Граф коммитов

17192 Коммитов

Автор SHA1 Сообщение Дата
Kershaw Chang 9c911c6c2f Bug 1451293 - P2: Call SetConnRefTaken r=michal
In part1 patch[1], nsHttpTransaction::GetConnectionReference is removed in order to make sure single thread access to nsHttpTransaction::mConnection. Since we called mH2WSTransaction->SetConnRefTaken in nsHttpTransaction::GetConnectionReference, we need to find a new place to do this.
This patch adds a new function nsHttpTransaction::SetH2WSConnRefTaken to call mH2WSTransaction->SetConnRefTaken.



[1]  https://phabricator.services.mozilla.com/D17221

Differential Revision: https://phabricator.services.mozilla.com/D17853

--HG--
extra : moz-landing-system : lando
2019-02-04 08:42:11 +00:00
Kershaw Chang a9a7383ac8 Bug 1451293 - single thread access to ConnectionHandle::mConn r=mayhemer
The goal of this patch is to make sure single thread access to ConnectionHandle::mConn.
It contains:
- Remove nsHttpTransaction::GetConnectionReference()
- For the cases where we need the sticky connection, save the reference of the sticky connection's transaction instead. Then, the sticky connection will be extracted in socket thread and set it to the new transaction.

Differential Revision: https://phabricator.services.mozilla.com/D17221

--HG--
extra : moz-landing-system : lando
2019-02-04 08:42:09 +00:00
Mike de Boer 481ae95c00 Bug 1524593 - nsISearchService (aka nsIBrowserSearchService, previously) refactor to be mostly an asynchronous, in preparation of WebExtension engines. r=daleharvey
This is a rollup of all the patches that have landed on the cedar project branch:

891252fdd0
Bug 1492475 - Part 1: Migrate most, if not all nsSearchService consumers to use async APIs. r=florian

79b2eb2367
Bug 1492475 - Part 2: Move nsIBrowserSearchService.idl to toolkit/components/search/nsISearchService.idl and update references. r=florian

a947d3cdf0
Bug 1492475 - Part 3: The search service init() method should simply return a Promise. r=florian

c1e172dfac
Bug 1492475 - Part 4: Remove the synchronous initialization flow. r=florian

cd41189eac
Bug 1492475 - Part 5: Since async initialization of the search service now is implicit behavior, remove the distinctive verbiage used internally. r=florian

2ae7189dfa
Bug 1492475 - Part 6: Update the cache build task to work with an actual Promise and re-initialize only once at the same time - all to fix race conditions here. r=florian

c8ee92973f
Bug 1492475 - Part 7: Make the region fetch not block the init flow, to ensure it's as fast as possible. r=florian

c44e674e16
Bug 1492475 - Part 8: Introduce an init flag, which can only be used privately, that allows to explicitly skip waiting for the region check process to complete. r=florian

6c79eaf1d3
Bug 1492475 - Part 9: Update unit tests to stop using 'currentEngine', in favor of 'defaultEngine'. r=Standard8

21b3aa17ee
Bug 1492475 - Part 10: Update unit tests to be fully aware of the new, async signatures of the search service API and remove sync init flow tests. r=mkaply,florian

ce5ba69019
Bug 1492475 - Part 11: Repair incorrect usage of the `identifier` property of nsISearchEngine instances. r=florian

fd177a7994
Bug 1518543 - Fix up the Android (Fennec) nsISearchService shim to work with the new asynchronous API. r=florian

3653d8ee22
Bug 1523708 - Change the search service interaction in the show-heartbeat action to use the new async API. r=florian

Differential Revision: https://phabricator.services.mozilla.com/D18355

--HG--
rename : netwerk/base/nsIBrowserSearchService.idl => toolkit/components/search/nsISearchService.idl
extra : moz-landing-system : lando
2019-02-02 11:27:21 +00:00
Kershaw Chang 3f231d0bbe Bug 1500710 - Add default MIME type definition for .wasm as 'application/wasm' r=bzbarsky
Add {"application/wasm", "wasm"} mapping in extraMimeEntries

