Граф коммитов

22733 Коммитов

Автор SHA1 Сообщение Дата
Nihanth Subramanya 3e435a16d6 Bug 1729831 - [DoH] In strict fallback mode, allow fallback when not confirmed. r=necko-reviewers,valentin
In strict fallback mode, confirmation should still catch cases when the provider is
unavailable for whatever reason, and after that we should just fall back. This was
missing from bug 1714182.

Differential Revision: https://phabricator.services.mozilla.com/D126168
2021-10-08 10:24:48 +00:00
ffxbld 518bed94e6 No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D127793
2021-10-07 17:17:12 +00:00
Manuel Bucher 799daafe1a Bug 1543811 - Add integration test case for trr requests with padding r=necko-reviewers,valentin
Differential Revision: https://phabricator.services.mozilla.com/D127072
2021-10-07 10:55:22 +00:00
Manuel Bucher 56fa275000 Bug 1543811 - Add test cases for EncodeRequest with padding r=necko-reviewers,valentin
Differential Revision: https://phabricator.services.mozilla.com/D126953
2021-10-07 10:55:21 +00:00
Manuel Bucher 3cc3731145 Bug 1543811 - EDNS Padding support for encrypted DNS transports r=necko-reviewers,valentin
Differential Revision: https://phabricator.services.mozilla.com/D126480
2021-10-07 10:55:21 +00:00
Rob Wu 87db63777d Bug 1722078 - Remove obsolete reference to app-extension-fields.properties r=Gijs,necko-reviewers,valentin
The file is no longer being loaded since the patch for bug 1729738.

Differential Revision: https://phabricator.services.mozilla.com/D127663
2021-10-07 08:59:25 +00:00
Jens Stutte 2216dc0a3d Bug 1731564: Use motivated SpinEventLoopUntil inside netwerk/*. r=necko-reviewers,valentin
Depends on D127102

Differential Revision: https://phabricator.services.mozilla.com/D127225
2021-10-07 08:06:12 +00:00
Jens Stutte cd08f3b728 Bug 1731564: Introduce a motivated SpinEventLoopUntil for direct use from C++. r=xpcom-reviewers,nika,necko-reviewers
This patch:
- moves the AutoNestedEventLoopAnnotation into SpinEventLoopUntil.h
- introduces the motivated SpinEventLoopUntil
- maps remaining SpinEventLoopUntil instances to SpinEventLoopUntil with "Missing motivation."
- changes relevant uses in nsThread and nsThreadManager to the motivated SpinEventLoopUntil
- changes all uses with IgnoreAndContinue behavior to the motivated SpinEventLoopUntil

Differential Revision: https://phabricator.services.mozilla.com/D126714
2021-10-07 08:06:10 +00:00
june wilde 692c22b993 Bug 1670058 - support Global Privacy Control signal; r=smaug,necko-reviewers
Differential Revision: https://phabricator.services.mozilla.com/D126966
2021-10-07 07:55:30 +00:00
Butkovits Atila b847c844ad Backed out changeset a34634271a66 (bug 1729831) for causing failures at test_odoh.js. CLOSED TREE 2021-10-07 08:44:17 +03:00
Nihanth Subramanya 53e44389e3 Bug 1729831 - [DoH] In strict fallback mode, allow fallback when not confirmed. r=necko-reviewers,valentin
In strict fallback mode, confirmation should still catch cases when the provider is
unavailable for whatever reason, and after that we should just fall back. This was
missing from bug 1714182.

Differential Revision: https://phabricator.services.mozilla.com/D126168
2021-10-07 04:27:15 +00:00
Marian-Vasile Laza 18fb16c542 Backed out 18 changesets (bug 1731564) for causing build bustages on SpinEventLoopUntil. CLOSED TREE
Backed out changeset 0464dbdc8584 (bug 1731564)
Backed out changeset 0d996df13545 (bug 1731564)
Backed out changeset 5630a0e7a109 (bug 1731564)
Backed out changeset 37b41d187cdb (bug 1731564)
Backed out changeset d37700fa60b6 (bug 1731564)
Backed out changeset b0ce7db44b99 (bug 1731564)
Backed out changeset aa5ec3aa1535 (bug 1731564)
Backed out changeset 73b648f1fa70 (bug 1731564)
Backed out changeset bb8fb0f9833e (bug 1731564)
Backed out changeset 0d8905144f5d (bug 1731564)
Backed out changeset 2cfb094a1ec3 (bug 1731564)
Backed out changeset 78d3b0257a6a (bug 1731564)
Backed out changeset e9d32926e93c (bug 1731564)
Backed out changeset 874cab520ce5 (bug 1731564)
Backed out changeset d8071cc32bd9 (bug 1731564)
Backed out changeset 283c5393cbbc (bug 1731564)
Backed out changeset 317bc38e3de5 (bug 1731564)
Backed out changeset 53e3f4862439 (bug 1731564)
2021-10-07 00:09:19 +03:00
Jens Stutte b3a8e550fe Bug 1731564: Use motivated SpinEventLoopUntil inside netwerk/*. r=necko-reviewers,valentin
Depends on D127102

Differential Revision: https://phabricator.services.mozilla.com/D127225
2021-10-06 19:45:14 +00:00
Jens Stutte 80463c0d23 Bug 1731564: Introduce a motivated SpinEventLoopUntil for direct use from C++. r=xpcom-reviewers,nika,necko-reviewers
This patch:
- moves the AutoNestedEventLoopAnnotation into SpinEventLoopUntil.h
- introduces the motivated SpinEventLoopUntil
- maps remaining SpinEventLoopUntil instances to SpinEventLoopUntil with "Missing motivation."
- changes relevant uses in nsThread and nsThreadManager to the motivated SpinEventLoopUntil
- changes all uses with IgnoreAndContinue behavior to the motivated SpinEventLoopUntil

Differential Revision: https://phabricator.services.mozilla.com/D126714
2021-10-06 19:45:11 +00:00
Nihanth Subramanya d79be2b492 Bug 1734183 - Add CIRA to TRR telemetry provider-key list. r=necko-reviewers,kershaw
Differential Revision: https://phabricator.services.mozilla.com/D127563
2021-10-06 15:53:48 +00:00
Agi Sferro b84a0603d7 Bug 1714945 - Allow setting permanent permissions for private browsing r=timhuang,johannh
By default nsIPermissionManager will not persist data in private browsing.

There are cases however, like private-only-browser Firefox Focus, where we
would want to be able to persist tracking protection exceptions permanently.

This patch adds a new method called
`addFromPrincipalAndPersistInPrivateBrowsing` which allows setting permanent
permissions in private browsing..

