Граф коммитов

22901 Коммитов

Автор SHA1 Сообщение Дата
Dragana Damjanovic c5ea85db23 Bug 1741422 - Add tests for the 103 responses over HTTP/2 r=necko-reviewers,valentin
GetHeader can return NS_ERROR_NOT_AVAILABLE which is not a fatal error and we should not assert.

Differential Revision: https://phabricator.services.mozilla.com/D131376
2021-11-30 11:07:04 +00:00
Magnus Melin 98e779c1f3 Bug 1657068 - Use emojis for text to HTML smiley upgrades. r=valentin,necko-reviewers
Differential Revision: https://phabricator.services.mozilla.com/D132399
2021-11-29 21:33:00 +00:00
Kershaw Chang 05fc784046 Bug 1739001 - Test case, r=necko-reviewers,valentin
Differential Revision: https://phabricator.services.mozilla.com/D130815
2021-11-29 15:19:16 +00:00
Kershaw Chang 478d192351 Bug 1739001 - Pre-fetch connection info for TRRServiceChannel, r=necko-reviewers,valentin,nhnt11
Differential Revision: https://phabricator.services.mozilla.com/D130814
2021-11-29 15:19:15 +00:00
ffxbld aac1ce7369 No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D132345
2021-11-29 15:03:20 +00:00
Christoph Kerschbaumer 6aafd54cd6 Bug 1724080: Have https-first and https-only rules apply to speculative connections r=kershaw
Differential Revision: https://phabricator.services.mozilla.com/D132239
2021-11-29 14:29:01 +00:00
Kershaw Chang f6509d5b4b Bug 1622845 - Enable http3 tsan tests, r=necko-reviewers,valentin
Differential Revision: https://phabricator.services.mozilla.com/D132257
2021-11-29 13:34:57 +00:00
Noemi Erli 0c17a17346 Backed out changeset fb595abd6511 (bug 1724080) for causing failures in browser_mixed_content_console.js CLOSED TREE 2021-11-29 14:25:31 +02:00
Christoph Kerschbaumer 7747b60099 Bug 1724080: Have https-first and https-only rules apply to speculative connections r=kershaw
Differential Revision: https://phabricator.services.mozilla.com/D132239
2021-11-29 11:27:21 +00:00
Narcis Beleuzu a322582a00 Backed out 11 changesets (bug 1721217) for bc failures on browser_scrollPositions.js . CLOSED TREE
Backed out changeset 750f4a84b30e (bug 1721217)
Backed out changeset c4eb4ad769ad (bug 1721217)
Backed out changeset 81af11d67439 (bug 1721217)
Backed out changeset 548f2441b7c6 (bug 1721217)
Backed out changeset cd584129321a (bug 1721217)
Backed out changeset f5f5291d1da8 (bug 1721217)
Backed out changeset 9ad66ceec1e2 (bug 1721217)
Backed out changeset 10b53a21bb23 (bug 1721217)
Backed out changeset 3755cfbe22fe (bug 1721217)
Backed out changeset 71436dc6c4c4 (bug 1721217)
Backed out changeset ecf33b73ae60 (bug 1721217)
2021-11-26 01:51:03 +02:00
Emilio Cobos Alvarez efe2305b8d Bug 1742696 - Opt-in a bunch of about:pages to dark system colors / form controls. r=Gijs,preferences-reviewers,webcompat-reviewers,twisniewski
Privileged pages do this automatically via:

  https://searchfox.org/mozilla-central/rev/aa8c75b83f636948f708986173965c84cae8c25f/widget/nsXPLookAndFeel.cpp#1179-1183

So this makes everything more consistent. Known exceptions:

 * Pocket panels (as those don't seem to support dark mode)
 * about:reader (because it has its own dark mode handling)

Differential Revision: https://phabricator.services.mozilla.com/D132019
2021-11-25 21:24:43 +00:00
Anny Gakhokidze 547cff5843 Bug 1721217 - Part 10: SetUserInteractionFlag for shentry for parent controlled loads, r=smaug
In Bug 1644914 code was added that assumed all UI code for loading URIs goes
through only one path - nsDocShell::LoadURI. Since we are enabling parent
controlled loads now, we need to make sure that we set the same flag in this
code path too.

