1. 07 Mar, 2013 40 commits
    • mhahnenberg@apple.com's avatar
      Objective-C API: Need a good way to reference event handlers without causing cycles · db731edf
      mhahnenberg@apple.com authored
      https://bugs.webkit.org/show_bug.cgi?id=111088
      
      Reviewed by Geoffrey Garen.
      
      JSManagedValue is like a special kind of weak value. When you create a JSManagedValue, you can
      supply an Objective-C object as its "owner". As long as the Objective-C owner object remains
      alive and its wrapper remains accessible to the JSC garbage collector (e.g. by being marked by 
      the global object), the reference to the JavaScript value is strong. As soon as the Objective-C
      owner is deallocated or its wrapper becomes inaccessible to the garbage collector, the reference
      becomes weak.
      
      If you do not supply an owner or you use the weakValueWithValue: convenience class method, the
      returned JSManagedValue behaves as a normal weak reference.
      
      This new class allows clients to maintain references to JavaScript values in the Objective-C
      heap without creating reference cycles/leaking memory.
      
      * API/JSAPIWrapperObject.cpp: Added.
      (JSC):
      (JSC::::createStructure):
      (JSC::JSAPIWrapperObject::JSAPIWrapperObject): This is a special JSObject for the Objective-C API that knows
      for the purposes of garbage collection/marking that it wraps an opaque Objective-C object.
      (JSC::JSAPIWrapperObject::visitChildren): We add the pointer to the wrapped Objective-C object to the set of
      opaque roots so that the weak handle owner for JSManagedValues can find it later.
      * API/JSAPIWrapperObject.h: Added.
      (JSC):
      (JSAPIWrapperObject):
      (JSC::JSAPIWrapperObject::wrappedObject):
      (JSC::JSAPIWrapperObject::setWrappedObject):
      * API/JSBase.cpp:
      (JSSynchronousGarbageCollect):
      * API/JSBasePrivate.h:
      * API/JSCallbackObject.cpp:
      (JSC):
      * API/JSCallbackObject.h:
      (JSC::JSCallbackObject::destroy): Moved this to the header so that we don't get link errors with JSAPIWrapperObject.
      * API/JSContext.mm:
      (-[JSContext initWithVirtualMachine:]): We weren't adding manually allocated/initialized JSVirtualMachine objects to 
      the global cache of virtual machines. The init methods handle this now rather than contextWithGlobalContextRef, since 
      not everyone is guaranteed to use the latter.
      (-[JSContext initWithGlobalContextRef:]):
      (+[JSContext contextWithGlobalContextRef:]):
      * API/JSManagedValue.h: Added.
      * API/JSManagedValue.mm: Added.
      (JSManagedValueHandleOwner):
      (managedValueHandleOwner):
      (+[JSManagedValue weakValueWithValue:]):
      (+[JSManagedValue managedValueWithValue:owner:]):
      (-[JSManagedValue init]): We explicitly call the ARC entrypoints to initialize/get the weak owner field since we don't 
      use ARC when building our framework.
      (-[JSManagedValue initWithValue:]):
      (-[JSManagedValue initWithValue:owner:]):
      (-[JSManagedValue dealloc]):
      (-[JSManagedValue value]):
      (-[JSManagedValue weakOwner]):
      (JSManagedValueHandleOwner::isReachableFromOpaqueRoots): If the Objective-C owner is still alive (i.e. loading the weak field
      returns non-nil) and that value was added to the set of opaque roots by the wrapper for that Objective-C owner, then the the 
      JSObject to which the JSManagedObject refers is still alive.
      * API/JSObjectRef.cpp: We have to add explicit checks for the JSAPIWrapperObject, just like the other types of JSCallbackObjects.
      (JSObjectGetPrivate):
      (JSObjectSetPrivate):
      (JSObjectGetPrivateProperty):
      (JSObjectSetPrivateProperty):
      (JSObjectDeletePrivateProperty):
      * API/JSValue.mm:
      (objectToValueWithoutCopy):
      * API/JSValueRef.cpp:
      (JSValueIsObjectOfClass):
      * API/JSVirtualMachine.mm:
      (-[JSVirtualMachine initWithContextGroupRef:]):
      (+[JSVirtualMachine virtualMachineWithContextGroupRef:]):
      * API/JSWrapperMap.mm:
      (wrapperFinalize):
      (makeWrapper): This is our own internal version of JSObjectMake which creates JSAPIWrapperObjects, the Obj-C API 
      version of JSCallbackObjects.
      (createObjectWithCustomBrand):
      (-[JSObjCClassInfo wrapperForObject:]):
      (tryUnwrapObjcObject):
      * API/JavaScriptCore.h:
      * API/tests/testapi.mm: Added new tests for the strong and weak uses of JSManagedValue in the context of an 
      onclick handler for an Objective-C object inserted into a JSContext.
      (-[TextXYZ setWeakOnclick:]):
      (-[TextXYZ setOnclick:]):
      (-[TextXYZ weakOnclick]):
      (-[TextXYZ onclick]):
      (-[TextXYZ click]):
      * CMakeLists.txt: Various build system additions.
      * GNUmakefile.list.am:
      * JavaScriptCore.gypi:
      * JavaScriptCore.vcproj/JavaScriptCore/JavaScriptCore.vcproj:
      * JavaScriptCore.xcodeproj/project.pbxproj:
      * runtime/JSGlobalObject.cpp: Added the new canonical Structure for the JSAPIWrapperObject class.
      (JSC::JSGlobalObject::reset):
      (JSC):
      (JSC::JSGlobalObject::visitChildren):
      * runtime/JSGlobalObject.h:
      (JSGlobalObject):
      (JSC::JSGlobalObject::objcWrapperObjectStructure):
      
      
      git-svn-id: http://svn.webkit.org/repository/webkit/trunk@145119 268f45cc-cd09-0410-ab3c-d52691b4dbfc
      db731edf
    • ojan@chromium.org's avatar
      Image rebaselines after r145104. · e500c3e7
      ojan@chromium.org authored
      * platform/chromium-mac/fast/table/border-collapsing/cached-change-row-border-width-expected.png:
      * platform/chromium-mac/fast/table/border-collapsing/cached-change-tbody-border-width-expected.png:
      
      git-svn-id: http://svn.webkit.org/repository/webkit/trunk@145117 268f45cc-cd09-0410-ab3c-d52691b4dbfc
      e500c3e7
    • cfleizach@apple.com's avatar
      AX: Can't activate links with VoiceOver in Safari · 50d4cd3f
      cfleizach@apple.com authored
      https://bugs.webkit.org/show_bug.cgi?id=111755
      
      Reviewed by Tim Horton.
      
      Source/WebCore: 
      
      VoiceOver is relying on the press action being the first action in the list. We changed
      that order inadvertently recently, which confuses VoiceOver.
      
      Test: platform/mac/accessibility/press-action-is-first.html
      
      * accessibility/mac/WebAccessibilityObjectWrapperMac.mm:
      (-[WebAccessibilityObjectWrapper accessibilityActionNames]):
      
      Tools: 
      
      * DumpRenderTree/AccessibilityUIElement.cpp:
      (supportedActionsCallback):
      (AccessibilityUIElement::getJSClass):
      * DumpRenderTree/AccessibilityUIElement.h:
      (AccessibilityUIElement):
      * DumpRenderTree/mac/AccessibilityUIElementMac.mm:
      (AccessibilityUIElement::supportedActions):
      
      LayoutTests: 
      
      * platform/mac/accessibility/press-action-is-first-expected.txt: Added.
      * platform/mac/accessibility/press-action-is-first.html: Added.
      
      
      
      git-svn-id: http://svn.webkit.org/repository/webkit/trunk@145116 268f45cc-cd09-0410-ab3c-d52691b4dbfc
      50d4cd3f
    • rafaelw@chromium.org's avatar
      Unreviewed, rolling out r145083. · 8925a574
      rafaelw@chromium.org authored
      http://trac.webkit.org/changeset/145083
      https://bugs.webkit.org/show_bug.cgi?id=110733
      
      caused lots crashes in http/tests/security/xssAuditor/* tests
      
      Source/WebCore:
      
      * html/parser/XSSAuditor.cpp:
      (WebCore::XSSAuditor::XSSAuditor):
      (WebCore::XSSAuditor::init):
      (WebCore::XSSAuditor::filterToken):
      * html/parser/XSSAuditor.h:
      * html/parser/XSSAuditorDelegate.cpp:
      (WebCore::XSSAuditorDelegate::didBlockScript):
      * html/parser/XSSAuditorDelegate.h:
      (WebCore::XSSInfo::create):
      (XSSInfo):
      (WebCore::XSSInfo::XSSInfo):
      
      LayoutTests:
      
