Commit Graph

20663 Commits

Author SHA1 Message Date
Razvan Maries
ab9f3eb05b Backed out 3 changesets (bug 1647759) for GTest perma failures. CLOSED TREE
Backed out changeset 94c175860a86 (bug 1647759)
Backed out changeset e7d8a7d2bdf1 (bug 1647759)
Backed out changeset 2972984413b8 (bug 1647759)
2020-07-09 15:41:22 +03:00
Dimi Lee
84e027594f Bug 1447935 - P2. Use fission-compatible third-party checks r=baku
Differential Revision: https://phabricator.services.mozilla.com/D80187
2020-07-09 11:32:45 +00:00
Dimi Lee
3f4421f020 Bug 1447935 - P1. CreatePairwiseEntitylist uses loading principal when a channel doesn't have an associated top-level window r=baku
loads in appcache doesn't have a top-level window, use loading principal
instead.

Differential Revision: https://phabricator.services.mozilla.com/D80186
2020-07-09 11:32:37 +00:00
Kershaw Chang
9c8f0c8d00 Bug 1647759 - P3: Send init attributes to socket process r=dragana
Depends on D82352

Differential Revision: https://phabricator.services.mozilla.com/D82353
2020-07-07 11:51:17 +00:00
Kershaw Chang
6cb09fb6f3 Bug 1647759 - P2: Send connectivity status to socket process r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D82352
2020-07-06 18:26:49 +00:00
Kershaw Chang
18ea12a27d Bug 1647759 - P1: Make nsIOService::mOffline and nsIOService::mConnectivity atomic r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D82351
2020-07-06 18:26:16 +00:00
Matt Woodrow
17fbf88433 Bug 1649879 - Handle URIFixup that happens on a failed channel in DocumentLoadListener if available, rather than waiting for it to reach nsDocShell. r=kmag
Differential Revision: https://phabricator.services.mozilla.com/D81947
2020-07-08 23:38:22 +00:00
Nika Layzell
3f8ded27c9 Bug 1650163 - Part 2: Add a NOT_REMOTE_TYPE define to clarify calling code, r=farre
Differential Revision: https://phabricator.services.mozilla.com/D82106
2020-07-08 20:16:04 +00:00
Nika Layzell
22a65a237e Bug 1650163 - Part 1: Switch native remoteType values to nsCString, r=farre,geckoview-reviewers,agi
Differential Revision: https://phabricator.services.mozilla.com/D82104
2020-07-08 20:15:59 +00:00
Mihai Alexandru Michis
1ba2a3f6f6 Backed out 3 changesets (bug 1650163) for causing bustages in nsContentSecurityManager.cpp
CLOSED TREE

Backed out changeset 51d7c644a1e6 (bug 1650163)
Backed out changeset 3d2b6908447a (bug 1650163)
Backed out changeset 79141707d47b (bug 1650163)
2020-07-08 21:18:44 +03:00
Nika Layzell
64031d88e9 Bug 1650163 - Part 2: Add a NOT_REMOTE_TYPE define to clarify calling code, r=farre
Differential Revision: https://phabricator.services.mozilla.com/D82106
2020-07-08 01:13:45 +00:00
Nika Layzell
c850a94434 Bug 1650163 - Part 1: Switch native remoteType values to nsCString, r=farre,geckoview-reviewers,agi
Differential Revision: https://phabricator.services.mozilla.com/D82104
2020-07-08 14:54:48 +00:00
Junior Hsu
acc77fd89e Bug 1649965 - only waiting for main thread OnStartRequestSent for LOAD_DOCUMENT_NEEDS_COOKIE, r=mayhemer,necko-reviewers
Differential Revision: https://phabricator.services.mozilla.com/D80682
2020-07-08 15:47:36 +00:00
Kershaw Chang
c87cb10f45 Bug 1527256 - P4: Enable about:networking tests r=dragana
Depends on D82320

Differential Revision: https://phabricator.services.mozilla.com/D82321
2020-07-08 10:28:53 +00:00
Kershaw Chang
39ecbeff00 Bug 1527256 - P3: Get HttpData from socket process r=dragana
Depends on D20355

Differential Revision: https://phabricator.services.mozilla.com/D82320
2020-07-08 10:29:01 +00:00
Kershaw Chang
3a97f39f6d Bug 1527256 - P2: Get DNSCacheEntries from socket process r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D20355
2020-07-08 10:29:03 +00:00
Kershaw Chang
907a9dedd4 Bug 1527256 - P1: Get SocketData from socket process r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D20354
2020-07-08 12:49:44 +00:00
Dimi Lee
0f6d4af47e Bug 1437626 - P5. Only call ShouldEnableClassifier for protection features. r=baku
ShouldEnableClassifier checks two things:
1. If AddOn can load the channel
2. If the classified channel is top-level.

