Noemi Erli
f08b043cf6
Backed out 5 changesets (bug 1639833
) for causing sessionstorage related failures CLOSED TREE
...
Backed out changeset b36af8d9db34 (bug 1639833
)
Backed out changeset 712c11904dbe (bug 1639833
)
Backed out changeset 14f1e4783582 (bug 1639833
)
Backed out changeset b7f14c4cfe5d (bug 1639833
)
Backed out changeset b4b25034dd83 (bug 1639833
)
2020-06-01 19:31:50 +03:00
Andrea Marchesini
a997c1d626
Bug 1639833
- IntrisincStoragePrincipal should always be partitioned - part 4 - Renaming storage access permission methods, r=dimi
...
Differential Revision: https://phabricator.services.mozilla.com/D76917
2020-06-01 11:59:46 +00:00
Sylvestre Ledru
63be8d152d
Bug 1519636 - Reformat recent changes to the Google coding style r=necko-reviewers,dragana
...
# ignore-this-changeset
Differential Revision: https://phabricator.services.mozilla.com/D77580
2020-05-30 09:55:27 +00:00
Alexis Beingessner
b4d76cf97a
Bug 1637727 - convert network.standard-url.max-length to a StaticPref. r=KrisWright,necko-reviewers,valentin
...
Differential Revision: https://phabricator.services.mozilla.com/D77106
2020-05-29 07:52:35 +00:00
Alexis Beingessner
a908129a6d
Bug 1637727 - convert network.standard-url.punycode-host to a StaticPref. r=necko-reviewers,valentin
...
Differential Revision: https://phabricator.services.mozilla.com/D77105
2020-05-28 18:23:28 +00:00
Alexis Beingessner
0e39201277
Bug 1637727 - convert nsIOService prefs to StaticPrefs. r=KrisWright,necko-reviewers
...
converts:
* security.data_uri.block_toplevel_data_uri_navigations
* network.offline-mirrors-connectivity
Differential Revision: https://phabricator.services.mozilla.com/D77104
2020-05-28 18:23:25 +00:00
Alexis Beingessner
7fd95dd59d
Bug 1637727 - convert network.ssl_tokens_cache prefs to StaticPrefs. r=KrisWright,necko-reviewers,valentin
...
converts:
* network.ssl_tokens_cache_enabled
* network.ssl_tokens_cache_capacity
Differential Revision: https://phabricator.services.mozilla.com/D77103
2020-05-29 07:56:16 +00:00
Alexis Beingessner
2c55bb187c
Bug 1637727 - convert network.security.esni.enabled to a StaticPref. r=KrisWright,necko-reviewers,valentin
...
Differential Revision: https://phabricator.services.mozilla.com/D77102
2020-05-28 18:23:20 +00:00
Razvan Maries
a985167fa6
Backed out 7 changesets (bug 1638711) for perma failures on test_bug375314-2.html. CLOSED TREE
...
Backed out changeset 9643bf18ac31 (bug 1638711)
Backed out changeset 3d06b48e2e3a (bug 1638711)
Backed out changeset c2a1461890c3 (bug 1638711)
Backed out changeset 9eda9f6c5877 (bug 1638711)
Backed out changeset f776c30279f3 (bug 1638711)
Backed out changeset b34546384903 (bug 1638711)
Backed out changeset 47da03dd8365 (bug 1638711)
2020-05-28 04:25:38 +03:00
Matt Woodrow
74388c26ab
Bug 1638711 - Do document security checks in parent process. r=ckerschb
...
Differential Revision: https://phabricator.services.mozilla.com/D75720
2020-05-27 09:39:44 +00:00
Emilio Cobos Álvarez
54fd961a29
Bug 1641245 - Make string comparators not virtual. r=froydnj,necko-reviewers,geckoview-reviewers,jgilbert,agi,valentin
...
There's no use case for stateful comparators, so they can be just plain
function pointers.
This is used in some hot places like CSS selector matching.
