Граф коммитов

18199 Коммитов

Автор SHA1 Сообщение Дата
Matthew Gaudet dea4a801a1 Bug 1652744 - Add browser pref for private fields support r=jorendorff
Differential Revision: https://phabricator.services.mozilla.com/D83511
2020-07-17 21:21:57 +00:00
Valentin Gosu 846a198de3 Bug 1653201 - Remove internal nsStandardURL punycode pref r=Gijs
Differential Revision: https://phabricator.services.mozilla.com/D84105
2020-07-19 19:40:05 +00:00
prathiksha 78c662789a Bug 1617987 - Fix URLs by prefixing www. when users encounter bad cert domain errors. r=nika,keeler
Differential Revision: https://phabricator.services.mozilla.com/D82024
2020-07-18 13:38:59 +00:00
Molly Howell fea4aee447 Bug 1653371 - Don't used a signed type for a length parameter. r=bytesized
Differential Revision: https://phabricator.services.mozilla.com/D84031
2020-07-17 22:25:54 +00:00
James Willcox 28273f27f7 Bug 1652474 - Enable EME on all channels for Android r=rbarker,bryce
Differential Revision: https://phabricator.services.mozilla.com/D83355
2020-07-17 19:06:03 +00:00
Paul Adenot 7fb73b1d6c Bug 1653113 - Backed out changeset cc82aacadf80. r=achronop
Depends on D83805

Differential Revision: https://phabricator.services.mozilla.com/D83806
2020-07-17 09:40:27 +00:00
Brian Birtles aad61ccfa5 Bug 1652676 - Enable Web Animations API compositing operations on release channels; r=boris
Differential Revision: https://phabricator.services.mozilla.com/D83727
2020-07-16 18:00:55 +00:00
Mark Striemer 2027ee64c6 Bug 1652627 - Setup a pref for tab modal print UI r=Gijs,sfoster
This creates the print.modal_print_preview.enabled pref to manage
whether the tab modal print UI should be used and creates some
files we'll need for the UI to use.

Differential Revision: https://phabricator.services.mozilla.com/D83445
2020-07-16 22:16:22 +00:00
Dale Harvey 321521cfd5 Bug 1651124 - Enable region cachebusting on release r=mikedeboer
Differential Revision: https://phabricator.services.mozilla.com/D83780
2020-07-16 14:09:00 +00:00
Alex Chronopoulos bf93baaaad Bug 1644566 - Enable AV1 and dav1d by default on Android. r=padenot
Depends on D83763

Differential Revision: https://phabricator.services.mozilla.com/D83764
2020-07-16 10:28:52 +00:00
Randell Jesup 4083132374 Bug 1642772: Add fission process renaming to eTLD+1 for Nightly (only) via a pref r=smaug,dveditz
Differential Revision: https://phabricator.services.mozilla.com/D77924
2020-07-15 17:59:36 +00:00
Frederik Braun a7153982e8 Bug 1366973: Rename security flags to not contain DATA anymore r=geckoview-reviewers,ckerschb,snorp
Differential Revision: https://phabricator.services.mozilla.com/D83490
2020-07-15 11:20:45 +00:00
Michal Novotny 0e25e01126 Bug 1645051 - Calculated smart max cache size shouldn't overwrite browser.cache.disk.capacity pref r=necko-reviewers,mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D83377
2020-07-14 16:54:22 +00:00
Sean Feng de666f6644 Bug 1652496 - Enable DOM arena allocation in Release r=smaug
Differential Revision: https://phabricator.services.mozilla.com/D83346
2020-07-14 05:41:55 +00:00
Miko Mynttinen 5c6954fa0d Bug 1652550 - Disable RenderExternalTextureHost when BufferTextureHost is wrapped with GPUVideoTextureHost r=mattwoodrow
This patch also re-enables client storage for Nightly builds (gfx.webrender.enable-client-storage=true).

Differential Revision: https://phabricator.services.mozilla.com/D83375
2020-07-14 13:31:32 +00:00
Julian Descottes a595fcea96 Bug 1651605 - Disable Service Worker support in DevTools Debugger r=Honza
We ran an experiment to assess the impact of the feature.
We could verify a significant performance impact on the opening times for the debugger.
It also led to a decrease in overall devtools usage and retention.
Therefore we are disabling the feature until we can implement it with better performance.
This should be implemented with https://bugzilla.mozilla.org/show_bug.cgi?id=1651522

Differential Revision: https://phabricator.services.mozilla.com/D83312
2020-07-14 08:44:59 +00:00
Alexis Beingessner d966b93086 Bug 1644466 - Convert dom.storage.next_gen into a StaticPref. r=janv
The kinda hacky mutex latch is preserved to avoid concerns with AtStartup prefs having
potential to deadlock when used in this subsystem.

Differential Revision: https://phabricator.services.mozilla.com/D83403
2020-07-14 02:57:57 +00:00
Marco Bonardo 14784dc42d Bug 1650201 - Fix mozStorage prefs read before profile and fallback to a non-exclusive VFS when it can't get an exclusive lock. r=asuth,geckoview-reviewers,agi
mozStorage used to read prefs on service init, because they could only be read
on the main-thread. When service init was moved earlier, it started trying
to read prefs too early, before the profile was set up, thus it ended up always
reading the default value.

