Jorg K
e09c6c1b10
Bug 1353204 - Follow-up: Use entire spec for origin for Thunderbird. r=bz
...
--HG--
extra : rebase_source : a1847772dc26a5042e9cd71b066e0d5843daf4de
2017-04-10 14:04:11 +02:00
Bobby Holley
564ee797a4
Bug 1353204 - Move the hostPort case after the nsIStandardURL check. r=bz
...
MozReview-Commit-ID: HIqxhEE41G0
2017-04-05 21:35:07 -07:00
Bobby Holley
4e4b492742
Bug 1353204 - Factor out the full-spec-to-origin machinery and use it if the Thunderbird-only flag is set. r=bz
...
MozReview-Commit-ID: 8acGT0n6O3X
2017-04-05 21:35:07 -07:00
Gijs Kruitbosch
8a8722824e
Bug 1352513 - re-add the hidden window exception behind a pref, r=bholley
...
MozReview-Commit-ID: 3q1CZ5QCuus
--HG--
extra : rebase_source : adb93e2ee26e17f8ce03023deebc85d657dfe498
2017-04-03 11:47:22 +01:00
Gijs Kruitbosch
17162a90b4
Bug 1145470 - remove hiddenWindow specialcasing from CheckLoadURI code, r=bholley
...
All the consumers relying on this have disappeared, so we can (finally!) get
rid of this ugly bit of special-casing.
MozReview-Commit-ID: HSeeG21O0p4
--HG--
extra : rebase_source : faebaf646308fe29b1c23e4117db2c1ea52ad658
2017-03-30 11:16:17 +01:00
Andrea Marchesini
2c716cd273
Bug 1347817 - Principal must always have a valid origin - part 6 - fixing tests, r=ehsan
2017-03-29 15:28:46 +02:00
Andrea Marchesini
3c0ea7282d
Bug 1347817 - Principal must always have a valid origin - part 4 - origin passed as argument when a principal is created, r=bholley
2017-03-29 08:24:01 +02:00
Andrea Marchesini
6ad34a8c5e
Bug 1347817 - Principal must always have a valid origin - part 3 - move origin to BasePrincipal, r=bholley
2017-03-29 08:22:26 +02:00
Andrea Marchesini
8d4516d1d9
Bug 1347817 - Principal must always have a valid origin - part 2 - move OriginAttributes to the BasePrincipal, r=bholley
2017-03-29 08:21:03 +02:00
Andrea Marchesini
d0aca06da7
Bug 1347817 - Principal must always have a valid origin - part 1 - renaming GetOriginInternal to GetOriginNoSuffixInternal, r=qdot
2017-03-29 08:19:41 +02:00
Sebastian Hengst
65459a7f0a
Backed out changeset a70b549ac35d (bug 1347817) for failing test_websocket-transport.html on OSX 10.10 debug. r=backout
2017-03-29 11:18:41 +02:00
Sebastian Hengst
2d288e10b9
Backed out changeset c0e8522353bd (bug 1347817)
2017-03-29 11:17:22 +02:00
Sebastian Hengst
32c96bb13a
Backed out changeset d71d95c73542 (bug 1347817)
2017-03-29 11:17:18 +02:00
Sebastian Hengst
f61a4826a3
Backed out changeset 059bcee1ccda (bug 1347817)
2017-03-29 11:17:13 +02:00
Sebastian Hengst
eadf7b5c6e
Backed out changeset 4af10700c64c (bug 1347817)
2017-03-29 11:17:04 +02:00
Andrea Marchesini
4b77f4a4b9
Bug 1347817 - Principal must always have a valid origin - part 6 - fixing tests, r=ehsan
2017-03-29 08:27:17 +02:00
Andrea Marchesini
0c636438cd
Bug 1347817 - Principal must always have a valid origin - part 4 - origin passed as argument when a principal is created, r=bholley
2017-03-29 08:24:01 +02:00
Andrea Marchesini
9ff7505132
Bug 1347817 - Principal must always have a valid origin - part 3 - move origin to BasePrincipal, r=bholley
2017-03-29 08:22:26 +02:00
Andrea Marchesini
6328758fcf
Bug 1347817 - Principal must always have a valid origin - part 2 - move OriginAttributes to the BasePrincipal, r=bholley
2017-03-29 08:21:03 +02:00
Andrea Marchesini
d775e1a0a0
Bug 1347817 - Principal must always have a valid origin - part 1 - renaming GetOriginInternal to GetOriginNoSuffixInternal, r=qdot
2017-03-29 08:19:41 +02:00
Eric Rahm
f9c9fc67cf
Bug 1349805 - Convert NS_ENSURE_TRUE in ContentPrincipal::GetOriginInternal to an if statement. r=baku
...
