Commit Graph

17057 Commits

Author SHA1 Message Date
Dragana Damjanovic
2a013cc260 Bug 1515459 - Check if we reenter CreateShimError. r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D15297

--HG--
extra : moz-landing-system : lando
2019-01-08 20:40:35 +00:00
Paolo Amadini
ffa6503244 Bug 983187 - Test that downloads fail when an RST packet is received. r=mayhemer
This adds a way to simulate failed network connections, allowing the addition of test coverage that would otherwise not be available. This is used in the Downloads tests to ensure that failures at the network level are handled correctly.

Differential Revision: https://phabricator.services.mozilla.com/D15522

--HG--
extra : rebase_source : 2597b27de5213b0322520cefafe10a197d0d3b83
2019-01-09 11:48:23 +00:00
Michal Novotny
1ac8081516 Bug 1513676 - Twice-reported memory allocations in CacheStorageService code, r=honzab
Do not report malloc size of CacheIOThread::mThread, because it can be reported by ThreadsReporter.

--HG--
extra : rebase_source : b077f80a82c5df70f1b3f267f7718f1ad7f94ea1
2019-01-08 16:38:00 +02:00
Andrea Marchesini
10799b6b03 Bug 1513300 - Implement Cryptomining URL-Classifier, r=dimi 2019-01-09 12:16:04 +01:00
Andrea Marchesini
0c34bd1c34 Bug 1513298 - Fingerprinting url-classifier feature, r=dimi 2019-01-09 12:16:04 +01:00
Noemi Erli
ac42324894 Backed out changeset 76f3be6b25e1 (bug 1513298) for ES lint failure in test_fingerprinting.html CLOSED TREE 2019-01-09 12:15:44 +02:00
Andrea Marchesini
f10ced4f9d Bug 1513298 - Fingerprinting url-classifier feature, r=dimi 2019-01-08 23:05:41 +01:00
Andrea Marchesini
d4de202543 Bug 1517308 - Add a search field in about:url-classifier - part 1 - nsIUrlClassifier.getFeatureNames(), r=dimi 2019-01-08 23:05:40 +01:00
Michal Novotny
f0e2bfb56c Bug 1479357 - Specific values for browser.cache.disk.capacity do break the cache, r=mayhemer
This patch changes all size limits in CacheObserver to kilobytes. The same unit is used at most places when checking these limits. This avoids uint32_t overflow when converting to bytes and back.
2019-01-08 16:28:00 +02:00
Andrea Marchesini
7728c152a2 Bug 1417463 - Default accept header should follow the fetch spec - tests, r=mayhemer 2019-01-08 23:36:17 +01:00
Andrea Marchesini
5752cef527 Bug 1417463 - Default accept header should follow the fetch spec, r=mayhemer
For navigation: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
For images: image/png,image/svg+xml,image/*;q=0.8,*/*;q=0.5
for style: text/css,*/*;q=0.1
Anything else: */*
2019-01-08 23:36:16 +01:00
Valentin Gosu
55d58519a7 Bug 1517542 - Fail URL deserialization if query or ref start at position 0 r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D15854

--HG--
extra : moz-landing-system : lando
2019-01-08 15:00:05 +00:00
Tom Schuster
82d1aa2207 Bug 1510223 - Test for MIME type warning. r=ckerschb,nchevobbe
Turns out we also produced an error instead of a warnings.
Good that we added those test \o/

Differential Revision: https://phabricator.services.mozilla.com/D15659

--HG--
extra : moz-landing-system : lando
2019-01-08 12:28:32 +00:00
Oana Pop Rus
3adbeba770 Merge mozilla-inbound to mozilla-central. a=merge 2019-01-08 12:13:02 +02:00
Dragana Damjanovic
7bdd6628ba Bug 1514688 - In case we already have a h2 connection and it does not support websockets, we should not try again to use websockets over h2. r=michal
There are 2 parts of the patch:
1) we should not try to use websockets over h2 if we already know that they are not supported.
2) make sure that we clean up websockets waiting for the settings frame when we close a h2 connection. (the part 1) will fix the issue, this part is only to be 100% that we some how do not retrigger the issue)

