Граф коммитов

63 Коммитов

Автор SHA1 Сообщение Дата
Francois Marier 8ac645b0cd Bug 1452699 - Add a temporary pref to disable same-site cookies. r=ckerschb,valentin
MozReview-Commit-ID: LRnaSmdSgVW

--HG--
extra : rebase_source : 9dd301f4d49b0fe6f81531d81bac2466032cc3a3
2018-04-13 18:52:28 -07:00
Christoph Kerschbaumer dadd18d654 Bug 1452496: Discard same-site cookie in cross site context. r=valentin 2018-04-12 12:52:51 +02:00
Christoph Kerschbaumer b844c33ae2 Bug 1286861: Update CookieService to enforce same site cookies. r=valentin 2018-04-08 19:52:05 +02:00
Amy Chung 222e1893c3 Bug 1421324 - Modify rejection timing when processing httponly cookie on CookieServiceChild. r=jdm 2017-12-14 13:29:32 -06:00
Chris Peterson 38fcf1fd08 Bug 1160368 - Part 2: Collect telemetry on how often first- and third-party cookies are set from HTTPS origins. r=jdm data-review=francois
This new COOKIE_SCHEME_HTTPS telemetry probe reports the same information as the COOKIE_SCHEME_SECURITY probe, but also categories cookies by whether they are set from an HTTP or HTTPS origin.

MozReview-Commit-ID: IWg8dycCzwq

--HG--
extra : source : 94708be3f00796680377b3235b78f7db70c34510
extra : intermediate-source : eaf32e92b13d54a8e8d70a7b8caf420800641d49
2017-02-16 18:58:48 -08:00
Chris Peterson f38368c9cc Bug 1160368 - Part 1: Add flag to treat third-party cookies set over nonsecure HTTP as session cookies. r=jdm
"Nonsecure HTTP" here just means regular, not-HTTPS HTTP. It doesn't mean HTTPS without the `Secure` cookie flag. Honor the expiration time of third-party cookies set over HTTPS, whether or not they have the `Secure` cookie flag. If a third-party cookie is set over HTTPS and then later sent in nonsecure HTTP request (which is allowed for cookies without the `Secure` cookie flag), the cookie won't be turned into a session cookie unless the nonsecure HTTP response sets a new cookie value.

This feature is controlled by the pref "network.cookie.thirdparty.nonsecureSessionOnly".

MozReview-Commit-ID: HlCg21JyvNC

--HG--
rename : extensions/cookie/test/unit/test_cookies_thirdparty_session.js => extensions/cookie/test/unit/test_cookies_thirdparty_nonsecure_session.js
extra : source : d1be2e4265201efd3ee93e965ac68561f548fd05
extra : intermediate-source : f5b382fa1b70e30a907b1f10d74f8c0c6dff344e
2017-02-16 19:27:49 -08:00
Amy Chung 3eec3617b1 Bug 1399590 - Modify the argument of nsICookiePermission::CanAccess for changing nsIURI to nsIPrincipal. r=jdm 2017-10-03 14:37:11 +08:00
Amy Chung e30f2f6227 Bug 1286858 - Data storage and interface changes for SameSite cookies. r=valentin 2017-09-25 01:27:04 +08:00
Chris Peterson 45aa2a8e8e Bug 870698 - Part 2: Replace Append("") with AppendLiteral(""). r=erahm
MozReview-Commit-ID: CrkIP4iHP1U

--HG--
extra : rebase_source : 5dc4e91a3f1860773c199f1abf3f66479218834a
extra : intermediate-source : ba51cc79847f2b43ba616f4a5d2bbc6958ca9f6d
extra : source : 1fda2fa990cc918c748ffa14fcc5dbe13fe3bdc3
2017-09-03 22:14:11 -07:00
Bill McCloskey 47a8d9cfd8 Bug 1398420 - Don't use SystemGroup for CookieServiceChild (r=jdm)
I noticed a bug where the following can happen. The parent sends a
TrackCookiesLoad message followed by an HTTP OnStartRequest
message. When these messages are received in the child, the
TrackCookiesLoad message goes in the SystemGroup event queue and the
OnStartRequest message goes in the event queue for the relevant
tab. Unfortunately, this means that the OnStartRequest message could
run first since the queues have no guaranteed ordering.

We really should be putting the TrackCookiesLoad message in the same
queue that the OnStartRequest message goes in. I worked on that a
little bit, but it's hard to get right. For now, I would like to leave
the cookie message unlabeled. Any unlabeled message/event is totally
ordered with respect to all other messages/events, so this fixes the
bug.

MozReview-Commit-ID: KiLDAhlrbB8
2017-09-11 19:11:05 -07:00
Kris Maglione c86bc6b1ea Bug 1396676: Return already_AddRefed from cookie service GetSingleton() methods. r=jdm
These methods return an addrefed raw pointer, which makes them easy to use in
ways that cause leaks. If they're to continue returning an addrefed pointer,
they should explicitly return an already_AddRefed.