Differential Revision: https://phabricator.services.mozilla.com/D18189

--HG--
extra : moz-landing-system : lando
2019-02-01 22:16:17 +00:00
Andrea Marchesini 94c935a73f Bug 1524262 - URL-Classifier should not check all the blacklist tables always, r=dimi
Differential Revision: https://phabricator.services.mozilla.com/D18218

--HG--
extra : moz-landing-system : lando
2019-01-31 15:15:03 +00:00
Dragana Damjanovic 4aa2cbebc3 Bug 1523427 - Check whether we really have a response for a upgrade request before making a connection DontReuse. r=michal
Differential Revision: https://phabricator.services.mozilla.com/D18202

--HG--
extra : moz-landing-system : lando
2019-01-31 15:09:01 +00:00
ffxbld b0ca3a2b01 No Bug, mozilla-central repo-update HSTS HPKP blocklist remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D18207

--HG--
extra : moz-landing-system : lando
2019-01-31 13:34:21 +00:00
Tom Schuster 93f896affe Bug 1514680 - Strictly enforce the MIME type of scripts loaded by importScripts(). r=dveditz
Differential Revision: https://phabricator.services.mozilla.com/D16730

--HG--
extra : moz-landing-system : lando
2019-01-30 22:21:26 +00:00
Andrea Marchesini 506304e224 Bug 1522210 - Fingerprinting and cryptomining classifiers must have separate nsIWebProgressListener blocking state codes - part 7 - cryptomining, r=ehsan,johannh
Differential Revision: https://phabricator.services.mozilla.com/D17641
2019-01-30 14:01:51 +01:00
Andrea Marchesini 5a909353eb Bug 1522210 - Fingerprinting and cryptomining classifiers must have separate nsIWebProgressListener blocking state codes - part 6 - fingerprinting, r=ehsan,johannh
Differential Revision: https://phabricator.services.mozilla.com/D17640
2019-01-30 14:01:05 +01:00
Andrea Marchesini e9ac7d9ef2 Bug 1522210 - Fingerprinting and cryptomining classifiers must have separate nsIWebProgressListener blocking state codes - part 5 - generalize content blocking notification, r=ehsan
Differential Revision: https://phabricator.services.mozilla.com/D17838
2019-01-28 16:44:38 +01:00
Andrea Marchesini bf8c0e40e2 Bug 1522210 - Fingerprinting and cryptomining classifiers must have separate nsIWebProgressListener blocking state codes - part 4 - abstract blocking state codes, r=ehsan
Differential Revision: https://phabricator.services.mozilla.com/D17639
2019-01-28 16:43:15 +01:00
Andrea Marchesini ef89767387 Bug 1522210 - Fingerprinting and cryptomining classifiers must have separate nsIWebProgressListener blocking state codes - part 3 - Canceling nsIChannel with error code, r=ehsan
Differential Revision: https://phabricator.services.mozilla.com/D17638
2019-01-25 14:50:26 +01:00
Andrea Marchesini 3386d20a2c Bug 1522210 - Fingerprinting and cryptomining classifiers must have separate nsIWebProgressListener blocking state codes - part 2 - rename variables in nsHttpChannel, r=ehsan
Differential Revision: https://phabricator.services.mozilla.com/D17664
2019-01-30 13:50:04 +01:00
Andrea Marchesini 43a5f36077 Bug 1522210 - Fingerprinting and cryptomining classifiers must have separate nsIWebProgressListener blocking state codes - part 1 - UrlClassifierFeatureFactory::IsClassifierBlockingErrorCode, r=ehsan
Differential Revision: https://phabricator.services.mozilla.com/D17637
2019-01-30 13:43:34 +01:00
Myk Melez 25349d2601 Bug 1518283 - prohibit blank lines at the beginning and end of blocks (eslint padded-blocks) r=mossop,Standard8
Differential Revision: https://phabricator.services.mozilla.com/D17526

