Граф коммитов

18185 Коммитов

Автор SHA1 Сообщение Дата
Edwin Gao c2dae416e6 Bug 1555454 - migrate xpcshelltests to macosx1014 r=gbrown
Changes:
- move xpcshell from macosx1010 to macosx1014
- updated regex for macosx1014 xpcshell to run on 2 chunks for all variants (for now)

Differential Revision: https://phabricator.services.mozilla.com/D34561

--HG--
extra : moz-landing-system : lando
2019-06-11 18:36:19 +00:00
Gijs Kruitbosch 01a4b7d58f Bug 1555671 - tests, r=valentin
Differential Revision: https://phabricator.services.mozilla.com/D33153

--HG--
extra : moz-landing-system : lando
2019-06-11 19:02:50 +00:00
Boris Zbarsky d5a8a4a595 Bug 1557793 part 3. Change the signatures of various nsContentUtils localization methods to play nicer with the new stringbundle API. r=smaug
Differential Revision: https://phabricator.services.mozilla.com/D34201

--HG--
extra : moz-landing-system : lando
2019-06-08 21:26:12 +00:00
Boris Zbarsky 9de72a3ac6 Bug 1557793 part 2. Stop using [array] in nsIStringBundle. r=Pike
Differential Revision: https://phabricator.services.mozilla.com/D34196

--HG--
extra : moz-landing-system : lando
2019-06-11 15:51:51 +00:00
Kershaw Chang 84202aaa22 Bug 1545523 - Set mRaceCacheWithNetwork to true if mCacheOpenFunc is assigned r=michal
Differential Revision: https://phabricator.services.mozilla.com/D33070

--HG--
extra : moz-landing-system : lando
2019-06-10 13:37:04 +00:00
Sylvestre Ledru f1fbd2ff00 Bug 1519636 - Reformat recent changes to the Google coding style r=Ehsan
# ignore-this-changeset

Differential Revision: https://phabricator.services.mozilla.com/D33456

--HG--
extra : moz-landing-system : lando
2019-06-08 08:26:37 +00:00
Tarek Ziadé b18ccf9c4e Bug 1529023 - Enable threads on macOS for GetProcInfo r=jld,mstange
To run task_for_pid() on child processes, we need the child task port for
security reasons. This port can be obtained via a Mach IPC exchange.

This is what GeckoChildProcessHost::GetChildTask() provides, so we use it
in cocoa's version of GetProcInfo()

Differential Revision: https://phabricator.services.mozilla.com/D25927

--HG--
extra : moz-landing-system : lando
2019-06-07 19:56:51 +00:00
Gijs Kruitbosch 9d7947d8a1 Bug 1556559 - make about:license non-web-linkable again, r=valentin
This ensures that links in about:license to about:rights and about:buildconfig actually work.

Differential Revision: https://phabricator.services.mozilla.com/D34136

--HG--
extra : moz-landing-system : lando
2019-06-07 12:11:34 +00:00
Sebastian Hengst 0d6b93005b Backed out changeset 0635eeb2fad4 (bug 1529023) for bustage in ChromeUtils.cpp. CLOSED TREE 2019-06-07 19:09:41 +02:00
Tarek Ziadé 2f870d3a3e Bug 1529023 - Enable threads on macOS for GetProcInfo r=jld,mstange
To run task_for_pid() on child processes, we need the child task port for
security reasons. This port can be obtained via a Mach IPC exchange.

This is what GeckoChildProcessHost::GetChildTask() provides, so we use it
in cocoa's version of GetProcInfo()

Differential Revision: https://phabricator.services.mozilla.com/D25927

--HG--
extra : moz-landing-system : lando
2019-06-07 07:48:37 +00:00
Kershaw Chang dc4eac2116 Bug 1556019 - Use int32 to store port number r=valentin
Differential Revision: https://phabricator.services.mozilla.com/D34123

--HG--
extra : moz-landing-system : lando
2019-06-07 10:07:37 +00:00
Christoph Kerschbaumer 242bf62249 Bug 1555050: Always (if non null) set any CSP as cspToInherit on the loadinfo of new document load. Update documentation for GetCSP, GetPreloadCSP() and GetCSPToInherit and update two callsites which called GetCSP instead of GetCSPToInherit. r=bzbarsky
Differential Revision: https://phabricator.services.mozilla.com/D33499

--HG--
extra : moz-landing-system : lando
2019-06-06 20:19:56 +00:00
Valentin Gosu 05f11128da Bug 1554680 - Use WindowGlobalParent::IsInitialDocument instead of WindowGlobalParent::DocumentPrincipal to figure out if the page is the initial about:blank r=nika
For a popup, the principal will be that of the opener, so we can't use that to
determine if the window is about:blank.

Differential Revision: https://phabricator.services.mozilla.com/D33249

--HG--
extra : moz-landing-system : lando
2019-06-04 22:08:20 +00:00
Valentin Gosu 48a10d1cfd Bug 1555359 - Treat the ExtensionProtocolHandler as threadsafe r=mayhemer
Since the RESOLVE_JAR_URI flag is not used for moz-extension, ResolveJARURI
would never get called in ExtensionProtocolHandler, so it's OK to consider
it threadsafe.

Differential Revision: https://phabricator.services.mozilla.com/D33253

--HG--
extra : moz-landing-system : lando
2019-06-06 20:15:11 +00:00
Valentin Gosu 40d01075ce Bug 1556259 - Make sure CaptiveDetect.jsm interprets any redirect as a locked captive portal r=mayhemer
The problem with CaptiveDetect was that it uses an XMLHttpRequest, and
apparently xhr.status is 0 for failed requests, which here includes cert
errors, redirect loops, etc.
Getting the XHR to not follow redirects was tricky, so a hacky fix was to
set nsIHttpChannel.redirectionLimit = 0;
For any redirect the XHR would now fail with NS_ERROR_REDIRECT_LOOP, which
we need to handle separately.

I also included tests for:
  * redirect to https with invalid cert
  * redirect to same URL causing redirect loop
  * redirect to different URL with different content
  * redirect to different URL with canonical content
All of these cases should be detected as locked captive portals.

Differential Revision: https://phabricator.services.mozilla.com/D33706

--HG--
extra : moz-landing-system : lando
2019-06-06 12:08:35 +00:00
Bogdan Tara bde97b25f5 Backed out 2 changesets (bug 1555050) for test_reloadInFreshProcess.html failures CLOSED TREE
Backed out changeset f5e954d593f8 (bug 1555050)
Backed out changeset b5b99e78b753 (bug 1555050)
2019-06-06 23:13:52 +03:00
Christoph Kerschbaumer a9912a9803 Bug 1555050: Always (if non null) set any CSP as cspToInherit on the loadinfo of new document load. Update documentation for GetCSP, GetPreloadCSP() and GetCSPToInherit and update two callsites which called GetCSP instead of GetCSPToInherit. r=bzbarsky
Differential Revision: https://phabricator.services.mozilla.com/D33499

--HG--
extra : moz-landing-system : lando
2019-06-06 18:09:03 +00:00
Nika Layzell 03a2f40528 Bug 1553272 - Eliminate the unnecessary ProtocolState object, r=froydnj
The vast majority of the virtual methods which were used on ProtocolState were
actually methods which only had meaningful implementations on the toplevel
protocol. This patch adds a new field to IProtocol holding a direct pointer to
the protocol's `IToplevelProtocol`, and the methods formerly implemented with
ProtocolState now directly call the corresponding method on IToplevelProtocol.
IToplevelProtocol then shadows these methods with the toplevel protocol
implementation, meaning that the right code is run in the right places.

In addition, some state was maintained for protocols inside of the separate
ProtocolState allocation, and this patch moves that state back into the actor
itself.

Differential Revision: https://phabricator.services.mozilla.com/D32044

--HG--
extra : moz-landing-system : lando
2019-06-06 14:57:34 +00:00
Boris Zbarsky 223721a61e Bug 1557237. Stop using [array] in nsIPrompt and nsIPromptService. r=Gijs
Differential Revision: https://phabricator.services.mozilla.com/D33909

--HG--
extra : moz-landing-system : lando
2019-06-06 08:03:56 +00:00
Thomas Nguyen 01ff0bf93f Bug 1534681 Use ReferrerInfo class in document r=ckerschb,baku,Gijs
Also, in many place, we use document uri as referrer. It is not right
for the case srdoc iframe. We should use the last non-srdoc parent
document's uri

Differential Revision: https://phabricator.services.mozilla.com/D30191

--HG--
rename : testing/web-platform/tests/referrer-policy/generic/iframe-inheritance.html => testing/web-platform/tests/referrer-policy/generic/inheritance/iframe-inheritance-data.html
rename : testing/web-platform/tests/referrer-policy/generic/iframe-inheritance.html => testing/web-platform/tests/referrer-policy/generic/inheritance/iframe-inheritance-srcdoc.html
extra : moz-landing-system : lando
2019-06-06 07:23:37 +00:00
Michal Novotny 8e84b11096 Bug 1556987 - Invalid assertion in nsHttpChannel::OnPush, r=dragana
NS_HTTP_ONPUSH_LISTENER capability is set in nsHttpChannel::SetupTransaction when notification callbacks implement nsIHttpPushListener, but nsHttpChannel::OnPush event is initiated on socket thread in Http2PushedStream::TryOnPush and the channel can be closed and listeners released before nsHttpChannel::OnPush is called on the main thread.

Differential Revision: https://phabricator.services.mozilla.com/D33776

--HG--
extra : moz-landing-system : lando
2019-06-06 06:35:50 +00:00
Valentin Gosu 50fee6b27e Bug 1556911 - Don't instantiate NetworkConnectivityService off-main-thread r=dragana
This patch calls NetworkConnectivityService::GetSingleton() on the main thread
and keeps a ref to the service until shutdown.
Even though calling ncs->GetIPv6() off-main-thread is technically a data-race
in practice that's OK because only the simple decision whether to send
AAAA requests is made based on that value, which in itself is an optimization.
I filed bug 1556967 for making the connectivity service thread safe.

Differential Revision: https://phabricator.services.mozilla.com/D33765

--HG--
extra : moz-landing-system : lando
2019-06-05 20:39:12 +00:00
nidhi 8c217493ad Bug 1552658 solved r=valentin
Added python 3 support for prepare_tlds.py

Differential Revision: https://phabricator.services.mozilla.com/D32363

--HG--
extra : moz-landing-system : lando
2019-06-05 20:07:40 +00:00
Andrea Marchesini 3b60357ed6 Bug 1551798 - nsICookie.sameSite should return rawSameSite if lax-by-default pref is set to false, r=Ehsan
Differential Revision: https://phabricator.services.mozilla.com/D33305

--HG--
extra : moz-landing-system : lando
2019-06-05 12:20:05 +00:00
Andrea Marchesini 0434ad7ecb Bug 1551798 - Test for cookie migration 10, r=Ehsan
Differential Revision: https://phabricator.services.mozilla.com/D32483

--HG--
extra : moz-landing-system : lando
2019-06-05 12:19:56 +00:00
Andrea Marchesini 382a3aa030 Bug 1551798 - Store sameSite value as received from the wire in the database - migration 10, r=Ehsan,robwu
Differential Revision: https://phabricator.services.mozilla.com/D32482

--HG--
extra : moz-landing-system : lando
2019-06-05 12:19:54 +00:00
Andrea Marchesini 228b3afe31 Bug 1551798 - SameSite=lax by default and SameSite=none only if secure, r=Ehsan
Differential Revision: https://phabricator.services.mozilla.com/D31215

--HG--
extra : moz-landing-system : lando
2019-06-05 12:18:52 +00:00
Valentin Gosu 3eed61b8a1 Bug 1548306 - Do not allow the ^ character to appear in the hostname r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D32895

--HG--
extra : moz-landing-system : lando
2019-06-04 13:35:47 +00:00
Valentin Gosu 7d213246fb Bug 1555302 - Ensure that nsStandardURL::Resolve() doesn't parse URLs with a different scheme as relative r=mayhemer
Normally, this method will return the entire in string if it has a scheme.
However, mParser->ParseURL may fail, leading to the scheme to be cleared,
and the result will be the same HTTP URL with the input appended to the
path. This triggers the assertion in NS_NewURI that the scheme should not
change.

As a fix, we bail out of nsStandardURL::Resolve() if the parsed scheme of
the input is different than the base URIs current scheme. This condition
is necessary, because we still need to support a deprecated form of relative
URLs like http:file or http:/path/file

Differential Revision: https://phabricator.services.mozilla.com/D33003

--HG--
extra : moz-landing-system : lando
2019-06-04 13:42:37 +00:00
Valentin Gosu 2c2ccd2797 Bug 1533877 - Frame navigations should check their parent's Cross-Origin policy r=nika
Differential Revision: https://phabricator.services.mozilla.com/D32972

--HG--
extra : moz-landing-system : lando
2019-06-04 12:24:56 +00:00
Andrea Marchesini 176b3f8e39 Bug 1556419 - cookie path should not contain the last '/', r=Ehsan
Differential Revision: https://phabricator.services.mozilla.com/D33500

--HG--
extra : moz-landing-system : lando
2019-06-04 02:42:57 +00:00
Andrea Marchesini b4b9392f9d Bug 1554847 - Improve cross-origin checks in canvas API - propagate allRedirectsSameOrigin to HttpChannelChild actor, r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D32793

--HG--
extra : moz-landing-system : lando
2019-06-04 06:33:11 +00:00
Valentin Gosu 269fbdbecf Bug 1518730 - Wait for both A and AAAA responses to come back before notifying the listeners r=dragana
This way we preserve the behaviour of getaddrinfo, where both A and AAAA
responses come back at the same time.
Without this Firefox will always be biased, as the first request will usually
be resolved first. So if we requested IPv4 first, we'd mostly be using IPv4.
If we requested IPv6 first, normally we'll wait for the IPv4 response to come
back too, which is functionally equivalent to the new behaviour.
However, if the pref is set network.trr.early-AAAA;true then we'd use the IPv6
response immediately, possibly leading to a failed request if the IPv6
connection fails before we have an IPv4 address to fall back to.