Differential Revision: https://phabricator.services.mozilla.com/D130198
2021-11-25 20:41:00 +00:00
Anny Gakhokidze 600c61e9f6 Bug 1721217 - Part 6: Don't cancel concurrent loads if they are downloads, r=nika,necko-reviewers
Differential Revision: https://phabricator.services.mozilla.com/D126846
2021-11-25 20:40:58 +00:00
Anny Gakhokidze 4d5efdcf73 Bug 1721217 - Part 2: Fix the race between navigations originating in the parent and in the content, r=nika
Add a synced ParentInitiatedNavigationEpoch field to browsing context, which
only gets incremented when we start navigations in the parent process. When a
child process initiates a navigation, it sends the current value of the field
that it sees via DocumentChannelCreationArgs. In the parent process, we can
compare the value of that field with the latest one for the same browsing
context. If the latest value is higher than the one provided by the content
process, it means that in the meantime parent process has started a navigation
so the earlier navigation originating in the content process will be cancelled.

Differential Revision: https://phabricator.services.mozilla.com/D126842
2021-11-25 20:40:57 +00:00
Anny Gakhokidze 8afaf07df0 Bug 1721217 - Part 1: Enable parent controlled loads via DC, r=nika
Differential Revision: https://phabricator.services.mozilla.com/D126841
2021-11-25 20:40:56 +00:00
Jesse Schwartzentruber 535ff43132 Bug 1731721 - Preliminary HTTP/3 fuzzing target r=dragana,decoder,necko-reviewers
Differential Revision: https://phabricator.services.mozilla.com/D126177
2021-11-25 19:01:04 +00:00
Tim Huang 7ff4cf104f Bug 1731990 - Part 3: Use the partitionKey from the foreign partitioned principal in ServiceWorkerPrivate. r=pbz,dom-storage-reviewers,edenchuang
We used to use the principal URL for the partitionKey in
ServiceWorkerPrivateImpl. This is correct if the ServiceWorker only
works in first-party context. But, it isn't correct in third-party
context.

To fix that, we can directly use the foreign paritioned principal from
the ServiceWorkerPrivate to get the partitionKey in third-party context.
For the first-party context, we can still use the original approach to
get the partitionKey.

Differential Revision: https://phabricator.services.mozilla.com/D128733
2021-11-25 13:11:35 +00:00
Tim Huang e05ade8128 Bug 1731982 - Part 7: Ignoring the partitionKey when verify loadingPrincipal with clientInfo. r=asuth,necko-reviewers
Given that we use the partitioned Principal in the third-party context
and the loading principal won't have it, we should ignore the
partitionKey when doing the verfication.

Differential Revision: https://phabricator.services.mozilla.com/D127841
2021-11-25 13:11:32 +00:00
Tim Huang db88fe8435 Bug 1742598 - Part 1: Add an parameter to URLParams::Serialize() to indicate if the encoding is needed for the serialization result. r=smaug,necko-reviewers,dragana
The URL query stripping doesn't want the URLParams::Serialize() to
encode the result because it will encode the unstripped parameters. This
will change the unstripped parameters once stripping was happened.

Therefore, we introduce an parameter to URLParams::Serialize() to
disable encoding.

Differential Revision: https://phabricator.services.mozilla.com/D131964
2021-11-25 12:13:48 +00:00
Iulian Moraru c71084a7f0 Backed out changeset 667e91aa1dea (bug 1731721) for causing multiple build bustages. CLOSED TREE 2021-11-24 20:32:30 +02:00
Jesse Schwartzentruber f66bf9dbc1 Bug 1731721 - Preliminary HTTP/3 fuzzing target r=dragana,decoder,necko-reviewers
Differential Revision: https://phabricator.services.mozilla.com/D126177
2021-11-24 18:04:45 +00:00
Nika Layzell acedd82927 Bug 1734739 - Part 3: Stop providing pids in places where it's not needed/used, r=handyman
Differential Revision: https://phabricator.services.mozilla.com/D128220
2021-11-24 17:56:01 +00:00
Nika Layzell c8c4669312 Bug 1734739 - Part 2: Stop requiring the OtherPid to create Endpoint, r=handyman
Differential Revision: https://phabricator.services.mozilla.com/D128219
2021-11-24 17:56:00 +00:00
Kershaw Chang 6e99fd9b3f Bug 1740856 - When 0RTT fails, poll should be called to drive handshake, r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D131808
2021-11-24 12:37:24 +00:00
ssummar b9d6fce436 Bug 1530209 - Removed context argument from various methods. r=necko-reviewers,valentin
Differential Revision: https://phabricator.services.mozilla.com/D129797
2021-11-24 11:25:41 +00:00
Gijs Kruitbosch 324af6151f Bug 1742787 - remove unused SecureUpgradeChannelURI method from InterceptedChannel, r=necko-reviewers,valentin
Differential Revision: https://phabricator.services.mozilla.com/D132010
2021-11-24 11:08:00 +00:00
Kershaw Chang f12dd38922 Bug 1736611 - Avoid creating runnables after SocketProcessHost is destroyed, r=necko-reviewers,dragana
Differential Revision: https://phabricator.services.mozilla.com/D131489
2021-11-23 20:13:09 +00:00
Benjamin VanderSloot 8a550db0b7 Bug 1731739 part 1 - Extend eTLD service to have funtions to return the Site of a URI r=necko-reviewers,anti-tracking-reviewers,pbz,valentin
This functionality is a common use of the output of GetBaseDomain.
This patch rolls this functionality into the service, providing a standard implementation, reducing bugs/inconsistency of the use of "Site"
There are two functions provided, GetSchemelessSite and GetSite.
GetSite performs a standard serialization of a URI to its origin's site.
GetSchemelessSite is non-standard but this logic is repeated throughout the codebase.


