Граф коммитов

4311 Коммитов

Автор SHA1 Сообщение Дата
Valentin Gosu 13ceec29f2 Bug 1303762 - Add UI to about:networking to turn on logging modules at runtime r=jaws,mcmanus 2016-09-29 12:03:49 -07:00
Wes Kocher 3209051dbb Backed out changeset e4508f246a86 (bug 1303762) for failures in browser_misused_characters_in_strings.js a=backout 2016-09-29 12:01:03 -07:00
Andrew Osmond 7c53a79c5a Bug 1275464 - Part 2. Move socket transport service thread shutdown to xpcom-shutdown-threads. r=dragana 2016-09-19 13:29:59 -04:00
Valentin Gosu 86d5a04ef7 Bug 1303762 - Add UI to about:networking to turn on logging modules at runtime r=jaws,mcmanus 2016-09-29 17:00:21 +02:00
Josh Matthews ee8da66177 Bug 1294450 - Make AutoIPCStream favour PSendStream for large input streams. r=nfroydj 2016-09-29 06:20:00 +02:00
Wes Kocher 673a0db365 Backed out changeset 57e78c503c4e (bug 1294450) for build bustage a=backout 2016-09-28 17:38:00 -07:00
Josh Matthews facc06fda2 Bug 1294450 - Make AutoIPCStream favour PSendStream for large input streams. r=froydnj
--HG--
extra : rebase_source : 764aa593bd2734ca15d556a0b5ca55e3f69d25bb
2016-09-28 18:38:51 -04:00
Carsten "Tomcat" Book 572e74ee99 merge mozilla-inbound to mozilla-central a=merge 2016-09-28 15:56:33 +02:00
James Andreou a47ce92ac2 Bug 1282124 - Remove nsILoadInfo.usePrivateBrowsing and the SEC_FORCE_PRIVATE_BROWSING flag; r=smaug,jryans 2016-09-27 16:56:44 -04:00
Kate McKinley c57d400961 Bug 1246540 - HSTS Priming Proof of Concept. r=ckerschb, r=mayhemer, r=jld, r=smaug, r=dkeeler, r=jmaher, p=ally
HSTS priming changes the order of mixed-content blocking and HSTS
upgrades, and adds a priming request to check if a mixed-content load is
accesible over HTTPS and the server supports upgrading via the
Strict-Transport-Security header.

Every call site that uses AsyncOpen2 passes through the mixed-content
blocker, and has a LoadInfo. If the mixed-content blocker marks the load as
needing HSTS priming, nsHttpChannel will build and send an HSTS priming
request on the same URI with the scheme upgraded to HTTPS. If the server
allows the upgrade, then channel performs an internal redirect to the HTTPS URI,
otherwise use the result of mixed-content blocker to allow or block the
load.

nsISiteSecurityService adds an optional boolean out parameter to
determine if the HSTS state is already cached for negative assertions.
If the host has been probed within the previous 24 hours, no HSTS
priming check will be sent.

MozReview-Commit-ID: ES1JruCtDdX

--HG--
extra : rebase_source : 2ac6c93c49f2862fc0b9e595eb0598cd1ea4bedf
2016-09-27 11:27:00 -04:00
Sergei Chernov 976d5c3f1d Bug 1293231 - Certificate Transparency - basic telemetry reports; r=Cykesiopka,keeler
MozReview-Commit-ID: EGvuZADObJo

--HG--
extra : rebase_source : 9a059c9f8e2fdf9bfc693b0b5649808b1beeb67b
2016-08-11 13:41:50 +03:00
Iris Hsiao 767e1e9b11 merge mozilla-inbound to mozilla-central a=merge 2016-09-26 18:34:20 +08:00
Thomas Nguyen 8c6badef26 Bug 1276836 - Implement same-origin, strict-origin, strict-origin-when-cross-origin referrer policy. r=mcmanus,jdm
MozReview-Commit-ID: 39AFT4RgHpl