This patch moves the only relevant pref to mirrored StaticPrefs that can be accessed
from different threads, and removes two preferences that apparently are not necessary
(they have been broken from a long time) for now.
In particular, providing a global synchronous setting is a footgun, each consumer should
decide about their synchronous needs, rather than abusing a dangerous "go fast" setting.
The page size is something we don't change from quite some time, and it's unlikely to be
used to run experiments in the wild before doing local measurements first, for which Try
builds are enough.

The remaining exclusiveLock pref is a bit controversial, because in general exclusive lock
is better for various reasons, and mostly it is necessary to use WAL on network shares.
Though developers may find it useful for debugging, and some third parties are doing
dangerous things (like copying over databases) to work around it, for which it's safer to
provide a less dangerous alternative.
Note exclusive lock only works on Unix-derived systems for now (no Windows implementation).

Finally, this introduces a fallback to exclusive lock, so that if a third party is using our
databases, so that we can't get an exclusive lock, we'll fallback to normal locking.

Differential Revision: https://phabricator.services.mozilla.com/D82717
2020-07-10 21:45:53 +00:00
Randell Jesup f1e4e6aed0 Bug 1112392: Move webrtc Tab Sharing to work in e10s/fission r=dminor
Also we drop support for an independent-of-scroll/viewport capture, which
the old Tab Sharing supported, for security reasons (and we don't need it).

Differential Revision: https://phabricator.services.mozilla.com/D80974
2020-07-11 12:31:49 +00:00
Dorel Luca 19042532b3 Backed out changeset ef25e5648b14 (bug 1112392) for causing build bustage on media/systemservices/video_engine/tab_capturer 2020-07-11 13:30:06 +03:00
J.C. Jones 8d808a0da4 Bug 1641356 - Unhide RSA-AES-GCM ciphersuite preferences r=kjacobs
In Bug 1638369 we added two new RSA-AES-GCM ciphersuites for web compatibility, but
did not add them to `all.js` so they weren't visible in about:config.

Since these are not mandatory ciphersuites to the TLS specification, they
should be configurable.

Differential Revision: https://phabricator.services.mozilla.com/D83192
2020-07-10 21:11:51 +00:00
Kagami Sascha Rosylight 5052c19940 Bug 1637624 - Part 2: Use StaticPrefs for layout.word_select.* r=emilio
Differential Revision: https://phabricator.services.mozilla.com/D83090
2020-07-10 21:21:30 +00:00
Randell Jesup 33bfc03435 Bug 1112392: Move webrtc Tab Sharing to work in e10s/fission r=dminor
Also we drop support for an independent-of-scroll/viewport capture, which
the old Tab Sharing supported, for security reasons (and we don't need it).

Differential Revision: https://phabricator.services.mozilla.com/D80974
2020-07-10 21:22:10 +00:00
Bogdan Tara b2ea557fcf Backed out changeset 6dea878aaf36 (bug 1112392) for tab_capturer.cc related bustage CLOSED TREE 2020-07-10 23:30:41 +03:00
Randell Jesup 109ef2a1dd Bug 1112392: Move webrtc Tab Sharing to work in e10s/fission r=dminor
Also we drop support for an independent-of-scroll/viewport capture, which
the old Tab Sharing supported, for security reasons (and we don't need it).

Differential Revision: https://phabricator.services.mozilla.com/D80974
2020-07-10 18:11:02 +00:00
Narcis Beleuzu d27be427c9 Backed out changeset 83749e9e67bd (bug 1220810) for bc failures on browser_fall_back_to_https.js . CLOSED TREE 2020-07-10 18:42:17 +03:00
Dan Minor 48ee13bd24 Bug 1651722 - Enable transport-cc and rtx and let them ride the trains; r=drno
Meet seems to be working with RTX enabled now, so I'm removing it from the blocklist
while I'm here.