Differential Revision: https://phabricator.services.mozilla.com/D126544
2021-10-05 22:09:59 +00:00
Csoregi Natalia 21bae7d190 Backed out changeset dbffee5cbf0d (bug 1722489) for failures on browser_iframe_test.js. CLOSED TREE 2021-10-06 00:34:43 +03:00
Alexandru Michis 485a54ca75 Backed out changeset b61b692cfbce (bug 1670058) for causing bustages in nsHttpChannel.cpp
CLOSED TREE
2021-10-05 19:49:52 +03:00
lyavor ac1be7a469 Bug 1722489 - Evaluate HSTS before https-only in NS_ShouldSecureUpgrade. r=ckerschb,necko-reviewers,kershaw
Differential Revision: https://phabricator.services.mozilla.com/D126238
2021-10-05 15:05:50 +00:00
june wilde e864a69420 Bug 1670058 - support Global Privacy Control signal; r=smaug,necko-reviewers
Differential Revision: https://phabricator.services.mozilla.com/D126966
2021-10-05 15:00:30 +00:00
Noemi Erli 55b2633c97 Backed out 3 changesets (bug 1733356) for causing bustages in CookieStorage.cpp CLOSED TREE
Backed out changeset e94611929d92 (bug 1733356)
Backed out changeset f1866e615f08 (bug 1733356)
Backed out changeset b87b34fa8a6f (bug 1733356)
2021-10-05 12:57:44 +03:00
Valentin Gosu f631f7ef60 Bug 1733356 - Fix non-unified build errors in netwerk/cookie/ r=necko-reviewers,dragana
Differential Revision: https://phabricator.services.mozilla.com/D127401
2021-10-05 08:22:01 +00:00
Valentin Gosu d77b41244a Bug 1733356 - Fix non-unified build errors in netwerk/cache/ r=necko-reviewers,dragana
Differential Revision: https://phabricator.services.mozilla.com/D127400
2021-10-05 08:22:00 +00:00
Valentin Gosu 822cd925d0 Bug 1733356 - Fix non-unified build errors in netwerk/dns/ r=necko-reviewers,dragana
Differential Revision: https://phabricator.services.mozilla.com/D127399
2021-10-05 08:22:00 +00:00
Gijs Kruitbosch dd394d57a2 Bug 1733558 - stop duplicating append redirect history entry logic everywhere, r=ckerschb,necko-reviewers,valentin
Differential Revision: https://phabricator.services.mozilla.com/D127251
2021-10-04 13:24:15 +00:00
ffxbld 37e818c16c No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D127414
2021-10-04 13:08:14 +00:00
Emilio Cobos Alvarez 3e78dd6549 Bug 1030660 - Disable ClearBogusContentEncodingIfNeeded. r=necko-reviewers,valentin
Other browsers don't do this and it causes compat issues.

Differential Revision: https://phabricator.services.mozilla.com/D127255
2021-10-02 16:40:36 +00:00
Dragana Damjanovic e4d1ab4dd7 Bug 1733603 - Neqo version 0.5.3 r=necko-reviewers,kershaw
Differential Revision: https://phabricator.services.mozilla.com/D127273
2021-10-01 18:07:10 +00:00
Dragana Damjanovic 00a3938779 Bug 1718520 - Retry a HttpTransaction if early data are used and a SSL_ERROR_PROTOCOL_VERSION_ALERT is received r=necko-reviewers,kershaw
Differential Revision: https://phabricator.services.mozilla.com/D126558
2021-10-01 17:22:54 +00:00
ffxbld 83e68e8168 No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D127083
2021-10-01 12:44:02 +00:00
Dragana Damjanovic 04599ffe8f Bug 1718520 - Disable early-data if a SSL_ERROR_PROTOCOL_VERSION_ALERT is received r=mt
If amount of origins that have early-data disabled exceeds certain amount, disable early-data for all origins

This is controlled by prefs.

Differential Revision: https://phabricator.services.mozilla.com/D126555
2021-10-01 12:14:21 +00:00
Alexandru Michis 611ed75183 Merge mozilla-central to autoland a=merge 2021-09-30 17:47:10 +03:00
Alexandru Michis 584991b4bd Backed out changeset 5bb05a86bd2e (bug 1732885) for causing networking crashes. a=backout 2021-09-30 17:31:53 +03:00
Valentin Gosu f5311b7c39 Bug 1732931 - Make nsDirIndexParser::gTextToSubURI a StaticRefPtr r=necko-reviewers,dragana
Differential Revision: https://phabricator.services.mozilla.com/D126810
2021-09-30 13:49:59 +00:00
Valentin Gosu a27040dd10 Bug 172434 - Add test for calling dnsResolve(null) in PAC scripts r=necko-reviewers,kershaw
Depends on D126468

Differential Revision: https://phabricator.services.mozilla.com/D126651
2021-09-30 13:49:38 +00:00
Valentin Gosu af2904c592 Bug 1724345 - Make sure argument passed to dnsResolve is string in PAC scripts r=necko-reviewers,kershaw
Simply converting the argument to a string could lead to odd situations where
resolving `null` succeeds if a hostname called "null" exists on the network.

Differential Revision: https://phabricator.services.mozilla.com/D126468
2021-09-30 13:49:38 +00:00
Kershaw Chang 01b5dd1808 Bug 1733247 - Check the http3 pref when selecting an npnToken, r=necko-reviewers,dragana
Differential Revision: https://phabricator.services.mozilla.com/D127015
2021-09-30 12:18:47 +00:00
Kershaw Chang 833394b32b Bug 1732584 - Make sure NS_HTTP_DISALLOW_HTTP3 is set when proxy is used, r=necko-reviewers,dragana
Differential Revision: https://phabricator.services.mozilla.com/D126907
2021-09-30 12:17:49 +00:00
Valentin Gosu 6b7ecfaebe Bug 1733318 - Better logging in GetAddrInfo r=necko-reviewers,dragana
Differential Revision: https://phabricator.services.mozilla.com/D127061
2021-09-30 12:14:19 +00:00
Valentin Gosu 6cd518bee9 Bug 1732961 - TRR should not be ignoring enterprise policy value of network.trr.uri/mode r=nhnt11
In bug 1626057 we added support for steering. There we made the distinction
between a default network.trr.uri pref, and a user-set one by using
`Preferences::HasUserValue`. However, it seems that enterprise policies change
the default branch of the pref, so this would lead to it having a lower
priority than DoHRollout or steering.

In bug 1713036 we introduced `network.trr.default_provider_uri` and made
`network.trr.uri` an empty string, so checking hasUserValue isn't required
anymore.

