Граф коммитов

16493 Коммитов

Автор SHA1 Сообщение Дата
Valentin Gosu 1030589ee4 Bug 1478732 - Change nsHostResolver to dispatch one resolver task per native lookup r=bagder
Differential Revision: https://phabricator.services.mozilla.com/D2431

--HG--
extra : moz-landing-system : lando
2018-08-07 07:03:57 +00:00
Jean-Yves Avenard 35a7076534 Bug 1481176 - P1. Export GetParameterHTTP as static method. r=valentin,r=bzbarsky
nsContentTypeParser used internally a nsIMIMEHeaderParam reference, effectively limiting its use on the main thread, and as such restricting any methods handling mime type there too.

nsContentTypeParser only made use of a single method nsMIMEHeaderParamImpl::GetParameterHTTP, so we make that method static and export it via nsNetUtil.

Differential Revision: https://phabricator.services.mozilla.com/D2788
2018-08-07 19:21:58 +02:00
Ehsan Akhgari 7d314b5011 Bug 1482129 - Exempt stylesheets, fonts and images when canceling loading of slow HTTP requests of tracking resources; r=valentin 2018-08-09 14:03:10 -04:00
Kershaw Chang 9430627a9f Bug 1478950 - Add a max limit to FTP list line, r=valentin
Summary: As suggested by pdknsk, add 32k limit to list line.

Reviewers: valentin

Tags: #secure-revision

Bug #: 1478950

Differential Revision: https://phabricator.services.mozilla.com/D2995
2018-08-09 20:12:54 +03:00
Junior Hsu 6fcddbf2de Bug 1481609 - Remove MOZ_SQLITE_COOKIES_OLD_SCHEMA telemetry probe r=valentin
Differential Revision: https://phabricator.services.mozilla.com/D2896

--HG--
extra : moz-landing-system : lando
2018-08-08 16:43:09 +00:00
Daniel Stenberg fcdada427b bug 1466860 - upgrade DOH code to draft-12 level r=mcmanus
MozReview-Commit-ID: FSVh7qUbBig

Differential Revision: https://phabricator.services.mozilla.com/D2828

--HG--
extra : moz-landing-system : lando
2018-08-08 15:01:05 +00:00
Kershaw Chang 37c0b16f99 Bug 1470458 - Test case, r=valentin
Test steps:
1. Create a XHR
2. Initializes the XHR with non-ascii username and password
3. Send the request to server
4. Check if the server receives the correct Authorization header
2018-08-07 06:00:00 +03:00
Kershaw Chang 2e30d83ba2 Bug 1470458 - Use correct function to copy UTF8 string, r=valentin
Since username and password are not always ascii string, we have to use the correct function CopyUTF8toUTF16 to copy string.
2018-08-07 06:00:00 +03:00
Arthur Edelstein 04dab89db7 Bug 1481096 - Fix incorrectly written pref name r=nwgh
"spdy.default-hpack-buffer" was incorrectly
written as "spdy.hpack-default-buffer".

--HG--
extra : histedit_source : 28dfa00e0accb4e51239a2d31178944034b3eaf5
2018-08-05 16:10:00 +03:00
Mike Hommey 01f69bda76 Bug 1481373 - Work around clang miscompilation of a non-virtual thunk to HttpChannelChild::AsyncCall on x86. r=valentin 2018-08-08 06:31:40 +09:00
Valentin Gosu 45e6d5718f Bug 1478732 - Backed out changeset 9de74f5039a4 r=backout 2018-08-09 18:56:02 +02:00
Masatoshi Kimura 3b21b7868b Bug 1090497 - Re-enable warnings as errors on clang-cl. r=froydnj
--HG--
extra : rebase_source : c09366fb93e5b0f72abe1e99d3094e3d96a934fb
extra : intermediate-source : 5950c9d63c3b4fd63a25464a7b50944aaec7079f
extra : source : ca1b9a2bcc4381795f556fea2fb59066567c30f3
2018-07-31 22:10:07 +09:00
Andrea Marchesini d7df3bf81e Bug 1476715 - low priority connection for 3rd party + tracking resource only, r=francois 2018-08-06 13:42:43 +02:00
Jeremy Lempereur e8a7f0b917 Bug 1481016 - Network, use inherent rust methods instead of deprecated std::ascii:AsciiExt ones, r=valentin
MozReview-Commit-ID: F1NGG0q6WdS

