Граф коммитов

17747 Коммитов

Автор SHA1 Сообщение Дата
Sebastian Hengst 3dd01e8232 Backed out 4 changesets (bug 1501108) for causing very frequent leaks in macOS debug wpt tests. a=backout
Backed out changeset 23a77e063257 (bug 1501108)
Backed out changeset 335cec0aacd8 (bug 1501108)
Backed out changeset 99ba286125d1 (bug 1501108)
Backed out changeset 8f2d511ad49f (bug 1501108)

--HG--
extra : rebase_source : 01925c24ac47b37135fcfebab8ae7e9876d5b90e
2019-04-29 17:39:42 +02:00
dlee b57dd97761 Bug 1545033 - P3. SetTrackingInfo in UrlClassifierFeatureTrackingAnnotation. r=baku
Differential Revision: https://phabricator.services.mozilla.com/D28791

--HG--
extra : moz-landing-system : lando
2019-04-26 13:04:41 +00:00
dlee 2baaee894b Bug 1545033 - P2. Add SetMatchedTrackingInfo in nsIClassifiedChannel. r=baku
This patch adds |setMatchedTrackingInfo| to channel to report matches that
are found in tracking annotation tables.

We have done something similar in nsIClassifiedChannel::setMatchedInfo to
report phishing protection matches.

Differential Revision: https://phabricator.services.mozilla.com/D28790

--HG--
extra : moz-landing-system : lando
2019-04-26 13:03:50 +00:00
dlee daa17adb9e Bug 1545033 - P1. Pass matched hash values to ProcessChannel. r=baku
In origin telemetry, we want to record the matching statistic of each entry
in our tracking tables. To identify which entry a given URL matches, it needs
the hash value that matches the safe browsing database.

This patch passes the hash value to ProcessChannel so Features can obtain the
information and pass it.

Note that it is possible that an URL may find multiple matches. If an URL matches
hash A of list 1 and hash B of list 2, the parameter in ProcessChannel looks like:
aList = [list 1, list2]
aHashes = [hash A, hash B]

Differential Revision: https://phabricator.services.mozilla.com/D28789

--HG--
extra : moz-landing-system : lando
2019-04-26 13:02:35 +00:00
Ehsan Akhgari 2422b99643 Bug 1535697 - Part 7: Pass the isolated flag to the nsHttpConnectionInfo constructor when cloning the object; r=michal
Building the hashkey for these objects will soon depend on the isolated flag,
therefore we need to ensure that it is available when cloning the objects
inside the constructor.  This patch refactors the clone method to avoid using
SetIsolated().

Differential Revision: https://phabricator.services.mozilla.com/D28377

--HG--
extra : moz-landing-system : lando
2019-04-29 17:09:41 +00:00
Ehsan Akhgari b1bd6e9654 Bug 1535697 - Part 6: Use separate network connections for isolated third-party trackers; r=michal
Differential Revision: https://phabricator.services.mozilla.com/D28376

--HG--
extra : moz-landing-system : lando
2019-04-29 17:09:41 +00:00
Ehsan Akhgari 45d4036c98 Bug 1535697 - Part 5: Pass the top window origin to nsHttpConnectionInfo objects when constructing them; r=michal
Differential Revision: https://phabricator.services.mozilla.com/D28375

--HG--
extra : moz-landing-system : lando
2019-04-29 17:09:40 +00:00
Ehsan Akhgari 969addfef3 Bug 1535697 - Part 4: Refactor the code for computing the origin of the top window for a channel and remember its result on the channel object; r=michal
Differential Revision: https://phabricator.services.mozilla.com/D28374

--HG--
extra : moz-landing-system : lando
2019-04-29 17:09:39 +00:00
Ehsan Akhgari dc946ab989 Bug 1535697 - Part 3: Only consider third-party tracking resources as isolated channels; r=michal
Differential Revision: https://phabricator.services.mozilla.com/D28373

--HG--
extra : moz-landing-system : lando
2019-04-29 17:09:39 +00:00
Ehsan Akhgari 3fcf2c3bae Bug 1535697 - Part 2: Represent whether the channel is isolated by anti-tracking as a separate axis on the connection info hash key; r=michal
Differential Revision: https://phabricator.services.mozilla.com/D28372

--HG--
extra : moz-landing-system : lando
2019-04-29 17:09:37 +00:00
Ehsan Akhgari 7fb3204d5c Bug 1535697 - Part 1: Avoid calling AntiTrackingCommon::IsFirstPartyStorageAccessGrantedFor() more than once per channel; r=michal
Differential Revision: https://phabricator.services.mozilla.com/D28371

