Alexis Beingessner
5013279fa5
Bug 1637727 - convert network.http.rcwn prefs to StaticPrefs. r=KrisWright,necko-reviewers,valentin
...
converts:
* network.http.rcwn.enabled
* network.http.rcwn.cache_queue_normal_threshold
* network.http.rcwn.cache_queue_priority_threshold
* network.http.rcwn.small_resource_size_kb
* network.http.rcwn.min_wait_before_racing_ms
* network.http.rcwn.max_wait_before_racing_ms
Differential Revision: https://phabricator.services.mozilla.com/D77108
2020-05-29 07:54:24 +00:00
Alexis Beingessner
32ab7a7bc4
Bug 1637727 - convert network.http.sanitize-headers-in-logs to a StaticPref. r=KrisWright,necko-reviewers,valentin
...
Differential Revision: https://phabricator.services.mozilla.com/D77107
2020-05-29 07:56:48 +00:00
Alexis Beingessner
b4d76cf97a
Bug 1637727 - convert network.standard-url.max-length to a StaticPref. r=KrisWright,necko-reviewers,valentin
...
Differential Revision: https://phabricator.services.mozilla.com/D77106
2020-05-29 07:52:35 +00:00
Alexis Beingessner
a908129a6d
Bug 1637727 - convert network.standard-url.punycode-host to a StaticPref. r=necko-reviewers,valentin
...
Differential Revision: https://phabricator.services.mozilla.com/D77105
2020-05-28 18:23:28 +00:00
Alexis Beingessner
0e39201277
Bug 1637727 - convert nsIOService prefs to StaticPrefs. r=KrisWright,necko-reviewers
...
converts:
* security.data_uri.block_toplevel_data_uri_navigations
* network.offline-mirrors-connectivity
Differential Revision: https://phabricator.services.mozilla.com/D77104
2020-05-28 18:23:25 +00:00
Alexis Beingessner
7fd95dd59d
Bug 1637727 - convert network.ssl_tokens_cache prefs to StaticPrefs. r=KrisWright,necko-reviewers,valentin
...
converts:
* network.ssl_tokens_cache_enabled
* network.ssl_tokens_cache_capacity
Differential Revision: https://phabricator.services.mozilla.com/D77103
2020-05-29 07:56:16 +00:00
Alexis Beingessner
2c55bb187c
Bug 1637727 - convert network.security.esni.enabled to a StaticPref. r=KrisWright,necko-reviewers,valentin
...
Differential Revision: https://phabricator.services.mozilla.com/D77102
2020-05-28 18:23:20 +00:00
Nico Grunbaum
46b83b6604
Bug 1218356 - P2 - Implement the RTCDataChannel stats;r=dminor
...
Note that transportId is not implemented and is not a stat but a key back into
the stats report. It identifies the related transport stats object. We don't
have transport stats, so this can not be implemented at the moment.
Differential Revision: https://phabricator.services.mozilla.com/D57116
2020-05-29 10:46:42 +00:00
Sebastian Hengst
d9ac58cbcd
Backed out 5 changesets (bug 1641459) for causing bug 1641635 (as requested by baku).
...
Backed out changeset 8f30acc0c69f (bug 1641459)
Backed out changeset 9bb7f1d7f4e8 (bug 1641459)
Backed out changeset a29a3d445871 (bug 1641459)
Backed out changeset d708ea7a1d98 (bug 1641459)
Backed out changeset 21fe51299547 (bug 1641459)
2020-05-29 10:21:52 +02:00
Andrea Marchesini
d0913541e4
Bug 1641459 - Consider 3rd parties cookie requested by documents with a window, r=smaug CLOSED TREE
...
This is required for how Cookies gtests are written
Differential Revision: https://phabricator.services.mozilla.com/D77301
2020-05-28 16:21:33 +00:00
ffxbld
3d17f898c9
No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=RyanVM
...
Differential Revision: https://phabricator.services.mozilla.com/D77261
2020-05-28 14:33:09 +00:00
Andrea Marchesini
9706a3ab32
Bug 1641459 - Do not allow the setting of sameSite=lax/strict cookies from cross-site iframe documents - part 1 - implementation, r=smaug
...
Differential Revision: https://phabricator.services.mozilla.com/D77244
2020-05-28 13:25:49 +00:00
Andrea Marchesini
385945afb9
Bug 1641459 - Do not expose sameSite=lax/strict cookies to cross-site documents - part 1 - implementation, r=smaug
...
Differential Revision: https://phabricator.services.mozilla.com/D77208
2020-05-28 11:04:23 +00:00
Jean-Yves Avenard
6131e9fa5c
Bug 1637869
- P7. Call DisconnectChildListeners when an error occurs. r=mattwoodrow
...
