2015-02-23 21:32:13 +01:00
|
|
|
# HG changeset patch
|
2018-03-13 20:46:06 +01:00
|
|
|
# Parent 97234138e3aafe66fc7f17c8f530e7c534af2fc2
|
2012-03-01 10:09:12 +01:00
|
|
|
Description: Add KDE integration to Firefox (toolkit parts)
|
|
|
|
Author: Wolfgang Rosenauer <wolfgang@rosenauer.org>
|
|
|
|
Author: Lubos Lunak <lunak@suse.com>
|
|
|
|
Bug: https://bugzilla.mozilla.org/show_bug.cgi?id=140751
|
|
|
|
https://bugzilla.novell.com/show_bug.cgi?id=170055
|
|
|
|
|
2014-12-02 23:01:52 +01:00
|
|
|
diff --git a/modules/libpref/Preferences.cpp b/modules/libpref/Preferences.cpp
|
|
|
|
--- a/modules/libpref/Preferences.cpp
|
|
|
|
+++ b/modules/libpref/Preferences.cpp
|
2018-03-13 20:46:06 +01:00
|
|
|
@@ -76,16 +76,17 @@
|
2011-06-01 08:05:09 +02:00
|
|
|
#include "nsXPCOMCID.h"
|
2018-01-23 10:55:12 +01:00
|
|
|
#include "nsXPCOM.h"
|
|
|
|
#include "nsXULAppAPI.h"
|
|
|
|
#include "nsZipArchive.h"
|
|
|
|
#include "plbase64.h"
|
2015-12-17 01:06:36 +01:00
|
|
|
#include "PLDHashTable.h"
|
2018-01-23 10:55:12 +01:00
|
|
|
#include "plstr.h"
|
|
|
|
#include "prlink.h"
|
|
|
|
+#include "nsKDEUtils.h"
|
2011-06-01 08:05:09 +02:00
|
|
|
|
2018-01-23 10:55:12 +01:00
|
|
|
#ifdef XP_WIN
|
|
|
|
#include "windows.h"
|
|
|
|
#endif
|
|
|
|
|
2018-03-13 20:46:06 +01:00
|
|
|
using namespace mozilla;
|
2011-06-01 08:05:09 +02:00
|
|
|
|
2018-03-13 20:46:06 +01:00
|
|
|
#ifdef DEBUG
|
|
|
|
@@ -4235,25 +4236,37 @@ Preferences::InitInitialObjects()
|
2018-01-23 10:55:12 +01:00
|
|
|
// application pref files for backwards compatibility.
|
2011-11-09 13:04:11 +01:00
|
|
|
static const char* specialFiles[] = {
|
2011-07-23 16:46:28 +02:00
|
|
|
#if defined(XP_MACOSX)
|
2011-11-09 13:04:11 +01:00
|
|
|
"macprefs.js"
|
2011-06-01 08:05:09 +02:00
|
|
|
#elif defined(XP_WIN)
|
2011-11-09 13:04:11 +01:00
|
|
|
"winpref.js"
|
2011-06-01 08:05:09 +02:00
|
|
|
#elif defined(XP_UNIX)
|
2011-11-09 13:04:11 +01:00
|
|
|
"unix.js"
|
|
|
|
+ , "" // placeholder for KDE (empty is otherwise harmless)
|
2016-04-27 09:09:13 +02:00
|
|
|
#if defined(_AIX)
|
2018-01-23 10:55:12 +01:00
|
|
|
,
|
|
|
|
"aix.js"
|
2011-06-01 08:05:09 +02:00
|
|
|
#endif
|
2011-07-23 16:46:28 +02:00
|
|
|
#elif defined(XP_BEOS)
|
2011-11-09 13:04:11 +01:00
|
|
|
"beos.js"
|
2011-06-01 08:05:09 +02:00
|
|
|
#endif
|
2011-11-09 13:04:11 +01:00
|
|
|
};
|
|
|
|
|
|
|
|
+ if(nsKDEUtils::kdeSession()) { // TODO what if some setup actually requires the helper?
|
2012-02-01 14:37:15 +01:00
|
|
|
+ for(int i = 0;
|
2014-04-27 18:09:32 +02:00
|
|
|
+ i < MOZ_ARRAY_LENGTH(specialFiles);
|
2011-11-09 13:04:11 +01:00
|
|
|
+ ++i ) {
|
|
|
|
+ if( *specialFiles[ i ] == '\0' ) {
|
|
|
|
+ specialFiles[ i ] = "kde.js";
|
|
|
|
+ break;
|
2011-06-01 08:05:09 +02:00
|
|
|
+ }
|
|
|
|
+ }
|
2011-11-09 13:04:11 +01:00
|
|
|
+ }
|
2011-06-01 08:05:09 +02:00
|
|
|
+
|
2018-01-23 10:55:12 +01:00
|
|
|
rv = pref_LoadPrefsInDir(
|
|
|
|
defaultPrefDir, specialFiles, ArrayLength(specialFiles));
|
|
|
|
if (NS_FAILED(rv)) {
|
2011-11-09 13:04:11 +01:00
|
|
|
NS_WARNING("Error parsing application default preferences.");
|
2018-01-23 10:55:12 +01:00
|
|
|
}
|
2011-06-01 08:05:09 +02:00
|
|
|
|
2011-07-23 16:46:28 +02:00
|
|
|
// Load jar:$app/omni.jar!/defaults/preferences/*.js
|
2012-07-16 10:13:51 +02:00
|
|
|
// or jar:$gre/omni.jar!/defaults/preferences/*.js.
|
2018-03-13 20:46:06 +01:00
|
|
|
@@ -4302,17 +4315,17 @@ Preferences::InitInitialObjects()
|
|
|
|
}
|
|
|
|
|
|
|
|
nsCOMPtr<nsIFile> path = do_QueryInterface(elem);
|
|
|
|
if (!path) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Do we care if a file provided by this process fails to load?
|
|
|
|
- pref_LoadPrefsInDir(path, nullptr, 0);
|
|
|
|
+ pref_LoadPrefsInDir(path, specialFiles, ArrayLength(specialFiles));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
#ifdef MOZ_WIDGET_ANDROID
|
|
|
|
// Set up the correct default for toolkit.telemetry.enabled. If this build
|
|
|
|
// has MOZ_TELEMETRY_ON_BY_DEFAULT *or* we're on the beta channel, telemetry
|
|
|
|
// is on by default, otherwise not. This is necessary so that beta users who
|
|
|
|
// are testing final release builds don't flipflop defaults.
|
2016-03-07 17:25:29 +01:00
|
|
|
diff --git a/modules/libpref/moz.build b/modules/libpref/moz.build
|
|
|
|
--- a/modules/libpref/moz.build
|
|
|
|
+++ b/modules/libpref/moz.build
|
2018-01-23 10:55:12 +01:00
|
|
|
@@ -27,16 +27,20 @@ XPIDL_MODULE = 'pref'
|
|
|
|
EXPORTS.mozilla += [
|
|
|
|
'Preferences.h',
|
|
|
|
]
|
|
|
|
|
2017-09-05 12:10:37 +02:00
|
|
|
UNIFIED_SOURCES += [
|
|
|
|
'Preferences.cpp',
|
2016-03-07 17:25:29 +01:00
|
|
|
]
|
|
|
|
|
|
|
|
+LOCAL_INCLUDES += [
|
2017-09-05 12:10:37 +02:00
|
|
|
+ '/toolkit/xre'
|
2016-03-07 17:25:29 +01:00
|
|
|
+]
|
|
|
|
+
|
|
|
|
include('/ipc/chromium/chromium-config.mozbuild')
|
|
|
|
|
|
|
|
FINAL_LIBRARY = 'xul'
|
|
|
|
|
|
|
|
DEFINES['OS_ARCH'] = CONFIG['OS_ARCH']
|
|
|
|
DEFINES['MOZ_WIDGET_TOOLKIT'] = CONFIG['MOZ_WIDGET_TOOLKIT']
|
2017-09-05 12:10:37 +02:00
|
|
|
if CONFIG['MOZ_ENABLE_WEBRENDER']:
|
|
|
|
DEFINES['MOZ_ENABLE_WEBRENDER'] = True
|
2013-05-14 16:33:59 +02:00
|
|
|
diff --git a/python/mozbuild/mozpack/chrome/flags.py b/python/mozbuild/mozpack/chrome/flags.py
|
|
|
|
--- a/python/mozbuild/mozpack/chrome/flags.py
|
|
|
|
+++ b/python/mozbuild/mozpack/chrome/flags.py
|
2017-09-05 12:10:37 +02:00
|
|
|
@@ -220,16 +220,17 @@ class Flags(OrderedDict):
|
2013-05-14 16:33:59 +02:00
|
|
|
'contentaccessible': Flag,
|
|
|
|
'os': StringFlag,
|
|
|
|
'osversion': VersionFlag,
|
|
|
|
'abi': StringFlag,
|
|
|
|
'platform': Flag,
|
|
|
|
'xpcnativewrappers': Flag,
|
|
|
|
'tablet': Flag,
|
2015-01-14 19:32:16 +01:00
|
|
|
'process': StringFlag,
|
|
|
|
+ 'desktop': StringFlag,
|
2013-05-14 16:33:59 +02:00
|
|
|
}
|
|
|
|
RE = re.compile(r'([!<>=]+)')
|
|
|
|
|
|
|
|
def __init__(self, *flags):
|
|
|
|
'''
|
|
|
|
Initialize a set of flags given in string form.
|
|
|
|
flags = Flags('contentaccessible=yes', 'appversion>=3.5')
|
|
|
|
'''
|
|
|
|
diff --git a/python/mozbuild/mozpack/chrome/manifest.py b/python/mozbuild/mozpack/chrome/manifest.py
|
|
|
|
--- a/python/mozbuild/mozpack/chrome/manifest.py
|
|
|
|
+++ b/python/mozbuild/mozpack/chrome/manifest.py
|
2017-11-15 00:17:59 +01:00
|
|
|
@@ -34,16 +34,17 @@ class ManifestEntry(object):
|
2013-05-14 16:33:59 +02:00
|
|
|
'platformversion',
|
|
|
|
'os',
|
|
|
|
'osversion',
|
|
|
|
'abi',
|
|
|
|
'xpcnativewrappers',
|
|
|
|
'tablet',
|
2015-01-14 19:32:16 +01:00
|
|
|
'process',
|
2017-11-15 00:17:59 +01:00
|
|
|
'contentaccessible',
|
|
|
|
+ 'desktop',
|
2013-05-14 16:33:59 +02:00
|
|
|
]
|
|
|
|
|
|
|
|
def __init__(self, base, *flags):
|
|
|
|
'''
|
|
|
|
Initialize a manifest entry with the given base path and flags.
|
|
|
|
'''
|
|
|
|
self.base = base
|
|
|
|
self.flags = Flags(*flags)
|
2014-12-02 23:01:52 +01:00
|
|
|
diff --git a/toolkit/components/downloads/moz.build b/toolkit/components/downloads/moz.build
|
|
|
|
--- a/toolkit/components/downloads/moz.build
|
|
|
|
+++ b/toolkit/components/downloads/moz.build
|
2018-01-23 10:55:12 +01:00
|
|
|
@@ -17,9 +17,13 @@ XPIDL_SOURCES += [
|
|
|
|
XPIDL_MODULE = 'downloads'
|
|
|
|
|
|
|
|
UNIFIED_SOURCES += [
|
2017-09-05 12:10:37 +02:00
|
|
|
'nsDownloadManager.cpp'
|
|
|
|
]
|
2014-12-02 23:01:52 +01:00
|
|
|
|
|
|
|
FINAL_LIBRARY = 'xul'
|
|
|
|
|
2018-01-23 10:55:12 +01:00
|
|
|
+LOCAL_INCLUDES += [
|
|
|
|
+ '/toolkit/xre'
|
|
|
|
+]
|
|
|
|
+
|
2014-12-02 23:01:52 +01:00
|
|
|
CXXFLAGS += CONFIG['TK_CFLAGS']
|
2011-06-01 08:05:09 +02:00
|
|
|
diff --git a/toolkit/content/jar.mn b/toolkit/content/jar.mn
|
|
|
|
--- a/toolkit/content/jar.mn
|
|
|
|
+++ b/toolkit/content/jar.mn
|
2018-03-13 20:46:06 +01:00
|
|
|
@@ -67,16 +67,18 @@ toolkit.jar:
|
|
|
|
content/global/bindings/checkbox.xml (widgets/checkbox.xml)
|
2012-10-09 13:14:08 +02:00
|
|
|
content/global/bindings/colorpicker.xml (widgets/colorpicker.xml)
|
2017-09-05 12:10:37 +02:00
|
|
|
content/global/bindings/datekeeper.js (widgets/datekeeper.js)
|
|
|
|
content/global/bindings/datepicker.js (widgets/datepicker.js)
|
2017-03-07 09:35:10 +01:00
|
|
|
content/global/bindings/datetimepopup.xml (widgets/datetimepopup.xml)
|
|
|
|
content/global/bindings/datetimebox.xml (widgets/datetimebox.xml)
|
|
|
|
content/global/bindings/datetimebox.css (widgets/datetimebox.css)
|
2016-04-27 09:09:13 +02:00
|
|
|
* content/global/bindings/dialog.xml (widgets/dialog.xml)
|
|
|
|
+* content/global/bindings/dialog-kde.xml (widgets/dialog-kde.xml)
|
2011-06-01 08:05:09 +02:00
|
|
|
+% override chrome://global/content/bindings/dialog.xml chrome://global/content/bindings/dialog-kde.xml desktop=kde
|
2012-10-09 13:14:08 +02:00
|
|
|
content/global/bindings/editor.xml (widgets/editor.xml)
|
2016-04-27 09:09:13 +02:00
|
|
|
content/global/bindings/filefield.xml (widgets/filefield.xml)
|
|
|
|
* content/global/bindings/findbar.xml (widgets/findbar.xml)
|
2012-10-09 13:14:08 +02:00
|
|
|
content/global/bindings/general.xml (widgets/general.xml)
|
|
|
|
content/global/bindings/groupbox.xml (widgets/groupbox.xml)
|
2016-04-27 09:09:13 +02:00
|
|
|
content/global/bindings/listbox.xml (widgets/listbox.xml)
|
2012-10-09 13:14:08 +02:00
|
|
|
content/global/bindings/menu.xml (widgets/menu.xml)
|
|
|
|
content/global/bindings/menulist.xml (widgets/menulist.xml)
|
2011-06-01 08:05:09 +02:00
|
|
|
diff --git a/toolkit/content/widgets/dialog-kde.xml b/toolkit/content/widgets/dialog-kde.xml
|
|
|
|
new file mode 100644
|
|
|
|
--- /dev/null
|
|
|
|
+++ b/toolkit/content/widgets/dialog-kde.xml
|
2018-03-13 20:46:06 +01:00
|
|
|
@@ -0,0 +1,477 @@
|
2011-06-01 08:05:09 +02:00
|
|
|
+<?xml version="1.0"?>
|
2012-08-28 20:40:50 +02:00
|
|
|
+<!-- This Source Code Form is subject to the terms of the Mozilla Public
|
|
|
|
+ - License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
|
|
+ - file, You can obtain one at http://mozilla.org/MPL/2.0/. -->
|
|
|
|
+
|
2018-03-13 20:46:06 +01:00
|
|
|
+<!DOCTYPE bindings [
|
|
|
|
+ <!ENTITY % globalKeysDTD SYSTEM "chrome://global/locale/globalKeys.dtd">
|
|
|
|
+ %globalKeysDTD;
|
|
|
|
+]>
|
2011-06-01 08:05:09 +02:00
|
|
|
+
|
|
|
|
+<bindings id="dialogBindings"
|
|
|
|
+ xmlns="http://www.mozilla.org/xbl"
|
|
|
|
+ xmlns:xul="http://www.mozilla.org/keymaster/gatekeeper/there.is.only.xul"
|
|
|
|
+ xmlns:xbl="http://www.mozilla.org/xbl">
|
- update to Firefox 47.0 (boo#983549)
* Enable VP9 video codec for users with fast machines
* Embedded YouTube videos now play with HTML5 video if Flash is
not installed
* View and search open tabs from your smartphone or another
computer in a sidebar
* Allow no-cache on back/forward navigations for https resources
security fixes:
* MFSA 2016-49/CVE-2016-2815/CVE-2016-2818
(boo#983638)
(bmo#1241896, bmo#1242798, bmo#1243466, bmo#1245743,
bmo#1264300, bmo#1271037, bmo#1234147, bmo#1256493,
bmo#1256739, bmo#1256968, bmo#1261230, bmo#1261752,
bmo#1263384, bmo#1264575, bmo#1265577, bmo#1267130,
bmo#1269729, bmo#1273202, bmo#1273701)
Miscellaneous memory safety hazards (rv:47.0 / rv:45.2)
* MFSA 2016-50/CVE-2016-2819 (boo#983655) (bmo#1270381)
Buffer overflow parsing HTML5 fragments
* MFSA 2016-51/CVE-2016-2821 (bsc#983653) (bmo#1271460)
Use-after-free deleting tables from a contenteditable document
* MFSA 2016-52/CVE-2016-2822 (boo#983652) (bmo#1273129)
Addressbar spoofing though the SELECT element
* MFSA 2016-53/CVE-2016-2824 (boo#983651) (bmo#1248580)
Out-of-bounds write with WebGL shader
* MFSA 2016-54/CVE-2016-2825 (boo#983649) (bmo#1193093)
Partial same-origin-policy through setting location.host
through data URI
* MFSA 2016-56/CVE-2016-2828 (boo#983646) (bmo#1223810)
Use-after-free when textures are used in WebGL operations
after recycle pool destruction
OBS-URL: https://build.opensuse.org/package/show/mozilla:Factory/MozillaFirefox?expand=0&rev=518
2016-06-08 14:26:29 +02:00
|
|
|
+
|
2011-06-01 08:05:09 +02:00
|
|
|
+ <binding id="dialog" extends="chrome://global/content/bindings/general.xml#root-element">
|
|
|
|
+ <resources>
|
|
|
|
+ <stylesheet src="chrome://global/skin/dialog.css"/>
|
|
|
|
+ </resources>
|
|
|
|
+ <content>
|
|
|
|
+ <xul:vbox class="box-inherit dialog-content-box" flex="1">
|
|
|
|
+ <children/>
|
|
|
|
+ </xul:vbox>
|
- update to Firefox 47.0 (boo#983549)
* Enable VP9 video codec for users with fast machines
* Embedded YouTube videos now play with HTML5 video if Flash is
not installed
* View and search open tabs from your smartphone or another
computer in a sidebar
* Allow no-cache on back/forward navigations for https resources
security fixes:
* MFSA 2016-49/CVE-2016-2815/CVE-2016-2818
(boo#983638)
(bmo#1241896, bmo#1242798, bmo#1243466, bmo#1245743,
bmo#1264300, bmo#1271037, bmo#1234147, bmo#1256493,
bmo#1256739, bmo#1256968, bmo#1261230, bmo#1261752,
bmo#1263384, bmo#1264575, bmo#1265577, bmo#1267130,
bmo#1269729, bmo#1273202, bmo#1273701)
Miscellaneous memory safety hazards (rv:47.0 / rv:45.2)
* MFSA 2016-50/CVE-2016-2819 (boo#983655) (bmo#1270381)
Buffer overflow parsing HTML5 fragments
* MFSA 2016-51/CVE-2016-2821 (bsc#983653) (bmo#1271460)
Use-after-free deleting tables from a contenteditable document
* MFSA 2016-52/CVE-2016-2822 (boo#983652) (bmo#1273129)
Addressbar spoofing though the SELECT element
* MFSA 2016-53/CVE-2016-2824 (boo#983651) (bmo#1248580)
Out-of-bounds write with WebGL shader
* MFSA 2016-54/CVE-2016-2825 (boo#983649) (bmo#1193093)
Partial same-origin-policy through setting location.host
through data URI
* MFSA 2016-56/CVE-2016-2828 (boo#983646) (bmo#1223810)
Use-after-free when textures are used in WebGL operations
after recycle pool destruction
OBS-URL: https://build.opensuse.org/package/show/mozilla:Factory/MozillaFirefox?expand=0&rev=518
2016-06-08 14:26:29 +02:00
|
|
|
+
|
2011-06-01 08:05:09 +02:00
|
|
|
+ <xul:hbox class="dialog-button-box" anonid="buttons"
|
|
|
|
+ xbl:inherits="pack=buttonpack,align=buttonalign,dir=buttondir,orient=buttonorient"
|
2016-06-14 22:12:53 +02:00
|
|
|
+#ifdef XP_UNIX_GNOME
|
2011-06-01 08:05:09 +02:00
|
|
|
+ >
|
|
|
|
+ <xul:button dlgtype="disclosure" class="dialog-button" hidden="true"/>
|
|
|
|
+ <xul:button dlgtype="help" class="dialog-button" hidden="true"/>
|
|
|
|
+ <xul:button dlgtype="extra2" class="dialog-button" hidden="true"/>
|
|
|
|
+ <xul:button dlgtype="extra1" class="dialog-button" hidden="true"/>
|
|
|
|
+ <xul:spacer anonid="spacer" flex="1"/>
|
|
|
|
+ <xul:button dlgtype="cancel" class="dialog-button"/>
|
|
|
|
+ <xul:button dlgtype="accept" class="dialog-button" xbl:inherits="disabled=buttondisabledaccept"/>
|
|
|
|
+#elif XP_UNIX
|
- update to Firefox 30.0 (bnc#881874)
* MFSA 2014-48/CVE-2014-1533/CVE-2014-1534
(bmo#921622, bmo#967354, bmo#969517, bmo#969549, bmo#973874,
bmo#978652, bmo#978811, bmo#988719, bmo#990868, bmo#991981,
bmo#992274, bmo#994907, bmo#995679, bmo#995816, bmo#995817,
bmo#996536, bmo#996715, bmo#999651, bmo#1000598,
bmo#1000960, bmo#1002340, bmo#1005578, bmo#1007223,
bmo#1009952, bmo#1011007)
Miscellaneous memory safety hazards (rv:30.0)
* MFSA 2014-49/CVE-2014-1536/CVE-2014-1537/CVE-2014-1538
(bmo#989994, bmo#999274, bmo#1005584)
Use-after-free and out of bounds issues found using Address
Sanitizer
* MFSA 2014-50/CVE-2014-1539 (bmo#995603)
Clickjacking through cursor invisability after Flash interaction
* MFSA 2014-51/CVE-2014-1540 (bmo#978862)
Use-after-free in Event Listener Manager
* MFSA 2014-52/CVE-2014-1541 (bmo#1000185)
Use-after-free with SMIL Animation Controller
* MFSA 2014-53/CVE-2014-1542 (bmo#991533)
Buffer overflow in Web Audio Speex resampler
* MFSA 2014-54/CVE-2014-1543 (bmo#1011859)
Buffer overflow in Gamepad API
- rebased patches
- removed obsolete patches
* firefox-browser-css.patch
* mozilla-aarch64-bmo-962488.patch
* mozilla-aarch64-bmo-963023.patch
* mozilla-aarch64-bmo-963024.patch
* mozilla-aarch64-bmo-963027.patch
OBS-URL: https://build.opensuse.org/package/show/mozilla:Factory/MozillaFirefox?expand=0&rev=384
2014-06-11 10:41:30 +02:00
|
|
|
+ >
|
2016-04-27 09:09:13 +02:00
|
|
|
+ <xul:button dlgtype="help" class="dialog-button" hidden="true"/>
|
- update to Firefox 47.0 (boo#983549)
* Enable VP9 video codec for users with fast machines
* Embedded YouTube videos now play with HTML5 video if Flash is
not installed
* View and search open tabs from your smartphone or another
computer in a sidebar
* Allow no-cache on back/forward navigations for https resources
security fixes:
* MFSA 2016-49/CVE-2016-2815/CVE-2016-2818
(boo#983638)
(bmo#1241896, bmo#1242798, bmo#1243466, bmo#1245743,
bmo#1264300, bmo#1271037, bmo#1234147, bmo#1256493,
bmo#1256739, bmo#1256968, bmo#1261230, bmo#1261752,
bmo#1263384, bmo#1264575, bmo#1265577, bmo#1267130,
bmo#1269729, bmo#1273202, bmo#1273701)
Miscellaneous memory safety hazards (rv:47.0 / rv:45.2)
* MFSA 2016-50/CVE-2016-2819 (boo#983655) (bmo#1270381)
Buffer overflow parsing HTML5 fragments
* MFSA 2016-51/CVE-2016-2821 (bsc#983653) (bmo#1271460)
Use-after-free deleting tables from a contenteditable document
* MFSA 2016-52/CVE-2016-2822 (boo#983652) (bmo#1273129)
Addressbar spoofing though the SELECT element
* MFSA 2016-53/CVE-2016-2824 (boo#983651) (bmo#1248580)
Out-of-bounds write with WebGL shader
* MFSA 2016-54/CVE-2016-2825 (boo#983649) (bmo#1193093)
Partial same-origin-policy through setting location.host
through data URI
* MFSA 2016-56/CVE-2016-2828 (boo#983646) (bmo#1223810)
Use-after-free when textures are used in WebGL operations
after recycle pool destruction
OBS-URL: https://build.opensuse.org/package/show/mozilla:Factory/MozillaFirefox?expand=0&rev=518
2016-06-08 14:26:29 +02:00
|
|
|
+ <xul:button dlgtype="extra2" class="dialog-button" hidden="true"/>
|
|
|
|
+ <xul:spacer anonid="spacer" flex="1"/>
|
|
|
|
+ <xul:button dlgtype="accept" class="dialog-button" xbl:inherits="disabled=buttondisabledaccept"/>
|
|
|
|
+ <xul:button dlgtype="extra1" class="dialog-button" hidden="true"/>
|
|
|
|
+ <xul:button dlgtype="cancel" class="dialog-button"/>
|
|
|
|
+ <xul:button dlgtype="disclosure" class="dialog-button" hidden="true"/>
|
2011-06-01 08:05:09 +02:00
|
|
|
+#else
|
|
|
|
+ pack="end">
|
|
|
|
+ <xul:button dlgtype="extra2" class="dialog-button" hidden="true"/>
|
|
|
|
+ <xul:spacer anonid="spacer" flex="1" hidden="true"/>
|
|
|
|
+ <xul:button dlgtype="accept" class="dialog-button" xbl:inherits="disabled=buttondisabledaccept"/>
|
|
|
|
+ <xul:button dlgtype="extra1" class="dialog-button" hidden="true"/>
