Граф коммитов

16656 Коммитов

Автор SHA1 Сообщение Дата
Francois Marier 66260f4d22 Bug 1480448 - Honor browser.contentblocking.enabled in Fastblock. r=xeonchen!
Differential Revision: https://phabricator.services.mozilla.com/D3135

--HG--
extra : moz-landing-system : lando
2018-08-13 10:06:37 +00:00
Ehsan Akhgari 9ab3b9fea9 Bug 1478539 - Part 3: Remove some dead code; r=nwgh 2018-08-13 17:05:31 -04:00
Ehsan Akhgari 8f79c3cc07 Bug 1478539 - Part 1: Add the Cookie header to HTTP requests only after a potential classification has been completed on the channel to ensure the tracking state is up to date; r=nwgh
Besides this, we also need to do two extra things here:

  * Call the http-on-modify-request observers after the Cookie header is set,
    to ensure the Cookie header will be visible to them.
  * Move the call to SetLoadGroupUserAgentOverride() to happen after that, in
    order to preserve the existing respective ordering of that with regards to
    when the http-on-modify-request observers run.

Please note that as things are right now, the http-on-modify-request observers
are unable to see the User-Agent header overrides through the loadgroup, which
seems suboptimal, but this patch aims to preserve the existing behavior of
these observers.
2018-08-13 17:04:44 -04:00
Andrea Marchesini d1e5833a37 Bug 1480780 - Merge the privacy.3rdpartystorage.enabled pref with the network.cookie.cookieBehavior pref; r=ehsan
This patch introduces a new cookie behavior policy called
BEHAVIOR_REJECT_TRACKER.  It also makes it possible to override that
behavior with cookie permissions similar to other cookie behaviors.
2018-08-13 16:01:16 -04:00
Daniel Stenberg 315e5ddcc0 bug 1466462 - TRR: disable EDNS Client Subnet by default r=mcmanus
Set the "network.trr.disable-ECS" pref to false to disable.

MozReview-Commit-ID: GE6L8Vpvuu0

Differential Revision: https://phabricator.services.mozilla.com/D2933

--HG--
extra : moz-landing-system : lando
2018-08-13 15:45:15 +00:00
Adrian Wielgosik be0c1a4f55 Bug 1481645 - Remove some redundant uses of do_QueryInterface. r=bzbarsky
Differential Revision: https://phabricator.services.mozilla.com/D2893

--HG--
extra : moz-landing-system : lando
2018-08-13 09:05:19 +00:00
Andrea Marchesini 04fcbb6556 Bug 1480131 - AntiTrackingCommon::IsFirstPartyStorageAccessGrantFor() should not grant permission to sub-sub-iframe channels; r=ehsan 2018-08-10 14:59:33 -04:00
Gabriele Svelto 15adf94f4d Bug 1348273 - Convert crash annotations into a machine-readable list of constants; r=ted.mielczarek,njn,dholbert,mak,cpearce,mcmanus,froydnj,Dexter,jrmuizel,jchen,jimm,bz,surkov
This introduces the machinery needed to generate crash annotations from a YAML
file. The relevant C++ functions are updated to take a typed enum. JavaScript
calls are unaffected but they will throw if the string argument does not
correspond to one of the known entries in the C++ enum. The existing whitelists
and blacklists of annotations are also generated from the YAML file and all
duplicate code related to them has been consolidated. Once written out to the
.extra file the annotations are converted in string form and are no different
than the existing ones.

All existing annotations have been included in the list (and some obsolete ones
have been removed) and all call sites have been updated including tests where
appropriate.

--HG--
extra : source : 4f6c43f2830701ec5552e08e3f1b06fe6d045860
2018-07-05 15:42:11 +02:00
Noemi Erli be6ab34c54 Merge mozilla-central to inbound. a=merge CLOSED TREE
--HG--
extra : rebase_source : 691b5b30b6c3b2ddece605c045ad913e466fdbab
2018-08-10 00:35:58 +03:00
Noemi Erli de9e45a850 Merge inbound to mozilla-central. a=merge 2018-08-10 00:31:09 +03:00
Tiberius Oros fae00acf70 Merge mozilla-central to inbound. a=merge CLOSED TREE 2018-08-09 13:06:13 +03:00
Jan de Mooij 729eb9343a Bug 1480678 part 10 - Remove unnecessary realm entering in TCPSocket::Send. r=bz 2018-08-09 10:48:29 +02:00
Csoregi Natalia 0ed25650ef Merge mozilla-central to autoland. a=merge CLOSED TREE 2018-08-08 13:02:49 +03:00
Valentin Gosu 1030589ee4 Bug 1478732 - Change nsHostResolver to dispatch one resolver task per native lookup r=bagder
Differential Revision: https://phabricator.services.mozilla.com/D2431

--HG--
extra : moz-landing-system : lando
2018-08-07 07:03:57 +00:00
Jean-Yves Avenard 35a7076534 Bug 1481176 - P1. Export GetParameterHTTP as static method. r=valentin,r=bzbarsky
nsContentTypeParser used internally a nsIMIMEHeaderParam reference, effectively limiting its use on the main thread, and as such restricting any methods handling mime type there too.

nsContentTypeParser only made use of a single method nsMIMEHeaderParamImpl::GetParameterHTTP, so we make that method static and export it via nsNetUtil.

Differential Revision: https://phabricator.services.mozilla.com/D2788
2018-08-07 19:21:58 +02:00
Ehsan Akhgari 7d314b5011 Bug 1482129 - Exempt stylesheets, fonts and images when canceling loading of slow HTTP requests of tracking resources; r=valentin 2018-08-09 14:03:10 -04:00
Kershaw Chang 9430627a9f Bug 1478950 - Add a max limit to FTP list line, r=valentin
Summary: As suggested by pdknsk, add 32k limit to list line.

Reviewers: valentin

Tags: #secure-revision

Bug #: 1478950

Differential Revision: https://phabricator.services.mozilla.com/D2995
2018-08-09 20:12:54 +03:00
Junior Hsu 6fcddbf2de Bug 1481609 - Remove MOZ_SQLITE_COOKIES_OLD_SCHEMA telemetry probe r=valentin
Differential Revision: https://phabricator.services.mozilla.com/D2896

--HG--
extra : moz-landing-system : lando
2018-08-08 16:43:09 +00:00
Daniel Stenberg fcdada427b bug 1466860 - upgrade DOH code to draft-12 level r=mcmanus
MozReview-Commit-ID: FSVh7qUbBig

Differential Revision: https://phabricator.services.mozilla.com/D2828

--HG--
extra : moz-landing-system : lando
2018-08-08 15:01:05 +00:00
Kershaw Chang 37c0b16f99 Bug 1470458 - Test case, r=valentin
Test steps:
1. Create a XHR
2. Initializes the XHR with non-ascii username and password
3. Send the request to server
4. Check if the server receives the correct Authorization header
2018-08-07 06:00:00 +03:00
Kershaw Chang 2e30d83ba2 Bug 1470458 - Use correct function to copy UTF8 string, r=valentin
Since username and password are not always ascii string, we have to use the correct function CopyUTF8toUTF16 to copy string.
2018-08-07 06:00:00 +03:00
Arthur Edelstein 04dab89db7 Bug 1481096 - Fix incorrectly written pref name r=nwgh
"spdy.default-hpack-buffer" was incorrectly
written as "spdy.hpack-default-buffer".

--HG--
extra : histedit_source : 28dfa00e0accb4e51239a2d31178944034b3eaf5
2018-08-05 16:10:00 +03:00
Mike Hommey 01f69bda76 Bug 1481373 - Work around clang miscompilation of a non-virtual thunk to HttpChannelChild::AsyncCall on x86. r=valentin 2018-08-08 06:31:40 +09:00
Valentin Gosu 45e6d5718f Bug 1478732 - Backed out changeset 9de74f5039a4 r=backout 2018-08-09 18:56:02 +02:00
Masatoshi Kimura 3b21b7868b Bug 1090497 - Re-enable warnings as errors on clang-cl. r=froydnj
--HG--
extra : rebase_source : c09366fb93e5b0f72abe1e99d3094e3d96a934fb
extra : intermediate-source : 5950c9d63c3b4fd63a25464a7b50944aaec7079f
extra : source : ca1b9a2bcc4381795f556fea2fb59066567c30f3
2018-07-31 22:10:07 +09:00
Andrea Marchesini d7df3bf81e Bug 1476715 - low priority connection for 3rd party + tracking resource only, r=francois 2018-08-06 13:42:43 +02:00
Jeremy Lempereur e8a7f0b917 Bug 1481016 - Network, use inherent rust methods instead of deprecated std::ascii:AsciiExt ones, r=valentin
MozReview-Commit-ID: F1NGG0q6WdS

--HG--
extra : rebase_source : 077684b197d23f9893048c977f1d3ca2e97b5136
2018-08-04 20:24:59 +02:00
Noemi Erli 23c8a3a9f3 Backed out changeset 1e9ecba54e7b (bug 1348273) for failing on widget/tests/test_bug1123480.xul 2018-08-04 12:39:40 +03:00
Andrea Marchesini 8ab9f07dd8 Bug 1462879 - PerformanceNavigationTiming must be notified correctly - part 1 - notify, r=smaug, r=valentin 2018-08-04 08:54:58 +02:00
Gabriele Svelto 50ba13cce4 Bug 1348273 - Convert crash annotations into a machine-readable list of constants; r=ted.mielczarek,njn,dholbert,mak,cpearce,mcmanus,froydnj,Dexter,jrmuizel,jchen,jimm,bz,surkov
This introduces the machinery needed to generate crash annotations from a YAML
file. The relevant functions are updated to take a typed enum (in C++) and an
integer constant (in JavaScript). A JavaScript wrapper around the crash
reporter service is provided to hold the constants. The existing whitelists
and blacklists of annotations are also generated from the YAML file and the
existing duplicate code has been consolidated. Once written out to the .extra
file the annotations are converted in string form and are no different than
the existing ones.

All existing annotations have been included (and some obsolete ones removed)
and all call sites have been updated including tests.