MozReview-Commit-ID: IgT8ZQ6ByKG
2017-03-23 14:30:16 -07:00
Sebastian Hengst
f5e68bc3e1
Backed out changeset ef22dba0dac5 (bug 1316683) for various test failures, e.g. xpcshell netwerk/test/unit/test_bug826063.js and browser-chrome browser/components/downloads/test/browser/browser_iframe_gone_mid_download.js. r=backout on a CLOSED TREE
2017-03-22 20:28:39 +01:00
Ehsan Akhgari
101a58b3c6
Bug 1316683 - Avoid going into SpiderMonkey for retrieving origin attributes; r=baku
...
Our caller is C++ code, and the implementations are all also written in C++,
so there is no reason to go through SpiderMonkey here. This patch also makes
nsILoadContext builtinclass to ensure that the implementation is always native.
2017-03-22 14:13:31 -04:00
Andrea Marchesini
8d7c2746ea
Bug 1349512 - Move OriginAttributes class in separate files, r=qdot
...
--HG--
rename : caps/BasePrincipal.cpp => caps/OriginAttributes.cpp
rename : caps/BasePrincipal.h => caps/OriginAttributes.h
2017-03-22 18:45:40 +01:00
Sebastian Hengst
20fb8455d6
Backed out changeset 7e47807067a6 (bug 1316683) for Windows bustage. r=backout
2017-03-22 15:15:27 +01:00
Ehsan Akhgari
9093d5f005
Bug 1316683 - Avoid going into SpiderMonkey for retrieving origin attributes; r=baku
...
Our caller is C++ code, and the implementations are all also written in C++,
so there is no reason to go through SpiderMonkey here. This patch also makes
nsILoadContext builtinclass to ensure that the implementation is always native.
2017-03-22 10:03:26 -04:00
Andrea Marchesini
507c00cb9f
Bug 1343933 - Renaming Principal classes - part 4 - ContentPrincipal, r=qdot
...
--HG--
rename : caps/nsPrincipal.cpp => caps/ContentPrincipal.cpp
rename : caps/nsPrincipal.h => caps/ContentPrincipal.h
2017-03-22 11:39:31 +01:00
Andrea Marchesini
f91cb666bb
Bug 1343933 - Renaming Principal classes - part 3 - SystemPrincipal, r=qdot
...
--HG--
rename : caps/nsSystemPrincipal.cpp => caps/SystemPrincipal.cpp
rename : caps/nsSystemPrincipal.h => caps/SystemPrincipal.h
2017-03-22 11:39:08 +01:00
Andrea Marchesini
1fd1bc3935
Bug 1343933 - Renaming Principal classes - part 2 - NullPrincipal, r=qdot
...
--HG--
rename : caps/nsNullPrincipal.cpp => caps/NullPrincipal.cpp
rename : caps/nsNullPrincipal.h => caps/NullPrincipal.h
rename : caps/nsNullPrincipalURI.cpp => caps/NullPrincipalURI.cpp
rename : caps/nsNullPrincipalURI.h => caps/NullPrincipalURI.h
2017-03-22 11:38:40 +01:00
Andrea Marchesini
68207654f2
Bug 1343933 - Renaming Principal classes - part 1 - ExpandedPrincipal, r=qdot
...
--HG--
rename : caps/nsExpandedPrincipal.cpp => caps/ExpandedPrincipal.cpp
rename : caps/nsExpandedPrincipal.h => caps/ExpandedPrincipal.h
2017-03-22 11:38:17 +01:00
Wes Kocher
4f5262444c
Merge inbound to central, a=merge
...
MozReview-Commit-ID: 2omKclRg40c
2017-03-20 18:19:52 -07:00
Andrea Marchesini
50f7937e84
Bug 1340163 - Introducing originNoSuffix as attribute in ContentPrincipalInfo, r=smaug
2017-03-20 16:03:45 +01:00
Sebastian Hengst
a472d9b04f
Backed out changeset 54a1f0cb64d9 (bug 1340163) for crashing e.g. in browser/components/originattributes/test/browser/browser_cacheAPI.js. r=backout
2017-03-20 15:38:19 +01:00
Andrea Marchesini
38c6ab4035
Bug 1340163 - Introducing originNoSuffix as attribute in ContentPrincipalInfo, r=smaug
2017-03-20 14:51:54 +01:00
Frederik Braun
622080220c
Bug 1073952: proper indentation for nsScriptSecurityManager::GetChannelResultPrincipal r=Tomcat
...