--HG--
extra : rebase_source : 1512555cb0da30a0fbbfd58c27e4a4d48a93586e
2016-09-22 16:27:42 -07:00
Kate McKinley ed0b5f06ee Bug 1271796 use raw bytes to calculate SRI hash r=francois
MozReview-Commit-ID: F62t5CnsYlJ

--HG--
extra : rebase_source : 9c2148ffe99a51db5541ec6d9961597b578157ae
2016-09-05 12:55:25 +02:00
Carsten "Tomcat" Book d25a5baeb8 merge mozilla-inbound to mozilla-central a=merge 2016-09-22 11:55:12 +02:00
Eric Faust 121151ec67 Bug 1263595 - Avoid deadlock between the JIT and the gecko profiler on win64. (r=froydnj) 2016-09-15 21:35:14 -07:00
David Keeler b1cb7643ef bug 1302140 - add policy to disable SHA-1 except for certificates issued by non-built-in CAs r=jcj,rbarnes
MozReview-Commit-ID: 2uwHPxk0VhZ

--HG--
extra : rebase_source : 1c7b5d2559139fa8286342decf4e4f7c83317e29
2016-09-14 15:11:15 -07:00
Daniel Stenberg 9df1623b92 Bug 1255474 - Cut off path from URLs passed to PAC scripts. r=mcmanus 2016-09-20 21:42:52 -04:00
Sebastian Hengst d8888f81d1 Backed out changeset 2df66e8b7411 (bug 1302140) for Windows build bustage in CertVerifier.cpp. r=backout on a CLOSED TREE 2016-09-21 20:47:08 +02:00
David Keeler d374bc442a bug 1302140 - add policy to disable SHA-1 except for certificates issued by non-built-in CAs r=jcj,rbarnes
MozReview-Commit-ID: 2uwHPxk0VhZ

--HG--
extra : rebase_source : 5b1342abc2eb260ec91464b3a1d331baf8968460
2016-09-14 15:11:15 -07:00
Valentin Gosu 76d2cd8b5d Bug 1231565 - (Part 2) Allow storing alternate data in the HTTP cache r=honzab
* Add PAltDataOutputStream.ipdl to be able to open an OutputStream to the cache entry in the child process
* AltDataOutputStreamChild/Parent are Main Thread only for now.
* Adds methods for reading and writing alt-data to nsICacheInfoChannel.idl
* Keep a ref of the cache entry after OnStopRequest in case the consumer tries to open the alt-data output stream

MozReview-Commit-ID: jlraDI97Hg
2016-04-11 05:17:02 +02:00
Christoph Kerschbaumer 8500d497a7 Bug 1297338 - Extend LoadInfo with a PrincipalToInherit member. r=bz 2016-09-20 08:35:45 +02:00
Christoph Kerschbaumer e822f3e9cc Bug 1291458 - Update documentation for nsILoadInfo. r=tanvi 2016-09-20 08:34:40 +02:00
Nicholas Hurley cb87df446e Bug 1302843 - Don't UpdateCacheabilityInternal if not enabled/initialized. r=mayhemer
MozReview-Commit-ID: HzSu0TM14R2

--HG--
extra : rebase_source : 6eea321f0c1b4e5f0e3216c6a952944afcb14f1f
2016-09-09 16:25:07 -07:00
Manish Goregaokar 65e072aa45 Bug 1301621 - Parse URL ports as 16 bit; r=valentin
MozReview-Commit-ID: 5FbRUsYzJdy

--HG--
extra : rebase_source : dba9575a3d3a56560f39a81c6a3431da4e21f3e9
2016-09-09 15:42:42 +08:00
Carsten "Tomcat" Book d63d14dfed Backed out changeset fc9963bf6d98 (bug 1301621) for xpcshell bustage 2016-09-14 12:28:50 +02:00
Carsten "Tomcat" Book 6520e60ddb Merge mozilla-central to autoland 2016-09-14 12:17:20 +02:00
Thomas Wisniewski 0748df2882 Bug 1302312 - Treat URLs with username or password but no host info as malformed. r=valentin
--HG--
extra : rebase_source : 24fdcd9682cbcc3bb6850bf7708ea859264f4661
2016-09-13 12:47:16 -04:00
Dragana Damjanovic 3432aadb24 Bug 1294032 - Fix poll hang - on shutdown hang in poll post event multiple times. r=mcmanus
--HG--
extra : rebase_source : 1d56be9b3d04bb3cf6fcb1151aa4e2cfc26ffeee
2016-09-13 04:43:00 -04:00
Manish Goregaokar ce7df594c1 Bug 1301621 - Parse URL ports as 16 bit; r=valentin
MozReview-Commit-ID: 5FbRUsYzJdy