--HG--
extra : rebase_source : b4f0d4bf83c64851028c271d3fab3ebcb6fbcd3e
2018-07-05 15:42:11 +02:00
Coroiu Cristina 1ba19a32ac Backed out changeset 86471a18672f (bug 1348273) for ESlint failure at toolkit/modules/WebNavigationChild.jsm
--HG--
extra : rebase_source : e0c94f49ddc1f1b119b72c06fccc1b4363b9d340
2018-08-03 22:48:51 +03:00
Gabriele Svelto eff24befbd Bug 1348273 - Convert crash annotations into a machine-readable list of constants; r=ted.mielczarek,njn,dholbert,mak,cpearce,mcmanus,froydnj,Dexter,jrmuizel,jchen,jimm,bz,surkov
This introduces the machinery needed to generate crash annotations from a YAML
file. The relevant functions are updated to take a typed enum (in C++) and an
integer constant (in JavaScript). A JavaScript wrapper around the crash
reporter service is provided to hold the constants. The existing whitelists
and blacklists of annotations are also generated from the YAML file and the
existing duplicate code has been consolidated. Once written out to the .extra
file the annotations are converted in string form and are no different than
the existing ones.

All existing annotations have been included (and some obsolete ones removed)
and all call sites have been updated including tests.

--HG--
extra : rebase_source : f0e8d229581ac5c0daa0e0454cb258746108e28d
2018-07-05 15:42:11 +02:00
Jan de Mooij 3af36d3d86 Bug 1479363 part 10 - Use JSAutoRealm instead of JSAutoRealmAllowCCW in other directories. r=mrbkap 2018-08-02 19:30:17 +02:00
Cosmin Sabou de8c2bd891 Backed out changeset 5950c9d63c3b (bug 1090497) for build bustages on several files. CLOSED TREE 2018-08-02 19:59:53 +03:00
Masatoshi Kimura feea19030c Bug 1090497 - Re-enable warnings as errors on clang-cl. r=froydnj
--HG--
extra : rebase_source : a62521fdc66def4e4d5d7bf52e68365a786b5c55
extra : source : ca1b9a2bcc4381795f556fea2fb59066567c30f3
2018-07-31 22:10:07 +09:00
Noemi Erli 8f66a71e70 Merge inbound to mozilla-central. a=merge 2018-08-02 11:54:46 +03:00
Nika Layzell 7a9f60fafb Bug 1479484 - Part 1: Add make_dafsa.py to the virtualenv's python path, r=froydnj
Summary:
The plan is to also expose perfecthash.py from this module on the python path.
This also allows us to stop using explicit module loading to load make_dafsa.py.

make_dafsa.py was moved into tools/ to avoid any extra python files from
accidentally ending up on the python path.

Reviewers: froydnj!

Tags: #secure-revision

Bug #: 1479484

Differential Revision: https://phabricator.services.mozilla.com/D2614


--HG--
rename : xpcom/ds/make_dafsa.py => xpcom/ds/tools/make_dafsa.py
2018-08-01 17:54:41 -04:00
dvarga 09eac64963 Merge mozilla-central to autoland. a=merge CLOSED TREE 2018-08-02 01:19:44 +03:00
Jorg K ba1be252a0 Bug 1478441 - Introduce nsIURIWithSpecialOrigin needed for Thunderbird. r=baku 2018-07-31 11:27:00 +03:00
Andrea Marchesini c0f96019e1 Bug 1430095 - Get rid of network.cookie.prefsMigrated, network.cookie.lifetime.enabled and network.cookie.lifetime.behavior prefs, r=valentin 2018-08-01 14:41:21 +02:00
Andrea Marchesini 5991b3ebdd Bug 1457170 - Get rid of nsICookieService::ACCEPT_FOR_N_DAYS, r=valentin 2018-08-01 14:41:21 +02:00
Francois Marier e98e918836 Bug 1461515 - Fix and expand tracking annotation test. r=dimi
Here's a summary of things that were wrong about this test:

1. It was setting urlclassifier.trackingTable only to be overwritten
   later by addTestTrackers().
2. It was using an http event which fires before the classification has
   been done.
3. It didn't disable tailing, which interferes with lowering the priority of
   XHRs.
4. It was not testing that non-annotated or whitelisted resources would not
   have their priority lowered.

I added more test cases both to ensure that the correct list
(urlclassifier.trackingAnnotationTable) is used but also to ensure that
whitelisted or non-blacklisted URLs preserve the normal priority (point #4 above).

I found that XHRs do not get their priority lowered because of this flag:

  https://searchfox.org/mozilla-central/rev/d47c829065767b6f36d29303d650bffb7c4f94a3/netwerk/base/nsChannelClassifier.cpp#221

which gets set here:

  https://searchfox.org/mozilla-central/rev/d47c829065767b6f36d29303d650bffb7c4f94a3/dom/xhr/XMLHttpRequestMainThread.cpp#2548

and so I had to disable tailing in the test (point #3 above).

There was also a problem where the test was resetting the prefs too early
because we were not actually waiting for the classification to finish.

We would wait for the following event: http-on-opening-request

  https://searchfox.org/mozilla-central/rev/d47c829065767b6f36d29303d650bffb7c4f94a3/netwerk/protocol/http/nsIHttpProtocolHandler.idl#85

whereas maybe a more appropriate one would be http-on-before-connect:

  https://searchfox.org/mozilla-central/rev/d47c829065767b6f36d29303d650bffb7c4f94a3/netwerk/protocol/http/nsIHttpProtocolHandler.idl#103

since that is triggerred after annotations (point #2 above):

  https://searchfox.org/mozilla-central/rev/d47c829065767b6f36d29303d650bffb7c4f94a3/netwerk/protocol/http/nsHttpChannel.cpp#6614

Differential Revision: https://phabricator.services.mozilla.com/D2485

--HG--
extra : moz-landing-system : lando
2018-08-01 11:52:03 +00:00
Francois Marier 9f161ab08f Bug 1461515 - Split tracking annotations from tracking protection. r=dimi
This makes it possible to use different lists for tracking protection
and for the features that rely on tracking annotations.

Differential Revision: https://phabricator.services.mozilla.com/D2484

--HG--
extra : moz-landing-system : lando
2018-08-01 20:45:41 +00:00
Andrea Marchesini 44ce53c72e Bug 1476592 - Remove the cache from nsCSPContext - part 2 - sendViolationReports parameter, r=ckerschb, r=aosmond 2018-08-01 06:35:24 +02:00
Cosmin Sabou bfc1e72e01 Backed out changeset 9035ff3757ac (bug 1415980) at request from froydnj on the suspicion that it's going to break MSVC builds when it gets merged to central. 2018-07-31 01:19:49 +03:00
Nathan Froyd 017b016850 Bug 1415980 - make hash keys movable and not copyable; r=erahm
Everything that goes in a PLDHashtable (and its derivatives, like
nsTHashtable) needs to inherit from PLDHashEntryHdr.  But through a lack
of enforcement, copy constructors for these derived classes didn't
explicitly invoke the copy constructor for PLDHashEntryHdr (and the
compiler didn't invoke the copy constructor for us).  Instead,
PLDHashTable explicitly copied around the bits that the copy constructor
would have.

The current setup has two problems:

1) Derived classes should be using move construction, not copy
   construction, since anything that's shuffling hash table keys/entries
   around will be using move construction.

2) Derived classes should take responsibility for transferring bits of
   superclass state around, and not rely on something else to handle
   that.

The second point is not a huge problem for PLDHashTable (PLDHashTable
only has to copy PLDHashEntryHdr's bits in a single place), but future
hash table implementations that might move entries around more
aggressively would have to insert compensation code all over the place.
Additionally, if moving entries is implemented via memcpy (which is
quite common), PLDHashTable copying around bits *again* is inefficient.

Let's fix all these problems in one go, by:

1) Explicitly declaring the set of constructors that PLDHashEntryHdr
   implements (and does not implement).  In particular, the copy
   constructor is deleted, so any derived classes that attempt to make
   themselves copyable will be detected at compile time: the compiler
   will complain that the superclass type is not copyable.

   This change on its own will result in many compiler errors, so...

2) Change any derived classes to implement move constructors instead
   of copy constructors.  Note that some of these move constructors are,
   strictly speaking, unnecessary, since the relevant classes are moved
   via memcpy in nsTHashtable and its derivatives.
2018-07-30 17:15:11 -04:00
Makoto Kato e788340ea4 Bug 1462019 - Part 1. Support abstract socket address on nsIServerSocket and nsISocketTransportService. r=mayhemer 2018-07-26 18:06:42 +09:00
Kris Maglione 031076f2f3 Bug 1463291: Move docShell getter from Document to Window. r=bz
DocShells are associated with outer DOM Windows, rather than Documents, so
having the getter on the document is a bit odd to begin with. But it's also
considerably less convenient, since most of the times when we want a docShell
from JS, we're dealing most directly with a window, and have to detour through
the document to get it.

MozReview-Commit-ID: LUj1H9nG3QL

--HG--
extra : source : fcfb99baa0f0fb60a7c420a712c6ae7c72576871
extra : histedit_source : 5be9b7b29a52a4b8376ee0bdfc5c08b12e3c775a
2018-05-21 16:58:23 -07:00
Kris Maglione 02ba563399 Bug 1463016: Part 5 - Add domWindow property to DocShellTreeItem and update callers to use it. r=nika
MozReview-Commit-ID: FRRAdxLHRtG

--HG--
extra : source : 0d69b4fb1ed43751cfcbc0b4f2fe3b6a49bc0494
extra : histedit_source : d0ce31513ffaae2fd7f01f6567a97b6d2d96b797%2Cfff837de7a00fa90809d2c3e755097180dfd56d8
2018-05-20 18:10:16 -07:00
Narcis Beleuzu 561ccb2ceb Backed out 2 changesets (bug 1463016, bug 1463291) for geckoview failures
Backed out changeset fcfb99baa0f0 (bug 1463291)
Backed out changeset 0d69b4fb1ed4 (bug 1463016)
2018-07-29 03:55:23 +03:00
Kris Maglione cb1ee1e34d Bug 1463291: Move docShell getter from Document to Window. r=bz
DocShells are associated with outer DOM Windows, rather than Documents, so
having the getter on the document is a bit odd to begin with. But it's also
considerably less convenient, since most of the times when we want a docShell
from JS, we're dealing most directly with a window, and have to detour through
the document to get it.

MozReview-Commit-ID: LUj1H9nG3QL

--HG--
extra : rebase_source : a13c59d1a5ed000187c7fd8e7339408ad6e2dee6
2018-05-21 16:58:23 -07:00
Kris Maglione 636f1839e5 Bug 1463016: Part 5 - Add domWindow property to DocShellTreeItem and update callers to use it. r=nika
MozReview-Commit-ID: FRRAdxLHRtG

--HG--
extra : rebase_source : 36565ef5e74360aad14062005e5bdab2939e888b
2018-05-20 18:10:16 -07:00
Jan de Mooij 80adc67aba Bug 1478955 part 1 - Rename JSAutoRealm to JSAutoRealmAllowCCW. r=luke 2018-07-28 12:12:26 +02:00
Nicholas Hurley e8cb6c18a3 Bug 1468583 - Explicitly tie h2stream to transaction in logs for logan. r=valentin
Differential Revision: https://phabricator.services.mozilla.com/D1656

--HG--
extra : moz-landing-system : lando
2018-07-27 06:35:00 +00:00
Felipe Gomes 25e4f07d6c Bug 1470324 - Don't load enterprise policies in the content during startup. r=kmag
With this patch, EnterprisePoliciesContent.js will only be loaded whenever a check for isAllowed happens in content.