For the first point, we added the check in Bug 1308640, and I think the
idea is only for tracking protection to not block channels when
extensions have permission on the channels' domain.
For annotation features, we should always annotate a channel regardless of whether
it is controlled by extensions (also for ETP).

And since we use first-party classification flag in channels, so we
should also annotate channel no matter it is top-level, first-party or
third-party.

So this patch removes calling ShouldEnableClassifier in annotation
features and also rename ShouldEnableClassifier to
ShouldEnableProtectionForChannel to make the idea more clear.

Differential Revision: https://phabricator.services.mozilla.com/D82504
2020-07-08 12:26:53 +00:00
Dimi Lee
34b12aaca6 Bug 1437626 - P3. Use global tracking Protection pref when a channel doesn't have a loadcontext r=baku
Channels loaded by service worker don't have loadcontext, so we don't
apply tracking protection on them.

Depends on D80183

Differential Revision: https://phabricator.services.mozilla.com/D80184
2020-07-08 12:12:09 +00:00
Dimi Lee
b20ed5b08a Bug 1437626 - P2. Get top-level URI from ClientInfo when a channel is initiated by ShareWorker or ServiceWorker r=baku
When a channel is initiated from sharedworker or service worker, we use
worker's origin as the top-level uri.

Depends on D80182

Differential Revision: https://phabricator.services.mozilla.com/D80183
2020-07-08 12:12:07 +00:00
Dimi Lee
26ac53ba5e Bug 1437626 - P1. Use TYPE_DOCUMENT to determin whether a channel is a top-level load. r=baku
We use whether channel->GetTopWindowURI returns a failure to determin
if the channel is a top-level load. However, channels loaded by service
worker or appcache don't have top-level window.

This patch use TYPE_DOCUMENT to determin whether it is a top-level load.
This patch also adds UrlClassifierCommon::GetTopWindowURI to print debug message
because nsIChannel::GetTopWindowURI is not fission-compatible.

Differential Revision: https://phabricator.services.mozilla.com/D80182
2020-07-08 12:11:59 +00:00
julianwels
c44ea283e8 Bug 1644456 - Manage HTTPS-Only Mode permission with SitePermissions interface. r=necko-reviewers,pbz,dragana
Differential Revision: https://phabricator.services.mozilla.com/D79427
2020-07-08 12:06:02 +00:00
Bogdan Tara
cfe6f49083 Backed out 4 changesets (bug 1527256) for network related bustage CLOSED TREE
Backed out changeset 5f3e90d1112e (bug 1527256)
Backed out changeset 8172b4bbba7b (bug 1527256)
Backed out changeset c15bc3e821ea (bug 1527256)
Backed out changeset a37b0cdf3155 (bug 1527256)
2020-07-08 13:25:34 +03:00
Kershaw Chang
b9dab9a111 Bug 1527256 - P4: Enable about:networking tests r=dragana
Depends on D82320

Differential Revision: https://phabricator.services.mozilla.com/D82321
2020-07-06 11:03:24 +00:00
Kershaw Chang
aad41f988e Bug 1527256 - P3: Get HttpData from socket process r=dragana
Depends on D20355

