Andreas Farre
c208b33fc0
Bug 1646474 - Remove LoadInfo::mDocumentHasLoaded. r=nika,necko-reviewers
...
Differential Revision: https://phabricator.services.mozilla.com/D96010
2020-11-10 12:45:22 +00:00
julianwels
2efbb0d597
Bug 1674926 - Collect telemetry for mixed display content upgrades. r=necko-reviewers,ckerschb,valentin
...
Differential Revision: https://phabricator.services.mozilla.com/D95921
2020-11-09 14:40:30 +00:00
Christoph Kerschbaumer
085e06de67
Bug 1658265: HTTPS-Only - Simplify LogMessage and exempt certain loads from being logged to the console. r=JulianWels
...
Differential Revision: https://phabricator.services.mozilla.com/D86918
2020-08-14 00:22:59 +00:00
Christoph Kerschbaumer
86017275d2
Bug 1642387: Prevent HTTPS-Only timeouts by sending http request in the background with a 3000ms delay. If that http request returns before the upgraded request, it's an indicator the https request will result in a timeout and we show the error... r=mattwoodrow,dragana,JulianWels
...
...page instead. r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D85300
2020-08-12 12:57:22 +00:00
Razvan Maries
b755f7fdb0
Backed out 2 changesets (bug 1642387) for perma failures on browser_errorpage_timeout.js. CLOSED TREE
...
Backed out changeset f09be3d0ab1b (bug 1642387)
Backed out changeset 5349b1df5595 (bug 1642387)
2020-08-10 21:04:03 +03:00
Christoph Kerschbaumer
a91ff39f2f
Bug 1642387: Prevent HTTPS-Only timeouts by sending http request in the background with a 500ms delay. If that http request returns before the upgraded request, it's an indicator the https request will result in a timeout and we show the error... r=mattwoodrow,dragana,JulianWels
...
...page instead. r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D85300
2020-08-10 16:34:39 +00:00
Sebastian Streich
fb1d1dc1df
Bug 1558394 - Pass the TriggeringSandboxFlags to nsILoadinfo r=ckerschb,smaug,necko-reviewers,valentin
...
Add triggering Sandbox flags to loadinfo
***
Pass triggering Flags into Loadinfo
***
Fix triggeringSandboxflags passing
Differential Revision: https://phabricator.services.mozilla.com/D69588
2020-07-29 11:43:23 +00:00
Anny Gakhokidze
deced955d5
Bug 1642468 - Part 1: Remove all outer windowId fields from LoadInfo, r=kmag
...
Differential Revision: https://phabricator.services.mozilla.com/D83562
2020-07-17 17:13:26 +00:00
Frederik Braun
a7153982e8
Bug 1366973: Rename security flags to not contain DATA anymore r=geckoview-reviewers,ckerschb,snorp
...
Differential Revision: https://phabricator.services.mozilla.com/D83490
2020-07-15 11:20:45 +00:00
Kris Maglione
5837ad4bdd
Bug 1580764: Part 3 - Remove unused AncestorOuterWindowIDs from LoadInfo. r=nika
...
Differential Revision: https://phabricator.services.mozilla.com/D82465
2020-07-07 21:14:34 +00:00
Kris Maglione
bd94db4e9a
Bug 1580764: Part 2 - Use BrowsingContext IDs rather than window IDs to compute frame IDs. r=zombie
...
Differential Revision: https://phabricator.services.mozilla.com/D82464
2020-07-07 21:37:53 +00:00
Kris Maglione
01ca404c30
Bug 1580764: Part 1 - Add ancestor BrowsingContext IDs to LoadInfo. r=nika
...
Differential Revision: https://phabricator.services.mozilla.com/D82463
2020-07-07 21:14:42 +00:00
Daisuke Akatsuka
14e2eb6c29
Bug 1646974: Introduce and use isInDevToolsContext flag. r=Honza,necko-reviewers,dragana
...
Differential Revision: https://phabricator.services.mozilla.com/D80623
2020-06-29 09:34:54 +00:00
Andrea Marchesini
6aa5b38d30
Bug 1641905
- ThirdPartyUtil::IsThirdPartyWindow for fission, r=dimi,necko-reviewers,dragana
...
