Граф коммитов

19300 Коммитов

Автор SHA1 Сообщение Дата
Junior Hsu a92a02a283 Bug 1604851, r=dragana
No need to optimize one lock here since telemetry tells us only 1 out of 1m request with alt-svc
https://searchfox.org/mozilla-central/rev/b243debf6235b050b42fd2eb615fdc729636ca6b/netwerk/protocol/http/nsHttpChannel.cpp#6670

Differential Revision: https://phabricator.services.mozilla.com/D57925

--HG--
extra : moz-landing-system : lando
2019-12-24 16:14:54 +00:00
Andi-Bogdan Postelnicu 597ca4ed51 Bug 1605659 - fix some errors discovered with `-Wdeprecated-copy`. r=valentin
Differential Revision: https://phabricator.services.mozilla.com/D59296

--HG--
extra : moz-landing-system : lando
2020-01-09 16:42:15 +00:00
Michal Novotny 4fe21c14b2 Bug 1601712 - Avoid notifying callback directly from InputStreamShim::AsyncWait() r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D59067

--HG--
extra : moz-landing-system : lando
2020-01-08 10:15:48 +00:00
ffxbld 47f9f24123 No Bug, mozilla-central repo-update HSTS HPKP blocklist remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D59324

--HG--
extra : moz-landing-system : lando
2020-01-09 15:43:49 +00:00
Arthur Iakab 94f5338c33 Backed out 2 changesets (bug 1405971) by request of evilpie.
Backed out changeset 1698a498f801 (bug 1405971)
Backed out changeset 94512ff23703 (bug 1405971)

--HG--
extra : rebase_source : 22b68902af62d1e4f4acd474f21684fce9640666
2020-01-09 17:04:02 +02:00
Valentin Gosu 17e4e93de7 Bug 1607468 - Remove NETWORK_CROSS_ORIGIN_STYLESHEET_CONTENT_TYPE telemetry r=kershaw
Differential Revision: https://phabricator.services.mozilla.com/D59106

--HG--
extra : moz-landing-system : lando
2020-01-08 15:24:34 +00:00
Michal Novotny 40a21eea5b Bug 1519126 - Intermittent GECKO(1168) | Assertion failure: !chunk->IsReady() r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D58533

--HG--
extra : moz-landing-system : lando
2020-01-08 14:09:33 +00:00
Valentin Gosu 16ae7bd480 Bug 1552176 - pass TRRMode into nsHTMLDNSPrefetch methods r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D49159

--HG--
extra : moz-landing-system : lando
2020-01-07 19:33:51 +00:00
Valentin Gosu 90fff44905 Bug 1552176 - Pass TRRMode to nsDNSPrefetch r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D49158

--HG--
extra : moz-landing-system : lando
2020-01-07 19:33:10 +00:00
Valentin Gosu cbc2554d2d Bug 1552176 - Captive portal domain should not be automatically excluded from TRR r=mayhemer
Previously we had no way from excluding just one channel from TRR mode3.
The solution was to add the captive portal domain to the exclusion list.
Now the captive portal channel is marked with nsIRequest.DISABLE_TRR_MODE so
the exclusion is not necessary anymore.

Differential Revision: https://phabricator.services.mozilla.com/D48820

--HG--
extra : moz-landing-system : lando
2020-01-07 19:32:32 +00:00
Valentin Gosu c7d9b630cb Bug 1552176 - Add nsIRequest.set/getTRRMode r=dragana
* Makes it possible to selectively enable TRR for pbmode/container/window/etc

Differential Revision: https://phabricator.services.mozilla.com/D48363

--HG--
extra : moz-landing-system : lando
2020-01-07 20:20:38 +00:00
Valentin Gosu b52a50f21f Bug 1552176 - Unit test for TRRMode for individual channels r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D48362

--HG--
extra : moz-landing-system : lando
2020-01-07 19:28:16 +00:00
Henrik Skupin c521cc2ffa Bug 1597227 - Remove forced GC when closing a httpd.js connection. r=froydnj
The forced garbage collection has been added a decade ago for a test that
exhibited a memory increase over time in Firefox. Now that the test is no
longer present in the tree, and the garbage collector got a lot of improvements
over the last years, there is no compelling reason to keep the call to
"forceGC()" in the closing handler of httpd.js.

Differential Revision: https://phabricator.services.mozilla.com/D58550

--HG--
extra : moz-landing-system : lando
2020-01-07 20:16:16 +00:00
Matt Woodrow 5913bdc39b Bug 1598523 - Create nsIWrapperChannel so that we can find the inner channel within view-source. r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D57893

--HG--
extra : moz-landing-system : lando
2020-01-08 01:00:35 +00:00
Matt Woodrow ff5ffc1ea3 Bug 1598523 - Implement nsIChildChannel on nsViewSourceChannel forwarding to the inner channel. r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D57891

--HG--
extra : moz-landing-system : lando
2020-01-08 01:00:37 +00:00
Matt Woodrow a59b688778 Bug 1598523 - Make DocumentChannelChild/ContentChild QI to the specific interfaces it wants, rather than assuming that only HttpChannelChild will have them. r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D57890

--HG--
extra : moz-landing-system : lando
2020-01-08 01:00:39 +00:00
Matt Woodrow 225eeb216b Bug 1598523 - Improve logging of channel names for DC and view-source. r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D57888

--HG--
extra : moz-landing-system : lando
2020-01-08 01:00:41 +00:00
Matt Woodrow 87b0e83cf6 Bug 1598523 - Share code for creating a channel for a document between nsDocShell, DocumentChannelChild and ContentChild. r=kmag
Note that this also implicitly adds support for the view-source+srcdoc configuration, and setting of the BaseURI, which were both in the nsDocShell version but not the others.

Differential Revision: https://phabricator.services.mozilla.com/D57887

--HG--
extra : moz-landing-system : lando
2020-01-08 02:10:54 +00:00
Bogdan Tara 4e368405fa Backed out 6 changesets (bug 1598523) for geckoview failures complaining about NavigationDelegateTest.loadUnknownProtocol
Backed out changeset 2e7ea1ae7fa2 (bug 1598523)
Backed out changeset 6adc1062662b (bug 1598523)
Backed out changeset 141372c43f02 (bug 1598523)
Backed out changeset c5abcaabaf2d (bug 1598523)
Backed out changeset 5a22a20dd993 (bug 1598523)
Backed out changeset e0df103c9cf3 (bug 1598523)
2020-01-08 02:56:18 +02:00
Matt Woodrow 27d2b8a269 Bug 1598523 - Create nsIWrapperChannel so that we can find the inner channel within view-source. r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D57893

--HG--
extra : moz-landing-system : lando
2020-01-07 20:57:52 +00:00
Matt Woodrow a92b542805 Bug 1598523 - Implement nsIChildChannel on nsViewSourceChannel forwarding to the inner channel. r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D57891

--HG--
extra : moz-landing-system : lando
2020-01-07 20:57:15 +00:00
Matt Woodrow 93ab0405ec Bug 1598523 - Make DocumentChannelChild/ContentChild QI to the specific interfaces it wants, rather than assuming that only HttpChannelChild will have them. r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D57890

--HG--
extra : moz-landing-system : lando
2020-01-07 20:57:13 +00:00
Matt Woodrow e835127601 Bug 1598523 - Improve logging of channel names for DC and view-source. r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D57888

--HG--
extra : moz-landing-system : lando
2020-01-07 20:56:02 +00:00
Matt Woodrow 0e8ab1d433 Bug 1598523 - Share code for creating a channel for a document between nsDocShell, DocumentChannelChild and ContentChild. r=kmag
Note that this also implicitly adds support for the view-source+srcdoc configuration, and setting of the BaseURI, which were both in the nsDocShell version but not the others.

Differential Revision: https://phabricator.services.mozilla.com/D57887

--HG--
extra : moz-landing-system : lando
2020-01-07 21:17:22 +00:00
Kershaw Chang 4294c4a5e5 Bug 1217876 - Show authentication prompt correctly for system XHR r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D56339

--HG--
extra : moz-landing-system : lando
2020-01-07 13:13:37 +00:00
Tarek Ziadé ba342de04f Bug 1478488 - Check for the write-ahead sqlite file in the test r=valentin
On windows 10-64 asan, we get a failure on the network io test that
checks the sqlite DB is touched. According to the logs, this failure
happens because when the test occurs the write happens in the wal
file. Adapted the test to also check for that location.

Differential Revision: https://phabricator.services.mozilla.com/D58908

--HG--
extra : moz-landing-system : lando
2020-01-07 08:55:40 +00:00
Matt Woodrow d18c4f70a4 Bug 1598520 - Add more logging to DocumentChannel. r=mayhemer,jya
Differential Revision: https://phabricator.services.mozilla.com/D57589

--HG--
extra : moz-landing-system : lando
2020-01-06 21:37:34 +00:00
Matt Woodrow f02ab8e1c4 Bug 1598520 - Fix missing flags write. r=kmag
Differential Revision: https://phabricator.services.mozilla.com/D57588

--HG--
extra : moz-landing-system : lando
2020-01-06 21:37:01 +00:00
Matt Woodrow 3687cec8cf Bug 1598520 - Allow DocumentChannel for srcdoc= loads. r=kmag
Differential Revision: https://phabricator.services.mozilla.com/D57587

--HG--
extra : moz-landing-system : lando
2020-01-06 21:36:34 +00:00
Jean-Yves Avenard 7d42be93a7 Bug 1603187 - P4. Pass navigation timing info to the new docshell when performing a process switch. r=mattwoodrow,farre
Differential Revision: https://phabricator.services.mozilla.com/D57772

--HG--
extra : moz-landing-system : lando
2020-01-05 05:44:44 +00:00
Junior Hsu 5ab6488c2e Bug 1600326 - P2 avoid propagating error if we don't have COOP without window global, r=ttung
Depends on D57578

Differential Revision: https://phabricator.services.mozilla.com/D57579

--HG--
extra : moz-landing-system : lando
2019-12-18 08:29:24 +00:00
Junior Hsu a0e824e158 Bug 1600326 - P1 avoid wrongly COOP error for subframe, r=ttung
Differential Revision: https://phabricator.services.mozilla.com/D57578

--HG--
extra : moz-landing-system : lando
2019-12-18 20:03:00 +00:00
Michal Novotny 5d31cfe04e Bug 1586782 - network ID: get rid of NL_DEBUG_LOG in NetlinkService r=valentin
Differential Revision: https://phabricator.services.mozilla.com/D58347

--HG--
extra : moz-landing-system : lando
2019-12-28 14:42:03 +00:00
ffxbld cbe062ca0b No Bug, mozilla-central repo-update HSTS HPKP blocklist remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D58244

--HG--
extra : moz-landing-system : lando
2019-12-26 21:30:40 +00:00
Junior Hsu 2f1ac171e7 Bug 1527242 - Guarantee onHandshakeDone is called even it's set after handshake, r=michal
We set a `securityObserver` in `onSocketAccepted` on the main thread to observe `onHandshakeDone`, which might be too late since handshake could complete off main thread. Therefore, when we set `securityObserver` after handshake is completed, call `onHandshakeDone`.

Differential Revision: https://phabricator.services.mozilla.com/D56483

--HG--
extra : moz-landing-system : lando
2019-12-24 20:16:34 +00:00
Junior Hsu bc6a80e794 Bug 1601671 - make websocket support proxying on SOCKS/HTTPS, r=michal
This is something less hacky to the best of my knowledge. Both passing preferable proxy table and letting system setting handle `ws`/`wss` touch the code of all platforms, which is more fragile.

Differential Revision: https://phabricator.services.mozilla.com/D57176

--HG--
extra : moz-landing-system : lando
2019-12-24 19:51:09 +00:00
Emma Malysz be8bd71702 Bug 1601110, remove handling and references to vnd.mozilla.xul+xml r=bzbarsky
Differential Revision: https://phabricator.services.mozilla.com/D57567

--HG--
extra : moz-landing-system : lando
2019-12-23 23:02:05 +00:00
Emma Malysz c028f5125c Bug 1605737, remove XUL cached type r=bzbarsky
Differential Revision: https://phabricator.services.mozilla.com/D58140

--HG--
extra : moz-landing-system : lando
2019-12-23 17:10:15 +00:00
Junior Hsu 1b32e82bc4 Bug 1531708 - avoid hiding error in nsSyncStreamListener r=michal
Differential Revision: https://phabricator.services.mozilla.com/D56812

--HG--
extra : moz-landing-system : lando
2019-12-20 18:22:40 +00:00
Dragana Damjanovic 8a5b949d76 Bug 1605096 - Make sure that in all cases we only make one QUIC connection. r=kershaw
Differential Revision: https://phabricator.services.mozilla.com/D57792

--HG--
extra : moz-landing-system : lando
2019-12-19 14:45:57 +00:00
Dragana Damjanovic 92e62f1418 Bug 1605090 - Use next_event() instead of events(). r=agrover
Differential Revision: https://phabricator.services.mozilla.com/D57785

--HG--
extra : moz-landing-system : lando
2019-12-19 17:40:36 +00:00
Christian Holler 878aa4ec9b Bug 1600130 - Sync HTTP fuzzing target with background thread. r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D56694

--HG--
extra : moz-landing-system : lando
2019-12-19 18:48:37 +00:00
Chris Peterson 406763af7f Bug 1570499 - Part 1: Replace MOZ_FALLTHROUGH macro with C++17's [[fallthrough]] attribute. r=froydnj
This changeset is a simple find and replace of `MOZ_FALLTHROUGH` and `[[fallthrough]]`.

