Commit Graph

17188 Commits

Author SHA1 Message Date
Andrea Marchesini
94c935a73f Bug 1524262 - URL-Classifier should not check all the blacklist tables always, r=dimi
Differential Revision: https://phabricator.services.mozilla.com/D18218

--HG--
extra : moz-landing-system : lando
2019-01-31 15:15:03 +00:00
Dragana Damjanovic
4aa2cbebc3 Bug 1523427 - Check whether we really have a response for a upgrade request before making a connection DontReuse. r=michal
Differential Revision: https://phabricator.services.mozilla.com/D18202

--HG--
extra : moz-landing-system : lando
2019-01-31 15:09:01 +00:00
ffxbld
b0ca3a2b01 No Bug, mozilla-central repo-update HSTS HPKP blocklist remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D18207

--HG--
extra : moz-landing-system : lando
2019-01-31 13:34:21 +00:00
Tom Schuster
93f896affe Bug 1514680 - Strictly enforce the MIME type of scripts loaded by importScripts(). r=dveditz
Differential Revision: https://phabricator.services.mozilla.com/D16730

--HG--
extra : moz-landing-system : lando
2019-01-30 22:21:26 +00:00
Andrea Marchesini
506304e224 Bug 1522210 - Fingerprinting and cryptomining classifiers must have separate nsIWebProgressListener blocking state codes - part 7 - cryptomining, r=ehsan,johannh
Differential Revision: https://phabricator.services.mozilla.com/D17641
2019-01-30 14:01:51 +01:00
Andrea Marchesini
5a909353eb Bug 1522210 - Fingerprinting and cryptomining classifiers must have separate nsIWebProgressListener blocking state codes - part 6 - fingerprinting, r=ehsan,johannh
Differential Revision: https://phabricator.services.mozilla.com/D17640
2019-01-30 14:01:05 +01:00
Andrea Marchesini
e9ac7d9ef2 Bug 1522210 - Fingerprinting and cryptomining classifiers must have separate nsIWebProgressListener blocking state codes - part 5 - generalize content blocking notification, r=ehsan
Differential Revision: https://phabricator.services.mozilla.com/D17838
2019-01-28 16:44:38 +01:00
Andrea Marchesini
bf8c0e40e2 Bug 1522210 - Fingerprinting and cryptomining classifiers must have separate nsIWebProgressListener blocking state codes - part 4 - abstract blocking state codes, r=ehsan
Differential Revision: https://phabricator.services.mozilla.com/D17639
2019-01-28 16:43:15 +01:00
Andrea Marchesini
ef89767387 Bug 1522210 - Fingerprinting and cryptomining classifiers must have separate nsIWebProgressListener blocking state codes - part 3 - Canceling nsIChannel with error code, r=ehsan
Differential Revision: https://phabricator.services.mozilla.com/D17638
2019-01-25 14:50:26 +01:00
Andrea Marchesini
3386d20a2c Bug 1522210 - Fingerprinting and cryptomining classifiers must have separate nsIWebProgressListener blocking state codes - part 2 - rename variables in nsHttpChannel, r=ehsan
Differential Revision: https://phabricator.services.mozilla.com/D17664
2019-01-30 13:50:04 +01:00
Andrea Marchesini
43a5f36077 Bug 1522210 - Fingerprinting and cryptomining classifiers must have separate nsIWebProgressListener blocking state codes - part 1 - UrlClassifierFeatureFactory::IsClassifierBlockingErrorCode, r=ehsan
Differential Revision: https://phabricator.services.mozilla.com/D17637
2019-01-30 13:43:34 +01:00
Myk Melez
25349d2601 Bug 1518283 - prohibit blank lines at the beginning and end of blocks (eslint padded-blocks) r=mossop,Standard8
Differential Revision: https://phabricator.services.mozilla.com/D17526

--HG--
extra : moz-landing-system : lando
2019-01-30 17:26:25 +00:00
Gijs Kruitbosch
ace4e930e1 Bug 1523249, r=valentin
Differential Revision: https://phabricator.services.mozilla.com/D17965

