Commit Graph

18525 Commits

Author SHA1 Message Date
Valentin Gosu
44d8431a8c Bug 1513574 - Remove UAOverridesBootstrapper r=michal
Differential Revision: https://phabricator.services.mozilla.com/D14750

--HG--
extra : moz-landing-system : lando
2019-09-16 15:21:18 +00:00
Ehsan Akhgari
e8e4f4ae9c Bug 1581160 - Part 2: Do not prevent the local database from being checked in UrlClassifierSkipListService.jsm; r=johannh,leplatrem
Differential Revision: https://phabricator.services.mozilla.com/D46029

--HG--
extra : moz-landing-system : lando
2019-09-16 15:02:06 +00:00
Cosmin Sabou
b1cfe7b829 Backed out 4 changesets (bug 1513574) for causing several browser chrome failures. CLOSED TREE
Backed out changeset 7d950fc452fb (bug 1513574)
Backed out changeset 11f015a3e739 (bug 1513574)
Backed out changeset be6959a563f6 (bug 1513574)
Backed out changeset ce51efd054b8 (bug 1513574)

--HG--
extra : histedit_source : a7bc0055925ac352826572f96730f3d90815bda0
2019-09-16 12:40:40 +03:00
Valentin Gosu
f9ed039670 Bug 1513574 - Remove UserAgentOverrides.jsm and UserAgentUpdates.jsm r=michal
Also removes the UA cache attached to nsILoadGroup and nsIRequestContext and the "http-on-useragent-request" observer notification.
If overriding the user agent is needed "http-on-modify-request" is equally usable (but should be used rarely, for performance reasons). A better way is using nsIDocShell.customUserAgent.

Depends on D14750

Differential Revision: https://phabricator.services.mozilla.com/D14751

--HG--
extra : moz-landing-system : lando
2019-09-16 08:38:24 +00:00
Valentin Gosu
949993a39a Bug 1513574 - Remove UAOverridesBootstrapper r=michal
Differential Revision: https://phabricator.services.mozilla.com/D14750

--HG--
extra : moz-landing-system : lando
2019-09-16 08:38:06 +00:00
Matt Woodrow
097e29a589 Bug 1579765 - Don't overwrite redirect timings when we convert DocumentChannel to a real channel. r=mayhemer
DocumentChannel doesn't use the REDIRECT_INTERNAL flag when replacing itself with a real channel if there has been a real redirect handled in the parent.
This is so that the docshell knows about the URI change, and to add history entries.
The timing data however always wanted to be treated as an internal redirect, so that we don't record a new 'redirectEnd' at the time of the switch.
This adds a new parameter to ConfigureReplacementChannel so that we can more accurately describe the behaviour we need.

Differential Revision: https://phabricator.services.mozilla.com/D45150

--HG--
extra : moz-landing-system : lando
2019-09-16 07:22:32 +00:00
Matt Woodrow
b6167f6c16 Bug 1579765 - Early exit from NS_GetReferrerFromChannel if we had the internalReferrer property. r=mayhemer,smaug
If the docshell explicitly set this property with a nullptr value, then we should just return that.
This fixes a warning where we try QI a DocumentChannelChild to nsIHttpChannel when looking for the referrer.

Differential Revision: https://phabricator.services.mozilla.com/D45149

--HG--
extra : moz-landing-system : lando
2019-09-16 07:22:17 +00:00
Matt Woodrow
ff552dee87 Bug 1579765 - Move upload stream handling into ReplacementChannelConfig so that it gets applied to DocumentChannel as well as normal HTTP redirects. r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D45146

--HG--
extra : moz-landing-system : lando
2019-09-16 07:25:18 +00:00
Valentin Gosu
37f85c0b87 Bug 1580750 - Enable some necko mochitests in fission r=JuniorHsu
Differential Revision: https://phabricator.services.mozilla.com/D45640

--HG--
extra : moz-landing-system : lando
2019-09-12 14:34:32 +00:00
Bas Schouten
7b4d55d375 Bug 1548373: Report Open stacks for XHR responses. r=mayhemer,julienw
Differential Revision: https://phabricator.services.mozilla.com/D42831

--HG--
extra : moz-landing-system : lando
2019-09-11 15:33:00 +00:00
Cosmin Sabou
1aeb602d5e Backed out 4 changesets (bug 1513574) for Android build bustage and browser chrome failures. CLOSED TREE
Backed out changeset f155c449e516 (bug 1513574)
Backed out changeset 1f2bbbe0f781 (bug 1513574)
Backed out changeset 5f8b5f72a4ea (bug 1513574)
Backed out changeset 0e4cababccc7 (bug 1513574)
2019-09-13 21:38:18 +03:00
Valentin Gosu
ef68d827d8 Bug 1513574 - Remove UserAgentOverrides.jsm and UserAgentUpdates.jsm r=michal
Also removes the UA cache attached to nsILoadGroup and nsIRequestContext and the "http-on-useragent-request" observer notification.
If overriding the user agent is needed "http-on-modify-request" is equally usable (but should be used rarely, for performance reasons). A better way is using nsIDocShell.customUserAgent.

Depends on D14750

Differential Revision: https://phabricator.services.mozilla.com/D14751

--HG--
extra : moz-landing-system : lando
2019-09-13 17:19:40 +00:00
Valentin Gosu
3373450337 Bug 1513574 - Remove UAOverridesBootstrapper r=michal
Differential Revision: https://phabricator.services.mozilla.com/D14750

--HG--
extra : moz-landing-system : lando
2019-09-13 17:19:26 +00:00
Ehsan Akhgari
32b3e361da Bug 1580273 - Add the needed head files to support-files; r=leplatrem
Differential Revision: https://phabricator.services.mozilla.com/D45409

--HG--
extra : moz-landing-system : lando
2019-09-13 09:55:59 +00:00
Valentin Gosu
4e6807391a Bug 1558310 - Remove main thread check in nsStandardURL::nsStandardURL() r=dragana
Removing this check would allow us to see leaked URIs created off main thread.
This is OK because we already use a mutex to guard the linkedList

Differential Revision: https://phabricator.services.mozilla.com/D45156

--HG--
extra : moz-landing-system : lando
2019-09-12 16:50:25 +00:00
Kershaw Chang
7ded6772fc Bug 1579874 - Use the correct process type for socket process r=jld
Differential Revision: https://phabricator.services.mozilla.com/D45633

--HG--
extra : moz-landing-system : lando
2019-09-12 20:34:58 +00:00
Kershaw Chang
bfea62cf48 Bug 1576171 - Send ftp channel status via OnStartRequest r=valentin
In FtpChannelParent, we didn't propagate the channel status to FtpChannelChild. This could make child start to do diversion on a failed channel.
Like what we did in http channel, we should send the channel status to child via OnStartRequest message.

