Граф коммитов

20476 Коммитов

Автор SHA1 Сообщение Дата
Anny Gakhokidze b0c4a70ea0 Bug 1631859 - Part 3: Remove ancestor principals and outer windowIDs from Document and nsDocShell, r=kmag
Differential Revision: https://phabricator.services.mozilla.com/D78408
2020-06-08 19:58:23 +00:00
Anny Gakhokidze 32add40b99 Bug 1631859 - Part 2: Remove ancestor data from LoadInfoArgs, r=kmag
Differential Revision: https://phabricator.services.mozilla.com/D78407
2020-06-08 19:58:21 +00:00
Anny Gakhokidze 21a581c031 Bug 1631859 - Part 1: Fill out ancestor principals and outer window IDs for LoadInfo only in the parent, r=kmag,extension-reviewers
Keeping a list of ancestor principals in a LoadInfo object, that, at times,
exists in the content process, is not secure. Since ancestor principals are
only ever needed to create a list of frameAncestors, which, in turn, are only
ever accessed from the parent process, we can assemble lists of ancestor
principals and outer windowIDs whenever we are in the parent process and are
either 1) creating a LoadInfo object or 2) deserializing a LoadInfoArgs struct,
received from content process, into a LoadInfo object.

Differential Revision: https://phabricator.services.mozilla.com/D78406
2020-06-08 19:58:14 +00:00
Dorel Luca b4228601a2 Backed out 2 changesets (bug 1642667) for XPCShell failures on netwerk/test/unit/test_http2-proxy.js. CLOSED TREE
Backed out changeset ff7fab70e315 (bug 1642667)
Backed out changeset 368a7cd06c69 (bug 1642667)
2020-06-08 20:21:20 +03:00
Andrea Marchesini bbe813fabe Bug 1642667 - Isolate alt-srv and connection pool per first-party when privacy.partition.network_state is set to true - part 1 - implementation, r=dragana,necko-reviewers
Differential Revision: https://phabricator.services.mozilla.com/D78082
2020-06-08 16:22:22 +00:00
ffxbld 07c69ab5ee No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D78679
2020-06-08 14:19:14 +00:00
Valentin Gosu 9d2690ae52 Bug 1640091 - Make sure DNS requests originating from PAC scripts use TRR_DISABLED_MODE r=kershaw,necko-reviewers
I also considered setting a flag if a PAC query originates from a
TRR service channel but that doesn't work because of this:
1. We try to load test.com -> PAC script
2. We try to load TRR channel -> PAC script with DISABLE_TRR flag
3. PAC thread is still blocked on resolving test.com - we exit early
   regardless of flag

Differential Revision: https://phabricator.services.mozilla.com/D78526
2020-06-08 11:20:04 +00:00
Valentin Gosu cc46191834 Bug 1640091 - Make sure we TRRServiceChannel::mProxyRequest is initialized and used r=kershaw,necko-reviewers
Differential Revision: https://phabricator.services.mozilla.com/D78525
2020-06-08 11:38:22 +00:00
Valentin Gosu cb3096e639 Bug 1640091 - Add test for using PAC script with TRR r=kershaw,necko-reviewers
Differential Revision: https://phabricator.services.mozilla.com/D78524
2020-06-08 13:11:50 +00:00
Mihai Alexandru Michis b0a610bce5 Backed out 3 changesets (bug 1640091) for causing xpcshell failures in nsCOMPtr.h
CLOSED TREE

Backed out changeset 03c4c517ee37 (bug 1640091)
Backed out changeset a1d86c177d79 (bug 1640091)
Backed out changeset f481d4ec255a (bug 1640091)
2020-06-08 12:51:42 +03:00
Bogdan Tara d68a202c49 Backed out 9 changesets (bug 1638711) for test_block_toplevel_data_navigation.html failures CLOSED TREE
Backed out changeset b137e5dfcc57 (bug 1638711)
Backed out changeset 3529cf4e69b6 (bug 1638711)
Backed out changeset 417df721766f (bug 1638711)
Backed out changeset 5b312893e8e2 (bug 1638711)
Backed out changeset d6d396498f5e (bug 1638711)
Backed out changeset 77f6f2396343 (bug 1638711)
Backed out changeset c1d12e04bc27 (bug 1638711)
Backed out changeset 6e702b519ef0 (bug 1638711)
Backed out changeset 9e5a049b57ed (bug 1638711)
2020-06-08 12:36:09 +03:00
Simon Giesecke 13502cf27c Bug 1642991 - Use RemoveElementsBy where easily possible. r=froydnj
Differential Revision: https://phabricator.services.mozilla.com/D78055
2020-06-08 09:01:48 +00:00
Matt Woodrow 52d72e0243 Bug 1638711 - Report correct error code in DocumentLoadListener if AsyncOpen fails. r=jya,necko-reviewers,valentin
Depends on D77171

Differential Revision: https://phabricator.services.mozilla.com/D77954
2020-06-08 07:29:58 +00:00
Matt Woodrow 7148736309 Bug 1638711 - Do document security checks in parent process. r=ckerschb
Differential Revision: https://phabricator.services.mozilla.com/D75720
2020-06-02 23:03:40 +00:00
Valentin Gosu b970921b67 Bug 1640091 - Make sure DNS requests originating from PAC scripts use TRR_DISABLED_MODE r=kershaw,necko-reviewers
I also considered setting a flag if a PAC query originates from a
TRR service channel but that doesn't work because of this:
1. We try to load test.com -> PAC script
2. We try to load TRR channel -> PAC script with DISABLE_TRR flag
3. PAC thread is still blocked on resolving test.com - we exit early
   regardless of flag

Differential Revision: https://phabricator.services.mozilla.com/D78526
2020-06-08 06:57:31 +00:00
Valentin Gosu 42d7490489 Bug 1640091 - Make sure we TRRServiceChannel::mProxyRequest is initialized and used r=kershaw,necko-reviewers
Differential Revision: https://phabricator.services.mozilla.com/D78525
2020-06-08 06:57:23 +00:00
Valentin Gosu b0af883a42 Bug 1640091 - Add test for using PAC script with TRR r=kershaw,necko-reviewers
Differential Revision: https://phabricator.services.mozilla.com/D78524
2020-06-08 06:57:15 +00:00
Kershaw Chang 8230af21ce Bug 1641496 - P8: Introduce PNativeDNSResolverOverride.ipdl r=valentin
A straightforward patch. Since DNS resolution is moved to socket process, we have to add another ipdl to make `nsINativeDNSResolverOverride` work.

Differential Revision: https://phabricator.services.mozilla.com/D78483
2020-06-05 13:27:35 +00:00
Kershaw Chang 8a93345ab3 Bug 1641496 - P7: Allow to use SSLTokensCache in parent process with socket process enabled r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D78228
2020-06-05 13:27:35 +00:00
Kershaw Chang f325bc0048 Bug 1641496 - P6: Reenable some tests r=dragana,extension-reviewers,mixedpuppy
Differential Revision: https://phabricator.services.mozilla.com/D77277
2020-06-04 22:56:38 +00:00
Kershaw Chang e6bff0a49c Bug 1641496 - P5: Make nsHttpActivityDistributor::AddObserver work if socket process is not ready r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D77276
2020-06-04 22:56:40 +00:00
Kershaw Chang cba8b4bdfc Bug 1641496 - P4: Send request size in OnStopRequest message r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D77275
2020-06-04 22:56:43 +00:00
Kershaw Chang ef6ab5d3fb Bug 1641496 - P3: Avoid ODA message being processed when the channel is already failed r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D77274
2020-06-04 22:56:45 +00:00
Kershaw Chang 99face40e3 Bug 1641496 - P2: Fix some problems to pass DNS related tests r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D77273
2020-06-04 22:56:47 +00:00
Kershaw Chang a4a6ef17e5 Bug 1641496 - P1: Add MOZ_FORCE_USE_SOCKET_PROCESS for encorcing networking over socket process r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D77272
2020-06-04 22:56:34 +00:00
Narcis Beleuzu 2301168947 Backed out changeset cf9b81801abc (bug 1640117) for dt failures on browser_webconsole_trackingprotection_errors.js . CLOSED TREE 2020-06-05 17:14:38 +03:00
Taegeon Lee 6b7bd763ae Bug 1640117 Change message in console for blocking contents from content blocking to enhanced tracking protection. r=nchevobbe,dimi
Differential Revision: https://phabricator.services.mozilla.com/D78470
2020-06-05 11:15:13 +00:00
Dan Glastonbury 4b0f865b02 Bug 1643239 - Add LoadInfo to support loading non-frame content. r=mattwoodrow
DocumentLoadListener assumes loading of frames with an available
BrowsingContext. Most of the required information is obtained from the BC's
WindowGlobalParent. Extract that common functionality to support using DLL to
load content from <object>/<embed>.