A test for this patch was added in bug 1542561.

Depends on D33476

Differential Revision: https://phabricator.services.mozilla.com/D33477

--HG--
extra : moz-landing-system : lando
2019-06-03 21:13:22 +00:00
Valentin Gosu c3ee743b2d Bug 1518730 - Only send AAAA TRR requests when the system has IPv6 connectivity r=dragana
This is an optimization. If we detect that the system can't use the IPv6
address, there's no point in making a request for it.

Depends on D33475

Differential Revision: https://phabricator.services.mozilla.com/D33476

--HG--
extra : moz-landing-system : lando
2019-06-03 21:17:08 +00:00
Valentin Gosu b0786cdfb7 Bug 1518730 - Disable TRR for connectivity checks r=dragana
Depends on D33473

Differential Revision: https://phabricator.services.mozilla.com/D33475

--HG--
extra : moz-landing-system : lando
2019-06-03 21:17:57 +00:00
Valentin Gosu 1bb0e080b4 Bug 1542561 - Test that a IPv4 NXDOMAIN still uses the IPv6 response, regardless which one comes back first r=dragana
This test uses prefs added in Bug 1518730, but the pref is ignored when it
doesn't exist, so the test is still valid.

Depends on D33471

Differential Revision: https://phabricator.services.mozilla.com/D33473

--HG--
extra : moz-landing-system : lando
2019-06-03 21:20:39 +00:00
Valentin Gosu 15ababeb71 Bug 1542561 - TRR: Don't return NS_ERROR_UNKNOWN_HOST when a AAAA response comes back first, but the second A response is NXDOMAIN r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D33471

--HG--
extra : moz-landing-system : lando
2019-06-03 21:05:27 +00:00
Coroiu Cristina 73edc6621b Backed out 4 changesets (bug 1554847) for wpt failures at /service-workers/service-worker/fetch-canvas-tainting-video-cache.https.html
Backed out changeset 17e36d139ac2 (bug 1554847)
Backed out changeset 101bd1c2d688 (bug 1554847)
Backed out changeset 3ff9a221f3e5 (bug 1554847)
Backed out changeset 946e4d9420dd (bug 1554847)
2019-06-04 03:24:42 +03:00
shindli b83baa135f Backed out changeset 32f9907bf1f7 (bug 1555302) for causing permafailures in dom/url/tests/test_url.html CLOSED TREE 2019-06-03 23:33:14 +03:00
Valentin Gosu 8c0163caeb Bug 1555302 - Ensure that nsStandardURL::Resolve() doesn't parse URLs with a different scheme as relative r=mayhemer
Normally, this method will return the entire in string if it has a scheme.
However, mParser->ParseURL may fail, leading to the scheme to be cleared,
and the result will be the same HTTP URL with the input appended to the
path. This triggers the assertion in NS_NewURI that the scheme should not
change.

As a fix, we bail out of nsStandardURL::Resolve() if the parsed scheme of
the input is different than the base URIs current scheme. This condition
is necessary, because we still need to support a deprecated form of relative
URLs like http:file or http:/path/file

Differential Revision: https://phabricator.services.mozilla.com/D33003

--HG--
extra : moz-landing-system : lando
2019-06-03 19:30:42 +00:00
shindli 18d693fe12 Backed out 5 changesets (bug 1533877) for causing wpt permafailure in /html/cross-origin/anonymous.tentative.html CLOSED TREE
Backed out changeset 1804d3178cd4 (bug 1533877)
Backed out changeset b5a3e938f421 (bug 1533877)
Backed out changeset 08efb10cceb2 (bug 1533877)
Backed out changeset c4b8d755873b (bug 1533877)
Backed out changeset e53056e11429 (bug 1533877)
2019-06-03 22:06:38 +03:00
Valentin Gosu e1092f8add Bug 1533877 - Frame navigations should check their parent's Cross-Origin policy r=nika
Differential Revision: https://phabricator.services.mozilla.com/D32972

--HG--
extra : moz-landing-system : lando
2019-06-03 14:57:13 +00:00
ffxbld 5cd2a9bc7d No Bug, mozilla-central repo-update HSTS HPKP blocklist remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D33506

--HG--
extra : moz-landing-system : lando
2019-06-03 15:44:26 +00:00
Andrea Marchesini 0a9fe4ff98 Bug 1553867 - Reduce the number of ClonePrincipalForPermission() call in CookieSettings, r=Ehsan
Differential Revision: https://phabricator.services.mozilla.com/D32364

--HG--
extra : moz-landing-system : lando
2019-06-03 11:14:38 +00:00
Andrea Marchesini 21cf95c1c2 Bug 1554847 - Improve cross-origin checks in canvas API - propagate allRedirectsSameOrigin to HttpChannelChild actor, r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D32793

--HG--
extra : moz-landing-system : lando
2019-06-03 09:55:08 +00:00
Csoregi Natalia de697c360a Merge mozilla-central to mozilla-inbound. CLOSED TREE
--HG--
rename : layout/generic/nsFrameIdList.h => layout/generic/FrameIdList.h
2019-06-02 00:37:53 +03:00
Valentin Gosu 3cacbcf87b Bug 1552438 - Remove TRR mode 4 (MODE_SHADOW) r=agrover
Differential Revision: https://phabricator.services.mozilla.com/D32997

--HG--
extra : moz-landing-system : lando
2019-06-01 09:44:20 +00:00
Valentin Gosu 4882c4f4ea Bug 1552438 - Remove TRR mode 1 (MODE_PARALLEL) r=agrover
Differential Revision: https://phabricator.services.mozilla.com/D32996

--HG--
extra : moz-landing-system : lando
2019-06-01 09:44:06 +00:00
arthur.iakab 36d75a7e56 Merge mozilla-central to mozilla-inbound 2019-06-01 01:30:47 +03:00
Kartikaya Gupta 0d8a0d2546 Bug 1555966 - Back out cset ecceef291b89 (bug 1551601) for regressions. rs=valentin 2019-05-31 16:07:18 -04:00
Honza Bambas c35df87597 Bug 1545421 - New nsresult error codes for 407, 502 and 504 http response codes returned by proxies + test, r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D32817

--HG--
extra : moz-landing-system : lando
2019-05-31 17:29:53 +00:00
Sebastian Hengst 78e651853f Merge mozilla-central to autoland. CLOSED TREE 2019-05-31 19:07:44 +02:00
Sebastian Hengst 5c434d0aa6 Merge autoland to mozilla-central. a=merge 2019-05-31 19:00:53 +02:00
Jorg K be25a0ae54 Bug 1550945 - Follow-up to part 2, M-C: Move hook in nsNetUtil::NS_NewURI(). r=valentin a=Aryx DONTBUILD NPOTB 2019-05-31 11:53:59 +02:00
Ehsan Akhgari d74c1d4a0f Bug 1555846 - Block cookies from trackers with dynamic FPI; r=baku
Differential Revision: https://phabricator.services.mozilla.com/D33227

--HG--
extra : moz-landing-system : lando
2019-05-31 14:33:36 +00:00
Dorel Luca 5a3296d55a Backed out changeset 910f7703f9f3 (bug 1555846) for Build bustages. CLOSED TREE 2019-05-31 17:24:43 +03:00
Ehsan Akhgari 62aa7c0ec3 Bug 1555846 - Block cookies from trackers with dynamic FPI; r=baku
Differential Revision: https://phabricator.services.mozilla.com/D33227

--HG--
extra : moz-landing-system : lando
2019-05-31 06:14:14 +00:00
Ehsan Akhgari 58702e4a1d Bug 1555715 - Remove WebSocketChannelParent::mIPCOpen; r=valentin
It is no longer necesssary for individual actors to do this book-keeping
manually.

Differential Revision: https://phabricator.services.mozilla.com/D33159

--HG--
extra : moz-landing-system : lando
2019-05-31 12:08:02 +00:00
ffxbld 669d19df08 No Bug, mozilla-central repo-update HSTS HPKP blocklist remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D33154

--HG--
extra : moz-landing-system : lando
2019-05-30 13:07:37 +00:00
Honza Bambas d47b46c009 Bug 1553927 - Do not do immediate captive portal check on certificate/ssl errors when connecting a plain URL to prevent loops, r=valentin
Differential Revision: https://phabricator.services.mozilla.com/D33032

--HG--
extra : moz-landing-system : lando
2019-05-29 16:13:46 +00:00
Christian Holler d67b031492 Bug 1528950 - Implement HTTP fuzzing target for Necko. r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D32755

--HG--
extra : moz-landing-system : lando
2019-05-31 09:34:00 +00:00
Andrea Marchesini aa84d3c812 Bug 1436674 - nsICookieService.idl should use ACString XPIDL type in place of the string type, r=Ehsan
Differential Revision: https://phabricator.services.mozilla.com/D32662

--HG--
extra : moz-landing-system : lando
2019-05-31 09:36:44 +00:00
Andrea Marchesini b1b122fb20 Bug 1554464 - Merge nsICookie2 and nsICookie in 1 single interface, r=Ehsan
Differential Revision: https://phabricator.services.mozilla.com/D33031

--HG--
extra : moz-landing-system : lando
2019-05-31 09:36:44 +00:00
Andrea Marchesini 68fbe6f8ca Bug 1554377 - Cleanup nsCookie implementation - Removed mIPCOpen, r=Ehsan
Differential Revision: https://phabricator.services.mozilla.com/D32616

--HG--
extra : moz-landing-system : lando
2019-05-31 09:32:51 +00:00
Andrea Marchesini fd927a96aa Bug 1554377 - Cleanup nsCookie implementation - network_cookie_thirdparty_nonsecureSessionOnly to StaticPrefs, r=Ehsan
Differential Revision: https://phabricator.services.mozilla.com/D32615

--HG--
extra : moz-landing-system : lando
2019-05-31 09:32:33 +00:00
Andrea Marchesini 1040f3de6a Bug 1554377 - Cleanup nsCookie implementation - network.cookie.thirdparty.sessionOnly to StaticPrefs, r=Ehsan
Differential Revision: https://phabricator.services.mozilla.com/D32614

--HG--
extra : moz-landing-system : lando
2019-05-31 09:32:13 +00:00
Andrea Marchesini ff8aaf2236 Bug 1554377 - Cleanup nsCookie implementation - simpler nsCookie, r=Ehsan
Differential Revision: https://phabricator.services.mozilla.com/D32562

--HG--
extra : moz-landing-system : lando
2019-05-31 09:31:47 +00:00
Andrea Marchesini 8bcf905e12 Bug 1554377 - Cleanup nsCookie implementation - Get rid of nsCookieAttributes, r=Ehsan
Differential Revision: https://phabricator.services.mozilla.com/D32561

--HG--
extra : moz-landing-system : lando
2019-05-31 09:31:30 +00:00
Andrea Marchesini a1e12567f6 Bug 1554377 - Cleanup nsCookie implementation - Get rid of ConstCookie, r=Ehsan
Differential Revision: https://phabricator.services.mozilla.com/D32560

--HG--
extra : moz-landing-system : lando
2019-05-31 09:31:12 +00:00
Thomas Nguyen cd48bd6695 Bug 1554289 - Add non-null checks around assignment referrerInfo to preflight HTTP channel r=valentin
Differential Revision: https://phabricator.services.mozilla.com/D32976

--HG--
extra : moz-landing-system : lando
2019-05-31 09:39:51 +00:00
Gijs Kruitbosch e561d233e9 Bug 1552993 - r=valentin,dragana
Differential Revision: https://phabricator.services.mozilla.com/D32066

--HG--
extra : moz-landing-system : lando
2019-05-27 09:14:33 +00:00
Csoregi Natalia a51ae3670f Backed out 5 changesets (bug 1551798) for failures on test_rawSameSite.js. CLOSED TREE
Backed out changeset 11ddc433b632 (bug 1551798)
Backed out changeset f2ac8efb023d (bug 1551798)
Backed out changeset 0f6e797b434f (bug 1551798)
Backed out changeset eae7f88660c8 (bug 1551798)
Backed out changeset 2ba747afb3d0 (bug 1551798)
2019-05-30 10:17:01 +03:00
Andrea Marchesini ef73f6105f Bug 1551798 - Add comments about the next removing patches, r=Ehsan
Differential Revision: https://phabricator.services.mozilla.com/D33037

