Andrea Marchesini
50f7937e84
Bug 1340163 - Introducing originNoSuffix as attribute in ContentPrincipalInfo, r=smaug
2017-03-20 16:03:45 +01:00
Sebastian Hengst
a472d9b04f
Backed out changeset 54a1f0cb64d9 (bug 1340163) for crashing e.g. in browser/components/originattributes/test/browser/browser_cacheAPI.js. r=backout
2017-03-20 15:38:19 +01:00
Andrea Marchesini
38c6ab4035
Bug 1340163 - Introducing originNoSuffix as attribute in ContentPrincipalInfo, r=smaug
2017-03-20 14:51:54 +01:00
Frederik Braun
622080220c
Bug 1073952: proper indentation for nsScriptSecurityManager::GetChannelResultPrincipal r=Tomcat
...
MozReview-Commit-ID: 84qywpARPwI
--HG--
extra : rebase_source : fd0bc97039e95d93ba0eb7688ef3e1571ef1bba3
2017-01-30 14:13:13 +01:00
Frederik Braun
390a075c26
Bug 1073952: inherit CSP into iframe sandbox srcdoc r=ckerschb,Tomcat
...
MozReview-Commit-ID: 3fhWCGwgG4A
--HG--
extra : rebase_source : 7e84fafe0ef69b7f6695de825fc254ee0e4209ba
2017-01-30 14:09:37 +01:00
Ehsan Akhgari
15bd78db3c
Bug 1347369 - Avoid dynamic allocation of URLParams in OriginAttributes methods; r=baku
...
These show up in some profiles sometimes, and there is no reason why
the variables can't simply live on the stack.
2017-03-15 23:03:31 -04:00
Yoshi Huang
996e0349b3
Bug 1300671 - set firstPartyDomain on about: pages. r=smaug
...
When we load about:blank in a remote tab, it will have
LOAD_FLAGS_DISALLOW_INHERIT_PRINCIPAL flag set, which will make
NullPrinicipal as its document principal. So we add
NULL_PRINCIPAL_FIRST_PARTY_DOMAIN as its firstPartyDomain.
So when we load data:, or javascript: URI in a remote tab, it will inherit the
principal from about:blank, hence also inherit the origin attributes.
There are also some about: pages will use codebase principal, so we also
set ABOUT_URI_FIRST_PARTY_DOMAIN as firstPartyDomain on their
principals.
2017-03-14 16:22:02 +08:00
Andrea Marchesini
e9195daa8d
Bug 1345168 - Get rid of OriginAttributes::Inherit, r=tjr
2017-03-08 07:41:51 +01:00
Carsten "Tomcat" Book
087da3f0d9
merge mozilla-inbound to mozilla-central a=merge
2017-03-07 15:13:31 +01:00
Ehsan Akhgari
9b370e9857
Bug 1344974 - Part 2: Make the non-virtual helpers for principal equality/subsumption checks inline; r=bholley
2017-03-07 00:29:27 -05:00
Ehsan Akhgari
0f5f27679b
Bug 1344974 - Part 1: Factor out more non-virtual helpers for principal equality/subsumption checks; r=bholley
2017-03-07 00:22:21 -05:00
Ehsan Akhgari
e3ddbde083
Bug 1340710 - Part 10 - Remove BasePrincipal::EqualsIgnoringAddonId which somehow crept back in during the last rebase
...
Landed on a CLOSED TREE
2017-03-06 23:22:01 -05:00
Ehsan Akhgari
3812e3f854
Bug 1340710 - Part 9: Speed up the OriginAttributes comparison in BasePrincipal::Subsumes(); r=bholley
2017-03-06 22:31:05 -05:00
Ehsan Akhgari
513af88e99
Bug 1340710 - Part 8: Add a fast path for nsIPrincipal::EqualsConsideringDomain() and nsIPrincipal::SubsumesConsideringDomain(); r=bholley
2017-03-06 22:30:54 -05:00
Ehsan Akhgari
e6073c48a5
Bug 1340710 - Part 7: Add a fast path for nsIPrincipal::Equals() and nsIPrincipal::EqualsConsideringDomain(); r=bholley
2017-03-06 22:27:59 -05:00
Ehsan Akhgari
3169d6c35c
Bug 1340710 - Part 6: Store BasePrincipal::{mOriginNoSuffix,mOriginSuffix} as a pair of atoms; r=bholley
...