      * fast/frames/xss-auditor-handles-file-urls-expected.txt:
      * http/tests/security/contentSecurityPolicy/1.1/reflected-xss-and-xss-protection-allow-block-expected.txt:
      * http/tests/security/contentSecurityPolicy/1.1/reflected-xss-and-xss-protection-allow-filter-expected.txt:
      * http/tests/security/contentSecurityPolicy/1.1/reflected-xss-and-xss-protection-allow-invalid-expected.txt:
      * http/tests/security/contentSecurityPolicy/1.1/reflected-xss-and-xss-protection-block-allow-expected.txt:
      * http/tests/security/contentSecurityPolicy/1.1/reflected-xss-and-xss-protection-block-block-expected.txt:
      * http/tests/security/contentSecurityPolicy/1.1/reflected-xss-and-xss-protection-block-filter-expected.txt:
      * http/tests/security/contentSecurityPolicy/1.1/reflected-xss-and-xss-protection-block-invalid-expected.txt:
      * http/tests/security/contentSecurityPolicy/1.1/reflected-xss-and-xss-protection-block-unset-expected.txt:
      * http/tests/security/contentSecurityPolicy/1.1/reflected-xss-and-xss-protection-filter-allow-expected.txt:
      * http/tests/security/contentSecurityPolicy/1.1/reflected-xss-and-xss-protection-filter-block-expected.txt:
      * http/tests/security/contentSecurityPolicy/1.1/reflected-xss-and-xss-protection-filter-filter-expected.txt:
      * http/tests/security/contentSecurityPolicy/1.1/reflected-xss-and-xss-protection-filter-invalid-expected.txt:
      * http/tests/security/contentSecurityPolicy/1.1/reflected-xss-and-xss-protection-filter-unset-expected.txt:
      * http/tests/security/contentSecurityPolicy/1.1/reflected-xss-and-xss-protection-invalid-allow-expected.txt:
      * http/tests/security/contentSecurityPolicy/1.1/reflected-xss-and-xss-protection-invalid-block-expected.txt:
      * http/tests/security/contentSecurityPolicy/1.1/reflected-xss-and-xss-protection-invalid-filter-expected.txt:
      * http/tests/security/contentSecurityPolicy/1.1/reflected-xss-and-xss-protection-invalid-invalid-expected.txt:
      * http/tests/security/contentSecurityPolicy/1.1/reflected-xss-and-xss-protection-invalid-unset-expected.txt:
      * http/tests/security/contentSecurityPolicy/1.1/reflected-xss-and-xss-protection-unset-block-expected.txt:
      * http/tests/security/contentSecurityPolicy/1.1/reflected-xss-and-xss-protection-unset-filter-expected.txt:
      * http/tests/security/contentSecurityPolicy/1.1/reflected-xss-and-xss-protection-unset-invalid-expected.txt:
      * http/tests/security/contentSecurityPolicy/1.1/reflected-xss-and-xss-protection-unset-unset-expected.txt:
      * http/tests/security/contentSecurityPolicy/1.1/reflected-xss-block-expected.txt:
      * http/tests/security/contentSecurityPolicy/1.1/reflected-xss-empty-expected.txt:
      * http/tests/security/contentSecurityPolicy/1.1/reflected-xss-filter-expected.txt:
      * http/tests/security/contentSecurityPolicy/1.1/reflected-xss-invalid-expected.txt:
      * http/tests/security/xssAuditor/anchor-url-dom-write-location-expected.txt:
      * http/tests/security/xssAuditor/anchor-url-dom-write-location-inline-event-expected.txt:
      * http/tests/security/xssAuditor/anchor-url-dom-write-location-inline-event-null-char-expected.txt:
      * http/tests/security/xssAuditor/anchor-url-dom-write-location-javascript-URL-expected.txt:
      * http/tests/security/xssAuditor/anchor-url-dom-write-location2-expected.txt:
      * http/tests/security/xssAuditor/base-href-control-char-expected.txt:
      * http/tests/security/xssAuditor/base-href-expected.txt:
      * http/tests/security/xssAuditor/base-href-null-char-expected.txt:
      * http/tests/security/xssAuditor/base-href-scheme-relative-expected.txt:
      * http/tests/security/xssAuditor/block-does-not-leak-location-expected.txt:
      * http/tests/security/xssAuditor/block-does-not-leak-referrer-expected.txt:
      * http/tests/security/xssAuditor/cached-frame-expected.txt:
      * http/tests/security/xssAuditor/cookie-injection-expected.txt:
      * http/tests/security/xssAuditor/dom-write-URL-expected.txt:
      * http/tests/security/xssAuditor/dom-write-location-expected.txt:
      * http/tests/security/xssAuditor/dom-write-location-inline-event-expected.txt:
      * http/tests/security/xssAuditor/dom-write-location-javascript-URL-expected.txt:
      * http/tests/security/xssAuditor/embed-tag-code-attribute-2-expected.txt:
      * http/tests/security/xssAuditor/embed-tag-code-attribute-expected.txt:
      * http/tests/security/xssAuditor/embed-tag-control-char-expected.txt:
      * http/tests/security/xssAuditor/embed-tag-expected.txt:
      * http/tests/security/xssAuditor/embed-tag-javascript-url-expected.txt:
      * http/tests/security/xssAuditor/embed-tag-null-char-expected.txt:
      * http/tests/security/xssAuditor/form-action-expected.txt:
      * http/tests/security/xssAuditor/formaction-on-button-expected.txt:
      * http/tests/security/xssAuditor/formaction-on-input-expected.txt:
      * http/tests/security/xssAuditor/full-block-base-href-expected.txt:
      * http/tests/security/xssAuditor/full-block-get-from-iframe-expected.txt:
      * http/tests/security/xssAuditor/full-block-iframe-javascript-url-expected.txt:
      * http/tests/security/xssAuditor/full-block-iframe-no-inherit-expected.txt:
      * http/tests/security/xssAuditor/full-block-javascript-link-expected.txt:
      * http/tests/security/xssAuditor/full-block-link-onclick-expected.txt:
      * http/tests/security/xssAuditor/full-block-object-tag-expected.txt:
      * http/tests/security/xssAuditor/full-block-post-from-iframe-expected.txt:
      * http/tests/security/xssAuditor/full-block-script-tag-cross-domain-expected.txt:
      * http/tests/security/xssAuditor/full-block-script-tag-expected.txt:
      * http/tests/security/xssAuditor/full-block-script-tag-with-source-expected.txt:
      * http/tests/security/xssAuditor/get-from-iframe-expected.txt:
      * http/tests/security/xssAuditor/iframe-injection-expected.txt:
      * http/tests/security/xssAuditor/iframe-javascript-url-expected.txt:
      * http/tests/security/xssAuditor/iframe-javascript-url-more-encoding-expected.txt:
      * http/tests/security/xssAuditor/iframe-javascript-url-twice-url-encode-expected.txt:
      * http/tests/security/xssAuditor/iframe-javascript-url-twice-url-encode2-expected.txt:
      * http/tests/security/xssAuditor/iframe-javascript-url-twice-url-encode3-expected.txt:
      * http/tests/security/xssAuditor/iframe-javascript-url-url-encoded-expected.txt:
      * http/tests/security/xssAuditor/iframe-onload-GBK-char-expected.txt:
      * http/tests/security/xssAuditor/iframe-onload-in-svg-tag-expected.txt:
      * http/tests/security/xssAuditor/iframe-srcdoc-expected.txt:
      * http/tests/security/xssAuditor/img-onerror-GBK-char-expected.txt:
      * http/tests/security/xssAuditor/img-onerror-accented-char-expected.txt:
      * http/tests/security/xssAuditor/img-onerror-non-ASCII-char-default-encoding-expected.txt:
      * http/tests/security/xssAuditor/img-onerror-non-ASCII-char-expected.txt:
      * http/tests/security/xssAuditor/img-onerror-non-ASCII-char2-default-encoding-expected.txt:
      * http/tests/security/xssAuditor/img-onerror-non-ASCII-char2-expected.txt:
      * http/tests/security/xssAuditor/inline-event-HTML-entities-expected.txt:
      * http/tests/security/xssAuditor/javascript-link-HTML-entities-control-char-expected.txt:
      * http/tests/security/xssAuditor/javascript-link-HTML-entities-expected.txt:
      * http/tests/security/xssAuditor/javascript-link-HTML-entities-named-expected.txt:
      * http/tests/security/xssAuditor/javascript-link-HTML-entities-null-char-expected.txt:
      * http/tests/security/xssAuditor/javascript-link-ampersand-expected.txt:
      * http/tests/security/xssAuditor/javascript-link-control-char-expected.txt:
      * http/tests/security/xssAuditor/javascript-link-expected.txt:
      * http/tests/security/xssAuditor/javascript-link-null-char-expected.txt:
      * http/tests/security/xssAuditor/javascript-link-one-plus-one-expected.txt:
      * http/tests/security/xssAuditor/javascript-link-url-encoded-expected.txt:
      * http/tests/security/xssAuditor/link-onclick-ampersand-expected.txt:
      * http/tests/security/xssAuditor/link-onclick-control-char-expected.txt:
      * http/tests/security/xssAuditor/link-onclick-entities-expected.txt:
      * http/tests/security/xssAuditor/link-onclick-expected.txt:
      * http/tests/security/xssAuditor/link-onclick-null-char-expected.txt:
      * http/tests/security/xssAuditor/link-opens-new-window-expected.txt:
      * http/tests/security/xssAuditor/malformed-HTML-expected.txt:
      * http/tests/security/xssAuditor/malformed-xss-protection-header-1-expected.txt:
      * http/tests/security/xssAuditor/malformed-xss-protection-header-2-expected.txt:
      * http/tests/security/xssAuditor/malformed-xss-protection-header-3-expected.txt:
      * http/tests/security/xssAuditor/malformed-xss-protection-header-4-expected.txt:
      * http/tests/security/xssAuditor/malformed-xss-protection-header-5-expected.txt:
      * http/tests/security/xssAuditor/malformed-xss-protection-header-6-expected.txt:
      * http/tests/security/xssAuditor/malformed-xss-protection-header-7-expected.txt:
      * http/tests/security/xssAuditor/malformed-xss-protection-header-8-expected.txt:
      * http/tests/security/xssAuditor/malformed-xss-protection-header-9-expected.txt:
      * http/tests/security/xssAuditor/meta-tag-http-refresh-javascript-url-expected.txt:
      * http/tests/security/xssAuditor/object-embed-tag-control-char-expected.txt:
      * http/tests/security/xssAuditor/object-embed-tag-expected.txt:
      * http/tests/security/xssAuditor/object-embed-tag-null-char-expected.txt:
      * http/tests/security/xssAuditor/object-tag-expected.txt:
      * http/tests/security/xssAuditor/object-tag-javascript-url-expected.txt:
      * http/tests/security/xssAuditor/open-attribute-body-expected.txt:
      * http/tests/security/xssAuditor/open-event-handler-iframe-expected.txt:
      * http/tests/security/xssAuditor/open-iframe-src-01-expected.txt:
      * http/tests/security/xssAuditor/open-iframe-src-02-expected.txt:
      * http/tests/security/xssAuditor/open-iframe-src-03-expected.txt:
      * http/tests/security/xssAuditor/open-script-src-01-expected.txt:
      * http/tests/security/xssAuditor/open-script-src-02-expected.txt:
      * http/tests/security/xssAuditor/open-script-src-03-expected.txt:
      * http/tests/security/xssAuditor/open-script-src-04-expected.txt:
      * http/tests/security/xssAuditor/post-from-iframe-expected.txt:
      * http/tests/security/xssAuditor/property-escape-comment-01-expected.txt:
      * http/tests/security/xssAuditor/property-escape-comment-02-expected.txt:
      * http/tests/security/xssAuditor/property-escape-comment-03-expected.txt:
      * http/tests/security/xssAuditor/property-escape-entity-01-expected.txt:
      * http/tests/security/xssAuditor/property-escape-entity-02-expected.txt:
      * http/tests/security/xssAuditor/property-escape-entity-03-expected.txt:
      * http/tests/security/xssAuditor/property-escape-expected.txt:
      * http/tests/security/xssAuditor/property-escape-long-expected.txt:
      * http/tests/security/xssAuditor/property-escape-quote-01-expected.txt:
      * http/tests/security/xssAuditor/property-escape-quote-02-expected.txt:
      * http/tests/security/xssAuditor/property-escape-quote-03-expected.txt:
      * http/tests/security/xssAuditor/report-script-tag-expected.txt:
      * http/tests/security/xssAuditor/report-script-tag-full-block-expected.txt:
      * http/tests/security/xssAuditor/script-tag-Big5-char-expected.txt:
      * http/tests/security/xssAuditor/script-tag-Big5-char-twice-url-encode-16bit-unicode-expected.txt:
      * http/tests/security/xssAuditor/script-tag-Big5-char-twice-url-encode-expected.txt:
      * http/tests/security/xssAuditor/script-tag-Big5-char2-expected.txt:
      * http/tests/security/xssAuditor/script-tag-addslashes-backslash-expected.txt:
      * http/tests/security/xssAuditor/script-tag-addslashes-double-quote-expected.txt:
      * http/tests/security/xssAuditor/script-tag-addslashes-null-char-expected.txt:
      * http/tests/security/xssAuditor/script-tag-addslashes-single-quote-expected.txt:
      * http/tests/security/xssAuditor/script-tag-control-char-expected.txt:
      * http/tests/security/xssAuditor/script-tag-convoluted-expected.txt:
      * http/tests/security/xssAuditor/script-tag-entities-expected.txt:
      * http/tests/security/xssAuditor/script-tag-expected.txt:
      * http/tests/security/xssAuditor/script-tag-inside-svg-tag-expected.txt:
      * http/tests/security/xssAuditor/script-tag-inside-svg-tag2-expected.txt:
      * http/tests/security/xssAuditor/script-tag-inside-svg-tag3-expected.txt:
      * http/tests/security/xssAuditor/script-tag-null-char-expected.txt:
      * http/tests/security/xssAuditor/script-tag-open-redirect-expected.txt:
      * http/tests/security/xssAuditor/script-tag-post-control-char-expected.txt:
      * http/tests/security/xssAuditor/script-tag-post-expected.txt:
      * http/tests/security/xssAuditor/script-tag-post-null-char-expected.txt:
      * http/tests/security/xssAuditor/script-tag-redirect-expected.txt:
      * http/tests/security/xssAuditor/script-tag-with-16bit-unicode-expected.txt:
      * http/tests/security/xssAuditor/script-tag-with-16bit-unicode-surrogate-pair-expected.txt:
      * http/tests/security/xssAuditor/script-tag-with-16bit-unicode2-expected.txt:
      * http/tests/security/xssAuditor/script-tag-with-16bit-unicode3-expected.txt:
      * http/tests/security/xssAuditor/script-tag-with-16bit-unicode4-expected.txt:
      * http/tests/security/xssAuditor/script-tag-with-16bit-unicode5-expected.txt:
      * http/tests/security/xssAuditor/script-tag-with-actual-comma-expected.txt:
      * http/tests/security/xssAuditor/script-tag-with-callbacks-expected.txt:
      * http/tests/security/xssAuditor/script-tag-with-comma-01-expected.txt:
      * http/tests/security/xssAuditor/script-tag-with-comma-02-expected.txt:
      * http/tests/security/xssAuditor/script-tag-with-fancy-unicode-expected.txt:
      * http/tests/security/xssAuditor/script-tag-with-invalid-closing-tag-expected.txt:
      * http/tests/security/xssAuditor/script-tag-with-invalid-url-encoding-expected.txt:
      * http/tests/security/xssAuditor/script-tag-with-source-control-char-expected.txt:
      * http/tests/security/xssAuditor/script-tag-with-source-data-url-expected.txt:
      * http/tests/security/xssAuditor/script-tag-with-source-data-url2-expected.txt:
      * http/tests/security/xssAuditor/script-tag-with-source-data-url3-expected.txt:
      * http/tests/security/xssAuditor/script-tag-with-source-double-quote-expected.txt:
      * http/tests/security/xssAuditor/script-tag-with-source-entities-expected.txt:
      * http/tests/security/xssAuditor/script-tag-with-source-expected.txt:
      * http/tests/security/xssAuditor/script-tag-with-source-no-quote-expected.txt:
      * http/tests/security/xssAuditor/script-tag-with-source-null-char-expected.txt:
      * http/tests/security/xssAuditor/script-tag-with-source-relative-scheme-expected.txt:
      * http/tests/security/xssAuditor/script-tag-with-source-same-host-with-query-expected.txt:
      * http/tests/security/xssAuditor/script-tag-with-source-unterminated-01-expected.txt:
      * http/tests/security/xssAuditor/script-tag-with-source-unterminated-02-expected.txt:
      * http/tests/security/xssAuditor/script-tag-with-source-unterminated-03-expected.txt:
      * http/tests/security/xssAuditor/script-tag-with-three-times-url-encoded-16bit-unicode-expected.txt:
      * http/tests/security/xssAuditor/script-tag-with-trailing-comment-U2028-expected.txt:
      * http/tests/security/xssAuditor/script-tag-with-trailing-comment-expected.txt:
      * http/tests/security/xssAuditor/script-tag-with-trailing-comment2-expected.txt:
      * http/tests/security/xssAuditor/script-tag-with-trailing-comment3-expected.txt:
      * http/tests/security/xssAuditor/script-tag-with-trailing-comment4-expected.txt:
      * http/tests/security/xssAuditor/script-tag-with-trailing-comment5-expected.txt:
      * http/tests/security/xssAuditor/svg-animate-expected.txt:
      * http/tests/security/xssAuditor/svg-script-tag-expected.txt:
      * http/tests/security/xssAuditor/xss-filter-bypass-big5-expected.txt:
      * http/tests/security/xssAuditor/xss-filter-bypass-long-string-expected.txt:
      * http/tests/security/xssAuditor/xss-filter-bypass-sjis-expected.txt:
      * http/tests/security/xssAuditor/xss-protection-parsing-01-expected.txt:
      * http/tests/security/xssAuditor/xss-protection-parsing-02-expected.txt:
      * http/tests/security/xssAuditor/xss-protection-parsing-03-expected.txt:
      * http/tests/security/xssAuditor/xss-protection-parsing-04-expected.txt:
      * platform/chromium/http/tests/security/xssAuditor/javascript-link-control-char2-expected.txt:
      