--HG--
extra : moz-landing-system : lando
2019-05-29 16:34:27 +00:00
Andrea Marchesini d513a67ed4 Bug 1551798 - Test for cookie migration 10, r=Ehsan
Differential Revision: https://phabricator.services.mozilla.com/D32483

--HG--
extra : moz-landing-system : lando
2019-05-29 15:56:22 +00:00
Andrea Marchesini 84e139e50b Bug 1551798 - Store sameSite value as received from the wire in the database - migration 10, r=Ehsan
Differential Revision: https://phabricator.services.mozilla.com/D32482

--HG--
extra : moz-landing-system : lando
2019-05-29 16:34:33 +00:00
Andrea Marchesini ae8ab513d8 Bug 1551798 - SameSite=lax by default and SameSite=none only if secure, r=Ehsan
Differential Revision: https://phabricator.services.mozilla.com/D31215

--HG--
extra : moz-landing-system : lando
2019-05-30 00:48:41 +00:00
Byron Campen [:bwc] 2d6cf50175 Bug 1551589: readyState fixes r=ng
Depends on D31085

Differential Revision: https://phabricator.services.mozilla.com/D31123

--HG--
extra : moz-landing-system : lando
2019-05-29 21:27:18 +00:00
Andrea Marchesini 4c6ace6ac6 Bug 1551798 - Rename nsICookie2.SAMESITE_UNSET to nsICookie2.SAMESITE_NONE, r=Ehsan
Differential Revision: https://phabricator.services.mozilla.com/D31214

--HG--
extra : moz-landing-system : lando
2019-05-29 15:55:03 +00:00
arthur.iakab 944263f18a Backed out 5 changesets (bug 1551798) for multiple build bustages on StaticPrefList.h CLOSED TREE
Backed out changeset c89daff34d97 (bug 1551798)
Backed out changeset bbc3f88b8c03 (bug 1551798)
Backed out changeset b87996b8a411 (bug 1551798)
Backed out changeset d88b0002d736 (bug 1551798)
Backed out changeset 0fe740c90e2b (bug 1551798)
2019-05-29 18:07:26 +03:00
Andrea Marchesini 08c8aa4d6d Bug 1551798 - Test for cookie migration 10, r=Ehsan
Differential Revision: https://phabricator.services.mozilla.com/D32483

--HG--
extra : moz-landing-system : lando
2019-05-27 01:46:11 +00:00
Andrea Marchesini d5fdfc9e8c Bug 1551798 - Store sameSite value as received from the wire in the database - migration 10, r=Ehsan
Differential Revision: https://phabricator.services.mozilla.com/D32482

--HG--
extra : moz-landing-system : lando
2019-05-27 05:11:54 +00:00
Andrea Marchesini 7a79f55da4 Bug 1551798 - SameSite=lax by default and SameSite=none only if secure, r=Ehsan
Differential Revision: https://phabricator.services.mozilla.com/D31215

--HG--
extra : moz-landing-system : lando
2019-05-24 15:44:00 +00:00
Andrea Marchesini e9bbb85ed1 Bug 1551798 - Rename nsICookie2.SAMESITE_UNSET to nsICookie2.SAMESITE_NONE, r=Ehsan
Differential Revision: https://phabricator.services.mozilla.com/D31214

--HG--
extra : moz-landing-system : lando
2019-05-24 15:18:49 +00:00
Honza Bambas 912f874cb7 Bug 1509827 - Document nsIClassOfService flags, r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D31067

--HG--
extra : moz-landing-system : lando
2019-05-29 14:02:26 +00:00
Tom Ritter b8705a8481 Bug 1539595 - Rename Priveleged Content Process to PrivlegedAbout Content Process r=mconley,flod
We do this because we will be introducing more privileged content processes
and we want to be able to distinguish them.

Differential Revision: https://phabricator.services.mozilla.com/D30274

--HG--
rename : browser/base/content/test/tabs/browser_new_tab_in_privileged_process_pref.js => browser/base/content/test/tabs/browser_new_tab_in_privilegedabout_process_pref.js
extra : moz-landing-system : lando
2019-05-29 11:31:31 +00:00
Noemi Erli 395fa026e1 Merge autoland to mozilla-central. a=merge 2019-05-29 12:47:04 +03:00
Jorg K b4c9e9391c Bug 1550945 - Part 2, M-C part: Hook into nsNetUtil::NS_NewURI(). r=valentin a=aryx,npotb DONTBUILD 2019-05-29 11:23:04 +02:00
Cosmin Sabou 482c1fdb41 Backed out 2 changesets (bug 1554527, bug 1553867) as requested by Sylvestre for causing huge perf regressions. a=backout
Backed out changeset 1e85291f97de (bug 1554527)
Backed out changeset daf113171d63 (bug 1553867)
2019-05-29 09:57:29 +03:00
Sebastian Hengst fba75a919c Backed out 4 changesets (bug 1539595) for build bustage in nsAboutRedirector.cpp. CLOSED TREE
Backed out changeset 2b0bb889b087 (bug 1539595)
Backed out changeset 95f0b82ec253 (bug 1539595)
Backed out changeset 6310e6dabceb (bug 1539595)
Backed out changeset ba3e353c6957 (bug 1539595)

--HG--
rename : browser/base/content/test/tabs/browser_e10s_about_page_triggeringprincipal.js => browser/base/content/test/general/browser_e10s_about_page_triggeringprincipal.js
rename : browser/base/content/test/tabs/browser_e10s_about_process.js => browser/base/content/test/general/browser_e10s_about_process.js
rename : browser/base/content/test/tabs/browser_e10s_chrome_process.js => browser/base/content/test/general/browser_e10s_chrome_process.js
rename : browser/base/content/test/tabs/browser_e10s_javascript.js => browser/base/content/test/general/browser_e10s_javascript.js
rename : browser/base/content/test/tabs/browser_e10s_switchbrowser.js => browser/base/content/test/general/browser_e10s_switchbrowser.js
rename : browser/base/content/test/tabs/file_about_child.html => browser/base/content/test/general/file_about_child.html
rename : browser/base/content/test/tabs/file_about_parent.html => browser/base/content/test/general/file_about_parent.html
rename : browser/base/content/test/tabs/test_process_flags_chrome.html => browser/base/content/test/general/test_process_flags_chrome.html
rename : browser/base/content/test/tabs/browser_new_tab_in_privilegedabout_process_pref.js => browser/base/content/test/tabs/browser_new_tab_in_privileged_process_pref.js
2019-05-28 19:49:17 +02:00
Tom Ritter 03b41fa512 Bug 1539595 - Rename Priveleged Content Process to PrivlegedAbout Content Process r=mconley,flod
We do this because we will be introducing more privileged content processes
and we want to be able to distinguish them.

Differential Revision: https://phabricator.services.mozilla.com/D30274

--HG--
rename : browser/base/content/test/tabs/browser_new_tab_in_privileged_process_pref.js => browser/base/content/test/tabs/browser_new_tab_in_privilegedabout_process_pref.js
extra : moz-landing-system : lando
2019-05-28 14:19:11 +00:00
Valentin Gosu 124a1062f6 Bug 1536744 - Rename NS_NewURIOnAnyThread to NS_NewURI. r=baku
The only protocol that can't be created off the main thread at the moment is
moz-extension, and that can be handled at a later time.

Differential Revision: https://phabricator.services.mozilla.com/D30713

--HG--
extra : moz-landing-system : lando
2019-05-28 14:17:04 +00:00
Valentin Gosu fd0006a0bf Bug 1536744 - Add ssh scheme to NS_NewURIOnAnyThread r=baku
This is needed to pass a web-platform-test. Since unknown protocols use
nsSimpleURI and nsSimpleURI::GetHost returns an error code, that will fail.
Instead, we instantiate an nsStandardURL for the ssh scheme.
Once we change nsSimpleURI to be backed by MozURL we can probably remove this.

Differential Revision: https://phabricator.services.mozilla.com/D30707

--HG--
extra : moz-landing-system : lando
2019-05-28 13:50:43 +00:00
Valentin Gosu 393c44437c Bug 1536744 - Add nsGIOProtocolHandler::GetSingleton(). Make sure nsIOService::GetProtocolHandler only returns it when it's supported. r=baku
Before, we'd try to create a URI using the GIO protocol handler, and if that
succeeded, we'd return the protocol handler.
Now we can't return it if NS_NewURI succeeds, because NS_NewURI doesn't check
the protocol handler anymore. So instead we just instantiate the handler,
check if the scheme is supported, and if so return it.

Differential Revision: https://phabricator.services.mozilla.com/D30706

--HG--
extra : moz-landing-system : lando
2019-05-28 13:50:20 +00:00
Valentin Gosu e117171c5d Bug 1536744 - Fix test by adding a proper implementation of nsSimpleURI::Resolve that uses MozURL r=baku
nsSimpleURI doesn't really have the concept of a relative URI.
Since unknown protocol schemes will ultimately fall back to using nsSimpleURI,
we need to make sure that resolving a URI with certain base still works as
before, when those URIs were nsStandardURLs, created by the protocol handlers.

To achieve this we check to see if the "relative path" has a scheme. If it
does, we just return it, to be parsed by NS_NewURI. Otherwise, we use
MozURL (based on rust-url) to figure out the correct relative URL we should
return. This by itself manages to fix several failing web-platform tests.

Differential Revision: https://phabricator.services.mozilla.com/D30705

--HG--
extra : moz-landing-system : lando
2019-05-28 13:50:00 +00:00
Valentin Gosu 37cf1a4629 Bug 1536744 - Add indexeddb and android schemes to NS_NewURIOnAnyThread r=baku
Differential Revision: https://phabricator.services.mozilla.com/D30704

--HG--
extra : moz-landing-system : lando
2019-05-28 13:49:45 +00:00
Valentin Gosu b8bdfab7c9 Bug 1536744 - Remove nsIProtocolHandler.newURI r=baku
Differential Revision: https://phabricator.services.mozilla.com/D30703

--HG--
extra : moz-landing-system : lando
2019-05-28 13:49:27 +00:00
Valentin Gosu 016cf57214 Bug 1536744 - Add "moz-icon" to NS_NewURIOnAnyThread r=baku
Differential Revision: https://phabricator.services.mozilla.com/D30702

--HG--
extra : moz-landing-system : lando
2019-05-28 13:49:19 +00:00
Valentin Gosu 875ad56974 Bug 1536744 - Add "about" protocol to NS_NewURIOnAnyThread r=baku
Differential Revision: https://phabricator.services.mozilla.com/D30701

--HG--
extra : moz-landing-system : lando
2019-05-28 13:49:17 +00:00
Valentin Gosu eb24233246 Bug 1536744 - Add "jar" to NS_NewURIOnAnyThread r=baku
Differential Revision: https://phabricator.services.mozilla.com/D30700

--HG--
extra : moz-landing-system : lando
2019-05-28 13:49:07 +00:00
Valentin Gosu 1c26cb2cac Bug 1536744 - Make resource protocol handler thread safe r=baku
This is achieved by adding a RWLock to SubstitutingProtocolHandler

Differential Revision: https://phabricator.services.mozilla.com/D30699

--HG--
extra : moz-landing-system : lando
2019-05-28 13:49:05 +00:00
Valentin Gosu 43021cd88a Bug 1536744 - Add "resource" and "moz-extension" to NS_NewURIOnAnyThread. r=baku
* Add main thread assertions for "resource" and "moz-extension" protocols
* Use ::GetSingleton() for resource and moz-extension protocol handlers

Differential Revision: https://phabricator.services.mozilla.com/D30698

--HG--
extra : moz-landing-system : lando
2019-05-28 13:48:56 +00:00
Valentin Gosu 8ce8ef49f6 Bug 1536744 - Add {nsAboutProtocolHandler,nsViewSourceHandler,SubstitutingProtocolHandler}::CreateNewURI() static methods r=baku
Differential Revision: https://phabricator.services.mozilla.com/D30697

--HG--
extra : moz-landing-system : lando
2019-05-28 13:48:49 +00:00
Valentin Gosu 6226941606 Bug 1536744 - Make nsIOService.newURI call NS_NewURI, and NS_NewURI call NS_NewURIOnAnyThread r=baku
This way all of the nsIURI creation will go through NS_NewURIOnAnyThread.
NS_NewURIOnAnyThread will be renamed to NS_NewURI in the final patch.

Differential Revision: https://phabricator.services.mozilla.com/D30696

--HG--
extra : moz-landing-system : lando
2019-05-28 13:48:47 +00:00
Valentin Gosu 804b1c0cb2 Bug 1536744 - NS_NewURIOnAnyThread should construct nsStandardURLs for smb and sftp URLs r=baku
These URL types need both specific applications to be installed on Linux, and for the pref to list them as supported.
We do these checks in nsGIOProtocolHandler::NewChannel instead of performing them when creating the URLs.