This will allow the DocumentChannel to be removed from the loading group and the docshell to stop waiting for for the ParentProcessDocumentChannel to do something.
Depends on D77201
Differential Revision: https://phabricator.services.mozilla.com/D77202
2020-05-28 07:42:35 +00:00
Jean-Yves Avenard
2746af48c3
Bug 1637869
- P6. Propagate proper error code when cancelling a channel. r=mattwoodrow
...
Differential Revision: https://phabricator.services.mozilla.com/D77201
2020-05-28 10:22:31 +00:00
Jean-Yves Avenard
66a61d942d
Bug 1637869
- P2. Allow ParentProcessDocumentChannel to perform process switching. r=nika,mattwoodrow
...
The moves all decisions to perform a process switch into the DocumentLoadListerner. This removes the unnecessary need to go via a content process to start the load.
Differential Revision: https://phabricator.services.mozilla.com/D76315
2020-05-28 00:07:39 +00:00
Jean-Yves Avenard
3943449ac1
Bug 1637869
- P1. Cancel channel before resuming. r=mattwoodrow
...
Differential Revision: https://phabricator.services.mozilla.com/D76314
2020-05-28 00:07:24 +00:00
Dimi Lee
acbbeb5981
Bug 1639718 - P2. Protection features call OnBeforeBlockChannel before blocking the channel. r=baku
...
Differential Revision: https://phabricator.services.mozilla.com/D76837
2020-05-28 09:51:23 +00:00
Dimi Lee
86d87ef93e
Bug 1639718 - P1. Add ChannelClassifierService to support notifying/unblocking channel. r=baku
...
ChannelClassifierService notifies "urlclassifier-before-block-channel"
event when a channel is going to be blocked by protection features.
It also provides an API for receivers to "unblock" the channel.
Sample usage:
this.service = Cc["@mozilla.org/url-classifier/channel-classifier-service;1"].getService(
Ci.nsIChannelClassifierService
);
if (this.service) {
this.service.addListener({
observe(aSubject, aTopic, aData) {
switch (aTopic) {
case "urlclassifier-before-block-channel":
let channel = aSubject.QueryInterface(Ci.nsIUrlClassifierBlockedChannel);
channel.unblock();
break;
}
},
})
}
Differential Revision: https://phabricator.services.mozilla.com/D76836
2020-05-28 09:51:15 +00:00
Valentin Gosu
d51967f492
Bug 1640872
- Add more TRR logging r=necko-reviewers,mayhemer
...
Differential Revision: https://phabricator.services.mozilla.com/D76826
2020-05-28 06:58:04 +00:00
Razvan Maries
a985167fa6
Backed out 7 changesets (bug 1638711) for perma failures on test_bug375314-2.html. CLOSED TREE
...
Backed out changeset 9643bf18ac31 (bug 1638711)
Backed out changeset 3d06b48e2e3a (bug 1638711)
Backed out changeset c2a1461890c3 (bug 1638711)
Backed out changeset 9eda9f6c5877 (bug 1638711)
Backed out changeset f776c30279f3 (bug 1638711)
Backed out changeset b34546384903 (bug 1638711)
Backed out changeset 47da03dd8365 (bug 1638711)
2020-05-28 04:25:38 +03:00
Matt Woodrow
74388c26ab
Bug 1638711 - Do document security checks in parent process. r=ckerschb
...
Differential Revision: https://phabricator.services.mozilla.com/D75720
2020-05-27 09:39:44 +00:00
prathiksha
f247187965
Bug 1634947 - Update the TLS deprecated error message in Firefox. r=johannh,necko-reviewers,valentin
...
Differential Revision: https://phabricator.services.mozilla.com/D77021
2020-05-27 21:58:30 +00:00
Eden Chuang
612b473d45
Bug 1634419 - Skip CORP checking for TYPE_WEBSOCKET loading r=necko-reviewers,valentin
...
Differential Revision: https://phabricator.services.mozilla.com/D74655
2020-05-27 21:29:32 +00:00
Emilio Cobos Álvarez
54fd961a29
Bug 1641245 - Make string comparators not virtual. r=froydnj,necko-reviewers,geckoview-reviewers,jgilbert,agi,valentin
...
There's no use case for stateful comparators, so they can be just plain
function pointers.
This is used in some hot places like CSS selector matching.
Differential Revision: https://phabricator.services.mozilla.com/D77084
2020-05-27 18:11:12 +00:00
Eden Chuang
8ec5c50a7f
Bug 1575095 - P2 Apply COOP switch with InterceptedHttpChannel in DocumentLoadListener r=necko-reviewers,valentin,mattwoodrow
...