Differential Revision: https://phabricator.services.mozilla.com/D126961
2021-09-30 11:58:52 +00:00
Valentin Gosu 2ec278d9e1 Bug 1732961 - Add xpcshell-test for setting an enterprise policy for DNSOverHTTPS r=nhnt11
Differential Revision: https://phabricator.services.mozilla.com/D126960
2021-09-30 11:58:51 +00:00
Manuel Bucher 0a9c89d46a Bug 1733323 - Remove `.only()`-call on test case to enable other trr test cases again r=necko-reviewers,valentin
Differential Revision: https://phabricator.services.mozilla.com/D127066
2021-09-30 08:49:13 +00:00
Dragana Damjanovic 33e8e81aa8 Bug 1732885 - Add assertions to make sure certificates are set if a handshake succeeds. r=necko-reviewers,valentin
Differential Revision: https://phabricator.services.mozilla.com/D126837
2021-09-29 21:18:12 +00:00
Olli Pettay 524e95c9e4 Bug 1732250, use the original URI from the old channel when updating session history entry, r=peterv,necko-reviewers,valentin
https://searchfox.org/mozilla-central/rev/1df999af9999ccb436512cfece57a68d94d36e08/netwerk/protocol/http/nsHttpChannel.cpp#2876
makes original uri handling in the channel rather magical. The value of it on the new channel is bogus during
AsyncOnChannelRedirect call, and nsIChannel.idl doesn't hint about that behavior.

browser_getNavigationHistory.js can work as a testcase once it is enabled for Fission.

Differential Revision: https://phabricator.services.mozilla.com/D126735
2021-09-29 09:35:59 +00:00
Dennis Schubert e6d9617889 Bug 1732875 - Call the ExperimentUserAgentUpdated() handler once direcly in nsHttpHandler::Init(). r=cpeterson,necko-reviewers,valentin
This is needed to make sure the experimental User Agent string is applied immediately after starting the browser, not just whenever the Nimbus data changes as part of the NimbusFeatures::OnUpdate handler.

Differential Revision: https://phabricator.services.mozilla.com/D126774
2021-09-28 17:11:26 +00:00
Valentin Gosu 0504488366 Bug 1731054 - Reenable bug1708673 without perf regression r=necko-reviewers,kershaw
Depends on D126360

Differential Revision: https://phabricator.services.mozilla.com/D126361
2021-09-28 07:08:28 +00:00
Tim Huang 93a518fe4f Bug 1731557 - Part 1: Using an enum to represent storage permission in the loadInfo. r=pbz,necko-reviewers,dragana
To differentiate the storage permission is granted by either the
permission or the allowList, we need to change the hasStoragePermission
to an enum to represent the storage permission state.

This patch also changes the name of the attribute to make it reasonable
with respect to this change.

Differential Revision: https://phabricator.services.mozilla.com/D126276
2021-09-27 22:50:41 +00:00
Shane Caraveo efe27c108e Bug 1732388 support proxyBypass flag on http channels r=dragana,necko-reviewers
Differential Revision: https://phabricator.services.mozilla.com/D126550
2021-09-27 21:01:53 +00:00
Kershaw Chang 25350b4da3 Bug 1615017 - Use a wrapped lock to protect data in CacheFileMetadata, r=necko-reviewers,valentin
Differential Revision: https://phabricator.services.mozilla.com/D126650
2021-09-27 20:59:17 +00:00
ffxbld acd813f1dd No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D126479
2021-09-23 15:38:10 +00:00
Dragana Damjanovic 5add3e9091 Bug 1732256 - When TLS handshake completion is pending it may happen that nss and necko are out of sync. r=necko-reviewers,kershaw,valentin
The previous check was incorrect.

Differential Revision: https://phabricator.services.mozilla.com/D126496
2021-09-23 13:10:23 +00:00
lyavor c8c3f419e0 Bug 1725402 - HTTPS-First should copy referrerInfo (and potentially more state) from upgraded channel when performing a fallback to http.r=ckerschb,Gijs,freddyb
Differential Revision: https://phabricator.services.mozilla.com/D122585
2021-09-23 10:51:14 +00:00
Valentin Gosu e41b7a871b Bug 1732095 - Remove unused nsICacheStorageService.synthesizedCacheStorage r=necko-reviewers,kershaw
Depends on D126357

Differential Revision: https://phabricator.services.mozilla.com/D126360
2021-09-23 09:14:19 +00:00
Valentin Gosu d99d6259ee Bug 1732095 - Clean up CacheStorageService r=necko-reviewers,kershaw
Differential Revision: https://phabricator.services.mozilla.com/D126357
2021-09-23 09:14:19 +00:00
Valentin Gosu 373cbe05bd Bug 1732249 - Check if secInfo->GetServerCert returns a null cert r=necko-reviewers,kershaw
Differential Revision: https://phabricator.services.mozilla.com/D126453
2021-09-23 09:00:18 +00:00
Sean Feng a1b9c83581 Bug 1731831 - Rename timedChannel to timedChannelInfo for ReplacementChannelConfig r=dragana,necko-reviewers
`timedChannel` is wrong because it implies it is a channel, however it
is in fact a `TimedChannelInfo`.

Differential Revision: https://phabricator.services.mozilla.com/D126254
2021-09-22 19:07:56 +00:00
Dragana Damjanovic a33c6961ed Bug 1382886 - Consider that mTransport may be nullptr when Handshake done callback is called r=necko-reviewers,kershaw
Also set mEarlyDataState to done earlier.

Differential Revision: https://phabricator.services.mozilla.com/D126264
2021-09-22 09:19:32 +00:00
Dragana Damjanovic 4148d02518 Bug 1382886 - Fix fuzzing build, also we cannot set SecurityInfo during read r=necko-reviewers,kershaw
Before this bug TLS handshake was only driven by forcing writes. SecurtyInfo was set during a write code path. That is not anymore true and the TLS handshake can be driven by reading from a socket. That causes an issue where the SecurtyInfo was not set in case a TLS handshake fails. This bug added the setting of the SecurtyInfo to the read code path, but that causes problems when the transaction is closed due to corrupted response.
This patch fixes this by moving the setting of SecurtyInfo to Close() function.

Do not call HandshakeDoneInternal if the connection has been closed between posting the HandshakeDoneInternal runable and executing it.

Differential Revision: https://phabricator.services.mozilla.com/D125666
2021-09-22 09:19:32 +00:00
Dragana Damjanovic 1f317abe34 Bug 1382886 - Remove a busy-wait if the early-data is negotiated and http/1.1 is used but the transaction cannot send early-data. r=necko-reviewers,kershaw
In this case necko should poll for read (not for write) and reset the poll flags when the handshake is done.
The other option is to inspect the resumption ticket before adding it to the nss socket and find out which alpn will be used and disable the early-data if the version is http/1.1 and the transaction cannot send early-data. This currently only works on Nightly. When we roll out the necko’s token cache we can consider making this change.