Unfortunately, the MOZ_FALLTHROUGH_ASSERT macro (to assert on case fallthrough in debug builds) is still necessary after switching from [[clang::fallthrough]] to [[fallthrough]] because:

* MOZ_ASSERT(false) followed by [[fallthrough]] triggers a -Wunreachable-code warning in DEBUG builds
* but MOZ_ASSERT(false) without [[fallthrough]] triggers a -Wimplicit-fallthrough warning in NDEBUG builds.

Differential Revision: https://phabricator.services.mozilla.com/D56440

--HG--
extra : moz-landing-system : lando
2019-12-20 07:16:43 +00:00
Razvan Maries 188a114962 Backed out 5 changesets (bug 1598520) for perma fails on test_enumerateDevices_navigation.html. CLOSED TREE
Backed out changeset 583dac2feebc (bug 1598520)
Backed out changeset c769e733f588 (bug 1598520)
Backed out changeset 45287a2ec476 (bug 1598520)
Backed out changeset 59cff6014447 (bug 1598520)
Backed out changeset ddf722557c33 (bug 1598520)
2019-12-20 01:56:55 +02:00
Matt Woodrow 7883ff5767 Bug 1598520 - Add more logging to DocumentChannel. r=mayhemer,jya
Differential Revision: https://phabricator.services.mozilla.com/D57589

--HG--
extra : source : 8e3b650d93130c7774b08180f9a92efce09c7440
2019-12-19 21:49:01 +00:00
Matt Woodrow b1a2e02a58 Bug 1598520 - Fix missing flags write. r=kmag
Differential Revision: https://phabricator.services.mozilla.com/D57588

--HG--
extra : source : 73c37ad27d188602bf4e4618d015d338b085fd33
2019-12-19 21:48:55 +00:00
Matt Woodrow 620323f684 Bug 1598520 - Allow DocumentChannel for srcdoc= loads. r=kmag
Differential Revision: https://phabricator.services.mozilla.com/D57587

--HG--
extra : source : 10ad2e4d27c3e66b8ce5190377ed672c72010732
2019-12-19 21:48:00 +00:00
Razvan Maries bfe0632450 Backed out 5 changesets (bug 1598520) for Linting failure. CLOSED TREE
Backed out changeset b4f71abf75fe (bug 1598520)
Backed out changeset 8e3b650d9313 (bug 1598520)
Backed out changeset 73c37ad27d18 (bug 1598520)
Backed out changeset 10ad2e4d27c3 (bug 1598520)
Backed out changeset 4a5d10759bf3 (bug 1598520)
2019-12-20 00:38:32 +02:00
Matt Woodrow c32db0c82d Bug 1598520 - Add more logging to DocumentChannel. r=mayhemer,jya
Differential Revision: https://phabricator.services.mozilla.com/D57589

--HG--
extra : moz-landing-system : lando
2019-12-19 21:49:01 +00:00
Matt Woodrow fe960cb2c3 Bug 1598520 - Fix missing flags write. r=kmag
Differential Revision: https://phabricator.services.mozilla.com/D57588

--HG--
extra : moz-landing-system : lando
2019-12-19 21:48:55 +00:00
Matt Woodrow fae5ac7731 Bug 1598520 - Allow DocumentChannel for srcdoc= loads. r=kmag
Differential Revision: https://phabricator.services.mozilla.com/D57587

--HG--
extra : moz-landing-system : lando
2019-12-19 21:48:00 +00:00
Matt Woodrow 60f2305143 Bug 1601243 - Revert removal of OnStartRequestSent. r=mayhemer
It turns out we can send messages over PHttpBackgroundChannel before OnStartRequest, in the case where we have content process serviceworkers generating a synthetic response.
This triggers diversion without sending OnStartRequest. We can remove this code again when we remove diversion.

Differential Revision: https://phabricator.services.mozilla.com/D57383

--HG--
extra : moz-landing-system : lando
2019-12-19 22:01:28 +00:00
Andreea Pavel e371758133 Backed out changeset d746c1641f6f (bug 1601243) for failing HttpBackgroundChannelChild.cpp on a CLOSED TREE 2019-12-19 22:58:29 +02:00
Matt Woodrow 78b62d4d1b Bug 1601243 - Revert removal of OnStartRequestSent. r=mayhemer
It turns out we can send messages over PHttpBackgroundChannel before OnStartRequest, in the case where we have content process serviceworkers generating a synthetic response.
This triggers diversion without sending OnStartRequest. We can remove this code again when we remove diversion.

Differential Revision: https://phabricator.services.mozilla.com/D57383

--HG--
extra : moz-landing-system : lando
2019-12-19 16:27:13 +00:00
Matt Woodrow 84b43c1321 Bug 1604717 - Disconnect content process immediately when we handle a request as a download. r=bzbarsky
This stops the originating docshell from showing as loading while a download is in progress, and prevents it from cancelling the download if it tries to navigate again.

Differential Revision: https://phabricator.services.mozilla.com/D57673

--HG--
extra : moz-landing-system : lando
2019-12-19 19:16:45 +00:00
Matt Woodrow ea7c6048c5 Bug 1604717- Ensure that we can no longer receive cancellations from the content process DocumentChannelChild after we've decided to disconnect it. r=jya
Differential Revision: https://phabricator.services.mozilla.com/D57672

--HG--
extra : moz-landing-system : lando
2019-12-19 13:44:03 +00:00
Matt Woodrow be28c2b749 Bug 1604717 - Remove unused Suspend/Restore methods from DocumentLoadListener. r=jya
Differential Revision: https://phabricator.services.mozilla.com/D57671

--HG--
extra : moz-landing-system : lando
2019-12-19 13:44:03 +00:00
Matt Woodrow 5ca742d969 Bug 1604717 - Add more DocumentLoadListener logging. r=jya
Differential Revision: https://phabricator.services.mozilla.com/D57670

--HG--
extra : moz-landing-system : lando
2019-12-19 13:44:02 +00:00
Jean-Yves Avenard dd4db4a4b5 Bug 1598497 - P2. Have the canceled attribute only if explicitly canceled. r=mayhemer.
Previously, GetCancelled() would have return true should the channel's status was an error.
Doing Cancel(NS_OK) for example, would have made a follow-up call to GetCancelled() return false. However, we can assert that such a call would have been a bug.

Following this change GetCancelled() will only return true if Cancel() was explicitly called.

Differential Revision: https://phabricator.services.mozilla.com/D55401

--HG--
extra : moz-landing-system : lando
2019-12-19 05:20:07 +00:00
Jean-Yves Avenard b1be794e1b Bug 1598497 - P1. move canceled attribute to nsIChannel. r=mayhemer
There is no functional change with this commit. The default implementation for GetCanceled() is still to check if the status code is a failure.

However, it can be argued that as you had to call Cancel() on the nsIChannel, having to check the nsIHttpChannelInternal interface to determine if you had been canceled in the past was rather a non obvious path.

It makes more sense to check the nsIChannel interface to determine if it's been canceled already and this allows for finer granularity if needed in the future.

Differential Revision: https://phabricator.services.mozilla.com/D55268

--HG--
extra : moz-landing-system : lando
2019-12-18 21:13:26 +00:00
Ehsan Akhgari 1ca91dd7ab Bug 1603969 - Part 1: Remove the concept of granted origins from the anti-tracking backend; r=baku
Granted origins cause a third-party tracker browsing context to not get
full first-party storage access after successfully calling the storage
access API or a heuristic granting ephemeral access.

For example, after https://tracker.example calls the storage access API
successfully in the third-party context, they embed
https://other-tracker.example, and that load fails because of ETP
restrictions.  Here what happens is that https://other-tracker.example
is mistakenly considered the granted origin, and because such a
permission doesn't exist, access is denied.

Differential Revision: https://phabricator.services.mozilla.com/D57493

--HG--
extra : moz-landing-system : lando
2019-12-19 02:56:52 +00:00
Gurzau Raul bed8b9f116 Backed out 4 changesets (bug 1603969) for failing at /browser_startup_mainthreadio.js on a CLOSED TREE.
Backed out changeset c4d79087eef1 (bug 1603969)
Backed out changeset 2c0198f3506c (bug 1603969)
Backed out changeset c5ad252c525b (bug 1603969)
Backed out changeset a334451b95eb (bug 1603969)
2019-12-19 02:08:09 +02:00
Ehsan Akhgari 1676da33c8 Bug 1603969 - Part 1: Remove the concept of granted origins from the anti-tracking backend; r=baku
Granted origins cause a third-party tracker browsing context to not get
full first-party storage access after successfully calling the storage
access API or a heuristic granting ephemeral access.

For example, after https://tracker.example calls the storage access API
successfully in the third-party context, they embed
https://other-tracker.example, and that load fails because of ETP
restrictions.  Here what happens is that https://other-tracker.example
is mistakenly considered the granted origin, and because such a
permission doesn't exist, access is denied.

Differential Revision: https://phabricator.services.mozilla.com/D57493

--HG--
extra : moz-landing-system : lando
2019-12-18 19:14:53 +00:00
Gurzau Raul e92fa08412 Backed out 4 changesets (bug 1603969) for failing at /browser_startup_mainthreadio.js on a CLOSED TREE.
Backed out changeset 959f12e42db9 (bug 1603969)
Backed out changeset 18bf461b9630 (bug 1603969)
Backed out changeset 8c3bb23a048b (bug 1603969)
Backed out changeset 450eec13d73e (bug 1603969)
2019-12-18 20:53:13 +02:00
Junior Hsu f0a71ae12f Bug 1575068 - update console error for CORSMissingAllowHeaderFromPreflight, r=ckerschb
Differential Revision: https://phabricator.services.mozilla.com/D57040

--HG--
extra : moz-landing-system : lando
2019-12-17 09:54:57 +00:00
Ehsan Akhgari 9852e6494c Bug 1603969 - Part 1: Remove the concept of granted origins from the anti-tracking backend; r=baku
Granted origins cause a third-party tracker browsing context to not get
full first-party storage access after successfully calling the storage
access API or a heuristic granting ephemeral access.

For example, after https://tracker.example calls the storage access API
successfully in the third-party context, they embed
https://other-tracker.example, and that load fails because of ETP
restrictions.  Here what happens is that https://other-tracker.example
is mistakenly considered the granted origin, and because such a
permission doesn't exist, access is denied.

Differential Revision: https://phabricator.services.mozilla.com/D57493

--HG--
extra : moz-landing-system : lando
2019-12-18 15:48:29 +00:00
Nathan Froyd db1510d87a Bug 1604555 - use GeneratedFile template in netwerk/socket/neqo_glue/; r=dragana
The template is slightly nicer and slighty more modern.

Differential Revision: https://phabricator.services.mozilla.com/D57487

--HG--
extra : moz-landing-system : lando
2019-12-18 08:02:52 +00:00
Nathan Froyd 7651624c69 Bug 1604556 - make some WebSocketChannel runnables use mozilla::Runnable; r=valentin
Differential Revision: https://phabricator.services.mozilla.com/D57489

--HG--
extra : moz-landing-system : lando
2019-12-17 19:45:48 +00:00
Noemi Erli 58bf47752e Backed out 2 changesets (bug 1598497) for causing OSX build bustages CLOSED TREE
Backed out changeset 3b31bbf74a5f (bug 1598497)
Backed out changeset 81beebdc2202 (bug 1598497)
2019-12-18 01:54:56 +02:00
Jean-Yves Avenard 653fbeaf3a Bug 1598497 - P2. Have the canceled attribute only if explicitly canceled. r=mayhemer.
Previously, GetCancelled() would have return true should the channel's status was an error.
Doing Cancel(NS_OK) for example, would have made a follow-up call to GetCancelled() return false. However, we can assert that such a call would have been a bug.

Following this change GetCancelled() will only return true if Cancel() was explicitly called.

Differential Revision: https://phabricator.services.mozilla.com/D55401

--HG--
extra : moz-landing-system : lando
2019-12-17 23:21:55 +00:00
Jean-Yves Avenard c63570cb58 Bug 1598497 - P1. move canceled attribute to nsIChannel. r=mayhemer
There is no functional change with this commit. The default implementation for GetCanceled() is still to check if the status code is a failure.

