Commit graph

991 commits

Author SHA1 Message Date
Iulian Moraru
3b2efb9273 Backed out changeset 675cf3cb3d33 (bug 1397646) for causing mochitest failures on test_fetch_basic_http.html. CLOSED TREE 2023-08-07 07:46:50 +03:00
Thomas Wisniewski
ae64997bee Bug 1397646 - return empty statusText for HTTP2 fetches and XMLHttpRequests; r=kershaw,necko-reviewers,sunil
Differential Revision: https://phabricator.services.mozilla.com/D184527
2023-08-07 04:00:31 +00:00
Peter Van der Beken
3f4ffadbe1 Bug 1846277 - Untangle nsGlobalWindow*.h includes. r=dom-core,media-playback-reviewers,sessionstore-reviewers,padenot,farre
Differential Revision: https://phabricator.services.mozilla.com/D184978
2023-08-02 20:41:49 +00:00
Kershaw Chang
8c9cb764ad Bug 1791027 - Support transaction pending time for socket process, r=necko-reviewers,jesup
Differential Revision: https://phabricator.services.mozilla.com/D185056
2023-08-02 09:03:57 +00:00
Iulian Moraru
df3805ec86 Backed out changeset 07b44dd04f0d (bug 1397646) for causing XHR related mochitest failures. 2023-08-01 01:56:42 +03:00
Thomas Wisniewski
e8e43661cf Bug 1397646 - return empty statusText for HTTP2 fetches and XMLHttpRequests; r=kershaw,necko-reviewers,sunil
Differential Revision: https://phabricator.services.mozilla.com/D184527
2023-07-31 19:30:16 +00:00
Tim Huang
ebf7945587 Bug 1842030 - Part 2: Check the global private browsing state for HttpBaseChannel::IsBrowsingContextDiscarded() if the loadGroup is not avaiable. r=necko-reviewers,jesup
The HttpBaseChannel::IsBrowsingContextDiscarded() did always return
false if the loadGroup is not avaiable. But, this may not be correct for
the private channels if the private session has been ended. To fix this,
we make the function to check the global private browsing state
if the loadGroup is not available for private channels.

Depends on D184010

Differential Revision: https://phabricator.services.mozilla.com/D184479
2023-07-26 10:14:38 +00:00
Andreas Farre
bc13cd7b8b Bug 1839881 - Don't log when we block ExtContentPolicy::TYPE_BEACON. r=sefeng,necko-reviewers,valentin
This doesn't mean that blocked beacons stops showing up in devtools.

Differential Revision: https://phabricator.services.mozilla.com/D181778
2023-07-07 05:33:58 +00:00
Kershaw Chang
fc2898f123 Bug 1816677 - Allow to retry diffrent IP family for Http/3, r=necko-reviewers,valentin
Differential Revision: https://phabricator.services.mozilla.com/D180679
2023-06-28 17:20:41 +00:00
Narcis Beleuzu
7ae0c765b0 Backed out changeset dfe0fed4de68 (bug 1816677) for xpcshell failure on test_http3_dns_retry.js . CLOSED TREE 2023-06-24 00:42:37 +03:00
Kershaw Chang
818d909b26 Bug 1816677 - Allow to retry diffrent IP family for Http/3, r=necko-reviewers,valentin
Differential Revision: https://phabricator.services.mozilla.com/D180679
2023-06-23 15:00:48 +00:00
Sean Feng
dba509892e Bug 1837585 - Make the COEP:Credentialless check ignores the subdocument request if it's a redirect r=valentin,necko-reviewers
We shouldn't block the iframe if the initial request doesn't have valid
headers, we should only check the final request.

