Граф коммитов

103 Коммитов

Автор SHA1 Сообщение Дата
Yoshi Huang cefd88cc40 Bug 1367581 - don't bail out if the channel doesn't have loadInfo. r=valentin 2017-06-07 14:14:00 +08:00
John Schoenick 4ce6580106 Bug 558184 - Part 4.3 - Load fake plugin handlers as eType_FakePlugin in nsObjectLoadingContent. r=peterv.
--HG--
extra : rebase_source : 4683568e90fd65a38c974aa755dd5f6f94479ee3
extra : source : 8e4be859c1a1ec73b29df98422d5ee6935cd9aa9
2015-05-20 15:30:05 +02:00
Valentin Gosu a1c45c3558 Bug 1368549 - Remove MOZ_WIDGET_GONK from netwerk/* r=mcmanus
MozReview-Commit-ID: J2njLbNwlco

--HG--
extra : rebase_source : ccb35cb5845024c1bf7b448ebcec451bab264e8b
2017-05-29 22:09:04 +02:00
Thomas Nguyen 4fcb94e968 Bug 1351146 - P1 - Add more information to redirect chains. r=dragana
In order to provide more details context of how client arrived at the unsafe
page, particularly in redirect case, we may have to add more information to
redirect chains including:
- referrer (if any)
- remote address.
- URL

We may want to use an idl interface instead of nsIPrincipal to store these
information

MozReview-Commit-ID: 3Uh4r06w60C
2017-05-25 19:42:00 +02:00
Honza Bambas b852ed009a Backout of 7f28c1084c47 (bug 1319111) for security checks breakage, r=me 2017-05-25 18:16:02 +02:00
Honza Bambas 2dfe5d94b8 Bug 1319111 - Expose 'result principal URI' on LoadInfo as a source for NS_GetFinalChannelURI (removes some use of LOAD_REPLACE flag). r=bz 2017-05-23 08:09:00 -04:00
Edouard Oger d198d9c234 Bug 1365273 - Remove about:sync-tabs. r=markh
MozReview-Commit-ID: HFsc4xf8N3a

--HG--
extra : rebase_source : 0af5802196622a3c44b162a4de7e2ceadfde666d
2017-05-17 11:39:22 -04:00
Sebastian Hengst cb81b8de15 Backed out changeset b8d0fdf79562 (bug 1365273) for build bustage: Unused pattern 'sync/**' in browser/base/content/moz.build and unreferenced files detected by browser_all_files_referenced.js. r=backout 2017-05-18 19:09:55 +02:00
Edouard Oger ca11d95460 Bug 1365273 - Remove about:sync-tabs. r=markh
MozReview-Commit-ID: HFsc4xf8N3a

--HG--
extra : rebase_source : 841763ceb5a2ce3630e2f0f3625f7d3d20569135
2017-05-17 11:39:22 -04:00
Honza Bambas d6d727a69e backout of f9abb9c83452 (bug 1319111) for crashes, r=bz 2017-05-13 13:55:11 +02:00
Wes Kocher 0a1e1fe23b Backed out changeset 95ff98f1c2e5 (bug 1319111) for talos failures a=backout
MozReview-Commit-ID: Gs09moFm5rQ
2017-05-12 18:24:42 -07:00
Honza Bambas 70f62bdec1 backout of f9abb9c83452 (bug 1319111) for crashes, r=bz 2017-05-12 22:13:49 +02:00
Kershaw Chang 2d78667ba8 Bug 1352176 - Part1: Pass a labeled event target when initializing nsInputStreamPump, r=mayhemer
Since the mTargetThread in nsInputStreamPump is directly acquired from current or main thread, we need to pass another labeled main thread target to dispatch runnables to the correct tab/doc group.
2017-05-09 19:59:00 +02:00
Ehsan Akhgari e0f12d7786 Bug 1362806 - Optimize NS_GetDefaultPort() for HTTP(S); r=mcmanus 2017-05-07 22:34:02 -04:00
Honza Bambas a1b64b4694 Bug 1319111 - Expose URI to make security check against on LoadInfo (no LOAD_REPLACE flag). r=bz 2017-01-27 19:10:01 +01:00
Yoshi Huang 7652396698 Bug 1284579 - Part 2: revise NS_ShouldCheckAppCache. r=valentin
There's one redudant NS_ShouldCheckAppCache(nsIURI*, bool) is not used
anymore. Also we remove the extra usePrivateBrowsing argument, since we
can get this information from nsIPrincipal.
2017-05-04 09:40:00 +08:00
Yoshi Huang 339c4768ca Bug 1284579 - Part 1:revise NS_UsePrivateBrowsing to get PB from origin attributes. r=valentin 2017-05-04 09:39:17 +08:00
Andi-Bogdan Postelnicu d5f08cd7a3 Bug 1359369 - prevent null pointer dereference in NS_GetIsDocumentChannel. r=valentin
MozReview-Commit-ID: I1iu2miXmjZ