Differential Revision: https://phabricator.services.mozilla.com/D82320
2020-07-06 11:01:51 +00:00
Kershaw Chang
0a2066141b Bug 1527256 - P2: Get DNSCacheEntries from socket process r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D20355
2020-07-06 11:01:03 +00:00
Kershaw Chang
f7ab79b775 Bug 1527256 - P1: Get SocketData from socket process r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D20354
2020-07-06 10:59:29 +00:00
Junior Hsu
da7ef4914b Bug 1645901 - handle cookie setting in child process for Set-Cookie response, r=baku,mayhemer,necko-reviewers
Differential Revision: https://phabricator.services.mozilla.com/D82130
2020-07-07 15:19:09 +00:00
Kris Maglione
5837ad4bdd Bug 1580764: Part 3 - Remove unused AncestorOuterWindowIDs from LoadInfo. r=nika
Differential Revision: https://phabricator.services.mozilla.com/D82465
2020-07-07 21:14:34 +00:00
Kris Maglione
bd94db4e9a Bug 1580764: Part 2 - Use BrowsingContext IDs rather than window IDs to compute frame IDs. r=zombie
Differential Revision: https://phabricator.services.mozilla.com/D82464
2020-07-07 21:37:53 +00:00
Kris Maglione
01ca404c30 Bug 1580764: Part 1 - Add ancestor BrowsingContext IDs to LoadInfo. r=nika
Differential Revision: https://phabricator.services.mozilla.com/D82463
2020-07-07 21:14:42 +00:00
Narcis Beleuzu
8359f16846 Backed out 7 changesets (bug 1650163, bug 1649477) for bustages on JSActor.cpp . CLOSED TREE
Backed out changeset 4a21afb65254 (bug 1650163)
Backed out changeset c41753a56f5a (bug 1650163)
Backed out changeset 5fb444c35764 (bug 1650163)
Backed out changeset 830aa93d2b0c (bug 1649477)
Backed out changeset eca6e9dce450 (bug 1649477)
Backed out changeset 5b217aa88289 (bug 1649477)
Backed out changeset 8959d02b840f (bug 1649477)
2020-07-08 04:09:27 +03:00
Junior Hsu
9b0685fe4c Bug 1646592 - P4 Remove the depedency between OnStartRequestSent and AttachStreamFilter, r=mayhemer,necko-reviewers
We're shorter the name!

Depends on D81274

Differential Revision: https://phabricator.services.mozilla.com/D81275
2020-07-07 21:46:34 +00:00
Junior Hsu
069f0d6456 Bug 1646592 - P3 Sending endpoint of stream filter via PHttpBackgroundChannel, r=mayhemer,necko-reviewers
Endpoint would be passed by a series of std::move via
nsHttpChannel -> HttpChannelParent -> HttpBackgroundChannelParent ---> HttpBackgroundChannelChild -> HttpChannelChild
												|
												|
   Resolve promise after successfully send IPC<-/

Depends on D81273

Differential Revision: https://phabricator.services.mozilla.com/D81274
2020-07-07 21:46:01 +00:00
Junior Hsu
cea21a8121 Bug 1646592 - P2 remove NeckoTargetChannelEvent which could not be specialized for HttpChannelChild, r=mayhemer,necko-reviewers
NeckoTargetChannelEvent uses a protected member function, which couldn't compile with instantiation of HttpChannelChild
https://searchfox.org/mozilla-central/rev/cfaa250d14e344834932de4c2eed0061701654da/netwerk/ipc/ChannelEventQueue.h#64

Depends on D81272

Differential Revision: https://phabricator.services.mozilla.com/D81273
2020-07-07 21:45:08 +00:00
Junior Hsu
257fe0c281 Bug 1646592 - P1 Use nsISerialEventTarget for HttpBackgroundChannelParent, r=valentin,necko-reviewers
Like bug 1647133, we need this to be nsISerialEventTarget for the InvokeAsync

Differential Revision: https://phabricator.services.mozilla.com/D81272
2020-07-07 21:44:50 +00:00
Nika Layzell
a3b4b6cba4 Bug 1650163 - Part 2: Add a NOT_REMOTE_TYPE define to clarify calling code, r=farre
Differential Revision: https://phabricator.services.mozilla.com/D82106
2020-07-06 20:27:59 +00:00
Nika Layzell
df351180c3 Bug 1650163 - Part 1: Switch native remoteType values to nsCString, r=farre
Differential Revision: https://phabricator.services.mozilla.com/D82104
2020-07-06 20:30:58 +00:00
Nika Layzell
41154a7fb8 Bug 1599579 - Part 3: Load toplevel extension frames into a per-extension BrowsingContextGroup, r=kmag
This is done by tracking a specific BrowsingContextGroup ID on the
WebExtensionPolicy in the parent process. Whenever a load is done with that
policy, the browsing context is replaced to ensure it is loaded in the correct
BrowsingContextGroup.

This patch also ensures that extension iframes are always loaded in the same
process as their embedder document, even if the frame was previously remote.

Differential Revision: https://phabricator.services.mozilla.com/D80256
2020-07-06 19:45:39 +00:00
Nika Layzell
1592543886 Bug 1599579 - Part 2: Reorganize RemoteType logic in MaybeTriggerProcessSwitch, r=mattwoodrow,necko-reviewers,valentin
The goal with this is to avoid having multiple booleans and other values
computed in arbitrary places and used around the method, and instead pre-compute
common shared information, and group each remoteType special-case together.

