| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
|
|
|
|
|
|
| |
Submodule src/3rdparty c8087cb6..9f71911e:
> [Backport] CVE-2021-30560: Use after free in Blink XSLT
Task-number: QTBUG-94103
Change-Id: I3e43653b6b3370d71b09b52a781a3b1d6c82293e
Reviewed-by: Allan Sandfeld Jensen <allan.jensen@qt.io>
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Submodule src/3rdparty 24fe4f70..c8087cb6:
> [Backport] CVE-2021-30566: Stack buffer overflow in Printing
> [Backport] CVE-2021-30585: Use after free in sensor handling
> Bump V8_PATCH_LEVEL
> [Backport] Security bug 1228036
> [Backport] CVE-2021-30604: Use after free in ANGLE
> [Backport] CVE-2021-30603: Race in WebAudio
> [Backport] CVE-2021-30602: Use after free in WebRTC
> [Backport] CVE-2021-30599: Type Confusion in V8
> [Backport] CVE-2021-30598: Type Confusion in V8
> [Backport] Security bug 1227933
> [Backport] Security bug 1205059
> [Backport] Security bug 1184294
> [Backport] Security bug 1198385
> [Backport] CVE-2021-30588: Type Confusion in V8
> [Backport] CVE-2021-30587: Inappropriate implementation in Compositing on Windows
> [Backport] CVE-2021-30573: Use after free in GPU
> [Backport] CVE-2021-30569, security bugs 1198216 and 1204814
> [Backport] CVE-2021-30568: Heap buffer overflow in WebGL
> [Backport] CVE-2021-30541: Use after free in V8
> [Backport] Security bugs 1197786 and 1194330
Task-number: QTBUG-94103
Task-number: QTBUG-95581
Change-Id: I1900426d64727fc065d438a0e4b3b9e916d537c0
Reviewed-by: Allan Sandfeld Jensen <allan.jensen@qt.io>
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Submodule src/3rdparty 5db4492a..24fe4f70:
> [Backport] Security bug 1194689
> [Backport] CVE-2021-30563: Type Confusion in V8
> [Backport] Security bug 1211215
> [Backport] Security bug 1209558
> [Backport] CVE-2021-30553: Use after free in Network service
> [Backport] CVE-2021-30548: Use after free in Loader
> [Backport] CVE-2021-30547: Out of bounds write in ANGLE
> [Backport] CVE-2021-30556: Use after free in WebAudio
> [Backport] CVE-2021-30559: Out of bounds write in ANGLE
> [Backport] CVE-2021-30533: Insufficient policy enforcement in PopupBlocker
> [Backport] Security bug 1202534
> [Backport] CVE-2021-30536: Out of bounds read in V8
Task-number: QTBUG-94103
Change-Id: I500b3258a90ea4f5d932777b9f217b6da1b8778c
Reviewed-by: Michal Klocek <michal.klocek@qt.io>
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Submodule src/3rdparty 7948becb..5db4492a:
> [Backport] CVE-2021-30522: Use after free in WebAudio
> [Backport] CVE-2021-30554 Use after free in WebGL
> [Backport] CVE-2021-30551: Type Confusion in V8
> [Backport] CVE-2021-30544: Use after free in BFCache
> [Backport] CVE-2021-30535: Double free in ICU
> [Backport] CVE-2021-30534: Insufficient policy enforcement in iFrameSandbox
> [Backport] CVE-2021-30530: Out of bounds memory access in WebAudio
> [Backport] CVE-2021-30523: Use after free in WebRTC
Task-number: QTBUG-94103
Change-Id: Ib1d77dae4c4b0f98f3eaf99442159374b8003fe7
Reviewed-by: Michal Klocek <michal.klocek@qt.io>
|
|
|
|
|
|
|
|
| |
Submodule src/3rdparty eaffb82d..7948becb:
> Generate mojo bindings before compiling extension API registration
Change-Id: Ie01368c9a082142801f0d0f8672ed7461631cfa1
Reviewed-by: Peter Varga <pvarga@inf.u-szeged.hu>
|
|
|
|
|
|
|
|
|
|
| |
The input event router does not like MayBegin.