Differential Revision: https://phabricator.services.mozilla.com/D79307
2020-06-17 20:18:23 +00:00
Razvan Maries
d653f63b03
Backed out changeset 1c9058277ddd (bug 1641905
) for perma failures on test_ext_cookies_firstParty.js. CLOSED TREE
2020-06-16 22:16:58 +03:00
Andrea Marchesini
f7efe6a94c
Bug 1641905
- ThirdPartyUtil::IsThirdPartyWindow for fission, r=dimi,necko-reviewers,dragana
...
Differential Revision: https://phabricator.services.mozilla.com/D79307
2020-06-16 17:46:41 +00:00
Anny Gakhokidze
21a581c031
Bug 1631859 - Part 1: Fill out ancestor principals and outer window IDs for LoadInfo only in the parent, r=kmag,extension-reviewers
...
Keeping a list of ancestor principals in a LoadInfo object, that, at times,
exists in the content process, is not secure. Since ancestor principals are
only ever needed to create a list of frameAncestors, which, in turn, are only
ever accessed from the parent process, we can assemble lists of ancestor
principals and outer windowIDs whenever we are in the parent process and are
either 1) creating a LoadInfo object or 2) deserializing a LoadInfoArgs struct,
received from content process, into a LoadInfo object.
Differential Revision: https://phabricator.services.mozilla.com/D78406
2020-06-08 19:58:14 +00:00
Eden Chuang
16b5f23697
Bug 1532287 - P2 Propagate loading document/worker's COEP to nsHttpChannel through nsILoadInfo r=necko-reviewers,valentin,JuniorHsu
...
Currently, the worker's COEP is saved in WorkerPrivate and not be respected when loading resources in workers.
This patch adds an attribute loadingEmbedderPolicy in nsILoadInfo, which indicates the COEP header the loading must be respected.
The default value of loadingEmbedderPolicy is nsILoadInfo::EMBEDDER_POLICY_NULL.
loadingEmbedderPolicy is initialized with the COEP of the BrowsingContext used for creating LoadInfo.
And it could be set to other value when fetch in workers.
Differential Revision: https://phabricator.services.mozilla.com/D73690
2020-05-19 12:50:39 +00:00
Razvan Maries
481517ce87
Backed out 2 changesets (bug 1558394) for perma failures on iframe_sandbox_anchor_download_block_downloads.sub.tentative.html. CLOSED TREE
...
Backed out changeset 79046ff8143b (bug 1558394)
Backed out changeset e13ede3c68d4 (bug 1558394)
2020-05-15 19:18:34 +03:00
Sebastian Streich
bb0855332f
Bug 1558394 - Pass the TriggeringSandboxFlags to nsILoadinfo r=ckerschb,smaug,necko-reviewers,valentin
...
Add triggering Sandbox flags to loadinfo
***
Pass triggering Flags into Loadinfo
Differential Revision: https://phabricator.services.mozilla.com/D69588
2020-05-15 14:03:28 +00:00
Bogdan Tara
edcb53f163
Backed out 2 changesets (bug 1558394) for nsDocShellLoadState related bustage CLOSED TREE
...
Backed out changeset 5889105bd089 (bug 1558394)
Backed out changeset 80a0ea17c9f8 (bug 1558394)
2020-05-14 15:17:32 +03:00
Sebastian Streich
9ce86dc585
Bug 1558394 - Pass the TriggeringSandboxFlags to nsILoadinfo r=ckerschb,smaug,necko-reviewers,valentin
...
Add triggering Sandbox flags to loadinfo
***
Pass triggering Flags into Loadinfo
Differential Revision: https://phabricator.services.mozilla.com/D69588
2020-05-14 10:04:44 +00:00
Tim Huang
1fa1133990
Bug 1633851 - Part 1: Add a 'IsThirdPartyContextToTopWindow' flag to LoadInfo. r=baku
...
We add a 'IsThirdPartyContextToTopWindow' flag in the LoadInfo. This
flag shows if the channel is considered as a third party related to the
top-level window.
