Граф коммитов

17048 Коммитов

Автор SHA1 Сообщение Дата
Andrea Marchesini 7728c152a2 Bug 1417463 - Default accept header should follow the fetch spec - tests, r=mayhemer 2019-01-08 23:36:17 +01:00
Andrea Marchesini 5752cef527 Bug 1417463 - Default accept header should follow the fetch spec, r=mayhemer
For navigation: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
For images: image/png,image/svg+xml,image/*;q=0.8,*/*;q=0.5
for style: text/css,*/*;q=0.1
Anything else: */*
2019-01-08 23:36:16 +01:00
Valentin Gosu 55d58519a7 Bug 1517542 - Fail URL deserialization if query or ref start at position 0 r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D15854

--HG--
extra : moz-landing-system : lando
2019-01-08 15:00:05 +00:00
Tom Schuster 82d1aa2207 Bug 1510223 - Test for MIME type warning. r=ckerschb,nchevobbe
Turns out we also produced an error instead of a warnings.
Good that we added those test \o/

Differential Revision: https://phabricator.services.mozilla.com/D15659

--HG--
extra : moz-landing-system : lando
2019-01-08 12:28:32 +00:00
Oana Pop Rus 3adbeba770 Merge mozilla-inbound to mozilla-central. a=merge 2019-01-08 12:13:02 +02:00
Dragana Damjanovic 7bdd6628ba Bug 1514688 - In case we already have a h2 connection and it does not support websockets, we should not try again to use websockets over h2. r=michal
There are 2 parts of the patch:
1) we should not try to use websockets over h2 if we already know that they are not supported.
2) make sure that we clean up websockets waiting for the settings frame when we close a h2 connection. (the part 1) will fix the issue, this part is only to be 100% that we some how do not retrigger the issue)

Differential Revision: https://phabricator.services.mozilla.com/D15296

--HG--
extra : moz-landing-system : lando
2019-01-07 23:09:35 +00:00
Ehsan Akhgari b63debc2d4 Bug 1517014 - Part 1: Add nsIPermissionManager.testPermissionOriginNoSuffix(), an API for testing permissions using an origin string without the overhead of parsing it into a URI; r=nika
For consumers which have an origin string, currently they need to parse it into
a URI before they can call testPermission().  Internally, in the common case this
nsIURI* argument will be immediately converted back into the same origin string
in PermissionKey::CreateFromURI().  This means that the cost of parsing the
original origin string will effectively end up being wasted in the common case.

This patch adds an API that allows the consumer to test a permission using the
origin string directly, and only parse it into an nsIURI when necessary, thereby
avoiding this overhead.

Differential Revision: https://phabricator.services.mozilla.com/D15543

--HG--
extra : moz-landing-system : lando
2019-01-07 18:45:26 +00:00
Csoregi Natalia 4eda4d34c0 Merge mozilla-central to mozilla-inbound. CLOSED TREE 2019-01-07 23:51:06 +02:00
Jeff Walden a128f0c35c Bug 1517624 - Move JSPropertySpec and JSFunctionSpec definitions into a new js/public/PropertySpec.h header. r=arai
--HG--
extra : rebase_source : b80911e01f984ee9f99fbbc6c4552ef3d2178587
2019-01-03 15:37:01 -06:00
Andrea Marchesini 4712d40e55 Bug 1514697 - Lazy loading for URL-Classifier features, r=dimi 2019-01-05 09:11:06 +01:00
Andrea Marchesini 1aada62615 Bug 1515286 - Get rid of nsIURIClassifier.asyncClassifyLocalWithTables, r=dimi 2019-01-05 09:10:56 +01:00
Andrea Marchesini 7872e64c7c Bug 1515286 - Introduce nsIURIClassifier.getFeatureByName() and nsIURIClassifier.createFeatureWithTables(), r=dimi 2019-01-05 09:10:45 +01:00
shindli ce5a0b424d Merge mozilla-central to inbound. a=merge CLOSED TREE 2019-01-05 06:09:57 +02:00
Jeff Walden d084a5e469 Back out f8a29b8bb211, d1267711aef0, df1b7a886a9d, 0f6a3dd2c2f7, e6628922b7be, 0a374ac233cd, cf00fd0f080c, 6fc24c4e7798, ab2e4a2e5dd2, 2d17e4ef5e71, 4a8940073f8c, ea3ab4b83152, c7577c232591, e58454c68f0f, and 0e39815d1bce for breaking a single Android J10 and nothing else. (That J10 task must not like deck chairs...) r=bustage
--HG--
extra : rebase_source : f02dabe3ece7955cb223313d3605b825560c62b1
2019-01-04 16:33:01 -06:00
bitnotri 542ea80ecd Bug 1461737 - Move nsstring-rs to a better location, r=nika
Differential Revision: https://phabricator.services.mozilla.com/D15743

