Commit Graph

18116 Commits

Author SHA1 Message Date
Thomas Nguyen
01ff0bf93f Bug 1534681 Use ReferrerInfo class in document r=ckerschb,baku,Gijs
Also, in many place, we use document uri as referrer. It is not right
for the case srdoc iframe. We should use the last non-srdoc parent
document's uri

Differential Revision: https://phabricator.services.mozilla.com/D30191

--HG--
rename : testing/web-platform/tests/referrer-policy/generic/iframe-inheritance.html => testing/web-platform/tests/referrer-policy/generic/inheritance/iframe-inheritance-data.html
rename : testing/web-platform/tests/referrer-policy/generic/iframe-inheritance.html => testing/web-platform/tests/referrer-policy/generic/inheritance/iframe-inheritance-srcdoc.html
extra : moz-landing-system : lando
2019-06-06 07:23:37 +00:00
Michal Novotny
8e84b11096 Bug 1556987 - Invalid assertion in nsHttpChannel::OnPush, r=dragana
NS_HTTP_ONPUSH_LISTENER capability is set in nsHttpChannel::SetupTransaction when notification callbacks implement nsIHttpPushListener, but nsHttpChannel::OnPush event is initiated on socket thread in Http2PushedStream::TryOnPush and the channel can be closed and listeners released before nsHttpChannel::OnPush is called on the main thread.

Differential Revision: https://phabricator.services.mozilla.com/D33776

--HG--
extra : moz-landing-system : lando
2019-06-06 06:35:50 +00:00
Valentin Gosu
50fee6b27e Bug 1556911 - Don't instantiate NetworkConnectivityService off-main-thread r=dragana
This patch calls NetworkConnectivityService::GetSingleton() on the main thread
and keeps a ref to the service until shutdown.
Even though calling ncs->GetIPv6() off-main-thread is technically a data-race
in practice that's OK because only the simple decision whether to send
AAAA requests is made based on that value, which in itself is an optimization.
I filed bug 1556967 for making the connectivity service thread safe.

Differential Revision: https://phabricator.services.mozilla.com/D33765

--HG--
extra : moz-landing-system : lando
2019-06-05 20:39:12 +00:00
nidhi
8c217493ad Bug 1552658 solved r=valentin
Added python 3 support for prepare_tlds.py

Differential Revision: https://phabricator.services.mozilla.com/D32363

--HG--
extra : moz-landing-system : lando
2019-06-05 20:07:40 +00:00
Andrea Marchesini
3b60357ed6 Bug 1551798 - nsICookie.sameSite should return rawSameSite if lax-by-default pref is set to false, r=Ehsan
Differential Revision: https://phabricator.services.mozilla.com/D33305

--HG--
extra : moz-landing-system : lando
2019-06-05 12:20:05 +00:00
Andrea Marchesini
0434ad7ecb Bug 1551798 - Test for cookie migration 10, r=Ehsan
Differential Revision: https://phabricator.services.mozilla.com/D32483

--HG--
extra : moz-landing-system : lando
2019-06-05 12:19:56 +00:00
Andrea Marchesini
382a3aa030 Bug 1551798 - Store sameSite value as received from the wire in the database - migration 10, r=Ehsan,robwu
Differential Revision: https://phabricator.services.mozilla.com/D32482

--HG--
extra : moz-landing-system : lando
2019-06-05 12:19:54 +00:00
Andrea Marchesini
228b3afe31 Bug 1551798 - SameSite=lax by default and SameSite=none only if secure, r=Ehsan
Differential Revision: https://phabricator.services.mozilla.com/D31215

--HG--
extra : moz-landing-system : lando
2019-06-05 12:18:52 +00:00
Valentin Gosu
3eed61b8a1 Bug 1548306 - Do not allow the ^ character to appear in the hostname r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D32895

--HG--
extra : moz-landing-system : lando
2019-06-04 13:35:47 +00:00
Valentin Gosu
7d213246fb Bug 1555302 - Ensure that nsStandardURL::Resolve() doesn't parse URLs with a different scheme as relative r=mayhemer
Normally, this method will return the entire in string if it has a scheme.
However, mParser->ParseURL may fail, leading to the scheme to be cleared,
and the result will be the same HTTP URL with the input appended to the
path. This triggers the assertion in NS_NewURI that the scheme should not
change.

As a fix, we bail out of nsStandardURL::Resolve() if the parsed scheme of
the input is different than the base URIs current scheme. This condition
is necessary, because we still need to support a deprecated form of relative
URLs like http:file or http:/path/file

Differential Revision: https://phabricator.services.mozilla.com/D33003

--HG--
extra : moz-landing-system : lando
2019-06-04 13:42:37 +00:00
Valentin Gosu
2c2ccd2797 Bug 1533877 - Frame navigations should check their parent's Cross-Origin policy r=nika
Differential Revision: https://phabricator.services.mozilla.com/D32972

--HG--
extra : moz-landing-system : lando
2019-06-04 12:24:56 +00:00
Andrea Marchesini
176b3f8e39 Bug 1556419 - cookie path should not contain the last '/', r=Ehsan
Differential Revision: https://phabricator.services.mozilla.com/D33500

--HG--
extra : moz-landing-system : lando
2019-06-04 02:42:57 +00:00
Andrea Marchesini
b4b9392f9d Bug 1554847 - Improve cross-origin checks in canvas API - propagate allRedirectsSameOrigin to HttpChannelChild actor, r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D32793

--HG--
extra : moz-landing-system : lando
2019-06-04 06:33:11 +00:00
Valentin Gosu
269fbdbecf Bug 1518730 - Wait for both A and AAAA responses to come back before notifying the listeners r=dragana
This way we preserve the behaviour of getaddrinfo, where both A and AAAA
responses come back at the same time.
Without this Firefox will always be biased, as the first request will usually
be resolved first. So if we requested IPv4 first, we'd mostly be using IPv4.
If we requested IPv6 first, normally we'll wait for the IPv4 response to come
back too, which is functionally equivalent to the new behaviour.
However, if the pref is set network.trr.early-AAAA;true then we'd use the IPv6
response immediately, possibly leading to a failed request if the IPv6
connection fails before we have an IPv4 address to fall back to.

A test for this patch was added in bug 1542561.

Depends on D33476

Differential Revision: https://phabricator.services.mozilla.com/D33477

--HG--
extra : moz-landing-system : lando
2019-06-03 21:13:22 +00:00
Valentin Gosu
c3ee743b2d Bug 1518730 - Only send AAAA TRR requests when the system has IPv6 connectivity r=dragana
This is an optimization. If we detect that the system can't use the IPv6
address, there's no point in making a request for it.

Depends on D33475

Differential Revision: https://phabricator.services.mozilla.com/D33476

--HG--
extra : moz-landing-system : lando
2019-06-03 21:17:08 +00:00
Valentin Gosu
b0786cdfb7 Bug 1518730 - Disable TRR for connectivity checks r=dragana
Depends on D33473

Differential Revision: https://phabricator.services.mozilla.com/D33475

--HG--
extra : moz-landing-system : lando
2019-06-03 21:17:57 +00:00
Valentin Gosu
1bb0e080b4 Bug 1542561 - Test that a IPv4 NXDOMAIN still uses the IPv6 response, regardless which one comes back first r=dragana
This test uses prefs added in Bug 1518730, but the pref is ignored when it
doesn't exist, so the test is still valid.

Depends on D33471

Differential Revision: https://phabricator.services.mozilla.com/D33473

--HG--
extra : moz-landing-system : lando
2019-06-03 21:20:39 +00:00
Valentin Gosu
15ababeb71 Bug 1542561 - TRR: Don't return NS_ERROR_UNKNOWN_HOST when a AAAA response comes back first, but the second A response is NXDOMAIN r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D33471

--HG--
extra : moz-landing-system : lando
2019-06-03 21:05:27 +00:00
Coroiu Cristina
73edc6621b Backed out 4 changesets (bug 1554847) for wpt failures at /service-workers/service-worker/fetch-canvas-tainting-video-cache.https.html
Backed out changeset 17e36d139ac2 (bug 1554847)
Backed out changeset 101bd1c2d688 (bug 1554847)
Backed out changeset 3ff9a221f3e5 (bug 1554847)
Backed out changeset 946e4d9420dd (bug 1554847)
2019-06-04 03:24:42 +03:00
shindli
b83baa135f Backed out changeset 32f9907bf1f7 (bug 1555302) for causing permafailures in dom/url/tests/test_url.html CLOSED TREE 2019-06-03 23:33:14 +03:00
Valentin Gosu
8c0163caeb Bug 1555302 - Ensure that nsStandardURL::Resolve() doesn't parse URLs with a different scheme as relative r=mayhemer
Normally, this method will return the entire in string if it has a scheme.
However, mParser->ParseURL may fail, leading to the scheme to be cleared,
and the result will be the same HTTP URL with the input appended to the
path. This triggers the assertion in NS_NewURI that the scheme should not
change.