Differential Revision: https://phabricator.services.mozilla.com/D45648

--HG--
extra : moz-landing-system : lando
2019-09-12 16:24:43 +00:00
Noemi Erli
b3c9dabce5 Merge inbound to mozilla-central. a=merge 2019-09-13 00:53:27 +03:00
Csoregi Natalia
2ee3e5109e Merge mozilla-central to mozilla-inbound. CLOSED TREE 2019-09-12 18:28:36 +03:00
Sebastian Streich
8695d9d7c2 Bug 1579179 - Use nsIChannel for noSniff checks r=ckerschb
Reviewers: ckerschb, bzbarsky

Reviewed By: ckerschb, bzbarsky

Subscribers: evilpie, bzbarsky, mayhemer

Bug #: 1579179

Differential Revision: https://phabricator.services.mozilla.com/D45351

--HG--
extra : rebase_source : 1c5bfdd073fd9b68227a376526bbdf118fb3fb77
extra : histedit_source : c0e66d1fa9033542b7bc7d425227ebd6627f3e85
2019-09-12 14:22:21 +03:00
Valentin Gosu
96689a4a96 Bug 1579331 - URL constructor fails when input is a data URL without a comma r=baku
Differential Revision: https://phabricator.services.mozilla.com/D45372

--HG--
extra : moz-landing-system : lando
2019-09-12 09:24:23 +00:00
Kershaw Chang
de860c0a83 Bug 1580046 - Introduce new trr pref: builtin-excluded-domains r=valentin
Differential Revision: https://phabricator.services.mozilla.com/D45518

--HG--
extra : moz-landing-system : lando
2019-09-12 12:44:16 +00:00
ffxbld
5af1f73d04 No Bug, mozilla-central repo-update HSTS HPKP blocklist remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D45662

--HG--
extra : moz-landing-system : lando
2019-09-12 13:37:51 +00:00
Christian Holler
94e642e603 Bug 1579475 - HTTP fuzzing target should call RemoveRequestContext. r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D45035

--HG--
extra : moz-landing-system : lando
2019-09-09 17:17:22 +00:00
Ehsan Akhgari
d11436d012 Bug 1575302 - Remove OptionalPrincipalInfo; r=barret
Differential Revision: https://phabricator.services.mozilla.com/D45565

--HG--
extra : moz-landing-system : lando
2019-09-11 20:36:06 +00:00
Kevin Jacobs
4bf9806ed6 Bug 1562773 - Propagate Delegated Credential flag to nsITransportSecurityInfo r=keeler,jcj
This patch adds a new `mIsDelegatedCredential` parameter to nsITransportSecurityInfo, indicating whether or not a delegated credential keypair was used in the TLS handshake (see: https://tools.ietf.org/html/draft-ietf-tls-subcerts-03) .

This functionality is only available if _security.tls.enable_delegated_credentials_ is set to true.

Differential Revision: https://phabricator.services.mozilla.com/D39807

--HG--
extra : moz-landing-system : lando
2019-09-11 15:19:57 +00:00
Brian Hackett
5b83776c8a Bug 1580104 Part 2 - Don't treat middleman processes as websocket child processes, r=mayhemer.
Depends on D45464

Differential Revision: https://phabricator.services.mozilla.com/D45465

--HG--
extra : moz-landing-system : lando
2019-09-11 16:07:46 +00:00
Noemi Erli
ba2490c251 Backed out changeset d0fb6559c22e (bug 1579331) for failing in browser_contextmenu.js CLOSED TREE 2019-09-11 19:05:35 +03:00
Valentin Gosu
c2c959abc7 Bug 1579331 - URL constructor fails when input is a data URL without a comma r=baku
Differential Revision: https://phabricator.services.mozilla.com/D45372

--HG--
extra : moz-landing-system : lando
2019-09-11 14:03:40 +00:00
Valentin Gosu
078dddfc0a Bug 1576386 - Don't recompute the networkId during shutdown r=michal
Calling the windows APIs may block shutdown.

Differential Revision: https://phabricator.services.mozilla.com/D45161

--HG--
extra : moz-landing-system : lando
2019-09-11 14:38:52 +00:00
Ehsan Akhgari
7e6d000cd3 Bug 1579552 - Update the cookie path matching algorithm per RFC6265; r=baku
Differential Revision: https://phabricator.services.mozilla.com/D45427

--HG--
extra : moz-landing-system : lando
2019-09-11 11:07:12 +00:00
Ehsan Akhgari
ebf23e7983 Bug 1580284 - Remove the nsIPrivateModeCallback unused interface; r=baku
Differential Revision: https://phabricator.services.mozilla.com/D45410

--HG--
extra : moz-landing-system : lando
2019-09-11 11:02:29 +00:00
Dragana Damjanovic
9cd449c033 Bug 1579047 - _NS_NEXT_TOKEN in the wrong place. r=Ehsan
Differential Revision: https://phabricator.services.mozilla.com/D44816

--HG--
extra : moz-landing-system : lando
2019-09-09 16:13:42 +00:00
Razvan Maries
2fb41871a9 Backed out 2 changesets (bug 1562773) for build bustages. CLOSED TREE
Backed out changeset 154b23d4a214 (bug 1562773)
Backed out changeset f32f7a644981 (bug 1562773)
2019-09-11 04:40:29 +03:00
J.C. Jones
a54604ea14 Bug 1562773 - Propagate Delegated Credential flag to nsITransportSecurityInfo r=keeler
This patch adds a new `mIsDelegatedCredential` parameter to nsITransportSecurityInfo, indicating whether or not a delegated credential keypair was used in the TLS handshake (see: https://tools.ietf.org/html/draft-ietf-tls-subcerts-03) .

This functionality is only available if _security.tls.enable_delegated_credentials_ is set to true.

Differential Revision: https://phabricator.services.mozilla.com/D39807

--HG--
extra : moz-landing-system : lando
2019-09-10 19:55:46 +00:00
Perry Jiang
d31ca19e4d Bug 1580363 - propagate "apply conversion" flag when synthesized response creates a redirect channel r=asuth
Differential Revision: https://phabricator.services.mozilla.com/D45472

--HG--
extra : moz-landing-system : lando
2019-09-10 23:55:21 +00:00
Junior Hsu
047f47caa2 Bug 1556037 - Re-enable test_http2-proxy.js test r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D41053

--HG--
extra : moz-landing-system : lando
2019-09-10 21:21:53 +00:00
Paul Zuehlcke
00119452fc Bug 1574480 - Updated browser.js and OfflineAppsChild.jsm to use PermissionManager principal methods. r=johannh,smaug
Differential Revision: https://phabricator.services.mozilla.com/D42620

--HG--
extra : moz-landing-system : lando
2019-09-10 10:57:07 +00:00
Jeremy Lempereur
28fa1df24e Bug 1562386 - Sort network attributes before hashing them to get a networkID r=mayhemer,michal,valentin
Differential Revision: https://phabricator.services.mozilla.com/D38418

--HG--
extra : moz-landing-system : lando
2019-09-10 11:02:25 +00:00
Johann Hofmann
a95351130d Bug 1571234 - Change RemoveCookiesFromRootDomain to RemoveCookiesFromExactHost. r=baku
This will change RemoveCookiesFromRootDomain to not remove cookies from all sub-domains but instead
only remove the single host that is passed. This is necessary to support removing all sub-domain
cookie data in ForgetAboutSite without compromising on the cookie permissions that are supported by
Sanitizer.jsm

As a side effect, this also fixes the issues described in https://bugzilla.mozilla.org/show_bug.cgi?id=1515913#c24
(which were caused by deleting sub-domains without checking their permission).