This patch also adds shortcuts to make sure that checks for about:blank, about:neterror and about:certerror are skipped

MozReview-Commit-ID: AdMrolJqouN

--HG--
extra : rebase_source : 0949427c78fe26743294c0c1b43844f0154003b7
2018-07-27 14:50:55 -03:00
Michal Novotny 6c7074966b Bug 1477684 - rcwn blocking some xmlHttpRequests, r=valentin
Remove conditional and byte range headers when network won the race for case we send the request again due to 401 response.
2018-07-26 07:20:00 +03:00
Dorel Luca 57b8025529 Backed out changeset 3ff805a9631e (bug 1475701) for XPCshell failures on netwerk/test/unit/test_cache2-29a-concurrent_read_resumable_entry_size_zero.js 2018-07-27 12:12:59 +03:00
Michal Novotny 38f29ba537 Bug 1475701 - Save Page As doesn't begin MP3 download while tab is open, r=valentin
We need to close the cache entry if opening output stream for writing/appending data failed, so the entry isn't blocked for other requests.
2018-07-26 14:54:00 +03:00
Eric Rahm c8e70cc096 Bug 1240547 - Part 5: Reorder HttpBaseChannel member variables. r=valentin
--HG--
extra : rebase_source : af73138c747517bb82658a4a1e9f3cf357db2f91
2018-07-20 16:56:22 -07:00
Eric Rahm 34bd603e7b Bug 1240547 - Part 4: Use bitfields for HttpChannelChild bool variables. r=valentin
--HG--
extra : rebase_source : aaba4d19c433485a711bdabb2907984163bb4ed0
2018-07-20 15:39:40 -07:00
Eric Rahm 4fa3e432dd Bug 1240547 - Part 3: Reorder HttpChannelChild member variables. r=valentin
--HG--
extra : rebase_source : f1c33e1b77f9ce0fd70838ed27331c8490163774
2018-07-20 14:11:46 -07:00
Eric Rahm a388fe4b0c Bug 1240547 - Part 2: Pack HttpChannelParent bool fields. r=valentin
--HG--
extra : rebase_source : 459cb63075b9a328d70c23b30cc9ca76a4a58162
2018-07-19 17:40:43 -07:00
Eric Rahm bcf9fc80b0 Bug 1240547 - Part 1: Reorder HttpChannelParent member variables. r=valentin
--HG--
extra : rebase_source : 2e60ea6d39d4e2717edd68e4abd1f06acf8bc7d4
2018-07-19 17:19:07 -07:00
Dipen Patel 7641beb1f8 Bug 1475647 - Remove nsISSLStatusProvider interface. r=baku,Gijs,jchen,jryans,keeler,mcmanus
- Access nsISSLStatus directly as a member of nsITransportSecurityInfo
and nsISecureBrowserUI.  This is part of a larger effort to consolidate
nsISSLStatus and nsITransportSecurityInfo.
- The TabParent implementation of GetSecInfo will always return null.
- Removed unnecessary QueryInterface calls
- Style adherence updates

MozReview-Commit-ID: Dzy6t2zYljL

--HG--
extra : rebase_source : 9c400bed3c9d29a186fc987c9bd0ffceb37bfd94
2018-07-13 11:48:55 -07:00
Andreea Pavel d0f6470c17 Backed out changeset c235d6f86c22 (bug 1475647) for breaking firefox ui at testing/firefox-ui/tests/puppeteer/test_tabbar.py on a CLOSED TREE 2018-07-25 19:34:58 +03:00
Dipen Patel 8670057dd5 Bug 1475647 - Remove nsISSLStatusProvider interface. r=baku,Gijs,jchen,jryans,keeler,mcmanus
- Access nsISSLStatus directly as a member of nsITransportSecurityInfo
and nsISecureBrowserUI.  This is part of a larger effort to consolidate
nsISSLStatus and nsITransportSecurityInfo.
- The TabParent implementation of GetSecInfo will always return null.
- Removed unnecessary QueryInterface calls
- Style adherence updates

MozReview-Commit-ID: Dzy6t2zYljL

--HG--
extra : rebase_source : fbfbcf7608efbfb35c9be4018ff0f4e70b2768d2
2018-07-13 11:48:55 -07:00
Tiberius Oros 036999d0a9 Merge mozilla-central to inbound. a=merge CLOSED TREE 2018-07-25 13:43:03 +03:00
Liang-Heng Chen 5574f1d788 Bug 1478081 - avoid accessing null pointer; r=valentin
Differential Revision: https://phabricator.services.mozilla.com/D2336

--HG--
extra : moz-landing-system : lando
2018-07-24 21:03:03 +00:00
Boris Zbarsky 634a492dda Bug 1476145 part 9. Drop support for getting window utils via getInterface. r=nika 2018-07-24 19:47:43 -04:00
Narcis Beleuzu 80c1cde899 Merge mozilla-central to inbound. a=merge CLOSED TREE 2018-07-25 01:22:42 +03:00
Michal Novotny 352af354ca Bug 1466577 - Race condition in WebSocketChannel::StopSession. r=hurley
This patch prevents calling WebSocketChannel::StopSession at the same time on main thread from WebSocketChannel::Close and on socket thread from WebSocketChannel::AbortSession.

--HG--
extra : amend_source : ee9c2ebb75273251d868c9726597a41cf38fbb6c
2018-07-24 17:18:58 -04:00
Andrea Marchesini f6768a8ff6 Bug 1228139 - Remove nsIURIWithPrincipal - part 3 - main part, r=bz
nsIURIWithPrincipal is currently used to retrieve the nsIPrincipal from a
BlobURL object.  BlobURLProtocolHandler has a hashtable containing, for each
blobURL, a BlobImpl and its nsIPrincipal. This patch introduces
BlobURLProtocolHandler::GetBlobURLPrincipal() that retrieves the nsIPrincipal
from this hashtable.

This patch fixes also a bug in how the revocation of blobURLs is broadcasted to
other processes. This should be done immediately because each process creates
its own timer to revoke them after 5 seconds.

An important change is related to NS_SecurityCompareURIs() where, if 1 (or
both) of the 2 URIs to compare, is a revoked BlobURL, we will QI its URL to
nsIStandardURL and fail out at that point.
2018-07-24 22:15:57 +02:00
Liang-Heng Chen 0e974b3af4 Bug 1474280 - Part 2: carry timestamp when redirects; r=valentin 2018-07-23 05:29:00 +03:00
Liang-Heng Chen a1785d29f1 Bug 1474280 - Part 1: Cancel timed-out trackers; r=mayhemer 2018-07-23 05:28:00 +03:00
Coroiu Cristina 3628e073f1 Merge mozilla-central to inbound a=merge on a CLOSED TREE 2018-07-24 00:46:46 +03:00
Brian Hackett ab23746a30 Bug 1465294 Part 11 - Don't create Necko children in middleman processes, r=mayhemer.
--HG--
extra : rebase_source : e83d613e11b40ad8dc75399bc5b946231ffe2886
2018-07-23 14:56:12 +00:00
Valentin Gosu 7937c7c4cc Bug 1476928 - Remove nsIURI.CloneIgnoringRef and nsIURI.CloneWithNewRef r=JuniorHsu
The patch introduces NS_GetURIWithNewRef and NS_GetURIWithNewRef which perform the same function.

Differential Revision: https://phabricator.services.mozilla.com/D2239

--HG--
extra : moz-landing-system : lando
2018-07-23 11:28:47 +00:00
Byron Campen [:bwc] 721e2034d6 Bug 1448846: Ignore POLLERR on UDP sockets. r=dragana
MozReview-Commit-ID: 1FxhHbH8Neg

--HG--
extra : rebase_source : e50fbde7c3d52141dfb29a9805a00cec9be633ca
2018-07-02 11:52:02 -05:00
Cosmin Sabou b5b2c78493 Merge mozilla-central to autoland. a=merge 2018-07-21 00:48:28 +03:00
Michael Kaply 96e550bb6b Bug 1477076 - Add POST support to addEngineWithDetails. r=florian
Differential Revision: https://phabricator.services.mozilla.com/D2254

--HG--
extra : moz-landing-system : lando
2018-07-20 18:40:00 +00:00
Christoph Kerschbaumer adac33969a Bug 1304645: Pass individual CSP errors as categories to web console error messages. r=baku 2018-07-20 19:57:21 +02:00
Christoph Kerschbaumer f9100f4600 Bug 1475073: Pass individual CORS errors as categories to web console error messages. r=baku 2018-07-20 19:57:41 +02:00
Andrea Marchesini 28962b5168 Bug 1468501 - Implement a way to delete network cache by nsIPrincipal, r=mayhemer, r=michal 2018-07-20 13:57:18 +02:00
Andreea Pavel b5a482c899 Backed out 3 changesets (bug 1475073, bug 1304645, bug 1474537) for failing wpt and mochitest on a CLOSED TREE
Backed out changeset 4fbeea69b10d (bug 1475073)
Backed out changeset d3ac68d9ead9 (bug 1304645)
Backed out changeset 113b601a3b59 (bug 1474537)
2018-07-20 14:00:09 +03:00
Christoph Kerschbaumer c1c9ee3d96 Bug 1475073: Pass individual CORS errors as categories to web console error messages. r=baku 2018-07-20 10:47:15 +02:00
Christoph Kerschbaumer 1de27c0297 Bug 1304645: Pass individual CSP errors as categories to web console error messages. r=baku 2018-07-20 10:42:46 +02:00
Robert Bartlensky 276e65ee14 Bug 1476016: Fix DEAD_STORE issue in nsMIMEHeaderParamImpl. r=michal
MozReview-Commit-ID: F1p3ji1ezp3

--HG--
extra : rebase_source : 74e95db9d7393e7b2ebc43bd8583d276639eb56a
2018-07-17 12:32:42 +01:00
Andrea Marchesini 3003d70341 Bug 1476324 - Storage activation via window.open(URL) applies across top-level domains - part 3 - annotate top-level channels, r=ehsan 2018-07-18 15:44:55 +02:00
Eric Rahm a064f414e3 Bug 1448034 - Part 2: Lazily create ProxyResolution thread. r=bagder
This delays the creation of the PAC thread until we need to dispatch a
runnable to it.