--HG--
extra : rebase_source : 077684b197d23f9893048c977f1d3ca2e97b5136
2018-08-04 20:24:59 +02:00
Noemi Erli 23c8a3a9f3 Backed out changeset 1e9ecba54e7b (bug 1348273) for failing on widget/tests/test_bug1123480.xul 2018-08-04 12:39:40 +03:00
Andrea Marchesini 8ab9f07dd8 Bug 1462879 - PerformanceNavigationTiming must be notified correctly - part 1 - notify, r=smaug, r=valentin 2018-08-04 08:54:58 +02:00
Gabriele Svelto 50ba13cce4 Bug 1348273 - Convert crash annotations into a machine-readable list of constants; r=ted.mielczarek,njn,dholbert,mak,cpearce,mcmanus,froydnj,Dexter,jrmuizel,jchen,jimm,bz,surkov
This introduces the machinery needed to generate crash annotations from a YAML
file. The relevant functions are updated to take a typed enum (in C++) and an
integer constant (in JavaScript). A JavaScript wrapper around the crash
reporter service is provided to hold the constants. The existing whitelists
and blacklists of annotations are also generated from the YAML file and the
existing duplicate code has been consolidated. Once written out to the .extra
file the annotations are converted in string form and are no different than
the existing ones.

All existing annotations have been included (and some obsolete ones removed)
and all call sites have been updated including tests.

--HG--
extra : rebase_source : b4f0d4bf83c64851028c271d3fab3ebcb6fbcd3e
2018-07-05 15:42:11 +02:00
Coroiu Cristina 1ba19a32ac Backed out changeset 86471a18672f (bug 1348273) for ESlint failure at toolkit/modules/WebNavigationChild.jsm
--HG--
extra : rebase_source : e0c94f49ddc1f1b119b72c06fccc1b4363b9d340
2018-08-03 22:48:51 +03:00
Gabriele Svelto eff24befbd Bug 1348273 - Convert crash annotations into a machine-readable list of constants; r=ted.mielczarek,njn,dholbert,mak,cpearce,mcmanus,froydnj,Dexter,jrmuizel,jchen,jimm,bz,surkov
This introduces the machinery needed to generate crash annotations from a YAML
file. The relevant functions are updated to take a typed enum (in C++) and an
integer constant (in JavaScript). A JavaScript wrapper around the crash
reporter service is provided to hold the constants. The existing whitelists
and blacklists of annotations are also generated from the YAML file and the
existing duplicate code has been consolidated. Once written out to the .extra
file the annotations are converted in string form and are no different than
the existing ones.

All existing annotations have been included (and some obsolete ones removed)
and all call sites have been updated including tests.

--HG--
extra : rebase_source : f0e8d229581ac5c0daa0e0454cb258746108e28d
2018-07-05 15:42:11 +02:00
Jan de Mooij 3af36d3d86 Bug 1479363 part 10 - Use JSAutoRealm instead of JSAutoRealmAllowCCW in other directories. r=mrbkap 2018-08-02 19:30:17 +02:00
Cosmin Sabou de8c2bd891 Backed out changeset 5950c9d63c3b (bug 1090497) for build bustages on several files. CLOSED TREE 2018-08-02 19:59:53 +03:00
Masatoshi Kimura feea19030c Bug 1090497 - Re-enable warnings as errors on clang-cl. r=froydnj
--HG--
extra : rebase_source : a62521fdc66def4e4d5d7bf52e68365a786b5c55
extra : source : ca1b9a2bcc4381795f556fea2fb59066567c30f3
2018-07-31 22:10:07 +09:00
Noemi Erli 8f66a71e70 Merge inbound to mozilla-central. a=merge 2018-08-02 11:54:46 +03:00
Nika Layzell 7a9f60fafb Bug 1479484 - Part 1: Add make_dafsa.py to the virtualenv's python path, r=froydnj
Summary:
The plan is to also expose perfecthash.py from this module on the python path.
This also allows us to stop using explicit module loading to load make_dafsa.py.

make_dafsa.py was moved into tools/ to avoid any extra python files from
accidentally ending up on the python path.

Reviewers: froydnj!

Tags: #secure-revision

Bug #: 1479484

Differential Revision: https://phabricator.services.mozilla.com/D2614


--HG--
rename : xpcom/ds/make_dafsa.py => xpcom/ds/tools/make_dafsa.py
2018-08-01 17:54:41 -04:00
dvarga 09eac64963 Merge mozilla-central to autoland. a=merge CLOSED TREE 2018-08-02 01:19:44 +03:00
Jorg K ba1be252a0 Bug 1478441 - Introduce nsIURIWithSpecialOrigin needed for Thunderbird. r=baku 2018-07-31 11:27:00 +03:00
Andrea Marchesini c0f96019e1 Bug 1430095 - Get rid of network.cookie.prefsMigrated, network.cookie.lifetime.enabled and network.cookie.lifetime.behavior prefs, r=valentin 2018-08-01 14:41:21 +02:00
Andrea Marchesini 5991b3ebdd Bug 1457170 - Get rid of nsICookieService::ACCEPT_FOR_N_DAYS, r=valentin 2018-08-01 14:41:21 +02:00
Francois Marier e98e918836 Bug 1461515 - Fix and expand tracking annotation test. r=dimi
Here's a summary of things that were wrong about this test:

1. It was setting urlclassifier.trackingTable only to be overwritten
   later by addTestTrackers().
2. It was using an http event which fires before the classification has
   been done.
3. It didn't disable tailing, which interferes with lowering the priority of
   XHRs.
4. It was not testing that non-annotated or whitelisted resources would not
   have their priority lowered.