As a fix, we bail out of nsStandardURL::Resolve() if the parsed scheme of
the input is different than the base URIs current scheme. This condition
is necessary, because we still need to support a deprecated form of relative
URLs like http:file or http:/path/file

Differential Revision: https://phabricator.services.mozilla.com/D33003

--HG--
extra : moz-landing-system : lando
2019-06-03 19:30:42 +00:00
shindli
18d693fe12 Backed out 5 changesets (bug 1533877) for causing wpt permafailure in /html/cross-origin/anonymous.tentative.html CLOSED TREE
Backed out changeset 1804d3178cd4 (bug 1533877)
Backed out changeset b5a3e938f421 (bug 1533877)
Backed out changeset 08efb10cceb2 (bug 1533877)
Backed out changeset c4b8d755873b (bug 1533877)
Backed out changeset e53056e11429 (bug 1533877)
2019-06-03 22:06:38 +03:00
Valentin Gosu
e1092f8add Bug 1533877 - Frame navigations should check their parent's Cross-Origin policy r=nika
Differential Revision: https://phabricator.services.mozilla.com/D32972

--HG--
extra : moz-landing-system : lando
2019-06-03 14:57:13 +00:00
ffxbld
5cd2a9bc7d No Bug, mozilla-central repo-update HSTS HPKP blocklist remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D33506

--HG--
extra : moz-landing-system : lando
2019-06-03 15:44:26 +00:00
Andrea Marchesini
0a9fe4ff98 Bug 1553867 - Reduce the number of ClonePrincipalForPermission() call in CookieSettings, r=Ehsan
Differential Revision: https://phabricator.services.mozilla.com/D32364

--HG--
extra : moz-landing-system : lando
2019-06-03 11:14:38 +00:00
Andrea Marchesini
21cf95c1c2 Bug 1554847 - Improve cross-origin checks in canvas API - propagate allRedirectsSameOrigin to HttpChannelChild actor, r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D32793

--HG--
extra : moz-landing-system : lando
2019-06-03 09:55:08 +00:00
Csoregi Natalia
de697c360a Merge mozilla-central to mozilla-inbound. CLOSED TREE
--HG--
rename : layout/generic/nsFrameIdList.h => layout/generic/FrameIdList.h
2019-06-02 00:37:53 +03:00
Valentin Gosu
3cacbcf87b Bug 1552438 - Remove TRR mode 4 (MODE_SHADOW) r=agrover
Differential Revision: https://phabricator.services.mozilla.com/D32997

--HG--
extra : moz-landing-system : lando
2019-06-01 09:44:20 +00:00
Valentin Gosu
4882c4f4ea Bug 1552438 - Remove TRR mode 1 (MODE_PARALLEL) r=agrover
Differential Revision: https://phabricator.services.mozilla.com/D32996

--HG--
extra : moz-landing-system : lando
2019-06-01 09:44:06 +00:00
arthur.iakab
36d75a7e56 Merge mozilla-central to mozilla-inbound 2019-06-01 01:30:47 +03:00
Kartikaya Gupta
0d8a0d2546 Bug 1555966 - Back out cset ecceef291b89 (bug 1551601) for regressions. rs=valentin 2019-05-31 16:07:18 -04:00
Honza Bambas
c35df87597 Bug 1545421 - New nsresult error codes for 407, 502 and 504 http response codes returned by proxies + test, r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D32817

--HG--
extra : moz-landing-system : lando
2019-05-31 17:29:53 +00:00
Sebastian Hengst
78e651853f Merge mozilla-central to autoland. CLOSED TREE 2019-05-31 19:07:44 +02:00
Sebastian Hengst
5c434d0aa6 Merge autoland to mozilla-central. a=merge 2019-05-31 19:00:53 +02:00
Jorg K
be25a0ae54 Bug 1550945 - Follow-up to part 2, M-C: Move hook in nsNetUtil::NS_NewURI(). r=valentin a=Aryx DONTBUILD NPOTB 2019-05-31 11:53:59 +02:00
Ehsan Akhgari
d74c1d4a0f Bug 1555846 - Block cookies from trackers with dynamic FPI; r=baku
Differential Revision: https://phabricator.services.mozilla.com/D33227

--HG--
extra : moz-landing-system : lando
2019-05-31 14:33:36 +00:00
Dorel Luca
5a3296d55a Backed out changeset 910f7703f9f3 (bug 1555846) for Build bustages. CLOSED TREE 2019-05-31 17:24:43 +03:00
Ehsan Akhgari
62aa7c0ec3 Bug 1555846 - Block cookies from trackers with dynamic FPI; r=baku
Differential Revision: https://phabricator.services.mozilla.com/D33227

--HG--
extra : moz-landing-system : lando
2019-05-31 06:14:14 +00:00
Ehsan Akhgari
58702e4a1d Bug 1555715 - Remove WebSocketChannelParent::mIPCOpen; r=valentin
It is no longer necesssary for individual actors to do this book-keeping
manually.

Differential Revision: https://phabricator.services.mozilla.com/D33159

--HG--
extra : moz-landing-system : lando
2019-05-31 12:08:02 +00:00
ffxbld
669d19df08 No Bug, mozilla-central repo-update HSTS HPKP blocklist remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D33154

--HG--
extra : moz-landing-system : lando
2019-05-30 13:07:37 +00:00
Honza Bambas
d47b46c009 Bug 1553927 - Do not do immediate captive portal check on certificate/ssl errors when connecting a plain URL to prevent loops, r=valentin
Differential Revision: https://phabricator.services.mozilla.com/D33032

--HG--
extra : moz-landing-system : lando
2019-05-29 16:13:46 +00:00
Christian Holler
d67b031492 Bug 1528950 - Implement HTTP fuzzing target for Necko. r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D32755

--HG--
extra : moz-landing-system : lando
2019-05-31 09:34:00 +00:00
Andrea Marchesini
aa84d3c812 Bug 1436674 - nsICookieService.idl should use ACString XPIDL type in place of the string type, r=Ehsan
Differential Revision: https://phabricator.services.mozilla.com/D32662

--HG--
extra : moz-landing-system : lando
2019-05-31 09:36:44 +00:00
Andrea Marchesini
b1b122fb20 Bug 1554464 - Merge nsICookie2 and nsICookie in 1 single interface, r=Ehsan
Differential Revision: https://phabricator.services.mozilla.com/D33031

--HG--
extra : moz-landing-system : lando
2019-05-31 09:36:44 +00:00
Andrea Marchesini
68fbe6f8ca Bug 1554377 - Cleanup nsCookie implementation - Removed mIPCOpen, r=Ehsan
Differential Revision: https://phabricator.services.mozilla.com/D32616

--HG--
extra : moz-landing-system : lando
2019-05-31 09:32:51 +00:00
Andrea Marchesini
fd927a96aa Bug 1554377 - Cleanup nsCookie implementation - network_cookie_thirdparty_nonsecureSessionOnly to StaticPrefs, r=Ehsan
Differential Revision: https://phabricator.services.mozilla.com/D32615

--HG--
extra : moz-landing-system : lando
2019-05-31 09:32:33 +00:00
Andrea Marchesini
1040f3de6a Bug 1554377 - Cleanup nsCookie implementation - network.cookie.thirdparty.sessionOnly to StaticPrefs, r=Ehsan
Differential Revision: https://phabricator.services.mozilla.com/D32614

--HG--
extra : moz-landing-system : lando
2019-05-31 09:32:13 +00:00
Andrea Marchesini
ff8aaf2236 Bug 1554377 - Cleanup nsCookie implementation - simpler nsCookie, r=Ehsan
Differential Revision: https://phabricator.services.mozilla.com/D32562

--HG--
extra : moz-landing-system : lando
2019-05-31 09:31:47 +00:00
Andrea Marchesini
8bcf905e12 Bug 1554377 - Cleanup nsCookie implementation - Get rid of nsCookieAttributes, r=Ehsan
Differential Revision: https://phabricator.services.mozilla.com/D32561

--HG--
extra : moz-landing-system : lando
2019-05-31 09:31:30 +00:00
Andrea Marchesini
a1e12567f6 Bug 1554377 - Cleanup nsCookie implementation - Get rid of ConstCookie, r=Ehsan
Differential Revision: https://phabricator.services.mozilla.com/D32560

--HG--
extra : moz-landing-system : lando
2019-05-31 09:31:12 +00:00
Thomas Nguyen
cd48bd6695 Bug 1554289 - Add non-null checks around assignment referrerInfo to preflight HTTP channel r=valentin
Differential Revision: https://phabricator.services.mozilla.com/D32976

--HG--
extra : moz-landing-system : lando
2019-05-31 09:39:51 +00:00
Gijs Kruitbosch
e561d233e9 Bug 1552993 - r=valentin,dragana
Differential Revision: https://phabricator.services.mozilla.com/D32066