Fixes: QTBUG-93082
Change-Id: I4ac9677d7f69da3d36fc33c17541026f011feb42
Reviewed-by: Michael Brüning <michael.bruning@qt.io>
(cherry picked from commit 588ea0d45f983f70e707a502cb4f3e429bbd3876)
Reviewed-by: Qt Cherry-pick Bot <cherrypick_bot@qt-project.org>
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Submodule src/3rdparty dc35950b..eaffb82d:
> [Backport] Security bug 1201938
> [Backport] Security bug 1201340
> [Backport] Security bug 1195331
> [Backport] Security bug 1204071
> [Backport] CVE-2021-30518: Heap buffer overflow in Reader Mode
> [Backport] CVE-2021-30516: Heap buffer overflow in History.
> [Backport] CVE-2021-30515: Use after free in File API
> [Backport] CVE-2021-30513: Type Confusion in V8
> [Backport] CVE-2021-30512: Use after free in Notifications
> [Backport] CVE-2021-30510: Race in Aura
> [Backport] CVE-2021-30508: Heap buffer overflow in Media Feeds
> Workaround revoked certificate check on Linux
Fixes: QTBUG-92895
Change-Id: Ib83f18a256822a2a6feb5dcdd1df7e933a2dd271
Reviewed-by: Allan Sandfeld Jensen <allan.jensen@qt.io>
|
|
|
|
|
|
|
|
|
|
| |
Speculative fix.
Add custom qtwebengine mojo_bindings as a dependency for compiling
chrome sources.
Change-Id: I930a8c94b8ffe02188659169fd9f27c99f42fb0b
Reviewed-by: Allan Sandfeld Jensen <allan.jensen@qt.io>
|
|
|
|
|
|
|
|
|
|
|
| |
Submodule src/3rdparty 1d3b13e9..dc35950b:
> FIXUP: third_party perfetto: add missing include for clang, asan and no_pch
> Bump V8_PATCH_LEVEL
> Fix build with GCC 11
Fixes: QTBUG-93744
Change-Id: If79bfb844f03052eab4d11018f07357b383626a7
Reviewed-by: Kirill Burtsev <kirill.burtsev@qt.io>
|
|
|
|
|
|
| |
Fixes: QTBUG-93304
Change-Id: If2f30aab1c6a6eb81cfbad51318ec31adf5e96b6
Reviewed-by: Allan Sandfeld Jensen <allan.jensen@qt.io>
|
|
|
|
|
| |
Change-Id: If2445171232864cb4ac51888ccc93bc00cb099a2
Reviewed-by: Allan Sandfeld Jensen <allan.jensen@qt.io>
|
|
|
|
|
|
|
|
|
|
|
| |
Pulls in the following changes:
Submodule src/3rdparty 6c7b4ffb..1d3b13e9
> 1d3b13e9634 Make clang to inline load/store atomic calls for YieldSortKey struct
> f6730fe81a0 Enable XkbKeyboardLayoutEngine::SetCurrentLayoutByName for Qt
Fixes: QTBUG-92971
Change-Id: I0c0cddfe4d3e25fd6d3f7e0764b302c300303172
Reviewed-by: Allan Sandfeld Jensen <allan.jensen@qt.io>
|
|
|
|
|
|
|
| |
If they use NORMAL, then we should too.
Change-Id: I252b4606c692ba483434c126fcda3a7484f399e2
Reviewed-by: Jüri Valdmann <juri.valdmann@qt.io>
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
It was added to suppress progress notification for error page load
after failure, but since error page load is reported as a new navigation
(which clears list of tracked frames), it was actually doing the
opposite thing. The only situation where it suppresses progress is when
navigation was not finished (due to invalid domain or network error),
but in this case it was real progress change for whole load which should
propagate further.
