Commit Graph

63 Commits

Author SHA1 Message Date
Dorel Luca
4dc040e94b Backed out changeset 1de121cdb483 (bug 1671641) for build bustage in dom/file/ipc/RemoteLazyInputStreamThread.cpp. CLOSED TREE 2020-10-22 07:46:54 +03:00
Andi-Bogdan Postelnicu
92acaa3702 Bug 1671641 - Make dom/file buildable outside of unified-build environment. r=sg
Differential Revision: https://phabricator.services.mozilla.com/D94082
2020-10-21 20:58:07 +00:00
Simon Giesecke
ab6f0a7137 Bug 1650145 - Replace all value uses of Empty[C]String by 0-length _ns literals. r=froydnj,geckoview-reviewers,agi
Differential Revision: https://phabricator.services.mozilla.com/D82325
2020-09-23 15:17:15 +00:00
Andrea Marchesini
2d4f39e3b3 Bug 1658878 - Isolate BlobURLs per agent-cluster - cleanup remove method, r=smaug
Differential Revision: https://phabricator.services.mozilla.com/D87059
2020-08-17 09:57:04 +00:00
Andrea Marchesini
11a79e4f9b Bug 1658878 - Isolate BlobURLs per agent-cluster - pref, r=smaug
Differential Revision: https://phabricator.services.mozilla.com/D86968
2020-08-17 09:55:56 +00:00
Andrea Marchesini
8349e83822 Bug 1658878 - Isolate BlobURLs per agent-cluster, r=smaug
Differential Revision: https://phabricator.services.mozilla.com/D86914
2020-08-14 19:45:52 +00:00
Bogdan Tara
8e3f9471c9 Backed out 4 changesets (bug 1658878) for blob related leaks CLOSED TREE
Backed out changeset 0288ef9ab65b (bug 1658878)
Backed out changeset a5af0e097560 (bug 1658878)
Backed out changeset 33c4b81f99a1 (bug 1658878)
Backed out changeset 16a33c7b4ff3 (bug 1658878)
2020-08-14 22:41:05 +03:00
Andrea Marchesini
8090e5f514 Bug 1658878 - Isolate BlobURLs per agent-cluster - cleanup remove method, r=smaug
Differential Revision: https://phabricator.services.mozilla.com/D87059
2020-08-14 17:39:26 +00:00
Andrea Marchesini
128b190cb1 Bug 1658878 - Isolate BlobURLs per agent-cluster - pref, r=smaug
Differential Revision: https://phabricator.services.mozilla.com/D86968
2020-08-14 17:39:14 +00:00
Andrea Marchesini
a0130669e2 Bug 1658878 - Isolate BlobURLs per agent-cluster, r=smaug
Differential Revision: https://phabricator.services.mozilla.com/D86914
2020-08-14 16:59:44 +00:00
Mihai Alexandru Michis
d4466c7a5a Backed out 4 changesets (bug 1658878) for causing failures in browser_blobURLIsolation.js
CLOSED TREE

Backed out changeset f69f80e5659f (bug 1658878)
Backed out changeset 20401a2adaa6 (bug 1658878)
Backed out changeset a8620aecc29f (bug 1658878)
Backed out changeset 3609760c1e5d (bug 1658878)
2020-08-14 19:55:25 +03:00
Andrea Marchesini
cb8933ec11 Bug 1658878 - Isolate BlobURLs per agent-cluster - cleanup remove method, r=smaug
Differential Revision: https://phabricator.services.mozilla.com/D87059
2020-08-14 15:57:45 +00:00
Andrea Marchesini
3a8ce06a85 Bug 1658878 - Isolate BlobURLs per agent-cluster - pref, r=smaug
Differential Revision: https://phabricator.services.mozilla.com/D86968
2020-08-14 15:57:02 +00:00
Andrea Marchesini
f4d419f4c1 Bug 1658878 - Isolate BlobURLs per agent-cluster, r=smaug
Differential Revision: https://phabricator.services.mozilla.com/D86914
2020-08-14 10:41:22 +00:00
ssengupta
7cd81fc7cc Bug 1619953 - P12 - Blob data is retrieved locally for non-http/https URLs r=baku
Differential Revision: https://phabricator.services.mozilla.com/D85868
2020-08-05 17:05:36 +00:00
ssengupta
ada47e1c27 Bug 1619953 - P6 - BlobURLChannel creates BlobURLInputStream only when content stream is opened r=baku
Additionally, BlobURLChannel holds no strong reference to BlobURLInputStream. This is to avoid circular dependency.