--HG--
extra : moz-landing-system : lando
2019-05-27 09:14:33 +00:00
Csoregi Natalia
a51ae3670f Backed out 5 changesets (bug 1551798) for failures on test_rawSameSite.js. CLOSED TREE
Backed out changeset 11ddc433b632 (bug 1551798)
Backed out changeset f2ac8efb023d (bug 1551798)
Backed out changeset 0f6e797b434f (bug 1551798)
Backed out changeset eae7f88660c8 (bug 1551798)
Backed out changeset 2ba747afb3d0 (bug 1551798)
2019-05-30 10:17:01 +03:00
Andrea Marchesini
ef73f6105f Bug 1551798 - Add comments about the next removing patches, r=Ehsan
Differential Revision: https://phabricator.services.mozilla.com/D33037

--HG--
extra : moz-landing-system : lando
2019-05-29 16:34:27 +00:00
Andrea Marchesini
d513a67ed4 Bug 1551798 - Test for cookie migration 10, r=Ehsan
Differential Revision: https://phabricator.services.mozilla.com/D32483

--HG--
extra : moz-landing-system : lando
2019-05-29 15:56:22 +00:00
Andrea Marchesini
84e139e50b Bug 1551798 - Store sameSite value as received from the wire in the database - migration 10, r=Ehsan
Differential Revision: https://phabricator.services.mozilla.com/D32482

--HG--
extra : moz-landing-system : lando
2019-05-29 16:34:33 +00:00
Andrea Marchesini
ae8ab513d8 Bug 1551798 - SameSite=lax by default and SameSite=none only if secure, r=Ehsan
Differential Revision: https://phabricator.services.mozilla.com/D31215

--HG--
extra : moz-landing-system : lando
2019-05-30 00:48:41 +00:00
Byron Campen [:bwc]
2d6cf50175 Bug 1551589: readyState fixes r=ng
Depends on D31085

Differential Revision: https://phabricator.services.mozilla.com/D31123

--HG--
extra : moz-landing-system : lando
2019-05-29 21:27:18 +00:00
Andrea Marchesini
4c6ace6ac6 Bug 1551798 - Rename nsICookie2.SAMESITE_UNSET to nsICookie2.SAMESITE_NONE, r=Ehsan
Differential Revision: https://phabricator.services.mozilla.com/D31214

--HG--
extra : moz-landing-system : lando
2019-05-29 15:55:03 +00:00
arthur.iakab
944263f18a Backed out 5 changesets (bug 1551798) for multiple build bustages on StaticPrefList.h CLOSED TREE
Backed out changeset c89daff34d97 (bug 1551798)
Backed out changeset bbc3f88b8c03 (bug 1551798)
Backed out changeset b87996b8a411 (bug 1551798)
Backed out changeset d88b0002d736 (bug 1551798)
Backed out changeset 0fe740c90e2b (bug 1551798)
2019-05-29 18:07:26 +03:00
Andrea Marchesini
08c8aa4d6d Bug 1551798 - Test for cookie migration 10, r=Ehsan
Differential Revision: https://phabricator.services.mozilla.com/D32483

--HG--
extra : moz-landing-system : lando
2019-05-27 01:46:11 +00:00
Andrea Marchesini
d5fdfc9e8c Bug 1551798 - Store sameSite value as received from the wire in the database - migration 10, r=Ehsan
Differential Revision: https://phabricator.services.mozilla.com/D32482

--HG--
extra : moz-landing-system : lando
2019-05-27 05:11:54 +00:00
Andrea Marchesini
7a79f55da4 Bug 1551798 - SameSite=lax by default and SameSite=none only if secure, r=Ehsan
Differential Revision: https://phabricator.services.mozilla.com/D31215

--HG--
extra : moz-landing-system : lando
2019-05-24 15:44:00 +00:00
Andrea Marchesini
e9bbb85ed1 Bug 1551798 - Rename nsICookie2.SAMESITE_UNSET to nsICookie2.SAMESITE_NONE, r=Ehsan
Differential Revision: https://phabricator.services.mozilla.com/D31214

--HG--
extra : moz-landing-system : lando
2019-05-24 15:18:49 +00:00
Honza Bambas
912f874cb7 Bug 1509827 - Document nsIClassOfService flags, r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D31067

--HG--
extra : moz-landing-system : lando
2019-05-29 14:02:26 +00:00
Tom Ritter
b8705a8481 Bug 1539595 - Rename Priveleged Content Process to PrivlegedAbout Content Process r=mconley,flod
We do this because we will be introducing more privileged content processes
and we want to be able to distinguish them.

Differential Revision: https://phabricator.services.mozilla.com/D30274

--HG--
rename : browser/base/content/test/tabs/browser_new_tab_in_privileged_process_pref.js => browser/base/content/test/tabs/browser_new_tab_in_privilegedabout_process_pref.js
extra : moz-landing-system : lando
2019-05-29 11:31:31 +00:00
Noemi Erli
395fa026e1 Merge autoland to mozilla-central. a=merge 2019-05-29 12:47:04 +03:00
Jorg K
b4c9e9391c Bug 1550945 - Part 2, M-C part: Hook into nsNetUtil::NS_NewURI(). r=valentin a=aryx,npotb DONTBUILD 2019-05-29 11:23:04 +02:00
Cosmin Sabou
482c1fdb41 Backed out 2 changesets (bug 1554527, bug 1553867) as requested by Sylvestre for causing huge perf regressions. a=backout
Backed out changeset 1e85291f97de (bug 1554527)
Backed out changeset daf113171d63 (bug 1553867)
2019-05-29 09:57:29 +03:00
Sebastian Hengst
fba75a919c Backed out 4 changesets (bug 1539595) for build bustage in nsAboutRedirector.cpp. CLOSED TREE
Backed out changeset 2b0bb889b087 (bug 1539595)
Backed out changeset 95f0b82ec253 (bug 1539595)
Backed out changeset 6310e6dabceb (bug 1539595)
Backed out changeset ba3e353c6957 (bug 1539595)

--HG--
rename : browser/base/content/test/tabs/browser_e10s_about_page_triggeringprincipal.js => browser/base/content/test/general/browser_e10s_about_page_triggeringprincipal.js
rename : browser/base/content/test/tabs/browser_e10s_about_process.js => browser/base/content/test/general/browser_e10s_about_process.js
rename : browser/base/content/test/tabs/browser_e10s_chrome_process.js => browser/base/content/test/general/browser_e10s_chrome_process.js
rename : browser/base/content/test/tabs/browser_e10s_javascript.js => browser/base/content/test/general/browser_e10s_javascript.js
rename : browser/base/content/test/tabs/browser_e10s_switchbrowser.js => browser/base/content/test/general/browser_e10s_switchbrowser.js
rename : browser/base/content/test/tabs/file_about_child.html => browser/base/content/test/general/file_about_child.html
rename : browser/base/content/test/tabs/file_about_parent.html => browser/base/content/test/general/file_about_parent.html
rename : browser/base/content/test/tabs/test_process_flags_chrome.html => browser/base/content/test/general/test_process_flags_chrome.html
rename : browser/base/content/test/tabs/browser_new_tab_in_privilegedabout_process_pref.js => browser/base/content/test/tabs/browser_new_tab_in_privileged_process_pref.js
2019-05-28 19:49:17 +02:00
Tom Ritter
03b41fa512 Bug 1539595 - Rename Priveleged Content Process to PrivlegedAbout Content Process r=mconley,flod
We do this because we will be introducing more privileged content processes
and we want to be able to distinguish them.

Differential Revision: https://phabricator.services.mozilla.com/D30274

--HG--
rename : browser/base/content/test/tabs/browser_new_tab_in_privileged_process_pref.js => browser/base/content/test/tabs/browser_new_tab_in_privilegedabout_process_pref.js
extra : moz-landing-system : lando
2019-05-28 14:19:11 +00:00
Valentin Gosu
124a1062f6 Bug 1536744 - Rename NS_NewURIOnAnyThread to NS_NewURI. r=baku
The only protocol that can't be created off the main thread at the moment is
moz-extension, and that can be handled at a later time.

Differential Revision: https://phabricator.services.mozilla.com/D30713

--HG--
extra : moz-landing-system : lando
2019-05-28 14:17:04 +00:00
Valentin Gosu
fd0006a0bf Bug 1536744 - Add ssh scheme to NS_NewURIOnAnyThread r=baku
This is needed to pass a web-platform-test. Since unknown protocols use
nsSimpleURI and nsSimpleURI::GetHost returns an error code, that will fail.
Instead, we instantiate an nsStandardURL for the ssh scheme.
Once we change nsSimpleURI to be backed by MozURL we can probably remove this.