Change-Id: Ifd1d681fb5c6495fb3afdc4247364afb4472c959
Reviewed-by: Allan Sandfeld Jensen <allan.jensen@qt.io>
Reviewed-by: Peter Varga <pvarga@inf.u-szeged.hu>
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
This change tries to match how chromium treats one single load. Before
the pair of loadStarted/loadFinished methods for api classes was called
on delegate's DidStartNavigation/DidFinishNavigation, which might be many
within one single logical load. This is true for multiple usecases (like
multiple redirects on load, immediate form submit on DOM load, page's
subresource load, or just an error page load on failure). Tracking these
methods and deciding when to emit signals based on states are error-prone
and complicates logic for no benefits. Also it somewhat lies about when
real load is done, which is only started and finished on outer methods
DidStartLoading/DidStopLoading, which are conveniently called only once
for all mentioned usecases. So, this change uses these methods to issue
signals for load start/finish, and only makes exception for error page,
which is needed for quick's private test support.
Fixes: QTBUG-65223
Fixes: QTBUG-76802
Fixes: QTBUG-87089
Fixes: QTBUG-90342
Fixes: QTBUG-91773
Fixes: QTBUG-92063
Change-Id: I9cc99b639030fedd8cf6a9dc04d0869d6be6357d
Reviewed-by: Allan Sandfeld Jensen <allan.jensen@qt.io>
Reviewed-by: Peter Varga <pvarga@inf.u-szeged.hu>
|
|
|
|
|
|
|
| |
Task-number: QTBUG-76802
Change-Id: I38cd148706c0479ffbad1e0d2877adc1cad9038d
Reviewed-by: Peter Varga <pvarga@inf.u-szeged.hu>
Reviewed-by: Allan Sandfeld Jensen <allan.jensen@qt.io>
|
|
|
|
|
|
|
|
|
|
| |
This form of OCSP is not good, so try to at least allow it to be
disabled, until we remove it.
Fixes: QTBUG-91467
Change-Id: Ied9e8c4960e6ea1503dea39ebbced2ad1af08d5d
Reviewed-by: Qt CI Bot <qt_ci_bot@qt-project.org>
Reviewed-by: Peter Varga <pvarga@inf.u-szeged.hu>
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Submodule src/3rdparty 3f594ea1..6c7b4ffb:
> FIXUP: Avoid crashing on new window in cross-origin isolated content
> [Backport] Security bug 1198309
> [Backport] CVE-2021-21231: Insufficient data validation in V8
> [Backport] CVE-2021-21230: Type Confusion in V8
> [Backport] CVE-2021-21233: Heap buffer overflow in ANGLE
> [Backport] CVE-2021-21227: Insufficient data validation in V8
> Avoid crashing on new window in cross-origin isolated content
> Fix build with system ICU 69
Change-Id: Iab339abb1a34ce93e03f64608c6b5c5719f36fce
Reviewed-by: Jüri Valdmann <juri.valdmann@qt.io>
|
|\
| |
| |
| | |
Change-Id: I659eb87245dfd59f014a7ca152c9f261ad400238
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
Submodule src/3rdparty dd45b1a1..3f594ea1:
> [Backport] Security bug 1155297 (3/3)
> [Backport] Security bug 1155297 (2/3)
> [Backport] Security bug 1155297 (1/3)
> [Backport] Security bug 1192552
> [Backport] CVE-2021-21225: Out of bounds memory access in V8 (2/2)
> [Backport] CVE-2021-21225: Out of bounds memory access in V8 (1/2)
> [Backport] CVE-2021-21224: Type Confusion in V8
> [Backport] CVE-2021-21223: Integer overflow in Mojo
> [Backport] CVE-2021-21222: Heap buffer overflow in V8
Task-number: QTBUG-92895
Change-Id: I9c5c3aa451d8a4cab018e23a6407fd0e1f7a58de
Reviewed-by: Allan Sandfeld Jensen <allan.jensen@qt.io>
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
Submodule src/3rdparty c38ae3ec..dd45b1a1:
> [Backport] CVE-2021-21209: Inappropriate implementation in storage (5/5)
> [Backport] CVE-2021-21209: Inappropriate implementation in storage (4/5)
> [Backport] CVE-2021-21209: Inappropriate implementation in storage (3/5)
> [Backport] CVE-2021-21209: Inappropriate implementation in storage (2/5)
> [Backport] CVE-2021-21209: Inappropriate implementation in storage (1/5)
> [Backport] Security bug 1184441
> [Backport] Security bug 1162424
Task-number: QTBUG-92895
Change-Id: I04217fe2026d0087e4b7bd9bc6d5e8fcb5e25ebd
Reviewed-by: Allan Sandfeld Jensen <allan.jensen@qt.io>
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
Submodule src/3rdparty 6764c29f..c38ae3ec:
> [Backport] Security bug 1190525
> [Backport] Security bug 1161759
> [Backport] Security bug 1175503
> [Backport] Security bugs 1175522 and 1181276
> [Backport] CVE-2021-21219: Uninitialized Use in PDFium
> [Backport] CVE-2021-21217 and CVE-2021-21218: Uninitialized Use in PDFium
> [Backport] CVE-2021-21214: Use after free in Network API
> [Backport] CVE-2021-21213: Use after free in WebMIDI
> [Backport] CVE-2021-21207: Use after free in IndexedDB
> [Backport] CVE-2021-21221: Insufficient validation of untrusted input in Mojo
> [Backport] CVE-2021-21204: Use after free in Blink.