Differential Revision: https://phabricator.services.mozilla.com/D15296

--HG--
extra : moz-landing-system : lando
2019-01-07 23:09:35 +00:00
Ehsan Akhgari
b63debc2d4 Bug 1517014 - Part 1: Add nsIPermissionManager.testPermissionOriginNoSuffix(), an API for testing permissions using an origin string without the overhead of parsing it into a URI; r=nika
For consumers which have an origin string, currently they need to parse it into
a URI before they can call testPermission().  Internally, in the common case this
nsIURI* argument will be immediately converted back into the same origin string
in PermissionKey::CreateFromURI().  This means that the cost of parsing the
original origin string will effectively end up being wasted in the common case.

This patch adds an API that allows the consumer to test a permission using the
origin string directly, and only parse it into an nsIURI when necessary, thereby
avoiding this overhead.

Differential Revision: https://phabricator.services.mozilla.com/D15543

--HG--
extra : moz-landing-system : lando
2019-01-07 18:45:26 +00:00
Csoregi Natalia
4eda4d34c0 Merge mozilla-central to mozilla-inbound. CLOSED TREE 2019-01-07 23:51:06 +02:00
Jeff Walden
a128f0c35c Bug 1517624 - Move JSPropertySpec and JSFunctionSpec definitions into a new js/public/PropertySpec.h header. r=arai
--HG--
extra : rebase_source : b80911e01f984ee9f99fbbc6c4552ef3d2178587
2019-01-03 15:37:01 -06:00
Andrea Marchesini
4712d40e55 Bug 1514697 - Lazy loading for URL-Classifier features, r=dimi 2019-01-05 09:11:06 +01:00
Andrea Marchesini
1aada62615 Bug 1515286 - Get rid of nsIURIClassifier.asyncClassifyLocalWithTables, r=dimi 2019-01-05 09:10:56 +01:00
Andrea Marchesini
7872e64c7c Bug 1515286 - Introduce nsIURIClassifier.getFeatureByName() and nsIURIClassifier.createFeatureWithTables(), r=dimi 2019-01-05 09:10:45 +01:00
shindli
ce5a0b424d Merge mozilla-central to inbound. a=merge CLOSED TREE 2019-01-05 06:09:57 +02:00
Jeff Walden
d084a5e469 Back out f8a29b8bb211, d1267711aef0, df1b7a886a9d, 0f6a3dd2c2f7, e6628922b7be, 0a374ac233cd, cf00fd0f080c, 6fc24c4e7798, ab2e4a2e5dd2, 2d17e4ef5e71, 4a8940073f8c, ea3ab4b83152, c7577c232591, e58454c68f0f, and 0e39815d1bce for breaking a single Android J10 and nothing else. (That J10 task must not like deck chairs...) r=bustage
--HG--
extra : rebase_source : f02dabe3ece7955cb223313d3605b825560c62b1
2019-01-04 16:33:01 -06:00
bitnotri
542ea80ecd Bug 1461737 - Move nsstring-rs to a better location, r=nika
Differential Revision: https://phabricator.services.mozilla.com/D15743

--HG--
rename : servo/support/gecko/nsstring/Cargo.toml => xpcom/rust/nsstring/Cargo.toml
rename : servo/support/gecko/nsstring/src/conversions.rs => xpcom/rust/nsstring/src/conversions.rs
rename : servo/support/gecko/nsstring/src/lib.rs => xpcom/rust/nsstring/src/lib.rs
extra : moz-landing-system : lando
2019-01-04 22:03:56 +00:00
Ciure Andrei
7a748ae68f Merge mozilla-central to autoland. a=merge CLOSED TREE 2019-01-04 01:03:06 +02:00
Boris Zbarsky
058f83508f Bug 1517434 part 2. Convert existing callers of GetIsSystemPrincipal() to IsSystemPrincipal(). r=mccr8
Differential Revision: https://phabricator.services.mozilla.com/D15673