      git-svn-id: http://svn.webkit.org/repository/webkit/trunk@145115 268f45cc-cd09-0410-ab3c-d52691b4dbfc
      8925a574
    • michelangelo@webkit.org's avatar
      [CSS Shaders] Implement hue and saturation non-separable blend modes · da00b68e
      michelangelo@webkit.org authored
      https://bugs.webkit.org/show_bug.cgi?id=109464
      
      Source/WebCore:
      
      Added the following GLSL helper functions to the CustomFilterValidatedProgram:
      
          - css_Sat(C): returns the saturation for the color C
          - css_SetSat(C, s): sets the saturation s on the color C
          - css_SetSatHelper(Cmin, Cmid, Cmax, s): helper function for css_SetSat
      
      The above functions are being used for the "hue" and "saturation" non-separable
      blend modes, the relevant spec for such modes is at URL:
      https://dvcs.w3.org/hg/FXTF/rawfile/tip/compositing/index.html#blendingnonseparable
      
      Reviewed by Dean Jackson.
      
      Tests: css3/filters/custom/custom-filter-nonseparable-blend-mode-hue.html
             css3/filters/custom/custom-filter-nonseparable-blend-mode-saturation.html
      
      * platform/graphics/filters/CustomFilterValidatedProgram.cpp:
      (WebCore::CustomFilterValidatedProgram::blendFunctionString):
      
      LayoutTests:
      
      Added relevant tests for the "hue" and "saturation" non-separable blend modes.
      These tests are currently skipped on Mac due to a slight color difference; please see relevant bug: http://webkit.org/b/107487.
      
      Reviewed by Dean Jackson.
      
      * css3/filters/custom/custom-filter-nonseparable-blend-mode-hue-expected.html: Added.
      * css3/filters/custom/custom-filter-nonseparable-blend-mode-hue.html: Added.
      * css3/filters/custom/custom-filter-nonseparable-blend-mode-saturation-expected.html: Added.
      * css3/filters/custom/custom-filter-nonseparable-blend-mode-saturation.html: Added.
      * platform/mac/TestExpectations:
      
      git-svn-id: http://svn.webkit.org/repository/webkit/trunk@145114 268f45cc-cd09-0410-ab3c-d52691b4dbfc
      da00b68e
    • rafaelw@chromium.org's avatar
      Unreviewed gardening. · 53368eec
      rafaelw@chromium.org authored
      * platform/chromium-mac/fast/borders/border-radius-with-box-shadow-01-expected.png: Added.
      * platform/chromium-win/fast/borders/border-radius-with-box-shadow-01-expected.png: Added.
      
      git-svn-id: http://svn.webkit.org/repository/webkit/trunk@145113 268f45cc-cd09-0410-ab3c-d52691b4dbfc
      53368eec
    • jsbell@chromium.org's avatar
      IndexedDB: Make test behavior deterministic in multiprocess ports · b6e32e5f
      jsbell@chromium.org authored
      https://bugs.webkit.org/show_bug.cgi?id=111643
      
      Reviewed by Tony Chang.
      
      Root cause is documented in wkbug.com/111642 but as a stop-gap - ensure
      that this test doesn't fail flakily in multiprocess ports by moving the
      last part of the test out of a limbo zone.
      
      * storage/indexeddb/resources/index-multientry.js: Run subsequent part of
      test in open's "success" handler rather than transaction's "complete" handler.
      
      
      git-svn-id: http://svn.webkit.org/repository/webkit/trunk@145111 268f45cc-cd09-0410-ab3c-d52691b4dbfc
      b6e32e5f
    • roger_fong@apple.com's avatar
      Windows debug layout tests are crashing like crazy again. · 686e6e88
      roger_fong@apple.com authored
      Disable tests on Win EWS bots temporarily.
      
      * Scripts/webkitpy/tool/commands/earlywarningsystem.py:
      (WinEWS):
      
      
      git-svn-id: http://svn.webkit.org/repository/webkit/trunk@145110 268f45cc-cd09-0410-ab3c-d52691b4dbfc
      686e6e88
    • pilgrim@chromium.org's avatar
      [Chromium] Remove WK/chromium/public/WebStorageArea.h · 5c57b834
      pilgrim@chromium.org authored
      https://bugs.webkit.org/show_bug.cgi?id=111744
      
      Reviewed by James Robinson.
      
      File moved to new Platform/ directory. All references have already
      been updated (including downstream).
      
      * public/WebStorageArea.h: Removed.
      
      
      git-svn-id: http://svn.webkit.org/repository/webkit/trunk@145109 268f45cc-cd09-0410-ab3c-d52691b4dbfc
      5c57b834
    • pilgrim@chromium.org's avatar
      [Chromium] Update some #includes for WebFileInfo.h in WK/chromium/src/ · 7f506f1a
      pilgrim@chromium.org authored
      https://bugs.webkit.org/show_bug.cgi?id=111741
      
      Reviewed by James Robinson.
      
      In preparation for removing WK/chromium/public/WebFileInfo.h.
      