> [Backport] CVE-2021-21203: Use after free in Blink
> [Backport] CVE-2021-21202: Use after free in extensions.
> [Backport] CVE-2021-21201: Use after free in permissions
Task-number: QTBUG-92895
Change-Id: I7e6f3d443366bb291cab027510f76788c14fc023
Reviewed-by: Allan Sandfeld Jensen <allan.jensen@qt.io>
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
A server redirect might not have been reflected in the navigation type
at this point, so also check the is_redirect value.
Fixes: QTBUG-92819
Change-Id: I711ef041de69552bc3485c9cf3db68c9e6033d6a
Reviewed-by: Allan Sandfeld Jensen <allan.jensen@qt.io>
Reviewed-by: Kirill Burtsev <kirill.burtsev@qt.io>
(cherry picked from commit b29b245fcb9db741d14180ea7e8dcb3ad2d4f49a)
Reviewed-by: Qt Cherry-pick Bot <cherrypick_bot@qt-project.org>
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
When printing with the default resolution of QPrinter, rasterized images
of pages are just too small to produce sharp result. Documentation of
QPrinter also mentions that the default ScreenResolution should
only be used for drafts.
Change-Id: I5fe93f7985d16b1126cf2bbcb9b4a4ddbdfd21f2
Task-number: QTBUG-92185
Reviewed-by: Allan Sandfeld Jensen <allan.jensen@qt.io>
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
Different countries (with the same language) can have different number
formatting and navigator.language should report not only the language,
but also the country. Locale normalization often falls back by cutting
the country off, because we have common .pak files for countries with
the same language.
This patch:
- Uses the locale resolvation only for concatenating .pak file paths
and reports the full locale everywhere else.
- Properly sets default ICU locale for JS number formats and prevents
l10n_util::GetApplicationLocale() to set it sneakily to some resolved
one.
- Fixes the crashing --lang command line argument and always prefers
its value over QLocale.
Task-number: QTBUG-91225
Change-Id: I1c09798abdb523b80f0b7a3d69fa8d7a08c7c09a
Reviewed-by: Kirill Burtsev <kirill.burtsev@qt.io>
|
|/
|
|
|
|
|
|
|
|
|
| |
A server redirect might not have been reflected in the navigation type
at this point, so also check the is_redirect value.
Pick-to: 5.15.4
Fixes: QTBUG-92819
Change-Id: I711ef041de69552bc3485c9cf3db68c9e6033d6a
Reviewed-by: Allan Sandfeld Jensen <allan.jensen@qt.io>
Reviewed-by: Kirill Burtsev <kirill.burtsev@qt.io>
|
|
|
|
|
|
|
|
|
|
| |
Stop using SiteForCookies::RepresentativeUrl() if it is used to provide
first party url because it returns a truncated URL and our API is expected
to return the full url of the first party.