However, it can be argued that as you had to call Cancel() on the nsIChannel, having to check the nsIHttpChannelInternal interface to determine if you had been canceled in the past was rather a non obvious path.

It makes more sense to check the nsIChannel interface to determine if it's been canceled already and this allows for finer granularity if needed in the future.

Differential Revision: https://phabricator.services.mozilla.com/D55268

--HG--
extra : moz-landing-system : lando
2019-12-17 23:21:46 +00:00
Sebastian Hengst 664abec404 No bug - Fix typo to get build and test coverage after previous push lacked them due to infra issue (b 1604422). CLOSED TREE 2019-12-17 11:05:56 +01:00
Matt Woodrow 8a50597ef9 Bug 1574372 - Add parent-process version of nsDocumentOpenInfo, and use it in DocumentLoadListener. r=bzbarsky
Differential Revision: https://phabricator.services.mozilla.com/D56137

--HG--
extra : moz-landing-system : lando
2019-12-17 03:54:45 +00:00
Matt Woodrow a925a86ada Bug 1574372 - Add API to test stream converters to find out their output type. r=bzbarsky
We don't want to run stream conversion in the parent (since a lot of them require access to the document), so this instead adds a way to find out what their output type will be.

Differential Revision: https://phabricator.services.mozilla.com/D56134

--HG--
extra : moz-landing-system : lando
2019-12-17 03:02:02 +00:00
Oana Pop Rus 5545e5a016 Backed out 9 changesets (bug 1574372) for bustage and wpt failures. on a CLOSED TREE
Backed out changeset b0183a606fec (bug 1574372)
Backed out changeset b7c96254826e (bug 1574372)
Backed out changeset 196d61adc272 (bug 1574372)
Backed out changeset 419b94b1210e (bug 1574372)
Backed out changeset c192e499eb47 (bug 1574372)
Backed out changeset 4e57038c3518 (bug 1574372)
Backed out changeset 6ec2aa542b59 (bug 1574372)
Backed out changeset d71b4c0aac1a (bug 1574372)
Backed out changeset a05c3b113ac1 (bug 1574372)
2019-12-17 03:26:38 +02:00
Matt Woodrow e0dc3411aa Bug 1592747 - Null check mChannel in WaitForBgParent so that we don't crash release builds. r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D57046

--HG--
extra : moz-landing-system : lando
2019-12-16 22:20:39 +00:00
Tom Schuster da96fc6b8a Bug 1597494 - Remove nsIDocShellTreeItem from LoadInfo.cpp. r=smaug
Differential Revision: https://phabricator.services.mozilla.com/D57370

--HG--
extra : moz-landing-system : lando
2019-12-16 21:15:13 +00:00
Matt Woodrow 898cc13c90 Bug 1574372 - Add parent-process version of nsDocumentOpenInfo, and use it in DocumentLoadListener. r=bzbarsky
Differential Revision: https://phabricator.services.mozilla.com/D56137

--HG--
extra : moz-landing-system : lando
2019-12-16 21:26:01 +00:00
Matt Woodrow d1851fa263 Bug 1574372 - Add API to test stream converters to find out their output type. r=bzbarsky
We don't want to run stream conversion in the parent (since a lot of them require access to the document), so this instead adds a way to find out what their output type will be.

Differential Revision: https://phabricator.services.mozilla.com/D56134

--HG--
extra : moz-landing-system : lando
2019-12-16 21:40:06 +00:00
Valentin Gosu 46c67febc9 Bug 1603854 - nsNotifyAddrListener: Don't call NS_DispatchToMainThread if mShutdown is true r=froydnj
Differential Revision: https://phabricator.services.mozilla.com/D57236

--HG--
extra : moz-landing-system : lando
2019-12-16 13:19:57 +00:00
Olli Pettay 6a4379bdc7 Bug 1600605, make PNecko to use mediumhigh priority messages, not high priority, r=dragana
Per comment https://bugzilla.mozilla.org/show_bug.cgi?id=1442178#c54 I'm using this PNecko as an example case
for this new priority.

Depends on D57013

Differential Revision: https://phabricator.services.mozilla.com/D57014

--HG--
extra : moz-landing-system : lando
2019-12-16 15:01:14 +00:00
Boris Zbarsky 6639140a09 Bug 1603806. Add a blocking reason when loads with the SEC_REQUIRE_SAME_ORIGIN_* security flags are blocked due to not being same-origin. r=ckerschb,ochameau
Differential Revision: https://phabricator.services.mozilla.com/D57147

--HG--
extra : moz-landing-system : lando
2019-12-16 09:36:45 +00:00
Valentin Gosu 2808b0a1c5 Bug 1580740 - Don't use TRR when calling nsDNSService::DeprecatedSyncResolve on the main thread r=dragana
`nsAuthSSPI` makes a call to `DeprecatedSyncResolve` that normally issues a DNS
request and blocks until that completes. Apart from being a problem in general
this is an issue when using TRR, because the HTTPS channel to the DoH server
uses the main thread. When `DeprecatedSyncResolve` gets called on the main
thread it then blocks the thread, and since the TRR request never has the
chance to complete (even the TRR cancellation when the timer expires is
processed on the main thread) the result is a deadlock.

This structural problem should be fixed, but until that happens we should
set the `RESOLVE_DISABLE_TRR` flag when calling `ResolveHost` from
`nsDNSService::DeprecatedSyncResolve`

Differential Revision: https://phabricator.services.mozilla.com/D57214

--HG--
extra : moz-landing-system : lando
2019-12-16 12:33:57 +00:00
Tom Schuster eaf1513b61 Bug 1597493 - Remove nsIDocShellTreeItem from GetLoadContextInfo. r=smaug
It is not quite clear to me if GetBrowsingContext can ever be null that is why I opened Bug 1604040.

Differential Revision: https://phabricator.services.mozilla.com/D57247

--HG--
extra : moz-landing-system : lando
2019-12-16 11:27:23 +00:00
Matt Woodrow e88be9e3a2 Bug 1601743 - Don't apply the referrer header to the referrer that we send back to the content process when converting a DocumentChannel into a real channel. r=Ehsan
Differential Revision: https://phabricator.services.mozilla.com/D56841

--HG--
extra : moz-landing-system : lando
2019-12-16 00:19:03 +00:00
Kris Maglione 295e55e227 Bug 1596918: Part 4d - Fix callers which try to return non-clonable values. r=mccr8
Differential Revision: https://phabricator.services.mozilla.com/D53745

--HG--
extra : moz-landing-system : lando
2019-12-13 20:36:37 +00:00
Kris Maglione 9853440599 Bug 1596918: Part 3b - Run code formatters on files changed by previous patch. r=mccr8,remote-protocol-reviewers,ato
Differential Revision: https://phabricator.services.mozilla.com/D53741

--HG--
extra : moz-landing-system : lando
2019-12-13 20:36:24 +00:00
Kris Maglione 94e3b0bd8d Bug 1596918: Part 3a - Scripted rewrite of most ContentTask.spawn calls to SpecialPowers.spawn calls. r=mccr8,remote-protocol-reviewers,ato
This is generally pretty straightforward, and rewrites nearly all calls. It
skips the ones that it can detect using frame script globals like
`sendAsyncMessage`, though.

Differential Revision: https://phabricator.services.mozilla.com/D53740

--HG--
extra : moz-landing-system : lando
2019-12-13 20:36:16 +00:00
Valentin Gosu b97f97fe35 Bug 1598575 - Make nsNotifyAddrListener check the local group policy for DNS suffixes r=kershaw
Bug 1597683, added support for setting the DNS suffix list via "Advanced TCP/IP Settings". The changes performed in "Advanced TCP/IP Settings" reflect inside the `Computer\HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters` registry key.

However, when setting the Local Group Policy for DNS Suffixes via gpedit, the registry key that gets modified is `Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\DNSClient`
Note: the setting in gpedit can be found at Computer Configuration > Administrative Templates > Network > DNS Client > DNS suffix search list

This patch first checks for the Local Group Policy registry key, and if not found it checks the one that gets set by the Advanced TCP/IP Settings window.

Differential Revision: https://phabricator.services.mozilla.com/D56344

--HG--
extra : moz-landing-system : lando
2019-12-13 13:38:33 +00:00
Boris Zbarsky ee1cc488f2 Bug 1602483 part 2. Add a window id argument to CheckLoadURIWithPrincipal. r=ckerschb
Differential Revision: https://phabricator.services.mozilla.com/D56428

--HG--
rename : devtools/client/webconsole/test/browser/browser_webconsole_same_origin_errors.js => devtools/client/webconsole/test/browser/browser_webconsole_checkloaduri_errors.js
rename : devtools/client/webconsole/test/browser/test-same-origin-required-load.html => devtools/client/webconsole/test/browser/test-checkloaduri-failure.html
extra : moz-landing-system : lando
2019-12-12 16:41:19 +00:00
Boris Zbarsky cbc90e1aca Bug 1602090 part 2. Create separate CheckMayLoad and CheckMayLoadWithReporting APIs. r=ckerschb
CheckMayLoadAndReport takes a window ID.  This allows us to report
errors from it to the web console as needed.  Most consumers know statically
whether they want reporting or not, so there's no reason to force the ones that
don't to provide window ids.

Differential Revision: https://phabricator.services.mozilla.com/D56388

--HG--
extra : moz-landing-system : lando
2019-12-13 06:24:12 +00:00
Kershaw Chang d3103de230 Bug 1602502 - If proxy connect is not used, don't call HttpProxyResponseToErrorCode() r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D56871

--HG--
extra : moz-landing-system : lando
2019-12-12 18:24:40 +00:00
Tom Schuster 80cee1a152 Bug 1405971 - Replace existing disallowed schemes in Origin header with null. r=JuniorHsu,ckerschb
Differential Revision: https://phabricator.services.mozilla.com/D39781

--HG--
extra : moz-landing-system : lando
2019-12-12 18:31:25 +00:00
Ciure Andrei 6c95adafed Backed out 4 changesets (bug 1602483, bug 1602090) for causing perma leackchecks CLOSED TREE
Backed out changeset 6b057ba06b4a (bug 1602483)
Backed out changeset 9be3269d781d (bug 1602483)
Backed out changeset e3e2c1d7478e (bug 1602090)
Backed out changeset fdc4a588912e (bug 1602090)
2019-12-12 18:37:01 +02:00
Dragana Damjanovic 5d872b9ae4 Bug 1602541 - Do not send some headers if http3 is used. r=agrover
Differential Revision: https://phabricator.services.mozilla.com/D56778

--HG--
extra : moz-landing-system : lando
2019-12-11 18:57:59 +00:00
ffxbld 7f9eb46978 No Bug, mozilla-central repo-update HSTS HPKP blocklist remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D56907

--HG--
extra : moz-landing-system : lando
2019-12-12 15:32:17 +00:00
Oana Pop Rus 53f1ba7c69 Backed out 10 changesets (bug 1599043) for build bustages in nsGlobalWindowOuter.cpp on a CLOSED TREE
Backed out changeset 463b815557e4 (bug 1599043)
Backed out changeset 7c3f0a58cc6c (bug 1599043)
Backed out changeset 1eadd9f5b50e (bug 1599043)
Backed out changeset e4ea0d47136b (bug 1599043)
Backed out changeset 6b97581c33b6 (bug 1599043)
Backed out changeset a68bd2acf5d6 (bug 1599043)
Backed out changeset c8ed9c52508c (bug 1599043)
Backed out changeset aaf83f7806b4 (bug 1599043)
Backed out changeset 0ad30634e416 (bug 1599043)
Backed out changeset 68219c132efc (bug 1599043)
2019-12-12 17:14:54 +02:00
Tim Huang e3647eeee3 Bug 1599043 - Part 9: Set channel matched info in channels in parent process. r=dimi
This patch makes the matched info also set into the channels in the
parent process. This info is neeced for the ContentBlocking telemetry
and GeckoView also relies on it.

Differential Revision: https://phabricator.services.mozilla.com/D56748

--HG--
extra : moz-landing-system : lando
2019-12-12 10:15:20 +00:00
Tim Huang 4d90cf0737 Bug 1599043 - Part 4: Notify the OnContentBlockingEvent in the parent process in UrlClassifierCommon. r=dimi,Ehsan
We make the OnContentBlockingEvent to be notified in the parent procees
for UrlClassifierCommon. There are two place would trigger this,
UrlClassifierCommon::SetBlockedContent and
UrlClassifierCommon::AnnotateChannel. But we still send to the child
process to notify the content blocking since we need to update the log
in the content process in this stage.