This has the nice side effect of making nsIPrincipal::GetOrigin() a bit faster
by avoiding computing the origin each time.
2017-03-06 22:27:53 -05:00
Ehsan Akhgari
5a95757626
Bug 1340710 - Part 5: Make nsIPrincipal.origin throw for about:blank codebase URI principals; r=bholley
...
Two about:blank codebase URI principals are only equal if their
object identities are the same, but not if their string
serializations happen to be equal (as they always will be.) In order
to ensure that we always get this right in places where we compare
the origin properties of two principals to check for their equality,
we should ensure that the origin getter would throw so that we never
incorrectly conclude that two such principals are equal.
We will soon start returning a null principal instead of a codebase
principal under this situation.
2017-03-06 22:27:51 -05:00
Ehsan Akhgari
57d1fd125b
Bug 1340710 - Part 4: Fix nsIPrincipal::GetOrigin()'s handling of non-strict file:// URI origin policy; r=bholley
2017-03-06 22:27:45 -05:00
Ehsan Akhgari
f3dc163eaf
Bug 1340710 - Part 3: Add an assertion to ensure that codebase principals are never constructed with URI schemes such as javascript:, about: and data:; r=bholley
2017-03-06 22:27:40 -05:00
Ehsan Akhgari
8f6e8510f6
Bug 1340710 - Part 2: De-virtualize BasePrincipal::Kind(); r=bholley
2017-03-06 22:27:37 -05:00
Ehsan Akhgari
c669405410
Bug 1340710 - Part 1: Remove nsPrincipal::SetURI() since it's unused; r=bholley
2017-03-06 22:27:31 -05:00
David Major
ed0b8f8653
Bug 1344615: Remove nsXPCOMStrings.{h,cpp} r=bsmedberg
...
These are now dead code.
MozReview-Commit-ID: AClU0Qx3kmN
--HG--
extra : rebase_source : df83cf89292da1519bb26027c11e14923d5c54a0
2017-03-06 17:52:54 +13:00
Kris Maglione
ee306e28c0
Bug 1314361 - Part 6: Remove the addonId origin attribute. r=bholley
2016-11-08 17:11:32 -08:00
Kris Maglione
7c5ab514b7
Bug 1314361 - Part 5: Remove origin attribute comparison helpers for ignoring addonId. r=bholley
2016-11-04 14:32:26 -07:00
Kris Maglione
45dbac3bdd
Bug 1314361 - Part 4: Stop setting addonId origin attribute. r=billm
2016-11-04 18:22:45 -07:00
Kris Maglione
af57bdc417
Bug 1314361 - Part 2: Stop using addonId origin attribute for permission checks. r=billm
2016-11-04 15:16:50 -07:00
Kris Maglione
7f01119247
Bug 1314361 - Part 1: Generate nsIPrincipal.addonId from AddonPolicyService rather than origin attributes. r=billm
2016-11-05 22:38:17 -07:00
Masatoshi Kimura
7be7b11a1c
Bug 1342144 - Remove version parameter from the type attribute of script elements. r=jmaher
...
This patch is generated by the following sed script:
find . ! -wholename '*/.hg*' -type f \( -iname '*.html' -o -iname '*.xhtml' -o -iname '*.xul' -o -iname '*.js' \) -exec sed -i -e 's/\(\(text\|application\)\/javascript\);version=1.[0-9]/\1/g' {} \;
MozReview-Commit-ID: AzhtdwJwVNg
--HG--
extra : rebase_source : e8f90249454c0779d926f87777f457352961748d
2017-02-23 06:10:07 +09:00
Andrea Marchesini
d0b50071c8
Bug 1341218 - nsNullPrincipal should serialize its URL, r=qdot
2017-02-23 14:30:23 +01:00
Andrea Marchesini
e7a1e33581
Bug 1341250 - Moving nsExpandedPrincipal in separate files, r=qdot
...
