Граф коммитов

23780 Коммитов

Автор SHA1 Сообщение Дата
Tim Huang 9fcc3e7f44 Bug 1773695 - Part 3: Implement email tracking url classifier feature. r=dimi
Differential Revision: https://phabricator.services.mozilla.com/D151050
2022-07-18 21:48:15 +00:00
Tim Huang 86d982dc94 Bug 1773695 - Part 2: Add flags for the email tracking protections. r=dimi
Differential Revision: https://phabricator.services.mozilla.com/D151049
2022-07-18 21:48:15 +00:00
Tom Ritter a199ab6a52 Bug 1737829: Populate an RFP bit from Channel to Connection via Caps r=necko-reviewers,kershaw
Differential Revision: https://phabricator.services.mozilla.com/D144583
2022-07-15 20:39:23 +00:00
Tom Ritter c55fc9ce83 Bug 1737829: Add an RFP argument to UserAgent() and AddStandardRequestHeaders() r=necko-reviewers,kershaw
UserAgent() needs a parameter because it previously was
calling the non-fine-grained RFP check. It can't call the
fine-grained check, so it needs to be told what to do.

AddStandardRequestHeaders calls UserAgent() and needs to
know what to pass it.

Differential Revision: https://phabricator.services.mozilla.com/D144582
2022-07-15 20:39:23 +00:00
Tom Ritter f11bc3e771 Bug 1737829: Add loadInfo to nsHttpChannel::Init() r=necko-reviewers,kershaw
Everywhere except one loadInfo is supplied to an HTTPChannel
right after it is Init()-ed.  Inside of Init we would like to
use the loadInfo so we'll put it in there.

Differential Revision: https://phabricator.services.mozilla.com/D144580
2022-07-15 20:39:22 +00:00
Tom Ritter b732796900 Bug 1770498: Create ShouldRFP(nsILoadInfo) and make ShouldRFP(nsIPrincipal) explicitly dangerous r=timhuang
- Move ShouldRFP(char*), ShouldRFP(docshell), ShouldRFP(Document)
  below some utility code.

- Now that we know we should check the CookieJarSettings, using
  ShouldRFP(nsIPrincipal) is dangerous.  We mark it as dangerous
  and annotate the existing uses of it.

- At the same time, an nsILoadInfo has the CookieJarSettings we
  want to check, so create a ShouldRFP(nsILoadInfo) that checks
  it and cascades to the (marked-dangerous-but-not-dangerous-for-
  this-call) principal function.

- We also correct a situation where WorkerLoadInfo does not
  initialize the shouldRFP member.

Differential Revision: https://phabricator.services.mozilla.com/D150591
2022-07-15 20:39:20 +00:00
Tom Ritter 1c40624193 Bug 1770498: Populate the RFP member of CookieJar Settings r=timhuang,geckoview-reviewers,owlish
CookieJarSettings frequently gets populated in a place
where we have ready access to the Document/Channel it
is being constructed for. This lets us populate the boolean
and pass it into CookieJarSetting's constructor easily.

When it is created for LoadInfo, we need to plumb the URI
through by adding it to LoadInfo::CreateForDocument.

Differential Revision: https://phabricator.services.mozilla.com/D150588
2022-07-15 20:39:19 +00:00
Tom Ritter 489d2393ae Bug 1770498: Add RFP to CookieJarSettings r=timhuang
Before we took a very simplistic view to domain-based RFP
exemptions - if the loading principal said an exempted
domain, you were exempted.

This did not intelligently take into account iframes. In
particular, if a non-exempted domain framed an exempted
domain, the exempted domain's iframe would be exempted.

It probably should not. This is debatable, but at this
point in time after consultation with Tor we are going
to take the approach described in the comments in
CookieJarSettings.h

Notably this is creating a gap when it comes to nested
iframes.  If an exempted domain iframes a non-exempted
domain, which in turn iframes an exempted domain - the
innermost iframe will be exempted even though its parent
is not.  This is not ideal, once a document is non-
exempted, all children should be non-exempted. But this
is especially difficult to implement with the facilities
easily available to us, so we leave this corner case for
another day.