--HG--
extra : moz-landing-system : lando
2019-01-30 17:26:25 +00:00
Gijs Kruitbosch ace4e930e1 Bug 1523249, r=valentin
Differential Revision: https://phabricator.services.mozilla.com/D17965

--HG--
extra : moz-landing-system : lando
2019-01-30 11:39:42 +00:00
shindli 011ea038cb Merge mozilla-central to inbound. a=merge CLOSED TREE 2019-01-29 23:54:31 +02:00
shindli d5c5369355 Merge inbound to mozilla-central. a=merge 2019-01-29 23:37:33 +02:00
Andrea Marchesini 79ddbe6541 Bug 1522265 - Moving malware, phishing and blocked URIs to features - part 4 - Phishing Protection, r=dimi
--HG--
rename : netwerk/url-classifier/UrlClassifierFeatureNoChannel.cpp => netwerk/url-classifier/UrlClassifierFeaturePhishingProtection.cpp
rename : netwerk/url-classifier/UrlClassifierFeatureNoChannel.h => netwerk/url-classifier/UrlClassifierFeaturePhishingProtection.h
2019-01-29 10:11:34 +01:00
Andrea Marchesini c48bfd063c Bug 1522265 - Moving malware, phishing and blocked URIs to features - part 2 - factory updated, r=dimi 2019-01-29 10:11:33 +01:00
Andrea Marchesini 2e4e28b9e5 Bug 1522265 - Moving malware, phishing and blocked URIs to features - part 1 - feature no channel, r=dimi 2019-01-29 10:11:33 +01:00
arthur.iakab 652cde9859 Backed out 4 changesets (bug 1522265) for mochitest assertion failures on extensions/cookie/nsPermissionManager.cpp CLOSED TREE
Backed out changeset 38b4179568c7 (bug 1522265)
Backed out changeset 38b824df9d02 (bug 1522265)
Backed out changeset 6085d51681f8 (bug 1522265)
Backed out changeset e6a0832f3b11 (bug 1522265)
2019-01-29 14:25:00 +02:00
Andrea Marchesini 901d0ea1b6 Bug 1522265 - Moving malware, phishing and blocked URIs to features - part 4 - Phishing Protection, r=dimi
--HG--
rename : netwerk/url-classifier/UrlClassifierFeatureNoChannel.cpp => netwerk/url-classifier/UrlClassifierFeaturePhishingProtection.cpp
rename : netwerk/url-classifier/UrlClassifierFeatureNoChannel.h => netwerk/url-classifier/UrlClassifierFeaturePhishingProtection.h
2019-01-29 10:11:34 +01:00
Andrea Marchesini 19c65633d3 Bug 1522265 - Moving malware, phishing and blocked URIs to features - part 2 - factory updated, r=dimi 2019-01-29 10:11:33 +01:00
Andrea Marchesini f43141ec0a Bug 1522265 - Moving malware, phishing and blocked URIs to features - part 1 - feature no channel, r=dimi 2019-01-29 10:11:33 +01:00
arthur.iakab c1fae83952 Backed out 16 changesets (bug 1478124) for failing android geckoview-junit CLOSED TREE
Backed out changeset fce62c77a56b (bug 1478124)
Backed out changeset eb2fa3b5edf7 (bug 1478124)
Backed out changeset 8dacce59fcc0 (bug 1478124)
Backed out changeset 012fd0107204 (bug 1478124)
Backed out changeset 496aaf774697 (bug 1478124)
Backed out changeset 21f4fda03159 (bug 1478124)
Backed out changeset b0444e0bc801 (bug 1478124)
Backed out changeset d94039b19943 (bug 1478124)
Backed out changeset 5d85deac61c2 (bug 1478124)
Backed out changeset 929fd654c9df (bug 1478124)
Backed out changeset 1ddd80d9e91a (bug 1478124)
Backed out changeset b8d2dfdfc324 (bug 1478124)
Backed out changeset f500020a273a (bug 1478124)
Backed out changeset dd00365ebb55 (bug 1478124)
Backed out changeset 538e40c5ee13 (bug 1478124)
Backed out changeset bedaa9c437ad (bug 1478124)
2019-01-29 10:03:06 +02:00
Shane Caraveo 3e429f056f Bug 1521573 web_accessible incognito support, r=kmag,smaug
Prevent web_accessible_resources resources loading in private contexts when extension does not have permission.