--HG--
extra : rebase_source : 8897d3d8724f082ad33027635795512ccb4a17eb
extra : source : 068bb4e7b8494d8ae82dfd1b1f22680234bf038c
2018-07-16 16:05:39 -07:00
Eric Rahm 8c04ce5531 Bug 1448034 - Part 1: Get rid of SysProxySetting threads. r=bagder
--HG--
extra : rebase_source : a9e99b0b4d8f6d3dff71547a15fb520ea2a37424
extra : source : eb542860b989d4f6ea1ffcb29ff843b857d78482
2018-07-10 18:02:21 -07:00
Andrea Marchesini 4e97b69ebf Bug 1476306 - Moving NullPrincipal/ContentPrincipal/SystemPrincipal under mozilla namespace - part 3 - ContentPrincipal, r=ckerschb 2018-07-17 21:38:48 +02:00
Andrea Marchesini a053cf1c15 Bug 1476306 - Moving NullPrincipal/ContentPrincipal/SystemPrincipal under mozilla namespace - part 1 - NullPrincipal, r=ckerschb 2018-07-17 21:37:48 +02:00
Ehsan Akhgari 51cc2694b0 Bug 1475697 - Part 1: Refactor the current way that Necko notifies DOM about the existence of blocked content; r=baku 2018-07-17 06:11:00 +03:00
Coroiu Cristina 98a7487673 Backed out 2 changesets (bug 1448034) for GTest failures
Backed out changeset 068bb4e7b849 (bug 1448034)
Backed out changeset eb542860b989 (bug 1448034)

--HG--
extra : rebase_source : b133c3bd4f769c25e49c7de59edd57245649ee72
2018-07-17 08:51:20 +03:00
Kris Maglione ae75e45945 Bug 1473631: Part 14 - Replace pref observers with callbacks in nsCacheService. r=njn
MozReview-Commit-ID: Kl1Sgo3F3Sk

--HG--
extra : rebase_source : 46fb508bb73adf1a556ac20abd30bf56bf23d3f5
2018-07-05 15:21:20 -07:00
Kris Maglione ab9a7b5649 Bug 1473631: Part 6 - Replace pref observers with callbacks in IDNService. r=njn
MozReview-Commit-ID: FlFC2HxYo4v

--HG--
extra : rebase_source : 1a6f00a7e9bff61e02ef7be8a6681f5574da442a
2018-07-05 14:01:51 -07:00
Kris Maglione 152af93226 Bug 1473631: Part 3 - Replace pref observers with callbacks in IOService. r=njn
MozReview-Commit-ID: BBNUysmOuZV

--HG--
extra : rebase_source : 204d4444deed66a34e029e794b4721cf93b33d72
2018-07-05 13:25:03 -07:00
Kris Maglione f1400534b8 Bug 1473631: Part 2 - Replace pref observers with callbacks in STS. r=njn
MozReview-Commit-ID: BUiQqMA8eVs

--HG--
extra : rebase_source : 0b9571fb151220db1852bebd8149aaaf3e987ddb
2018-07-05 13:15:52 -07:00
Kris Maglione 37b1a59b2a Bug 1473631: Part 1 - Replace pref observers with callbacks in nsHttpHandler. r=njn
MozReview-Commit-ID: LtWV0yEwSd6

--HG--
extra : rebase_source : d839e8436ae97932d448d725ff70b0bb2a22d786
2018-07-05 13:10:20 -07:00
Kris Maglione 0bfdb4329f Bug 1473631: Part 0a - Make preference callbacks typesafe. r=njn
I initially tried to avoid this, but decided it was necessary given the number
of times I had to repeat the same pattern of casting a variable to void*, and
then casting it back in a part of code far distant from the original type.

This changes our preference callback registration functions to match the type
of the callback's closure argument to the actual type of the closure pointer
passed, and then casting it to the type of our generic callback function. This
ensures that the callback function always gets an argument of the type it's
actually expecting without adding any additional runtime memory or
QueryInterface overhead for tracking it.

MozReview-Commit-ID: 9tLKBe10ddP

--HG--
extra : rebase_source : 7524fa8dcd5585f5a31fdeb37d95714f1bb94922
2018-07-06 12:24:41 -07:00
Eric Rahm 3eed00fc26 Bug 1448034 - Part 2: Lazily create ProxyResolution thread. r=bagder
This delays the creation of the PAC thread until we need to dispatch a
runnable to it.

--HG--
extra : rebase_source : dc4bffc041e237dddac7ae36a3a3b2f9c5de3421
2018-07-16 16:05:39 -07:00
Eric Rahm dba1589cc2 Bug 1448034 - Part 1: Get rid of SysProxySetting threads. r=bagder
--HG--
extra : rebase_source : 4d8de477d605801ae19579eac1bf2b647cf444c9
2018-07-10 18:02:21 -07:00
Polly Shaw 226a5beff6 Bug 356831 - Proxy autodiscovery doesn't check DHCP (option 252) r=bagder,valentin
This patch addresses an issue with Firefox's proxy detection on networks which
do not have their a proxy auto-configuration (PAC) file hosted at
http://wpad/wpad.dat, and instead make use of DHCP option 252 for broadcasting
the address of the PAC file. See https://findproxyforurl.com/wpad-introduction/
for an introduction to the protocol.

Prior to this patch, proxy auto-detect missed out the DHCP query stage, and just
 looked for a PAC file at http://wpad/wpad.dat


This patch only addresses the issue for Firefox on Windows, although it defines a
DHCP client interface which could be implemented on other platforms.

The high-level components of this patch are:
 * nsIDHCPClient.idl - this is an interface which has been defined for querying the
   DHCP server.
 * nsPACMan.cpp - where previously when the PAC URL was simply set to a constant of
   http://wpad/wpad.dat, it now dispatches an asynchronous command to the proxy
   thread. The class ExecutePACThreadAction has been augmented to include an
   instruction to 'ConfigureWPAD' (Configure Web-proxy auto-detect), and a new class,
   'ConfigureWPADComplete' has been created to relay the result (the URL of the PAC
   file) back to the nsPACMan object.
 * nsProtocolProxyService.cpp
   Minor changes to reflect the fact that the PAC URL not being set does not always
   mean there is no PAC to be used; instead it could be in the process of being
   detected.
 * TestPACMan.cpp
   This is a new file, and tests only the DHCP auto-detect functionality.
   Some tests use multiple threads, as they test the non-blocking proxy detection.
 * DHCPUtils.cpp
   A class containing the main logic for querying DHCP.
 * WindowsNetworkFunctionsWrapper.cpp
   A very thin wrapper around the Windows API calls needed by DHCPUtils.
   This class was introduced so it could be mocked out in tests.
 * nsWindowsDHCPClient.cpp
 * An implementation of the interface defined in nsIDHCPClient.idl. Fairly thin:
   most logic is implemented in DHCPUtils.
 * TestDHCPUtils.cpp
   Tests for DHCPUtils and nsWindowsDHCPClient

MozReview-Commit-ID: 4xFQz3tOLEx

--HG--
extra : rebase_source : dfd5c588406a8b0d92f91cc8a0038ca722b7140a
2018-06-07 23:07:28 +01:00
Noemi Erli 9793ca2da4 Merge inbound to mozilla-central. a=merge 2018-07-14 00:52:51 +03:00
Masayuki Nakano 5c3723acb2 Bug 1475461 - part 2: Make callers of PLDHashTable::Search() const methods if possible r=Ehsan
Some callers of PLDHashTable::Search() use const_cast, some others are not
const methods due to non-const PLDHashTable::Search().

This patch removes const_cast from the former and mark some methods of the
latter const.

MozReview-Commit-ID: C8ayoi7mXc1

--HG--
extra : rebase_source : 2cba0339756e3278ba6e5f0e8a11e68217a61d34
2018-07-13 19:01:53 +09:00
Andrea Marchesini 1498612e1b Bug 1474812 - No needs to store granted storage access in nsILoadInfo and in the inner window, r=ehsan 2018-07-13 12:02:19 +02:00
Daniel Stenberg af7b8b701a bug 1472662 - only send DNS_TRR_NS_VERIFIED telemetry once r=mcmanus
... by making sure we only retry TRR when we go from CP bad=>good.

MozReview-Commit-ID: FcDwzSHm6Ia

--HG--
extra : rebase_source : dce21e18e6a4d854bd2023c61974658b100c1484
2018-07-11 09:43:38 +02:00
Patrick McManus 689f7724db Bug 1475420 - mark the TRR connection as DISABLE_TRR to avoid TXT deadlock r=valentin
MozReview-Commit-ID: 3xF3Hb5rpyh

--HG--
extra : rebase_source : 732e5c440321b8cd6bf9b189c5f97774ae338051
2018-07-12 17:48:54 -04:00
Gurzau Raul fff6ccd0b0 Merge mozilla-central to autoland. a=merge CLOSED TREE 2018-07-12 01:08:09 +03:00
Dragana Damjanovic 66dc0d2b39 Bug 1467102 - Fix the ftp diversion. r=bagder 2018-07-11 10:01:43 -04:00
imjching 01b7c92eb4 Bug 1416066 - Add a new flag to nsIAboutModule to load URIs in privileged content processes if feature is enabled. r=mconley
We will apply the URI_CAN_LOAD_IN_PRIVILEGED_CHILD flag to Activity Stream about: pages instead of hardcoding the URLs in a Set.