Differential Revision: https://phabricator.services.mozilla.com/D180485
2023-06-15 13:07:43 +00:00
Sean Feng
81ade4f308 Bug 1835925 - Expand ORB_BLOCK_INITIATOR telemetry probe to demystify OTHER r=smaug,necko-reviewers,valentin,jesup
Differential Revision: https://phabricator.services.mozilla.com/D179579
2023-06-14 15:25:40 +00:00
Tom Schuster
c6275439e2 Bug 1837153 - Make RFPTarget parameter of ShouldResistFingerprinting with nsIChannel non-optional. r=tjr,cookie-reviewers,timhuang,geckoview-reviewers,owlish
Differential Revision: https://phabricator.services.mozilla.com/D180199
2023-06-13 19:32:17 +00:00
Cristian Tuns
91c8c583d9 Backed out changeset ba4fa2a4dc58 (bug 1835925) for causing build bustages in nsContentSecurityManager.cpp 2023-06-12 11:11:26 -04:00
Sean Feng
688592df12 Bug 1835925 - Expand ORB_BLOCK_INITIATOR telemetry probe to demystify OTHER r=smaug,necko-reviewers,valentin,jesup
Differential Revision: https://phabricator.services.mozilla.com/D179579
2023-06-12 14:39:04 +00:00
Ho Cheung
6df7ed2a89 Bug 1835863 - Remove ContentParent* aParent in netwerk r=manuel
`ContentParent* aParent` is unused and can be removed.

Differential Revision: https://phabricator.services.mozilla.com/D180526
2023-06-12 12:37:18 +00:00
Cristian Tuns
bc4cfd88c2 Backed out 4 changesets (bug 1837582, bug 1837153) for causing build bustages in nsGlobalWindowInner.cpp on Android CLOSED TREE
Backed out changeset e17bfa5f8959 (bug 1837153)
Backed out changeset 662b7f7504b9 (bug 1837582)
Backed out changeset 7c5fa154397d (bug 1837153)
Backed out changeset b447d95efe6e (bug 1837153)
2023-06-12 06:23:38 -04:00
Tom Schuster
61cbc9d9c9 Bug 1837153 - Make RFPTarget parameter of ShouldResistFingerprinting with nsIChannel non-optional. r=tjr,cookie-reviewers,timhuang
Differential Revision: https://phabricator.services.mozilla.com/D180199
2023-06-12 09:48:03 +00:00
Cristina Horotan
c1f04d7bb9 Backed out changeset 4b086a7e6115 (bug 1835925) for causing wpt failures at HttpBaseChannel.cpp on a CLOSED TREE 2023-06-07 17:55:34 +03:00
Sean Feng
cca262fb5e Bug 1835925 - Expand ORB_BLOCK_INITIATOR telemetry probe to demystify OTHER r=smaug,necko-reviewers,valentin
Differential Revision: https://phabricator.services.mozilla.com/D179579
2023-06-07 13:11:28 +00:00
Andreas Farre
2680ac02eb Bug 1834497 - Register ORB prefs in nimbus FeatureManifest. r=necko-reviewers,kershaw
Differential Revision: https://phabricator.services.mozilla.com/D178916
2023-05-31 20:30:36 +00:00
Sean Feng
f5a6348688 Bug 1833216 - Add two more telemetry probes for ORB r=farre,necko-reviewers
Add `ORB_BLOCK_REASON` to learn more about the reasoning of orb blocking in the wild.

Add ORB_BLOCK_INITIATOR to learn about the initiators. We can add more probes in the future if we want to target a specific initiator.

Differential Revision: https://phabricator.services.mozilla.com/D178102
2023-05-23 20:42:35 +00:00
Andreas Farre
97ee97f4a7 Bug 1823817 - Process cross origin security headers from nsHttpChannel::OnAuthCancelled. r=necko-reviewers,valentin
nsHttpChannel::OnAuthCancelled calls nsHttpChannel::CallOnStartRequest
directly, effectively bypassing
HttpBaseChannel::ProcessCrossOriginSecurityHeaders, which is needed to
get CORP handling right.

Differential Revision: https://phabricator.services.mozilla.com/D177778
2023-05-16 14:55:23 +00:00
Andreas Farre
1125476080 Bug 1828375 - Do gradual ORB transition. r=sefeng,necko-reviewers
Add a separate check for spec breaking allows of certain MIME
types. Having this separated out means that we can make the rest of
the implementation behave exactly like spec.

