Граф коммитов

20607 Коммитов

Автор SHA1 Сообщение Дата
Matt Woodrow 17fbf88433 Bug 1649879 - Handle URIFixup that happens on a failed channel in DocumentLoadListener if available, rather than waiting for it to reach nsDocShell. r=kmag
Differential Revision: https://phabricator.services.mozilla.com/D81947
2020-07-08 23:38:22 +00:00
Nika Layzell 3f8ded27c9 Bug 1650163 - Part 2: Add a NOT_REMOTE_TYPE define to clarify calling code, r=farre
Differential Revision: https://phabricator.services.mozilla.com/D82106
2020-07-08 20:16:04 +00:00
Nika Layzell 22a65a237e Bug 1650163 - Part 1: Switch native remoteType values to nsCString, r=farre,geckoview-reviewers,agi
Differential Revision: https://phabricator.services.mozilla.com/D82104
2020-07-08 20:15:59 +00:00
Mihai Alexandru Michis 1ba2a3f6f6 Backed out 3 changesets (bug 1650163) for causing bustages in nsContentSecurityManager.cpp
CLOSED TREE

Backed out changeset 51d7c644a1e6 (bug 1650163)
Backed out changeset 3d2b6908447a (bug 1650163)
Backed out changeset 79141707d47b (bug 1650163)
2020-07-08 21:18:44 +03:00
Nika Layzell 64031d88e9 Bug 1650163 - Part 2: Add a NOT_REMOTE_TYPE define to clarify calling code, r=farre
Differential Revision: https://phabricator.services.mozilla.com/D82106
2020-07-08 01:13:45 +00:00
Nika Layzell c850a94434 Bug 1650163 - Part 1: Switch native remoteType values to nsCString, r=farre,geckoview-reviewers,agi
Differential Revision: https://phabricator.services.mozilla.com/D82104
2020-07-08 14:54:48 +00:00
Junior Hsu acc77fd89e Bug 1649965 - only waiting for main thread OnStartRequestSent for LOAD_DOCUMENT_NEEDS_COOKIE, r=mayhemer,necko-reviewers
Differential Revision: https://phabricator.services.mozilla.com/D80682
2020-07-08 15:47:36 +00:00
Kershaw Chang c87cb10f45 Bug 1527256 - P4: Enable about:networking tests r=dragana
Depends on D82320

Differential Revision: https://phabricator.services.mozilla.com/D82321
2020-07-08 10:28:53 +00:00
Kershaw Chang 39ecbeff00 Bug 1527256 - P3: Get HttpData from socket process r=dragana
Depends on D20355

Differential Revision: https://phabricator.services.mozilla.com/D82320
2020-07-08 10:29:01 +00:00
Kershaw Chang 3a97f39f6d Bug 1527256 - P2: Get DNSCacheEntries from socket process r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D20355
2020-07-08 10:29:03 +00:00
Kershaw Chang 907a9dedd4 Bug 1527256 - P1: Get SocketData from socket process r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D20354
2020-07-08 12:49:44 +00:00
Dimi Lee 0f6d4af47e Bug 1437626 - P5. Only call ShouldEnableClassifier for protection features. r=baku
ShouldEnableClassifier checks two things:
1. If AddOn can load the channel
2. If the classified channel is top-level.

For the first point, we added the check in Bug 1308640, and I think the
idea is only for tracking protection to not block channels when
extensions have permission on the channels' domain.
For annotation features, we should always annotate a channel regardless of whether
it is controlled by extensions (also for ETP).

And since we use first-party classification flag in channels, so we
should also annotate channel no matter it is top-level, first-party or
third-party.

So this patch removes calling ShouldEnableClassifier in annotation
features and also rename ShouldEnableClassifier to
ShouldEnableProtectionForChannel to make the idea more clear.

Differential Revision: https://phabricator.services.mozilla.com/D82504
2020-07-08 12:26:53 +00:00
Dimi Lee 34b12aaca6 Bug 1437626 - P3. Use global tracking Protection pref when a channel doesn't have a loadcontext r=baku
Channels loaded by service worker don't have loadcontext, so we don't
apply tracking protection on them.

Depends on D80183

Differential Revision: https://phabricator.services.mozilla.com/D80184
2020-07-08 12:12:09 +00:00
Dimi Lee b20ed5b08a Bug 1437626 - P2. Get top-level URI from ClientInfo when a channel is initiated by ShareWorker or ServiceWorker r=baku
When a channel is initiated from sharedworker or service worker, we use
worker's origin as the top-level uri.