--HG--
extra : moz-landing-system : lando
2019-01-03 20:55:38 +00:00
Jeff Walden
87aba62a4a Bug 1517624 - Move JSPropertySpec and JSFunctionSpec definitions into a new js/public/PropertySpec.h header. r=arai 2019-01-03 15:37:01 -06:00
Andrea Marchesini
647b040b0f Bug Bug 1515272 - Get rid of nsIURIClassifier.classifyLocal(), r=dimi, r=froydnj 2019-01-04 14:46:30 +01:00
Andrea Marchesini
e34612e16e Bug 1514202 - Port flash url-classifier to nsIUrlClassifierFeature - part 1 - Flash feature, r=dimi, r=edgar, r=valentin 2019-01-04 14:45:42 +01:00
Tom Schuster
008b6d8204 Bug 1510223 - Warn about scripts with wrong MIME type. r=ckerschb,nchevobbe
Differential Revision: https://phabricator.services.mozilla.com/D14859

--HG--
extra : moz-landing-system : lando
2019-01-03 08:58:48 +00:00
Ehsan Akhgari
60238893a6 Bug 1517057 - Part 2: Avoid minting a new codebase principal in the channel-based version of AntiTrackingCommon::IsFirstPartyStorageAccessGrantedFor() in the common case to make things faster; r=baku
Depends on D15547

Differential Revision: https://phabricator.services.mozilla.com/D15548

--HG--
extra : moz-landing-system : lando
2019-01-02 15:41:59 +00:00
Ehsan Akhgari
61338d3be7 Bug 1517057 - Part 1: Remove support for the unused URI_FORBIDS_COOKIE_ACCESS protocol flag; r=baku
Differential Revision: https://phabricator.services.mozilla.com/D15547

--HG--
extra : moz-landing-system : lando
2019-01-02 15:42:08 +00:00
ffxbld
7745a0ae89 No Bug, mozilla-central repo-update HSTS HPKP blocklist remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D15511

--HG--
extra : moz-landing-system : lando
2018-12-31 13:34:39 +00:00
Emilio Cobos Álvarez
d2ed260822 Bug 1517241 - Rename nsIDocument to mozilla::dom::Document. r=smaug
Summary: Really sorry for the size of the patch. It's mostly automatic
s/nsIDocument/Document/ but I had to fix up in a bunch of places manually to
add the right namespacing and such.

Overall it's not a very interesting patch I think.

nsDocument.cpp turns into Document.cpp, nsIDocument.h into Document.h and
nsIDocumentInlines.h into DocumentInlines.h.

I also changed a bunch of nsCOMPtr usage to RefPtr, but not all of it.

While fixing up some of the bits I also removed some unneeded OwnerDoc() null
checks and such, but I didn't do anything riskier than that.
2019-01-03 17:48:33 +01:00
Sylvestre Ledru
cccdda3c2a Bug 1516555 - Reformat everything to the Google coding style r=Ehsan
# ignore-this-changeset

Differential Revision: https://phabricator.services.mozilla.com/D15426

--HG--
extra : moz-landing-system : lando
2018-12-28 15:48:06 +00:00
Tom Schuster
8c3a7f7d61 Bug 1510241 - Proxy HttpChannel MIME blocking message to the child process. r=flod,dragana
Differential Revision: https://phabricator.services.mozilla.com/D14858

--HG--
extra : moz-landing-system : lando
2018-12-27 06:25:51 +00:00
Kris Maglione
39ae97e234 Bug 1515884: Remove unused XPCWrappedJS nsIPropertyBag implementation. r=bholley
This helper code is currently unused, and presents a pretty significant
footgun for any JS object which implements nsIPropertyBag itself.

When those objects are first queried to nsIWritablePropertyBag, they behave as
expected, returning the JS-implemented nsIPropertyBag methods. But when
they're first queried to nsIPropertyBag, they use the XPCWrappedNative stubs,
which don't behave as expected.

