Andrea Marchesini
50f7937e84
Bug 1340163 - Introducing originNoSuffix as attribute in ContentPrincipalInfo, r=smaug
2017-03-20 16:03:45 +01:00
Sebastian Hengst
a472d9b04f
Backed out changeset 54a1f0cb64d9 (bug 1340163) for crashing e.g. in browser/components/originattributes/test/browser/browser_cacheAPI.js. r=backout
2017-03-20 15:38:19 +01:00
Andrea Marchesini
38c6ab4035
Bug 1340163 - Introducing originNoSuffix as attribute in ContentPrincipalInfo, r=smaug
2017-03-20 14:51:54 +01:00
Frederik Braun
622080220c
Bug 1073952: proper indentation for nsScriptSecurityManager::GetChannelResultPrincipal r=Tomcat
...
MozReview-Commit-ID: 84qywpARPwI
--HG--
extra : rebase_source : fd0bc97039e95d93ba0eb7688ef3e1571ef1bba3
2017-01-30 14:13:13 +01:00
Frederik Braun
390a075c26
Bug 1073952: inherit CSP into iframe sandbox srcdoc r=ckerschb,Tomcat
...
MozReview-Commit-ID: 3fhWCGwgG4A
--HG--
extra : rebase_source : 7e84fafe0ef69b7f6695de825fc254ee0e4209ba
2017-01-30 14:09:37 +01:00
Ehsan Akhgari
15bd78db3c
Bug 1347369 - Avoid dynamic allocation of URLParams in OriginAttributes methods; r=baku
...
These show up in some profiles sometimes, and there is no reason why
the variables can't simply live on the stack.
2017-03-15 23:03:31 -04:00
Yoshi Huang
996e0349b3
Bug 1300671 - set firstPartyDomain on about: pages. r=smaug
...
When we load about:blank in a remote tab, it will have
LOAD_FLAGS_DISALLOW_INHERIT_PRINCIPAL flag set, which will make
NullPrinicipal as its document principal. So we add
NULL_PRINCIPAL_FIRST_PARTY_DOMAIN as its firstPartyDomain.
So when we load data:, or javascript: URI in a remote tab, it will inherit the
principal from about:blank, hence also inherit the origin attributes.
There are also some about: pages will use codebase principal, so we also
set ABOUT_URI_FIRST_PARTY_DOMAIN as firstPartyDomain on their
principals.
2017-03-14 16:22:02 +08:00
Andrea Marchesini
e9195daa8d
Bug 1345168 - Get rid of OriginAttributes::Inherit, r=tjr
2017-03-08 07:41:51 +01:00
Carsten "Tomcat" Book
087da3f0d9
merge mozilla-inbound to mozilla-central a=merge
2017-03-07 15:13:31 +01:00
Ehsan Akhgari
9b370e9857
Bug 1344974 - Part 2: Make the non-virtual helpers for principal equality/subsumption checks inline; r=bholley
2017-03-07 00:29:27 -05:00
Ehsan Akhgari
0f5f27679b
Bug 1344974 - Part 1: Factor out more non-virtual helpers for principal equality/subsumption checks; r=bholley
2017-03-07 00:22:21 -05:00
Ehsan Akhgari
e3ddbde083
Bug 1340710 - Part 10 - Remove BasePrincipal::EqualsIgnoringAddonId which somehow crept back in during the last rebase
...
Landed on a CLOSED TREE
2017-03-06 23:22:01 -05:00
Ehsan Akhgari
3812e3f854
Bug 1340710 - Part 9: Speed up the OriginAttributes comparison in BasePrincipal::Subsumes(); r=bholley
2017-03-06 22:31:05 -05:00
Ehsan Akhgari
513af88e99
Bug 1340710 - Part 8: Add a fast path for nsIPrincipal::EqualsConsideringDomain() and nsIPrincipal::SubsumesConsideringDomain(); r=bholley
2017-03-06 22:30:54 -05:00
Ehsan Akhgari
e6073c48a5
Bug 1340710 - Part 7: Add a fast path for nsIPrincipal::Equals() and nsIPrincipal::EqualsConsideringDomain(); r=bholley
2017-03-06 22:27:59 -05:00
Ehsan Akhgari
3169d6c35c
Bug 1340710 - Part 6: Store BasePrincipal::{mOriginNoSuffix,mOriginSuffix} as a pair of atoms; r=bholley
...
This has the nice side effect of making nsIPrincipal::GetOrigin() a bit faster
by avoiding computing the origin each time.