|
|
|
|
+ <xul:button dlgtype="cancel" class="dialog-button"/>
|
|
|
|
+ <xul:button dlgtype="help" class="dialog-button" hidden="true"/>
|
|
|
|
+ <xul:button dlgtype="disclosure" class="dialog-button" hidden="true"/>
|
|
|
|
+#endif
|
|
|
|
+ </xul:hbox>
|
2018-03-13 20:46:06 +01:00
|
|
|
+
|
|
|
|
+ <xul:keyset>
|
|
|
|
+ <xul:key phase="capturing" oncommand="document.documentElement.openHelp(event)"
|
|
|
|
+#ifdef XP_MACOSX
|
|
|
|
+ key="&openHelpMac.commandkey;" modifiers="accel"/>
|
|
|
|
+#else
|
|
|
|
+ keycode="&openHelp.commandkey;"/>
|
|
|
|
+#endif
|
|
|
|
+ </xul:keyset>
|
|
|
|
+
|
2011-06-01 08:05:09 +02:00
|
|
|
+ </content>
|
|
|
|
+
|
|
|
|
+ <implementation>
|
|
|
|
+ <field name="_mStrBundle">null</field>
|
|
|
|
+ <field name="_closeHandler">(function(event) {
|
|
|
|
+ if (!document.documentElement.cancelDialog())
|
|
|
|
+ event.preventDefault();
|
|
|
|
+ })</field>
|
|
|
|
+
|
|
|
|
+ <property name="buttons"
|
|
|
|
+ onget="return this.getAttribute('buttons');"
|
|
|
|
+ onset="this._configureButtons(val); return val;"/>
|
|
|
|
+
|
|
|
|
+ <property name="defaultButton">
|
|
|
|
+ <getter>
|
|
|
|
+ <![CDATA[
|
|
|
|
+ if (this.hasAttribute("defaultButton"))
|
|
|
|
+ return this.getAttribute("defaultButton");
|
2018-03-13 20:46:06 +01:00
|
|
|
+ return "accept"; // default to the accept button
|
2011-06-01 08:05:09 +02:00
|
|
|
+ ]]>
|
|
|
|
+ </getter>
|
|
|
|
+ <setter>
|
|
|
|
+ <![CDATA[
|
|
|
|
+ this._setDefaultButton(val);
|
|
|
|
+ return val;
|
|
|
|
+ ]]>
|
|
|
|
+ </setter>
|
|
|
|
+ </property>
|
|
|
|
+
|
|
|
|
+ <method name="acceptDialog">
|
|
|
|
+ <body>
|
|
|
|
+ <![CDATA[
|
|
|
|
+ return this._doButtonCommand("accept");
|
|
|
|
+ ]]>
|
|
|
|
+ </body>
|
|
|
|
+ </method>
|
- update to Firefox 47.0 (boo#983549)
* Enable VP9 video codec for users with fast machines
* Embedded YouTube videos now play with HTML5 video if Flash is
not installed
* View and search open tabs from your smartphone or another
computer in a sidebar
* Allow no-cache on back/forward navigations for https resources
security fixes:
* MFSA 2016-49/CVE-2016-2815/CVE-2016-2818
(boo#983638)
(bmo#1241896, bmo#1242798, bmo#1243466, bmo#1245743,
bmo#1264300, bmo#1271037, bmo#1234147, bmo#1256493,
bmo#1256739, bmo#1256968, bmo#1261230, bmo#1261752,
bmo#1263384, bmo#1264575, bmo#1265577, bmo#1267130,
bmo#1269729, bmo#1273202, bmo#1273701)
Miscellaneous memory safety hazards (rv:47.0 / rv:45.2)
* MFSA 2016-50/CVE-2016-2819 (boo#983655) (bmo#1270381)
Buffer overflow parsing HTML5 fragments
* MFSA 2016-51/CVE-2016-2821 (bsc#983653) (bmo#1271460)
Use-after-free deleting tables from a contenteditable document
* MFSA 2016-52/CVE-2016-2822 (boo#983652) (bmo#1273129)
Addressbar spoofing though the SELECT element
* MFSA 2016-53/CVE-2016-2824 (boo#983651) (bmo#1248580)
Out-of-bounds write with WebGL shader
* MFSA 2016-54/CVE-2016-2825 (boo#983649) (bmo#1193093)
Partial same-origin-policy through setting location.host
through data URI
* MFSA 2016-56/CVE-2016-2828 (boo#983646) (bmo#1223810)
Use-after-free when textures are used in WebGL operations
after recycle pool destruction
OBS-URL: https://build.opensuse.org/package/show/mozilla:Factory/MozillaFirefox?expand=0&rev=518
2016-06-08 14:26:29 +02:00
|
|
|
+
|
2011-06-01 08:05:09 +02:00
|
|
|
+ <method name="cancelDialog">
|
|
|
|
+ <body>
|
|
|
|
+ <![CDATA[
|
|
|
|
+ return this._doButtonCommand("cancel");
|
|
|
|
+ ]]>
|
|
|
|
+ </body>
|
|
|
|
+ </method>
|
- update to Firefox 47.0 (boo#983549)
* Enable VP9 video codec for users with fast machines
* Embedded YouTube videos now play with HTML5 video if Flash is
not installed
* View and search open tabs from your smartphone or another
computer in a sidebar
* Allow no-cache on back/forward navigations for https resources
security fixes:
* MFSA 2016-49/CVE-2016-2815/CVE-2016-2818
(boo#983638)
(bmo#1241896, bmo#1242798, bmo#1243466, bmo#1245743,
bmo#1264300, bmo#1271037, bmo#1234147, bmo#1256493,
bmo#1256739, bmo#1256968, bmo#1261230, bmo#1261752,
bmo#1263384, bmo#1264575, bmo#1265577, bmo#1267130,
bmo#1269729, bmo#1273202, bmo#1273701)
Miscellaneous memory safety hazards (rv:47.0 / rv:45.2)
* MFSA 2016-50/CVE-2016-2819 (boo#983655) (bmo#1270381)
Buffer overflow parsing HTML5 fragments
* MFSA 2016-51/CVE-2016-2821 (bsc#983653) (bmo#1271460)
Use-after-free deleting tables from a contenteditable document
* MFSA 2016-52/CVE-2016-2822 (boo#983652) (bmo#1273129)
Addressbar spoofing though the SELECT element
* MFSA 2016-53/CVE-2016-2824 (boo#983651) (bmo#1248580)
Out-of-bounds write with WebGL shader
* MFSA 2016-54/CVE-2016-2825 (boo#983649) (bmo#1193093)
Partial same-origin-policy through setting location.host
through data URI
* MFSA 2016-56/CVE-2016-2828 (boo#983646) (bmo#1223810)
Use-after-free when textures are used in WebGL operations
after recycle pool destruction
OBS-URL: https://build.opensuse.org/package/show/mozilla:Factory/MozillaFirefox?expand=0&rev=518
2016-06-08 14:26:29 +02:00
|
|
|
+
|
2011-06-01 08:05:09 +02:00
|
|
|
+ <method name="getButton">
|
|
|
|
+ <parameter name="aDlgType"/>
|
|
|
|
+ <body>
|
|
|
|
+ <![CDATA[
|
|
|
|
+ return this._buttons[aDlgType];
|
|
|
|
+ ]]>
|
|
|
|
+ </body>
|
|
|
|
+ </method>
|
|
|
|
+
|
|
|
|
+ <method name="moveToAlertPosition">
|
|
|
|
+ <body>
|
|
|
|
+ <![CDATA[
|
|
|
|
+ // hack. we need this so the window has something like its final size
|
|
|
|
+ if (window.outerWidth == 1) {
|
|
|
|
+ dump("Trying to position a sizeless window; caller should have called sizeToContent() or sizeTo(). See bug 75649.\n");
|
|
|
|
+ sizeToContent();
|
|
|
|
+ }
|
|
|
|
+
|
2015-08-12 09:11:49 +02:00
|
|
|
+ if (opener) {
|
|
|
|
+ var xOffset = (opener.outerWidth - window.outerWidth) / 2;
|
|
|
|
+ var yOffset = opener.outerHeight / 5;
|
2011-06-01 08:05:09 +02:00
|
|
|
+
|
2015-08-12 09:11:49 +02:00
|
|
|
+ var newX = opener.screenX + xOffset;
|
|
|
|
+ var newY = opener.screenY + yOffset;
|
|
|
|
+ } else {
|
|
|
|
+ newX = (screen.availWidth - window.outerWidth) / 2;
|
|
|
|
+ newY = (screen.availHeight - window.outerHeight) / 2;
|
|
|
|
+ }
|
2011-06-01 08:05:09 +02:00
|
|
|
+
|
|
|
|
+ // ensure the window is fully onscreen (if smaller than the screen)
|
|
|
|
+ if (newX < screen.availLeft)
|
|
|
|
+ newX = screen.availLeft + 20;
|
|
|
|
+ if ((newX + window.outerWidth) > (screen.availLeft + screen.availWidth))
|
|
|
|
+ newX = (screen.availLeft + screen.availWidth) - window.outerWidth - 20;
|
|
|
|
+
|
|
|
|
+ if (newY < screen.availTop)
|
|
|
|
+ newY = screen.availTop + 20;
|
|
|
|
+ if ((newY + window.outerHeight) > (screen.availTop + screen.availHeight))
|
|
|
|
+ newY = (screen.availTop + screen.availHeight) - window.outerHeight - 60;
|
|
|
|
+
|
|
|
|
+ window.moveTo( newX, newY );
|
|
|
|
+ ]]>
|
|
|
|
+ </body>
|
|
|
|
+ </method>
|
|
|
|
+
|
|
|
|
+ <method name="centerWindowOnScreen">
|
|
|
|
+ <body>
|
|
|
|
+ <![CDATA[
|
2017-09-05 12:10:37 +02:00
|
|
|
+ var xOffset = screen.availWidth / 2 - window.outerWidth / 2;
|
|
|
|
+ var yOffset = screen.availHeight / 2 - window.outerHeight / 2;
|
- update to Firefox 47.0 (boo#983549)
* Enable VP9 video codec for users with fast machines
* Embedded YouTube videos now play with HTML5 video if Flash is
not installed
* View and search open tabs from your smartphone or another
computer in a sidebar
* Allow no-cache on back/forward navigations for https resources
security fixes:
* MFSA 2016-49/CVE-2016-2815/CVE-2016-2818
(boo#983638)
(bmo#1241896, bmo#1242798, bmo#1243466, bmo#1245743,
bmo#1264300, bmo#1271037, bmo#1234147, bmo#1256493,
bmo#1256739, bmo#1256968, bmo#1261230, bmo#1261752,
bmo#1263384, bmo#1264575, bmo#1265577, bmo#1267130,
bmo#1269729, bmo#1273202, bmo#1273701)
Miscellaneous memory safety hazards (rv:47.0 / rv:45.2)
* MFSA 2016-50/CVE-2016-2819 (boo#983655) (bmo#1270381)
Buffer overflow parsing HTML5 fragments
* MFSA 2016-51/CVE-2016-2821 (bsc#983653) (bmo#1271460)
Use-after-free deleting tables from a contenteditable document
* MFSA 2016-52/CVE-2016-2822 (boo#983652) (bmo#1273129)
Addressbar spoofing though the SELECT element
* MFSA 2016-53/CVE-2016-2824 (boo#983651) (bmo#1248580)
Out-of-bounds write with WebGL shader
* MFSA 2016-54/CVE-2016-2825 (boo#983649) (bmo#1193093)
Partial same-origin-policy through setting location.host
through data URI
* MFSA 2016-56/CVE-2016-2828 (boo#983646) (bmo#1223810)
Use-after-free when textures are used in WebGL operations
after recycle pool destruction
OBS-URL: https://build.opensuse.org/package/show/mozilla:Factory/MozillaFirefox?expand=0&rev=518
2016-06-08 14:26:29 +02:00
|
|
|
+
|
2011-06-01 08:05:09 +02:00
|
|
|
+ xOffset = xOffset > 0 ? xOffset : 0;
|
|
|
|
+ yOffset = yOffset > 0 ? yOffset : 0;
|
|
|
|
+ window.moveTo(xOffset, yOffset);
|
|
|
|
+ ]]>
|
|
|
|
+ </body>
|
|
|
|
+ </method>
|
|
|
|
+
|
|
|
|
+ <constructor>
|
|
|
|
+ <![CDATA[
|
|
|
|
+ this._configureButtons(this.buttons);
|
|
|
|
+
|
|
|
|
+ // listen for when window is closed via native close buttons
|
2017-09-05 12:10:37 +02:00
|
|
|
+ window.addEventListener("close", this._closeHandler);
|
2011-06-01 08:05:09 +02:00
|
|
|
+
|
|
|
|
+ // for things that we need to initialize after onload fires
|
2017-09-05 12:10:37 +02:00
|
|
|
+ window.addEventListener("load", this.postLoadInit);
|
2011-06-01 08:05:09 +02:00
|
|
|
+
|
|
|
|
+ window.moveToAlertPosition = this.moveToAlertPosition;
|
|
|
|
+ window.centerWindowOnScreen = this.centerWindowOnScreen;
|
|
|
|
+ ]]>
|
|
|
|
+ </constructor>
|
|
|
|
+
|
|
|
|
+ <method name="postLoadInit">
|
|
|
|
+ <parameter name="aEvent"/>
|
|
|
|
+ <body>
|
|
|
|
+ <![CDATA[
|
|
|
|
+ function focusInit() {
|
|
|
|
+ const dialog = document.documentElement;
|
|
|
|
+ const defaultButton = dialog.getButton(dialog.defaultButton);
|
|
|
|
+ // give focus to the first focusable element in the dialog
|
|
|
|
+ if (!document.commandDispatcher.focusedElement) {
|
|
|
|
+ document.commandDispatcher.advanceFocusIntoSubtree(dialog);
|
|
|
|
+
|
|
|
|
+ var focusedElt = document.commandDispatcher.focusedElement;
|
|
|
|
+ if (focusedElt) {
|
|
|
|
+ var initialFocusedElt = focusedElt;
|
|
|
|
+ while (focusedElt.localName == "tab" ||
|
|
|
|
+ focusedElt.getAttribute("noinitialfocus") == "true") {
|
|
|
|
+ document.commandDispatcher.advanceFocusIntoSubtree(focusedElt);
|
|
|
|
+ focusedElt = document.commandDispatcher.focusedElement;
|
2018-01-23 10:55:12 +01:00
|
|
|
+ if (focusedElt == initialFocusedElt) {
|
|
|
|
+ if (focusedElt.getAttribute("noinitialfocus") == "true") {
|
|
|
|
+ focusedElt.blur();
|
|
|
|
+ }
|
2011-06-01 08:05:09 +02:00
|
|
|
+ break;
|
2018-01-23 10:55:12 +01:00
|
|
|
+ }
|
2011-06-01 08:05:09 +02:00
|
|
|
+ }
|
|
|
|
+
|
|
|
|
+ if (initialFocusedElt.localName == "tab") {
|
|
|
|
+ if (focusedElt.hasAttribute("dlgtype")) {
|
|
|
|
+ // We don't want to focus on anonymous OK, Cancel, etc. buttons,
|
|
|
|
+ // so return focus to the tab itself
|
|
|
|
+ initialFocusedElt.focus();
|
|
|
|
+ }
|
2017-09-05 12:10:37 +02:00
|
|
|
+ } else if (!/Mac/.test(navigator.platform) &&
|
|
|
|
+ focusedElt.hasAttribute("dlgtype") && focusedElt != defaultButton) {
|
2011-06-01 08:05:09 +02:00
|
|
|
+ defaultButton.focus();
|
|
|
|
+ }
|
|
|
|
+ }
|
|
|
|
+ }
|
|
|
|
+
|
|
|
|
+ try {
|
|
|
|
+ if (defaultButton)
|
|
|
|
+ window.notifyDefaultButtonLoaded(defaultButton);
|
|
|
|
+ } catch (e) { }
|
|
|
|
+ }
|
|
|
|
+
|
|
|
|
+ // Give focus after onload completes, see bug 103197.
|
|
|
|
+ setTimeout(focusInit, 0);
|
|
|
|
+ ]]>
|
|
|
|
+ </body>
|
- update to Firefox 47.0 (boo#983549)
* Enable VP9 video codec for users with fast machines
* Embedded YouTube videos now play with HTML5 video if Flash is
not installed
* View and search open tabs from your smartphone or another
computer in a sidebar
* Allow no-cache on back/forward navigations for https resources
security fixes:
* MFSA 2016-49/CVE-2016-2815/CVE-2016-2818
(boo#983638)
(bmo#1241896, bmo#1242798, bmo#1243466, bmo#1245743,
bmo#1264300, bmo#1271037, bmo#1234147, bmo#1256493,
bmo#1256739, bmo#1256968, bmo#1261230, bmo#1261752,
bmo#1263384, bmo#1264575, bmo#1265577, bmo#1267130,
bmo#1269729, bmo#1273202, bmo#1273701)
Miscellaneous memory safety hazards (rv:47.0 / rv:45.2)
* MFSA 2016-50/CVE-2016-2819 (boo#983655) (bmo#1270381)
Buffer overflow parsing HTML5 fragments
* MFSA 2016-51/CVE-2016-2821 (bsc#983653) (bmo#1271460)
Use-after-free deleting tables from a contenteditable document
* MFSA 2016-52/CVE-2016-2822 (boo#983652) (bmo#1273129)
Addressbar spoofing though the SELECT element
* MFSA 2016-53/CVE-2016-2824 (boo#983651) (bmo#1248580)
Out-of-bounds write with WebGL shader
* MFSA 2016-54/CVE-2016-2825 (boo#983649) (bmo#1193093)
Partial same-origin-policy through setting location.host
through data URI
* MFSA 2016-56/CVE-2016-2828 (boo#983646) (bmo#1223810)
Use-after-free when textures are used in WebGL operations
after recycle pool destruction
OBS-URL: https://build.opensuse.org/package/show/mozilla:Factory/MozillaFirefox?expand=0&rev=518
2016-06-08 14:26:29 +02:00
|
|
|
+ </method>
|
2011-06-01 08:05:09 +02:00
|
|
|
+
|
2018-03-13 20:46:06 +01:00
|
|
|
+ <method name="openHelp">
|
|
|
|
+ <parameter name="event"/>
|
|
|
|
+ <body>
|
|
|
|
+ <![CDATA[
|
|
|
|
+ var helpButton = document.documentElement.getButton("help");
|
|
|
|
+ if (helpButton.disabled || helpButton.hidden)
|
|
|
|
+ return;
|
|
|
|
+ this._fireButtonEvent("help");
|
|
|
|
+ event.stopPropagation();
|
|
|
|
+ event.preventDefault();
|
|
|
|
+ ]]>
|
|
|
|
+ </body>
|
|
|
|
+ </method>
|
|
|
|
+
|
2011-06-01 08:05:09 +02:00
|
|
|
+ <property name="mStrBundle">
|
|
|
|
+ <getter>
|
|
|
|
+ <![CDATA[
|
|
|
|
+ if (!this._mStrBundle) {
|
|
|
|
+ // need to create string bundle manually instead of using <xul:stringbundle/>
|
|
|
|
+ // see bug 63370 for details
|
|
|
|
+ this._mStrBundle = Components.classes["@mozilla.org/intl/stringbundle;1"]
|
|
|
|
+ .getService(Components.interfaces.nsIStringBundleService)
|
|
|
|
+ .createBundle("chrome://global/locale/dialog.properties");
|
|
|
|
+ }
|
|
|
|
+ return this._mStrBundle;
|
|
|
|
+ ]]></getter>
|
|
|
|
+ </property>
|
- update to Firefox 47.0 (boo#983549)
* Enable VP9 video codec for users with fast machines
* Embedded YouTube videos now play with HTML5 video if Flash is
not installed
* View and search open tabs from your smartphone or another
computer in a sidebar
* Allow no-cache on back/forward navigations for https resources
security fixes:
* MFSA 2016-49/CVE-2016-2815/CVE-2016-2818
(boo#983638)
(bmo#1241896, bmo#1242798, bmo#1243466, bmo#1245743,
bmo#1264300, bmo#1271037, bmo#1234147, bmo#1256493,
bmo#1256739, bmo#1256968, bmo#1261230, bmo#1261752,
bmo#1263384, bmo#1264575, bmo#1265577, bmo#1267130,
bmo#1269729, bmo#1273202, bmo#1273701)
Miscellaneous memory safety hazards (rv:47.0 / rv:45.2)
* MFSA 2016-50/CVE-2016-2819 (boo#983655) (bmo#1270381)
Buffer overflow parsing HTML5 fragments
* MFSA 2016-51/CVE-2016-2821 (bsc#983653) (bmo#1271460)
Use-after-free deleting tables from a contenteditable document
* MFSA 2016-52/CVE-2016-2822 (boo#983652) (bmo#1273129)
Addressbar spoofing though the SELECT element
* MFSA 2016-53/CVE-2016-2824 (boo#983651) (bmo#1248580)
Out-of-bounds write with WebGL shader
* MFSA 2016-54/CVE-2016-2825 (boo#983649) (bmo#1193093)
Partial same-origin-policy through setting location.host
through data URI
* MFSA 2016-56/CVE-2016-2828 (boo#983646) (bmo#1223810)
Use-after-free when textures are used in WebGL operations
after recycle pool destruction
OBS-URL: https://build.opensuse.org/package/show/mozilla:Factory/MozillaFirefox?expand=0&rev=518
2016-06-08 14:26:29 +02:00
|
|
|
+
|
2011-06-01 08:05:09 +02:00
|
|
|
+ <method name="_configureButtons">
|
|
|
|
+ <parameter name="aButtons"/>
|
|
|
|
+ <body>
|
|
|
|
+ <![CDATA[
|
|
|
|
+ // by default, get all the anonymous button elements
|
|
|
|
+ var buttons = {};
|
|
|
|
+ this._buttons = buttons;
|
|
|
|
+ buttons.accept = document.getAnonymousElementByAttribute(this, "dlgtype", "accept");
|
|
|
|
+ buttons.cancel = document.getAnonymousElementByAttribute(this, "dlgtype", "cancel");
|
|
|
|
+ buttons.extra1 = document.getAnonymousElementByAttribute(this, "dlgtype", "extra1");
|
|
|
|
+ buttons.extra2 = document.getAnonymousElementByAttribute(this, "dlgtype", "extra2");
|
|
|
|
+ buttons.help = document.getAnonymousElementByAttribute(this, "dlgtype", "help");
|
|
|
|
+ buttons.disclosure = document.getAnonymousElementByAttribute(this, "dlgtype", "disclosure");
|
|
|
|
+
|
|
|
|
+ // look for any overriding explicit button elements
|
|
|
|
+ var exBtns = this.getElementsByAttribute("dlgtype", "*");
|
|
|
|
+ var dlgtype;
|
|
|
|
+ var i;
|
|
|
|
+ for (i = 0; i < exBtns.length; ++i) {
|
|
|
|
+ dlgtype = exBtns[i].getAttribute("dlgtype");
|
|
|
|
+ buttons[dlgtype].hidden = true; // hide the anonymous button
|
|
|
|
+ buttons[dlgtype] = exBtns[i];
|
|
|
|
+ }
|
|
|
|
+
|
|
|
|
+ // add the label and oncommand handler to each button
|
|
|
|
+ for (dlgtype in buttons) {
|
|
|
|
+ var button = buttons[dlgtype];
|
|
|
|
+ button.addEventListener("command", this._handleButtonCommand, true);
|
|
|
|
+
|
|
|
|
+ // don't override custom labels with pre-defined labels on explicit buttons
|
|
|
|
+ if (!button.hasAttribute("label")) {
|
|
|
|
+ // dialog attributes override the default labels in dialog.properties
|
2017-09-05 12:10:37 +02:00
|
|
|
+ if (this.hasAttribute("buttonlabel" + dlgtype)) {
|
|
|
|
+ button.setAttribute("label", this.getAttribute("buttonlabel" + dlgtype));
|
|
|
|
+ if (this.hasAttribute("buttonaccesskey" + dlgtype))
|
|
|
|
+ button.setAttribute("accesskey", this.getAttribute("buttonaccesskey" + dlgtype));
|
2018-03-13 20:46:06 +01:00
|
|
|
+ } else if (dlgtype != "extra1" && dlgtype != "extra2") {
|
|
|
|
+ button.setAttribute("label", this.mStrBundle.GetStringFromName("button-" + dlgtype));
|
|
|
|
+ var accessKey = this.mStrBundle.GetStringFromName("accesskey-" + dlgtype);
|
|
|
|
+ if (accessKey)
|
|
|
|
+ button.setAttribute("accesskey", accessKey);
|
2011-06-01 08:05:09 +02:00
|
|
|
+ }
|
2018-03-13 20:46:06 +01:00
|
|
|
+ }
|
|
|
|
+ // allow specifying alternate icons in the dialog header
|
|
|
|
+ if (!button.hasAttribute("icon")) {
|
|
|
|
+ // if there's an icon specified, use that
|
|
|
|
+ if (this.hasAttribute("buttonicon" + dlgtype))
|
|
|
|
+ button.setAttribute("icon", this.getAttribute("buttonicon" + dlgtype));
|
|
|
|
+ // otherwise set defaults