Differential Revision: https://phabricator.services.mozilla.com/D81452
2020-08-05 17:06:04 +00:00
ssengupta
304e2dce1f Bug 1619953 - P5 - BlobURLChannel allows loading blob data that is very recently revoked r=baku
Previously similar logic existed in BlobURLProtocolHandler, which has now been removed, since such checks are now for parent process only and should be abstracted from BlobURLProtocolHandler.

Depends on D75293

Differential Revision: https://phabricator.services.mozilla.com/D81126
2020-08-05 17:06:01 +00:00
ssengupta
bc82703913 Bug 1619953 - P4 - BlobURLChannel now creates BlobURLInputStream to acquire blob data r=baku
BlobURLProtocolHandler no longer passes blobImpl pointer to BlobURLChannel. Instead, acquisition and handling of blob data is offloaded to BlobURLInputStream.

Differential Revision: https://phabricator.services.mozilla.com/D75293
2020-08-05 17:05:59 +00:00
Csoregi Natalia
a23c846016 Backed out 9 changesets (bug 1619953) for causing leaks. CLOSED TREE
Backed out changeset 9f610c8c44de (bug 1619953)
Backed out changeset 4e66983a4f00 (bug 1619953)
Backed out changeset 38aac5691967 (bug 1619953)
Backed out changeset 062c0c9b132f (bug 1619953)
Backed out changeset 830eb658d70e (bug 1619953)
Backed out changeset fccda4625d51 (bug 1619953)
Backed out changeset 4668c99560de (bug 1619953)
Backed out changeset 77c24528c8c2 (bug 1619953)
Backed out changeset b79dc688bfc9 (bug 1619953)
2020-07-02 17:58:57 +03:00
ssengupta
75156c68d8 Bug 1619953 - P6 - BlobURLChannel creates BlobURLInputStream only when content stream is opened r=baku
Additionally, BlobURLChannel holds no strong reference to BlobURLInputStream. This is to avoid circular dependency.

Differential Revision: https://phabricator.services.mozilla.com/D81452
2020-07-02 13:38:29 +00:00
ssengupta
3b2ddeb1c3 Bug 1619953 - P5 - BlobURLChannel allows loading blob data that is very recently revoked r=baku
Previously similar logic existed in BlobURLProtocolHandler, which has now been removed, since such checks are now for parent process only and should be abstracted from BlobURLProtocolHandler.

Depends on D75293

Differential Revision: https://phabricator.services.mozilla.com/D81126
2020-07-02 13:38:26 +00:00
ssengupta
e5e76226c1 Bug 1619953 - P4 - BlobURLChannel now creates BlobURLInputStream to acquire blob data r=baku
BlobURLProtocolHandler no longer passes blobImpl pointer to BlobURLChannel. Instead, acquisition and handling of blob data is offloaded to BlobURLInputStream.

Differential Revision: https://phabricator.services.mozilla.com/D75293
2020-07-02 13:38:06 +00:00
Simon Giesecke
d2e71d5859 Bug 1648010 - Remove NS_NAMED_LITERAL_CSTRING and NS_NAMED_LITERAL_STRING macros. r=froydnj
Differential Revision: https://phabricator.services.mozilla.com/D80631
2020-07-01 08:42:31 +00:00
Simon Giesecke
f6c10f5ca9 Bug 1648010 - Fix uses of NS_LITERAL_STRING with C string literals. r=geckoview-reviewers,agi,froydnj
Differential Revision: https://phabricator.services.mozilla.com/D80861
2020-07-01 08:34:12 +00:00
Simon Giesecke
a69d79b6db Bug 1648010 - Replace uses of NS_LITERAL_STRING/NS_LITERAL_CSTRING macros by _ns literals. r=geckoview-reviewers,jgilbert,agi,hsivonen,froydnj
Differential Revision: https://phabricator.services.mozilla.com/D80860
2020-07-01 08:29:29 +00:00
Nicholas Nethercote
a2ef9fa679 Bug 1645982 - Rename some service getters in Services.py to better match the types. r=froydnj
Differential Revision: https://phabricator.services.mozilla.com/D79791
2020-06-16 23:32:21 +00:00
owlishDeveloper
01acfa2770 Bug 1432949 - Allow system principal initialize a channel for revoked blob URLs r=geckoview-reviewers,snorp,baku,ckerschb
Differential Revision: https://phabricator.services.mozilla.com/D75659
2020-05-20 14:39:28 +00:00
Andreas Farre
4ca438fe5b Bug 1620594 - Part 3: Use default target for timers using SystemGroup. r=nika
Depends on D67632

