Commit Graph

3964 Commits

Author SHA1 Message Date
Iris Hsiao
703b663355 Backed out changeset a0f243dead30 (bug 1301649) for developers' request 2016-10-20 15:24:50 +08:00
Valentin Gosu
92395971b8 Bug 1294719 - Make sure to check mIPCClosed before calling SendRedirect1Begin r=honzab
MozReview-Commit-ID: 7xE7p6tE2kR
2016-10-19 19:31:01 +02:00
Valentin Gosu
d746e122c8 Bug 1307491 - (Part 1) Remove support for per-app-offline in netwerk/ [nukeb2g] r=bagder
* * *
Bug 1307491 - Remove support for per-app-offline [nukeb2g] r=bagder

MozReview-Commit-ID: FoweWBv9QyE

--HG--
extra : rebase_source : 0f6e0f0d19f108c3aef8b25cb6d605ecd338ee2b
2016-10-17 03:54:46 +02:00
Valentin Gosu
8d0db35d9c Bug 1302400 - Set docshell UA override for redirected channels in the child r=mcmanus
MozReview-Commit-ID: 3rmoAfpvml0
2016-10-13 15:50:50 +02:00
Carsten "Tomcat" Book
85979d0405 Merge mozilla-central to mozilla-inbound 2016-10-13 11:58:40 +02:00
Tim Huang
17d537f0e1 Bug 1277803 - Part 4 : Make the NS_CompareLoadInfoAndLoadContext() skiping test if the request is the favicon loading from the XUL image. r=honzab 2016-10-13 15:43:59 +08:00
Francois Marier
54d1778d66 Bug 1307596 - Add a preference for trimming third-party referrers. r=dragana
MozReview-Commit-ID: EL2L4yMnwAi

--HG--
extra : rebase_source : 6046849abb11560b7073b7fe30f46297e45d16e9
2016-10-05 16:36:16 -07:00
Francois Marier
65552ada0a Bug 1308725 - Remove network.http.sendSecureXSiteReferrer pref. r=dragana
MozReview-Commit-ID: LQgxMijXIaF

--HG--
extra : rebase_source : 62482337ee35edbdcd0cb76efd8614f295ea9099
2016-10-08 12:06:03 -07:00
Wes Kocher
2142de26c1 Backed out 8 changesets (bug 1277803) for browser-chrome test failures a=backout
Backed out changeset 477890efdb88 (bug 1277803)
Backed out changeset 49da326bfe68 (bug 1277803)
Backed out changeset 2d17a40a9077 (bug 1277803)
Backed out changeset b1cb0a195ca1 (bug 1277803)
Backed out changeset c7d82459d152 (bug 1277803)
Backed out changeset 3be9a06248af (bug 1277803)
Backed out changeset 8d119ca96999 (bug 1277803)
Backed out changeset be767a6f7ecd (bug 1277803)
2016-10-12 14:26:00 -07:00
Tim Huang
6e27a2a6a1 Bug 1277803 - Part 4 : Make the NS_CompareLoadInfoAndLoadContext() skiping test if the request is the favicon loading from the XUL image. r=honzab 2016-10-12 17:32:08 +08:00
Ting-Yu Chou
cd6f9ab1d4 Bug 1293501 - Use VirtualProtect to track down a possible memory corruption. r=dragana
MozReview-Commit-ID: J4ZFzR1nE5n
2016-10-06 17:31:43 +08:00
Kate McKinley
9288d568fb Bug 1311893 - HSTS Priming timing telemetry r=ckerschb,francois p=francois
MozReview-Commit-ID: WKmlCqDOKT

--HG--
extra : rebase_source : e41defed5b737b780e8f1d6616517f1204775514
2016-10-26 14:36:44 +09:00
Honza Bambas
26354e9b7b Bug 1311682 - Rename LOG in PackagedAppService.cpp to avoid redefine of LOG directing to nsHttp log module. r=valentin 2016-10-20 06:47:00 -04:00
Ehsan Akhgari
7cbf03adb5 Bug 1307730 - Disallow CORS fetches when we have an expanded principal; r=bzbarsky
It's not possible to construct a useful Origin header when we have
an expanded principal and are about to perform a CORS fetch.  Therefore,
instead of sending a CORS fetch with an |Origin: null| header, we
must fail the request.
2016-10-07 12:47:11 -04:00
Yoshi Huang
2a51f65d99 Bug 1237152 - rename clear-origin-data to clear-origin-attributes-data, r=smaug
find \( -name '*.cpp' -o -name '*.h' -o -name '*.js' -o -name '*.jsm' -o -name '*.idl' -o -name '*.html' \) \
-a -type f -exec sed -i 's/clear-origin-data/clear-origin-attributes-data/g' {} \;
2016-10-07 17:45:10 +08:00
Yoshi Huang
00f6846c07 Bug 1301649 - nits for bug 1260931. r=smaug
- use MOZ_ASSERT_IF
- always call inherit function
2016-10-07 17:42:03 +08:00
Iris Hsiao
5abee5efd3 Backed out changeset d17370e68325 (bug 1277803)
CLOSED TREE
2016-10-07 11:23:45 +08:00
Tim Huang
33effa2da2 Bug 1277803 - Part 4: Make the NS_CompareLoadInfoAndLoadContext() skiping test if the request is the favicon loading from the XUL image. r=honzab 2016-10-06 00:57:00 -04:00
David Keeler
c3c34a8853 bug 1301407 - ensure PSM is initialized on the main thread before doing a speculative connect r=mcmanus
MozReview-Commit-ID: Bc9KiN3Qw1E

--HG--
extra : rebase_source : f531db52fa1e3f17a354922dbf4f73160bcb9458
2016-09-22 14:54:48 -07:00
Christoph Kerschbaumer
b0951acfc5 Bug 1302539 - X-Content-Type-Options: nosniff should not apply to images (temporarily). r=dveditz 2016-09-30 09:38:44 +02:00
Nicholas Hurley
8739dd3c4e Bug 1297554 - Perform a gNeckoParent-ectomy r=billm,mcmanus
MozReview-Commit-ID: 7WQE8MhWlYr

--HG--
extra : rebase_source : 46545fa7485c8ba7ce4b0b4dc48a377b68a2ff80
2016-09-21 12:21:00 -07:00
Carsten "Tomcat" Book
b5206d37f5 Merge mozilla-central to mozilla-inbound 2016-09-28 16:25:01 +02:00
Carsten "Tomcat" Book
572e74ee99 merge mozilla-inbound to mozilla-central a=merge 2016-09-28 15:56:33 +02:00
James Andreou
a47ce92ac2 Bug 1282124 - Remove nsILoadInfo.usePrivateBrowsing and the SEC_FORCE_PRIVATE_BROWSING flag; r=smaug,jryans 2016-09-27 16:56:44 -04:00
Kate McKinley
c57d400961 Bug 1246540 - HSTS Priming Proof of Concept. r=ckerschb, r=mayhemer, r=jld, r=smaug, r=dkeeler, r=jmaher, p=ally
HSTS priming changes the order of mixed-content blocking and HSTS
upgrades, and adds a priming request to check if a mixed-content load is
accesible over HTTPS and the server supports upgrading via the
Strict-Transport-Security header.

Every call site that uses AsyncOpen2 passes through the mixed-content
blocker, and has a LoadInfo. If the mixed-content blocker marks the load as
needing HSTS priming, nsHttpChannel will build and send an HSTS priming
request on the same URI with the scheme upgraded to HTTPS. If the server
allows the upgrade, then channel performs an internal redirect to the HTTPS URI,
otherwise use the result of mixed-content blocker to allow or block the
load.

nsISiteSecurityService adds an optional boolean out parameter to
determine if the HSTS state is already cached for negative assertions.
If the host has been probed within the previous 24 hours, no HSTS
priming check will be sent.