Some tradeoffs that we need in the current state are:

* Allowing "application/dash+xml"
* Allowing "application/vnd.apple.mpegurl"
* Allowing "text/vtt"
* Allow all MIME types beginning with "audio/mpeg"
* Allow "text/plain" when there is a no-sniff header.

Differential Revision: https://phabricator.services.mozilla.com/D176821
2023-05-10 14:35:52 +00:00
Andreas Farre
476835e1c7 Bug 1823877 - Part 1: Filter opaque results from fetch() in the parent for ORB. r=sefeng,smaug,necko-reviewers,edenchuang,valentin
We make sure to not send any data to the content process in case of
fetching an opaque resource. This is way to remain more web
compatible, but is also in conflict with the ORB specification.

Differential Revision: https://phabricator.services.mozilla.com/D173454
2023-05-10 14:35:52 +00:00
Kershaw Chang
8f95e3fca6 Bug 1808323 - Add telemetry for the page load time and the time to first paint for sites that supports Early Hints response, r=manuel,necko-reviewers,valentin
Differential Revision: https://phabricator.services.mozilla.com/D165966
2023-05-02 08:08:44 +00:00
sunil mayya
ddaba9c7bb Bug 1823502 - do not drop auth header for HSTS and internal redirects. r=necko-reviewers,valentin
Differential Revision: https://phabricator.services.mozilla.com/D173523
2023-03-28 00:56:23 +00:00
Sean Feng
3591a80eeb Bug 1823921 - Filter out some types of requests from the ORB_DID_EVER_BLOCK_RESPONSE probe r=farre,necko-reviewers,kershaw
Content processes can do nothing to the responses of nsIContentPolicy::TYPE_BEACON,
nsIContentPolicy::TYPE_PING and nsIContentPolicy::TYPE_CSP_REPORT requests, so filter
them out of the ORB_DID_EVER_BLOCK_RESPONSE probe to not worry them for
web compatibility.

Differential Revision: https://phabricator.services.mozilla.com/D173292
2023-03-23 13:22:19 +00:00
Sean Feng
10b143a80e Bug 1804086 - Allow document charset to be passed from content to parent r=smaug,necko-reviewers,kershaw
This is needed for doing content decoding for ORB.

Depends on D172490

Differential Revision: https://phabricator.services.mozilla.com/D172491
2023-03-22 14:21:40 +00:00
Sean Feng
b32e4554a9 Bug 1804086 - Allow classic script hint to be passed from content to parent r=smaug,necko-reviewers,kershaw
This is needed for doing content decoding for ORB.

Differential Revision: https://phabricator.services.mozilla.com/D172490
2023-03-22 14:21:39 +00:00
Noemi Erli
b4fa013c2d Backed out 3 changesets (bug 1804086) for causing failures in JSValidatorChild.cpp CLOSED TREE
Backed out changeset 12a40a80a975 (bug 1804086)
Backed out changeset 1bea9ea5e20d (bug 1804086)
Backed out changeset 00feb14e7824 (bug 1804086)
2023-03-22 03:33:43 +02:00
Sean Feng
0feaa2906c Bug 1804086 - Allow document charset to be passed from content to parent r=smaug,necko-reviewers,kershaw
This is needed for doing content decoding for ORB.

Depends on D172490

Differential Revision: https://phabricator.services.mozilla.com/D172491
2023-03-21 22:55:08 +00:00
Sean Feng
078281d4c2 Bug 1804086 - Allow classic script hint to be passed from content to parent r=smaug,necko-reviewers,kershaw
This is needed for doing content decoding for ORB.

