Commit Graph

6226 Commits

Author SHA1 Message Date
Honza Bambas
13a16f0e2d Bug 1596799 - Have a preference to force remote TCP/UDP port remapping for easier local network testing, r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D59917

--HG--
extra : moz-landing-system : lando
2020-01-16 17:22:36 +00:00
Dorel Luca
d29d22d6dc Backed out changeset 84f69fc66690 (bug 1596799) for Browser-chrome failures in /builds/worker/workspace/build/src/netwerk/base/nsSocketTransportService2.cpp. CLOSED TREE 2020-01-15 21:31:46 +02:00
Honza Bambas
0e35da72e0 Bug 1596799 - Have a preference to force remote TCP/UDP port remapping for easier local network testing, r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D59917

--HG--
extra : moz-landing-system : lando
2020-01-15 18:30:42 +00:00
Matt Woodrow
dc86748b77 Bug 1599438 - Store sandbox flags on the LoadInfo when creating a channel for a docshell, so that we don't read a stale value from the BrowsingContext later. r=bzbarsky
Differential Revision: https://phabricator.services.mozilla.com/D59263

--HG--
extra : moz-landing-system : lando
2020-01-15 08:02:57 +00:00
Narcis Beleuzu
c59ca04e7b Backed out changeset b3538b7016aa (bug 1599438) for bustages on TestHttpFuzzing.cpp . CLOSED TREE 2020-01-15 06:03:55 +02:00
Matt Woodrow
dd0d183cb4 Bug 1599438 - Store sandbox flags on the LoadInfo when creating a channel for a docshell, so that we don't read a stale value from the BrowsingContext later. r=bzbarsky
Differential Revision: https://phabricator.services.mozilla.com/D59263

--HG--
extra : moz-landing-system : lando
2020-01-15 02:05:57 +00:00
Ehsan Akhgari
ae823cb5a3 Bug 1484315 - Refactor the third-party checks used in the cookie backend; r=baku
Differential Revision: https://phabricator.services.mozilla.com/D58998

--HG--
extra : moz-landing-system : lando
2020-01-08 10:25:44 +00:00
Shane Caraveo
4d3b7a6d20 Bug 1604618 support request cancel reason in webrequest r=rpl,Honza
Support cancel reason so devtools, download panel, etc. can understand that an extension cancelled a request.

Differential Revision: https://phabricator.services.mozilla.com/D57537

--HG--
extra : moz-landing-system : lando
2020-01-13 20:30:26 +00:00
Eric Rahm
78ee6675cf Bug 1606187 - Part 2b: Update users of nsClassHashtable to handle UniquePtr differences r=KrisWright,froydnj
Differential Revision: https://phabricator.services.mozilla.com/D59042

--HG--
extra : moz-landing-system : lando
2020-01-13 19:18:56 +00:00
Jan de Mooij
44ec4609e5 Bug 1607494 - Disable Ion for the PAC script thread. r=tcampbell
Differential Revision: https://phabricator.services.mozilla.com/D59467

--HG--
extra : moz-landing-system : lando
2020-01-10 18:54:42 +00:00
Valentin Gosu
90fff44905 Bug 1552176 - Pass TRRMode to nsDNSPrefetch r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D49158

--HG--
extra : moz-landing-system : lando
2020-01-07 19:33:10 +00:00
Valentin Gosu
c7d9b630cb Bug 1552176 - Add nsIRequest.set/getTRRMode r=dragana
* Makes it possible to selectively enable TRR for pbmode/container/window/etc

Differential Revision: https://phabricator.services.mozilla.com/D48363

--HG--
extra : moz-landing-system : lando
2020-01-07 20:20:38 +00:00
Matt Woodrow
5913bdc39b Bug 1598523 - Create nsIWrapperChannel so that we can find the inner channel within view-source. r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D57893

--HG--
extra : moz-landing-system : lando
2020-01-08 01:00:35 +00:00
Bogdan Tara
4e368405fa Backed out 6 changesets (bug 1598523) for geckoview failures complaining about NavigationDelegateTest.loadUnknownProtocol
Backed out changeset 2e7ea1ae7fa2 (bug 1598523)
Backed out changeset 6adc1062662b (bug 1598523)
Backed out changeset 141372c43f02 (bug 1598523)
Backed out changeset c5abcaabaf2d (bug 1598523)
Backed out changeset 5a22a20dd993 (bug 1598523)
Backed out changeset e0df103c9cf3 (bug 1598523)
2020-01-08 02:56:18 +02:00
Matt Woodrow
27d2b8a269 Bug 1598523 - Create nsIWrapperChannel so that we can find the inner channel within view-source. r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D57893