Differential Revision: https://phabricator.services.mozilla.com/D77084
2020-05-27 18:11:12 +00:00
Dorel Luca
34b793064e
Backed out 6 changesets (bug 1638711) for Geckoview failures in NavigationDelegateTest.loadUriReferrerSessionFileUrl.CLOSED TREE
...
Backed out changeset 22a7b8f16c44 (bug 1638711)
Backed out changeset 75d97b8df5ba (bug 1638711)
Backed out changeset 254871b49de9 (bug 1638711)
Backed out changeset 97d1d2390586 (bug 1638711)
Backed out changeset bebe76fca022 (bug 1638711)
Backed out changeset 164b842bea99 (bug 1638711)
2020-05-27 12:28:10 +03:00
Matt Woodrow
edc0d0a35f
Bug 1638711 - Do document security checks in parent process. r=ckerschb
...
Differential Revision: https://phabricator.services.mozilla.com/D75720
2020-05-27 00:32:05 +00:00
Matt Woodrow
e060a86c42
Bug 1631405 - Move nsISecureBrowserUI to be owned by the canonical browsing context instead of docshell. r=nika,ckerschb,Gijs,webcompat-reviewers,twisniewski
...
This removes all docshell nsISecureBrowserUI and mixed content properties, and moves them into CanonicalBrowsingContext/WindowGlobalParent. It makes the mixed content blocker just compute the state for the current load, and then send the results to the parent process, where we update the security state accordingly.
I think we could in the future remove onSecurityChange entirely, and instead just fire an event to the <browser> element notifying it of changes to the queryable securityUI.
Unfortunately we have a lot of existing code that depends on specific ordering between onSecurityChange and onLocationChange, so I had to hook into the RemoteWebProgress implementation in BrowserParent to mimic the same timings.
Differential Revision: https://phabricator.services.mozilla.com/D75447
2020-05-27 00:28:59 +00:00
Chris Fronk
0752132932
Bug 1620369 Convert Cache Deleter to use background thread pool r=necko-reviewers,michal
...
Differential Revision: https://phabricator.services.mozilla.com/D74577
2020-05-27 00:05:58 +00:00
Chris Fronk
39313c3fb4
Bug 1620366
- Convert BackgroundFileSaver to use background thread pool. r=valentin,necko-reviewers
...
Differential Revision: https://phabricator.services.mozilla.com/D74546
2020-05-27 00:06:16 +00:00
Bogdan Tara
a54ec3073f
Backed out 4 changesets (bug 1631405) for multiple mochitest failures CLOSED TREE
...
Backed out changeset 9963cc0b23cb (bug 1631405)
Backed out changeset 469ac933ed7c (bug 1631405)
Backed out changeset 0c5f55864268 (bug 1631405)
Backed out changeset 20dcbcc2f3b8 (bug 1631405)
2020-05-27 01:30:20 +03:00
Matt Woodrow
240d417eb6
Bug 1631405 - Move nsISecureBrowserUI to be owned by the canonical browsing context instead of docshell. r=nika,ckerschb,Gijs,webcompat-reviewers,twisniewski
...
This removes all docshell nsISecureBrowserUI and mixed content properties, and moves them into CanonicalBrowsingContext/WindowGlobalParent. It makes the mixed content blocker just compute the state for the current load, and then send the results to the parent process, where we update the security state accordingly.
I think we could in the future remove onSecurityChange entirely, and instead just fire an event to the <browser> element notifying it of changes to the queryable securityUI.
Unfortunately we have a lot of existing code that depends on specific ordering between onSecurityChange and onLocationChange, so I had to hook into the RemoteWebProgress implementation in BrowserParent to mimic the same timings.
Differential Revision: https://phabricator.services.mozilla.com/D75447
2020-05-26 21:17:01 +00:00
Matt Woodrow
38ffa87e05
Bug 1640160 - Serialize mRequestContextId with BrowsingContext's IPCInitializer to ensure that we don't try to create a request context with an id of 0. r=nika
...
This was a bit of pain to track down, because some code was allowing an ID of 0, and creating a request context to match, but other code was treating 0 as invalid.