|
|
|
|
+ else
|
|
|
|
+ switch (dlgtype) {
|
|
|
|
+ case "accept":
|
|
|
|
+ button.setAttribute("icon", "accept");
|
|
|
|
+ break;
|
|
|
|
+ case "cancel":
|
|
|
|
+ button.setAttribute("icon", "cancel");
|
|
|
|
+ break;
|
|
|
|
+ case "disclosure":
|
|
|
|
+ button.setAttribute("icon", "properties");
|
|
|
|
+ break;
|
|
|
|
+ case "help":
|
|
|
|
+ button.setAttribute("icon", "help");
|
|
|
|
+ break;
|
|
|
|
+ default:
|
|
|
|
+ break;
|
|
|
|
+ }
|
2011-06-01 08:05:09 +02:00
|
|
|
+ }
|
|
|
|
+ }
|
- update to Firefox 47.0 (boo#983549)
* Enable VP9 video codec for users with fast machines
* Embedded YouTube videos now play with HTML5 video if Flash is
not installed
* View and search open tabs from your smartphone or another
computer in a sidebar
* Allow no-cache on back/forward navigations for https resources
security fixes:
* MFSA 2016-49/CVE-2016-2815/CVE-2016-2818
(boo#983638)
(bmo#1241896, bmo#1242798, bmo#1243466, bmo#1245743,
bmo#1264300, bmo#1271037, bmo#1234147, bmo#1256493,
bmo#1256739, bmo#1256968, bmo#1261230, bmo#1261752,
bmo#1263384, bmo#1264575, bmo#1265577, bmo#1267130,
bmo#1269729, bmo#1273202, bmo#1273701)
Miscellaneous memory safety hazards (rv:47.0 / rv:45.2)
* MFSA 2016-50/CVE-2016-2819 (boo#983655) (bmo#1270381)
Buffer overflow parsing HTML5 fragments
* MFSA 2016-51/CVE-2016-2821 (bsc#983653) (bmo#1271460)
Use-after-free deleting tables from a contenteditable document
* MFSA 2016-52/CVE-2016-2822 (boo#983652) (bmo#1273129)
Addressbar spoofing though the SELECT element
* MFSA 2016-53/CVE-2016-2824 (boo#983651) (bmo#1248580)
Out-of-bounds write with WebGL shader
* MFSA 2016-54/CVE-2016-2825 (boo#983649) (bmo#1193093)
Partial same-origin-policy through setting location.host
through data URI
* MFSA 2016-56/CVE-2016-2828 (boo#983646) (bmo#1223810)
Use-after-free when textures are used in WebGL operations
after recycle pool destruction
OBS-URL: https://build.opensuse.org/package/show/mozilla:Factory/MozillaFirefox?expand=0&rev=518
2016-06-08 14:26:29 +02:00
|
|
|
+
|
2018-03-13 20:46:06 +01:00
|
|
|
+ // ensure that hitting enter triggers the default button command
|
|
|
|
+ this.defaultButton = this.defaultButton;
|
- update to Firefox 47.0 (boo#983549)
* Enable VP9 video codec for users with fast machines
* Embedded YouTube videos now play with HTML5 video if Flash is
not installed
* View and search open tabs from your smartphone or another
computer in a sidebar
* Allow no-cache on back/forward navigations for https resources
security fixes:
* MFSA 2016-49/CVE-2016-2815/CVE-2016-2818
(boo#983638)
(bmo#1241896, bmo#1242798, bmo#1243466, bmo#1245743,
bmo#1264300, bmo#1271037, bmo#1234147, bmo#1256493,
bmo#1256739, bmo#1256968, bmo#1261230, bmo#1261752,
bmo#1263384, bmo#1264575, bmo#1265577, bmo#1267130,
bmo#1269729, bmo#1273202, bmo#1273701)
Miscellaneous memory safety hazards (rv:47.0 / rv:45.2)
* MFSA 2016-50/CVE-2016-2819 (boo#983655) (bmo#1270381)
Buffer overflow parsing HTML5 fragments
* MFSA 2016-51/CVE-2016-2821 (bsc#983653) (bmo#1271460)
Use-after-free deleting tables from a contenteditable document
* MFSA 2016-52/CVE-2016-2822 (boo#983652) (bmo#1273129)
Addressbar spoofing though the SELECT element
* MFSA 2016-53/CVE-2016-2824 (boo#983651) (bmo#1248580)
Out-of-bounds write with WebGL shader
* MFSA 2016-54/CVE-2016-2825 (boo#983649) (bmo#1193093)
Partial same-origin-policy through setting location.host
through data URI
* MFSA 2016-56/CVE-2016-2828 (boo#983646) (bmo#1223810)
Use-after-free when textures are used in WebGL operations
after recycle pool destruction
OBS-URL: https://build.opensuse.org/package/show/mozilla:Factory/MozillaFirefox?expand=0&rev=518
2016-06-08 14:26:29 +02:00
|
|
|
+
|
2018-03-13 20:46:06 +01:00
|
|
|
+ // if there is a special button configuration, use it
|
|
|
|
+ if (aButtons) {
|
|
|
|
+ // expect a comma delimited list of dlgtype values
|
|
|
|
+ var list = aButtons.split(",");
|
2011-06-01 08:05:09 +02:00
|
|
|
+
|
2018-03-13 20:46:06 +01:00
|
|
|
+ // mark shown dlgtypes as true
|
|
|
|
+ var shown = { accept: false, cancel: false, help: false,
|
|
|
|
+ disclosure: false, extra1: false, extra2: false };
|
|
|
|
+ for (i = 0; i < list.length; ++i)
|
|
|
|
+ shown[list[i].replace(/ /g, "")] = true;
|
- update to Firefox 47.0 (boo#983549)
* Enable VP9 video codec for users with fast machines
* Embedded YouTube videos now play with HTML5 video if Flash is
not installed
* View and search open tabs from your smartphone or another
computer in a sidebar
* Allow no-cache on back/forward navigations for https resources
security fixes:
* MFSA 2016-49/CVE-2016-2815/CVE-2016-2818
(boo#983638)
(bmo#1241896, bmo#1242798, bmo#1243466, bmo#1245743,
bmo#1264300, bmo#1271037, bmo#1234147, bmo#1256493,
bmo#1256739, bmo#1256968, bmo#1261230, bmo#1261752,
bmo#1263384, bmo#1264575, bmo#1265577, bmo#1267130,
bmo#1269729, bmo#1273202, bmo#1273701)
Miscellaneous memory safety hazards (rv:47.0 / rv:45.2)
* MFSA 2016-50/CVE-2016-2819 (boo#983655) (bmo#1270381)
Buffer overflow parsing HTML5 fragments
* MFSA 2016-51/CVE-2016-2821 (bsc#983653) (bmo#1271460)
Use-after-free deleting tables from a contenteditable document
* MFSA 2016-52/CVE-2016-2822 (boo#983652) (bmo#1273129)
Addressbar spoofing though the SELECT element
* MFSA 2016-53/CVE-2016-2824 (boo#983651) (bmo#1248580)
Out-of-bounds write with WebGL shader
* MFSA 2016-54/CVE-2016-2825 (boo#983649) (bmo#1193093)
Partial same-origin-policy through setting location.host
through data URI
* MFSA 2016-56/CVE-2016-2828 (boo#983646) (bmo#1223810)
Use-after-free when textures are used in WebGL operations
after recycle pool destruction
OBS-URL: https://build.opensuse.org/package/show/mozilla:Factory/MozillaFirefox?expand=0&rev=518
2016-06-08 14:26:29 +02:00
|
|
|
+
|
2018-03-13 20:46:06 +01:00
|
|
|
+ // hide/show the buttons we want
|
|
|
|
+ for (dlgtype in buttons)
|
|
|
|
+ buttons[dlgtype].hidden = !shown[dlgtype];
|
- update to Firefox 47.0 (boo#983549)
* Enable VP9 video codec for users with fast machines
* Embedded YouTube videos now play with HTML5 video if Flash is
not installed
* View and search open tabs from your smartphone or another
computer in a sidebar
* Allow no-cache on back/forward navigations for https resources
security fixes:
* MFSA 2016-49/CVE-2016-2815/CVE-2016-2818
(boo#983638)
(bmo#1241896, bmo#1242798, bmo#1243466, bmo#1245743,
bmo#1264300, bmo#1271037, bmo#1234147, bmo#1256493,
bmo#1256739, bmo#1256968, bmo#1261230, bmo#1261752,
bmo#1263384, bmo#1264575, bmo#1265577, bmo#1267130,
bmo#1269729, bmo#1273202, bmo#1273701)
Miscellaneous memory safety hazards (rv:47.0 / rv:45.2)
* MFSA 2016-50/CVE-2016-2819 (boo#983655) (bmo#1270381)
Buffer overflow parsing HTML5 fragments
* MFSA 2016-51/CVE-2016-2821 (bsc#983653) (bmo#1271460)
Use-after-free deleting tables from a contenteditable document
* MFSA 2016-52/CVE-2016-2822 (boo#983652) (bmo#1273129)
Addressbar spoofing though the SELECT element
* MFSA 2016-53/CVE-2016-2824 (boo#983651) (bmo#1248580)
Out-of-bounds write with WebGL shader
* MFSA 2016-54/CVE-2016-2825 (boo#983649) (bmo#1193093)
Partial same-origin-policy through setting location.host
through data URI
* MFSA 2016-56/CVE-2016-2828 (boo#983646) (bmo#1223810)
Use-after-free when textures are used in WebGL operations
after recycle pool destruction
OBS-URL: https://build.opensuse.org/package/show/mozilla:Factory/MozillaFirefox?expand=0&rev=518
2016-06-08 14:26:29 +02:00
|
|
|
+
|
2018-03-13 20:46:06 +01:00
|
|
|
+ // show the spacer on Windows only when the extra2 button is present
|
|
|
|
+ if (/Win/.test(navigator.platform)) {
|
|
|
|
+ var spacer = document.getAnonymousElementByAttribute(this, "anonid", "spacer");
|
|
|
|
+ spacer.removeAttribute("hidden");
|
|
|
|
+ spacer.setAttribute("flex", shown.extra2 ? "1" : "0");
|
2011-06-01 08:05:09 +02:00
|
|
|
+ }
|
|
|
|
+ }
|
|
|
|
+ ]]>
|
|
|
|
+ </body>
|
|
|
|
+ </method>
|
- update to Firefox 47.0 (boo#983549)
* Enable VP9 video codec for users with fast machines
* Embedded YouTube videos now play with HTML5 video if Flash is
not installed
* View and search open tabs from your smartphone or another
computer in a sidebar
* Allow no-cache on back/forward navigations for https resources
security fixes:
* MFSA 2016-49/CVE-2016-2815/CVE-2016-2818
(boo#983638)
(bmo#1241896, bmo#1242798, bmo#1243466, bmo#1245743,
bmo#1264300, bmo#1271037, bmo#1234147, bmo#1256493,
bmo#1256739, bmo#1256968, bmo#1261230, bmo#1261752,
bmo#1263384, bmo#1264575, bmo#1265577, bmo#1267130,
bmo#1269729, bmo#1273202, bmo#1273701)
Miscellaneous memory safety hazards (rv:47.0 / rv:45.2)
* MFSA 2016-50/CVE-2016-2819 (boo#983655) (bmo#1270381)
Buffer overflow parsing HTML5 fragments
* MFSA 2016-51/CVE-2016-2821 (bsc#983653) (bmo#1271460)
Use-after-free deleting tables from a contenteditable document
* MFSA 2016-52/CVE-2016-2822 (boo#983652) (bmo#1273129)
Addressbar spoofing though the SELECT element
* MFSA 2016-53/CVE-2016-2824 (boo#983651) (bmo#1248580)
Out-of-bounds write with WebGL shader
* MFSA 2016-54/CVE-2016-2825 (boo#983649) (bmo#1193093)
Partial same-origin-policy through setting location.host
through data URI
* MFSA 2016-56/CVE-2016-2828 (boo#983646) (bmo#1223810)
Use-after-free when textures are used in WebGL operations
after recycle pool destruction
OBS-URL: https://build.opensuse.org/package/show/mozilla:Factory/MozillaFirefox?expand=0&rev=518
2016-06-08 14:26:29 +02:00
|
|
|
+
|
2018-03-13 20:46:06 +01:00
|
|
|
+ <method name="_setDefaultButton">
|
|
|
|
+ <parameter name="aNewDefault"/>
|
2011-06-01 08:05:09 +02:00
|
|
|
+ <body>
|
|
|
|
+ <![CDATA[
|
2018-03-13 20:46:06 +01:00
|
|
|
+ // remove the default attribute from the previous default button, if any
|
|
|
|
+ var oldDefaultButton = this.getButton(this.defaultButton);
|
|
|
|
+ if (oldDefaultButton)
|
|
|
|
+ oldDefaultButton.removeAttribute("default");
|
- update to Firefox 47.0 (boo#983549)
* Enable VP9 video codec for users with fast machines
* Embedded YouTube videos now play with HTML5 video if Flash is
not installed
* View and search open tabs from your smartphone or another
computer in a sidebar
* Allow no-cache on back/forward navigations for https resources
security fixes:
* MFSA 2016-49/CVE-2016-2815/CVE-2016-2818
(boo#983638)
(bmo#1241896, bmo#1242798, bmo#1243466, bmo#1245743,
bmo#1264300, bmo#1271037, bmo#1234147, bmo#1256493,
bmo#1256739, bmo#1256968, bmo#1261230, bmo#1261752,
bmo#1263384, bmo#1264575, bmo#1265577, bmo#1267130,
bmo#1269729, bmo#1273202, bmo#1273701)
Miscellaneous memory safety hazards (rv:47.0 / rv:45.2)
* MFSA 2016-50/CVE-2016-2819 (boo#983655) (bmo#1270381)
Buffer overflow parsing HTML5 fragments
* MFSA 2016-51/CVE-2016-2821 (bsc#983653) (bmo#1271460)
Use-after-free deleting tables from a contenteditable document
* MFSA 2016-52/CVE-2016-2822 (boo#983652) (bmo#1273129)
Addressbar spoofing though the SELECT element
* MFSA 2016-53/CVE-2016-2824 (boo#983651) (bmo#1248580)
Out-of-bounds write with WebGL shader
* MFSA 2016-54/CVE-2016-2825 (boo#983649) (bmo#1193093)
Partial same-origin-policy through setting location.host
through data URI
* MFSA 2016-56/CVE-2016-2828 (boo#983646) (bmo#1223810)
Use-after-free when textures are used in WebGL operations
after recycle pool destruction
OBS-URL: https://build.opensuse.org/package/show/mozilla:Factory/MozillaFirefox?expand=0&rev=518
2016-06-08 14:26:29 +02:00
|
|
|
+
|
2018-03-13 20:46:06 +01:00
|
|
|
+ var newDefaultButton = this.getButton(aNewDefault);
|
|
|
|
+ if (newDefaultButton) {
|
|
|
|
+ this.setAttribute("defaultButton", aNewDefault);
|
|
|
|
+ newDefaultButton.setAttribute("default", "true");
|
|
|
|
+ } else {
|
|
|
|
+ this.setAttribute("defaultButton", "none");
|
|
|
|
+ if (aNewDefault != "none")
|
|
|
|
+ dump("invalid new default button: " + aNewDefault + ", assuming: none\n");
|
|
|
|
+ }
|
2011-06-01 08:05:09 +02:00
|
|
|
+ ]]>
|
|
|
|
+ </body>
|
|
|
|
+ </method>
|
- update to Firefox 47.0 (boo#983549)
* Enable VP9 video codec for users with fast machines
* Embedded YouTube videos now play with HTML5 video if Flash is
not installed
* View and search open tabs from your smartphone or another
computer in a sidebar
* Allow no-cache on back/forward navigations for https resources
security fixes:
* MFSA 2016-49/CVE-2016-2815/CVE-2016-2818
(boo#983638)
(bmo#1241896, bmo#1242798, bmo#1243466, bmo#1245743,
bmo#1264300, bmo#1271037, bmo#1234147, bmo#1256493,
bmo#1256739, bmo#1256968, bmo#1261230, bmo#1261752,
bmo#1263384, bmo#1264575, bmo#1265577, bmo#1267130,
bmo#1269729, bmo#1273202, bmo#1273701)
Miscellaneous memory safety hazards (rv:47.0 / rv:45.2)
* MFSA 2016-50/CVE-2016-2819 (boo#983655) (bmo#1270381)
Buffer overflow parsing HTML5 fragments
* MFSA 2016-51/CVE-2016-2821 (bsc#983653) (bmo#1271460)
Use-after-free deleting tables from a contenteditable document
* MFSA 2016-52/CVE-2016-2822 (boo#983652) (bmo#1273129)
Addressbar spoofing though the SELECT element
* MFSA 2016-53/CVE-2016-2824 (boo#983651) (bmo#1248580)
Out-of-bounds write with WebGL shader
* MFSA 2016-54/CVE-2016-2825 (boo#983649) (bmo#1193093)
Partial same-origin-policy through setting location.host
through data URI
* MFSA 2016-56/CVE-2016-2828 (boo#983646) (bmo#1223810)
Use-after-free when textures are used in WebGL operations
after recycle pool destruction
OBS-URL: https://build.opensuse.org/package/show/mozilla:Factory/MozillaFirefox?expand=0&rev=518
2016-06-08 14:26:29 +02:00
|
|
|
+
|
2018-03-13 20:46:06 +01:00
|
|
|
+ <method name="_handleButtonCommand">
|
|
|
|
+ <parameter name="aEvent"/>
|
2011-06-01 08:05:09 +02:00
|
|
|
+ <body>
|
|
|
|
+ <![CDATA[
|
2018-03-13 20:46:06 +01:00
|
|
|
+ return document.documentElement._doButtonCommand(
|
|
|
|
+ aEvent.target.getAttribute("dlgtype"));
|
2011-06-01 08:05:09 +02:00
|
|
|
+ ]]>
|
|
|
|
+ </body>
|
|
|
|
+ </method>
|
- update to Firefox 47.0 (boo#983549)
* Enable VP9 video codec for users with fast machines
* Embedded YouTube videos now play with HTML5 video if Flash is
not installed
* View and search open tabs from your smartphone or another
computer in a sidebar
* Allow no-cache on back/forward navigations for https resources
security fixes:
* MFSA 2016-49/CVE-2016-2815/CVE-2016-2818
(boo#983638)
(bmo#1241896, bmo#1242798, bmo#1243466, bmo#1245743,
bmo#1264300, bmo#1271037, bmo#1234147, bmo#1256493,
bmo#1256739, bmo#1256968, bmo#1261230, bmo#1261752,
bmo#1263384, bmo#1264575, bmo#1265577, bmo#1267130,
bmo#1269729, bmo#1273202, bmo#1273701)
Miscellaneous memory safety hazards (rv:47.0 / rv:45.2)
* MFSA 2016-50/CVE-2016-2819 (boo#983655) (bmo#1270381)
Buffer overflow parsing HTML5 fragments
* MFSA 2016-51/CVE-2016-2821 (bsc#983653) (bmo#1271460)
Use-after-free deleting tables from a contenteditable document
* MFSA 2016-52/CVE-2016-2822 (boo#983652) (bmo#1273129)
Addressbar spoofing though the SELECT element
* MFSA 2016-53/CVE-2016-2824 (boo#983651) (bmo#1248580)
Out-of-bounds write with WebGL shader
* MFSA 2016-54/CVE-2016-2825 (boo#983649) (bmo#1193093)
Partial same-origin-policy through setting location.host
through data URI
* MFSA 2016-56/CVE-2016-2828 (boo#983646) (bmo#1223810)
Use-after-free when textures are used in WebGL operations
after recycle pool destruction
OBS-URL: https://build.opensuse.org/package/show/mozilla:Factory/MozillaFirefox?expand=0&rev=518
2016-06-08 14:26:29 +02:00
|
|
|
+
|
2018-03-13 20:46:06 +01:00
|
|
|
+ <method name="_doButtonCommand">
|
|
|
|
+ <parameter name="aDlgType"/>
|
2011-06-01 08:05:09 +02:00
|
|
|
+ <body>
|
|
|
|
+ <![CDATA[
|
2018-03-13 20:46:06 +01:00
|
|
|
+ var button = this.getButton(aDlgType);
|
|
|
|
+ if (!button.disabled) {
|
|
|
|
+ var noCancel = this._fireButtonEvent(aDlgType);
|
|
|
|
+ if (noCancel) {
|
|
|
|
+ if (aDlgType == "accept" || aDlgType == "cancel") {
|
|
|
|
+ var closingEvent = new CustomEvent("dialogclosing", {
|
|
|
|
+ bubbles: true,
|
|
|
|
+ detail: { button: aDlgType },
|
|
|
|
+ });
|
|
|
|
+ this.dispatchEvent(closingEvent);
|
|
|
|
+ window.close();
|
|
|
|
+ }
|
|
|
|
+ }
|
|
|
|
+ return noCancel;
|
2011-06-01 08:05:09 +02:00
|
|
|
+ }
|
2018-03-13 20:46:06 +01:00
|
|
|
+ return true;
|
2011-06-01 08:05:09 +02:00
|
|
|
+ ]]>
|
|
|
|
+ </body>
|
|
|
|
+ </method>
|
- update to Firefox 47.0 (boo#983549)
* Enable VP9 video codec for users with fast machines
* Embedded YouTube videos now play with HTML5 video if Flash is
not installed
* View and search open tabs from your smartphone or another
computer in a sidebar
* Allow no-cache on back/forward navigations for https resources
security fixes:
* MFSA 2016-49/CVE-2016-2815/CVE-2016-2818
(boo#983638)
(bmo#1241896, bmo#1242798, bmo#1243466, bmo#1245743,
bmo#1264300, bmo#1271037, bmo#1234147, bmo#1256493,
bmo#1256739, bmo#1256968, bmo#1261230, bmo#1261752,
bmo#1263384, bmo#1264575, bmo#1265577, bmo#1267130,
bmo#1269729, bmo#1273202, bmo#1273701)
Miscellaneous memory safety hazards (rv:47.0 / rv:45.2)
* MFSA 2016-50/CVE-2016-2819 (boo#983655) (bmo#1270381)
Buffer overflow parsing HTML5 fragments
* MFSA 2016-51/CVE-2016-2821 (bsc#983653) (bmo#1271460)
Use-after-free deleting tables from a contenteditable document
* MFSA 2016-52/CVE-2016-2822 (boo#983652) (bmo#1273129)
Addressbar spoofing though the SELECT element
* MFSA 2016-53/CVE-2016-2824 (boo#983651) (bmo#1248580)
Out-of-bounds write with WebGL shader
* MFSA 2016-54/CVE-2016-2825 (boo#983649) (bmo#1193093)
Partial same-origin-policy through setting location.host
through data URI
* MFSA 2016-56/CVE-2016-2828 (boo#983646) (bmo#1223810)
Use-after-free when textures are used in WebGL operations
after recycle pool destruction
OBS-URL: https://build.opensuse.org/package/show/mozilla:Factory/MozillaFirefox?expand=0&rev=518
2016-06-08 14:26:29 +02:00
|
|
|
+
|
2018-03-13 20:46:06 +01:00
|
|
|
+ <method name="_fireButtonEvent">
|
|
|
|
+ <parameter name="aDlgType"/>
|
2011-06-01 08:05:09 +02:00
|
|
|
+ <body>
|
|
|
|
+ <![CDATA[
|
2018-03-13 20:46:06 +01:00
|
|
|
+ var event = document.createEvent("Events");
|
|
|
|
+ event.initEvent("dialog" + aDlgType, true, true);
|
2015-09-22 08:10:40 +02:00
|
|
|
+
|
2018-03-13 20:46:06 +01:00
|
|
|
+ // handle dom event handlers
|
|
|
|
+ var noCancel = this.dispatchEvent(event);
|
- update to Firefox 47.0 (boo#983549)
* Enable VP9 video codec for users with fast machines
* Embedded YouTube videos now play with HTML5 video if Flash is
not installed
* View and search open tabs from your smartphone or another
computer in a sidebar
* Allow no-cache on back/forward navigations for https resources