Differential Revision: https://phabricator.services.mozilla.com/D172490
2023-03-21 22:55:08 +00:00
Gijs Kruitbosch
f1911aef9a Bug 1718082 - track current tab using browserId instead of top browsing context id for network prioritization purposes, r=nika,mconley,necko-reviewers,kershaw,valentin
Differential Revision: https://phabricator.services.mozilla.com/D171646
2023-03-13 17:32:08 +00:00
Sean Feng
e62365a145 Bug 1820192 - Add a hint of ORB blocking to developer console r=smaug
Differential Revision: https://phabricator.services.mozilla.com/D172263
2023-03-13 15:39:38 +00:00
Butkovits Atila
ac029a126f Backed out changeset 188db2f94c8e (bug 1809931) for causing failures at test_fetch_event.html. CLOSED TREE 2023-03-01 17:39:38 +02:00
Andreas Farre
4b69c300a0 Bug 1809931 - Explicitly check for top-level loads when running ORB. r=sefeng,necko-reviewers,valentin
With HTTPS-First top-level loads can have a loading principal, so we
need to explicitly check the load info if we're doing a top-level
load.

Differential Revision: https://phabricator.services.mozilla.com/D171315
2023-03-01 14:52:25 +00:00
Sean Feng
27084394a5 Bug 1809518 - Special case the HTTPS Only timeout request to make it bypass ORB r=farre,necko-reviewers
This particular request is used to identify the potential timeout issue
for HTTPS only requests. ORB doesn't need to block this request.

Differential Revision: https://phabricator.services.mozilla.com/D170251
2023-02-28 19:46:11 +00:00
Sean Feng
84f1835811 Bug 1809518 - Allow requests that are maded by devtools bypass ORB r=farre,necko-reviewers
Devtools use its own mainThreadFetch to fetch resources when it's
needed. For example, fetching the content of a source file. Importantly,
these request use `TYPE_OTHER` which could be blocked by ORB. Having
ORB block requests coming from devtools break some of it
functionalities.

Differential Revision: https://phabricator.services.mozilla.com/D170250
2023-02-28 19:46:11 +00:00
Marian-Vasile Laza
c39ea4a713 Backed out 15 changesets (bug 1809518) for wpt failures on navigation-headers.https.html.
Backed out changeset d245efcf2257 (bug 1809518)
Backed out changeset 3f29ad282371 (bug 1809518)
Backed out changeset 8f77fb0ddfef (bug 1809518)
Backed out changeset b1f9dcd5f147 (bug 1809518)
Backed out changeset eda8f3ef3fdb (bug 1809518)
Backed out changeset 85f4c2ca24e0 (bug 1809518)
Backed out changeset 92b774c122c9 (bug 1809518)
Backed out changeset b6e6065c79ff (bug 1809518)
Backed out changeset 724a5c7bba6a (bug 1809518)
Backed out changeset 224ccbc28c49 (bug 1809518)
Backed out changeset cc88d68be920 (bug 1809518)
Backed out changeset c02d3f25c880 (bug 1809518)
Backed out changeset 597cb423049d (bug 1809518)
Backed out changeset ae56071e154f (bug 1809518)
Backed out changeset 563403090c7f (bug 1809518)
2023-02-28 20:42:23 +02:00
Joshua Marshall
b0c912c415 Bug 1645054 - Disable/purge service workers when dom.serviceWorkers.enabled is false r=dom-worker-reviewers,necko-reviewers,asuth,webdriver-reviewers,whimboo
Differential Revision: https://phabricator.services.mozilla.com/D167550
2023-02-28 15:57:55 +00:00
Sean Feng
bfba867972 Bug 1809518 - Special case the HTTPS Only timeout request to make it bypass ORB r=farre,necko-reviewers
This particular request is used to identify the potential timeout issue
for HTTPS only requests. ORB doesn't need to block this request.

Differential Revision: https://phabricator.services.mozilla.com/D170251
2023-02-28 15:28:04 +00:00
Sean Feng
702eb65533 Bug 1809518 - Allow requests that are maded by devtools bypass ORB r=farre,necko-reviewers
Devtools use its own mainThreadFetch to fetch resources when it's
needed. For example, fetching the content of a source file. Importantly,
these request use `TYPE_OTHER` which could be blocked by ORB. Having
ORB block requests coming from devtools break some of it
functionalities.

