Commit Graph

18218 Commits

Author SHA1 Message Date
Junior Hsu
66e435a6d7 Bug 1543068 - P4 pass COEP check if target is not a nested browsing context r=nika
https://mikewest.github.io/corpp/#abstract-opdef-process-navigation-response

Differential Revision: https://phabricator.services.mozilla.com/D39127

--HG--
extra : moz-landing-system : lando
2019-08-08 19:01:55 +00:00
Junior Hsu
15adda2765 Bug 1543068 - P3 Take COEP into account for COOP mismatch r=nika
Step 9 in obtain a cross-origin opener-policy
https://gist.github.com/annevk/6f2dd8c79c77123f39797f6bdac43f3e

Differential Revision: https://phabricator.services.mozilla.com/D38950

--HG--
extra : moz-landing-system : lando
2019-08-08 19:00:00 +00:00
Junior Hsu
f83eff1c6f Bug 1543068 - P2 Take COEP into account in CORP check r=nika
Implement https://mikewest.github.io/corpp/#corp-check

Differential Revision: https://phabricator.services.mozilla.com/D38789

--HG--
extra : moz-landing-system : lando
2019-08-08 18:58:56 +00:00
Junior Hsu
895ebba7c1 Bug 1543068 - P1.5 Remove InheritedEmbedderPolicy r=nika
I believe it's the right thing to do.
COEP inherits opener's COEP and is overwritten if COEP by response is stricter.
i.e., we no more need the inherited one.

Differential Revision: https://phabricator.services.mozilla.com/D40143

--HG--
extra : moz-landing-system : lando
2019-08-08 18:56:30 +00:00
Junior Hsu
2247427ef2 Bug 1543068 - P1 Substitute Cross-Origin header with COEP r=nika
(a) Substitute Cross-Origin header with COEP
(b) Forcing cors in FetchDriver is removed since COEP doesn't need to IIUC

Differential Revision: https://phabricator.services.mozilla.com/D38788

--HG--
extra : moz-landing-system : lando
2019-08-08 18:38:03 +00:00
Nika Layzell
667f8e129d Bug 1566643 - Part 3: Remove CPM::GetTabContextByContentProcess, r=kmag
Differential Revision: https://phabricator.services.mozilla.com/D39258

--HG--
extra : moz-landing-system : lando
2019-08-08 16:07:30 +00:00
Jared Wein
9ad3ab33b5 Bug 1571567 - Fix no-fallthrough errors in /netwerk. r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D40877

--HG--
extra : moz-landing-system : lando
2019-08-08 15:18:38 +00:00
Bogdan Tara
844afcfb06 Backed out 10 changesets (bug 1571567) complementary backout after es lint failure on the patch CLOSED TREE
Backed out changeset ce83fa75ae32 (bug 1571567)
Backed out changeset 7aa97ba7cce9 (bug 1571567)
Backed out changeset 777d79076e99 (bug 1571567)
Backed out changeset fbdf6b75a484 (bug 1571567)
Backed out changeset e2ed4620f232 (bug 1571567)
Backed out changeset 2c67015f12c6 (bug 1571567)
Backed out changeset 7ec086bb5bd5 (bug 1571567)
Backed out changeset 42df735c8556 (bug 1571567)
Backed out changeset 7d5fc57b2809 (bug 1571567)
Backed out changeset 606bafb8211c (bug 1571567)
2019-08-08 18:13:54 +03:00
Tom Schuster
d2d9c3ff60 Bug 1558915 - Use infallible nsIURI::SchemeIs in netwerk/. r=baku
Sorry I had some problems figuring out who can review netwerk/. Most people seem to be on PTO.

Differential Revision: https://phabricator.services.mozilla.com/D41175

--HG--
extra : moz-landing-system : lando
2019-08-08 13:02:36 +00:00
Jared Wein
9c73e2262f Bug 1571567 - Fix no-fallthrough errors in /netwerk. r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D40877

--HG--
extra : moz-landing-system : lando
2019-08-08 10:53:00 +00:00
Thomas Nguyen
034395aea7 Bug 1572082 - Remove unused params in HttpChannelOpenArgs r=kershaw
Differential Revision: https://phabricator.services.mozilla.com/D41000

--HG--
extra : moz-landing-system : lando
2019-08-07 13:47:03 +00:00
Ehsan Akhgari
b05ce1a78b Bug 1571893 - Remove the prefs that can cause Gecko to stop honouring the Content Blocking allow list; r=baku
Differential Revision: https://phabricator.services.mozilla.com/D40895

--HG--
extra : moz-landing-system : lando
2019-08-07 15:54:54 +00:00
Ciure Andrei
adef2661b1 Merge inbound to mozilla-central. a=merge 2019-08-07 07:34:55 +03:00
Kris Maglione
c01ad83372 Bug 1571502: Don't leak TabGroups which have never had windows joined to them. r=nika
Currently, TabGroups know to break their reference cycles only when the last
window leaves them. For TabGroups which have never had a window join (which
happens under Fission), this means they also never see a window leave, and
therefore never break their reference cycles, and leak.