--HG--
extra : moz-landing-system : lando
2019-04-29 17:09:32 +00:00
Cosmin Sabou 9ce8571e7a Merge mozilla-central to autoland. 2019-04-29 12:57:24 +03:00
Gurzau Raul 2c2d5c8e3d Backed out 7 changesets (bug 1535697) for causing Bug 1547596. a=backout
Backed out changeset 037390836504 (bug 1535697)
Backed out changeset ebad998aae7a (bug 1535697)
Backed out changeset 969945148b3d (bug 1535697)
Backed out changeset 5cbdeb635a3e (bug 1535697)
Backed out changeset c316d49df8c4 (bug 1535697)
Backed out changeset 4a5475f6aa49 (bug 1535697)
Backed out changeset 9191d987a9e1 (bug 1535697)
2019-04-29 01:05:24 +03:00
Andrea Marchesini 071573bc71 Bug 1541339 - WebSocket channel should use the correct CookieSettings in workers, r=Ehsan
Differential Revision: https://phabricator.services.mozilla.com/D28949

--HG--
extra : moz-landing-system : lando
2019-04-26 22:51:42 +00:00
Kershaw Chang 351a470dad Bug 1544526 - Copy the callback instead of moving r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D27894

--HG--
extra : moz-landing-system : lando
2019-04-26 18:33:28 +00:00
Ehsan Akhgari f3548957c4 Bug 1535697 - Part 7: Pass the isolated flag to the nsHttpConnectionInfo constructor when cloning the object; r=michal
Building the hashkey for these objects will soon depend on the isolated flag,
therefore we need to ensure that it is available when cloning the objects
inside the constructor.  This patch refactors the clone method to avoid using
SetIsolated().

Differential Revision: https://phabricator.services.mozilla.com/D28377

--HG--
extra : moz-landing-system : lando
2019-04-27 01:34:41 +00:00
Ehsan Akhgari 8d5e253237 Bug 1535697 - Part 6: Use separate network connections for isolated third-party trackers; r=michal
Differential Revision: https://phabricator.services.mozilla.com/D28376

--HG--
extra : moz-landing-system : lando
2019-04-27 01:34:39 +00:00
Ehsan Akhgari 1d483abfeb Bug 1535697 - Part 5: Pass the top window origin to nsHttpConnectionInfo objects when constructing them; r=michal
Differential Revision: https://phabricator.services.mozilla.com/D28375

--HG--
extra : moz-landing-system : lando
2019-04-27 01:34:37 +00:00
Ehsan Akhgari fef6fe14e0 Bug 1535697 - Part 4: Refactor the code for computing the origin of the top window for a channel and remember its result on the channel object; r=michal
Differential Revision: https://phabricator.services.mozilla.com/D28374

--HG--
extra : moz-landing-system : lando
2019-04-27 07:47:52 +00:00
Ehsan Akhgari a709cc3a40 Bug 1535697 - Part 3: Only consider third-party tracking resources as isolated channels; r=michal
Differential Revision: https://phabricator.services.mozilla.com/D28373

--HG--
extra : moz-landing-system : lando
2019-04-27 01:34:32 +00:00
Ehsan Akhgari f2113beb89 Bug 1535697 - Part 2: Represent whether the channel is isolated by anti-tracking as a separate axis on the connection info hash key; r=michal
Differential Revision: https://phabricator.services.mozilla.com/D28372

--HG--
extra : moz-landing-system : lando
2019-04-27 01:34:30 +00:00
Ehsan Akhgari c64e2314b0 Bug 1535697 - Part 1: Avoid calling AntiTrackingCommon::IsFirstPartyStorageAccessGrantedFor() more than once per channel; r=michal
Differential Revision: https://phabricator.services.mozilla.com/D28371

--HG--
extra : moz-landing-system : lando
2019-04-27 01:34:23 +00:00
Edwin Gao a0b7203b57 Bug 1547412 - re-enable tests in netwerk/test/unit/xpcshell.ini for windows10-aarch64 r=jmaher
Re-enable the tests due to the dependent bug being resolved with a fix.

