Граф коммитов

5991 Коммитов

Автор SHA1 Сообщение Дата
Sylvestre Ledru 645f2d5773 Bug 1519636 - Reformat recent changes to the Google coding style r=Ehsan
# ignore-this-changeset

Differential Revision: https://phabricator.services.mozilla.com/D41559

--HG--
extra : moz-landing-system : lando
2019-08-13 07:15:25 +00:00
Narcis Beleuzu f53affe1cb Backed out 22 changesets (bug 1231213) for build bustages on RemoteWorkerChild.cpp . CLOSED TREE
Backed out changeset 6f25a7e73fe2 (bug 1231213)
Backed out changeset 5e88c3855fb6 (bug 1231213)
Backed out changeset a78d7b3e44af (bug 1231213)
Backed out changeset eb7f3a9b0a42 (bug 1231213)
Backed out changeset 87575a180ad5 (bug 1231213)
Backed out changeset 4e8369314e87 (bug 1231213)
Backed out changeset 039c34bc043c (bug 1231213)
Backed out changeset 0528ab68d94e (bug 1231213)
Backed out changeset 670e7d61d95c (bug 1231213)
Backed out changeset d61b9d65bd0a (bug 1231213)
Backed out changeset 9042ea694d40 (bug 1231213)
Backed out changeset bc0607e0d50b (bug 1231213)
Backed out changeset 196ee18781cb (bug 1231213)
Backed out changeset 4b588dec466b (bug 1231213)
Backed out changeset be6031a6fca7 (bug 1231213)
Backed out changeset 12e04c22f52f (bug 1231213)
Backed out changeset fd146f327f2d (bug 1231213)
Backed out changeset f2af7b66f50d (bug 1231213)
Backed out changeset 71d93fc98d3f (bug 1231213)
Backed out changeset 280271806864 (bug 1231213)
Backed out changeset ca4e828345a2 (bug 1231213)
Backed out changeset e41b984510ad (bug 1231213)
2019-08-13 07:47:05 +03:00
Perry Jiang 166ecc9374 Bug 1231213 - Correctly choose nsBufferedStream's underlying nsIInputStream after initialization. r=asuth
Differential Revision: https://phabricator.services.mozilla.com/D26159

--HG--
extra : moz-landing-system : lando
2019-08-13 04:03:12 +00:00
Junior Hsu 122ebb1e31 Bug 1543066 - P1 Implement COOP:unsafe-inherit r=nika
Differential Revision: https://phabricator.services.mozilla.com/D40356

--HG--
extra : moz-landing-system : lando
2019-08-10 23:24:41 +00:00
Csoregi Natalia c1b14876f2 Backed out 2 changesets (bug 1543066) for COOP related failures on new_window_null.tentative.html. CLOSED TREE
Backed out changeset 8b50000b89dd (bug 1543066)
Backed out changeset 20f44d88ae9c (bug 1543066)
2019-08-11 02:18:57 +03:00
Junior Hsu 2e3d48bb52 Bug 1543066 - P1 Implement COOP:unsafe-inherit r=nika
Differential Revision: https://phabricator.services.mozilla.com/D40356

--HG--
extra : moz-landing-system : lando
2019-08-10 18:16:20 +00:00
Junior Hsu 15adda2765 Bug 1543068 - P3 Take COEP into account for COOP mismatch r=nika
Step 9 in obtain a cross-origin opener-policy
https://gist.github.com/annevk/6f2dd8c79c77123f39797f6bdac43f3e

Differential Revision: https://phabricator.services.mozilla.com/D38950

--HG--
extra : moz-landing-system : lando
2019-08-08 19:00:00 +00:00
Junior Hsu 2247427ef2 Bug 1543068 - P1 Substitute Cross-Origin header with COEP r=nika
(a) Substitute Cross-Origin header with COEP
(b) Forcing cors in FetchDriver is removed since COEP doesn't need to IIUC

Differential Revision: https://phabricator.services.mozilla.com/D38788

--HG--
extra : moz-landing-system : lando
2019-08-08 18:38:03 +00:00
Tom Schuster d2d9c3ff60 Bug 1558915 - Use infallible nsIURI::SchemeIs in netwerk/. r=baku
Sorry I had some problems figuring out who can review netwerk/. Most people seem to be on PTO.