--HG--
extra : moz-landing-system : lando
2020-01-07 20:57:52 +00:00
Junior Hsu
2f1ac171e7 Bug 1527242 - Guarantee onHandshakeDone is called even it's set after handshake, r=michal
We set a `securityObserver` in `onSocketAccepted` on the main thread to observe `onHandshakeDone`, which might be too late since handshake could complete off main thread. Therefore, when we set `securityObserver` after handshake is completed, call `onHandshakeDone`.

Differential Revision: https://phabricator.services.mozilla.com/D56483

--HG--
extra : moz-landing-system : lando
2019-12-24 20:16:34 +00:00
Junior Hsu
bc6a80e794 Bug 1601671 - make websocket support proxying on SOCKS/HTTPS, r=michal
This is something less hacky to the best of my knowledge. Both passing preferable proxy table and letting system setting handle `ws`/`wss` touch the code of all platforms, which is more fragile.

Differential Revision: https://phabricator.services.mozilla.com/D57176

--HG--
extra : moz-landing-system : lando
2019-12-24 19:51:09 +00:00
Junior Hsu
1b32e82bc4 Bug 1531708 - avoid hiding error in nsSyncStreamListener r=michal
Differential Revision: https://phabricator.services.mozilla.com/D56812

--HG--
extra : moz-landing-system : lando
2019-12-20 18:22:40 +00:00
Chris Peterson
406763af7f Bug 1570499 - Part 1: Replace MOZ_FALLTHROUGH macro with C++17's [[fallthrough]] attribute. r=froydnj
This changeset is a simple find and replace of `MOZ_FALLTHROUGH` and `[[fallthrough]]`.

Unfortunately, the MOZ_FALLTHROUGH_ASSERT macro (to assert on case fallthrough in debug builds) is still necessary after switching from [[clang::fallthrough]] to [[fallthrough]] because:

* MOZ_ASSERT(false) followed by [[fallthrough]] triggers a -Wunreachable-code warning in DEBUG builds
* but MOZ_ASSERT(false) without [[fallthrough]] triggers a -Wimplicit-fallthrough warning in NDEBUG builds.

Differential Revision: https://phabricator.services.mozilla.com/D56440

--HG--
extra : moz-landing-system : lando
2019-12-20 07:16:43 +00:00
Jean-Yves Avenard
dd4db4a4b5 Bug 1598497 - P2. Have the canceled attribute only if explicitly canceled. r=mayhemer.
Previously, GetCancelled() would have return true should the channel's status was an error.
Doing Cancel(NS_OK) for example, would have made a follow-up call to GetCancelled() return false. However, we can assert that such a call would have been a bug.

Following this change GetCancelled() will only return true if Cancel() was explicitly called.

Differential Revision: https://phabricator.services.mozilla.com/D55401

--HG--
extra : moz-landing-system : lando
2019-12-19 05:20:07 +00:00
Jean-Yves Avenard
b1be794e1b Bug 1598497 - P1. move canceled attribute to nsIChannel. r=mayhemer
There is no functional change with this commit. The default implementation for GetCanceled() is still to check if the status code is a failure.

However, it can be argued that as you had to call Cancel() on the nsIChannel, having to check the nsIHttpChannelInternal interface to determine if you had been canceled in the past was rather a non obvious path.

It makes more sense to check the nsIChannel interface to determine if it's been canceled already and this allows for finer granularity if needed in the future.

Differential Revision: https://phabricator.services.mozilla.com/D55268

--HG--
extra : moz-landing-system : lando
2019-12-18 21:13:26 +00:00
Noemi Erli
58bf47752e Backed out 2 changesets (bug 1598497) for causing OSX build bustages CLOSED TREE
Backed out changeset 3b31bbf74a5f (bug 1598497)
Backed out changeset 81beebdc2202 (bug 1598497)
2019-12-18 01:54:56 +02:00
Jean-Yves Avenard
653fbeaf3a Bug 1598497 - P2. Have the canceled attribute only if explicitly canceled. r=mayhemer.
Previously, GetCancelled() would have return true should the channel's status was an error.
Doing Cancel(NS_OK) for example, would have made a follow-up call to GetCancelled() return false. However, we can assert that such a call would have been a bug.