Differential Revision: https://phabricator.services.mozilla.com/D30695

--HG--
extra : moz-landing-system : lando
2019-05-28 13:47:18 +00:00
Valentin Gosu 10a3eb98ad Bug 1536744 - Make SubstitutingProtocolHandler::NewURI only call ResolveJARURI if the host is android r=baku
Differential Revision: https://phabricator.services.mozilla.com/D30694

--HG--
extra : moz-landing-system : lando
2019-05-28 13:46:55 +00:00
Valentin Gosu 552486a275 Bug 1536744 - Add nsAboutProtocolHandler::CreateNewURI() r=baku
Differential Revision: https://phabricator.services.mozilla.com/D30693

--HG--
extra : moz-landing-system : lando
2019-05-28 13:46:35 +00:00
Valentin Gosu ef2b6cf771 Bug 1536744 - Add nsResProtocolHandler::GetSingleton() r=baku
Differential Revision: https://phabricator.services.mozilla.com/D30692

--HG--
extra : moz-landing-system : lando
2019-05-28 13:46:17 +00:00
ffxbld dafef8c4a2 No Bug, mozilla-central repo-update HSTS HPKP blocklist remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D32686

--HG--
extra : moz-landing-system : lando
2019-05-28 20:34:21 +00:00
Ehsan Akhgari 6c4174f1f6 Bug 1554713 - Remove HttpChannelChild::mIPCOpen; r=michal
Differential Revision: https://phabricator.services.mozilla.com/D32717

--HG--
extra : moz-landing-system : lando
2019-05-28 17:06:01 +00:00
Kris Maglione ffe2477ea3 Bug 1555439: Store enterprise policy about: whitelist in static array. r=mkaply
Differential Revision: https://phabricator.services.mozilla.com/D33058

--HG--
extra : rebase_source : 68ee1c16d2008a3766faad2b661788ee0a381db1
2019-05-29 11:21:06 -07:00
Valentin Gosu 33c3bf5390 Bug 1551601 - Do process switch _before_ processing cached redirect r=mayhemer
This patch splits ReadFromCache in two - by adding ContinueReadFromCache.
ContinueReadFromCache is called asycly when a cross-process-redirect is
complete.

Sometimes, the channel will be cancelled before the cross-process-redirect
is complete, such as in:
testing/firefox-ui/tests/functional/safebrowsing/test_notification.py
In that case we must make sure to call HandleAsyncAbort if the listener's
onStart/StopRequest callbacks haven't been called.

Differential Revision: https://phabricator.services.mozilla.com/D31226

--HG--
extra : moz-landing-system : lando
2019-05-28 09:37:06 +00:00
Honza Bambas 8e33c5a50b Bug 1554953 - Fix test_captive_portal_service.js intermittent timeout at shutdown, r=valentin
Differential Revision: https://phabricator.services.mozilla.com/D32814

--HG--
extra : moz-landing-system : lando
2019-05-28 12:31:31 +00:00
Valentin Gosu cc2ad47710 Bug 1552886 - Modernize test_trr.js (part 2) r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D31801

--HG--
extra : moz-landing-system : lando
2019-05-29 21:40:11 +00:00
Andrea Marchesini 4bbb03b93b Bug 1554527 - Clone the principal for permission checks in CookieSettings only if needed, r=Ehsan
Differential Revision: https://phabricator.services.mozilla.com/D32660

--HG--
extra : moz-landing-system : lando
2019-05-27 13:45:42 +00:00
Andrea Marchesini 67e56bf7fb Bug 1191313 - Get rid of third-party-cookie-accepted and third-party-cookie-rejected notifications, r=Ehsan
Differential Revision: https://phabricator.services.mozilla.com/D32665

--HG--
extra : moz-landing-system : lando
2019-05-27 13:27:47 +00:00
Andrea Marchesini c355651b11 Bug 1416657 - Avoid calling IsThirdPartyChannel() with a nullptr channel in nsCookieService, r=Ehsan
Differential Revision: https://phabricator.services.mozilla.com/D32672

--HG--
extra : moz-landing-system : lando
2019-05-27 13:25:12 +00:00
Kershaw Chang 5d000eeb62 Bug 1544619 - Ignore response body if method is HEAD or CONNECT r=mayhemer
According to the spec, we should ignore the response body for the HEAD and CONNECT requests.

Differential Revision: https://phabricator.services.mozilla.com/D28678

--HG--
extra : moz-landing-system : lando
2019-05-27 09:08:50 +00:00
Sylvestre Ledru d57d4905f1 Bug 1519636 - Reformat recent changes to the Google coding style r=Ehsan
# ignore-this-changeset

Differential Revision: https://phabricator.services.mozilla.com/D30883

--HG--
extra : moz-landing-system : lando
2019-05-25 17:46:15 +00:00
Julien Wajsberg b63e2a6156 Bug 1543040 - Report timings for redirects in the child as well r=mayhemer
Depends on D31486

Differential Revision: https://phabricator.services.mozilla.com/D31484

--HG--
extra : moz-landing-system : lando
2019-05-22 12:38:32 +00:00
Julien Wajsberg 6073a0fd93 Bug 1543040 - Report transaction timings in the redirect marker r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D31486

--HG--
extra : moz-landing-system : lando
2019-05-22 12:38:25 +00:00
Andrea Marchesini 1f043863ca Bug 1554138 - nsCookie::Create should return an already_AddRef<> instead of a raw pointer, r=Ehsan
Depends on D32461

Differential Revision: https://phabricator.services.mozilla.com/D32462

--HG--
extra : moz-landing-system : lando
2019-05-25 01:32:24 +00:00
Ehsan Akhgari a5fe850945 Bug 1547813 - Part 9: Ensure the cookie service does third-party checks when the cookie policy is set to nsICookieService::BEHAVIOR_REJECT_TRACKER_AND_PARTITION_FOREIGN; r=baku
Differential Revision: https://phabricator.services.mozilla.com/D30118

--HG--
extra : moz-landing-system : lando
2019-05-25 01:25:46 +00:00
Ehsan Akhgari 70dba3be94 Bug 1547813 - Part 8: Introduce a CookieSettings API to query whether cookies from third-party trackers must be rejected and use it in Gecko; r=baku
Differential Revision: https://phabricator.services.mozilla.com/D30117

--HG--
extra : moz-landing-system : lando
2019-05-25 01:25:43 +00:00
Ehsan Akhgari ab20502fb9 Bug 1547813 - Part 7: Introduce a storage partitioning API; r=baku
This API abstracts away the details of the decision on what context should be
partitioned away from the consumers and centralizes the decision making into
the same location in the code base.

Differential Revision: https://phabricator.services.mozilla.com/D29742

--HG--
extra : moz-landing-system : lando
2019-05-25 01:25:41 +00:00
Ehsan Akhgari e2a2c24b6e Bug 1547813 - Part 1: Introduce nsICookieService::BEHAVIOR_REJECT_TRACKER_AND_PARTITION_FOREIGN; r=baku
This new code designates our new cookie policy for blocking cookies and
storage access from third-party trackers and partitioning the cookie jar
of the rest of third-party resources.

Differential Revision: https://phabricator.services.mozilla.com/D29736

--HG--
extra : moz-landing-system : lando
2019-05-25 01:25:23 +00:00
Andrea Marchesini c926d65d2f Bug 1553867 - Reduce the number of ClonePrincipalForPermission() call in CookieSettings, r=Ehsan
Differential Revision: https://phabricator.services.mozilla.com/D32364

--HG--
extra : moz-landing-system : lando
2019-05-24 19:05:35 +00:00
Andrea Marchesini 52816e049d Bug 1554137 - nsICookie and nsICookie2 should be builtinclass interfaces, r=Ehsan
Differential Revision: https://phabricator.services.mozilla.com/D32461

--HG--
extra : moz-landing-system : lando
2019-05-24 17:01:21 +00:00
arthur.iakab af8e458c5f Backed out changeset a296439a25ff (bug 1519636) for frequent Windows cppunit failures CLOSED TREE 2019-05-24 14:26:01 +03:00
Sylvestre Ledru c82ea97226 Bug 1519636 - Reformat recent changes to the Google coding style r=Ehsan
# ignore-this-changeset

Differential Revision: https://phabricator.services.mozilla.com/D30883

--HG--
extra : moz-landing-system : lando
2019-05-24 09:59:17 +00:00
Dzmitry Malyshau d3f4d3cc1c Bug 1552549 - Update rand dependency to 0.6 r=kats,froydnj,nika,jkt,jcj
Update rand version in u2fhid and xpcom

Differential Revision: https://phabricator.services.mozilla.com/D31669

--HG--
rename : third_party/rust/scopeguard/.cargo-checksum.json => third_party/rust/scopeguard-0.3.2/.cargo-checksum.json
rename : third_party/rust/scopeguard/Cargo.toml => third_party/rust/scopeguard-0.3.2/Cargo.toml
rename : third_party/rust/scopeguard/README.rst => third_party/rust/scopeguard-0.3.2/README.rst
rename : third_party/rust/scopeguard/examples/readme.rs => third_party/rust/scopeguard-0.3.2/examples/readme.rs
rename : third_party/rust/scopeguard/src/lib.rs => third_party/rust/scopeguard-0.3.2/src/lib.rs
extra : moz-landing-system : lando
2019-05-23 19:54:25 +00:00
Sylvestre Ledru 993c03acb1 Bug 1552795 - Remove all trailing whitespaces in idl files r=Ehsan
Differential Revision: https://phabricator.services.mozilla.com/D31769

--HG--
extra : moz-landing-system : lando
2019-05-22 22:37:14 +00:00
Bogdan Tara fa8d90211a Merge mozilla-central to mozilla-inbound. a=merge CLOSED TREE 2019-05-23 07:44:57 +03:00
Valentin Gosu b4b25d6861 Bug 1529911 - Ensure that mOnStartRequestCalled/mOnStopRequestCalled is set just before calling the listener to avoid reentrancy issues r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D20499

--HG--
extra : moz-landing-system : lando
2019-05-22 13:48:59 +00:00
Valentin Gosu 33c73bd3eb Bug 1529911 - Add more tests for cancelling the channel r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D20500

--HG--
extra : moz-landing-system : lando
2019-05-22 13:58:55 +00:00
Valentin Gosu 9f3b339e68 Bug 1529911 - Make the httpcancel unit test run in e10s r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D20501

--HG--
extra : moz-landing-system : lando
2019-05-22 13:48:31 +00:00
Andrea Marchesini 7b8a38ee05 Bug 1551729 - Revert bug 1548432 - Re-introducing the support for cookies without values, r=mayhemer
This patch reverts the second part of bug 1548432.

Differential Revision: https://phabricator.services.mozilla.com/D31267

--HG--
extra : moz-landing-system : lando
2019-05-22 06:31:22 +00:00
Christoph Kerschbaumer b633427366 Bug 965637: Move CSP from Principal into Client, part 1: backend changes. r=mccr8
Differential Revision: https://phabricator.services.mozilla.com/D27654

--HG--
extra : moz-landing-system : lando
2019-05-21 23:14:27 +00:00
Cosmin Sabou bdf1d2a559 Backed out changeset a10cdf32fb5a (bug 1552549) for causing a spike in xpcshell failures. CLOSED TREE 2019-05-22 02:05:22 +03:00
Dzmitry Malyshau 1298c14a90 Bug 1552549 - Update rand dependency to 0.6 r=kats,froydnj,nika,jkt,jcj
Update rand version in u2fhid and xpcom

Differential Revision: https://phabricator.services.mozilla.com/D31669

--HG--
rename : third_party/rust/scopeguard/.cargo-checksum.json => third_party/rust/scopeguard-0.3.2/.cargo-checksum.json
rename : third_party/rust/scopeguard/Cargo.toml => third_party/rust/scopeguard-0.3.2/Cargo.toml
rename : third_party/rust/scopeguard/README.rst => third_party/rust/scopeguard-0.3.2/README.rst
rename : third_party/rust/scopeguard/examples/readme.rs => third_party/rust/scopeguard-0.3.2/examples/readme.rs
rename : third_party/rust/scopeguard/src/lib.rs => third_party/rust/scopeguard-0.3.2/src/lib.rs
extra : moz-landing-system : lando
2019-05-21 19:36:56 +00:00
Nika Layzell 30555bd898 Bug 1540731 - Part 3: Stop releasing actors within ActorDestroy, r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D29606

--HG--
extra : moz-landing-system : lando
2019-05-21 17:04:23 +00:00
Liang-Heng Chen d77a6249b5 Bug 1552431 - handle first/third party correctly; r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D31590

--HG--
extra : moz-landing-system : lando
2019-05-21 14:41:58 +00:00
Mihai Alexandru Michis 68421ffba4 Backed out changeset 754426d70d28 (bug 1551729) for causing wpt failures. CLOSED TREE 2019-05-21 15:17:37 +03:00
Andrea Marchesini 32c1b6bb89 Bug 1551729 - Revert bug 1548432 - Re-introducing the support for cookies without values, r=mayhemer
This patch reverts the second part of bug 1548432.

Differential Revision: https://phabricator.services.mozilla.com/D31267

--HG--
extra : moz-landing-system : lando
2019-05-21 08:57:21 +00:00
Dorel Luca 06b2e4e9d2 Backed out changeset 41c511d9528c (bug 1551729) for causing WPT failures in cookies/http-state/mozilla-tests.html. CLOSED TREE 2019-05-20 23:40:10 +03:00
Daniel Varga 9054636e2c Backed out 2 changesets (bug 1487113) for mochitest failure at dom/base/test/test_script_loader_js_cache.html.
Backed out changeset dce59b615568 (bug 1487113)
Backed out changeset e6f579752678 (bug 1487113)
2019-05-20 21:04:40 +03:00
Shane Caraveo 636c68369c Bug 1552248 support ftp channel in proxy api r=mayhemer,kmag
ChannelWrapper is used throughout webext APIs and it requires a channel to support weakref.
FTPChannel did not, thus ftp requests did not go through proxy.onRequest.