MozReview-Commit-ID: ES1JruCtDdX

--HG--
extra : rebase_source : 2ac6c93c49f2862fc0b9e595eb0598cd1ea4bedf
2016-09-27 11:27:00 -04:00
Valentin Gosu
29eff7dfe4 Bug 1231565 - (Part 3) Make alt-data responses report the correct content length r=michal
MozReview-Commit-ID: DvQP7NB4SqW
2016-09-27 10:26:00 +02:00
Andi-Bogdan Postelnicu
55e8cb71fa Bug 1282408 - Add ignore-initialization-check annotation to variables mPeakSizeID and mPeakCountID from Http2BaseCompressor. r=valentin
MozReview-Commit-ID: H5DsehXu2nr
2016-09-28 11:08:44 +03:00
Francois Marier
16c0d80286 Bug 1302938 - Explain why user referrer trimming policy can be overriden. r=dragana
MozReview-Commit-ID: GfmeIu2WEGX

--HG--
extra : rebase_source : 386c056f51dd351e7713806cec2292f5a226e8ef
2016-09-27 13:25:35 -07:00
Sebastian Hengst
cc132d092f Backed out changeset 04cda7684b40 (bug 1217876) for failing xpcshell test test_resumable_channel_wrap.js in debug builds. r=backout 2016-09-25 11:00:29 +02:00
Andrea Marchesini
ff1efcb34a Bug 1217876 - nsIXMLHttpRequest must show the authentication prompt correctly when used by addons in e10s, r=mayhemer 2016-09-25 07:50:44 +02:00
Thomas Nguyen
8c6badef26 Bug 1276836 - Implement same-origin, strict-origin, strict-origin-when-cross-origin referrer policy. r=mcmanus,jdm
MozReview-Commit-ID: 39AFT4RgHpl

--HG--
extra : rebase_source : 1512555cb0da30a0fbbfd58c27e4a4d48a93586e
2016-09-22 16:27:42 -07:00
Valentin Gosu
76d2cd8b5d Bug 1231565 - (Part 2) Allow storing alternate data in the HTTP cache r=honzab
* Add PAltDataOutputStream.ipdl to be able to open an OutputStream to the cache entry in the child process
* AltDataOutputStreamChild/Parent are Main Thread only for now.
* Adds methods for reading and writing alt-data to nsICacheInfoChannel.idl
* Keep a ref of the cache entry after OnStopRequest in case the consumer tries to open the alt-data output stream

MozReview-Commit-ID: jlraDI97Hg
2016-04-11 05:17:02 +02:00
Josh Matthews
903b01d434 Bug 1300464 - Avoid overriding security info with null. r=orange 2016-09-23 13:04:33 -04:00
Josh Matthews
701a2f8248 Bug 1300464 - Propagate redirecting channel's security information to new HTTP channels when intercepted channels are redirected. r=mayhemer
--HG--
extra : rebase_source : 2655a88e05214b1c3fc5ab03be446e56b9afdb78
2016-09-16 13:38:07 -04:00
Nicholas Hurley
01c12cb1ef Bug 1296280 (part 2) - Add pref for our SETTINGS_MAX_TABLE_SIZE. r=mcmanus
MozReview-Commit-ID: 44CYEvJOno0

--HG--
extra : rebase_source : 5317d25981bf83ab8cc9b921055cc9028a1d4470
2016-08-24 14:35:43 -07:00
Nicholas Hurley
233fa83252 Bug 1296280 (part 1) - Add telemetry for HPACK usage. r=bsmedberg,mcmanus data-review=bsmedberg
MozReview-Commit-ID: Hk5XNrj3Tbh

--HG--
extra : rebase_source : 73851cd39d9885110c49007e4e9fca5de06d2d74
2016-08-24 06:38:52 -07:00
amy
49df78fa51 Bug 1013635 - Removed the dispatch and call the notification service directly in HttpBaseChannel.cpp where this noticiation emits, r=honzab 2016-09-20 15:54:52 +08:00
Patrick McManus
14f8754356 Bug 1302488 - Alt-Svc Hard Refresh Race r=hurley 2016-09-13 13:24:19 -04:00
Andi-Bogdan Postelnicu
06bc5f3170 Bug 1282408 - add ignore initialization check flag for variables in AltSvcMapping. r=mcmanus
MozReview-Commit-ID: GRWqLr1pW3q
2016-09-14 10:05:11 +03:00
Dragana Damjanovic dd.mozilla@gmail.com
ef19d6d0f4 Bug 1296288 - Add telemetry for TLS early-data. r=mcmanus
--HG--
extra : rebase_source : 0d62e936d2af4de539802dff046a3b8453e4d9c6
2016-09-13 02:32:00 -04:00
Phil Ringnalda
3748f182f6 Merge m-i to m-c, a=merge 2016-09-10 00:14:21 -07:00
Ben Kelly
4fd0037991 Bug 1301678 - Make InterceptedChannel use a different state variable to indicated the channel is closed. r=jdm, a=RyanVM 2016-09-09 07:28:00 -04:00
Nicholas Nethercote
37301e25ad Bug 1297300 - Add missing checks to GetSpec() calls in netwerk/. r=hurley,dragana.
--HG--
extra : rebase_source : 961a82fb6e723688837e5250f57121c14ca958cb
2016-08-26 16:40:57 +10:00
Christoph Kerschbaumer
3d6e94c203 Bug 1300891 - Rename SCRIPT_BLOCK_WRONG_MIME to avoid confusing the telemetry probe. r=gfritzsche 2016-09-08 09:29:17 +02:00
Tom Tung
a167b66e90 Bug 1187335 - P4 - Integrate fetch and cache with SRI & add nsIConsoleReportCollector to show console report. r=bkelly. 2016-09-07 10:20:23 +08:00
Patrick McManus
1d5bcef263 Bug 1301117 - update opportunisitic encryption r=hurley 2016-08-16 15:51:18 -04:00
Tom Tung
c34ee7095c Bug 1187335 - P1 - Add a way to report error to all clients for ServiceWorker and SharedWorker. r=bkelly. 2016-05-23 14:56:46 +08:00
Carsten "Tomcat" Book
656d6db419 Merge mozilla-central to mozilla-inbound 2016-09-07 17:21:27 +02:00
Carsten "Tomcat" Book
1c61ba654e merge mozilla-inbound to mozilla-central a=merge 2016-09-07 17:20:12 +02:00
Michael Layzell
36e08437d0 Bug 1018486 - Part 8: Various other changes, r=smaug
MozReview-Commit-ID: B0dsomkWgEk
2016-09-07 10:50:45 -04:00
Nicholas Hurley
c2ffdd32e6 Bug 1300148 - Fix handling of HPACK dynamic size update r=mcmanus
MozReview-Commit-ID: 46n3gWvyW0P

--HG--
extra : rebase_source : e1e4b5f443a59c53f158a8644f65752cb52f6036
2016-09-02 10:50:00 -07:00
Nicholas Nethercote
34dcc7b852 Bug 1299384 - Use MOZ_MUST_USE with NS_warn_if_impl(). r=erahm.
This change avoids lots of false positives for Coverity's CHECKED_RETURN
warning, caused by NS_WARN_IF's current use in both statement-style and
expression-style.

In the case where the code within the NS_WARN_IF has side-effects, I made the
following change.

> NS_WARN_IF(NS_FAILED(FunctionWithSideEffects()));
> -->
> Unused << NS_WARN_IF(NS_FAILED(FunctionWithSideEffects()));

In the case where the code within the NS_WARN_IF lacks side-effects, I made the
following change.

> NS_WARN_IF(!condWithoutSideEffects);
> -->
> NS_WARNING_ASSERTION(condWithoutSideEffects, "msg");

This has two improvements.
- The condition is not evaluated in non-debug builds.
- The sense of the condition is inverted to the familiar "this condition should
  be true" sense used in assertions.

A common variation on the side-effect-free case is the following.

> nsresult rv = Fn();
> NS_WARN_IF_(NS_FAILED(rv));
> -->
> DebugOnly<nsresult rv> = Fn();
> NS_WARNING_ASSERTION(NS_SUCCEEDED(rv), "Fn failed");

--HG--
extra : rebase_source : 58788245021096efa8372a9dc1d597a611d45611
2016-09-02 17:12:24 +10:00
Ting-Yu Chou
d458637195 Bug 1293501 - Remove debug code for not propagating to Aurora. r=me 2016-09-07 10:17:20 +08:00
Andrea Marchesini
52b87b9b14 Bug 1217876 - nsIXMLHttpRequest must show the authentication prompt correctly when used by addons in e10s, r=mayhemer 2016-09-06 21:21:29 +02:00
Bill McCloskey
64d9762e21 Bug 1277582 - Don't send HTTP constructor when content process has started to shut down (r=mrbkap) 2016-09-06 11:13:33 -07:00
Yoshi Huang
02dbef1f56 Bug 1260931 - Part 4: update OriginAttributes when http redirect. r=smaug 2016-09-06 10:26:03 +08:00
Sebastian Hengst
4f2b803d06 Backed out changeset 9efc0a2bb306 (bug 1260931) 2016-09-05 21:15:25 +02:00
Tom Schuster
e92a8267c7 Bug 1299267 - Add additonal telemetry types. r=ckerschb 2016-09-05 20:02:52 +02:00
Tom Schuster
b1d8e594b3 Bug 1299267 - Block additional wrong mime types for scripts. r=ckerschb 2016-09-05 20:02:52 +02:00
Yoshi Huang
0f48c1a7b5 Bug 1260931 - Part 4: update OriginAttributes when http redirect. r=smaug 2016-09-06 01:50:37 +08:00
Sebastian Hengst
30f931f0b9 Backed out changeset 51b6694efc8f (bug 1260931) 2016-09-02 15:33:51 +02:00
Sebastian Hengst
31c5f85098 Backed out 5 changesets (bug 1260931)
Backed out changeset 86e1a437021b (bug 1260931)
Backed out changeset be65e87da9e3 (bug 1260931)
Backed out changeset 39cff1d988fd (bug 1260931)
Backed out changeset 2fa7c4d8a5bc (bug 1260931)
Backed out changeset 075d612841fb (bug 1260931)
2016-09-02 14:55:59 +02:00
Sebastian Hengst
83cd5f7eeb Backed out changeset 51b6694efc8f (bug 1260931) 2016-09-02 14:38:37 +02:00
Yoshi Huang
35d80df5df Bug 1260931 - Part 4: update OriginAttributes when http redirect. r=smaug 2016-09-02 15:04:40 +08:00
Nicholas Nethercote
b71747b2ac Bug 1299727 - Rename NS_WARN_IF_FALSE as NS_WARNING_ASSERTION. r=erahm.
The new name makes the sense of the condition much clearer. E.g. compare:

  NS_WARN_IF_FALSE(!rv.Failed());

with:

  NS_WARNING_ASSERTION(!rv.Failed());

The new name also makes it clearer that it only has effect in debug builds,
because that's standard for assertions.

--HG--
extra : rebase_source : 886e57a9e433e0cb6ed635cc075b34b7ebf81853
2016-09-01 15:01:16 +10:00
Nicholas Nethercote
742fc7eb48 Bug 1297961 (part 1) - Introduce nsURI::GetSpecOrDefault(). r=hurley.
This function is an infallible alternative to nsIURI::GetSpec(). It's useful
when it's appropriate to handle a GetSpec() failure with a failure string, e.g.
for log/warning/error messages. It allows code like this:

  nsAutoCString spec;
  uri->GetSpec(spec);
  printf("uri: %s", spec.get());

to be changed to this:

  printf("uri: %s", uri->GetSpecOrDefault().get());

This introduces a slight behavioural change. Previously, if GetSpec() failed,
an empty string would be used here. Now, "[nsIURI::GetSpec failed]" will be
produced instead. In most cases this failure string will make for a clearer
log/warning/error message than the empty string.
* * *
Bug 1297961 (part 1b) - More GetSpecOrDefault() additions. r=hurley.

I will fold this into part 1 before landing.

--HG--
extra : rebase_source : ddc19a5624354ac098be019ca13cc24b99b80ddc
2016-08-26 16:02:31 +10:00
Valentin Gosu
df850d1391 Bug 1297663 - Backout bug 1264566 a=backout
MozReview-Commit-ID: L9poncnpmGs
2016-08-31 15:39:36 +02:00
Andrea Marchesini
c318373c9a Bug 1298738 - Remove onprogress assertions in HttpChannelChild, r=jduell 2016-08-30 15:49:36 -07:00
Ting-Yu Chou
70ba2956d1 Bug 1293501 - Add some more crash annotations to dianose bug 1145613. r=mcmanus
MozReview-Commit-ID: 4hsrKYlV0ER

--HG--
extra : transplant_source : %0BF%BB%02%B5%C4%D9H%DC%07%FC%BD%BDQ7%5Dr%AD%19%F4
2016-08-26 10:08:18 +08:00
Andrea Marchesini
f32b1a0034 Bug 1298737 - Indentation fix in HttpChannelParentListener.cpp, r=smaug 2016-08-29 07:04:22 -07:00
Nicholas Nethercote
c2306345d5 Bug 1297658 - Avoid unnecessary checking in memory reporters. r=erahm.
This patch removes checking of all the callback calls in memory reporter
CollectReport() functions, because it's not useful.

The patch also does some associated clean-up.

- Replaces some uses of nsIMemoryReporterCallback with the preferred
  nsIHandleReportCallback typedef.

- Replaces aCallback/aCb/aClosure with aHandleRepor/aData for CollectReports()
  parameter names, for consistency.

- Adds MOZ_MUST_USE/[must_use] in a few places in nsIMemoryReporter.idl.

- Uses the MOZ_COLLECT_REPORT macro in all suitable places.

Overall the patch reduces code size by ~300 lines and reduces the size of
libxul by about 37 KiB on my Linux64 builds.

--HG--
extra : rebase_source : e94323614bd10463a0c5134a7276238a7ca1cf23
2016-08-24 15:23:45 +10:00
Tim Huang
a6320a5184 Bug 1291652 - Part 2: Make sure that we fetch originAttributes from the nsIloadInfo, but not from the nsIloadContext. r=mayhemer
--HG--
extra : rebase_source : 54ec153c713fe7262a793eb8d3cb53bd43075776
2016-08-23 07:20:00 -04:00
Jinank Jain
f2776091ea Bug 712936 - Convert users of PR_STATIC_ASSERT to C++11 static_assert(). r=Ms2ger
--HG--
extra : rebase_source : b3e4c3e7c81799f2b1f3ec62ba3ff3b5d3adba27
2016-08-23 11:24:54 -04:00
Ryan VanderMeulen
69113163cf Merge m-c to inbound. a=merge 2016-08-24 09:09:05 -04:00
Phil Ringnalda
f35f0c69e0 Merge m-c to a CLOSED TREE f-t 2016-08-23 22:59:10 -07:00
Ryan VanderMeulen
d63783b351 Merge m-c to autoland. a=merge 2016-08-23 10:07:52 -04:00
Ryan VanderMeulen
82663d8710 Merge inbound to m-c. a=merge 2016-08-23 10:05:18 -04:00
Wes Kocher
730c59fce4 Backed out changeset e1f3ed984607 (bug 1261585) for causing bug 1292586 a=backout 2016-08-22 11:29:04 -07:00
Ryan VanderMeulen
baeaac9b10 Merge m-c to fx-team. a=merge 2016-08-23 10:11:52 -04:00
Tom Tromey
ef548d271d Bug 1244227 - Add nsIThrottledInputChannel.idl and implement. r=mcmanus
MozReview-Commit-ID: JVIjxEO901W
2016-08-23 07:36:52 -06:00
Christoph Kerschbaumer
3976be42ff Bug 1288361 - Return a network error for requests whose type is script and response has a MIME type that starts with image. r=dveditz 2016-08-22 08:55:35 +02:00
Dragana Damjanovic
79e0168a9b Bug 1264578 - Networking support for http with TLS 1.3. r=mcmanus
--HG--
extra : rebase_source : eb851624fe67c2112ed4ed1cf7f1790b41a341cd
2016-08-11 08:28:00 -04:00
Jonathan Hao
cc481ebca7 Bug 1283319 - Tests for connection info's hash key. r=mayhemer
--HG--
extra : rebase_source : 78cc39299d247146be49078976f1671a8bb89811
2016-08-17 19:57:00 -04:00
Jonathan Hao
bc22b048bf Bug 1283319 - Add origin attributes to nsHttpConnectionInfo's hash key. r=mayhemer
--HG--
extra : rebase_source : a3f95ed223d6658e78daba0268407b7be0b7e16f
2016-08-04 01:17:00 -04:00
Kan-Ru Chen
d137b49d3b Bug 1295103 - Check OriginAttributes::PopulateFromSuffix return value in PackagedAppVerifier. r=mayhemer
MozReview-Commit-ID: 7V4vEZKWYHw

--HG--
extra : rebase_source : 2f5cea9a361072fbd1955ffc349f74f1e53d9a1c
2016-08-15 18:19:44 +08:00
Kan-Ru Chen
b6d880aca1 Bug 1297276 - Rename mfbt/unused.h to mfbt/Unused.h for consistency. r=froydnj
The patch is generated from following command:

  rgrep -l unused.h|xargs sed -i -e s,mozilla/unused.h,mozilla/Unused.h,

MozReview-Commit-ID: AtLcWApZfES


--HG--
rename : mfbt/unused.h => mfbt/Unused.h
2016-08-24 14:47:04 +08:00
Honza Bambas
70d3208f45 Bug 1293765 - Don't release upload stream in HTTP channel until authentication loop is done. r=valentin 2016-08-17 07:08:00 -04:00
Sebastian Hengst
de7e01f00d Backed out changeset 123049a4ba35 (bug 1264578) for timing out in browser_clientAuth_connection.js. r=backout 2016-08-18 17:28:09 +02:00
Dragana Damjanovic
ff61d396de Bug 1264578 - Networking support for http with TLS 1.3. r=mcmanus
--HG--
extra : rebase_source : 09ca6da3ec12db1db0520f20a7cc39c515d8b5a8
2016-08-11 08:28:00 -04:00
Chris Peterson
b64548f6c6 Bug 1295085 - Replace PR_snprintf and s[n]printf calls with SprintfLiteral in netwerk/. r=jduell 2016-08-15 01:09:06 -07:00
Honza Bambas
d90344d529 Bug 1291700 - Allow negotiate/ntml to work when in the 'Never remember history' mode. r=jduell
--HG--
extra : rebase_source : 179a11fa222061f4c1c1cc2c1485ca49ca226d29
2016-08-16 06:24:00 -04:00
Nicholas Nethercote
60d75f09dd Bug 1295053 (part 8) - Don't use NS_METHOD for netwerk/ functions. r=froydnj.
These don't need __stdcall on Win32.