2017-03-06 22:27:53 -05:00
Ehsan Akhgari
5a95757626
Bug 1340710 - Part 5: Make nsIPrincipal.origin throw for about:blank codebase URI principals; r=bholley
...
Two about:blank codebase URI principals are only equal if their
object identities are the same, but not if their string
serializations happen to be equal (as they always will be.) In order
to ensure that we always get this right in places where we compare
the origin properties of two principals to check for their equality,
we should ensure that the origin getter would throw so that we never
incorrectly conclude that two such principals are equal.
We will soon start returning a null principal instead of a codebase
principal under this situation.
2017-03-06 22:27:51 -05:00
Ehsan Akhgari
57d1fd125b
Bug 1340710 - Part 4: Fix nsIPrincipal::GetOrigin()'s handling of non-strict file:// URI origin policy; r=bholley
2017-03-06 22:27:45 -05:00
Ehsan Akhgari
f3dc163eaf
Bug 1340710 - Part 3: Add an assertion to ensure that codebase principals are never constructed with URI schemes such as javascript:, about: and data:; r=bholley
2017-03-06 22:27:40 -05:00
Ehsan Akhgari
8f6e8510f6
Bug 1340710 - Part 2: De-virtualize BasePrincipal::Kind(); r=bholley
2017-03-06 22:27:37 -05:00
Ehsan Akhgari
c669405410
Bug 1340710 - Part 1: Remove nsPrincipal::SetURI() since it's unused; r=bholley
2017-03-06 22:27:31 -05:00
David Major
ed0b8f8653
Bug 1344615: Remove nsXPCOMStrings.{h,cpp} r=bsmedberg
...
These are now dead code.
MozReview-Commit-ID: AClU0Qx3kmN
--HG--
extra : rebase_source : df83cf89292da1519bb26027c11e14923d5c54a0
2017-03-06 17:52:54 +13:00
Kris Maglione
ee306e28c0
Bug 1314361 - Part 6: Remove the addonId origin attribute. r=bholley
2016-11-08 17:11:32 -08:00
Kris Maglione
7c5ab514b7
Bug 1314361 - Part 5: Remove origin attribute comparison helpers for ignoring addonId. r=bholley
2016-11-04 14:32:26 -07:00
Kris Maglione
45dbac3bdd
Bug 1314361 - Part 4: Stop setting addonId origin attribute. r=billm
2016-11-04 18:22:45 -07:00
Kris Maglione
af57bdc417
Bug 1314361 - Part 2: Stop using addonId origin attribute for permission checks. r=billm
2016-11-04 15:16:50 -07:00
Kris Maglione
7f01119247
Bug 1314361 - Part 1: Generate nsIPrincipal.addonId from AddonPolicyService rather than origin attributes. r=billm
2016-11-05 22:38:17 -07:00
Masatoshi Kimura
7be7b11a1c
Bug 1342144 - Remove version parameter from the type attribute of script elements. r=jmaher
...
This patch is generated by the following sed script:
find . ! -wholename '*/.hg*' -type f \( -iname '*.html' -o -iname '*.xhtml' -o -iname '*.xul' -o -iname '*.js' \) -exec sed -i -e 's/\(\(text\|application\)\/javascript\);version=1.[0-9]/\1/g' {} \;
MozReview-Commit-ID: AzhtdwJwVNg
--HG--
extra : rebase_source : e8f90249454c0779d926f87777f457352961748d
2017-02-23 06:10:07 +09:00
Andrea Marchesini
d0b50071c8
Bug 1341218 - nsNullPrincipal should serialize its URL, r=qdot
2017-02-23 14:30:23 +01:00
Andrea Marchesini
e7a1e33581
Bug 1341250 - Moving nsExpandedPrincipal in separate files, r=qdot
...
--HG--
rename : caps/nsPrincipal.cpp => caps/nsExpandedPrincipal.cpp
rename : caps/nsPrincipal.h => caps/nsExpandedPrincipal.h
2017-02-22 10:01:43 +01:00
Olli Pettay
5a13988731
Bug 1339251 - Make Equals/Subsumes faster when comparing same objects, r=bholley
...
--HG--
extra : rebase_source : 977c790f03188c4fda83297db026af62ee56a870
2017-02-22 13:19:03 +02:00
Sebastian Hengst
c171511b3c
Backed out changeset a6267555a244 (bug 1341218) for various test failures, e.g. xpcshell test dom/push/test/xpcshell/test_service_parent.js. r=backout
2017-02-22 11:21:37 +01:00
Sebastian Hengst
0ea43f8182
Backed out changeset f0886e3477a5 (bug 1341250)
2017-02-22 11:20:46 +01:00
Andrea Marchesini
c83982c31f
Bug 1341250 - Moving nsExpandedPrincipal in separate files, r=qdot
...