Hopefully, this should make it easier to extend the behaviour in
MaybeTriggerProcessSwitch in the future.

Differential Revision: https://phabricator.services.mozilla.com/D80255
2020-07-06 19:45:31 +00:00
Nika Layzell
cafcceeb34 Bug 1599579 - Part 1: Add the ability to specify a specific BrowsingContextGroup during process switch, r=kmag
Differential Revision: https://phabricator.services.mozilla.com/D80254
2020-07-06 20:10:43 +00:00
Andrea Marchesini
07b75de903 Bug 1650950 - Rename blacklist, whitelist, and skiplist in the anti-tracking and url-classifier code, r=dimi
Differential Revision: https://phabricator.services.mozilla.com/D82497
2020-07-07 16:17:11 +00:00
Honza Bambas
275edede6b Bug 1605895, r=kershaw,necko-reviewers
Differential Revision: https://phabricator.services.mozilla.com/D82037
2020-07-03 12:37:38 +00:00
Valentin Gosu
6dd9cb9291 Bug 1649127 - Only trigger confirmation in TRR-first and TRR-only modes r=dragana,necko-reviewers
Due to a change in timing in this patch, when we reset the confirmation pref
at the end of the test, a TRR request would happen after we changed the prefs
leading to accessing a non-local IP in testing and causing a crash.
This should be gated on being in the correct mode anyway

Depends on D81517

Differential Revision: https://phabricator.services.mozilla.com/D82222
2020-07-04 15:39:45 +00:00
Valentin Gosu
9b25e934ea Bug 1649127 - Make sure we only set AddrHostRecord::mTRRUsed = true when TRRServiceChannel::AsyncOpen succeeds r=dragana,necko-reviewers
mTRRUsed is a variable that we check to gate several telemetry probes, and to
decide if TRR really failed and we should add a domain to the TRR blocklist.
The problem with setting this too early is that when this is true but we
don't actually send the TRR request, then we will report that we fell back
to Do53 and potentially skip next TRR requests in the future.

The solution here is to only set mTRRUsed if TRRServiceChannel::AsyncOpen
succeeds.

Differential Revision: https://phabricator.services.mozilla.com/D81517
2020-07-07 10:08:28 +00:00
Csoregi Natalia
fe1354b164 Backed out changeset 4ed5a0e27c05 (bug 1647732) for font related wpt failures. CLOSED TREE 2020-07-07 12:31:27 +03:00
Liang-Heng Chen
e69b3bc58b Bug 1647732 - isolate font cache; r=baku,jfkthame,necko-reviewers
Differential Revision: https://phabricator.services.mozilla.com/D82034
2020-07-07 07:49:38 +00:00
Dragana Damjanovic
7ec7ee4a9b Bug 1646961 - Set the correct version of QUIC to be used when initializing Http3Client from necko. r=agrover
Differential Revision: https://phabricator.services.mozilla.com/D82423
2020-07-06 19:50:20 +00:00
Christoph Kerschbaumer
402b0a5c46 Bug 1647719: Introduce Pref for HTTS-Only in Private Browsing Mode. r=JulianWels,jcj
Differential Revision: https://phabricator.services.mozilla.com/D80873
2020-07-06 08:52:02 +00:00
Coroiu Cristina
057efa89c8 Backed out 5 changesets (bug 1649879) for browser-chrome failures at browser/base/content/test/tabs/browser_progress_keyword_search_handling.js
Backed out changeset f9670eed4ac5 (bug 1649879)
Backed out changeset 76ab8adad34b (bug 1649879)
Backed out changeset 6dc2e9474f43 (bug 1649879)
Backed out changeset 6f905d33681f (bug 1649879)
Backed out changeset 13b19e14a332 (bug 1649879)
2020-07-06 10:44:56 +03:00
Matt Woodrow
1ef58514bd Bug 1649879 - Handle URIFixup that happens on a failed channel in DocumentLoadListener if available, rather than waiting for it to reach nsDocShell. r=kmag
Differential Revision: https://phabricator.services.mozilla.com/D81947
2020-07-06 04:29:33 +00:00
Emilio Cobos Álvarez
a0d2559af5 Bug 1649807 - Ignore Pragma: no-cache if Cache-Control is specified. r=mayhemer,necko-reviewers
See bug 1599160 comment 43 for an example in the wild (though it has
been fixed since) which prevents us from caching resources
unnecessarily.