This patch adds a check to break reference cycles if no windows have joined by
the time a BrowserChild they belong to is destroyed.

MANUAL PUSH: Lando fails to rebase.

Differential Revision: https://phabricator.services.mozilla.com/D40669

--HG--
extra : source : 03acb28ab60fb77fa06064385a62cc46cf4ad1bd
extra : amend_source : 0a71625d99951bebe45ee6f62570de491a714e97
2019-08-02 18:19:53 -07:00
Kershaw Chang
5036125ab8 Bug 1542037 - Avoid accessing nsDNSService on middleman process r=dragana
- This patch makes sure that we don't create nsDNSService on both child process and middleman process.
- gNeckoChild won't be created in middleman process, so it's fine to create ChildDNSService on middleman process.
- Add some MOZ_DIAGNOSTIC_ASSERT in TRR, so we know where TRR is used on child process.

Differential Revision: https://phabricator.services.mozilla.com/D40018

--HG--
extra : moz-landing-system : lando
2019-08-06 12:09:19 +00:00
Mihai Alexandru Michis
4bcc3ac00a Backed out changeset 8de4baa1dee3 (bug 1570658) for causing mochitest failures. CLOSED TREE 2019-08-06 14:19:31 +03:00
Sebastian Streich
6f2b641d45 Bug 1570658 - Add a Flag for Navigation-Nosniff r=ckerschb
Differential Revision: https://phabricator.services.mozilla.com/D40618

--HG--
extra : moz-landing-system : lando
2019-08-05 14:58:13 +00:00
Emilio Cobos Álvarez
6da1e7506f Bug 1499000 - Make CORS use the right security flags to check whether an URL can be loaded. r=ckerschb
This fixes at least part of the problem. Without this patch, some of the flags
may get lost, like the ALLOW_CHROME flag which controls whether stuff like
resource:// URLs can be loaded or not.

Differential Revision: https://phabricator.services.mozilla.com/D40633

--HG--
extra : moz-landing-system : lando
2019-08-05 19:28:00 +00:00
Andrea Marchesini
01a1f139a1 Bug 1570971 - Enable all the annotation URL-Classifier features and remove their prefs, r=Ehsan
Differential Revision: https://phabricator.services.mozilla.com/D40420

--HG--
extra : moz-landing-system : lando
2019-08-05 11:34:24 +00:00
Ehsan Akhgari
6eeefccacb Bug 1566825 - Part 2: Support storing and querying for anti-tracking permission grants in private windows; r=baku
Differential Revision: https://phabricator.services.mozilla.com/D40363

--HG--
extra : moz-landing-system : lando
2019-08-06 20:07:21 +00:00
Andreea Pavel
f6c90e68d3 Backed out 2 changesets (bug 1566825) for build bustages on a CLOSED TREE
Backed out changeset 7fcd3effcc45 (bug 1566825)
Backed out changeset 15de0b815be9 (bug 1566825)
2019-08-06 21:17:16 +03:00
Ehsan Akhgari
725049201c Bug 1566825 - Part 2: Support storing and querying for anti-tracking permission grants in private windows; r=baku
Differential Revision: https://phabricator.services.mozilla.com/D40363

--HG--
extra : moz-landing-system : lando
2019-08-05 08:30:22 +00:00
Andreea Pavel
53820aa30c Backed out 9 changesets (bug 1564221) xpcshell failures on a CLOSED TREE
Backed out changeset 36e33a3b59f0 (bug 1564221)
Backed out changeset 12d1607c1415 (bug 1564221)
Backed out changeset 8c3157ad3ac9 (bug 1564221)
Backed out changeset ad7a644c5a8d (bug 1564221)
Backed out changeset 31f730109760 (bug 1564221)
Backed out changeset a140da3467e0 (bug 1564221)
Backed out changeset 02a324e713d6 (bug 1564221)
Backed out changeset dc76eeb3a74a (bug 1564221)
Backed out changeset bc933f236434 (bug 1564221)
2019-08-06 20:49:21 +03:00
Barret Rennie
3df3c840f0 Bug 1564221 - Make nsITransportSecurityInfo builtinclass r=keeler
There are no longer any consumers of the JS-implemented
`FakeTransportSecurityInfo` class, so it can be removed. That removes the last
JS-implemented `nsITransportSecurityInfo` instance and it therefore can be
marked `builtinclass`.