MozReview-Commit-ID: F6AGmsKs1SR

--HG--
extra : rebase_source : e0435776b7bd390a2a62190ba6c72d4d312538d1
2018-07-03 19:31:37 -04:00
vinoth 33326b442d Bug 1312864 - Allow redirects for requests that require preflight
Reviewers: ckerschb, mrbkap

Reviewed By: ckerschb, mrbkap

Subscribers: ckerschb

Bug #: 1312864

Differential Revision: https://phabricator.services.mozilla.com/D1875

--HG--
extra : rebase_source : 06ae50d91816955ab6bdaa2741ddccb1eb2a3206
2018-07-10 15:48:03 +03:00
Andrea Marchesini 0a542c2c05 Bug 1469993 - Grant storage access to a 3rd party, tracking resource if a opened document has user-interaction - part 7 - cookies, r=ehsan 2018-07-10 10:09:59 +02:00
Andrea Marchesini 2227a5e089 Bug 1469993 - Grant storage access to a 3rd party, tracking resource if a opened document has user-interaction - part 3 - using permissions, r=ehsan 2018-07-10 10:09:59 +02:00
Andrea Marchesini ba1f8971c7 Bug 1469993 - Grant storage access to a 3rd party, tracking resource if a opened document has user-interaction - part 2 - storing first user interaction in nsILoadInfo, r=ehsan 2018-07-10 10:09:59 +02:00
Margareta Eliza Balazs c37b51f523 Backed out 9 changesets (bug 1469993) for causing bustage in build/srcdom/base/nsGlobalWindowInner.cpp on a CLOSED TREE
Backed out changeset e89192032fe2 (bug 1469993)
Backed out changeset 4b261595099d (bug 1469993)
Backed out changeset 37182cfe869c (bug 1469993)
Backed out changeset 5b9870995c73 (bug 1469993)
Backed out changeset 55499fcd9738 (bug 1469993)
Backed out changeset 8c1c838d54ba (bug 1469993)
Backed out changeset 12b9c8bfa41f (bug 1469993)
Backed out changeset 04ab7d6c169a (bug 1469993)
Backed out changeset 53885d61244e (bug 1469993)
2018-07-10 11:32:34 +03:00
Andrea Marchesini de64db476d Bug 1469993 - Grant storage access to a 3rd party, tracking resource if a opened document has user-interaction - part 7 - cookies, r=ehsan 2018-07-10 10:09:59 +02:00
Andrea Marchesini f34232490a Bug 1469993 - Grant storage access to a 3rd party, tracking resource if a opened document has user-interaction - part 3 - using permissions, r=ehsan 2018-07-10 10:09:59 +02:00
Andrea Marchesini 637cab9bf6 Bug 1469993 - Grant storage access to a 3rd party, tracking resource if a opened document has user-interaction - part 2 - storing first user interaction in nsILoadInfo, r=ehsan 2018-07-10 10:09:59 +02:00
Ciure Andrei 79aa5c6ec9 Merge inbound to mozilla-central. a=merge 2018-07-10 00:59:02 +03:00
Daniel Stenberg 9cdf207464 bug 1473333 - add Telemetry probe HTTP_CHANNEL_ONSTART_SUCCESS r=mcmanus
Measure success rate in nsHttpChannel::OnStartRequest

MozReview-Commit-ID: Ia8h8acIvSA
2018-07-08 23:02:00 +03:00
vinoth a3ef79c1d0 Bug 1471502 - Misleading console error message fixed r=ckerschb
Reviewers: ckerschb

Reviewed By: ckerschb

Subscribers: ckerschb, Pike, flod

Bug #: 1471502

Differential Revision: https://phabricator.services.mozilla.com/D1965

--HG--
extra : rebase_source : 717404c6661192cec34c85e93354bc59165cc2f8
extra : amend_source : 3aad1b8a31e97accdd7d994e0cdc1c5bfa385996
2018-07-08 02:16:12 +03:00
Francois Marier cae189fda8 Bug 1461534 - Improve logging for the channel classifier. r=dimi
This patch reduces the level of noise in MOZ_LOG messages by:

- splitting log messages into Warning, Info, and Debug levels
- truncating long URIs down to the first 128 bytes
- not mentioning suspended channels on NS_OK results

It also introduces new log messages for the outcome of a
match against the blacklist:

- dropping the channel priority (tracking annotations)
- cancelling the channel (tracking protection)
- no match (i.e. not a tracker)

MozReview-Commit-ID: wSQChJkMKv

--HG--
extra : rebase_source : 620c0b8f7094fa001d2389c99cbee6d547627fd9
2018-07-09 09:42:31 -07:00
Francois Marier c6b7a3206d Bug 1461534 - Enable user/add-on overrides of tracking annotations. r=dimi
MozReview-Commit-ID: GQfIGirbSuW

--HG--
extra : rebase_source : d25ce41b88663e862c8221772d3b3cb670f55f02
2018-07-03 17:32:29 -07:00
Bogdan Tara d628012cab Backed out 2 changesets (bug 1461534) for nsChannelClassifier.cpp related build bustages CLOSED TREE
Backed out changeset 152002e28671 (bug 1461534)
Backed out changeset b4818535bde9 (bug 1461534)
2018-07-09 20:01:05 +03:00
Francois Marier 7bf9a0bdd0 Bug 1461534 - Improve logging for the channel classifier. r=dimi
This patch reduces the level of noise in MOZ_LOG messages by:

- splitting log messages into Warning, Info, and Debug levels
- truncating long URIs down to the first 128 bytes
- not mentioning suspended channels on NS_OK results

It also introduces new log messages for the outcome of a
match against the blacklist:

- dropping the channel priority (tracking annotations)
- cancelling the channel (tracking protection)
- no match (i.e. not a tracker)

MozReview-Commit-ID: wSQChJkMKv

--HG--
extra : rebase_source : ce8229414a3e3f4335af23253a6dc0c55fa9118a
2018-07-09 09:42:31 -07:00
Francois Marier 6de941bdd0 Bug 1461534 - Enable user/add-on overrides of tracking annotations. r=dimi
MozReview-Commit-ID: GQfIGirbSuW

--HG--
extra : rebase_source : d25ce41b88663e862c8221772d3b3cb670f55f02
2018-07-03 17:32:29 -07:00
Tarek Ziadé 8533ddcaac Bug 1472718 - Convert ChromeUtils.requestIOActivity to a Promise - r=baku,valentin
Changes:

- The API now returns a Promise containing a sequence of IOActivityData dictionnaries.
- All the code related to notifications and XPCOM is removed.
- The counters are no longer reset to 0 when the API is called

MozReview-Commit-ID: 7J2EgFqDgf

--HG--
extra : rebase_source : eb7dc3e0921b12bbb3715a90863dc8e2a60c1c09
2018-07-06 13:43:08 +02:00
Margareta Eliza Balazs 4ee26c6e5e Backed out changeset c22aa9571139 (bug 1472718) for failures in browser/browser_test_io_activity.js on a CLOSED TREE 2018-07-06 11:04:39 +03:00
Tarek Ziadé 12c531f562 Bug 1472718 - Convert ChromeUtils.requestIOActivity to a Promise - r=baku,valentin
Changes:

- The API now returns a Promise containing a sequence of IOActivityData dictionnaries.
- All the code related to notifications and XPCOM is removed.
- The counters are no longer reset to 0 when the API is called

MozReview-Commit-ID: 7J2EgFqDgf

--HG--
extra : rebase_source : 4e16640a3f52fd7c042687471153971a66158623
2018-07-06 02:10:33 +02:00
Andreea Pavel 1193ef6a61 Merge mozilla-inbound to mozilla-central. a=merge 2018-07-05 19:26:15 +03:00
Daniel Stenberg cf42e18246 bug 1470813 - Telemetry::DNS_TRR_RACE2 adds two new categories r=francois
... compared to DNS_TRR_RACE, to also count when either of the resolves
were more than 100 milliseconds faster.

MozReview-Commit-ID: FNZa7ZVuJPv
2018-07-04 23:26:00 +03:00
Ciure Andrei 2198f99f97 Merge inbound to mozilla-central. a=merge 2018-07-05 12:51:41 +03:00
Kris Maglione 17578086c0 Bug 1472523: Part 4 - Avoid unnecessary domain string duplication in preference observers. r=njn
MozReview-Commit-ID: EMCgMRTDqDn

--HG--
extra : rebase_source : 11731e5a7c53c725396a9c8b46f116071d0c6e31
2018-07-04 14:52:48 -07:00
Daniel Stenberg dd6df388fc bug 1472659 - add Telemetry::DNS_TRR_FIRST and Telemetry::DNS_TRR_DISABLED r=mcmanus
To help evaluate TRRfirst sucess/error rates.

MozReview-Commit-ID: Ljrbed6UDG2

--HG--
extra : rebase_source : ac604fda9610997cde5aa2993ca15319e6213e89
2018-07-02 13:50:21 +02:00
Daniel Stenberg 62e576e79d bug 1472656 - only do DNS_TRR_COMPARE in shadow or parallel mode r=mcmanus
MozReview-Commit-ID: 5eQb3pCNIwK

--HG--
extra : rebase_source : 95b197684c74d48ef37cade44d548536e4371409
2018-07-02 13:04:11 +02:00
Robert Bartlensky 50df265ee1 Bug 1471943: Remove release call to ensure socket is closed. r=valentin
MozReview-Commit-ID: 8RC4YdaqAdX

--HG--
extra : rebase_source : 029eeaad0a1eea60a9dce56756160a827b522d30
2018-07-02 11:45:39 +01:00
Daniel Stenberg 1fabe10330 bug 1470215 let Telemetry::DNS_NATIVE_QUEUING measure queue times r=mcmanus
MozReview-Commit-ID: 77FE4SJOXMG

--HG--
extra : rebase_source : 545961452d5d32b2ce65376e8ed680d6413eaa30
2018-06-25 08:03:44 +02:00
Sylvestre Ledru b4f411b274 Bug 1472945 - Remove some deadcode introduced by bug 1470355 r=valentin
MozReview-Commit-ID: 46IcpU2uw5o

--HG--
extra : rebase_source : 325bb7d66519376858c250626cfc0cffff98a88f
2018-07-03 10:38:46 +02:00
arthur.iakab de2ee4f3a3 Merge mozilla-central to autoland 2018-07-03 11:57:10 +03:00
Tiberius Oros 93bed26733 Merge mozilla-central to inbound. a=merge CLOSED TREE 2018-07-03 00:59:47 +03:00
Tiberius Oros 65a30935a5 Merge inbound to mozilla-central. a=merge 2018-07-03 00:53:57 +03:00
Valentin Gosu eb373305f2 Bug 1472788 - Use smart pointers in nsHostResolver::Create r=bagder
Small patch to test out phabricator

Differential Revision: https://phabricator.services.mozilla.com/D1916

--HG--
extra : moz-landing-system : lando
2018-07-02 21:46:16 +00:00
Michal Novotny 92e0c48aaf Bug 1470355 - Firefox is unresponsive when visiting https://www.youtube.com/premium, r=valentin
This patch avoids returning NS_BASE_STREAM_WOULD_BLOCK from CacheFileInputStream::ReadSegments when it was called with aCount=0.
2018-07-02 00:26:00 +03:00
Andrea Marchesini a1a6028669 Bug 1470355 - BufferWriter should stop reading data when the wanted amount has been reached, r=michal 2018-07-02 02:00:00 +03:00
Dorel Luca 9a50b6f6de Backed out 2 changesets (bug 1470355) for causing multiple failures
Backed out changeset 50b0bfa64b2c (bug 1470355)
Backed out changeset 198a4644c09a (bug 1470355)

--HG--
extra : amend_source : 10f20801a4e72fec17d53f6428d1c983a908a771
2018-07-02 15:06:11 +03:00
Andrea Marchesini 9b09232ce9 Bug 1470355 - BufferWriter should stop reading data when the wanted amount has been reached, r=michal 2018-07-02 02:00:00 +03:00
Michal Novotny dd9505228b Bug 1470355 - Firefox is unresponsive when visiting https://www.youtube.com/premium, r=valentin
This patch avoids returning NS_BASE_STREAM_WOULD_BLOCK from CacheFileInputStream::ReadSegments when it was called with aCount=0.
2018-07-02 00:26:00 +03:00
Valentin Gosu e6ea31c9c7 Bug 1471628 - Use singleton for captive portal constructor r=bagder
This is to make sure that the test is using the same Captive Portal Service that nsIOService initializes.