Sanitizer.jsm should retain its functionality even with this change, because it already collects
all the principals we have to delete individually and tries to delete them (so it would consider
mozilla.org and support.mozilla.org separately).

Differential Revision: https://phabricator.services.mozilla.com/D45012

--HG--
extra : moz-landing-system : lando
2019-09-09 13:58:06 +00:00
Kershaw Chang
487ae96c4a Bug 1546816 - Part 1-1: Remove MITM_OK flag and bypassAuthentication r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D45019

--HG--
extra : moz-landing-system : lando
2019-09-09 13:46:45 +00:00
Brindusan Cristian
41e89721b3 Backed out changeset 566627a48370 (bug 1562386) for bustages on nsNotifyAddrListener.cpp:222:21. CLOSED TREE
--HG--
extra : histedit_source : d26c75e2ded633ed92ce294faf94e2c9ec259c74
2019-09-09 14:28:10 +03:00
Jeremy Lempereur
d70444d071 Bug 1562386 - Sort network attributes before hashing them to get a networkID r=mayhemer,michal
Differential Revision: https://phabricator.services.mozilla.com/D38418

--HG--
extra : moz-landing-system : lando
2019-09-06 10:12:51 +00:00
Daisuke Akatsuka
a65bd31ef9 Bug 1572933: Introduce an attribute to raise the cache priority. r=pbro,mayhemer
For now, when we turn on `disable cache` switch in DevTools[1], web page loads
the contents without using the cache. Furthermore, DevTools as well comes to
load the contents DevTools inspects without using the cache. And, if the loaded
contents from the web page and DevTools was different, becomes impossible to
inspect the content correctly.
Thus, in order to make DevTools refer the same content the web page loaded,
makes DevTools load the contents inspecting from the cache at first, no matter
if disables the switch or not.

When turns on disable cache in DevTools, `LOAD_BYPASS_CACHE` flag is set into
`loadFlags` in the `docshell`.[2] The other hand, the content DevTools inspects
is loaded from a channel DevTools creates with `LOAD_FROM_CACHE` flag.[3]
However, because this channel is belong to same `loadGroup` of the `docshell`,
`LOAD_BYPASS_CACHE` is inherited and is choosen even if `LOAD_FROM_CACHE` is set.
Thus, in this patch, we introduce an attribute `preferCacheLoadOverBypass`
which raises the priority for `LOAD_FROM_CACHE` above `LOAD_BYPASS_CACHE` and
`LOAD_BYPASS_LOCAL_CACHE`.

[1] https://developer.mozilla.org/en-US/docs/Tools/Settings#Advanced_settings
[2] https://searchfox.org/mozilla-central/source/devtools/server/actors/targets/browsing-context.js#1227
[3] https://searchfox.org/mozilla-central/source/devtools/shared/DevToolsUtils.js#542-544

Differential Revision: https://phabricator.services.mozilla.com/D44626

--HG--
extra : moz-landing-system : lando
2019-09-09 00:57:05 +00:00
Gurzau Raul
812644ff5f Backed out changeset 8c25acd6a557 (bug 1237782) for wpt failures at controller-on-disconnect.https.html 2019-09-07 14:32:37 +03:00
Jonathan Kingston
64f59b042f Bug 1237782 - Remove http override and add appcache pref r=baku
Differential Revision: https://phabricator.services.mozilla.com/D44472

--HG--
extra : moz-landing-system : lando
2019-09-07 07:45:30 +00:00
Christian Holler
c87d1c6975 Bug 1579466 - Check GetEsniUsed return value in nsHttpConnection. r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D45032

--HG--
extra : moz-landing-system : lando
2019-09-06 17:56:16 +00:00
Cosmin Sabou
732b97195a Backed out changeset 7dc9a45ef7d6 (bug 1237782) for causing browser chrome failures on browser_disableAppcache.js CLOSED TREE 2019-09-06 19:10:20 +03:00
Jonathan Kingston
a8f4386427 Bug 1237782 - Remove http override and add appcache pref r=baku
Differential Revision: https://phabricator.services.mozilla.com/D44472

--HG--
extra : moz-landing-system : lando
2019-09-06 15:02:34 +00:00
Ting-Yu Lin
b8fee8f71c Bug 1308587 Part 2 - Remove -moz prefix for all multi-column properties in testing and css files. r=dholbert
This patch is generated by the following script:

```
function remove_column_prefix() {
    echo "Renaming $1 to $2"
    find .\
         -type f\
         ! -path "./obj*"\
         ! -path "./.git"\
         ! -path "./.hg"\
         \( -name "*.html" -or\
            -name "*.xhtml" -or\
            -name "*.xht" -or\
            -name "*.xul" -or\
            -name "*.xml" -or\
            -name "*.css"  \)\
            -exec sed -i -e "s/$1/$2/g" "{}" \;
}

remove_column_prefix "-moz-columns" "columns"
remove_column_prefix "-moz-column-width" "column-width"
remove_column_prefix "-moz-column-count" "column-count"
remove_column_prefix "-moz-column-fill" "column-fill"
remove_column_prefix "-moz-column-gap" "column-gap"
remove_column_prefix "-moz-column-rule" "column-rule"
remove_column_prefix "-moz-column-rule-width" "column-rule-width"
remove_column_prefix "-moz-column-rule-color" "column-rule-color"
remove_column_prefix "-moz-column-rule-style" "column-rule-style"

```

Note: after running the above script, I reverted one minor change to the
file multicol-nested-column-rule-001.xht in the theoretically read-only
directory layout/reftests/w3c-css/received/css-multicol/.