Differential Revision: https://phabricator.services.mozilla.com/D40355

--HG--
extra : moz-landing-system : lando
2019-08-06 15:36:52 +00:00
Kershaw Chang
93e82cb323 Bug 1569196 - Make ChildDNSService run on socket process r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D40592

--HG--
extra : moz-landing-system : lando
2019-08-05 20:54:01 +00:00
Honza Bambas
501e5f99cc Bug 1565242 - Remove HTTP/2 connection (e2e or proxy) from the opposite (an)onymous connection entry in case it cannot be found in the entry the connection is associated with because of HTTP/2 (an)onymous connection pool sharing, r=kershaw
Differential Revision: https://phabricator.services.mozilla.com/D37881

--HG--
extra : moz-landing-system : lando
2019-08-02 11:04:20 +00:00
Dragana Damjanovic
fa88ecef4b Bug 1570227 - NIT: do not call AsyncWait if we are calling ForceRecv. r=mayhemer mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D40007

--HG--
extra : moz-landing-system : lando
2019-07-31 10:47:21 +00:00
Razvan Maries
518b15a876 Merge mozilla-central to mozilla-inbound. a=merge on a CLOSED TREE 2019-08-02 01:52:58 +03:00
Sebastian Streich
6917b697b8 Bug 1428473 Support X-Content-Type-Options: nosniff when navigating r=ckerschb,dragana,alchen
***
Apply Requested Revision

Differential Revision: https://phabricator.services.mozilla.com/D33959

--HG--
extra : moz-landing-system : lando
2019-07-31 16:59:53 +00:00
Irakli Gozalishvili
7bc070b022 Bug 1271553 - Add known dweb protocols and ext+ to the standard list r=kershaw
Fix for the Bug 1536744 removed abiliti for nsIProtocolHandler to parse URLs of the
custom protocols & broke libdweb. In order to fix followup change for Bug 1559356 introduced a
whitelist for dweb: and dat: protocols to parse those as nsIStandardURLs. This change extends
whitelist with ipfs: ipns: ssb: schemes and ext+ prefix scheme.

This would allow Bug 1271553 to progress until better more general solution can be implemnted.

Differential Revision: https://phabricator.services.mozilla.com/D39463

--HG--
extra : moz-landing-system : lando
2019-07-31 19:52:30 +00:00
Christian Holler
d7765e1c1c Bug 1566482 - Properly calculate end in SetHttpTrailers. r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D38272

--HG--
extra : moz-landing-system : lando
2019-07-31 07:53:17 +00:00
Christian Holler
e58e513d34 Bug 1566465 - Fix crash in Http2Session::RecvAltSvc. r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D38197

--HG--
extra : moz-landing-system : lando
2019-07-31 07:51:05 +00:00
Johann Hofmann
7b984428e8 Bug 1567826 - Don't mark any secureContext pages as insecure. r=nhnt11,keeler,Ehsan
Differential Revision: https://phabricator.services.mozilla.com/D39012

--HG--
extra : moz-landing-system : lando
2019-07-30 12:31:22 +00:00
Ciure Andrei
e432090afa Backed out changeset ded87cc3f3ee (bug 1567826) for causing browser_check_identity_state.js to perma fail CLOSED TREE 2019-07-30 12:50:29 +03:00
Johann Hofmann
04c28108fc Bug 1567826 - Don't mark any secureContext pages as insecure. r=nhnt11,keeler,Ehsan
Differential Revision: https://phabricator.services.mozilla.com/D39012

--HG--
extra : moz-landing-system : lando
2019-07-30 07:52:59 +00:00
Nicholas Nethercote
cd426e3ad2 Bug 1569526 - Remove return values from Add*VarCache(). r=KrisWright
They're infallible in practice and always `NS_OK`. (This stems from
`AddVarCacheNoAssignment()` always returning `NS_OK`.)

As a result, the commit removes lots of unnecessary checks.

Differential Revision: https://phabricator.services.mozilla.com/D39804

--HG--
extra : moz-landing-system : lando
2019-07-30 06:19:46 +00:00
Mihai Alexandru Michis
b644b1615f Backed out changeset 8d6593460b06 (bug 1271553) for mochitest failures. 2019-07-30 07:46:46 +03:00
Irakli Gozalishvili
e83a6e8364 Bug 1271553 - Add known dweb protocols and ext+ to the standard list r=kershaw
Fix for the Bug 1536744 removed abiliti for nsIProtocolHandler to parse URLs of the
custom protocols & broke libdweb. In order to fix followup change for Bug 1559356 introduced a
whitelist for dweb: and dat: protocols to parse those as nsIStandardURLs. This change extends
whitelist with ipfs: ipns: ssb: schemes and ext+ prefix scheme.