Differential Revision: https://phabricator.services.mozilla.com/D31540

--HG--
extra : moz-landing-system : lando
2019-05-20 15:05:26 +00:00
Andrea Marchesini b2c76acaf1 Bug 1551729 - Revert bug 1548432 - Re-introducing the support for cookies without values, r=mayhemer
This patch reverts the second part of bug 1548432.

Differential Revision: https://phabricator.services.mozilla.com/D31267

--HG--
extra : moz-landing-system : lando
2019-05-20 15:16:06 +00:00
Andrea Marchesini 32fb7a2445 Bug 1487113 - nsICacheInfoChannel.alternativeDataInputStream as attribute, r=valentin
Differential Revision: https://phabricator.services.mozilla.com/D31791

--HG--
extra : moz-landing-system : lando
2019-05-20 15:22:47 +00:00
Andrea Marchesini aa9560f5f0 Bug 1487113 - nsICacheInfoChannel.originalInputStream as attribute, r=valentin
Differential Revision: https://phabricator.services.mozilla.com/D31790

--HG--
extra : moz-landing-system : lando
2019-05-20 15:18:25 +00:00
Ryan Hunt f037851489 Bug 1525720, part 5 - Redirect nsIHttpChannel using content process ID instead of nsIRemoteTab. r=valentin
This code currently works for remote subframes assuming that nsIRemoteTab is implemented
by BrowserParent, but will break when nsIRemoteTab is only for a top-level BrowserParent.

What this code really wants is a content process ID to retarget the channel to. This
commit switches the interfaces to pass this around instead of nsIRemoteTab.

Differential Revision: https://phabricator.services.mozilla.com/D31435

--HG--
extra : source : 757b4f595cc4b18ae35483d23edff4896d15d4b1
2019-05-15 12:33:42 -05:00
Gurzau Raul 57f573a6ff Backed out 18 changesets (bug 1525720) for mass failures on Windows platform e.g ProcessPriorityManager.cpp on a CLOSED TREE.
Backed out changeset 1f2e86c2d691 (bug 1525720)
Backed out changeset 9b79caa460a0 (bug 1525720)
Backed out changeset e65cb2d4c5a5 (bug 1525720)
Backed out changeset 99f971a02d87 (bug 1525720)
Backed out changeset d25963c72ff7 (bug 1525720)
Backed out changeset 810b73719871 (bug 1525720)
Backed out changeset ee10a8254481 (bug 1525720)
Backed out changeset 1bcf9f586c55 (bug 1525720)
Backed out changeset d3b2ac8d5ca4 (bug 1525720)
Backed out changeset 697774dd8984 (bug 1525720)
Backed out changeset eadeacbe4483 (bug 1525720)
Backed out changeset 32eeee79d628 (bug 1525720)
Backed out changeset 07678a2fa9e7 (bug 1525720)
Backed out changeset 757b4f595cc4 (bug 1525720)
Backed out changeset b255e0a84e12 (bug 1525720)
Backed out changeset 9a255864f75d (bug 1525720)
Backed out changeset 5f1c1b609ec1 (bug 1525720)
Backed out changeset 00d83f1d02e0 (bug 1525720)
2019-05-23 01:57:16 +03:00
Ryan Hunt 3621e207d9 Bug 1525720, part 5 - Redirect nsIHttpChannel using content process ID instead of nsIRemoteTab. r=valentin
This code currently works for remote subframes assuming that nsIRemoteTab is implemented
by BrowserParent, but will break when nsIRemoteTab is only for a top-level BrowserParent.

What this code really wants is a content process ID to retarget the channel to. This
commit switches the interfaces to pass this around instead of nsIRemoteTab.

Differential Revision: https://phabricator.services.mozilla.com/D31435

--HG--
extra : rebase_source : be3303c2d38d704a6a1817fa45fd76700fae6287
extra : histedit_source : c7bf1e496f4328acc9ee70fcccdff98ea2cce5df
2019-05-15 12:33:42 -05:00
Andrea Marchesini 62236a7f79 Bug 1550050 - Fix intermittent failures in test_same_base_domain_3.html forcing no cache via HTTP headers, r=valentin
At the end of each test, file_chromecommon.js deletes all the cookies, but it
doesn't invalidate the network cache. Some of the files are shared between
tests. When they are loaded from the cache, we don't set the cookies and,
because of this, the tests were reporting a wrong cookie number.

Differential Revision: https://phabricator.services.mozilla.com/D31596

--HG--
extra : moz-landing-system : lando
2019-05-17 11:20:19 +00:00
Jonathan Kew 6476568714 Bug 1256009 - Add U+0138 to IDN character blocklist. r=valentin
Differential Revision: https://phabricator.services.mozilla.com/D31595

--HG--
extra : moz-landing-system : lando
2019-05-17 09:19:22 +00:00
Mihai Alexandru Michis 4916ef8c09 Merge mozilla-central to autoland. CLOSED TREE 2019-05-17 12:36:07 +03:00
Nico Grunbaum 07d183b29f Bug 1551702 - hide DataChannelConnection ctor, and set local port - r=bwc
Differential Revision: https://phabricator.services.mozilla.com/D31343

--HG--
extra : moz-landing-system : lando
2019-05-16 18:43:13 +00:00
Liang-Heng Chen 846a1486fa Bug 1550756 - make system principal fall into new traffic category; r=dragana
- add 2 category: system principals for normal/private browsing
- P3Basic* and P3Content* are labeled incorrectly
- add many assertions to check categories

Differential Revision: https://phabricator.services.mozilla.com/D30660

--HG--
extra : moz-landing-system : lando
2019-05-16 13:24:18 +00:00
Valentin Gosu cc95fd19b6 Bug 1540656 - Use dns-packet node module in test_trr.js r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D25671

--HG--
extra : moz-landing-system : lando
2019-05-16 06:22:06 +00:00
Andrea Marchesini 4e58d1f5a3 Bug 1551826 - Use StaticPrefs for network.cookie.staleThreshold in nsCookie, r=ckerschb
Differential Revision: https://phabricator.services.mozilla.com/D31218

--HG--
extra : moz-landing-system : lando
2019-05-15 13:33:47 +00:00
Andrea Marchesini 289365e128 Bug 1551821 - Get rid of pref network.cookie.same-site.enabled, r=ckerschb
Differential Revision: https://phabricator.services.mozilla.com/D31217

--HG--
extra : moz-landing-system : lando
2019-05-15 13:33:45 +00:00
Honza Bambas 4534b7e9ee Bug 1548804 - Remove origin suffix isolation for proxy credentials when setting authentication cache entry, r=valentin
Differential Revision: https://phabricator.services.mozilla.com/D30911

--HG--
extra : moz-landing-system : lando
2019-05-14 13:40:30 +00:00
Honza Bambas 7e08712a6a Bug 1550498, r=kershaw
Differential Revision: https://phabricator.services.mozilla.com/D30510

--HG--
extra : moz-landing-system : lando
2019-05-09 17:42:17 +00:00
Honza Bambas ad027c9594 Bug 1548822, r=kershaw,valentin
Differential Revision: https://phabricator.services.mozilla.com/D30364

--HG--
extra : moz-landing-system : lando
2019-05-09 16:39:59 +00:00
Honza Bambas f739775f6f Bug 1540759, r=valentin
Differential Revision: https://phabricator.services.mozilla.com/D30382

--HG--
extra : moz-landing-system : lando
2019-05-08 21:07:05 +00:00
dlee d7aece18ce Bug 1548517 - Add hash for test entries added via HostInPrefTables. r=baku
Origin telemetry expects every tracking channel has tracker's hash.
Without hash value for test entries, it will trigger MOZ_ASSERT while running
testcases.

Differential Revision: https://phabricator.services.mozilla.com/D30061

--HG--
extra : moz-landing-system : lando
2019-05-10 19:39:24 +00:00
dlee 00f63d827c Bug 1549405 - Use LOAD_BYPASS_URL_ClASSIFIER flag for TRR request. r=valentin
We should add LOAD_BYPASS_URL_ClASSIFIER to TRR request because if
"network.trr.mode" is set to 3, blocked TRR request means DNS resolution
fail, we don't fall back to regular DNS in this scenario.

Differential Revision: https://phabricator.services.mozilla.com/D30085

--HG--
extra : moz-landing-system : lando
2019-05-06 19:05:02 +00:00
Valentin Gosu 74914bc5a5 Bug 1548994 - Release nsCompleteUpgradeData.mUpgradeListener on the main thread as it is not always threadsafe r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D30022

--HG--
extra : moz-landing-system : lando
2019-05-13 22:49:02 +00:00
Andrew McCreight 2841945140 Bug 1550860 - Mark implicit builtinclass interfaces explicitly. r=nika
If an XPIDL interface has a method or attribute that is [notxpcom],
then it is implicitly treated as [builtinclass], even if it is not
marked as such. For clarity, this patch goes through and marks every
place that relies on this behavior (aside from some test code).

Differential Revision: https://phabricator.services.mozilla.com/D30714

--HG--
extra : moz-landing-system : lando
2019-05-13 19:51:49 +00:00
Michal Novotny 9bfa74da09 Bug 1550874 - Don't call SSL_SetResumptionToken if SSL_NO_CACHE option was set on the socket, r=valentin
We shouldn't search the cache and try to set TLS resumption token in nsSocketTransport::InitiateSocket() if the socket has SSL_NO_CACHE flag set, because NSS code might not honor the flag when the token is provided via API for external TLS session caches.

Differential Revision: https://phabricator.services.mozilla.com/D30726

--HG--
extra : moz-landing-system : lando
2019-05-13 15:14:46 +00:00
Andrew McCreight 4e2463d64c Bug 1550591 - nsIRequestTailUnblockCallback and nsIRequestContext don't need to be scriptable. r=valentin
Differential Revision: https://phabricator.services.mozilla.com/D30607

--HG--
extra : moz-landing-system : lando
2019-05-10 06:04:53 +00:00
Valentin Gosu 2246580609 Bug 1547882 - Fix test_bug337744.js that expects no %2f in the query of resource URLs r=kmag,kershaw
Differential Revision: https://phabricator.services.mozilla.com/D30351

--HG--
extra : moz-landing-system : lando
2019-05-10 13:56:27 +00:00
Valentin Gosu ab2249cd48 Bug 1547882 - Don't unescape %2e and %2f in the query or hash or moz-extension URLs. r=kershaw
Since the SubstitutingProtocolHandler is also extended by nsResProtocolHandler, this change would also apply to resource:// URLs.

Differential Revision: https://phabricator.services.mozilla.com/D30344

--HG--
extra : moz-landing-system : lando
2019-05-10 13:56:05 +00:00
Michal Novotny 224fc95a6b Bug 1548472 - Collect telemetry about how is the cache split by the content type, r=mayhemer
Like in case of bug 1506534, this telemetry is sampled periodically every time 2GB of data is written to the cache, i.e. when the cache was used for some time and there is a chance that its content has changed significantly.

Differential Revision: https://phabricator.services.mozilla.com/D29678

--HG--
extra : moz-landing-system : lando
2019-05-08 13:15:40 +00:00
Michal Novotny 242a096333 Bug 1546975 - Cache SSL resumption tokens in necko, r=mayhemer
SSLTokensCache is a simple memory only storage for resumption tokens which are get and set using API for external TLS session caches in NSS.

Differential Revision: https://phabricator.services.mozilla.com/D29465

--HG--
extra : moz-landing-system : lando
2019-05-09 22:04:43 +00:00
Byron Campen [:bwc] 6bc474b4f7 Bug 1548272: Don't look at mFlags in GetOrdered (since this is called on main). r=mjf
Differential Revision: https://phabricator.services.mozilla.com/D29529

--HG--
extra : moz-landing-system : lando
2019-05-09 15:37:55 +00:00
Byron Campen [:bwc] d9e760b079 Bug 1529612 - Part 4: Work around issue where receiver would get message before sender saw its bufferedAmount drop. r=mjf
Differential Revision: https://phabricator.services.mozilla.com/D30389

--HG--
extra : moz-landing-system : lando
2019-05-09 16:12:35 +00:00
Byron Campen [:bwc] eb8300b947 Bug 1529612 - Part 2: Keep/update bufferedAmount on main only. Some simplifications. r=mjf
Differential Revision: https://phabricator.services.mozilla.com/D28526

--HG--
extra : moz-landing-system : lando
2019-05-09 15:39:05 +00:00
Noemi Erli 6430d23336 Backed out 12 changesets (bug 1547813) for failures in browser_partitionedIndexedDB.js CLOSED TREE
Backed out changeset 98989127264b (bug 1547813)
Backed out changeset f9d790139a26 (bug 1547813)
Backed out changeset a29f58cef022 (bug 1547813)
Backed out changeset c1288949de1c (bug 1547813)
Backed out changeset 8cad4fd197b1 (bug 1547813)
Backed out changeset 807ce59e7e6e (bug 1547813)
Backed out changeset 06943593738c (bug 1547813)
Backed out changeset 4ced8d49ddc3 (bug 1547813)
Backed out changeset 77a040f527e9 (bug 1547813)
Backed out changeset b4651cfaff30 (bug 1547813)
Backed out changeset 279c140a4d71 (bug 1547813)
Backed out changeset 0e0241f3d366 (bug 1547813)
2019-05-09 20:04:16 +03:00
Ehsan Akhgari b9c7626390 Bug 1547813 - Part 9: Ensure the cookie service does third-party checks when the cookie policy is set to nsICookieService::BEHAVIOR_REJECT_TRACKER_AND_PARTITION_FOREIGN; r=baku
Differential Revision: https://phabricator.services.mozilla.com/D30118

--HG--
extra : moz-landing-system : lando
2019-05-08 19:38:08 +00:00
Ehsan Akhgari c7cb5521d1 Bug 1547813 - Part 8: Introduce a CookieSettings API to query whether cookies from third-party trackers must be rejected and use it in Gecko; r=baku
Differential Revision: https://phabricator.services.mozilla.com/D30117

--HG--
extra : moz-landing-system : lando
2019-05-08 20:22:18 +00:00
Ehsan Akhgari f33f21e80b Bug 1547813 - Part 7: Introduce a storage partitioning API; r=baku
This API abstracts away the details of the decision on what context should be
partitioned away from the consumers and centralizes the decision making into
the same location in the code base.