The response from ServiceWorker might also be COOP mismatched, such that the document/sub-document loading need to be performed on another process.
However, DocumentLoadListener only works with nsHttpChannel.
This patch would like to support InterceptedHttpChannel in DocumentLoadListener.
Differential Revision: https://phabricator.services.mozilla.com/D76841
2020-05-27 15:37:21 +00:00
Eden Chuang
a570025eed
Bug 1575095 - P1 Move CrossOriginXXXHeaders checking into HttpBaseChannel and apply CrossOriginXXXHeaders in InterceptedHttpChannel. r=valentin
...
Move COOP, COEP, and CORP checking into HttpBaseChannel, and apply these checking on InterceptedHttpChannel.
Differential Revision: https://phabricator.services.mozilla.com/D54224
2020-05-27 15:37:09 +00:00
Dorel Luca
cb70b659d6
Backed out changeset 0440fa5863b2 (bug 1634947) for Devtools failures in browser_webconsole_certificate_messages.js . CLOSED TREE
2020-05-27 17:52:28 +03:00
prathiksha
18ae80df9c
Bug 1634947 - Update the TLS deprecated error message in Firefox. r=johannh,necko-reviewers,valentin
...
Differential Revision: https://phabricator.services.mozilla.com/D77021
2020-05-27 11:43:20 +00:00
Andrea Marchesini
8605dd5b17
Bug 1639570 - Implement nsICookieService::getCookieStringFromDocument - part 2 - tests, r=ckerschb
...
Differential Revision: https://phabricator.services.mozilla.com/D76143
2020-05-27 10:15:41 +00:00
Andrea Marchesini
ab373eca61
Bug 1639570 - Implement nsICookieService::getCookieStringFromDocument - part 1 - implementation, r=ckerschb
...
Differential Revision: https://phabricator.services.mozilla.com/D76142
2020-05-27 10:15:21 +00:00
Dorel Luca
34b793064e
Backed out 6 changesets (bug 1638711) for Geckoview failures in NavigationDelegateTest.loadUriReferrerSessionFileUrl.CLOSED TREE
...
Backed out changeset 22a7b8f16c44 (bug 1638711)
Backed out changeset 75d97b8df5ba (bug 1638711)
Backed out changeset 254871b49de9 (bug 1638711)
Backed out changeset 97d1d2390586 (bug 1638711)
Backed out changeset bebe76fca022 (bug 1638711)
Backed out changeset 164b842bea99 (bug 1638711)
2020-05-27 12:28:10 +03:00
Matt Woodrow
edc0d0a35f
Bug 1638711 - Do document security checks in parent process. r=ckerschb
...
Differential Revision: https://phabricator.services.mozilla.com/D75720
2020-05-27 00:32:05 +00:00
Matt Woodrow
e060a86c42
Bug 1631405 - Move nsISecureBrowserUI to be owned by the canonical browsing context instead of docshell. r=nika,ckerschb,Gijs,webcompat-reviewers,twisniewski
...
This removes all docshell nsISecureBrowserUI and mixed content properties, and moves them into CanonicalBrowsingContext/WindowGlobalParent. It makes the mixed content blocker just compute the state for the current load, and then send the results to the parent process, where we update the security state accordingly.
I think we could in the future remove onSecurityChange entirely, and instead just fire an event to the <browser> element notifying it of changes to the queryable securityUI.
Unfortunately we have a lot of existing code that depends on specific ordering between onSecurityChange and onLocationChange, so I had to hook into the RemoteWebProgress implementation in BrowserParent to mimic the same timings.
Differential Revision: https://phabricator.services.mozilla.com/D75447
2020-05-27 00:28:59 +00:00
Chris Fronk
0752132932
Bug 1620369 Convert Cache Deleter to use background thread pool r=necko-reviewers,michal
...
Differential Revision: https://phabricator.services.mozilla.com/D74577
2020-05-27 00:05:58 +00:00
Chris Fronk
39313c3fb4
Bug 1620366
- Convert BackgroundFileSaver to use background thread pool. r=valentin,necko-reviewers
...
Differential Revision: https://phabricator.services.mozilla.com/D74546
2020-05-27 00:06:16 +00:00
Bogdan Tara
a54ec3073f
Backed out 4 changesets (bug 1631405) for multiple mochitest failures CLOSED TREE
...