Differential Revision: https://phabricator.services.mozilla.com/D15235

--HG--
extra : rebase_source : 02942592dc8c4efcc1190610448a46593faa5703
2018-12-21 15:03:13 -08:00
Andrea Marchesini
301d9591cd Bug 1515693 - Check allow-storage-access-by-user-activation sandbox flag only if StorageAccess API is enabled, r=ehsan 2018-12-22 00:38:37 +01:00
Ehsan Akhgari
aa81b3cc6c Bug 1510860 - Ensure that the cookie service checks the content blocking allow list even for first-party cookies since that's required when we're blocking all cookies; r=baku
Differential Revision: https://phabricator.services.mozilla.com/D15109
2018-12-21 12:21:28 -05:00
Jeff Walden
ed23151bd7 Bug 1492937 - Make the JS subscript loader load scripts exclusively as UTF-8, with no way to specify any other encoding, and adjust a bunch of existing tests to use UTF-8 directly, rather than Unicode escape sequences or similar. (This also changes the encoding of .sjs scripts and all mochitest-browser tests in the tree from Latin-1 to UTF-8.) r=yzen, r=MattN, r=jimb, r=kmag 2018-12-19 13:46:20 -08:00
Nathan Froyd
6a08dde1cc Bug 1515194 - part 4 - un-aggregate nsLoadGroup; r=valentin
We no longer use the aggregation facility for nsLoadGroup, and removing
it saves approximately 10% of the space consumed by nsLoadGroup.
2018-12-19 10:08:28 -05:00
Nathan Froyd
e8ace34120 Bug 1515194 - part 3 - pack holes in nsLoadGroup better on 64-bit platforms; r=valentin
Due to member alignment rules on 64-bit platforms, nsLoadGroup has more
unused space than it should.  Shuffling members around a little to fill
in holes should make nsLoadGroup somewhat smaller.
2018-12-19 10:08:28 -05:00
Nathan Froyd
6e924db228 Bug 1515194 - part 2 - remove nsPILoadGroupInternal; r=valentin
We apparently had this for internal extension hooks that couldn't be
depended on externally...but now that interfaces aren't exposed to
addons, we can remove this no-op interface entirely.
2018-12-19 10:08:28 -05:00
Nathan Froyd
d7b6a23e76 Bug 1515194 - part 1 - remove nsLoadGroup::mTimedNonCachedRequestsUntilOnEndPageLoad; r=valentin
We only write to this variable and never read it.  The whole
nsPILoadGroupInternal interface looks like it could go away, actually;
we'll do that in a subsequent patch.
2018-12-19 10:08:28 -05:00
Tom Schuster
02af40ca25 Bug 1510225 - Refresh script MIME type telemetry again. r=dveditz datareview=chutten
Differential Revision: https://phabricator.services.mozilla.com/D14762

--HG--
extra : rebase_source : 7263d071a281c518cd2220fe2fe938f52265249b
2018-12-17 17:59:48 +01:00
Dragana Damjanovic
2ebce46fd8 Bug 1415625 - Use Telemetry::CanRecordPreReleaseData instead of toolkit.telemetry.enabled. Remove network.allow-experiments because it is not used. r=michal
Differential Revision: https://phabricator.services.mozilla.com/D12745

--HG--
extra : moz-landing-system : lando
2018-12-18 17:19:29 +00:00
Valentin Gosu
f9762144c9 Bug 1355207 - Wait for http server shutdown and disable test_host.js on OSX r=dragana
The test intermittently fails on OSX. For some reason start(PORT) doesn't always fail when PORT is in use, so we timeout because the handler is never called. I suspect it's because of how SO_REUSEADDR and SO_REUSEPORT are handled on sockets sever-side on OSX. Since httpd is used for unit tests, there is little risk in disabling the test on OSX.
The alternative is to check for a timeout, and in that case switch to another port - which is cumbersome, and not the purpose of the test.

Differential Revision: https://phabricator.services.mozilla.com/D14756

--HG--
extra : moz-landing-system : lando
2018-12-18 11:14:14 +00:00
Honza Bambas
25a593d03e Bug 1506821 - Redirect content is shown when redirecting to a blacklisted port. r=dragana 2018-12-14 09:25:00 -05:00
Andrea Marchesini
ce48e4ca2d Bug 1514441 - AsyncUrlChannelClassifier must keep a reference to the channel callback, r=dimi 2018-12-16 10:22:43 +01:00
Andrea Marchesini
b6a922c797 Bug 1514133 - Port Login-Reputation classification to nsIUrlClassifierFeature, r=dimi 2018-12-15 09:54:02 +01:00