Differential Revision: https://phabricator.services.mozilla.com/D78221
2020-06-05 00:39:30 +00:00
Csoregi Natalia 63635ef2aa Backed out 7 changesets (bug 1641496) for failures on test_trr.js. CLOSED TREE
Backed out changeset 1c927e612dda (bug 1641496)
Backed out changeset 0f1ba77e3942 (bug 1641496)
Backed out changeset a626e86ce5c9 (bug 1641496)
Backed out changeset 196381953eac (bug 1641496)
Backed out changeset 70b0af678bfd (bug 1641496)
Backed out changeset bf41bd8ca89c (bug 1641496)
Backed out changeset 745da0e1cb80 (bug 1641496)
2020-06-05 01:39:19 +03:00
Kershaw Chang 133ff46017 Bug 1641496 - P7: Allow to use SSLTokensCache in parent process with socket process enabled r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D78228
2020-06-04 11:51:13 +00:00
Kershaw Chang 9e895a5b1f Bug 1641496 - P6: Reenable some tests r=dragana,extension-reviewers,mixedpuppy
Differential Revision: https://phabricator.services.mozilla.com/D77277
2020-06-04 16:53:23 +00:00
Kershaw Chang 57cbc05cf3 Bug 1641496 - P5: Make nsHttpActivityDistributor::AddObserver work if socket process is not ready r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D77276
2020-06-04 11:49:40 +00:00
Kershaw Chang fb7f2879f7 Bug 1641496 - P4: Send request size in OnStopRequest message r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D77275
2020-06-04 12:23:57 +00:00
Kershaw Chang f677ce3a79 Bug 1641496 - P3: Avoid ODA message being processed when the channel is already failed r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D77274
2020-06-04 11:49:18 +00:00
Kershaw Chang 5c5b0d638d Bug 1641496 - P2: Fix some problems to pass DNS related tests r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D77273
2020-06-04 12:17:03 +00:00
Kershaw Chang dfd7b19955 Bug 1641496 - P1: Add MOZ_FORCE_USE_SOCKET_PROCESS for encorcing networking over socket process r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D77272
2020-06-04 11:49:01 +00:00
Valentin Gosu da85d07d64 Bug 1643264 - Failed ResolveWithTRR requests should not be retried to get the TTL r=dragana,necko-reviewers
While doing the TRR dry run experiment it became apparent that we are issuing
a lot of TRR requests that are causing us to DDOS our TRR provider.
We had a hint that this may only be affecting Windows. Upon inspection of the
code and the APIs we use to measure the performance of each TRR service we
discovered that the codepath that is used to get the TTL for DNS records on
Windows was wrongly exercised for TRR too, causing us to keep repeating a
failing TRR request until success (or until the browser was shut down).

We confirmed this with a unit test and logging.

This patch fixes the condition that caused us to look for failed TRR requests.
We also add a second check that ResolveWithTRRServer calls fail if they also
have the RESOLVE_DISABLE_TRR flag set.

Differential Revision: https://phabricator.services.mozilla.com/D78229
2020-06-04 10:43:47 +00:00
Valentin Gosu 944dc631cb Bug 1637512 - Test that IPv6 TRR requests fallback to DNS properly r=dragana,necko-reviewers
Depends on D78237

Differential Revision: https://phabricator.services.mozilla.com/D78238
2020-06-04 11:10:36 +00:00
Valentin Gosu c9d1c3f2cd Bug 1637512 - IPv6 TRR requests don't fallback to DNS properly r=dragana,necko-reviewers
Differential Revision: https://phabricator.services.mozilla.com/D78237
2020-06-04 11:12:19 +00:00
Liang-Heng Chen 01f8cce7e1 Bug 1640135 - P4: update usage of PartitionKey; r=timhuang
Differential Revision: https://phabricator.services.mozilla.com/D77917
2020-06-04 10:51:21 +00:00
Andrea Marchesini 69818a4d17 Bug 1639833 - IntrisincStoragePrincipal should always be partitioned - part 4 - Renaming storage access permission methods, r=dimi
Differential Revision: https://phabricator.services.mozilla.com/D76917
2020-06-03 06:12:06 +00:00
Matt Woodrow 6653839518 Bug 1638652 - Only disable content conversion in the parent process if we're going to be delivering data to a content process. r=jya,necko-reviewers
Differential Revision: https://phabricator.services.mozilla.com/D77399
2020-06-02 23:43:19 +00:00
Brindusan Cristian c7ae0f169c Bug 1558539 - Fix file-whitespace linting failure. CLOSED TREE 2020-06-03 02:54:44 +03:00
ssengupta 8a32b935f4 Bug 1641826 - P2 - GTest cases added for PartiallySeekableInputStream to test AsyncWait/AsyncLengthWait behaviour when stream closed r=baku,necko-reviewers,mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D77539
2020-06-02 19:04:20 +00:00
ssengupta d95870593b Bug 1641826 - P1 - PartiallySeekableInputStream does not return error and executes callback on AsyncWait/AsyncLengthWait if stream is closed r=baku,necko-reviewers,mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D77409
2020-06-02 19:04:20 +00:00
Jason Kratzer 42508ee26a Bug 1558539 - Implement URL parser fuzzing target r=valentin
Differential Revision: https://phabricator.services.mozilla.com/D34719
2020-06-02 17:09:10 +00:00
Honza Bambas 2db5052835 Bug 1631327 - Do not crash with IPC_FAIL when RecvPredLearn receives a null target URI, we handle it gracefully later, r=valentin,necko-reviewers
Differential Revision: https://phabricator.services.mozilla.com/D77795
2020-06-02 12:51:05 +00:00
Andy Grover 95b90fb23e Bug 1633006 - Update to Neqo 0.4.0 r=dragana,necko-reviewers
Document qlog uses 2 clause bsd license.

Adapt to API changes in glue and http3server

Differential Revision: https://phabricator.services.mozilla.com/D77903
2020-06-02 21:28:31 +00:00
Valentin Gosu 243786d713 Bug 1640867 - Add new HTTP_CHANNEL_ONSTART_SUCCESS_TRR probe r=dragana,tdsmith,necko-reviewers
Differential Revision: https://phabricator.services.mozilla.com/D77127
2020-05-30 08:39:17 +00:00
Andrea Marchesini 2a98a3d66d Bug 1640405 - SameSite=lax/strict cookies should be sent to TYPE_SAVEAS_DOWNLOAD content-type, r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D77298
2020-06-02 12:23:00 +00:00
Andrea Marchesini 6254482164 Bug 1638358 - Cookie Schemeful Same-Site - part 6 - console messages, r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D75800
2020-06-02 13:50:32 +00:00
Andrea Marchesini 7ff3759ac3 Bug 1638358 - Cookie Schemeful Same-Site - part 5 - schemeful comparison, r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D75629
2020-06-02 13:50:12 +00:00
Andrea Marchesini 4c5f4e6c30 Bug 1638358 - Cookie Schemeful Same-Site - part 4 - tests for cookie scheme merging, r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D75628
2020-06-02 13:49:45 +00:00
Andrea Marchesini 5ccae203ff Bug 1638358 - Cookie Schemeful Same-Site - part 3 - update add/addNative methods, r=mayhemer,remote-protocol-reviewers,marionette-reviewers,maja_zf,MattN,whimboo
Differential Revision: https://phabricator.services.mozilla.com/D75627
2020-06-02 13:49:27 +00:00
Andrea Marchesini fdba4c920d Bug 1638358 - Cookie Schemeful Same-Site - part 2 - schemeMap in the cookie DB, r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D75626
2020-06-02 13:48:54 +00:00
Andrea Marchesini 01cf5e2ca5 Bug 1638358 - Cookie Schemeful Same-Site - part 1 - scheme map in nsICookie, r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D75624
2020-06-02 13:48:28 +00:00
Kershaw Chang 7e46af5f99 Bug 1524035 - Make parent process shut down when socket process crashed and MOZ_CRASHREPORTER_SHUTDOWN is set r=dragana
This patch is mainly for stoping the testsuite keeps going when the socket process is crashed.

Differential Revision: https://phabricator.services.mozilla.com/D76817
2020-05-29 13:56:27 +00:00
Honza Bambas cbb21fd55a Bug 1605895 - Advance the diagnostic assertion to check status of channel event queues, r=michal,necko-reviewers
Differential Revision: https://phabricator.services.mozilla.com/D77687
2020-06-01 21:35:03 +00:00
Csoregi Natalia e960b9f449 Backed out 7 changesets (bug 1640405, bug 1638358) for failures on browser_webconsole_network_messages_status_code.js. CLOSED TREE
Backed out changeset ef5f7479ddf8 (bug 1640405)
Backed out changeset 286e0c83eb30 (bug 1638358)
Backed out changeset 89e396b2896e (bug 1638358)
Backed out changeset 33ad5fa05209 (bug 1638358)
Backed out changeset d213264c1379 (bug 1638358)
Backed out changeset 6bc05236afb4 (bug 1638358)
Backed out changeset 87e9d0ed3982 (bug 1638358)
2020-06-02 15:16:42 +03:00
Csoregi Natalia 2d5cafc841 Backed out 5 changesets (bug 1639833) for failures on browser_blockingIndexedDbInWorkers.js. CLOSED TREE
Backed out changeset 6b4f76d65540 (bug 1639833)
Backed out changeset c77acba1aacb (bug 1639833)
Backed out changeset 30c97666919e (bug 1639833)
Backed out changeset d769b313441a (bug 1639833)
Backed out changeset ed41b41d1b03 (bug 1639833)
2020-06-02 15:02:31 +03:00
Andrea Marchesini cef861b90b Bug 1640405 - SameSite=lax/strict cookies should be sent to TYPE_SAVEAS_DOWNLOAD content-type, r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D77298
2020-06-02 09:26:10 +00:00
Andrea Marchesini 8325f09f3c Bug 1638358 - Cookie Schemeful Same-Site - part 6 - console messages, r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D75800
2020-06-02 09:15:31 +00:00
Andrea Marchesini 2eaedfe5f4 Bug 1638358 - Cookie Schemeful Same-Site - part 5 - schemeful comparison, r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D75629
2020-06-02 09:15:24 +00:00
Andrea Marchesini 3db0d7fa7b Bug 1638358 - Cookie Schemeful Same-Site - part 4 - tests for cookie scheme merging, r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D75628
2020-06-02 09:14:09 +00:00
Andrea Marchesini b4173bc59e Bug 1638358 - Cookie Schemeful Same-Site - part 3 - update add/addNative methods, r=mayhemer,remote-protocol-reviewers,marionette-reviewers,maja_zf,MattN,whimboo
Differential Revision: https://phabricator.services.mozilla.com/D75627
2020-06-02 09:13:51 +00:00
Andrea Marchesini b919211710 Bug 1638358 - Cookie Schemeful Same-Site - part 2 - schemeMap in the cookie DB, r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D75626
2020-06-02 09:13:18 +00:00
Andrea Marchesini 4b72e0214f Bug 1638358 - Cookie Schemeful Same-Site - part 1 - scheme map in nsICookie, r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D75624
2020-06-02 09:12:54 +00:00
Andrea Marchesini 6f2eed62c8 Bug 1639833 - IntrisincStoragePrincipal should always be partitioned - part 4 - Renaming storage access permission methods, r=dimi
Differential Revision: https://phabricator.services.mozilla.com/D76917
2020-06-02 08:30:24 +00:00
Jon Bauman a311412e9e Bug 1641208 - `Accept` header does not include `image/avif` even when `image.avif.enable` is set. r=mattwoodrow,aosmond,necko-reviewers,valentin
Differential Revision: https://phabricator.services.mozilla.com/D77371
2020-06-01 22:21:05 +00:00
Matt Woodrow 5b6028fd46 Bug 1620679 - Use web progress listener for detecting load end in reftest-content.js. r=kmag,tnikkel
The previous patch stops us from firing the load event if we abort a load. We have a few crashtests that abort loads (either by directly calling stop(), or by starting a new navigation before load completes).