Differential Revision: https://phabricator.services.mozilla.com/D82937
2020-07-09 19:37:04 +00:00
Andrea Marchesini 23052342cb Bug 1220810 - Hardcode localhost to loopback, r=ckerschb,dragana
Differential Revision: https://phabricator.services.mozilla.com/D64586
2020-07-10 14:30:58 +00:00
Mihai Alexandru Michis b62be4d15f Backed out changeset 1b035d80fb9f (bug 1220810) for causing bustages in netwerk/dns/DNS.cpp
CLOSED TREE
2020-07-10 17:17:20 +03:00
Andrea Marchesini f498accc17 Bug 1220810 - Hardcode localhost to loopback, r=ckerschb,dragana
Differential Revision: https://phabricator.services.mozilla.com/D64586
2020-07-10 13:08:14 +00:00
Mihai Alexandru Michis 44cad01e29 Backed out changeset 1b44f13206d0 (bug 1220810) for causing gecko decision task bustages.
CLOSED TREE
2020-07-10 15:37:45 +03:00
Andrea Marchesini 2144af13e9 Bug 1220810 - Hardcode localhost to loopback, r=ckerschb,dragana
Differential Revision: https://phabricator.services.mozilla.com/D64586
2020-07-10 12:23:46 +00:00
Mihai Alexandru Michis 61006875dd Backed out changeset 36f368ba214c (bug 1220810) for causing gecko decision task bustages.
CLOSED TREE
2020-07-10 15:00:15 +03:00
Andrea Marchesini f36d351374 Bug 1220810 - Hardcode localhost to loopback, r=ckerschb,dragana
Differential Revision: https://phabricator.services.mozilla.com/D64586
2020-07-10 11:34:10 +00:00
Butkovits Atila 02e9ce4012 Merge mozilla-central to autoland. a=merge CLOSED TREE 2020-07-10 06:54:20 +03:00
Jeff Muizelaar f03aaa6c2e Bug 1651594. Disable client storage for breaking YouTube. r=mstange a=fix
Differential Revision: https://phabricator.services.mozilla.com/D83026
2020-07-10 03:11:35 +00:00
Chun-Min Chang 1ed88894b6 Bug 1598148 - P1: Remove the cubeb backend preference on macos in all.js. r=kinetik
Differential Revision: https://phabricator.services.mozilla.com/D54054
2020-07-08 23:44:05 +00:00
Kris Maglione 6a39211860 Bug 1464542: Part 3b - Add existing Services.jsm registrations to the new services cache. r=mccr8,geckoview-reviewers,agi
Differential Revision: https://phabricator.services.mozilla.com/D81419
2020-07-09 21:42:25 +00:00
Andrea Marchesini 3c1b71a6e4 Bug 1651618 - Use cookie 'SameSite' attribute with capital 'S' everywhere, r=flod,fluent-reviewers,remote-protocol-reviewers,marionette-reviewers,perftest-reviewers,whimboo,sparky
Differential Revision: https://phabricator.services.mozilla.com/D82872
2020-07-09 20:40:15 +00:00
Csoregi Natalia b355fcc4bf Backed out 6 changesets (bug 1464542) for xpcshell failures on test_Services.js. CLOSED TREE
Backed out changeset b50af9005851 (bug 1464542)
Backed out changeset 9d3a0ea2cf65 (bug 1464542)
Backed out changeset 71c3475fcbc2 (bug 1464542)
Backed out changeset 51ff93220a95 (bug 1464542)
Backed out changeset e84de1547c09 (bug 1464542)
Backed out changeset bbecc16d08eb (bug 1464542)
2020-07-09 23:19:26 +03:00
Kris Maglione d09458dc51 Bug 1464542: Part 3b - Add existing Services.jsm registrations to the new services cache. r=mccr8,geckoview-reviewers,agi
Differential Revision: https://phabricator.services.mozilla.com/D81419
2020-07-09 17:59:16 +00:00
Jed Davis 3bfc3ec49f Bug 1640345 - Add a hidden pref to prevent sandboxed content processes from connecting to the X server. r=gcp
This adds the boolean pref security.sandbox.content.headless (on Linux
only) which does two things:

1. Sets the MOZ_HEADLESS env var for content processes, so that they
don't initialize GTK and don't connect to the X server.

2. Disallows brokered access to parts of the filesystem used only for
graphics -- most critically connecting to the X11 socket itself, but
also opening GPU device nodes and the parts of sysfs used by Mesa, for
example.

This is experimental; use at your own risk.

Setting this pref will break native widgets, so it's also necessary to
set widget.disable-native-theme-for-content

Additionally, it breaks Flash and WebGL; see bug 1638466 for the latter.

Differential Revision: https://phabricator.services.mozilla.com/D81425
2020-07-01 21:10:36 +00:00
Mark Banner 6cd1a39735 Bug 1632448 - Remove AddSearchProvider implementation. r=baku,daleharvey
Depends on D82350

Differential Revision: https://phabricator.services.mozilla.com/D82524
2020-07-09 09:52:24 +00:00
Dana Keeler 97b8c4eeb3 Bug 1651155 - disable intermediate preloading healer in late beta and release r=jcj
While we figure out the crashes we're seeing on beta (bug 1650654), this will
disable the intermediate preloading healer in late beta and release.

Differential Revision: https://phabricator.services.mozilla.com/D82588
2020-07-08 22:41:06 +00:00
Michael Froman 27399f92bf Bug 1651235 - enable webrtc usage of socket process on early beta and earlier. r=drno
Differential Revision: https://phabricator.services.mozilla.com/D82623
2020-07-08 18:53:35 +00:00
Sebastian Streich 8ccf28a8ba Bug 1614969 - Check download with MixedContentBlocker r=ckerschb
Differential Revision: https://phabricator.services.mozilla.com/D73302
2020-07-08 15:25:43 +00:00
Frederik Braun 9cf407544a Bug 1644671 - systemprincipal restrictions telemetry r=tjr,ckerschb
Differential Revision: https://phabricator.services.mozilla.com/D79142
2020-07-08 13:11:57 +00:00
Bogdan Tara ecb7c0ac10 Backed out changeset 1e15fd6bbf25 (bug 1644671) for telemetry related bustages CLOSED TREE 2020-07-08 15:34:15 +03:00
Frederik Braun ae8dc932e1 Bug 1644671 - systemprincipal restrictions telemetry r=tjr,ckerschb
Differential Revision: https://phabricator.services.mozilla.com/D79142
2020-07-08 12:06:05 +00:00
Mike Hommey 1c697d5065 Bug 1651263 - Avoid spending > 2 minutes compiling Preferences.cpp r=njn
Not inlining AddMirror brings compilation time of this file, on my
machine, from 2:14 to 13.5s.

Differential Revision: https://phabricator.services.mozilla.com/D82633
2020-07-08 04:16:26 +00:00
Doug Thayer b274aafa4b Bug 1627075 - Route Omnijar requests through StartupCache r=froydnj
This should be a relatively straightforward patch. Essentially, we implement
a wrapper class (and friends) around nsZipArchive (and friends), which transparently
caches entries from the underlying zip archive in the StartupCache. This will break
without changes to the StartupCache, made in the patch after this, which allow it
to be used off of the main thread, and outside the main process.