Differential Revision: https://phabricator.services.mozilla.com/D76652
2020-05-26 21:14:27 +00:00
Kagami Sascha Rosylight
236de553f6
Bug 1466532 - Part 1: Drop nsIFile::followLinks r=froydnj,necko-reviewers,dragana
...
This drops `followLinks` as 1) it has been no-op on UNIX for a long time and 2) its Windows implementation never had a proper symlink support.
Differential Revision: https://phabricator.services.mozilla.com/D75569
2020-05-26 20:51:16 +00:00
Kershaw Chang
8ac1a956ac
Bug 1602832 - P6: Make sure we don't launch socket process for xpcshell http server r=dragana
...
Differential Revision: https://phabricator.services.mozilla.com/D76664
2020-05-26 14:30:54 +00:00
Kershaw Chang
eb032f3176
Bug 1602832 - P1: Run xpcshell tests without e10s with socket process r=dragana
...
Differential Revision: https://phabricator.services.mozilla.com/D58110
2020-05-26 14:30:09 +00:00
JulianWels
2cc2e49495
Bug 1625156 - Error page for HTTPS Only Mode. r=fluent-reviewers,ckerschb,nhnt11,flod,nika,johannh,mattwoodrow
...
Differential Revision: https://phabricator.services.mozilla.com/D72129
2020-05-26 11:45:21 +00:00
Butkovits Atila
f167b5c275
Backed out 6 changesets (bug 1602832) for causing perma failure at test_trr_case_sensitivity.js. CLOSED TREE
...
Backed out changeset 0e9c378df995 (bug 1602832)
Backed out changeset 534fedb3836e (bug 1602832)
Backed out changeset db012c05d64e (bug 1602832)
Backed out changeset ca0c207dca21 (bug 1602832)
Backed out changeset bea1f3aeea49 (bug 1602832)
Backed out changeset 2d54acd78124 (bug 1602832)
2020-05-26 13:09:07 +03:00
Kershaw Chang
8def6e94e6
Bug 1602832 - P6: Make sure we don't launch socket process for xpcshell http server r=dragana
...
Differential Revision: https://phabricator.services.mozilla.com/D76664
2020-05-26 08:35:54 +00:00
Kershaw Chang
ad95a84c3b
Bug 1602832 - P1: Run xpcshell tests without e10s with socket process r=dragana
...
Differential Revision: https://phabricator.services.mozilla.com/D58110
2020-05-26 08:35:02 +00:00
Csoregi Natalia
38116effd4
Backed out changeset 8d0d9cb87686 (bug 1466532) for failures on test_file_protocol.js. CLOSED TREE
2020-05-26 01:46:49 +03:00
Kagami Sascha Rosylight
b712a9333b
Bug 1466532 - Part 1: Drop nsIFile::followLinks r=froydnj,necko-reviewers,dragana
...
This drops `followLinks` as 1) it has been no-op on UNIX for a long time and 2) its Windows implementation never had a proper symlink support.
Differential Revision: https://phabricator.services.mozilla.com/D75569
2020-05-25 18:55:59 +00:00
Christoph Kerschbaumer
6ae4ad1947
Bug 1422284 - Upgrade insecure requests should only apply to top-level same-origin redirects. r=baku,valentin,necko-reviewers
...
Differential Revision: https://phabricator.services.mozilla.com/D75259
2020-05-25 08:14:10 +00:00
Andrea Marchesini
75207bad22
Bug 1639154 - Isolate network cache per first-party when privacy.partition.network_state is set to true - part 1 - implementation, r=mayhemer,necko-reviewers
...
Differential Revision: https://phabricator.services.mozilla.com/D75921
2020-05-20 16:46:39 +00:00
Matt Woodrow
b7105cc963
Bug 1627533 - Create LoadGroups for docshells using the BrowsingContext's request context id. r=dragana,necko-reviewers
...
Differential Revision: https://phabricator.services.mozilla.com/D75885
2020-05-21 03:38:37 +00:00
Matt Woodrow
56206beda8
Bug 1627533 - Create a request context id for each BrowsingContext. r=nika,dragana,necko-reviewers
...