Differential Revision: https://phabricator.services.mozilla.com/D81879
2020-07-03 14:04:31 +00:00
Razvan Maries
9da7f3cb73 Backed out 2 changesets (bug 1649127) for perma failures on test_trr.js. CLOSED TREE
Backed out changeset d967c48fa147 (bug 1649127)
Backed out changeset 17e5b3f78f03 (bug 1649127)
2020-07-04 18:30:54 +03:00
Valentin Gosu
acc4997769 Bug 1649127 - Only trigger confirmation in TRR-first and TRR-only modes r=dragana,necko-reviewers
Due to a change in timing in this patch, when we reset the confirmation pref
at the end of the test, a TRR request would happen after we changed the prefs
leading to accessing a non-local IP in testing and causing a crash.
This should be gated on being in the correct mode anyway

Depends on D81517

Differential Revision: https://phabricator.services.mozilla.com/D82222
2020-07-04 13:08:30 +00:00
Valentin Gosu
a38929f26f Bug 1649127 - Make sure we only set AddrHostRecord::mTRRUsed = true when TRRServiceChannel::AsyncOpen succeeds r=dragana,necko-reviewers
mTRRUsed is a variable that we check to gate several telemetry probes, and to
decide if TRR really failed and we should add a domain to the TRR blocklist.
The problem with setting this too early is that when this is true but we
don't actually send the TRR request, then we will report that we fell back
to Do53 and potentially skip next TRR requests in the future.

The solution here is to only set mTRRUsed if TRRServiceChannel::AsyncOpen
succeeds.

Differential Revision: https://phabricator.services.mozilla.com/D81517
2020-07-04 13:08:15 +00:00
Sylvestre Ledru
caf785c695 Bug 1519636 - Reformat recent changes to the Google coding style r=andi
# ignore-this-changeset

Differential Revision: https://phabricator.services.mozilla.com/D82178
2020-07-04 09:38:43 +00:00
Mihai Alexandru Michis
e587ecf789 Backed out changeset 16ff0a677ab2 (bug 1649127) for causing failures in nsHostResolver.cpp
CLOSED TREE
2020-07-04 00:01:32 +03:00
Valentin Gosu
2d46993c30 Bug 1649127 - Make sure we only set AddrHostRecord::mTRRUsed = true when TRRServiceChannel::AsyncOpen succeeds r=dragana,necko-reviewers
mTRRUsed is a variable that we check to gate several telemetry probes, and to
decide if TRR really failed and we should add a domain to the TRR blocklist.
The problem with setting this too early is that when this is true but we
don't actually send the TRR request, then we will report that we fell back
to Do53 and potentially skip next TRR requests in the future.

The solution here is to only set mTRRUsed if TRRServiceChannel::AsyncOpen
succeeds.

Differential Revision: https://phabricator.services.mozilla.com/D81517
2020-07-03 09:17:44 +00:00
Kershaw Chang
bfef77cb06 Bug 1607426 - Add a mutex to protect nsPACMan::mLoader r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D73286
2020-07-03 12:31:31 +00:00
Honza Bambas
3bd96223fe Bug 1609410 - Allow restart of an HTTP transaction with 421 HTTP end-server response made through a newly authenticated NTLM proxy connection by unsticking the connection, r=kershaw,necko-reviewers
Differential Revision: https://phabricator.services.mozilla.com/D81886
2020-07-02 08:31:18 +00:00
Honza Bambas
a14447a33a Bug 1642602 - Make about:cache show all entries, remove the no longer usable context switch UI, r=michal,necko-reviewers
Differential Revision: https://phabricator.services.mozilla.com/D81885
2020-07-03 11:41:53 +00:00
Jean-Yves Avenard
8fd158d479 Bug 1649684 - Use the current nsISerialEventTarget with the various process hosts. r=nika
In all those cases, the current nsISerialEventTarget is either the main thread or the MessageChannel's nsISerialEventTarget (since bug 1634846)

Differential Revision: https://phabricator.services.mozilla.com/D81966
2020-07-02 22:59:24 +00:00
Michal Novotny
ae7b241f26 Bug 1649410 - [socket-process] test_version_fallback() in netwerk/test/unit/test_http3.js fails r=necko-reviewers,kershaw
Propagate Alt-Used request header set in socket process to parent process.