This switches the reftest harness to use web progress to determine when we've finished loading a test.

Differential Revision: https://phabricator.services.mozilla.com/D73995
2020-05-30 17:19:54 +00:00
Razvan Maries 79fe28f0d6 Backed out 6 changesets (bug 1638358) for perma failures on browser_webconsole_navigate_to_parse_error.js. CLOSED TREE
Backed out changeset beb85cf281d5 (bug 1638358)
Backed out changeset 39f2e21623aa (bug 1638358)
Backed out changeset 2c873c72bf1f (bug 1638358)
Backed out changeset e91292c7c719 (bug 1638358)
Backed out changeset 0219ef931cd9 (bug 1638358)
Backed out changeset 4ac06f3992f4 (bug 1638358)
2020-06-02 00:24:46 +03:00
Andrea Marchesini 3b653684fe Bug 1638358 - Cookie Schemeful Same-Site - part 6 - console messages, r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D75800
2020-06-01 16:49:01 +00:00
Andrea Marchesini 97f0db059a Bug 1638358 - Cookie Schemeful Same-Site - part 5 - schemeful comparison, r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D75629
2020-06-01 16:49:03 +00:00
Andrea Marchesini 8170437e2e Bug 1638358 - Cookie Schemeful Same-Site - part 4 - tests for cookie scheme merging, r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D75628
2020-06-01 16:49:05 +00:00
Andrea Marchesini 848f1f0043 Bug 1638358 - Cookie Schemeful Same-Site - part 3 - update add/addNative methods, r=mayhemer,remote-protocol-reviewers,marionette-reviewers,maja_zf,MattN,whimboo
Differential Revision: https://phabricator.services.mozilla.com/D75627
2020-06-01 17:59:13 +00:00
Andrea Marchesini 897b86e015 Bug 1638358 - Cookie Schemeful Same-Site - part 2 - schemeMap in the cookie DB, r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D75626
2020-06-01 16:48:51 +00:00
Andrea Marchesini 1bb5a79565 Bug 1638358 - Cookie Schemeful Same-Site - part 1 - scheme map in nsICookie, r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D75624
2020-06-01 16:48:53 +00:00
Noemi Erli e40be0aa72 Backed out 6 changesets (bug 1638358) for causing failures in test_Chrome_cookies.js CLOSED TREE
Backed out changeset 4e8fbe01aa38 (bug 1638358)
Backed out changeset 532731e94bb2 (bug 1638358)
Backed out changeset fad2ba760157 (bug 1638358)
Backed out changeset 932a3fdbd07c (bug 1638358)
Backed out changeset 05a62901a3f5 (bug 1638358)
Backed out changeset cddeada5c4a6 (bug 1638358)
2020-06-01 19:45:46 +03:00
Noemi Erli f08b043cf6 Backed out 5 changesets (bug 1639833) for causing sessionstorage related failures CLOSED TREE
Backed out changeset b36af8d9db34 (bug 1639833)
Backed out changeset 712c11904dbe (bug 1639833)
Backed out changeset 14f1e4783582 (bug 1639833)
Backed out changeset b7f14c4cfe5d (bug 1639833)
Backed out changeset b4b25034dd83 (bug 1639833)
2020-06-01 19:31:50 +03:00
Ricky Stewart 0bbaac721b Bug 1641693 - Replace a bunch of uses of `GENERATED_FILES` with the `GeneratedFile` template r=necko-reviewers,geckoview-reviewers,aklotz,dragana,froydnj
Also update documentation to suggest using the `GeneratedFile` template rather than directly referencing `GENERATED_FILES` where possible.

Differential Revision: https://phabricator.services.mozilla.com/D77496
2020-06-01 16:00:28 +00:00
Andrea Marchesini a997c1d626 Bug 1639833 - IntrisincStoragePrincipal should always be partitioned - part 4 - Renaming storage access permission methods, r=dimi
Differential Revision: https://phabricator.services.mozilla.com/D76917
2020-06-01 11:59:46 +00:00
Andrea Marchesini bfdca98faf Bug 1638358 - Cookie Schemeful Same-Site - part 6 - console messages, r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D75800
2020-06-01 15:17:31 +00:00
Andrea Marchesini bcda89c3fb Bug 1638358 - Cookie Schemeful Same-Site - part 5 - schemeful comparison, r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D75629
2020-06-01 11:43:28 +00:00
Andrea Marchesini ce264fd0b1 Bug 1638358 - Cookie Schemeful Same-Site - part 4 - tests for cookie scheme merging, r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D75628
2020-06-01 11:43:30 +00:00
Andrea Marchesini 165022b2c4 Bug 1638358 - Cookie Schemeful Same-Site - part 3 - update add/addNative methods, r=mayhemer,remote-protocol-reviewers,marionette-reviewers,maja_zf,MattN,whimboo
Differential Revision: https://phabricator.services.mozilla.com/D75627
2020-06-01 11:43:19 +00:00
Andrea Marchesini d3f891933d Bug 1638358 - Cookie Schemeful Same-Site - part 2 - schemeMap in the cookie DB, r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D75626
2020-06-01 11:43:21 +00:00
Andrea Marchesini 0cc026faf1 Bug 1638358 - Cookie Schemeful Same-Site - part 1 - scheme map in nsICookie, r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D75624
2020-06-01 11:43:23 +00:00
ffxbld 12faf95015 No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D77670
2020-06-01 14:16:14 +00:00
Dorel Luca 9574e25c80 Backed out 6 changesets (bug 1638358) for XPCShell failures in netwerk/cookie/test/unit/test_schemeMap.js. CLOSED TREE
Backed out changeset 745eab35e851 (bug 1638358)
Backed out changeset a45df1876e37 (bug 1638358)
Backed out changeset 1a85cc92d2fb (bug 1638358)
Backed out changeset 2156294cb158 (bug 1638358)
Backed out changeset 31101054c52c (bug 1638358)
Backed out changeset d284b50551ab (bug 1638358)
2020-06-01 14:38:22 +03:00
Andrea Marchesini 814f65058b Bug 1638358 - Cookie Schemeful Same-Site - part 6 - console messages, r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D75800
2020-06-01 10:29:48 +00:00
Andrea Marchesini e2b687e0ce Bug 1638358 - Cookie Schemeful Same-Site - part 5 - schemeful comparison, r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D75629
2020-06-01 10:29:34 +00:00
Andrea Marchesini f9e824f6c7 Bug 1638358 - Cookie Schemeful Same-Site - part 4 - tests for cookie scheme merging, r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D75628
2020-06-01 10:29:06 +00:00
Andrea Marchesini d1c11476f6 Bug 1638358 - Cookie Schemeful Same-Site - part 3 - update add/addNative methods, r=mayhemer,remote-protocol-reviewers,marionette-reviewers,maja_zf,MattN,whimboo
Differential Revision: https://phabricator.services.mozilla.com/D75627
2020-06-01 10:28:51 +00:00
Andrea Marchesini 8d0f3f353b Bug 1638358 - Cookie Schemeful Same-Site - part 2 - schemeMap in the cookie DB, r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D75626
2020-06-01 10:28:18 +00:00
Andrea Marchesini 4afe05e324 Bug 1638358 - Cookie Schemeful Same-Site - part 1 - scheme map in nsICookie, r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D75624
2020-06-01 10:27:51 +00:00
Valentin Gosu 555823e361 Bug 1641901 - Check the type of OutboundMessage::mMsg before using r=michal,necko-reviewers
Differential Revision: https://phabricator.services.mozilla.com/D77546
2020-05-30 06:53:02 +00:00
Sylvestre Ledru 63be8d152d Bug 1519636 - Reformat recent changes to the Google coding style r=necko-reviewers,dragana
# ignore-this-changeset

Differential Revision: https://phabricator.services.mozilla.com/D77580
2020-05-30 09:55:27 +00:00
Valentin Gosu 23ea06d309 Bug 1640867 - Record TRR steering telemetry separately r=dragana,tdsmith,necko-reviewers
This change makes a set of probes keyed. The key is "(default)" if no steering
is currently active, or "(auto-detected)" is the current URL has been set
by steering (autodetection).

Differential Revision: https://phabricator.services.mozilla.com/D77022
2020-05-30 08:39:02 +00:00
Dorel Luca 12d676daa0 Backed out changeset e4b730f2d853 (bug 1641208) for Browser-chrome failures in dom/tests/browser/browser_persist_image_accept.js 2020-05-30 07:10:09 +03:00
Jon Bauman f43c78c21f Bug 1641208 - `Accept` header does not include `image/avif` even when `image.avif.enable` is set. r=mattwoodrow,aosmond,necko-reviewers,valentin
Differential Revision: https://phabricator.services.mozilla.com/D77371
2020-05-29 22:18:59 +00:00
Dorel Luca ca47e808e1 Backed out 2 changesets (bug 1640867) for Network failures on multipe platforms. CLOSED TREE
Backed out changeset 75a1f56ff1ee (bug 1640867)
Backed out changeset a4c770a70516 (bug 1640867)
2020-05-30 02:02:33 +03:00
Valentin Gosu 5a7c7bf9ec Bug 1640867 - Add new HTTP_CHANNEL_ONSTART_SUCCESS_TRR probe r=dragana,tdsmith,necko-reviewers
Differential Revision: https://phabricator.services.mozilla.com/D77127
2020-05-29 21:23:50 +00:00
Valentin Gosu 5570291ec4 Bug 1640867 - Record TRR steering telemetry separately r=dragana,tdsmith,necko-reviewers
This change makes a set of probes keyed. The key is "(default)" if no steering
is currently active, or "(auto-detected)" is the current URL has been set
by steering (autodetection).