Additional changes:
Consolidate mEarlyDataNegotiated and mWaitingFor0RTTResponse into mEarlyDataState

Differential Revision: https://phabricator.services.mozilla.com/D123928
2021-09-22 09:19:32 +00:00
Dragana Damjanovic df4152feaf Bug 1382886 - Make sure that nsHttpConnection immediately knows that the handshake is done. r=necko-reviewers,kershaw
Differential Revision: https://phabricator.services.mozilla.com/D123919
2021-09-22 09:19:31 +00:00
Dragana Damjanovic 985c02c2f1 Bug 1382886 - Use HandshakeDone to signal that a handshake is done r=necko-reviewers,keeler,kershaw
HandshakeDone will be called after a handshake is finished and also after the certificate verifications are done.
The code relies on HandshakeDone to signal that the handshake is done. When early-data is not available HandshakeDone is responsible for setting up a Http2 session if needed. There are 2 outcomes when early-data is used:
1) early-data is accepted and transaction continues polling for read,
2) early-data is rejected. In this case, the transaction is restarted as well as polling flags, i.e. the connection will stop polling for read and start polling for write.
Another difference is that a transaction that is started during the early-data period will behave as a normal transaction, i.e. it will write data and continue polling for read to receive response. The special cases during early-data(mWaitingFor0RTTResponse==true) are removed from nsHttpConnection::OnSocketWritable().

EnsureNPNComplete is only responsible for driving handshake and checking the early-data availability. All logic for finishing a handshake (i.e. checking whether early-data is accepted and checking alpn value) has been moved to HandshakeDone.
The patch also extracts FinishNPNSetup that is responsible for the bookkeeping after a handshake is done or fails, e.g. resetting transactions if 0Rtt is used but handshake fails, updating timings and sending telemetry.

HandshakeDone needs to be dispatched so that it is not called inside nss locks. The side effect of this is that nsHttpConnection::OnSocketWritable() may be called in between  HandshakeDone being dispatched and executed. Therefore we still need to keep CheckCanWrite0RTTData(). This can be fixed in a follow up patch.

Side cleanups:
Remove mNotTrustedMitmDetected - his was used for ESNI, but it is not used anymore

Differential Revision: https://phabricator.services.mozilla.com/D123824
2021-09-22 09:19:31 +00:00
Dragana Damjanovic 18800f98eb Bug 1382886 - Don’t use a special way to write 0RTT data. Reuse the standard code path r=necko-reviewers,kershaw
Differential Revision: https://phabricator.services.mozilla.com/D123680
2021-09-22 09:19:30 +00:00
Dragana Damjanovic c116b60b2c Bug 1382886 - Add a callback when the handshake is done. r=necko-reviewers,kershaw,keeler
Differential Revision: https://phabricator.services.mozilla.com/D123601
2021-09-22 09:19:30 +00:00
Dragana Damjanovic 96de623086 Bug 1382886 - Refactor EnsureNPNComplete r=necko-reviewers,kershaw
Extract Check0RttEnabled
The old code checks 0RTT state then does a DriveHandshake then checks 0RTT again. This is done in this way because before DriveHandshake is called for the first time 0RTT states are not set.  DriveHandshake is sometimes called as a side effect by IsAlive() check. The new code makes this less complex and just calls DriveHandshaek before checking 0RTT.
Extract code for setting 0RTT telemetry values.
Remove some code that set timing because the same code is called a bit later again.

Differential Revision: https://phabricator.services.mozilla.com/D123645
2021-09-22 09:19:29 +00:00
Narcis Beleuzu a2842d5f98 Merge autoland to mozilla-central. a=merge 2021-09-22 07:06:10 +03:00
Narcis Beleuzu a750766613 Backed out changeset da95455590d7 (bug 1475641) for marionette crashes on test_profile_management.py . CLOSED TREE 2021-09-22 01:19:18 +03:00
Kershaw Chang 72e0fa0067 Bug 1475641 - Move PAProxyAutoConfig to socket process, r=necko-reviewers,dragana
Differential Revision: https://phabricator.services.mozilla.com/D125855
2021-09-21 19:54:29 +00:00
Kershaw Chang 558cd8791f Bug 1715960 - Add a simple parity check to URLSegment, r=necko-reviewers,valentin
Differential Revision: https://phabricator.services.mozilla.com/D124748
2021-09-21 19:13:37 +00:00
Kershaw Chang 3ab686eb88 Bug 1730418 - Fetch HTTPS RR in nsHttpChannel::MaybeUseHTTPSRRForUpgrade, r=necko-reviewers,dragana
Before this patch, we fetch HTTPS RR in `nsHttpChannel::MaybeStartDNSPrefetch`, which is too early. It's possible that this http request is blocked by an extension but we still send the query for HTTPS RR.
To improve this, we move the time of fetching HTTPS RR a bit late.

Differential Revision: https://phabricator.services.mozilla.com/D125931
2021-09-21 08:58:24 +00:00
Christoph Kerschbaumer 502869a709 Bug 1731602: Update some tests within netwerk/ to work with https-first enabled r=necko-reviewers,dragana
Differential Revision: https://phabricator.services.mozilla.com/D126103
2021-09-20 14:30:47 +00:00
Kershaw Chang 0017d6ff11 Bug 1726528 - Make sure we don't fallback to a record without echConfig, r=necko-reviewers,dragana
Differential Revision: https://phabricator.services.mozilla.com/D125074
2021-09-20 14:24:15 +00:00
Kershaw Chang 21d1774ea9 Bug 1726528 - Add a pref to control whether to enable echConfig for http3, r=necko-reviewers,dragana
Differential Revision: https://phabricator.services.mozilla.com/D123125
2021-09-20 14:24:14 +00:00
Kershaw Chang 5ed5b6c43a Bug 1729431 - Use an enum as the index of connection info's hash key, r=necko-reviewers,valentin
Differential Revision: https://phabricator.services.mozilla.com/D124752
2021-09-20 14:02:49 +00:00
Kershaw Chang 3146e59eaf Bug 1667102 - Make sure nsHttpTransaction::mConnection is released on socket thread, r=necko-reviewers,dragana
Since `nsHttpTransaction::mConnection` could be `Http2Session` and `Http2Session` supports weak reference, we should make sure `Http2Session` to be always released on socket thread.

Differential Revision: https://phabricator.services.mozilla.com/D125510
2021-09-20 13:57:29 +00:00
Kershaw Chang f9ebc6ad69 Bug 1667102 - Add some diagnostic assertions, r=necko-reviewers,dragana
Differential Revision: https://phabricator.services.mozilla.com/D124753
2021-09-20 13:57:29 +00:00
Butkovits Atila e097708c27 Backed out 7 changesets (bug 1382886) for causing very frequent networking crashes. a=backout DONTBUILD
Backed out changeset e0d76ea1bdd2 (bug 1382886)
Backed out changeset 1db60c600b97 (bug 1382886)
Backed out changeset c922a30d444e (bug 1382886)
Backed out changeset 7f2260b49e60 (bug 1382886)
Backed out changeset 0c049a8ee4a8 (bug 1382886)
Backed out changeset 632eefa7e529 (bug 1382886)
Backed out changeset fe6b8f41ca83 (bug 1382886)
2021-09-18 12:37:24 +03:00
Marian-Vasile Laza 381c254e6d Backed out 3 changesets (bug 1487113) for causing hazard bustages. CLOSED TREE
Backed out changeset 13bf04fc644f (bug 1487113)
Backed out changeset 5b7fe5d564aa (bug 1487113)
Backed out changeset 02236ccd64b4 (bug 1487113)
2021-09-17 22:58:33 +03:00
Dragana Damjanovic 4bd11b491f Bug 1382886 - Fix fuzzing build, also we cannot set SecurityInfo during read r=necko-reviewers,kershaw
Before this bug TLS handshake was only driven by forcing writes. SecurtyInfo was set during a write code path. That is not anymore true and the TLS handshake can be driven by reading from a socket. That causes an issue where the SecurtyInfo was not set in case a TLS handshake fails. This bug added the setting of the SecurtyInfo to the read code path, but that causes problems when the transaction is closed due to corrupted response.
This patch fixes this by moving the setting of SecurtyInfo to Close() function.