I added more test cases both to ensure that the correct list
(urlclassifier.trackingAnnotationTable) is used but also to ensure that
whitelisted or non-blacklisted URLs preserve the normal priority (point #4 above).

I found that XHRs do not get their priority lowered because of this flag:

  https://searchfox.org/mozilla-central/rev/d47c829065767b6f36d29303d650bffb7c4f94a3/netwerk/base/nsChannelClassifier.cpp#221

which gets set here:

  https://searchfox.org/mozilla-central/rev/d47c829065767b6f36d29303d650bffb7c4f94a3/dom/xhr/XMLHttpRequestMainThread.cpp#2548

and so I had to disable tailing in the test (point #3 above).

There was also a problem where the test was resetting the prefs too early
because we were not actually waiting for the classification to finish.

We would wait for the following event: http-on-opening-request

  https://searchfox.org/mozilla-central/rev/d47c829065767b6f36d29303d650bffb7c4f94a3/netwerk/protocol/http/nsIHttpProtocolHandler.idl#85

whereas maybe a more appropriate one would be http-on-before-connect:

  https://searchfox.org/mozilla-central/rev/d47c829065767b6f36d29303d650bffb7c4f94a3/netwerk/protocol/http/nsIHttpProtocolHandler.idl#103

since that is triggerred after annotations (point #2 above):

  https://searchfox.org/mozilla-central/rev/d47c829065767b6f36d29303d650bffb7c4f94a3/netwerk/protocol/http/nsHttpChannel.cpp#6614

Differential Revision: https://phabricator.services.mozilla.com/D2485

--HG--
extra : moz-landing-system : lando
2018-08-01 11:52:03 +00:00
Francois Marier 9f161ab08f Bug 1461515 - Split tracking annotations from tracking protection. r=dimi
This makes it possible to use different lists for tracking protection
and for the features that rely on tracking annotations.

Differential Revision: https://phabricator.services.mozilla.com/D2484

--HG--
extra : moz-landing-system : lando
2018-08-01 20:45:41 +00:00
Andrea Marchesini 44ce53c72e Bug 1476592 - Remove the cache from nsCSPContext - part 2 - sendViolationReports parameter, r=ckerschb, r=aosmond 2018-08-01 06:35:24 +02:00
Cosmin Sabou bfc1e72e01 Backed out changeset 9035ff3757ac (bug 1415980) at request from froydnj on the suspicion that it's going to break MSVC builds when it gets merged to central. 2018-07-31 01:19:49 +03:00
Nathan Froyd 017b016850 Bug 1415980 - make hash keys movable and not copyable; r=erahm
Everything that goes in a PLDHashtable (and its derivatives, like
nsTHashtable) needs to inherit from PLDHashEntryHdr.  But through a lack
of enforcement, copy constructors for these derived classes didn't
explicitly invoke the copy constructor for PLDHashEntryHdr (and the
compiler didn't invoke the copy constructor for us).  Instead,
PLDHashTable explicitly copied around the bits that the copy constructor
would have.

The current setup has two problems:

1) Derived classes should be using move construction, not copy
   construction, since anything that's shuffling hash table keys/entries
   around will be using move construction.

2) Derived classes should take responsibility for transferring bits of
   superclass state around, and not rely on something else to handle
   that.

The second point is not a huge problem for PLDHashTable (PLDHashTable
only has to copy PLDHashEntryHdr's bits in a single place), but future
hash table implementations that might move entries around more
aggressively would have to insert compensation code all over the place.
Additionally, if moving entries is implemented via memcpy (which is
quite common), PLDHashTable copying around bits *again* is inefficient.

Let's fix all these problems in one go, by:

1) Explicitly declaring the set of constructors that PLDHashEntryHdr
   implements (and does not implement).  In particular, the copy
   constructor is deleted, so any derived classes that attempt to make
   themselves copyable will be detected at compile time: the compiler
   will complain that the superclass type is not copyable.

   This change on its own will result in many compiler errors, so...

2) Change any derived classes to implement move constructors instead
   of copy constructors.  Note that some of these move constructors are,
   strictly speaking, unnecessary, since the relevant classes are moved
   via memcpy in nsTHashtable and its derivatives.
2018-07-30 17:15:11 -04:00
Makoto Kato e788340ea4 Bug 1462019 - Part 1. Support abstract socket address on nsIServerSocket and nsISocketTransportService. r=mayhemer 2018-07-26 18:06:42 +09:00
Kris Maglione 031076f2f3 Bug 1463291: Move docShell getter from Document to Window. r=bz
DocShells are associated with outer DOM Windows, rather than Documents, so
having the getter on the document is a bit odd to begin with. But it's also
considerably less convenient, since most of the times when we want a docShell
from JS, we're dealing most directly with a window, and have to detour through
the document to get it.