--HG--
rename : servo/support/gecko/nsstring/Cargo.toml => xpcom/rust/nsstring/Cargo.toml
rename : servo/support/gecko/nsstring/src/conversions.rs => xpcom/rust/nsstring/src/conversions.rs
rename : servo/support/gecko/nsstring/src/lib.rs => xpcom/rust/nsstring/src/lib.rs
extra : moz-landing-system : lando
2019-01-04 22:03:56 +00:00
Ciure Andrei 7a748ae68f Merge mozilla-central to autoland. a=merge CLOSED TREE 2019-01-04 01:03:06 +02:00
Boris Zbarsky 058f83508f Bug 1517434 part 2. Convert existing callers of GetIsSystemPrincipal() to IsSystemPrincipal(). r=mccr8
Differential Revision: https://phabricator.services.mozilla.com/D15673

--HG--
extra : moz-landing-system : lando
2019-01-03 20:55:38 +00:00
Jeff Walden 87aba62a4a Bug 1517624 - Move JSPropertySpec and JSFunctionSpec definitions into a new js/public/PropertySpec.h header. r=arai 2019-01-03 15:37:01 -06:00
Andrea Marchesini 647b040b0f Bug Bug 1515272 - Get rid of nsIURIClassifier.classifyLocal(), r=dimi, r=froydnj 2019-01-04 14:46:30 +01:00
Andrea Marchesini e34612e16e Bug 1514202 - Port flash url-classifier to nsIUrlClassifierFeature - part 1 - Flash feature, r=dimi, r=edgar, r=valentin 2019-01-04 14:45:42 +01:00
Tom Schuster 008b6d8204 Bug 1510223 - Warn about scripts with wrong MIME type. r=ckerschb,nchevobbe
Differential Revision: https://phabricator.services.mozilla.com/D14859

--HG--
extra : moz-landing-system : lando
2019-01-03 08:58:48 +00:00
Ehsan Akhgari 60238893a6 Bug 1517057 - Part 2: Avoid minting a new codebase principal in the channel-based version of AntiTrackingCommon::IsFirstPartyStorageAccessGrantedFor() in the common case to make things faster; r=baku
Depends on D15547

Differential Revision: https://phabricator.services.mozilla.com/D15548

--HG--
extra : moz-landing-system : lando
2019-01-02 15:41:59 +00:00
Ehsan Akhgari 61338d3be7 Bug 1517057 - Part 1: Remove support for the unused URI_FORBIDS_COOKIE_ACCESS protocol flag; r=baku
Differential Revision: https://phabricator.services.mozilla.com/D15547

--HG--
extra : moz-landing-system : lando
2019-01-02 15:42:08 +00:00
ffxbld 7745a0ae89 No Bug, mozilla-central repo-update HSTS HPKP blocklist remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D15511

--HG--
extra : moz-landing-system : lando
2018-12-31 13:34:39 +00:00
Emilio Cobos Álvarez d2ed260822 Bug 1517241 - Rename nsIDocument to mozilla::dom::Document. r=smaug
Summary: Really sorry for the size of the patch. It's mostly automatic
s/nsIDocument/Document/ but I had to fix up in a bunch of places manually to
add the right namespacing and such.

Overall it's not a very interesting patch I think.

nsDocument.cpp turns into Document.cpp, nsIDocument.h into Document.h and
nsIDocumentInlines.h into DocumentInlines.h.