Do not call HandshakeDoneInternal if the connection has been closed between posting the HandshakeDoneInternal runable and executing it.

Differential Revision: https://phabricator.services.mozilla.com/D125666
2021-09-17 13:19:02 +00:00
Dragana Damjanovic 99717c8156 Bug 1382886 - Remove a busy-wait if the early-data is negotiated and http/1.1 is used but the transaction cannot send early-data. r=necko-reviewers,kershaw
In this case necko should poll for read (not for write) and reset the poll flags when the handshake is done.
The other option is to inspect the resumption ticket before adding it to the nss socket and find out which alpn will be used and disable the early-data if the version is http/1.1 and the transaction cannot send early-data. This currently only works on Nightly. When we roll out the necko’s token cache we can consider making this change.

Additional changes:
Consolidate mEarlyDataNegotiated and mWaitingFor0RTTResponse into mEarlyDataState

Differential Revision: https://phabricator.services.mozilla.com/D123928
2021-09-17 13:19:02 +00:00
Dragana Damjanovic 3f98b48466 Bug 1382886 - Make sure that nsHttpConnection immediately knows that the handshake is done. r=necko-reviewers,kershaw
Differential Revision: https://phabricator.services.mozilla.com/D123919
2021-09-17 13:19:01 +00:00
Dragana Damjanovic 72ccc52dcc Bug 1382886 - Use HandshakeDone to signal that a handshake is done r=necko-reviewers,keeler,kershaw
HandshakeDone will be called after a handshake is finished and also after the certificate verifications are done.
The code relies on HandshakeDone to signal that the handshake is done. When early-data is not available HandshakeDone is responsible for setting up a Http2 session if needed. There are 2 outcomes when early-data is used:
1) early-data is accepted and transaction continues polling for read,
2) early-data is rejected. In this case, the transaction is restarted as well as polling flags, i.e. the connection will stop polling for read and start polling for write.
Another difference is that a transaction that is started during the early-data period will behave as a normal transaction, i.e. it will write data and continue polling for read to receive response. The special cases during early-data(mWaitingFor0RTTResponse==true) are removed from nsHttpConnection::OnSocketWritable().

EnsureNPNComplete is only responsible for driving handshake and checking the early-data availability. All logic for finishing a handshake (i.e. checking whether early-data is accepted and checking alpn value) has been moved to HandshakeDone.
The patch also extracts FinishNPNSetup that is responsible for the bookkeeping after a handshake is done or fails, e.g. resetting transactions if 0Rtt is used but handshake fails, updating timings and sending telemetry.

HandshakeDone needs to be dispatched so that it is not called inside nss locks. The side effect of this is that nsHttpConnection::OnSocketWritable() may be called in between  HandshakeDone being dispatched and executed. Therefore we still need to keep CheckCanWrite0RTTData(). This can be fixed in a follow up patch.

Side cleanups:
Remove mNotTrustedMitmDetected - his was used for ESNI, but it is not used anymore

Differential Revision: https://phabricator.services.mozilla.com/D123824
2021-09-17 13:19:01 +00:00
Dragana Damjanovic eebb396d61 Bug 1382886 - Don’t use a special way to write 0RTT data. Reuse the standard code path r=necko-reviewers,kershaw
Differential Revision: https://phabricator.services.mozilla.com/D123680
2021-09-17 13:19:01 +00:00
Dragana Damjanovic 1f0044c034 Bug 1382886 - Add a callback when the handshake is done. r=necko-reviewers,kershaw,keeler
Differential Revision: https://phabricator.services.mozilla.com/D123601
2021-09-17 13:19:00 +00:00
Dragana Damjanovic e5fd2cf6d3 Bug 1382886 - Refactor EnsureNPNComplete r=necko-reviewers,kershaw
Extract Check0RttEnabled
The old code checks 0RTT state then does a DriveHandshake then checks 0RTT again. This is done in this way because before DriveHandshake is called for the first time 0RTT states are not set.  DriveHandshake is sometimes called as a side effect by IsAlive() check. The new code makes this less complex and just calls DriveHandshaek before checking 0RTT.
Extract code for setting 0RTT telemetry values.
Remove some code that set timing because the same code is called a bit later again.

Differential Revision: https://phabricator.services.mozilla.com/D123645
2021-09-17 13:19:00 +00:00
Kershaw Chang 4fce4f4f6d Bug 1731030 - Check if the status code is NS_ERROR_OFFLINE, r=necko-reviewers,valentin
Differential Revision: https://phabricator.services.mozilla.com/D125809
2021-09-17 12:53:03 +00:00
Yury Delendik 19b0d24e7f Bug 1487113 - nsICacheInfoChannel.alternativeDataInputStream as attribute. r=necko-reviewers,valentin
Differential Revision: https://phabricator.services.mozilla.com/D117360
2021-09-17 12:16:23 +00:00
Valentin Gosu b6521a7e56 Bug 1724233 - Make sure to run ConvertUTF8toACE before ConvertToDisplayIDN r=necko-reviewers,dragana
Differential Revision: https://phabricator.services.mozilla.com/D122097
2021-09-16 11:27:34 +00:00
Valentin Gosu 72c414923b Bug 1730494 - Add error codes for COOP and COEP errors r=necko-reviewers,dragana
Differential Revision: https://phabricator.services.mozilla.com/D125671
2021-09-16 08:31:04 +00:00
Valentin Gosu 13ab902ec7 Bug 1730494 - Show error in webconsole when resource is blocked by CORP headers r=necko-reviewers,dragana
Differential Revision: https://phabricator.services.mozilla.com/D125392
2021-09-16 08:31:03 +00:00
Valentin Gosu c1f1effff8 Bug 1699373 - Call ProcessCrossOrigin*Header methods after loading cached headers r=necko-reviewers,dragana
Previously we called `ProcessCrossOriginEmbedderPolicy` in
`nsHttpChannel::ContinueProcessResponse1`, but we only loaded the cached
response headers in `ContinueProcessResponse3`, meaning that we incorrectly
reported a missing header for the revalidated resource.