Differential Revision: https://phabricator.services.mozilla.com/D44870

--HG--
extra : moz-landing-system : lando
2019-09-05 21:37:32 +00:00
Christian Holler
77a280300f Bug 1578186 - Add fuzzing support for HTTP2 proxy. r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D44374

--HG--
extra : moz-landing-system : lando
2019-09-05 19:26:12 +00:00
Christian Holler
95fc013b8b Bug 1528951 - Implement Websocket fuzzing target for Necko. r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D42816

--HG--
extra : moz-landing-system : lando
2019-09-05 16:28:42 +00:00
Coroiu Cristina
9683a17a37 Backed out changeset d2867a062f45 (bug 1574480) for browser-chrome failures at browser/base/content/test/general/browser_offlineQuotaNotification.js on a CLOSED TREE 2019-09-05 18:38:42 +03:00
Christian Holler
d5d628a5fb Bug 1577571 - Add OnUpgradeFailed to nsIHttpUpgradeListener. r=michal
Differential Revision: https://phabricator.services.mozilla.com/D44680

--HG--
extra : moz-landing-system : lando
2019-09-05 12:10:27 +00:00
Paul Zuehlcke
99bfbf1328 Bug 1574480 - Updated browser.js and OfflineAppsChild.jsm to use PermissionManager principal methods. r=johannh,smaug
Differential Revision: https://phabricator.services.mozilla.com/D42620

--HG--
extra : moz-landing-system : lando
2019-09-05 13:37:55 +00:00
ffxbld
3e8fdbe0ed No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D44828

--HG--
extra : moz-landing-system : lando
2019-09-05 13:17:10 +00:00
Bogdan Tara
37b20c9b16 Backed out 2 changesets (bug 1405971) for test_sanityRegisteredServiceWorker2.html failures a=backout
Backed out changeset 71d1cf219835 (bug 1405971)
Backed out changeset 207b97835f60 (bug 1405971)
2019-09-05 06:45:40 +03:00
Brindusan Cristian
971c2dc9aa Merge inbound to mozilla-central. a=merge 2019-09-04 19:26:46 +03:00
Cosmin Sabou
62c067e92f Bug 1578037 - Disable tests that cause leaks on fission. r=johannh
Differential Revision: https://phabricator.services.mozilla.com//D44599
2019-09-04 07:18:42 +03:00
arthur.iakab
4ea120b5cb Backed out changeset e3f06f11de62 (bug 1237782) for causing browser-chrome failure on automation.py CLOSED TREE 2019-09-03 21:04:49 +03:00
Jonathan Kingston
dbfd29b586 Bug 1237782 - Remove http override and add appcache pref r=baku
Differential Revision: https://phabricator.services.mozilla.com/D44472

--HG--
extra : moz-landing-system : lando
2019-09-03 16:44:13 +00:00
hb
f05c8469c7 Bug 1575217, r=michal,dragana
Differential Revision: https://phabricator.services.mozilla.com/D43761

--HG--
extra : moz-landing-system : lando
2019-09-02 18:06:09 +00:00
Tom Schuster
68ebc30ae5 Bug 1405971 - Strip existing disallowed schemes in Origin header. r=JuniorHsu,ckerschb
Differential Revision: https://phabricator.services.mozilla.com/D39781

--HG--
extra : moz-landing-system : lando
2019-09-03 18:58:18 +00:00
Honza Bambas
482bfa7a25 Bug 1559088 - Fix test_redirect-caching_failure.js to again do what it has to, r=kershaw
Differential Revision: https://phabricator.services.mozilla.com/D43796

--HG--
extra : moz-landing-system : lando
2019-09-03 12:24:11 +00:00
Andrea Marchesini
d5803b5f62 Bug 1563313 - URL-Classifier should process nsIChannel before the proxy, r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D36872

--HG--
extra : moz-landing-system : lando
2019-09-03 10:50:40 +00:00
Dorel Luca
15fefbe415 Merge mozilla-inbound to mozilla-central. a=merge 2019-09-03 07:03:04 +03:00
Jean-Yves Avenard
1c657f7d19 Bug 1556489 - P25. Make nsIIdentChannel support conditional for nsBaseChannel. r=mayhemer
So that we can restrict QI(nsIIdentChannel) to nsIHttpChannel and DocumentChannelChild objects only.

Differential Revision: https://phabricator.services.mozilla.com/D44111

MANUAL PUSH: multiple authors stack
2019-09-03 10:20:16 +10:00
Jean-Yves Avenard
5749840f21 Bug 1556489 - P23 - Only create new ClientSource objects in the content, but use the recreated info from redirects in the parent. r=asuth
Differential Revision: https://phabricator.services.mozilla.com/D42260
2019-09-03 10:19:53 +10:00
Jean-Yves Avenard
ff8e5e92fd Bug 1556489 - P22 - Manually add history entries for all DocumentChannel redirects, since these aren't exposed to the content process as channel redirects. r=kmag
Differential Revision: https://phabricator.services.mozilla.com/D42259
2019-09-03 10:19:53 +10:00
Matt Woodrow
4151ea2a94 Bug 1556489 - P21 - Cache the original referrer before url classification has been applied to send back to the content process, since the docshell expects to find the original. r=mayhemer,tnguyen
Differential Revision: https://phabricator.services.mozilla.com/D42258
2019-09-03 10:19:52 +10:00
Jean-Yves Avenard
9cdcb33634 Bug 1556489 - P20 - Remove unused method. r=mayhemer 2019-09-03 10:19:52 +10:00
Jean-Yves Avenard
d65c5e0309 Bug 1556489 - P19. Fix devtools stack traces. r=honza,ochameau
DevTools rely on events when a new HttpChannel is opened, it needs to know when a DocumentChannel is.

Differential Revision: https://phabricator.services.mozilla.com/D40975
2019-09-03 10:19:46 +10:00
Matt Woodrow
1b5f7c772a Bug 1556489 - P18. Add DocumentChannel and hook it up. r=nika,mayhemer
DocumentChannel acts as a replacement for HttpChannel where redirects are now entirely handled in the DocumentChannelParent. The ContentChild will receive the final nsIChannel once all redirects have been handled.

Differential Revision: https://phabricator.services.mozilla.com/D37490
2019-09-03 10:19:38 +10:00
Jean-Yves Avenard
f0b40a38d7 Bug 1556489 - P15. Move methods into dedicated nsI* interface. r=mayhemer
This allows in the future for the nsHttpChannel to deal with things others than the HttpChannelParent.

Differential Revision: https://phabricator.services.mozilla.com/D40972
2019-09-03 10:19:37 +10:00
Matt Woodrow
8a54afbb4c Bug 1556489 - P14. No longer pass nsILoadInfo to TriggerCrossProcessRedirect. r=mayhemer
We can deduct it from the nsIChannel argument already. In the future, the httpParent may be either HttpChannelParent or DocumentChannelParent.

Differential Revision: https://phabricator.services.mozilla.com/D40971
2019-09-03 10:19:36 +10:00
Jean-Yves Avenard
b43fd91ea2 Bug 1556489 - P11. Add nIIdentChannel interface. r=mayhemer
The devtools listens to http-on-opening-request event which is expected to receive a nsIHttpChannel. However future changes will make it that it's not always a nsIHttpChannel that can fire such event.

As such we create an intermediary interface nsIIdentChannel and move the subset generating such event in nsIHttpChannel there.

Differential Revision: https://phabricator.services.mozilla.com/D40968
2019-09-03 10:19:34 +10:00
Matt Woodrow
a209298de2 Bug 1556489 - P7. Make LoadInfoArgsToLoadInfo works with LoadInfo class. r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D40964
2019-09-03 10:19:11 +10:00
Jean-Yves Avenard
0c52caf2b2 Bug 1556489 - P6. Simplify use of namespace. r=mayhemer
This is a cosmetic only change.