Differential Revision: https://phabricator.services.mozilla.com/D150587
2022-07-15 20:39:18 +00:00
Iulian Moraru 26f8a8400a Backed out 6 changesets (bug 1773691, bug 1773695) for causing condprof xpcshell failures on test_ext_webRequest_urlclassification.js. CLOSED TREE
Backed out changeset f1d59396c406 (bug 1773695)
Backed out changeset db926abd402c (bug 1773695)
Backed out changeset 1c2556d56a53 (bug 1773695)
Backed out changeset cd29b0766f86 (bug 1773695)
Backed out changeset 6c7bd0531bc6 (bug 1773695)
Backed out changeset 0b4036e39469 (bug 1773691)
2022-07-15 18:53:49 +03:00
Tim Huang 82e7464da4 Bug 1773695 - Part 3: Implement email tracking url classifier feature. r=dimi
Differential Revision: https://phabricator.services.mozilla.com/D151050
2022-07-15 14:30:21 +00:00
Tim Huang ef064b90b5 Bug 1773695 - Part 2: Add flags for the email tracking protections. r=dimi
Differential Revision: https://phabricator.services.mozilla.com/D151049
2022-07-15 14:30:20 +00:00
Thomas Wisniewski d1c82fe05f Bug 1758745 - Refactor EffectiveStoragePrincipal to EffectiveCookiePrincipal and create new function EffectiveStoragePrincipal that is never unpartitioned; r=bvandersloot
Depends on D143626

Differential Revision: https://phabricator.services.mozilla.com/D143627
2022-07-15 13:26:17 +00:00
Cristian Tuns 2f5fe88da3 Backed out 19 changesets (bug 1758745, bug 1758740, bug 1762462, bug 1779603) for causing mochitest failures on browser_partitionedConsoleMessage.js CLOSED TREE
Backed out changeset e3c8cd6f00b6 (bug 1779603)
Backed out changeset 4e46a6f209b4 (bug 1762462)
Backed out changeset 00c0c6314640 (bug 1762462)
Backed out changeset 8f11221f859f (bug 1762462)
Backed out changeset ffbf90e3bbab (bug 1762462)
Backed out changeset 0c760428dfec (bug 1762462)
Backed out changeset 7c99293cc8f9 (bug 1762462)
Backed out changeset 92bd237a95e1 (bug 1762462)
Backed out changeset 74539a3cc7fc (bug 1762462)
Backed out changeset acf08a10c6fb (bug 1762462)
Backed out changeset 0cf191a7739f (bug 1762462)
Backed out changeset 030c276d6669 (bug 1762462)
Backed out changeset a88a099c684d (bug 1762462)
Backed out changeset cbd69786a24b (bug 1762462)
Backed out changeset e5e0655206a8 (bug 1762462)
Backed out changeset 707f9dfed501 (bug 1762462)
Backed out changeset 619e4bb01a81 (bug 1762462)
Backed out changeset 02b7641683b0 (bug 1758745)
Backed out changeset a2f110442038 (bug 1758740)
2022-07-14 17:26:17 -04:00
criss b77dc7a479 Backed out 6 changesets (bug 1773691, bug 1773695) for causing Bp-hybrid bustages on UrlClassifierFeatureEmailTrackingProtection
Backed out changeset f402f1bd4caa (bug 1773695)
Backed out changeset 001c38822c53 (bug 1773695)
Backed out changeset 8ef4d3597d92 (bug 1773695)
Backed out changeset f4770b2fe53d (bug 1773695)
Backed out changeset fb625ae08f73 (bug 1773695)
Backed out changeset 6c23adf9184f (bug 1773691)
2022-07-14 23:41:50 +03:00
Tim Huang 73b719cca4 Bug 1773695 - Part 3: Implement email tracking url classifier feature. r=dimi
Differential Revision: https://phabricator.services.mozilla.com/D151050
2022-07-14 19:39:32 +00:00
Tim Huang 1ab8b37cce Bug 1773695 - Part 2: Add flags for the email tracking protections. r=dimi
Differential Revision: https://phabricator.services.mozilla.com/D151049
2022-07-14 19:39:32 +00:00
Thomas Wisniewski 3f80260311 Bug 1758745 - Refactor EffectiveStoragePrincipal to EffectiveCookiePrincipal and create new function EffectiveStoragePrincipal that is never unpartitioned; r=bvandersloot
Depends on D143626