Differential Revision: https://phabricator.services.mozilla.com/D55647

--HG--
extra : moz-landing-system : lando
2019-12-11 15:00:44 +00:00
Boris Zbarsky 4425adb1cc Bug 1602483 part 2. Add a window id argument to CheckLoadURIWithPrincipal. r=ckerschb
Differential Revision: https://phabricator.services.mozilla.com/D56428

--HG--
rename : devtools/client/webconsole/test/browser/browser_webconsole_same_origin_errors.js => devtools/client/webconsole/test/browser/browser_webconsole_checkloaduri_errors.js
rename : devtools/client/webconsole/test/browser/test-same-origin-required-load.html => devtools/client/webconsole/test/browser/test-checkloaduri-failure.html
extra : moz-landing-system : lando
2019-12-12 13:05:12 +00:00
Boris Zbarsky e0acf6e9fc Bug 1602090 part 2. Create separate CheckMayLoad and CheckMayLoadWithReporting APIs. r=ckerschb
CheckMayLoadAndReport takes a window ID.  This allows us to report
errors from it to the web console as needed.  Most consumers know statically
whether they want reporting or not, so there's no reason to force the ones that
don't to provide window ids.

Differential Revision: https://phabricator.services.mozilla.com/D56388

--HG--
extra : moz-landing-system : lando
2019-12-12 13:03:42 +00:00
Kershaw Chang 601d5de82a Bug 1602009 - Make sure mSecurityObserver can be only accessed within a lock r=valentin
Differential Revision: https://phabricator.services.mozilla.com/D56904

--HG--
extra : moz-landing-system : lando
2019-12-12 13:42:43 +00:00
Kershaw Chang 048e30fab9 Bug 1602026 - Get resolvedByTRR value within a lock r=valentin
Differential Revision: https://phabricator.services.mozilla.com/D56880

--HG--
extra : moz-landing-system : lando
2019-12-12 12:42:46 +00:00
Geoff Lankow 84cd35c4f7 Bug 1567462 - Make the test_redirect_protocol_telemetry.js test collect telemetry data for all products during testing. r=valentin
This test fails on Thunderbird otherwise.

Differential Revision: https://phabricator.services.mozilla.com/D56813

--HG--
extra : moz-landing-system : lando
2019-12-12 09:04:16 +00:00
Matt Woodrow fc8d68c367 Bug 1603194 - Pass nsDocShellLoadState's load flags to new process when process switching. r=kmag
Depends on D56821

Differential Revision: https://phabricator.services.mozilla.com/D56822

--HG--
extra : moz-landing-system : lando
2019-12-12 02:32:29 +00:00
Valentin Gosu 005584251a Bug 1586411 - Reenable netwerk/test/mochitests/test_different_domain_in_hierarchy.html in fission r=mattwoodrow
Differential Revision: https://phabricator.services.mozilla.com/D56795

--HG--
extra : moz-landing-system : lando
2019-12-11 21:29:52 +00:00
Valentin Gosu 99cfec8178 Bug 1561860 - Add rust-url based nsIURI implementation r=JuniorHsu
This patch adds DefaultURI which wraps MozURL which in turn forwards calls
to rust-url.
For the moment the added network.url.useDefaultURI is set to false by default.
The plan is to make this the default implementation for unknown URI types.

Differential Revision: https://phabricator.services.mozilla.com/D54748

--HG--
extra : moz-landing-system : lando
2019-12-11 20:17:53 +00:00
Neil Deakin 75efe08ebc Bug 1595154, replace the frame script FormAutofillFrameScript.js with an actor and fix up setTimeout calls in places that were relying on Timer.jsm being loaded in that frame script, r=MattN
Differential Revision: https://phabricator.services.mozilla.com/D52721

--HG--
rename : browser/extensions/formautofill/content/FormAutofillFrameScript.js => browser/extensions/formautofill/FormAutofillChild.jsm
extra : moz-landing-system : lando
2019-12-11 13:37:51 +00:00
Tom Tung dcf0aeb0a2 Bug 1474608 - P2 - Clear origin attributes data directly on cache2; r=asuth,michal,baku
Differential Revision: https://phabricator.services.mozilla.com/D34324

--HG--
extra : moz-landing-system : lando
2019-12-02 19:47:05 +00:00
Tom Tung 83eb41d14a Bug 1474608 - P1 - Clear origin attributes directly for deleteDataFromOriginAttributesPattern if it's possible; r=asuth,baku
The idea of this patch is to try to not use oberver mechanism as possible. To
achieve that, it introduces deleteByOriginAttributes() to cleaners. Different
from other methods, it would only be executed if it's implemented from a
cleaner.

It doesn't remove oberver mechanism entirely since some cleaners are still using
that for other deleteByXXX() functions. So, it only applies removing stuff to
PushService, QuotaManagerService, ServiceWorkerManager, nsPermissionManager,
nsApplicationCacheService, and nsCookieService.

Since the original issue is related to QuotaManagerService, it adds xpcshell
test under the dom/quota/test/unit/ to ensure the behavior won't be changed
accidentally in the future.

Differential Revision: https://phabricator.services.mozilla.com/D33758

--HG--
extra : moz-landing-system : lando
2019-12-02 19:47:13 +00:00
Jeff Walden 62a130ba0a Bug 1602882 - Move array operations to a new js/Array.h header. r=sfink,bzbarsky
Differential Revision: https://phabricator.services.mozilla.com/D56595

--HG--
extra : moz-landing-system : lando
2019-12-11 06:17:44 +00:00
shindli 91924fedc7 Backed out 9 changesets (bug 1596918) for causing mochitest permafailures in toolkit/content/tests/chrome/test_findbar_events.xhtml CLOSED TREE
Backed out changeset 45a1c42118f2 (bug 1596918)
Backed out changeset db09910ffa56 (bug 1596918)
Backed out changeset 5c9d9f141c10 (bug 1596918)
Backed out changeset 6a135670d603 (bug 1596918)
Backed out changeset 3a0184e0df72 (bug 1596918)
Backed out changeset 2f0036486823 (bug 1596918)
Backed out changeset a770c6d08d52 (bug 1596918)
Backed out changeset ef062eb7a6ee (bug 1596918)
Backed out changeset a6ea596e98db (bug 1596918)
2019-12-11 03:09:26 +02:00
Junior Hsu 743f50e6f0 Bug 1567462 - Resurrect telemetry for http redirects, r=valentin
Differential Revision: https://phabricator.services.mozilla.com/D53310

--HG--
extra : moz-landing-system : lando
2019-12-10 19:00:37 +00:00
Kris Maglione 37c15883a5 Bug 1596918: Part 4d - Fix callers which try to return non-clonable values. r=mccr8
Differential Revision: https://phabricator.services.mozilla.com/D53745

--HG--
extra : moz-landing-system : lando
2019-12-10 23:07:34 +00:00
Kris Maglione 3ca78ce8e3 Bug 1596918: Part 3b - Run code formatters on files changed by previous patch. r=mccr8,remote-protocol-reviewers,ato
Differential Revision: https://phabricator.services.mozilla.com/D53741

--HG--
extra : moz-landing-system : lando
2019-12-10 23:07:21 +00:00
Kris Maglione 16a9b29848 Bug 1596918: Part 3a - Scripted rewrite of most ContentTask.spawn calls to SpecialPowers.spawn calls. r=mccr8,remote-protocol-reviewers,ato
This is generally pretty straightforward, and rewrites nearly all calls. It
skips the ones that it can detect using frame script globals like
`sendAsyncMessage`, though.

Differential Revision: https://phabricator.services.mozilla.com/D53740

--HG--
extra : moz-landing-system : lando
2019-12-10 23:07:13 +00:00
Valentin Gosu a734b943c7 Bug 1598663 - Move calls to ComputeCrossOriginOpenerPolicyMismatch earlier r=JuniorHsu
* Initializes mHasCrossOriginOpenerPolicyMismatch = 0
* Moves ProcessCrossOriginResourcePolicyHeader and ComputeCrossOriginOpenerPolicyMismatch higher in the method, so we call them even when the channel gets cancelled for other reasons.

Differential Revision: https://phabricator.services.mozilla.com/D56228

--HG--
extra : moz-landing-system : lando
2019-12-10 11:10:31 +00:00
Valentin Gosu e16765733b Bug 1599816 - TRR: Make sure we recheck for VPNs on all relevant observer topics r=kershaw
This bug is caused by bug 1598676 (Adds NS_DNS_SUFFIX_LIST_UPDATED_TOPIC), and
bug 1598676 (makes CheckAdaptersAddresses be called at startup)

While at startup it's sometimes the case that the NS_NETWORK_LINK_TOPIC and
NS_DNS_SUFFIX_LIST_UPDATED_TOPIC are both called, due to coalescing and
other link service quirks (or bugs) that doesn't happen for every network
change.

This means that we end up calling RebuildSuffixList after every
CheckAdaptersAddresses call, but we don't do that for CheckPlatformDNSStatus.

This patch makes it so that we always call both methods regardless which of
the two observer notifications was received.

Differential Revision: https://phabricator.services.mozilla.com/D56435

--HG--
extra : moz-landing-system : lando
2019-12-10 09:37:05 +00:00
ffxbld ddfb9c0ff8 No Bug, mozilla-central repo-update HSTS HPKP blocklist remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D56358

--HG--
extra : moz-landing-system : lando
2019-12-09 18:02:19 +00:00
Boris Zbarsky de81734f14 Bug 1602093. Make CORS error messages be errors, not warnings. r=ckerschb
These typically indicate a fatal problem for whatever the page is trying to do;
we should give them the appropriate visibility.

Differential Revision: https://phabricator.services.mozilla.com/D56239

--HG--
extra : moz-landing-system : lando
2019-12-08 16:38:55 +00:00
Noemi Erli 82d41a33b2 Backed out 9 changesets (bug 1596918) for causing multiple browser-chrome failures
Backed out changeset 415007efd8c9 (bug 1596918)
Backed out changeset 011eb5ce927b (bug 1596918)
Backed out changeset e5fd3ee22ea1 (bug 1596918)
Backed out changeset 0bca4de31d40 (bug 1596918)
Backed out changeset 11ec4393f23d (bug 1596918)
Backed out changeset c5404a7c286d (bug 1596918)
Backed out changeset 7e9304405a46 (bug 1596918)
Backed out changeset fa0f0aeabf99 (bug 1596918)
Backed out changeset de196b077000 (bug 1596918)
2019-12-07 22:26:43 +02:00
Kris Maglione 8c28f5ff8d Bug 1596918: Part 4d - Fix callers which try to return non-clonable values. r=mccr8
Differential Revision: https://phabricator.services.mozilla.com/D53745

--HG--
extra : moz-landing-system : lando
2019-12-07 18:44:35 +00:00
Kris Maglione fa3556c3fc Bug 1596918: Part 3b - Run code formatters on files changed by previous patch. r=mccr8,remote-protocol-reviewers,ato
Differential Revision: https://phabricator.services.mozilla.com/D53741

--HG--
extra : moz-landing-system : lando
2019-12-07 18:44:34 +00:00
Kris Maglione 910eab35d2 Bug 1596918: Part 3a - Scripted rewrite of most ContentTask.spawn calls to SpecialPowers.spawn calls. r=mccr8,remote-protocol-reviewers,ato
This is generally pretty straightforward, and rewrites nearly all calls. It
skips the ones that it can detect using frame script globals like
`sendAsyncMessage`, though.

Differential Revision: https://phabricator.services.mozilla.com/D53740

--HG--
extra : moz-landing-system : lando
2019-12-07 19:11:58 +00:00
Daniel Varga 84a601a6d4 Backed out 17 changesets (bug 1596918) for multiple browser-chrome and dev-tools failures. On a CLOSED TREE
Backed out changeset ab87d2c1afae (bug 1596918)
Backed out changeset 775f3b06a687 (bug 1596918)
Backed out changeset 67cc63ef5d7f (bug 1596918)
Backed out changeset 7d290bcd2067 (bug 1596918)
Backed out changeset 048db9f4db7c (bug 1596918)
Backed out changeset 96a79d2ba614 (bug 1596918)
Backed out changeset be770d112dd8 (bug 1596918)
Backed out changeset 302c8ab8391c (bug 1596918)
Backed out changeset 44ef8f20732e (bug 1596918)
Backed out changeset 38c11ebfb8ff (bug 1596918)
Backed out changeset b586fc081374 (bug 1596918)
Backed out changeset 12283166716f (bug 1596918)
Backed out changeset 99b0421015d8 (bug 1596918)
Backed out changeset 97ec49dbbbf3 (bug 1596918)
Backed out changeset ec79478f58f1 (bug 1596918)
Backed out changeset c6d356833bb8 (bug 1596918)
Backed out changeset 5ef6026806c8 (bug 1596918)
2019-12-07 03:12:07 +02:00
Kris Maglione 6d5729ccb5 Bug 1596918: Part 4d - Fix callers which try to return non-clonable values. r=mccr8
Differential Revision: https://phabricator.services.mozilla.com/D53745

--HG--
extra : moz-landing-system : lando
2019-12-06 22:15:27 +00:00
Kris Maglione b5238224ba Bug 1596918: Part 3b - Run code formatters on files changed by previous patch. r=mccr8,remote-protocol-reviewers,ato
Differential Revision: https://phabricator.services.mozilla.com/D53741

--HG--
extra : moz-landing-system : lando
2019-12-06 22:14:22 +00:00
Kris Maglione 20da940e14 Bug 1596918: Part 3a - Scripted rewrite of most ContentTask.spawn calls to SpecialPowers.spawn calls. r=mccr8,remote-protocol-reviewers,ato
This is generally pretty straightforward, and rewrites nearly all calls. It
skips the ones that it can detect using frame script globals like
`sendAsyncMessage`, though.