MozReview-Commit-ID: LUj1H9nG3QL

--HG--
extra : source : fcfb99baa0f0fb60a7c420a712c6ae7c72576871
extra : histedit_source : 5be9b7b29a52a4b8376ee0bdfc5c08b12e3c775a
2018-05-21 16:58:23 -07:00
Kris Maglione 02ba563399 Bug 1463016: Part 5 - Add domWindow property to DocShellTreeItem and update callers to use it. r=nika
MozReview-Commit-ID: FRRAdxLHRtG

--HG--
extra : source : 0d69b4fb1ed43751cfcbc0b4f2fe3b6a49bc0494
extra : histedit_source : d0ce31513ffaae2fd7f01f6567a97b6d2d96b797%2Cfff837de7a00fa90809d2c3e755097180dfd56d8
2018-05-20 18:10:16 -07:00
Narcis Beleuzu 561ccb2ceb Backed out 2 changesets (bug 1463016, bug 1463291) for geckoview failures
Backed out changeset fcfb99baa0f0 (bug 1463291)
Backed out changeset 0d69b4fb1ed4 (bug 1463016)
2018-07-29 03:55:23 +03:00
Kris Maglione cb1ee1e34d Bug 1463291: Move docShell getter from Document to Window. r=bz
DocShells are associated with outer DOM Windows, rather than Documents, so
having the getter on the document is a bit odd to begin with. But it's also
considerably less convenient, since most of the times when we want a docShell
from JS, we're dealing most directly with a window, and have to detour through
the document to get it.

MozReview-Commit-ID: LUj1H9nG3QL

--HG--
extra : rebase_source : a13c59d1a5ed000187c7fd8e7339408ad6e2dee6
2018-05-21 16:58:23 -07:00
Kris Maglione 636f1839e5 Bug 1463016: Part 5 - Add domWindow property to DocShellTreeItem and update callers to use it. r=nika
MozReview-Commit-ID: FRRAdxLHRtG

--HG--
extra : rebase_source : 36565ef5e74360aad14062005e5bdab2939e888b
2018-05-20 18:10:16 -07:00
Jan de Mooij 80adc67aba Bug 1478955 part 1 - Rename JSAutoRealm to JSAutoRealmAllowCCW. r=luke 2018-07-28 12:12:26 +02:00
Nicholas Hurley e8cb6c18a3 Bug 1468583 - Explicitly tie h2stream to transaction in logs for logan. r=valentin
Differential Revision: https://phabricator.services.mozilla.com/D1656

--HG--
extra : moz-landing-system : lando
2018-07-27 06:35:00 +00:00
Felipe Gomes 25e4f07d6c Bug 1470324 - Don't load enterprise policies in the content during startup. r=kmag
With this patch, EnterprisePoliciesContent.js will only be loaded whenever a check for isAllowed happens in content.

This patch also adds shortcuts to make sure that checks for about:blank, about:neterror and about:certerror are skipped