Differential Revision: https://phabricator.services.mozilla.com/D29742

--HG--
extra : moz-landing-system : lando
2019-05-08 20:15:13 +00:00
Ehsan Akhgari 564ae33dab Bug 1547813 - Part 1: Introduce nsICookieService::BEHAVIOR_REJECT_TRACKER_AND_PARTITION_FOREIGN; r=baku
This new code designates our new cookie policy for blocking cookies and
storage access from third-party trackers and partitioning the cookie jar
of the rest of third-party resources.

Differential Revision: https://phabricator.services.mozilla.com/D29736

--HG--
extra : moz-landing-system : lando
2019-05-08 19:37:40 +00:00
Kershaw Chang 0b4a4597ab Bug 1545226 - Enable gtests r=valentin
This patch fixes some build issues on Android and also enables some gtests.

Differential Revision: https://phabricator.services.mozilla.com/D30386

--HG--
extra : moz-landing-system : lando
2019-05-08 20:56:51 +00:00
Andrea Marchesini 42390cde39 Bug 1546598 - Remove domain cookies in nsICookieService.removeCookiesFromRootDomain(), r=Ehsan
Differential Revision: https://phabricator.services.mozilla.com/D30384

--HG--
extra : moz-landing-system : lando
2019-05-08 22:37:02 +00:00
Dragana Damjanovic 28355093cb Bug 1531344 - Be strict about incorrect chunked encoding. r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D28811

--HG--
extra : moz-landing-system : lando
2019-05-08 19:29:16 +00:00
Andrea Marchesini c97597a819 Bug 1457503 - Removal of http-equiv cookies. draft, r=jkt
Differential Revision: https://phabricator.services.mozilla.com/D29841

--HG--
extra : moz-landing-system : lando
2019-05-08 13:50:45 +00:00
Ehsan Akhgari 3d7881e880 Bug 1549011 - Ignore cookie name-value-pair strings with an empty name; r=baku
Differential Revision: https://phabricator.services.mozilla.com/D29929

--HG--
extra : moz-landing-system : lando
2019-05-08 08:51:42 +00:00
Haik Aftandilian 45bb7b8823 Bug 1546544 - Enable TCSM r=asuth,spohl,mccr8
Differential Revision: https://phabricator.services.mozilla.com/D29046

--HG--
extra : moz-landing-system : lando
2019-05-07 22:16:14 +00:00
Bogdan Tara be70e99ad1 Backed out changeset 723587a2ae49 (bug 1531344) for netwerk/test/unit/test_* failures CLOSED TREE 2019-05-08 00:04:32 +03:00
Dragana Damjanovic 463cf81c74 Bug 1531344 - Be strict about incorrect chunked encoding. r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D28811

--HG--
extra : moz-landing-system : lando
2019-05-07 17:57:33 +00:00
arthur.iakab 62df572c1c Backed out 2 changesets (bug 1546544) for causing mochitest-chrome test failures on automation.py CLOSED TREE
Backed out changeset d4b67960c0f9 (bug 1546544)
Backed out changeset fda45db5f8e9 (bug 1546544)
2019-05-07 05:38:37 +03:00
Valentin Gosu 987a27b272 Bug 1525640 - Add nsIHttpChannelInternal.isResolvedByTRR r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D26884

--HG--
extra : moz-landing-system : lando
2019-05-06 16:38:16 +00:00
Valentin Gosu b20ae58567 Bug 1525640 - Rename nsIHttpChannelInternal.trr to .isHttpServiceChannel to avoid confusion r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D26883

--HG--
extra : moz-landing-system : lando
2019-05-06 16:37:01 +00:00
Valentin Gosu 975c55c679 Bug 1525640 - Pass TRR status from sockettransport to channel r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D26882

--HG--
extra : moz-landing-system : lando
2019-05-06 16:47:14 +00:00
Haik Aftandilian cd1c25bb79 Bug 1546544 - Enable TCSM r=asuth,spohl,mccr8
Differential Revision: https://phabricator.services.mozilla.com/D29046

--HG--
extra : moz-landing-system : lando
2019-05-06 06:09:10 +00:00
Honza Bambas 994f162385 Bug 1549368 - Let proxyAuthorizationHeader and connectionIsolationKey in proxy.onRequest apply only to HTTPS proxies, no test, r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D30066

--HG--
extra : moz-landing-system : lando
2019-05-06 16:28:25 +00:00
Geoff Brown 069ac0b409 Bug 1545226 - Enable some android gtests in netwerk/test/gtest/parse-ftp; r=jmaher
With changes from bug 1548555, one of the gtests previously disabled on Android
can be re-enabled, but most of the tests in netwerk/test/gtest are still problematic
(some won't build for me).

Differential Revision: https://phabricator.services.mozilla.com/D30081

--HG--
extra : moz-landing-system : lando
2019-05-06 18:53:55 +00:00
Honza Bambas 2555fb9646 Bug 1545420 - Allow extensions to set Proxy-Authorization and connection isolation key through proxy.onRequest, r=dragana,mixedpuppy+mixedpuppy
Differential Revision: https://phabricator.services.mozilla.com/D29825

--HG--
extra : moz-landing-system : lando
2019-05-06 07:22:18 +00:00
dlee c46d88af6d Bug 1548486 - Set tracking info in fingerprinting annotation & cryptoming annotation. r=baku
The enable channels classified by these two features contain tracker's
hash value.

Differential Revision: https://phabricator.services.mozilla.com/D29647

--HG--
extra : moz-landing-system : lando
2019-05-02 16:06:56 +00:00
Cosmin Sabou 43e85c587a Bug 1140656 - Disable test_socks.js on mac debug for frequent failures. r=jmaher
Differential Revision: https://phabricator.services.mozilla.com/D29967

--HG--
extra : moz-landing-system : lando
2019-05-05 22:40:37 +00:00
Liang-Heng Chen 784cd8785e Bug 1544598 - Part 1: use hash to record origin telemetry; r=Ehsan
Differential Revision: https://phabricator.services.mozilla.com/D29357

--HG--
extra : moz-landing-system : lando
2019-05-03 15:37:14 +00:00
Andrea Marchesini 360fec5787 Bug 1542170 - Expose http channel Id to WebSocketEvent listeners, r=valentin
Differential Revision: https://phabricator.services.mozilla.com/D28865

--HG--
extra : moz-landing-system : lando
2019-05-03 17:25:44 +00:00
Andrea Marchesini fc1e01dc0b Bug 1542170 - Introduce nsIWebSocketChannel.httpChannelId, r=valentin
Differential Revision: https://phabricator.services.mozilla.com/D28864

--HG--
extra : moz-landing-system : lando
2019-05-03 17:25:24 +00:00
Andrea Marchesini 000c5d8a75 Bug 1320404 - Remove appId from origin attributes - part 4 - necko, r=valentin
Differential Revision: https://phabricator.services.mozilla.com/D29356

--HG--
extra : moz-landing-system : lando
2019-05-03 17:14:23 +00:00
Andrea Marchesini d179c5015e Bug 1320404 - Remove appId from origin attributes - part 2 - NO_APP_ID UNKNOWN_APP_ID, r=Ehsan
Differential Revision: https://phabricator.services.mozilla.com/D29354

--HG--
extra : moz-landing-system : lando
2019-05-03 17:13:47 +00:00
Andrea Marchesini f8565bf748 Bug 1320404 - Remove appId from origin attributes - part 1 - OriginAttributes and nsIPrincipal, r=Ehsan,flod
Differential Revision: https://phabricator.services.mozilla.com/D29353

--HG--
extra : moz-landing-system : lando
2019-05-03 17:13:17 +00:00
Geoff Brown 0f0beaf249 Bug 1546553 - Disable some xpcshell tests on Android x86_64; r=jmaher
These tests need to be disabled to get a green run on the Android x86_64
test platform. The failures in toolkit/components/extensions are
concerning and definitely require follow-up.

Differential Revision: https://phabricator.services.mozilla.com/D29843

--HG--
extra : moz-landing-system : lando
2019-05-03 16:50:15 +00:00
Liang-Heng Chen 9aff84c4b1 Bug 1546906 - use strict fingerprint category for telemetry; r=dragana,tanvi
Differential Revision: https://phabricator.services.mozilla.com/D28801

--HG--
extra : moz-landing-system : lando
2019-05-03 10:05:30 +00:00
Gurzau Raul b4e790d05f Merge inbound to mozilla-central. a=merge 2019-05-03 07:16:59 +03:00
Myk Melez bfe7c7e0b4 Bug 1547877 - enable configuration of new cert storage implementation r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D29306

--HG--
extra : moz-landing-system : lando
2019-05-02 23:02:13 +00:00
Gurzau Raul 0068b9927d Merge mozilla-central to autoland. a=merge CLOSED TREE 2019-05-03 01:17:27 +03:00
Gurzau Raul 39cabb27e2 Merge inbound to mozilla-central. a=merge 2019-05-03 01:02:21 +03:00
Ehsan Akhgari 782c6b7440 Bug 1548432 - Part 2: Ignore cookie name-value-pair strings without a "=" character; r=baku
Differential Revision: https://phabricator.services.mozilla.com/D29619

--HG--
extra : moz-landing-system : lando
2019-05-02 17:12:55 +00:00
Bogdan Tara 8244fce3c8 Backed out 3 changesets (bug 1525640) for frequent wpt failures CLOSED TREE
Backed out changeset d9a454afe9bf (bug 1525640)
Backed out changeset 19aa991328cb (bug 1525640)
Backed out changeset 4294abed890f (bug 1525640)
2019-05-03 00:16:20 +03:00
Perry Jiang cf811f1da6 Bug 1535699 - Propagate redirect mode across cross-process redirects. r=asuth
Differential Revision: https://phabricator.services.mozilla.com/D29719

--HG--
extra : moz-landing-system : lando
2019-05-02 20:46:34 +00:00
Gurzau Raul e54b1b421e Merge mozilla-central to inbound. a=merge CLOSED TREE 2019-05-03 01:19:30 +03:00
Thomas Nguyen 23e61a2595 Bug 1532318 - part 1: use ReferrerInfo class in nsIHttpChannel instead of referrer and referrer policy r=valentin,ckerschb,michal
Differential Revision: https://phabricator.services.mozilla.com/D22783

--HG--
extra : moz-landing-system : lando
2019-05-02 12:34:52 +00:00
Valentin Gosu 50b2b648b6 Bug 1525640 - Add nsIHttpChannelInternal.isResolvedByTRR r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D26884

--HG--
extra : moz-landing-system : lando
2019-05-02 12:53:45 +00:00
Valentin Gosu f96dbbf019 Bug 1525640 - Rename nsIHttpChannelInternal.trr to .isHttpServiceChannel to avoid confusion r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D26883

--HG--
extra : moz-landing-system : lando
2019-05-02 12:53:38 +00:00
Valentin Gosu e649e93aa1 Bug 1525640 - Pass TRR status from sockettransport to channel r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D26882

--HG--
extra : moz-landing-system : lando
2019-05-02 12:53:36 +00:00
Ehsan Akhgari 6fa7b44385 Bug 1543219 follow-up: Address review comment 2019-05-02 13:04:56 -04:00
Csoregi Natalia f6c688146a Merge mozilla-central to mozilla-inbound. CLOSED TREE 2019-05-17 01:00:41 +03:00
Fabio Alessandrelli aec49ddacd Bug 1529695: Implement RTCDataChannel.negotiated. r=bwc,smaug
--HG--
extra : amend_source : d16ca9ffde03d531b012c8f7263d49ef1137327b
2019-05-16 23:11:46 +02:00
Jorg K 0a06472d5d Bug 1543219 - Allow Mailnews to check protocol flags for cookie permissions. r=jorgk
This reinstates nsIProtocolHandler::URI_FORBIDS_COOKIE_ACCESS removed in bug 1517057, Part 1, rev 23a0332b18a1
2019-05-02 18:07:51 +02:00
Cosmin Sabou a884fb99d8 Backed out 4 changesets (bug 1320404) for xperf failures on permissions.sqlite-journal.
Backed out changeset fbacf18b6532 (bug 1320404)
Backed out changeset fed7c475d75c (bug 1320404)
Backed out changeset 557b586f774a (bug 1320404)
Backed out changeset 5a20b5f43280 (bug 1320404)
2019-05-02 04:51:18 +03:00
Andrea Marchesini 7a0fabb9f6 Bug 1320404 - Remove appId from origin attributes - part 4 - necko, r=valentin
Differential Revision: https://phabricator.services.mozilla.com/D29356