This change moves the header checking calls to `ContinueProcessNormal` and
`AsyncProcessRedirection` instead, so they get executed after processing
the cached headers.

Differential Revision: https://phabricator.services.mozilla.com/D125184
2021-09-16 08:31:03 +00:00
Kershaw Chang 7bcfc2ecf8 Bug 1730983 - Notify the change of pref "network.disable-localhost-when-offline" to socket process, r=necko-reviewers,valentin
Differential Revision: https://phabricator.services.mozilla.com/D125759
2021-09-16 08:06:26 +00:00
Valentin Gosu 990245fb6a Bug 1729897 - CSP Upgrade-insecure-requests is upgrading localhost websocket r=necko-reviewers,dragana
Differential Revision: https://phabricator.services.mozilla.com/D125533
2021-09-15 11:28:13 +00:00
Jens Stutte 87de42e070 Bug 1726813: Ensure AppShutdown remains in sync with shutdown notifications in the parent process. r=xpcom-reviewers,nika,dom-worker-reviewers,asuth
The goal here is to ensure we can always rely on `AppShutdown::GetShutdownPhase` to be in sync with the "real" application status, mainly this was needed for xpcshell tests to not break if we add assertions on our shutdown state on some global singletons.

We keep the existing observer notification topics but force them (on the parent process) to be issued through the new `advanceShutdownPhase` function of the startup service using the `ShutdownPhase` enum. This way we can synchronize `AppShutdown`'s internal status accordingly.

Some further notes:

  # The `MOZ_ASSERT(AppShutdown::IsNoOrLegalShutdownTopic(aTopic));` in `NotifyObservers` helped a lot to identify missing cases. I think we should keep it in order to stay safe.
  # Introducing the `cenum IDLShutdownPhase` helps to keep the knowledge about the mapping from shutdown phases to observer topics exclusively inside AppShutdown.cpp. Still callers must know what they do in order to choose a proper phase, of course.
  # However we must be aware that `AppShutdown` this way can be kept in sync with the shutdown notifications only in the parent process and that `GetCurrentShutdownPhase` might not give the correct result in child processes. We might want to file a follow up bug that adds some asserts to avoid improper use of `AppShutdown` functions in child processes (but I do not want to make this patch bigger as needed to solve the blocking dependency for bug 1697972).
  # The socket process is one example of a child process that "overloads" shutdown topics. I was wondering if it is the right call to use the very same topic names here to request shutdown to the socket process or if it should have its own topics. Those topics triggered the assert and thus I had to disable it for child processes, for now.
  # This goes together with the more general approach to define process type specific shutdown phases (and hence mappings to topics) as drafted very roughly in bug 1697745.
  # This patch seemed to trigger a known intermittent more often, thus the change here in `ServiceWorkerManager`.

Differential Revision: https://phabricator.services.mozilla.com/D124350
2021-09-15 07:25:29 +00:00
Cristian Tuns f2f6eac4d6 Backed out 3 changesets (bug 1487113) for causing mochitest failures. CLOSED TREE
Backed out changeset b20e5d76c77e (bug 1487113)
Backed out changeset b0b2b27dcb68 (bug 1487113)
Backed out changeset 9214b396eb84 (bug 1487113)
2021-09-14 17:38:32 -04:00
Yury Delendik 0b78665a0e Bug 1487113 - nsICacheInfoChannel.alternativeDataInputStream as attribute. r=necko-reviewers,valentin
Differential Revision: https://phabricator.services.mozilla.com/D117360
2021-09-14 20:12:51 +00:00
Manuel Bucher ecf25dc8fa Bug 1730672 - Update neqo to 0.5.0 r=necko-reviewers,dragana
Differential Revision: https://phabricator.services.mozilla.com/D125528
2021-09-14 13:37:19 +00:00
Valentin Gosu 0500b123b6 Bug 1718267 - Flip network.cache.bug1708673 to false to fix browsertime regression r=necko-reviewers,kershaw
Differential Revision: https://phabricator.services.mozilla.com/D125398
2021-09-14 07:48:37 +00:00
Sandor Molnar c86cd1bc00 Backed out changeset 0568cca2f4bb (bug 1718267) for causing xpc failures in netwerk/test/unit/test_predictor. CLOSED TREE 2021-09-14 00:26:22 +03:00
Valentin Gosu 8000373ec5 Bug 1718267 - Flip network.cache.bug1708673 to false to fix browsertime regression r=necko-reviewers,kershaw
Differential Revision: https://phabricator.services.mozilla.com/D125398
2021-09-13 20:43:12 +00:00
Byron Campen b67cbe0b60 Bug 1702417: Test case for bug. r=freddyb,mixedpuppy,necko-reviewers
We add the new content policy here, but leave the behavior as TYPE_OTHER, so
we can verify that the new test fails before the fix is applied.

Differential Revision: https://phabricator.services.mozilla.com/D124965
2021-09-13 18:20:10 +00:00
ffxbld fb7c66cb59 No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D125385
2021-09-13 15:09:05 +00:00
Valentin Gosu a80ffb44aa Bug 1729717 - Remove unused nsDeleteDir helpers r=necko-reviewers,dragana
Differential Revision: https://phabricator.services.mozilla.com/D124925
2021-09-13 12:07:38 +00:00
Valentin Gosu e209403593 Bug 1729717 - Remove unused CleanupCacheDirectories r=necko-reviewers,dragana
This was used previously when switching between cache backend versions.

Differential Revision: https://phabricator.services.mozilla.com/D124922
2021-09-13 12:07:37 +00:00
Csoregi Natalia 2ecacd2e2d Backed out 2 changesets (bug 1729717) for causing assertion failures on CacheObserver.cpp. CLOSED TREE
Backed out changeset 7123efe825f0 (bug 1729717)
Backed out changeset 92e06bd625c9 (bug 1729717)
2021-09-13 12:40:11 +03:00
Valentin Gosu 4ee56c10e6 Bug 1729717 - Remove unused nsDeleteDir helpers r=necko-reviewers,dragana
Differential Revision: https://phabricator.services.mozilla.com/D124925
2021-09-13 09:12:35 +00:00
Valentin Gosu fc6cd46e34 Bug 1729717 - Remove unused CleanupCacheDirectories r=necko-reviewers,dragana
This was used previously when switching between cache backend versions.

