Граф коммитов

230 Коммитов

Автор SHA1 Сообщение Дата
Honza Bambas b862dc4c74 Bug 1312243 - Block authentication dialog pop-ups by cancling 3 of them in a row, r=Dolske+mcmanus 2016-12-16 03:42:00 +01:00
Patrick McManus eefe030798 Bug 1321783 - Make updater be networking conservative r=dkeeler r=rstrong r=dragana 2016-12-02 16:49:23 -05:00
Christoph Kerschbaumer f2776f1b8d Bug 1308889 - Try to explicitly pass aTriggeringPrincipal and aPrincipalToInherit to DoURILoad(). r=bz 2016-11-08 07:23:12 +01:00
Josh Matthews 9c847a5ac4 Bug 1277681 - Send HTTP request bodies in chunks. r=mayhemer 2016-09-28 18:38:26 -04:00
Kate McKinley c57d400961 Bug 1246540 - HSTS Priming Proof of Concept. r=ckerschb, r=mayhemer, r=jld, r=smaug, r=dkeeler, r=jmaher, p=ally
HSTS priming changes the order of mixed-content blocking and HSTS
upgrades, and adds a priming request to check if a mixed-content load is
accesible over HTTPS and the server supports upgrading via the
Strict-Transport-Security header.

Every call site that uses AsyncOpen2 passes through the mixed-content
blocker, and has a LoadInfo. If the mixed-content blocker marks the load as
needing HSTS priming, nsHttpChannel will build and send an HSTS priming
request on the same URI with the scheme upgraded to HTTPS. If the server
allows the upgrade, then channel performs an internal redirect to the HTTPS URI,
otherwise use the result of mixed-content blocker to allow or block the
load.

nsISiteSecurityService adds an optional boolean out parameter to
determine if the HSTS state is already cached for negative assertions.
If the host has been probed within the previous 24 hours, no HSTS
priming check will be sent.

MozReview-Commit-ID: ES1JruCtDdX

--HG--
extra : rebase_source : 2ac6c93c49f2862fc0b9e595eb0598cd1ea4bedf
2016-09-27 11:27:00 -04:00
Valentin Gosu 76d2cd8b5d Bug 1231565 - (Part 2) Allow storing alternate data in the HTTP cache r=honzab
* Add PAltDataOutputStream.ipdl to be able to open an OutputStream to the cache entry in the child process
* AltDataOutputStreamChild/Parent are Main Thread only for now.
* Adds methods for reading and writing alt-data to nsICacheInfoChannel.idl
* Keep a ref of the cache entry after OnStopRequest in case the consumer tries to open the alt-data output stream

MozReview-Commit-ID: jlraDI97Hg
2016-04-11 05:17:02 +02:00
Christoph Kerschbaumer 8500d497a7 Bug 1297338 - Extend LoadInfo with a PrincipalToInherit member. r=bz 2016-09-20 08:35:45 +02:00
Yoshi Huang 84039380cc Bug 1287073 - remove SEC_FORCE_INHERIT_PRINCIPAL_WAS_DROPPED from nsILoadInfo r=sicking 2016-07-28 15:56:32 +08:00
Iris Hsiao caea40742f Backed out changeset 8dc198cd46ff (bug 1246540) for Mochitest failures 2016-07-27 13:14:07 +08:00
Kate McKinley c6650db185 Bug 1246540 HSTS Priming Proof of Concept
HSTS priming changes the order of mixed-content blocking and HSTS
upgrades, and adds a priming request to check if a mixed-content load is
accesible over HTTPS and the server supports upgrading via the
Strict-Transport-Security header.

Every call site that uses AsyncOpen2 passes through the mixed-content
blocker, and has a LoadInfo. If the mixed-content blocker marks the load as
needing HSTS priming, nsHttpChannel will build and send an HSTS priming
request on the same URI with the scheme upgraded to HTTPS. If the server
allows the upgrade, then channel performs an internal redirect to the HTTPS URI,
otherwise use the result of mixed-content blocker to allow or block the
load.

nsISiteSecurityService adds an optional boolean out parameter to
determine if the HSTS state is already cached for negative assertions.
If the host has been probed within the previous 24 hours, no HSTS
priming check will be sent.

(r=ckerschb,r=mayhemer,r=jld,r=smaug,r=dkeeler,r=jmaher,p=ally)
2016-07-26 13:03:00 +08:00
Iris Hsiao a7c8429fc4 Backed out changeset d7e39be85498 (bug 1246540) for Mochitest failures 2016-07-27 11:15:52 +08:00
Kate McKinley 567ebcf321 Bug 1246540 - HSTS Priming Proof of Concept. r=ckerschb, r=mayhemer, r=jld, r=smaug, r=dkeeler, r=jmaher, p=ally
HSTS priming changes the order of mixed-content blocking and HSTS
upgrades, and adds a priming request to check if a mixed-content load is
accesible over HTTPS and the server supports upgrading via the
Strict-Transport-Security header.