      * src/AssertMatchingEnums.cpp:
      
      
      git-svn-id: http://svn.webkit.org/repository/webkit/trunk@145108 268f45cc-cd09-0410-ab3c-d52691b4dbfc
      7f506f1a
    • roger_fong@apple.com's avatar
      Make EWS bots build and test in release. · 49f3baad
      roger_fong@apple.com authored
      * Scripts/webkitpy/tool/commands/earlywarningsystem.py:
      (WinEWS):
      * Scripts/webkitpy/tool/steps/runtests.py:
      (RunTests.run):
      
      
      git-svn-id: http://svn.webkit.org/repository/webkit/trunk@145107 268f45cc-cd09-0410-ab3c-d52691b4dbfc
      49f3baad
    • commit-queue@webkit.org's avatar
      Web Inspector: [ACE] set correct font · 296ebde6
      commit-queue@webkit.org authored
      https://bugs.webkit.org/show_bug.cgi?id=111747
      
      Patch by Andrey Lushnikov <lushnikov@chromium.org> on 2013-03-07
      Reviewed by Pavel Feldman.
      
      No new tests.
      
      Set class "source-code" for the ace editor element.
      
      * inspector/front-end/AceTextEditor.js:
      (WebInspector.AceTextEditor):
      
      git-svn-id: http://svn.webkit.org/repository/webkit/trunk@145106 268f45cc-cd09-0410-ab3c-d52691b4dbfc
      296ebde6
    • ojan@chromium.org's avatar
      Recalculate borders at the beginning of table layout · 1d0377be
      ojan@chromium.org authored
      https://bugs.webkit.org/show_bug.cgi?id=111634
      
      Reviewed by Julien Chaffraix.
      
      Source/WebCore:
      
      Doing it in convertStyleLogicalWidthToComputedWidth missed some dynamic
      relayout cases. I confirmed that the new results match the results we
      would get if we set the border width initially instead of dynamically.
      
      * rendering/RenderTable.cpp:
      (WebCore::RenderTable::convertStyleLogicalWidthToComputedWidth):
      (WebCore::RenderTable::layout):
      
      LayoutTests:
      
      * fast/table/border-collapsing/cached-change-row-border-width-expected.png:
      * fast/table/border-collapsing/cached-change-row-border-width-expected.txt:
      * fast/table/border-collapsing/cached-change-tbody-border-width-expected.png:
      * fast/table/border-collapsing/cached-change-tbody-border-width-expected.txt:
      
      git-svn-id: http://svn.webkit.org/repository/webkit/trunk@145104 268f45cc-cd09-0410-ab3c-d52691b4dbfc
      1d0377be
    • rafaelw@chromium.org's avatar
      Unreviewed gardening. · 319f7b8d
      rafaelw@chromium.org authored
      * platform/chromium/TestExpectations: http/tests/css/shared-stylesheet-mutation-preconstruct.html
      
      git-svn-id: http://svn.webkit.org/repository/webkit/trunk@145103 268f45cc-cd09-0410-ab3c-d52691b4dbfc
      319f7b8d
    • pilgrim@chromium.org's avatar
      [Chromium] Remove WK/chromium/public/WebWorkerRunLoop.h · b5a882e5
      pilgrim@chromium.org authored
      https://bugs.webkit.org/show_bug.cgi?id=111740
      
      Reviewed by James Robinson.
      
      No longer needed; all references have been updated to new version
      in top-level Platform/ directory.
      
      * public/WebWorkerRunLoop.h: Removed.
      
      
      git-svn-id: http://svn.webkit.org/repository/webkit/trunk@145102 268f45cc-cd09-0410-ab3c-d52691b4dbfc
      b5a882e5
    • commit-queue@webkit.org's avatar
      Unreviewed. Rolled Chromium DEPS to r186592. Requested by · 2f8172ee
      commit-queue@webkit.org authored
      "Dana Jansens" <danakj@chromium.org> via sheriffbot.
      
      Patch by Sheriff Bot <webkit.review.bot@gmail.com> on 2013-03-07
      
      * DEPS:
      
      git-svn-id: http://svn.webkit.org/repository/webkit/trunk@145101 268f45cc-cd09-0410-ab3c-d52691b4dbfc
      2f8172ee
    • hyatt@apple.com's avatar
      Source/WebCore: border-fit-adjust should happen at layout time rather than paint time · 80934d70
      hyatt@apple.com authored
      https://bugs.webkit.org/show_bug.cgi?id=111606
      <rdar://problem/13101714>
      
      Reviewed by Antti Koivisto.
      
      In order for border-fit-adjust to be accurate in more cases, it needs
      to be a layout-time adjustment rather than a paint-time adjustment.
      Specifically there are cases where an LTR adjusted box was right-aligned
      by its container, and without genuinely shrinking the size of the box,
      we end up chopping off the right edge but not shifting the box to the
      right to compensate.
              
      This patch changes border-fit-adjust to now do the adjustment using
      the override width mechanism and a second layout pass instead of just
      hacking painting.
      
      Test: fast/block/border-fit-with-right-alignment.html
      
      * rendering/RenderBlock.cpp:
      (WebCore::RenderBlock::layoutBlock):
      Calls fitBorderToLinesIfNeeded at the end of layout to do a second
      layout pass if the adjustment needs to be made.
      
      (WebCore::RenderBlock::fitBorderToLinesIfNeeded):
      Renamed borderFitAdjust to fitBorderToLinesIfNeeded and made it
      non-virtual, since it's no longer called from RenderBox code. Changed it
      to do a relayout using override widths if an adjustment is needed.
      
      * rendering/RenderBlock.h:
      (RenderBlock):
      Renamed borderFitAdjust to fitBorderToLinesIfNeeded and made it
      non-virtual.
      
      * rendering/RenderBox.cpp:
      (WebCore::RenderBox::paintBoxDecorations):
      (WebCore::RenderBox::paintMask):
      Removed the paint-time border-fit adjustment.
      
      (WebCore::RenderBox::computeLogicalWidthInRegion):
      Use the override width when border-fit is set to lines.
      
      * rendering/RenderBox.h:
      (RenderBox):
      Remove the virtual borderFitAdjust method.
      
      LayoutTests: border-fit should happen at layout time rather than paint time
      https://bugs.webkit.org/show_bug.cgi?id=111606
      <rdar://problem/13101714>
      
      Reviewed by Antti Koivisto.
      
      * fast/block/border-fit-with-right-alignment-expected.html: Added.
      * fast/block/border-fit-with-right-alignment.html: Added.
      
      
      
      git-svn-id: http://svn.webkit.org/repository/webkit/trunk@145100 268f45cc-cd09-0410-ab3c-d52691b4dbfc
      80934d70
    • pilgrim@chromium.org's avatar
      [Chromium] Update some #includes for WebVideoFrame.h · 53d72c45
      pilgrim@chromium.org authored
      https://bugs.webkit.org/show_bug.cgi?id=111739
      
      Reviewed by James Robinson.
      
      In anticipation of removing WebVideoFrame.h from WK/chromium/public/.
      
      * public/WebMediaPlayer.h:
      
      
      git-svn-id: http://svn.webkit.org/repository/webkit/trunk@145099 268f45cc-cd09-0410-ab3c-d52691b4dbfc
      53d72c45
    • allan.jensen@digia.com's avatar
      REGRESSION(r143727): Clicking / selecting inside an <embed> is broken · 55d86dc3
      allan.jensen@digia.com authored
      https://bugs.webkit.org/show_bug.cgi?id=111217
      
      Reviewed by Julien Chaffraix.
      
      Source/WebCore:
      
      Hit-testing into child frames need to happen in RenderPart, otherwise
      we will miss frame views in <embed> and <object> elements.
      
      Test: fast/dom/nodesFromRect/nodesFromRect-embedded-frame-content.html
      
      * rendering/RenderFrameBase.cpp:
      * rendering/RenderFrameBase.h:
      (RenderFrameBase):
      * rendering/RenderPart.cpp:
      (WebCore::RenderPart::nodeAtPoint):
      * rendering/RenderPart.h:
      (RenderPart):
      
      LayoutTests:
      
      Test rect and point based hit-testing inside embed and object child frames.
      
      * fast/dom/nodesFromRect/nodesFromRect-embedded-frame-content-expected.txt: Added.
      * fast/dom/nodesFromRect/nodesFromRect-embedded-frame-content.html: Added.
      * fast/dom/nodesFromRect/resources/nodesFromRect.js:
      (checkPoint):
      
      git-svn-id: http://svn.webkit.org/repository/webkit/trunk@145098 268f45cc-cd09-0410-ab3c-d52691b4dbfc
      55d86dc3
    • ap@apple.com's avatar
      FormData should allow setting filename to empty · a383c470
      ap@apple.com authored
              https://bugs.webkit.org/show_bug.cgi?id=111687
      
              Reviewed by Brady Eidson.
      
              Tests: http/tests/local/formdata/send-form-data-with-empty-blob-filename.html
                     http/tests/local/formdata/send-form-data-with-empty-file-filename.html
      
              * html/FileInputType.cpp: (WebCore::FileInputType::appendFormData):
              Use a Blob for empty file input, not a hacky File with empty path.
      
              * platform/network/FormData.cpp: (WebCore::FormData::appendKeyValuePairItems):
              Missing value is a null string. If the string is empty, we should treat is as
              authoritative.
      
      
      
      git-svn-id: http://svn.webkit.org/repository/webkit/trunk@145097 268f45cc-cd09-0410-ab3c-d52691b4dbfc
      a383c470
    • timothy_horton@apple.com's avatar
      Null-check the page overlay before trying to use it. · ec0d645f
      timothy_horton@apple.com authored
      Reviewed by Simon Fraser.
      
      * WebProcess/WebPage/mac/TiledCoreAnimationDrawingArea.mm:
      (WebKit::TiledCoreAnimationDrawingArea::scroll):
      
      
      git-svn-id: http://svn.webkit.org/repository/webkit/trunk@145096 268f45cc-cd09-0410-ab3c-d52691b4dbfc
      ec0d645f
    • dino@apple.com's avatar
      inspector/debugger/debugger-expand-scope.html sometimes fails on Apple... · a9fa5f02
      dino@apple.com authored
      inspector/debugger/debugger-expand-scope.html sometimes fails on Apple MountainLion Release WK1 (Tests)
      https://bugs.webkit.org/show_bug.cgi?id=111754
      
      Skipping this test so that Mac EWS can catch up.
      
      * platform/mac/TestExpectations:
      
      git-svn-id: http://svn.webkit.org/repository/webkit/trunk@145095 268f45cc-cd09-0410-ab3c-d52691b4dbfc
      a9fa5f02
    • commit-queue@webkit.org's avatar
      Web Inspector: [CodeMirror] dublicated horizontal scroll · a35a6d2c
      commit-queue@webkit.org authored
      https://bugs.webkit.org/show_bug.cgi?id=111712
      
      Patch by Andrey Lushnikov <lushnikov@chromium.org> on 2013-03-07
      Reviewed by Pavel Feldman.
      
      Set a box-sizing css property on all codemirror elements to
      "content-box".
      
      No new tests.
      