Differential Revision: https://phabricator.services.mozilla.com/D40963
2019-09-03 10:19:10 +10:00
Jean-Yves Avenard
e76aa88e15 Bug 1556489 - P4. Add ability to set Document object on LoadInfo. r=mayhemer,ckerschb
This will be required to access the Performance object from future DocumentChannel.

Differential Revision: https://phabricator.services.mozilla.com/D41133
2019-09-03 10:18:58 +10:00
Jean-Yves Avenard
a23b70b74e Bug 1556489 - P3. Move logic on when to return the PerformanceStorage into nsILoadInfo. r=mayhemer
This more closely follow the code as earlier documented. To remove all ambiguities, the idl documentation was amended.

Differential Revision: https://phabricator.services.mozilla.com/D40961
2019-09-03 09:50:05 +10:00
Jean-Yves Avenard
de650bb217 Bug 1556489 - P2. Use ReplacementChannelConfig across HttpChannelParent and ContentChild. r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D40960
2019-09-03 09:49:46 +10:00
Jean-Yves Avenard
cc07990908 Bug 1556489 - P1. Introduce ReplacementChannelConfig. r=mayhemer
This class allows to encapsulate all the information required in order to create a new HttpChannel object following a redirect.

Differential Revision: https://phabricator.services.mozilla.com/D40959
2019-09-03 09:47:17 +10:00
Michal Novotny
85857b979d Bug 1577354 - Assertion failure: decoded.CountChar('\t') == 2, at /netwerk/cache2/CacheFileContextEvictor.cpp:409, r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D43902

--HG--
extra : moz-landing-system : lando
2019-09-02 17:26:08 +00:00
Honza Bambas
26889bce93 Bug 1578136 - Add a non-null check before dereferencing TLSFilterTransaction::Connection(), r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D44391

--HG--
extra : moz-landing-system : lando
2019-09-02 17:22:23 +00:00
Michal Novotny
a9aa8451c2 Bug 1570932 - Add telemetry about how often we observe network change events, r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D44215

--HG--
extra : moz-landing-system : lando
2019-08-30 18:18:19 +00:00
arthur.iakab
fd7aae5565 Backed out changeset 9057d052acee (bug 1559088) for causing xpcshell failures on test_redirect-caching_failure.js CLOSED TREE 2019-08-30 21:37:15 +03:00
Honza Bambas
1b5f4ca60b Bug 1559088 - Fix test_redirect-caching_failure.js to again do what it has to, r=kershaw
Differential Revision: https://phabricator.services.mozilla.com/D43796

--HG--
extra : moz-landing-system : lando
2019-08-30 16:44:11 +00:00
Ehsan Akhgari
625509f19c Bug 1399803 - Consider all IPv4 loopback addresses as secure context; r=bzbarsky,dragana
Differential Revision: https://phabricator.services.mozilla.com/D43633

--HG--
extra : moz-landing-system : lando
2019-08-30 07:57:34 +00:00
Eric Rahm
e678238a60 Bug 1569323 - Remove verbose warning in SetUserPass. r=mayhemer
This removes a rather verbose warning during URI mutation. This often
happens for use cases such as attempting to clear the field. Since `Finalize`
is marked as `MOZ_MUST_USE` we can be confident that any failures that used
to be warned about are properly handled.

Differential Revision: https://phabricator.services.mozilla.com/D42384

--HG--
extra : moz-landing-system : lando
2019-08-22 14:49:28 +00:00
Ehsan Akhgari
d5e2f368cc Bug 1529396 - Fix another test CLOSED TREE
Bug #: 1529396

Differential Revision: https://phabricator.services.mozilla.com/D44071

--HG--
extra : amend_source : 7445e9c7c4168365e363731dcc69b76a8bea3c20
2019-08-30 01:50:41 +03:00
Ehsan Akhgari
52b58160a7 Bug 1576109 - Ensure that the content blocking allow list principal is set correctly during HTTP redirects; r=baku,dragana
Differential Revision: https://phabricator.services.mozilla.com/D43541

--HG--
extra : moz-landing-system : lando
2019-08-29 18:48:43 +00:00
Bogdan Tara
3310211997 Backed out changeset a4768bd82d57 (bug 1559088) for test_redirect-caching_failure_wrap.js failures CLOSED TREE 2019-08-29 21:01:38 +03:00
Honza Bambas
bcbbd6b737 Bug 1559088 - Fix test_redirect-caching_failure.js to again do what it has to, r=kershaw
Differential Revision: https://phabricator.services.mozilla.com/D43796

--HG--
extra : moz-landing-system : lando
2019-08-29 12:07:54 +00:00
Michal Novotny
19c05de902 Bug 1576826 - Intermittent Assertion failure: isResponse, at NetlinkService.cpp:613, r=kershaw
Obviously broadcasted messages can be multipart too.

Differential Revision: https://phabricator.services.mozilla.com/D43849

--HG--
extra : moz-landing-system : lando
2019-08-29 12:08:53 +00:00
Barret Rennie
b0cbc31990 Bug 1510569 - Implement serializers for nsITransportSecurityInfo, nsIX509Cert, and nsIX509CertList r=froydnj,keeler,mayhemer
As part of the ongoing effort to port the nsIWebProgress events from
RemoteWebProgress / WebProgressChild to BrowserParent / BrowserChild, we need
to (de)serialize the nsITransportSecurityInfo instance across the IPC layer.
The existing code was calling `NS_SerializeToString` which has the overhead of
(a) allocating a buffer and also performing base64 encoding/decoding. This
patch adds `IPC::ParamTraits` implementations for `nsITransportSecurityInfo`,
`nsIX509Certificate`, and `nsIX509CertList` that (de)serializes the params
directly onto and off of the IPC message so that we don't go through the
overhead of allocating and encoding/decoding an additional buffer.

This (de)serialization will address the performance issues present in the
current implementation.

As a side effect, I also make nsITransportSecurityInfo a builtinclass XPCOM
interface, since the existing serialization code was assuming it was, there is
only one implementation, and it is in C++.

Differential Revision: https://phabricator.services.mozilla.com/D35090

--HG--
extra : moz-landing-system : lando
2019-08-28 18:55:31 +00:00
Dorel Luca
b09fe526aa Backed out 4 changesets (bug 1510569) for build bustage. CLOSED TREE
Backed out changeset d7db6a1935ce (bug 1510569)
Backed out changeset 03b7cf756a7f (bug 1510569)
Backed out changeset fa318eec0e76 (bug 1510569)
Backed out changeset cecb17bd8c03 (bug 1510569)
2019-08-28 21:46:40 +03:00
Barret Rennie
4ab0fd7d38 Bug 1510569 - Implement serializers for nsITransportSecurityInfo, nsIX509Cert, and nsIX509CertList r=froydnj,keeler,mayhemer
As part of the ongoing effort to port the nsIWebProgress events from
RemoteWebProgress / WebProgressChild to BrowserParent / BrowserChild, we need
to (de)serialize the nsITransportSecurityInfo instance across the IPC layer.
The existing code was calling `NS_SerializeToString` which has the overhead of
(a) allocating a buffer and also performing base64 encoding/decoding. This
patch adds `IPC::ParamTraits` implementations for `nsITransportSecurityInfo`,
`nsIX509Certificate`, and `nsIX509CertList` that (de)serializes the params
directly onto and off of the IPC message so that we don't go through the
overhead of allocating and encoding/decoding an additional buffer.