Previously we created a new request context id for each LoadGroup, which meant we didn't have a constant value across process switches.
The next patch uses this request context id when creating a new LoadGroup for an nsDocShell, so that all docshell/loadgroups for a BrowsingContext share the same id.
Differential Revision: https://phabricator.services.mozilla.com/D75884
2020-05-21 03:38:14 +00:00
Noemi Erli
3adaaeb800
Backed out 3 changesets (bug 1627533) for causing assertions in RequestContextService.cpp CLOSED TREE
...
Backed out changeset 3b35a1852a60 (bug 1627533)
Backed out changeset 70fa5e075269 (bug 1627533)
Backed out changeset 0d1046670534 (bug 1627533)
2020-05-21 04:16:21 +03:00
Matt Woodrow
f8b14e22ba
Bug 1627533 - Create LoadGroups for docshells using the BrowsingContext's request context id. r=dragana,necko-reviewers
...
Differential Revision: https://phabricator.services.mozilla.com/D75885
2020-05-20 23:41:36 +00:00
Matt Woodrow
d958cab047
Bug 1627533 - Create a request context id for each BrowsingContext. r=nika,dragana,necko-reviewers
...
Previously we created a new request context id for each LoadGroup, which meant we didn't have a constant value across process switches.
The next patch uses this request context id when creating a new LoadGroup for an nsDocShell, so that all docshell/loadgroups for a BrowsingContext share the same id.
Differential Revision: https://phabricator.services.mozilla.com/D75884
2020-05-20 23:41:13 +00:00
Andrea Marchesini
81a382b344
Bug 1639247 - Isolate DNS cache per first-party when privacy.partition.network_state is set to true - part 4 - DNS originAttributes suffix in about:networking, r=valentin,fluent-reviewers,necko-reviewers,flod
...
Differential Revision: https://phabricator.services.mozilla.com/D75986
2020-05-20 16:46:26 +00:00
Razvan Maries
02e0a1d9a4
Backed out 3 changesets (bug 1639247) for build bustages on on StoragePrincipalHelper.cpp. CLOSED TREE
...
Backed out changeset 48a854ee6710 (bug 1639247)
Backed out changeset 032d302608e4 (bug 1639247)
Backed out changeset 2d2ff22a0ea4 (bug 1639247)
2020-05-20 19:34:22 +03:00
Andrea Marchesini
50ea627cef
Bug 1639247 - Isolate DNS cache per first-party when privacy.partition.network_state is set to true - part 3 - DNS originAttributes suffix in about:networking, r=valentin,fluent-reviewers,necko-reviewers,flod
...
Differential Revision: https://phabricator.services.mozilla.com/D75986
2020-05-20 15:52:54 +00:00
Coroiu Cristina
44c378a7fb
Backed out 5 changesets (bug 1602832) for browser-chrome failures at toolkit/mozapps/extensions/test/xpinstall/browser_doorhanger_installs.js on a CLOSED TREE
...
Backed out changeset 059a7f44d1a9 (bug 1602832)
Backed out changeset 2f3cc391b48a (bug 1602832)
Backed out changeset 24d1ce1b0ac9 (bug 1602832)
Backed out changeset 5ea85726cc48 (bug 1602832)
Backed out changeset ee00e846104e (bug 1602832)
2020-05-19 23:05:26 +03:00
Kershaw Chang
e5f3047c48
Bug 1602832 - P1: Run xpcshell tests without e10s with socket process r=dragana
...
Differential Revision: https://phabricator.services.mozilla.com/D58110
2020-05-19 12:56:47 +00:00
Eden Chuang
16b5f23697
Bug 1532287 - P2 Propagate loading document/worker's COEP to nsHttpChannel through nsILoadInfo r=necko-reviewers,valentin,JuniorHsu
...
Currently, the worker's COEP is saved in WorkerPrivate and not be respected when loading resources in workers.
This patch adds an attribute loadingEmbedderPolicy in nsILoadInfo, which indicates the COEP header the loading must be respected.