MozReview-Commit-ID: 84qywpARPwI
--HG--
extra : rebase_source : fd0bc97039e95d93ba0eb7688ef3e1571ef1bba3
2017-01-30 14:13:13 +01:00
Frederik Braun
390a075c26
Bug 1073952: inherit CSP into iframe sandbox srcdoc r=ckerschb,Tomcat
...
MozReview-Commit-ID: 3fhWCGwgG4A
--HG--
extra : rebase_source : 7e84fafe0ef69b7f6695de825fc254ee0e4209ba
2017-01-30 14:09:37 +01:00
Ehsan Akhgari
15bd78db3c
Bug 1347369 - Avoid dynamic allocation of URLParams in OriginAttributes methods; r=baku
...
These show up in some profiles sometimes, and there is no reason why
the variables can't simply live on the stack.
2017-03-15 23:03:31 -04:00
Yoshi Huang
996e0349b3
Bug 1300671 - set firstPartyDomain on about: pages. r=smaug
...
When we load about:blank in a remote tab, it will have
LOAD_FLAGS_DISALLOW_INHERIT_PRINCIPAL flag set, which will make
NullPrinicipal as its document principal. So we add
NULL_PRINCIPAL_FIRST_PARTY_DOMAIN as its firstPartyDomain.
So when we load data:, or javascript: URI in a remote tab, it will inherit the
principal from about:blank, hence also inherit the origin attributes.
There are also some about: pages will use codebase principal, so we also
set ABOUT_URI_FIRST_PARTY_DOMAIN as firstPartyDomain on their
principals.
2017-03-14 16:22:02 +08:00
Andrea Marchesini
e9195daa8d
Bug 1345168 - Get rid of OriginAttributes::Inherit, r=tjr
2017-03-08 07:41:51 +01:00
Carsten "Tomcat" Book
087da3f0d9
merge mozilla-inbound to mozilla-central a=merge
2017-03-07 15:13:31 +01:00
Ehsan Akhgari
9b370e9857
Bug 1344974 - Part 2: Make the non-virtual helpers for principal equality/subsumption checks inline; r=bholley
2017-03-07 00:29:27 -05:00
Ehsan Akhgari
0f5f27679b
Bug 1344974 - Part 1: Factor out more non-virtual helpers for principal equality/subsumption checks; r=bholley
2017-03-07 00:22:21 -05:00
Ehsan Akhgari
e3ddbde083
Bug 1340710 - Part 10 - Remove BasePrincipal::EqualsIgnoringAddonId which somehow crept back in during the last rebase
...
Landed on a CLOSED TREE
2017-03-06 23:22:01 -05:00
Ehsan Akhgari
3812e3f854
Bug 1340710 - Part 9: Speed up the OriginAttributes comparison in BasePrincipal::Subsumes(); r=bholley
2017-03-06 22:31:05 -05:00
Ehsan Akhgari
513af88e99
Bug 1340710 - Part 8: Add a fast path for nsIPrincipal::EqualsConsideringDomain() and nsIPrincipal::SubsumesConsideringDomain(); r=bholley
2017-03-06 22:30:54 -05:00
Ehsan Akhgari
e6073c48a5
Bug 1340710 - Part 7: Add a fast path for nsIPrincipal::Equals() and nsIPrincipal::EqualsConsideringDomain(); r=bholley
2017-03-06 22:27:59 -05:00
Ehsan Akhgari
3169d6c35c
Bug 1340710 - Part 6: Store BasePrincipal::{mOriginNoSuffix,mOriginSuffix} as a pair of atoms; r=bholley
...
This has the nice side effect of making nsIPrincipal::GetOrigin() a bit faster
by avoiding computing the origin each time.
2017-03-06 22:27:53 -05:00
Ehsan Akhgari
5a95757626
Bug 1340710 - Part 5: Make nsIPrincipal.origin throw for about:blank codebase URI principals; r=bholley
...
Two about:blank codebase URI principals are only equal if their
object identities are the same, but not if their string
serializations happen to be equal (as they always will be.) In order
to ensure that we always get this right in places where we compare
the origin properties of two principals to check for their equality,
we should ensure that the origin getter would throw so that we never
incorrectly conclude that two such principals are equal.
We will soon start returning a null principal instead of a codebase
principal under this situation.
2017-03-06 22:27:51 -05:00
Ehsan Akhgari
57d1fd125b
Bug 1340710 - Part 4: Fix nsIPrincipal::GetOrigin()'s handling of non-strict file:// URI origin policy; r=bholley
2017-03-06 22:27:45 -05:00
Ehsan Akhgari
f3dc163eaf
Bug 1340710 - Part 3: Add an assertion to ensure that codebase principals are never constructed with URI schemes such as javascript:, about: and data:; r=bholley
2017-03-06 22:27:40 -05:00