MozReview-Commit-ID: AdMrolJqouN

--HG--
extra : rebase_source : 0949427c78fe26743294c0c1b43844f0154003b7
2018-07-27 14:50:55 -03:00
Michal Novotny 6c7074966b Bug 1477684 - rcwn blocking some xmlHttpRequests, r=valentin
Remove conditional and byte range headers when network won the race for case we send the request again due to 401 response.
2018-07-26 07:20:00 +03:00
Dorel Luca 57b8025529 Backed out changeset 3ff805a9631e (bug 1475701) for XPCshell failures on netwerk/test/unit/test_cache2-29a-concurrent_read_resumable_entry_size_zero.js 2018-07-27 12:12:59 +03:00
Michal Novotny 38f29ba537 Bug 1475701 - Save Page As doesn't begin MP3 download while tab is open, r=valentin
We need to close the cache entry if opening output stream for writing/appending data failed, so the entry isn't blocked for other requests.
2018-07-26 14:54:00 +03:00
Eric Rahm c8e70cc096 Bug 1240547 - Part 5: Reorder HttpBaseChannel member variables. r=valentin
--HG--
extra : rebase_source : af73138c747517bb82658a4a1e9f3cf357db2f91
2018-07-20 16:56:22 -07:00
Eric Rahm 34bd603e7b Bug 1240547 - Part 4: Use bitfields for HttpChannelChild bool variables. r=valentin
--HG--
extra : rebase_source : aaba4d19c433485a711bdabb2907984163bb4ed0
2018-07-20 15:39:40 -07:00
Eric Rahm 4fa3e432dd Bug 1240547 - Part 3: Reorder HttpChannelChild member variables. r=valentin
--HG--
extra : rebase_source : f1c33e1b77f9ce0fd70838ed27331c8490163774
2018-07-20 14:11:46 -07:00
Eric Rahm a388fe4b0c Bug 1240547 - Part 2: Pack HttpChannelParent bool fields. r=valentin
--HG--
extra : rebase_source : 459cb63075b9a328d70c23b30cc9ca76a4a58162
2018-07-19 17:40:43 -07:00
Eric Rahm bcf9fc80b0 Bug 1240547 - Part 1: Reorder HttpChannelParent member variables. r=valentin
--HG--
extra : rebase_source : 2e60ea6d39d4e2717edd68e4abd1f06acf8bc7d4
2018-07-19 17:19:07 -07:00
Dipen Patel 7641beb1f8 Bug 1475647 - Remove nsISSLStatusProvider interface. r=baku,Gijs,jchen,jryans,keeler,mcmanus
- Access nsISSLStatus directly as a member of nsITransportSecurityInfo
and nsISecureBrowserUI.  This is part of a larger effort to consolidate
nsISSLStatus and nsITransportSecurityInfo.
- The TabParent implementation of GetSecInfo will always return null.
- Removed unnecessary QueryInterface calls
- Style adherence updates

MozReview-Commit-ID: Dzy6t2zYljL

--HG--
extra : rebase_source : 9c400bed3c9d29a186fc987c9bd0ffceb37bfd94
2018-07-13 11:48:55 -07:00
Andreea Pavel d0f6470c17 Backed out changeset c235d6f86c22 (bug 1475647) for breaking firefox ui at testing/firefox-ui/tests/puppeteer/test_tabbar.py on a CLOSED TREE 2018-07-25 19:34:58 +03:00
Dipen Patel 8670057dd5 Bug 1475647 - Remove nsISSLStatusProvider interface. r=baku,Gijs,jchen,jryans,keeler,mcmanus
- Access nsISSLStatus directly as a member of nsITransportSecurityInfo
and nsISecureBrowserUI.  This is part of a larger effort to consolidate
nsISSLStatus and nsITransportSecurityInfo.
- The TabParent implementation of GetSecInfo will always return null.
- Removed unnecessary QueryInterface calls
- Style adherence updates

MozReview-Commit-ID: Dzy6t2zYljL

--HG--
extra : rebase_source : fbfbcf7608efbfb35c9be4018ff0f4e70b2768d2
2018-07-13 11:48:55 -07:00
Tiberius Oros 036999d0a9 Merge mozilla-central to inbound. a=merge CLOSED TREE 2018-07-25 13:43:03 +03:00
Liang-Heng Chen 5574f1d788 Bug 1478081 - avoid accessing null pointer; r=valentin
Differential Revision: https://phabricator.services.mozilla.com/D2336

--HG--
extra : moz-landing-system : lando
2018-07-24 21:03:03 +00:00
Boris Zbarsky 634a492dda Bug 1476145 part 9. Drop support for getting window utils via getInterface. r=nika 2018-07-24 19:47:43 -04:00
Narcis Beleuzu 80c1cde899 Merge mozilla-central to inbound. a=merge CLOSED TREE 2018-07-25 01:22:42 +03:00
Michal Novotny 352af354ca Bug 1466577 - Race condition in WebSocketChannel::StopSession. r=hurley
This patch prevents calling WebSocketChannel::StopSession at the same time on main thread from WebSocketChannel::Close and on socket thread from WebSocketChannel::AbortSession.

--HG--
extra : amend_source : ee9c2ebb75273251d868c9726597a41cf38fbb6c
2018-07-24 17:18:58 -04:00
Andrea Marchesini f6768a8ff6 Bug 1228139 - Remove nsIURIWithPrincipal - part 3 - main part, r=bz
nsIURIWithPrincipal is currently used to retrieve the nsIPrincipal from a
BlobURL object.  BlobURLProtocolHandler has a hashtable containing, for each
blobURL, a BlobImpl and its nsIPrincipal. This patch introduces
BlobURLProtocolHandler::GetBlobURLPrincipal() that retrieves the nsIPrincipal
from this hashtable.

This patch fixes also a bug in how the revocation of blobURLs is broadcasted to
other processes. This should be done immediately because each process creates
its own timer to revoke them after 5 seconds.