--HG--
rename : caps/nsPrincipal.cpp => caps/nsExpandedPrincipal.cpp
rename : caps/nsPrincipal.h => caps/nsExpandedPrincipal.h
2017-02-22 10:01:43 +01:00
Olli Pettay
5a13988731
Bug 1339251 - Make Equals/Subsumes faster when comparing same objects, r=bholley
...
--HG--
extra : rebase_source : 977c790f03188c4fda83297db026af62ee56a870
2017-02-22 13:19:03 +02:00
Sebastian Hengst
c171511b3c
Backed out changeset a6267555a244 (bug 1341218) for various test failures, e.g. xpcshell test dom/push/test/xpcshell/test_service_parent.js. r=backout
2017-02-22 11:21:37 +01:00
Sebastian Hengst
0ea43f8182
Backed out changeset f0886e3477a5 (bug 1341250)
2017-02-22 11:20:46 +01:00
Andrea Marchesini
c83982c31f
Bug 1341250 - Moving nsExpandedPrincipal in separate files, r=qdot
...
--HG--
rename : caps/nsPrincipal.cpp => caps/nsExpandedPrincipal.cpp
rename : caps/nsPrincipal.h => caps/nsExpandedPrincipal.h
2017-02-22 10:01:43 +01:00
Andrea Marchesini
0626b9d52e
Bug 1341218 - nsNullPrincipal should consider its URI in ::Write/::Read, r=qdot
2017-02-22 10:01:43 +01:00
Olli Pettay
f3a30cf48d
Bug 1339213 - Inline IsRestrictOpenerAccessForFPI, r=tihuang
2017-02-14 13:45:35 +02:00
Shane Caraveo
c7c7bd4f51
Bug 1308640 bypass TP when addon has explicit permission to url, r=bz,kmag,mrbkap
...
MozReview-Commit-ID: BIhoUY2Ug8k
--HG--
extra : rebase_source : 29cc48becfa958ba8f50d254fa6f30fd1820aef9
2017-02-09 21:08:06 -08:00
Gijs Kruitbosch
e4b6ebfe64
Bug 1335272 - fix about:cache internal links, r=bz
...
MozReview-Commit-ID: QzgsTTulJC
--HG--
extra : rebase_source : 8604d1ea660a6c5c811f47fd3ed98ab136e73c6e
2017-02-02 15:10:11 +00:00
Brad Lassey
a5e07b93bf
bug 1303096 - Stop sending sync messages soon after content process start-up r=billm
2017-02-05 00:52:38 -05:00
Sebastian Hengst
122ebc553b
Backed out changeset e9d8a75a0dcc (bug 1303096) for failing various tests on Android 4.3 debug (e.g. test_saveHeapSnapshot_e10s_01.html). r=backout
2017-02-05 10:26:28 +01:00
Brad Lassey
ecdf363246
bug 1303096 - Stop sending sync messages soon after content process start-up r=billm
2017-02-05 00:52:38 -05:00
Daniel Holbert
c280ee0009
Bug 1259348 part 1: Remove CSSUnprefixingService.js and associated code (since it's been supplanted by built-in webkit-prefixed-CSS support). r=mats
...
MozReview-Commit-ID: CXCJJWhHc8G
--HG--
extra : rebase_source : a09745ce568c9afde78065d9e837da958e7b252e
2017-02-03 14:56:13 -08:00
Tim Huang
4e31b183a6
Bug 1319773 - Part 2: Add a pref 'privacy.firstparty.isolate.restrict_opener_access' which controls the access of window.opener for different first party domain. r=baku
...
--HG--
extra : rebase_source : 052dfb3554ba050af85247bcf2587ade26710aac
2017-01-23 10:50:22 +08:00
Tim Huang
3e5d172c95
Bug 1319773 - Part 1: Add a SubsumesConsideringDomainIgnoringFPD in BasePrincipal. r=baku
...