Differential Revision: https://phabricator.services.mozilla.com/D53740

--HG--
extra : moz-landing-system : lando
2019-12-06 22:14:14 +00:00
Gabriele Svelto 5dc21d568c Bug 1600545 - Remove useless inclusions of header files generated from IDL files in modules/, netwerk/, parser/, security/, startupcache/, storage/, toolkit/, tools/, uriloader/, widget/, xpcom/ and xpfe/ r=Ehsan
The inclusions were removed with the following very crude script and the
resulting breakage was fixed up by hand. The manual fixups did either
revert the changes done by the script, replace a generic header with a more
specific one or replace a header with a forward declaration.

find . -name "*.idl" | grep -v web-platform | grep -v third_party | while read path; do
    interfaces=$(grep "^\(class\|interface\).*:.*" "$path" | cut -d' ' -f2)
    if [ -n "$interfaces" ]; then
        if [[ "$interfaces" == *$'\n'* ]]; then
          regexp="\("
          for i in $interfaces; do regexp="$regexp$i\|"; done
          regexp="${regexp%%\\\|}\)"
        else
          regexp="$interfaces"
        fi
        interface=$(basename "$path")
        rg -l "#include.*${interface%%.idl}.h" . | while read path2; do
            hits=$(grep -v "#include.*${interface%%.idl}.h" "$path2" | grep -c "$regexp" )
            if [ $hits -eq 0 ]; then
                echo "Removing ${interface} from ${path2}"
                grep -v "#include.*${interface%%.idl}.h" "$path2" > "$path2".tmp
                mv -f "$path2".tmp "$path2"
            fi
        done
    fi
done

Differential Revision: https://phabricator.services.mozilla.com/D55444

--HG--
extra : moz-landing-system : lando
2019-12-06 09:17:57 +00:00
Gabriele Svelto 69790bc62e Bug 1600545 - Remove useless inclusions of header files generated from IDL files in accessible/, browser/, caps/, chrome/, devtools/, docshell/, editor/, extensions/, gfx/, hal/, image/, intl/, ipc/, js/, layout/, and media/ r=Ehsan
The inclusions were removed with the following very crude script and the
resulting breakage was fixed up by hand. The manual fixups did either
revert the changes done by the script, replace a generic header with a more
specific one or replace a header with a forward declaration.

find . -name "*.idl" | grep -v web-platform | grep -v third_party | while read path; do
    interfaces=$(grep "^\(class\|interface\).*:.*" "$path" | cut -d' ' -f2)
    if [ -n "$interfaces" ]; then
        if [[ "$interfaces" == *$'\n'* ]]; then
          regexp="\("
          for i in $interfaces; do regexp="$regexp$i\|"; done
          regexp="${regexp%%\\\|}\)"
        else
          regexp="$interfaces"
        fi
        interface=$(basename "$path")
        rg -l "#include.*${interface%%.idl}.h" . | while read path2; do
            hits=$(grep -v "#include.*${interface%%.idl}.h" "$path2" | grep -c "$regexp" )
            if [ $hits -eq 0 ]; then
                echo "Removing ${interface} from ${path2}"
                grep -v "#include.*${interface%%.idl}.h" "$path2" > "$path2".tmp
                mv -f "$path2".tmp "$path2"
            fi
        done
    fi
done

Differential Revision: https://phabricator.services.mozilla.com/D55443

--HG--
extra : moz-landing-system : lando
2019-12-06 09:16:44 +00:00
Valentin Gosu 7f4d9c85c8 Bug 1543201 - DoH Privacy Enhancement: Do not set the User-Agent header for DoH requests r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D55934

--HG--
extra : moz-landing-system : lando
2019-12-05 19:17:28 +00:00
Mike Hommey 6a1d6c2698 Bug 1587468 - Update uuid to 0.8.1. r=webdriver-reviewers,whimboo,emilio
This leaves one out-of-tree of uuid 0.7, handled by https://github.com/mozilla/rkv/pull/184
(but we have two copies of that, we'd need to have it landed on both
branches and pulled).

Differential Revision: https://phabricator.services.mozilla.com/D55912

--HG--
extra : moz-landing-system : lando
2019-12-06 00:47:50 +00:00
Andy Grover d51d3cc964 Bug 1601070 - update Neqo to 0.1.7 r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D55731

--HG--
extra : moz-landing-system : lando
2019-12-05 18:44:09 +00:00
ffxbld 029fc78ac3 No Bug, mozilla-central repo-update HSTS HPKP blocklist remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D55956

--HG--
extra : moz-landing-system : lando
2019-12-05 15:40:18 +00:00
Michal Novotny 6504573f1b Bug 1601620 - ThreadSanitizer: data race in mozilla::net::CacheFileUtils::CachePerfStats, r=valentin
Differential Revision: https://phabricator.services.mozilla.com/D55972

--HG--
extra : moz-landing-system : lando
2019-12-05 14:49:24 +00:00
Boris Zbarsky 75124bdd98 Bug 1517588. Use nsIPrincipal::IsSystemPrincipal instead of nsContentUtils::IsSystemPrincipal r=bzbarsky
Differential Revision: https://phabricator.services.mozilla.com/D53067

--HG--
extra : moz-landing-system : lando
2019-12-05 04:44:32 +00:00
Ciure Andrei 7229b5803b Backed out 5 changesets (bug 1595154) for causing talos performance tests failures CLOSED TREE
Backed out changeset 498f750ed88a (bug 1595154)
Backed out changeset 45481561c120 (bug 1595154)
Backed out changeset 8ca3c106fc8d (bug 1595154)
Backed out changeset 7ffa8f958d0a (bug 1595154)
Backed out changeset 444505b4936b (bug 1595154)

--HG--
rename : browser/extensions/formautofill/FormAutofillChild.jsm => browser/extensions/formautofill/content/FormAutofillFrameScript.js
2019-12-04 21:07:05 +02:00
Neil Deakin 0fe11bd612 Bug 1595154, replace the frame script FormAutofillFrameScript.js with an actor and fix up setTimeout calls in places that were relying on Timer.jsm being loaded in that frame script, r=MattN
Differential Revision: https://phabricator.services.mozilla.com/D52721

--HG--
rename : browser/extensions/formautofill/content/FormAutofillFrameScript.js => browser/extensions/formautofill/FormAutofillChild.jsm
extra : moz-landing-system : lando
2019-12-04 11:45:10 +00:00
Andreas Tolfsen 6805a19f9f bug 1600121: netwerk: error on empty path in nsIHttpServer.registerPathHandler; r=mayhemer
It should be illegal to add paths that cannot be handled/accessed
or later referenced.  Without a path, it is for example later
impossible to delete the handler.

To address this we return an NS_ERROR_INVALID_ARG when
nsIHttpServer.registerPathHandler is called with an empty string.

Differential Revision: https://phabricator.services.mozilla.com/D55160

--HG--
extra : moz-landing-system : lando
2019-11-29 18:41:44 +00:00
Tom Schuster 60bd30f45a Bug 1596701 - Do not warn about wrong JS MIME type when HTTP load failed. r=ckerschb
Differential Revision: https://phabricator.services.mozilla.com/D55273

--HG--
extra : moz-landing-system : lando
2019-12-02 10:02:43 +00:00
Dimi Lee 890d2ceb9d Bug 1584931 - P2. Disable flashblock when fission is enabled. r=bytesized
This patch does the following:
  1. Disable flashblock when fission is enabled.
  2. Update flashblock tests to expect "unknown" classification when fission is
     enabled.
  3. Remove skip-if=fission in flashblock mochitests.

Depends on D51098

Differential Revision: https://phabricator.services.mozilla.com/D55091

--HG--
extra : moz-landing-system : lando
2019-12-04 09:00:28 +00:00
Matt Woodrow 6f0f9e969f Bug 1600211 - Forward AllPartsStopped to HttpChannelChild to ensure that we notify the listeners correctly. r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D55223

--HG--
extra : moz-landing-system : lando
2019-12-04 03:19:38 +00:00
Matt Woodrow a2c085754a Bug 1600211 - Disable content conversion by HttpChannelChild if we have already applied it by the time we get to HttpChannelParent::OnStartRequest. r=mayhemer
We normally get HttpChannelParent::OnStartRequest directly from nsHttpChannel::OnStartRequest, where we disable content conversion and ask the child to do it instead.

When we install a multipart converter, we defer calling HttpChannelParent::OnStartRequest until we've decoded parts, at which point content conversion is already applied to the stream.

This detects that case, and stops the child trying to do it a second time (which fails, and breaks the content).

Differential Revision: https://phabricator.services.mozilla.com/D55222

--HG--
extra : moz-landing-system : lando
2019-12-04 03:19:26 +00:00
Matt Woodrow 969be7e03d Bug 1600211 - Support multipart channels in DocumentLoadListener. r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D55221

--HG--
extra : moz-landing-system : lando
2019-12-04 03:19:08 +00:00
Matt Woodrow fbc0783110 Bug 1600211 - Add nsIMultiPartChannelListener as a reliable way to detect when a multi-part channel is finished and we can break reference cycles. r=mayhemer
We can't always know when sending a part if it'll be the last one (either because the channel is later cancelled, or because the response just sends the end boundary without warning). This was initially reported in bug 339610.

Differential Revision: https://phabricator.services.mozilla.com/D55220

--HG--
extra : moz-landing-system : lando
2019-12-04 03:18:56 +00:00
Matt Woodrow a26e9542d2 Bug 1600211 - Send OnDataAvailable and OnStopRequest on the main-thread channel when in multi-part mode to avoid complicated races across the two channels. r=mayhemer
This also removes OnStartRequestSent from PHttpBackgroundChannel, since there should never be any messages sent earlier on this channel, so we can just assume the waiting state initially.

Differential Revision: https://phabricator.services.mozilla.com/D55219

--HG--
extra : moz-landing-system : lando
2019-12-04 03:18:38 +00:00
Matt Woodrow 92e976c088 Bug 1600211 - Disable some interfaces on HttpChannelChild when we're in multipart mode since nsPartChannel didn't implement these and we don't want to support them. r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D55218

--HG--
extra : moz-landing-system : lando
2019-12-04 03:18:26 +00:00
Matt Woodrow 96102b54a4 Bug 1600211 - Support passsing nsIMultiPartChannel values through PHttpChannel, and conditionally expose this interface on HttpChannelChild. r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D55217

--HG--
extra : moz-landing-system : lando
2019-12-04 03:18:13 +00:00
Matt Woodrow ae112914b6 Bug 1600211 - Create a multi-part converter in nsHttpChannel if needed. r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D55216

--HG--
extra : moz-landing-system : lando
2019-12-04 03:17:55 +00:00
Matt Woodrow acb2b568b2 Bug 1600211 - Convert DocumentLoadListener to use a Variant for recording and replaying nsIStreamListener functions. r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D55215

--HG--
extra : moz-landing-system : lando
2019-12-04 03:17:43 +00:00
Matt Woodrow ff5771a51f Bug 1598516 - Add DocumentChannel MOZ_LOGs. r=jya
Differential Revision: https://phabricator.services.mozilla.com/D54250

--HG--
extra : moz-landing-system : lando
2019-12-03 23:55:04 +00:00
Matt Woodrow b3c2394593 Bug 1598516 - Don't crash if NS_NewChannelInternal fails. r=mayhemer
Looks like this can sometimes fail with moz-extension URIs, so we shouldn't crash

Differential Revision: https://phabricator.services.mozilla.com/D54249

--HG--
extra : moz-landing-system : lando
2019-12-03 23:54:51 +00:00
Matt Woodrow 713f0b20e6 Bug 1598516 - Expose a RemoteWindowContext on ParentChannelListener. r=mayhemer,kmag
Without DocumentChannel, nsExtProtocolChannel::OpenURL calls into nsExternalHelperAppService::LoadURI in the content process.
We then manually forward this to the parent process over PContent, create a RemoteWindowContext around the browser parent, and then call LoadURI again.

With DocumemntChannel, the nsExtProtocolChannel already lives in the parent, so we just need to provide a RemoteWindowContext directly (that the code accesses via GetInterface on the callbacks).