--HG--
extra : rebase_source : 891a7c252f947ca6ed0d9558138becd97e070ba5
2016-08-16 12:12:30 +10:00
Nicholas Nethercote
ca40b738e4 Bug 1294620 - Use infallible XPIDL attribute getters more. r=erahm.
This makes a lot of code more compact, and also avoids some redundant nsresult
checks.

The patch also removes a handful of redundant checks on infallible setters.

--HG--
extra : rebase_source : f82426e7584d0d5cddf7c2524356f0f318fbea7d
2016-08-12 15:19:29 +10:00
Ting-Yu Chou
6813eb1209 Bug 1293501 - Add debug annotations to track down the crash of bug 1145613. r=jduell
--HG--
extra : rebase_source : 11e074486a5a3d06fc1de50b51ac30b45358a1db
2016-08-08 10:57:10 +08:00
Valentin Gosu
c472ce64a3 Bug 1264566 - Close mUploadStream in the content process in OnStopRequest. r=jduell
MozReview-Commit-ID: GPmltXvAT6s
2016-08-11 00:48:46 +02:00
Yoshi Huang
9895a88a2a Bug 1292450 - Check mPrivateBrowsingId is correct in LoadInfo and LoadContext. r=smaug, ehsan
Make sure the mPrivateBrowsingId of Origin Attributes is consistent
between LoadInfo and LoadContext.

For chrome docshell, its mPrivateBrowsingId remains 0 even if its
UserPrivateBrowsing() is true (bug 1278664). So we sync the
mPrivateBrowsingId field in LoadInfo in the same way.
2016-08-15 19:03:24 +08:00
Igor
175543fda8 Bug 1293384 - Part 2: Rename Snprintf.h header to Sprintf.h. r=froydnj 2016-08-14 23:43:21 -07:00
Nicholas Nethercote
3b0485fcdb Bug 1294645 - Don't use NS_CALLBACK for callbacks in nsI{Input,Output,UnicharInput},Stream.idl. r=froydnj.
Slightly less than half (93 / 210) of the NS_METHOD instances in the codebase
are because of the use of NS_CALLBACK in
nsI{Input,Output,UnicharInput},Stream.idl. The use of __stdcall on Win32 isn't
important for these callbacks because they are only used as arguments to
[noscript] methods.

This patch converts them to vanilla |nsresult| functions. It increases the size
of xul.dll by about ~600 bytes, which is about 0.001%.

--HG--
extra : rebase_source : c15d85298e0975fd030cd8f8f8e54501f453959b
2016-08-12 17:36:22 +10:00
Christoph Kerschbaumer
f2589e5050 Bug 1294411 - Update XCTO: nosniff implementation to accept images which content type starts with 'image/'. r=dveditz 2016-08-11 14:49:02 +02:00
Nicholas Nethercote
bab6d17ebf Bug 1293117 (part 4) - Change many NS_IMETHODIMP occurrences to NS_IMETHOD. r=froydnj.
This patch makes the following changes on many in-class methods.

- NS_IMETHODIMP F() override;      --> NS_IMETHOD F() override;
- NS_IMETHODIMP F() override {...} --> NS_IMETHOD F() override {...}
- NS_IMETHODIMP F() final;         --> NS_IMETHOD F() final;
- NS_IMETHODIMP F() final {...}    --> NS_IMETHOD F() final {...}

Using NS_IMETHOD is the preferred way of marking in-class virtual methods.
Although these transformations add an explicit |virtual|, they are safe --
there's an implicit |virtual| anyway because |override| and |final| only work
with virtual methods.

--HG--
extra : rebase_source : 386ee4e4ea2ecd8d5001efabc3ac87b4d6c0659f
2016-08-08 10:54:47 +10:00
Michael Layzell
eea03e9e4d Bug 1293364 - Refactor out duplicate typedefs in xpidl, r=mayhemer
MozReview-Commit-ID: 6lJxrqqBTk8
2016-08-10 11:11:42 -04:00
Carsten "Tomcat" Book
553a2da922 merge mozilla-inbound to mozilla-central a=merge 2016-08-10 15:54:26 +02:00
Nicholas Nethercote
e7f10a07fd Bug 1293603 (part 2) - Make Run() declarations consistent. r=erahm.
This patch makes most Run() declarations in subclasses of nsIRunnable have the
same form: |NS_IMETHOD Run() override|.

As a result of these changes, I had to add |override| to a couple of other
functions to satisfy clang's -Winconsistent-missing-override warning.

--HG--
extra : rebase_source : 815d0018b0b13329bb5698c410f500dddcc3ee12
2016-08-08 12:18:10 +10:00
Henry Chang
4d24f3fb3f Bug 1210985 - More specific error message for "useCredentials" and wildcard allowing origin. r=ckerschb
MozReview-Commit-ID: 9MvrhZk4sPI

--HG--
extra : rebase_source : de7999c6573e7e5670eab63699851c550ebe8af0
extra : source : 26506044f7650db6f2b27c3c496ba44ddf927723
2016-08-05 11:46:33 +08:00
Franziskus Kiefer
7943c27406 Bug 1290037 - Update keybits in H2, r=mt
MozReview-Commit-ID: 35oWoDMqe1Y