Differential Revision: https://phabricator.services.mozilla.com/D124922
2021-09-13 09:12:34 +00:00
Mark Banner 14aedbb785 Bug 1729460 - Change users of defineLazyServiceGetter(s) to use Services.* where appropriate. r=mossop,webdriver-reviewers,extension-reviewers,whimboo,robwu
Differential Revision: https://phabricator.services.mozilla.com/D124838
2021-09-10 12:09:49 +00:00
Michelle Goossens d835eb1793 Bug 1727925 - Part 3: Migrate six more windows10-32 test suites from AWS to Azure r=jmaher
Differential Revision: https://phabricator.services.mozilla.com/D124192
2021-09-10 11:51:00 +00:00
Noemi Erli e0f4b9b5fe Backed out 2 changesets (bug 1729460) for causing newtab failures CLOSED TREE
Backed out changeset 5617839462be (bug 1729460)
Backed out changeset 6d52fde3ee0e (bug 1729460)
2021-09-10 13:14:12 +03:00
Mark Banner 3cfdb5c41a Bug 1729460 - Change users of defineLazyServiceGetter(s) to use Services.* where appropriate. r=mossop,webdriver-reviewers,extension-reviewers,whimboo,robwu
Differential Revision: https://phabricator.services.mozilla.com/D124838
2021-09-10 09:38:42 +00:00
Nicklas Boman ad454095ed Bug 1308103 - Replace PL_strcmp/PL_strncmp with strcmp/strncmp in netwerk/ r=necko-reviewers,valentin
Differential Revision: https://phabricator.services.mozilla.com/D123877
2021-09-09 19:36:10 +00:00
Byron Campen f48b2388ae Bug 1683417: Remove tsan suppression and fix race. r=ng,decoder
Also add a thread assertion.

Differential Revision: https://phabricator.services.mozilla.com/D124993
2021-09-09 17:13:36 +00:00
Benjamin Peterson 9253af4014 Bug 1729843 - Remove vestigial plugin-related code from nsWebNavigationInfo. r=smaug
Differential Revision: https://phabricator.services.mozilla.com/D125026
2021-09-09 15:03:05 +00:00
ffxbld a9b982bfec No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D125057
2021-09-09 14:38:12 +00:00
Kershaw Chang 1956da361f Bug 1725766 - Disallow view-source URI to open external apps, r=necko-reviewers,dragana,valentin
Differential Revision: https://phabricator.services.mozilla.com/D123825
2021-09-09 07:42:59 +00:00
Ben Hearsum 1ce8af6321 Bug 1714200: annotate remaining M1 test failures. r=jmaher,application-update-reviewers,bytesized DONTBUILD
Depends on D124907

Differential Revision: https://phabricator.services.mozilla.com/D124908
2021-09-08 18:14:01 +00:00
Nika Layzell 3211ad72e0 Bug 1723797 - Add a separate pref to control process isolation strategy when fission.autostart is enabled, r=farre,johannh,necko-reviewers,dragana
This new pref will be used on android to enable high-value-only process
isolation. An initial version of high-value-only process isolation is
also implemented in this bug, using the permission manager to track
whether a site is high-value due to having served a
`Cross-Origin-Opener-Policy` header.

Future high-value permissions due to things like logging into a site and
OAuth flows can be tracked in the same way, by adding the permission to
the permissions database.

In the future, it might be valuable to provide UI for visualizing what
sites are considered high-value at any point in time, but this works
fine for now.

Differential Revision: https://phabricator.services.mozilla.com/D123127
2021-09-08 17:45:31 +00:00
Nihanth Subramanya 1951210c53 Bug 1714182 - Don't fallback from DoH to native in cases of request failure. r=necko-reviewers,dragana
Differential Revision: https://phabricator.services.mozilla.com/D123908
2021-09-08 14:36:07 +00:00
Nihanth Subramanya 1f8ef93d7d Bug 1634246 - Add option to disallow connections to localhost while in offline mode. r=necko-reviewers,valentin
Differential Revision: https://phabricator.services.mozilla.com/D116466
2021-09-08 14:35:57 +00:00
Valentin Gosu 009064a050 Bug 1729497 - Return error code in nsHttpChannelAuthProvider::GetAuthenticator if we return a null authenticator r=necko-reviewers,kershaw
This can happen during shutdown, when in `nsHttpNegotiateAuth::GetOrCreate()`
we assign `gSingleton` to a `new nsHttpNegotiateAuth` object but then it gets
cleared immediately by `mozilla::ClearOnShutdown` because we're already
shutting down.

Differential Revision: https://phabricator.services.mozilla.com/D124893
2021-09-08 09:40:33 +00:00
Benjamin Peterson 634755298f Bug 1729609 - Fix typo in Http2Session.cpp comment. r=necko-reviewers,valentin DONTBUILD
Differential Revision: https://phabricator.services.mozilla.com/D124873
2021-09-08 08:00:16 +00:00
Anny Gakhokidze dc3f1b9721 Bug 1720958 - Fix DocumentLoadListener leak that occurs when browser.tabs.documentchannel.parent-controlled is enabled, r=nika
Without the pref enabled, DocumentLoadListener is destroyed when
DocumentChannelParent is destroyed. With the pref enabled, we create
DocumentLoadListener when we are trying to do a parent controlled navigation,
but it does not get destroyed anywhere. To do that, we can disconnect the
DLL listeners before we trigger redirection to the real channel and resume the
load.

Differential Revision: https://phabricator.services.mozilla.com/D122131
2021-09-07 23:32:20 +00:00
Kershaw Chang 5ea2a6408c Bug 1716566 - Make websocket work when socket process is enabled, r=necko-reviewers,dragana
Differential Revision: https://phabricator.services.mozilla.com/D123108
2021-09-07 14:42:44 +00:00
ffxbld a166f59fba No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D124611
2021-09-07 14:25:19 +00:00
Florian Quèze 919114028c Bug 1729285 - move the nsIncrementalDownload nsITimerCallback implementation to a nested subclass to avoid a conflict between the nsINamed and nsIRequest interfaces, r=necko-reviewers,kershaw
Depends on D124619

Differential Revision: https://phabricator.services.mozilla.com/D124696
2021-09-07 08:01:19 +00:00
Florian Quèze ba40523537 Bug 1728760 - move the nsHttpChannel nsITimerCallback implementation to a nested subclass to avoid issues when an object implements both nsIChannel and nsIRequest, r=smaug,necko-reviewers,kershaw.
Differential Revision: https://phabricator.services.mozilla.com/D124385
2021-09-07 08:01:18 +00:00
Florian Quèze 998adb18ea Bug 1728760 - require all nsITimerCallback native implementations to also implement nsINamed, r=smaug.
Differential Revision: https://phabricator.services.mozilla.com/D124349
2021-09-07 08:01:18 +00:00
Mark Banner 30f1b8637e Bug 1602940 - Manual fixes to fix issues in files. r=Gijs,necko-reviewers,rpl,kershaw
Depends on D124392

Differential Revision: https://phabricator.services.mozilla.com/D124393
2021-09-06 09:53:52 +00:00
Mark Banner 11bfa90d06 Bug 1602940 - Automated replacements to use Services.uuid. r=Gijs,necko-reviewers,preferences-reviewers,kershaw
Depends on D124391