I also changed a bunch of nsCOMPtr usage to RefPtr, but not all of it.

While fixing up some of the bits I also removed some unneeded OwnerDoc() null
checks and such, but I didn't do anything riskier than that.
2019-01-03 17:48:33 +01:00
Sylvestre Ledru cccdda3c2a Bug 1516555 - Reformat everything to the Google coding style r=Ehsan
# ignore-this-changeset

Differential Revision: https://phabricator.services.mozilla.com/D15426

--HG--
extra : moz-landing-system : lando
2018-12-28 15:48:06 +00:00
Tom Schuster 8c3a7f7d61 Bug 1510241 - Proxy HttpChannel MIME blocking message to the child process. r=flod,dragana
Differential Revision: https://phabricator.services.mozilla.com/D14858

--HG--
extra : moz-landing-system : lando
2018-12-27 06:25:51 +00:00
Kris Maglione 39ae97e234 Bug 1515884: Remove unused XPCWrappedJS nsIPropertyBag implementation. r=bholley
This helper code is currently unused, and presents a pretty significant
footgun for any JS object which implements nsIPropertyBag itself.

When those objects are first queried to nsIWritablePropertyBag, they behave as
expected, returning the JS-implemented nsIPropertyBag methods. But when
they're first queried to nsIPropertyBag, they use the XPCWrappedNative stubs,
which don't behave as expected.

Differential Revision: https://phabricator.services.mozilla.com/D15235

--HG--
extra : rebase_source : 02942592dc8c4efcc1190610448a46593faa5703
2018-12-21 15:03:13 -08:00
Andrea Marchesini 301d9591cd Bug 1515693 - Check allow-storage-access-by-user-activation sandbox flag only if StorageAccess API is enabled, r=ehsan 2018-12-22 00:38:37 +01:00
Ehsan Akhgari aa81b3cc6c Bug 1510860 - Ensure that the cookie service checks the content blocking allow list even for first-party cookies since that's required when we're blocking all cookies; r=baku
Differential Revision: https://phabricator.services.mozilla.com/D15109
2018-12-21 12:21:28 -05:00
Jeff Walden ed23151bd7 Bug 1492937 - Make the JS subscript loader load scripts exclusively as UTF-8, with no way to specify any other encoding, and adjust a bunch of existing tests to use UTF-8 directly, rather than Unicode escape sequences or similar. (This also changes the encoding of .sjs scripts and all mochitest-browser tests in the tree from Latin-1 to UTF-8.) r=yzen, r=MattN, r=jimb, r=kmag 2018-12-19 13:46:20 -08:00
Nathan Froyd 6a08dde1cc Bug 1515194 - part 4 - un-aggregate nsLoadGroup; r=valentin
We no longer use the aggregation facility for nsLoadGroup, and removing
it saves approximately 10% of the space consumed by nsLoadGroup.
2018-12-19 10:08:28 -05:00
Nathan Froyd e8ace34120 Bug 1515194 - part 3 - pack holes in nsLoadGroup better on 64-bit platforms; r=valentin
Due to member alignment rules on 64-bit platforms, nsLoadGroup has more
unused space than it should.  Shuffling members around a little to fill
in holes should make nsLoadGroup somewhat smaller.
2018-12-19 10:08:28 -05:00
Nathan Froyd 6e924db228 Bug 1515194 - part 2 - remove nsPILoadGroupInternal; r=valentin
We apparently had this for internal extension hooks that couldn't be
depended on externally...but now that interfaces aren't exposed to
addons, we can remove this no-op interface entirely.
2018-12-19 10:08:28 -05:00
Nathan Froyd d7b6a23e76 Bug 1515194 - part 1 - remove nsLoadGroup::mTimedNonCachedRequestsUntilOnEndPageLoad; r=valentin
We only write to this variable and never read it.  The whole
nsPILoadGroupInternal interface looks like it could go away, actually;
we'll do that in a subsequent patch.
2018-12-19 10:08:28 -05:00
Tom Schuster 02af40ca25 Bug 1510225 - Refresh script MIME type telemetry again. r=dveditz datareview=chutten
Differential Revision: https://phabricator.services.mozilla.com/D14762