Differential Revision: https://phabricator.services.mozilla.com/D77022
2020-05-29 21:23:41 +00:00
Andrea Marchesini a0049a050f Bug 1641459 - Consider 3rd parties cookie requested by documents with a window, r=smaug
This is required for how Cookies gtests are written

Differential Revision: https://phabricator.services.mozilla.com/D77301
2020-05-29 15:57:29 +00:00
Andrea Marchesini 58c2fe71b1 Bug 1641459 - Do not allow the setting of sameSite=lax/strict cookies from cross-site iframe documents - part 1 - implementation, r=smaug
Differential Revision: https://phabricator.services.mozilla.com/D77244
2020-05-29 15:54:24 +00:00
Andrea Marchesini e9c61f5c0b Bug 1641459 - Do not expose sameSite=lax/strict cookies to cross-site documents - part 1 - implementation, r=smaug
Differential Revision: https://phabricator.services.mozilla.com/D77208
2020-05-29 15:53:42 +00:00
Alexis Beingessner 5013279fa5 Bug 1637727 - convert network.http.rcwn prefs to StaticPrefs. r=KrisWright,necko-reviewers,valentin
converts:
 * network.http.rcwn.enabled
 * network.http.rcwn.cache_queue_normal_threshold
 * network.http.rcwn.cache_queue_priority_threshold
 * network.http.rcwn.small_resource_size_kb
 * network.http.rcwn.min_wait_before_racing_ms
 * network.http.rcwn.max_wait_before_racing_ms

Differential Revision: https://phabricator.services.mozilla.com/D77108
2020-05-29 07:54:24 +00:00
Alexis Beingessner 32ab7a7bc4 Bug 1637727 - convert network.http.sanitize-headers-in-logs to a StaticPref. r=KrisWright,necko-reviewers,valentin
Differential Revision: https://phabricator.services.mozilla.com/D77107
2020-05-29 07:56:48 +00:00
Alexis Beingessner b4d76cf97a Bug 1637727 - convert network.standard-url.max-length to a StaticPref. r=KrisWright,necko-reviewers,valentin
Differential Revision: https://phabricator.services.mozilla.com/D77106
2020-05-29 07:52:35 +00:00
Alexis Beingessner a908129a6d Bug 1637727 - convert network.standard-url.punycode-host to a StaticPref. r=necko-reviewers,valentin
Differential Revision: https://phabricator.services.mozilla.com/D77105
2020-05-28 18:23:28 +00:00
Alexis Beingessner 0e39201277 Bug 1637727 - convert nsIOService prefs to StaticPrefs. r=KrisWright,necko-reviewers
converts:
 * security.data_uri.block_toplevel_data_uri_navigations
 * network.offline-mirrors-connectivity

Differential Revision: https://phabricator.services.mozilla.com/D77104
2020-05-28 18:23:25 +00:00
Alexis Beingessner 7fd95dd59d Bug 1637727 - convert network.ssl_tokens_cache prefs to StaticPrefs. r=KrisWright,necko-reviewers,valentin
converts:
 * network.ssl_tokens_cache_enabled
 * network.ssl_tokens_cache_capacity

Differential Revision: https://phabricator.services.mozilla.com/D77103
2020-05-29 07:56:16 +00:00
Alexis Beingessner 2c55bb187c Bug 1637727 - convert network.security.esni.enabled to a StaticPref. r=KrisWright,necko-reviewers,valentin
Differential Revision: https://phabricator.services.mozilla.com/D77102
2020-05-28 18:23:20 +00:00
Nico Grunbaum 46b83b6604 Bug 1218356 - P2 - Implement the RTCDataChannel stats;r=dminor
Note that transportId is not implemented and is not a stat but a key back into
the stats report. It identifies the related transport stats object. We don't
have transport stats, so this can not be implemented at the moment.

Differential Revision: https://phabricator.services.mozilla.com/D57116
2020-05-29 10:46:42 +00:00
Sebastian Hengst d9ac58cbcd Backed out 5 changesets (bug 1641459) for causing bug 1641635 (as requested by baku).
Backed out changeset 8f30acc0c69f (bug 1641459)
Backed out changeset 9bb7f1d7f4e8 (bug 1641459)
Backed out changeset a29a3d445871 (bug 1641459)
Backed out changeset d708ea7a1d98 (bug 1641459)
Backed out changeset 21fe51299547 (bug 1641459)
2020-05-29 10:21:52 +02:00
Andrea Marchesini d0913541e4 Bug 1641459 - Consider 3rd parties cookie requested by documents with a window, r=smaug CLOSED TREE
This is required for how Cookies gtests are written

Differential Revision: https://phabricator.services.mozilla.com/D77301
2020-05-28 16:21:33 +00:00
ffxbld 3d17f898c9 No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D77261
2020-05-28 14:33:09 +00:00
Andrea Marchesini 9706a3ab32 Bug 1641459 - Do not allow the setting of sameSite=lax/strict cookies from cross-site iframe documents - part 1 - implementation, r=smaug
Differential Revision: https://phabricator.services.mozilla.com/D77244
2020-05-28 13:25:49 +00:00
Andrea Marchesini 385945afb9 Bug 1641459 - Do not expose sameSite=lax/strict cookies to cross-site documents - part 1 - implementation, r=smaug
Differential Revision: https://phabricator.services.mozilla.com/D77208
2020-05-28 11:04:23 +00:00
Jean-Yves Avenard 6131e9fa5c Bug 1637869 - P7. Call DisconnectChildListeners when an error occurs. r=mattwoodrow
This will allow the DocumentChannel to be removed from the loading group and the docshell to stop waiting for for the ParentProcessDocumentChannel to do something.

Depends on D77201

Differential Revision: https://phabricator.services.mozilla.com/D77202
2020-05-28 07:42:35 +00:00
Jean-Yves Avenard 2746af48c3 Bug 1637869 - P6. Propagate proper error code when cancelling a channel. r=mattwoodrow
Differential Revision: https://phabricator.services.mozilla.com/D77201
2020-05-28 10:22:31 +00:00
Jean-Yves Avenard 66a61d942d Bug 1637869 - P2. Allow ParentProcessDocumentChannel to perform process switching. r=nika,mattwoodrow
The moves all decisions to perform a process switch into the DocumentLoadListerner. This removes the unnecessary need to go via a content process to start the load.

Differential Revision: https://phabricator.services.mozilla.com/D76315
2020-05-28 00:07:39 +00:00
Jean-Yves Avenard 3943449ac1 Bug 1637869 - P1. Cancel channel before resuming. r=mattwoodrow
Differential Revision: https://phabricator.services.mozilla.com/D76314
2020-05-28 00:07:24 +00:00
Dimi Lee acbbeb5981 Bug 1639718 - P2. Protection features call OnBeforeBlockChannel before blocking the channel. r=baku
Differential Revision: https://phabricator.services.mozilla.com/D76837
2020-05-28 09:51:23 +00:00
Dimi Lee 86d87ef93e Bug 1639718 - P1. Add ChannelClassifierService to support notifying/unblocking channel. r=baku
ChannelClassifierService notifies "urlclassifier-before-block-channel"
event when a channel is going to be blocked by protection features.

It also provides an API for receivers to "unblock" the channel.

Sample usage:
this.service = Cc["@mozilla.org/url-classifier/channel-classifier-service;1"].getService(
  Ci.nsIChannelClassifierService
);
if (this.service) {
  this.service.addListener({
    observe(aSubject, aTopic, aData) {
      switch (aTopic) {
        case "urlclassifier-before-block-channel":
          let channel = aSubject.QueryInterface(Ci.nsIUrlClassifierBlockedChannel);
          channel.unblock();
          break;
      }
    },
  })
}

Differential Revision: https://phabricator.services.mozilla.com/D76836
2020-05-28 09:51:15 +00:00
Valentin Gosu d51967f492 Bug 1640872 - Add more TRR logging r=necko-reviewers,mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D76826
2020-05-28 06:58:04 +00:00
Razvan Maries a985167fa6 Backed out 7 changesets (bug 1638711) for perma failures on test_bug375314-2.html. CLOSED TREE
Backed out changeset 9643bf18ac31 (bug 1638711)
Backed out changeset 3d06b48e2e3a (bug 1638711)
Backed out changeset c2a1461890c3 (bug 1638711)
Backed out changeset 9eda9f6c5877 (bug 1638711)
Backed out changeset f776c30279f3 (bug 1638711)
Backed out changeset b34546384903 (bug 1638711)
Backed out changeset 47da03dd8365 (bug 1638711)
2020-05-28 04:25:38 +03:00
Matt Woodrow 74388c26ab Bug 1638711 - Do document security checks in parent process. r=ckerschb
Differential Revision: https://phabricator.services.mozilla.com/D75720
2020-05-27 09:39:44 +00:00
prathiksha f247187965 Bug 1634947 - Update the TLS deprecated error message in Firefox. r=johannh,necko-reviewers,valentin
Differential Revision: https://phabricator.services.mozilla.com/D77021
2020-05-27 21:58:30 +00:00
Eden Chuang 612b473d45 Bug 1634419 - Skip CORP checking for TYPE_WEBSOCKET loading r=necko-reviewers,valentin
Differential Revision: https://phabricator.services.mozilla.com/D74655
2020-05-27 21:29:32 +00:00
Emilio Cobos Álvarez 54fd961a29 Bug 1641245 - Make string comparators not virtual. r=froydnj,necko-reviewers,geckoview-reviewers,jgilbert,agi,valentin
There's no use case for stateful comparators, so they can be just plain
function pointers.

This is used in some hot places like CSS selector matching.