Differential Revision: https://phabricator.services.mozilla.com/D170250
2023-02-28 15:28:04 +00:00
sunil mayya
3ae22e6d6f Bug 1817980 - replace ReferrerInfo::IsCrossOriginRequest with nsScriptSecurityManager::CheckSameOriginURI for determining cross-origin redirects. r=necko-reviewers,valentin
Since Bug 1802086, we strip authentication headers when redirected to a cross-origin page. However, the api   ReferrerInfo::IsCrossOriginRequest  used for determining whether a request is cross-origin cannot be used as it compares the triggering principal's uri with the redirected channel's uri. This comparison might sometimes yield to false positives.
For e.g consider the following scenario:
1. Load `https://example.org/` and send the following fetch request from browser console
```
fetch("https://test.com/some_location", {
  "headers": {
    "Authorization": "Token foo"
  }
});
```
2. Server responds with  a redirect to https://test.com/another_location

In the above scenario, the api ReferrerInfo::IsCrossOriginRequest  will yield the above request as cross origin since the triggering principal uri here is example.com. Hence, this will be treated as cross-origin redirect resulting in removal of auth headers.

Thus ReferrerInfo::IsCrossOriginRequest  has been replaced with nsScriptSecurityManager::CheckSameOriginURI  where we directly compare the origins for the two requests.

Differential Revision: https://phabricator.services.mozilla.com/D170868
2023-02-28 12:06:36 +00:00
Csoregi Natalia
47428da2d3 Backed out 8 changesets (bug 1809518) for causing fetch related failures. CLOSED TREE
Backed out changeset b448bddfa364 (bug 1809518)
Backed out changeset ce3a811a4522 (bug 1809518)
Backed out changeset f5add471e7f9 (bug 1809518)
Backed out changeset d2e6d1734eec (bug 1809518)
Backed out changeset 2299a5bdc7a9 (bug 1809518)
Backed out changeset 3eb92dc5aac9 (bug 1809518)
Backed out changeset 3061e4fbf237 (bug 1809518)
Backed out changeset 678468cb98cd (bug 1809518)
2023-02-23 04:33:37 +02:00
Sean Feng
4cfd97b195 Bug 1809518 - Special case the HTTPS Only timeout request to make it bypass ORB r=farre,necko-reviewers
This particular request is used to identify the potential timeout issue
for HTTPS only requests. ORB doesn't need to block this request.

Differential Revision: https://phabricator.services.mozilla.com/D170251
2023-02-22 20:17:04 +00:00
Sean Feng
7d217e6674 Bug 1809518 - Allow requests that are maded by devtools bypass ORB r=farre,necko-reviewers
Devtools use its own mainThreadFetch to fetch resources when it's
needed. For example, fetching the content of a source file. Importantly,
these request use `TYPE_OTHER` which could be blocked by ORB. Having
ORB block requests coming from devtools break some of it
functionalities.

Differential Revision: https://phabricator.services.mozilla.com/D170250
2023-02-22 20:17:03 +00:00
Cristian Tuns
ef9fa152c1 Backed out 8 changesets (bug 1809518) for causing build bustages on JSOracleChild.h CLOSED TREE
Backed out changeset 1057c5d5a0a5 (bug 1809518)
Backed out changeset 1ddffd079624 (bug 1809518)
Backed out changeset 3f43f1cd3e8b (bug 1809518)
Backed out changeset 16bd31105745 (bug 1809518)
Backed out changeset d86c04497104 (bug 1809518)
Backed out changeset 25a5bf657f5c (bug 1809518)
Backed out changeset bf67b8c14aa0 (bug 1809518)
Backed out changeset 5cc0653b2072 (bug 1809518)
2023-02-22 12:20:40 -05:00
Sean Feng
0c077ca87a Bug 1809518 - Special case the HTTPS Only timeout request to make it bypass ORB r=farre,necko-reviewers
This particular request is used to identify the potential timeout issue
for HTTPS only requests. ORB doesn't need to block this request.

Differential Revision: https://phabricator.services.mozilla.com/D170251
2023-02-22 14:07:48 +00:00