Following this change GetCancelled() will only return true if Cancel() was explicitly called.

Differential Revision: https://phabricator.services.mozilla.com/D55401

--HG--
extra : moz-landing-system : lando
2019-12-17 23:21:55 +00:00
Jean-Yves Avenard
c63570cb58 Bug 1598497 - P1. move canceled attribute to nsIChannel. r=mayhemer
There is no functional change with this commit. The default implementation for GetCanceled() is still to check if the status code is a failure.

However, it can be argued that as you had to call Cancel() on the nsIChannel, having to check the nsIHttpChannelInternal interface to determine if you had been canceled in the past was rather a non obvious path.

It makes more sense to check the nsIChannel interface to determine if it's been canceled already and this allows for finer granularity if needed in the future.

Differential Revision: https://phabricator.services.mozilla.com/D55268

--HG--
extra : moz-landing-system : lando
2019-12-17 23:21:46 +00:00
Sebastian Hengst
664abec404 No bug - Fix typo to get build and test coverage after previous push lacked them due to infra issue (b 1604422). CLOSED TREE 2019-12-17 11:05:56 +01:00
Tom Schuster
da96fc6b8a Bug 1597494 - Remove nsIDocShellTreeItem from LoadInfo.cpp. r=smaug
Differential Revision: https://phabricator.services.mozilla.com/D57370

--HG--
extra : moz-landing-system : lando
2019-12-16 21:15:13 +00:00
Boris Zbarsky
6639140a09 Bug 1603806. Add a blocking reason when loads with the SEC_REQUIRE_SAME_ORIGIN_* security flags are blocked due to not being same-origin. r=ckerschb,ochameau
Differential Revision: https://phabricator.services.mozilla.com/D57147

--HG--
extra : moz-landing-system : lando
2019-12-16 09:36:45 +00:00
Tom Schuster
eaf1513b61 Bug 1597493 - Remove nsIDocShellTreeItem from GetLoadContextInfo. r=smaug
It is not quite clear to me if GetBrowsingContext can ever be null that is why I opened Bug 1604040.

Differential Revision: https://phabricator.services.mozilla.com/D57247

--HG--
extra : moz-landing-system : lando
2019-12-16 11:27:23 +00:00
Boris Zbarsky
cbc90e1aca Bug 1602090 part 2. Create separate CheckMayLoad and CheckMayLoadWithReporting APIs. r=ckerschb
CheckMayLoadAndReport takes a window ID.  This allows us to report
errors from it to the web console as needed.  Most consumers know statically
whether they want reporting or not, so there's no reason to force the ones that
don't to provide window ids.

Differential Revision: https://phabricator.services.mozilla.com/D56388

--HG--
extra : moz-landing-system : lando
2019-12-13 06:24:12 +00:00
Ciure Andrei
6c95adafed Backed out 4 changesets (bug 1602483, bug 1602090) for causing perma leackchecks CLOSED TREE
Backed out changeset 6b057ba06b4a (bug 1602483)
Backed out changeset 9be3269d781d (bug 1602483)
Backed out changeset e3e2c1d7478e (bug 1602090)
Backed out changeset fdc4a588912e (bug 1602090)
2019-12-12 18:37:01 +02:00
Boris Zbarsky
e0acf6e9fc Bug 1602090 part 2. Create separate CheckMayLoad and CheckMayLoadWithReporting APIs. r=ckerschb
CheckMayLoadAndReport takes a window ID.  This allows us to report
errors from it to the web console as needed.  Most consumers know statically
whether they want reporting or not, so there's no reason to force the ones that
don't to provide window ids.

Differential Revision: https://phabricator.services.mozilla.com/D56388

--HG--
extra : moz-landing-system : lando
2019-12-12 13:03:42 +00:00
Kershaw Chang
601d5de82a Bug 1602009 - Make sure mSecurityObserver can be only accessed within a lock r=valentin
Differential Revision: https://phabricator.services.mozilla.com/D56904

--HG--
extra : moz-landing-system : lando
2019-12-12 13:42:43 +00:00
Valentin Gosu
99cfec8178 Bug 1561860 - Add rust-url based nsIURI implementation r=JuniorHsu
This patch adds DefaultURI which wraps MozURL which in turn forwards calls
to rust-url.
For the moment the added network.url.useDefaultURI is set to false by default.
The plan is to make this the default implementation for unknown URI types.