--HG--
extra : rebase_source : ea86f96806ae0536cb799e28c286e92d4c3b4717
2017-04-25 14:38:03 +03:00
Valentin Gosu 0a4d506e21 Bug 1354349 - Add nsIChannel.isDocument that checks if LOAD_DOCUMENT_URI is set, or if LOAD_HTML_OBJECT_DATA and the channel has the appropriate MIME type r=mcmanus,mystor
MozReview-Commit-ID: K28Opd9JTr2

--HG--
extra : rebase_source : d1a786d9b4318be15f195fdc330489121ebd6ece
2017-04-20 10:15:06 +08:00
Tom Tung 8c93a46f2a Bug 1330297 - Part 1: Strip leading or trailing HTTP whitespace for Header value to follow the spec and share code bewteen fetch and XHR. r=baku 2017-04-10 16:15:29 +08:00
Kershaw Chang 3310ba5db8 Bug 1309653 - Part1: Add new API for updating current top level outer content windowId - v2, r=honzab
--HG--
extra : rebase_source : a7a9797ad94d66e9ecb9b13a6d7103c0af2303ff
2017-03-10 01:32:00 +01:00
Wei-Cheng Pan 03ca0df8a1 Bug 1310127 - Part 3: Use MOZ_MUST_USE in netwerk/protocol/http r=mcmanus
Add assertions.

MozReview-Commit-ID: DPvgKzVr3ip

--HG--
extra : rebase_source : a96d658c8b76180fe5a904106de9a68de16e0383
2017-01-12 17:48:45 +08:00
Nick 88d3231652 Bug 1343545 - Moved necessary code out of nsNetUtilInlines.h and removed the file r=bsmedberg
MozReview-Commit-ID: AazctrDbCdf

--HG--
extra : rebase_source : 153265d7b2bf208d8a22c648f621c0f7f40ff405
2017-03-02 09:32:37 -05:00
Andrea Marchesini e87ad16573 Bug 1339710 - Remove nsIPartialFileInputStream, r=smaug 2017-02-22 09:41:51 +01:00
Iris Hsiao f9bdfe10bb Backed out 5 changesets (bug 1339710) for GTest failures in TestSlicedInputStream.StartBiggerThan
Backed out changeset 7c0ec55b44dc (bug 1339710)
Backed out changeset cbb4e1c2aada (bug 1339710)
Backed out changeset c685dca493f5 (bug 1339710)
Backed out changeset 4761a15d45fd (bug 1339710)
Backed out changeset 7561692c1bc7 (bug 1339710)
2017-02-22 16:19:50 +08:00
Andrea Marchesini 190bf147a2 Bug 1339710 - Remove nsIPartialFileInputStream, r=smaug 2017-02-22 07:56:29 +01:00
Ehsan Akhgari 8b87856c36 Bug 1340677 - Stop supporting ORIGIN_IS_FULL_SPEC for Firefox; r=mcmanus
This is only used in Thunderbird and SeaMonkey and makes origin
comparisons needlessly slow in Firefox.
2017-02-21 10:37:37 -05:00
Carsten "Tomcat" Book 85079555b0 Merge mozilla-central to autoland 2017-02-20 14:12:30 +01:00
Jonathan Hao 9a4de2ace4 Bug 1323644 - Isolate the HSTS and HPKP storage by first party domain (Necko) r=ckerschb
MozReview-Commit-ID: 6DFPXTXoykc