Differential Revision: https://phabricator.services.mozilla.com/D67633
2020-04-07 15:16:46 +00:00
Andreas Farre
4ee379404b Bug 1620594 - Part 2: Use SchedulerGroup::Dispatch instead of SystemGroup::Dispatch. r=nika
Depends on D67631

Differential Revision: https://phabricator.services.mozilla.com/D67632
2020-04-07 15:16:33 +00:00
Emilio Cobos Álvarez
46f64ba715 Bug 1627707 - Rename LoadInfo::LoadingPrincipal to GetLoadingPrincipal as it can return null. r=ckerschb
Mostly a matter of:

  rg -l '\->LoadingPrincipal' | xargs sed -i 's/->LoadingPrincipal/->GetLoadingPrincipal/g'

And then clang-format. But I tweaked manually nsHttpChannelAuthProvider (move
the variable where it's used, don't take a useless strong ref),
AddonContentPolicy (move the declaration of the variable to the if condition),
and BackgroundUtils (same).

Differential Revision: https://phabricator.services.mozilla.com/D69828
2020-04-06 18:57:36 +00:00
Cosmin Sabou
8ca4dd2b6f Backed out 3 changesets (bug 1627707) for build bustages @ mozilla::net::LoadInfo.
Backed out changeset 65d6a90651ce (bug 1627707)
Backed out changeset 378ec30d9979 (bug 1627707)
Backed out changeset 058a19e11b06 (bug 1627707)
2020-04-06 20:07:04 +03:00
Emilio Cobos Álvarez
d828790f70 Bug 1627707 - Rename LoadInfo::LoadingPrincipal to GetLoadingPrincipal as it can return null. r=ckerschb
Mostly a matter of:

  rg -l '\->LoadingPrincipal' | xargs sed -i 's/->LoadingPrincipal/->GetLoadingPrincipal/g'

And then clang-format. But I tweaked manually nsHttpChannelAuthProvider (move
the variable where it's used, don't take a useless strong ref),
AddonContentPolicy (move the declaration of the variable to the if condition),
and BackgroundUtils (same).