security fixes:
* MFSA 2016-49/CVE-2016-2815/CVE-2016-2818
(boo#983638)
(bmo#1241896, bmo#1242798, bmo#1243466, bmo#1245743,
bmo#1264300, bmo#1271037, bmo#1234147, bmo#1256493,
bmo#1256739, bmo#1256968, bmo#1261230, bmo#1261752,
bmo#1263384, bmo#1264575, bmo#1265577, bmo#1267130,
bmo#1269729, bmo#1273202, bmo#1273701)
Miscellaneous memory safety hazards (rv:47.0 / rv:45.2)
* MFSA 2016-50/CVE-2016-2819 (boo#983655) (bmo#1270381)
Buffer overflow parsing HTML5 fragments
* MFSA 2016-51/CVE-2016-2821 (bsc#983653) (bmo#1271460)
Use-after-free deleting tables from a contenteditable document
* MFSA 2016-52/CVE-2016-2822 (boo#983652) (bmo#1273129)
Addressbar spoofing though the SELECT element
* MFSA 2016-53/CVE-2016-2824 (boo#983651) (bmo#1248580)
Out-of-bounds write with WebGL shader
* MFSA 2016-54/CVE-2016-2825 (boo#983649) (bmo#1193093)
Partial same-origin-policy through setting location.host
through data URI
* MFSA 2016-56/CVE-2016-2828 (boo#983646) (bmo#1223810)
Use-after-free when textures are used in WebGL operations
after recycle pool destruction
OBS-URL: https://build.opensuse.org/package/show/mozilla:Factory/MozillaFirefox?expand=0&rev=518
2016-06-08 14:26:29 +02:00
|
|
|
+
|
2018-03-13 20:46:06 +01:00
|
|
|
+ // handle any xml attribute event handlers
|
|
|
|
+ var handler = this.getAttribute("ondialog" + aDlgType);
|
|
|
|
+ if (handler != "") {
|
|
|
|
+ var fn = new Function("event", handler);
|
|
|
|
+ var returned = fn(event);
|
|
|
|
+ if (returned == false)
|
|
|
|
+ noCancel = false;
|
2011-06-01 08:05:09 +02:00
|
|
|
+ }
|
|
|
|
+
|
2018-03-13 20:46:06 +01:00
|
|
|
+ return noCancel;
|
2011-06-01 08:05:09 +02:00
|
|
|
+ ]]>
|
|
|
|
+ </body>
|
|
|
|
+ </method>
|
- update to Firefox 47.0 (boo#983549)
* Enable VP9 video codec for users with fast machines
* Embedded YouTube videos now play with HTML5 video if Flash is
not installed
* View and search open tabs from your smartphone or another
computer in a sidebar
* Allow no-cache on back/forward navigations for https resources
security fixes:
* MFSA 2016-49/CVE-2016-2815/CVE-2016-2818
(boo#983638)
(bmo#1241896, bmo#1242798, bmo#1243466, bmo#1245743,
bmo#1264300, bmo#1271037, bmo#1234147, bmo#1256493,
bmo#1256739, bmo#1256968, bmo#1261230, bmo#1261752,
bmo#1263384, bmo#1264575, bmo#1265577, bmo#1267130,
bmo#1269729, bmo#1273202, bmo#1273701)
Miscellaneous memory safety hazards (rv:47.0 / rv:45.2)
* MFSA 2016-50/CVE-2016-2819 (boo#983655) (bmo#1270381)
Buffer overflow parsing HTML5 fragments
* MFSA 2016-51/CVE-2016-2821 (bsc#983653) (bmo#1271460)
Use-after-free deleting tables from a contenteditable document
* MFSA 2016-52/CVE-2016-2822 (boo#983652) (bmo#1273129)
Addressbar spoofing though the SELECT element
* MFSA 2016-53/CVE-2016-2824 (boo#983651) (bmo#1248580)
Out-of-bounds write with WebGL shader
* MFSA 2016-54/CVE-2016-2825 (boo#983649) (bmo#1193093)
Partial same-origin-policy through setting location.host
through data URI
* MFSA 2016-56/CVE-2016-2828 (boo#983646) (bmo#1223810)
Use-after-free when textures are used in WebGL operations
after recycle pool destruction
OBS-URL: https://build.opensuse.org/package/show/mozilla:Factory/MozillaFirefox?expand=0&rev=518
2016-06-08 14:26:29 +02:00
|
|
|
+
|
2018-03-13 20:46:06 +01:00
|
|
|
+ <method name="_hitEnter">
|
|
|
|
+ <parameter name="evt"/>
|
2011-06-01 08:05:09 +02:00
|
|
|
+ <body>
|
|
|
|
+ <![CDATA[
|
2018-03-13 20:46:06 +01:00
|
|
|
+ if (evt.defaultPrevented)
|
|
|
|
+ return;
|
- update to Firefox 47.0 (boo#983549)
* Enable VP9 video codec for users with fast machines
* Embedded YouTube videos now play with HTML5 video if Flash is
not installed
* View and search open tabs from your smartphone or another
computer in a sidebar
* Allow no-cache on back/forward navigations for https resources
security fixes:
* MFSA 2016-49/CVE-2016-2815/CVE-2016-2818
(boo#983638)
(bmo#1241896, bmo#1242798, bmo#1243466, bmo#1245743,
bmo#1264300, bmo#1271037, bmo#1234147, bmo#1256493,
bmo#1256739, bmo#1256968, bmo#1261230, bmo#1261752,
bmo#1263384, bmo#1264575, bmo#1265577, bmo#1267130,
bmo#1269729, bmo#1273202, bmo#1273701)
Miscellaneous memory safety hazards (rv:47.0 / rv:45.2)
* MFSA 2016-50/CVE-2016-2819 (boo#983655) (bmo#1270381)
Buffer overflow parsing HTML5 fragments
* MFSA 2016-51/CVE-2016-2821 (bsc#983653) (bmo#1271460)
Use-after-free deleting tables from a contenteditable document
* MFSA 2016-52/CVE-2016-2822 (boo#983652) (bmo#1273129)
Addressbar spoofing though the SELECT element
* MFSA 2016-53/CVE-2016-2824 (boo#983651) (bmo#1248580)
Out-of-bounds write with WebGL shader
* MFSA 2016-54/CVE-2016-2825 (boo#983649) (bmo#1193093)
Partial same-origin-policy through setting location.host
through data URI
* MFSA 2016-56/CVE-2016-2828 (boo#983646) (bmo#1223810)
Use-after-free when textures are used in WebGL operations
after recycle pool destruction
OBS-URL: https://build.opensuse.org/package/show/mozilla:Factory/MozillaFirefox?expand=0&rev=518
2016-06-08 14:26:29 +02:00
|
|
|
+
|
2018-03-13 20:46:06 +01:00
|
|
|
+ var btn = this.getButton(this.defaultButton);
|
|
|
|
+ if (btn)
|
|
|
|
+ this._doButtonCommand(this.defaultButton);
|
2011-06-01 08:05:09 +02:00
|
|
|
+ ]]>
|
|
|
|
+ </body>
|
|
|
|
+ </method>
|
- update to Firefox 47.0 (boo#983549)
* Enable VP9 video codec for users with fast machines
* Embedded YouTube videos now play with HTML5 video if Flash is
not installed
* View and search open tabs from your smartphone or another
computer in a sidebar
* Allow no-cache on back/forward navigations for https resources
security fixes:
* MFSA 2016-49/CVE-2016-2815/CVE-2016-2818
(boo#983638)
(bmo#1241896, bmo#1242798, bmo#1243466, bmo#1245743,
bmo#1264300, bmo#1271037, bmo#1234147, bmo#1256493,
bmo#1256739, bmo#1256968, bmo#1261230, bmo#1261752,
bmo#1263384, bmo#1264575, bmo#1265577, bmo#1267130,
bmo#1269729, bmo#1273202, bmo#1273701)
Miscellaneous memory safety hazards (rv:47.0 / rv:45.2)
* MFSA 2016-50/CVE-2016-2819 (boo#983655) (bmo#1270381)
Buffer overflow parsing HTML5 fragments
* MFSA 2016-51/CVE-2016-2821 (bsc#983653) (bmo#1271460)
Use-after-free deleting tables from a contenteditable document
* MFSA 2016-52/CVE-2016-2822 (boo#983652) (bmo#1273129)
Addressbar spoofing though the SELECT element
* MFSA 2016-53/CVE-2016-2824 (boo#983651) (bmo#1248580)
Out-of-bounds write with WebGL shader
* MFSA 2016-54/CVE-2016-2825 (boo#983649) (bmo#1193093)
Partial same-origin-policy through setting location.host
through data URI
* MFSA 2016-56/CVE-2016-2828 (boo#983646) (bmo#1223810)
Use-after-free when textures are used in WebGL operations
after recycle pool destruction
OBS-URL: https://build.opensuse.org/package/show/mozilla:Factory/MozillaFirefox?expand=0&rev=518
2016-06-08 14:26:29 +02:00
|
|
|
+
|
2011-06-01 08:05:09 +02:00
|
|
|
+ </implementation>
|
2018-03-13 20:46:06 +01:00
|
|
|
+
|
2011-06-01 08:05:09 +02:00
|
|
|
+ <handlers>
|
2018-03-13 20:46:06 +01:00
|
|
|
+ <handler event="keypress" keycode="VK_RETURN"
|
|
|
|
+ group="system" action="this._hitEnter(event);"/>
|
|
|
|
+ <handler event="keypress" keycode="VK_ESCAPE" group="system">
|
|
|
|
+ if (!event.defaultPrevented)
|
|
|
|
+ this.cancelDialog();
|
2011-06-01 08:05:09 +02:00
|
|
|
+ </handler>
|
2018-03-13 20:46:06 +01:00
|
|
|
+#ifdef XP_MACOSX
|
|
|
|
+ <handler event="keypress" key="." modifiers="meta" phase="capturing" action="this.cancelDialog();"/>
|
|
|
|
+#else
|
|
|
|
+ <handler event="focus" phase="capturing">
|
|
|
|
+ var btn = this.getButton(this.defaultButton);
|
|
|
|
+ if (btn)
|
|
|
|
+ btn.setAttribute("default", event.originalTarget == btn || !(event.originalTarget instanceof Components.interfaces.nsIDOMXULButtonElement));
|
2011-06-01 08:05:09 +02:00
|
|
|
+ </handler>
|
2018-03-13 20:46:06 +01:00
|
|
|
+#endif
|
2011-06-01 08:05:09 +02:00
|
|
|
+ </handlers>
|
- update to Firefox 47.0 (boo#983549)
* Enable VP9 video codec for users with fast machines
* Embedded YouTube videos now play with HTML5 video if Flash is
not installed
* View and search open tabs from your smartphone or another
computer in a sidebar
* Allow no-cache on back/forward navigations for https resources
security fixes:
* MFSA 2016-49/CVE-2016-2815/CVE-2016-2818
(boo#983638)
(bmo#1241896, bmo#1242798, bmo#1243466, bmo#1245743,
bmo#1264300, bmo#1271037, bmo#1234147, bmo#1256493,
bmo#1256739, bmo#1256968, bmo#1261230, bmo#1261752,
bmo#1263384, bmo#1264575, bmo#1265577, bmo#1267130,
bmo#1269729, bmo#1273202, bmo#1273701)
Miscellaneous memory safety hazards (rv:47.0 / rv:45.2)
* MFSA 2016-50/CVE-2016-2819 (boo#983655) (bmo#1270381)
Buffer overflow parsing HTML5 fragments
* MFSA 2016-51/CVE-2016-2821 (bsc#983653) (bmo#1271460)
Use-after-free deleting tables from a contenteditable document
* MFSA 2016-52/CVE-2016-2822 (boo#983652) (bmo#1273129)
Addressbar spoofing though the SELECT element
* MFSA 2016-53/CVE-2016-2824 (boo#983651) (bmo#1248580)
Out-of-bounds write with WebGL shader
* MFSA 2016-54/CVE-2016-2825 (boo#983649) (bmo#1193093)
Partial same-origin-policy through setting location.host
through data URI
* MFSA 2016-56/CVE-2016-2828 (boo#983646) (bmo#1223810)
Use-after-free when textures are used in WebGL operations
after recycle pool destruction
OBS-URL: https://build.opensuse.org/package/show/mozilla:Factory/MozillaFirefox?expand=0&rev=518
2016-06-08 14:26:29 +02:00
|
|
|
+
|
2011-06-01 08:05:09 +02:00
|
|
|
+ </binding>
|
|
|
|
+
|
|
|
|
+</bindings>
|
2017-03-07 09:35:10 +01:00
|
|
|
diff --git a/toolkit/mozapps/downloads/nsHelperAppDlg.js b/toolkit/mozapps/downloads/nsHelperAppDlg.js
|
|
|
|
--- a/toolkit/mozapps/downloads/nsHelperAppDlg.js
|
|
|
|
+++ b/toolkit/mozapps/downloads/nsHelperAppDlg.js
|
2018-01-23 10:55:12 +01:00
|
|
|
@@ -626,17 +626,17 @@ nsUnknownContentTypeDialog.prototype = {
|
2017-03-07 09:35:10 +01:00
|
|
|
else
|
|
|
|
typeString = mimeInfo.MIMEType;
|
|
|
|
}
|
|
|
|
// When the length is unknown, contentLength would be -1
|
|
|
|
if (this.mLauncher.contentLength >= 0) {
|
|
|
|
let [size, unit] = DownloadUtils.
|
|
|
|
convertByteUnits(this.mLauncher.contentLength);
|
|
|
|
type.value = this.dialogElement("strings")
|
|
|
|
- .getFormattedString("orderedFileSizeWithType",
|
|
|
|
+ .getFormattedString("orderedFileSizeWithType",
|
|
|
|
[typeString, size, unit]);
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
type.value = typeString;
|
|
|
|
}
|
|
|
|
},
|
|
|
|
|
|
|
|
// Returns true if opening the default application makes sense.
|
2018-01-23 10:55:12 +01:00
|
|
|
@@ -800,17 +800,17 @@ nsUnknownContentTypeDialog.prototype = {
|
2017-03-07 09:35:10 +01:00
|
|
|
switch (this.dialogElement("openHandler").selectedIndex) {
|
|
|
|
case 0:
|
|
|
|
// No app need be specified in this case.
|
|
|
|
ok = true;
|
|
|
|
break;
|
|
|
|
case 1:
|
|
|
|
// only enable the OK button if we have a default app to use or if
|
|
|
|
// the user chose an app....
|
|
|
|
- ok = this.chosenApp || /\S/.test(this.dialogElement("otherHandler").getAttribute("path"));
|
|
|
|
+ ok = this.chosenApp || /\S/.test(this.dialogElement("otherHandler").getAttribute("path"));
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Enable Ok button if ok to press.
|
|
|
|
this.mDialog.document.documentElement.getButton("accept").disabled = !ok;
|
|
|
|
},
|
|
|
|
|
2018-01-23 10:55:12 +01:00
|
|
|
@@ -1065,30 +1065,57 @@ nsUnknownContentTypeDialog.prototype = {
|
2017-09-28 10:44:46 +02:00
|
|
|
|
|
|
|
if (params.handlerApp &&
|
2017-03-07 09:35:10 +01:00
|
|
|
params.handlerApp.executable &&
|
|
|
|
params.handlerApp.executable.isFile()) {
|
|
|
|
// Remember the file they chose to run.
|
|
|
|
this.chosenApp = params.handlerApp;
|
|
|
|
}
|
2017-09-28 10:44:46 +02:00
|
|
|
} else if ("@mozilla.org/applicationchooser;1" in Components.classes) {
|
2017-03-07 09:35:10 +01:00
|
|
|
- var nsIApplicationChooser = Components.interfaces.nsIApplicationChooser;
|
|
|
|
- var appChooser = Components.classes["@mozilla.org/applicationchooser;1"]
|
|
|
|
- .createInstance(nsIApplicationChooser);
|
|
|
|
- appChooser.init(this.mDialog, this.dialogElement("strings").getString("chooseAppFilePickerTitle"));
|
|
|
|
- var contentTypeDialogObj = this;
|
|
|
|
- let appChooserCallback = function appChooserCallback_done(aResult) {
|
|
|
|
- if (aResult) {
|
|
|
|
- contentTypeDialogObj.chosenApp = aResult.QueryInterface(Components.interfaces.nsILocalHandlerApp);
|
|
|
|
+ // handle the KDE case which is implemented in the filepicker
|
|
|
|
+ // therefore falling back to Gtk2 like behaviour if KDE is running
|
2017-09-28 10:44:46 +02:00
|
|
|
+ // FIXME this should be better handled in the nsIApplicationChooser
|
|
|
|
+ // interface
|
2017-03-07 09:35:10 +01:00
|
|
|
+ var env = Components.classes["@mozilla.org/process/environment;1"]
|
|
|
|
+ .getService(Components.interfaces.nsIEnvironment);
|
|
|
|
+ if (env.get('KDE_FULL_SESSION') == "true")
|
|
|
|
+ {
|
|
|
|
+ var nsIFilePicker = Components.interfaces.nsIFilePicker;
|
|
|
|
+ var fp = Components.classes["@mozilla.org/filepicker;1"]
|
|
|
|
+ .createInstance(nsIFilePicker);
|
|
|
|
+ fp.init(this.mDialog,
|
|
|
|
+ this.dialogElement("strings").getString("chooseAppFilePickerTitle"),
|
|
|
|
+ nsIFilePicker.modeOpen);
|
|
|
|
+
|
|
|
|
+ fp.appendFilters(nsIFilePicker.filterApps);
|
|
|
|
+
|
|
|
|
+ if (fp.show() == nsIFilePicker.returnOK && fp.file) {
|
|
|
|
+ // Remember the file they chose to run.
|
|
|
|
+ var localHandlerApp =
|
|
|
|
+ Components.classes["@mozilla.org/uriloader/local-handler-app;1"].
|
|
|
|
+ createInstance(Components.interfaces.nsILocalHandlerApp);
|
|
|
|
+ localHandlerApp.executable = fp.file;
|
|
|
|
+ this.chosenApp = localHandlerApp;
|
|
|
|
}
|
|
|
|
- contentTypeDialogObj.finishChooseApp();
|
|
|
|
- };
|
|
|
|
- appChooser.open(this.mLauncher.MIMEInfo.MIMEType, appChooserCallback);
|
|
|
|
- // The finishChooseApp is called from appChooserCallback
|
|
|
|
- return;
|
|
|
|
+ } else {
|
|
|
|
+ var nsIApplicationChooser = Components.interfaces.nsIApplicationChooser;
|
|
|
|
+ var appChooser = Components.classes["@mozilla.org/applicationchooser;1"]
|
|
|
|
+ .createInstance(nsIApplicationChooser);
|
|
|
|
+ appChooser.init(this.mDialog, this.dialogElement("strings").getString("chooseAppFilePickerTitle"));
|
|
|
|
+ var contentTypeDialogObj = this;
|
|
|
|
+ let appChooserCallback = function appChooserCallback_done(aResult) {
|
|
|
|
+ if (aResult) {
|
|
|
|
+ contentTypeDialogObj.chosenApp = aResult.QueryInterface(Components.interfaces.nsILocalHandlerApp);
|
|
|
|
+ }
|
|
|
|
+ contentTypeDialogObj.finishChooseApp();
|
|
|
|
+ };
|
|
|
|
+ appChooser.open(this.mLauncher.MIMEInfo.MIMEType, appChooserCallback);
|
|
|
|
+ // The finishChooseApp is called from appChooserCallback
|
|
|
|
+ return;
|
|
|
|
+ }
|
2017-09-28 10:44:46 +02:00
|
|
|
} else {
|
2017-03-07 09:35:10 +01:00
|
|
|
var nsIFilePicker = Components.interfaces.nsIFilePicker;
|
|
|
|
var fp = Components.classes["@mozilla.org/filepicker;1"]
|
|
|
|
.createInstance(nsIFilePicker);
|
|
|
|
fp.init(this.mDialog,
|
|
|
|
this.dialogElement("strings").getString("chooseAppFilePickerTitle"),
|
|
|
|
nsIFilePicker.modeOpen);
|
|
|
|
|
2011-06-01 08:05:09 +02:00
|
|
|
diff --git a/toolkit/system/unixproxy/nsUnixSystemProxySettings.cpp b/toolkit/system/unixproxy/nsUnixSystemProxySettings.cpp
|
|
|
|
--- a/toolkit/system/unixproxy/nsUnixSystemProxySettings.cpp
|
|
|
|
+++ b/toolkit/system/unixproxy/nsUnixSystemProxySettings.cpp
|
2015-11-03 16:49:03 +01:00
|
|
|
@@ -15,16 +15,17 @@
|
2011-06-01 08:05:09 +02:00
|
|
|
#include "nsPrintfCString.h"
|
2015-11-03 16:49:03 +01:00
|
|
|
#include "nsNetCID.h"
|
2011-06-01 08:05:09 +02:00
|
|
|
#include "nsNetUtil.h"
|
|
|
|
#include "nsISupportsPrimitives.h"
|
2012-03-01 10:09:12 +01:00
|
|
|
#include "nsIGSettingsService.h"
|
2012-06-05 20:01:53 +02:00
|
|
|
#include "nsInterfaceHashtable.h"
|
2012-11-20 21:34:15 +01:00
|
|
|
#include "mozilla/Attributes.h"
|
2013-01-07 21:49:28 +01:00
|
|
|
#include "nsIURI.h"
|
2011-06-01 08:05:09 +02:00
|
|
|
+#include "nsKDEUtils.h"
|
|
|
|
|
2015-05-10 22:12:38 +02:00
|
|
|
class nsUnixSystemProxySettings final : public nsISystemProxySettings {
|
2011-06-01 08:05:09 +02:00
|
|
|
public:
|
|
|
|
NS_DECL_ISUPPORTS
|
|
|
|
NS_DECL_NSISYSTEMPROXYSETTINGS
|
|
|
|
|
2013-12-11 09:31:54 +01:00
|
|
|
nsUnixSystemProxySettings()
|
2014-12-02 23:01:52 +01:00
|
|
|
: mSchemeProxySettings(4)
|
2015-11-03 16:49:03 +01:00
|
|
|
@@ -39,16 +40,17 @@ private:
|
2012-03-01 10:09:12 +01:00
|
|
|
nsCOMPtr<nsIGSettingsService> mGSettings;
|
2012-06-05 20:01:53 +02:00
|
|
|
nsCOMPtr<nsIGSettingsCollection> mProxySettings;
|
|
|
|
nsInterfaceHashtable<nsCStringHashKey, nsIGSettingsCollection> mSchemeProxySettings;
|
2012-02-01 14:37:15 +01:00
|
|
|
bool IsProxyMode(const char* aMode);
|
2011-06-01 08:05:09 +02:00
|
|
|
nsresult SetProxyResultFromGConf(const char* aKeyBase, const char* aType, nsACString& aResult);
|
2012-11-20 21:34:15 +01:00
|
|
|
nsresult GetProxyFromGConf(const nsACString& aScheme, const nsACString& aHost, int32_t aPort, nsACString& aResult);
|
|
|
|
nsresult GetProxyFromGSettings(const nsACString& aScheme, const nsACString& aHost, int32_t aPort, nsACString& aResult);
|
2012-03-01 10:09:12 +01:00
|
|
|
nsresult SetProxyResultFromGSettings(const char* aKeyBase, const char* aType, nsACString& aResult);
|
2011-06-01 08:05:09 +02:00
|
|
|
+ nsresult GetProxyFromKDE(const nsACString& aScheme, const nsACString& aHost, PRInt32 aPort, nsACString& aResult);
|
|
|
|
};
|
|
|
|
|
2014-07-21 11:32:46 +02:00
|
|
|
NS_IMPL_ISUPPORTS(nsUnixSystemProxySettings, nsISystemProxySettings)
|
2011-06-01 08:05:09 +02:00
|
|
|
|
2013-01-07 21:49:28 +01:00
|
|
|
NS_IMETHODIMP
|
|
|
|
nsUnixSystemProxySettings::GetMainThreadOnly(bool *aMainThreadOnly)
|
2011-06-01 08:05:09 +02:00
|
|
|
{
|
2013-01-07 21:49:28 +01:00
|
|
|
// dbus prevents us from being threadsafe, but this routine should not block anyhow
|
2015-11-03 16:49:03 +01:00
|
|
|
@@ -505,16 +507,19 @@ nsUnixSystemProxySettings::GetProxyFromG
|
2011-06-01 08:05:09 +02:00
|
|
|
|
2013-01-07 21:49:28 +01:00
|
|
|
nsresult
|
|
|
|
nsUnixSystemProxySettings::GetProxyForURI(const nsACString & aSpec,
|
|
|
|
const nsACString & aScheme,
|
|
|
|
const nsACString & aHost,
|
|
|
|
const int32_t aPort,
|
|
|
|
nsACString & aResult)
|
|
|
|
{
|
|
|
|
+ if (nsKDEUtils::kdeSupport())
|
|
|
|
+ return GetProxyFromKDE(aScheme, aHost, aPort, aResult);
|
2011-06-01 08:05:09 +02:00
|
|