--HG--
extra : rebase_source : 020fbd93c190131eb04eed2d583787d6e5954a5a
2016-07-28 16:48:00 +02:00
Patrick McManus
68cdc941e8 Bug 1291814 - enforce h2 increasing push ids. r=hurley 2016-08-03 14:36:50 -04:00
Carsten "Tomcat" Book
5e3b6f7523 Merge mozilla-central to autoland
--HG--
rename : dom/media/platforms/apple/ReorderQueue.h => dom/media/platforms/ReorderQueue.h
rename : js/src/jit-test/tests/wasm/basic-conversion.js => js/src/jit-test/tests/wasm/conversion.js
rename : testing/web-platform/meta/html/semantics/embedded-content-0/media-elements/video_008.htm.ini => testing/web-platform/meta/html/semantics/embedded-content/media-elements/video_008.htm.ini
rename : testing/web-platform/meta/referrer-policy/origin-only/attr-referrer/cross-origin/http-http/img-tag/generic.keep-origin-redirect.http.html.ini => testing/web-platform/meta/referrer-policy/origin/attr-referrer/cross-origin/http-http/img-tag/generic.keep-origin-redirect.http.html.ini
rename : testing/web-platform/meta/referrer-policy/origin-only/attr-referrer/cross-origin/http-http/img-tag/generic.no-redirect.http.html.ini => testing/web-platform/meta/referrer-policy/origin/attr-referrer/cross-origin/http-http/img-tag/generic.no-redirect.http.html.ini
rename : testing/web-platform/meta/referrer-policy/origin-only/attr-referrer/cross-origin/http-http/img-tag/generic.swap-origin-redirect.http.html.ini => testing/web-platform/meta/referrer-policy/origin/attr-referrer/cross-origin/http-http/img-tag/generic.swap-origin-redirect.http.html.ini
rename : testing/web-platform/meta/referrer-policy/origin-only/attr-referrer/cross-origin/http-https/img-tag/generic.keep-origin-redirect.http.html.ini => testing/web-platform/meta/referrer-policy/origin/attr-referrer/cross-origin/http-https/img-tag/generic.keep-origin-redirect.http.html.ini
rename : testing/web-platform/meta/referrer-policy/origin-only/attr-referrer/cross-origin/http-https/img-tag/generic.no-redirect.http.html.ini => testing/web-platform/meta/referrer-policy/origin/attr-referrer/cross-origin/http-https/img-tag/generic.no-redirect.http.html.ini
rename : testing/web-platform/meta/referrer-policy/origin-only/attr-referrer/cross-origin/http-https/img-tag/generic.swap-origin-redirect.http.html.ini => testing/web-platform/meta/referrer-policy/origin/attr-referrer/cross-origin/http-https/img-tag/generic.swap-origin-redirect.http.html.ini
rename : testing/web-platform/meta/referrer-policy/origin-only/attr-referrer/same-origin/http-http/img-tag/generic.keep-origin-redirect.http.html.ini => testing/web-platform/meta/referrer-policy/origin/attr-referrer/same-origin/http-http/img-tag/generic.keep-origin-redirect.http.html.ini
rename : testing/web-platform/meta/referrer-policy/origin-only/attr-referrer/same-origin/http-http/img-tag/generic.no-redirect.http.html.ini => testing/web-platform/meta/referrer-policy/origin/attr-referrer/same-origin/http-http/img-tag/generic.no-redirect.http.html.ini
rename : testing/web-platform/meta/referrer-policy/origin-only/attr-referrer/same-origin/http-http/img-tag/generic.swap-origin-redirect.http.html.ini => testing/web-platform/meta/referrer-policy/origin/attr-referrer/same-origin/http-http/img-tag/generic.swap-origin-redirect.http.html.ini
rename : testing/web-platform/meta/referrer-policy/origin-only/attr-referrer/same-origin/http-https/img-tag/generic.keep-origin-redirect.http.html.ini => testing/web-platform/meta/referrer-policy/origin/attr-referrer/same-origin/http-https/img-tag/generic.keep-origin-redirect.http.html.ini
rename : testing/web-platform/meta/referrer-policy/origin-only/attr-referrer/same-origin/http-https/img-tag/generic.no-redirect.http.html.ini => testing/web-platform/meta/referrer-policy/origin/attr-referrer/same-origin/http-https/img-tag/generic.no-redirect.http.html.ini
rename : testing/web-platform/meta/referrer-policy/origin-only/attr-referrer/same-origin/http-https/img-tag/generic.swap-origin-redirect.http.html.ini => testing/web-platform/meta/referrer-policy/origin/attr-referrer/same-origin/http-https/img-tag/generic.swap-origin-redirect.http.html.ini
rename : testing/web-platform/meta/referrer-policy/origin-only/http-rp/cross-origin/http-http/img-tag/generic.keep-origin-redirect.http.html.ini => testing/web-platform/meta/referrer-policy/origin/http-rp/cross-origin/http-http/img-tag/generic.keep-origin-redirect.http.html.ini
rename : testing/web-platform/meta/referrer-policy/origin-only/http-rp/cross-origin/http-http/img-tag/generic.no-redirect.http.html.ini => testing/web-platform/meta/referrer-policy/origin/http-rp/cross-origin/http-http/img-tag/generic.no-redirect.http.html.ini
rename : testing/web-platform/meta/referrer-policy/origin-only/http-rp/cross-origin/http-http/img-tag/generic.swap-origin-redirect.http.html.ini => testing/web-platform/meta/referrer-policy/origin/http-rp/cross-origin/http-http/img-tag/generic.swap-origin-redirect.http.html.ini
rename : testing/web-platform/meta/referrer-policy/origin-only/http-rp/cross-origin/http-https/img-tag/generic.keep-origin-redirect.http.html.ini => testing/web-platform/meta/referrer-policy/origin/http-rp/cross-origin/http-https/img-tag/generic.keep-origin-redirect.http.html.ini
rename : testing/web-platform/meta/referrer-policy/origin-only/http-rp/cross-origin/http-https/img-tag/generic.no-redirect.http.html.ini => testing/web-platform/meta/referrer-policy/origin/http-rp/cross-origin/http-https/img-tag/generic.no-redirect.http.html.ini
rename : testing/web-platform/meta/referrer-policy/origin-only/http-rp/cross-origin/http-https/img-tag/generic.swap-origin-redirect.http.html.ini => testing/web-platform/meta/referrer-policy/origin/http-rp/cross-origin/http-https/img-tag/generic.swap-origin-redirect.http.html.ini
rename : testing/web-platform/meta/referrer-policy/origin-only/http-rp/same-origin/http-http/img-tag/generic.keep-origin-redirect.http.html.ini => testing/web-platform/meta/referrer-policy/origin/http-rp/same-origin/http-http/img-tag/generic.keep-origin-redirect.http.html.ini
rename : testing/web-platform/meta/referrer-policy/origin-only/http-rp/same-origin/http-http/img-tag/generic.no-redirect.http.html.ini => testing/web-platform/meta/referrer-policy/origin/http-rp/same-origin/http-http/img-tag/generic.no-redirect.http.html.ini
rename : testing/web-platform/meta/referrer-policy/origin-only/http-rp/same-origin/http-http/img-tag/generic.swap-origin-redirect.http.html.ini => testing/web-platform/meta/referrer-policy/origin/http-rp/same-origin/http-http/img-tag/generic.swap-origin-redirect.http.html.ini
rename : testing/web-platform/meta/referrer-policy/origin-only/http-rp/same-origin/http-https/img-tag/generic.keep-origin-redirect.http.html.ini => testing/web-platform/meta/referrer-policy/origin/http-rp/same-origin/http-https/img-tag/generic.keep-origin-redirect.http.html.ini
rename : testing/web-platform/meta/referrer-policy/origin-only/http-rp/same-origin/http-https/img-tag/generic.no-redirect.http.html.ini => testing/web-platform/meta/referrer-policy/origin/http-rp/same-origin/http-https/img-tag/generic.no-redirect.http.html.ini
rename : testing/web-platform/meta/referrer-policy/origin-only/http-rp/same-origin/http-https/img-tag/generic.swap-origin-redirect.http.html.ini => testing/web-platform/meta/referrer-policy/origin/http-rp/same-origin/http-https/img-tag/generic.swap-origin-redirect.http.html.ini
rename : testing/web-platform/tests/html/semantics/embedded-content-0/media-elements/video_008.htm => testing/web-platform/tests/html/semantics/embedded-content/media-elements/video_008.htm
rename : testing/web-platform/tests/referrer-policy/origin-only/http-rp/cross-origin/http-http/fetch-request/generic.keep-origin-redirect.http.html.headers => testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/fetch-request/generic.keep-origin-redirect.http.html.headers
rename : testing/web-platform/tests/referrer-policy/origin-only/http-rp/cross-origin/http-http/fetch-request/generic.no-redirect.http.html.headers => testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/fetch-request/generic.no-redirect.http.html.headers
rename : testing/web-platform/tests/referrer-policy/origin-only/http-rp/cross-origin/http-http/fetch-request/generic.swap-origin-redirect.http.html.headers => testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/fetch-request/generic.swap-origin-redirect.http.html.headers
rename : testing/web-platform/tests/referrer-policy/origin-only/http-rp/cross-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html.headers => testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html.headers
rename : testing/web-platform/tests/referrer-policy/origin-only/http-rp/cross-origin/http-http/iframe-tag/generic.no-redirect.http.html.headers => testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/iframe-tag/generic.no-redirect.http.html.headers
rename : testing/web-platform/tests/referrer-policy/origin-only/http-rp/cross-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html.headers => testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html.headers
rename : testing/web-platform/tests/referrer-policy/origin-only/http-rp/cross-origin/http-http/img-tag/generic.keep-origin-redirect.http.html.headers => testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/img-tag/generic.keep-origin-redirect.http.html.headers
rename : testing/web-platform/tests/referrer-policy/origin-only/http-rp/cross-origin/http-http/img-tag/generic.no-redirect.http.html.headers => testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/img-tag/generic.no-redirect.http.html.headers
rename : testing/web-platform/tests/referrer-policy/origin-only/http-rp/cross-origin/http-http/img-tag/generic.swap-origin-redirect.http.html.headers => testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/img-tag/generic.swap-origin-redirect.http.html.headers
rename : testing/web-platform/tests/referrer-policy/origin-only/http-rp/cross-origin/http-http/script-tag/generic.keep-origin-redirect.http.html.headers => testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/script-tag/generic.keep-origin-redirect.http.html.headers
rename : testing/web-platform/tests/referrer-policy/origin-only/http-rp/cross-origin/http-http/script-tag/generic.no-redirect.http.html.headers => testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/script-tag/generic.no-redirect.http.html.headers
rename : testing/web-platform/tests/referrer-policy/origin-only/http-rp/cross-origin/http-http/script-tag/generic.swap-origin-redirect.http.html.headers => testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/script-tag/generic.swap-origin-redirect.http.html.headers
rename : testing/web-platform/tests/referrer-policy/origin-only/http-rp/cross-origin/http-http/xhr-request/generic.keep-origin-redirect.http.html.headers => testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/xhr-request/generic.keep-origin-redirect.http.html.headers
rename : testing/web-platform/tests/referrer-policy/origin-only/http-rp/cross-origin/http-http/xhr-request/generic.no-redirect.http.html.headers => testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/xhr-request/generic.no-redirect.http.html.headers
rename : testing/web-platform/tests/referrer-policy/origin-only/http-rp/cross-origin/http-http/xhr-request/generic.swap-origin-redirect.http.html.headers => testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/xhr-request/generic.swap-origin-redirect.http.html.headers
rename : testing/web-platform/tests/referrer-policy/origin-only/http-rp/cross-origin/http-https/fetch-request/generic.keep-origin-redirect.http.html.headers => testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/fetch-request/generic.keep-origin-redirect.http.html.headers