The default value of loadingEmbedderPolicy is nsILoadInfo::EMBEDDER_POLICY_NULL.
loadingEmbedderPolicy is initialized with the COEP of the BrowsingContext used for creating LoadInfo.
And it could be set to other value when fetch in workers.
Differential Revision: https://phabricator.services.mozilla.com/D73690
2020-05-19 12:50:39 +00:00
Frederik Braun
de3412e689
Bug 1613609 - Add required loadinfo flag requests initiated with SystemPrincipal r=necko-reviewers,dragana
...
Adding the flag to existing channel/loadinfo object for:
- PushServices HTTP, WebSocket
- NetworkGeolocationProvider
- NetUtil.jsm's NewChannel
- NetworkConnectivityService
- OCSP
- Portal Detection
- ProductAddonChecker.jsm
- URLClassifier
Differential Revision: https://phabricator.services.mozilla.com/D75063
2020-05-19 08:54:58 +00:00
Kershaw Chang
bdbecde447
Bug 1539819 - P1: Make TRRService work in socket process r=dragana,necko-reviewers
...
Differential Revision: https://phabricator.services.mozilla.com/D68880
2020-05-18 20:18:03 +00:00
Mihai Alexandru Michis
a2026344a1
Backed out 2 changesets (bug 1613609) for causing bustages.
...
CLOSED TREE
Backed out changeset dd6e395dc342 (bug 1613609)
Backed out changeset 5bcb7b13a4ad (bug 1613609)
2020-05-18 16:38:58 +03:00
Frederik Braun
3baff21cbd
Bug 1613609 - Add required loadinfo flag requests initiated with SystemPrincipal r=necko-reviewers,dragana
...
Adding the flag to existing channel/loadinfo object for:
- PushServices HTTP, WebSocket
- NetworkGeolocationProvider
- NetUtil.jsm's NewChannel
- NetworkConnectivityService
- OCSP
- Portal Detection
- ProductAddonChecker.jsm
- URLClassifier
Differential Revision: https://phabricator.services.mozilla.com/D75063
2020-05-18 10:59:04 +00:00
Csoregi Natalia
5162f86676
Backed out 2 changesets (bug 1613609) for failures on nsXPConnect.cpp. CLOSED TREE
...
Backed out changeset c593a7296df4 (bug 1613609)
Backed out changeset 72199fc4ea2b (bug 1613609)
2020-05-18 13:05:12 +03:00
Frederik Braun
3b0d63cd07
Bug 1613609 - Add required loadinfo flag requests initiated with SystemPrincipal r=necko-reviewers,dragana
...
Adding the flag to existing channel/loadinfo object for:
- PushServices HTTP, WebSocket
- NetworkGeolocationProvider
- NetUtil.jsm's NewChannel
- NetworkConnectivityService
- OCSP
- Portal Detection
- ProductAddonChecker.jsm
- URLClassifier
Differential Revision: https://phabricator.services.mozilla.com/D75063
2020-05-18 09:19:17 +00:00
Nicklas Boman
4f2fa0cfa7
Bug 1515419 - fixing ToNewCString (and ToNewUnicode as well) xpcom/string/nsReadableUtils.cpp r=froydnj,necko-reviewers,valentin
...
Differential Revision: https://phabricator.services.mozilla.com/D17411
2020-05-17 06:58:48 +00:00
Aaron Klotz
53710190f5
Bug 1637452: Part 7 - Fix JNI includes in netwerk; r=necko-reviewers,valentin
...
In this bug we're moving away from monolithic JNI headers to class-specific
headers so that we don't have to rebuild the world every time we make a change
to a JNI interface.
Differential Revision: https://phabricator.services.mozilla.com/D75370
2020-05-15 17:04:32 +00:00
Razvan Maries
481517ce87
Backed out 2 changesets (bug 1558394) for perma failures on iframe_sandbox_anchor_download_block_downloads.sub.tentative.html. CLOSED TREE
...
Backed out changeset 79046ff8143b (bug 1558394)
Backed out changeset e13ede3c68d4 (bug 1558394)
2020-05-15 19:18:34 +03:00