Differential Revision: https://phabricator.services.mozilla.com/D143627
2022-07-14 19:26:26 +00:00
Kagami Sascha Rosylight d0b83eb89d Bug 1769290 - Part 16: Apply mozilla-js-handle-rooted-typedef against netwerk r=andi
Differential Revision: https://phabricator.services.mozilla.com/D151783
2022-07-14 17:00:21 +00:00
Dragana Damjanovic 1c21538aeb Bug 1544127 - Split releasing members of LoadInfo into a couple of runnables r=necko-reviewers,kershaw
Differential Revision: https://phabricator.services.mozilla.com/D151124
2022-07-14 15:02:41 +00:00
Norisz Fay 388468729f Backed out 18 changesets (bug 1762462, bug 1758745, bug 1758740) for causing mochitest failures on test_storage_copied.html
Backed out changeset a27ae15872a9 (bug 1762462)
Backed out changeset b7d979a36324 (bug 1762462)
Backed out changeset 6249efe40513 (bug 1762462)
Backed out changeset 1e81ed3014a0 (bug 1762462)
Backed out changeset 92cec5f5db1c (bug 1762462)
Backed out changeset fa3c45b4de5c (bug 1762462)
Backed out changeset 64df67f43ad7 (bug 1762462)
Backed out changeset d66dd76ec2b6 (bug 1762462)
Backed out changeset 4f8aaba02a03 (bug 1762462)
Backed out changeset 81eb7d60dea9 (bug 1762462)
Backed out changeset 01504f5f818a (bug 1762462)
Backed out changeset 2615b571c9ba (bug 1762462)
Backed out changeset 73ed8be3f117 (bug 1762462)
Backed out changeset edb94ba8ec59 (bug 1762462)
Backed out changeset 21dd6fdc672e (bug 1762462)
Backed out changeset 31a70f9ad879 (bug 1762462)
Backed out changeset 5261ee5a2368 (bug 1758745)
Backed out changeset ad6ffd85ef3c (bug 1758740)
2022-07-14 03:16:08 +03:00
Thomas Wisniewski 7a3c3e5c10 Bug 1758745 - Refactor EffectiveStoragePrincipal to EffectiveCookiePrincipal and create new function EffectiveStoragePrincipal that is never unpartitioned; r=bvandersloot
Depends on D143626