This (de)serialization will address the performance issues present in the
current implementation.

As a side effect, I also make nsITransportSecurityInfo a builtinclass XPCOM
interface, since the existing serialization code was assuming it was, there is
only one implementation, and it is in C++.

Differential Revision: https://phabricator.services.mozilla.com/D35090

--HG--
extra : moz-landing-system : lando
2019-08-28 18:00:16 +00:00
dlee
f981c3905f Bug 1575811 - Remove |IsAllowListed| check in UrlClassifierCommon::AnnotateChannel. r=Ehsan
When URL Classifier reports a channel is a tracker, we should only notify the classification
result when it is a third-party channel.
That means, |IsAllowListed| should not take into consideation here.

Differential Revision: https://phabricator.services.mozilla.com/D43735

--HG--
extra : moz-landing-system : lando
2019-08-28 13:40:33 +00:00
Henrik Skupin
1803585259 Bug 1570104 - Add shared IPv4 range from RFC 6598 (100.64/10) to allowed list of IP addresses for testing. r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D40167

--HG--
extra : moz-landing-system : lando
2019-08-28 10:58:48 +00:00
Kershaw Chang
5018d39958 Bug 1571987 - Forward proxy check request to parent process r=dragana,bwc
Differential Revision: https://phabricator.services.mozilla.com/D41004

--HG--
extra : moz-landing-system : lando
2019-08-24 05:37:00 +00:00
Paul Bone
08bc01ab37 Bug 1576814 - Skip tests that timeout r=kmag
Depends on D43572

Differential Revision: https://phabricator.services.mozilla.com/D43573

--HG--
extra : moz-landing-system : lando
2019-08-27 19:07:43 +00:00
Ehsan Akhgari
6ed82c152f Bug 1540117 - Part 1: Do not generate a console warning when we reject an attempt to retrieve a cookie for a host that has none stored; r=baku
Differential Revision: https://phabricator.services.mozilla.com/D43270

--HG--
extra : moz-landing-system : lando
2019-08-27 15:10:45 +00:00
Noemi Erli
d6af4c1426 Backed out 3 changesets (bug 1540117) for failures in browser_storageAccessPrivateWindow.js
Backed out changeset 1dcf5956a3f1 (bug 1540117)
Backed out changeset 1dc867e1d4b2 (bug 1540117)
Backed out changeset c93e83feda5e (bug 1540117)
2019-08-27 18:06:58 +03:00
Ehsan Akhgari
184c0ca703 Bug 1540117 - Part 1: Do not generate a console warning when we reject an attempt to retrieve a cookie for a host that has none stored; r=baku
Differential Revision: https://phabricator.services.mozilla.com/D43270

--HG--
extra : moz-landing-system : lando
2019-08-27 10:36:39 +00:00
Michal Novotny
390918caab Bug 1567616 - network id based on default gateway is wrong when VPN overrides default gateway by more specific routes r=dragana
This patch implements NetlinkService which communicates with kernel via netlink socket. It keeps track of addresses, default routes, interfaces and neighbors and uses it to calculate network ID.

Differential Revision: https://phabricator.services.mozilla.com/D43175

--HG--
rename : netwerk/system/linux/nsNotifyAddrListener_Linux.cpp => netwerk/system/linux/nsNetworkLinkService.cpp
rename : netwerk/system/linux/nsNotifyAddrListener_Linux.h => netwerk/system/linux/nsNetworkLinkService.h
extra : moz-landing-system : lando
2019-08-26 21:46:32 +00:00
Andreea Pavel
f042d32425 Backed out changeset 22469090e93e (bug 1567616) for build bustages on a CLOSED TREE
--HG--
rename : netwerk/system/linux/nsNetworkLinkService.cpp => netwerk/system/linux/nsNotifyAddrListener_Linux.cpp
rename : netwerk/system/linux/nsNetworkLinkService.h => netwerk/system/linux/nsNotifyAddrListener_Linux.h
2019-08-27 00:30:40 +03:00
Michal Novotny
128254f45e Bug 1567616 - network id based on default gateway is wrong when VPN overrides default gateway by more specific routes r=dragana
This patch implements NetlinkService which communicates with kernel via netlink socket. It keeps track of addresses, default routes, interfaces and neighbors and uses it to calculate network ID.

Differential Revision: https://phabricator.services.mozilla.com/D43175

--HG--
rename : netwerk/system/linux/nsNotifyAddrListener_Linux.cpp => netwerk/system/linux/nsNetworkLinkService.cpp
rename : netwerk/system/linux/nsNotifyAddrListener_Linux.h => netwerk/system/linux/nsNetworkLinkService.h
extra : moz-landing-system : lando
2019-08-26 20:03:33 +00:00
Dragana Damjanovic
2826398670 Bug 1575780 - We need a long request's timeout for trronly mode. r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D43410

--HG--
extra : moz-landing-system : lando
2019-08-26 19:52:20 +00:00
Honza Bambas
e09f9634c2 Bug 1451714 - Fix comment over LOAD_NO_NETWORK_IO flag, r=michal
Simply removing the confusing and not much info providing sentence.

Differential Revision: https://phabricator.services.mozilla.com/D43451

--HG--
extra : moz-landing-system : lando
2019-08-26 13:58:47 +00:00
ffxbld
36f90d0df0 No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D43457

--HG--
extra : moz-landing-system : lando
2019-08-26 14:49:18 +00:00
Nika Layzell
bf4d274ec0 Bug 1570369 - Part 15: Use IPDL refcounted for PHttpChannel, r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D40264

--HG--
extra : moz-landing-system : lando
2019-08-16 10:54:23 +00:00
Nika Layzell
696b024d27 Bug 1570369 - Part 14: Use IPDL refcounted for PHttpBackgroundChannel, r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D40263

--HG--
extra : moz-landing-system : lando
2019-08-16 10:50:08 +00:00
Nika Layzell
3538174984 Bug 1570369 - Part 13: Use IPDL refcounted for PFileChannel, r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D40259

--HG--
extra : moz-landing-system : lando
2019-08-16 10:46:30 +00:00
Nika Layzell
cac925ef9d Bug 1570369 - Part 12: Use IPDL refcounted for PDataChannel, r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D40257

--HG--
extra : moz-landing-system : lando
2019-08-16 10:45:57 +00:00
Arpit Bharti
214fd3f380 Bug 1563246 - Reload the Public Suffix List when data is updated in profile folder r=leplatrem,kmag
Differential Revision: https://phabricator.services.mozilla.com/D42470