--HG--
extra : rebase_source : 4c69a918b289f76a75ac463f08a6e43f7b625571
2017-02-14 10:29:41 +08:00
Tim Huang 756cf900c9 Bug 1336802 - Part 2: Updating the whole code base to make sure nsILoadInfo get null check. r=smaug
--HG--
extra : rebase_source : 22149fd540fd02119afe9fe5c9a815d01cf959c1
2017-02-07 11:49:34 +08:00
Andrea Marchesini 359ae91eac Bug 1328653 - Merging all the various *OriginAttributes to just one, r=huseby 2017-01-12 17:38:48 +01:00
Thomas Nguyen 8cd72c67ca Bug 1304623 - Create a pref to control the default referrer policy- part 2. r=mcmanus, r=bkelly
MozReview-Commit-ID: GEUDZ8UZAT5
2017-01-05 11:30:03 +08:00
Christoph Kerschbaumer c88d12696d Bug 1182569: Update ContentSecurityManager to handle docshell loads. r=smaug 2017-01-03 20:59:30 +01:00
Wei-Cheng Pan 19fc36c981 Bug 1323947 - Use Use MOZ_MUST_USE in netwerk/protocol/viewsource r=valentin
MozReview-Commit-ID: 5JAkF53s42X

--HG--
extra : rebase_source : 5e3d82f3b15b25c610086e26e941cb6064acf975
2016-11-23 17:21:17 +08:00
Ehsan Akhgari fd99cf4221 Bug 1318888 - Remove a few other mentions of appId's from Necko; r=mcmanus 2016-11-21 15:00:49 -05:00
Ehsan Akhgari 0fad752fae Bug 1318887 - Remove NS_GetAppInfo; r=mcmanus
This function is now only used to populate some write-only data members.
2016-11-21 15:00:46 -05:00
Ehsan Akhgari 1488007b30 Bug 1318206 - Remove some unused code for clearing app data; r=baku,mcmanus 2016-11-17 08:30:21 -05:00
Ehsan Akhgari eac76d9772 Bug 1310845 - Remove support for mozapp iframes; r=fabrice,jryans,baku,mcmanus
This patch removes support for mozapp iframes, leaving support for
mozbrowser iframes intact.  Some of the code has been rewritten in order
to phrase things in terms of mozbrowser only, as opposed to mozbrowser
or app.  In some places, code that was only useful with apps has been
completely removed, so that the APIs consumed can also be removed.  In
some places where the notion of appId was bleeding out of this API, now
we use NO_APP_ID.  Other notions of appId which were restricted to this
API have been removed.
2016-11-16 09:13:38 -05:00
Carsten "Tomcat" Book 3eacc680db Backed out changeset 7d1f7dd996f7 (bug 1310845) 2016-11-16 14:50:44 +01:00
Ehsan Akhgari cb369370b3 Bug 1310845 - Remove support for mozapp iframes; r=fabrice,jryans,baku,mcmanus
This patch removes support for mozapp iframes, leaving support for
mozbrowser iframes intact.  Some of the code has been rewritten in order
to phrase things in terms of mozbrowser only, as opposed to mozbrowser
or app.  In some places, code that was only useful with apps has been
completely removed, so that the APIs consumed can also be removed.  In
some places where the notion of appId was bleeding out of this API, now
we use NO_APP_ID.  Other notions of appId which were restricted to this
API have been removed.
2016-11-15 18:31:46 -05:00
Dragana Damjanovic 0c685d3bcb Bug 1301407 - Remove release assert for nss initialization. r=keeler
--HG--
extra : rebase_source : 0192a97588e00e82f36921bb2d6cfe751cb9aa31
2016-11-08 00:13:00 +01:00
Dragana Damjanovic dd.mozilla@gmail.com 30904871cc Bug 1301407 - Ensure nss initialized during nsHttpHandler initialization. r=mcmanus, r=keeler 2016-10-25 10:43:00 -04:00
Yoshi Huang 3e74d36035 Bug 1308938: skip check for about: pages. r=baku 2016-10-19 15:16:34 +08:00
Valentin Gosu d746e122c8 Bug 1307491 - (Part 1) Remove support for per-app-offline in netwerk/ [nukeb2g] r=bagder
* * *
Bug 1307491 - Remove support for per-app-offline [nukeb2g] r=bagder