--HG--
extra : rebase_source : db853a600e666cd11a140153536427c1f4e5882c
2017-01-18 20:17:19 +08:00
Boris Zbarsky
0bf506240a
Bug 1335311. Remove the file:/resource: special case in CheckLoadURIFromScript. r=bholley
2017-02-01 15:29:45 -05:00
Ehsan Akhgari
b62bca9af3
Bug 1335526 - Ensure that sandboxed channel's result principal is unique; r=bzbarsky
2017-02-01 13:47:26 -05:00
Sebastian Hengst
53d59b106f
Backed out changeset a273aee1be72 (bug 1335526) for bustage. r=backout
2017-02-01 17:41:29 +01:00
Ehsan Akhgari
9b36bf10cd
Bug 1335526 - Ensure that sandboxed channel's result principal is unique; r=bzbarsky
2017-02-01 11:24:49 -05:00
Florian Quèze
2cf30507bd
Bug 1334261 - script-generated patch to remove more newURI null parameters, r=jaws.
2017-01-27 10:51:02 +01:00
Geoff Brown
677d00071c
Bug 1305241 - Allow more assertions in test_bug995943.xul; r=jmaher
2017-01-26 07:26:33 -07:00
Eric Rahm
6af429ff8a
Bug 1332202 - Convert most infallible NS_EscapeURL calls to fallible version. r=froydnj
...
This makes most users of |NS_EscapeURL| use the fallible version. A few are
left infallible as it seems like the entire function is assumed to be
infallible.
MozReview-Commit-ID: Cy1L5jQwjO1
2017-01-24 11:11:44 -08:00
Dave Townsend
c5f0e2be67
Bug 1331968: Implement the moz: protocol handler to redirect to a fixed website. r=gijs
...
The protocol handler is intentionally simple. It works for the entering into the
urlbar case but not a lot else. Included some basic tests.
MozReview-Commit-ID: 4FQ1irdt3Nj
--HG--
extra : rebase_source : 30d9fc7ba2c500f268d282e47d291724d9899ba4
2017-01-18 14:10:46 -08:00
Mark Banner
16e6d381ac
Bug 503613 - Remove old 'tail =' lines from xpcshell.ini files; r=gps
...
MozReview-Commit-ID: 62Hp5ISxowJ
--HG--
extra : rebase_source : daa8efb3409031fea553f4fd0c9d0746e38dc308
extra : histedit_source : b4c23aacf678ba0d0ac9c09191a7c494ead11a08
2017-01-18 10:30:39 +00:00
Andrea Marchesini
d63b101bc3
Bug 1331751 - Fix the use of nsIURIWithPrincipal in nsPrincipal::GetOriginInternal, r=bkelly
2017-01-18 15:52:24 +01:00
Andrea Marchesini
359ae91eac
Bug 1328653 - Merging all the various *OriginAttributes to just one, r=huseby
2017-01-12 17:38:48 +01:00
Joel Maher
160093df2f
Bug 1328383 - add BUG_COMPONENT to caps/* files. r=bholley
...
MozReview-Commit-ID: 64bkvdcsHL9
2017-01-10 12:46:28 -05:00
Florian Quèze
fc6379e827
Bug 1329182 - remove trailing newURI null parameters in the rest of the tree, r=jaws.
2017-01-09 20:27:26 +01:00
Andrea Marchesini
2781835fb3
Bug 1321550 - origin should not contain ref part of the URL, r=valentin
2017-01-04 14:53:57 +01:00
Jean-Luc Bonnafoux
fe7f4239c6
Bug 1322146 - initialize mFlags variable in constructor. r=dveditz
2016-12-19 12:56:23 +01:00
dimi
bcd217b3c0
Bug 1320402 - Move url-classifier off of using appIds. r=ehsan, gcp
...
MozReview-Commit-ID: IqnAVrv2c9W
2017-01-03 14:21:58 +08:00
Masatoshi Kimura
0c6dc2ea73
Bug 1323683 - Fold nsIURIWithQuery into nsIURI. r=valentin.gosu
...