      * inspector/front-end/cm/cmdevtools.css:
      (.CodeMirror *):
      
      git-svn-id: http://svn.webkit.org/repository/webkit/trunk@145093 268f45cc-cd09-0410-ab3c-d52691b4dbfc
      a35a6d2c
    • dino@apple.com's avatar
      Chromium, mac-wk2 and mac need new baselines after fixing paint phases for composited scrolling. · 454bb655
      dino@apple.com authored
      https://bugs.webkit.org/show_bug.cgi?id=107952
      
      New baseline for Mac.
      
      * platform/mac/compositing/overflow/composited-scrolling-creates-a-stacking-container-expected.txt:
      
      git-svn-id: http://svn.webkit.org/repository/webkit/trunk@145092 268f45cc-cd09-0410-ab3c-d52691b4dbfc
      454bb655
    • danakj@chromium.org's avatar
      [chromium] Remove WebView's sharedGraphicsContext3D method. · 7dafe794
      danakj@chromium.org authored
      https://bugs.webkit.org/show_bug.cgi?id=111499
      
      Reviewed by James Robinson.
      
      * public/WebView.h:
      (WebView):
      * src/WebViewImpl.cpp:
      * src/WebViewImpl.h:
      (WebViewImpl):
      
      
      git-svn-id: http://svn.webkit.org/repository/webkit/trunk@145091 268f45cc-cd09-0410-ab3c-d52691b4dbfc
      7dafe794
    • acolwell@chromium.org's avatar
      Remove GC code duplication in http/tests LayoutTests. · f9e20b14
      acolwell@chromium.org authored
      https://bugs.webkit.org/show_bug.cgi?id=111589
      
      Reviewed by Kentaro Hara, Alexey Proskuryakov.
      
      Replaced duplicated GC logic in various tests with a function call to the implementation
      in /js-test-resources/js-test-pre.js
      
      * http/tests/appcache/destroyed-frame.html:
      * http/tests/media/media-source/video-media-source-sourcebufferlist-crash.html:
      * http/tests/misc/async-script.html:
      * http/tests/misc/embed-image-load-outlives-gc-without-crashing.html:
      * http/tests/misc/image-input-type-outlives-gc-without-crashing.html:
      * http/tests/misc/image-load-outlives-gc-without-crashing.html:
      * http/tests/misc/javascript-url-stop-loaders.html:
      * http/tests/misc/object-image-load-outlives-gc-without-crashing.html:
      * http/tests/misc/svg-image-load-outlives-gc-without-crashing.html:
      * http/tests/misc/video-poster-image-load-outlives-gc-without-crashing.html:
      * http/tests/security/detached-sandboxed-frame-access.html:
      * http/tests/websocket/tests/hybi/websocket-pending-activity.html:
      * http/tests/xmlhttprequest/event-listener-gc.html:
      
      
      git-svn-id: http://svn.webkit.org/repository/webkit/trunk@145090 268f45cc-cd09-0410-ab3c-d52691b4dbfc
      f9e20b14
    • vsevik@chromium.org's avatar
      Web Inspector: Styles sidebar pane toolbar disappears in horizontal split mode. · 1f497c2e
      vsevik@chromium.org authored
      https://bugs.webkit.org/show_bug.cgi?id=111735
      
      Reviewed by Pavel Feldman.
      
      * inspector/front-end/ElementsPanel.js:
      (WebInspector.ElementsPanel.prototype._splitVertically):
      * inspector/front-end/elementsPanel.css:
      (.sidebar-pane.composite .metrics-and-computed .sidebar-pane-toolbar):
      
      
      git-svn-id: http://svn.webkit.org/repository/webkit/trunk@145086 268f45cc-cd09-0410-ab3c-d52691b4dbfc
      1f497c2e
    • commit-queue@webkit.org's avatar
      [Qt] QWebSettings::clearMemoryCaches should clear JS garbage · 16dda3ee
      commit-queue@webkit.org authored
      https://bugs.webkit.org/show_bug.cgi?id=111094
      
      Patch by Arunprasad Rajkumar <arunprasadr@nds.com> on 2013-03-07
      Reviewed by Jocelyn Turcotte.
      
      * Api/qwebsettings.cpp:
      (QWebSettings::clearMemoryCaches):
      
      git-svn-id: http://svn.webkit.org/repository/webkit/trunk@145085 268f45cc-cd09-0410-ab3c-d52691b4dbfc
      16dda3ee
    • zandobersek@gmail.com's avatar
      [GTK] Limit the supported compilers to GCC >= 4.7 and Clang >= 3.0 · ee50a5f2
      zandobersek@gmail.com authored
      https://bugs.webkit.org/show_bug.cgi?id=109932
      
      Patch by Zan Dobersek <zdobersek@igalia.com> on 2013-03-07
      Reviewed by Martin Robinson.
      
      .: 
      
      * Source/autotools/CheckSystemAndBasicDependencies.m4: Strictly check for one of the two compilers.
      * Source/autotools/SetupCompilerFlags.m4: Set up C++11-specific compiler flags. Force the C99 standard for the C code.
      Use the -Qunused-arguments flag when using Clang, it reduces irrelevant errors when using ccache.
      
      Source/WebCore: 
      
      * GNUmakefile.am: Replace references to SYMBOL_VISIBILITY_INLINES and SYMBOL_VISIBILITY variables with the actual flags.
      They are now available by default due to the limited set of supported compilers.
      * bindings/gobject/GNUmakefile.am: Ditto.
      
      Source/WebKit/gtk: 
      
      * GNUmakefile.am: Replace references to SYMBOL_VISIBILITY_INLINES and SYMBOL_VISIBILITY variables with the actual flags.
      They are now available by default due to the limited set of supported compilers.
      
      Source/WebKit2: 
      
      * GNUmakefile.am: Replace references to SYMBOL_VISIBILITY_INLINES and SYMBOL_VISIBILITY variables with the actual flags.
      They are now available by default due to the limited set of supported compilers.
      
      
      git-svn-id: http://svn.webkit.org/repository/webkit/trunk@145084 268f45cc-cd09-0410-ab3c-d52691b4dbfc
      ee50a5f2
    • mkwst@chromium.org's avatar
      XSSAuditor should send only one console error when blocking a page. · d20add54
      mkwst@chromium.org authored
      https://bugs.webkit.org/show_bug.cgi?id=110733
      
      Reviewed by Daniel Bates.
      
      Source/WebCore:
      
      Currently, we send two console errors when XSSAuditor blocks a page:
      "Refused to execute a JavaScript script. Source code of script found
      within request.\n", and "Entire page will be blocked.".
      
      We should only send one message, tuning it properly for the context, and
      including the URL of the page effected by the XSSAuditor's work.
      
      Covered by rebaselines of all the XSSAuditor and 'reflected-xss' tests.
      
      * html/parser/XSSAuditor.cpp:
      * html/parser/XSSAuditor.h:
      (WebCore::XSSAuditor::XSSAuditor):
          Add two booleans to track the headers used to set the XSSAuditor state.
      (WebCore::XSSAuditor::init):
          Save a copy of the document's URL even if we're not generating a
          report upon violation: we'll need it for the console messages. Also
          populate the didSendValidXXXHeader booleans for use later.
      (WebCore::XSSAuditor::filterToken):
          Add detail about the header status to the constructed XSSInfo object.
      * html/parser/XSSAuditorDelegate.cpp:
      (WebCore::buildConsoleError):
          Move message construction out into a separate inlined function, as
          it's becoming complex.
      (WebCore::XSSAuditorDelegate::didBlockScript):
          Fold the "Entire page will be blocked" message into the main console
          error.
      * html/parser/XSSAuditorDelegate.h:
      (WebCore::XSSInfo::create):
      (WebCore::XSSInfo::XSSInfo):
          Add detail about header status to XSSInfo in order to correctly
          construct the console error.
      
      LayoutTests:
      