--HG--
rename : caps/nsPrincipal.cpp => caps/nsExpandedPrincipal.cpp
rename : caps/nsPrincipal.h => caps/nsExpandedPrincipal.h
2017-02-22 10:01:43 +01:00
Andrea Marchesini
0626b9d52e
Bug 1341218 - nsNullPrincipal should consider its URI in ::Write/::Read, r=qdot
2017-02-22 10:01:43 +01:00
Olli Pettay
f3a30cf48d
Bug 1339213 - Inline IsRestrictOpenerAccessForFPI, r=tihuang
2017-02-14 13:45:35 +02:00
Shane Caraveo
c7c7bd4f51
Bug 1308640 bypass TP when addon has explicit permission to url, r=bz,kmag,mrbkap
...
MozReview-Commit-ID: BIhoUY2Ug8k
--HG--
extra : rebase_source : 29cc48becfa958ba8f50d254fa6f30fd1820aef9
2017-02-09 21:08:06 -08:00
Gijs Kruitbosch
e4b6ebfe64
Bug 1335272 - fix about:cache internal links, r=bz
...
MozReview-Commit-ID: QzgsTTulJC
--HG--
extra : rebase_source : 8604d1ea660a6c5c811f47fd3ed98ab136e73c6e
2017-02-02 15:10:11 +00:00
Brad Lassey
a5e07b93bf
bug 1303096 - Stop sending sync messages soon after content process start-up r=billm
2017-02-05 00:52:38 -05:00
Sebastian Hengst
122ebc553b
Backed out changeset e9d8a75a0dcc (bug 1303096) for failing various tests on Android 4.3 debug (e.g. test_saveHeapSnapshot_e10s_01.html). r=backout
2017-02-05 10:26:28 +01:00
Brad Lassey
ecdf363246
bug 1303096 - Stop sending sync messages soon after content process start-up r=billm
2017-02-05 00:52:38 -05:00
Daniel Holbert
c280ee0009
Bug 1259348 part 1: Remove CSSUnprefixingService.js and associated code (since it's been supplanted by built-in webkit-prefixed-CSS support). r=mats
...
MozReview-Commit-ID: CXCJJWhHc8G
--HG--
extra : rebase_source : a09745ce568c9afde78065d9e837da958e7b252e
2017-02-03 14:56:13 -08:00
Tim Huang
4e31b183a6
Bug 1319773 - Part 2: Add a pref 'privacy.firstparty.isolate.restrict_opener_access' which controls the access of window.opener for different first party domain. r=baku
...
--HG--
extra : rebase_source : 052dfb3554ba050af85247bcf2587ade26710aac
2017-01-23 10:50:22 +08:00
Tim Huang
3e5d172c95
Bug 1319773 - Part 1: Add a SubsumesConsideringDomainIgnoringFPD in BasePrincipal. r=baku
...
--HG--
extra : rebase_source : db853a600e666cd11a140153536427c1f4e5882c
2017-01-18 20:17:19 +08:00
Boris Zbarsky
0bf506240a
Bug 1335311. Remove the file:/resource: special case in CheckLoadURIFromScript. r=bholley
2017-02-01 15:29:45 -05:00
Ehsan Akhgari
b62bca9af3
Bug 1335526 - Ensure that sandboxed channel's result principal is unique; r=bzbarsky
2017-02-01 13:47:26 -05:00
Sebastian Hengst
53d59b106f
Backed out changeset a273aee1be72 (bug 1335526) for bustage. r=backout
2017-02-01 17:41:29 +01:00
Ehsan Akhgari
9b36bf10cd
Bug 1335526 - Ensure that sandboxed channel's result principal is unique; r=bzbarsky
2017-02-01 11:24:49 -05:00
Florian Quèze
2cf30507bd
Bug 1334261 - script-generated patch to remove more newURI null parameters, r=jaws.
2017-01-27 10:51:02 +01:00
Geoff Brown
677d00071c
Bug 1305241 - Allow more assertions in test_bug995943.xul; r=jmaher
2017-01-26 07:26:33 -07:00
Eric Rahm
6af429ff8a
Bug 1332202 - Convert most infallible NS_EscapeURL calls to fallible version. r=froydnj
...