Fixes: QTBUG-90231
Change-Id: I628f7f31bfbeaf3de976ae9af1a8fa6408b661c5
Reviewed-by: Kirill Burtsev <kirill.burtsev@qt.io>
|
|
|
|
|
|
|
|
|
|
|
|
| |
Submodule src/3rdparty d13920f2..048f5e99:
> [Backport] CVE-2021-21220: Insufficient validation of untrusted input in V8 for x86_64
> [Backport] CVE-2021-21206: Use after free in Blink
> Fix build with no extensions on mac
Task-number: QTBUG-92080
Change-Id: I0265d3992ac3ec7fe0f55405daf58d1fc2789b12
Reviewed-by: Allan Sandfeld Jensen <allan.jensen@qt.io>
|
|
|
|
|
| |
Change-Id: Iafdfb3c740ce42119a9891729be1ea0c89249039
Reviewed-by: Michael Brüning <michael.bruning@qt.io>
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
When using QtWebView with WebEngine then it will hook the call to
QtWebEngine::initialize() to the start up of the application object which
means it will output the warning because it already exists. However
there is still time at this point to set what is needed because it is
still being initialized. So by checking if the application is running
(i.e. !startingUp()) then we can be safe in knowing that it is still
able to do the initialization.
Change-Id: I8c5d8808b4b09e1e7bbf4be52e5efc0786ce1472
Reviewed-by: Allan Sandfeld Jensen <allan.jensen@qt.io>
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Cover all cases from https://pdfobject.com/static
- Plugin placeholder is generally broken: displays garbage and crashes
on interaction. Fix it and show when PDFs are included by <embed>
or <object> tags.
- Do not start an automatical download when the disabled PDF plugin
was requested by an iframe. Show a clickable placeholder and let the
end-users start it manually.
- Remove unused class PluginPlaceholderQt
Task-number: QTBUG-76314
Change-Id: I01a0c93ab23f54e4272f5aeb30578de0dcf18932
Reviewed-by: Allan Sandfeld Jensen <allan.jensen@qt.io>
|
|
|
|
|
|
|
|
|
|
|
| |
Since 42b5da qtbase supports an installation of 3rdpaty
in case of static builds. Depend on 'public' qtbase 3rdparty
installed libs. This fixes prl generation by not including
build paths.
Task-number: QTBUG-91385
Change-Id: Ib0609b2b92d6759aad639154617b45fc2fe96916
Reviewed-by: Alexandru Croitor <alexandru.croitor@qt.io>
|
|
|
|
|
|
|
|
|
|
|
| |
Use correct qt zlib lib in case of windows.
Passing qtzlib is actually just done in shake of clarity
and proper dependency tracking since qtCore is most likely
always a dependency for any user app.
Fixes: QTBUG-91476
Change-Id: I20816ebf926472c642847e2611797a6decdeecee
Reviewed-by: Joerg Bornemann <joerg.bornemann@qt.io>
|
|
|
|
|
|
|
|
|
| |
Fix duplicated symbols for category logging between
core and qml plugin.
Task-number: QTBUG-91476
Change-Id: I532ad35b8b0e8a0b93e51b9b7a7b3a4602fad9b3
Reviewed-by: Shawn Rutledge <shawn.rutledge@qt.io>
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Submodule update src/3rdparty 8d49f9a2..d13920f2:
> [Backport] Security bug 1185482
> [Backport] Security bug 1161847
> [Backport] Security bug 1161379
> [Backport] CVE-2021-21198: Out of bounds read in IPC
> [Backport] CVE-2021-21195: Use after free in V8
Task-number: QTBUG-92080
Change-Id: I638a0fa0285d46736cfbf5406874702bd3600580
Reviewed-by: Jüri Valdmann <juri.valdmann@qt.io>
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Submodule src/3rdparty 6ec3297a..9d237e39:
> Fixup for: [Backport] Security bug 1062941
> [Backport] CVE-2021-21193: Use after free in Blink
> [Backport] CVE-2021-21191: Use after free in WebRTC
> [Backport] Security bug 1161048
> [Backport] Security bug 1155710
> [Backport] Security bug 1062941
> [Backport] Security bug 1142712 (2/2)
> [Backport] Security bug 1142712 (1/2)
> [Backport] Security bug 1146813 (2/2)
> [Backport] Security bug 1146813 (1/2)
> [Backport] CVE-2021-21166: Object lifecycle issue in audio
> [Backport] CVE-2021-21187: Insufficient data validation in URL formatting
> [Backport] CVE-2021-21183 and CVE-2021-21184: Inappropriate implementation in performance APIs
> [Backport] CVE-2020-27844: Heap buffer overflow in OpenJPEG
> Fix crashes when webrtc is not compiled in
Task-number: QTBUG-92080
Change-Id: Ifaac3e24a5f0cacb8ba783f453ae30c8ae5e9abf
Reviewed-by: Qt CI Bot <qt_ci_bot@qt-project.org>
Reviewed-by: Jüri Valdmann <juri.valdmann@qt.io>
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Submodule src/3rdparty 302379ca..79f989b8:
> Build fix for "[Backport] CVE-2021-21160..." with gcc
> [Backport] CVE-2021-21160: Heap buffer overflow in WebAudio
> [Backport] CVE-2021-21173: Side-channel information leakage in Network Internals.