This flag would be set when opening the channel in the parent process.
Differential Revision: https://phabricator.services.mozilla.com/D73199
2020-05-13 13:38:41 +00:00
Christoph Kerschbaumer
7e43ad336f
Bug 1621987: Implement Sec-Fetch-User. r=baku,edgar,Gijs
...
Differential Revision: https://phabricator.services.mozilla.com/D69392
--HG--
extra : moz-landing-system : lando
2020-04-16 08:04:26 +00:00
Christoph Kerschbaumer
4935907607
Bug 1627963: Remove requestContext from CSP shouldload and replace with fission friendly primitives. r=mattwoodrow
...
Differential Revision: https://phabricator.services.mozilla.com/D70173
--HG--
extra : moz-landing-system : lando
2020-04-10 10:56:57 +00:00
Bogdan Tara
33bc5f92db
Backed out changeset 55c37e8a6563 (bug 1627963) for test_csp_reports.js failures CLOSED TREE
2020-04-09 13:18:25 +03:00
Christoph Kerschbaumer
667d022b80
Bug 1627963: Remove requestContext from CSP shouldload and replace with fission friendly primitives. r=mattwoodrow
...
Differential Revision: https://phabricator.services.mozilla.com/D70173
--HG--
extra : moz-landing-system : lando
2020-04-09 07:47:52 +00:00
Frederik Braun
1a204fbc01
Bug 1613609 - add 'allowDeprecatedSystemRequests' loadinfo flag r=ckerschb
...
Differential Revision: https://phabricator.services.mozilla.com/D68035
--HG--
extra : moz-landing-system : lando
2020-04-07 11:55:20 +00:00
Emilio Cobos Álvarez
4b9fdf3d73
Bug 1627707 - Rename LoadInfo::LoadingPrincipal to GetLoadingPrincipal as it can return null. r=ckerschb
...
Mostly a matter of:
rg -l '\->LoadingPrincipal' | xargs sed -i 's/->LoadingPrincipal/->GetLoadingPrincipal/g'
And then clang-format. But I tweaked manually nsHttpChannelAuthProvider (move
the variable where it's used, don't take a useless strong ref),
AddonContentPolicy (move the declaration of the variable to the if condition),
and BackgroundUtils (same).
Differential Revision: https://phabricator.services.mozilla.com/D69828
--HG--
extra : moz-landing-system : lando
2020-04-06 18:57:36 +00:00
Cosmin Sabou
d557e2ed22
Backed out 3 changesets (bug 1627707) for build bustages @ mozilla::net::LoadInfo.
...
Backed out changeset 65d6a90651ce (bug 1627707)
Backed out changeset 378ec30d9979 (bug 1627707)
Backed out changeset 058a19e11b06 (bug 1627707)
2020-04-06 20:07:04 +03:00
Emilio Cobos Álvarez
97872f2fee
Bug 1627707 - Rename LoadInfo::LoadingPrincipal to GetLoadingPrincipal as it can return null. r=ckerschb
...
Mostly a matter of:
rg -l '\->LoadingPrincipal' | xargs sed -i 's/->LoadingPrincipal/->GetLoadingPrincipal/g'
And then clang-format. But I tweaked manually nsHttpChannelAuthProvider (move
the variable where it's used, don't take a useless strong ref),
AddonContentPolicy (move the declaration of the variable to the if condition),
and BackgroundUtils (same).
Differential Revision: https://phabricator.services.mozilla.com/D69828
--HG--
extra : moz-landing-system : lando
2020-04-06 16:00:43 +00:00
Tim Huang
da4b3a697c
Bug 1616788 - Part 1: Add a hasStoragePermission flag in the LoadInfo. r=dimi,baku
...
We add a flag 'HasStoragePermission' in the LoadInfo. This flag
represents whether the loading document, for docuemnt loads, or the
loading resource has the storage permission. And this flag would only
get updated in the parent process when opening the channel.