Differential Revision: https://phabricator.services.mozilla.com/D69828
2020-04-06 16:00:43 +00:00
Sebastian Streich
0adae91a06 Bug 1622042 - Remove nsContentUtils::GetAsciiOrigin r=ckerschb
Differential Revision: https://phabricator.services.mozilla.com/D66634
2020-03-26 13:20:35 +00:00
Stefan Hindli
bb21fc71f7 Backed out 4 changesets (bug 1622042) for causing AddonInstallException: Could not install add-on: c:\users\task_1584560140\appdata\local\temp\tmpbg9_h7.zip: ERROR_FILE_ACCESS: There was an error accessing the filesystem. CLOSED TREE
Backed out changeset 929043330599 (bug 1622042)
Backed out changeset b08cdd075e20 (bug 1622042)
Backed out changeset ca87f1c6b90b (bug 1622042)
Backed out changeset 27dbbb7cd590 (bug 1622042)
2020-03-18 22:49:23 +02:00
Sebastian Streich
2843e0e5b8 Bug 1622042 - Remove nsContentUtils::GetAsciiOrigin r=ckerschb
Differential Revision: https://phabricator.services.mozilla.com/D66634
2020-03-18 16:00:53 +00:00
Cosmin Sabou
48ff1e921d Backed out 4 changesets (bug 1622042) for causing build bustages on nsContentUtils.cpp. CLOSED TREE
Backed out changeset dc7af5abb8de (bug 1622042)
Backed out changeset 16e3b4a1fefc (bug 1622042)
Backed out changeset f60b16588dad (bug 1622042)
Backed out changeset 4193aea26e28 (bug 1622042)
2020-03-17 20:38:35 +02:00
Sebastian Streich
5dcdec5d06 Bug 1622042 - Remove nsContentUtils::GetAsciiOrigin r=ckerschb
Differential Revision: https://phabricator.services.mozilla.com/D66634
2020-03-17 17:11:52 +00:00
Tom Schuster
8c09e50a0e Bug 1615897 - Blob URL should not ignore query parameter and revokeObjectURL additionally should not ignore fragments. r=baku
Differential Revision: https://phabricator.services.mozilla.com/D63939
2020-02-25 07:56:07 +00:00
Simon Giesecke
32c7ff2335 Bug 1613985 - Use default for equivalent-to-default constructors/destructors in dom/file. r=smaug
Differential Revision: https://phabricator.services.mozilla.com/D63166
2020-02-20 16:11:24 +00:00
Sebastian Streich
f6fab46d86 Bug 1608862 : refactor GetURI usage in BlobURLProtocolHandler.cpp r=ckerschb
***
 Add get Prepath

Differential Revision: https://phabricator.services.mozilla.com/D59731
2020-02-12 16:13:19 +00:00
Andrea Marchesini
9c0afb8603 Bug 1472158 - Broadcast BlobURLs only to processes with the same loaded origins, r=farre,asuth
Differential Revision: https://phabricator.services.mozilla.com/D57637
2020-01-09 08:15:49 +00:00
Ciure Andrei
35fc5de588 Backed out changeset 26694602791a (bug 1472158) for causing Bug 1583000 2019-12-22 15:22:58 +02:00
Andrea Marchesini
9a036c7ac5 Bug 1472158 - Broadcast BlobURLs only to processes with the same loaded origins, r=farre
Differential Revision: https://phabricator.services.mozilla.com/D57637
2019-12-20 04:28:04 +00:00
Boris Zbarsky
2df1df0176 Bug 1517588. Use nsIPrincipal::IsSystemPrincipal instead of nsContentUtils::IsSystemPrincipal r=bzbarsky
Differential Revision: https://phabricator.services.mozilla.com/D53067
2019-12-05 04:44:32 +00:00
Emilio Cobos Álvarez
e93f60910a Bug 1599843 - Make one variant of BlobURLProtocolHandler::AddDataEntry infallible. r=baku
And clean-up surrounding code by removing useless namespace qualification.

It seems like the first call to Broadcast is useless? Or am I missing something?

Differential Revision: https://phabricator.services.mozilla.com/D55000
2019-11-28 14:43:08 +00:00
Emilio Cobos Álvarez
84cbb0a900 Bug 1599843 - BlobURLProtocolHandler::AddDataEntryInternal is infallible. r=baku
Differential Revision: https://phabricator.services.mozilla.com/D54984
2019-11-27 20:11:05 +00:00
Valentin Gosu
b5b7df0e54 Bug 1536744 - Remove nsIProtocolHandler.newURI r=baku
Differential Revision: https://phabricator.services.mozilla.com/D30703
2019-05-28 13:49:27 +00:00
Sylvestre Ledru
d42e742a3e Bug 1519636 - Reformat recent changes to the Google coding style r=Ehsan
# ignore-this-changeset

Differential Revision: https://phabricator.services.mozilla.com/D24168
2019-03-31 15:12:55 +00:00
Valentin Gosu
7c4caf0aa2 Bug 1532253 - Hold lock in mozilla::dom::IsType() r=baku
Differential Revision: https://phabricator.services.mozilla.com/D24018
2019-03-19 15:14:04 +00:00
Valentin Gosu
9c03986669 Bug 1532253 - Add threadsafe BlobURLProtocolHandler::CreateNewURI r=baku
Differential Revision: https://phabricator.services.mozilla.com/D22135
2019-03-19 15:13:47 +00:00