Backed out changeset 9963cc0b23cb (bug 1631405)
Backed out changeset 469ac933ed7c (bug 1631405)
Backed out changeset 0c5f55864268 (bug 1631405)
Backed out changeset 20dcbcc2f3b8 (bug 1631405)
2020-05-27 01:30:20 +03:00
Matt Woodrow
240d417eb6
Bug 1631405 - Move nsISecureBrowserUI to be owned by the canonical browsing context instead of docshell. r=nika,ckerschb,Gijs,webcompat-reviewers,twisniewski
...
This removes all docshell nsISecureBrowserUI and mixed content properties, and moves them into CanonicalBrowsingContext/WindowGlobalParent. It makes the mixed content blocker just compute the state for the current load, and then send the results to the parent process, where we update the security state accordingly.
I think we could in the future remove onSecurityChange entirely, and instead just fire an event to the <browser> element notifying it of changes to the queryable securityUI.
Unfortunately we have a lot of existing code that depends on specific ordering between onSecurityChange and onLocationChange, so I had to hook into the RemoteWebProgress implementation in BrowserParent to mimic the same timings.
Differential Revision: https://phabricator.services.mozilla.com/D75447
2020-05-26 21:17:01 +00:00
Matt Woodrow
38ffa87e05
Bug 1640160 - Serialize mRequestContextId with BrowsingContext's IPCInitializer to ensure that we don't try to create a request context with an id of 0. r=nika
...
This was a bit of pain to track down, because some code was allowing an ID of 0, and creating a request context to match, but other code was treating 0 as invalid.
Differential Revision: https://phabricator.services.mozilla.com/D76652
2020-05-26 21:14:27 +00:00
Kagami Sascha Rosylight
236de553f6
Bug 1466532 - Part 1: Drop nsIFile::followLinks r=froydnj,necko-reviewers,dragana
...
This drops `followLinks` as 1) it has been no-op on UNIX for a long time and 2) its Windows implementation never had a proper symlink support.
Differential Revision: https://phabricator.services.mozilla.com/D75569
2020-05-26 20:51:16 +00:00
ffxbld
b3c5906f23
No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=RyanVM
...
Differential Revision: https://phabricator.services.mozilla.com/D76710
2020-05-26 14:53:18 +00:00
Kershaw Chang
8ac1a956ac
Bug 1602832 - P6: Make sure we don't launch socket process for xpcshell http server r=dragana
...
Differential Revision: https://phabricator.services.mozilla.com/D76664
2020-05-26 14:30:54 +00:00
Kershaw Chang
b8de602ab2
Bug 1602832 - P5: Make sure ChildDNSService is created on main thread r=dragana
...
Differential Revision: https://phabricator.services.mozilla.com/D72611
2020-05-26 14:30:47 +00:00
Kershaw Chang
104bf647be
Bug 1602832 - P3: Skip failed tests r=dragana
...
Differential Revision: https://phabricator.services.mozilla.com/D67448
2020-05-26 14:30:26 +00:00
Kershaw Chang
eb032f3176
Bug 1602832 - P1: Run xpcshell tests without e10s with socket process r=dragana
...
Differential Revision: https://phabricator.services.mozilla.com/D58110
2020-05-26 14:30:09 +00:00
Sebastian Streich
47570a169b
Bug 1633710 - Move js uri.AsciiHost to principal r=ckerschb
...
Differential Revision: https://phabricator.services.mozilla.com/D73239
2020-05-26 11:58:06 +00:00
JulianWels
2cc2e49495
Bug 1625156 - Error page for HTTPS Only Mode. r=fluent-reviewers,ckerschb,nhnt11,flod,nika,johannh,mattwoodrow
...
Differential Revision: https://phabricator.services.mozilla.com/D72129
2020-05-26 11:45:21 +00:00
Butkovits Atila
f167b5c275
Backed out 6 changesets (bug 1602832) for causing perma failure at test_trr_case_sensitivity.js. CLOSED TREE
...
Backed out changeset 0e9c378df995 (bug 1602832)
Backed out changeset 534fedb3836e (bug 1602832)
Backed out changeset db012c05d64e (bug 1602832)
Backed out changeset ca0c207dca21 (bug 1602832)
Backed out changeset bea1f3aeea49 (bug 1602832)
Backed out changeset 2d54acd78124 (bug 1602832)
2020-05-26 13:09:07 +03:00
Kershaw Chang
8def6e94e6
Bug 1602832 - P6: Make sure we don't launch socket process for xpcshell http server r=dragana
...
Differential Revision: https://phabricator.services.mozilla.com/D76664
2020-05-26 08:35:54 +00:00
Kershaw Chang
3412834247
Bug 1602832 - P5: Make sure ChildDNSService is created on main thread r=dragana
...
Differential Revision: https://phabricator.services.mozilla.com/D72611
2020-05-26 08:35:47 +00:00