Differential Revision: https://phabricator.services.mozilla.com/D124392
2021-09-06 09:53:52 +00:00
Jan Varga d730017508 Bug 1722668 - Expose nsFileStream via the component manager; r=necko-reviewers,dragana,jari
Differential Revision: https://phabricator.services.mozilla.com/D123773
2021-09-04 21:54:53 +00:00
Csoregi Natalia 03b44ad93d Backed out 3 changesets (bug 1722668) for failures on test_unsetLastAccessTime.js. CLOSED TREE
Backed out changeset db05822c64ff (bug 1722668)
Backed out changeset c9f100cb3f86 (bug 1722668)
Backed out changeset a7179b67eb1a (bug 1722668)
2021-09-05 00:22:49 +03:00
Jan Varga 1e06353298 Bug 1722668 - Expose nsFileStream via the component manager; r=necko-reviewers,dragana,jari
Differential Revision: https://phabricator.services.mozilla.com/D123773
2021-09-04 20:10:12 +00:00
Kershaw Chang 95f5b8933d Bug 1727173 - Make h3/h2 excluded list synced between socket process and parent process, r=necko-reviewers,dragana
Differential Revision: https://phabricator.services.mozilla.com/D123376
2021-09-03 20:14:39 +00:00
Nika Layzell c525c65ff8 Bug 1722880 - Part 1: Add IsInBFCache to WindowContext, and make it non-SHIP compatible, r=smaug,necko-reviewers,dragana
This field will be useful to JS code such as JSWindowActors which need to be
able to detect when their WindowContext is no longer active.

Differential Revision: https://phabricator.services.mozilla.com/D124098
2021-09-03 15:26:13 +00:00
Dragana Damjanovic 0a98b4c4a4 Bug 1728735 - Neqo version 0.4.32 r=necko-reviewers,kershaw
Differential Revision: https://phabricator.services.mozilla.com/D124320
2021-09-02 21:28:15 +00:00
Nika Layzell abb857c80a Bug 1709421 - Abort generating partial digest of existing file when download is cancelled, r=necko-reviewers,dragana
There were a number of crashes caused due to a hang on a background
TaskQueue, and in many of these bugs there was a read from
BackgroundFileSaver on the stack. It appears that we are stuck in this
loop late in shutdown, when we are attempting to shut down TaskQueues
and XPCOM threads.

I'm unsure if we would cancel these requests already, however I noticed
that we wouldn't abort this read even if we did. This change now
performs a check to see if the BackgroundFileSaver has errored between
each read, which should cause aborts to also abort this loop, and
hopefully avoid potential shutdown hangs.

Differential Revision: https://phabricator.services.mozilla.com/D124123
2021-09-02 14:07:29 +00:00
Marian-Vasile Laza c6b30230dd Backed out changeset f4a35daa5ed7 for causing build bustages. CLOSED TREE 2021-09-02 16:17:10 +03:00
ffxbld 2102d03a39 No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D124331
2021-09-02 12:55:49 +00:00
Kershaw Chang 76f640ee76 Bug 1728073 - Don't stop parsing if we encountered an error, r=necko-reviewers,dragana
Differential Revision: https://phabricator.services.mozilla.com/D124191
2021-09-02 08:20:03 +00:00
Agi Sferro 52b49a2dbe Bug 1676216 - Remove unused checkbox on promptAuth and similar. r=dimi,owlish,necko-reviewers,kershaw
The checkbox is never actually displayed (I think) so we don't need any of this
code.

Differential Revision: https://phabricator.services.mozilla.com/D122502
2021-09-01 23:42:25 +00:00
Dragana Damjanovic 9c5412108c Bug 1718719 - Disable the TLS early-data if proxy is use r=necko-reviewers,keeler,kershaw
Currently we do not use the early-data when a proxy is used, but we do not disable it in the nss layer.

Differential Revision: https://phabricator.services.mozilla.com/D123492
2021-09-01 19:57:10 +00:00
Iulian Moraru 0672e33a18 Backed out 8 changesets (bug 1676216, bug 1710668) for causing build bustages. CLOSED TREE
Backed out changeset b18aea9590ee (bug 1676216)
Backed out changeset bb5fc7f9df83 (bug 1676216)
Backed out changeset dfc0ce411a75 (bug 1676216)
Backed out changeset d83b518be746 (bug 1676216)
Backed out changeset a7c71027c898 (bug 1676216)
Backed out changeset 41fee786f8ec (bug 1676216)
Backed out changeset 86546e1132f5 (bug 1710668)
Backed out changeset 8e3d053f5f55 (bug 1710668)
2021-09-01 21:57:28 +03:00
Agi Sferro 22c6b5887b Bug 1676216 - Remove unused checkbox on promptAuth and similar. r=dimi,owlish,necko-reviewers,kershaw
The checkbox is never actually displayed (I think) so we don't need any of this
code.

Differential Revision: https://phabricator.services.mozilla.com/D122502
2021-09-01 17:19:41 +00:00
Sandor Molnar 1a9baf6591 Backed out changeset 028b3aadad28 (bug 1718719) for causing bustages in build fuzzing. CLOSED TREE 2021-09-01 17:46:12 +03:00
Dragana Damjanovic 75908ae9b0 Bug 1718719 - Disable the TLS early-data if proxy is use r=necko-reviewers,keeler,kershaw
Currently we do not use the early-data when a proxy is used, but we do not disable it in the nss layer.

Differential Revision: https://phabricator.services.mozilla.com/D123492
2021-09-01 13:05:12 +00:00
Csoregi Natalia 839df28cb3 Backed out changeset 509bc61da667 (bug 1725766) for failures on test_bug1725766.js. CLOSED TREE 2021-08-31 14:16:05 +03:00
Kershaw Chang 0ae88a030e Bug 1725766 - Disallow view-source URI to open external apps, r=necko-reviewers,dragana
Differential Revision: https://phabricator.services.mozilla.com/D123825
2021-08-31 10:14:56 +00:00
Dragana Damjanovic 38fd6ab7be Bug 1728268 - Update neqo to 0.4.31 r=necko-reviewers,kershaw
Differential Revision: https://phabricator.services.mozilla.com/D124012
2021-08-31 08:50:59 +00:00
Paul Zuehlcke 518d5ded96 Bug 1683165 - Add a pref to control anti-tracking webcompat features. r=timhuang,twisniewski,webcompat-reviewers,dimi
Differential Revision: https://phabricator.services.mozilla.com/D123614
2021-08-26 15:13:10 +00:00
Andi-Bogdan Postelnicu 2fc4f70e9b Bug 1725145 - Preparation for the hybrid build env. r=necko-reviewers,firefox-build-system-reviewers,valentin,glandium
Automatically generated path that adds flag `REQUIRES_UNIFIED_BUILD = True` to `moz.build`
when the module governed by the build config file is not buildable outside on the unified environment.

This needs to be done in order to have a hybrid build system that adds the possibility of combing
unified build components with ones that are built outside of the unified eco system.

Differential Revision: https://phabricator.services.mozilla.com/D122345
2021-08-25 10:46:17 +00:00