rename : testing/web-platform/tests/referrer-policy/origin-only/http-rp/cross-origin/http-https/fetch-request/generic.no-redirect.http.html.headers => testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/fetch-request/generic.no-redirect.http.html.headers
rename : testing/web-platform/tests/referrer-policy/origin-only/http-rp/cross-origin/http-https/fetch-request/generic.swap-origin-redirect.http.html.headers => testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/fetch-request/generic.swap-origin-redirect.http.html.headers
rename : testing/web-platform/tests/referrer-policy/origin-only/http-rp/cross-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html.headers => testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html.headers
rename : testing/web-platform/tests/referrer-policy/origin-only/http-rp/cross-origin/http-https/iframe-tag/generic.no-redirect.http.html.headers => testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/iframe-tag/generic.no-redirect.http.html.headers
rename : testing/web-platform/tests/referrer-policy/origin-only/http-rp/cross-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html.headers => testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html.headers
rename : testing/web-platform/tests/referrer-policy/origin-only/http-rp/cross-origin/http-https/img-tag/generic.keep-origin-redirect.http.html.headers => testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/img-tag/generic.keep-origin-redirect.http.html.headers
rename : testing/web-platform/tests/referrer-policy/origin-only/http-rp/cross-origin/http-https/img-tag/generic.no-redirect.http.html.headers => testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/img-tag/generic.no-redirect.http.html.headers
rename : testing/web-platform/tests/referrer-policy/origin-only/http-rp/cross-origin/http-https/img-tag/generic.swap-origin-redirect.http.html.headers => testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/img-tag/generic.swap-origin-redirect.http.html.headers
rename : testing/web-platform/tests/referrer-policy/origin-only/http-rp/cross-origin/http-https/script-tag/generic.keep-origin-redirect.http.html.headers => testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/script-tag/generic.keep-origin-redirect.http.html.headers
rename : testing/web-platform/tests/referrer-policy/origin-only/http-rp/cross-origin/http-https/script-tag/generic.no-redirect.http.html.headers => testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/script-tag/generic.no-redirect.http.html.headers
rename : testing/web-platform/tests/referrer-policy/origin-only/http-rp/cross-origin/http-https/script-tag/generic.swap-origin-redirect.http.html.headers => testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/script-tag/generic.swap-origin-redirect.http.html.headers
rename : testing/web-platform/tests/referrer-policy/origin-only/http-rp/cross-origin/http-https/xhr-request/generic.keep-origin-redirect.http.html.headers => testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/xhr-request/generic.keep-origin-redirect.http.html.headers
rename : testing/web-platform/tests/referrer-policy/origin-only/http-rp/cross-origin/http-https/xhr-request/generic.no-redirect.http.html.headers => testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/xhr-request/generic.no-redirect.http.html.headers
rename : testing/web-platform/tests/referrer-policy/origin-only/http-rp/cross-origin/http-https/xhr-request/generic.swap-origin-redirect.http.html.headers => testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/xhr-request/generic.swap-origin-redirect.http.html.headers
rename : testing/web-platform/tests/referrer-policy/origin-only/http-rp/same-origin/http-http/fetch-request/generic.keep-origin-redirect.http.html.headers => testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/fetch-request/generic.keep-origin-redirect.http.html.headers
rename : testing/web-platform/tests/referrer-policy/origin-only/http-rp/same-origin/http-http/fetch-request/generic.no-redirect.http.html.headers => testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/fetch-request/generic.no-redirect.http.html.headers
rename : testing/web-platform/tests/referrer-policy/origin-only/http-rp/same-origin/http-http/fetch-request/generic.swap-origin-redirect.http.html.headers => testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/fetch-request/generic.swap-origin-redirect.http.html.headers
rename : testing/web-platform/tests/referrer-policy/origin-only/http-rp/same-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html.headers => testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html.headers
rename : testing/web-platform/tests/referrer-policy/origin-only/http-rp/same-origin/http-http/iframe-tag/generic.no-redirect.http.html.headers => testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/iframe-tag/generic.no-redirect.http.html.headers
rename : testing/web-platform/tests/referrer-policy/origin-only/http-rp/same-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html.headers => testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html.headers
rename : testing/web-platform/tests/referrer-policy/origin-only/http-rp/same-origin/http-http/img-tag/generic.keep-origin-redirect.http.html.headers => testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/img-tag/generic.keep-origin-redirect.http.html.headers
rename : testing/web-platform/tests/referrer-policy/origin-only/http-rp/same-origin/http-http/img-tag/generic.no-redirect.http.html.headers => testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/img-tag/generic.no-redirect.http.html.headers
rename : testing/web-platform/tests/referrer-policy/origin-only/http-rp/same-origin/http-http/img-tag/generic.swap-origin-redirect.http.html.headers => testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/img-tag/generic.swap-origin-redirect.http.html.headers
rename : testing/web-platform/tests/referrer-policy/origin-only/http-rp/same-origin/http-http/script-tag/generic.keep-origin-redirect.http.html.headers => testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/script-tag/generic.keep-origin-redirect.http.html.headers
rename : testing/web-platform/tests/referrer-policy/origin-only/http-rp/same-origin/http-http/script-tag/generic.no-redirect.http.html.headers => testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/script-tag/generic.no-redirect.http.html.headers
rename : testing/web-platform/tests/referrer-policy/origin-only/http-rp/same-origin/http-http/script-tag/generic.swap-origin-redirect.http.html.headers => testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/script-tag/generic.swap-origin-redirect.http.html.headers
rename : testing/web-platform/tests/referrer-policy/origin-only/http-rp/same-origin/http-http/xhr-request/generic.keep-origin-redirect.http.html.headers => testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/xhr-request/generic.keep-origin-redirect.http.html.headers
rename : testing/web-platform/tests/referrer-policy/origin-only/http-rp/same-origin/http-http/xhr-request/generic.no-redirect.http.html.headers => testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/xhr-request/generic.no-redirect.http.html.headers
rename : testing/web-platform/tests/referrer-policy/origin-only/http-rp/same-origin/http-http/xhr-request/generic.swap-origin-redirect.http.html.headers => testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/xhr-request/generic.swap-origin-redirect.http.html.headers
rename : testing/web-platform/tests/referrer-policy/origin-only/http-rp/same-origin/http-https/fetch-request/generic.keep-origin-redirect.http.html.headers => testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/fetch-request/generic.keep-origin-redirect.http.html.headers
rename : testing/web-platform/tests/referrer-policy/origin-only/http-rp/same-origin/http-https/fetch-request/generic.no-redirect.http.html.headers => testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/fetch-request/generic.no-redirect.http.html.headers
rename : testing/web-platform/tests/referrer-policy/origin-only/http-rp/same-origin/http-https/fetch-request/generic.swap-origin-redirect.http.html.headers => testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/fetch-request/generic.swap-origin-redirect.http.html.headers
rename : testing/web-platform/tests/referrer-policy/origin-only/http-rp/same-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html.headers => testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html.headers
rename : testing/web-platform/tests/referrer-policy/origin-only/http-rp/same-origin/http-https/iframe-tag/generic.no-redirect.http.html.headers => testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/iframe-tag/generic.no-redirect.http.html.headers
rename : testing/web-platform/tests/referrer-policy/origin-only/http-rp/same-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html.headers => testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html.headers
rename : testing/web-platform/tests/referrer-policy/origin-only/http-rp/same-origin/http-https/img-tag/generic.keep-origin-redirect.http.html.headers => testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/img-tag/generic.keep-origin-redirect.http.html.headers
rename : testing/web-platform/tests/referrer-policy/origin-only/http-rp/same-origin/http-https/img-tag/generic.no-redirect.http.html.headers => testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/img-tag/generic.no-redirect.http.html.headers
rename : testing/web-platform/tests/referrer-policy/origin-only/http-rp/same-origin/http-https/img-tag/generic.swap-origin-redirect.http.html.headers => testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/img-tag/generic.swap-origin-redirect.http.html.headers
rename : testing/web-platform/tests/referrer-policy/origin-only/http-rp/same-origin/http-https/script-tag/generic.keep-origin-redirect.http.html.headers => testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/script-tag/generic.keep-origin-redirect.http.html.headers
rename : testing/web-platform/tests/referrer-policy/origin-only/http-rp/same-origin/http-https/script-tag/generic.no-redirect.http.html.headers => testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/script-tag/generic.no-redirect.http.html.headers
rename : testing/web-platform/tests/referrer-policy/origin-only/http-rp/same-origin/http-https/script-tag/generic.swap-origin-redirect.http.html.headers => testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/script-tag/generic.swap-origin-redirect.http.html.headers
rename : testing/web-platform/tests/referrer-policy/origin-only/http-rp/same-origin/http-https/xhr-request/generic.keep-origin-redirect.http.html.headers => testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/xhr-request/generic.keep-origin-redirect.http.html.headers
rename : testing/web-platform/tests/referrer-policy/origin-only/http-rp/same-origin/http-https/xhr-request/generic.no-redirect.http.html.headers => testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/xhr-request/generic.no-redirect.http.html.headers
rename : testing/web-platform/tests/referrer-policy/origin-only/http-rp/same-origin/http-https/xhr-request/generic.swap-origin-redirect.http.html.headers => testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/xhr-request/generic.swap-origin-redirect.http.html.headers
extra : rebase_source : 6d4775b78e280819e9abd9b3760b3fc059098283
2016-08-02 17:15:16 +02:00
Nicholas Hurley
54a819c93b Bug 1253699 - Use transaction to determine end-to-end tls when proxying. r=mcmanus
MozReview-Commit-ID: 5Q87t5sQKBf