--HG--
extra : moz-landing-system : lando
2019-05-01 23:21:19 +00:00
Andrea Marchesini 36718d66c8 Bug 1320404 - Remove appId from origin attributes - part 2 - NO_APP_ID UNKNOWN_APP_ID, r=Ehsan
Differential Revision: https://phabricator.services.mozilla.com/D29354

--HG--
extra : moz-landing-system : lando
2019-05-01 23:21:54 +00:00
Andrea Marchesini 7e61125d8f Bug 1320404 - Remove appId from origin attributes - part 1 - OriginAttributes and nsIPrincipal, r=Ehsan,flod
Differential Revision: https://phabricator.services.mozilla.com/D29353

--HG--
extra : moz-landing-system : lando
2019-05-01 23:21:45 +00:00
Andrea Marchesini 4426f8f63b Bug 1548253 - Port pref cache variables of nsContentUtils to StaticPrefs - network.http.tailing.enabled, r=Ehsan
Differential Revision: https://phabricator.services.mozilla.com/D29520

--HG--
extra : moz-landing-system : lando
2019-05-01 21:10:31 +00:00
Andrea Marchesini 79d0eaf58e Bug 1548253 - Port pref cache variables of nsContentUtils to StaticPrefs - privacy.donottrackheader.enabled, r=Ehsan
Differential Revision: https://phabricator.services.mozilla.com/D29514

--HG--
extra : moz-landing-system : lando
2019-05-01 21:09:44 +00:00
Sylvestre Ledru e226046cb8 Bug 1547143 - Format the tree: Be prescriptive with the pointer style (left) r=Ehsan
# ignore-this-changeset

Depends on D28954

Differential Revision: https://phabricator.services.mozilla.com/D28956

--HG--
extra : moz-landing-system : lando
2019-05-01 08:47:10 +00:00
J.C. Jones 0100ed6dff Bug 1547860 - Update test_tls_server to use TLS 1.3 client cert alert logic r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D29384

--HG--
extra : moz-landing-system : lando
2019-04-30 21:32:51 +00:00
Geoff Lankow db8a35c1de Bug 1482809 - Move non-browser-specific parts of browser/components/enterprisepolicies to toolkit r=mkaply,Felipe
Differential Revision: https://phabricator.services.mozilla.com/D28309

--HG--
rename : browser/components/enterprisepolicies/EnterprisePolicies.js => toolkit/components/enterprisepolicies/EnterprisePolicies.js
rename : browser/components/enterprisepolicies/EnterprisePolicies.manifest => toolkit/components/enterprisepolicies/EnterprisePolicies.manifest
rename : browser/components/enterprisepolicies/EnterprisePoliciesContent.js => toolkit/components/enterprisepolicies/EnterprisePoliciesContent.js
rename : browser/components/enterprisepolicies/WindowsGPOParser.jsm => toolkit/components/enterprisepolicies/WindowsGPOParser.jsm
rename : browser/components/enterprisepolicies/macOSPoliciesParser.jsm => toolkit/components/enterprisepolicies/macOSPoliciesParser.jsm
rename : browser/components/enterprisepolicies/tests/EnterprisePolicyTesting.jsm => toolkit/components/enterprisepolicies/tests/EnterprisePolicyTesting.jsm
rename : browser/components/enterprisepolicies/tests/browser/browser_policies_basic_tests.js => toolkit/components/enterprisepolicies/tests/browser/browser_policies_basic_tests.js
rename : browser/components/enterprisepolicies/tests/browser/browser_policies_broken_json.js => toolkit/components/enterprisepolicies/tests/browser/browser_policies_broken_json.js
rename : browser/components/enterprisepolicies/tests/browser/browser_policies_enterprise_only.js => toolkit/components/enterprisepolicies/tests/browser/browser_policies_enterprise_only.js
rename : browser/components/enterprisepolicies/tests/browser/browser_policies_mistyped_json.js => toolkit/components/enterprisepolicies/tests/browser/browser_policies_mistyped_json.js
rename : browser/components/enterprisepolicies/tests/browser/config_broken_json.json => toolkit/components/enterprisepolicies/tests/browser/config_broken_json.json
extra : moz-landing-system : lando
2019-04-30 16:01:06 +00:00
Gurzau Raul f1e0f0ddf1 Backed out changeset 28b3bd8e5018 (bug 1482809) for using the wrong author.
--HG--
rename : toolkit/components/enterprisepolicies/EnterprisePolicies.js => browser/components/enterprisepolicies/EnterprisePolicies.js
rename : toolkit/components/enterprisepolicies/EnterprisePolicies.manifest => browser/components/enterprisepolicies/EnterprisePolicies.manifest
rename : toolkit/components/enterprisepolicies/EnterprisePoliciesContent.js => browser/components/enterprisepolicies/EnterprisePoliciesContent.js
rename : toolkit/components/enterprisepolicies/WindowsGPOParser.jsm => browser/components/enterprisepolicies/WindowsGPOParser.jsm
rename : toolkit/components/enterprisepolicies/macOSPoliciesParser.jsm => browser/components/enterprisepolicies/macOSPoliciesParser.jsm
rename : toolkit/components/enterprisepolicies/tests/EnterprisePolicyTesting.jsm => browser/components/enterprisepolicies/tests/EnterprisePolicyTesting.jsm
rename : toolkit/components/enterprisepolicies/tests/browser/browser_policies_basic_tests.js => browser/components/enterprisepolicies/tests/browser/browser_policies_basic_tests.js
rename : toolkit/components/enterprisepolicies/tests/browser/browser_policies_broken_json.js => browser/components/enterprisepolicies/tests/browser/browser_policies_broken_json.js
rename : toolkit/components/enterprisepolicies/tests/browser/browser_policies_enterprise_only.js => browser/components/enterprisepolicies/tests/browser/browser_policies_enterprise_only.js
rename : toolkit/components/enterprisepolicies/tests/browser/browser_policies_mistyped_json.js => browser/components/enterprisepolicies/tests/browser/browser_policies_mistyped_json.js
rename : toolkit/components/enterprisepolicies/tests/browser/config_broken_json.json => browser/components/enterprisepolicies/tests/browser/config_broken_json.json
2019-04-30 18:54:43 +03:00
Magnus Melin a032a45a18 Bug 1482809 - Move non-browser-specific parts of browser/components/enterprisepolicies to toolkit r=mkaply,Felipe
Differential Revision: https://phabricator.services.mozilla.com/D28309

--HG--
rename : browser/components/enterprisepolicies/EnterprisePolicies.js => toolkit/components/enterprisepolicies/EnterprisePolicies.js
rename : browser/components/enterprisepolicies/EnterprisePolicies.manifest => toolkit/components/enterprisepolicies/EnterprisePolicies.manifest
rename : browser/components/enterprisepolicies/EnterprisePoliciesContent.js => toolkit/components/enterprisepolicies/EnterprisePoliciesContent.js
rename : browser/components/enterprisepolicies/WindowsGPOParser.jsm => toolkit/components/enterprisepolicies/WindowsGPOParser.jsm
rename : browser/components/enterprisepolicies/macOSPoliciesParser.jsm => toolkit/components/enterprisepolicies/macOSPoliciesParser.jsm
rename : browser/components/enterprisepolicies/tests/EnterprisePolicyTesting.jsm => toolkit/components/enterprisepolicies/tests/EnterprisePolicyTesting.jsm
rename : browser/components/enterprisepolicies/tests/browser/browser_policies_basic_tests.js => toolkit/components/enterprisepolicies/tests/browser/browser_policies_basic_tests.js
rename : browser/components/enterprisepolicies/tests/browser/browser_policies_broken_json.js => toolkit/components/enterprisepolicies/tests/browser/browser_policies_broken_json.js
rename : browser/components/enterprisepolicies/tests/browser/browser_policies_enterprise_only.js => toolkit/components/enterprisepolicies/tests/browser/browser_policies_enterprise_only.js
rename : browser/components/enterprisepolicies/tests/browser/browser_policies_mistyped_json.js => toolkit/components/enterprisepolicies/tests/browser/browser_policies_mistyped_json.js
rename : browser/components/enterprisepolicies/tests/browser/config_broken_json.json => toolkit/components/enterprisepolicies/tests/browser/config_broken_json.json
extra : moz-landing-system : lando
2019-04-30 15:38:22 +00:00
Ehsan Akhgari c541551107 Bug 1547397 - Part 3: Move the permission manager code to extensions/permissions; r=baku
Differential Revision: https://phabricator.services.mozilla.com/D29116

--HG--
rename : extensions/cookie/nsPermission.cpp => extensions/permissions/nsPermission.cpp
rename : extensions/cookie/nsPermission.h => extensions/permissions/nsPermission.h
rename : extensions/cookie/nsPermissionManager.cpp => extensions/permissions/nsPermissionManager.cpp
rename : extensions/cookie/nsPermissionManager.h => extensions/permissions/nsPermissionManager.h
rename : extensions/cookie/test/.eslintrc.js => extensions/permissions/test/.eslintrc.js
rename : extensions/cookie/test/browser.ini => extensions/permissions/test/browser.ini
rename : extensions/cookie/test/browser_permmgr_sync.js => extensions/permissions/test/browser_permmgr_sync.js
rename : extensions/cookie/test/browser_permmgr_viewsrc.js => extensions/permissions/test/browser_permmgr_viewsrc.js
rename : extensions/cookie/test/gtest/PermissionManagerTest.cpp => extensions/permissions/test/gtest/PermissionManagerTest.cpp
rename : extensions/cookie/test/gtest/moz.build => extensions/permissions/test/gtest/moz.build
rename : extensions/cookie/test/moz.build => extensions/permissions/test/moz.build
rename : extensions/cookie/test/unit/test_permmanager_cleardata.js => extensions/permissions/test/unit/test_permmanager_cleardata.js
rename : extensions/cookie/test/unit/test_permmanager_default_pref.js => extensions/permissions/test/unit/test_permmanager_default_pref.js
rename : extensions/cookie/test/unit/test_permmanager_defaults.js => extensions/permissions/test/unit/test_permmanager_defaults.js
rename : extensions/cookie/test/unit/test_permmanager_expiration.js => extensions/permissions/test/unit/test_permmanager_expiration.js
rename : extensions/cookie/test/unit/test_permmanager_getAllForURI.js => extensions/permissions/test/unit/test_permmanager_getAllForURI.js
rename : extensions/cookie/test/unit/test_permmanager_getAllWithTypePrefix.js => extensions/permissions/test/unit/test_permmanager_getAllWithTypePrefix.js
rename : extensions/cookie/test/unit/test_permmanager_getPermissionObject.js => extensions/permissions/test/unit/test_permmanager_getPermissionObject.js
rename : extensions/cookie/test/unit/test_permmanager_idn.js => extensions/permissions/test/unit/test_permmanager_idn.js
rename : extensions/cookie/test/unit/test_permmanager_load_invalid_entries.js => extensions/permissions/test/unit/test_permmanager_load_invalid_entries.js
rename : extensions/cookie/test/unit/test_permmanager_local_files.js => extensions/permissions/test/unit/test_permmanager_local_files.js
rename : extensions/cookie/test/unit/test_permmanager_matches.js => extensions/permissions/test/unit/test_permmanager_matches.js
rename : extensions/cookie/test/unit/test_permmanager_matchesuri.js => extensions/permissions/test/unit/test_permmanager_matchesuri.js
rename : extensions/cookie/test/unit/test_permmanager_migrate_4-7.js => extensions/permissions/test/unit/test_permmanager_migrate_4-7.js
rename : extensions/cookie/test/unit/test_permmanager_migrate_4-7_no_history.js => extensions/permissions/test/unit/test_permmanager_migrate_4-7_no_history.js
rename : extensions/cookie/test/unit/test_permmanager_migrate_5-7a.js => extensions/permissions/test/unit/test_permmanager_migrate_5-7a.js
rename : extensions/cookie/test/unit/test_permmanager_migrate_5-7b.js => extensions/permissions/test/unit/test_permmanager_migrate_5-7b.js
rename : extensions/cookie/test/unit/test_permmanager_migrate_6-7a.js => extensions/permissions/test/unit/test_permmanager_migrate_6-7a.js
rename : extensions/cookie/test/unit/test_permmanager_migrate_6-7b.js => extensions/permissions/test/unit/test_permmanager_migrate_6-7b.js
rename : extensions/cookie/test/unit/test_permmanager_migrate_7-8.js => extensions/permissions/test/unit/test_permmanager_migrate_7-8.js
rename : extensions/cookie/test/unit/test_permmanager_notifications.js => extensions/permissions/test/unit/test_permmanager_notifications.js
rename : extensions/cookie/test/unit/test_permmanager_removeall.js => extensions/permissions/test/unit/test_permmanager_removeall.js
rename : extensions/cookie/test/unit/test_permmanager_removebytype.js => extensions/permissions/test/unit/test_permmanager_removebytype.js
rename : extensions/cookie/test/unit/test_permmanager_removebytypesince.js => extensions/permissions/test/unit/test_permmanager_removebytypesince.js
rename : extensions/cookie/test/unit/test_permmanager_removeforapp.js => extensions/permissions/test/unit/test_permmanager_removeforapp.js
rename : extensions/cookie/test/unit/test_permmanager_removepermission.js => extensions/permissions/test/unit/test_permmanager_removepermission.js
rename : extensions/cookie/test/unit/test_permmanager_removesince.js => extensions/permissions/test/unit/test_permmanager_removesince.js
rename : extensions/cookie/test/unit/test_permmanager_subdomains.js => extensions/permissions/test/unit/test_permmanager_subdomains.js
rename : extensions/cookie/test/unit/xpcshell.ini => extensions/permissions/test/unit/xpcshell.ini
extra : moz-landing-system : lando
2019-04-30 14:06:53 +00:00
Ehsan Akhgari 868c13b5e5 Bug 1547397 - Part 2: Move some xpcshell tests for cookies out of extensions/cookies; r=baku
Differential Revision: https://phabricator.services.mozilla.com/D29115