Differential Revision: https://phabricator.services.mozilla.com/D81714
2020-07-02 16:54:34 +00:00
Csoregi Natalia
4dcffa68cd Backed out 9 changesets (bug 1619953) for causing leaks. CLOSED TREE
Backed out changeset 9f610c8c44de (bug 1619953)
Backed out changeset 4e66983a4f00 (bug 1619953)
Backed out changeset 38aac5691967 (bug 1619953)
Backed out changeset 062c0c9b132f (bug 1619953)
Backed out changeset 830eb658d70e (bug 1619953)
Backed out changeset fccda4625d51 (bug 1619953)
Backed out changeset 4668c99560de (bug 1619953)
Backed out changeset 77c24528c8c2 (bug 1619953)
Backed out changeset b79dc688bfc9 (bug 1619953)
2020-07-02 17:58:57 +03:00
ffxbld
079e757071 No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D82025
2020-07-02 14:34:09 +00:00
ssengupta
2b0a9341fb Bug 1619953 - P8 - Test browser_blob-channelname.js converted to xpcshell-test and updated to work with asynchronous input streams r=baku,necko-reviewers
Differential Revision: https://phabricator.services.mozilla.com/D81783
2020-07-02 13:38:48 +00:00
Noemi Erli
d60357a61d Backed out changeset 3e349b00a1e4 (bug 1649349) for causing failures in browser_CORS-console-warnings.js 2020-07-02 14:01:25 +03:00
Kershaw Chang
555ff876d1 Bug 1648008 - Don't report DNS error if the socket is closed by client side r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D81469
2020-06-29 09:09:21 +00:00
Noemi Erli
6d5eb18b6a Backed out 4 changesets (bug 1437626) for causing ES lint failure CLOSED TREE
Backed out changeset c9a432ac1964 (bug 1437626)
Backed out changeset 905916b5ee1a (bug 1437626)
Backed out changeset c692ce0d363a (bug 1437626)
Backed out changeset fcd023c403bc (bug 1437626)
2020-07-02 11:05:40 +03:00
Dimi Lee
4f69aa8fa0 Bug 1437626 - P3. Use global tracking Protection pref when a channel doesn't have a loadcontext r=baku
Channels loaded by service worker don't have loadcontext, so we don't
apply tracking protection on them.

Depends on D80183

Differential Revision: https://phabricator.services.mozilla.com/D80184
2020-07-02 07:20:52 +00:00
Dimi Lee
f334f91266 Bug 1437626 - P2. Get top-level URI from ClientInfo when a channel is initiated by ShareWorker or ServiceWorker r=baku
When a channel is initiated from sharedworker or service worker, we use
worker's origin as the top-level uri.

Depends on D80182

Differential Revision: https://phabricator.services.mozilla.com/D80183
2020-07-02 07:20:44 +00:00
Dimi Lee
ae27794ca2 Bug 1437626 - P1. Use TYPE_DOCUMENT to determin whether a channel is a top-level load. r=baku
We use whether channel->GetTopWindowURI returns a failure to determin
if the channel is a top-level load. However, channels loaded by service
worker or appcache don't have top-level window.

This patch use TYPE_DOCUMENT to determin whether it is a top-level load.
This patch also adds UrlClassifierCommon::GetTopWindowURI to print debug message
because nsIChannel::GetTopWindowURI is not fission-compatible.

Differential Revision: https://phabricator.services.mozilla.com/D80182
2020-07-02 07:20:42 +00:00
Matt Woodrow
2ffa50a0da Bug 1649349 - Don't delay rejecting DocumentLoadListener's Open promise when we switch process. r=jya
Differential Revision: https://phabricator.services.mozilla.com/D81648
2020-07-02 07:12:23 +00:00
Mihai Alexandru Michis
9a29f7817f Backed out changeset 28298106459d (bug 1649349) for causing multiple mochitest failures.
CLOSED TREE
2020-07-02 05:18:07 +03:00
Junior Hsu
33eb15b30e Bug 1648035 - remove the false alarm assertion given mChild could be destroied by ActorDestory, r=mayhemer,necko-reviewers
Differential Revision: https://phabricator.services.mozilla.com/D81625
2020-07-02 01:07:34 +00:00
Matt Woodrow
ff289259d3 Bug 1649349 - Don't delay rejecting DocumentLoadListener's Open promise when we switch process. r=jya
Differential Revision: https://phabricator.services.mozilla.com/D81648
2020-06-30 19:19:59 +00:00
Honza Bambas
3e4d7a2df9 Bug 1615121 - Keep CacheEntry.mLock when reading its mState to prevent a race, r=michal,necko-reviewers
Differential Revision: https://phabricator.services.mozilla.com/D62773
2020-07-01 17:55:46 +00:00
Dragana Damjanovic
7ab47f85ba Bug 1648553 - Improve Http3Stream sending states. r=michal,necko-reviewers
Differential Revision: https://phabricator.services.mozilla.com/D81396
2020-07-01 11:23:46 +00:00
Valentin Gosu
d65a630d7b Bug 1618271 - Fail DNS requests when proxy is in use r=mayhemer,necko-reviewers
Differential Revision: https://phabricator.services.mozilla.com/D80889
2020-07-01 16:49:19 +00:00
Valentin Gosu
722b5f1b24 Bug 1618271 - Move network.proxy.type to StaticPrefList.yaml r=mayhemer,necko-reviewers
Differential Revision: https://phabricator.services.mozilla.com/D80888
2020-07-01 16:49:05 +00:00
Andy Grover
05abb6839b Bug 1649512 - Update to Neqo 0.4.5 r=dragana,necko-reviewers
Differential Revision: https://phabricator.services.mozilla.com/D81763
2020-07-01 08:11:35 +00:00
Andreas Farre
91413414ea Bug 1645781 - Part 2: Make nsMIMEInputStream always be serializable. r=baku,necko-reviewers
nsMIMEInputStream was conditionally serializable depending on the
wrapped stream. In general when a stream needs to be sent over IPC, if
it isn't serializable we send it using
InputStreamHelper::SerializeInputStreamAsPipe. There is no reason to
not branch on the wrapped stream when serializing nsMIMEInputStream
and use that, instead of sending the nsMIMEInputStream itself over a
pipe.