--HG--
extra : rebase_source : fa4ebe5c0f8fa3d7cf65351fe500854695094e64
2016-07-27 10:00:21 -07:00
Nicholas Hurley
c520425d6e Bug 1248197 - Remove spdy/3.1 support. r=mcmanus
MozReview-Commit-ID: 1RgzxOY00Le

--HG--
extra : rebase_source : 6b37c087fcffcea7e5dd56d1e6ad5d099e8f5e49
2016-07-15 15:13:49 -07:00
Decky Coss
646f325157 Bug 1277019 - Change header and status parsing methods to take nsACString instead of char array. r=mayhemer
MozReview-Commit-ID: 7ZNwvnTMCzo

--HG--
extra : transplant_source : %E7T%DC%83%08%22%11%92%A4%2C%89G%1C%88%B3L%0D%7D%FA%FC
2016-05-31 12:42:15 -04:00
Jan Horak
db067f26be Bug 1277213 - Reset state after cancel. r=mayhemer 2016-07-28 10:09:32 -04:00
Iris Hsiao
caea40742f Backed out changeset 8dc198cd46ff (bug 1246540) for Mochitest failures 2016-07-27 13:14:07 +08:00
Kate McKinley
c6650db185 Bug 1246540 HSTS Priming Proof of Concept
HSTS priming changes the order of mixed-content blocking and HSTS
upgrades, and adds a priming request to check if a mixed-content load is
accesible over HTTPS and the server supports upgrading via the
Strict-Transport-Security header.

Every call site that uses AsyncOpen2 passes through the mixed-content
blocker, and has a LoadInfo. If the mixed-content blocker marks the load as
needing HSTS priming, nsHttpChannel will build and send an HSTS priming
request on the same URI with the scheme upgraded to HTTPS. If the server
allows the upgrade, then channel performs an internal redirect to the HTTPS URI,
otherwise use the result of mixed-content blocker to allow or block the
load.

nsISiteSecurityService adds an optional boolean out parameter to
determine if the HSTS state is already cached for negative assertions.
If the host has been probed within the previous 24 hours, no HSTS
priming check will be sent.

(r=ckerschb,r=mayhemer,r=jld,r=smaug,r=dkeeler,r=jmaher,p=ally)
2016-07-26 13:03:00 +08:00
Iris Hsiao
a7c8429fc4 Backed out changeset d7e39be85498 (bug 1246540) for Mochitest failures 2016-07-27 11:15:52 +08:00
Honza Bambas
14d285bdcd Bug 1171203 - Fix redirection limit underflow, don't count internal redirect to this limit, r=mcmanus 2016-08-01 04:12:00 +02:00
Kate McKinley
567ebcf321 Bug 1246540 - HSTS Priming Proof of Concept. r=ckerschb, r=mayhemer, r=jld, r=smaug, r=dkeeler, r=jmaher, p=ally
HSTS priming changes the order of mixed-content blocking and HSTS
upgrades, and adds a priming request to check if a mixed-content load is
accesible over HTTPS and the server supports upgrading via the
Strict-Transport-Security header.

Every call site that uses AsyncOpen2 passes through the mixed-content
blocker, and has a LoadInfo. If the mixed-content blocker marks the load as
needing HSTS priming, nsHttpChannel will build and send an HSTS priming
request on the same URI with the scheme upgraded to HTTPS. If the server
allows the upgrade, then channel performs an internal redirect to the HTTPS URI,
otherwise use the result of mixed-content blocker to allow or block the
load.

nsISiteSecurityService adds an optional boolean out parameter to
determine if the HSTS state is already cached for negative assertions.
If the host has been probed within the previous 24 hours, no HSTS
priming check will be sent.
2016-07-26 13:03:00 -04:00
Carsten "Tomcat" Book
25aa8617fc Backed out changeset 1825b8fa636a (bug 1246540) for bustage
--HG--
extra : rebase_source : 45defacae713b2c2f75813fea6f2f289ebc481cd
2016-07-26 12:52:15 +02:00
Kate McKinley
01cbd73591 Bug 1246540 - HSTS Priming Proof of Concept. r=ckerschb,r=mayhemer,r=jld,r=smaug,r=dkeeler,r=jmaher,p=ally
HSTS priming changes the order of mixed-content blocking and HSTS
upgrades, and adds a priming request to check if a mixed-content load is
accesible over HTTPS and the server supports upgrading via the
Strict-Transport-Security header.

Every call site that uses AsyncOpen2 passes through the mixed-content
blocker, and has a LoadInfo. If the mixed-content blocker marks the load as
needing HSTS priming, nsHttpChannel will build and send an HSTS priming
request on the same URI with the scheme upgraded to HTTPS. If the server
allows the upgrade, then channel performs an internal redirect to the HTTPS URI,
otherwise use the result of mixed-content blocker to allow or block the
load.

nsISiteSecurityService adds an optional boolean out parameter to
determine if the HSTS state is already cached for negative assertions.
If the host has been probed within the previous 24 hours, no HSTS
priming check will be sent.

(r=ckerschb,r=mayhemer,r=jld,r=smaug,r=dkeeler,r=jmaher,p=ally)
2016-07-25 12:37:00 +02:00
Carsten "Tomcat" Book
0a5622c093 Backed out changeset 640247e978ba (bug 1246540) for bustage 2016-07-24 15:59:31 +02:00
Kate McKinley
547500d5a7 Bug 1246540 - HSTS Priming Proof of Concept. r=honzab
HSTS priming changes the order of mixed-content blocking and HSTS
upgrades, and adds a priming request to check if a mixed-content load is
accesible over HTTPS and the server supports upgrading via the
Strict-Transport-Security header.

Every call site that uses AsyncOpen2 passes through the mixed-content
blocker, and has a LoadInfo. If the mixed-content blocker marks the load as
needing HSTS priming, nsHttpChannel will build and send an HSTS priming
request on the same URI with the scheme upgraded to HTTPS. If the server
allows the upgrade, then channel performs an internal redirect to the HTTPS URI,
otherwise use the result of mixed-content blocker to allow or block the
load.

nsISiteSecurityService adds an optional boolean out parameter to
determine if the HSTS state is already cached for negative assertions.
If the host has been probed within the previous 24 hours, no HSTS
priming check will be sent.

(r=ckerschb,r=mayhemer,r=jld,r=smaug,r=dkeeler,r=jmaher,p=ally)
2016-07-22 18:35:00 +02:00
Wei-Cheng Pan
eab2098c99 Bug 1264566 - Part 3: Release upload stream after request complete. r=valentin
MozReview-Commit-ID: 5r1fEkOy9vU

--HG--
extra : transplant_source : %1Dc6%99%3F%5C%81%F6%FDu%FD%C0l%B8-%CD%AF%BBx%01
extra : histedit_source : b407a427fa4cd3fedfd71f7d7f56958fce1099ca
2016-06-24 18:12:32 +08:00
Tom Tromey
5538d692d3 Bug 1286877 - do not set c-basic-offset for python-mode; r=gps
This removes the unnecessary setting of c-basic-offset from all
python-mode files.