Differential Revision: https://phabricator.services.mozilla.com/D41175

--HG--
extra : moz-landing-system : lando
2019-08-08 13:02:36 +00:00
Ehsan Akhgari 6eeefccacb Bug 1566825 - Part 2: Support storing and querying for anti-tracking permission grants in private windows; r=baku
Differential Revision: https://phabricator.services.mozilla.com/D40363

--HG--
extra : moz-landing-system : lando
2019-08-06 20:07:21 +00:00
Andreea Pavel f6c90e68d3 Backed out 2 changesets (bug 1566825) for build bustages on a CLOSED TREE
Backed out changeset 7fcd3effcc45 (bug 1566825)
Backed out changeset 15de0b815be9 (bug 1566825)
2019-08-06 21:17:16 +03:00
Ehsan Akhgari 725049201c Bug 1566825 - Part 2: Support storing and querying for anti-tracking permission grants in private windows; r=baku
Differential Revision: https://phabricator.services.mozilla.com/D40363

--HG--
extra : moz-landing-system : lando
2019-08-05 08:30:22 +00:00
Kershaw Chang 93e82cb323 Bug 1569196 - Make ChildDNSService run on socket process r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D40592

--HG--
extra : moz-landing-system : lando
2019-08-05 20:54:01 +00:00
Emilio Cobos Álvarez 6da1e7506f Bug 1499000 - Make CORS use the right security flags to check whether an URL can be loaded. r=ckerschb
This fixes at least part of the problem. Without this patch, some of the flags
may get lost, like the ALLOW_CHROME flag which controls whether stuff like
resource:// URLs can be loaded or not.

Differential Revision: https://phabricator.services.mozilla.com/D40633

--HG--
extra : moz-landing-system : lando
2019-08-05 19:28:00 +00:00
Razvan Maries 518b15a876 Merge mozilla-central to mozilla-inbound. a=merge on a CLOSED TREE 2019-08-02 01:52:58 +03:00
Sebastian Streich 6917b697b8 Bug 1428473 Support X-Content-Type-Options: nosniff when navigating r=ckerschb,dragana,alchen
***
Apply Requested Revision

Differential Revision: https://phabricator.services.mozilla.com/D33959

--HG--
extra : moz-landing-system : lando
2019-07-31 16:59:53 +00:00
Irakli Gozalishvili 7bc070b022 Bug 1271553 - Add known dweb protocols and ext+ to the standard list r=kershaw
Fix for the Bug 1536744 removed abiliti for nsIProtocolHandler to parse URLs of the
custom protocols & broke libdweb. In order to fix followup change for Bug 1559356 introduced a
whitelist for dweb: and dat: protocols to parse those as nsIStandardURLs. This change extends
whitelist with ipfs: ipns: ssb: schemes and ext+ prefix scheme.

This would allow Bug 1271553 to progress until better more general solution can be implemnted.

Differential Revision: https://phabricator.services.mozilla.com/D39463

--HG--
extra : moz-landing-system : lando
2019-07-31 19:52:30 +00:00
Johann Hofmann 7b984428e8 Bug 1567826 - Don't mark any secureContext pages as insecure. r=nhnt11,keeler,Ehsan
Differential Revision: https://phabricator.services.mozilla.com/D39012

--HG--
extra : moz-landing-system : lando
2019-07-30 12:31:22 +00:00
Ciure Andrei e432090afa Backed out changeset ded87cc3f3ee (bug 1567826) for causing browser_check_identity_state.js to perma fail CLOSED TREE 2019-07-30 12:50:29 +03:00
Johann Hofmann 04c28108fc Bug 1567826 - Don't mark any secureContext pages as insecure. r=nhnt11,keeler,Ehsan
Differential Revision: https://phabricator.services.mozilla.com/D39012

--HG--
extra : moz-landing-system : lando
2019-07-30 07:52:59 +00:00
Mihai Alexandru Michis b644b1615f Backed out changeset 8d6593460b06 (bug 1271553) for mochitest failures. 2019-07-30 07:46:46 +03:00
Irakli Gozalishvili e83a6e8364 Bug 1271553 - Add known dweb protocols and ext+ to the standard list r=kershaw
Fix for the Bug 1536744 removed abiliti for nsIProtocolHandler to parse URLs of the
custom protocols & broke libdweb. In order to fix followup change for Bug 1559356 introduced a
whitelist for dweb: and dat: protocols to parse those as nsIStandardURLs. This change extends
whitelist with ipfs: ipns: ssb: schemes and ext+ prefix scheme.

This would allow Bug 1271553 to progress until better more general solution can be implemnted.

Differential Revision: https://phabricator.services.mozilla.com/D39463

--HG--
extra : moz-landing-system : lando
2019-07-29 23:58:08 +00:00
Kris Maglione 85c7f7187f Bug 1566186: Part 1 - Remove DocShell support for isolated mozbrowsers. r=nika
This functionality is currently unused, and blocks work needed to support
Fission.