Differential Revision: https://phabricator.services.mozilla.com/D54748

--HG--
extra : moz-landing-system : lando
2019-12-11 20:17:53 +00:00
Tom Tung
83eb41d14a Bug 1474608 - P1 - Clear origin attributes directly for deleteDataFromOriginAttributesPattern if it's possible; r=asuth,baku
The idea of this patch is to try to not use oberver mechanism as possible. To
achieve that, it introduces deleteByOriginAttributes() to cleaners. Different
from other methods, it would only be executed if it's implemented from a
cleaner.

It doesn't remove oberver mechanism entirely since some cleaners are still using
that for other deleteByXXX() functions. So, it only applies removing stuff to
PushService, QuotaManagerService, ServiceWorkerManager, nsPermissionManager,
nsApplicationCacheService, and nsCookieService.

Since the original issue is related to QuotaManagerService, it adds xpcshell
test under the dom/quota/test/unit/ to ensure the behavior won't be changed
accidentally in the future.

Differential Revision: https://phabricator.services.mozilla.com/D33758

--HG--
extra : moz-landing-system : lando
2019-12-02 19:47:13 +00:00
Jeff Walden
62a130ba0a Bug 1602882 - Move array operations to a new js/Array.h header. r=sfink,bzbarsky
Differential Revision: https://phabricator.services.mozilla.com/D56595

--HG--
extra : moz-landing-system : lando
2019-12-11 06:17:44 +00:00
Junior Hsu
743f50e6f0 Bug 1567462 - Resurrect telemetry for http redirects, r=valentin
Differential Revision: https://phabricator.services.mozilla.com/D53310

--HG--
extra : moz-landing-system : lando
2019-12-10 19:00:37 +00:00
Gabriele Svelto
5dc21d568c Bug 1600545 - Remove useless inclusions of header files generated from IDL files in modules/, netwerk/, parser/, security/, startupcache/, storage/, toolkit/, tools/, uriloader/, widget/, xpcom/ and xpfe/ r=Ehsan
The inclusions were removed with the following very crude script and the
resulting breakage was fixed up by hand. The manual fixups did either
revert the changes done by the script, replace a generic header with a more
specific one or replace a header with a forward declaration.

find . -name "*.idl" | grep -v web-platform | grep -v third_party | while read path; do
    interfaces=$(grep "^\(class\|interface\).*:.*" "$path" | cut -d' ' -f2)
    if [ -n "$interfaces" ]; then
        if [[ "$interfaces" == *$'\n'* ]]; then
          regexp="\("
          for i in $interfaces; do regexp="$regexp$i\|"; done
          regexp="${regexp%%\\\|}\)"
        else
          regexp="$interfaces"
        fi
        interface=$(basename "$path")
        rg -l "#include.*${interface%%.idl}.h" . | while read path2; do
            hits=$(grep -v "#include.*${interface%%.idl}.h" "$path2" | grep -c "$regexp" )
            if [ $hits -eq 0 ]; then
                echo "Removing ${interface} from ${path2}"
                grep -v "#include.*${interface%%.idl}.h" "$path2" > "$path2".tmp
                mv -f "$path2".tmp "$path2"
            fi
        done
    fi
done

Differential Revision: https://phabricator.services.mozilla.com/D55444

--HG--
extra : moz-landing-system : lando
2019-12-06 09:17:57 +00:00
Mike Hommey
6a1d6c2698 Bug 1587468 - Update uuid to 0.8.1. r=webdriver-reviewers,whimboo,emilio
This leaves one out-of-tree of uuid 0.7, handled by https://github.com/mozilla/rkv/pull/184
(but we have two copies of that, we'd need to have it landed on both
branches and pulled).