> [Backport] CVE-2021-21190: Uninitialized Use in PDFium
> [Backport] CVE-2021-21188: Use after free in Blink.
> [Backport] CVE-2021-21178: Inappropriate implementation in Compositing
> [Backport] CVE-2021-21175: Inappropriate implementation in Site isolation
> [Backport] CVE-2021-21174: Inappropriate implementation in Referrer.
> [Backport] CVE-2021-21172: Insufficient policy enforcement in File System API
> [Backport] CVE-2021-21171: Incorrect security UI in TabStrip and Navigation
> [Backport] CVE-2021-21169: Out of bounds memory access in V8 (2/2)
> [Backport] CVE-2021-21169: Out of bounds memory access in V8 (1/2)
> [Backport] CVE-2021-21168: Insufficient policy enforcement in appcache
> [Backport] CVE-2021-21165: Object lifecycle issue in audio
> [Backport] CVE-2021-21162: Use after free in WebRTC
> [Backport] CVE-2021-21179: Use after free in Network Internals
> [Backport] Security bug 1175975
> [Backport] Security bug 1167277
> [Backport] Security bug 1180871
> Fix WebRtcLoggingController for QtWebEngine
Task-number: QTBUG-92080
Change-Id: I8578ea4a3fe13b9e5a3e6ed01f8fe9d3053353fc
Reviewed-by: Kirill Burtsev <kirill.burtsev@qt.io>
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Current implementation cancels current findText only when new navigation
is accepted (since it may be rejected all together), so it's not guaranteed
that user code will not receive completion callback if it arrives after
explicit load/setContent/setHtml but before acceptNavigationRequest.
For explicit navigation it doesn't make sense to wait until it's
accepted, since it's only exposed there just for consistency, and an
expectation for findText is that it should be canceled on new navigation.
Fixes: QTBUG-61887
Change-Id: Ia2e19df3b5712e6b5426443d1bce6b205e186668
Reviewed-by: Peter Varga <pvarga@inf.u-szeged.hu>
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Before, QQuickWebEngineView's canGoBack/canGoForward change signals
are based on urlChanged. But the urlChanged signal may be emitted
slightly before the value of canGoBack/canGoForwad actually changes,
resulting in a missed change notification.
After, they get their own signals, which are forwarded from the
QQuickWebEngineAction::enabledChanged signal of the respective web
actions.
Fixes: QTBUG-91565
Change-Id: Id411eb146c776e2824fd2447660e8857974da32e
Reviewed-by: Allan Sandfeld Jensen <allan.jensen@qt.io>
|
|
|
|
|
|
|
| |
Fixes: QTBUG-91695
Change-Id: Ie00b9bb92b62b97c500d427defbf2a4632ddbeda
Reviewed-by: Florian Bruhin <qt-project.org@the-compiler.org>
Reviewed-by: Michal Klocek <michal.klocek@qt.io>
|
|
|
|
|
|
|
|
| |
This includes the screencast mode that now works.