An important change is related to NS_SecurityCompareURIs() where, if 1 (or
both) of the 2 URIs to compare, is a revoked BlobURL, we will QI its URL to
nsIStandardURL and fail out at that point.
2018-07-24 22:15:57 +02:00
Liang-Heng Chen 0e974b3af4 Bug 1474280 - Part 2: carry timestamp when redirects; r=valentin 2018-07-23 05:29:00 +03:00
Liang-Heng Chen a1785d29f1 Bug 1474280 - Part 1: Cancel timed-out trackers; r=mayhemer 2018-07-23 05:28:00 +03:00
Coroiu Cristina 3628e073f1 Merge mozilla-central to inbound a=merge on a CLOSED TREE 2018-07-24 00:46:46 +03:00
Brian Hackett ab23746a30 Bug 1465294 Part 11 - Don't create Necko children in middleman processes, r=mayhemer.
--HG--
extra : rebase_source : e83d613e11b40ad8dc75399bc5b946231ffe2886
2018-07-23 14:56:12 +00:00
Valentin Gosu 7937c7c4cc Bug 1476928 - Remove nsIURI.CloneIgnoringRef and nsIURI.CloneWithNewRef r=JuniorHsu
The patch introduces NS_GetURIWithNewRef and NS_GetURIWithNewRef which perform the same function.

Differential Revision: https://phabricator.services.mozilla.com/D2239

--HG--
extra : moz-landing-system : lando
2018-07-23 11:28:47 +00:00
Byron Campen [:bwc] 721e2034d6 Bug 1448846: Ignore POLLERR on UDP sockets. r=dragana
MozReview-Commit-ID: 1FxhHbH8Neg

--HG--
extra : rebase_source : e50fbde7c3d52141dfb29a9805a00cec9be633ca
2018-07-02 11:52:02 -05:00
Cosmin Sabou b5b2c78493 Merge mozilla-central to autoland. a=merge 2018-07-21 00:48:28 +03:00
Michael Kaply 96e550bb6b Bug 1477076 - Add POST support to addEngineWithDetails. r=florian
Differential Revision: https://phabricator.services.mozilla.com/D2254

--HG--
extra : moz-landing-system : lando
2018-07-20 18:40:00 +00:00
Christoph Kerschbaumer adac33969a Bug 1304645: Pass individual CSP errors as categories to web console error messages. r=baku 2018-07-20 19:57:21 +02:00
Christoph Kerschbaumer f9100f4600 Bug 1475073: Pass individual CORS errors as categories to web console error messages. r=baku 2018-07-20 19:57:41 +02:00
Andrea Marchesini 28962b5168 Bug 1468501 - Implement a way to delete network cache by nsIPrincipal, r=mayhemer, r=michal 2018-07-20 13:57:18 +02:00
Andreea Pavel b5a482c899 Backed out 3 changesets (bug 1475073, bug 1304645, bug 1474537) for failing wpt and mochitest on a CLOSED TREE
Backed out changeset 4fbeea69b10d (bug 1475073)
Backed out changeset d3ac68d9ead9 (bug 1304645)
Backed out changeset 113b601a3b59 (bug 1474537)
2018-07-20 14:00:09 +03:00
Christoph Kerschbaumer c1c9ee3d96 Bug 1475073: Pass individual CORS errors as categories to web console error messages. r=baku 2018-07-20 10:47:15 +02:00
Christoph Kerschbaumer 1de27c0297 Bug 1304645: Pass individual CSP errors as categories to web console error messages. r=baku 2018-07-20 10:42:46 +02:00
Robert Bartlensky 276e65ee14 Bug 1476016: Fix DEAD_STORE issue in nsMIMEHeaderParamImpl. r=michal
MozReview-Commit-ID: F1p3ji1ezp3

--HG--
extra : rebase_source : 74e95db9d7393e7b2ebc43bd8583d276639eb56a
2018-07-17 12:32:42 +01:00
Andrea Marchesini 3003d70341 Bug 1476324 - Storage activation via window.open(URL) applies across top-level domains - part 3 - annotate top-level channels, r=ehsan 2018-07-18 15:44:55 +02:00
Eric Rahm a064f414e3 Bug 1448034 - Part 2: Lazily create ProxyResolution thread. r=bagder
This delays the creation of the PAC thread until we need to dispatch a
runnable to it.

--HG--
extra : rebase_source : 8897d3d8724f082ad33027635795512ccb4a17eb
extra : source : 068bb4e7b8494d8ae82dfd1b1f22680234bf038c
2018-07-16 16:05:39 -07:00
Eric Rahm 8c04ce5531 Bug 1448034 - Part 1: Get rid of SysProxySetting threads. r=bagder
--HG--
extra : rebase_source : a9e99b0b4d8f6d3dff71547a15fb520ea2a37424
extra : source : eb542860b989d4f6ea1ffcb29ff843b857d78482
2018-07-10 18:02:21 -07:00
Andrea Marchesini 4e97b69ebf Bug 1476306 - Moving NullPrincipal/ContentPrincipal/SystemPrincipal under mozilla namespace - part 3 - ContentPrincipal, r=ckerschb 2018-07-17 21:38:48 +02:00
Andrea Marchesini a053cf1c15 Bug 1476306 - Moving NullPrincipal/ContentPrincipal/SystemPrincipal under mozilla namespace - part 1 - NullPrincipal, r=ckerschb 2018-07-17 21:37:48 +02:00
Ehsan Akhgari 51cc2694b0 Bug 1475697 - Part 1: Refactor the current way that Necko notifies DOM about the existence of blocked content; r=baku 2018-07-17 06:11:00 +03:00
Coroiu Cristina 98a7487673 Backed out 2 changesets (bug 1448034) for GTest failures
Backed out changeset 068bb4e7b849 (bug 1448034)
Backed out changeset eb542860b989 (bug 1448034)