--HG--
extra : rebase_source : 62bd371b8d510f596d3484aec6fad997739ada8b
2018-07-02 15:30:33 +02:00
Valentin Gosu 57418912d1 Bug 1471628 - Add test for Captive Portal Service r=bagder
--HG--
extra : rebase_source : 08c0990f945fe6cdbaf405e257f8c35edd2e191f
2018-07-02 15:26:48 +02:00
Rob Wu d987da8b60 Bug 1351663 - Ensure that OriginAttributes is initialized when nsCookieService::Add receives a SameSite parameter r=valentin
InitializeOriginAttributes takes aArgc and only initializes the
parameter when aArgc is 1. nsCookieService::Add takes another optional
parameter, namely aSameSite. If a caller sets this SameSite flag, then
InitializeOriginAttributes would skip the initialization of the
OriginAttributes.

This was caught by a private browsing test in
toolkit/components/extensions/test/mochitest/test_ext_cookies.html
(after I added support for SameSite flag in the extension API)

MozReview-Commit-ID: HLfte7x1X7T

--HG--
extra : rebase_source : 1feb84ceca157d8c5ec8575c6336cc606c3504fe
2018-06-09 01:21:02 +02:00
Rob Wu a1cd43731e Bug 1351663 - Skip "optimization" if SameSite flag changes r=valentin
After writing a unit test I discovered that updating a cookie's samesite
flag did not work. This is caused by an "optimization" that avoids
modifying a cookie if any of the cookie attributes were not changed.
This check did not account for the SameSite flag, until now.

A unit test for this will be added in a later commit, at
toolkit/components/extensions/test/xpcshell/test_ext_cookies_samesite.js

MozReview-Commit-ID: ChiwwqqOE57

--HG--
extra : rebase_source : f6bd9bd650f6db50a0726451cd781ca7984962a1
2018-06-09 00:23:45 +02:00
Mark Banner 82aadc6ada Bug 1470455 - Add the 'expected' arguments to throws/rejects for netwerk. r=mcmanus
MozReview-Commit-ID: 40K0YkBQfue

--HG--
extra : rebase_source : 22276acde28f0152963324d176e6925e9b69f374
2018-06-21 17:08:24 +01:00
Andrew Osmond c7ece5c2e5 Bug 1472145 - Part 1. Add support for identifying the WebP images MIME type. r=tnikkel 2018-06-29 20:30:05 -04:00
Dragana Damjanovic c73d6a6cda Bug 1453204 - Fix 425 return code for websocket. r=michal
--HG--
extra : rebase_source : 7455df696dd97cf3b457edf6d227128432bce04a
2018-06-29 09:10:00 +03:00
Ciure Andrei 647372a88b Merge mozilla-central to autoland. a=merge CLOSED TREE 2018-07-05 12:53:31 +03:00
Valentin Gosu 6a2bda63e8 Bug 1471280 - Add new pref for how much longer resolver threads should remain idle r=bagder
The new pref is "network.dns.resolver-thread-extra-idle-time-seconds"
The default is 60 seconds. This means that threads will stay idle for an extra 60 seconds, after which they are shutdown.
Setting the pref to 0 would preserve the behaviour before the threads were swiched to use nsThreadPool - meaning that they would be shutdown immediately after ThreadFunc completes.
Setting the pref to -1 would keep the threads alive forever.

MozReview-Commit-ID: CoUB5gan4MR

--HG--
extra : rebase_source : 7b444789eebaf43c939ce9d7153218c4cd594b65
2018-07-04 21:25:28 +02:00
Valentin Gosu 2c7b0b5f89 Bug 1471280 - Use nsThreadPool for DNS resolver threads r=bagder
Instead of creating and deleteing each thread, we use a nsThreadPool with a max of 8 resolver threads.
Whereas before each thread would run ThreadFunc exactly once then shut down, the threads may now remain active for a while. During this time we may post another task(runnable) to the thread.

MozReview-Commit-ID: FiE370ic1ah

--HG--
extra : rebase_source : 065bbf1f9867dfb38ac7b13816d4d06824d3a05d
2018-07-04 20:36:58 +02:00
Michal Novotny 54b4934a24 Bug 756165 - Return close code 1015 to JS when TLS setup fails, r=baku, r=valentin
We cannot simply pass the status code using nsIWebSocketListener::OnServerClose because it's called only when the connection is established. Instead, I'm passing TLS failure from http channel to nsIWebSocketListener::OnStop where the correct status code is set.
2018-06-28 07:54:00 +03:00
Cosmin Sabou f4b3baf021 Merge mozilla-inbound to mozilla-central. a=merge 2018-06-28 13:04:23 +03:00
Tiberius Oros 945c24abe5 Merge mozilla-central to autoland. a=merge CLOSED TREE 2018-06-28 01:12:18 +03:00
Tiberius Oros 705b995848 Merge inbound to mozilla-central. a=merge 2018-06-28 01:07:30 +03:00
Nathan Froyd 9fd8289cf9 Bug 1471435 - part 2 - micro-optimize deferred MaybeOpen calls; r=valentin
We shouldn't need to QueryInterface from nsIFile to nsIFile!
2018-06-27 11:27:33 -04:00
Nathan Froyd d65aee9de5 Bug 1471435 - part 1 - clean up nsFile{Input,Ouput}Stream::Create; r=valentin
We should be using smart pointers here, and there's no need to check for
allocation failure with our infallible new policy.
2018-06-27 11:27:33 -04:00
David Keeler 9b69a30991 bug 1470030 - convert manually-written nsINSSComponent definition to idl r=fkiefer
Defining nsINSSComponent in idl rather than manually in a header file allows us
to make full use of the machinery that already exists to process and generate
the correct definitions. Furthermore, it enables us to define JS-accessible APIs
on nsINSSComponent, which enables us to build frontend features that can work
directly with the data and functionality the underlying implementation has
access to.

MozReview-Commit-ID: JFI9s12wmRE

--HG--
extra : rebase_source : 16b660e37db681c8823cbb6b7ff59dd0d35f7e73
2018-06-20 16:43:18 -07:00
Andreea Pavel 2110978616 Backed out changeset 5d8c20358cac (bug 756165) for [@ MOZ_CrashOOL] crashes on a CLOSED TREE 2018-06-28 03:00:49 +03:00
Michal Novotny 10476f8e5b Bug 756165 - Return close code 1015 to JS when TLS setup fails, r=baku, r=valentin
We cannot simply pass the status code using nsIWebSocketListener::OnServerClose because it's called only when the connection is established. Instead, I'm passing TLS failure from http channel to nsIWebSocketListener::OnStop where the correct status code is set.
2018-06-27 06:50:00 +03:00
Tiberius Oros eacc3eda3e Merge mozilla-central to inbound. a=merge CLOSED TREE 2018-06-28 01:15:41 +03:00
Nathan Froyd dcb8cac432 Bug 1471627 - use a more reasonable stack size for DNS resolver threads; r=valentin
We're maintaining a thread pool, we should be using thread pool stack sizes.
2018-06-27 15:29:12 -04:00
Marco Bonardo 042ca3e569 Bug 1470961 - Remove unnecessary use of SQLITE_IGNORE. r=asuth
MozReview-Commit-ID: GhZzTzLULWp

--HG--
extra : rebase_source : d5d0c60014199da544893003036fa3371b440c00
2018-06-26 13:50:57 +02:00
Valentin Gosu b029385db8 Bug 1470907 - Call AsyncShutdown for threads at the end of nsHostResolver::ThreadFunc r=froydnj
MozReview-Commit-ID: 2M8Qn8KDfdx

--HG--
extra : rebase_source : 5f6f37a630093badae7889ffdd4f10ba4e3d49b7
2018-06-26 02:54:48 +02:00
Daniel Stenberg 4a2731b037 bug 1471217 - ignore the network.dns.get-ttl pref on non-supported systems r=mcmanus
Which is how the pref is documented in all.js

MozReview-Commit-ID: 5ONQgZ1wO5G

--HG--
extra : rebase_source : cdbf5683b12a3bdb889f56c9b4b5037218bedc43
2018-06-26 15:36:26 +02:00
Margareta Eliza Balazs 03ab62719a Merge mozilla-central to autoland. a=merge CLOSED TREE
--HG--
rename : devtools/client/debugger/test/mochitest/browser_dbg_tabactor-01.js => devtools/client/debugger/test/mochitest/browser_dbg_target-scoped-actor-01.js
rename : devtools/client/debugger/test/mochitest/browser_dbg_tabactor-02.js => devtools/client/debugger/test/mochitest/browser_dbg_target-scoped-actor-02.js
2018-06-26 18:08:43 +03:00
Chris Peterson 2afd829d0f Bug 1469769 - Part 6: Replace non-failing NS_NOTREACHED with MOZ_ASSERT_UNREACHABLE. r=froydnj
This patch is an automatic replacement of s/NS_NOTREACHED/MOZ_ASSERT_UNREACHABLE/. Reindenting long lines and whitespace fixups follow in patch 6b.