Differential Revision: https://phabricator.services.mozilla.com/D54247

--HG--
extra : moz-landing-system : lando
2019-12-03 23:54:21 +00:00
Bogdan Tara 0108d839e9 Backed out 8 changesets (bug 1598516) for run startup hangs CLOSED TREE
Backed out changeset bc0035aa57fe (bug 1598516)
Backed out changeset 33603b723337 (bug 1598516)
Backed out changeset 31c11dd9146d (bug 1598516)
Backed out changeset 4e269a638350 (bug 1598516)
Backed out changeset 76b86080c868 (bug 1598516)
Backed out changeset b6f84b01cbd9 (bug 1598516)
Backed out changeset 74d136798dd3 (bug 1598516)
Backed out changeset bf370938463e (bug 1598516)
2019-12-04 00:48:17 +02:00
Matt Woodrow 9d6d1cef54 Bug 1598516 - Add DocumentChannel MOZ_LOGs. r=jya
Differential Revision: https://phabricator.services.mozilla.com/D54250

--HG--
extra : moz-landing-system : lando
2019-12-03 20:43:43 +00:00
Matt Woodrow 6fd561123e Bug 1598516 - Don't crash if NS_NewChannelInternal fails. r=mayhemer
Looks like this can sometimes fail with moz-extension URIs, so we shouldn't crash

Differential Revision: https://phabricator.services.mozilla.com/D54249

--HG--
extra : moz-landing-system : lando
2019-12-03 20:43:33 +00:00
Matt Woodrow 1f894c8f18 Bug 1598516 - Expose a RemoteWindowContext on ParentChannelListener. r=mayhemer,kmag
Without DocumentChannel, nsExtProtocolChannel::OpenURL calls into nsExternalHelperAppService::LoadURI in the content process.
We then manually forward this to the parent process over PContent, create a RemoteWindowContext around the browser parent, and then call LoadURI again.

With DocumemntChannel, the nsExtProtocolChannel already lives in the parent, so we just need to provide a RemoteWindowContext directly (that the code accesses via GetInterface on the callbacks).

Differential Revision: https://phabricator.services.mozilla.com/D54247

--HG--
extra : moz-landing-system : lando
2019-12-03 20:43:19 +00:00
Michal Novotny a7fe3954fe Bug 1598321 - InputStreamShim::AsyncWait() and OutputStreamShim::AsyncWait() are not one-shot, r=dragana
InputStreamShim and OutputStreamShim now hold a strong reference to the callback and it's released after calling nsIInputStreamCallback::OnInputStreamReady() and nsIOutputStreamCallback::OnOutputStreamReady()

Differential Revision: https://phabricator.services.mozilla.com/D54147

--HG--
extra : moz-landing-system : lando
2019-11-26 18:31:18 +00:00
Gurzau Raul 2e8639b3b4 Backed out 8 changesets (bug 1598516) for build bustage at ParentChannelListener.cpp on a CLOSED TREE.
Backed out changeset 7ac1b091aa5f (bug 1598516)
Backed out changeset b62c5b49b91c (bug 1598516)
Backed out changeset e48c0ce38498 (bug 1598516)
Backed out changeset cc2599921b5e (bug 1598516)
Backed out changeset 0a0f80b0b278 (bug 1598516)
Backed out changeset 1dc19a039cab (bug 1598516)
Backed out changeset b664c8af6e2d (bug 1598516)
Backed out changeset 943b440179b9 (bug 1598516)
2019-12-03 21:48:14 +02:00
Michal Novotny b508e7721e Bug 1600811 - network ID: use hardcoded IP for route checking in nsNetworkLinkService on MacOS r=JuniorHsu
The preferences network.netlink.route.check.IPv4 and network.netlink.route.check.IPv6 were removed in bug 1593693 and the values are now hardcoded because they are used by Linux/Android implementation of nsNetworkLinkService for link status detection and they are not supposed to be changed by the user.

Differential Revision: https://phabricator.services.mozilla.com/D55587

--HG--
extra : moz-landing-system : lando
2019-12-03 07:26:07 +00:00
Matt Woodrow ab7f711e51 Bug 1598516 - Add DocumentChannel MOZ_LOGs. r=jya
Differential Revision: https://phabricator.services.mozilla.com/D54250

--HG--
extra : moz-landing-system : lando
2019-12-03 06:20:23 +00:00
Matt Woodrow 15db260efa Bug 1598516 - Don't crash if NS_NewChannelInternal fails. r=mayhemer
Looks like this can sometimes fail with moz-extension URIs, so we shouldn't crash

Differential Revision: https://phabricator.services.mozilla.com/D54249

--HG--
extra : moz-landing-system : lando
2019-12-03 06:20:11 +00:00
Matt Woodrow 9cc742b690 Bug 1598516 - Expose a RemoteWindowContext on ParentChannelListener. r=mayhemer,kmag
Without DocumentChannel, nsExtProtocolChannel::OpenURL calls into nsExternalHelperAppService::LoadURI in the content process.
We then manually forward this to the parent process over PContent, create a RemoteWindowContext around the browser parent, and then call LoadURI again.

With DocumemntChannel, the nsExtProtocolChannel already lives in the parent, so we just need to provide a RemoteWindowContext directly (that the code accesses via GetInterface on the callbacks).

Differential Revision: https://phabricator.services.mozilla.com/D54247

--HG--
extra : moz-landing-system : lando
2019-12-03 06:19:35 +00:00
Ehsan Akhgari d94f27a8d6 Bug 1595934 - Make nsICookieManager cookie enumerators return Array<nsICookie> instead of nsISimpleEnumerator; r=baku
Differential Revision: https://phabricator.services.mozilla.com/D52761

--HG--
extra : moz-landing-system : lando
2019-12-03 17:08:25 +00:00
Tom Ritter 4f9313ba4e Bug 1582512 - Register a ScriptValidationCallback to examine script loads in the parent process r=Gijs,ckerschb
Additionally, we disable validation on PAC scripts.

Differential Revision: https://phabricator.services.mozilla.com/D46500

--HG--
extra : moz-landing-system : lando
2019-12-02 17:27:09 +00:00
Kershaw Chang 9c48606bb3 Bug 1596409 - P6: Add a pref for using socket process for network r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D54174

--HG--
extra : moz-landing-system : lando
2019-12-03 13:46:04 +00:00
Kershaw Chang e686a3ff31 Bug 1596409 - P5: Enable necessary XPCOM components for using nsHttpTransaction in socket process r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D54165

--HG--
extra : moz-landing-system : lando
2019-12-03 13:45:19 +00:00
Kershaw Chang 23e2261f84 Bug 1596409 - P4: Impl PHttpConnectionMgr IPC protocol r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D54164

--HG--
extra : moz-landing-system : lando
2019-12-03 13:44:39 +00:00
Kershaw Chang 1c7dbad1ac Bug 1596409 - P3: Add HttpConnectionMgrShell r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D54162

--HG--
extra : moz-landing-system : lando
2019-12-03 13:44:06 +00:00
Kershaw Chang cb29d04cfa Bug 1596409 - P2: Seperate nsHttpConnectionMgr and AltSvcCache r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D54161

--HG--
extra : moz-landing-system : lando
2019-12-03 13:43:29 +00:00
Kershaw Chang 750f73dbb2 Bug 1596409 - P1.2: Create PHttpTransaction IPC protocol r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D54290

--HG--
extra : moz-landing-system : lando
2019-12-03 13:42:15 +00:00
Kershaw Chang f3bddbd52b Bug 1596409 - P1.1: Make socket process support IPCStream r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D54289

--HG--
extra : moz-landing-system : lando
2019-12-03 13:41:58 +00:00
Kershaw Chang a1a7f14884 Bug 1600678 - Use IPDL refcounted for DNSRequest r=valentin
Differential Revision: https://phabricator.services.mozilla.com/D55475

--HG--
extra : moz-landing-system : lando
2019-12-02 18:28:49 +00:00
Valentin Gosu 2fc5985a45 Bug 1598430 - Make sure that we record the NETWORK_ID_ONLINE telemetry at the right time r=michal
We perform this check in the first OnDataAvailable, instead of doing it in
OnStopRequest in case a network down event occurs after the data has arrived
but before we fire OnStopRequest. That would cause us to report a missing
networkID, even though it was not empty while receiving data.

Differential Revision: https://phabricator.services.mozilla.com/D55574

--HG--
extra : moz-landing-system : lando
2019-12-03 07:35:11 +00:00
Ciure Andrei e473bd5f57 Backed out 10 changesets (bug 1582512) for causing browser_preferences_usage.js to permafail CLOSED TREE
Backed out changeset a615a2c07523 (bug 1582512)
Backed out changeset 7dd0266da0a1 (bug 1582512)
Backed out changeset dfdefc6ede97 (bug 1582512)
Backed out changeset 59db30e1915f (bug 1582512)
Backed out changeset 1eb6f6b02149 (bug 1582512)
Backed out changeset 391ed11326fb (bug 1582512)
Backed out changeset 02865605c1c3 (bug 1582512)
Backed out changeset 017582048986 (bug 1582512)
Backed out changeset 1374c08302f9 (bug 1582512)
Backed out changeset 40dd63b6910a (bug 1582512)
2019-12-02 19:23:12 +02:00
Tom Ritter 40826aaf6c Bug 1582512 - Register a ScriptValidationCallback to examine script loads in the parent process r=Gijs,ckerschb
Additionally, we disable validation on PAC scripts.

Differential Revision: https://phabricator.services.mozilla.com/D46500

--HG--
extra : moz-landing-system : lando
2019-12-02 15:45:13 +00:00
Emilio Cobos Álvarez 74327c26b4 Bug 1599615 - Make some necko code less nsresult-happy. r=kershaw,valentin
Stuff that's infallible and not virtual has no reason to return an nsresult.

Differential Revision: https://phabricator.services.mozilla.com/D54831

--HG--
extra : moz-landing-system : lando
2019-12-02 13:21:06 +00:00
Valentin Gosu 0848f9ba9a Bug 1590528 - Call CheckAdaptersAddresses at startup r=kershaw
The problem is that the suffix is not always computed when Firefox starts up.
This patch adds a pref `network.notify.initial_call` that controls whether
CheckAdaptersAddresses gets called imediately after.
This call is necessary in order to compute the suffix list, VPN status, etc.

This patch also ensures that OnDnsSuffixListUpdated gets called by
NetlinkService::ComputeDNSSuffixList on Android. This notification is
necessary for the TRRService to pick up the suffix list.

Differential Revision: https://phabricator.services.mozilla.com/D55303

--HG--
extra : moz-landing-system : lando
2019-12-02 09:34:14 +00:00
Jean-Yves Avenard 72d4a6a2a4 Bug 1599968 - Remove nsIChildProcessChannelListerner interface. r=farre
There's just no use for it, it was an unnecessary virtual interface, with a single concreate class and only ever used in C++.

Differential Revision: https://phabricator.services.mozilla.com/D55069

--HG--
extra : moz-landing-system : lando
2019-11-29 15:14:07 +00:00
Jean-Yves Avenard 1bd91d2d68 Bug 1597865 - Fix do_QueryInterface to a RefPtr in DocumentChannel. r=mattwoodrow,mayhemer.
Use QueryObject instead. Some variable renaming to make it clearer we are dealing with a http channel.

Differential Revision: https://phabricator.services.mozilla.com/D55238

--HG--
extra : moz-landing-system : lando
2019-11-29 12:43:44 +00:00
Christian Holler fcad9f8bf9 Bug 1595692 - Handle missing base64 challenge in NegotiateAuth. r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D53989

--HG--
extra : moz-landing-system : lando
2019-11-22 21:17:10 +00:00
Michal Novotny f67a1ec522 Bug 1587534 - nsHttpChannel can return invalid content length for alternative data, r=valentin
CacheEntry::GetAltDataSize() can throw an error if the size isn't known yet, i.e. when the output stream wasn't closed yet. nsHttpChannel::OpenCacheInputStream() doesn't check the return value and in case of failure uninitialized altDataSize is stored in mAltDataLength.

Differential Revision: https://phabricator.services.mozilla.com/D55085

--HG--
extra : moz-landing-system : lando
2019-11-28 11:09:09 +00:00
Valentin Gosu 7996f8211b Bug 1582647 - Pref off the "public-suffix-list-updated" event r=Gijs
Updating the PSL while Firefox is running could cause principals to have
a different base domain before/after the update.
See bug 1582647 comment 30

Differential Revision: https://phabricator.services.mozilla.com/D55014

--HG--
extra : moz-landing-system : lando
2019-11-28 12:16:19 +00:00
Sebastian Streich a79df87bcc Bug 1589690 : Add isOnion API r=ckerschb
Differential Revision: https://phabricator.services.mozilla.com/D49751

--HG--
extra : moz-landing-system : lando
2019-11-28 09:22:17 +00:00
Jean-Yves Avenard 06d164721b Bug 1599006 - P4. Properly carry history and frecency data when switching process. r=kmag,mayhemer.
This allows test toolkit/components/places/tests/browser/browser_multi_redirect_frecency.js and others to pass when fission is enabled.