Differential Revision: https://phabricator.services.mozilla.com/D17138

--HG--
extra : moz-landing-system : lando
2019-01-29 15:40:09 +00:00
Byron Campen [:bwc] 68bc15c3ce Bug 1494311: Making the mtransport API a little more IPC friendly, and establishing a proper base-class. r=mt,mjf
Differential Revision: https://phabricator.services.mozilla.com/D17272

--HG--
extra : moz-landing-system : lando
2019-01-29 14:56:19 +00:00
Sebastian Hengst 9ece29fd9b Merge mozilla-central to autoland. CLOSED TREE 2019-01-29 12:59:48 +02:00
Sebastian Hengst b78e4e8667 Merge mozilla-central to mozilla-inbound
--HG--
rename : browser/components/urlbar/tests/legacy/browser_urlbar_search_no_speculative_connect_with_client_cert.js => browser/components/urlbar/tests/browser/browser_urlbar_speculative_connect_not_with_client_cert.js
2019-01-29 02:55:55 +02:00
Sebastian Hengst 90f4b6640c Merge mozilla-inbound to mozilla-central. a=merge 2019-01-29 01:33:28 +02:00
Razvan Maries c88bd55f59 Merge mozilla-inbound to mozilla-central a=merge 2019-01-28 23:46:39 +02:00
Andrea Marchesini 3ac22c62d4 Bug 1523274 - Flash URL-Classifier feature optimization, r=dimi 2019-01-28 21:48:09 +01:00
Nazım Can Altınova 236c0f6cdc Bug 1522277 - Add more NETWORK category labels r=mstange
Differential Revision: https://phabricator.services.mozilla.com/D17832

--HG--
extra : moz-landing-system : lando
2019-01-28 18:09:43 +00:00
Boris Zbarsky 5214e58438 Bug 1522940. Bail out of redirect processing immediately if our loadinfo says to not follow redirects. r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D17674

--HG--
extra : moz-landing-system : lando
2019-01-28 14:32:43 +00:00
Andrea Marchesini 0499bad916 Bug 1520150 - Single InputStreams can serialize themselves as IPCRemoteStreams (pipe) - part 1 - Passing IPC managers around, r=smaug
Before this set of patches, the decision of exposing the stream as a pipe was
centralized in IPCStreamUtils, based on the total expectation size of the IPC
message. This triggers issues when multiplex inputStreams contain something
that cannot be sent as a pipe (IPCBlobInputStream, for instance), or something
that it's better to do not set as a pipe (nsFileInputStream), together with
memory streams (nsStringInputStream), which could make the IPC message greater
then what accepted (1mb).

These patches move the "pipe vs non-pipe" choice into the single inputStream
implementation.
2019-01-28 10:48:35 +01:00
Coroiu Cristina 1ec6503fd8 Merge mozilla-central to inbound a=merge on a CLOSED TREE 2019-01-25 23:55:33 +02:00
Ehsan Akhgari 7426dccfc0 Bug 1522596 - Remove nsIIPCSerializableURI and move its only member to nsIURI; r=valentin
Differential Revision: https://phabricator.services.mozilla.com/D17531