      * fast/frames/xss-auditor-handles-file-urls-expected.txt:
      * http/tests/security/contentSecurityPolicy/1.1/reflected-xss-and-xss-protection-allow-block-expected.txt:
      * http/tests/security/contentSecurityPolicy/1.1/reflected-xss-and-xss-protection-allow-filter-expected.txt:
      * http/tests/security/contentSecurityPolicy/1.1/reflected-xss-and-xss-protection-allow-invalid-expected.txt:
      * http/tests/security/contentSecurityPolicy/1.1/reflected-xss-and-xss-protection-block-allow-expected.txt:
      * http/tests/security/contentSecurityPolicy/1.1/reflected-xss-and-xss-protection-block-block-expected.txt:
      * http/tests/security/contentSecurityPolicy/1.1/reflected-xss-and-xss-protection-block-filter-expected.txt:
      * http/tests/security/contentSecurityPolicy/1.1/reflected-xss-and-xss-protection-block-invalid-expected.txt:
      * http/tests/security/contentSecurityPolicy/1.1/reflected-xss-and-xss-protection-block-unset-expected.txt:
      * http/tests/security/contentSecurityPolicy/1.1/reflected-xss-and-xss-protection-filter-allow-expected.txt:
      * http/tests/security/contentSecurityPolicy/1.1/reflected-xss-and-xss-protection-filter-block-expected.txt:
      * http/tests/security/contentSecurityPolicy/1.1/reflected-xss-and-xss-protection-filter-filter-expected.txt:
      * http/tests/security/contentSecurityPolicy/1.1/reflected-xss-and-xss-protection-filter-invalid-expected.txt:
      * http/tests/security/contentSecurityPolicy/1.1/reflected-xss-and-xss-protection-filter-unset-expected.txt:
      * http/tests/security/contentSecurityPolicy/1.1/reflected-xss-and-xss-protection-invalid-allow-expected.txt:
      * http/tests/security/contentSecurityPolicy/1.1/reflected-xss-and-xss-protection-invalid-block-expected.txt:
      * http/tests/security/contentSecurityPolicy/1.1/reflected-xss-and-xss-protection-invalid-filter-expected.txt:
      * http/tests/security/contentSecurityPolicy/1.1/reflected-xss-and-xss-protection-invalid-invalid-expected.txt:
      * http/tests/security/contentSecurityPolicy/1.1/reflected-xss-and-xss-protection-invalid-unset-expected.txt:
      * http/tests/security/contentSecurityPolicy/1.1/reflected-xss-and-xss-protection-unset-block-expected.txt:
      * http/tests/security/contentSecurityPolicy/1.1/reflected-xss-and-xss-protection-unset-filter-expected.txt:
      * http/tests/security/contentSecurityPolicy/1.1/reflected-xss-and-xss-protection-unset-invalid-expected.txt:
      * http/tests/security/contentSecurityPolicy/1.1/reflected-xss-and-xss-protection-unset-unset-expected.txt:
      * http/tests/security/contentSecurityPolicy/1.1/reflected-xss-block-expected.txt:
      * http/tests/security/contentSecurityPolicy/1.1/reflected-xss-empty-expected.txt:
      * http/tests/security/contentSecurityPolicy/1.1/reflected-xss-filter-expected.txt:
      * http/tests/security/contentSecurityPolicy/1.1/reflected-xss-invalid-expected.txt:
      * http/tests/security/xssAuditor/anchor-url-dom-write-location-expected.txt:
      * http/tests/security/xssAuditor/anchor-url-dom-write-location-inline-event-expected.txt:
      * http/tests/security/xssAuditor/anchor-url-dom-write-location-inline-event-null-char-expected.txt:
      * http/tests/security/xssAuditor/anchor-url-dom-write-location-javascript-URL-expected.txt:
      * http/tests/security/xssAuditor/anchor-url-dom-write-location2-expected.txt:
      * http/tests/security/xssAuditor/base-href-control-char-expected.txt:
      * http/tests/security/xssAuditor/base-href-expected.txt:
      * http/tests/security/xssAuditor/base-href-null-char-expected.txt:
      * http/tests/security/xssAuditor/base-href-scheme-relative-expected.txt:
      * http/tests/security/xssAuditor/block-does-not-leak-location-expected.txt:
      * http/tests/security/xssAuditor/block-does-not-leak-referrer-expected.txt:
      * http/tests/security/xssAuditor/cached-frame-expected.txt:
      * http/tests/security/xssAuditor/cookie-injection-expected.txt:
      * http/tests/security/xssAuditor/dom-write-URL-expected.txt:
      * http/tests/security/xssAuditor/dom-write-location-expected.txt:
      * http/tests/security/xssAuditor/dom-write-location-inline-event-expected.txt:
      * http/tests/security/xssAuditor/dom-write-location-javascript-URL-expected.txt:
      * http/tests/security/xssAuditor/embed-tag-code-attribute-2-expected.txt:
      * http/tests/security/xssAuditor/embed-tag-code-attribute-expected.txt:
      * http/tests/security/xssAuditor/embed-tag-control-char-expected.txt:
      * http/tests/security/xssAuditor/embed-tag-expected.txt:
      * http/tests/security/xssAuditor/embed-tag-javascript-url-expected.txt:
      * http/tests/security/xssAuditor/embed-tag-null-char-expected.txt:
      * http/tests/security/xssAuditor/formaction-on-button-expected.txt:
      * http/tests/security/xssAuditor/formaction-on-input-expected.txt:
      * http/tests/security/xssAuditor/form-action-expected.txt:
      * http/tests/security/xssAuditor/full-block-base-href-expected.txt:
      * http/tests/security/xssAuditor/full-block-get-from-iframe-expected.txt:
      * http/tests/security/xssAuditor/full-block-iframe-javascript-url-expected.txt:
      * http/tests/security/xssAuditor/full-block-iframe-no-inherit-expected.txt:
      * http/tests/security/xssAuditor/full-block-javascript-link-expected.txt:
      * http/tests/security/xssAuditor/full-block-link-onclick-expected.txt:
      * http/tests/security/xssAuditor/full-block-object-tag-expected.txt:
      * http/tests/security/xssAuditor/full-block-post-from-iframe-expected.txt:
      * http/tests/security/xssAuditor/full-block-script-tag-cross-domain-expected.txt:
      * http/tests/security/xssAuditor/full-block-script-tag-expected.txt:
      * http/tests/security/xssAuditor/full-block-script-tag-with-source-expected.txt:
      * http/tests/security/xssAuditor/get-from-iframe-expected.txt:
      * http/tests/security/xssAuditor/iframe-injection-expected.txt:
      * http/tests/security/xssAuditor/iframe-javascript-url-expected.txt:
      * http/tests/security/xssAuditor/iframe-javascript-url-more-encoding-expected.txt:
      * http/tests/security/xssAuditor/iframe-javascript-url-twice-url-encode-expected.txt:
      * http/tests/security/xssAuditor/iframe-javascript-url-twice-url-encode2-expected.txt:
      * http/tests/security/xssAuditor/iframe-javascript-url-twice-url-encode3-expected.txt:
      * http/tests/security/xssAuditor/iframe-javascript-url-url-encoded-expected.txt:
      * http/tests/security/xssAuditor/iframe-onload-GBK-char-expected.txt:
      * http/tests/security/xssAuditor/iframe-onload-in-svg-tag-expected.txt:
      * http/tests/security/xssAuditor/iframe-srcdoc-expected.txt:
      * http/tests/security/xssAuditor/img-onerror-GBK-char-expected.txt:
      * http/tests/security/xssAuditor/img-onerror-accented-char-expected.txt:
      * http/tests/security/xssAuditor/img-onerror-non-ASCII-char-default-encoding-expected.txt:
      * http/tests/security/xssAuditor/img-onerror-non-ASCII-char-expected.txt:
      * http/tests/security/xssAuditor/img-onerror-non-ASCII-char2-default-encoding-expected.txt:
      * http/tests/security/xssAuditor/img-onerror-non-ASCII-char2-expected.txt:
      * http/tests/security/xssAuditor/inline-event-HTML-entities-expected.txt:
      * http/tests/security/xssAuditor/javascript-link-HTML-entities-control-char-expected.txt:
      * http/tests/security/xssAuditor/javascript-link-HTML-entities-expected.txt:
      * http/tests/security/xssAuditor/javascript-link-HTML-entities-named-expected.txt:
      * http/tests/security/xssAuditor/javascript-link-HTML-entities-null-char-expected.txt:
      * http/tests/security/xssAuditor/javascript-link-ampersand-expected.txt:
      * http/tests/security/xssAuditor/javascript-link-control-char-expected.txt:
      * http/tests/security/xssAuditor/javascript-link-expected.txt:
      * http/tests/security/xssAuditor/javascript-link-null-char-expected.txt:
      * http/tests/security/xssAuditor/javascript-link-one-plus-one-expected.txt:
      * http/tests/security/xssAuditor/javascript-link-url-encoded-expected.txt:
      * http/tests/security/xssAuditor/link-onclick-ampersand-expected.txt:
      * http/tests/security/xssAuditor/link-onclick-control-char-expected.txt:
      * http/tests/security/xssAuditor/link-onclick-entities-expected.txt:
      * http/tests/security/xssAuditor/link-onclick-expected.txt:
      * http/tests/security/xssAuditor/link-onclick-null-char-expected.txt:
      * http/tests/security/xssAuditor/link-opens-new-window-expected.txt:
      * http/tests/security/xssAuditor/malformed-HTML-expected.txt:
      * http/tests/security/xssAuditor/malformed-xss-protection-header-1-expected.txt:
      * http/tests/security/xssAuditor/malformed-xss-protection-header-2-expected.txt:
      * http/tests/security/xssAuditor/malformed-xss-protection-header-3-expected.txt:
      * http/tests/security/xssAuditor/malformed-xss-protection-header-4-expected.txt:
      * http/tests/security/xssAuditor/malformed-xss-protection-header-5-expected.txt:
      * http/tests/security/xssAuditor/malformed-xss-protection-header-6-expected.txt:
      * http/tests/security/xssAuditor/malformed-xss-protection-header-7-expected.txt:
      * http/tests/security/xssAuditor/malformed-xss-protection-header-8-expected.txt:
      * http/tests/security/xssAuditor/malformed-xss-protection-header-9-expected.txt:
      * http/tests/security/xssAuditor/meta-tag-http-refresh-javascript-url-expected.txt:
      * http/tests/security/xssAuditor/object-embed-tag-control-char-expected.txt:
      * http/tests/security/xssAuditor/object-embed-tag-expected.txt:
      * http/tests/security/xssAuditor/object-embed-tag-null-char-expected.txt:
      * http/tests/security/xssAuditor/object-tag-expected.txt:
      * http/tests/security/xssAuditor/object-tag-javascript-url-expected.txt:
      * http/tests/security/xssAuditor/open-attribute-body-expected.txt:
      * http/tests/security/xssAuditor/open-event-handler-iframe-expected.txt:
      * http/tests/security/xssAuditor/open-iframe-src-01-expected.txt:
      * http/tests/security/xssAuditor/open-iframe-src-02-expected.txt:
      * http/tests/security/xssAuditor/open-script-src-01-expected.txt:
      * http/tests/security/xssAuditor/open-script-src-02-expected.txt:
      * http/tests/security/xssAuditor/open-script-src-03-expected.txt:
      * http/tests/security/xssAuditor/open-script-src-04-expected.txt:
      * http/tests/security/xssAuditor/post-from-iframe-expected.txt:
      * http/tests/security/xssAuditor/property-escape-comment-01-expected.txt:
      * http/tests/security/xssAuditor/property-escape-comment-02-expected.txt:
      * http/tests/security/xssAuditor/property-escape-comment-03-expected.txt:
      * http/tests/security/xssAuditor/property-escape-entity-01-expected.txt:
      * http/tests/security/xssAuditor/property-escape-entity-02-expected.txt:
      * http/tests/security/xssAuditor/property-escape-entity-03-expected.txt:
      * http/tests/security/xssAuditor/property-escape-expected.txt:
      * http/tests/security/xssAuditor/property-escape-long-expected.txt:
      * http/tests/security/xssAuditor/property-escape-quote-01-expected.txt:
      * http/tests/security/xssAuditor/property-escape-quote-02-expected.txt:
      * http/tests/security/xssAuditor/property-escape-quote-03-expected.txt:
      * http/tests/security/xssAuditor/report-script-tag-expected.txt:
      * http/tests/security/xssAuditor/report-script-tag-full-block-expected.txt:
      * http/tests/security/xssAuditor/script-tag-Big5-char-expected.txt:
      * http/tests/security/xssAuditor/script-tag-Big5-char-twice-url-encode-16bit-unicode-expected.txt:
      * http/tests/security/xssAuditor/script-tag-Big5-char-twice-url-encode-expected.txt:
      * http/tests/security/xssAuditor/script-tag-Big5-char2-expected.txt:
      * http/tests/security/xssAuditor/script-tag-addslashes-backslash-expected.txt:
      * http/tests/security/xssAuditor/script-tag-addslashes-double-quote-expected.txt:
      * http/tests/security/xssAuditor/script-tag-addslashes-null-char-expected.txt:
      * http/tests/security/xssAuditor/script-tag-addslashes-single-quote-expected.txt:
      * http/tests/security/xssAuditor/script-tag-control-char-expected.txt:
      * http/tests/security/xssAuditor/script-tag-convoluted-expected.txt:
      * http/tests/security/xssAuditor/script-tag-entities-expected.txt:
      * http/tests/security/xssAuditor/script-tag-expected.txt:
      * http/tests/security/xssAuditor/script-tag-inside-svg-tag-expected.txt:
      * http/tests/security/xssAuditor/script-tag-inside-svg-tag2-expected.txt:
      * http/tests/security/xssAuditor/script-tag-inside-svg-tag3-expected.txt:
      * http/tests/security/xssAuditor/script-tag-null-char-expected.txt:
      * http/tests/security/xssAuditor/script-tag-open-redirect-expected.txt:
      * http/tests/security/xssAuditor/script-tag-post-control-char-expected.txt:
      * http/tests/security/xssAuditor/script-tag-post-expected.txt:
      * http/tests/security/xssAuditor/script-tag-post-null-char-expected.txt:
      * http/tests/security/xssAuditor/script-tag-redirect-expected.txt:
      * http/tests/security/xssAuditor/script-tag-with-16bit-unicode-expected.txt:
      * http/tests/security/xssAuditor/script-tag-with-16bit-unicode-surrogate-pair-expected.txt:
      * http/tests/security/xssAuditor/script-tag-with-16bit-unicode2-expected.txt:
      * http/tests/security/xssAuditor/script-tag-with-16bit-unicode3-expected.txt:
      * http/tests/security/xssAuditor/script-tag-with-16bit-unicode4-expected.txt:
      * http/tests/security/xssAuditor/script-tag-with-16bit-unicode5-expected.txt:
      * http/tests/security/xssAuditor/script-tag-with-actual-comma-expected.txt:
      * http/tests/security/xssAuditor/script-tag-with-callbacks-expected.txt:
      * http/tests/security/xssAuditor/script-tag-with-comma-01-expected.txt:
      * http/tests/security/xssAuditor/script-tag-with-comma-02-expected.txt:
      * http/tests/security/xssAuditor/script-tag-with-fancy-unicode-expected.txt:
      * http/tests/security/xssAuditor/script-tag-with-invalid-closing-tag-expected.txt:
      * http/tests/security/xssAuditor/script-tag-with-invalid-url-encoding-expected.txt:
      * http/tests/security/xssAuditor/script-tag-with-source-control-char-expected.txt:
      * http/tests/security/xssAuditor/script-tag-with-source-data-url-expected.txt:
      * http/tests/security/xssAuditor/script-tag-with-source-data-url2-expected.txt:
      * http/tests/security/xssAuditor/script-tag-with-source-data-url3-expected.txt:
      * http/tests/security/xssAuditor/script-tag-with-source-double-quote-expected.txt:
      * http/tests/security/xssAuditor/script-tag-with-source-entities-expected.txt:
      * http/tests/security/xssAuditor/script-tag-with-source-expected.txt:
      * http/tests/security/xssAuditor/script-tag-with-source-no-quote-expected.txt:
      * http/tests/security/xssAuditor/script-tag-with-source-null-char-expected.txt:
      * http/tests/security/xssAuditor/script-tag-with-source-relative-scheme-expected.txt:
      * http/tests/security/xssAuditor/script-tag-with-source-same-host-with-query-expected.txt:
      * http/tests/security/xssAuditor/script-tag-with-source-unterminated-01-expected.txt:
      * http/tests/security/xssAuditor/script-tag-with-source-unterminated-02-expected.txt:
      * http/tests/security/xssAuditor/script-tag-with-source-unterminated-03-expected.txt:
      * http/tests/security/xssAuditor/script-tag-with-three-times-url-encoded-16bit-unicode-expected.txt:
      * http/tests/security/xssAuditor/script-tag-with-trailing-comment-U2028-expected.txt:
      * http/tests/security/xssAuditor/script-tag-with-trailing-comment-expected.txt:
      * http/tests/security/xssAuditor/script-tag-with-trailing-comment2-expected.txt:
      * http/tests/security/xssAuditor/script-tag-with-trailing-comment3-expected.txt:
      * http/tests/security/xssAuditor/script-tag-with-trailing-comment4-expected.txt:
      * http/tests/security/xssAuditor/script-tag-with-trailing-comment5-expected.txt:
      * http/tests/security/xssAuditor/svg-script-tag-expected.txt:
      * http/tests/security/xssAuditor/xss-filter-bypass-big5-expected.txt:
      * http/tests/security/xssAuditor/xss-filter-bypass-long-string-expected.txt:
      * http/tests/security/xssAuditor/xss-filter-bypass-sjis-expected.txt:
      * http/tests/security/xssAuditor/xss-protection-parsing-01-expected.txt:
      * http/tests/security/xssAuditor/xss-protection-parsing-02-expected.txt:
      * http/tests/security/xssAuditor/xss-protection-parsing-03-expected.txt:
      * http/tests/security/xssAuditor/xss-protection-parsing-04-expected.txt:
      * platform/chromium/http/tests/security/xssAuditor/javascript-link-control-char2-expected.txt:
      