Differential Revision: https://phabricator.services.mozilla.com/D77084
2020-05-27 18:11:12 +00:00
Eden Chuang 8ec5c50a7f Bug 1575095 - P2 Apply COOP switch with InterceptedHttpChannel in DocumentLoadListener r=necko-reviewers,valentin,mattwoodrow
The response from ServiceWorker might also be COOP mismatched, such that the document/sub-document loading need to be performed on another process.
However, DocumentLoadListener only works with nsHttpChannel.

This patch would like to support InterceptedHttpChannel in DocumentLoadListener.

Differential Revision: https://phabricator.services.mozilla.com/D76841
2020-05-27 15:37:21 +00:00
Eden Chuang a570025eed Bug 1575095 - P1 Move CrossOriginXXXHeaders checking into HttpBaseChannel and apply CrossOriginXXXHeaders in InterceptedHttpChannel. r=valentin
Move COOP, COEP, and CORP checking into HttpBaseChannel, and apply these checking on InterceptedHttpChannel.

Differential Revision: https://phabricator.services.mozilla.com/D54224
2020-05-27 15:37:09 +00:00
Dorel Luca cb70b659d6 Backed out changeset 0440fa5863b2 (bug 1634947) for Devtools failures in browser_webconsole_certificate_messages.js . CLOSED TREE 2020-05-27 17:52:28 +03:00
prathiksha 18ae80df9c Bug 1634947 - Update the TLS deprecated error message in Firefox. r=johannh,necko-reviewers,valentin
Differential Revision: https://phabricator.services.mozilla.com/D77021
2020-05-27 11:43:20 +00:00
Andrea Marchesini 8605dd5b17 Bug 1639570 - Implement nsICookieService::getCookieStringFromDocument - part 2 - tests, r=ckerschb
Differential Revision: https://phabricator.services.mozilla.com/D76143
2020-05-27 10:15:41 +00:00
Andrea Marchesini ab373eca61 Bug 1639570 - Implement nsICookieService::getCookieStringFromDocument - part 1 - implementation, r=ckerschb
Differential Revision: https://phabricator.services.mozilla.com/D76142
2020-05-27 10:15:21 +00:00
Dorel Luca 34b793064e Backed out 6 changesets (bug 1638711) for Geckoview failures in NavigationDelegateTest.loadUriReferrerSessionFileUrl.CLOSED TREE
Backed out changeset 22a7b8f16c44 (bug 1638711)
Backed out changeset 75d97b8df5ba (bug 1638711)
Backed out changeset 254871b49de9 (bug 1638711)
Backed out changeset 97d1d2390586 (bug 1638711)
Backed out changeset bebe76fca022 (bug 1638711)
Backed out changeset 164b842bea99 (bug 1638711)
2020-05-27 12:28:10 +03:00
Matt Woodrow edc0d0a35f Bug 1638711 - Do document security checks in parent process. r=ckerschb
Differential Revision: https://phabricator.services.mozilla.com/D75720
2020-05-27 00:32:05 +00:00
Matt Woodrow e060a86c42 Bug 1631405 - Move nsISecureBrowserUI to be owned by the canonical browsing context instead of docshell. r=nika,ckerschb,Gijs,webcompat-reviewers,twisniewski
This removes all docshell nsISecureBrowserUI and mixed content properties, and moves them into CanonicalBrowsingContext/WindowGlobalParent. It makes the mixed content blocker just compute the state for the current load, and then send the results to the parent process, where we update the security state accordingly.

I think we could in the future remove onSecurityChange entirely, and instead just fire an event to the <browser> element notifying it of changes to the queryable securityUI.

Unfortunately we have a lot of existing code that depends on specific ordering between onSecurityChange and onLocationChange, so I had to hook into the RemoteWebProgress implementation in BrowserParent to mimic the same timings.

Differential Revision: https://phabricator.services.mozilla.com/D75447
2020-05-27 00:28:59 +00:00
Chris Fronk 0752132932 Bug 1620369 Convert Cache Deleter to use background thread pool r=necko-reviewers,michal
Differential Revision: https://phabricator.services.mozilla.com/D74577
2020-05-27 00:05:58 +00:00
Chris Fronk 39313c3fb4 Bug 1620366 - Convert BackgroundFileSaver to use background thread pool. r=valentin,necko-reviewers
Differential Revision: https://phabricator.services.mozilla.com/D74546
2020-05-27 00:06:16 +00:00
Bogdan Tara a54ec3073f Backed out 4 changesets (bug 1631405) for multiple mochitest failures CLOSED TREE
Backed out changeset 9963cc0b23cb (bug 1631405)
Backed out changeset 469ac933ed7c (bug 1631405)
Backed out changeset 0c5f55864268 (bug 1631405)
Backed out changeset 20dcbcc2f3b8 (bug 1631405)
2020-05-27 01:30:20 +03:00
Matt Woodrow 240d417eb6 Bug 1631405 - Move nsISecureBrowserUI to be owned by the canonical browsing context instead of docshell. r=nika,ckerschb,Gijs,webcompat-reviewers,twisniewski
This removes all docshell nsISecureBrowserUI and mixed content properties, and moves them into CanonicalBrowsingContext/WindowGlobalParent. It makes the mixed content blocker just compute the state for the current load, and then send the results to the parent process, where we update the security state accordingly.

I think we could in the future remove onSecurityChange entirely, and instead just fire an event to the <browser> element notifying it of changes to the queryable securityUI.

Unfortunately we have a lot of existing code that depends on specific ordering between onSecurityChange and onLocationChange, so I had to hook into the RemoteWebProgress implementation in BrowserParent to mimic the same timings.

Differential Revision: https://phabricator.services.mozilla.com/D75447
2020-05-26 21:17:01 +00:00
Matt Woodrow 38ffa87e05 Bug 1640160 - Serialize mRequestContextId with BrowsingContext's IPCInitializer to ensure that we don't try to create a request context with an id of 0. r=nika
This was a bit of pain to track down, because some code was allowing an ID of 0, and creating a request context to match, but other code was treating 0 as invalid.

Differential Revision: https://phabricator.services.mozilla.com/D76652
2020-05-26 21:14:27 +00:00
Kagami Sascha Rosylight 236de553f6 Bug 1466532 - Part 1: Drop nsIFile::followLinks r=froydnj,necko-reviewers,dragana
This drops `followLinks` as 1) it has been no-op on UNIX for a long time and 2) its Windows implementation never had a proper symlink support.

Differential Revision: https://phabricator.services.mozilla.com/D75569
2020-05-26 20:51:16 +00:00
ffxbld b3c5906f23 No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D76710
2020-05-26 14:53:18 +00:00
Kershaw Chang 8ac1a956ac Bug 1602832 - P6: Make sure we don't launch socket process for xpcshell http server r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D76664
2020-05-26 14:30:54 +00:00
Kershaw Chang b8de602ab2 Bug 1602832 - P5: Make sure ChildDNSService is created on main thread r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D72611
2020-05-26 14:30:47 +00:00
Kershaw Chang 104bf647be Bug 1602832 - P3: Skip failed tests r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D67448
2020-05-26 14:30:26 +00:00
Kershaw Chang eb032f3176 Bug 1602832 - P1: Run xpcshell tests without e10s with socket process r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D58110
2020-05-26 14:30:09 +00:00
Sebastian Streich 47570a169b Bug 1633710 - Move js uri.AsciiHost to principal r=ckerschb
Differential Revision: https://phabricator.services.mozilla.com/D73239
2020-05-26 11:58:06 +00:00
JulianWels 2cc2e49495 Bug 1625156 - Error page for HTTPS Only Mode. r=fluent-reviewers,ckerschb,nhnt11,flod,nika,johannh,mattwoodrow
Differential Revision: https://phabricator.services.mozilla.com/D72129
2020-05-26 11:45:21 +00:00
Butkovits Atila f167b5c275 Backed out 6 changesets (bug 1602832) for causing perma failure at test_trr_case_sensitivity.js. CLOSED TREE
Backed out changeset 0e9c378df995 (bug 1602832)
Backed out changeset 534fedb3836e (bug 1602832)
Backed out changeset db012c05d64e (bug 1602832)
Backed out changeset ca0c207dca21 (bug 1602832)
Backed out changeset bea1f3aeea49 (bug 1602832)
Backed out changeset 2d54acd78124 (bug 1602832)
2020-05-26 13:09:07 +03:00
Kershaw Chang 8def6e94e6 Bug 1602832 - P6: Make sure we don't launch socket process for xpcshell http server r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D76664
2020-05-26 08:35:54 +00:00
Kershaw Chang 3412834247 Bug 1602832 - P5: Make sure ChildDNSService is created on main thread r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D72611
2020-05-26 08:35:47 +00:00
Kershaw Chang 52a180d403 Bug 1602832 - P3: Skip failed tests r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D67448
2020-05-26 08:35:32 +00:00
Kershaw Chang ad95a84c3b Bug 1602832 - P1: Run xpcshell tests without e10s with socket process r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D58110
2020-05-26 08:35:02 +00:00
Butkovits Atila 1d2238af48 Backed out 2 changesets (bug 1620679) for perma Reftest failure. CLOSED TREE
Backed out changeset 8190c67514cc (bug 1620679)
Backed out changeset 4ca2912d7421 (bug 1620679)
2020-05-26 10:58:42 +03:00
Dimi Lee 1bd66e58e7 Bug 1637634 - Update IsOnContentBlockingAllowList in nsHttpChannel::AsyncOpen r=timhuang,necko-reviewers
This patch removes the assertion that ensures the channel is
top-level via BrowsingContext.
This is because more than one testcases creates a TYPE_DOCUMENT channel
to test.

Differential Revision: https://phabricator.services.mozilla.com/D76152
2020-05-26 06:52:39 +00:00
Matt Woodrow 3254d194e7 Bug 1620679 - Use web progress listener for detecting load end in reftest-content.js. r=kmag,tnikkel
The previous patch stops us from firing the load event if we abort a load. We have a few crashtests that abort loads (either by directly calling stop(), or by starting a new navigation before load completes).