Differential Revision: https://phabricator.services.mozilla.com/D80890
2020-07-01 14:20:06 +00:00
Valentin Gosu
c5c364d39b Bug 1649417 - Don't perform unnecessary DoH CNAME requests r=dragana,necko-reviewers
Differential Revision: https://phabricator.services.mozilla.com/D81721
2020-07-01 12:34:15 +00:00
Valentin Gosu
b6daaa1aa8 Bug 1649401 - Default initializer for TRR constructors r=dragana,necko-reviewers
Differential Revision: https://phabricator.services.mozilla.com/D81674
2020-07-01 12:34:03 +00:00
Valentin Gosu
6e82d17bea Bug 1649401 - Remove unused mStartTime r=dragana,necko-reviewers
Differential Revision: https://phabricator.services.mozilla.com/D81673
2020-07-01 12:34:56 +00:00
Simon Giesecke
9364b353d4 Bug 1648010 - Remove NS_NAMED_LITERAL_CSTRING and NS_NAMED_LITERAL_STRING macros. r=froydnj
Differential Revision: https://phabricator.services.mozilla.com/D80631
2020-07-01 08:42:31 +00:00
Simon Giesecke
e3c223da3e Bug 1648010 - Fix uses of NS_LITERAL_STRING with C string literals. r=geckoview-reviewers,agi,froydnj
Differential Revision: https://phabricator.services.mozilla.com/D80861
2020-07-01 08:34:12 +00:00
Simon Giesecke
cd8b8939b9 Bug 1648010 - Replace uses of NS_LITERAL_STRING/NS_LITERAL_CSTRING macros by _ns literals. r=geckoview-reviewers,jgilbert,agi,hsivonen,froydnj
Differential Revision: https://phabricator.services.mozilla.com/D80860
2020-07-01 08:29:29 +00:00
Tim Huang
986aadbbd4 Bug 1644738 - Propagate the IsOnContentBlockingAllowList in CookieJarSettings to the script generated document. r=baku
We also need to propagate the IsOnContentBlockingAllowList to the script
generated document. For this kind of document, it won't have the
CookieJarSettings at the first place. It will generate its
CookieJarSettings when someone requests it. And we need to propagate the
flag when generating the CookieJarSettings in this case. Or the script
generated document will have a wrong IsOnContentBlockingAllowList flag.

Differential Revision: https://phabricator.services.mozilla.com/D81727
2020-07-01 05:57:16 +00:00
Honza Bambas
9dc053c421 Bug 1632215 - Make nsHttpChannel::mAuthRetryPending atomic to fix a bit field race, r=valentin,necko-reviewers
Differential Revision: https://phabricator.services.mozilla.com/D81729
2020-06-30 19:03:51 +00:00
Junior Hsu
426527907a Bug 1578230 - do not process transactions blocked on tunnel before a final response, r=mayhemer,necko-reviewers
Depends on D80261

Differential Revision: https://phabricator.services.mozilla.com/D81620
2020-06-30 18:37:28 +00:00
Junior Hsu
65da3adae8 Bug 1578230 - skip 1xx pre-response for H2 CONNECT proxy, r=mayhemer,necko-reviewers
We already able to allow more headers after 1xx for H2.
https://searchfox.org/mozilla-central/rev/5e6c7717255ca9638b2856c2b2058919aec1d21d/netwerk/protocol/http/Http2Session.cpp#1547-1550

What we need to do is a special handle in H2 Tunneling:
Create the transport shims and decide if we need secondary TLS when we have a final response.