--HG--
extra : rebase_source : 4274433be9e6c7f76909e22dc79f7a2a41e5f455
2016-09-09 15:42:42 +08:00
Kannan Vijayan e40b66af93 Bug 1296464 - Part 1 - Add init2 method to nsIUDPSocket to allow opening sockets on specific IPs. r=hurley 2016-09-13 11:16:22 -04:00
Julian Seward 7c7afaaa0a Bug 1296716 - Uninitialised value uses somehow relating to nsSocketTransportService::AnalyzeConnection. r=valentin.gosu@gmail.com. 2016-09-10 08:16:14 +02:00
Carsten "Tomcat" Book 0f2c669a48 merge mozilla-inbound to mozilla-central a=merge 2016-09-09 12:02:43 +02:00
Junior Hsu b552a263d3 Bug 1301344 - Bail out from canonicalizing IPv4 first. r=valentin 2016-09-08 02:59:00 -04:00
Nicholas Nethercote 37301e25ad Bug 1297300 - Add missing checks to GetSpec() calls in netwerk/. r=hurley,dragana.
--HG--
extra : rebase_source : 961a82fb6e723688837e5250f57121c14ca958cb
2016-08-26 16:40:57 +10:00
Cykesiopka 80c7f24081 Bug 1274135 - Replace char_ptr_cast() and uint8_t_ptr_cast() with mozilla::BitwiseCast. r=keeler,valentin
The functions aren't necessary now that we have BitwiseCast.

MozReview-Commit-ID: 2nzOuwAop4Y

--HG--
extra : rebase_source : 0cb2c16f484a81b2e77384564973b58ac2d10fb9
2016-09-08 20:46:26 +08:00
Ryan VanderMeulen 57d3c61d9b Backed out changeset db5d2a3899c0 (bug 1274135) for bustage. 2016-09-07 20:52:18 -04:00
Cykesiopka 0193f94d53 Bug 1274135 - Replace char_ptr_cast() and uint8_t_ptr_cast() with mozilla::BitwiseCast. r=keeler,valentin
The functions aren't necessary now that we have BitwiseCast.

MozReview-Commit-ID: 2nzOuwAop4Y

--HG--
extra : rebase_source : 196449249eec75b8eb10e59662231c3f4e83c268
2016-09-01 15:58:51 +08:00
Carsten "Tomcat" Book 1c61ba654e merge mozilla-inbound to mozilla-central a=merge 2016-09-07 17:20:12 +02:00
Nicholas Hurley e2ec095399 Bug 1295565 - Don't create URIs if we don't have to. r=mayhemer
MozReview-Commit-ID: 86tc52aqBH2

--HG--
extra : rebase_source : 2e538ab8fff3831b763c79fbb379a3a84e2c4e7f
2016-08-16 13:41:15 -07:00
Boris Zbarsky 8ff5499fbb Bug 1292159. Be more careful about removing the inherit principal bit on base channel redirects. r=ckerschb 2016-09-02 17:55:38 -04:00
Nicholas Nethercote 34dcc7b852 Bug 1299384 - Use MOZ_MUST_USE with NS_warn_if_impl(). r=erahm.
This change avoids lots of false positives for Coverity's CHECKED_RETURN
warning, caused by NS_WARN_IF's current use in both statement-style and
expression-style.

In the case where the code within the NS_WARN_IF has side-effects, I made the
following change.