This switches the reftest harness to use web progress to determine when we've finished loading a test.

Differential Revision: https://phabricator.services.mozilla.com/D73995
2020-05-26 03:08:53 +00:00
Csoregi Natalia 38116effd4 Backed out changeset 8d0d9cb87686 (bug 1466532) for failures on test_file_protocol.js. CLOSED TREE 2020-05-26 01:46:49 +03:00
Csoregi Natalia 60c1f31133 Backed out changeset b42b355fc457 (bug 1637634) for crashes on UpdateIsOnContentBlockingAllowList. CLOSED TREE 2020-05-25 23:54:18 +03:00
Dimi Lee ddefdeef9b Bug 1639140 - Remove HasStoragePermissionInParent in DocumentLoadListener r=timhuang,necko-reviewers a=reland CLOSED TREE
We don't need to call this API in DocumentLoadListener::AsyncOpen because we have
already called this in nsHttpChannel::AsyncOpen

Differential Revision: https://phabricator.services.mozilla.com/D76275
2020-05-22 07:32:22 +00:00
Noemi Erli a10ab58b99 Backed out changeset 48b3b92e77f5 (bug 1639140) for causing xpcshell failures CLOSED TREE 2020-05-25 22:35:07 +03:00
Kagami Sascha Rosylight b712a9333b Bug 1466532 - Part 1: Drop nsIFile::followLinks r=froydnj,necko-reviewers,dragana
This drops `followLinks` as 1) it has been no-op on UNIX for a long time and 2) its Windows implementation never had a proper symlink support.

Differential Revision: https://phabricator.services.mozilla.com/D75569
2020-05-25 18:55:59 +00:00
Dimi Lee ed4c44789a Bug 1637634 - Update IsOnContentBlockingAllowList in nsHttpChannel::AsyncOpen r=timhuang,necko-reviewers
This patch removes TYPE_DOCUMENT test in test_shouldclassify because the
testcase creates a non-top level channel with TYPE_DOCUMENT flag (this is wong!),
which triggers the assertion in UpdateIsOnContentBlockingAllowList.

File a follow-up bug 1640715 to add TYPE_DOCUMENT test back.

Differential Revision: https://phabricator.services.mozilla.com/D76152
2020-05-25 18:30:43 +00:00
Dimi Lee d2c1b033d5 Bug 1639140 - Remove HasStoragePermissionInParent in DocumentLoadListener r=timhuang,necko-reviewers
We don't need to call this API in DocumentLoadListener::AsyncOpen because we have
already called this in nsHttpChannel::AsyncOpen

Differential Revision: https://phabricator.services.mozilla.com/D76275
2020-05-22 07:32:22 +00:00
Valentin Gosu e73971d1e6 Bug 1635566 - TRR: Perform a case-insensitive match for the host name r=necko-reviewers,dragana
This is according to RFC 4343 : Domain Name System (DNS) Case Insensitivity Clarification

Differential Revision: https://phabricator.services.mozilla.com/D75081
2020-05-25 13:06:36 +00:00
Valentin Gosu 88b4cf197a Bug 1635566 - TRR: lowercase cname after reading it from the packet r=necko-reviewers,dragana
Differential Revision: https://phabricator.services.mozilla.com/D75079
2020-05-25 13:06:23 +00:00
Valentin Gosu d68d384a5d Bug 1635566 - Create reusable code for running TRR tests in a separate node container r=necko-reviewers,dragana
Differential Revision: https://phabricator.services.mozilla.com/D75078
2020-05-25 13:06:11 +00:00
Kershaw Chang 80a7a8303b Bug 1546358 - Forward cache entry check to parent process r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D75941
2020-05-25 11:07:07 +00:00
Christoph Kerschbaumer 6ae4ad1947 Bug 1422284 - Upgrade insecure requests should only apply to top-level same-origin redirects. r=baku,valentin,necko-reviewers
Differential Revision: https://phabricator.services.mozilla.com/D75259
2020-05-25 08:14:10 +00:00
Kershaw Chang 24d1611207 Bug 1629457 - Make sure TRRServiceChannel is released on target thread r=dragana
The reason of this crash is because that `TRRServiceChannel` is released on the wrong thread. Bug 1616014 fixed a possible case that makes `TRRServiceChannel` release on main thread, but there could be other hidden cases that we are not aware of. To be on the safe side, we should consider to take this future-proof patch.

Differential Revision: https://phabricator.services.mozilla.com/D75973
2020-05-20 09:09:10 +00:00
Chris Peterson bb83eb2360 Bug 1640097 - Remove unused function nsHttpHandler::Get32BitsOfPseudoRandom(). r=necko-reviewers,JuniorHsu
Differential Revision: https://phabricator.services.mozilla.com/D76446
2020-05-22 16:16:23 +00:00
Mihai Alexandru Michis f8bf0815ae Backed out changeset efd4bcfa61dc (bug 1637634) for causing failures in ContentBlockingAllowList.cpp
CLOSED TREE
2020-05-23 01:53:36 +03:00
Dimi Lee 4438bd81db Bug 1637634 - Update IsOnContentBlockingAllowList in nsHttpChannel::AsyncOpen r=timhuang,necko-reviewers
Differential Revision: https://phabricator.services.mozilla.com/D76152
2020-05-22 22:19:57 +00:00
Junior Hsu 7d2a5e55c5 Bug 1638313 - Let devtool show CORS rejected requests correctly r=necko-reviewers,mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D76255
2020-05-22 02:21:25 +00:00
Dorel Luca 86d5322893 Backed out 4 changesets (bug 1637869) for Geckoview failures in org.mozilla.geckoview.test.NavigationDelegateTest.extensionProcessSwitching. CLOSED TREE
Backed out changeset a0c0203ee8c9 (bug 1637869)
Backed out changeset 75359ba23865 (bug 1637869)
Backed out changeset d300b61ed89f (bug 1637869)
Backed out changeset 34389f9c86e4 (bug 1637869)
2020-05-22 19:38:15 +03:00
Jean-Yves Avenard d1133de668 Bug 1637869 - P2. Allow ParentProcessDocumentChannel to perform process switching. r=nika,mattwoodrow
The moves all decisions to perform a process switch into the DocumentLoadListerner. This removes the unnecessary need to go via a content process to start the load.

Differential Revision: https://phabricator.services.mozilla.com/D76315
2020-05-22 10:28:41 +00:00
Jean-Yves Avenard aa02bf49c0 Bug 1637869 - P1. Cancel channel before resuming. r=mattwoodrow
Differential Revision: https://phabricator.services.mozilla.com/D76314
2020-05-22 10:30:29 +00:00
Michal Novotny 9198a0f0ae Bug 1637947 - network ID: link status isn't updated in NetlinkService::OnAddrMessage() r=necko-reviewers,valentin
Differential Revision: https://phabricator.services.mozilla.com/D76194
2020-05-21 16:55:42 +00:00
Junior Hsu b966699767 Bug 1638172 - avoid name hiding for handling multipart channel in HttpChannelChild, r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D75445
2020-05-21 23:32:31 +00:00
Cosmin Sabou 2fb40db9fc Backed out changeset 578ecaa1f863 (bug 1638313) for devtools failures on browser_net_filter-01.js. 2020-05-22 03:20:47 +03:00
Bogdan Tara d389f72e6d Backed out changeset 440612f47d83 (bug 1638172) for HttpChannelParent.cpp related bustages CLOSED TREE 2020-05-22 02:21:35 +03:00
Junior Hsu 6c3aa3878c Bug 1638172 - avoid name hiding for handling multipart channel in HttpChannelChild, r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D75445
2020-05-21 23:02:38 +00:00
Junior Hsu 6ff998ce0c Bug 1638313 - Let devtool show CORS rejected requests correctly, r=necko-reviewers,mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D76255
2020-05-21 22:41:44 +00:00
Andrea Marchesini 0ae464faaa Bug 1639154 - Isolate network cache per first-party when privacy.partition.network_state is set to true - part 2 - tests, r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D75922
2020-05-21 05:41:50 +00:00
Andrea Marchesini 75207bad22 Bug 1639154 - Isolate network cache per first-party when privacy.partition.network_state is set to true - part 1 - implementation, r=mayhemer,necko-reviewers
Differential Revision: https://phabricator.services.mozilla.com/D75921
2020-05-20 16:46:39 +00:00
Matt Woodrow 1f62fbffdd Bug 1627533 - Have DocumentLoadListener retrieve the request context id from the BrowsingContext and use it for http loads. r=dragana,necko-reviewers
Differential Revision: https://phabricator.services.mozilla.com/D75886
2020-05-21 03:38:45 +00:00
Matt Woodrow b7105cc963 Bug 1627533 - Create LoadGroups for docshells using the BrowsingContext's request context id. r=dragana,necko-reviewers
Differential Revision: https://phabricator.services.mozilla.com/D75885
2020-05-21 03:38:37 +00:00
Matt Woodrow 56206beda8 Bug 1627533 - Create a request context id for each BrowsingContext. r=nika,dragana,necko-reviewers
Previously we created a new request context id for each LoadGroup, which meant we didn't have a constant value across process switches.
The next patch uses this request context id when creating a new LoadGroup for an nsDocShell, so that all docshell/loadgroups for a BrowsingContext share the same id.

Differential Revision: https://phabricator.services.mozilla.com/D75884
2020-05-21 03:38:14 +00:00
Noemi Erli 3adaaeb800 Backed out 3 changesets (bug 1627533) for causing assertions in RequestContextService.cpp CLOSED TREE
Backed out changeset 3b35a1852a60 (bug 1627533)
Backed out changeset 70fa5e075269 (bug 1627533)
Backed out changeset 0d1046670534 (bug 1627533)
2020-05-21 04:16:21 +03:00
Matt Woodrow f9fa9d6117 Bug 1627533 - Have DocumentLoadListener retrieve the request context id from the BrowsingContext and use it for http loads. r=dragana,necko-reviewers
Differential Revision: https://phabricator.services.mozilla.com/D75886
2020-05-20 23:41:46 +00:00
Matt Woodrow f8b14e22ba Bug 1627533 - Create LoadGroups for docshells using the BrowsingContext's request context id. r=dragana,necko-reviewers
Differential Revision: https://phabricator.services.mozilla.com/D75885
2020-05-20 23:41:36 +00:00
Matt Woodrow d958cab047 Bug 1627533 - Create a request context id for each BrowsingContext. r=nika,dragana,necko-reviewers
Previously we created a new request context id for each LoadGroup, which meant we didn't have a constant value across process switches.
The next patch uses this request context id when creating a new LoadGroup for an nsDocShell, so that all docshell/loadgroups for a BrowsingContext share the same id.