--HG--
extra : moz-landing-system : lando
2019-01-30 11:39:42 +00:00
shindli
011ea038cb Merge mozilla-central to inbound. a=merge CLOSED TREE 2019-01-29 23:54:31 +02:00
shindli
d5c5369355 Merge inbound to mozilla-central. a=merge 2019-01-29 23:37:33 +02:00
Andrea Marchesini
79ddbe6541 Bug 1522265 - Moving malware, phishing and blocked URIs to features - part 4 - Phishing Protection, r=dimi
--HG--
rename : netwerk/url-classifier/UrlClassifierFeatureNoChannel.cpp => netwerk/url-classifier/UrlClassifierFeaturePhishingProtection.cpp
rename : netwerk/url-classifier/UrlClassifierFeatureNoChannel.h => netwerk/url-classifier/UrlClassifierFeaturePhishingProtection.h
2019-01-29 10:11:34 +01:00
Andrea Marchesini
c48bfd063c Bug 1522265 - Moving malware, phishing and blocked URIs to features - part 2 - factory updated, r=dimi 2019-01-29 10:11:33 +01:00
Andrea Marchesini
2e4e28b9e5 Bug 1522265 - Moving malware, phishing and blocked URIs to features - part 1 - feature no channel, r=dimi 2019-01-29 10:11:33 +01:00
arthur.iakab
652cde9859 Backed out 4 changesets (bug 1522265) for mochitest assertion failures on extensions/cookie/nsPermissionManager.cpp CLOSED TREE
Backed out changeset 38b4179568c7 (bug 1522265)
Backed out changeset 38b824df9d02 (bug 1522265)
Backed out changeset 6085d51681f8 (bug 1522265)
Backed out changeset e6a0832f3b11 (bug 1522265)
2019-01-29 14:25:00 +02:00
Andrea Marchesini
901d0ea1b6 Bug 1522265 - Moving malware, phishing and blocked URIs to features - part 4 - Phishing Protection, r=dimi
--HG--
rename : netwerk/url-classifier/UrlClassifierFeatureNoChannel.cpp => netwerk/url-classifier/UrlClassifierFeaturePhishingProtection.cpp
rename : netwerk/url-classifier/UrlClassifierFeatureNoChannel.h => netwerk/url-classifier/UrlClassifierFeaturePhishingProtection.h
2019-01-29 10:11:34 +01:00
Andrea Marchesini
19c65633d3 Bug 1522265 - Moving malware, phishing and blocked URIs to features - part 2 - factory updated, r=dimi 2019-01-29 10:11:33 +01:00
Andrea Marchesini
f43141ec0a Bug 1522265 - Moving malware, phishing and blocked URIs to features - part 1 - feature no channel, r=dimi 2019-01-29 10:11:33 +01:00
arthur.iakab
c1fae83952 Backed out 16 changesets (bug 1478124) for failing android geckoview-junit CLOSED TREE
Backed out changeset fce62c77a56b (bug 1478124)
Backed out changeset eb2fa3b5edf7 (bug 1478124)
Backed out changeset 8dacce59fcc0 (bug 1478124)
Backed out changeset 012fd0107204 (bug 1478124)
Backed out changeset 496aaf774697 (bug 1478124)
Backed out changeset 21f4fda03159 (bug 1478124)
Backed out changeset b0444e0bc801 (bug 1478124)
Backed out changeset d94039b19943 (bug 1478124)
Backed out changeset 5d85deac61c2 (bug 1478124)
Backed out changeset 929fd654c9df (bug 1478124)
Backed out changeset 1ddd80d9e91a (bug 1478124)
Backed out changeset b8d2dfdfc324 (bug 1478124)
Backed out changeset f500020a273a (bug 1478124)
Backed out changeset dd00365ebb55 (bug 1478124)
Backed out changeset 538e40c5ee13 (bug 1478124)
Backed out changeset bedaa9c437ad (bug 1478124)
2019-01-29 10:03:06 +02:00
Shane Caraveo
3e429f056f Bug 1521573 web_accessible incognito support, r=kmag,smaug
Prevent web_accessible_resources resources loading in private contexts when extension does not have permission.