|
+
|
2012-06-05 20:01:53 +02:00
|
|
|
if (mProxySettings) {
|
2013-01-07 21:49:28 +01:00
|
|
|
nsresult rv = GetProxyFromGSettings(aScheme, aHost, aPort, aResult);
|
|
|
|
if (NS_SUCCEEDED(rv))
|
2012-03-01 10:09:12 +01:00
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
if (mGConf)
|
2013-01-07 21:49:28 +01:00
|
|
|
return GetProxyFromGConf(aScheme, aHost, aPort, aResult);
|
2011-06-01 08:05:09 +02:00
|
|
|
|
2015-11-03 16:49:03 +01:00
|
|
|
@@ -540,8 +545,34 @@ static const mozilla::Module::ContractID
|
2011-07-01 11:12:30 +02:00
|
|
|
|
|
|
|
static const mozilla::Module kUnixProxyModule = {
|
|
|
|
mozilla::Module::kVersion,
|
|
|
|
kUnixProxyCIDs,
|
|
|
|
kUnixProxyContracts
|
|
|
|
};
|
|
|
|
|
|
|
|
NSMODULE_DEFN(nsUnixProxyModule) = &kUnixProxyModule;
|
|
|
|
+
|
|
|
|
+nsresult
|
|
|
|
+nsUnixSystemProxySettings::GetProxyFromKDE(const nsACString& aScheme,
|
|
|
|
+ const nsACString& aHost,
|
|
|
|
+ PRInt32 aPort,
|
|
|
|
+ nsACString& aResult)
|
|
|
|
+{
|
2013-01-07 21:49:28 +01:00
|
|
|
+ nsAutoCString url;
|
2011-07-01 11:12:30 +02:00
|
|
|
+ url = aScheme;
|
|
|
|
+ url += "://";
|
|
|
|
+ url += aHost;
|
|
|
|
+ if( aPort >= 0 )
|
|
|
|
+ {
|
|
|
|
+ url += ":";
|
|
|
|
+ url += nsPrintfCString("%d", aPort);
|
|
|
|
+ }
|
2012-02-01 14:37:15 +01:00
|
|
|
+ nsTArray<nsCString> command;
|
|
|
|
+ command.AppendElement( NS_LITERAL_CSTRING( "GETPROXY" ));
|
|
|
|
+ command.AppendElement( url );
|
|
|
|
+ nsTArray<nsCString> result;
|
2012-03-01 10:09:12 +01:00
|
|
|
+ if( !nsKDEUtils::command( command, &result ) || result.Length() != 1 )
|
2011-07-01 11:12:30 +02:00
|
|
|
+ return NS_ERROR_FAILURE;
|
2012-03-01 10:09:12 +01:00
|
|
|
+ aResult = result[0];
|
2011-07-01 11:12:30 +02:00
|
|
|
+ return NS_OK;
|
|
|
|
+}
|
|
|
|
+
|
2013-09-16 09:57:05 +02:00
|
|
|
diff --git a/toolkit/xre/moz.build b/toolkit/xre/moz.build
|
|
|
|
--- a/toolkit/xre/moz.build
|
|
|
|
+++ b/toolkit/xre/moz.build
|
2017-09-05 12:10:37 +02:00
|
|
|
@@ -61,17 +61,19 @@ elif CONFIG['MOZ_WIDGET_TOOLKIT'] == 'co
|
2018-03-13 20:46:06 +01:00
|
|
|
'../components/printingui',
|
2016-11-15 19:06:29 +01:00
|
|
|
]
|
|
|
|
elif CONFIG['MOZ_WIDGET_TOOLKIT'] == 'uikit':
|
|
|
|
UNIFIED_SOURCES += [
|
|
|
|
'nsNativeAppSupportDefault.cpp',
|
|
|
|
'UIKitDirProvider.mm',
|
2013-09-16 09:57:05 +02:00
|
|
|
]
|
2016-08-03 00:00:28 +02:00
|
|
|
elif 'gtk' in CONFIG['MOZ_WIDGET_TOOLKIT']:
|
2013-09-16 09:57:05 +02:00
|
|
|
+ EXPORTS += ['nsKDEUtils.h']
|
2014-03-18 20:44:32 +01:00
|
|
|
UNIFIED_SOURCES += [
|
2014-02-03 16:34:42 +01:00
|
|
|
+ 'nsKDEUtils.cpp',
|
2014-03-18 20:44:32 +01:00
|
|
|
'nsNativeAppSupportUnix.cpp',
|
2013-09-16 09:57:05 +02:00
|
|
|
]
|
|
|
|
else:
|
2014-03-18 20:44:32 +01:00
|
|
|
UNIFIED_SOURCES += [
|
2013-09-16 09:57:05 +02:00
|
|
|
'nsNativeAppSupportDefault.cpp',
|
|
|
|
]
|
|
|
|
|
2014-10-13 20:00:43 +02:00
|
|
|
if CONFIG['MOZ_WIDGET_TOOLKIT'] == 'gtk3':
|
2011-06-01 08:05:09 +02:00
|
|
|
diff --git a/toolkit/xre/nsKDEUtils.cpp b/toolkit/xre/nsKDEUtils.cpp
|
|
|
|
new file mode 100644
|
|
|
|
--- /dev/null
|
|
|
|
+++ b/toolkit/xre/nsKDEUtils.cpp
|
- update to Firefox 51.0
* requires NSPR >= 4.13.1, NSS >= 3.28.1
* Added support for FLAC (Free Lossless Audio Codec) playback
* Added support for WebGL 2
* Added Georgian (ka) and Kabyle (kab) locales
* Support saving passwords for forms without 'submit' events
* Improved video performance for users without GPU acceleration
* Zoom indicator is shown in the URL bar if the zoom level is not
at default level
* View passwords from the prompt before saving them
* Remove Belarusian (be) locale
* Use Skia for content rendering (Linux)
* MFSA 2017-01
CVE-2017-5375: Excessive JIT code allocation allows bypass of
ASLR and DEP (bmo#1325200, boo#1021814)
CVE-2017-5376: Use-after-free in XSL (bmo#1311687, boo#1021817)
CVE-2017-5377: Memory corruption with transforms to create
gradients in Skia (bmo#1306883, boo#1021826)
CVE-2017-5378: Pointer and frame data leakage of Javascript objects
(bmo#1312001, bmo#1330769, boo#1021818)
CVE-2017-5379: Use-after-free in Web Animations
(bmo#1309198,boo#1021827)
CVE-2017-5380: Potential use-after-free during DOM manipulations
(bmo#1322107, boo#1021819)
CVE-2017-5390: Insecure communication methods in Developer Tools
JSON viewer (bmo#1297361, boo#1021820)
CVE-2017-5389: WebExtensions can install additional add-ons via
modified host requests (bmo#1308688, boo#1021828)
CVE-2017-5396: Use-after-free with Media Decoder
(bmo#1329403, boo#1021821)
OBS-URL: https://build.opensuse.org/package/show/mozilla:Factory/MozillaFirefox?expand=0&rev=567
2017-01-25 11:27:08 +01:00
|
|
|
@@ -0,0 +1,344 @@
|
2011-06-01 08:05:09 +02:00
|
|
|
+/* -*- Mode: C++; tab-width: 4; indent-tabs-mode: nil; c-basic-offset: 4 -*- */
|
2012-11-20 21:34:15 +01:00
|
|
|
+/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
|
|
+ * License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
|
|
+ * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
2011-06-01 08:05:09 +02:00
|
|
|
+
|
|
|
|
+#include "nsKDEUtils.h"
|
|
|
|
+#include "nsIWidget.h"
|
2012-03-01 10:09:12 +01:00
|
|
|
+#include "nsISupportsPrimitives.h"
|
|
|
|
+#include "nsIMutableArray.h"
|
|
|
|
+#include "nsComponentManagerUtils.h"
|
|
|
|
+#include "nsArrayUtils.h"
|
2011-06-01 08:05:09 +02:00
|
|
|
+
|
|
|
|
+#include <gtk/gtk.h>
|
|
|
|
+
|
|
|
|
+#include <limits.h>
|
|
|
|
+#include <stdio.h>
|
|
|
|
+#include <sys/wait.h>
|
2012-07-29 11:45:44 +02:00
|
|
|
+#include <sys/resource.h>
|
2011-06-01 08:05:09 +02:00
|
|
|
+#include <unistd.h>
|
|
|
|
+#include <X11/Xlib.h>
|
- update to Firefox 51.0
* requires NSPR >= 4.13.1, NSS >= 3.28.1
* Added support for FLAC (Free Lossless Audio Codec) playback
* Added support for WebGL 2
* Added Georgian (ka) and Kabyle (kab) locales
* Support saving passwords for forms without 'submit' events
* Improved video performance for users without GPU acceleration
* Zoom indicator is shown in the URL bar if the zoom level is not
at default level
* View passwords from the prompt before saving them
* Remove Belarusian (be) locale
* Use Skia for content rendering (Linux)
* MFSA 2017-01
CVE-2017-5375: Excessive JIT code allocation allows bypass of
ASLR and DEP (bmo#1325200, boo#1021814)
CVE-2017-5376: Use-after-free in XSL (bmo#1311687, boo#1021817)
CVE-2017-5377: Memory corruption with transforms to create
gradients in Skia (bmo#1306883, boo#1021826)
CVE-2017-5378: Pointer and frame data leakage of Javascript objects
(bmo#1312001, bmo#1330769, boo#1021818)
CVE-2017-5379: Use-after-free in Web Animations
(bmo#1309198,boo#1021827)
CVE-2017-5380: Potential use-after-free during DOM manipulations
(bmo#1322107, boo#1021819)
CVE-2017-5390: Insecure communication methods in Developer Tools
JSON viewer (bmo#1297361, boo#1021820)
CVE-2017-5389: WebExtensions can install additional add-ons via
modified host requests (bmo#1308688, boo#1021828)
CVE-2017-5396: Use-after-free with Media Decoder
(bmo#1329403, boo#1021821)
OBS-URL: https://build.opensuse.org/package/show/mozilla:Factory/MozillaFirefox?expand=0&rev=567
2017-01-25 11:27:08 +01:00
|
|
|
+// copied from X11/X.h as a hack since for an unknown
|
|
|
|
+// reason it's not picked up from X11/X.h
|
|
|
|
+#ifndef None
|
|
|
|
+#define None 0L /* universal null resource or null atom */
|
|
|
|
+#endif
|
2011-06-01 08:05:09 +02:00
|
|
|
+
|
|
|
|
+//#define DEBUG_KDE
|
|
|
|
+#ifdef DEBUG_KDE
|
|
|
|
+#define KMOZILLAHELPER "kmozillahelper"
|
|
|
|
+#else
|
|
|
|
+// not need for lib64, it's a binary
|
|
|
|
+#define KMOZILLAHELPER "/usr/lib/mozilla/kmozillahelper"
|
|
|
|
+#endif
|
|
|
|
+
|
|
|
|
+#define KMOZILLAHELPER_VERSION 6
|
|
|
|
+#define MAKE_STR2( n ) #n
|
|
|
|
+#define MAKE_STR( n ) MAKE_STR2( n )
|
|
|
|
+
|
|
|
|
+static bool getKdeSession()
|
|
|
|
+ {
|
|
|
|
+ Display* dpy = XOpenDisplay( NULL );
|
|
|
|
+ if( dpy == NULL )
|
|
|
|
+ return false;
|
|
|
|
+ Atom kde_full_session = XInternAtom( dpy, "KDE_FULL_SESSION", True );
|
|
|
|
+ bool kde = false;
|
|
|
|
+ if( kde_full_session != None )
|
|
|
|
+ {
|
|
|
|
+ int cnt;
|
|
|
|
+ if( Atom* props = XListProperties( dpy, DefaultRootWindow( dpy ), &cnt ))
|
|
|
|
+ {
|
|
|
|
+ for( int i = 0;
|
|
|
|
+ i < cnt;
|
|
|
|
+ ++i )
|
|
|
|
+ {
|
|
|
|
+ if( props[ i ] == kde_full_session )
|
|
|
|
+ {
|
|
|
|
+ kde = true;
|
|
|
|
+#ifdef DEBUG_KDE
|
|
|
|
+ fprintf( stderr, "KDE SESSION %d\n", kde );
|
|
|
|
+#endif
|
|
|
|
+ break;
|
|
|
|
+ }
|
|
|
|
+ }
|
|
|
|
+ XFree( props );
|
|
|
|
+ }
|
|
|
|
+ }
|
|
|
|
+ XCloseDisplay( dpy );
|
|
|
|
+ return kde;
|
|
|
|
+ }
|
|
|
|
+
|
|
|
|
+static bool getKdeSupport()
|
|
|
|
+ {
|
2012-02-01 14:37:15 +01:00
|
|
|
+ nsTArray<nsCString> command;
|
|
|
|
+ command.AppendElement( NS_LITERAL_CSTRING( "CHECK" ));
|
|
|
|
+ command.AppendElement( NS_LITERAL_CSTRING( MAKE_STR( KMOZILLAHELPER_VERSION )));
|
2012-03-01 10:09:12 +01:00
|
|
|
+ bool kde = nsKDEUtils::command( command );
|
2011-06-01 08:05:09 +02:00
|
|
|
+#ifdef DEBUG_KDE
|
|
|
|
+ fprintf( stderr, "KDE RUNNING %d\n", kde );
|
|
|
|
+#endif
|
|
|
|
+ return kde;
|
|
|
|
+ }
|
|
|
|
+
|
|
|
|
+nsKDEUtils::nsKDEUtils()
|
|
|
|
+ : commandFile( NULL )
|
|
|
|
+ , replyFile( NULL )
|
|
|
|
+ {
|
|
|
|
+ }
|
|
|
|
+
|
|
|
|
+nsKDEUtils::~nsKDEUtils()
|
|
|
|
+ {
|
|
|
|
+// closeHelper(); not actually useful, exiting will close the fd too
|
|
|
|
+ }
|
|
|
|
+
|
|
|
|
+nsKDEUtils* nsKDEUtils::self()
|
|
|
|
+ {
|
|
|
|
+ static nsKDEUtils s;
|
|
|
|
+ return &s;
|
|
|
|
+ }
|
|
|
|
+
|
|
|
|
+static bool helperRunning = false;
|
|
|
|
+static bool helperFailed = false;
|
|
|
|
+
|
|
|
|
+bool nsKDEUtils::kdeSession()
|
|
|
|
+ {
|
|
|
|
+ static bool session = getKdeSession();
|
|
|
|
+ return session;
|
|
|
|
+ }
|
|
|
|
+
|
|
|
|
+bool nsKDEUtils::kdeSupport()
|
|
|
|
+ {
|
|
|
|
+ static bool support = kdeSession() && getKdeSupport();
|
|
|
|
+ return support && helperRunning;
|
|
|
|
+ }
|
|
|
|
+
|
|
|
|
+struct nsKDECommandData
|
|
|
|
+ {
|
|
|
|
+ FILE* file;
|
2012-02-01 14:37:15 +01:00
|
|
|
+ nsTArray<nsCString>* output;
|
2011-06-01 08:05:09 +02:00
|
|
|
+ GMainLoop* loop;
|
|
|
|
+ bool success;
|
|
|
|
+ };
|
|
|
|
+
|
|
|
|
+static gboolean kdeReadFunc( GIOChannel*, GIOCondition, gpointer data )
|
|
|
|
+ {
|
|
|
|
+ nsKDECommandData* p = static_cast< nsKDECommandData* >( data );
|
|
|
|
+ char buf[ 8192 ]; // TODO big enough
|
|
|
|
+ bool command_done = false;
|
|
|
|
+ bool command_failed = false;
|
|
|
|
+ while( !command_done && !command_failed && fgets( buf, 8192, p->file ) != NULL )
|
|
|
|
+ { // TODO what if the kernel splits a line into two chunks?
|
|
|
|
+//#ifdef DEBUG_KDE
|
|
|
|
+// fprintf( stderr, "READ: %s %d\n", buf, feof( p->file ));
|
|
|
|
+//#endif
|
|
|
|
+ if( char* eol = strchr( buf, '\n' ))
|
|
|
|
+ *eol = '\0';
|
|
|
|
+ command_done = ( strcmp( buf, "\\1" ) == 0 );
|
|
|
|
+ command_failed = ( strcmp( buf, "\\0" ) == 0 );
|
2013-01-07 21:49:28 +01:00
|
|
|
+ nsAutoCString line( buf );
|
2011-06-01 08:05:09 +02:00
|
|
|
+ line.ReplaceSubstring( "\\n", "\n" );
|
|
|
|
+ line.ReplaceSubstring( "\\" "\\", "\\" ); // \\ -> \ , i.e. unescape
|
|
|
|
+ if( p->output && !( command_done || command_failed ))
|
2012-02-01 14:37:15 +01:00
|
|
|
+ p->output->AppendElement( nsCString( buf )); // TODO utf8?
|
2011-06-01 08:05:09 +02:00
|
|
|
+ }
|
|
|
|
+ bool quit = false;
|
|
|
|
+ if( feof( p->file ) || command_failed )
|
|
|
|
+ {
|
|
|
|
+ quit = true;
|
|
|
|
+ p->success = false;
|
|
|
|
+ }
|
|
|
|
+ if( command_done )
|
|
|
|
+ { // reading one reply finished
|
|
|
|
+ quit = true;
|
|
|
|
+ p->success = true;
|
|
|
|
+ }
|
|
|
|
+ if( quit )
|
|
|
|
+ {
|
|
|
|
+ if( p->loop )
|
|
|
|
+ g_main_loop_quit( p->loop );
|
|
|
|
+ return FALSE;
|
|
|
|
+ }
|
|
|
|
+ return TRUE;
|
|
|
|
+ }
|
|
|
|
+
|
2012-02-01 14:37:15 +01:00
|
|
|
+bool nsKDEUtils::command( const nsTArray<nsCString>& command, nsTArray<nsCString>* output )
|
2011-06-01 08:05:09 +02:00
|
|
|
+ {
|
|
|
|
+ return self()->internalCommand( command, NULL, false, output );
|
|
|
|
+ }
|
|
|
|
+
|
2012-03-01 10:09:12 +01:00
|
|
|
+bool nsKDEUtils::command( nsIArray* command, nsIArray** output)
|
|
|
|
+ {
|
|
|
|
+ nsTArray<nsCString> in;
|
|
|
|
+ PRUint32 length;
|
|
|
|
+ command->GetLength( &length );
|
|
|
|
+ for ( PRUint32 i = 0; i < length; i++ )
|
|
|
|
+ {
|
|
|
|
+ nsCOMPtr<nsISupportsCString> str = do_QueryElementAt( command, i );
|
|
|
|
+ if( str )
|
|
|
|
+ {
|
2013-01-07 21:49:28 +01:00
|
|
|
+ nsAutoCString s;
|
2012-03-01 10:09:12 +01:00
|
|
|
+ str->GetData( s );
|
|
|
|
+ in.AppendElement( s );
|
|
|
|
+ }
|
|
|
|
+ }
|
|
|
|
+
|
|
|
|
+ nsTArray<nsCString> out;
|
|
|
|
+ bool ret = self()->internalCommand( in, NULL, false, &out );
|
|
|
|
+
|
|
|
|
+ if ( !output ) return ret;
|
|
|
|
+
|
|
|
|
+ nsCOMPtr<nsIMutableArray> result = do_CreateInstance( NS_ARRAY_CONTRACTID );
|
|
|
|
+ if ( !result ) return false;
|
|
|
|
+
|
|
|
|
+ for ( PRUint32 i = 0; i < out.Length(); i++ )
|
|
|
|
+ {
|
|
|
|
+ nsCOMPtr<nsISupportsCString> rstr = do_CreateInstance( NS_SUPPORTS_CSTRING_CONTRACTID );
|
|
|
|
+ if ( !rstr ) return false;
|
|
|
|
+
|
|
|
|
+ rstr->SetData( out[i] );
|
2018-01-23 10:55:12 +01:00
|
|
|
+ result->AppendElement( rstr );
|
2012-03-01 10:09:12 +01:00
|
|
|
+ }
|
|
|
|
+
|
|
|
|
+ NS_ADDREF( *output = result);
|
|
|
|
+ return ret;
|
|
|
|
+ }
|
|
|
|
+
|
|
|
|
+
|
2016-01-26 23:39:03 +01:00
|
|
|
+bool nsKDEUtils::commandBlockUi( const nsTArray<nsCString>& command, GtkWindow* parent, nsTArray<nsCString>* output )
|
2011-06-01 08:05:09 +02:00
|
|
|
+ {
|
|
|
|
+ return self()->internalCommand( command, parent, true, output );
|
|
|
|
+ }
|
|
|
|
+
|
2016-01-26 23:39:03 +01:00
|
|
|
+bool nsKDEUtils::internalCommand( const nsTArray<nsCString>& command, GtkWindow* parent, bool blockUi,
|
2012-02-01 14:37:15 +01:00
|
|
|
+ nsTArray<nsCString>* output )
|
2011-06-01 08:05:09 +02:00
|
|
|
+ {
|
|
|
|
+ if( !startHelper())
|
|
|
|
+ return false;
|
2012-03-01 10:09:12 +01:00
|
|
|
+ feedCommand( command );
|
2011-06-01 08:05:09 +02:00
|
|
|
+ // do not store the data in 'this' but in extra structure, just in case there
|
|
|
|
+ // is reentrancy (can there be? the event loop is re-entered)
|
|
|
|
+ nsKDECommandData data;
|
|
|
|
+ data.file = replyFile;
|
|
|
|
+ data.output = output;
|
|
|
|
+ data.success = false;
|
|
|
|
+ if( blockUi )
|
|
|
|
+ {
|
|
|
|
+ data.loop = g_main_loop_new( NULL, FALSE );
|
|
|
|
+ GtkWidget* window = gtk_window_new( GTK_WINDOW_TOPLEVEL );
|
2016-01-26 23:39:03 +01:00
|
|
|
+ if( parent && gtk_window_get_group(parent) )
|
|
|
|
+ gtk_window_group_add_window( gtk_window_get_group(parent), GTK_WINDOW( window ));
|
2011-06-01 08:05:09 +02:00
|
|
|
+ gtk_widget_realize( window );
|
|
|
|
+ gtk_widget_set_sensitive( window, TRUE );
|
|
|
|
+ gtk_grab_add( window );
|
|
|
|
+ GIOChannel* channel = g_io_channel_unix_new( fileno( data.file ));
|
|
|
|
+ g_io_add_watch( channel, static_cast< GIOCondition >( G_IO_IN | G_IO_ERR | G_IO_HUP ), kdeReadFunc, &data );
|
|
|
|
+ g_io_channel_unref( channel );
|
|
|
|
+ g_main_loop_run( data.loop );
|
|
|
|
+ g_main_loop_unref( data.loop );
|
|
|
|
+ gtk_grab_remove( window );
|
|
|
|
+ gtk_widget_destroy( window );
|
|
|
|
+ }
|
|
|
|
+ else
|
|
|
|
+ {
|
|
|
|
+ data.loop = NULL;
|
|
|
|
+ while( kdeReadFunc( NULL, static_cast< GIOCondition >( 0 ), &data ))
|
|
|
|
+ ;
|
|
|
|
+ }
|
|
|
|
+ return data.success;
|
|
|
|
+ }
|
|
|
|
+
|
|
|
|
+bool nsKDEUtils::startHelper()
|
|
|
|
+ {
|
|
|
|
+ if( helperRunning )
|
|
|
|
+ return true;
|
|
|
|
+ if( helperFailed )
|
|
|
|
+ return false;
|
|
|
|
+ helperFailed = true;
|
|
|
|
+ int fdcommand[ 2 ];
|
|
|
|
+ int fdreply[ 2 ];
|
|
|
|
+ if( pipe( fdcommand ) < 0 )
|
|
|
|
+ return false;
|
|
|
|
+ if( pipe( fdreply ) < 0 )
|
|
|
|
+ {
|
|
|
|
+ close( fdcommand[ 0 ] );
|
|
|
|
+ close( fdcommand[ 1 ] );
|
|
|
|
+ return false;
|
|
|
|
+ }
|
|
|
|
+ char* args[ 2 ] = { const_cast< char* >( KMOZILLAHELPER ), NULL };
|
|
|
|
+ switch( fork())
|
|
|
|
+ {
|
|
|
|
+ case -1:
|
|
|
|
+ {
|
|
|
|
+ close( fdcommand[ 0 ] );
|
|
|
|
+ close( fdcommand[ 1 ] );
|
|
|
|
+ close( fdreply[ 0 ] );
|
|
|
|
+ close( fdreply[ 1 ] );
|
|
|
|
+ return false;
|
|
|
|
+ }
|
|
|
|
+ case 0: // child
|
|
|
|
+ {
|
|
|
|
+ if( dup2( fdcommand[ 0 ], STDIN_FILENO ) < 0 )
|
|
|
|
+ _exit( 1 );
|
|
|
|
+ if( dup2( fdreply[ 1 ], STDOUT_FILENO ) < 0 )
|
|
|
|
+ _exit( 1 );
|
|
|
|
+ int maxfd = 1024; // close all other fds
|
|
|
|
+ struct rlimit rl;
|
|
|
|
+ if( getrlimit( RLIMIT_NOFILE, &rl ) == 0 )
|
|
|
|
+ maxfd = rl.rlim_max;
|
|
|
|
+ for( int i = 3;
|
|
|
|
+ i < maxfd;
|
|
|
|
+ ++i )
|
|
|
|
+ close( i );
|
|
|
|
+#ifdef DEBUG_KDE
|
|
|
|
+ execvp( KMOZILLAHELPER, args );
|
|
|
|
+#else
|
|
|
|
+ execv( KMOZILLAHELPER, args );
|
|
|
|
+#endif
|
|
|
|
+ _exit( 1 ); // failed
|
|
|
|
+ }
|
|
|
|
+ default: // parent
|
|
|
|
+ {
|
|
|
|
+ commandFile = fdopen( fdcommand[ 1 ], "w" );
|
|
|
|
+ replyFile = fdopen( fdreply[ 0 ], "r" );
|
|
|
|
+ close( fdcommand[ 0 ] );
|
|
|
|
+ close( fdreply[ 1 ] );
|
|
|
|
+ if( commandFile == NULL || replyFile == NULL )
|
|
|
|
+ {
|
|
|
|
+ closeHelper();
|
|
|
|
+ return false;
|
|
|
|
+ }
|
|
|
|
+ // ok, helper ready, getKdeRunning() will check if it works
|
|
|
|
+ }
|
|
|
|
+ }
|
|
|
|
+ helperFailed = false;
|
|
|
|
+ helperRunning = true;
|
|
|
|
+ return true;
|
|
|
|
+ }
|
|
|
|
+
|
|
|
|
+void nsKDEUtils::closeHelper()
|
|
|
|
+ {
|
|
|
|
+ if( commandFile != NULL )
|
|
|
|
+ fclose( commandFile ); // this will also make the helper quit
|
|
|
|
+ if( replyFile != NULL )
|
|
|
|
+ fclose( replyFile );
|
|
|
|
+ helperRunning = false;
|
|
|
|
+ }
|
|
|
|
+
|
2012-02-01 14:37:15 +01:00
|
|
|
+void nsKDEUtils::feedCommand( const nsTArray<nsCString>& command )
|
2011-06-01 08:05:09 +02:00
|
|
|
+ {
|
|
|
|
+ for( int i = 0;
|
2012-02-01 14:37:15 +01:00
|
|
|
+ i < command.Length();
|
2011-06-01 08:05:09 +02:00
|
|
|
+ ++i )
|
|
|
|
+ {
|
2012-02-01 14:37:15 +01:00
|
|
|
+ nsCString line = command[ i ];
|
2011-06-01 08:05:09 +02:00
|
|
|
+ line.ReplaceSubstring( "\\", "\\" "\\" ); // \ -> \\ , i.e. escape
|
|
|
|
+ line.ReplaceSubstring( "\n", "\\n" );
|
|
|
|
+#ifdef DEBUG_KDE
|
|
|
|
+ fprintf( stderr, "COMM: %s\n", line.get());
|
|
|
|
+#endif
|
|
|
|
+ fputs( line.get(), commandFile );
|
|
|
|
+ fputs( "\n", commandFile );
|
|
|
|
+ }
|
|
|
|