This was automatically generated using

    perl -pi -e 's/; *c-basic-offset: *[0-9]+//'

... on the affected files.

The bulk of these files are moz.build files but there a few others as
well.

MozReview-Commit-ID: 2pPf3DEiZqx

--HG--
extra : rebase_source : 0a7dcac80b924174a2c429b093791148ea6ac204
2016-07-14 10:16:42 -06:00
Franziskus Kiefer
dd5231632f Bug 1263793 - Using content signature verifier for verifying remote newtab, r=keeler,mayhemer
MozReview-Commit-ID: ABXYYseKImq

--HG--
extra : rebase_source : 79614e5215e738dff9683ad447245bd830c887bf
2016-05-19 10:59:48 +02:00
Chris Peterson
b175c9fdd5 Bug 1277106 - Part 2: Expand MOZ_UTF16() strings to u"" string literals. r=Waldo 2016-07-20 22:03:25 -07:00
Wes Kocher
e2d9911273 Backed out changeset 21d8bb5af7b4 (bug 1263793) for leaks in various jobs CLOSED TREE 2016-07-20 11:16:37 -07:00
Franziskus Kiefer
9b9c643025 Bug 1263793 - Using content signature verifier for verifying remote newtab, r=keeler,mayhemer
MozReview-Commit-ID: CHUPgBr8WaC

--HG--
extra : rebase_source : 969bd058a157c7307b7a4d3c2a4c5d62e82b7489
2016-05-19 10:59:48 +02:00
Thomas Zimmermann
4bee1b2945 Bug 1288077: Forward declare arrays by including 'nsTArrayForwardDeclare.h', r=froydnj
MozReview-Commit-ID: 4RBeHDyhQgr
2016-07-20 17:29:36 +02:00
Christoph Kerschbaumer
9ec95d3d9d Bug 471020 - Implement X-Content-Type-Options: nosniff. r=dveditz,bz,mcmanus 2016-07-20 12:22:27 +02:00
Dragana Damjanovic
56aa665f1b Bug 1274818 - Early return from nsHttpChannel::CallOnStartRequest on its second call, r=dragana 2016-07-15 12:14:00 +02:00
Dragana Damjanovic dd.mozilla@gmail.com
35cecae1b6 Bug 1261585 - Make nsITraceableChannel listener work with content encoding.r=jduell
--HG--
extra : rebase_source : 98c549ada53f64f66eb716801f0140da6b7252ef
2016-07-19 05:05:00 +02:00
Nicholas Nethercote
b844244609 Bug 1273043 - Add a missing null check to HttpChannelChild::DoOnStartRequest(). r=michal.
--HG--
extra : rebase_source : 9524ee9f1328505c8136a8da8bfea49fb279f33e
2016-07-12 10:33:07 +10:00
Wes Kocher
c9783f64cb Backed out 4 changesets (bug 471020) for frequent Windows w(2) failures CLOSED TREE a=merge
Backed out changeset d9675ab3d203 (bug 471020)
Backed out changeset 3ee328c56de0 (bug 471020)
Backed out changeset 000576e264bd (bug 471020)
Backed out changeset ffe60708c457 (bug 471020)
2016-07-18 16:07:28 -07:00
Christoph Kerschbaumer
f897b7df7e Bug 471020 - Implement X-Content-Type-Options: nosniff. r=dveditz,bz,mcmanus 2016-07-18 14:47:48 +02:00
Jan Horak
f1cd3790fc Bug 890908 - Move Negotiate auth off main thread. r=mayhemer
--HG--
extra : rebase_source : ca85ad4bb099845b45a276823fe1abca68d384eb
2016-07-14 03:32:00 -04:00
Valentin Gosu
3d1c76ef59 Bug 1277582 - Check if TabChild is still available before calling SendPHttpChannelConstructor. r=billm
MozReview-Commit-ID: 5XH3cYkbUd1
2016-07-15 03:32:20 +03:00
Patrick McManus
d564a1740d Bug 1286664 - TLSFilterTransaction::WriteSegments null Connection() r=hurley 2016-07-13 16:52:51 -04:00
Andrew Sutherland
4d5d691957 Bug 1274250 - Referrer host should be IDN encoded when trimmed by policy. r=valentin
Since bug 822869 the referrer trimming has relied on using prePath when
trimming resulting in non-ASCII hosts being passed through in UTF-8 (or
whatever their encoding was.)

Prior to this patch, the logic when trimming was to generate the referrer
string using prePath and possibly nsIURL.filePath, then re-derive the
nsIURI from that string.

Concerned about the cost of introducing asciiPrePath just for this consumer,
I opted to have the code just combine the scheme and asciiHostPort to
approximate the prior use of prePath.  (userPass is explicitly cleared by
the code.)

Concerned about weirdness/loss of fidelity in the nsIURI, I replaced the
code that re-derived the URI from the spec string with manual clearing
of the parts of the URI/URL we were not including.  This may not be the
right thing to do.

I modified the existing Gecko-specific test coverage of SetReferrerPolicy.
The existing web platform tests and referrer policy didn't seem concerned
with this case, and the bug is indeed localized to a very small segment
of Gecko code.  Note that the userReferrerTrimmingPolicy=1 bug case can
only be triggered by explicit user preference setting and this is only
tested in test_referrer.js.  userReferrerTrimmingPolicy=2 need not be
set by preference if REFERRER_POLICY_ORIGIN or
REFERRER_POLICY_ORIGIN_WHEN_XORIGIN (when cross origin) is used.
2016-07-13 11:08:53 -04:00
Ben Kelly
9028a55053 Bug 1286258 Abort http channels that fail ContinueAsyncOpen() during service worker handling. r=valentin 2016-07-12 10:54:13 -07:00
Thomas Wisniewski
ef7d665ee0 Bug 1207233 - Part 1: Allow not sending a Content-Type header, or sending a blank string for it, and have XMLHttpRequest.setRequestHeader honor those possibilities. r=dragana 2016-07-11 14:27:36 -04:00
Carsten "Tomcat" Book
b40f905f49 Backed out changeset 643bfa8b72ba (bug 1207233) for bustage 2016-07-12 11:40:16 +02:00
Thomas Wisniewski
291ec7772c Bug 1207233 - Part 1: Allow not sending a Content-Type header, or sending a blank string for it, and have XMLHttpRequest.setRequestHeader honor those possibilities. r=dragana
--HG--
extra : rebase_source : f4063c85716f899545878f89fc7f2225ef95c7cd
2016-07-11 14:27:36 -04:00
Patrick McManus
558727e2f9 Bug 1275917 - 1st transaction on dontresused h2 session r=hurley 2016-07-05 12:33:34 -04:00
Valentin Gosu
e49ed17270 Bug 1277582 - Don't send SendPHttpChannelConstructor ipdl messages during child shutdown r=dragana,jdm
MozReview-Commit-ID: F6pCCn4jPVb
2016-07-07 17:12:00 +03:00
Nicholas Hurley
0c1bd66dda Bug 1280605 - Update Alt-Svc parser to RFC. r=mcmanus
MozReview-Commit-ID: 1N3HuuAimFy
2016-07-06 11:09:53 -07:00
Patrick McManus
d7d8d5b5dc Bug 1283823 - ASpdySession::ForceIO() safety after h2 Shutdown() r=hurley 2016-07-05 17:43:21 -04:00
Carsten "Tomcat" Book
3b4c79cd57 Backed out changeset 7132b115ab91 (bug 1275917) for causing timeouts in test_notification_http2.js
--HG--
extra : rebase_source : efb6ab780e52d75b648f3461bf7c5d526b2c6f3d
2016-07-06 16:39:35 +02:00
Patrick McManus
e066471796 Bug 1275917 - 1st transaction on dontresused h2 session r=hurley 2016-07-05 12:33:34 -04:00
Thomas Nguyen
53c1367728 Bug 1279494 - Fix crash in SetReferrerWithPolicy, add null check the triggeringPrincipal. r=ckerschb
MozReview-Commit-ID: ho0StGNqc8
2016-07-04 17:05:57 +08:00
Decky Coss
45a4f56d95 Bug 1279324: use VisitOriginalResponseHeaders to check for multiple Access-Control-Allow-Origin values; r=ckerschb
MozReview-Commit-ID: JiPs16Cmr0s

--HG--
extra : transplant_source : %CE%FB%60%C7%AAcp%BB%BB%E0%B65%3B%A3%D4%03%19%C2%8E%18
2016-06-20 18:03:55 -04:00
Christoph Kerschbaumer
71fde070bb Bug 1282554 - Provide helper function to check if channel can be openen using open2() and asyncOpen2() r=bholly 2016-06-28 19:03:56 +02:00