Depends on D77635

Differential Revision: https://phabricator.services.mozilla.com/D77634
2020-07-08 02:46:34 +00:00
Doug Thayer 3a305bb054 Bug 1627075 - Allow lazily initializing nsZipArchives r=froydnj
Opening our Omnijars can be expensive, and it should be deferrable until after
startup is completed, provided we have a startup cache. In a previous patch in this
stack, we implemented caching of the zip central directory for omnijars, but we
still have to open the file in order to hand the object off to various omnijar
consumers. In a later patch, we will wrap nsZipArchive access in a class which
will allow us to transparently cache nsZipArchive results. These two get us
most of the way to not needing to read from the underlying omnijar files during
startup, but there are still nontrivial pieces, like nsZipFind for instance,
which we don't want to just duplicate inside of a wrapper class, so we would
like to sort out a way in which we can use an nsZipArchive class, but not
actually back it up with the real underlying file until we really need data
from it which we can't find in a cache.

Depends on D77633

Differential Revision: https://phabricator.services.mozilla.com/D78584
2020-07-08 02:44:13 +00:00
Doug Thayer d9fd460e11 Bug 1627075 - Build Omnijar file list from startup cache r=froydnj
We would like to be able to defer opening the omnijar files until after startup
if the StartupCache has already been populated. Opening the omnijar files takes
a nontrivial time, at least on Windows, and almost everything in the omnijar
should be fairly compressible, and thus makes sense to live in the StartupCache.
See the last patch in this series for a little more discussion on numbers, but
tl;dr: we saw a 12% improvement in time to about:home being finished on reference
hardware with these changes together with the changes from the descendant patches.

Differential Revision: https://phabricator.services.mozilla.com/D77632
2020-07-08 02:43:02 +00:00
Andrew McCreight ddcceedd1a Bug 1649331 - toolkit.shutdown.fastShutdownStage should be 0 in ASan builds. r=dthayer
We do leak checking in AddressSanitizer builds. This runs as processes exit,
so we can't exit early. NS_FREE_PERMANENT_DATA should be set in any kind of
build that cares about leak checking.

Differential Revision: https://phabricator.services.mozilla.com/D82459
2020-07-07 21:02:04 +00:00
Narcis Beleuzu a182c015f5 Backed out 6 changesets (bug 1627075) for bustages on startupcache/StartupCache.cpp . CLOSED TREE
Backed out changeset 21605186687e (bug 1627075)
Backed out changeset e29b15980da2 (bug 1627075)
Backed out changeset eb5265addd5e (bug 1627075)
Backed out changeset dfd71f4ecb81 (bug 1627075)
Backed out changeset 13ecd68b3c0d (bug 1627075)
Backed out changeset 333d035afe92 (bug 1627075)
2020-07-07 23:30:48 +03:00
Doug Thayer a2595a8402 Bug 1627075 - Route Omnijar requests through StartupCache r=froydnj
This should be a relatively straightforward patch. Essentially, we implement
a wrapper class (and friends) around nsZipArchive (and friends), which transparently
caches entries from the underlying zip archive in the StartupCache. This will break
without changes to the StartupCache, made in the patch after this, which allow it
to be used off of the main thread, and outside the main process.

Depends on D77635

Differential Revision: https://phabricator.services.mozilla.com/D77634
2020-07-07 17:04:27 +00:00
Doug Thayer 2046625fac Bug 1627075 - Allow lazily initializing nsZipArchives r=froydnj
Opening our Omnijars can be expensive, and it should be deferrable until after
startup is completed, provided we have a startup cache. In a previous patch in this
stack, we implemented caching of the zip central directory for omnijars, but we
still have to open the file in order to hand the object off to various omnijar
consumers. In a later patch, we will wrap nsZipArchive access in a class which
will allow us to transparently cache nsZipArchive results. These two get us
most of the way to not needing to read from the underlying omnijar files during
startup, but there are still nontrivial pieces, like nsZipFind for instance,
which we don't want to just duplicate inside of a wrapper class, so we would
like to sort out a way in which we can use an nsZipArchive class, but not
actually back it up with the real underlying file until we really need data
from it which we can't find in a cache.

Depends on D77633

Differential Revision: https://phabricator.services.mozilla.com/D78584
2020-07-07 17:02:42 +00:00
Doug Thayer 7915db05b2 Bug 1627075 - Build Omnijar file list from startup cache r=froydnj
We would like to be able to defer opening the omnijar files until after startup
if the StartupCache has already been populated. Opening the omnijar files takes
a nontrivial time, at least on Windows, and almost everything in the omnijar
should be fairly compressible, and thus makes sense to live in the StartupCache.
See the last patch in this series for a little more discussion on numbers, but
tl;dr: we saw a 12% improvement in time to about:home being finished on reference
hardware with these changes together with the changes from the descendant patches.