> NS_WARN_IF(NS_FAILED(FunctionWithSideEffects()));
> -->
> Unused << NS_WARN_IF(NS_FAILED(FunctionWithSideEffects()));

In the case where the code within the NS_WARN_IF lacks side-effects, I made the
following change.

> NS_WARN_IF(!condWithoutSideEffects);
> -->
> NS_WARNING_ASSERTION(condWithoutSideEffects, "msg");

This has two improvements.
- The condition is not evaluated in non-debug builds.
- The sense of the condition is inverted to the familiar "this condition should
  be true" sense used in assertions.

A common variation on the side-effect-free case is the following.

> nsresult rv = Fn();
> NS_WARN_IF_(NS_FAILED(rv));
> -->
> DebugOnly<nsresult rv> = Fn();
> NS_WARNING_ASSERTION(NS_SUCCEEDED(rv), "Fn failed");

--HG--
extra : rebase_source : 58788245021096efa8372a9dc1d597a611d45611
2016-09-02 17:12:24 +10:00
Josh Matthews ee501c8947 Bug 1167730 - Make nsTemporaryFileStream serializable. r=baku 2016-09-23 10:34:42 -04:00
Nicholas Hurley 1e782edab3 Bug 1304387 - Re-enable predictor prefetch r=mayhemer
MozReview-Commit-ID: 7NL5YWbg4gO
2016-09-23 12:33:43 -07:00
Andrea Marchesini c4fc186821 Bug 1293949 - nsFileInputStream must do the pending open step before been serialized, r=mayhemer 2016-09-23 15:29:05 +02:00
Nicholas Nethercote b71747b2ac Bug 1299727 - Rename NS_WARN_IF_FALSE as NS_WARNING_ASSERTION. r=erahm.
The new name makes the sense of the condition much clearer. E.g. compare:

  NS_WARN_IF_FALSE(!rv.Failed());

with:

  NS_WARNING_ASSERTION(!rv.Failed());

The new name also makes it clearer that it only has effect in debug builds,
because that's standard for assertions.

--HG--
extra : rebase_source : 886e57a9e433e0cb6ed635cc075b34b7ebf81853
2016-09-01 15:01:16 +10:00
Nicholas Nethercote c94421bf7c Bug 1297961 (part 2) - Use nsIURI::GetSpecOrDefault() for comparisons to fixed URIs. r=hurley.
--HG--
extra : rebase_source : c742ded3ca4ff6ddf745cf8d720261624f172027
2016-08-26 16:02:32 +10:00
Nicholas Nethercote 742fc7eb48 Bug 1297961 (part 1) - Introduce nsURI::GetSpecOrDefault(). r=hurley.
This function is an infallible alternative to nsIURI::GetSpec(). It's useful
when it's appropriate to handle a GetSpec() failure with a failure string, e.g.
for log/warning/error messages. It allows code like this:

  nsAutoCString spec;
  uri->GetSpec(spec);
  printf("uri: %s", spec.get());

to be changed to this:

  printf("uri: %s", uri->GetSpecOrDefault().get());

This introduces a slight behavioural change. Previously, if GetSpec() failed,
an empty string would be used here. Now, "[nsIURI::GetSpec failed]" will be
produced instead. In most cases this failure string will make for a clearer
log/warning/error message than the empty string.
* * *
Bug 1297961 (part 1b) - More GetSpecOrDefault() additions. r=hurley.

I will fold this into part 1 before landing.

--HG--
extra : rebase_source : ddc19a5624354ac098be019ca13cc24b99b80ddc
2016-08-26 16:02:31 +10:00
Jinank Jain 17c45acab3 Bug 712936 - Convert users of PR_STATIC_ASSERT to C++11 static_assert(). r=Ms2ger 2016-08-26 11:40:16 -04:00
Makoto Kato ec124dbfbd Bug 1299054 - Remove old Android support (API level < 15) from Gecko. r=snorp
MozReview-Commit-ID: K32YSqGsLf9

--HG--
extra : rebase_source : be0d3b3fc1146234efc75229171ea61258c46492
2016-08-30 14:11:55 +09:00