--HG--
extra : moz-landing-system : lando
2019-08-23 10:56:59 +00:00
Arpit Bharti
47dfa3b891 Bug 1563226 - Download the Public Suffix List using Remote Settings r=leplatrem
Differential Revision: https://phabricator.services.mozilla.com/D42469

--HG--
extra : moz-landing-system : lando
2019-08-22 14:09:42 +00:00
Kershaw Chang
89ca1976ab Bug 1570732 - Skip trr when parental control is enabled r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D42489

--HG--
extra : moz-landing-system : lando
2019-08-23 21:17:15 +00:00
Honza Bambas
eb406bc935 Bug 1562276 - Proper transaction restart on HTTP_1_1_REQUIRED and h2 proxy, r=dragana.
1. Unsticky connection from a transaction we disable SPDY on to restart
2. Call OnReadSegment from TLSFilterTransaction;FilterOutput to push written data out (renegotiation)
3. Break indefinite loop that may occur during renegotiation by propagating WOULD_BLOCK via mFilterReadCode

Differential Revision; https;\\phabricator.services.mozilla.com\D40409

Differential Revision: https://phabricator.services.mozilla.com/D42310

--HG--
extra : moz-landing-system : lando
2019-08-24 13:21:37 +00:00
Kershaw Chang
157eb3caa4 Bug 1574410 - Add tests to check captive portal URL is resolved by native dns r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D42491

--HG--
extra : moz-landing-system : lando
2019-08-23 20:23:12 +00:00
Kershaw Chang
fee6e1a70f Bug 1574410 - Directly put the host of captive portal URL to TRR black list r=mt
Differential Revision: https://phabricator.services.mozilla.com/D42280

--HG--
extra : moz-landing-system : lando
2019-08-23 20:23:12 +00:00
Kershaw Chang
1ee6c512c5 Bug 1571356 - Add TRANSPARENT_PROXY_RESOLVES_HOST flag to connection info's hash key r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D43043

--HG--
extra : moz-landing-system : lando
2019-08-22 15:13:36 +00:00
Junior Hsu
0e6b4ffc45 Bug 1574676 - Obtaining COEP from the document through which target is nested r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D42397

--HG--
extra : moz-landing-system : lando
2019-08-22 15:45:19 +00:00
Sebastian Streich
444eb9179d Bug 1536058 - Add Cache-Isolation behind a pref r=ckerschb,Ehsan
***

Differential Revision: https://phabricator.services.mozilla.com/D40612

--HG--
extra : moz-landing-system : lando
2019-08-22 15:20:53 +00:00
Christian Holler
1577bd20a8 Bug 1575493 - Create a RequestContext in the HTTP fuzzing target. r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D42815

--HG--
extra : moz-landing-system : lando
2019-08-22 13:38:16 +00:00
Jan de Mooij
28c7a3ddb9 Bug 1547977 - Use JS::DefaultHeapMaxBytes instead of 4 MB for PAC runtime. r=jonco,mayhemer
DefaultHeapMaxBytes is currently 32 MB so it should give us a bit more breathing
room.

Differential Revision: https://phabricator.services.mozilla.com/D42819

--HG--
extra : moz-landing-system : lando
2019-08-21 15:21:40 +00:00
Dragana Damjanovic
5b141b34d7 Bug 1575488 - Sent the correct host name for the esni query. r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D42822

--HG--
extra : moz-landing-system : lando
2019-08-21 11:32:33 +00:00
Mike Hommey
66d7fe943e Bug 1575420 - Replace MOZ_WIDGET_TOOLKIT value of "gtk3" with "gtk". r=froydnj
Differential Revision: https://phabricator.services.mozilla.com/D42765

--HG--
extra : moz-landing-system : lando
2019-08-21 12:25:42 +00:00
Oana Pop Rus
3223cd3dc2 Backed out 4 changesets (bug 1510569) for causing build bustage on a CLOSED TREE
Backed out changeset eae555c11f25 (bug 1510569)
Backed out changeset 2fb8938d16db (bug 1510569)
Backed out changeset b480af862022 (bug 1510569)
Backed out changeset 642cd6323cdc (bug 1510569)
2019-08-21 22:55:43 +03:00
Junior Hsu
cd2404613c Bug 1574603 - recognize COOP:unsafe-allow-outgoing r=kershaw
Differential Revision: https://phabricator.services.mozilla.com/D42367

--HG--
extra : moz-landing-system : lando
2019-08-21 13:37:07 +00:00
Barret Rennie
d8a4453540 Bug 1510569 - Implement serializers for nsITransportSecurityInfo, nsIX509Cert, and nsIX509CertList r=froydnj,keeler
As part of the ongoing effort to port the nsIWebProgress events from
RemoteWebProgress / WebProgressChild to BrowserParent / BrowserChild, we need
to (de)serialize the nsITransportSecurityInfo instance across the IPC layer.
The existing code was calling `NS_SerializeToString` which has the overhead of
(a) allocating a buffer and also performing base64 encoding/decoding. This
patch adds `IPC::ParamTraits` implementations for `nsITransportSecurityInfo`,
`nsIX509Certificate`, and `nsIX509CertList` that (de)serializes the params
directly onto and off of the IPC message so that we don't go through the
overhead of allocating and encoding/decoding an additional buffer.

This (de)serialization will address the performance issues present in the
current implementation.

As a side effect, I also make nsITransportSecurityInfo a builtinclass XPCOM
interface, since the existing serialization code was assuming it was, there is
only one implementation, and it is in C++.

Differential Revision: https://phabricator.services.mozilla.com/D35090

--HG--
extra : moz-landing-system : lando
2019-08-21 18:24:56 +00:00
Thomas Nguyen
cf20303f06 Bug 1528697 - Remove ReferrerPolicy.h and add utils to ReferrerInfo r=ckerschb
Differential Revision: https://phabricator.services.mozilla.com/D41956

--HG--
extra : moz-landing-system : lando
2019-08-21 12:09:06 +00:00
Thomas Nguyen
bbd6f51a56 Bug 1528697 - Add cenum referrerpolicy in ReferrerInfo.idl r=ckerschb,Gijs
Differential Revision: https://phabricator.services.mozilla.com/D41955

--HG--
extra : moz-landing-system : lando
2019-08-21 13:28:23 +00:00
Thomas Nguyen
32ab8293ff Bug 1528697 - Expose ReferrerPolicy.webidl and use referrerpolicy enum r=smaug
ReferrerPolicy gets tossed back and forth as a uint32_t and
ReferrerPolicy enum in header file. Expose ReferrerPolicyValues from
webidl file and use consistently in native code.