Differential Revision: https://phabricator.services.mozilla.com/D67466
--HG--
extra : moz-landing-system : lando
2020-03-30 14:10:07 +00:00
JulianWels
b9a66ff272
Bug 1622028 - Log failed upgrades for HTTPS Only Mode. r=ckerschb,dragana
...
Differential Revision: https://phabricator.services.mozilla.com/D68026
--HG--
extra : moz-landing-system : lando
2020-03-27 17:09:15 +00:00
Oana Pop Rus
679f10ce5f
Backed out changeset 9d3487044f9a (bug 1622028) for build bustages in nsHTTPSOnlyStreamListener.h on a CLOSED TREE
2020-03-27 17:47:07 +02:00
JulianWels
8d65d4a658
Bug 1622028 - Log failed upgrades for HTTPS Only Mode. r=ckerschb,dragana
...
Differential Revision: https://phabricator.services.mozilla.com/D68026
--HG--
extra : moz-landing-system : lando
2020-03-27 14:35:33 +00:00
sonakshi
d0bf0d67e0
Bug 1608599 - Add preloaded status for requests in the Network panel r=valentin
...
Differential Revision: https://phabricator.services.mozilla.com/D67764
--HG--
extra : moz-landing-system : lando
2020-03-25 13:04:35 +00:00
JulianWels
e5c3036681
Bug 1620242 - Basic implementation for HTTPS Only Mode. r=ckerschb,mixedpuppy
...
Differential Revision: https://phabricator.services.mozilla.com/D62590
--HG--
rename : dom/security/test/csp/file_redirect_report.sjs => dom/security/test/https-only/file_redirect.sjs
rename : dom/security/test/csp/file_upgrade_insecure.html => dom/security/test/https-only/file_upgrade_insecure.html
rename : dom/security/test/csp/file_upgrade_insecure_server.sjs => dom/security/test/https-only/file_upgrade_insecure_server.sjs
rename : dom/security/test/csp/file_upgrade_insecure_wsh.py => dom/security/test/https-only/file_upgrade_insecure_wsh.py
extra : moz-landing-system : lando
2020-03-17 19:24:31 +00:00
Noemi Erli
f10f67e74c
Backed out changeset 21f62488a5b5 (bug 1620242) for causing bustages in nsMixedContentBlocker.cpp CLOSED TREE
2020-03-16 23:11:00 +02:00
JulianWels
c2c4e65115
Bug 1620242 - Basic implementation for HTTPS Only Mode. r=ckerschb,mixedpuppy
...
Differential Revision: https://phabricator.services.mozilla.com/D62590
--HG--
rename : dom/security/test/csp/file_redirect_report.sjs => dom/security/test/https-only/file_redirect.sjs
rename : dom/security/test/csp/file_upgrade_insecure.html => dom/security/test/https-only/file_upgrade_insecure.html
rename : dom/security/test/csp/file_upgrade_insecure_server.sjs => dom/security/test/https-only/file_upgrade_insecure_server.sjs
rename : dom/security/test/csp/file_upgrade_insecure_wsh.py => dom/security/test/https-only/file_upgrade_insecure_wsh.py
extra : moz-landing-system : lando
2020-03-16 16:47:54 +00:00
Mihai Alexandru Michis
75355611d1
Backed out changeset 46dfbb4de902 (bug 1620242) for causing failures in test_x-frame-options.html
...
CLOSED TREE
2020-03-13 18:24:03 +02:00
JulianWels
d5b073f588
Bug 1620242 - Basic implementation for HTTPS Only Mode. r=ckerschb,mixedpuppy
...
Differential Revision: https://phabricator.services.mozilla.com/D62590
--HG--
rename : dom/security/test/csp/file_redirect_report.sjs => dom/security/test/https-only/file_redirect.sjs
rename : dom/security/test/csp/file_upgrade_insecure.html => dom/security/test/https-only/file_upgrade_insecure.html
rename : dom/security/test/csp/file_upgrade_insecure_server.sjs => dom/security/test/https-only/file_upgrade_insecure_server.sjs
rename : dom/security/test/csp/file_upgrade_insecure_wsh.py => dom/security/test/https-only/file_upgrade_insecure_wsh.py
extra : moz-landing-system : lando
2020-03-13 14:25:08 +00:00
Tim Huang
04d44bae12
Bug 1616570 - Part 1: Rename CookieSettings to CookieJarSettings. r=Ehsan
...