Every call site that uses AsyncOpen2 passes through the mixed-content
blocker, and has a LoadInfo. If the mixed-content blocker marks the load as
needing HSTS priming, nsHttpChannel will build and send an HSTS priming
request on the same URI with the scheme upgraded to HTTPS. If the server
allows the upgrade, then channel performs an internal redirect to the HTTPS URI,
otherwise use the result of mixed-content blocker to allow or block the
load.

nsISiteSecurityService adds an optional boolean out parameter to
determine if the HSTS state is already cached for negative assertions.
If the host has been probed within the previous 24 hours, no HSTS
priming check will be sent.
2016-07-26 13:03:00 -04:00
Carsten "Tomcat" Book 25aa8617fc Backed out changeset 1825b8fa636a (bug 1246540) for bustage
--HG--
extra : rebase_source : 45defacae713b2c2f75813fea6f2f289ebc481cd
2016-07-26 12:52:15 +02:00
Kate McKinley 01cbd73591 Bug 1246540 - HSTS Priming Proof of Concept. r=ckerschb,r=mayhemer,r=jld,r=smaug,r=dkeeler,r=jmaher,p=ally
HSTS priming changes the order of mixed-content blocking and HSTS
upgrades, and adds a priming request to check if a mixed-content load is
accesible over HTTPS and the server supports upgrading via the
Strict-Transport-Security header.

Every call site that uses AsyncOpen2 passes through the mixed-content
blocker, and has a LoadInfo. If the mixed-content blocker marks the load as
needing HSTS priming, nsHttpChannel will build and send an HSTS priming
request on the same URI with the scheme upgraded to HTTPS. If the server
allows the upgrade, then channel performs an internal redirect to the HTTPS URI,
otherwise use the result of mixed-content blocker to allow or block the
load.

nsISiteSecurityService adds an optional boolean out parameter to
determine if the HSTS state is already cached for negative assertions.
If the host has been probed within the previous 24 hours, no HSTS
priming check will be sent.

(r=ckerschb,r=mayhemer,r=jld,r=smaug,r=dkeeler,r=jmaher,p=ally)
2016-07-25 12:37:00 +02:00
Carsten "Tomcat" Book 0a5622c093 Backed out changeset 640247e978ba (bug 1246540) for bustage 2016-07-24 15:59:31 +02:00
Kate McKinley 547500d5a7 Bug 1246540 - HSTS Priming Proof of Concept. r=honzab
HSTS priming changes the order of mixed-content blocking and HSTS
upgrades, and adds a priming request to check if a mixed-content load is
accesible over HTTPS and the server supports upgrading via the
Strict-Transport-Security header.

Every call site that uses AsyncOpen2 passes through the mixed-content
blocker, and has a LoadInfo. If the mixed-content blocker marks the load as
needing HSTS priming, nsHttpChannel will build and send an HSTS priming
request on the same URI with the scheme upgraded to HTTPS. If the server
allows the upgrade, then channel performs an internal redirect to the HTTPS URI,
otherwise use the result of mixed-content blocker to allow or block the
load.

nsISiteSecurityService adds an optional boolean out parameter to
determine if the HSTS state is already cached for negative assertions.
If the host has been probed within the previous 24 hours, no HSTS
priming check will be sent.

(r=ckerschb,r=mayhemer,r=jld,r=smaug,r=dkeeler,r=jmaher,p=ally)
2016-07-22 18:35:00 +02:00
Aaron Klotz 6470186455 Bug 1268151: Clean up some dependencies in IPDL headers; r=billm
MozReview-Commit-ID: n0FkC1zcay

--HG--
extra : rebase_source : a56c34e5ab1fe9354be7b586a917b6eecff4cb31
2016-05-17 16:01:25 -06:00
Kershaw Chang aa2bd5ea05 Bug 1256595 - Add frameOuterWindowID in nsILoadInfo, r=billm 2016-06-27 02:42:00 +02:00
Jarda Snajdr 4948ad52d6 Bug 1274556 - Add a channelId attribute to nsIHttpChannel r=hurley 2016-06-01 12:29:21 -07:00
Valentin Gosu c8a94789bb Bug 1262326 - Make test_user_agent_overrides.html work in e10s r=nwgh
* Rename SchedulingContext to RequestContext
* Move SetLoadGroupUserAgentOverride to nsHttpChannel
* Cache the userAgentOverride in RequestContext instead of LoadGroup