Differential Revision: https://phabricator.services.mozilla.com/D41954

--HG--
extra : moz-landing-system : lando
2019-08-21 13:24:45 +00:00
Dorel Luca
4bc74d1cc5 Backed out changeset 4e11ff3ee0e7 (bug 1575493) for build bustage on build/src/netwerk/test/fuzz/TestHttpFuzzing.cpp. CLOSED TREE 2019-08-21 14:39:19 +03:00
Christian Holler
284b791163 Bug 1575493 - Create a RequestContext in the HTTP fuzzing target. r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D42815

--HG--
extra : moz-landing-system : lando
2019-08-21 11:12:39 +00:00
Barret Rennie
3f90c2f83f Bug 1564221 - Make nsITransportSecurityInfo builtinclass r=keeler
There are no longer any consumers of the JS-implemented
`FakeTransportSecurityInfo` class, so it can be removed. That removes the last
JS-implemented `nsITransportSecurityInfo` instance and it therefore can be
marked `builtinclass`.

Differential Revision: https://phabricator.services.mozilla.com/D40355

--HG--
extra : moz-landing-system : lando
2019-08-20 21:38:24 +00:00
Liang-Heng Chen
8b0df5b122 Bug 1560574 - use FormatPRExplodedTime to display GMT; r=kershaw
Differential Revision: https://phabricator.services.mozilla.com/D36502

--HG--
extra : moz-landing-system : lando
2019-08-20 14:00:31 +00:00
Ehsan Akhgari
c771ae8334 Bug 1572240 - Part 6: Remove nsIPermissionManager.testPermissionOriginNoSuffix; r=baku
This is now dead code which will be kept alive by the vtable,
and introduces needless overhead inside the permission manager.

Differential Revision: https://phabricator.services.mozilla.com/D42207

--HG--
extra : moz-landing-system : lando
2019-08-19 14:38:47 +00:00
Ehsan Akhgari
05feeeb79b Bug 1572240 - Part 5: Use the principal-based version of the permission manager APIs in Gecko when checking the content blocking allow list; r=baku
Differential Revision: https://phabricator.services.mozilla.com/D42206

--HG--
extra : moz-landing-system : lando
2019-08-19 14:38:45 +00:00
Ehsan Akhgari
575c480fc5 Bug 1572240 - Part 3: Introduce nsIHttpChannelInternal.contentBlockingAllowListPrincipal; r=michal
Differential Revision: https://phabricator.services.mozilla.com/D42204

--HG--
extra : moz-landing-system : lando
2019-08-19 19:38:50 +00:00
Cosmin Sabou
2e5b997146 Backed out 9 changesets (bug 1564221) for devtools failures on browser_net_security-redirect.js.
Backed out changeset bcae1e55fc27 (bug 1564221)
Backed out changeset 0efeb9b1f5fa (bug 1564221)
Backed out changeset aaa8ffb687f2 (bug 1564221)
Backed out changeset a1947eef7d86 (bug 1564221)
Backed out changeset 6cd17e69d1c7 (bug 1564221)
Backed out changeset ede7219b9a9e (bug 1564221)
Backed out changeset 63d578684d29 (bug 1564221)
Backed out changeset e804c46a9541 (bug 1564221)
Backed out changeset 4cd81a6d3b25 (bug 1564221)

--HG--
extra : histedit_source : 3b34632390a828e53929751dd79fe800b08a0ecb
2019-08-19 23:59:28 +03:00
Barret Rennie
244c61a02f Bug 1564221 - Make nsITransportSecurityInfo builtinclass r=keeler
There are no longer any consumers of the JS-implemented
`FakeTransportSecurityInfo` class, so it can be removed. That removes the last
JS-implemented `nsITransportSecurityInfo` instance and it therefore can be
marked `builtinclass`.

Differential Revision: https://phabricator.services.mozilla.com/D40355

--HG--
extra : moz-landing-system : lando
2019-08-06 17:55:53 +00:00
Christian Holler
601bb91a9b Bug 1566342 - Implement changes for HTTP2 fuzzing in Necko. r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D38182

--HG--
extra : moz-landing-system : lando
2019-08-19 13:46:18 +00:00
Ciure Andrei
9a123fb597 Backed out changeset 81156ff3f4fa (bug 1571656) for causing browser_PageActions.js and test_insertTree_fixupOrSkipInvalidEntries.js to perma fail CLOSED TREE 2019-08-19 13:00:44 +03:00
Moritz Birghan
240771fa29 Bug 1571656 - Use Assert.jsm numeric comparison functions in tests r=mixedpuppy,MattN
Differential Revision: https://phabricator.services.mozilla.com/D40614

--HG--
extra : moz-landing-system : lando
2019-08-19 07:17:12 +00:00
Simon Sapin
c65755ac41 Bug 1568540 - Update the url crate to 2.0 r=emilio
Differential Revision: https://phabricator.services.mozilla.com/D42364

--HG--
extra : moz-landing-system : lando
2019-08-17 16:26:27 +00:00
Michal Novotny
2624e66847 Bug 1544757 - Failed assertion MOZ_ASSERT(mRaceCacheWithNetwork || !(mTransactionPump && mCachePump) || mCachedContentIsPartial), r=mayhemer
When revalidated cache entry is used, normally the sequence is:
 OnStartRequest(mTransactionPump)
 OnStopRequest(mTransactionPump)
 OnStartRequest(mCachePump)
 OnStopRequest(mCachePump)

When doing cross process redirect, the call to OnStopRequest(mTransactionPump) might get delayed, so we can still have mTransactionPump in OnStartRequest(mCachePump).

Differential Revision: https://phabricator.services.mozilla.com/D41484

--HG--
extra : rebase_source : c4887343fa6ac95695df3b456f761c4ad3217511
extra : source : 3feee5147ab0c9a7647f920bb0dde9950c836bed
2019-08-16 10:40:41 +00:00
Razvan Maries
308996b4e3 Backed out changeset 3feee5147ab0 (bug 1544757) for perma dt failures on browser_parsable_css.js. CLOSED TREE 2019-08-17 03:18:36 +03:00
Michal Novotny
e2a1205f6d Bug 1544757 - Failed assertion MOZ_ASSERT(mRaceCacheWithNetwork || !(mTransactionPump && mCachePump) || mCachedContentIsPartial), r=mayhemer
When revalidated cache entry is used, normally the sequence is:
 OnStartRequest(mTransactionPump)
 OnStopRequest(mTransactionPump)
 OnStartRequest(mCachePump)
 OnStopRequest(mCachePump)

When doing cross process redirect, the call to OnStopRequest(mTransactionPump) might get delayed, so we can still have mTransactionPump in OnStartRequest(mCachePump).

Differential Revision: https://phabricator.services.mozilla.com/D41484

--HG--
extra : moz-landing-system : lando
2019-08-16 10:40:41 +00:00
Kershaw Chang
fb1430c0de Bug 1553267 - Cancel the redirect load if docshell is being destroyed r=mayhemer
When the docshell is being destroyed, HttpChannelChild::CompleteRedirectSetup is not called and HttpChannelChild::mListener is not also assigned. In this case, I think we should cancel the channel and propagate the error to the http channel parent.

Differential Revision: https://phabricator.services.mozilla.com/D41515

--HG--
extra : moz-landing-system : lando
2019-08-16 11:41:04 +00:00