Differential Revision: https://phabricator.services.mozilla.com/D29087

--HG--
extra : moz-landing-system : lando
2019-04-27 00:36:39 +00:00
Ehsan Akhgari bba7e3c8b0 Bug 1547114 - Part 8: Move nsCookiePermission to netwerk/cookie; r=baku
Differential Revision: https://phabricator.services.mozilla.com/D29078

--HG--
rename : extensions/cookie/nsCookiePermission.cpp => netwerk/cookie/nsCookiePermission.cpp
rename : extensions/cookie/nsCookiePermission.h => netwerk/cookie/nsCookiePermission.h
extra : moz-landing-system : lando
2019-04-26 22:31:57 +00:00
Dana Keeler c90cfeaf74 bug 1441989 - remove ContentVerifier r=baku,mayhemer
ContentVerifier has been dead code since bug 1355166 (which, incidentally, means
it has no tests). Its presence is preventing improvements to
ContentSignatureVerifier (see e.g. bug 1534600), so this patch removes it.
As a result, the nsILoadInfo attributes verifySignedContent and enforceSRI are
also unused, so this patch removes those as well.

Differential Revision: https://phabricator.services.mozilla.com/D28885

--HG--
extra : moz-landing-system : lando
2019-04-26 22:21:36 +00:00
Cosmin Sabou 6041076346 Backed out changeset daeba572395d (bug 1541339) for xpcshell failures on test_dns_proxy_bypass. 2019-04-26 21:26:21 +03:00
Ehsan Akhgari c8fea1ecad Bug 1547114 - Part 5: Remove nsICookiePermission::CanAccess(); r=baku
Differential Revision: https://phabricator.services.mozilla.com/D28996

--HG--
extra : moz-landing-system : lando
2019-04-26 15:41:07 +00:00
Andrea Marchesini 1e2d43b310 Bug 1541339 - WebSocket channel should use the correct CookieSettings in workers, r=Ehsan
Differential Revision: https://phabricator.services.mozilla.com/D28949

--HG--
extra : moz-landing-system : lando
2019-04-26 17:44:59 +00:00
Ehsan Akhgari 565bc7aba8 Bug 1547114 - Part 1: Remove nsICookiePermission::CanAccessURI(); r=baku
Differential Revision: https://phabricator.services.mozilla.com/D28914

--HG--
extra : moz-landing-system : lando
2019-04-26 15:49:17 +00:00
Andreea Pavel 81b8902215 Backed out 4 changesets (bug 1547114) for multiple failures e.g. xpcshell at test_SitePermissions.js on a CLOSED TREE
Backed out changeset 4167117f548f (bug 1547114)
Backed out changeset 0a4180b074ea (bug 1547114)
Backed out changeset c92df939a4d6 (bug 1547114)
Backed out changeset fc4e5936eeae (bug 1547114)
2019-04-26 18:35:28 +03:00
Liang-Heng Chen 984a2d5906 Bug 1546796 - Fix swapped traffic category descriptions; r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D28792

--HG--
extra : moz-landing-system : lando
2019-04-26 15:01:58 +00:00
Liang-Heng Chen a6b1274871 Bug 1546903 - change traffic telemetry unit from byte to KB; r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D28797

--HG--
extra : moz-landing-system : lando
2019-04-26 09:39:31 +00:00
Liang-Heng Chen bed04f7f7b Bug 1546884 - fix third-party channel checks; r=dragana
`mThirdPartyClassificationFlags` can only check for third-party tracking channel, it should be checked by calling `IsThirdPartyWindowOrChannel`.

Differential Revision: https://phabricator.services.mozilla.com/D28788

--HG--
extra : moz-landing-system : lando
2019-04-26 09:29:07 +00:00
Byron Campen [:bwc] fd880e95f8 Bug 1545827: Use TabId instead of PBrowserOrId, use LoadInfoArgs to avoid using the system principal on the socket process, and use PSocketProcess for the WebrtcProxyChannel when on the socket process. r=kershaw,mjf
Differential Revision: https://phabricator.services.mozilla.com/D28239

--HG--
extra : moz-landing-system : lando
2019-04-26 14:46:26 +00:00
Ehsan Akhgari b3c08a7ca4 Bug 1547114 - Part 4: Mark nsICookiePermission as non-scriptable; r=baku
Differential Revision: https://phabricator.services.mozilla.com/D28917

--HG--
extra : moz-landing-system : lando
2019-04-26 12:02:21 +00:00
Ehsan Akhgari 9421931e25 Bug 1547114 - Part 1: Remove nsICookiePermission::CanAccessURI(); r=baku
Differential Revision: https://phabricator.services.mozilla.com/D28914

--HG--
extra : moz-landing-system : lando
2019-04-26 12:02:20 +00:00
Honza Bambas 5f945421d4 Bug 1493599 - Expose reason of security blocking on nsILoadInfo and add new http observer notification for failed asyncOpens, r=Honza,dragana
Differential Revision: https://phabricator.services.mozilla.com/D23150