      
      git-svn-id: http://svn.webkit.org/repository/webkit/trunk@145083 268f45cc-cd09-0410-ab3c-d52691b4dbfc
      d20add54
    • vsevik@chromium.org's avatar
      Web Inspector: Add some more compilation annotations to NavigatorView · c118f0df
      vsevik@chromium.org authored
      https://bugs.webkit.org/show_bug.cgi?id=111730
      
      Reviewed by Alexander Pavlov.
      
      * inspector/front-end/NavigatorView.js:
      
      
      git-svn-id: http://svn.webkit.org/repository/webkit/trunk@145082 268f45cc-cd09-0410-ab3c-d52691b4dbfc
      c118f0df
    • kov@webkit.org's avatar
      [GTK] Enable translations for WebKit2 · 08382c14
      kov@webkit.org authored
      https://bugs.webkit.org/show_bug.cgi?id=111398
      
      Patch by Gustavo Noronha Silva <gns@gnome.org> on 2013-03-07.
      Reviewed by Martin Robinson.
      
      * GNUmakefile.am: adjust path for i18n GNUmakefile.am.
      * configure.ac: generate the i18n makefile unconditionally, the translations are
      used by both WebKitGTK+ and WebKit2GTK+.
      
      Source/WebCore:
      
      * GNUmakefile.am: distribute po files.
      * platform/gtk/po/POTFILES.in: adjust paths for translatable files.
      
      Source/WebCore/platform/gtk/po:
      
      * GNUmakefile.am: Renamed from Source/WebKit/gtk/po/GNUmakefile.am.
      * POTFILES.in: Renamed from Source/WebKit/gtk/po/POTFILES.in.
      * README: Renamed from Source/WebKit/gtk/po/README.
      * ar.po: Renamed from Source/WebKit/gtk/po/ar.po.
      * as.po: Renamed from Source/WebKit/gtk/po/as.po.
      * bg.po: Renamed from Source/WebKit/gtk/po/bg.po.
      * cs.po: Renamed from Source/WebKit/gtk/po/cs.po.
      * de.po: Renamed from Source/WebKit/gtk/po/de.po.
      * el.po: Renamed from Source/WebKit/gtk/po/el.po.
      * en_CA.po: Renamed from Source/WebKit/gtk/po/en_CA.po.
      * en_GB.po: Renamed from Source/WebKit/gtk/po/en_GB.po.
      * eo.po: Renamed from Source/WebKit/gtk/po/eo.po.
      * es.po: Renamed from Source/WebKit/gtk/po/es.po.
      * et.po: Renamed from Source/WebKit/gtk/po/et.po.
      * eu.po: Renamed from Source/WebKit/gtk/po/eu.po.
      * fr.po: Renamed from Source/WebKit/gtk/po/fr.po.
      * gl.po: Renamed from Source/WebKit/gtk/po/gl.po.
      * gu.po: Renamed from Source/WebKit/gtk/po/gu.po.
      * he.po: Renamed from Source/WebKit/gtk/po/he.po.
      * hi.po: Renamed from Source/WebKit/gtk/po/hi.po.
      * hu.po: Renamed from Source/WebKit/gtk/po/hu.po.
      * id.po: Renamed from Source/WebKit/gtk/po/id.po.
      * it.po: Renamed from Source/WebKit/gtk/po/it.po.
      * ko.po: Renamed from Source/WebKit/gtk/po/ko.po.
      * lt.po: Renamed from Source/WebKit/gtk/po/lt.po.
      * lv.po: Renamed from Source/WebKit/gtk/po/lv.po.
      * mr.po: Renamed from Source/WebKit/gtk/po/mr.po.
      * nb.po: Renamed from Source/WebKit/gtk/po/nb.po.
      * nl.po: Renamed from Source/WebKit/gtk/po/nl.po.
      * pa.po: Renamed from Source/WebKit/gtk/po/pa.po.
      * pl.po: Renamed from Source/WebKit/gtk/po/pl.po.
      * pt.po: Renamed from Source/WebKit/gtk/po/pt.po.
      * pt_BR.po: Renamed from Source/WebKit/gtk/po/pt_BR.po.
      * ro.po: Renamed from Source/WebKit/gtk/po/ro.po.
      * ru.po: Renamed from Source/WebKit/gtk/po/ru.po.
      * sl.po: Renamed from Source/WebKit/gtk/po/sl.po.
      * sr.po: Renamed from Source/WebKit/gtk/po/sr.po.
      * sr@latin.po: Renamed from Source/WebKit/gtk/po/sr@latin.po.
      * sv.po: Renamed from Source/WebKit/gtk/po/sv.po.
      * uk.po: Renamed from Source/WebKit/gtk/po/uk.po.
      * vi.po: Renamed from Source/WebKit/gtk/po/vi.po.
      * zh_CN.po: Renamed from Source/WebKit/gtk/po/zh_CN.po.
      
      Source/WebKit2:
      
      * GNUmakefile.am: define PACKAGE_LOCALE_DIR when building WebProcess's main module.
      * WebProcess/gtk/WebProcessMainGtk.cpp:
      (WebKit::WebProcessMainGtk): register the i18n domain name, and prefer UTF-8, since
      we're GTK+; at the moment we're just using the same name as WebKitGTK+, pro: the
      translation module can be reused, con: you can't have different versions of
      WebKitGTK+ and WebKit2GTK+ installed, because the module would not be fit for reuse
      in that case.
      * UIProcess/Launcher/gtk/ProcessLauncherGtk.cpp:
      (WebKit::childSetupFunction): do not set LC_ALL environment variable explicitly,
      the child process will already inherit the environment of the parent, which should
      have all the variables set properly.
      
      git-svn-id: http://svn.webkit.org/repository/webkit/trunk@145081 268f45cc-cd09-0410-ab3c-d52691b4dbfc
      08382c14
    • commit-queue@webkit.org's avatar
      Web Inspector: [CodeMirror] update codemirror to version 3.1 · 8f04b186
      commit-queue@webkit.org authored
      https://bugs.webkit.org/show_bug.cgi?id=111711
      
      Patch by Andrey Lushnikov <lushnikov@chromium.org> on 2013-03-07
      Reviewed by Vsevolod Vlasov.
      
      Update code mirror experimental editor to version 3.1
      
      No new tests.
      