GetSchemelessSite can remove the redundant logic in the following functions in the codebase:

JS:
- SiteDataManager.getBaseDomainFromHost
- TemporaryPermissions._uriToBaseDomain
- LoginManagerStorage_geckoview.searchLoginsAsync

C++:
- BasePrincipal::GetLocalStorageQuotaKey
- ThirdPartyUtil::GetBaseDomain
- ThirdPartyUtil::GetBaseDomainFromSchemeHost
- ReferrerInfo::HandleUserXOriginSendingPolicy
- CookieCommons::GetBaseDomain
- CookieCommons::GetBaseDomainFromHost
- URLDecorationStripper::StripToRegistrableDomain

Differential Revision: https://phabricator.services.mozilla.com/D129812
2021-11-23 18:25:57 +00:00
Butkovits Atila 824ba655d3 Backed out changeset a62dd031768d (bug 1731721) for causing build bustages complaining about static_prefs. 2021-11-23 20:04:58 +02:00
Jesse Schwartzentruber c8e6fdac85 Bug 1731721 - Preliminary HTTP/3 fuzzing target r=dragana,decoder,necko-reviewers
Differential Revision: https://phabricator.services.mozilla.com/D126177
2021-11-23 17:27:19 +00:00
Manuel Bucher 76a2547903 Bug 1734132 - Test that different http3 priorities are sent r=necko-reviewers,dragana
Differential Revision: https://phabricator.services.mozilla.com/D129618
2021-11-23 17:22:31 +00:00
Manuel Bucher 7056b2cb0c Bug 1734132 - Map necko priorities to http3 priorities r=necko-reviewers,dragana
Differential Revision: https://phabricator.services.mozilla.com/D127834
2021-11-23 17:22:30 +00:00
Manuel Bucher 888b460351 Bug 1734132 - Add neqo glue code to send priority updates r=necko-reviewers,dragana
Differential Revision: https://phabricator.services.mozilla.com/D129003
2021-11-23 17:22:30 +00:00
Marian-Vasile Laza 0e7ef02d35 Backed out 3 changesets (bug 1731739) for causing build bustages on PermissionManager.cpp.
Backed out changeset 2f723b6e625b (bug 1731739)
Backed out changeset 7b053cfeab3e (bug 1731739)
Backed out changeset c4a31c29c441 (bug 1731739)
2021-11-23 19:06:14 +02:00
Benjamin VanderSloot fd0488a427 Bug 1731739 part 1 - Extend eTLD service to have funtions to return the Site of a URI r=necko-reviewers,anti-tracking-reviewers,pbz,valentin
This functionality is a common use of the output of GetBaseDomain.
This patch rolls this functionality into the service, providing a standard implementation, reducing bugs/inconsistency of the use of "Site"
There are two functions provided, GetSchemelessSite and GetSite.
GetSite performs a standard serialization of a URI to its origin's site.
GetSchemelessSite is non-standard but this logic is repeated throughout the codebase.