The content process expects to know the chain of redirects encountered while opening a URI. The DocumentChannelParent gather that information and sends it to the new ContentChild which can then propagate the information to the new nsDocShell.

The data used to only be passed around during same-origin redirects when fission mode was enabled.

In order to allow for move semantics and preventing unnecessary copy of the DocumentChannelRedirect array, we make the nsIChildProcessChannelListener::onChannelReady property C++ only (noscript).
As we have only one concrete nsIChildProcessChannelListener class (ChildProcessListener) and that the unique OnChannelReady implementation is infallible; we really don't need for the method to return nsresult (so we declare it nostdcall). This helps simplify that call.

Differential Revision: https://phabricator.services.mozilla.com/D54909

--HG--
extra : moz-landing-system : lando
2019-11-28 06:09:54 +00:00
Jean-Yves Avenard 3a1ad99868 Bug 1599006 - P3. Fix move semantics. r=mattwoodrow
A typo prevented for moves to actually occur. Fix other IPDL entry points while at it that could benefit from move semantics.

Depends on D54907

Differential Revision: https://phabricator.services.mozilla.com/D54908

--HG--
extra : moz-landing-system : lando
2019-11-27 23:07:34 +00:00
Jean-Yves Avenard 1922c3d728 Bug 1599006 - P2. Fix namespace comment. r=mattwoodrow
Depends on D54454

Differential Revision: https://phabricator.services.mozilla.com/D54907

--HG--
extra : moz-landing-system : lando
2019-11-27 23:00:57 +00:00
Emilio Cobos Álvarez 0c421267c6 Bug 1599843 - nsBaseChannel::Init does nothing. r=valentin
And is not virtual, so has no point in existing.

Differential Revision: https://phabricator.services.mozilla.com/D54983

--HG--
extra : moz-landing-system : lando
2019-11-27 20:06:41 +00:00
Ehsan Akhgari 6216893099 Bug 1599237 - Add a cookie manager API for deleting cookies by a time range, and use it in the clear data service; r=baku
Differential Revision: https://phabricator.services.mozilla.com/D54646

--HG--
extra : moz-landing-system : lando
2019-11-27 11:01:45 +00:00
Andreea Pavel c81fb53e77 Bug 1582318 - disable correct browser_sharedWorker.js test case on fission r=timhuang
Differential Revision: https://phabricator.services.mozilla.com/D54895

--HG--
extra : moz-landing-system : lando
2019-11-27 10:36:36 +00:00
Kershaw Chang 0e741f1658 Bug 1598676 - P2: Send dns suffix list updated event (Windows/Linux/Android) r=valentin
Differential Revision: https://phabricator.services.mozilla.com/D54901

--HG--
extra : moz-landing-system : lando
2019-11-27 11:14:44 +00:00
Kershaw Chang 4c90c150c6 Bug 1598676 - P1: Send dns suffix list updated event (MacOS) r=valentin
Differential Revision: https://phabricator.services.mozilla.com/D54782

--HG--
extra : moz-landing-system : lando
2019-11-27 11:14:44 +00:00
Matt Woodrow 4e9f06f73c Bug 1584031 - Allow non-http channels into on-may-change-process. r=kmag
Differential Revision: https://phabricator.services.mozilla.com/D53893

--HG--
extra : moz-landing-system : lando
2019-11-27 02:19:17 +00:00
Narcis Beleuzu 7d30f98797 Backed out changeset 4c50773d59a2 (bug 1594004) for mochitest failures on test_postMessage_solidus.html . CLOSED TREE 2019-11-27 02:01:58 +02:00
Alex Catarineu 5f0e03d3bf Bug 1598647 - Set Origin to null with network.http.referer.hideOnionSource r=JuniorHsu
Fix comment.

Differential Revision: https://phabricator.services.mozilla.com/D54749

--HG--
extra : moz-landing-system : lando
2019-11-26 17:56:14 +00:00
Sebastian Streich a3be2f9036 Bug 1594004 - Enable CacheSplit in nightly r=ckerschb,annevk
***
Fix Cache-Split related Tests

Differential Revision: https://phabricator.services.mozilla.com/D51815

--HG--
extra : moz-landing-system : lando
2019-11-26 15:38:53 +00:00
Sylvestre Ledru 8d2f0d1b1f Bug 1519636 - Reformat recent changes to the Google coding style r=Ehsan
# ignore-this-changeset

Differential Revision: https://phabricator.services.mozilla.com/D54686

--HG--
extra : moz-landing-system : lando
2019-11-26 14:35:02 +00:00
Michal Novotny f155107d8c Bug 1528850 - ws-over-h2 receive seems unreliable, r=dragana
The patch changes InputStreamShim::AsyncWait() so it checks the buffer state and if there is some data available the callback is immediately notified. Without this check the callback would be notified only when new data is delivered from the network.

Differential Revision: https://phabricator.services.mozilla.com/D53972

--HG--
extra : moz-landing-system : lando
2019-11-26 08:20:59 +00:00
Brindusan Cristian 6c34625fa0 Backed out 4 changesets (bug 1584031) for crashtest failures at crashtests/914521.html.
Backed out changeset 48a289c7226f (bug 1584031)
Backed out changeset cac72426ac2a (bug 1584031)
Backed out changeset bfb6286d68b6 (bug 1584031)
Backed out changeset c94a216693c5 (bug 1584031)
2019-11-26 06:42:14 +02:00
Matt Woodrow c5ae95e1b1 Bug 1584031 - Allow non-http channels into on-may-change-process. r=kmag
Differential Revision: https://phabricator.services.mozilla.com/D53893

--HG--
extra : moz-landing-system : lando
2019-11-26 03:18:26 +00:00
Jean-Yves Avenard 7198477b2c Bug 1596665 - P5. Pass last site information from the parent and remove DCC's nsHashPropertyBag inheritance. r=mayhemer,kmag
The previous site URI is now only written on the parent and sent back to the child once all redirects have completed.

In a follow up we will also transfer this information when a process switch occur as it's currently broken.

Differential Revision: https://phabricator.services.mozilla.com/D53926

--HG--
extra : moz-landing-system : lando
2019-11-26 01:47:48 +00:00
Jean-Yves Avenard 6f3787fd8c Bug 1596665 - P4. Expose some nsDocShell utility methods. r=kmag
And use the new methods where we can.

Differential Revision: https://phabricator.services.mozilla.com/D53925

--HG--
extra : moz-landing-system : lando
2019-11-26 01:24:42 +00:00
Jean-Yves Avenard 9d62b283ad Bug 1596665 - P3. Copy property bag from parent to child. r=kmag,mayhemer
Rather that setting the property bag on both the child and parent from the docshell; we first set it on the parent instead, and once the redirect (or process switch) has completed we carry that bag across.

Differential Revision: https://phabricator.services.mozilla.com/D53924

--HG--
extra : moz-landing-system : lando
2019-11-26 01:24:34 +00:00
Jean-Yves Avenard cc5f1886ed Bug 1596665 - P2. Add ability to copy all property bag contents to another. r=mattwoodrow
Add static CopyFrom method which is to be used in a follow-up patch. The static method takes a nsIWritablePropertyBag so that we don't need to cast to the concrete class.

Differential Revision: https://phabricator.services.mozilla.com/D53923

--HG--
extra : moz-landing-system : lando
2019-11-26 01:49:28 +00:00
Coroiu Cristina b55f6bda39 Backed out 6 changesets (bug 1598516) for Mn and pgo failures on a CLOSED TREE
Backed out changeset 63a84cdfd937 (bug 1598516)
Backed out changeset 894aaa4bc62e (bug 1598516)
Backed out changeset e19ada9e8b30 (bug 1598516)
Backed out changeset 72f2256ae171 (bug 1598516)
Backed out changeset 6ba74ff735ba (bug 1598516)
Backed out changeset b235cf22b0e4 (bug 1598516)
2019-11-26 04:40:35 +02:00
Matt Woodrow e6d9c278a0 Bug 1598516 - Add DocumentChannel MOZ_LOGs. r=jya
Differential Revision: https://phabricator.services.mozilla.com/D54250

--HG--
extra : moz-landing-system : lando
2019-11-25 20:23:27 +00:00
Matt Woodrow 9631fb7196 Bug 1598516 - Don't crash if NS_NewChannelInternal fails. r=mayhemer
Looks like this can sometimes fail with moz-extension URIs, so we shouldn't crash

Differential Revision: https://phabricator.services.mozilla.com/D54249

--HG--
extra : moz-landing-system : lando
2019-11-25 20:23:14 +00:00
Matt Woodrow f1d25c550d Bug 1598516 - Expose a RemoteWindowContext on ParentChannelListener. r=mayhemer,kmag
Without DocumentChannel, nsExtProtocolChannel::OpenURL calls into nsExternalHelperAppService::LoadURI in the content process.
We then manually forward this to the parent process over PContent, create a RemoteWindowContext around the browser parent, and then call LoadURI again.

With DocumemntChannel, the nsExtProtocolChannel already lives in the parent, so we just need to provide a RemoteWindowContext directly (that the code accesses via GetInterface on the callbacks).

Differential Revision: https://phabricator.services.mozilla.com/D54247

--HG--
extra : moz-landing-system : lando
2019-11-25 23:43:06 +00:00
Andrew McCreight e1cddbb815 Bug 1599180 - Fix some trivial "browing" typos. r=Ehsan
Differential Revision: https://phabricator.services.mozilla.com/D54570

--HG--
extra : moz-landing-system : lando
2019-11-25 18:32:35 +00:00
Valentin Gosu 2f9d597c56 Bug 1598635 - nsHttpChannel::ComputeCOOPMismatch should not crash in xpcshell-tests r=ttung
Not having a responseHead or browsingContext should not cause a crash or exception

In xpcshell-tests we don't really have a browsingContext, so we want to make
sure we don't crash when that happens.

If the channel failed, we may not have a response head. In that case we don't
want the call to ComputeCrossOriginOpenerPolicyMismatch to be what throws
an exception.

Differential Revision: https://phabricator.services.mozilla.com/D54408

--HG--
extra : moz-landing-system : lando
2019-11-25 09:52:51 +00:00
Alex Catarineu 31723548da Bug 1598647 - Set Origin to null with network.http.referer.hideOnionSource r=JuniorHsu
Differential Revision: https://phabricator.services.mozilla.com/D54303

--HG--
extra : moz-landing-system : lando
2019-11-25 13:29:47 +00:00
Valentin Gosu 43afef29e7 Bug 1565022 - TRR: Check for NRPT on Windows to use platform DNS r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D54093

--HG--
extra : moz-landing-system : lando
2019-11-24 14:33:26 +00:00
Valentin Gosu 0e928af6c3 Bug 1565008 - TRR: Check for Proxy on Windows to use platform DNS r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D54092

--HG--
extra : moz-landing-system : lando
2019-11-24 14:54:02 +00:00
Liang-Heng Chen 6bedbf81f5 Bug 1593083 - Ensure mTopWindowURI & mContentBlockingAllowListPrincipal are set correctly during HTTP redirects; r=mayhemer,Ehsan
There are 2 redirections happened on the tracking resource:
`nsHttpChannel` -> `InterceptedHttpChannel` -> `nsHttpChannel`.

`mTopWindowURI` is not copied to during the first redirection because it checks if the target channel is a `nsHttpChannel`.

Differential Revision: https://phabricator.services.mozilla.com/D52181

--HG--
extra : moz-landing-system : lando
2019-11-23 22:45:35 +00:00
Kershaw Chang b6831f6f80 Bug 1579049 - Part2: Expose proxy response error code in nsIProxiedChannel.idl r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D51143

--HG--
extra : moz-landing-system : lando
2019-11-21 16:02:47 +00:00
Kershaw Chang 60f6486027 Bug 1579049 - P1: Map Http error response codes to gecko error codes r=mayhemer,valentin
Differential Revision: https://phabricator.services.mozilla.com/D49903

--HG--
extra : moz-landing-system : lando
2019-11-21 14:24:36 +00:00
Mathieu Leplatre 280083669e Bug 1597337 - Report download errors in uptake telemetry r=Gijs
Differential Revision: https://phabricator.services.mozilla.com/D53783

--HG--
extra : moz-landing-system : lando
2019-11-22 08:35:30 +00:00
Kershaw Chang 0074c17ca8 Bug 1587686 - Cancel post-redirect channel if pre-redirect channel is already canceled r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D52546

--HG--
extra : moz-landing-system : lando
2019-11-21 16:17:55 +00:00
ffxbld 533132c23d No Bug, mozilla-central repo-update HSTS HPKP blocklist remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D54125

--HG--
extra : moz-landing-system : lando
2019-11-21 15:29:52 +00:00
Daniel Varga f12c40c242 Backed out changeset afe80b4ff889 (bug 1595934) Requested by ehsan to see if it fixex bug 1597915. On a CLOSED TREE 2019-11-22 02:01:51 +02:00
Jean-Yves Avenard 81120e5898 Bug 1595637 - P0. Remove use of NS_IF_ADDREF macro. r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D53380

--HG--
extra : moz-landing-system : lando
2019-11-21 10:57:54 +00:00
Jean-Yves Avenard aabcbaf2bd Bug 1595637 - P6. Remove depency on ChannelEventQueue and NeckoTargetHolder from DocumentChannelChild. r=mayhemer
There was no need for the ChannelEventQueue and GetNeckoTarget() was always retuning the main thread anyway.