      * inspector/front-end/cm/codemirror.css:
      (.CodeMirror div.CodeMirror-cursor):
      (.CodeMirror div.CodeMirror-secondarycursor):
      (.CodeMirror.cm-keymap-fat-cursor div.CodeMirror-cursor):
      (.CodeMirror.cm-keymap-fat-cursor div.CodeMirror-cursor:not(#nonsense_id)):
      (.CodeMirror div.CodeMirror-cursor.CodeMirror-overwrite):
      (.CodeMirror-gutters):
      (.CodeMirror-linewidget):
      (.CodeMirror-widget):
      (.CodeMirror-focused div.CodeMirror-cursor):
      (@media print):
      * inspector/front-end/cm/codemirror.js:
      (window.CodeMirror):
      (window.CodeMirror.):
      
      git-svn-id: http://svn.webkit.org/repository/webkit/trunk@145080 268f45cc-cd09-0410-ab3c-d52691b4dbfc
      8f04b186
    • commit-queue@webkit.org's avatar
      OpenGLShims: fix check for ANGLE GLES2 extensions · a6a4fb6d
      commit-queue@webkit.org authored
      https://bugs.webkit.org/show_bug.cgi?id=111656
      
      Patch by Sergio Correia <sergio.correia@openbossa.org> on 2013-03-07
      Reviewed by Simon Hausmann.
      
      The check for ANGLE GLES2 extensions is currently being overriden
      with checks for APPLE extensions in lookupOpenGLFunctionAddress().
      
      No new tests. No user visible behavior changed.
      
      * platform/graphics/OpenGLShims.cpp:
      (WebCore::lookupOpenGLFunctionAddress):
      
      git-svn-id: http://svn.webkit.org/repository/webkit/trunk@145079 268f45cc-cd09-0410-ab3c-d52691b4dbfc
      a6a4fb6d
    • ddkilzer@apple.com's avatar
      Rename visible_units.h to VisibleUnits.h in WebCore.vcxproj.filters · 8bab1545
      ddkilzer@apple.com authored
      <http://webkit.org/b/111426>
      
      * WebCore.vcxproj/WebCore.vcxproj.filters: Rename visible_units.h
      to VisibleUnits.h and re-sort.
      
      git-svn-id: http://svn.webkit.org/repository/webkit/trunk@145078 268f45cc-cd09-0410-ab3c-d52691b4dbfc
      8bab1545
    • vsevik@chromium.org's avatar
      Web Inspector: Support a shortcut for reloading front-end in debug mode. · 840c3060
      vsevik@chromium.org authored
      https://bugs.webkit.org/show_bug.cgi?id=111709
      
      Reviewed by Pavel Feldman.
      
      Source/WebCore:
      
      * inspector/front-end/buildSystemOnly.js:
      * inspector/front-end/inspector.js:
      (WebInspector.documentKeyDown):
      
      Source/WebKit/chromium:
      
      * src/js/DevTools.js:
      
      git-svn-id: http://svn.webkit.org/repository/webkit/trunk@145077 268f45cc-cd09-0410-ab3c-d52691b4dbfc
      840c3060
    • vsevik@chromium.org's avatar
      Web Inspector: Support setting up file system mappings from scripts panel context menu. · 8b0cdef5
      vsevik@chromium.org authored
      https://bugs.webkit.org/show_bug.cgi?id=111583
      
      Reviewed by Pavel Feldman.
      
      Added context menu items to set up network - file system mappings from sources panel.
      Implemented mapping add/remove methods on Workspace.
      Added a dialog suggesting to reload front-end after making such changes.
      
      * English.lproj/localizedStrings.js:
      * inspector/front-end/FileSystemMapping.js:
      (WebInspector.FileSystemMappingImpl.prototype.fileSystemPath):
      * inspector/front-end/FileSystemProjectDelegate.js:
      (WebInspector.FileSystemWorkspaceProvider.prototype._fileSystemRemoved):
      (WebInspector.FileSystemWorkspaceProvider.prototype.fileSystemPath):
      * inspector/front-end/FilteredItemSelectionDialog.js:
      (WebInspector.FilteredItemSelectionDialog.prototype.onEnter):
      (WebInspector.FilteredItemSelectionDialog.prototype.setQuery):
      (WebInspector.SelectUISourceCodeDialog):
      (WebInspector.SelectUISourceCodeDialog.prototype.uiSourceCodeSelected):
      (WebInspector.SelectUISourceCodeDialog.prototype.filterProject):
      (WebInspector.SelectUISourceCodeDialog.prototype.filterUISourceCode):
      (WebInspector.SelectUISourceCodeDialog.prototype.selectItem):
      (WebInspector.SelectUISourceCodeDialog.prototype._uiSourceCodeAdded):
      (WebInspector.OpenResourceDialog):
      (WebInspector.OpenResourceDialog.prototype.uiSourceCodeSelected):
      (WebInspector.OpenResourceDialog.prototype.filterProject):
      (WebInspector.SelectUISourceCodeForProjectTypeDialog):
      (WebInspector.SelectUISourceCodeForProjectTypeDialog.prototype.uiSourceCodeSelected):
      (WebInspector.SelectUISourceCodeForProjectTypeDialog.prototype.filterProject):
      (WebInspector.SelectUISourceCodeForProjectTypeDialog.show):
      * inspector/front-end/ScriptsPanel.js:
      (WebInspector.ScriptsPanel.prototype._mapFileSystemToNetwork.mapFileSystemToNetwork):
      (WebInspector.ScriptsPanel.prototype._mapFileSystemToNetwork):
      (WebInspector.ScriptsPanel.prototype._removeNetworkMapping):
      (WebInspector.ScriptsPanel.prototype._mapNetworkToFileSystem.mapNetworkToFileSystem):
      (WebInspector.ScriptsPanel.prototype._mapNetworkToFileSystem):
      (WebInspector.ScriptsPanel.prototype.):
      (WebInspector.ScriptsPanel.prototype._appendUISourceCodeMappingItems):
      (WebInspector.ScriptsPanel.prototype._appendUISourceCodeItems):
      * inspector/front-end/SettingsScreen.js:
      (WebInspector.WorkspaceSettingsTab):
      (WebInspector.WorkspaceSettingsTab.prototype.wasShown):
      (WebInspector.WorkspaceSettingsTab.prototype._reset):
      * inspector/front-end/ViewportControl.js:
      (WebInspector.ViewportControl.prototype.refresh):
      * inspector/front-end/Workspace.js:
      (WebInspector.Workspace.prototype.addMapping):
      (WebInspector.Workspace.prototype.removeMapping):
      * inspector/front-end/externs.js:
      (WebInspector.suggestReload):
      * inspector/front-end/inspector.js:
      (WebInspector.suggestReload):
      
      git-svn-id: http://svn.webkit.org/repository/webkit/trunk@145076 268f45cc-cd09-0410-ab3c-d52691b4dbfc
      8b0cdef5
    • vsevik@chromium.org's avatar
      Web Inspector: Add support for frontend reloading · caa2bcfe
      vsevik@chromium.org authored
      https://bugs.webkit.org/show_bug.cgi?id=111727
      
      Reviewed by Pavel Feldman.
      
      This patch adds support for frontend reloading including:
        - making sure no messages are sent to backend once frontend started reloading
        - updating frontend url with up-to-date dockSide query parameter value.
      
      * inspector/front-end/InspectorBackend.js:
      (InspectorBackendClass.prototype.sendMessageObjectToBackend):
      (InspectorBackendClass.prototype.disconnect):
      * inspector/front-end/externs.js:
      (WebInspector.reload):
      * inspector/front-end/inspector.js:
      (WebInspector.reload):
      
      git-svn-id: http://svn.webkit.org/repository/webkit/trunk@145075 268f45cc-cd09-0410-ab3c-d52691b4dbfc
      caa2bcfe
    • commit-queue@webkit.org's avatar
      Web Inspector: Change profile start button caption depending on profile type. · 45364253
      commit-queue@webkit.org authored
      https://bugs.webkit.org/show_bug.cgi?id=111698
      
      Change the start profiling button caption to "Snapshot" for
      snapshot-like profile types, e.g. JS heap snapshot, native memory snapshot.
      
      Patch by Alexei Filippov <alph@chromium.org> on 2013-03-07
      Reviewed by Yury Semikhatsky.
      
      * English.lproj/localizedStrings.js:
      * inspector/front-end/HeapSnapshotView.js:
      (WebInspector.HeapSnapshotProfileType.prototype.isInstantProfile):
      * inspector/front-end/NativeMemorySnapshotView.js:
      (WebInspector.NativeSnapshotProfileType.prototype.isInstantProfile):
      (WebInspector.NativeMemoryProfileType.prototype.isInstantProfile):
      * inspector/front-end/ProfileLauncherView.js:
      (WebInspector.ProfileLauncherView):
      (WebInspector.ProfileLauncherView.prototype.addProfileType):
      (WebInspector.ProfileLauncherView.prototype._updateControls):
      (WebInspector.MultiProfileLauncherView.prototype._updateControls):
      (WebInspector.MultiProfileLauncherView.prototype._profileTypeChanged):
      * inspector/front-end/ProfilesPanel.js:
      (WebInspector.ProfileType.prototype.isInstantProfile):
      
      git-svn-id: http://svn.webkit.org/repository/webkit/trunk@145074 268f45cc-cd09-0410-ab3c-d52691b4dbfc
      45364253
    • bruno.abinader@basyskom.com's avatar
      [texmap] Remove direct access to clip state from clip stack · d7fd4c93
      bruno.abinader@basyskom.com authored
      https://bugs.webkit.org/show_bug.cgi?id=111630
      
      Reviewed by Allan Sandfeld Jensen.
      
      As we are now monitoring the clip state from
      TextureMapperGL/BitmapTextureGL, have direct access to clip state object
      would eventually make it dirty without properly setting the
      'clipStateDirty' flag. This bug intends to substitute direct access with
      auxiliary functions which would set the clip state dirty when necessary.
      
      No new tests. No user visible behavior changed.
      
      * platform/graphics/texmap/TextureMapperGL.cpp:
      (WebCore::TextureMapperGL::ClipStack::intersect):
      (WebCore::TextureMapperGL::ClipStack::setStencilIndex):
      (WebCore::TextureMapperGL::drawBorder):
      (WebCore::TextureMapperGL::drawTexture):
      (WebCore::TextureMapperGL::beginScissorClip):
      (WebCore::TextureMapperGL::beginClip):
      Replaced direct access with auxiliary functions.
      
      * platform/graphics/texmap/TextureMapperGL.h:
      (ClipStack): Removed ClipStack::current() function.
      (WebCore::TextureMapperGL::ClipStack::getStencilIndex): Added.
      (WebCore::TextureMapperGL::ClipStack::isCurrentScissorBoxEmpty): Added.
      
      
      git-svn-id: http://svn.webkit.org/repository/webkit/trunk@145073 268f45cc-cd09-0410-ab3c-d52691b4dbfc
      d7fd4c93