Differential Revision: https://phabricator.services.mozilla.com/D55912

--HG--
extra : moz-landing-system : lando
2019-12-06 00:47:50 +00:00
Boris Zbarsky
75124bdd98 Bug 1517588. Use nsIPrincipal::IsSystemPrincipal instead of nsContentUtils::IsSystemPrincipal r=bzbarsky
Differential Revision: https://phabricator.services.mozilla.com/D53067

--HG--
extra : moz-landing-system : lando
2019-12-05 04:44:32 +00:00
Matt Woodrow
fbc0783110 Bug 1600211 - Add nsIMultiPartChannelListener as a reliable way to detect when a multi-part channel is finished and we can break reference cycles. r=mayhemer
We can't always know when sending a part if it'll be the last one (either because the channel is later cancelled, or because the response just sends the end boundary without warning). This was initially reported in bug 339610.

Differential Revision: https://phabricator.services.mozilla.com/D55220

--HG--
extra : moz-landing-system : lando
2019-12-04 03:18:56 +00:00
Tom Ritter
4f9313ba4e Bug 1582512 - Register a ScriptValidationCallback to examine script loads in the parent process r=Gijs,ckerschb
Additionally, we disable validation on PAC scripts.

Differential Revision: https://phabricator.services.mozilla.com/D46500

--HG--
extra : moz-landing-system : lando
2019-12-02 17:27:09 +00:00
Kershaw Chang
9c48606bb3 Bug 1596409 - P6: Add a pref for using socket process for network r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D54174

--HG--
extra : moz-landing-system : lando
2019-12-03 13:46:04 +00:00
Kershaw Chang
e686a3ff31 Bug 1596409 - P5: Enable necessary XPCOM components for using nsHttpTransaction in socket process r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D54165

--HG--
extra : moz-landing-system : lando
2019-12-03 13:45:19 +00:00
Kershaw Chang
750f73dbb2 Bug 1596409 - P1.2: Create PHttpTransaction IPC protocol r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D54290

--HG--
extra : moz-landing-system : lando
2019-12-03 13:42:15 +00:00
Kershaw Chang
f3bddbd52b Bug 1596409 - P1.1: Make socket process support IPCStream r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D54289

--HG--
extra : moz-landing-system : lando
2019-12-03 13:41:58 +00:00
Valentin Gosu
2fc5985a45 Bug 1598430 - Make sure that we record the NETWORK_ID_ONLINE telemetry at the right time r=michal
We perform this check in the first OnDataAvailable, instead of doing it in
OnStopRequest in case a network down event occurs after the data has arrived
but before we fire OnStopRequest. That would cause us to report a missing
networkID, even though it was not empty while receiving data.

Differential Revision: https://phabricator.services.mozilla.com/D55574

--HG--
extra : moz-landing-system : lando
2019-12-03 07:35:11 +00:00
Ciure Andrei
e473bd5f57 Backed out 10 changesets (bug 1582512) for causing browser_preferences_usage.js to permafail CLOSED TREE
Backed out changeset a615a2c07523 (bug 1582512)
Backed out changeset 7dd0266da0a1 (bug 1582512)
Backed out changeset dfdefc6ede97 (bug 1582512)
Backed out changeset 59db30e1915f (bug 1582512)
Backed out changeset 1eb6f6b02149 (bug 1582512)
Backed out changeset 391ed11326fb (bug 1582512)
Backed out changeset 02865605c1c3 (bug 1582512)
Backed out changeset 017582048986 (bug 1582512)
Backed out changeset 1374c08302f9 (bug 1582512)
Backed out changeset 40dd63b6910a (bug 1582512)
2019-12-02 19:23:12 +02:00
Tom Ritter
40826aaf6c Bug 1582512 - Register a ScriptValidationCallback to examine script loads in the parent process r=Gijs,ckerschb
Additionally, we disable validation on PAC scripts.

Differential Revision: https://phabricator.services.mozilla.com/D46500

--HG--
extra : moz-landing-system : lando
2019-12-02 15:45:13 +00:00
Emilio Cobos Álvarez
74327c26b4 Bug 1599615 - Make some necko code less nsresult-happy. r=kershaw,valentin
Stuff that's infallible and not virtual has no reason to return an nsresult.

Differential Revision: https://phabricator.services.mozilla.com/D54831

--HG--
extra : moz-landing-system : lando
2019-12-02 13:21:06 +00:00
Emilio Cobos Álvarez
0c421267c6 Bug 1599843 - nsBaseChannel::Init does nothing. r=valentin
And is not virtual, so has no point in existing.

Differential Revision: https://phabricator.services.mozilla.com/D54983

--HG--
extra : moz-landing-system : lando
2019-11-27 20:06:41 +00:00