MozReview-Commit-ID: FoweWBv9QyE

--HG--
extra : rebase_source : 0f6e0f0d19f108c3aef8b25cb6d605ecd338ee2b
2016-10-17 03:54:46 +02:00
Tim Huang 17d537f0e1 Bug 1277803 - Part 4 : Make the NS_CompareLoadInfoAndLoadContext() skiping test if the request is the favicon loading from the XUL image. r=honzab 2016-10-13 15:43:59 +08:00
Wes Kocher 2142de26c1 Backed out 8 changesets (bug 1277803) for browser-chrome test failures a=backout
Backed out changeset 477890efdb88 (bug 1277803)
Backed out changeset 49da326bfe68 (bug 1277803)
Backed out changeset 2d17a40a9077 (bug 1277803)
Backed out changeset b1cb0a195ca1 (bug 1277803)
Backed out changeset c7d82459d152 (bug 1277803)
Backed out changeset 3be9a06248af (bug 1277803)
Backed out changeset 8d119ca96999 (bug 1277803)
Backed out changeset be767a6f7ecd (bug 1277803)
2016-10-12 14:26:00 -07:00
Tim Huang 6e27a2a6a1 Bug 1277803 - Part 4 : Make the NS_CompareLoadInfoAndLoadContext() skiping test if the request is the favicon loading from the XUL image. r=honzab 2016-10-12 17:32:08 +08:00
James Andreou a47ce92ac2 Bug 1282124 - Remove nsILoadInfo.usePrivateBrowsing and the SEC_FORCE_PRIVATE_BROWSING flag; r=smaug,jryans 2016-09-27 16:56:44 -04:00
Kate McKinley c57d400961 Bug 1246540 - HSTS Priming Proof of Concept. r=ckerschb, r=mayhemer, r=jld, r=smaug, r=dkeeler, r=jmaher, p=ally
HSTS priming changes the order of mixed-content blocking and HSTS
upgrades, and adds a priming request to check if a mixed-content load is
accesible over HTTPS and the server supports upgrading via the
Strict-Transport-Security header.

Every call site that uses AsyncOpen2 passes through the mixed-content
blocker, and has a LoadInfo. If the mixed-content blocker marks the load as
needing HSTS priming, nsHttpChannel will build and send an HSTS priming
request on the same URI with the scheme upgraded to HTTPS. If the server
allows the upgrade, then channel performs an internal redirect to the HTTPS URI,
otherwise use the result of mixed-content blocker to allow or block the
load.

nsISiteSecurityService adds an optional boolean out parameter to
determine if the HSTS state is already cached for negative assertions.
If the host has been probed within the previous 24 hours, no HSTS
priming check will be sent.

MozReview-Commit-ID: ES1JruCtDdX

--HG--
extra : rebase_source : 2ac6c93c49f2862fc0b9e595eb0598cd1ea4bedf
2016-09-27 11:27:00 -04:00
Ehsan Akhgari 39ca2d769a Bug 1340712 - Remove MOZILLA_INTERNAL_API ifdef's from nsNetUtil.cpp; r=mcmanus
The C++ code inside libxul always uses the internal API.
2017-02-18 09:41:52 -05:00