MozReview-Commit-ID: FQS9uSRR8kd

--HG--
rename : netwerk/base/SchedulingContextService.cpp => netwerk/base/RequestContextService.cpp
rename : netwerk/base/SchedulingContextService.h => netwerk/base/RequestContextService.h
rename : netwerk/base/nsISchedulingContext.idl => netwerk/base/nsIRequestContext.idl
2016-04-21 16:59:17 +02:00
Tanvi Vyas 2ca721ef81 Bug 1105556 - Allow loadInfo->loadingNode and loadInfo->loadingPrincipal to be null for TYPE_DOCUMENT loads. r=sicking, ckerschb 2016-04-13 16:30:16 -07:00
Stone Shih d2be3770c7 Bug 1255597 - Part 3: Synchronize content-type hint of HttpChannelChild to HttpChannelParent. r=jduell
--HG--
extra : rebase_source : 59b5fadf761e8a11d4f946259d5074ba698a46f5
2016-03-16 14:03:57 +08:00
Jonathan Hao 7bee2c98a0 Bug 1235572 - Enforce SRI if content signature is enforced r=francois
* * *
[mq]: sri_fix

MozReview-Commit-ID: 8vY9J4j3Eog
* * *
[mq]: loadInfo

MozReview-Commit-ID: EZ8BUfCOXO6
* * *
[mq]: add-logs

MozReview-Commit-ID: 1jeyTq9nvlW

--HG--
extra : transplant_source : %8Dj%12f%16%F5%12%8E%FE%7C%02%274%2A%A0a%C8%CB2P
2016-03-16 11:13:26 +08:00
Franziskus Kiefer 0d2149893d Bug 1226928 - network and ipc bits for content-signing on remote about:newtab, r=mayhemer 2016-03-14 11:56:52 +01:00
Andrea Marchesini e9160985c2 Bug 1221320 - XMLHttpRequest authentication should not require auth prompt dialog, r=honzab.moz 2015-12-30 18:47:55 +00:00
Honza Bambas 31fe69aff2 Bug 1087320 - On charset reload set LOAD_FROM_CACHE only on the default channel, r=bz r=jduell 2016-01-19 15:28:00 +01:00
Christoph Kerschbaumer 071f422450 Bug 1233098 - Refactor CSP upgrade insecure requests flag within loadInfo (r=sicking) 2016-01-14 12:38:15 -08:00
Nigel Babu 7089beabc7 Backed out changeset f51b921e1ccf (bug 1233098) for browser-chrome bustage
--HG--
extra : commitid : ytS8fc4lFu
2016-01-14 08:04:37 +05:30
Christoph Kerschbaumer c42851930c Bug 1233098 - Refactor CSP upgrade insecure requests flag within loadInfo (r=sicking) 2016-01-13 15:51:43 -08:00
Ben Kelly dd179ed223 Bug 1220681 P4 Automatically suspend the parent channel after synthesizing the response for diverison. r=jdm 2015-12-23 12:20:53 -08:00
Jonas Sicking f7193fdf30 Bug 1226909 part 4: Make AsyncOpen2 set taining information on channels. Use this information in XHR and fetch(). r=bkelly 2015-12-06 18:33:15 -05:00
Jonas Sicking 28de02f687 Bug 1226909 part 3: Move logic of when to initiate CORS preflight into channels. Allow CORS preflight to happen when doing a same-origin to cross-origin redirect. r=ckerschb 2015-12-06 18:33:14 -05:00
Jonas Sicking 0e0c8c52ea Bug 1226909 part 2: Let CORS preflight logic grab information from nsILoadInfo rather than duplicate it. r=ckerschb 2015-12-06 18:33:14 -05:00
Sebastian Hengst 774236075d Backed out changeset 09d64535bcda (bug 1216687), a7f1a289dd78, 4dbf06183e6c, 26318a5e3006, 9ae2af3cf86d (bug 1226909) for M(1,2,5) oranges. r=backout 2015-12-05 16:34:47 +01:00
Jonas Sicking 7fae3fd853 Bug 1226909 part 4: Make AsyncOpen2 set taining information on channels. Use this information in XHR and fetch(). r=bkelly 2015-12-05 01:46:20 -08:00
Jonas Sicking ff12f48c5a Bug 1226909 part 3: Move logic of when to initiate CORS preflight into channels. Allow CORS preflight to happen when doing a same-origin to cross-origin redirect. r=ckerschb 2015-12-05 01:46:20 -08:00
Jonas Sicking 918c689657 Bug 1226909 part 2: Let CORS preflight logic grab information from nsILoadInfo rather than duplicate it. r=ckerschb 2015-12-05 01:46:20 -08:00