Differential Revision: https://phabricator.services.mozilla.com/D30707

--HG--
extra : moz-landing-system : lando
2019-05-28 13:50:43 +00:00
Valentin Gosu
393c44437c Bug 1536744 - Add nsGIOProtocolHandler::GetSingleton(). Make sure nsIOService::GetProtocolHandler only returns it when it's supported. r=baku
Before, we'd try to create a URI using the GIO protocol handler, and if that
succeeded, we'd return the protocol handler.
Now we can't return it if NS_NewURI succeeds, because NS_NewURI doesn't check
the protocol handler anymore. So instead we just instantiate the handler,
check if the scheme is supported, and if so return it.

Differential Revision: https://phabricator.services.mozilla.com/D30706

--HG--
extra : moz-landing-system : lando
2019-05-28 13:50:20 +00:00
Valentin Gosu
e117171c5d Bug 1536744 - Fix test by adding a proper implementation of nsSimpleURI::Resolve that uses MozURL r=baku
nsSimpleURI doesn't really have the concept of a relative URI.
Since unknown protocol schemes will ultimately fall back to using nsSimpleURI,
we need to make sure that resolving a URI with certain base still works as
before, when those URIs were nsStandardURLs, created by the protocol handlers.

To achieve this we check to see if the "relative path" has a scheme. If it
does, we just return it, to be parsed by NS_NewURI. Otherwise, we use
MozURL (based on rust-url) to figure out the correct relative URL we should
return. This by itself manages to fix several failing web-platform tests.

Differential Revision: https://phabricator.services.mozilla.com/D30705

--HG--
extra : moz-landing-system : lando
2019-05-28 13:50:00 +00:00
Valentin Gosu
37cf1a4629 Bug 1536744 - Add indexeddb and android schemes to NS_NewURIOnAnyThread r=baku
Differential Revision: https://phabricator.services.mozilla.com/D30704

--HG--
extra : moz-landing-system : lando
2019-05-28 13:49:45 +00:00
Valentin Gosu
b8bdfab7c9 Bug 1536744 - Remove nsIProtocolHandler.newURI r=baku
Differential Revision: https://phabricator.services.mozilla.com/D30703

--HG--
extra : moz-landing-system : lando
2019-05-28 13:49:27 +00:00
Valentin Gosu
016cf57214 Bug 1536744 - Add "moz-icon" to NS_NewURIOnAnyThread r=baku
Differential Revision: https://phabricator.services.mozilla.com/D30702

--HG--
extra : moz-landing-system : lando
2019-05-28 13:49:19 +00:00
Valentin Gosu
875ad56974 Bug 1536744 - Add "about" protocol to NS_NewURIOnAnyThread r=baku
Differential Revision: https://phabricator.services.mozilla.com/D30701

--HG--
extra : moz-landing-system : lando
2019-05-28 13:49:17 +00:00
Valentin Gosu
eb24233246 Bug 1536744 - Add "jar" to NS_NewURIOnAnyThread r=baku
Differential Revision: https://phabricator.services.mozilla.com/D30700

--HG--
extra : moz-landing-system : lando
2019-05-28 13:49:07 +00:00
Valentin Gosu
1c26cb2cac Bug 1536744 - Make resource protocol handler thread safe r=baku
This is achieved by adding a RWLock to SubstitutingProtocolHandler

Differential Revision: https://phabricator.services.mozilla.com/D30699

--HG--
extra : moz-landing-system : lando
2019-05-28 13:49:05 +00:00
Valentin Gosu
43021cd88a Bug 1536744 - Add "resource" and "moz-extension" to NS_NewURIOnAnyThread. r=baku
* Add main thread assertions for "resource" and "moz-extension" protocols
* Use ::GetSingleton() for resource and moz-extension protocol handlers

Differential Revision: https://phabricator.services.mozilla.com/D30698

--HG--
extra : moz-landing-system : lando
2019-05-28 13:48:56 +00:00
Valentin Gosu
8ce8ef49f6 Bug 1536744 - Add {nsAboutProtocolHandler,nsViewSourceHandler,SubstitutingProtocolHandler}::CreateNewURI() static methods r=baku
Differential Revision: https://phabricator.services.mozilla.com/D30697

--HG--
extra : moz-landing-system : lando
2019-05-28 13:48:49 +00:00
Valentin Gosu
6226941606 Bug 1536744 - Make nsIOService.newURI call NS_NewURI, and NS_NewURI call NS_NewURIOnAnyThread r=baku
This way all of the nsIURI creation will go through NS_NewURIOnAnyThread.
NS_NewURIOnAnyThread will be renamed to NS_NewURI in the final patch.

Differential Revision: https://phabricator.services.mozilla.com/D30696

--HG--
extra : moz-landing-system : lando
2019-05-28 13:48:47 +00:00
Valentin Gosu
804b1c0cb2 Bug 1536744 - NS_NewURIOnAnyThread should construct nsStandardURLs for smb and sftp URLs r=baku
These URL types need both specific applications to be installed on Linux, and for the pref to list them as supported.
We do these checks in nsGIOProtocolHandler::NewChannel instead of performing them when creating the URLs.

Differential Revision: https://phabricator.services.mozilla.com/D30695

--HG--
extra : moz-landing-system : lando
2019-05-28 13:47:18 +00:00
Valentin Gosu
10a3eb98ad Bug 1536744 - Make SubstitutingProtocolHandler::NewURI only call ResolveJARURI if the host is android r=baku
Differential Revision: https://phabricator.services.mozilla.com/D30694

--HG--
extra : moz-landing-system : lando
2019-05-28 13:46:55 +00:00
Valentin Gosu
552486a275 Bug 1536744 - Add nsAboutProtocolHandler::CreateNewURI() r=baku
Differential Revision: https://phabricator.services.mozilla.com/D30693

--HG--
extra : moz-landing-system : lando
2019-05-28 13:46:35 +00:00
Valentin Gosu
ef2b6cf771 Bug 1536744 - Add nsResProtocolHandler::GetSingleton() r=baku
Differential Revision: https://phabricator.services.mozilla.com/D30692

--HG--
extra : moz-landing-system : lando
2019-05-28 13:46:17 +00:00
ffxbld
dafef8c4a2 No Bug, mozilla-central repo-update HSTS HPKP blocklist remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D32686

--HG--
extra : moz-landing-system : lando
2019-05-28 20:34:21 +00:00
Ehsan Akhgari
6c4174f1f6 Bug 1554713 - Remove HttpChannelChild::mIPCOpen; r=michal
Differential Revision: https://phabricator.services.mozilla.com/D32717

--HG--
extra : moz-landing-system : lando
2019-05-28 17:06:01 +00:00
Kris Maglione
ffe2477ea3 Bug 1555439: Store enterprise policy about: whitelist in static array. r=mkaply
Differential Revision: https://phabricator.services.mozilla.com/D33058

--HG--
extra : rebase_source : 68ee1c16d2008a3766faad2b661788ee0a381db1
2019-05-29 11:21:06 -07:00
Valentin Gosu
33c3bf5390 Bug 1551601 - Do process switch _before_ processing cached redirect r=mayhemer
This patch splits ReadFromCache in two - by adding ContinueReadFromCache.
ContinueReadFromCache is called asycly when a cross-process-redirect is
complete.

Sometimes, the channel will be cancelled before the cross-process-redirect
is complete, such as in:
testing/firefox-ui/tests/functional/safebrowsing/test_notification.py
In that case we must make sure to call HandleAsyncAbort if the listener's
onStart/StopRequest callbacks haven't been called.

Differential Revision: https://phabricator.services.mozilla.com/D31226

--HG--
extra : moz-landing-system : lando
2019-05-28 09:37:06 +00:00
Honza Bambas
8e33c5a50b Bug 1554953 - Fix test_captive_portal_service.js intermittent timeout at shutdown, r=valentin
Differential Revision: https://phabricator.services.mozilla.com/D32814

--HG--
extra : moz-landing-system : lando
2019-05-28 12:31:31 +00:00
Valentin Gosu
cc2ad47710 Bug 1552886 - Modernize test_trr.js (part 2) r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D31801

--HG--
extra : moz-landing-system : lando
2019-05-29 21:40:11 +00:00
Andrea Marchesini
4bbb03b93b Bug 1554527 - Clone the principal for permission checks in CookieSettings only if needed, r=Ehsan
Differential Revision: https://phabricator.services.mozilla.com/D32660

--HG--
extra : moz-landing-system : lando
2019-05-27 13:45:42 +00:00
Andrea Marchesini
67e56bf7fb Bug 1191313 - Get rid of third-party-cookie-accepted and third-party-cookie-rejected notifications, r=Ehsan
Differential Revision: https://phabricator.services.mozilla.com/D32665

--HG--
extra : moz-landing-system : lando
2019-05-27 13:27:47 +00:00
Andrea Marchesini
c355651b11 Bug 1416657 - Avoid calling IsThirdPartyChannel() with a nullptr channel in nsCookieService, r=Ehsan
Differential Revision: https://phabricator.services.mozilla.com/D32672

--HG--
extra : moz-landing-system : lando
2019-05-27 13:25:12 +00:00
Kershaw Chang
5d000eeb62 Bug 1544619 - Ignore response body if method is HEAD or CONNECT r=mayhemer
According to the spec, we should ignore the response body for the HEAD and CONNECT requests.