--HG--
extra : moz-landing-system : lando
2019-04-26 10:59:41 +00:00
Sebastian Streich 8ac88db494 Bug 1444503 - Remove the IPC::Principal r=ckerschb,nika
***
Removed IPC References in PCContent
***
Removed IPC References on nsContentPermissionHelper
***
 Remove IPC Principal from PBrowser
***
Remove IPCPrincipal from the PaymentRequest
***
Remove IPCPrincipal from the PPresentation
***
Remove IPC Principal from PNecko

Differential Revision: https://phabricator.services.mozilla.com/D28650

--HG--
extra : moz-landing-system : lando
2019-04-25 14:18:11 +00:00
Sebastian Streich a2d3e618af Bug 1546913 - Remove GetLoadInfo callsites r=ckerschb
Differential Revision: https://phabricator.services.mozilla.com/D27647

--HG--
extra : moz-landing-system : lando
2019-04-25 12:16:35 +00:00
Nico Grunbaum 8a57537454 Bug 1400563 - timer deadlock fix r=drno,dminor
timer deadlock fix

Differential Revision: https://phabricator.services.mozilla.com/D28087

--HG--
extra : moz-landing-system : lando
2019-04-23 05:32:57 +00:00
Michal Novotny 1efe8b8b26 Bug 1506534 - Collect telemetry to measure how much penalty we will experience with first-party cache isolation, r=mayhemer, data-r=chutten
Whenever a cache entry is accessed during a document load, eTLD+1 of the top level document is added to the entry's metadata. Number of accessing sites is also stored in cache index. So we know how many copies of each entry would we have if we did a first party isolation without data deduplication. The telemetry is sent every time we write 2GB to the cache and then the data is reset. Telemetry report ID is an identifier of the telemetry cycle and it's used to invalidate eTLD+1 hashes in all cache entries.

Differential Revision: https://phabricator.services.mozilla.com/D26425

--HG--
extra : moz-landing-system : lando
2019-04-25 12:21:17 +00:00
Brindusan Cristian f92b05e5f0 Merge inbound to mozilla-central. a=merge
--HG--
rename : dom/ipc/TabParent.cpp => dom/ipc/BrowserParent.cpp
2019-04-25 00:54:01 +03:00
Honza Bambas f26d4b5095 Bug 1536511 - Cache-control: stale-while-revalidate response header implementation, r=kershaw,asuth
Differential Revision: https://phabricator.services.mozilla.com/D28494

--HG--
extra : moz-landing-system : lando
2019-04-24 16:40:59 +00:00
Eden Chuang 9bffd42acf Bug 1539208 - Propagate the result of mListener in InterceptedHttpChannel::OnStartRequest and ::OnStopRequest r=perry,ttung,kershaw
1. Propagate the mListener's result in InterceptedHttpChannel::OnStartRequest()
   and ::OnStopRequest().

2. remove unnecessary assertion in FetchDriver::OnStartRequest().

Differential Revision: https://phabricator.services.mozilla.com/D28477

--HG--
extra : moz-landing-system : lando
2019-04-24 08:49:36 +00:00
Andrew McCreight 710a932577 Bug 1545843 - Mark some HTTP XPIDL classes as builtinclass. r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D28295

--HG--
extra : moz-landing-system : lando
2019-04-23 16:05:29 +00:00
Andrew McCreight 8140c28c5e Bug 1545821 - nsI-ify NetDashboardCallback. r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D28284

--HG--
extra : moz-landing-system : lando
2019-04-23 15:33:57 +00:00
Kershaw Chang 45ba7eb235 Bug 1544799 - Make PSocketProcess manage PWebrtcProxyChannel r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D28038

--HG--
extra : moz-landing-system : lando
2019-04-23 13:10:56 +00:00
Kershaw Chang 5f5d6f4c69 Bug 1540289 - Don't init socket process bridge if the pref is disabled r=dragana,bwc
Differential Revision: https://phabricator.services.mozilla.com/D25571

--HG--
extra : moz-landing-system : lando
2019-04-23 13:06:05 +00:00
Oana Pop Rus 3c634d9c72 Merge autoland to mozilla-central. a=merge 2019-04-23 00:45:58 +03:00
Sylvestre Ledru a1dce6440a Bug 1519636 - Reformat recent changes to the Google coding style r=Ehsan
# ignore-this-changeset

Differential Revision: https://phabricator.services.mozilla.com/D28329

--HG--
extra : moz-landing-system : lando
2019-04-22 16:35:03 +00:00