Differential Revision: https://phabricator.services.mozilla.com/D77632
2020-07-07 17:02:30 +00:00
Miko Mynttinen 0d02beff03 Bug 1536515 - Part 3: Add RenderExternalTextureHost r=sotaro
Differential Revision: https://phabricator.services.mozilla.com/D80506
2020-07-07 17:57:22 +00:00
Narcis Beleuzu 339d33ec67 Backed out changeset 627f9b4fea56 (bug 1644671) for bustages on TelemetryEventData.h.stub . CLOSED TREE 2020-07-07 20:33:53 +03:00
Narcis Beleuzu 8aa587a3c0 Backed out changeset ade40e37fbff (bug 1649331) for M12 plain leakchecks. CLOSED TREE 2020-07-07 20:17:32 +03:00
Frederik Braun 71de7e32d5 Bug 1644671 - systemprincipal restrictions telemetry r=tjr,ckerschb
Differential Revision: https://phabricator.services.mozilla.com/D79142
2020-07-07 14:17:05 +00:00
Andrew McCreight 301cc4e9a7 Bug 1649331 - toolkit.shutdown.fastShutdownStage should be 0 in ASan builds. r=dthayer
We do leak checking in AddressSanitizer builds. This runs as processes exit,
so we can't exit early. NS_FREE_PERMANENT_DATA should be set in any kind of
build that cares about leak checking.

Differential Revision: https://phabricator.services.mozilla.com/D82459
2020-07-07 11:23:07 +00:00
Nicholas Nethercote ba1e98b7ca Bug 1648348 - Fix formatting errors in the prefs parser's rustdocs. r=froydnj
Differential Revision: https://phabricator.services.mozilla.com/D81962
2020-07-07 07:38:10 +00:00
Perry Jiang 03a1a1da06 Bug 1588154 - remove invalid comment for SW pref r=dom-workers-and-storage-reviewers,asuth
Differential Revision: https://phabricator.services.mozilla.com/D75318
2020-05-14 20:57:57 +00:00
Mihai Alexandru Michis 87cb0ad6fa Backed out 6 changesets (bug 1627075) for causing bustages in StartupCache.cpp
CLOSED TREE

Backed out changeset fc144caf5d06 (bug 1627075)
Backed out changeset a345e05df151 (bug 1627075)
Backed out changeset 288a67aed661 (bug 1627075)
Backed out changeset 2cb021a493d8 (bug 1627075)
Backed out changeset 920398d1c3d3 (bug 1627075)
Backed out changeset ebdcd96a9d20 (bug 1627075)
2020-07-07 08:47:14 +03:00
Doug Thayer e3f3b7b80b Bug 1627075 - Route Omnijar requests through StartupCache r=froydnj
This should be a relatively straightforward patch. Essentially, we implement
a wrapper class (and friends) around nsZipArchive (and friends), which transparently
caches entries from the underlying zip archive in the StartupCache. This will break
without changes to the StartupCache, made in the patch after this, which allow it
to be used off of the main thread, and outside the main process.

Depends on D77635

Differential Revision: https://phabricator.services.mozilla.com/D77634
2020-07-07 04:36:27 +00:00
Doug Thayer 51a40f3027 Bug 1627075 - Allow lazily initializing nsZipArchives r=froydnj
Opening our Omnijars can be expensive, and it should be deferrable until after
startup is completed, provided we have a startup cache. In a previous patch in this
stack, we implemented caching of the zip central directory for omnijars, but we
still have to open the file in order to hand the object off to various omnijar
consumers. In a later patch, we will wrap nsZipArchive access in a class which
will allow us to transparently cache nsZipArchive results. These two get us
most of the way to not needing to read from the underlying omnijar files during
startup, but there are still nontrivial pieces, like nsZipFind for instance,
which we don't want to just duplicate inside of a wrapper class, so we would
like to sort out a way in which we can use an nsZipArchive class, but not
actually back it up with the real underlying file until we really need data
from it which we can't find in a cache.

Depends on D77633

Differential Revision: https://phabricator.services.mozilla.com/D78584
2020-07-07 04:34:19 +00:00
Doug Thayer 5b755bb7f3 Bug 1627075 - Build Omnijar file list from startup cache r=froydnj
We would like to be able to defer opening the omnijar files until after startup
if the StartupCache has already been populated. Opening the omnijar files takes
a nontrivial time, at least on Windows, and almost everything in the omnijar
should be fairly compressible, and thus makes sense to live in the StartupCache.
See the last patch in this series for a little more discussion on numbers, but
tl;dr: we saw a 12% improvement in time to about:home being finished on reference
hardware with these changes together with the changes from the descendant patches.

Differential Revision: https://phabricator.services.mozilla.com/D77632
2020-07-07 04:33:49 +00:00
Doug Thayer 1ed75f202c Bug 1623943 - Advance fastShutdownStage to 3 on Nightly r=froydnj
See https://bugzilla.mozilla.org/show_bug.cgi?id=1623943#c10 for more info,
but in short, this should be ready - there are a very small number of late
writes coming in via telemetry. I have gone through them, and the vast
majority of them are clearly nonissues. Of those remaining, which is on the
order of one hundredth of one percent of shutdowns, they are all going
through atomic file streams.

Differential Revision: https://phabricator.services.mozilla.com/D81609
2020-07-06 17:56:33 +00:00
Dana Keeler 8b5037b2d1 Bug 1649518 - 3/3: enable osclientcerts by default in nightly r=jcj,johannh
Differential Revision: https://phabricator.services.mozilla.com/D81890
2020-07-06 19:29:17 +00:00
Emilio Cobos Álvarez 77e8fe49d3 Bug 1650444 - Remove browser.find.anonymous_content.enabled. r=jfkthame
Other than this, there hasn't been any other major regression since we
introduced that switch. I don't think there's a point in keeping it
around.