--HG--
extra : rebase_source : b133c3bd4f769c25e49c7de59edd57245649ee72
2018-07-17 08:51:20 +03:00
Kris Maglione ae75e45945 Bug 1473631: Part 14 - Replace pref observers with callbacks in nsCacheService. r=njn
MozReview-Commit-ID: Kl1Sgo3F3Sk

--HG--
extra : rebase_source : 46fb508bb73adf1a556ac20abd30bf56bf23d3f5
2018-07-05 15:21:20 -07:00
Kris Maglione ab9a7b5649 Bug 1473631: Part 6 - Replace pref observers with callbacks in IDNService. r=njn
MozReview-Commit-ID: FlFC2HxYo4v

--HG--
extra : rebase_source : 1a6f00a7e9bff61e02ef7be8a6681f5574da442a
2018-07-05 14:01:51 -07:00
Kris Maglione 152af93226 Bug 1473631: Part 3 - Replace pref observers with callbacks in IOService. r=njn
MozReview-Commit-ID: BBNUysmOuZV

--HG--
extra : rebase_source : 204d4444deed66a34e029e794b4721cf93b33d72
2018-07-05 13:25:03 -07:00
Kris Maglione f1400534b8 Bug 1473631: Part 2 - Replace pref observers with callbacks in STS. r=njn
MozReview-Commit-ID: BUiQqMA8eVs

--HG--
extra : rebase_source : 0b9571fb151220db1852bebd8149aaaf3e987ddb
2018-07-05 13:15:52 -07:00
Kris Maglione 37b1a59b2a Bug 1473631: Part 1 - Replace pref observers with callbacks in nsHttpHandler. r=njn
MozReview-Commit-ID: LtWV0yEwSd6

--HG--
extra : rebase_source : d839e8436ae97932d448d725ff70b0bb2a22d786
2018-07-05 13:10:20 -07:00
Kris Maglione 0bfdb4329f Bug 1473631: Part 0a - Make preference callbacks typesafe. r=njn
I initially tried to avoid this, but decided it was necessary given the number
of times I had to repeat the same pattern of casting a variable to void*, and
then casting it back in a part of code far distant from the original type.

This changes our preference callback registration functions to match the type
of the callback's closure argument to the actual type of the closure pointer
passed, and then casting it to the type of our generic callback function. This
ensures that the callback function always gets an argument of the type it's
actually expecting without adding any additional runtime memory or
QueryInterface overhead for tracking it.

MozReview-Commit-ID: 9tLKBe10ddP

--HG--
extra : rebase_source : 7524fa8dcd5585f5a31fdeb37d95714f1bb94922
2018-07-06 12:24:41 -07:00
Eric Rahm 3eed00fc26 Bug 1448034 - Part 2: Lazily create ProxyResolution thread. r=bagder
This delays the creation of the PAC thread until we need to dispatch a
runnable to it.

--HG--
extra : rebase_source : dc4bffc041e237dddac7ae36a3a3b2f9c5de3421
2018-07-16 16:05:39 -07:00
Eric Rahm dba1589cc2 Bug 1448034 - Part 1: Get rid of SysProxySetting threads. r=bagder
--HG--
extra : rebase_source : 4d8de477d605801ae19579eac1bf2b647cf444c9
2018-07-10 18:02:21 -07:00
Polly Shaw 226a5beff6 Bug 356831 - Proxy autodiscovery doesn't check DHCP (option 252) r=bagder,valentin
This patch addresses an issue with Firefox's proxy detection on networks which
do not have their a proxy auto-configuration (PAC) file hosted at
http://wpad/wpad.dat, and instead make use of DHCP option 252 for broadcasting
the address of the PAC file. See https://findproxyforurl.com/wpad-introduction/
for an introduction to the protocol.

Prior to this patch, proxy auto-detect missed out the DHCP query stage, and just
 looked for a PAC file at http://wpad/wpad.dat


This patch only addresses the issue for Firefox on Windows, although it defines a
DHCP client interface which could be implemented on other platforms.