This would allow Bug 1271553 to progress until better more general solution can be implemnted.

Differential Revision: https://phabricator.services.mozilla.com/D39463

--HG--
extra : moz-landing-system : lando
2019-07-29 23:58:08 +00:00
Thomas Nguyen
2bfaa83f89 Bug 1567573 - Apply Referrer-Policy header from redirect response r=michal
Differential Revision: https://phabricator.services.mozilla.com/D38879

--HG--
extra : moz-landing-system : lando
2019-07-29 13:51:17 +00:00
Junior Hsu
5932647860 Bug 1566295 - Do not send Origin: if we can't extract a valid origin r=ckerschb,tnguyen
Sometimes we don't have origin like OCSP requests, or a fetch issues from web extension.
We should not send `Origin:`

Spec doesn't specify how to treat other protocol like moz-extension.
IMO we should also prevent sending `Origin:` to keep web-compat.

Differential Revision: https://phabricator.services.mozilla.com/D39595

--HG--
extra : moz-landing-system : lando
2019-07-29 08:00:35 +00:00
Kris Maglione
85c7f7187f Bug 1566186: Part 1 - Remove DocShell support for isolated mozbrowsers. r=nika
This functionality is currently unused, and blocks work needed to support
Fission.

Differential Revision: https://phabricator.services.mozilla.com/D39542

--HG--
extra : rebase_source : 1d8fdea73d48c714112d13844f5110f7f1892dda
2019-07-16 16:40:19 -07:00
Andrea Marchesini
7044fec84c Bug 1566961 - Integrate SocialTracking and ETP, r=Ehsan
Differential Revision: https://phabricator.services.mozilla.com/D38451

--HG--
extra : moz-landing-system : lando
2019-07-29 12:20:39 +00:00
Andrea Marchesini
2e169ffe17 Bug 1566961 - Integrate SocialTracking and ETP - Remove YOUTUBE classification, r=Ehsan
Differential Revision: https://phabricator.services.mozilla.com/D38450

--HG--
extra : moz-landing-system : lando
2019-07-29 12:20:35 +00:00
Andrea Marchesini
cef26c06c6 Bug 1567892 - PeerConnectionMedia should use nsIProtocolProxyService on the parent process - PProxyConfigLookup IPC protocol, r=bwc,kershaw,jld
Differential Revision: https://phabricator.services.mozilla.com/D39010

--HG--
extra : moz-landing-system : lando
2019-07-29 12:27:59 +00:00
Michal Novotny
82a7200c4b Bug 1561273 - network ID: ipv4NetworkId/scanArp returns gateway IP instead of its MAC, r=kershaw
This patch fixes a bug in ipv4NetworkId where we wrongly hashed IP address instead of MAC address. It also simplifies getMac function. MAC address must be 6 bytes long. If it's not it's probably an error and we must not use it.

Differential Revision: https://phabricator.services.mozilla.com/D39349

--HG--
extra : moz-landing-system : lando
2019-07-26 12:29:01 +00:00
Dragana Damjanovic
6bb0ea26c5 Bug 1567133 - Call ForceRecv if there is data in the tunnel buffer. r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D38989

--HG--
extra : moz-landing-system : lando
2019-07-29 10:58:08 +00:00
Csoregi Natalia
755219489e Backed out 3 changesets (bug 1566961) for eslint failure on browser_socialtracking.js. CLOSED TREE
Backed out changeset a85686cb5dfa (bug 1566961)
Backed out changeset 9cb916e52712 (bug 1566961)
Backed out changeset 4c747eb1c370 (bug 1566961)
2019-07-29 15:17:28 +03:00
Andrea Marchesini
7f34a5abc1 Bug 1566961 - Integrate SocialTracking and ETP, r=Ehsan
Differential Revision: https://phabricator.services.mozilla.com/D38451

--HG--
extra : moz-landing-system : lando
2019-07-29 11:27:23 +00:00
Andrea Marchesini
ce99b99d11 Bug 1566961 - Integrate SocialTracking and ETP - Remove YOUTUBE classification, r=Ehsan
Differential Revision: https://phabricator.services.mozilla.com/D38450

--HG--
extra : moz-landing-system : lando
2019-07-29 10:40:31 +00:00
Tom Schuster
bc9bb616f7 Bug 1569122 - Use StaticPrefs for our MIME type script blocking prefs. r=ckerschb
Differential Revision: https://phabricator.services.mozilla.com/D39634

--HG--
extra : moz-landing-system : lando
2019-07-29 07:25:05 +00:00