Differential Revision: https://phabricator.services.mozilla.com/D28678

--HG--
extra : moz-landing-system : lando
2019-05-27 09:08:50 +00:00
Sylvestre Ledru
d57d4905f1 Bug 1519636 - Reformat recent changes to the Google coding style r=Ehsan
# ignore-this-changeset

Differential Revision: https://phabricator.services.mozilla.com/D30883

--HG--
extra : moz-landing-system : lando
2019-05-25 17:46:15 +00:00
Julien Wajsberg
b63e2a6156 Bug 1543040 - Report timings for redirects in the child as well r=mayhemer
Depends on D31486

Differential Revision: https://phabricator.services.mozilla.com/D31484

--HG--
extra : moz-landing-system : lando
2019-05-22 12:38:32 +00:00
Julien Wajsberg
6073a0fd93 Bug 1543040 - Report transaction timings in the redirect marker r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D31486

--HG--
extra : moz-landing-system : lando
2019-05-22 12:38:25 +00:00
Andrea Marchesini
1f043863ca Bug 1554138 - nsCookie::Create should return an already_AddRef<> instead of a raw pointer, r=Ehsan
Depends on D32461

Differential Revision: https://phabricator.services.mozilla.com/D32462

--HG--
extra : moz-landing-system : lando
2019-05-25 01:32:24 +00:00
Ehsan Akhgari
a5fe850945 Bug 1547813 - Part 9: Ensure the cookie service does third-party checks when the cookie policy is set to nsICookieService::BEHAVIOR_REJECT_TRACKER_AND_PARTITION_FOREIGN; r=baku
Differential Revision: https://phabricator.services.mozilla.com/D30118

--HG--
extra : moz-landing-system : lando
2019-05-25 01:25:46 +00:00
Ehsan Akhgari
70dba3be94 Bug 1547813 - Part 8: Introduce a CookieSettings API to query whether cookies from third-party trackers must be rejected and use it in Gecko; r=baku
Differential Revision: https://phabricator.services.mozilla.com/D30117

--HG--
extra : moz-landing-system : lando
2019-05-25 01:25:43 +00:00
Ehsan Akhgari
ab20502fb9 Bug 1547813 - Part 7: Introduce a storage partitioning API; r=baku
This API abstracts away the details of the decision on what context should be
partitioned away from the consumers and centralizes the decision making into
the same location in the code base.

Differential Revision: https://phabricator.services.mozilla.com/D29742

--HG--
extra : moz-landing-system : lando
2019-05-25 01:25:41 +00:00
Ehsan Akhgari
e2a2c24b6e Bug 1547813 - Part 1: Introduce nsICookieService::BEHAVIOR_REJECT_TRACKER_AND_PARTITION_FOREIGN; r=baku
This new code designates our new cookie policy for blocking cookies and
storage access from third-party trackers and partitioning the cookie jar
of the rest of third-party resources.

Differential Revision: https://phabricator.services.mozilla.com/D29736

--HG--
extra : moz-landing-system : lando
2019-05-25 01:25:23 +00:00
Andrea Marchesini
c926d65d2f Bug 1553867 - Reduce the number of ClonePrincipalForPermission() call in CookieSettings, r=Ehsan
Differential Revision: https://phabricator.services.mozilla.com/D32364

--HG--
extra : moz-landing-system : lando
2019-05-24 19:05:35 +00:00
Andrea Marchesini
52816e049d Bug 1554137 - nsICookie and nsICookie2 should be builtinclass interfaces, r=Ehsan
Differential Revision: https://phabricator.services.mozilla.com/D32461

--HG--
extra : moz-landing-system : lando
2019-05-24 17:01:21 +00:00
arthur.iakab
af8e458c5f Backed out changeset a296439a25ff (bug 1519636) for frequent Windows cppunit failures CLOSED TREE 2019-05-24 14:26:01 +03:00
Sylvestre Ledru
c82ea97226 Bug 1519636 - Reformat recent changes to the Google coding style r=Ehsan
# ignore-this-changeset

Differential Revision: https://phabricator.services.mozilla.com/D30883

--HG--
extra : moz-landing-system : lando
2019-05-24 09:59:17 +00:00
Dzmitry Malyshau
d3f4d3cc1c Bug 1552549 - Update rand dependency to 0.6 r=kats,froydnj,nika,jkt,jcj
Update rand version in u2fhid and xpcom

Differential Revision: https://phabricator.services.mozilla.com/D31669

--HG--
rename : third_party/rust/scopeguard/.cargo-checksum.json => third_party/rust/scopeguard-0.3.2/.cargo-checksum.json
rename : third_party/rust/scopeguard/Cargo.toml => third_party/rust/scopeguard-0.3.2/Cargo.toml
rename : third_party/rust/scopeguard/README.rst => third_party/rust/scopeguard-0.3.2/README.rst
rename : third_party/rust/scopeguard/examples/readme.rs => third_party/rust/scopeguard-0.3.2/examples/readme.rs
rename : third_party/rust/scopeguard/src/lib.rs => third_party/rust/scopeguard-0.3.2/src/lib.rs
extra : moz-landing-system : lando
2019-05-23 19:54:25 +00:00
Sylvestre Ledru
993c03acb1 Bug 1552795 - Remove all trailing whitespaces in idl files r=Ehsan
Differential Revision: https://phabricator.services.mozilla.com/D31769

--HG--
extra : moz-landing-system : lando
2019-05-22 22:37:14 +00:00
Bogdan Tara
fa8d90211a Merge mozilla-central to mozilla-inbound. a=merge CLOSED TREE 2019-05-23 07:44:57 +03:00
Valentin Gosu
b4b25d6861 Bug 1529911 - Ensure that mOnStartRequestCalled/mOnStopRequestCalled is set just before calling the listener to avoid reentrancy issues r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D20499

--HG--
extra : moz-landing-system : lando
2019-05-22 13:48:59 +00:00
Valentin Gosu
33c73bd3eb Bug 1529911 - Add more tests for cancelling the channel r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D20500

--HG--
extra : moz-landing-system : lando
2019-05-22 13:58:55 +00:00
Valentin Gosu
9f3b339e68 Bug 1529911 - Make the httpcancel unit test run in e10s r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D20501

--HG--
extra : moz-landing-system : lando
2019-05-22 13:48:31 +00:00
Andrea Marchesini
7b8a38ee05 Bug 1551729 - Revert bug 1548432 - Re-introducing the support for cookies without values, r=mayhemer
This patch reverts the second part of bug 1548432.

Differential Revision: https://phabricator.services.mozilla.com/D31267

--HG--
extra : moz-landing-system : lando
2019-05-22 06:31:22 +00:00
Christoph Kerschbaumer
b633427366 Bug 965637: Move CSP from Principal into Client, part 1: backend changes. r=mccr8
Differential Revision: https://phabricator.services.mozilla.com/D27654

--HG--
extra : moz-landing-system : lando
2019-05-21 23:14:27 +00:00
Cosmin Sabou
bdf1d2a559 Backed out changeset a10cdf32fb5a (bug 1552549) for causing a spike in xpcshell failures. CLOSED TREE 2019-05-22 02:05:22 +03:00
Dzmitry Malyshau
1298c14a90 Bug 1552549 - Update rand dependency to 0.6 r=kats,froydnj,nika,jkt,jcj
Update rand version in u2fhid and xpcom

Differential Revision: https://phabricator.services.mozilla.com/D31669

--HG--
rename : third_party/rust/scopeguard/.cargo-checksum.json => third_party/rust/scopeguard-0.3.2/.cargo-checksum.json
rename : third_party/rust/scopeguard/Cargo.toml => third_party/rust/scopeguard-0.3.2/Cargo.toml
rename : third_party/rust/scopeguard/README.rst => third_party/rust/scopeguard-0.3.2/README.rst
rename : third_party/rust/scopeguard/examples/readme.rs => third_party/rust/scopeguard-0.3.2/examples/readme.rs
rename : third_party/rust/scopeguard/src/lib.rs => third_party/rust/scopeguard-0.3.2/src/lib.rs
extra : moz-landing-system : lando
2019-05-21 19:36:56 +00:00
Nika Layzell
30555bd898 Bug 1540731 - Part 3: Stop releasing actors within ActorDestroy, r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D29606

--HG--
extra : moz-landing-system : lando
2019-05-21 17:04:23 +00:00
Liang-Heng Chen
d77a6249b5 Bug 1552431 - handle first/third party correctly; r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D31590

--HG--
extra : moz-landing-system : lando
2019-05-21 14:41:58 +00:00
Mihai Alexandru Michis
68421ffba4 Backed out changeset 754426d70d28 (bug 1551729) for causing wpt failures. CLOSED TREE 2019-05-21 15:17:37 +03:00
Andrea Marchesini
32c1b6bb89 Bug 1551729 - Revert bug 1548432 - Re-introducing the support for cookies without values, r=mayhemer
This patch reverts the second part of bug 1548432.