Blake Kaplan b62a6327bd Bug 1171215 - Compute third-partyness in the loadinfo instead of nsIHttpChannelInternal so that other protocols correctly respect the third-party cookie pref. r=sicking/ckerschb 2015-11-30 13:25:29 -08:00
Yoshi Huang 4b500464f5 Bug 1209162 - Create OriginAttributes subtypes. IGNORE IDL r=sicking. 2015-11-03 09:50:54 +08:00
Christoph Kerschbaumer d9f1276ace Bug 663570 - MetaCSP Part 3: Upgrade insecure requests changes (r=bz) 2015-11-14 19:28:38 -08:00
Christoph Kerschbaumer e15fd3a5f0 Bug 1194052 - Add support for internal redirectchain to loadInfo (r=sicking) 2015-10-31 15:18:59 -07:00
Dragana Damjanovic 35a05c4285 Bug 1175685 - add OriginAttribute to LoadInfo. r=jonas, r=ckerschb, r=michal 2015-10-21 23:47:00 +02:00
Patrick McManus 60d6db97ae bug 1204614 - use h2 per stream flow control to deal with suspended channels r=hurley 2015-09-11 15:53:27 -04:00
Ehsan Akhgari d1029ccc78 Bug 1199049 - Part 6: Transfer the preflight parameters to the parent process in e10s mode; r=jduell 2015-09-12 19:21:01 -04:00
Honza Bambas cb0925e6e8 Bug 1172992 - Send security info override from HttpChildChannel to the parent, r=jduell
--HG--
extra : rebase_source : 72df514bb695ccdfc280ef124254da3107905a59
2015-08-19 14:50:34 -07:00
Nicholas Hurley 16407ea724 Bug 1127618 - make push caches work in e10s. r=mcmanus r=froydnj IGNORE IDL
--HG--
extra : rebase_source : 24dd37c6eaec83a1776d77632b97106e8abb8015
2015-07-31 13:50:08 -07:00
Wes Kocher 98e5242831 Backed out changeset 2bdaed564656 (bug 1125961) for b2g emulator mochitest-21 failures starting in test_fetch_event_client_postmessage.html 2015-07-30 14:53:38 -07:00
Josh Matthews 77fd3928cf Bug 1125961 - Allow sending null PBrowser actors when there's a triggering principal which can be used for security checks. r=bkelly,ddamjano 2015-06-03 15:07:42 -04:00
Christoph Kerschbaumer bf53f62d80 Bug 1143922 - Add AsyncOpen2 to nsIChannel and perform security checks when opening a channel - loadinfo changes (r=sicking,tanvi,sworkman) 2015-07-19 19:11:57 -07:00
Christoph Kerschbaumer c0cc3c5614 Bug 1175803 - Store redirect chain within loadInfo - part 1 (r=sicking,mayhemer) 2015-07-19 19:11:03 -07:00
Christoph Kerschbaumer c255f4187b Bug 1179505 - Make LoadInfo arguments optional in ipdl (r=bent,sicking) 2015-07-13 22:43:13 -07:00
Christoph Kerschbaumer 7685654149 Bug 1139297 - Implement CSP upgrade-insecure-requests directive - loadinfo changes (r=sicking,sworkman)
--HG--
extra : rebase_source : 3582ac42bcd0cc0dee332505880c2a65d87964eb
2015-07-10 13:57:55 -07:00
Christoph Kerschbaumer 4e803ed392 Bug 1175352 - Refactor LoadInfo arguments to be more self contained (r=bent) 2015-06-18 15:37:20 -07:00
Bill McCloskey 3d39da47b9 Bug 1163861 - Pass window IDs in nsILoadInfo (r=ckerschb) 2015-06-09 21:04:50 -07:00
Josh Matthews f5fb27939c Bug 1157283 - Recreate IPC redirected HTTP channels as necessary after intercepting the request in the child. r=mayhemer 2015-05-28 10:47:35 -04:00
Michal Novotny 67351b86be Bug 1163900 - crash in mozilla::net::nsHttpChannelCacheKey::GetData(unsigned int*, nsACString_internal&), r=jduell 2015-05-14 19:05:34 +02:00
Michal Novotny faa2a67d00 Bug 1156493 - e10s: move .cacheKey to nsICacheInfoChannel so child channels can get/set it, r=jduell 2015-05-10 02:26:39 +02:00