Differential Revision: https://phabricator.services.mozilla.com/D39542

--HG--
extra : rebase_source : 1d8fdea73d48c714112d13844f5110f7f1892dda
2019-07-16 16:40:19 -07:00
Kannan Vijayan 3fb6190ec6 Bug 1559414 - Rename unaudited pre-fission methods with SameProcess for future audit burndown. r=nika
Differential Revision: https://phabricator.services.mozilla.com/D39378

--HG--
extra : moz-landing-system : lando
2019-07-26 16:48:31 +00:00
Nicholas Nethercote 18fae65f38 Bug 1563139 - Remove StaticPrefs.h. r=glandium
This requires replacing inclusions of it with inclusions of more specific prefs
files.

The exception is that StaticPrefsAll.h, which is equivalent to StaticPrefs.h,
and is used in `Codegen.py` because doing something smarter is tricky and
suitable for a follow-up. As a result, any change to StaticPrefList.yaml will
still trigger recompilation of all the generated DOM bindings files, but that's
still a big improvement over trigger recompilation of every file that uses
static prefs.

Most of the changes in this commit are very boring. The only changes that are
not boring are modules/libpref/*, Codegen.py, and ServoBindings.toml.

Differential Revision: https://phabricator.services.mozilla.com/D39138

--HG--
extra : moz-landing-system : lando
2019-07-26 01:10:23 +00:00
Andreea Pavel 14071390d5 Backed out 2 changesets (bug 1567892) for build bustages on a CLOSED TREE
Backed out changeset edcdfaa8a2b1 (bug 1567892)
Backed out changeset 3aef1ee02e9b (bug 1567892)
2019-07-25 08:26:29 +03:00
Andrea Marchesini 6b1b4929af Bug 1567892 - PeerConnectionMedia should use nsIProtocolProxyService on the parent process - part 1 - nsProtocolProxyService on parent process only, r=bwc,kershaw
Differential Revision: https://phabricator.services.mozilla.com/D39009

--HG--
extra : moz-landing-system : lando
2019-07-24 18:32:26 +00:00
Bogdan Tara e50924670e Backed out 2 changesets (bug 1567892) for build bustages complaining about PNecko.ipdl CLOSED TREE
Backed out changeset 18a1d7fe61e0 (bug 1567892)
Backed out changeset b1b922fe6c11 (bug 1567892)
2019-07-24 18:59:39 +03:00
Andrea Marchesini 2aff622028 Bug 1567892 - PeerConnectionMedia should use nsIProtocolProxyService on the parent process - part 1 - nsProtocolProxyService on parent process only, r=bwc,kershaw
Differential Revision: https://phabricator.services.mozilla.com/D39009

--HG--
extra : moz-landing-system : lando
2019-07-24 15:13:24 +00:00
Benjamin 6da0bbfd32 Bug 1566453: Added flag to detect if a load was initiated by a form submission r=ckerschb
The flag in loadinfo can be used to detect if a load was initiated by a form submission. This is crucial for implmenting the CSP directive navigate-to. https://www.w3.org/TR/CSP3/#navigate-to-pre-navigate

Differential Revision: https://phabricator.services.mozilla.com/D38403

--HG--
extra : moz-landing-system : lando
2019-07-22 13:41:47 +00:00
Michal Novotny 8b628d8cc7 Bug 1544127 - Make LoadInfo refcounting thread-safe, r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D38347

--HG--
extra : moz-landing-system : lando
2019-07-18 21:46:29 +00:00
Andrea Marchesini e1f54861b2 Bug 1563313 - AsyncApplyFilters must set mProxyInfo only when if it has not already been canceled, r=mayhemer
Otherwise, in the CTOR, we crash becaues of MOZ_ASSERT(!mProxyInfo);

Differential Revision: https://phabricator.services.mozilla.com/D37162

--HG--
extra : moz-landing-system : lando
2019-07-16 14:17:57 +00:00
Byron Campen [:bwc] 1353b31f42 Bug 1555792: Disable the socket process if e10s is disabled. r=kershaw
Differential Revision: https://phabricator.services.mozilla.com/D37506

--HG--
extra : moz-landing-system : lando
2019-07-11 17:00:37 +00:00
Mihai Alexandru Michis 7441986e1b Backed out 2 changesets (bug 1563313) for failures in test_protocolproxyservice.js CLOSED TREE
Backed out changeset 0585bc6ff55b (bug 1563313)
Backed out changeset 3b9ef89d8c5c (bug 1563313)
2019-07-15 23:57:57 +03:00
Andrea Marchesini 8966ad5733 Bug 1563313 - AsyncApplyFilters must set mProxyInfo only when if it has not already been canceled, r=mayhemer
Otherwise, in the CTOR, we crash becaues of MOZ_ASSERT(!mProxyInfo);

Differential Revision: https://phabricator.services.mozilla.com/D37162

--HG--
extra : moz-landing-system : lando
2019-07-15 13:07:06 +00:00
Boris Zbarsky 5062731c15 Bug 1565688. Remove unused IOService arg from NS_NewURI. r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D37968