Differential Revision: https://phabricator.services.mozilla.com/D53140

--HG--
extra : moz-landing-system : lando
2019-11-21 11:00:04 +00:00
Jean-Yves Avenard 7939f75703 Bug 1595637 - P5. Remove Suspend/Resume methods from PDocumentChannel. r=mattwoodrow
They are no longer used.

Differential Revision: https://phabricator.services.mozilla.com/D53381

--HG--
extra : moz-landing-system : lando
2019-11-21 10:58:31 +00:00
Jean-Yves Avenard 140a44a824 Bug 1595637 - P4. Assert that DCC non-functional methods are never called. r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D52786

--HG--
extra : moz-landing-system : lando
2019-11-21 10:58:23 +00:00
Jean-Yves Avenard 901cb4a89a Bug 1595637 - P2. Remove nsIIdentChannel from nsBaseChannel. r=mayhemer
It was only needed when used with DocumentChannelChild.

Differential Revision: https://phabricator.services.mozilla.com/D52784

--HG--
extra : moz-landing-system : lando
2019-11-21 10:58:11 +00:00
Jean-Yves Avenard e4fca7200e Bug 1595637 - P1. Don't have DocumentChannelChild inherit from nsBaseChannel. r=mayhemer
This expose that some methods aren't doing anything. We will address those in a follow-up change.

Differential Revision: https://phabricator.services.mozilla.com/D52783

--HG--
extra : moz-landing-system : lando
2019-11-21 10:58:02 +00:00
Valentin Gosu 50ab46ba6c Bug 1565004 - Make sure we skip TRR when there's an active VPN r=mayhemer
- Adds the `network.trr.enable_when_vpn_detected` defaulting to false. This means detecting a PPP adapter will make IsExcludedFromTRR always return true - it does not affect the `network.trr.mode` pref.
- Adds a test that when nsINetworkLinkService.vpnDetected is true we skip all TRR requests
- Makes it so we update the excludedDomains list and VPN detected status for TRR on any network:link-status-changed observer notification that is received.

Differential Revision: https://phabricator.services.mozilla.com/D53356

--HG--
extra : moz-landing-system : lando
2019-11-21 10:02:48 +00:00
Valentin Gosu 13590a1c98 Bug 1565004 - Add nsINetworkLinkService.vpnDetected r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D52168

--HG--
extra : moz-landing-system : lando
2019-11-21 10:43:02 +00:00
Valentin Gosu 8cbd335488 Bug 1597137 - Make sure that variables touched from IsExcludedFromTRR are locked r=dragana
- Since IsExcludedFromTRR may be called from multiple threads we should make sure that the member variables it uses are either atomic or locked.
- Makes IsTRRBlacklisted call IsExcludedFromTRR instead of querying variables again.
- Removes hardcoded checks for localhost and .local, since these are included in network.trr.builtin-excluded-domains

Differential Revision: https://phabricator.services.mozilla.com/D53984

--HG--
extra : moz-landing-system : lando
2019-11-21 10:43:02 +00:00
Valentin Gosu 8750aabfa9 Bug 1597137 - Don't load TRR entries from the cache if they are part of the excluded list. r=dragana
This patch fixes two issues where we may mistakenly load a TRR record even though the host is part of the excluded-domains list:
1. If a.com is part of the excluded domains, but b.com is not, then when we first resolve b.com using TRR, the server may also push the record for a.com; Previously we didn't check if the pushed record is also excluded, which could lead us to load it from the TRR cache.
2. If b.com is resolved using TRR, but later b.com is added to the excluded-domains list, we may mistakenly load b.com from the TRR cache, even though we should use platform DNS for it.

Differential Revision: https://phabricator.services.mozilla.com/D53354

--HG--
extra : moz-landing-system : lando
2019-11-21 10:02:33 +00:00
Honza Bambas 50f49afa20 Bug 1592628 - Propagate network.http.proxy.respect-be-conservative to the http connection manager at startup properly, r=kershaw
Differential Revision: https://phabricator.services.mozilla.com/D54002

--HG--
extra : moz-landing-system : lando
2019-11-20 18:22:08 +00:00
Matt Woodrow ecff1d58fe Bug 1597015 - Split DocumentChannelParent into two separate classes (DocumentLoadListener and DocumentChannelParent). r=mayhemer,jya
Currently DocumentChannelParent serves two fairly separate functions.

    It acts as a logic controller for a connecting load (ultimately on behalf of a CanonicalBrowsingContext), that creates a channel and once it gets a response, figures out the right thing to do with it (send to the originating process, send to a new process, handle as a download etc).

    It's the parent-side IPDL actor for an nsIChannel implementation that we hold in the docshell as a placeholder while the above happens. This is largely a backwards compatibility hack since docshell expects to have a channel when a load has been initiated (but in the future we could do loads more directly through BrowsingContext and rewrite docshell to understand waiting on that).

This patch splits this into two separate classes (and adds more documentation explaining exactly what each one does). It shouldn't affect any behaviour.

Differential Revision: https://phabricator.services.mozilla.com/D53383

--HG--
rename : netwerk/ipc/DocumentChannelParent.cpp => netwerk/ipc/DocumentLoadListener.cpp
extra : moz-landing-system : lando
2019-11-20 03:29:25 +00:00
Cosmin Sabou 3a4c7de3a6 Backed out changeset 1e9b8d8d2c8f (bug 1595833) for causing linux tsan build bustages. CLOSED TREE
--HG--
extra : amend_source : 5cd314ae4ddb281fd5f5c35477994883c9e3e45f
2019-11-20 18:57:29 +02:00
Cosmin Sabou be84eb7037 Backed out 11 changesets (bug 1582512) for causing valgrind bustages.
Backed out changeset 8b850fd66bf5 (bug 1582512)
Backed out changeset 07d3631e609a (bug 1582512)
Backed out changeset fa91b085eb59 (bug 1582512)
Backed out changeset 232d5735d404 (bug 1582512)
Backed out changeset 47045fa2ffd2 (bug 1582512)
Backed out changeset 40a0f6c6cd61 (bug 1582512)
Backed out changeset 5fb3e489c31f (bug 1582512)
Backed out changeset 379318a35b20 (bug 1582512)
Backed out changeset bf81985c33b7 (bug 1582512)
Backed out changeset 1e0dd57b8041 (bug 1582512)
Backed out changeset 2787043f1fab (bug 1582512)
2019-11-20 18:44:45 +02:00
Cosmin Sabou 4e76fd5665 Backed out 2 changesets (bug 1565004) for xpc failures on netwerk/test/unit/test_trr.js.
Backed out changeset 3d6d67621349 (bug 1565004)
Backed out changeset ef016d00ec9b (bug 1565004)
2019-11-20 18:40:16 +02:00
Honza Bambas 070175d563 Bug 1595833 - Send http preferences correctly to the http connection manager to take actual affect, r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D52700

--HG--
extra : moz-landing-system : lando
2019-11-20 15:58:36 +00:00
Tom Ritter e7037fe85f Bug 1582512 - Register a ScriptValidationCallback to examine script loads in the parent process r=Gijs,ckerschb
Additionally, we disable validation on PAC scripts.

Differential Revision: https://phabricator.services.mozilla.com/D46500

--HG--
extra : moz-landing-system : lando
2019-11-19 13:04:00 +00:00
Valentin Gosu 2bdc8b2de9 Bug 1565004 - Make sure we skip TRR when there's an active VPN r=mayhemer
- Adds the `network.trr.enable_when_vpn_detected` defaulting to false. This means detecting a PPP adapter will make IsExcludedFromTRR always return true - it does not affect the `network.trr.mode` pref.
- Adds a test that when nsINetworkLinkService.vpnDetected is true we skip all TRR requests
- Makes it so we update the excludedDomains list and VPN detected status for TRR on any network:link-status-changed observer notification that is received.

Differential Revision: https://phabricator.services.mozilla.com/D53356

--HG--
extra : moz-landing-system : lando
2019-11-20 14:33:33 +00:00
Valentin Gosu eb905c9af5 Bug 1565004 - Add nsINetworkLinkService.vpnDetected r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D52168

--HG--
extra : moz-landing-system : lando
2019-11-20 14:33:11 +00:00
Valentin Gosu d7cadb0bc8 Bug 1597683 - Parse DNS suffix list from the windows registry r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D53814

--HG--
extra : moz-landing-system : lando
2019-11-20 12:54:29 +00:00
Michal Novotny c42d0ce790 Bug 1596419 - Network change event can be hidden by coalescing period on Linux/Android r=valentin
This patch makes network change event different from network ID change event on Linux and Android. Network change event is now also sent when any address has been added, removed or changed.

Differential Revision: https://phabricator.services.mozilla.com/D53796

--HG--
extra : moz-landing-system : lando
2019-11-20 11:56:13 +00:00
Andreea Pavel 5c654c5a3f Backed out changeset 7e8755b2ddce (bug 1594004) for failing xpcshell at test_http2.js on a CLOSED TREE 2019-11-20 06:13:50 +02:00
Andreea Pavel 03a2c54d6f Backed out 3 changesets (bug 1595154) for failing bc at browser_autocomplete_marked_detached_tab.js on a CLOSED TREE
Backed out changeset f512953534ac (bug 1595154)
Backed out changeset 803a2dfdda82 (bug 1595154)
Backed out changeset ddd336d5bf1a (bug 1595154)

--HG--
rename : browser/extensions/formautofill/FormAutofillChild.jsm => browser/extensions/formautofill/content/FormAutofillFrameScript.js
2019-11-20 05:03:37 +02:00
Sebastian Streich 2b934a4f1a Bug 1594004 - Enable CacheSplit on default r=ckerschb,annevk
***
Fix Cache-Split related Tests

Differential Revision: https://phabricator.services.mozilla.com/D51815

--HG--
extra : moz-landing-system : lando
2019-11-19 15:27:20 +00:00
Matt Woodrow a439f13b34 Bug 1597014 - Unify same-process and cross-process redirect to real channel functions to avoid needed separate promise handlers. r=mayhemer
These two functions both have a large number of arguments that are largely identical (and ones missing from the PContent one are mostly oversights).
Unifying both to take a single argument and return the same result means we can unify the serialization and return value (promise) handling.

Differential Revision: https://phabricator.services.mozilla.com/D53382

--HG--
extra : moz-landing-system : lando
2019-11-20 01:48:32 +00:00
Neil Deakin a6095ebaf4 Bug 1595154, replace the frame script FormAutofillFrameScript.js with an actor and fix up setTimeout calls in places that were relying on Timer.jsm being loaded in that frame script, r=MattN
Differential Revision: https://phabricator.services.mozilla.com/D52721

--HG--
rename : browser/extensions/formautofill/content/FormAutofillFrameScript.js => browser/extensions/formautofill/FormAutofillChild.jsm
extra : moz-landing-system : lando
2019-11-20 01:25:20 +00:00
Sean Feng f8ddb7e6f1 Bug 1580316 - Update signatureInfo to Array of Array of nsIX509Cert(in raw bytes) r=keeler,dimi
The signatureInfo that has been used in ExternalHelperAppService and
ReputationService has been stored Array of nsIX509CertList, which
isn't necessary because only the raw bytes of the certs are required.
This patch intends to remove the usage of nsIX509CertList and store
the raw bytes directly.

Differential Revision: https://phabricator.services.mozilla.com/D44243

--HG--
extra : moz-landing-system : lando
2019-11-19 19:51:44 +00:00
Andrew McCreight 3906df9ebd Bug 1597804 - Fix "pricnipal" typos in some comments. r=Ehsan
Differential Revision: https://phabricator.services.mozilla.com/D53882

--HG--
extra : moz-landing-system : lando
2019-11-19 23:07:54 +00:00
Valentin Gosu 8cf9e7e128 Bug 1589446 - Send the network id notification on networkID change (OSX) r=kershaw
Differential Revision: https://phabricator.services.mozilla.com/D53363

--HG--
extra : moz-landing-system : lando
2019-11-19 10:33:43 +00:00
Valentin Gosu 8c6c95e80d Bug 1589446 - Send the network id notification on networkID change (Android) r=kershaw
Differential Revision: https://phabricator.services.mozilla.com/D53362

--HG--
extra : moz-landing-system : lando
2019-11-19 10:33:30 +00:00