Josh Matthews 04c41ddefc Bug 1137287 - Part 2: Send non-200/404 synthesized responses via the parent HTTP implementation for proper processing. r=mayhemer 2015-04-17 18:59:10 -04:00
Patrick McManus 2bc676b831 Bug 1153936 - nsIHttpChannelInteral attribute to opt out of alt-svc on per channel basis r=hurley 2015-04-13 12:59:34 -04:00
Ryan VanderMeulen 579da75a70 Backed out changeset e713ce8013eb (bug 1127618) for suspicion of causing semi-frequent B2G crashes.
CLOSED TREE
2015-04-09 20:05:49 -04:00
Nicholas Hurley 0b4c1de637 Bug 1127618 - make push caches work in e10s. r=mcmanus r=froydnj
--HG--
extra : rebase_source : 3da2229082ccd041a1ec47ba77d9f0940020f3c9
2015-04-08 14:42:00 +02:00
Christoph Kerschbaumer 5e75741df7 Bug 1099296 - Attach LoadInfo to remaining callers of ioService and ProtocolHandlers - websocket changes (r=jduell) 2015-02-17 10:09:58 -08:00
Christoph Kerschbaumer 05d08f5899 Bug 1107638 - Add innerWindowID to LoadInfo (r=sicking,jduell) 2015-01-07 15:51:20 -08:00
Patrick McManus 7edbeec28f bug 1003450 - [2/3] Group Dependency nodes for HTTP/2 r=hurley 2014-12-06 14:26:50 -05:00
Owen Chu d3d0babc79 Bug 704320 - Changes for HttpChannelParent. (r=mcmanus) 2014-11-18 08:46:35 -05:00
Christoph Kerschbaumer 59e7c4cbd1 Bug 1083422 - Add triggering Principal to nsILoadInfo - e10s changes (r=jduell)
* * *
[mq]: tmp
2014-11-14 08:57:09 -08:00
Monica Chew 43fa6ed7e2 Bug 1088183: Propagate the top window URI to the parent http channel through HttpChannelOpenArgs (a=kwierso,r=jduell,mrbkap) 2014-10-29 17:22:22 -07:00
Blake Kaplan afa69fda4d Bug 1049299 - Correctly calculate 3rd-party cookie status for content-process HTTP channels. r=jduell 2014-10-28 14:23:00 +01:00
Steve Workman 49393025ca Bug 1012917 - Send HttpBaseChannel::mApplyConversion with ChannelDiverter constructor in IPDL r=mayhemer 2014-10-21 16:40:08 -07:00
Christoph Kerschbaumer e27bd0e936 Bug 1038756: Callsites creating a channel in /netwerk/ [e10s parts] (r=mcmanus) 2014-09-21 09:40:27 -07:00
Patrick McManus b17f6374d4 bug 1003566 - part 1 - allowSTS attribute to nsIHttpChannel r=honzab 2014-06-04 09:57:15 -07:00
Ethan Tseng f2d1f8c08a Bug 992568 - Part 2: Refactor RtspChannel to support redirection. r=sworkman 2014-04-03 19:08:34 +08:00
Andrea Marchesini ebeddf1969 Bug 910010 - Implementation of PFileDescriptorSet - part 2, r=bent 2014-03-25 18:37:28 +00:00
Patrick McManus ae599f9845 bug 477578 - http methods should be case sensitive r=hurley 2014-03-18 12:36:18 -04:00
Steve Workman c0d484b966 Bug 975338 - Enable diverting of HTTP and FTP channels back to parent process from child r=jduell 2014-03-10 23:04:28 +01:00
Ed Morley e914d19aae Backed out changeset 97858e5c1f13 (bug 975338) 2014-03-10 17:57:53 +00:00
Steve Workman 65a4092dcf Bug 975338 - Add PChannelDiverter and new messages to PHttpChannel r=jduell 2014-03-10 18:31:05 +01:00
Nathan Froyd ec839c62b4 Bug 918651 - part 8 - remove redundant includes from IPDL files; r=ehsan
These include statements have been made redundant by all the qualifications
to the using statements.
2013-10-18 13:34:08 -04:00
Nathan Froyd ebcc1e1abf Bug 918651 - part 5 - qualify all IPDL using statements with required header; r=ehsan 2013-10-01 15:25:07 -04:00
Jason Duell a9d6a2e333 Bug 558623 - e10s HTTP: combine PHttpChannel constructor with SendAsyncOpen/SendRedirect1Begin r=jdm
--HG--
rename : netwerk/protocol/http/nsHttp.h => netwerk/protocol/http/HttpLog.h
extra : rebase_source : 80cac843f38f2237c9fd932c428e1c1fda781b50
2013-06-22 09:09:19 -07:00