+ fputs( "\\E\n", commandFile ); // done as \E, so it cannot happen in normal data
|
|
|
|
+ fflush( commandFile );
|
|
|
|
+ }
|
|
|
|
diff --git a/toolkit/xre/nsKDEUtils.h b/toolkit/xre/nsKDEUtils.h
|
|
|
|
new file mode 100644
|
|
|
|
--- /dev/null
|
|
|
|
+++ b/toolkit/xre/nsKDEUtils.h
|
2012-11-20 21:34:15 +01:00
|
|
|
@@ -0,0 +1,48 @@
|
|
|
|
+/* -*- Mode: C++; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
|
|
|
|
+/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
|
|
+ * License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
|
|
+ * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
2011-06-01 08:05:09 +02:00
|
|
|
+
|
|
|
|
+#ifndef nsKDEUtils_h__
|
|
|
|
+#define nsKDEUtils_h__
|
|
|
|
+
|
2018-03-13 20:46:06 +01:00
|
|
|
+#include "nsString.h"
|
2012-02-01 14:37:15 +01:00
|
|
|
+#include "nsTArray.h"
|
2011-06-01 08:05:09 +02:00
|
|
|
+#include <stdio.h>
|
|
|
|
+
|
|
|
|
+typedef struct _GtkWindow GtkWindow;
|
|
|
|
+
|
2012-03-01 10:09:12 +01:00
|
|
|
+class nsIArray;
|
|
|
|
+
|
2011-06-01 08:05:09 +02:00
|
|
|
+class NS_EXPORT nsKDEUtils
|
|
|
|
+ {
|
|
|
|
+ public:
|
|
|
|
+ /* Returns true if running inside a KDE session (regardless of whether there is KDE
|
|
|
|
+ support available for Firefox). This should be used e.g. when determining
|
|
|
|
+ dialog button order but not for code that requires the KDE support. */
|
|
|
|
+ static bool kdeSession();
|
|
|
|
+ /* Returns true if running inside a KDE session and KDE support is available
|
|
|
|
+ for Firefox. This should be used everywhere where the external helper is needed. */
|
|
|
|
+ static bool kdeSupport();
|
|
|
|
+ /* Executes the given helper command, returns true if helper returned success. */
|
2012-02-01 14:37:15 +01:00
|
|
|
+ static bool command( const nsTArray<nsCString>& command, nsTArray<nsCString>* output = NULL );
|
2012-03-01 10:09:12 +01:00
|
|
|
+ static bool command( nsIArray* command, nsIArray** output = NULL );
|
2011-06-01 08:05:09 +02:00
|
|
|
+ /* Like command(), but additionally blocks the parent widget like if there was
|
|
|
|
+ a modal dialog shown and enters the event loop (i.e. there are still paint updates,
|
|
|
|
+ this is for commands that take long). */
|
2016-01-26 23:39:03 +01:00
|
|
|
+ static bool commandBlockUi( const nsTArray<nsCString>& command, GtkWindow* parent, nsTArray<nsCString>* output = NULL );
|
2012-02-01 14:37:15 +01:00
|
|
|
+
|
2011-06-01 08:05:09 +02:00
|
|
|
+ private:
|
|
|
|
+ nsKDEUtils();
|
|
|
|
+ ~nsKDEUtils();
|
|
|
|
+ static nsKDEUtils* self();
|
|
|
|
+ bool startHelper();
|
|
|
|
+ void closeHelper();
|
2012-02-01 14:37:15 +01:00
|
|
|
+ void feedCommand( const nsTArray<nsCString>& command );
|
2016-01-26 23:39:03 +01:00
|
|
|
+ bool internalCommand( const nsTArray<nsCString>& command, GtkWindow* parent, bool isParent,
|
2012-02-01 14:37:15 +01:00
|
|
|
+ nsTArray<nsCString>* output );
|
2011-06-01 08:05:09 +02:00
|
|
|
+ FILE* commandFile;
|
|
|
|
+ FILE* replyFile;
|
|
|
|
+ };
|
|
|
|
+
|
|
|
|
+#endif // nsKDEUtils
|
2013-09-16 09:57:05 +02:00
|
|
|
diff --git a/uriloader/exthandler/moz.build b/uriloader/exthandler/moz.build
|
|
|
|
--- a/uriloader/exthandler/moz.build
|
|
|
|
+++ b/uriloader/exthandler/moz.build
|
2016-09-20 18:19:47 +02:00
|
|
|
@@ -77,17 +77,19 @@ else:
|
2014-02-03 16:34:42 +01:00
|
|
|
SOURCES += [
|
|
|
|
osdir + '/nsOSHelperAppService.cpp',
|
2013-09-16 09:57:05 +02:00
|
|
|
]
|
2018-03-13 20:46:06 +01:00
|
|
|
if CONFIG['CC_TYPE'] in ('clang', 'gcc'):
|
2016-09-20 18:19:47 +02:00
|
|
|
CXXFLAGS += ['-Wno-error=shadow']
|
2011-06-01 08:05:09 +02:00
|
|
|
|
2016-08-03 00:00:28 +02:00
|
|
|
if 'gtk' in CONFIG['MOZ_WIDGET_TOOLKIT']:
|
2014-03-18 20:44:32 +01:00
|
|
|
UNIFIED_SOURCES += [
|
2014-02-03 16:34:42 +01:00
|
|
|
+ 'unix/nsCommonRegistry.cpp',
|
|
|
|
'unix/nsGNOMERegistry.cpp',
|
2018-03-13 20:46:06 +01:00
|
|
|
+ 'unix/nsKDERegistry.cpp',
|
2014-02-03 16:34:42 +01:00
|
|
|
'unix/nsMIMEInfoUnix.cpp',
|
2013-09-16 09:57:05 +02:00
|
|
|
]
|
|
|
|
elif CONFIG['MOZ_WIDGET_TOOLKIT'] == 'android':
|
2014-03-18 20:44:32 +01:00
|
|
|
UNIFIED_SOURCES += [
|
2014-02-03 16:34:42 +01:00
|
|
|
'android/nsAndroidHandlerApp.cpp',
|
|
|
|
'android/nsExternalSharingAppService.cpp',
|
|
|
|
'android/nsExternalURLHandlerService.cpp',
|
|
|
|
'android/nsMIMEInfoAndroid.cpp',
|
2018-03-13 20:46:06 +01:00
|
|
|
@@ -124,16 +126,17 @@ include('/ipc/chromium/chromium-config.m
|
2014-12-02 23:01:52 +01:00
|
|
|
FINAL_LIBRARY = 'xul'
|
|
|
|
|
|
|
|
LOCAL_INCLUDES += [
|
2018-01-23 10:55:12 +01:00
|
|
|
'/docshell/base',
|
2014-12-02 23:01:52 +01:00
|
|
|
'/dom/base',
|
|
|
|
'/dom/ipc',
|
2015-05-10 22:12:38 +02:00
|
|
|
'/netwerk/base',
|
2014-12-02 23:01:52 +01:00
|
|
|
'/netwerk/protocol/http',
|
2015-05-10 22:12:38 +02:00
|
|
|
+ '/toolkit/xre',
|
2014-12-02 23:01:52 +01:00
|
|
|
]
|
|
|
|
|
|
|
|
if CONFIG['MOZ_ENABLE_DBUS']:
|
|
|
|
CXXFLAGS += CONFIG['TK_CFLAGS']
|
|
|
|
CXXFLAGS += CONFIG['MOZ_DBUS_CFLAGS']
|
|
|
|
|
2018-03-13 20:46:06 +01:00
|
|
|
if CONFIG['MOZ_WIDGET_TOOLKIT'] == 'gtk3':
|
2014-12-02 23:01:52 +01:00
|
|
|
CXXFLAGS += CONFIG['TK_CFLAGS']
|
2011-06-01 08:05:09 +02:00
|
|
|
diff --git a/uriloader/exthandler/unix/nsCommonRegistry.cpp b/uriloader/exthandler/unix/nsCommonRegistry.cpp
|
|
|
|
new file mode 100644
|
|
|
|
--- /dev/null
|
|
|
|
+++ b/uriloader/exthandler/unix/nsCommonRegistry.cpp
|
2015-08-12 09:11:49 +02:00
|
|
|
@@ -0,0 +1,53 @@
|
2011-06-01 08:05:09 +02:00
|
|
|
+/* -*- Mode: C++; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
|
2012-11-20 21:34:15 +01:00
|
|
|
+/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
|
|
+ * License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
|
|
+ * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
2011-06-01 08:05:09 +02:00
|
|
|
+
|
|
|
|
+#include "nsCommonRegistry.h"
|
|
|
|
+
|
|
|
|
+#include "nsGNOMERegistry.h"
|
|
|
|
+#include "nsKDERegistry.h"
|
|
|
|
+#include "nsString.h"
|
|
|
|
+#include "nsKDEUtils.h"
|
|
|
|
+
|
2013-01-07 21:49:28 +01:00
|
|
|
+/* static */ bool
|
2011-06-01 08:05:09 +02:00
|
|
|
+nsCommonRegistry::HandlerExists(const char *aProtocolScheme)
|
|
|
|
+{
|
|
|
|
+ if( nsKDEUtils::kdeSupport())
|
|
|
|
+ return nsKDERegistry::HandlerExists( aProtocolScheme );
|
|
|
|
+ return nsGNOMERegistry::HandlerExists( aProtocolScheme );
|
|
|
|
+}
|
|
|
|
+
|
|
|
|
+/* static */ nsresult
|
|
|
|
+nsCommonRegistry::LoadURL(nsIURI *aURL)
|
|
|
|
+{
|
|
|
|
+ if( nsKDEUtils::kdeSupport())
|
|
|
|
+ return nsKDERegistry::LoadURL( aURL );
|
|
|
|
+ return nsGNOMERegistry::LoadURL( aURL );
|
|
|
|
+}
|
|
|
|
+
|
|
|
|
+/* static */ void
|
|
|
|
+nsCommonRegistry::GetAppDescForScheme(const nsACString& aScheme,
|
|
|
|
+ nsAString& aDesc)
|
|
|
|
+{
|
|
|
|
+ if( nsKDEUtils::kdeSupport())
|
|
|
|
+ return nsKDERegistry::GetAppDescForScheme( aScheme, aDesc );
|
|
|
|
+ return nsGNOMERegistry::GetAppDescForScheme( aScheme, aDesc );
|
|
|
|
+}
|
|
|
|
+
|
|
|
|
+
|
|
|
|
+/* static */ already_AddRefed<nsMIMEInfoBase>
|
|
|
|
+nsCommonRegistry::GetFromExtension(const nsACString& aFileExt)
|
|
|
|
+{
|
|
|
|
+ if( nsKDEUtils::kdeSupport())
|
|
|
|
+ return nsKDERegistry::GetFromExtension( aFileExt );
|
|
|
|
+ return nsGNOMERegistry::GetFromExtension( aFileExt );
|
|
|
|
+}
|
|
|
|
+
|
|
|
|
+/* static */ already_AddRefed<nsMIMEInfoBase>
|
|
|
|
+nsCommonRegistry::GetFromType(const nsACString& aMIMEType)
|
|
|
|
+{
|
|
|
|
+ if( nsKDEUtils::kdeSupport())
|
|
|
|
+ return nsKDERegistry::GetFromType( aMIMEType );
|
|
|
|
+ return nsGNOMERegistry::GetFromType( aMIMEType );
|
|
|
|
+}
|
|
|
|
diff --git a/uriloader/exthandler/unix/nsCommonRegistry.h b/uriloader/exthandler/unix/nsCommonRegistry.h
|
|
|
|
new file mode 100644
|
|
|
|
--- /dev/null
|
|
|
|
+++ b/uriloader/exthandler/unix/nsCommonRegistry.h
|
2014-09-22 18:35:40 +02:00
|
|
|
@@ -0,0 +1,28 @@
|
2012-11-20 21:34:15 +01:00
|
|
|
+/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
|
|
+ * License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
|
|
+ * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
2011-06-01 08:05:09 +02:00
|
|
|
+
|
2014-09-22 18:35:40 +02:00
|
|
|
+#ifndef nsCommonRegistry_h__
|
|
|
|
+#define nsCommonRegistry_h__
|
|
|
|
+
|
2011-06-01 08:05:09 +02:00
|
|
|
+#include "nsIURI.h"
|
|
|
|
+#include "nsCOMPtr.h"
|
|
|
|
+
|
|
|
|
+class nsMIMEInfoBase;
|
|
|
|
+
|
|
|
|
+class nsCommonRegistry
|
|
|
|
+{
|
|
|
|
+ public:
|
2013-01-07 21:49:28 +01:00
|
|
|
+ static bool HandlerExists(const char *aProtocolScheme);
|
2011-06-01 08:05:09 +02:00
|
|
|
+
|
|
|
|
+ static nsresult LoadURL(nsIURI *aURL);
|
|
|
|
+
|
|
|
|
+ static void GetAppDescForScheme(const nsACString& aScheme,
|
|
|
|
+ nsAString& aDesc);
|
|
|
|
+
|
|
|
|
+ static already_AddRefed<nsMIMEInfoBase> GetFromExtension(const nsACString& aFileExt);
|
|
|
|
+
|
|
|
|
+ static already_AddRefed<nsMIMEInfoBase> GetFromType(const nsACString& aMIMEType);
|
|
|
|
+};
|
2014-09-22 18:35:40 +02:00
|
|
|
+
|
|
|
|
+#endif
|
2011-06-01 08:05:09 +02:00
|
|
|
diff --git a/uriloader/exthandler/unix/nsKDERegistry.cpp b/uriloader/exthandler/unix/nsKDERegistry.cpp
|
|
|
|
new file mode 100644
|
|
|
|
--- /dev/null
|
|
|
|
+++ b/uriloader/exthandler/unix/nsKDERegistry.cpp
|
2017-11-15 00:17:59 +01:00
|
|
|
@@ -0,0 +1,87 @@
|
2011-06-01 08:05:09 +02:00
|
|
|
+/* -*- Mode: C++; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
|
2012-11-20 21:34:15 +01:00
|
|
|
+/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
|
|
+ * License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
|
|
+ * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
2011-06-01 08:05:09 +02:00
|
|
|
+
|
|
|
|
+#include "nsKDERegistry.h"
|
|
|
|
+#include "prlink.h"
|
|
|
|
+#include "prmem.h"
|
|
|
|
+#include "nsString.h"
|
|
|
|
+#include "nsMIMEInfoUnix.h"
|
|
|
|
+#include "nsAutoPtr.h"
|
|
|
|
+#include "nsKDEUtils.h"
|
|
|
|
+
|
2013-01-07 21:49:28 +01:00
|
|
|
+/* static */ bool
|
2011-06-01 08:05:09 +02:00
|
|
|
+nsKDERegistry::HandlerExists(const char *aProtocolScheme)
|
|
|
|
+{
|
2012-02-01 14:37:15 +01:00
|
|
|
+ nsTArray<nsCString> command;
|
|
|
|
+ command.AppendElement( NS_LITERAL_CSTRING( "HANDLEREXISTS" ));
|
2013-01-07 21:49:28 +01:00
|
|
|
+ command.AppendElement( nsAutoCString( aProtocolScheme ));
|
2011-06-01 08:05:09 +02:00
|
|
|
+ return nsKDEUtils::command( command );
|
|
|
|
+}
|
|
|
|
+
|
|
|
|
+/* static */ nsresult
|
|
|
|
+nsKDERegistry::LoadURL(nsIURI *aURL)
|
|
|
|
+{
|
2012-02-01 14:37:15 +01:00
|
|
|
+ nsTArray<nsCString> command;
|
|
|
|
+ command.AppendElement( NS_LITERAL_CSTRING( "OPEN" ));
|
2011-06-01 08:05:09 +02:00
|
|
|
+ nsCString url;
|
|
|
|
+ aURL->GetSpec( url );
|
2012-02-01 14:37:15 +01:00
|
|
|
+ command.AppendElement( url );
|
2013-01-07 21:49:28 +01:00
|
|
|
+ bool rv = nsKDEUtils::command( command );
|
|
|
|
+ if (!rv)
|
|
|
|
+ return NS_ERROR_FAILURE;
|
|
|
|
+
|
|
|
|
+ return NS_OK;
|
2011-06-01 08:05:09 +02:00
|
|
|
+}
|
|
|
|
+
|
|
|
|
+/* static */ void
|
|
|
|
+nsKDERegistry::GetAppDescForScheme(const nsACString& aScheme,
|
|
|
|
+ nsAString& aDesc)
|
|
|
|
+{
|
2012-02-01 14:37:15 +01:00
|
|
|
+ nsTArray<nsCString> command;
|
|
|
|
+ command.AppendElement( NS_LITERAL_CSTRING( "GETAPPDESCFORSCHEME" ));
|
|
|
|
+ command.AppendElement( aScheme );
|
|
|
|
+ nsTArray<nsCString> output;
|
|
|
|
+ if( nsKDEUtils::command( command, &output ) && output.Length() == 1 )
|
|
|
|
+ CopyUTF8toUTF16( output[ 0 ], aDesc );
|
2011-06-01 08:05:09 +02:00
|
|
|
+}
|
|
|
|
+
|
|
|
|
+
|
|
|
|
+/* static */ already_AddRefed<nsMIMEInfoBase>
|
|
|
|
+nsKDERegistry::GetFromExtension(const nsACString& aFileExt)
|
|
|
|
+{
|
|
|
|
+ NS_ASSERTION(aFileExt[0] != '.', "aFileExt shouldn't start with a dot");
|
2012-02-01 14:37:15 +01:00
|
|
|
+ nsTArray<nsCString> command;
|
|
|
|
+ command.AppendElement( NS_LITERAL_CSTRING( "GETFROMEXTENSION" ));
|
|
|
|
+ command.AppendElement( aFileExt );
|
2011-06-01 08:05:09 +02:00
|
|
|
+ return GetFromHelper( command );
|
|
|
|
+}
|
|
|
|
+
|
|
|
|
+/* static */ already_AddRefed<nsMIMEInfoBase>
|
|
|
|
+nsKDERegistry::GetFromType(const nsACString& aMIMEType)
|
|
|
|
+{
|
2012-02-01 14:37:15 +01:00
|
|
|
+ nsTArray<nsCString> command;
|
|
|
|
+ command.AppendElement( NS_LITERAL_CSTRING( "GETFROMTYPE" ));
|
|
|
|
+ command.AppendElement( aMIMEType );
|
2011-06-01 08:05:09 +02:00
|
|
|
+ return GetFromHelper( command );
|
|
|
|
+}
|
|
|
|
+
|
|
|
|
+/* static */ already_AddRefed<nsMIMEInfoBase>
|
2012-02-01 14:37:15 +01:00
|
|
|
+nsKDERegistry::GetFromHelper(const nsTArray<nsCString>& command)
|
2011-06-01 08:05:09 +02:00
|
|
|
+{
|
2012-02-01 14:37:15 +01:00
|
|
|
+ nsTArray<nsCString> output;
|
|
|
|
+ if( nsKDEUtils::command( command, &output ) && output.Length() == 3 )
|
2011-06-01 08:05:09 +02:00
|
|
|
+ {
|
2012-02-01 14:37:15 +01:00
|
|
|
+ nsCString mimetype = output[ 0 ];
|
2016-01-26 23:39:03 +01:00
|
|
|
+ RefPtr<nsMIMEInfoUnix> mimeInfo = new nsMIMEInfoUnix( mimetype );
|
2012-11-20 21:34:15 +01:00
|
|
|
+ NS_ENSURE_TRUE(mimeInfo, nullptr);
|
2012-02-01 14:37:15 +01:00
|
|
|
+ nsCString description = output[ 1 ];
|
2011-06-01 08:05:09 +02:00
|
|
|
+ mimeInfo->SetDescription(NS_ConvertUTF8toUTF16(description));
|
2012-02-01 14:37:15 +01:00
|
|
|
+ nsCString handlerAppName = output[ 2 ];
|
2011-06-01 08:05:09 +02:00
|
|
|
+ mimeInfo->SetDefaultDescription(NS_ConvertUTF8toUTF16(handlerAppName));
|
|
|
|
+ mimeInfo->SetPreferredAction(nsIMIMEInfo::useSystemDefault);
|
2013-09-16 09:57:05 +02:00
|
|
|
+ return mimeInfo.forget();
|
2011-06-01 08:05:09 +02:00
|
|
|
+ }
|
2012-11-20 21:34:15 +01:00
|
|
|
+ return nullptr;
|
2011-06-01 08:05:09 +02:00
|
|
|
+}
|
|
|
|
diff --git a/uriloader/exthandler/unix/nsKDERegistry.h b/uriloader/exthandler/unix/nsKDERegistry.h
|
|
|
|
new file mode 100644
|
|
|
|
--- /dev/null
|
|
|
|
+++ b/uriloader/exthandler/unix/nsKDERegistry.h
|
2014-09-22 18:35:40 +02:00
|
|
|
@@ -0,0 +1,34 @@
|
2012-11-20 21:34:15 +01:00
|
|
|
+/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
|
|
+ * License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
|
|
+ * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
2011-06-01 08:05:09 +02:00
|
|
|
+
|
2014-09-22 18:35:40 +02:00
|
|
|
+#ifndef nsKDERegistry_h__
|
|
|
|
+#define nsKDERegistry_h__
|
|
|
|
+
|
2011-06-01 08:05:09 +02:00
|
|
|
+#include "nsIURI.h"
|
|
|
|
+#include "nsCOMPtr.h"
|
2012-02-01 14:37:15 +01:00
|
|
|
+#include "nsTArray.h"
|
2011-06-01 08:05:09 +02:00
|
|
|
+
|
|
|
|
+class nsMIMEInfoBase;
|
2017-11-15 00:17:59 +01:00
|
|
|
+//class nsAutoCString;
|
|
|
|
+//class nsCString;
|
2011-06-01 08:05:09 +02:00
|
|
|
+
|
|
|
|
+class nsKDERegistry
|
|
|
|
+{
|
|
|
|
+ public:
|
2013-01-07 21:49:28 +01:00
|
|
|
+ static bool HandlerExists(const char *aProtocolScheme);
|
2011-06-01 08:05:09 +02:00
|
|
|
+
|
|
|
|
+ static nsresult LoadURL(nsIURI *aURL);
|
|
|
|
+
|
|
|
|
+ static void GetAppDescForScheme(const nsACString& aScheme,
|
|
|
|
+ nsAString& aDesc);
|
|
|
|
+
|
|
|
|
+ static already_AddRefed<nsMIMEInfoBase> GetFromExtension(const nsACString& aFileExt);
|
|
|
|
+
|
|
|
|
+ static already_AddRefed<nsMIMEInfoBase> GetFromType(const nsACString& aMIMEType);
|
|
|
|
+ private:
|
2012-02-01 14:37:15 +01:00
|
|
|
+ static already_AddRefed<nsMIMEInfoBase> GetFromHelper(const nsTArray<nsCString>& command);
|
2011-06-01 08:05:09 +02:00
|
|
|
+
|
|
|
|
+};
|
2014-09-22 18:35:40 +02:00
|
|
|
+
|
|
|
|
+#endif //nsKDERegistry_h__
|
2011-06-01 08:05:09 +02:00
|
|
|
diff --git a/uriloader/exthandler/unix/nsMIMEInfoUnix.cpp b/uriloader/exthandler/unix/nsMIMEInfoUnix.cpp
|
|
|
|
--- a/uriloader/exthandler/unix/nsMIMEInfoUnix.cpp
|
|
|
|
+++ b/uriloader/exthandler/unix/nsMIMEInfoUnix.cpp
|
2016-11-15 19:06:29 +01:00
|
|
|
@@ -1,50 +1,53 @@
|
|
|
|
/* -*- Mode: C++; tab-width: 3; indent-tabs-mode: nil; c-basic-offset: 2 -*-
|
|
|
|
*
|
|
|
|
* This Source Code Form is subject to the terms of the Mozilla Public
|
|
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
2011-06-01 08:05:09 +02:00
|
|
|
|
|
|
|
#include "nsMIMEInfoUnix.h"
|
|
|
|
-#include "nsGNOMERegistry.h"
|
|
|
|
+#include "nsCommonRegistry.h"
|
|
|
|
#include "nsIGIOService.h"
|
|
|
|
#include "nsNetCID.h"
|
|
|
|
#include "nsIIOService.h"
|
|
|
|
#include "nsAutoPtr.h"
|
|
|
|
#ifdef MOZ_ENABLE_DBUS
|
|
|
|
#include "nsDBusHandlerApp.h"
|
|
|
|
#endif
|
|
|
|
+#if defined(XP_UNIX) && !defined(XP_MACOSX)
|
|
|
|
+#include "nsKDEUtils.h"
|
|
|
|
+#endif
|
|
|
|
|
|
|
|
nsresult
|
|
|
|
nsMIMEInfoUnix::LoadUriInternal(nsIURI * aURI)
|
|
|
|
{
|
2016-11-15 19:06:29 +01:00
|
|
|
- return nsGNOMERegistry::LoadURL(aURI);
|
|
|
|
+ return nsCommonRegistry::LoadURL(aURI);
|
|
|
|
}
|
2015-02-23 21:32:13 +01:00
|
|
|
|
2016-11-15 19:06:29 +01:00
|
|
|
NS_IMETHODIMP
|
|
|
|
nsMIMEInfoUnix::GetHasDefaultHandler(bool *_retval)
|
|
|
|
{
|
|
|
|
// if mDefaultApplication is set, it means the application has been set from
|
2013-06-24 09:57:33 +02:00
|
|
|
// either /etc/mailcap or ${HOME}/.mailcap, in which case we don't want to
|
|
|
|
// give the GNOME answer.
|
|
|
|
if (mDefaultApplication)
|
|
|
|
return nsMIMEInfoImpl::GetHasDefaultHandler(_retval);
|
|
|
|
|
2012-02-01 14:37:15 +01:00
|
|
|
*_retval = false;
|
2014-07-21 11:32:46 +02:00
|
|
|
|
2015-05-10 22:12:38 +02:00
|
|
|
if (mClass == eProtocolInfo) {
|
2014-07-21 11:32:46 +02:00
|
|
|
- *_retval = nsGNOMERegistry::HandlerExists(mSchemeOrType.get());
|
|
|
|
+ *_retval = nsCommonRegistry::HandlerExists(mSchemeOrType.get());
|
|
|
|
} else {
|
2016-01-26 23:39:03 +01:00
|
|
|
- RefPtr<nsMIMEInfoBase> mimeInfo = nsGNOMERegistry::GetFromType(mSchemeOrType);
|
|
|
|
+ RefPtr<nsMIMEInfoBase> mimeInfo = nsCommonRegistry::GetFromType(mSchemeOrType);
|
2014-07-21 11:32:46 +02:00
|
|
|
if (!mimeInfo) {
|
|
|
|
nsAutoCString ext;
|
|
|
|
nsresult rv = GetPrimaryExtension(ext);
|
|
|
|
if (NS_SUCCEEDED(rv)) {
|
|
|
|
- mimeInfo = nsGNOMERegistry::GetFromExtension(ext);
|
|
|
|
+ mimeInfo = nsCommonRegistry::GetFromExtension(ext);
|
|
|
|
}
|
2011-06-01 08:05:09 +02:00
|
|
|
}
|
2014-07-21 11:32:46 +02:00
|
|
|
if (mimeInfo)
|
|
|
|
*_retval = true;
|
2011-06-01 08:05:09 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
if (*_retval)
|
|
|
|
return NS_OK;
|
2018-03-13 20:46:06 +01:00
|
|
|
@@ -59,16 +62,33 @@ nsMIMEInfoUnix::LaunchDefaultWithFile(ns
|
|
|
|
// either /etc/mailcap or ${HOME}/.mailcap, in which case we don't want to
|
|
|
|
// give the GNOME answer.