MozReview-Commit-ID: 5UQVHElSpCr

--HG--
extra : rebase_source : 4c1b2fc32b269342f07639266b64941e2270e9c4
extra : source : 907543f6eae716f23a6de52b1ffb1c82908d158a
2018-06-17 22:43:11 -07:00
Tarek Ziadé 7158cbfa29 Bug 1470073 - Make IOActivityMonitor timer optional - r=valentin
- Introduced the io.activity.enabled pref, so IOActivityMonitor can run without a timer
- Added IOActivityMonitor::NotifyActivities() to trigger notifications manually
- Added ChromeUtils.requestIOActivity() so we can trigger it via JS

MozReview-Commit-ID: 9JA2rLaM496

--HG--
extra : rebase_source : e473a7b0ec7c231ab321846c5ddcc4d6a88d7245
2018-06-26 10:43:16 +02:00
arthur.iakab 05cc8bb814 Backed out changeset b5e89c1b4e8c (bug 1470073) for failing browser chrome tests on browser_test_io_activity.js on a CLOSED TREE 2018-06-26 04:10:45 +03:00
Tarek Ziadé 0f643a27fd Bug 1470073 - Make IOActivityMonitor timer optional - r=valentin
- Introduced the io.activity.enabled pref, so IOActivityMonitor can run without a timer
- Added IOActivityMonitor::NotifyActivities() to trigger notifications manually
- Added ChromeUtils.requestIOActivity() so we can trigger it via JS

MozReview-Commit-ID: 9JA2rLaM496

--HG--
extra : rebase_source : 0a92195b6b8314383c63de4b2bb1dfe033c40e9f
2018-06-25 18:32:22 +02:00
Andrea Marchesini 99fa4c908a Bug 1470578 - Rename the anti-tracking pref, r=francois 2018-06-25 22:46:13 +02:00
Ben Kelly 06ae64dde8 Bug 1470286 Propagate channel creation and async open time across internal redirects. r=valentin 2018-06-23 10:10:10 -07:00
Petr Sumbera 700965b040 Bug 1452130 - nsHttpConnection.cpp should compare time intervals in the same units r=dragana 2018-06-15 04:52:52 -07:00
Ben Kelly bee2ef4646 Bug 1470114 Make parent-side of redirect override the reserved ClientInfo to handle some corner cases. r=valentin 2018-06-22 08:09:00 -07:00
Csoregi Natalia ed1521707f Merge inbound to mozilla-central. a=merge 2018-06-22 00:50:23 +03:00
Ben Kelly 13c58b163c Bug 1470234 Handle empty headers correctly when auto-copying headers for special internal redirect to InterceptedHttpChannel. r=valentin 2018-06-21 12:11:05 -07:00
Daniel Stenberg e596152e6c bug 1470093 - fix telemetry::DNS_TRR_LOOKUP_TIME r=mcmanus
MozReview-Commit-ID: 80jrEQ4kLM6

--HG--
extra : rebase_source : 702efbd6dff9615ff827f8c7f05dd8cce2cbd419
2018-06-21 12:02:03 +02:00
Daniel Minor 8595564f3a Bug 1458048 - Cherry pick usersctp rev 8789a6da02e2c7c03522bc6f275b302f6ef977fe; r=drno 2018-06-20 21:18:50 -04:00
Cosmin Sabou 4c18cd4036 Merge inbound to central. a=merge
--HG--
rename : servo/components/style/properties/longhand/box.mako.rs => servo/components/style/properties/longhands/box.mako.rs
2018-06-21 04:16:40 +03:00
Andrea Marchesini f235838704 Bug 1461921 - Block storage access for third-parties on the tracking protection list - part 7 - Network cache, r=mayhemer, r=ehsan 2018-06-20 13:38:22 -04:00
Andrea Marchesini 5b9437cad2 Bug 1461921 - Block storage access for third-parties on the tracking protection list - part 5 - Cookies, r=ehsan 2018-06-20 13:38:22 -04:00
Dorel Luca b595d82310 Merge mozilla-central to mozilla-inbound 2018-06-20 01:06:23 +03:00
Valentin Gosu 0959b41dd0 Bug 1426019 - Use nsIThread in nsHostResolver r=bagder
MozReview-Commit-ID: LOt7VX9mj7r

--HG--
extra : rebase_source : f66c7282be6c01419d98a216a731fa4bd0a72839
2018-06-18 18:35:16 +02:00
Andrea Marchesini 6b1a54c793 Bug 1469290 - Avoid extra locks in NS_ReadInputStreamToBuffer, r=valentin 2018-06-18 19:41:29 -04:00
Valentin Gosu 4cade1b2b5 Bug 1389251 - Add esc_Spaces that may be used to force escaping of spaces r=bz,jdescottes
MozReview-Commit-ID: 4tahH3IOKW

--HG--
extra : rebase_source : 12057b98c87d7d3c57e90888082f540c49c5a9a9
2018-06-18 15:06:25 +02:00
Valentin Gosu 6444ab9d1e Bug 1389251 - Do not escape spaces in nsSimpleURI r=bz
This change makes nsEscape::T_EscapeURL not escape spaces when passed esc_OnlyNonASCII.
This fixes a web-compat issue for URLs such as "javascript: alert('hello');" and the fact that data: URIs with spaces around MIME type are rejected.

MozReview-Commit-ID: 91Qw9foW6Y3

--HG--
extra : rebase_source : 2da1b5f305ca2abcce2f9988cd6a5cbc12635c61
2018-06-18 15:06:24 +02:00
Andrea Marchesini 10f1e301a9 Bug 1468108 - Increase the buffer size and avoid extra runnables in NS_ReadInputStreamToBuffer, r=valentin 2018-06-17 20:30:58 -04:00
Ben Kelly dea8612c12 Bug 1468828 Automatically copy headers to the InterceptedHttpChannel when performing the special hidden internal redirect. r=valentin 2018-06-19 11:24:36 -04:00
Andi-Bogdan Postelnicu d9e98a1219 Bug 1453795 - WebRTC - Initialize member fields in classes/ structures. r=rjesup
--HG--
extra : amend_source : f4d5cf1f53793ddb457e81fdf9220ce43fbd4ff7
2018-06-15 18:55:03 +03:00
Dorel Luca ba31c8c2b2 Backed out 3 changesets (bug 1389251) for browser-chrome failure on browser/base/content/test/pageinfo/browser_pageinfo_image_info.js. CLOSED TREE
Backed out changeset a76a3251a9d2 (bug 1389251)
Backed out changeset c6baebf7b34c (bug 1389251)
Backed out changeset 6e89a11ae28e (bug 1389251)
2018-06-15 06:18:04 +03:00
Dorel Luca b53fbe3617 Merge mozilla-central to autoland 2018-06-15 05:43:31 +03:00
Valentin Gosu 316f7bf9ac Bug 1389251 - Add esc_Spaces that may be used to force escaping of spaces r=bz,jdescottes
MozReview-Commit-ID: 7VgNlkWqrPK

--HG--
extra : rebase_source : c7ea99bc727a82e652871e78c222e8d5d642a52e
2018-06-12 03:05:03 +02:00
Valentin Gosu 01487f76fb Bug 1389251 - Do not escape spaces in nsSimpleURI r=bz
This change makes nsEscape::T_EscapeURL not escape spaces when passed esc_OnlyNonASCII.
This fixes a web-compat issue for URLs such as "javascript: alert('hello');" and the fact that data: URIs with spaces around MIME type are rejected.

MozReview-Commit-ID: B78AacLxGBp

--HG--
extra : rebase_source : fcef25fab58f7da1732725054ae684588f2e0e89
2018-06-12 03:03:57 +02:00
Valentin Gosu d9800226a5 Bug 1417827 - Pass DNS arguments as nsACString& instead of char* r=bagder
MozReview-Commit-ID: 7Zk0wM2wsJF

--HG--
extra : rebase_source : 6bfe7a9c21d447252db1b0a5351305bdecb0fa3a
2018-06-15 01:15:13 +02:00
Andi-Bogdan Postelnicu 90ac230485 Bug 1453795 - Necko - Initialize member fields in classes/ structures. r=michal 2018-06-14 11:19:07 +03:00
Narcis Beleuzu 31030f080d Merge mozilla-central to inbound. a=merge CLOSED TREE 2018-06-14 00:58:55 +03:00
Narcis Beleuzu 8aa6325a89 Merge inbound to mozilla-central. a=merge 2018-06-14 00:52:57 +03:00
Andi-Bogdan Postelnicu dcb297f5a0 Bug 1453795 - Netwerk/Coockies - Initialize member fields in classes/ structures. r=josh 2018-06-13 23:52:59 +03:00
Ehsan Akhgari f4e3e1d715 Bug 1462432 - Part 1: Add an API to override the tracking status on an HTTP channel; r=mayhemer 2018-06-13 16:18:39 -04:00
Joel Maher 1ef32bf5c6 Bug 1405428 - skip-if = verify on xpcshell tests which do not pass test-verify. r=gbrown 2018-06-13 11:34:40 -04:00
Ben Kelly 2294b0f525 Bug 1468340 P2 Don't unconditionally set LOAD_BYPASS_SERVICE_WORKER in HttpChannelParent for non-synthesized channels. r=valentin 2018-06-13 06:41:47 -07:00
Ben Kelly cc22e8c6d7 Bug 1468340 P1 Send the parent channel's load flags to the child process in Redirect1Begin. r=valentin 2018-06-13 06:41:47 -07:00
Cosmin Sabou 40577076a6 Merge inbound to mozilla-central. a=merge 2018-06-13 12:22:15 +03:00
Ben Kelly 2c60e5ec03 Bug 1468248 Propagate nsIHttpChannelInternal.integrityMetadata to the parent when the channel is opened. r=valentin 2018-06-12 09:53:54 -07:00
Ben Kelly f4e69fbdb7 Bug 1468209 Remove nsIHttpChannelInternal.responseSynthesized and use nsILoadInfo.serviceWorkerTaintingSynthesized instead. r=valentin 2018-06-12 07:02:01 -07:00
Ben Kelly ecb17922d9 Bug 1468213 Propagate nsILoadInfo.serviceWorkerTaintingSynthesized and tainting values from parent process to child process. r=valentin 2018-06-11 12:54:22 -07:00
Gurzau Raul 4a77089b27 Merge mozilla-central to autoland. a=merge CLOSED TREE 2018-06-13 00:53:34 +03:00
Tarek Ziadé 2ad736aa2e Bug 1447931 - NetworkActivity becomes IOActivity - r=baku,mak,valentin
Generalizes NetworkActivity so it can be used for sockets but also disk files.
The host/port data becomes a single location string prefixed with socket://
or file:// and we're not using the FD as the identifier anymore.