Differential Revision: https://phabricator.services.mozilla.com/D143627
2022-07-13 22:44:57 +00:00
Cosmin Sabou 85307ea6b9 Backed out 3 changesets (bug 1750972) for potential site breakage.
Backed out changeset 90d51383665c (bug 1750972)
Backed out changeset 3b7d15317952 (bug 1750972)
Backed out changeset b1a8adcb9099 (bug 1750972)
2022-07-13 12:36:32 +03:00
Tooru Fujisawa 54623364da Bug 1777486 - Part 2: Migrate XPCOMUtils.jsm consumers with automatic migration. r=webdriver-reviewers,geckoview-reviewers,preferences-reviewers,application-update-reviewers,pip-reviewers,kmag,owlish,whimboo
Differential Revision: https://phabricator.services.mozilla.com/D151214
2022-07-12 04:21:34 +00:00
mleclair f15f91dc56 Bug 1772124 - Added Glean metrics to track different type of resources for Early Hints r=dragana,mbucher,necko-reviewers
Differential Revision: https://phabricator.services.mozilla.com/D148741
2022-07-11 22:46:22 +00:00
Andreea Pavel 7738a75fdd Backed out 11 changesets (Bug 1777486) for failing bc at browser_startup.js on a CLOSED TREE
Backed out changeset b6c4c386f1a6 (Bug 1777486)
Backed out changeset 195cc2de8433 (Bug 1777486)
Backed out changeset 20c746fb1648 (Bug 1777486)
Backed out changeset d5fd8173d62d (Bug 1777486)
Backed out changeset 6d758fab5a3e (Bug 1777486)
Backed out changeset e938b601ba15 (Bug 1777486)
Backed out changeset 0c4ea0b9416b (Bug 1777486)
Backed out changeset 0559c53cc668 (Bug 1777486)
Backed out changeset eea573d3a9f9 (Bug 1777486)
Backed out changeset 9ce3a6496a49 (bug 1777486)
Backed out changeset b0867652fc48 (bug 1777486)
2022-07-11 22:24:40 +03:00
Tooru Fujisawa 8cd6ed7409 Bug 1777486 - Part 2: Migrate XPCOMUtils.jsm consumers with automatic migration. r=webdriver-reviewers,geckoview-reviewers,preferences-reviewers,application-update-reviewers,pip-reviewers,kmag,owlish,whimboo
Differential Revision: https://phabricator.services.mozilla.com/D151214
2022-07-11 15:09:13 +00:00
Tooru Fujisawa 601a003c2c Bug 1667455 - Part 22: Make httpd.js compatible both with patched and unpatched binary (hostutils). r=kmag,necko-reviewers,dragana
Differential Revision: https://phabricator.services.mozilla.com/D150913
2022-07-11 12:41:57 +00:00
Tooru Fujisawa c26c3f5551 Bug 1667455 - Part 14: Stop importing Services.jsm in documents. r=kmag,necko-reviewers,dragana
Differential Revision: https://phabricator.services.mozilla.com/D150903
2022-07-11 12:41:54 +00:00
Tooru Fujisawa 52c95734e7 Bug 1667455 - Part 9: Stop importing Services.jsm from chrome-priv HTML code, single-line cases. r=kmag,necko-reviewers,geckoview-reviewers,extension-reviewers,m_kato,dragana
Differential Revision: https://phabricator.services.mozilla.com/D150898
2022-07-11 12:41:52 +00:00
Tooru Fujisawa 7539547097 Bug 1667455 - Part 8: Stop importing Services.jsm from chrome-priv JS code, other cases. r=kmag,necko-reviewers,dragana
Differential Revision: https://phabricator.services.mozilla.com/D150897
2022-07-11 12:41:52 +00:00
Tooru Fujisawa 47c8f80432 Bug 1667455 - Part 6: Stop importing Services.jsm from chrome-priv JS code, non-top-level or multi-line cases. r=kmag,perftest-reviewers,AlexandruIonescu,sparky
Differential Revision: https://phabricator.services.mozilla.com/D150895
2022-07-11 12:41:51 +00:00
Tooru Fujisawa bf93d07148 Bug 1667455 - Part 5: Stop importing Services.jsm from chrome-priv JS code, top-level single-line cases. r=kmag,webdriver-reviewers,perftest-reviewers,webcompat-reviewers,geckoview-reviewers,extension-reviewers,application-update-reviewers,pip-reviewers,twisniewski,m_kato,jdescottes,mconley,AlexandruIonescu,mossop
Differential Revision: https://phabricator.services.mozilla.com/D150894
2022-07-11 12:41:50 +00:00
Tooru Fujisawa f3a8c52c53 Bug 1667455 - Part 4: Stop importing Services.jsm from JSM. r=kmag,webdriver-reviewers,perftest-reviewers,webcompat-reviewers,geckoview-reviewers,application-update-reviewers,pip-reviewers,twisniewski,devtools-reviewers,m_kato,jdescottes,ochameau,mconley,sfoster,AlexandruIonescu
Differential Revision: https://phabricator.services.mozilla.com/D150893
2022-07-11 12:41:50 +00:00
ffxbld 7863aace6c No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=diannaS
Differential Revision: https://phabricator.services.mozilla.com/D151241
2022-07-07 14:24:35 +00:00
Butkovits Atila da2b7986d0 Backed out changeset 8cc6f6f552a3 (bug 1772124) for causing failures at browser_103_preload.js. CLOSED TREE 2022-07-07 03:56:04 +03:00
mleclair 2ff75f9613 Bug 1772124 - Added Glean metrics to track different type of resources for Early Hints r=dragana,mbucher,necko-reviewers
Differential Revision: https://phabricator.services.mozilla.com/D148741
2022-07-06 23:16:41 +00:00
Nika Layzell 7ced96212e Bug 1778211 - Reject xpidl CDATA containing 'virtual', r=xpcom-reviewers,necko-reviewers,mccr8,dragana
We'll probably want to do something more accurate in the future with a
custom clang static analysis pass which validates that XPIDL interfaces
have the expected vtable and struct layout, however doing so would be
more involved than the string matching done in this patch.