Differential Revision: https://phabricator.services.mozilla.com/D17138

--HG--
extra : moz-landing-system : lando
2019-01-29 15:40:09 +00:00
Byron Campen [:bwc]
68bc15c3ce Bug 1494311: Making the mtransport API a little more IPC friendly, and establishing a proper base-class. r=mt,mjf
Differential Revision: https://phabricator.services.mozilla.com/D17272

--HG--
extra : moz-landing-system : lando
2019-01-29 14:56:19 +00:00
Sebastian Hengst
9ece29fd9b Merge mozilla-central to autoland. CLOSED TREE 2019-01-29 12:59:48 +02:00
Sebastian Hengst
b78e4e8667 Merge mozilla-central to mozilla-inbound
--HG--
rename : browser/components/urlbar/tests/legacy/browser_urlbar_search_no_speculative_connect_with_client_cert.js => browser/components/urlbar/tests/browser/browser_urlbar_speculative_connect_not_with_client_cert.js
2019-01-29 02:55:55 +02:00
Sebastian Hengst
90f4b6640c Merge mozilla-inbound to mozilla-central. a=merge 2019-01-29 01:33:28 +02:00
Razvan Maries
c88bd55f59 Merge mozilla-inbound to mozilla-central a=merge 2019-01-28 23:46:39 +02:00
Andrea Marchesini
3ac22c62d4 Bug 1523274 - Flash URL-Classifier feature optimization, r=dimi 2019-01-28 21:48:09 +01:00
Nazım Can Altınova
236c0f6cdc Bug 1522277 - Add more NETWORK category labels r=mstange
Differential Revision: https://phabricator.services.mozilla.com/D17832

--HG--
extra : moz-landing-system : lando
2019-01-28 18:09:43 +00:00
Boris Zbarsky
5214e58438 Bug 1522940. Bail out of redirect processing immediately if our loadinfo says to not follow redirects. r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D17674

--HG--
extra : moz-landing-system : lando
2019-01-28 14:32:43 +00:00
Andrea Marchesini
0499bad916 Bug 1520150 - Single InputStreams can serialize themselves as IPCRemoteStreams (pipe) - part 1 - Passing IPC managers around, r=smaug
Before this set of patches, the decision of exposing the stream as a pipe was
centralized in IPCStreamUtils, based on the total expectation size of the IPC
message. This triggers issues when multiplex inputStreams contain something
that cannot be sent as a pipe (IPCBlobInputStream, for instance), or something
that it's better to do not set as a pipe (nsFileInputStream), together with
memory streams (nsStringInputStream), which could make the IPC message greater
then what accepted (1mb).

These patches move the "pipe vs non-pipe" choice into the single inputStream
implementation.
2019-01-28 10:48:35 +01:00
Coroiu Cristina
1ec6503fd8 Merge mozilla-central to inbound a=merge on a CLOSED TREE 2019-01-25 23:55:33 +02:00
Ehsan Akhgari
7426dccfc0 Bug 1522596 - Remove nsIIPCSerializableURI and move its only member to nsIURI; r=valentin
Differential Revision: https://phabricator.services.mozilla.com/D17531

--HG--
extra : moz-landing-system : lando
2019-01-25 13:32:36 +00:00
Andreea Pavel
b839d65d3c Backed out changeset 546ee20723b6 (bug 1521573) for failing test_ext_web_accessible_incognito.html 2019-01-29 06:07:40 +02:00
Oana Pop Rus
028136ace2 Merge inbound to mozilla-central. a=merge 2019-01-24 18:50:45 +02:00
vinoth
cc6d429241 Bug 1512949 - Remove eval from tests and flip assertion flag r=ckerschb
Differential Revision: https://phabricator.services.mozilla.com/D14054

--HG--
extra : moz-landing-system : lando
2019-01-24 09:06:07 +00:00
Ciure Andrei
c035ee7d3a Merge inbound to mozilla-central. a=merge 2019-01-24 05:44:33 +02:00
Nika Layzell
25503346ef Bug 1467223 - Part 7: Renumber Continue* methods on nsHttpChannel, r=valentin,mayhemer
Depends on D15613

Differential Revision: https://phabricator.services.mozilla.com/D16714

--HG--
extra : moz-landing-system : lando
2019-01-23 21:17:33 +00:00
Nika Layzell
53c6040388 Bug 1467223 - Part 3: Support uncached resources by using a redirectTo-like API for process swaps in necko, r=valentin,mayhemer
With the old process selector service implementation, non-cached loads
would skip the call into the process selector.