This also switches to StaticRefPtr with ClearOnShutdown for the cached
pointers for the sake of sanity.

MozReview-Commit-ID: D0lDpU8Hqug

--HG--
extra : rebase_source : 7b199070805fc0472eaf8409932517700ed23d49
2017-09-04 15:05:10 -07:00
Amy Chung 985ec17209 Bug 1376009 - Add mIPCOpen flag and check it before sending IPC messages to the parent. r=jdm
--HG--
extra : amend_source : 6ff24b1b3f4827f69f11f2d9f6213d1ed00e3ee0
2017-08-22 03:48:00 -04:00
Kershaw Chang aa86b2e80c Bug 1388247 - Use SystemGroup to label PCookieServiceChild. r=jdm 2017-08-16 00:05:00 -04:00
Josh Matthews 2103350e42 Bug 1331680 - Bustage fix for nsIURI changes. a=bustage 2017-08-03 09:23:43 -04:00
Amy Chung 238f1e2d3a Bug 1331680 - Part 3: Broadcast cookie changes to all content processes. r=jdm 2017-08-03 18:00:12 +08:00
Amy Chung b01732f8ca Bug 1331680 - Part 2: Use local cookie hashtable in content process, and perform cookie permission checks synchronously. r=jdm 2017-08-03 17:59:31 +08:00
Amy Chung 1f101b071c Bug 1331680 - Part 1: Send required cookies to the content process on demand. r=jdm 2017-08-03 19:00:41 +08:00
Sylvestre Ledru 4e9cf83ee8 Bug 1378712 - Remove all trailing whitespaces r=Ehsan
MozReview-Commit-ID: Kdz2xtTF9EG

--HG--
extra : rebase_source : 7235b3802f25bab29a8c6ba40a181a722f3df0ce
2017-07-06 14:00:35 +02:00
Junior Hsu 96ffc639e8 Bug 1370454 - Part2: Expose runInTransaction in nsICookieService.idl, r=jduell 2017-06-06 05:36:00 +02:00
Junior Hsu 78f744d40d Bug 1363659 - Ensure not sending cookie service constructor when shutting down, r=ehsan 2017-05-26 03:08:00 +02:00
Ehsan Akhgari 87f01dcea3 Bug 1363311 - Honor Set-Cookie headers in multipart/mixed response boundary headers in e10s mode; r=jdm 2017-05-24 17:32:32 -04:00
Ehsan Akhgari c5652aad98 Bug 1339129 - Remove access to HTTP-only cookies from the child process; r=jdm 2017-02-14 10:01:47 -05:00
Sebastian Hengst ebe4ae4dc3 Backed out changeset c27179ee59e9 (bug 1339129) for failing xpcshell tests netwerk/cookie/test/unit_ipc/test_ipc_parser_0001.js and test_ipc_parser_0019.js. r=backout 2017-02-13 21:23:52 +01:00
Ehsan Akhgari cbdcae43c2 Bug 1339129 - Remove access to HTTP-only cookies from the child process; r=jdm 2017-02-13 14:08:38 -05:00
Andrea Marchesini 359ae91eac Bug 1328653 - Merging all the various *OriginAttributes to just one, r=huseby 2017-01-12 17:38:48 +01:00
Yoshi Huang 1b06918946 Bug 1301406 - replace SerializedLoadContext with NeckoOriginAttributes. r=smaug, ehsan, jduell
SerializedLoadContext carries the origin attributes of the docshell to
parent process. However document could have different origin attributes
than the docshell's. And the origin attributes of the document comes
from the LoadInfo of the channel.
So we replace SerializedLoadContext with NeckoOriginAttributes, which is from
the loadInfo of the channel, therefore parent can get the correct origin
attributes from the document.
2016-09-20 14:24:23 +08:00
Nicholas Nethercote b71747b2ac Bug 1299727 - Rename NS_WARN_IF_FALSE as NS_WARNING_ASSERTION. r=erahm.
The new name makes the sense of the condition much clearer. E.g. compare:

  NS_WARN_IF_FALSE(!rv.Failed());

with:

  NS_WARNING_ASSERTION(!rv.Failed());

The new name also makes it clearer that it only has effect in debug builds,
because that's standard for assertions.

--HG--
extra : rebase_source : 886e57a9e433e0cb6ed635cc075b34b7ebf81853
2016-09-01 15:01:16 +10:00
Michael Layzell 811eb00946 Bug 1184971 - Expose cookieBehavior and cookieLifetimePolicy preference variants from nsICookieService. r=ehsan
--HG--
extra : rebase_source : 7cfe37db0fe858f42aceda2ef90a5fa69560b86e
2015-07-17 08:01:00 +02:00
Carsten "Tomcat" Book af1ca050c6 Backed out changeset 2f4b5acae553 (bug 1184971) for causing OS X Memory Leaks
--HG--
extra : rebase_source : 8a69fbfd8f30276036a80929e2f04b1e22d60341
2015-07-21 10:27:44 +02:00
Michael Layzell 30664f5e8d Bug 1184971 - Expose cookieBehavior and cookieLifetimePolicy preference variants from nsICookieService. r=ehsan 2015-07-17 08:01:00 +02:00
Birunthan Mohanathas a8939590de Bug 1182996 - Fix and add missing namespace comments. rs=ehsan
The bulk of this commit was generated by running:

  run-clang-tidy.py \
    -checks='-*,llvm-namespace-comment' \
    -header-filter=^/.../mozilla-central/.* \
    -fix
2015-07-13 08:25:42 -07:00
Dragana Damjanovic 7987d2203e Bug 905127 - Part 2 - remove unnecessary nsNetUtil.h includes r=jduell 2015-07-06 07:55:00 +02:00
Emanuel Hoogeveen 7d1e52f2ff Bug 905127 - Part 1 - Make some functions from nsNetUtil not inline. r=jduell 2015-07-07 04:17:00 +02:00
Blake Kaplan 2b00b0f294 Bug 1087646 - fast-path null principal'd documents. r=mcmanus 2015-02-24 12:54:40 -08:00
Birunthan Mohanathas 5f1fde8824 Bug 900908 - Part 3: Change uses of numbered macros in nsIClassInfoImpl.h/nsISupportsImpl.h to the variadic variants. r=froydnj 2014-04-27 03:06:00 -04:00
Ehsan Akhgari 1b83407ce9 Bug 927728 - Part 1: Replace PRUnichar with char16_t; r=roc
This patch was automatically generated by the following script:

#!/bin/bash
# Command to convert PRUnichar to char16_t

function convert() {
echo "Converting $1 to $2..."
find . ! -wholename "*nsprpub*" \
       ! -wholename "*security/nss*" \
       ! -wholename "*modules/libmar*" \
       ! -wholename "*/.hg*" \
       ! -wholename "obj-ff-dbg*" \
       ! -name prtypes.h \
       ! -name Char16.h \
         -type f \
      \( -iname "*.cpp" \
         -o -iname "*.h" \
         -o -iname "*.c" \
         -o -iname "*.cc" \
         -o -iname "*.idl" \
         -o -iname "*.ipdl" \
         -o -iname "*.ipdlh" \
         -o -iname "*.mm" \) | \
    xargs -n 1 sed -i -e "s/\b$1\b/$2/g"
}

convert PRUnichar char16_t
2014-01-04 10:02:17 -05:00
Ryan VanderMeulen 6e2343aa58 Backed out changeset e2536905b186 (bug 940194) for bustage. 2013-11-21 09:38:59 -05:00
Michael Shuen 301a0d2bb2 Bug 940194 - Build netwerk/cookie in unified mode. r=ehsan 2013-11-21 09:22:25 -05:00
Nathan Froyd 05e020c835 Bug 918651 - part 7a - fix source files bootlegging things from IPDL headers; rs=ehsan 2013-10-18 16:57:55 -04:00
Birunthan Mohanathas 8975ae03b9 Bug 784739 - Switch from NULL to nullptr in netwerk/ (1/2); r=ehsan 2013-09-19 15:28:26 -04:00
Ehsan Akhgari c915f4615d Bug 917266 - Remove some unneeded code in netwerk/; r=mcmanus 2013-09-17 12:38:55 -04:00
David Zbarsky bde5f8493e Bug 890570 - PCookieService doesn't need PBrowser r=jduell 2013-08-21 02:49:41 -04:00
Jonathan Mayer 529b037b7c Bug 818340 - change third party cookie handling to block third party cookies from sites I haven't visited. (r=jdm, r=dolske)
--HG--
extra : rebase_source : f486f39feac1fb743edc920618bec29884d515f1
2013-02-22 08:16:01 -08:00
Jason Duell fca682ab29 Bug 833935 - Warn when child is about to issue illegal IPDL request. r=jdm 2013-01-24 19:24:00 +00:00
Josh Matthews 7482ee38c6 Bug 782542 - Secure necko IPDL usage. r=ted,jduell a=blocking-b2g 2012-12-29 04:02:16 -05:00
Josh Matthews 315334a8d5 Backed out changeset 6cd44513d285 (bug 782542) 2012-12-28 19:18:38 -05:00
Josh Matthews 8574d2db42 Bug 782542 - Secure necko IPDL usage. r=ted,jduell a=blocking-b2g 2012-12-12 10:40:33 -05:00
Ed Morley f41c087da9 Backout 3e4e600adc3b (bug 782542) for crashtest-ipc timeouts 2012-12-16 18:09:39 +00:00
Josh Matthews 4d20bfdcc1 Bug 782542 - Secure necko IPDL usage. r=ted,jduell
* * *
Bug 782542 - Disable network.ipc security for certain mochitests r=ted
* * *
Bug 782542.  Disable some more tests that use mozbrowser w/o app r?ted
* * *
Bug 782542 : yet another test needs tweaking. r?ted
2012-12-12 10:40:33 -05:00
Ehsan Akhgari 367b53417c Backed out changeset 34c9ccee8058 (bug 782542) for mochitest failures 2012-12-11 15:04:11 -05:00