--HG--
extra : moz-landing-system : lando
2019-07-15 13:39:51 +00:00
Ciure Andrei 6a2a7ad8b6 Backed out 3 changesets (bug 1563313) for causing various xpcshell tests to perma fail CLOSED TREE
Backed out changeset 55ecf0dacd00 (bug 1563313)
Backed out changeset 624d3e47b069 (bug 1563313)
Backed out changeset 5c7df32d9028 (bug 1563313)
2019-07-15 15:46:04 +03:00
Andrea Marchesini 50b96b3edb Bug 1563313 - AsyncApplyFilters must set mProxyInfo only when if it has not already been canceled, r=mayhemer
Otherwise, in the CTOR, we crash becaues of MOZ_ASSERT(!mProxyInfo);

Differential Revision: https://phabricator.services.mozilla.com/D37162

--HG--
extra : moz-landing-system : lando
2019-07-15 11:37:08 +00:00
Michal Novotny 4e82c1dc19 Bug 1556487 - Replace HttpChannelParentListener with a more generic class, r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D37573

--HG--
rename : netwerk/protocol/http/HttpChannelParentListener.cpp => netwerk/protocol/http/ParentChannelListener.cpp
rename : netwerk/protocol/http/HttpChannelParentListener.h => netwerk/protocol/http/ParentChannelListener.h
extra : moz-landing-system : lando
2019-07-11 16:06:06 +00:00
Jonathan Kingston 31441f82ea Bug 1560455 - rename CodebasePrincipal to ContentPrincipal. r=ckerschb
Differential Revision: https://phabricator.services.mozilla.com/D35504

--HG--
extra : moz-landing-system : lando
2019-07-08 16:37:45 +00:00
Sylvestre Ledru 2bf505b023 Bug 1562642 - Add missing MPL2 headers r=mhoye
Differential Revision: https://phabricator.services.mozilla.com/D37053

--HG--
extra : moz-landing-system : lando
2019-07-05 17:05:57 +00:00
Andrea Marchesini ac791bf6a1 Bug 1558299 - Add a pref to treat File: URLs as unique origins, r=ckerschb
Differential Revision: https://phabricator.services.mozilla.com/D36920

--HG--
extra : moz-landing-system : lando
2019-07-05 09:16:06 +00:00
Victor Porof 2c53a5dcd9 Bug 1561435 - Format netwerk/, a=automatic-formatting
# ignore-this-changeset

Differential Revision: https://phabricator.services.mozilla.com/D35919

--HG--
extra : source : afa5bd771feba466ba7670c58f3d93233a14e202
2019-07-05 10:55:23 +02:00
arthur.iakab 7bc47eec9b Backed out 2 changesets (bug 1552168) for causing mochitest crashes on test_menubar.xul CLOSED TREE
Backed out changeset 83590619ce06 (bug 1552168)
Backed out changeset 7ff83cc5d33a (bug 1552168)
2019-07-03 16:08:23 +03:00
Sebastian Streich e7a3fe847e Bug 1552168 - Remove Pref data_uri.unique_opaque_origin r=ckerschb
Differential Revision: https://phabricator.services.mozilla.com/D35005

--HG--
extra : moz-landing-system : lando
2019-07-03 10:23:29 +00:00
Valentin Gosu a09f77fb6b Bug 1551601 - When performing a cross process redirect update the loadInfo to have the correct browsingContext r=nika
Differential Revision: https://phabricator.services.mozilla.com/D35839

--HG--
extra : moz-landing-system : lando
2019-06-30 20:20:51 +00:00
Narcis Beleuzu dcc603a037 Backed out changeset 2719ba46ac12 (bug 1551601) for causing xpcshell failures. CLOSED TREE 2019-06-29 02:41:31 +03:00
Valentin Gosu 8c3c48e159 Bug 1551601 - When performing a cross process redirect update the loadInfo to have the correct browsingContext r=nika
Differential Revision: https://phabricator.services.mozilla.com/D35839

--HG--
extra : moz-landing-system : lando
2019-06-28 21:10:13 +00:00
Valentin Gosu ce90534047 Bug 1561005 - Add nsINetworkLinkService.networkID r=michal
Differential Revision: https://phabricator.services.mozilla.com/D35683

--HG--
extra : moz-landing-system : lando
2019-06-28 11:42:12 +00:00
Valentin Gosu 1fc5fb9a40 Bug 1395914 - Figure out network id for IPv6 too (Linux) r=michal
Differential Revision: https://phabricator.services.mozilla.com/D34903

--HG--
extra : moz-landing-system : lando
2019-06-28 11:42:18 +00:00