Differential Revision: https://phabricator.services.mozilla.com/D31267

--HG--
extra : moz-landing-system : lando
2019-05-21 08:57:21 +00:00
Dorel Luca
06b2e4e9d2 Backed out changeset 41c511d9528c (bug 1551729) for causing WPT failures in cookies/http-state/mozilla-tests.html. CLOSED TREE 2019-05-20 23:40:10 +03:00
Daniel Varga
9054636e2c Backed out 2 changesets (bug 1487113) for mochitest failure at dom/base/test/test_script_loader_js_cache.html.
Backed out changeset dce59b615568 (bug 1487113)
Backed out changeset e6f579752678 (bug 1487113)
2019-05-20 21:04:40 +03:00
Shane Caraveo
636c68369c Bug 1552248 support ftp channel in proxy api r=mayhemer,kmag
ChannelWrapper is used throughout webext APIs and it requires a channel to support weakref.
FTPChannel did not, thus ftp requests did not go through proxy.onRequest.

Differential Revision: https://phabricator.services.mozilla.com/D31540

--HG--
extra : moz-landing-system : lando
2019-05-20 15:05:26 +00:00
Andrea Marchesini
b2c76acaf1 Bug 1551729 - Revert bug 1548432 - Re-introducing the support for cookies without values, r=mayhemer
This patch reverts the second part of bug 1548432.

Differential Revision: https://phabricator.services.mozilla.com/D31267

--HG--
extra : moz-landing-system : lando
2019-05-20 15:16:06 +00:00
Andrea Marchesini
32fb7a2445 Bug 1487113 - nsICacheInfoChannel.alternativeDataInputStream as attribute, r=valentin
Differential Revision: https://phabricator.services.mozilla.com/D31791

--HG--
extra : moz-landing-system : lando
2019-05-20 15:22:47 +00:00
Andrea Marchesini
aa9560f5f0 Bug 1487113 - nsICacheInfoChannel.originalInputStream as attribute, r=valentin
Differential Revision: https://phabricator.services.mozilla.com/D31790

--HG--
extra : moz-landing-system : lando
2019-05-20 15:18:25 +00:00
Ryan Hunt
f037851489 Bug 1525720, part 5 - Redirect nsIHttpChannel using content process ID instead of nsIRemoteTab. r=valentin
This code currently works for remote subframes assuming that nsIRemoteTab is implemented
by BrowserParent, but will break when nsIRemoteTab is only for a top-level BrowserParent.

What this code really wants is a content process ID to retarget the channel to. This
commit switches the interfaces to pass this around instead of nsIRemoteTab.

Differential Revision: https://phabricator.services.mozilla.com/D31435

--HG--
extra : source : 757b4f595cc4b18ae35483d23edff4896d15d4b1
2019-05-15 12:33:42 -05:00
Gurzau Raul
57f573a6ff Backed out 18 changesets (bug 1525720) for mass failures on Windows platform e.g ProcessPriorityManager.cpp on a CLOSED TREE.
Backed out changeset 1f2e86c2d691 (bug 1525720)
Backed out changeset 9b79caa460a0 (bug 1525720)
Backed out changeset e65cb2d4c5a5 (bug 1525720)
Backed out changeset 99f971a02d87 (bug 1525720)
Backed out changeset d25963c72ff7 (bug 1525720)
Backed out changeset 810b73719871 (bug 1525720)
Backed out changeset ee10a8254481 (bug 1525720)
Backed out changeset 1bcf9f586c55 (bug 1525720)
Backed out changeset d3b2ac8d5ca4 (bug 1525720)
Backed out changeset 697774dd8984 (bug 1525720)
Backed out changeset eadeacbe4483 (bug 1525720)
Backed out changeset 32eeee79d628 (bug 1525720)
Backed out changeset 07678a2fa9e7 (bug 1525720)
Backed out changeset 757b4f595cc4 (bug 1525720)
Backed out changeset b255e0a84e12 (bug 1525720)
Backed out changeset 9a255864f75d (bug 1525720)
Backed out changeset 5f1c1b609ec1 (bug 1525720)
Backed out changeset 00d83f1d02e0 (bug 1525720)
2019-05-23 01:57:16 +03:00
Ryan Hunt
3621e207d9 Bug 1525720, part 5 - Redirect nsIHttpChannel using content process ID instead of nsIRemoteTab. r=valentin
This code currently works for remote subframes assuming that nsIRemoteTab is implemented
by BrowserParent, but will break when nsIRemoteTab is only for a top-level BrowserParent.

What this code really wants is a content process ID to retarget the channel to. This
commit switches the interfaces to pass this around instead of nsIRemoteTab.

Differential Revision: https://phabricator.services.mozilla.com/D31435

--HG--
extra : rebase_source : be3303c2d38d704a6a1817fa45fd76700fae6287
extra : histedit_source : c7bf1e496f4328acc9ee70fcccdff98ea2cce5df
2019-05-15 12:33:42 -05:00
Andrea Marchesini
62236a7f79 Bug 1550050 - Fix intermittent failures in test_same_base_domain_3.html forcing no cache via HTTP headers, r=valentin
At the end of each test, file_chromecommon.js deletes all the cookies, but it
doesn't invalidate the network cache. Some of the files are shared between
tests. When they are loaded from the cache, we don't set the cookies and,
because of this, the tests were reporting a wrong cookie number.

Differential Revision: https://phabricator.services.mozilla.com/D31596

--HG--
extra : moz-landing-system : lando
2019-05-17 11:20:19 +00:00
Jonathan Kew
6476568714 Bug 1256009 - Add U+0138 to IDN character blocklist. r=valentin
Differential Revision: https://phabricator.services.mozilla.com/D31595

--HG--
extra : moz-landing-system : lando
2019-05-17 09:19:22 +00:00
Mihai Alexandru Michis
4916ef8c09 Merge mozilla-central to autoland. CLOSED TREE 2019-05-17 12:36:07 +03:00
Nico Grunbaum
07d183b29f Bug 1551702 - hide DataChannelConnection ctor, and set local port - r=bwc
Differential Revision: https://phabricator.services.mozilla.com/D31343

--HG--
extra : moz-landing-system : lando
2019-05-16 18:43:13 +00:00
Liang-Heng Chen
846a1486fa Bug 1550756 - make system principal fall into new traffic category; r=dragana
- add 2 category: system principals for normal/private browsing
- P3Basic* and P3Content* are labeled incorrectly
- add many assertions to check categories

Differential Revision: https://phabricator.services.mozilla.com/D30660

--HG--
extra : moz-landing-system : lando
2019-05-16 13:24:18 +00:00
Valentin Gosu
cc95fd19b6 Bug 1540656 - Use dns-packet node module in test_trr.js r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D25671

--HG--
extra : moz-landing-system : lando
2019-05-16 06:22:06 +00:00
Andrea Marchesini
4e58d1f5a3 Bug 1551826 - Use StaticPrefs for network.cookie.staleThreshold in nsCookie, r=ckerschb
Differential Revision: https://phabricator.services.mozilla.com/D31218

--HG--
extra : moz-landing-system : lando
2019-05-15 13:33:47 +00:00
Andrea Marchesini
289365e128 Bug 1551821 - Get rid of pref network.cookie.same-site.enabled, r=ckerschb
Differential Revision: https://phabricator.services.mozilla.com/D31217

--HG--
extra : moz-landing-system : lando
2019-05-15 13:33:45 +00:00
Honza Bambas
4534b7e9ee Bug 1548804 - Remove origin suffix isolation for proxy credentials when setting authentication cache entry, r=valentin
Differential Revision: https://phabricator.services.mozilla.com/D30911

--HG--
extra : moz-landing-system : lando
2019-05-14 13:40:30 +00:00
Honza Bambas
7e08712a6a Bug 1550498, r=kershaw
Differential Revision: https://phabricator.services.mozilla.com/D30510

--HG--
extra : moz-landing-system : lando
2019-05-09 17:42:17 +00:00
Honza Bambas
ad027c9594 Bug 1548822, r=kershaw,valentin
Differential Revision: https://phabricator.services.mozilla.com/D30364

--HG--
extra : moz-landing-system : lando
2019-05-09 16:39:59 +00:00
Honza Bambas
f739775f6f Bug 1540759, r=valentin
Differential Revision: https://phabricator.services.mozilla.com/D30382

--HG--
extra : moz-landing-system : lando
2019-05-08 21:07:05 +00:00
dlee
d7aece18ce Bug 1548517 - Add hash for test entries added via HostInPrefTables. r=baku
Origin telemetry expects every tracking channel has tracker's hash.
Without hash value for test entries, it will trigger MOZ_ASSERT while running
testcases.