|
|
|
|
if (mDefaultApplication)
|
|
|
|
return nsMIMEInfoImpl::LaunchDefaultWithFile(aFile);
|
|
|
|
|
|
|
|
nsAutoCString nativePath;
|
|
|
|
aFile->GetNativePath(nativePath);
|
2011-06-01 08:05:09 +02:00
|
|
|
|
|
|
|
+ if( nsKDEUtils::kdeSupport()) {
|
2012-02-01 14:37:15 +01:00
|
|
|
+ bool supports;
|
2011-06-01 08:05:09 +02:00
|
|
|
+ if( NS_SUCCEEDED( GetHasDefaultHandler( &supports )) && supports ) {
|
2012-02-01 14:37:15 +01:00
|
|
|
+ nsTArray<nsCString> command;
|
|
|
|
+ command.AppendElement( NS_LITERAL_CSTRING( "OPEN" ));
|
|
|
|
+ command.AppendElement( nativePath );
|
|
|
|
+ command.AppendElement( NS_LITERAL_CSTRING( "MIMETYPE" ));
|
|
|
|
+ command.AppendElement( mSchemeOrType );
|
2011-06-01 08:05:09 +02:00
|
|
|
+ if( nsKDEUtils::command( command ))
|
|
|
|
+ return NS_OK;
|
|
|
|
+ }
|
|
|
|
+ if (!mDefaultApplication)
|
|
|
|
+ return NS_ERROR_FILE_NOT_FOUND;
|
|
|
|
+
|
|
|
|
+ return LaunchWithIProcess(mDefaultApplication, nativePath);
|
|
|
|
+ }
|
|
|
|
+
|
|
|
|
nsCOMPtr<nsIGIOService> giovfs = do_GetService(NS_GIOSERVICE_CONTRACTID);
|
2015-05-10 22:12:38 +02:00
|
|
|
if (!giovfs) {
|
|
|
|
return NS_ERROR_FAILURE;
|
2011-06-01 08:05:09 +02:00
|
|
|
}
|
|
|
|
|
2015-05-10 22:12:38 +02:00
|
|
|
// nsGIOMimeApp->Launch wants a URI string instead of local file
|
|
|
|
nsresult rv;
|
|
|
|
nsCOMPtr<nsIIOService> ioservice = do_GetService(NS_IOSERVICE_CONTRACTID, &rv);
|
2011-06-01 08:05:09 +02:00
|
|
|
diff --git a/uriloader/exthandler/unix/nsOSHelperAppService.cpp b/uriloader/exthandler/unix/nsOSHelperAppService.cpp
|
|
|
|
--- a/uriloader/exthandler/unix/nsOSHelperAppService.cpp
|
|
|
|
+++ b/uriloader/exthandler/unix/nsOSHelperAppService.cpp
|
2018-01-23 10:55:12 +01:00
|
|
|
@@ -5,17 +5,17 @@
|
|
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
|
|
|
|
|
|
|
#include <sys/types.h>
|
|
|
|
#include <sys/stat.h>
|
2011-06-01 08:05:09 +02:00
|
|
|
|
|
|
|
#include "nsOSHelperAppService.h"
|
|
|
|
#include "nsMIMEInfoUnix.h"
|
2013-09-16 09:57:05 +02:00
|
|
|
#ifdef MOZ_WIDGET_GTK
|
2011-06-01 08:05:09 +02:00
|
|
|
-#include "nsGNOMERegistry.h"
|
|
|
|
+#include "nsCommonRegistry.h"
|
|
|
|
#endif
|
|
|
|
#include "nsISupports.h"
|
|
|
|
#include "nsString.h"
|
|
|
|
#include "nsReadableUtils.h"
|
|
|
|
#include "nsUnicharUtils.h"
|
|
|
|
#include "nsIURL.h"
|
|
|
|
#include "nsIFileStreams.h"
|
2017-11-15 00:17:59 +01:00
|
|
|
#include "nsILineInputStream.h"
|
2018-01-23 10:55:12 +01:00
|
|
|
@@ -1128,17 +1128,17 @@ nsOSHelperAppService::GetHandlerAndDescr
|
2011-06-01 08:05:09 +02:00
|
|
|
|
2018-01-23 10:55:12 +01:00
|
|
|
nsresult nsOSHelperAppService::OSProtocolHandlerExists(const char * aProtocolScheme, bool * aHandlerExists)
|
|
|
|
{
|
|
|
|
nsresult rv = NS_OK;
|
2011-06-01 08:05:09 +02:00
|
|
|
|
2018-01-23 10:55:12 +01:00
|
|
|
if (!XRE_IsContentProcess()) {
|
2013-09-16 09:57:05 +02:00
|
|
|
#ifdef MOZ_WIDGET_GTK
|
2018-01-23 10:55:12 +01:00
|
|
|
// Check the GNOME registry for a protocol handler
|
|
|
|
- *aHandlerExists = nsGNOMERegistry::HandlerExists(aProtocolScheme);
|
|
|
|
+ *aHandlerExists = nsCommonRegistry::HandlerExists(aProtocolScheme);
|
|
|
|
#else
|
|
|
|
*aHandlerExists = false;
|
2011-06-01 08:05:09 +02:00
|
|
|
#endif
|
2018-01-23 10:55:12 +01:00
|
|
|
} else {
|
|
|
|
*aHandlerExists = false;
|
|
|
|
nsCOMPtr<nsIHandlerService> handlerSvc = do_GetService(NS_HANDLERSERVICE_CONTRACTID, &rv);
|
|
|
|
if (NS_SUCCEEDED(rv) && handlerSvc) {
|
|
|
|
rv = handlerSvc->ExistsForProtocol(nsCString(aProtocolScheme), aHandlerExists);
|
|
|
|
@@ -1146,17 +1146,17 @@ nsresult nsOSHelperAppService::OSProtoco
|
|
|
|
}
|
2011-06-01 08:05:09 +02:00
|
|
|
|
2018-01-23 10:55:12 +01:00
|
|
|
return rv;
|
2011-06-01 08:05:09 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP nsOSHelperAppService::GetApplicationDescription(const nsACString& aScheme, nsAString& _retval)
|
|
|
|
{
|
2013-09-16 09:57:05 +02:00
|
|
|
#ifdef MOZ_WIDGET_GTK
|
2011-06-01 08:05:09 +02:00
|
|
|
- nsGNOMERegistry::GetAppDescForScheme(aScheme, _retval);
|
|
|
|
+ nsCommonRegistry::GetAppDescForScheme(aScheme, _retval);
|
|
|
|
return _retval.IsEmpty() ? NS_ERROR_NOT_AVAILABLE : NS_OK;
|
|
|
|
#else
|
|
|
|
return NS_ERROR_NOT_AVAILABLE;
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
2014-04-27 18:09:32 +02:00
|
|
|
nsresult nsOSHelperAppService::GetFileTokenForPath(const char16_t * platformAppPath, nsIFile ** aFile)
|
2011-06-01 08:05:09 +02:00
|
|
|
{
|
2018-01-23 10:55:12 +01:00
|
|
|
@@ -1243,17 +1243,17 @@ nsOSHelperAppService::GetFromExtension(c
|
2011-06-01 08:05:09 +02:00
|
|
|
mime_types_description,
|
2012-02-01 14:37:15 +01:00
|
|
|
true);
|
2011-06-01 08:05:09 +02:00
|
|
|
|
|
|
|
if (NS_FAILED(rv) || majorType.IsEmpty()) {
|
2014-07-21 11:32:46 +02:00
|
|
|
|
2013-09-16 09:57:05 +02:00
|
|
|
#ifdef MOZ_WIDGET_GTK
|
2011-06-01 08:05:09 +02:00
|
|
|
LOG(("Looking in GNOME registry\n"));
|
2016-01-26 23:39:03 +01:00
|
|
|
RefPtr<nsMIMEInfoBase> gnomeInfo =
|
2013-08-07 14:18:59 +02:00
|
|
|
- nsGNOMERegistry::GetFromExtension(aFileExt);
|
|
|
|
+ nsCommonRegistry::GetFromExtension(aFileExt);
|
2011-06-01 08:05:09 +02:00
|
|
|
if (gnomeInfo) {
|
|
|
|
LOG(("Got MIMEInfo from GNOME registry\n"));
|
2013-08-07 14:18:59 +02:00
|
|
|
return gnomeInfo.forget();
|
2011-06-01 08:05:09 +02:00
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
rv = LookUpTypeAndDescription(NS_ConvertUTF8toUTF16(aFileExt),
|
|
|
|
majorType,
|
2018-01-23 10:55:12 +01:00
|
|
|
@@ -1364,17 +1364,17 @@ nsOSHelperAppService::GetFromType(const
|
2015-05-10 22:12:38 +02:00
|
|
|
nsAutoString extensions, mime_types_description;
|
|
|
|
LookUpExtensionsAndDescription(majorType,
|
|
|
|
minorType,
|
|
|
|
extensions,
|
|
|
|
mime_types_description);
|
|
|
|
|
2013-09-16 09:57:05 +02:00
|
|
|
#ifdef MOZ_WIDGET_GTK
|
2011-06-01 08:05:09 +02:00
|
|
|
if (handler.IsEmpty()) {
|
2016-01-26 23:39:03 +01:00
|
|
|
- RefPtr<nsMIMEInfoBase> gnomeInfo = nsGNOMERegistry::GetFromType(aMIMEType);
|
|
|
|
+ RefPtr<nsMIMEInfoBase> gnomeInfo = nsCommonRegistry::GetFromType(aMIMEType);
|
2015-05-10 22:12:38 +02:00
|
|
|
if (gnomeInfo) {
|
|
|
|
LOG(("Got MIMEInfo from GNOME registry without extensions; setting them "
|
|
|
|
"to %s\n", NS_LossyConvertUTF16toASCII(extensions).get()));
|
|
|
|
|
|
|
|
NS_ASSERTION(!gnomeInfo->HasExtensions(), "How'd that happen?");
|
|
|
|
gnomeInfo->SetFileExtensions(NS_ConvertUTF16toUTF8(extensions));
|
2013-08-07 14:18:59 +02:00
|
|
|
return gnomeInfo.forget();
|
2011-06-01 08:05:09 +02:00
|
|
|
}
|
2014-12-02 23:01:52 +01:00
|
|
|
diff --git a/widget/gtk/moz.build b/widget/gtk/moz.build
|
|
|
|
--- a/widget/gtk/moz.build
|
|
|
|
+++ b/widget/gtk/moz.build
|
2018-03-13 20:46:06 +01:00
|
|
|
@@ -121,16 +121,17 @@ else:
|
2015-02-23 21:32:13 +01:00
|
|
|
include('/ipc/chromium/chromium-config.mozbuild')
|
|
|
|
|
2014-12-02 23:01:52 +01:00
|
|
|
FINAL_LIBRARY = 'xul'
|
|
|
|
|
|
|
|
LOCAL_INCLUDES += [
|
|
|
|
'/layout/generic',
|
|
|
|
'/layout/xul',
|
|
|
|
'/other-licenses/atk-1.0',
|
2015-02-23 21:32:13 +01:00
|
|
|
+ '/toolkit/xre',
|
|
|
|
'/widget',
|
2017-09-05 12:10:37 +02:00
|
|
|
'/widget/headless',
|
2014-12-02 23:01:52 +01:00
|
|
|
]
|
|
|
|
|
|
|
|
if CONFIG['MOZ_X11']:
|
|
|
|
LOCAL_INCLUDES += [
|
2015-02-23 21:32:13 +01:00
|
|
|
'/widget/x11',
|
2014-12-02 23:01:52 +01:00
|
|
|
]
|
2014-02-03 16:34:42 +01:00
|
|
|
diff --git a/widget/gtk/nsFilePicker.cpp b/widget/gtk/nsFilePicker.cpp
|
|
|
|
--- a/widget/gtk/nsFilePicker.cpp
|
|
|
|
+++ b/widget/gtk/nsFilePicker.cpp
|
2015-04-01 07:22:19 +02:00
|
|
|
@@ -4,32 +4,34 @@
|
2012-08-28 20:40:50 +02:00
|
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
2011-06-01 08:05:09 +02:00
|
|
|
|
2014-03-18 20:44:32 +01:00
|
|
|
#include "mozilla/Types.h"
|
2015-04-01 07:22:19 +02:00
|
|
|
#include <sys/types.h>
|
|
|
|
#include <sys/stat.h>
|
|
|
|
#include <unistd.h>
|
2012-02-01 14:37:15 +01:00
|
|
|
|
2011-06-01 08:05:09 +02:00
|
|
|
#include <gtk/gtk.h>
|
|
|
|
+#include <gdk/gdkx.h>
|
|
|
|
|
2013-10-30 15:45:02 +01:00
|
|
|
#include "nsGtkUtils.h"
|
2011-06-01 08:05:09 +02:00
|
|
|
#include "nsIFileURL.h"
|
|
|
|
#include "nsIURI.h"
|
|
|
|
#include "nsIWidget.h"
|
2012-10-09 13:14:08 +02:00
|
|
|
#include "nsIFile.h"
|
2011-06-01 08:05:09 +02:00
|
|
|
#include "nsIStringBundle.h"
|
|
|
|
|
|
|
|
#include "nsArrayEnumerator.h"
|
2013-02-19 20:24:59 +01:00
|
|
|
#include "nsMemory.h"
|
|
|
|
#include "nsEnumeratorUtils.h"
|
2011-11-09 13:04:11 +01:00
|
|
|
#include "nsNetUtil.h"
|
2011-06-01 08:05:09 +02:00
|
|
|
#include "nsReadableUtils.h"
|
|
|
|
#include "mozcontainer.h"
|
|
|
|
|
|
|
|
#include "nsFilePicker.h"
|
|
|
|
+#include "nsKDEUtils.h"
|
|
|
|
|
2012-02-01 14:37:15 +01:00
|
|
|
using namespace mozilla;
|
2011-06-01 08:05:09 +02:00
|
|
|
|
2012-02-01 14:37:15 +01:00
|
|
|
#define MAX_PREVIEW_SIZE 180
|
2015-09-22 08:10:40 +02:00
|
|
|
// bug 1184009
|
|
|
|
#define MAX_PREVIEW_SOURCE_SIZE 4096
|
2013-12-11 09:31:54 +01:00
|
|
|
|
|
|
|
nsIFile *nsFilePicker::mPrevDisplayDirectory = nullptr;
|
2015-09-22 08:10:40 +02:00
|
|
|
@@ -246,17 +248,19 @@ nsFilePicker::AppendFilters(int32_t aFil
|
2011-06-01 08:05:09 +02:00
|
|
|
return nsBaseFilePicker::AppendFilters(aFilterMask);
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
nsFilePicker::AppendFilter(const nsAString& aTitle, const nsAString& aFilter)
|
|
|
|
{
|
|
|
|
if (aFilter.EqualsLiteral("..apps")) {
|
|
|
|
// No platform specific thing we can do here, really....
|
|
|
|
- return NS_OK;
|
|
|
|
+ // Unless it's KDE.
|
|
|
|
+ if( mMode != modeOpen || !nsKDEUtils::kdeSupport())
|
2013-01-07 21:49:28 +01:00
|
|
|
+ return NS_OK;
|
2011-06-01 08:05:09 +02:00
|
|
|
}
|
|
|
|
|
2013-01-07 21:49:28 +01:00
|
|
|
nsAutoCString filter, name;
|
2011-06-01 08:05:09 +02:00
|
|
|
CopyUTF16toUTF8(aFilter, filter);
|
|
|
|
CopyUTF16toUTF8(aTitle, name);
|
|
|
|
|
|
|
|
mFilters.AppendElement(filter);
|
|
|
|
mFilterNames.AppendElement(name);
|
2018-01-03 14:39:46 +01:00
|
|
|
@@ -371,16 +375,39 @@ nsFilePicker::Show(int16_t *aReturn)
|
2011-06-01 08:05:09 +02:00
|
|
|
|
|
|
|
NS_IMETHODIMP
|
2012-11-26 12:27:34 +01:00
|
|
|
nsFilePicker::Open(nsIFilePickerShownCallback *aCallback)
|
2011-06-01 08:05:09 +02:00
|
|
|
{
|
2012-11-26 12:27:34 +01:00
|
|
|
// Can't show two dialogs concurrently with the same filepicker
|
|
|
|
if (mRunning)
|
|
|
|
return NS_ERROR_NOT_AVAILABLE;
|
2011-06-01 08:05:09 +02:00
|
|
|
|
2012-11-26 12:27:34 +01:00
|
|
|
+ // KDE file picker is not handled via callback
|
|
|
|
+ if( nsKDEUtils::kdeSupport()) {
|
|
|
|
+ mCallback = aCallback;
|
|
|
|
+ mRunning = true;
|
2018-01-03 14:39:46 +01:00
|
|
|
+ NS_ADDREF_THIS();
|
2017-10-30 07:56:57 +01:00
|
|
|
+ g_idle_add([](gpointer data) -> gboolean {
|
|
|
|
+ nsFilePicker* queuedPicker = (nsFilePicker*) data;
|
|
|
|
+ int16_t result;
|
|
|
|
+ queuedPicker->kdeFileDialog(&result);
|
|
|
|
+ if (queuedPicker->mCallback) {
|
|
|
|
+ queuedPicker->mCallback->Done(result);
|
|
|
|
+ queuedPicker->mCallback = nullptr;
|
|
|
|
+ } else {
|
|
|
|
+ queuedPicker->mResult = result;
|
|
|
|
+ }
|
|
|
|
+ queuedPicker->mRunning = false;
|
2018-01-03 14:39:46 +01:00
|
|
|
+ NS_RELEASE(queuedPicker);
|
2017-10-30 07:56:57 +01:00
|
|
|
+ return G_SOURCE_REMOVE;
|
|
|
|
+ }, this);
|
|
|
|
+
|
2012-11-26 12:27:34 +01:00
|
|
|
+ return NS_OK;
|
|
|
|
+ }
|
2012-03-01 10:09:12 +01:00
|
|
|
+
|
2017-11-15 00:17:59 +01:00
|
|
|
nsCString title;
|
2012-11-26 12:27:34 +01:00
|
|
|
title.Adopt(ToNewUTF8String(mTitle));
|
2011-06-01 08:05:09 +02:00
|
|
|
|
2013-02-19 20:24:59 +01:00
|
|
|
GtkWindow *parent_widget =
|
|
|
|
GTK_WINDOW(mParentWidget->GetNativeData(NS_NATIVE_SHELLWIDGET));
|
2011-06-01 08:05:09 +02:00
|
|
|
|
2012-11-26 12:27:34 +01:00
|
|
|
GtkFileChooserAction action = GetGtkFileChooserAction(mMode);
|
2016-11-15 19:06:29 +01:00
|
|
|
|
2018-01-03 14:39:46 +01:00
|
|
|
@@ -603,8 +630,233 @@ nsFilePicker::Done(GtkWidget* file_choos
|
2012-11-20 21:34:15 +01:00
|
|
|
if (mCallback) {
|
|
|
|
mCallback->Done(result);
|
|
|
|
mCallback = nullptr;
|
|
|
|
} else {
|
|
|
|
mResult = result;
|
|
|
|
}
|
|
|
|
NS_RELEASE_THIS();
|
2011-06-01 08:05:09 +02:00
|
|
|
}
|
|
|
|
+
|
|
|
|
+nsCString nsFilePicker::kdeMakeFilter( int index )
|
|
|
|
+ {
|
|
|
|
+ nsCString buf = mFilters[ index ];
|
|
|
|
+ for( PRUint32 i = 0;
|
|
|
|
+ i < buf.Length();
|
|
|
|
+ ++i )
|
|
|
|
+ if( buf[ i ] == ';' ) // KDE separates just using spaces
|
|
|
|
+ buf.SetCharAt( ' ', i );
|
|
|
|
+ if (!mFilterNames[index].IsEmpty())
|
|
|
|
+ {
|
|
|
|
+ buf += "|";
|
|
|
|
+ buf += mFilterNames[index].get();
|
|
|
|
+ }
|
|
|
|
+ return buf;
|
|
|
|
+ }
|
|
|
|
+
|
|
|
|
+static PRInt32 windowToXid( nsIWidget* widget )
|
|
|
|
+ {
|
2013-02-19 20:24:59 +01:00
|
|
|
+ GtkWindow *parent_widget = GTK_WINDOW(widget->GetNativeData(NS_NATIVE_SHELLWIDGET));
|
2011-06-01 08:05:09 +02:00
|
|
|
+ GdkWindow* gdk_window = gtk_widget_get_window( gtk_widget_get_toplevel( GTK_WIDGET( parent_widget )));
|
|
|
|
+ return GDK_WINDOW_XID( gdk_window );
|
|
|
|
+ }
|
|
|
|
+
|
|
|
|
+NS_IMETHODIMP nsFilePicker::kdeFileDialog(PRInt16 *aReturn)
|
|
|
|
+ {
|
|
|
|
+ NS_ENSURE_ARG_POINTER(aReturn);
|
|
|
|
+
|
|
|
|
+ if( mMode == modeOpen && mFilters.Length() == 1 && mFilters[ 0 ].EqualsLiteral( "..apps" ))
|
|
|
|
+ return kdeAppsDialog( aReturn );
|
|
|
|
+
|
2017-11-15 00:17:59 +01:00
|
|
|
+ nsCString title;
|
2011-06-01 08:05:09 +02:00
|
|
|
+ title.Adopt(ToNewUTF8String(mTitle));
|
|
|
|
+
|
|
|
|
+ const char* arg = NULL;
|
|
|
|
+ if( mAllowURLs )
|
|
|
|
+ {
|
|
|
|
+ switch( mMode )
|
|
|
|
+ {
|
|
|
|
+ case nsIFilePicker::modeOpen:
|
|
|
|
+ case nsIFilePicker::modeOpenMultiple:
|
|
|
|
+ arg = "GETOPENURL";
|
|
|
|
+ break;
|
|
|
|
+ case nsIFilePicker::modeSave:
|
|
|
|
+ arg = "GETSAVEURL";
|
|
|
|
+ break;
|
|
|
|
+ case nsIFilePicker::modeGetFolder:
|
|
|
|
+ arg = "GETDIRECTORYURL";
|
|
|
|
+ break;
|
|
|
|
+ }
|
|
|
|
+ }
|
|
|
|
+ else
|
|
|
|
+ {
|
|
|
|
+ switch( mMode )
|
|
|
|
+ {
|
|
|
|
+ case nsIFilePicker::modeOpen:
|
|
|
|
+ case nsIFilePicker::modeOpenMultiple:
|
|
|
|
+ arg = "GETOPENFILENAME";
|
|
|
|
+ break;
|
|
|
|
+ case nsIFilePicker::modeSave:
|
|
|
|
+ arg = "GETSAVEFILENAME";
|
|
|
|
+ break;
|
|
|
|
+ case nsIFilePicker::modeGetFolder:
|
|
|
|
+ arg = "GETDIRECTORYFILENAME";
|
|
|
|
+ break;
|
|
|
|
+ }
|
|
|
|
+ }
|
|
|
|
+
|
2013-01-07 21:49:28 +01:00
|
|
|
+ nsAutoCString directory;
|
2011-06-01 08:05:09 +02:00
|
|
|
+ if (mDisplayDirectory) {
|
|
|
|
+ mDisplayDirectory->GetNativePath(directory);
|
|
|
|
+ } else if (mPrevDisplayDirectory) {
|
|
|
|
+ mPrevDisplayDirectory->GetNativePath(directory);
|
|
|
|
+ }
|
|
|
|
+
|
2013-01-07 21:49:28 +01:00
|
|
|
+ nsAutoCString startdir;
|
2011-06-01 08:05:09 +02:00
|
|
|
+ if (!directory.IsEmpty()) {
|
|
|
|
+ startdir = directory;
|
|
|
|
+ }
|
|
|
|
+ if (mMode == nsIFilePicker::modeSave) {
|
|
|
|
+ if( !startdir.IsEmpty())
|
|
|
|
+ {
|
|
|
|
+ startdir += "/";
|
|
|
|
+ startdir += ToNewUTF8String(mDefault);
|
|
|
|
+ }
|
|
|
|
+ else
|
|
|
|
+ startdir = ToNewUTF8String(mDefault);
|
|
|
|
+ }
|
|
|
|
+
|
2013-01-07 21:49:28 +01:00
|
|
|
+ nsAutoCString filters;
|
2011-06-01 08:05:09 +02:00
|
|
|
+ PRInt32 count = mFilters.Length();
|
|
|
|
+ if( count == 0 ) //just in case
|
|
|
|
+ filters = "*";
|
|
|
|
+ else
|
|
|
|
+ {
|
|
|
|
+ filters = kdeMakeFilter( 0 );
|
|
|
|
+ for (PRInt32 i = 1; i < count; ++i)
|
|
|
|
+ {
|
|
|
|
+ filters += "\n";
|
|
|
|
+ filters += kdeMakeFilter( i );
|
|
|
|
+ }
|
|
|
|
+ }
|
|
|
|
+
|
2012-02-01 14:37:15 +01:00
|
|
|
+ nsTArray<nsCString> command;
|
2013-01-07 21:49:28 +01:00
|
|
|
+ command.AppendElement( nsAutoCString( arg ));
|
2012-02-01 14:37:15 +01:00
|
|
|
+ command.AppendElement( startdir );
|
2011-06-01 08:05:09 +02:00
|
|
|
+ if( mMode != nsIFilePicker::modeGetFolder )
|
|
|
|
+ {
|
2012-02-01 14:37:15 +01:00
|
|
|
+ command.AppendElement( filters );
|
2013-01-07 21:49:28 +01:00
|
|
|
+ nsAutoCString selected;
|
2011-06-01 08:05:09 +02:00
|
|
|
+ selected.AppendInt( mSelectedType );
|
2012-02-01 14:37:15 +01:00
|
|
|
+ command.AppendElement( selected );
|
2011-06-01 08:05:09 +02:00
|
|
|
+ }
|
2012-02-01 14:37:15 +01:00
|
|
|
+ command.AppendElement( title );
|
2011-06-01 08:05:09 +02:00
|
|
|
+ if( mMode == nsIFilePicker::modeOpenMultiple )
|
2012-02-01 14:37:15 +01:00
|
|
|
+ command.AppendElement( NS_LITERAL_CSTRING( "MULTIPLE" ));
|
2011-06-01 08:05:09 +02:00
|
|
|
+ if( PRInt32 xid = windowToXid( mParentWidget ))
|
|
|
|
+ {
|
2012-02-01 14:37:15 +01:00
|
|
|
+ command.AppendElement( NS_LITERAL_CSTRING( "PARENT" ));
|
2013-01-07 21:49:28 +01:00
|
|
|
+ nsAutoCString parent;
|
2011-06-01 08:05:09 +02:00
|
|
|
+ parent.AppendInt( xid );
|
2012-02-01 14:37:15 +01:00
|
|
|
+ command.AppendElement( parent );
|
2011-06-01 08:05:09 +02:00
|
|
|
+ }
|
|
|
|
+
|
2012-02-01 14:37:15 +01:00
|
|
|
+ nsTArray<nsCString> output;
|
2013-02-19 20:24:59 +01:00
|
|
|
+ if( nsKDEUtils::commandBlockUi( command, GTK_WINDOW(mParentWidget->GetNativeData(NS_NATIVE_SHELLWIDGET)), &output ))
|
2011-06-01 08:05:09 +02:00
|
|
|
+ {
|
|
|
|
+ *aReturn = nsIFilePicker::returnOK;
|
|
|
|
+ mFiles.Clear();
|
|
|
|
+ if( mMode != nsIFilePicker::modeGetFolder )
|
|
|
|
+ {
|
2012-02-01 14:37:15 +01:00
|
|
|
+ mSelectedType = atoi( output[ 0 ].get());
|
|
|
|
+ output.RemoveElementAt( 0 );
|
2011-06-01 08:05:09 +02:00
|
|
|
+ }
|
|
|
|
+ if (mMode == nsIFilePicker::modeOpenMultiple)
|
|
|
|
+ {
|
|
|
|
+ mFileURL.Truncate();
|
2012-02-01 14:37:15 +01:00
|
|
|
+ PRUint32 count = output.Length();
|
2011-06-01 08:05:09 +02:00
|
|
|
+ for( PRUint32 i = 0;
|
|
|
|
+ i < count;
|
|
|
|
+ ++i )
|
|
|
|
+ {
|
2012-10-09 13:14:08 +02:00
|
|
|
+ nsCOMPtr<nsIFile> localfile;
|
2012-02-01 14:37:15 +01:00
|
|
|
+ nsresult rv = NS_NewNativeLocalFile( output[ i ],
|
2011-06-01 08:05:09 +02:00
|
|
|
+ PR_FALSE,
|
|
|
|
+ getter_AddRefs(localfile));
|
|
|
|
+ if (NS_SUCCEEDED(rv))
|
|
|
|
+ mFiles.AppendObject(localfile);
|
|
|
|
+ }
|
|
|
|
+ }
|
|
|
|
+ else
|
|
|
|
+ {
|
2012-02-01 14:37:15 +01:00
|
|
|
+ if( output.Length() == 0 )
|
2011-06-01 08:05:09 +02:00
|
|
|
+ mFileURL = nsCString();
|
|
|
|
+ else if( mAllowURLs )
|
2012-02-01 14:37:15 +01:00
|
|
|
+ mFileURL = output[ 0 ];
|
2011-06-01 08:05:09 +02:00
|
|
|
+ else // GetFile() actually requires it to be url even for local files :-/
|
|
|
|
+ {
|
|
|
|
+ mFileURL = nsCString( "file://" );
|
2012-02-01 14:37:15 +01:00
|
|
|
+ mFileURL.Append( output[ 0 ] );
|
2011-06-01 08:05:09 +02:00
|
|
|
+ }
|
|
|
|
+ }
|
|
|
|
+ // Remember last used directory.