--HG--
extra : moz-landing-system : lando
2019-01-25 13:32:36 +00:00
Andreea Pavel b839d65d3c Backed out changeset 546ee20723b6 (bug 1521573) for failing test_ext_web_accessible_incognito.html 2019-01-29 06:07:40 +02:00
Oana Pop Rus 028136ace2 Merge inbound to mozilla-central. a=merge 2019-01-24 18:50:45 +02:00
vinoth cc6d429241 Bug 1512949 - Remove eval from tests and flip assertion flag r=ckerschb
Differential Revision: https://phabricator.services.mozilla.com/D14054

--HG--
extra : moz-landing-system : lando
2019-01-24 09:06:07 +00:00
Ciure Andrei c035ee7d3a Merge inbound to mozilla-central. a=merge 2019-01-24 05:44:33 +02:00
Nika Layzell 25503346ef Bug 1467223 - Part 7: Renumber Continue* methods on nsHttpChannel, r=valentin,mayhemer
Depends on D15613

Differential Revision: https://phabricator.services.mozilla.com/D16714

--HG--
extra : moz-landing-system : lando
2019-01-23 21:17:33 +00:00
Nika Layzell 53c6040388 Bug 1467223 - Part 3: Support uncached resources by using a redirectTo-like API for process swaps in necko, r=valentin,mayhemer
With the old process selector service implementation, non-cached loads
would skip the call into the process selector.

This implementation piggybacks atop the existing 'redirectTo' mechanism.
This is unfortunately not the perfect system for catching these loads,
as it doesn't provide an opportunity for performing a final process
switch before redirecting to a non-http channel. In addition, it doesn't
provide indication that a redirect is going to happen, causing
potentially unnecessary process switches.

Not all places where 'redirectTo' is supported use this mechanism. This
process switching mechanism is only checked in situations after
http-on-examine-response.

Potential future changes include:

 1. Moving these checks closer to the real 'OnStartRequest' call (e.g.
    in ContinueProcessNormal + ContinueOnStartRequest3). This would mean
    that loads other than the final load will not cause process swaps.

 2. Adding a callback before a redirect is performed, passing in the new
    channel, and allowing modifications to be made. This would allow
    performing a process swap before redirecting to a non-http(s)
    channel.

Depends on D15609

Differential Revision: https://phabricator.services.mozilla.com/D15610

--HG--
extra : moz-landing-system : lando
2019-01-23 21:19:39 +00:00
Nika Layzell 9b4bbc17fd Bug 1467223 - Part 2: Add BrowsingContextID to LoadInfo, r=valentin
This is handy when performing process swaps, as it provides useful & important
information to parent-process callers.

Depends on D15608

Differential Revision: https://phabricator.services.mozilla.com/D15609

--HG--
extra : moz-landing-system : lando
2019-01-23 21:06:59 +00:00
Nika Layzell be5f88174d Bug 1467223 - Part 1: Move CrossProcessRedirect Message to PContent, r=valentin
This is needed because early in a content process's lifecycle, NeckoParent may
not have been created yet. This leads to issues when trying to redirect into a
fresh process which hasn't performed network loads yet. By sending the message
over PContent, we can be sure the APIs are available.

Differential Revision: https://phabricator.services.mozilla.com/D15608

--HG--
extra : moz-landing-system : lando
2019-01-23 21:27:44 +00:00
Valentin Gosu 23c68c90c6 Bug 1522076 - Backed out changeset f10300d5ef4e a=backout
--HG--
extra : rebase_source : 84e3f5e7673de141f49815bd8b93cf40cf230d56
2019-01-24 11:37:12 +02:00
Valentin Gosu 5ccd13de0d Bug 1522076 - Backed out changeset 1b6a90a3d820 a=backout
--HG--
extra : rebase_source : 6909b5d123bb23ca54d39f81e84f7fc65f02252c
2019-01-24 11:34:17 +02:00
Shane Caraveo 6004d08141 Bug 1521573 web_accessible incognito support, r=kmag,smaug
Prevent web_accessible_resources resources loading in private contexts when extension does not have permission.

Differential Revision: https://phabricator.services.mozilla.com/D17138

--HG--
extra : moz-landing-system : lando
2019-01-29 01:42:34 +00:00