--HG--
rename : extensions/cookie/test/unit/head_cookies.js => netwerk/test/unit/head_cookies.js
rename : extensions/cookie/test/unit/test_bug526789.js => netwerk/test/unit/test_bug526789.js
rename : extensions/cookie/test/unit/test_bug650522.js => netwerk/test/unit/test_bug650522.js
rename : extensions/cookie/test/unit/test_bug667087.js => netwerk/test/unit/test_bug667087.js
rename : extensions/cookie/test/unit/test_cookies_async_failure.js => netwerk/test/unit/test_cookies_async_failure.js
rename : extensions/cookie/test/unit/test_cookies_persistence.js => netwerk/test/unit/test_cookies_persistence.js
rename : extensions/cookie/test/unit/test_cookies_privatebrowsing.js => netwerk/test/unit/test_cookies_privatebrowsing.js
rename : extensions/cookie/test/unit/test_cookies_profile_close.js => netwerk/test/unit/test_cookies_profile_close.js
rename : extensions/cookie/test/unit/test_cookies_read.js => netwerk/test/unit/test_cookies_read.js
rename : extensions/cookie/test/unit/test_cookies_sync_failure.js => netwerk/test/unit/test_cookies_sync_failure.js
rename : extensions/cookie/test/unit/test_cookies_thirdparty.js => netwerk/test/unit/test_cookies_thirdparty.js
rename : extensions/cookie/test/unit/test_cookies_thirdparty_nonsecure_session.js => netwerk/test/unit/test_cookies_thirdparty_nonsecure_session.js
rename : extensions/cookie/test/unit/test_cookies_thirdparty_session.js => netwerk/test/unit/test_cookies_thirdparty_session.js
rename : extensions/cookie/test/unit/test_domain_eviction.js => netwerk/test/unit/test_domain_eviction.js
rename : extensions/cookie/test/unit/test_eviction.js => netwerk/test/unit/test_eviction.js
rename : extensions/cookie/test/unit/test_schema_2_migration.js => netwerk/test/unit/test_schema_2_migration.js
rename : extensions/cookie/test/unit/test_schema_3_migration.js => netwerk/test/unit/test_schema_3_migration.js
extra : moz-landing-system : lando
2019-04-30 14:06:27 +00:00
Ehsan Akhgari 3252b3943e Bug 1547397 - Part 1: Move some mochitests and browser-chrome tests for cookies out of extensions/cookies; r=baku
Differential Revision: https://phabricator.services.mozilla.com/D29117

--HG--
rename : extensions/cookie/test/browser_test_favicon.js => netwerk/test/browser/browser_test_favicon.js
rename : extensions/cookie/test/damonbowling.jpg => netwerk/test/browser/damonbowling.jpg
rename : extensions/cookie/test/damonbowling.jpg^headers^ => netwerk/test/browser/damonbowling.jpg^headers^
rename : extensions/cookie/test/beltzner.jpg => netwerk/test/mochitests/beltzner.jpg
rename : extensions/cookie/test/beltzner.jpg^headers^ => netwerk/test/mochitests/beltzner.jpg^headers^
rename : extensions/cookie/test/file_chromecommon.js => netwerk/test/mochitests/file_chromecommon.js
rename : extensions/cookie/test/file_domain_hierarchy_inner.html => netwerk/test/mochitests/file_domain_hierarchy_inner.html
rename : extensions/cookie/test/file_domain_hierarchy_inner_inner.html => netwerk/test/mochitests/file_domain_hierarchy_inner_inner.html
rename : extensions/cookie/test/file_domain_hierarchy_inner_inner_inner.html => netwerk/test/mochitests/file_domain_hierarchy_inner_inner_inner.html
rename : extensions/cookie/test/file_domain_inner.html => netwerk/test/mochitests/file_domain_inner.html
rename : extensions/cookie/test/file_domain_inner_inner.html => netwerk/test/mochitests/file_domain_inner_inner.html
rename : extensions/cookie/test/file_image_inner.html => netwerk/test/mochitests/file_image_inner.html
rename : extensions/cookie/test/file_image_inner_inner.html => netwerk/test/mochitests/file_image_inner_inner.html
rename : extensions/cookie/test/file_loadflags_inner.html => netwerk/test/mochitests/file_loadflags_inner.html
rename : extensions/cookie/test/file_localhost_inner.html => netwerk/test/mochitests/file_localhost_inner.html
rename : extensions/cookie/test/file_loopback_inner.html => netwerk/test/mochitests/file_loopback_inner.html
rename : extensions/cookie/test/file_subdomain_inner.html => netwerk/test/mochitests/file_subdomain_inner.html
rename : extensions/cookie/test/file_testcommon.js => netwerk/test/mochitests/file_testcommon.js
rename : extensions/cookie/test/file_testloadflags.js => netwerk/test/mochitests/file_testloadflags.js
rename : extensions/cookie/test/file_testloadflags_chromescript.js => netwerk/test/mochitests/file_testloadflags_chromescript.js
rename : extensions/cookie/test/image1.png => netwerk/test/mochitests/image1.png
rename : extensions/cookie/test/image1.png^headers^ => netwerk/test/mochitests/image1.png^headers^
rename : extensions/cookie/test/image1.png => netwerk/test/mochitests/image2.png
rename : extensions/cookie/test/image2.png^headers^ => netwerk/test/mochitests/image2.png^headers^
rename : extensions/cookie/test/test1.css => netwerk/test/mochitests/test1.css
rename : extensions/cookie/test/test1.css^headers^ => netwerk/test/mochitests/test1.css^headers^
rename : extensions/cookie/test/test1.css => netwerk/test/mochitests/test2.css
rename : extensions/cookie/test/test2.css^headers^ => netwerk/test/mochitests/test2.css^headers^
rename : extensions/cookie/test/test_different_domain_in_hierarchy.html => netwerk/test/mochitests/test_different_domain_in_hierarchy.html
rename : extensions/cookie/test/test_differentdomain.html => netwerk/test/mochitests/test_differentdomain.html
rename : extensions/cookie/test/test_image.html => netwerk/test/mochitests/test_image.html
rename : extensions/cookie/test/test_loadflags.html => netwerk/test/mochitests/test_loadflags.html
rename : extensions/cookie/test/test_same_base_domain.html => netwerk/test/mochitests/test_same_base_domain.html
rename : extensions/cookie/test/test_same_base_domain_2.html => netwerk/test/mochitests/test_same_base_domain_2.html
rename : extensions/cookie/test/test_same_base_domain_3.html => netwerk/test/mochitests/test_same_base_domain_3.html
rename : extensions/cookie/test/test_same_base_domain_4.html => netwerk/test/mochitests/test_same_base_domain_4.html
rename : extensions/cookie/test/test_same_base_domain_5.html => netwerk/test/mochitests/test_same_base_domain_5.html
rename : extensions/cookie/test/test_same_base_domain_6.html => netwerk/test/mochitests/test_same_base_domain_6.html
rename : extensions/cookie/test/test_samedomain.html => netwerk/test/mochitests/test_samedomain.html
extra : moz-landing-system : lando
2019-04-30 14:07:12 +00:00
Sebastian Hengst 3dd01e8232 Backed out 4 changesets (bug 1501108) for causing very frequent leaks in macOS debug wpt tests. a=backout
Backed out changeset 23a77e063257 (bug 1501108)
Backed out changeset 335cec0aacd8 (bug 1501108)
Backed out changeset 99ba286125d1 (bug 1501108)
Backed out changeset 8f2d511ad49f (bug 1501108)

--HG--
extra : rebase_source : 01925c24ac47b37135fcfebab8ae7e9876d5b90e
2019-04-29 17:39:42 +02:00
dlee b57dd97761 Bug 1545033 - P3. SetTrackingInfo in UrlClassifierFeatureTrackingAnnotation. r=baku
Differential Revision: https://phabricator.services.mozilla.com/D28791

--HG--
extra : moz-landing-system : lando
2019-04-26 13:04:41 +00:00
dlee 2baaee894b Bug 1545033 - P2. Add SetMatchedTrackingInfo in nsIClassifiedChannel. r=baku
This patch adds |setMatchedTrackingInfo| to channel to report matches that
are found in tracking annotation tables.

We have done something similar in nsIClassifiedChannel::setMatchedInfo to
report phishing protection matches.

Differential Revision: https://phabricator.services.mozilla.com/D28790

--HG--
extra : moz-landing-system : lando
2019-04-26 13:03:50 +00:00
dlee daa17adb9e Bug 1545033 - P1. Pass matched hash values to ProcessChannel. r=baku
In origin telemetry, we want to record the matching statistic of each entry
in our tracking tables. To identify which entry a given URL matches, it needs
the hash value that matches the safe browsing database.

This patch passes the hash value to ProcessChannel so Features can obtain the
information and pass it.

Note that it is possible that an URL may find multiple matches. If an URL matches
hash A of list 1 and hash B of list 2, the parameter in ProcessChannel looks like:
aList = [list 1, list2]
aHashes = [hash A, hash B]

Differential Revision: https://phabricator.services.mozilla.com/D28789

--HG--
extra : moz-landing-system : lando
2019-04-26 13:02:35 +00:00
Ehsan Akhgari 2422b99643 Bug 1535697 - Part 7: Pass the isolated flag to the nsHttpConnectionInfo constructor when cloning the object; r=michal
Building the hashkey for these objects will soon depend on the isolated flag,
therefore we need to ensure that it is available when cloning the objects
inside the constructor.  This patch refactors the clone method to avoid using
SetIsolated().

Differential Revision: https://phabricator.services.mozilla.com/D28377

--HG--
extra : moz-landing-system : lando
2019-04-29 17:09:41 +00:00
Ehsan Akhgari b1bd6e9654 Bug 1535697 - Part 6: Use separate network connections for isolated third-party trackers; r=michal
Differential Revision: https://phabricator.services.mozilla.com/D28376

--HG--
extra : moz-landing-system : lando
2019-04-29 17:09:41 +00:00
Ehsan Akhgari 45d4036c98 Bug 1535697 - Part 5: Pass the top window origin to nsHttpConnectionInfo objects when constructing them; r=michal
Differential Revision: https://phabricator.services.mozilla.com/D28375

--HG--
extra : moz-landing-system : lando
2019-04-29 17:09:40 +00:00
Ehsan Akhgari 969addfef3 Bug 1535697 - Part 4: Refactor the code for computing the origin of the top window for a channel and remember its result on the channel object; r=michal
Differential Revision: https://phabricator.services.mozilla.com/D28374

--HG--
extra : moz-landing-system : lando
2019-04-29 17:09:39 +00:00
Ehsan Akhgari dc946ab989 Bug 1535697 - Part 3: Only consider third-party tracking resources as isolated channels; r=michal
Differential Revision: https://phabricator.services.mozilla.com/D28373

--HG--
extra : moz-landing-system : lando
2019-04-29 17:09:39 +00:00
Ehsan Akhgari 3fcf2c3bae Bug 1535697 - Part 2: Represent whether the channel is isolated by anti-tracking as a separate axis on the connection info hash key; r=michal
Differential Revision: https://phabricator.services.mozilla.com/D28372

--HG--
extra : moz-landing-system : lando
2019-04-29 17:09:37 +00:00
Ehsan Akhgari 7fb3204d5c Bug 1535697 - Part 1: Avoid calling AntiTrackingCommon::IsFirstPartyStorageAccessGrantedFor() more than once per channel; r=michal
Differential Revision: https://phabricator.services.mozilla.com/D28371

--HG--
extra : moz-landing-system : lando
2019-04-29 17:09:32 +00:00
Cosmin Sabou 9ce8571e7a Merge mozilla-central to autoland. 2019-04-29 12:57:24 +03:00