The high-level components of this patch are:
 * nsIDHCPClient.idl - this is an interface which has been defined for querying the
   DHCP server.
 * nsPACMan.cpp - where previously when the PAC URL was simply set to a constant of
   http://wpad/wpad.dat, it now dispatches an asynchronous command to the proxy
   thread. The class ExecutePACThreadAction has been augmented to include an
   instruction to 'ConfigureWPAD' (Configure Web-proxy auto-detect), and a new class,
   'ConfigureWPADComplete' has been created to relay the result (the URL of the PAC
   file) back to the nsPACMan object.
 * nsProtocolProxyService.cpp
   Minor changes to reflect the fact that the PAC URL not being set does not always
   mean there is no PAC to be used; instead it could be in the process of being
   detected.
 * TestPACMan.cpp
   This is a new file, and tests only the DHCP auto-detect functionality.
   Some tests use multiple threads, as they test the non-blocking proxy detection.
 * DHCPUtils.cpp
   A class containing the main logic for querying DHCP.
 * WindowsNetworkFunctionsWrapper.cpp
   A very thin wrapper around the Windows API calls needed by DHCPUtils.
   This class was introduced so it could be mocked out in tests.
 * nsWindowsDHCPClient.cpp
 * An implementation of the interface defined in nsIDHCPClient.idl. Fairly thin:
   most logic is implemented in DHCPUtils.
 * TestDHCPUtils.cpp
   Tests for DHCPUtils and nsWindowsDHCPClient

MozReview-Commit-ID: 4xFQz3tOLEx

--HG--
extra : rebase_source : dfd5c588406a8b0d92f91cc8a0038ca722b7140a
2018-06-07 23:07:28 +01:00
Noemi Erli 9793ca2da4 Merge inbound to mozilla-central. a=merge 2018-07-14 00:52:51 +03:00
Masayuki Nakano 5c3723acb2 Bug 1475461 - part 2: Make callers of PLDHashTable::Search() const methods if possible r=Ehsan
Some callers of PLDHashTable::Search() use const_cast, some others are not
const methods due to non-const PLDHashTable::Search().

This patch removes const_cast from the former and mark some methods of the
latter const.

MozReview-Commit-ID: C8ayoi7mXc1

--HG--
extra : rebase_source : 2cba0339756e3278ba6e5f0e8a11e68217a61d34
2018-07-13 19:01:53 +09:00
Andrea Marchesini 1498612e1b Bug 1474812 - No needs to store granted storage access in nsILoadInfo and in the inner window, r=ehsan 2018-07-13 12:02:19 +02:00
Daniel Stenberg af7b8b701a bug 1472662 - only send DNS_TRR_NS_VERIFIED telemetry once r=mcmanus
... by making sure we only retry TRR when we go from CP bad=>good.

MozReview-Commit-ID: FcDwzSHm6Ia

--HG--
extra : rebase_source : dce21e18e6a4d854bd2023c61974658b100c1484
2018-07-11 09:43:38 +02:00
Patrick McManus 689f7724db Bug 1475420 - mark the TRR connection as DISABLE_TRR to avoid TXT deadlock r=valentin
MozReview-Commit-ID: 3xF3Hb5rpyh

--HG--
extra : rebase_source : 732e5c440321b8cd6bf9b189c5f97774ae338051
2018-07-12 17:48:54 -04:00
Gurzau Raul fff6ccd0b0 Merge mozilla-central to autoland. a=merge CLOSED TREE 2018-07-12 01:08:09 +03:00
Dragana Damjanovic 66dc0d2b39 Bug 1467102 - Fix the ftp diversion. r=bagder 2018-07-11 10:01:43 -04:00
imjching 01b7c92eb4 Bug 1416066 - Add a new flag to nsIAboutModule to load URIs in privileged content processes if feature is enabled. r=mconley
We will apply the URI_CAN_LOAD_IN_PRIVILEGED_CHILD flag to Activity Stream about: pages instead of hardcoding the URLs in a Set.

MozReview-Commit-ID: F6AGmsKs1SR

--HG--
extra : rebase_source : e0435776b7bd390a2a62190ba6c72d4d312538d1
2018-07-03 19:31:37 -04:00
vinoth 33326b442d Bug 1312864 - Allow redirects for requests that require preflight
Reviewers: ckerschb, mrbkap

Reviewed By: ckerschb, mrbkap

Subscribers: ckerschb

Bug #: 1312864

Differential Revision: https://phabricator.services.mozilla.com/D1875

--HG--
extra : rebase_source : 06ae50d91816955ab6bdaa2741ddccb1eb2a3206
2018-07-10 15:48:03 +03:00
Andrea Marchesini 0a542c2c05 Bug 1469993 - Grant storage access to a 3rd party, tracking resource if a opened document has user-interaction - part 7 - cookies, r=ehsan 2018-07-10 10:09:59 +02:00