This makes most users of |NS_EscapeURL| use the fallible version. A few are
left infallible as it seems like the entire function is assumed to be
infallible.
MozReview-Commit-ID: Cy1L5jQwjO1
2017-01-24 11:11:44 -08:00
Dave Townsend
c5f0e2be67
Bug 1331968: Implement the moz: protocol handler to redirect to a fixed website. r=gijs
...
The protocol handler is intentionally simple. It works for the entering into the
urlbar case but not a lot else. Included some basic tests.
MozReview-Commit-ID: 4FQ1irdt3Nj
--HG--
extra : rebase_source : 30d9fc7ba2c500f268d282e47d291724d9899ba4
2017-01-18 14:10:46 -08:00
Mark Banner
16e6d381ac
Bug 503613 - Remove old 'tail =' lines from xpcshell.ini files; r=gps
...
MozReview-Commit-ID: 62Hp5ISxowJ
--HG--
extra : rebase_source : daa8efb3409031fea553f4fd0c9d0746e38dc308
extra : histedit_source : b4c23aacf678ba0d0ac9c09191a7c494ead11a08
2017-01-18 10:30:39 +00:00
Andrea Marchesini
d63b101bc3
Bug 1331751 - Fix the use of nsIURIWithPrincipal in nsPrincipal::GetOriginInternal, r=bkelly
2017-01-18 15:52:24 +01:00
Andrea Marchesini
359ae91eac
Bug 1328653 - Merging all the various *OriginAttributes to just one, r=huseby
2017-01-12 17:38:48 +01:00
Joel Maher
160093df2f
Bug 1328383 - add BUG_COMPONENT to caps/* files. r=bholley
...
MozReview-Commit-ID: 64bkvdcsHL9
2017-01-10 12:46:28 -05:00
Florian Quèze
fc6379e827
Bug 1329182 - remove trailing newURI null parameters in the rest of the tree, r=jaws.
2017-01-09 20:27:26 +01:00
Andrea Marchesini
2781835fb3
Bug 1321550 - origin should not contain ref part of the URL, r=valentin
2017-01-04 14:53:57 +01:00
Jean-Luc Bonnafoux
fe7f4239c6
Bug 1322146 - initialize mFlags variable in constructor. r=dveditz
2016-12-19 12:56:23 +01:00
dimi
bcd217b3c0
Bug 1320402 - Move url-classifier off of using appIds. r=ehsan, gcp
...
MozReview-Commit-ID: IqnAVrv2c9W
2017-01-03 14:21:58 +08:00
Masatoshi Kimura
0c6dc2ea73
Bug 1323683 - Fold nsIURIWithQuery into nsIURI. r=valentin.gosu
...
MozReview-Commit-ID: BFfgr42sNyx
--HG--
extra : rebase_source : a28d6a3c96f0c86dd7269147f130b3195b1f1faf
2016-12-28 20:40:21 +09:00
Yoshi Huang
2b7e1dceb6
Bug 1324115 - Part 1: add a C++ helper in nsIPrincipal. r=smaug
2016-12-21 14:59:20 +08:00
Andrea Marchesini
912e678ea6
Bug 1322514 - nsIPrincipal::GetOrigin should use the parent principal when dealing with blobURL, r=ehsan
2016-12-08 10:44:59 -10:00
Andrea Marchesini
f7f5990527
Bug 1317927 - Media caching needs to use origin attributes, r=cpearce, r=jesup
2016-12-07 07:07:09 -10:00
Gijs Kruitbosch
d1260ddfab
Bug 1318664 - fix about pages linking to themselves with query parameters, r=bz
...
MozReview-Commit-ID: Dsqj0L4aIlv
--HG--
extra : rebase_source : 5fde285885cfa4a14200aefc70d1f2395d67d92f
2016-11-23 18:26:44 +00:00
Andrea Marchesini
43e2ee7f71
Bug 1318727 - BroadcastChannel should support data URL - part 2, r=me
2016-11-30 15:31:09 +01:00
Andrea Marchesini
a9a05a834d
Bug 1318727 - BroadcastChannel should support data URL, r=smaug
2016-11-30 15:13:27 +01:00
Dragana Damjanovic
898f6d8b2a
Bug 1317641
- Some loadinfo security flags should not apply in case of a redirect. r=bz
...