Depends on D80182

Differential Revision: https://phabricator.services.mozilla.com/D80183
2020-07-08 12:12:07 +00:00
Dimi Lee 26ac53ba5e Bug 1437626 - P1. Use TYPE_DOCUMENT to determin whether a channel is a top-level load. r=baku
We use whether channel->GetTopWindowURI returns a failure to determin
if the channel is a top-level load. However, channels loaded by service
worker or appcache don't have top-level window.

This patch use TYPE_DOCUMENT to determin whether it is a top-level load.
This patch also adds UrlClassifierCommon::GetTopWindowURI to print debug message
because nsIChannel::GetTopWindowURI is not fission-compatible.

Differential Revision: https://phabricator.services.mozilla.com/D80182
2020-07-08 12:11:59 +00:00
julianwels c44ea283e8 Bug 1644456 - Manage HTTPS-Only Mode permission with SitePermissions interface. r=necko-reviewers,pbz,dragana
Differential Revision: https://phabricator.services.mozilla.com/D79427
2020-07-08 12:06:02 +00:00
Bogdan Tara cfe6f49083 Backed out 4 changesets (bug 1527256) for network related bustage CLOSED TREE
Backed out changeset 5f3e90d1112e (bug 1527256)
Backed out changeset 8172b4bbba7b (bug 1527256)
Backed out changeset c15bc3e821ea (bug 1527256)
Backed out changeset a37b0cdf3155 (bug 1527256)
2020-07-08 13:25:34 +03:00
Kershaw Chang b9dab9a111 Bug 1527256 - P4: Enable about:networking tests r=dragana
Depends on D82320

Differential Revision: https://phabricator.services.mozilla.com/D82321
2020-07-06 11:03:24 +00:00
Kershaw Chang aad41f988e Bug 1527256 - P3: Get HttpData from socket process r=dragana
Depends on D20355

Differential Revision: https://phabricator.services.mozilla.com/D82320
2020-07-06 11:01:51 +00:00
Kershaw Chang 0a2066141b Bug 1527256 - P2: Get DNSCacheEntries from socket process r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D20355
2020-07-06 11:01:03 +00:00
Kershaw Chang f7ab79b775 Bug 1527256 - P1: Get SocketData from socket process r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D20354
2020-07-06 10:59:29 +00:00
Junior Hsu da7ef4914b Bug 1645901 - handle cookie setting in child process for Set-Cookie response, r=baku,mayhemer,necko-reviewers
Differential Revision: https://phabricator.services.mozilla.com/D82130
2020-07-07 15:19:09 +00:00
Kris Maglione 5837ad4bdd Bug 1580764: Part 3 - Remove unused AncestorOuterWindowIDs from LoadInfo. r=nika
Differential Revision: https://phabricator.services.mozilla.com/D82465
2020-07-07 21:14:34 +00:00
Kris Maglione bd94db4e9a Bug 1580764: Part 2 - Use BrowsingContext IDs rather than window IDs to compute frame IDs. r=zombie
Differential Revision: https://phabricator.services.mozilla.com/D82464
2020-07-07 21:37:53 +00:00
Kris Maglione 01ca404c30 Bug 1580764: Part 1 - Add ancestor BrowsingContext IDs to LoadInfo. r=nika
Differential Revision: https://phabricator.services.mozilla.com/D82463
2020-07-07 21:14:42 +00:00
Narcis Beleuzu 8359f16846 Backed out 7 changesets (bug 1650163, bug 1649477) for bustages on JSActor.cpp . CLOSED TREE
Backed out changeset 4a21afb65254 (bug 1650163)
Backed out changeset c41753a56f5a (bug 1650163)
Backed out changeset 5fb444c35764 (bug 1650163)
Backed out changeset 830aa93d2b0c (bug 1649477)
Backed out changeset eca6e9dce450 (bug 1649477)
Backed out changeset 5b217aa88289 (bug 1649477)
Backed out changeset 8959d02b840f (bug 1649477)
2020-07-08 04:09:27 +03:00
Junior Hsu 9b0685fe4c Bug 1646592 - P4 Remove the depedency between OnStartRequestSent and AttachStreamFilter, r=mayhemer,necko-reviewers
We're shorter the name!