Differential Revision: https://phabricator.services.mozilla.com/D30061

--HG--
extra : moz-landing-system : lando
2019-05-10 19:39:24 +00:00
dlee
00f63d827c Bug 1549405 - Use LOAD_BYPASS_URL_ClASSIFIER flag for TRR request. r=valentin
We should add LOAD_BYPASS_URL_ClASSIFIER to TRR request because if
"network.trr.mode" is set to 3, blocked TRR request means DNS resolution
fail, we don't fall back to regular DNS in this scenario.

Differential Revision: https://phabricator.services.mozilla.com/D30085

--HG--
extra : moz-landing-system : lando
2019-05-06 19:05:02 +00:00
Valentin Gosu
74914bc5a5 Bug 1548994 - Release nsCompleteUpgradeData.mUpgradeListener on the main thread as it is not always threadsafe r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D30022

--HG--
extra : moz-landing-system : lando
2019-05-13 22:49:02 +00:00
Andrew McCreight
2841945140 Bug 1550860 - Mark implicit builtinclass interfaces explicitly. r=nika
If an XPIDL interface has a method or attribute that is [notxpcom],
then it is implicitly treated as [builtinclass], even if it is not
marked as such. For clarity, this patch goes through and marks every
place that relies on this behavior (aside from some test code).

Differential Revision: https://phabricator.services.mozilla.com/D30714

--HG--
extra : moz-landing-system : lando
2019-05-13 19:51:49 +00:00
Michal Novotny
9bfa74da09 Bug 1550874 - Don't call SSL_SetResumptionToken if SSL_NO_CACHE option was set on the socket, r=valentin
We shouldn't search the cache and try to set TLS resumption token in nsSocketTransport::InitiateSocket() if the socket has SSL_NO_CACHE flag set, because NSS code might not honor the flag when the token is provided via API for external TLS session caches.

Differential Revision: https://phabricator.services.mozilla.com/D30726

--HG--
extra : moz-landing-system : lando
2019-05-13 15:14:46 +00:00
Andrew McCreight
4e2463d64c Bug 1550591 - nsIRequestTailUnblockCallback and nsIRequestContext don't need to be scriptable. r=valentin
Differential Revision: https://phabricator.services.mozilla.com/D30607

--HG--
extra : moz-landing-system : lando
2019-05-10 06:04:53 +00:00
Valentin Gosu
2246580609 Bug 1547882 - Fix test_bug337744.js that expects no %2f in the query of resource URLs r=kmag,kershaw
Differential Revision: https://phabricator.services.mozilla.com/D30351

--HG--
extra : moz-landing-system : lando
2019-05-10 13:56:27 +00:00
Valentin Gosu
ab2249cd48 Bug 1547882 - Don't unescape %2e and %2f in the query or hash or moz-extension URLs. r=kershaw
Since the SubstitutingProtocolHandler is also extended by nsResProtocolHandler, this change would also apply to resource:// URLs.

Differential Revision: https://phabricator.services.mozilla.com/D30344

--HG--
extra : moz-landing-system : lando
2019-05-10 13:56:05 +00:00
Michal Novotny
224fc95a6b Bug 1548472 - Collect telemetry about how is the cache split by the content type, r=mayhemer
Like in case of bug 1506534, this telemetry is sampled periodically every time 2GB of data is written to the cache, i.e. when the cache was used for some time and there is a chance that its content has changed significantly.

Differential Revision: https://phabricator.services.mozilla.com/D29678

--HG--
extra : moz-landing-system : lando
2019-05-08 13:15:40 +00:00
Michal Novotny
242a096333 Bug 1546975 - Cache SSL resumption tokens in necko, r=mayhemer
SSLTokensCache is a simple memory only storage for resumption tokens which are get and set using API for external TLS session caches in NSS.

Differential Revision: https://phabricator.services.mozilla.com/D29465

--HG--
extra : moz-landing-system : lando
2019-05-09 22:04:43 +00:00
Byron Campen [:bwc]
6bc474b4f7 Bug 1548272: Don't look at mFlags in GetOrdered (since this is called on main). r=mjf
Differential Revision: https://phabricator.services.mozilla.com/D29529

--HG--
extra : moz-landing-system : lando
2019-05-09 15:37:55 +00:00
Byron Campen [:bwc]
d9e760b079 Bug 1529612 - Part 4: Work around issue where receiver would get message before sender saw its bufferedAmount drop. r=mjf
Differential Revision: https://phabricator.services.mozilla.com/D30389

--HG--
extra : moz-landing-system : lando
2019-05-09 16:12:35 +00:00
Byron Campen [:bwc]
eb8300b947 Bug 1529612 - Part 2: Keep/update bufferedAmount on main only. Some simplifications. r=mjf
Differential Revision: https://phabricator.services.mozilla.com/D28526

--HG--
extra : moz-landing-system : lando
2019-05-09 15:39:05 +00:00
Noemi Erli
6430d23336 Backed out 12 changesets (bug 1547813) for failures in browser_partitionedIndexedDB.js CLOSED TREE
Backed out changeset 98989127264b (bug 1547813)
Backed out changeset f9d790139a26 (bug 1547813)
Backed out changeset a29f58cef022 (bug 1547813)
Backed out changeset c1288949de1c (bug 1547813)
Backed out changeset 8cad4fd197b1 (bug 1547813)
Backed out changeset 807ce59e7e6e (bug 1547813)
Backed out changeset 06943593738c (bug 1547813)
Backed out changeset 4ced8d49ddc3 (bug 1547813)
Backed out changeset 77a040f527e9 (bug 1547813)
Backed out changeset b4651cfaff30 (bug 1547813)
Backed out changeset 279c140a4d71 (bug 1547813)
Backed out changeset 0e0241f3d366 (bug 1547813)
2019-05-09 20:04:16 +03:00
Ehsan Akhgari
b9c7626390 Bug 1547813 - Part 9: Ensure the cookie service does third-party checks when the cookie policy is set to nsICookieService::BEHAVIOR_REJECT_TRACKER_AND_PARTITION_FOREIGN; r=baku
Differential Revision: https://phabricator.services.mozilla.com/D30118

--HG--
extra : moz-landing-system : lando
2019-05-08 19:38:08 +00:00
Ehsan Akhgari
c7cb5521d1 Bug 1547813 - Part 8: Introduce a CookieSettings API to query whether cookies from third-party trackers must be rejected and use it in Gecko; r=baku
Differential Revision: https://phabricator.services.mozilla.com/D30117

--HG--
extra : moz-landing-system : lando
2019-05-08 20:22:18 +00:00
Ehsan Akhgari
f33f21e80b Bug 1547813 - Part 7: Introduce a storage partitioning API; r=baku
This API abstracts away the details of the decision on what context should be
partitioned away from the consumers and centralizes the decision making into
the same location in the code base.

Differential Revision: https://phabricator.services.mozilla.com/D29742

--HG--
extra : moz-landing-system : lando
2019-05-08 20:15:13 +00:00
Ehsan Akhgari
564ae33dab Bug 1547813 - Part 1: Introduce nsICookieService::BEHAVIOR_REJECT_TRACKER_AND_PARTITION_FOREIGN; r=baku
This new code designates our new cookie policy for blocking cookies and
storage access from third-party trackers and partitioning the cookie jar
of the rest of third-party resources.

Differential Revision: https://phabricator.services.mozilla.com/D29736

--HG--
extra : moz-landing-system : lando
2019-05-08 19:37:40 +00:00
Kershaw Chang
0b4a4597ab Bug 1545226 - Enable gtests r=valentin
This patch fixes some build issues on Android and also enables some gtests.