--HG--
extra : rebase_source : aaebbb8628801871e09bc583b3b11a9908b77b92
2016-11-23 17:54:58 -05:00
Andrea Marchesini
dd1d53bd2b
Bug 1319045 - Get rid of nsPrincipal::GetOriginFromURI, r=qdot
2016-11-22 12:38:41 +01:00
Andrea Marchesini
2f974ccbce
Bug 1318273 - Improve the use of SpecialPowers.pushPrefEnv() - part 1, r=qdot
2016-11-18 09:33:33 +01:00
Sebastian Hengst
7110a88674
Backed out changeset d43b778d95c6 (bug 1318273) for failing mochitest fetch/test_formdataparsing.html. r=backout on a CLOSED TREE
2016-11-17 20:58:38 +01:00
Andrea Marchesini
cf2ad8072f
Bug 1318273 - Improve the use of SpecialPowers.pushPrefEnv() - part 1, r=qdot
2016-11-17 19:36:01 +01:00
Ehsan Akhgari
d07f79a266
Bug 1318210 - Remove nsIAppsService; r=baku
2016-11-17 10:41:36 -05:00
Ehsan Akhgari
5cc591dc59
Bug 1318209
- Remove mozIApplication; r=baku
2016-11-17 10:12:43 -05:00
Andrea Marchesini
d5b0cbe35a
Bug 1315905
- Cleanup Necko http security check - part 1, r=valentin
2016-11-17 14:52:16 +01:00
Ehsan Akhgari
eac76d9772
Bug 1310845 - Remove support for mozapp iframes; r=fabrice,jryans,baku,mcmanus
...
This patch removes support for mozapp iframes, leaving support for
mozbrowser iframes intact. Some of the code has been rewritten in order
to phrase things in terms of mozbrowser only, as opposed to mozbrowser
or app. In some places, code that was only useful with apps has been
completely removed, so that the APIs consumed can also be removed. In
some places where the notion of appId was bleeding out of this API, now
we use NO_APP_ID. Other notions of appId which were restricted to this
API have been removed.
2016-11-16 09:13:38 -05:00
Carsten "Tomcat" Book
3eacc680db
Backed out changeset 7d1f7dd996f7 (bug 1310845)
2016-11-16 14:50:44 +01:00
Ehsan Akhgari
cb369370b3
Bug 1310845 - Remove support for mozapp iframes; r=fabrice,jryans,baku,mcmanus
...
This patch removes support for mozapp iframes, leaving support for
mozbrowser iframes intact. Some of the code has been rewritten in order
to phrase things in terms of mozbrowser only, as opposed to mozbrowser
or app. In some places, code that was only useful with apps has been
completely removed, so that the APIs consumed can also be removed. In
some places where the notion of appId was bleeding out of this API, now
we use NO_APP_ID. Other notions of appId which were restricted to this
API have been removed.
2016-11-15 18:31:46 -05:00
Gijs Kruitbosch
82d475be93
Bug 1309310, r=bz
...
MozReview-Commit-ID: KLaMv6zfxR8
--HG--
extra : rebase_source : ccb4d19c874230c512010d3891aae33a69947f62
2016-11-09 18:25:11 +00:00
Tim Huang
950b86072e
Bug 1313627 - Get the firstPartyDomain from the nodePrincipal of the document in nsDocShell::CanAccessItem() if the first party isolation is on. r=smaug
2016-11-10 14:20:38 +08:00
Christoph Kerschbaumer
f2776f1b8d
Bug 1308889 - Try to explicitly pass aTriggeringPrincipal and aPrincipalToInherit to DoURILoad(). r=bz
2016-11-08 07:23:12 +01:00
Valentin Gosu
656872593e
Bug 1315302 - Remove signedPkg from origin attributes r=baku
...
MozReview-Commit-ID: L1xvRgeO6De
--HG--
extra : rebase_source : dee943054af499b6e3f0aca2801fa9414f5567be
2016-11-06 16:15:36 +01:00
Sebastian Hengst
8ed57a9dc8
Bug 1310297 - Remove test annotations using b2g, mulet or gonk: caps. r=RyanVM
...
MozReview-Commit-ID: DXTWNHWatEv
--HG--
extra : rebase_source : da5e99ba431f1bc826101d8cc1e1bcb599aaa5fb
2016-11-05 11:29:13 +01:00
Kris Maglione
8b10d432c1
Bug 1308920: Part 1 - Add an EqualsIgnoringAddonId method to BasePrincipal. r=bholley
...
This is meant as a temporary stopgap until we can stop using origin attributes
to store add-on IDs.