Differential Revision: https://phabricator.services.mozilla.com/D82297
2020-07-06 15:05:49 +00:00
Hiroyuki Ikezoe d32459e2c0 Bug 1650686 - Drop layout.viewport_contains_no_contents_area. r=botond
I suppose it's been well tested on Fenix.

Differential Revision: https://phabricator.services.mozilla.com/D82305
2020-07-06 09:53:34 +00:00
Christoph Kerschbaumer 402b0a5c46 Bug 1647719: Introduce Pref for HTTS-Only in Private Browsing Mode. r=JulianWels,jcj
Differential Revision: https://phabricator.services.mozilla.com/D80873
2020-07-06 08:52:02 +00:00
Hiroyuki Ikezoe 4205879729 Bug 1324591 - Report janked animations to the main-thread and update them on the main-thread. r=botond,boris
The machinery to report janked animations is;

1) Store the partial pre-rendered animation id and the Animation object in a
   hashtable in LayerManager
2) Store the animation id in the Animation object as well
3) When we detect jank, we send the animation id to the main-thread via an IPC
   call
4) Find the Animation object with the id in the hashtable and update the
   Animaiton
5) Whenever the partial pre-rendered Animation stop running on the compositor
   i.e. the Animation finished normally, the Animation's target element is
   changed, etc. etc., remove the Animation from the hashtable

Depends on D75731

Differential Revision: https://phabricator.services.mozilla.com/D75732
2020-07-05 11:45:01 +00:00
Brindusan Cristian 7f75410fd7 Backed out 9 changesets (bug 1324591) for linux build bustages on central on nsDisplayList.h.
Backed out changeset 75966ee1fe65 (bug 1324591)
Backed out changeset d6a01c6bc40e (bug 1324591)
Backed out changeset fef36ff2ea3d (bug 1324591)
Backed out changeset 4a4ae4bd95d1 (bug 1324591)
Backed out changeset 732804c83add (bug 1324591)
Backed out changeset 84657a3522fb (bug 1324591)
Backed out changeset e6c74ba41007 (bug 1324591)
Backed out changeset 8e6d4e9f5aa0 (bug 1324591)
Backed out changeset 6bc284863aff (bug 1324591)
2020-07-05 13:45:35 +03:00
Hiroyuki Ikezoe 92208a9c28 Bug 1324591 - Report janked animations to the main-thread and update them on the main-thread. r=botond,boris
The machinery to report janked animations is;

1) Store the partial pre-rendered animation id and the Animation object in a
   hashtable in LayerManager
2) Store the animation id in the Animation object as well
3) When we detect jank, we send the animation id to the main-thread via an IPC
   call
4) Find the Animation object with the id in the hashtable and update the
   Animaiton
5) Whenever the partial pre-rendered Animation stop running on the compositor
   i.e. the Animation finished normally, the Animation's target element is
   changed, etc. etc., remove the Animation from the hashtable

Differential Revision: https://phabricator.services.mozilla.com/D75732
2020-07-05 02:21:01 +00:00
sefeng 80e3e377d1 Bug 1645046 - Enable HTML5 dialog in Nightly r=smaug
Differential Revision: https://phabricator.services.mozilla.com/D80045
2020-07-03 19:48:59 +00:00
Nils Ohlmeier [:drno] e5646896c7 Bug 1641308: increasing minimum DTLS version from 1.0 to 1.2. r=dminor
Differential Revision: https://phabricator.services.mozilla.com/D77130
2020-07-01 19:20:09 +00:00
Cosmin Sabou 5d6a0462a3 Backed out changeset 0f5653007c41 (bug 1645046) for wpt failures. CLOSED TREE 2020-07-03 18:19:17 +03:00
sefeng 383b8d065d Bug 1645046 - Enable HTML5 dialog in Nightly r=smaug
Differential Revision: https://phabricator.services.mozilla.com/D80045
2020-07-02 20:36:37 +00:00
Luca Greco c87982167d Bug 1609920 - part 2: Guard ServiceWorkerContainer::Register to allow/disallow moz-extension scheme based on prefs. r=dom-workers-and-storage-reviewers,asuth,webidl,smaug
- Adds a new "extensions.serviceWorkerRegister.allowed" pref (defaults to false)
- Makes ServiceWorkerContainer::Register to throw NS_ERROR_DOM_SECURITY_ERR if the
  script url is a moz-extension url and the caller is a non-system caller
  (but do not throw NS_ERROR_DOM_SECURITY_ERR if the caller is a moz-extension
  and the new pref is set to true)

Depends on D60244

Differential Revision: https://phabricator.services.mozilla.com/D60245
2020-07-03 10:14:42 +00:00
Luca Greco 82aa5fed3a Bug 1609920 - part 1: Allow the WebExtension Framework to register a moz-extension service worker. r=dom-workers-and-storage-reviewers,asuth,mixedpuppy
- Adds the new about:config pref "extensions.backgroundServiceWorker.enabled" (currently defaults to false).
- Adds the background.service_worker property to the manifest JSON schema definition
- Locks background.service_worker manifest property behind the new preference
- Adds a new BackgroundWorker class to ext-backgroundPage.js (responsible for managing the background
  service worker for the extension, e.g. make sure that the expected worker script is registered
  as expected when the extension is starting up)
- Adds to the ServiceWorkerManager a new method to allow the WebExtension Framework to register the
  background service worker without an existing extension page
- Allows the "moz-extension" schema in the dom/serviceworkers and dom/cache internals

Depends on D63697

Differential Revision: https://phabricator.services.mozilla.com/D60244
2020-07-03 10:14:24 +00:00
sotaro ce3a41744b Bug 1648411 - Add AHardwareBuffer layer buffer support on android r=jnicol
AHardwareBuffer is supported since Android O(APIVersion 26). Implementation of AndroidHardwareBufferTextureData referred AndroidNativeWindowTextureData. Implementation of AndroidHardwareBufferTextureHost referred obsoleted GrallocTextureHost.

android fence is not supported yet.