|
2012-10-09 13:14:08 +02:00
|
|
|
+ nsCOMPtr<nsIFile> file;
|
2011-06-01 08:05:09 +02:00
|
|
|
+ GetFile(getter_AddRefs(file));
|
|
|
|
+ if (file) {
|
|
|
|
+ nsCOMPtr<nsIFile> dir;
|
|
|
|
+ file->GetParent(getter_AddRefs(dir));
|
2012-10-09 13:14:08 +02:00
|
|
|
+ nsCOMPtr<nsIFile> localDir(do_QueryInterface(dir));
|
2011-06-01 08:05:09 +02:00
|
|
|
+ if (localDir) {
|
|
|
|
+ localDir.swap(mPrevDisplayDirectory);
|
|
|
|
+ }
|
|
|
|
+ }
|
|
|
|
+ if (mMode == nsIFilePicker::modeSave)
|
|
|
|
+ {
|
2012-10-09 13:14:08 +02:00
|
|
|
+ nsCOMPtr<nsIFile> file;
|
2011-06-01 08:05:09 +02:00
|
|
|
+ GetFile(getter_AddRefs(file));
|
|
|
|
+ if (file)
|
|
|
|
+ {
|
2012-02-01 14:37:15 +01:00
|
|
|
+ bool exists = false;
|
2011-06-01 08:05:09 +02:00
|
|
|
+ file->Exists(&exists);
|
|
|
|
+ if (exists) // TODO do overwrite check in the helper app
|
|
|
|
+ *aReturn = nsIFilePicker::returnReplace;
|
|
|
|
+ }
|
|
|
|
+ }
|
|
|
|
+ }
|
|
|
|
+ else
|
|
|
|
+ {
|
|
|
|
+ *aReturn = nsIFilePicker::returnCancel;
|
|
|
|
+ }
|
|
|
|
+ return NS_OK;
|
|
|
|
+ }
|
|
|
|
+
|
|
|
|
+
|
|
|
|
+NS_IMETHODIMP nsFilePicker::kdeAppsDialog(PRInt16 *aReturn)
|
|
|
|
+ {
|
|
|
|
+ NS_ENSURE_ARG_POINTER(aReturn);
|
|
|
|
+
|
2017-11-15 00:17:59 +01:00
|
|
|
+ nsCString title;
|
2011-06-01 08:05:09 +02:00
|
|
|
+ title.Adopt(ToNewUTF8String(mTitle));
|
|
|
|
+
|
2012-02-01 14:37:15 +01:00
|
|
|
+ nsTArray<nsCString> command;
|
|
|
|
+ command.AppendElement( NS_LITERAL_CSTRING( "APPSDIALOG" ));
|
|
|
|
+ command.AppendElement( title );
|
2011-06-01 08:05:09 +02:00
|
|
|
+ if( PRInt32 xid = windowToXid( mParentWidget ))
|
|
|
|
+ {
|
2012-02-01 14:37:15 +01:00
|
|
|
+ command.AppendElement( NS_LITERAL_CSTRING( "PARENT" ));
|
2013-01-07 21:49:28 +01:00
|
|
|
+ nsAutoCString parent;
|
2011-06-01 08:05:09 +02:00
|
|
|
+ parent.AppendInt( xid );
|
2012-02-01 14:37:15 +01:00
|
|
|
+ command.AppendElement( parent );
|
2011-06-01 08:05:09 +02:00
|
|
|
+ }
|
|
|
|
+
|
2012-02-01 14:37:15 +01:00
|
|
|
+ nsTArray<nsCString> output;
|
2013-02-19 20:24:59 +01:00
|
|
|
+ if( nsKDEUtils::commandBlockUi( command, GTK_WINDOW(mParentWidget->GetNativeData(NS_NATIVE_SHELLWIDGET)), &output ))
|
2011-06-01 08:05:09 +02:00
|
|
|
+ {
|
|
|
|
+ *aReturn = nsIFilePicker::returnOK;
|
2012-02-01 14:37:15 +01:00
|
|
|
+ mFileURL = output.Length() > 0 ? output[ 0 ] : nsCString();
|
2011-06-01 08:05:09 +02:00
|
|
|
+ }
|
|
|
|
+ else
|
|
|
|
+ {
|
|
|
|
+ *aReturn = nsIFilePicker::returnCancel;
|
|
|
|
+ }
|
|
|
|
+ return NS_OK;
|
|
|
|
+ }
|
2012-11-20 21:34:15 +01:00
|
|
|
+
|
2014-02-03 16:34:42 +01:00
|
|
|
diff --git a/widget/gtk/nsFilePicker.h b/widget/gtk/nsFilePicker.h
|
|
|
|
--- a/widget/gtk/nsFilePicker.h
|
|
|
|
+++ b/widget/gtk/nsFilePicker.h
|
2015-09-22 08:10:40 +02:00
|
|
|
@@ -69,14 +69,20 @@ protected:
|
2011-06-01 08:05:09 +02:00
|
|
|
nsString mDefaultExtension;
|
|
|
|
|
|
|
|
nsTArray<nsCString> mFilters;
|
|
|
|
nsTArray<nsCString> mFilterNames;
|
|
|
|
|
|
|
|
private:
|
2012-10-09 13:14:08 +02:00
|
|
|
static nsIFile *mPrevDisplayDirectory;
|
2015-09-22 08:10:40 +02:00
|
|
|
|
2011-06-01 08:05:09 +02:00
|
|
|
+ bool kdeRunning();
|
|
|
|
+ bool getKdeRunning();
|
|
|
|
+ NS_IMETHODIMP kdeFileDialog(PRInt16 *aReturn);
|
|
|
|
+ NS_IMETHODIMP kdeAppsDialog(PRInt16 *aReturn);
|
|
|
|
+ nsCString kdeMakeFilter( int index );
|
2015-09-22 08:10:40 +02:00
|
|
|
+
|
2018-03-13 20:46:06 +01:00
|
|
|
#ifdef MOZ_WIDGET_GTK
|
2015-09-22 08:10:40 +02:00
|
|
|
GtkFileChooserWidget *mFileChooserDelegate;
|
|
|
|
#endif
|
2011-06-01 08:05:09 +02:00
|
|
|
};
|
|
|
|
|
|
|
|
#endif
|
|
|
|
diff --git a/xpcom/components/ManifestParser.cpp b/xpcom/components/ManifestParser.cpp
|
|
|
|
--- a/xpcom/components/ManifestParser.cpp
|
|
|
|
+++ b/xpcom/components/ManifestParser.cpp
|
2017-09-05 12:10:37 +02:00
|
|
|
@@ -33,16 +33,17 @@
|
- update to Firefox 51.0
* requires NSPR >= 4.13.1, NSS >= 3.28.1
* Added support for FLAC (Free Lossless Audio Codec) playback
* Added support for WebGL 2
* Added Georgian (ka) and Kabyle (kab) locales
* Support saving passwords for forms without 'submit' events
* Improved video performance for users without GPU acceleration
* Zoom indicator is shown in the URL bar if the zoom level is not
at default level
* View passwords from the prompt before saving them
* Remove Belarusian (be) locale
* Use Skia for content rendering (Linux)
* MFSA 2017-01
CVE-2017-5375: Excessive JIT code allocation allows bypass of
ASLR and DEP (bmo#1325200, boo#1021814)
CVE-2017-5376: Use-after-free in XSL (bmo#1311687, boo#1021817)
CVE-2017-5377: Memory corruption with transforms to create
gradients in Skia (bmo#1306883, boo#1021826)
CVE-2017-5378: Pointer and frame data leakage of Javascript objects
(bmo#1312001, bmo#1330769, boo#1021818)
CVE-2017-5379: Use-after-free in Web Animations
(bmo#1309198,boo#1021827)
CVE-2017-5380: Potential use-after-free during DOM manipulations
(bmo#1322107, boo#1021819)
CVE-2017-5390: Insecure communication methods in Developer Tools
JSON viewer (bmo#1297361, boo#1021820)
CVE-2017-5389: WebExtensions can install additional add-ons via
modified host requests (bmo#1308688, boo#1021828)
CVE-2017-5396: Use-after-free with Media Decoder
(bmo#1329403, boo#1021821)
OBS-URL: https://build.opensuse.org/package/show/mozilla:Factory/MozillaFirefox?expand=0&rev=567
2017-01-25 11:27:08 +01:00
|
|
|
#include "nsTextFormatter.h"
|
|
|
|
#include "nsVersionComparator.h"
|
|
|
|
#include "nsXPCOMCIDInternal.h"
|
2012-06-05 20:01:53 +02:00
|
|
|
|
|
|
|
#include "nsIConsoleService.h"
|
|
|
|
#include "nsIScriptError.h"
|
|
|
|
#include "nsIXULAppInfo.h"
|
|
|
|
#include "nsIXULRuntime.h"
|
|
|
|
+#include "nsKDEUtils.h"
|
|
|
|
|
- update to Firefox 51.0
* requires NSPR >= 4.13.1, NSS >= 3.28.1
* Added support for FLAC (Free Lossless Audio Codec) playback
* Added support for WebGL 2
* Added Georgian (ka) and Kabyle (kab) locales
* Support saving passwords for forms without 'submit' events
* Improved video performance for users without GPU acceleration
* Zoom indicator is shown in the URL bar if the zoom level is not
at default level
* View passwords from the prompt before saving them
* Remove Belarusian (be) locale
* Use Skia for content rendering (Linux)
* MFSA 2017-01
CVE-2017-5375: Excessive JIT code allocation allows bypass of
ASLR and DEP (bmo#1325200, boo#1021814)
CVE-2017-5376: Use-after-free in XSL (bmo#1311687, boo#1021817)
CVE-2017-5377: Memory corruption with transforms to create
gradients in Skia (bmo#1306883, boo#1021826)
CVE-2017-5378: Pointer and frame data leakage of Javascript objects
(bmo#1312001, bmo#1330769, boo#1021818)
CVE-2017-5379: Use-after-free in Web Animations
(bmo#1309198,boo#1021827)
CVE-2017-5380: Potential use-after-free during DOM manipulations
(bmo#1322107, boo#1021819)
CVE-2017-5390: Insecure communication methods in Developer Tools
JSON viewer (bmo#1297361, boo#1021820)
CVE-2017-5389: WebExtensions can install additional add-ons via
modified host requests (bmo#1308688, boo#1021828)
CVE-2017-5396: Use-after-free with Media Decoder
(bmo#1329403, boo#1021821)
OBS-URL: https://build.opensuse.org/package/show/mozilla:Factory/MozillaFirefox?expand=0&rev=567
2017-01-25 11:27:08 +01:00
|
|
|
using namespace mozilla;
|
|
|
|
|
|
|
|
struct ManifestDirective
|
|
|
|
{
|
|
|
|
const char* directive;
|
|
|
|
int argc;
|
|
|
|
|
2017-09-05 12:10:37 +02:00
|
|
|
@@ -466,16 +467,17 @@ ParseManifest(NSLocationType aType, File
|
2015-05-10 22:12:38 +02:00
|
|
|
NS_NAMED_LITERAL_STRING(kRemoteEnabled, "remoteenabled");
|
|
|
|
NS_NAMED_LITERAL_STRING(kRemoteRequired, "remoterequired");
|
2012-06-05 20:01:53 +02:00
|
|
|
NS_NAMED_LITERAL_STRING(kApplication, "application");
|
|
|
|
NS_NAMED_LITERAL_STRING(kAppVersion, "appversion");
|
|
|
|
NS_NAMED_LITERAL_STRING(kGeckoVersion, "platformversion");
|
|
|
|
NS_NAMED_LITERAL_STRING(kOs, "os");
|
|
|
|
NS_NAMED_LITERAL_STRING(kOsVersion, "osversion");
|
|
|
|
NS_NAMED_LITERAL_STRING(kABI, "abi");
|
|
|
|
+ NS_NAMED_LITERAL_STRING(kDesktop, "desktop");
|
2015-01-14 19:32:16 +01:00
|
|
|
NS_NAMED_LITERAL_STRING(kProcess, "process");
|
2012-06-05 20:01:53 +02:00
|
|
|
#if defined(MOZ_WIDGET_ANDROID)
|
|
|
|
NS_NAMED_LITERAL_STRING(kTablet, "tablet");
|
|
|
|
#endif
|
|
|
|
|
2015-01-14 19:32:16 +01:00
|
|
|
NS_NAMED_LITERAL_STRING(kMain, "main");
|
|
|
|
NS_NAMED_LITERAL_STRING(kContent, "content");
|
2012-06-05 20:01:53 +02:00
|
|
|
|
2017-09-05 12:10:37 +02:00
|
|
|
@@ -526,44 +528,49 @@ ParseManifest(NSLocationType aType, File
|
2012-06-05 20:01:53 +02:00
|
|
|
CopyUTF8toUTF16(s, abi);
|
2014-04-27 18:09:32 +02:00
|
|
|
abi.Insert(char16_t('_'), 0);
|
2012-06-05 20:01:53 +02:00
|
|
|
abi.Insert(osTarget, 0);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
nsAutoString osVersion;
|
|
|
|
+ nsAutoString desktop;
|
|
|
|
#if defined(XP_WIN)
|
2014-04-27 18:09:32 +02:00
|
|
|
#pragma warning(push)
|
|
|
|
#pragma warning(disable:4996) // VC12+ deprecates GetVersionEx
|
2012-06-05 20:01:53 +02:00
|
|
|
OSVERSIONINFO info = { sizeof(OSVERSIONINFO) };
|
|
|
|
if (GetVersionEx(&info)) {
|
2016-11-15 19:06:29 +01:00
|
|
|
nsTextFormatter::ssprintf(osVersion, u"%ld.%ld",
|
2014-12-02 23:01:52 +01:00
|
|
|
info.dwMajorVersion,
|
|
|
|
info.dwMinorVersion);
|
2012-06-05 20:01:53 +02:00
|
|
|
}
|
|
|
|
+ desktop = NS_LITERAL_STRING("win");
|
2014-04-27 18:09:32 +02:00
|
|
|
#pragma warning(pop)
|
2012-06-05 20:01:53 +02:00
|
|
|
#elif defined(MOZ_WIDGET_COCOA)
|
2014-04-27 18:09:32 +02:00
|
|
|
SInt32 majorVersion = nsCocoaFeatures::OSXVersionMajor();
|
|
|
|
SInt32 minorVersion = nsCocoaFeatures::OSXVersionMinor();
|
2016-11-15 19:06:29 +01:00
|
|
|
nsTextFormatter::ssprintf(osVersion, u"%ld.%ld",
|
2014-12-02 23:01:52 +01:00
|
|
|
majorVersion,
|
|
|
|
minorVersion);
|
2012-06-05 20:01:53 +02:00
|
|
|
+ desktop = NS_LITERAL_STRING("macosx");
|
2013-09-16 09:57:05 +02:00
|
|
|
#elif defined(MOZ_WIDGET_GTK)
|
2016-11-15 19:06:29 +01:00
|
|
|
nsTextFormatter::ssprintf(osVersion, u"%ld.%ld",
|
2014-12-02 23:01:52 +01:00
|
|
|
gtk_major_version,
|
|
|
|
gtk_minor_version);
|
2012-06-05 20:01:53 +02:00
|
|
|
+ desktop = nsKDEUtils::kdeSession() ? NS_LITERAL_STRING("kde") : NS_LITERAL_STRING("gnome");
|
|
|
|
#elif defined(MOZ_WIDGET_ANDROID)
|
|
|
|
bool isTablet = false;
|
|
|
|
if (mozilla::AndroidBridge::Bridge()) {
|
2014-12-02 23:01:52 +01:00
|
|
|
mozilla::AndroidBridge::Bridge()->GetStaticStringField("android/os/Build$VERSION",
|
|
|
|
"RELEASE",
|
|
|
|
osVersion);
|
2016-11-15 19:06:29 +01:00
|
|
|
isTablet = java::GeckoAppShell::IsTablet();
|
2012-06-05 20:01:53 +02:00
|
|
|
}
|
|
|
|
+ desktop = NS_LITERAL_STRING("android");
|
|
|
|
#endif
|
|
|
|
|
2015-11-03 16:49:03 +01:00
|
|
|
if (XRE_IsContentProcess()) {
|
2015-01-14 19:32:16 +01:00
|
|
|
process = kContent;
|
|
|
|
} else {
|
|
|
|
process = kMain;
|
|
|
|
}
|
2012-06-05 20:01:53 +02:00
|
|
|
|
2017-09-05 12:10:37 +02:00
|
|
|
@@ -666,25 +673,27 @@ ParseManifest(NSLocationType aType, File
|
2015-05-10 22:12:38 +02:00
|
|
|
TriState stOsVersion = eUnspecified;
|
2012-06-05 20:01:53 +02:00
|
|
|
TriState stOs = eUnspecified;
|
|
|
|
TriState stABI = eUnspecified;
|
2015-01-14 19:32:16 +01:00
|
|
|
TriState stProcess = eUnspecified;
|
2012-06-05 20:01:53 +02:00
|
|
|
#if defined(MOZ_WIDGET_ANDROID)
|
|
|
|
TriState stTablet = eUnspecified;
|
|
|
|
#endif
|
2015-05-10 22:12:38 +02:00
|
|
|
int flags = 0;
|
2012-06-05 20:01:53 +02:00
|
|
|
+ TriState stDesktop = eUnspecified;
|
|
|
|
|
2014-12-02 23:01:52 +01:00
|
|
|
while ((token = nsCRT::strtok(whitespace, kWhitespace, &whitespace)) &&
|
|
|
|
ok) {
|
2012-06-05 20:01:53 +02:00
|
|
|
ToLowerCase(token);
|
|
|
|
NS_ConvertASCIItoUTF16 wtoken(token);
|
|
|
|
|
|
|
|
if (CheckStringFlag(kApplication, wtoken, appID, stApp) ||
|
2017-09-05 12:10:37 +02:00
|
|
|
CheckOsFlag(kOs, wtoken, osTarget, stOs) ||
|
2012-06-05 20:01:53 +02:00
|
|
|
CheckStringFlag(kABI, wtoken, abi, stABI) ||
|
|
|
|
+ CheckStringFlag(kDesktop, wtoken, desktop, stDesktop) ||
|
2015-01-14 19:32:16 +01:00
|
|
|
CheckStringFlag(kProcess, wtoken, process, stProcess) ||
|
2012-06-05 20:01:53 +02:00
|
|
|
CheckVersionFlag(kOsVersion, wtoken, osVersion, stOsVersion) ||
|
|
|
|
CheckVersionFlag(kAppVersion, wtoken, appVersion, stAppVersion) ||
|
2014-12-02 23:01:52 +01:00
|
|
|
CheckVersionFlag(kGeckoVersion, wtoken, geckoVersion, stGeckoVersion)) {
|
2012-06-05 20:01:53 +02:00
|
|
|
continue;
|
2014-12-02 23:01:52 +01:00
|
|
|
}
|
2012-06-05 20:01:53 +02:00
|
|
|
|
|
|
|
#if defined(MOZ_WIDGET_ANDROID)
|
2017-09-05 12:10:37 +02:00
|
|
|
@@ -729,16 +738,17 @@ ParseManifest(NSLocationType aType, File
|
2012-06-05 20:01:53 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
if (!ok ||
|
|
|
|
stApp == eBad ||
|
|
|
|
stAppVersion == eBad ||
|
|
|
|
stGeckoVersion == eBad ||
|
|
|
|
stOs == eBad ||
|
|
|
|
stOsVersion == eBad ||
|
|
|
|
+ stDesktop == eBad ||
|
|
|
|
#ifdef MOZ_WIDGET_ANDROID
|
|
|
|
stTablet == eBad ||
|
|
|
|
#endif
|
2015-01-14 19:32:16 +01:00
|
|
|
stABI == eBad ||
|
|
|
|
stProcess == eBad) {
|
2012-06-05 20:01:53 +02:00
|
|
|
continue;
|
2014-12-02 23:01:52 +01:00
|
|
|
}
|
2012-06-05 20:01:53 +02:00
|
|
|
|
2014-12-02 23:01:52 +01:00
|
|
|
diff --git a/xpcom/components/moz.build b/xpcom/components/moz.build
|
|
|
|
--- a/xpcom/components/moz.build
|
|
|
|
+++ b/xpcom/components/moz.build
|
2016-09-20 18:19:47 +02:00
|
|
|
@@ -44,12 +44,13 @@ FINAL_LIBRARY = 'xul'
|
2014-12-02 23:01:52 +01:00
|
|
|
LOCAL_INCLUDES += [
|
2016-03-07 17:25:29 +01:00
|
|
|
'!..',
|
2014-12-02 23:01:52 +01:00
|
|
|
'../base',
|
|
|
|
'../build',
|
|
|
|
'../ds',
|
|
|
|
'../reflect/xptinfo',
|
|
|
|
'/chrome',
|
|
|
|
'/modules/libjar',
|
|
|
|
+ '/toolkit/xre'
|
|
|
|
]
|
|
|
|
|
2016-08-03 00:00:28 +02:00
|
|
|
if 'gtk' in CONFIG['MOZ_WIDGET_TOOLKIT']:
|
2014-12-02 23:01:52 +01:00
|
|
|
CXXFLAGS += CONFIG['TK_CFLAGS']
|
2011-06-01 08:05:09 +02:00
|
|
|
diff --git a/xpcom/io/nsLocalFileUnix.cpp b/xpcom/io/nsLocalFileUnix.cpp
|
|
|
|
--- a/xpcom/io/nsLocalFileUnix.cpp
|
|
|
|
+++ b/xpcom/io/nsLocalFileUnix.cpp
|
2017-11-15 00:17:59 +01:00
|
|
|
@@ -45,16 +45,17 @@
|
2015-05-10 22:12:38 +02:00
|
|
|
#include "prproces.h"
|
2011-06-01 08:05:09 +02:00
|
|
|
#include "nsIDirectoryEnumerator.h"
|
|
|
|
#include "nsISimpleEnumerator.h"
|
2012-02-01 14:37:15 +01:00
|
|
|
#include "private/pprio.h"
|
2014-02-03 16:34:42 +01:00
|
|
|
#include "prlink.h"
|
2011-06-01 08:05:09 +02:00
|
|
|
|
2012-10-09 13:14:08 +02:00
|
|
|
#ifdef MOZ_WIDGET_GTK
|
2011-06-01 08:05:09 +02:00
|
|
|
#include "nsIGIOService.h"
|
|
|
|
+#include "nsKDEUtils.h"
|
|
|
|
#endif
|
|
|
|
|
2012-02-01 14:37:15 +01:00
|
|
|
#ifdef MOZ_WIDGET_COCOA
|
2011-06-01 08:05:09 +02:00
|
|
|
#include <Carbon/Carbon.h>
|
|
|
|
#include "CocoaFileUtils.h"
|
|
|
|
#include "prmem.h"
|
|
|
|
#include "plbase64.h"
|
|
|
|
|
2018-03-13 20:46:06 +01:00
|
|
|
@@ -1934,59 +1935,74 @@ nsLocalFile::SetPersistentDescriptor(con
|
2014-09-22 18:35:40 +02:00
|
|
|
return InitWithNativePath(aPersistentDescriptor);
|
2011-06-01 08:05:09 +02:00
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
nsLocalFile::Reveal()
|
|
|
|
{
|
2012-10-09 13:14:08 +02:00
|
|
|
#ifdef MOZ_WIDGET_GTK
|
2014-09-22 18:35:40 +02:00
|
|
|
- nsCOMPtr<nsIGIOService> giovfs = do_GetService(NS_GIOSERVICE_CONTRACTID);
|
2015-05-10 22:12:38 +02:00
|
|
|
- if (!giovfs) {
|
2014-09-22 18:35:40 +02:00
|
|
|
- return NS_ERROR_FAILURE;
|
|
|
|
- }
|
|
|
|
+ nsAutoCString url;
|
2015-05-10 22:12:38 +02:00
|
|
|
|
2014-09-22 18:35:40 +02:00
|
|
|
bool isDirectory;
|
|
|
|
if (NS_FAILED(IsDirectory(&isDirectory))) {
|
|
|
|
return NS_ERROR_FAILURE;
|
|
|
|
}
|
|
|
|
|
|
|
|
+ nsCOMPtr<nsIGIOService> giovfs = do_GetService(NS_GIOSERVICE_CONTRACTID);
|
|
|
|
if (isDirectory) {
|
2015-05-10 22:12:38 +02:00
|
|
|
- return giovfs->ShowURIForInput(mPath);
|
2014-09-22 18:35:40 +02:00
|
|
|
+ url = mPath;
|
2017-09-05 12:10:37 +02:00
|
|
|
}
|
|
|
|
if (NS_SUCCEEDED(giovfs->OrgFreedesktopFileManager1ShowItems(mPath))) {
|
2014-09-22 18:35:40 +02:00
|
|
|
return NS_OK;
|
2017-09-05 12:10:37 +02:00
|
|
|
}
|
|
|
|
nsCOMPtr<nsIFile> parentDir;
|
|
|
|
nsAutoCString dirPath;
|
|
|
|
if (NS_FAILED(GetParent(getter_AddRefs(parentDir)))) {
|
|
|
|
return NS_ERROR_FAILURE;
|
|
|
|
}
|
|
|
|
if (NS_FAILED(parentDir->GetNativePath(dirPath))) {
|
|
|
|
return NS_ERROR_FAILURE;
|
|
|
|
}
|
2014-09-22 18:35:40 +02:00
|
|
|
|
2017-09-05 12:10:37 +02:00
|
|
|
- return giovfs->ShowURIForInput(dirPath);
|
|
|
|
+ url = dirPath;
|
|
|
|
#elif defined(MOZ_WIDGET_COCOA)
|
|
|
|
CFURLRef url;
|
|
|
|
if (NS_SUCCEEDED(GetCFURL(&url))) {
|
|
|
|
nsresult rv = CocoaFileUtils::RevealFileInFinder(url);
|
|
|
|
::CFRelease(url);
|
|
|
|
return rv;
|
2014-09-22 18:35:40 +02:00
|
|
|
}
|
2017-09-05 12:10:37 +02:00
|
|
|
return NS_ERROR_FAILURE;
|
|
|
|
#else
|
|
|
|
return NS_ERROR_FAILURE;
|
|
|
|
#endif
|
2014-09-22 18:35:40 +02:00
|
|
|
+ if(nsKDEUtils::kdeSupport()) {
|
|
|
|
+ nsTArray<nsCString> command;
|
|
|
|
+ command.AppendElement( NS_LITERAL_CSTRING("REVEAL") );
|
|
|
|
+ command.AppendElement( mPath );
|
|
|
|
+ return nsKDEUtils::command( command ) ? NS_OK : NS_ERROR_FAILURE;
|
|
|
|
+ }
|
2011-06-01 08:05:09 +02:00
|
|
|
+
|
2015-05-10 22:12:38 +02:00
|
|
|
+ if (!giovfs)
|
2014-09-22 18:35:40 +02:00
|
|
|
+ return NS_ERROR_FAILURE;
|
2011-06-01 08:05:09 +02:00
|
|
|
+
|
2015-05-10 22:12:38 +02:00
|
|
|
+ return giovfs->ShowURIForInput(url);
|
2013-12-11 09:31:54 +01:00
|
|
|
}
|
2011-06-01 08:05:09 +02:00
|
|
|
|
2013-12-11 09:31:54 +01:00
|
|
|
NS_IMETHODIMP
|
|
|
|
nsLocalFile::Launch()
|
|
|
|
{
|
|
|
|
#ifdef MOZ_WIDGET_GTK
|
2014-09-22 18:35:40 +02:00
|
|
|
+ if( nsKDEUtils::kdeSupport()) {
|
|
|
|
+ nsTArray<nsCString> command;
|
|
|
|
+ command.AppendElement( NS_LITERAL_CSTRING("OPEN") );
|
|
|
|
+ command.AppendElement( mPath );
|
|
|
|
+ return nsKDEUtils::command( command ) ? NS_OK : NS_ERROR_FAILURE;
|
|
|
|
+ }
|
|
|
|
nsCOMPtr<nsIGIOService> giovfs = do_GetService(NS_GIOSERVICE_CONTRACTID);
|
2015-05-10 22:12:38 +02:00
|
|
|
if (!giovfs) {
|
|
|
|
return NS_ERROR_FAILURE;
|
|
|
|
}
|
|
|
|
|
|
|
|
return giovfs->ShowURIForInput(mPath);
|
2018-03-13 20:46:06 +01:00
|
|
|
#elif defined(MOZ_WIDGET_ANDROID)
|
|
|
|
// Try to get a mimetype, if this fails just use the file uri alone
|