Differential Revision: https://phabricator.services.mozilla.com/D80261
2020-06-29 23:33:44 +00:00
Butkovits Atila
b75fb2d3e0 Backed out 4 changesets (bug 1646592) for xpcshell failures on test_ext_webRequest_filterResponseData.js CLOSED TREE
Backed out changeset cc60e258290e (bug 1646592)
Backed out changeset 3a514b227127 (bug 1646592)
Backed out changeset de9ba1eaded1 (bug 1646592)
Backed out changeset 31aab78792d8 (bug 1646592)
2020-06-30 21:50:45 +03:00
Butkovits Atila
146ad267af Backed out 6 changesets (bug 1599579) for bc failures at test_chrome_ext_contentscript_data_uri.html.
Backed out changeset b767f26b10ed (bug 1599579)
Backed out changeset c5bc0ea42193 (bug 1599579)
Backed out changeset cfdd8d5973d4 (bug 1599579)
Backed out changeset 73f6c956fc30 (bug 1599579)
Backed out changeset 14698ab42ee4 (bug 1599579)
Backed out changeset b4bdd8759433 (bug 1599579)
2020-06-30 21:41:27 +03:00
Nika Layzell
4977d4d393 Bug 1599579 - Part 3: Load toplevel extension frames into a per-extension BrowsingContextGroup, r=kmag
This is done by tracking a specific BrowsingContextGroup ID on the
WebExtensionPolicy in the parent process. Whenever a load is done with that
policy, the browsing context is replaced to ensure it is loaded in the correct
BrowsingContextGroup.

This patch also ensures that extension iframes are always loaded in the same
process as their embedder document, even if the frame was previously remote.

Differential Revision: https://phabricator.services.mozilla.com/D80256
2020-06-30 15:55:43 +00:00
Nika Layzell
c42a21e44a Bug 1599579 - Part 2: Reorganize RemoteType logic in MaybeTriggerProcessSwitch, r=mattwoodrow,necko-reviewers,valentin
The goal with this is to avoid having multiple booleans and other values
computed in arbitrary places and used around the method, and instead pre-compute
common shared information, and group each remoteType special-case together.

Hopefully, this should make it easier to extend the behaviour in
MaybeTriggerProcessSwitch in the future.

Differential Revision: https://phabricator.services.mozilla.com/D80255
2020-06-30 15:55:35 +00:00
Nika Layzell
824c8da580 Bug 1599579 - Part 1: Add the ability to specify a specific BrowsingContextGroup during process switch, r=kmag
Differential Revision: https://phabricator.services.mozilla.com/D80254
2020-06-30 16:52:53 +00:00
Junior Hsu
cf2bd325c2 Bug 1646592 - P4 Remove the depedency between OnStartRequestSent and AttachStreamFilter, r=mayhemer,necko-reviewers
We're shorter the name!

Differential Revision: https://phabricator.services.mozilla.com/D81275
2020-06-30 00:35:22 +00:00
Junior Hsu
b5d505b9d7 Bug 1646592 - P3 Sending endpoint of stream filter via PHttpBackgroundChannel, r=mayhemer,necko-reviewers
Endpoint would be passed by a series of std::move via
nsHttpChannel -> HttpChannelParent -> HttpBackgroundChannelParent ---> HttpBackgroundChannelChild -> HttpChannelChild
												|
												|
   Resolve promise after successfully send IPC<-/

Differential Revision: https://phabricator.services.mozilla.com/D81274
2020-06-30 00:35:12 +00:00
Junior Hsu
97eade221b Bug 1646592 - P2 remove NeckoTargetChannelEvent which could not be specialized for HttpChannelChild, r=mayhemer,necko-reviewers
NeckoTargetChannelEvent uses a protected member function, which couldn't compile with instantiation of HttpChannelChild
https://searchfox.org/mozilla-central/rev/cfaa250d14e344834932de4c2eed0061701654da/netwerk/ipc/ChannelEventQueue.h#64

Differential Revision: https://phabricator.services.mozilla.com/D81273
2020-06-30 00:34:54 +00:00