Differential Revision: https://phabricator.services.mozilla.com/D81808
2020-07-02 13:43:19 +00:00
Noemi Erli b13f2bcb47 Backed out 7 changesets (bug 1627075) for causing @nsZipArchive crashes CLOSED TREE
Backed out changeset 9705b2759d45 (bug 1627075)
Backed out changeset 699212a443c3 (bug 1627075)
Backed out changeset 7ae4df10749c (bug 1627075)
Backed out changeset ece9a4223349 (bug 1627075)
Backed out changeset 6c4eedaa0d04 (bug 1627075)
Backed out changeset f5106898239f (bug 1627075)
Backed out changeset b6029c7c0016 (bug 1627075)
2020-07-02 14:05:53 +03:00
Doug Thayer 3742aac030 Bug 1627075 - Route Omnijar requests through StartupCache r=froydnj
This should be a relatively straightforward patch. Essentially, we implement
a wrapper class (and friends) around nsZipArchive (and friends), which transparently
caches entries from the underlying zip archive in the StartupCache. This will break
without changes to the StartupCache, made in the patch after this, which allow it
to be used off of the main thread, and outside the main process.

Depends on D77635

Differential Revision: https://phabricator.services.mozilla.com/D77634
2020-07-02 02:51:41 +00:00
Doug Thayer 45d135813f Bug 1627075 - Allow lazily initializing nsZipArchives r=froydnj
Opening our Omnijars can be expensive, and it should be deferrable until after
startup is completed, provided we have a startup cache. In a previous patch in this
stack, we implemented caching of the zip central directory for omnijars, but we
still have to open the file in order to hand the object off to various omnijar
consumers. In a later patch, we will wrap nsZipArchive access in a class which
will allow us to transparently cache nsZipArchive results. These two get us
most of the way to not needing to read from the underlying omnijar files during
startup, but there are still nontrivial pieces, like nsZipFind for instance,
which we don't want to just duplicate inside of a wrapper class, so we would
like to sort out a way in which we can use an nsZipArchive class, but not
actually back it up with the real underlying file until we really need data
from it which we can't find in a cache.

Depends on D77633

Differential Revision: https://phabricator.services.mozilla.com/D78584
2020-07-02 03:12:49 +00:00
Doug Thayer 10f4af3f14 Bug 1627075 - Build Omnijar file list from startup cache r=froydnj
We would like to be able to defer opening the omnijar files until after startup
if the StartupCache has already been populated. Opening the omnijar files takes
a nontrivial time, at least on Windows, and almost everything in the omnijar
should be fairly compressible, and thus makes sense to live in the StartupCache.
See the last patch in this series for a little more discussion on numbers, but
tl;dr: we saw a 12% improvement in time to about:home being finished on reference
hardware with these changes together with the changes from the descendant patches.

Differential Revision: https://phabricator.services.mozilla.com/D77632
2020-07-02 02:49:31 +00:00
Jeff Gilbert 80a2030fe4 Bug 1649894 - Add webgl.debug.incomplete-tex-color. r=lsalzman
Differential Revision: https://phabricator.services.mozilla.com/D81920
2020-07-02 01:42:21 +00:00
Mihai Alexandru Michis bab20702a8 Backed out 6 changesets (bug 1627075) for causing failures regarding startupcache.
CLOSED TREE

Backed out changeset cf23b456ba12 (bug 1627075)
Backed out changeset b07887474f51 (bug 1627075)
Backed out changeset 65c0e6790a33 (bug 1627075)
Backed out changeset 6cd31f17a931 (bug 1627075)
Backed out changeset 0f0d1bd2a8ac (bug 1627075)
Backed out changeset 763a5a7b43a0 (bug 1627075)
2020-07-01 22:16:28 +03:00
Doug Thayer ab4b703a53 Bug 1627075 - Route Omnijar requests through StartupCache r=froydnj
This should be a relatively straightforward patch. Essentially, we implement
a wrapper class (and friends) around nsZipArchive (and friends), which transparently
caches entries from the underlying zip archive in the StartupCache. This will break
without changes to the StartupCache, made in the patch after this, which allow it
to be used off of the main thread, and outside the main process.