Depends on D81274

Differential Revision: https://phabricator.services.mozilla.com/D81275
2020-07-07 21:46:34 +00:00
Junior Hsu 069f0d6456 Bug 1646592 - P3 Sending endpoint of stream filter via PHttpBackgroundChannel, r=mayhemer,necko-reviewers
Endpoint would be passed by a series of std::move via
nsHttpChannel -> HttpChannelParent -> HttpBackgroundChannelParent ---> HttpBackgroundChannelChild -> HttpChannelChild
												|
												|
   Resolve promise after successfully send IPC<-/

Depends on D81273

Differential Revision: https://phabricator.services.mozilla.com/D81274
2020-07-07 21:46:01 +00:00
Junior Hsu cea21a8121 Bug 1646592 - P2 remove NeckoTargetChannelEvent which could not be specialized for HttpChannelChild, r=mayhemer,necko-reviewers
NeckoTargetChannelEvent uses a protected member function, which couldn't compile with instantiation of HttpChannelChild
https://searchfox.org/mozilla-central/rev/cfaa250d14e344834932de4c2eed0061701654da/netwerk/ipc/ChannelEventQueue.h#64

Depends on D81272

Differential Revision: https://phabricator.services.mozilla.com/D81273
2020-07-07 21:45:08 +00:00
Junior Hsu 257fe0c281 Bug 1646592 - P1 Use nsISerialEventTarget for HttpBackgroundChannelParent, r=valentin,necko-reviewers
Like bug 1647133, we need this to be nsISerialEventTarget for the InvokeAsync

Differential Revision: https://phabricator.services.mozilla.com/D81272
2020-07-07 21:44:50 +00:00
Nika Layzell a3b4b6cba4 Bug 1650163 - Part 2: Add a NOT_REMOTE_TYPE define to clarify calling code, r=farre
Differential Revision: https://phabricator.services.mozilla.com/D82106
2020-07-06 20:27:59 +00:00
Nika Layzell df351180c3 Bug 1650163 - Part 1: Switch native remoteType values to nsCString, r=farre
Differential Revision: https://phabricator.services.mozilla.com/D82104
2020-07-06 20:30:58 +00:00
Nika Layzell 41154a7fb8 Bug 1599579 - Part 3: Load toplevel extension frames into a per-extension BrowsingContextGroup, r=kmag
This is done by tracking a specific BrowsingContextGroup ID on the
WebExtensionPolicy in the parent process. Whenever a load is done with that
policy, the browsing context is replaced to ensure it is loaded in the correct
BrowsingContextGroup.

This patch also ensures that extension iframes are always loaded in the same
process as their embedder document, even if the frame was previously remote.

Differential Revision: https://phabricator.services.mozilla.com/D80256
2020-07-06 19:45:39 +00:00
Nika Layzell 1592543886 Bug 1599579 - Part 2: Reorganize RemoteType logic in MaybeTriggerProcessSwitch, r=mattwoodrow,necko-reviewers,valentin
The goal with this is to avoid having multiple booleans and other values
computed in arbitrary places and used around the method, and instead pre-compute
common shared information, and group each remoteType special-case together.

Hopefully, this should make it easier to extend the behaviour in
MaybeTriggerProcessSwitch in the future.

Differential Revision: https://phabricator.services.mozilla.com/D80255
2020-07-06 19:45:31 +00:00
Nika Layzell cafcceeb34 Bug 1599579 - Part 1: Add the ability to specify a specific BrowsingContextGroup during process switch, r=kmag
Differential Revision: https://phabricator.services.mozilla.com/D80254
2020-07-06 20:10:43 +00:00
Andrea Marchesini 07b75de903 Bug 1650950 - Rename blacklist, whitelist, and skiplist in the anti-tracking and url-classifier code, r=dimi
Differential Revision: https://phabricator.services.mozilla.com/D82497
2020-07-07 16:17:11 +00:00
Honza Bambas 275edede6b Bug 1605895, r=kershaw,necko-reviewers
Differential Revision: https://phabricator.services.mozilla.com/D82037
2020-07-03 12:37:38 +00:00
Valentin Gosu 6dd9cb9291 Bug 1649127 - Only trigger confirmation in TRR-first and TRR-only modes r=dragana,necko-reviewers
Due to a change in timing in this patch, when we reset the confirmation pref
at the end of the test, a TRR request would happen after we changed the prefs
leading to accessing a non-local IP in testing and causing a crash.
This should be gated on being in the correct mode anyway

Depends on D81517

Differential Revision: https://phabricator.services.mozilla.com/D82222
2020-07-04 15:39:45 +00:00
Valentin Gosu 9b25e934ea Bug 1649127 - Make sure we only set AddrHostRecord::mTRRUsed = true when TRRServiceChannel::AsyncOpen succeeds r=dragana,necko-reviewers
mTRRUsed is a variable that we check to gate several telemetry probes, and to
decide if TRR really failed and we should add a domain to the TRR blocklist.
The problem with setting this too early is that when this is true but we
don't actually send the TRR request, then we will report that we fell back
to Do53 and potentially skip next TRR requests in the future.