Differential Revision: https://phabricator.services.mozilla.com/D75884
2020-05-20 23:41:13 +00:00
Andrea Marchesini 81a382b344 Bug 1639247 - Isolate DNS cache per first-party when privacy.partition.network_state is set to true - part 4 - DNS originAttributes suffix in about:networking, r=valentin,fluent-reviewers,necko-reviewers,flod
Differential Revision: https://phabricator.services.mozilla.com/D75986
2020-05-20 16:46:26 +00:00
Andrea Marchesini e69aa140ef Bug 1639247 - Isolate DNS cache per first-party when privacy.partition.network_state is set to true - part 3 - implementation, r=valentin,necko-reviewers
Differential Revision: https://phabricator.services.mozilla.com/D75985
2020-05-20 17:27:43 +00:00
Andrea Marchesini c590ba5d3d Bug 1639247 - Isolate DNS cache per first-party when privacy.partition.network_state is set to true - part 2 - check the return value of GetUsername(), r=valentin,necko-reviewers
Differential Revision: https://phabricator.services.mozilla.com/D75984
2020-05-20 16:45:37 +00:00
Razvan Maries 02e0a1d9a4 Backed out 3 changesets (bug 1639247) for build bustages on on StoragePrincipalHelper.cpp. CLOSED TREE
Backed out changeset 48a854ee6710 (bug 1639247)
Backed out changeset 032d302608e4 (bug 1639247)
Backed out changeset 2d2ff22a0ea4 (bug 1639247)
2020-05-20 19:34:22 +03:00
Andrea Marchesini 50ea627cef Bug 1639247 - Isolate DNS cache per first-party when privacy.partition.network_state is set to true - part 3 - DNS originAttributes suffix in about:networking, r=valentin,fluent-reviewers,necko-reviewers,flod
Differential Revision: https://phabricator.services.mozilla.com/D75986
2020-05-20 15:52:54 +00:00
Andrea Marchesini de934d0d8f Bug 1639247 - Isolate DNS cache per first-party when privacy.partition.network_state is set to true - part 2 - implementation, r=valentin,necko-reviewers
Differential Revision: https://phabricator.services.mozilla.com/D75985
2020-05-20 15:25:35 +00:00
Andrea Marchesini ab5b80165e Bug 1639247 - Isolate DNS cache per first-party when privacy.partition.network_state is set to true - part 1 - check the return value of GetUsername(), r=valentin,necko-reviewers
Differential Revision: https://phabricator.services.mozilla.com/D75984
2020-05-20 15:25:30 +00:00
Alex Catarineu 76c5b17fcd Bug 1638330 - Fix intermittent netwerk/test/unit/test_dns_disabled.js r=necko-reviewers,valentin
Remove test case which relied on an entry being in the DNS cache, and
was most likely the cause of the intermittent failures. Also added an assert
to check the lookup result status before calling inRecord.getNextAddrAsString(),
as that was resulting in a timeout instead of a test failure. Also some minor
changes removing a few lines that were not needed.

Differential Revision: https://phabricator.services.mozilla.com/D76097
2020-05-20 10:27:44 +00:00
Peter Van der Beken f38cc0e952 Bug 1570255 - Reboot session history in parent part 1. r=smaug,necko-reviewers,valentin
This adds a new implementation of nsISHEntry
(mozilla::dom::SessionHistoryEntry). When session history in the parent
is turned on, we'll instantiate the existing nsSHistory in the parent
process, but it will store entries of this new type. The nsSHistory in
the child process will also be instantiated for now, to avoid breaking
too many assumptions, and we try to keep parent and child
implementations in sync.

mozilla::dom::SessionHistoryEntry stores most of its data in a new
structure (mozilla::dom::SessionHistoryInfo) which can be sent over IPC.
When a load starts through the DocumentChannel we create an entry of
this new type for it in the parent process in
DocumentLoadListener::Open. The SessionHistoryInfo for that entry (with
an associated ID) is then sent over IPC in the RedirectToRealChannelArgs
to the process that does the actual load, where we store it in the
nsDocShell in mLoadingEntry (and mLoadingEntryId). The parent process
keeps track of outstanding loading entries in an array (mLoadingEntries)
in the CanonicalBrowsingContext. When a load finishes the nsDocShell
transfers mLoadingEntry into mActiveEntry, and notifies the parent
process through an IPC message (HistoryCommit) with the id of that
entry. The CanonicalBrowsingContext then removes the entry from the
array and stores it in its mActiveEntry, and adds the entry to the
nsSHistory object.

There are a number of things in this patch that are broken, and a lot of
FIXME comments. However, with the pref turned off things should just be
working as before. The goal is to land this first part, and then iterate
on the new implementation until we can switch over.

Differential Revision: https://phabricator.services.mozilla.com/D65329
2020-05-20 09:09:12 +00:00
Tom Tung 5485075de6 Bug 1605176 - Run a cross site origin iframe in webCOOP+COEP process if the COOP and COEP are set; r=nika
Differential Revision: https://phabricator.services.mozilla.com/D74666
2020-05-14 09:57:16 +00:00
Coroiu Cristina 44c378a7fb Backed out 5 changesets (bug 1602832) for browser-chrome failures at toolkit/mozapps/extensions/test/xpinstall/browser_doorhanger_installs.js on a CLOSED TREE
Backed out changeset 059a7f44d1a9 (bug 1602832)
Backed out changeset 2f3cc391b48a (bug 1602832)
Backed out changeset 24d1ce1b0ac9 (bug 1602832)
Backed out changeset 5ea85726cc48 (bug 1602832)
Backed out changeset ee00e846104e (bug 1602832)
2020-05-19 23:05:26 +03:00
Dylan Roeh 2157c7820c Bug 1596825 - Add NavigationDelegate.onSubframeLoadRequest to handle non-top-level load requests. r=snorp,mattwoodrow,geckoview-reviewers,agi
Differential Revision: https://phabricator.services.mozilla.com/D74939
2020-05-19 17:05:42 +00:00
Liang-Heng Chen 466189ebb4 Bug 1631676 - Part 2: remember FPI state in CookieJarSettings; r=baku,timhuang
Differential Revision: https://phabricator.services.mozilla.com/D74050
2020-05-19 14:47:57 +00:00
Liang-Heng Chen 0c371a2e76 Bug 1631676 - Part 1: add cookie behavior pref getter; r=baku
Differential Revision: https://phabricator.services.mozilla.com/D74049
2020-05-19 14:51:10 +00:00
Kershaw Chang f94384d121 Bug 1602832 - P5: Make sure ChildDNSService is created on main thread r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D72611
2020-05-19 12:56:56 +00:00
Kershaw Chang 0e9baa4d27 Bug 1602832 - P3: Skip failed tests r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D67448
2020-05-19 12:56:52 +00:00
Kershaw Chang e5f3047c48 Bug 1602832 - P1: Run xpcshell tests without e10s with socket process r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D58110
2020-05-19 12:56:47 +00:00
Kershaw Chang 9f9eb50d04 Bug 1616014 - Get rid off nsMainThreadPtrHandle in DNSListenerProxy r=valentin
Differential Revision: https://phabricator.services.mozilla.com/D75485
2020-05-19 13:54:48 +00:00
Eden Chuang 16b5f23697 Bug 1532287 - P2 Propagate loading document/worker's COEP to nsHttpChannel through nsILoadInfo r=necko-reviewers,valentin,JuniorHsu
Currently, the worker's COEP is saved in WorkerPrivate and not be respected when loading resources in workers.
This patch adds an attribute loadingEmbedderPolicy in nsILoadInfo, which indicates the COEP header the loading must be respected.

The default value of loadingEmbedderPolicy is nsILoadInfo::EMBEDDER_POLICY_NULL.
loadingEmbedderPolicy is initialized with the COEP of the BrowsingContext used for creating LoadInfo.
And it could be set to other value when fetch in workers.

Differential Revision: https://phabricator.services.mozilla.com/D73690
2020-05-19 12:50:39 +00:00
Dimi Lee 27c0acc692 Bug 1637194 - P4. Inherit the first-party domain from the parent document when creating CookieJarSetting in document r=timhuang,baku
This fixes a issue that about:blank page can't get correct first-party
domain when fission is enabled.

Differential Revision: https://phabricator.services.mozilla.com/D75784
2020-05-19 09:47:42 +00:00
Dimi Lee ae8751a56d Bug 1637194 - P2. Set firstPartyDomain to CookieJarSetting in nsHttpChannel::AsyncOpen r=necko-reviewers,timhuang,baku,kershaw
FirstPartyDomain is only set while loading a top-level document.
We added in nsHttpChannel::AsyncOpen to ensure that the value is updated
whenever we open a channel.