MozReview-Commit-ID: DHstOTyu7pR
--HG--
extra : rebase_source : adb8fbfaadf6e914b5aa15c2693a35056669506c
2016-11-02 10:04:13 -07:00
Dave Huseby
ce82855c42
Bug 1189086 - Eliminate nsIPrincipal::jarPrefix. r=dveditz
2016-10-24 13:52:00 +02:00
Tom Tromey
0dc689acdd
Bug 553032 - use MOZ_FORMAT_PRINTF in js; r=evilpie
...
MozReview-Commit-ID: DD3DJRkOxmC
--HG--
extra : rebase_source : 61cdf0da1a82b626abc79209ee41e43c3bb152ca
2016-10-11 12:44:40 -06:00
Sebastian Hengst
9e31a95f74
Backed out changeset 2bfd163f23f9 (bug 553032)
2016-10-19 18:29:36 +02:00
Tom Tromey
5b851428f8
Bug 553032 - use MOZ_FORMAT_PRINTF in js; r=evilpie
...
MozReview-Commit-ID: DD3DJRkOxmC
--HG--
extra : rebase_source : 4f98705e5e2c5ff9860f04384abbc6f5dc18a7a9
2016-10-11 12:44:40 -06:00
Ehsan Akhgari
4a51ebacfa
Bug 1310378 - Remove support for mozwidget; r=baku
2016-10-17 13:15:36 -04:00
Ehsan Akhgari
9de6bbbaec
Bug 1261019 - Part 3: Remove Navigator.mozApps and code depending on it; r=myk,jryans,fabrice,mcmanus,peterv
2016-10-13 13:18:41 -04:00
Christoph Kerschbaumer
fb07f658e3
Bug 1305012 - Downgrade a new channel's principal to NullPrincipal. r=smaug
2016-10-05 21:19:51 +02:00
Cameron McCormack
418bfe72a3
Bug 1300720 - Part 2: Lazily initialize nsScriptSecurityManager::mFileURIWhitelist. r=bholley
...
MozReview-Commit-ID: 8cqHUlOnsEH
2016-10-03 12:43:17 +08:00
Olli Pettay
9f0454f829
Bug 1306300, null check nsILoadContext in GetLoadContextCodebasePrincipal, r=baku
2016-09-29 20:31:50 +03:00
Gijs Kruitbosch
7de765df42
Bug 1290668 - unbreak view-source links between http and https pages, r=smaug
...
MozReview-Commit-ID: B4nXTkMC5LE
--HG--
extra : rebase_source : ad7086b7ff58f44b12c3eaaf9b7be8c8955762a5
2016-09-27 13:31:53 +01:00
Tooru Fujisawa
10dd75211d
Bug 1289050 - Part 2: Use ASCII or Latin1 variants of JS_ReportError in not-simple cases. r=jwalden
2016-08-15 19:20:01 +09:00
Jonathan Hao
8a70bfa5fc
Bug 1302047 - Ignore userContextId and firstPartyDomain when matching permissions. r=baku
...
--HG--
extra : rebase_source : da81c21da92810d808ebe865a456cc9d04058ce3
2016-09-20 16:35:21 +08:00
Tracy Walker
ab9e34053d
Bug 1279087 - In caps/tests/mochitests/bug995943.xul, widen range of assertion check for OSX 10.10 to 5-9 to reduce intermittent test timeouts. r=emk
2016-09-26 08:13:38 -05:00
Ehsan Akhgari
9d56bec7a1
Bug 1297687 - Part 5: Require passing an OriginAttribute when constructing an nsExpandedPrincipal; r=bholley
2016-09-22 13:28:04 -04:00
Ehsan Akhgari
e45aad00ec
Bug 1297687 - Part 3: Ensure that the expanded principal of a sandbox has a sensible OriginAttributes; r=bholley
...
This patch allows specifying an OriginAttributes when creating a sandbox
using Components.utils.Sandbox() by specifying an originAttributes
member on the options dictionary.
If an OA is specified in this way, it is used for creating codebase
principals from the string arguments passed to the function. Otherwise,
if one or more principals are passed in the array argument to Sandbox(),
the OA of the principal(s) is used to construct codebase principals from
the strings inside the array. In this case, we check to make sure that
all of the passed principals have the same OA, otherwise we'll throw an
exception.
In case no explicit OA is specified and no principals are passed in the
array argument, we create the codebase principals using a default OA.
2016-09-22 13:27:51 -04:00
Ehsan Akhgari
5404c2dc93
Bug 1297687 - Part 2: Allow specifying an OriginAttribute when creating an expanded principal; r=bholley
2016-09-22 13:27:40 -04:00