Differential Revision: https://phabricator.services.mozilla.com/D30386

--HG--
extra : moz-landing-system : lando
2019-05-08 20:56:51 +00:00
Andrea Marchesini
42390cde39 Bug 1546598 - Remove domain cookies in nsICookieService.removeCookiesFromRootDomain(), r=Ehsan
Differential Revision: https://phabricator.services.mozilla.com/D30384

--HG--
extra : moz-landing-system : lando
2019-05-08 22:37:02 +00:00
Dragana Damjanovic
28355093cb Bug 1531344 - Be strict about incorrect chunked encoding. r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D28811

--HG--
extra : moz-landing-system : lando
2019-05-08 19:29:16 +00:00
Andrea Marchesini
c97597a819 Bug 1457503 - Removal of http-equiv cookies. draft, r=jkt
Differential Revision: https://phabricator.services.mozilla.com/D29841

--HG--
extra : moz-landing-system : lando
2019-05-08 13:50:45 +00:00
Ehsan Akhgari
3d7881e880 Bug 1549011 - Ignore cookie name-value-pair strings with an empty name; r=baku
Differential Revision: https://phabricator.services.mozilla.com/D29929

--HG--
extra : moz-landing-system : lando
2019-05-08 08:51:42 +00:00
Haik Aftandilian
45bb7b8823 Bug 1546544 - Enable TCSM r=asuth,spohl,mccr8
Differential Revision: https://phabricator.services.mozilla.com/D29046

--HG--
extra : moz-landing-system : lando
2019-05-07 22:16:14 +00:00
Bogdan Tara
be70e99ad1 Backed out changeset 723587a2ae49 (bug 1531344) for netwerk/test/unit/test_* failures CLOSED TREE 2019-05-08 00:04:32 +03:00
Dragana Damjanovic
463cf81c74 Bug 1531344 - Be strict about incorrect chunked encoding. r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D28811

--HG--
extra : moz-landing-system : lando
2019-05-07 17:57:33 +00:00
arthur.iakab
62df572c1c Backed out 2 changesets (bug 1546544) for causing mochitest-chrome test failures on automation.py CLOSED TREE
Backed out changeset d4b67960c0f9 (bug 1546544)
Backed out changeset fda45db5f8e9 (bug 1546544)
2019-05-07 05:38:37 +03:00
Valentin Gosu
987a27b272 Bug 1525640 - Add nsIHttpChannelInternal.isResolvedByTRR r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D26884

--HG--
extra : moz-landing-system : lando
2019-05-06 16:38:16 +00:00
Valentin Gosu
b20ae58567 Bug 1525640 - Rename nsIHttpChannelInternal.trr to .isHttpServiceChannel to avoid confusion r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D26883

--HG--
extra : moz-landing-system : lando
2019-05-06 16:37:01 +00:00
Valentin Gosu
975c55c679 Bug 1525640 - Pass TRR status from sockettransport to channel r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D26882

--HG--
extra : moz-landing-system : lando
2019-05-06 16:47:14 +00:00
Haik Aftandilian
cd1c25bb79 Bug 1546544 - Enable TCSM r=asuth,spohl,mccr8
Differential Revision: https://phabricator.services.mozilla.com/D29046

--HG--
extra : moz-landing-system : lando
2019-05-06 06:09:10 +00:00
Honza Bambas
994f162385 Bug 1549368 - Let proxyAuthorizationHeader and connectionIsolationKey in proxy.onRequest apply only to HTTPS proxies, no test, r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D30066

--HG--
extra : moz-landing-system : lando
2019-05-06 16:28:25 +00:00
Geoff Brown
069ac0b409 Bug 1545226 - Enable some android gtests in netwerk/test/gtest/parse-ftp; r=jmaher
With changes from bug 1548555, one of the gtests previously disabled on Android
can be re-enabled, but most of the tests in netwerk/test/gtest are still problematic
(some won't build for me).

Differential Revision: https://phabricator.services.mozilla.com/D30081

--HG--
extra : moz-landing-system : lando
2019-05-06 18:53:55 +00:00
Honza Bambas
2555fb9646 Bug 1545420 - Allow extensions to set Proxy-Authorization and connection isolation key through proxy.onRequest, r=dragana,mixedpuppy+mixedpuppy
Differential Revision: https://phabricator.services.mozilla.com/D29825

--HG--
extra : moz-landing-system : lando
2019-05-06 07:22:18 +00:00
dlee
c46d88af6d Bug 1548486 - Set tracking info in fingerprinting annotation & cryptoming annotation. r=baku
The enable channels classified by these two features contain tracker's
hash value.

Differential Revision: https://phabricator.services.mozilla.com/D29647

--HG--
extra : moz-landing-system : lando
2019-05-02 16:06:56 +00:00
Cosmin Sabou
43e85c587a Bug 1140656 - Disable test_socks.js on mac debug for frequent failures. r=jmaher
Differential Revision: https://phabricator.services.mozilla.com/D29967

--HG--
extra : moz-landing-system : lando
2019-05-05 22:40:37 +00:00
Liang-Heng Chen
784cd8785e Bug 1544598 - Part 1: use hash to record origin telemetry; r=Ehsan
Differential Revision: https://phabricator.services.mozilla.com/D29357

--HG--
extra : moz-landing-system : lando
2019-05-03 15:37:14 +00:00
Andrea Marchesini
360fec5787 Bug 1542170 - Expose http channel Id to WebSocketEvent listeners, r=valentin
Differential Revision: https://phabricator.services.mozilla.com/D28865

--HG--
extra : moz-landing-system : lando
2019-05-03 17:25:44 +00:00
Andrea Marchesini
fc1e01dc0b Bug 1542170 - Introduce nsIWebSocketChannel.httpChannelId, r=valentin
Differential Revision: https://phabricator.services.mozilla.com/D28864

--HG--
extra : moz-landing-system : lando
2019-05-03 17:25:24 +00:00
Andrea Marchesini
000c5d8a75 Bug 1320404 - Remove appId from origin attributes - part 4 - necko, r=valentin
Differential Revision: https://phabricator.services.mozilla.com/D29356

--HG--
extra : moz-landing-system : lando
2019-05-03 17:14:23 +00:00
Andrea Marchesini
d179c5015e Bug 1320404 - Remove appId from origin attributes - part 2 - NO_APP_ID UNKNOWN_APP_ID, r=Ehsan
Differential Revision: https://phabricator.services.mozilla.com/D29354

--HG--
extra : moz-landing-system : lando
2019-05-03 17:13:47 +00:00
Andrea Marchesini
f8565bf748 Bug 1320404 - Remove appId from origin attributes - part 1 - OriginAttributes and nsIPrincipal, r=Ehsan,flod
Differential Revision: https://phabricator.services.mozilla.com/D29353

--HG--
extra : moz-landing-system : lando
2019-05-03 17:13:17 +00:00
Geoff Brown
0f0beaf249 Bug 1546553 - Disable some xpcshell tests on Android x86_64; r=jmaher
These tests need to be disabled to get a green run on the Android x86_64
test platform. The failures in toolkit/components/extensions are
concerning and definitely require follow-up.

Differential Revision: https://phabricator.services.mozilla.com/D29843

--HG--
extra : moz-landing-system : lando
2019-05-03 16:50:15 +00:00
Liang-Heng Chen
9aff84c4b1 Bug 1546906 - use strict fingerprint category for telemetry; r=dragana,tanvi
Differential Revision: https://phabricator.services.mozilla.com/D28801

--HG--
extra : moz-landing-system : lando
2019-05-03 10:05:30 +00:00
Gurzau Raul
b4e790d05f Merge inbound to mozilla-central. a=merge 2019-05-03 07:16:59 +03:00
Myk Melez
bfe7c7e0b4 Bug 1547877 - enable configuration of new cert storage implementation r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D29306

--HG--
extra : moz-landing-system : lando
2019-05-02 23:02:13 +00:00
Gurzau Raul
0068b9927d Merge mozilla-central to autoland. a=merge CLOSED TREE 2019-05-03 01:17:27 +03:00
Gurzau Raul
39cabb27e2 Merge inbound to mozilla-central. a=merge 2019-05-03 01:02:21 +03:00
Ehsan Akhgari
782c6b7440 Bug 1548432 - Part 2: Ignore cookie name-value-pair strings without a "=" character; r=baku
Differential Revision: https://phabricator.services.mozilla.com/D29619

--HG--
extra : moz-landing-system : lando
2019-05-02 17:12:55 +00:00
Bogdan Tara
8244fce3c8 Backed out 3 changesets (bug 1525640) for frequent wpt failures CLOSED TREE
Backed out changeset d9a454afe9bf (bug 1525640)
Backed out changeset 19aa991328cb (bug 1525640)
Backed out changeset 4294abed890f (bug 1525640)
2019-05-03 00:16:20 +03:00
Perry Jiang
cf811f1da6 Bug 1535699 - Propagate redirect mode across cross-process redirects. r=asuth
Differential Revision: https://phabricator.services.mozilla.com/D29719

--HG--
extra : moz-landing-system : lando
2019-05-02 20:46:34 +00:00
Gurzau Raul
e54b1b421e Merge mozilla-central to inbound. a=merge CLOSED TREE 2019-05-03 01:19:30 +03:00
Thomas Nguyen
23e61a2595 Bug 1532318 - part 1: use ReferrerInfo class in nsIHttpChannel instead of referrer and referrer policy r=valentin,ckerschb,michal
Differential Revision: https://phabricator.services.mozilla.com/D22783

--HG--
extra : moz-landing-system : lando
2019-05-02 12:34:52 +00:00
Valentin Gosu
50b2b648b6 Bug 1525640 - Add nsIHttpChannelInternal.isResolvedByTRR r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D26884

--HG--
extra : moz-landing-system : lando
2019-05-02 12:53:45 +00:00
Valentin Gosu
f96dbbf019 Bug 1525640 - Rename nsIHttpChannelInternal.trr to .isHttpServiceChannel to avoid confusion r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D26883

--HG--
extra : moz-landing-system : lando
2019-05-02 12:53:38 +00:00