Differential Revision: https://phabricator.services.mozilla.com/D75277
2020-05-19 09:47:25 +00:00
Dimi Lee 7cf904bbc5 Bug 1637194 - P1. Add firstPartyDomain to CookieJarSetting r=timhuang,baku
Differential Revision: https://phabricator.services.mozilla.com/D75276
2020-05-19 09:47:12 +00:00
Frederik Braun de3412e689 Bug 1613609 - Add required loadinfo flag requests initiated with SystemPrincipal r=necko-reviewers,dragana
Adding the flag to existing channel/loadinfo object for:
- PushServices HTTP, WebSocket
- NetworkGeolocationProvider
- NetUtil.jsm's NewChannel
- NetworkConnectivityService
- OCSP
- Portal Detection
- ProductAddonChecker.jsm
- URLClassifier

Differential Revision: https://phabricator.services.mozilla.com/D75063
2020-05-19 08:54:58 +00:00
Kershaw Chang e523bf4175 Bug 1539819 - P5: Extract the logic of processing TRRService URI r=valentin
Differential Revision: https://phabricator.services.mozilla.com/D73903
2020-05-18 20:18:15 +00:00
Kershaw Chang f576a6f9bf Bug 1539819 - P4: Some adjustments to pass trr test r=dragana,necko-reviewers
Differential Revision: https://phabricator.services.mozilla.com/D68881
2020-05-18 20:18:13 +00:00
Kershaw Chang 5732714230 Bug 1539819 - P3: Some adjustments to make TRRServiceChannel work on socket process r=dragana,necko-reviewers
Differential Revision: https://phabricator.services.mozilla.com/D68399
2020-05-18 20:18:08 +00:00
Kershaw Chang 2cbb8cd25e Bug 1539819 - P2: Introduce PProxyConfigLookup.ipdl for get proxy config in TRRServiceChannel r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D68398
2020-05-18 20:18:05 +00:00
Kershaw Chang bdbecde447 Bug 1539819 - P1: Make TRRService work in socket process r=dragana,necko-reviewers
Differential Revision: https://phabricator.services.mozilla.com/D68880
2020-05-18 20:18:03 +00:00
Valentin Gosu 6777c89a7f Bug 1638789 - Also log originAttributes in nsHostResolver::ResolveHost r=necko-reviewers,dragana
Differential Revision: https://phabricator.services.mozilla.com/D75765
2020-05-18 14:55:21 +00:00
Mihai Alexandru Michis a2026344a1 Backed out 2 changesets (bug 1613609) for causing bustages.
CLOSED TREE

Backed out changeset dd6e395dc342 (bug 1613609)
Backed out changeset 5bcb7b13a4ad (bug 1613609)
2020-05-18 16:38:58 +03:00
Frederik Braun 3baff21cbd Bug 1613609 - Add required loadinfo flag requests initiated with SystemPrincipal r=necko-reviewers,dragana
Adding the flag to existing channel/loadinfo object for:
- PushServices HTTP, WebSocket
- NetworkGeolocationProvider
- NetUtil.jsm's NewChannel
- NetworkConnectivityService
- OCSP
- Portal Detection
- ProductAddonChecker.jsm
- URLClassifier

Differential Revision: https://phabricator.services.mozilla.com/D75063
2020-05-18 10:59:04 +00:00
Magnus Melin 96a75d8f03 Bug 1638288 - don't use nsIPrincipal->GetURI for Thunderbird. r=ckerschb
Differential Revision: https://phabricator.services.mozilla.com/D75535
2020-05-18 09:23:25 +00:00
Csoregi Natalia 5162f86676 Backed out 2 changesets (bug 1613609) for failures on nsXPConnect.cpp. CLOSED TREE
Backed out changeset c593a7296df4 (bug 1613609)
Backed out changeset 72199fc4ea2b (bug 1613609)
2020-05-18 13:05:12 +03:00
Frederik Braun 3b0d63cd07 Bug 1613609 - Add required loadinfo flag requests initiated with SystemPrincipal r=necko-reviewers,dragana
Adding the flag to existing channel/loadinfo object for:
- PushServices HTTP, WebSocket
- NetworkGeolocationProvider
- NetUtil.jsm's NewChannel
- NetworkConnectivityService
- OCSP
- Portal Detection
- ProductAddonChecker.jsm
- URLClassifier

Differential Revision: https://phabricator.services.mozilla.com/D75063
2020-05-18 09:19:17 +00:00
Nicklas Boman 4f2fa0cfa7 Bug 1515419 - fixing ToNewCString (and ToNewUnicode as well) xpcom/string/nsReadableUtils.cpp r=froydnj,necko-reviewers,valentin
Differential Revision: https://phabricator.services.mozilla.com/D17411
2020-05-17 06:58:48 +00:00
Aaron Klotz 53710190f5 Bug 1637452: Part 7 - Fix JNI includes in netwerk; r=necko-reviewers,valentin
In this bug we're moving away from monolithic JNI headers to class-specific
headers so that we don't have to rebuild the world every time we make a change
to a JNI interface.

Differential Revision: https://phabricator.services.mozilla.com/D75370
2020-05-15 17:04:32 +00:00
Razvan Maries 481517ce87 Backed out 2 changesets (bug 1558394) for perma failures on iframe_sandbox_anchor_download_block_downloads.sub.tentative.html. CLOSED TREE
Backed out changeset 79046ff8143b (bug 1558394)
Backed out changeset e13ede3c68d4 (bug 1558394)
2020-05-15 19:18:34 +03:00
Sebastian Streich bb0855332f Bug 1558394 - Pass the TriggeringSandboxFlags to nsILoadinfo r=ckerschb,smaug,necko-reviewers,valentin
Add triggering Sandbox flags to loadinfo
***
Pass triggering Flags into Loadinfo

Differential Revision: https://phabricator.services.mozilla.com/D69588
2020-05-15 14:03:28 +00:00
Michal Novotny a3eb320428 Bug 1630000 - Hitting Back sometimes shows old cached content, r=mayhemer,necko-reviewers
If we're racing cache with network and the network wins we don't have a cache entry for writing the downloaded data. In this case nsHttpChannel::MaybeCreateCacheEntryWhenRCWN() creates the entry synchronously by calling nsICacheStorage::openTruncate() before we initialize cache entry for writing.

Differential Revision: https://phabricator.services.mozilla.com/D74660
2020-05-15 13:28:06 +00:00
Christoph Kerschbaumer 296ee0329d Bug 1432205: Always require the creation of a LoadInfo in nsIOService::NewChannelFromURIWithProxyFlagsInternal. r=valentin,necko-reviewers
Differential Revision: https://phabricator.services.mozilla.com/D75484
2020-05-15 11:45:15 +00:00
Junior Hsu 170e3d5ad8 Bug 1633942 - P2 pass HttpChannelOnStartRequestArgs through PHttpChannel, r=mayhemer,necko-reviewers
Differential Revision: https://phabricator.services.mozilla.com/D73136
2020-05-14 23:33:46 +00:00
Junior Hsu aaa5387318 Bug 1633942 - P1 introduce HttpChannelOnStartRequestArgs and ipdl changes, r=mayhemer,necko-reviewers
Differential Revision: https://phabricator.services.mozilla.com/D73135
2020-05-14 23:33:15 +00:00
Sebastian Streich 1ec5974790 Bug 1636148 - "BandAid" - Cast Remaining Callers To BasePrincipal r=ckerschb,geckoview-reviewers,agi
Differential Revision: https://phabricator.services.mozilla.com/D74248
2020-05-14 19:42:57 +00:00
Alex Catarineu f45b17374e Bug 1636411 followup - add network.dns.disabled checks to cover all paths r=necko-reviewers,valentin
Adding/moving network.dns.disabled checks to make sure we cover all DNS lookups paths.

Differential Revision: https://phabricator.services.mozilla.com/D74626
2020-05-14 18:26:17 +00:00
Dorel Luca 773143da8a Backed out 3 changesets (bug 1635566) for XPCShell in netwerk/test/unit/test_trr_case_sensitivity.js. CLOSED TREE
Backed out changeset 873f7e079fd8 (bug 1635566)
Backed out changeset d9b4727f85cf (bug 1635566)
Backed out changeset 832dfd3bf2dd (bug 1635566)
2020-05-14 21:27:28 +03:00
Magnus Melin b2578e4b34 Bug 1636783 - Ensure default profile permissions do not confuse permission manager tests (test_permmgr.js). r=mayhemer,necko-reviewers
This is a problem for Thunderbird due to bug 1168178.

Differential Revision: https://phabricator.services.mozilla.com/D75031
2020-05-14 15:47:25 +00:00
Valentin Gosu 7a0dc7cc47 Bug 1635566 - TRR: Perform a case-insensitive match for the host name r=necko-reviewers,dragana
This is according to RFC 4343 : Domain Name System (DNS) Case Insensitivity Clarification

Differential Revision: https://phabricator.services.mozilla.com/D75081
2020-05-14 10:52:57 +00:00
Valentin Gosu 681c9b474e Bug 1635566 - TRR: lowercase cname after reading it from the packet r=necko-reviewers,dragana
Differential Revision: https://phabricator.services.mozilla.com/D75079
2020-05-14 10:52:45 +00:00
Valentin Gosu 6ddc89bcb2 Bug 1635566 - Create reusable code for running TRR tests in a separate node container r=necko-reviewers,dragana
Differential Revision: https://phabricator.services.mozilla.com/D75078
2020-05-14 10:52:32 +00:00
Kershaw Chang ba8b3a4b44 Bug 1636999 - Use CallOrWaitForSocketProcess in HttpConnectionMgrParent r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D74697
2020-05-14 14:52:17 +00:00
Kershaw Chang 7922f6e91f Bug 1549323 - Make sure session cache is cleared in socket process r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D74906
2020-05-14 12:21:59 +00:00
Kershaw Chang 634eba0f2c Bug 1636930 - Add missing data members in serialise/deserialise code of nsHttpResponseHead r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D74653
2020-05-14 12:21:41 +00:00
Bogdan Tara edcb53f163 Backed out 2 changesets (bug 1558394) for nsDocShellLoadState related bustage CLOSED TREE
Backed out changeset 5889105bd089 (bug 1558394)
Backed out changeset 80a0ea17c9f8 (bug 1558394)
2020-05-14 15:17:32 +03:00
Sebastian Streich 9ce86dc585 Bug 1558394 - Pass the TriggeringSandboxFlags to nsILoadinfo r=ckerschb,smaug,necko-reviewers,valentin
Add triggering Sandbox flags to loadinfo
***
Pass triggering Flags into Loadinfo

Differential Revision: https://phabricator.services.mozilla.com/D69588
2020-05-14 10:04:44 +00:00