The solution here is to only set mTRRUsed if TRRServiceChannel::AsyncOpen
succeeds.

Differential Revision: https://phabricator.services.mozilla.com/D81517
2020-07-07 10:08:28 +00:00
Csoregi Natalia fe1354b164 Backed out changeset 4ed5a0e27c05 (bug 1647732) for font related wpt failures. CLOSED TREE 2020-07-07 12:31:27 +03:00
Liang-Heng Chen e69b3bc58b Bug 1647732 - isolate font cache; r=baku,jfkthame,necko-reviewers
Differential Revision: https://phabricator.services.mozilla.com/D82034
2020-07-07 07:49:38 +00:00
Dragana Damjanovic 7ec7ee4a9b Bug 1646961 - Set the correct version of QUIC to be used when initializing Http3Client from necko. r=agrover
Differential Revision: https://phabricator.services.mozilla.com/D82423
2020-07-06 19:50:20 +00:00
Christoph Kerschbaumer 402b0a5c46 Bug 1647719: Introduce Pref for HTTS-Only in Private Browsing Mode. r=JulianWels,jcj
Differential Revision: https://phabricator.services.mozilla.com/D80873
2020-07-06 08:52:02 +00:00
Coroiu Cristina 057efa89c8 Backed out 5 changesets (bug 1649879) for browser-chrome failures at browser/base/content/test/tabs/browser_progress_keyword_search_handling.js
Backed out changeset f9670eed4ac5 (bug 1649879)
Backed out changeset 76ab8adad34b (bug 1649879)
Backed out changeset 6dc2e9474f43 (bug 1649879)
Backed out changeset 6f905d33681f (bug 1649879)
Backed out changeset 13b19e14a332 (bug 1649879)
2020-07-06 10:44:56 +03:00
Matt Woodrow 1ef58514bd Bug 1649879 - Handle URIFixup that happens on a failed channel in DocumentLoadListener if available, rather than waiting for it to reach nsDocShell. r=kmag
Differential Revision: https://phabricator.services.mozilla.com/D81947
2020-07-06 04:29:33 +00:00
Emilio Cobos Álvarez a0d2559af5 Bug 1649807 - Ignore Pragma: no-cache if Cache-Control is specified. r=mayhemer,necko-reviewers
See bug 1599160 comment 43 for an example in the wild (though it has
been fixed since) which prevents us from caching resources
unnecessarily.

Differential Revision: https://phabricator.services.mozilla.com/D81879
2020-07-03 14:04:31 +00:00
Razvan Maries 9da7f3cb73 Backed out 2 changesets (bug 1649127) for perma failures on test_trr.js. CLOSED TREE
Backed out changeset d967c48fa147 (bug 1649127)
Backed out changeset 17e5b3f78f03 (bug 1649127)
2020-07-04 18:30:54 +03:00
Valentin Gosu acc4997769 Bug 1649127 - Only trigger confirmation in TRR-first and TRR-only modes r=dragana,necko-reviewers
Due to a change in timing in this patch, when we reset the confirmation pref
at the end of the test, a TRR request would happen after we changed the prefs
leading to accessing a non-local IP in testing and causing a crash.
This should be gated on being in the correct mode anyway

Depends on D81517

Differential Revision: https://phabricator.services.mozilla.com/D82222
2020-07-04 13:08:30 +00:00
Valentin Gosu a38929f26f Bug 1649127 - Make sure we only set AddrHostRecord::mTRRUsed = true when TRRServiceChannel::AsyncOpen succeeds r=dragana,necko-reviewers
mTRRUsed is a variable that we check to gate several telemetry probes, and to
decide if TRR really failed and we should add a domain to the TRR blocklist.
The problem with setting this too early is that when this is true but we
don't actually send the TRR request, then we will report that we fell back
to Do53 and potentially skip next TRR requests in the future.

The solution here is to only set mTRRUsed if TRRServiceChannel::AsyncOpen
succeeds.

Differential Revision: https://phabricator.services.mozilla.com/D81517
2020-07-04 13:08:15 +00:00
Sylvestre Ledru caf785c695 Bug 1519636 - Reformat recent changes to the Google coding style r=andi
# ignore-this-changeset

Differential Revision: https://phabricator.services.mozilla.com/D82178
2020-07-04 09:38:43 +00:00