Given that we are going to add ContentBlockingAllowList in
CookieSettings, so CookieSettings will be responsible for more stuff than the
cookie behavior and cookie permission. We should use a proper name to
reflect the purpose of it. The name 'CookieSettings' is misleading that
this is only for cookie related stuff. So, we decide to rename
'CookieSettins' to 'CookieJarSettings' which serves better meaning here.
Differential Revision: https://phabricator.services.mozilla.com/D63935
--HG--
rename : netwerk/cookie/CookieSettings.cpp => netwerk/cookie/CookieJarSettings.cpp
rename : netwerk/cookie/nsICookieSettings.idl => netwerk/cookie/nsICookieJarSettings.idl
extra : moz-landing-system : lando
2020-03-04 08:59:08 +00:00
Dan Glastonbury
89e79e2d97
Bug 1616171 - P2: nsILoadInfo::targetBrowsingContext attribute. r=mattwoodrow,nika
...
This new attribute on nsILoadInfo allows retrieving the BrowsingContext and
BrowsingContextId for the BC of the document to be loaded by an nsILoadInfo.
Differential Revision: https://phabricator.services.mozilla.com/D63127
--HG--
extra : moz-landing-system : lando
2020-02-25 23:17:53 +00:00
Valentin Gosu
1ced192f38
Bug 1607460 - Align with Cross-Origin-Opener-Policy changes r=michal
...
See: https://gist.github.com/annevk/6f2dd8c79c77123f39797f6bdac43f3e/f39cac7bf3a8a894059879f15c5b7b41f0195e29
The definition of the header is now:
Cross-Origin-Opener-Policy = %s"same-origin" / %s"same-origin-allow-popups" / %s"unsafe-none"; case-sensitive
Differential Revision: https://phabricator.services.mozilla.com/D60480
--HG--
extra : moz-landing-system : lando
2020-02-18 16:39:08 +00:00
Perry Jiang
c2250891d2
Bug 1264175 - remove FetchEvent.isReload r=dom-workers-and-storage-reviewers,valentin,sg,bzbarsky
...
isReload is no longer a property defined by the FetchEvent specification.
Differential Revision: https://phabricator.services.mozilla.com/D60774
--HG--
extra : moz-landing-system : lando
2020-01-25 00:05:12 +00:00
shindli
78f9c85759
Backed out changeset 86d1da74131f (bug 1264175) for causing mochitest failures in dom/serviceworkers/test/test_fetch_event.html CLOSED TREE
2020-01-24 06:18:04 +02:00
Perry Jiang
64699e71f7
Bug 1264175 - remove FetchEvent.isReload r=dom-workers-and-storage-reviewers,valentin,sg,bzbarsky
...
isReload is no longer a property defined by the FetchEvent specification.
Differential Revision: https://phabricator.services.mozilla.com/D60774
--HG--
extra : moz-landing-system : lando
2020-01-24 02:38:01 +00:00
Andrea Marchesini
d2e146600e
Bug 1507055 - Implement Anti-tracking heuristic for redirects, r=Ehsan
...
Differential Revision: https://phabricator.services.mozilla.com/D56191
--HG--
extra : moz-landing-system : lando
2020-01-21 18:18:32 +00:00
Noemi Erli
e5fff9caae
Backed out 2 changesets (bug 1507055) for causing build bustages in AntiTrackingCommon.cpp CLOSED TREE
...
Backed out changeset be170480919d (bug 1507055)
Backed out changeset 678dd02cf719 (bug 1507055)
2020-01-21 20:14:36 +02:00
Andrea Marchesini
f97dcc5818
Bug 1507055 - Implement Anti-tracking heuristic for redirects, r=Ehsan
...
Differential Revision: https://phabricator.services.mozilla.com/D56191
--HG--
extra : moz-landing-system : lando
2020-01-21 17:59:33 +00:00