--HG--
extra : rebase_source : 7263d071a281c518cd2220fe2fe938f52265249b
2018-12-17 17:59:48 +01:00
Dragana Damjanovic 2ebce46fd8 Bug 1415625 - Use Telemetry::CanRecordPreReleaseData instead of toolkit.telemetry.enabled. Remove network.allow-experiments because it is not used. r=michal
Differential Revision: https://phabricator.services.mozilla.com/D12745

--HG--
extra : moz-landing-system : lando
2018-12-18 17:19:29 +00:00
Valentin Gosu f9762144c9 Bug 1355207 - Wait for http server shutdown and disable test_host.js on OSX r=dragana
The test intermittently fails on OSX. For some reason start(PORT) doesn't always fail when PORT is in use, so we timeout because the handler is never called. I suspect it's because of how SO_REUSEADDR and SO_REUSEPORT are handled on sockets sever-side on OSX. Since httpd is used for unit tests, there is little risk in disabling the test on OSX.
The alternative is to check for a timeout, and in that case switch to another port - which is cumbersome, and not the purpose of the test.

Differential Revision: https://phabricator.services.mozilla.com/D14756

--HG--
extra : moz-landing-system : lando
2018-12-18 11:14:14 +00:00
Honza Bambas 25a593d03e Bug 1506821 - Redirect content is shown when redirecting to a blacklisted port. r=dragana 2018-12-14 09:25:00 -05:00
Andrea Marchesini ce48e4ca2d Bug 1514441 - AsyncUrlChannelClassifier must keep a reference to the channel callback, r=dimi 2018-12-16 10:22:43 +01:00
Andrea Marchesini b6a922c797 Bug 1514133 - Port Login-Reputation classification to nsIUrlClassifierFeature, r=dimi 2018-12-15 09:54:02 +01:00
Brian Hackett a655254f45 Bug 801304 Part 2 - Check if event queues should be suspended before processing their events, r=mayhemer,smaug.
--HG--
extra : rebase_source : e1828ffdaaaa7ab48f956c22a93109f80a765d43
2018-12-14 06:47:58 -10:00
Andrea Marchesini 6b9fe3a6cf Bug 1511436 - Cleanup URL-Classifier code - part 3 - AsyncUrlChannelClassifier, r=dimi 2018-12-14 12:40:17 +01:00
Andrea Marchesini 71b120ca17 Bug 1511436 - Cleanup URL-Classifier code - part 2 - nsUrlClassifierDBService::AsyncClassifyLocalWithFeatures, r=dimi 2018-12-14 12:40:17 +01:00
Andrea Marchesini 69926deea6 Bug 1511436 - Cleanup URL-Classifier code - part 1 - nsIUrlClassifierFeature, r=dimi
--HG--
rename : netwerk/base/nsChannelClassifier.cpp => netwerk/url-classifier/nsChannelClassifier.cpp
rename : netwerk/base/nsChannelClassifier.h => netwerk/url-classifier/nsChannelClassifier.h
rename : netwerk/base/nsIURIClassifier.idl => netwerk/url-classifier/nsIURIClassifier.idl
2018-12-14 12:40:16 +01:00
Andrea Marchesini cdd5a7b12c Bug 1511436 - Cleanup URL-Classifier code - part 0 - use of StaticPrefs, r=dimi 2018-12-14 12:40:16 +01:00
Bogdan Tara 724c256428 Merge mozilla-central to mozilla-inbound. a=merge CLOSED TREE 2018-12-14 07:45:04 +02:00
Bogdan Tara 38717f9e9e Merge mozilla-central to mozilla-inbound. a=merge CLOSED TREE 2018-12-14 00:54:42 +02:00
Bogdan Tara b6a18773a4 Merge inbound to mozilla-central. a=merge 2018-12-14 00:42:20 +02:00
Jeremy Lempereur 695604da1d Bug 1481014 - WIP - Rewrite net_IsValidIPv4Addr in rust. r=valentin,froydnj
Differential Revision: https://phabricator.services.mozilla.com/D3713

--HG--
extra : moz-landing-system : lando
2018-12-13 12:07:26 +00:00