IOActivityMonitor is now used in three places:

- nsFileStreams for plain files
- TelemetryVFS for sqlite files
- nsSocketTransport & nsUDPSocket for UDP & TCP sockets

MozReview-Commit-ID: GNu5o400PaV

--HG--
rename : netwerk/base/NetworkActivityMonitor.cpp => netwerk/base/IOActivityMonitor.cpp
rename : netwerk/base/NetworkActivityMonitor.h => netwerk/base/IOActivityMonitor.h
rename : netwerk/base/nsINetworkActivityData.idl => netwerk/base/nsIIOActivityData.idl
extra : rebase_source : 55a1c51b261ffbe16f88671d55445d1b0d9106b6
2018-06-12 13:22:50 -07:00
Ben Kelly 6301585f22 Bug 1467852 Align LoadInfo::mServiceWorkerTaintingSynthesized handling with other service worker fields. r=valentin 2018-06-10 18:44:38 -07:00
Noemi Erli ad2118e866 Merge mozilla-central to inbound. a=merge CLOSED TREE 2018-06-11 00:40:00 +03:00
Joel Maher 50b91c0a14 Bug 1405428 - skip-if = verify on mochitests which do not pass test-verify. r=gbrown 2018-06-10 05:01:47 -04:00
Valentin Gosu 9296b54502 Bug 1464135 - Pass the timing data to the child channel during OnStart r=baku
MozReview-Commit-ID: D07sY6dlINM

--HG--
extra : rebase_source : 020e94adc1d82f74e30fc71e5247b70798df9e8a
2018-06-13 03:02:23 +02:00
Johann Hofmann 2339934fea Bug 1462470 - Part 1 - Notify frontend of loaded tracking content in annotation-only mode. r=Ehsan
In order to notify the user that there is tracking content on the page
which could have been blocked by Tracking Protection, we need to mark
the document as having tracking content even when TP is off.

Part 2 will update the desktop frontend to handle this correctly and
show a different message when TP is on vs. off. Fennec should not be
affected by this change since it already prevents loaded state from
showing if TP is disabled:

https://searchfox.org/mozilla-central/rev/dc6d85680539cb7e5fe2843d38a30a0581bfefe1/mobile/android/chrome/content/browser.js#5669
https://searchfox.org/mozilla-central/rev/dc6d85680539cb7e5fe2843d38a30a0581bfefe1/mobile/android/modules/geckoview/GeckoViewProgress.jsm#112

MozReview-Commit-ID: LNF0zABNsx1

--HG--
extra : rebase_source : c06a7ed9a32b9674a9c5a35834d39cf90f60b592
2018-05-24 12:44:42 +02:00
Jan de Mooij 2b3ff5c90a Bug 1468219 - Rename JS_InitStandardClasses to JS::InitRealmStandardClasses, remove obj argument. r=anba
--HG--
extra : rebase_source : 5c092c37298e89096b85524e92d143ff2447f31f
2018-06-13 12:47:47 -07:00
Andrea Marchesini df966c5c8c Bug 1468503 - Implement nsIEffectiveTLDService.hasRootDomain, r=smaug 2018-06-13 12:29:39 -07:00
Daniel Stenberg 7e7f7eeb34 bug 1463356 do not count "not started" TRR resolves as failures r=mcmanus
... when comparing against the native resolver. DNS_TRR_COMPARE is meant
to compare how the actually performed name resolves fare against each
other.

MozReview-Commit-ID: 98NoUGPpHr6

--HG--
extra : rebase_source : 4042c81da3e5478de26feb7f83c98ee5eb298156
2018-06-20 11:00:19 +02:00
Byron Campen [:bwc] 777bf8b996 Bug 1455647 - Part 4: Make a place to live for context about media packets, to fix packet dump hooks. r+drno r=drno
MozReview-Commit-ID: 1HMF93mLa7r

--HG--
rename : media/mtransport/transportlayersrtp.cpp => media/webrtc/signaling/src/mediapipeline/TransportLayerPacketDumper.cpp
rename : media/mtransport/transportlayersrtp.h => media/webrtc/signaling/src/mediapipeline/TransportLayerPacketDumper.h
extra : rebase_source : 062814836325b69da17e8f592774f006e29905ad
2018-05-09 17:13:35 -05:00
Valentin Gosu a8e3a8c349 Bug 1448330 - Make nsIURI.clone a private method r=mayhemer
MozReview-Commit-ID: 1efpeaEPaXP

--HG--
extra : rebase_source : e660f1e5bcae9b7119bc5b37713691069272b375
2018-06-14 13:05:43 +02:00
Byron Campen [:bwc] cb8df81f4c Bug 1455647 - Part 1: Simplify TransportFlow. r+drno r=drno
MozReview-Commit-ID: 1jJuln4WAw9

--HG--
extra : rebase_source : e5d9cba95e7e79815e9842edac2fc5eec54aac06
2018-04-27 12:14:40 -05:00
arthur.iakab edbf2c0099 Merge inbound to mozilla-central a=merge 2018-06-08 12:55:49 +03:00
Ciure Andrei 25ae31a366 Merge mozilla-central to autoland. a=merge CLOSED TREE 2018-06-08 00:54:06 +03:00
Ciure Andrei 05605d68c4 Merge inbound to mozilla-central. a=merge 2018-06-08 00:50:18 +03:00
Randell Jesup c0b25e1706 Bug 1395246: nullcheck DataChannel SendPacket calls, add some diagnostics r=drno 2018-06-07 15:26:25 -04:00
Nicholas Hurley 2423735102 Bug 1460310 - Separate HTTP and SPDY identifiers into separate namespaces. r=dragana
MozReview-Commit-ID: E55YpGK7PXI

--HG--
extra : rebase_source : 3146c7de66653262694235043a44be4ccf5ffc33
2018-06-01 11:32:05 -07:00
Michael Kaply 8c11aa5676 Bug 1464025 - Change accept header if locale changes. r=gandalf
MozReview-Commit-ID: HshY3mCab4M

--HG--
extra : rebase_source : f2b6c9e442cfc745e623288388da91ef34273be0
2018-06-06 19:12:45 -05:00
Kris Maglione 7b7264f453 Bug 1464548: Part 3 - Update callers to use defineLazyGlobalGetters. r=mccr8
MozReview-Commit-ID: 9APGewiDDYB

--HG--
extra : rebase_source : 2931dd0eec0e4206414b698a9700fc20d922eb3a
2018-05-25 17:02:29 -07:00
Nicholas Hurley 7a9f6d6eac Bug 1460590 part 1 - Fix our parsing of Server-Timing. r=valentin
We were erroneously looking for the first reasonably-valued
server-timing-param for each name. However, that's not how it works. We
should really be looking for the first server-timing-param regardless
of how reasonable its value is.

MozReview-Commit-ID: LwaHFyCpteU

--HG--
extra : rebase_source : 995f14fec3bd130e6eeada6c4cac0db0b27e618f
2018-06-01 11:39:49 -07:00
Alex Gaynor b174206e6f Bug 1451859 - Part 2: Add sanitizer coverage to a handful of places relevant to IPC. r=posidron 2018-04-05 15:48:11 -04:00
Jan de Mooij 56ca3c9524 Bug 1466501 part 1 - Refactor ZoneSpecifier and add a sameCompartmentAs option to newGlobal in the shell. r=luke 2018-06-07 10:02:10 +02:00
Cosmin Sabou 18d0742c9b Backed out 3 changesets (bug 1451859) for causing Spidermonkey bustages on Linux x64 opt.
Backed out changeset 8f5a9e18e953 (bug 1451859)
Backed out changeset 950fa584ec8e (bug 1451859)
Backed out changeset f1f42726f1ec (bug 1451859)
2018-06-07 09:10:35 +03:00
Alex Gaynor 76b53de450 Bug 1451859 - Part 2: Add sanitizer coverage to a handful of places relevant to IPC. r=posidron 2018-04-05 15:48:11 -04:00
Daniel Stenberg a69516185c bug 1466777 - make TRR failures pass on "unknown host" status r=valentin
MozReview-Commit-ID: HamTaGeZSzw

--HG--
extra : rebase_source : 1f6a46ad77fd071801b68d7ced03b2604fb147a0
2018-06-05 11:20:05 +02:00
Andrea Marchesini 8005b74540 Bug 1465465 - Block ports 427, 548 and 6697, r=annevk, r=valentin 2018-06-05 07:49:02 +02:00
Andrea Marchesini 1f69f950e8 Bug 1465465 - Update blocked port names, r=annevk, r=valentin 2018-06-05 07:49:02 +02:00
Dorel Luca 535f1df913 Merge mozilla-central to mozilla-inbound 2018-06-04 21:48:29 +03:00
Dorel Luca 746fbfe0a7 Merge mozilla-inbound to mozilla-central. a=merge 2018-06-04 21:11:34 +03:00
Valentin Gosu bfbf927306 Bug 1459666 - Ensure that DivertToParent is only called during OnStartRequest r=dragana
The bug was caused by the tcp connection not sending back any data, and just being closed right away.
So we get something like this:
FTPChannelChild::DoOnStartRequest
FTPChannelChild::DoOnStopRequest -> nsUnknownDecoder::OnStopRequest -> (data is empty) -> nsUnknownDecoder::FireListenerNotifications -> nsDocumentOpenInfo::OnStartRequest -> ExternalHelperAppChild::OnStartRequest -> ExternalHelperAppChild::DivertToParent -> FTPChannelChild::DivertToParent.

However, in nsIDivertableChannel.idl the description for divertToParent() is "divertToParent is called in the child process. It can only be called during OnStartRequest()."

Enforcing this condition seems to be enough to avoid an infinite loop. The crash was fixed by bug 1436311.
2018-06-04 20:05:56 +02:00
Ben Kelly ac7ea6f3f6 Bug 1441932 P4 Treat same-value assignments to the LoadInfo reserved and initial ClientInfo values as no-op changes. r=mayhemer 2018-06-04 09:26:51 -07:00
Ben Kelly 85490e45e8 Bug 1441932 P3 Forward reserved client, initial client, and controller on Redirect2Verify message back to parent. r=mayhemer 2018-06-04 09:26:51 -07:00
Ben Kelly 1030889376 Bug 1441932 P2 Remove explicit ServiceWorker controller from http OnStartRequest message. r=mayhemer 2018-06-04 09:26:51 -07:00
Ben Kelly 5697bd9f89 Bug 1441932 P1 Add the ServiceWorker controller to ParentLoadInfoForwarderArgs. r=mayhemer 2018-06-04 09:26:50 -07:00
Ryan VanderMeulen cb40810a94 Bug 1443164 - Update brotli to version 1.0.4 and update Gecko callers. r=jfkthame, r=mayhemer
--HG--
extra : rebase_source : 1d5f9fe1fac61afdbdc0209aa851ce4f7ab3d230
2018-05-31 12:49:40 -04:00
Alex Gaynor d71b5b9238 Bug 1392739 - Add test for faulty nsStandardURL deserialization. r=mayhemer 2018-05-23 22:25:08 +02:00