In addition to checking for extra virtual methods, we'll likely also
want to check for data members on interfaces, and reject them unless the
class is marked as `[builtinclass]` in addition to some other attribute
which we'll need to add to prevent them from being implemented in Rust
(as c++ data members will not be reflected by the rust macro).

There were 2 instances of a comment which contained the word 'virtual'
within a CDATA block. These comments were moved out of the CDATA block
to avoid triggering the error.

Differential Revision: https://phabricator.services.mozilla.com/D151068
2022-07-06 14:53:06 +00:00
Kershaw Chang 7458e38eee Bug 1777968 - Fix the header name, r=necko-reviewers,dragana
On mingw32 platform, the header name should be lower case

Differential Revision: https://phabricator.services.mozilla.com/D151110
2022-07-06 10:41:57 +00:00
criss 1e2c56acfe Backed out changeset 50b01879aaff (bug 1774581) for causing Xpcshell failures on test_trr_telemetry.js. CLOSED TREE 2022-07-06 14:04:38 +03:00
criss a50b5fe9e0 Backed out changeset 8d82f37e0c57 (bug 1775244) for causing Xpcshell failures on test_servers.js. CLOSED TREE 2022-07-06 12:16:14 +03:00
Kershaw Chang 15596177b5 Bug 1774581 - Use telemetry data to test whether TRR is retried, r=necko-reviewers,dragana
Differential Revision: https://phabricator.services.mozilla.com/D149510
2022-07-06 08:45:23 +00:00
Kershaw Chang ceffb375f2 Bug 1775244 - Make HTTP2ProxyCode speak Http/2, r=necko-reviewers,dragana
Differential Revision: https://phabricator.services.mozilla.com/D150637
2022-07-06 08:34:45 +00:00
Dragana Damjanovic 0cb9ae544a Bug 1778272 - Revert the change to the LoadInfo release function. r=necko-reviewers,kershaw
Differential Revision: https://phabricator.services.mozilla.com/D151103
2022-07-06 08:10:51 +00:00
Dana Keeler dc4ce8d406 Bug 1777366 - remove unused `source` and `cached` parameters from nsISiteSecurityService APIs r=rmf,necko-reviewers,kershaw
These parameters are no longer used and can be removed, along with the expired
telemetry HSTS_UPGRADE_SOURCE.

Differential Revision: https://phabricator.services.mozilla.com/D150786
2022-07-05 18:33:18 +00:00
Paul Zuehlcke 97fbf50b2c Bug 1777513 - Grant first-party storage access to allow service worker to run in test frame. r=anti-tracking-reviewers,timhuang
Differential Revision: https://phabricator.services.mozilla.com/D150957
2022-07-05 09:55:14 +00:00
Tooru Fujisawa 854319c8ab Bug 1777641 - Suppress CheckForBrokenChromeURL and RecordZeroLengthEvent for JSM loaded by mozJSModuleLoader. r=necko-reviewers,dragana
Differential Revision: https://phabricator.services.mozilla.com/D150875
2022-07-05 09:18:31 +00:00
Csoregi Natalia 7e2a20405f Backed out changeset 6c542cd8d622 for causing devtools compat issues. CLOSED TREE 2022-07-04 19:39:21 +03:00
ffxbld 8592d3250f No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=diannaS
Differential Revision: https://phabricator.services.mozilla.com/D150961
2022-07-04 13:49:30 +00:00
Kershaw Chang 5e9a1264ff Bug 1770019 - Make httpd.js support both IPv4 and IPv6, r=necko-reviewers,dragana
Differential Revision: https://phabricator.services.mozilla.com/D148696
2022-07-04 11:04:02 +00:00
Tom Schuster 699741deb6 Bug 1750972 - Remove tests setting noneRequiresSecure = true. r=freddyb
Differential Revision: https://phabricator.services.mozilla.com/D150603
2022-07-04 10:22:50 +00:00