Task-number: QTBUG-85171
Change-Id: I11f6fc11db8066a88880df3277e5613db65ae5a5
Reviewed-by: Michael Brüning <michael.bruning@qt.io>
|
|
|
|
|
|
|
|
|
|
|
| |
Submodule src/3rdparty 7c8217b3..302379ca:
> Fix multiple include dirs
> Revert "Use devtools app for Qt"
> Prepare net-internals for QtWebEngine usage
Task-number: QTBUG-91799
Change-Id: I527fd06a1f3f142cafb098d93ee3bfc0026984f9
Reviewed-by: Michal Klocek <michal.klocek@qt.io>
|
|
|
|
|
|
|
|
|
|
|
| |
Submodule src/3rdparty d9d9e606..7c8217b3:
> [Backport] Remove mouse wheel handler DCHECK
> PDF viewer: Restore createBrowserApi() function
> [Backport] CVE-2021-21138: Use after free in DevTools
Change-Id: I1190e71d109c98285a57365f8ed1315b50895da1
Reviewed-by: Szabolcs David <davidsz@inf.u-szeged.hu>
Reviewed-by: Kirill Burtsev <kirill.burtsev@qt.io>
|
|
|
|
|
|
|
|
|
| |
Use the internal Chromium routine to get the app locale Chromium
expects.
Fixes: QTBUG-91715
Change-Id: I5042eb066cb6879ad69628959912f2841867b4e8
Reviewed-by: Michael Brüning <michael.bruning@qt.io>
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
When the QWebEnginePage changed on a QWebEngineView, all signal connec-
tions between the view and the previous page were removed as well, even
those that the user connected themself.
To prevent unexpected behavior, only disconnect the signals that the
view connected to automatically and leave the rest of the connections
intact when the page on the view is changed.
Fixes: QTBUG-90509
Change-Id: Icac3e3be0b598dec8107e8fffdf7f25dd88a4b71
Reviewed-by: Michal Klocek <michal.klocek@qt.io>
|
|
|
|
|
|
|
| |
We do build snapshot_aura.cc (Linux) and ui/snapshot_win.cc (Windows).
Change-Id: I8b0459a761b76a411371ea175103bd7e864d6417
Reviewed-by: Allan Sandfeld Jensen <allan.jensen@qt.io>
|
|
|
|
|
|
| |
Fixes: QTBUG-53593
Change-Id: Ic330875c3ca3ebe460a166ac815dbf2e052143c2
Reviewed-by: Michael Brüning <michael.bruning@qt.io>
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Let Chromium know about the status of plugin availability from
WebEngineSettings. This way it can decide whether the response is
a download and it has more benefits:
- It doesn't have to start a new load request to download a PDF file,
it just treats the original response accordingly.
- Fixes websites which are protected from cross-domain requests (e.g. by
checking the Referer header) and/or redirecting requests for PDFs.
Calling DownloadManager "manually" and not passing the original request
headers did not work when the server relied on them.
Task-number: QTBUG-78114
Change-Id: I8cfa90c211418001c60c4b2f0f8818ee453101fc
Reviewed-by: Allan Sandfeld Jensen <allan.jensen@qt.io>
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
This is the basic support of guest views, implemented based
on Chrome.
- Embed PDF as a child frame instead of navigating to its
extension WebUI. Keep the original URL (pointing to the file) to
extend functionality of PDF viewer with URL parameters.
- Make RenderWidgetHostInputEventRouter to work and modify most of
the event forwarding logic to use that. This way WebEngine supports
pages with multiple RenderWidgetHost and guest views can be
interactive with user input.
[ChangeLog] PDF files are opened as embedded objects, WebEngine
will not navigate the content away from the requested file to
present it. PDF viewer can accept URL parameters (e.g. to control
zooming or fitting to view). Also, PDF viewer is interactive
when displayed in a subframe.
Task-number: QTBUG-80463
Task-number: QTBUG-86152
Task-number: QTBUG-90712
Change-Id: Ib1591fbd9a594891cdeace8e9dae0d3cc21a9f8e
Reviewed-by: Allan Sandfeld Jensen <allan.jensen@qt.io>
|
|
|
|
|
|
| |
Fixes: QTBUG-91257
Change-Id: Ic303278e2b8871e6bcb3f4f5c5810c8f43371bb8
Reviewed-by: Allan Sandfeld Jensen <allan.jensen@qt.io>
|