This implementation piggybacks atop the existing 'redirectTo' mechanism.
This is unfortunately not the perfect system for catching these loads,
as it doesn't provide an opportunity for performing a final process
switch before redirecting to a non-http channel. In addition, it doesn't
provide indication that a redirect is going to happen, causing
potentially unnecessary process switches.

Not all places where 'redirectTo' is supported use this mechanism. This
process switching mechanism is only checked in situations after
http-on-examine-response.

Potential future changes include:

 1. Moving these checks closer to the real 'OnStartRequest' call (e.g.
    in ContinueProcessNormal + ContinueOnStartRequest3). This would mean
    that loads other than the final load will not cause process swaps.

 2. Adding a callback before a redirect is performed, passing in the new
    channel, and allowing modifications to be made. This would allow
    performing a process swap before redirecting to a non-http(s)
    channel.

Depends on D15609

Differential Revision: https://phabricator.services.mozilla.com/D15610

--HG--
extra : moz-landing-system : lando
2019-01-23 21:19:39 +00:00
Nika Layzell
9b4bbc17fd Bug 1467223 - Part 2: Add BrowsingContextID to LoadInfo, r=valentin
This is handy when performing process swaps, as it provides useful & important
information to parent-process callers.

Depends on D15608

Differential Revision: https://phabricator.services.mozilla.com/D15609

--HG--
extra : moz-landing-system : lando
2019-01-23 21:06:59 +00:00
Nika Layzell
be5f88174d Bug 1467223 - Part 1: Move CrossProcessRedirect Message to PContent, r=valentin
This is needed because early in a content process's lifecycle, NeckoParent may
not have been created yet. This leads to issues when trying to redirect into a
fresh process which hasn't performed network loads yet. By sending the message
over PContent, we can be sure the APIs are available.

Differential Revision: https://phabricator.services.mozilla.com/D15608

--HG--
extra : moz-landing-system : lando
2019-01-23 21:27:44 +00:00
Valentin Gosu
23c68c90c6 Bug 1522076 - Backed out changeset f10300d5ef4e a=backout
--HG--
extra : rebase_source : 84e3f5e7673de141f49815bd8b93cf40cf230d56
2019-01-24 11:37:12 +02:00
Valentin Gosu
5ccd13de0d Bug 1522076 - Backed out changeset 1b6a90a3d820 a=backout
--HG--
extra : rebase_source : 6909b5d123bb23ca54d39f81e84f7fc65f02252c
2019-01-24 11:34:17 +02:00
Shane Caraveo
6004d08141 Bug 1521573 web_accessible incognito support, r=kmag,smaug
Prevent web_accessible_resources resources loading in private contexts when extension does not have permission.

Differential Revision: https://phabricator.services.mozilla.com/D17138

--HG--
extra : moz-landing-system : lando
2019-01-29 01:42:34 +00:00
Andrea Marchesini
ae7e7d4c3a Bug 1521051 - Get rid of nsICookiePermission.ACCESS_ALLOW_FIRST_PARTY_ONLY, r=johannh, r=flod 2019-01-23 19:19:19 +01:00
Andrea Marchesini
dc777dc7a6 Bug 1521051 - nsICookiePermission.ACCESS_LIMIT_THIRD_PARTY, r=valentin, r=johannh 2019-01-23 19:19:18 +01:00
Razvan Maries
7ccb4bf803 Backed out 2 changesets (bug 1521051) for xpcshell fails on extensions/cookie/test/unit/test_cookies_thirdparty.js. CLOSED TREE
Backed out changeset 90bb620dd870 (bug 1521051)
Backed out changeset 483fa314e45e (bug 1521051)
2019-01-23 22:09:32 +02:00
Ciure Andrei
a4eeeccf1d Merge mozilla-central to mozilla-inbound. a=merge CLOSED TREE 2019-01-23 20:55:29 +02:00