Depends on D77635

Differential Revision: https://phabricator.services.mozilla.com/D77634
2020-07-01 17:09:53 +00:00
Doug Thayer b52c9d39c1 Bug 1627075 - Allow lazily initializing nsZipArchives r=froydnj
Opening our Omnijars can be expensive, and it should be deferrable until after
startup is completed, provided we have a startup cache. In a previous patch in this
stack, we implemented caching of the zip central directory for omnijars, but we
still have to open the file in order to hand the object off to various omnijar
consumers. In a later patch, we will wrap nsZipArchive access in a class which
will allow us to transparently cache nsZipArchive results. These two get us
most of the way to not needing to read from the underlying omnijar files during
startup, but there are still nontrivial pieces, like nsZipFind for instance,
which we don't want to just duplicate inside of a wrapper class, so we would
like to sort out a way in which we can use an nsZipArchive class, but not
actually back it up with the real underlying file until we really need data
from it which we can't find in a cache.

Depends on D77633

Differential Revision: https://phabricator.services.mozilla.com/D78584
2020-07-01 18:04:48 +00:00
Doug Thayer b19fd0dabb Bug 1627075 - Build Omnijar file list from startup cache r=froydnj
We would like to be able to defer opening the omnijar files until after startup
if the StartupCache has already been populated. Opening the omnijar files takes
a nontrivial time, at least on Windows, and almost everything in the omnijar
should be fairly compressible, and thus makes sense to live in the StartupCache.
See the last patch in this series for a little more discussion on numbers, but
tl;dr: we saw a 12% improvement in time to about:home being finished on reference
hardware with these changes together with the changes from the descendant patches.

Differential Revision: https://phabricator.services.mozilla.com/D77632
2020-07-01 17:07:17 +00:00
Valentin Gosu 722b5f1b24 Bug 1618271 - Move network.proxy.type to StaticPrefList.yaml r=mayhemer,necko-reviewers
Differential Revision: https://phabricator.services.mozilla.com/D80888
2020-07-01 16:49:05 +00:00
Sebastian Hengst 255c22186f Backed out 4 changesets (bug 1609920) for leaks in browser-chrome. CLOSED TREE
Backed out changeset 1c8faab05606 (bug 1609920)
Backed out changeset eaa0bb2cf36b (bug 1609920)
Backed out changeset fd1e4db7cf78 (bug 1609920)
Backed out changeset 0e68db4ad6af (bug 1609920)
2020-07-01 17:10:13 +02:00
Martin Stransky bd18fc33e3 Bug 1649120 [Linux] Rename dmabuf/vaapi preferences, r=jya
As DMABuf is going to be used under X11 let's remove Wayland keyword from the preferences
and also use media.ffmpeg key.

Wayland specific preferences rename:
    widget.wayland-dmabuf-textures.enabled to widget.dmabuf-textures.enabled
    widget.wayland-dmabuf-webgl.enabled to widget.dmabuf-webgl.enabled

Change dmabuf preferences to media.ffmpeg ones:
    widget.wayland-dmabuf-vaapi.enabled to media.ffmpeg.vaapi.enabled
    widget.wayland-dmabuf-video-textures.enabled to media.ffmpeg.dmabuf-textures.enabled

Implement media.ffmpeg.vaapi-drm-display.enabled preference to use DRM VA-API display
instead of the native one.

Differential Revision: https://phabricator.services.mozilla.com/D81512
2020-07-01 11:22:07 +00:00
Simon Giesecke 9364b353d4 Bug 1648010 - Remove NS_NAMED_LITERAL_CSTRING and NS_NAMED_LITERAL_STRING macros. r=froydnj
Differential Revision: https://phabricator.services.mozilla.com/D80631
2020-07-01 08:42:31 +00:00
Simon Giesecke cd8b8939b9 Bug 1648010 - Replace uses of NS_LITERAL_STRING/NS_LITERAL_CSTRING macros by _ns literals. r=geckoview-reviewers,jgilbert,agi,hsivonen,froydnj
Differential Revision: https://phabricator.services.mozilla.com/D80860
2020-07-01 08:29:29 +00:00
Luca Greco ac67fbe999 Bug 1609920 - part 2: Guard ServiceWorkerContainer::Register to allow/disallow moz-extension scheme based on prefs. r=dom-workers-and-storage-reviewers,asuth,webidl,smaug
- Adds a new "extensions.serviceWorkerRegister.allowed" pref (defaults to false)
- Makes ServiceWorkerContainer::Register to throw NS_ERROR_DOM_SECURITY_ERR if the
  script url is a moz-extension url and the caller is a non-system caller
  (but do not throw NS_ERROR_DOM_SECURITY_ERR if the caller is a moz-extension
  and the new pref is set to true)

Depends on D60244

Differential Revision: https://phabricator.services.mozilla.com/D60245
2020-06-30 20:40:53 +00:00
Luca Greco 665d0662d8 Bug 1609920 - part 1: Allow the WebExtension Framework to register a moz-extension service worker. r=dom-workers-and-storage-reviewers,asuth,mixedpuppy
- Adds the new about:config pref "extensions.backgroundServiceWorker.enabled" (currently defaults to false).
- Adds the background.service_worker property to the manifest JSON schema definition
- Locks background.service_worker manifest property behind the new preference
- Adds a new BackgroundWorker class to ext-backgroundPage.js (responsible for managing the background
  service worker for the extension, e.g. make sure that the expected worker script is registered
  as expected when the extension is starting up)
- Adds to the ServiceWorkerManager a new method to allow the WebExtension Framework to register the
  background service worker without an existing extension page
- Allows the "moz-extension" schema in the dom/serviceworkers and dom/cache internals

Depends on D63697

Differential Revision: https://phabricator.services.mozilla.com/D60244
2020-06-10 12:13:29 +00:00