GetSchemelessSite can remove the redundant logic in the following functions in the codebase:

JS:
- SiteDataManager.getBaseDomainFromHost
- TemporaryPermissions._uriToBaseDomain
- LoginManagerStorage_geckoview.searchLoginsAsync

C++:
- BasePrincipal::GetLocalStorageQuotaKey
- ThirdPartyUtil::GetBaseDomain
- ThirdPartyUtil::GetBaseDomainFromSchemeHost
- ReferrerInfo::HandleUserXOriginSendingPolicy
- CookieCommons::GetBaseDomain
- CookieCommons::GetBaseDomainFromHost
- URLDecorationStripper::StripToRegistrableDomain

Differential Revision: https://phabricator.services.mozilla.com/D129812
2021-11-23 16:18:42 +00:00
Neil Deakin 9ca75dedc1 Bug 1719892, add a default value for content disposition, so that it can be explicitly set to inline, r=kershaw
Differential Revision: https://phabricator.services.mozilla.com/D131002
2021-11-23 14:56:16 +00:00
Kershaw Chang 89050e7a2e Bug 1738664 - Add peerId to nsITransportSecurityInfo, r=necko-reviewers,dragana
Differential Revision: https://phabricator.services.mozilla.com/D130034
2021-11-23 11:59:47 +00:00
Niklas Goegge 08952898f4 Bug 1617611: Annotate each failing xpcshell test individually. r=ckerschb,extension-reviewers,robwu
Depends on D131491

Differential Revision: https://phabricator.services.mozilla.com/D131492
2021-11-23 10:53:26 +00:00
Valentin Gosu aab7891ed0 Bug 1742408 - Add TRR skip reason telemetry that only includes relevant reasons r=nhnt11
Differential Revision: https://phabricator.services.mozilla.com/D131798
2021-11-23 08:34:46 +00:00
Kershaw Chang 1cbf39ee90 Bug 1734609 - Make sure to not reuse a connection that has a mSpdySession, r=necko-reviewers,valentin
Differential Revision: https://phabricator.services.mozilla.com/D131617
2021-11-22 13:34:47 +00:00
Randell Jesup ea6b431cc4 Bug 1740767: DataChannels cleanup r=bwc
Differential Revision: https://phabricator.services.mozilla.com/D131021
2021-11-19 16:27:17 +00:00
Yoshi Cheng-Hao Huang e699e26a37 Bug 1719545 - Part 3: Unify nsIDNService.cpp. r=platform-i18n-reviewers,jfkthame,gregtatum,valentin
Differential Revision: https://phabricator.services.mozilla.com/D130977
2021-11-19 13:20:23 +00:00
Mark Banner b5e3aa0e47 Bug 1741167 - Enable ESLint rule mozilla/use-services for rest of netwerk. r=necko-reviewers,dragana
Differential Revision: https://phabricator.services.mozilla.com/D131131
2021-11-18 18:05:02 +00:00
Mark Banner 9985ff4a0f Bug 1741167 - Replace get_cache_service in netwerk tests with a direct call to Services.cache2. r=necko-reviewers,valentin
Differential Revision: https://phabricator.services.mozilla.com/D131130
2021-11-18 18:05:01 +00:00
Frederik Braun ff85ee61be Bug 1738418 - set sandboxflags for object/embed loads correctly r=ckerschb,smaug,necko-reviewers
Depends on D130958

Differential Revision: https://phabricator.services.mozilla.com/D130959
2021-11-18 12:21:07 +00:00
Kershaw Chang 14db165b22 Bug 1734609 - Fix the test:testAllRecordsInHttp3ExcludedList, r=necko-reviewers,dragana
Differential Revision: https://phabricator.services.mozilla.com/D130637
2021-11-18 10:22:15 +00:00
Kershaw Chang 743032056b Bug 1734609 - Make sure we don't dispatch a transaction more than once, r=necko-reviewers,dragana
Differential Revision: https://phabricator.services.mozilla.com/D130250
2021-11-18 10:22:15 +00:00
Jesse Schwartzentruber 931314c5f1 Bug 1741684 - Initialize PSM prior to HTTP fuzzing iterations. r=decoder
Differential Revision: https://phabricator.services.mozilla.com/D131414
2021-11-17 21:51:43 +00:00
Cristian Tuns acd5a045f9 Backed out 3 changesets (bug 1734132) for causing hybrid/build bustages on Http3Stream.cpp CLOSED TREE
Backed out changeset 51a131c3817b (bug 1734132)
Backed out changeset aee682c3af71 (bug 1734132)
Backed out changeset 51ba73eb5bc2 (bug 1734132)
2021-11-17 11:55:11 -05:00
Manuel Bucher 02462f80b2 Bug 1734132 - Test that different http3 priorities are sent r=necko-reviewers,dragana
Differential Revision: https://phabricator.services.mozilla.com/D129618
2021-11-17 16:26:30 +00:00