MozReview-Commit-ID: BFfgr42sNyx
--HG--
extra : rebase_source : a28d6a3c96f0c86dd7269147f130b3195b1f1faf
2016-12-28 20:40:21 +09:00
Yoshi Huang
2b7e1dceb6
Bug 1324115 - Part 1: add a C++ helper in nsIPrincipal. r=smaug
2016-12-21 14:59:20 +08:00
Andrea Marchesini
912e678ea6
Bug 1322514 - nsIPrincipal::GetOrigin should use the parent principal when dealing with blobURL, r=ehsan
2016-12-08 10:44:59 -10:00
Andrea Marchesini
f7f5990527
Bug 1317927 - Media caching needs to use origin attributes, r=cpearce, r=jesup
2016-12-07 07:07:09 -10:00
Gijs Kruitbosch
d1260ddfab
Bug 1318664 - fix about pages linking to themselves with query parameters, r=bz
...
MozReview-Commit-ID: Dsqj0L4aIlv
--HG--
extra : rebase_source : 5fde285885cfa4a14200aefc70d1f2395d67d92f
2016-11-23 18:26:44 +00:00
Andrea Marchesini
43e2ee7f71
Bug 1318727 - BroadcastChannel should support data URL - part 2, r=me
2016-11-30 15:31:09 +01:00
Andrea Marchesini
a9a05a834d
Bug 1318727 - BroadcastChannel should support data URL, r=smaug
2016-11-30 15:13:27 +01:00
Dragana Damjanovic
898f6d8b2a
Bug 1317641
- Some loadinfo security flags should not apply in case of a redirect. r=bz
...
--HG--
extra : rebase_source : aaebbb8628801871e09bc583b3b11a9908b77b92
2016-11-23 17:54:58 -05:00
Andrea Marchesini
dd1d53bd2b
Bug 1319045 - Get rid of nsPrincipal::GetOriginFromURI, r=qdot
2016-11-22 12:38:41 +01:00
Andrea Marchesini
2f974ccbce
Bug 1318273 - Improve the use of SpecialPowers.pushPrefEnv() - part 1, r=qdot
2016-11-18 09:33:33 +01:00
Sebastian Hengst
7110a88674
Backed out changeset d43b778d95c6 (bug 1318273) for failing mochitest fetch/test_formdataparsing.html. r=backout on a CLOSED TREE
2016-11-17 20:58:38 +01:00
Andrea Marchesini
cf2ad8072f
Bug 1318273 - Improve the use of SpecialPowers.pushPrefEnv() - part 1, r=qdot
2016-11-17 19:36:01 +01:00
Ehsan Akhgari
d07f79a266
Bug 1318210 - Remove nsIAppsService; r=baku
2016-11-17 10:41:36 -05:00
Ehsan Akhgari
5cc591dc59
Bug 1318209
- Remove mozIApplication; r=baku
2016-11-17 10:12:43 -05:00
Andrea Marchesini
d5b0cbe35a
Bug 1315905
- Cleanup Necko http security check - part 1, r=valentin
2016-11-17 14:52:16 +01:00
Ehsan Akhgari
eac76d9772
Bug 1310845 - Remove support for mozapp iframes; r=fabrice,jryans,baku,mcmanus
...
This patch removes support for mozapp iframes, leaving support for
mozbrowser iframes intact. Some of the code has been rewritten in order
to phrase things in terms of mozbrowser only, as opposed to mozbrowser
or app. In some places, code that was only useful with apps has been
completely removed, so that the APIs consumed can also be removed. In
some places where the notion of appId was bleeding out of this API, now
we use NO_APP_ID. Other notions of appId which were restricted to this
API have been removed.
2016-11-16 09:13:38 -05:00
Carsten "Tomcat" Book
3eacc680db
Backed out changeset 7d1f7dd996f7 (bug 1310845)
2016-11-16 14:50:44 +01:00
Ehsan Akhgari
cb369370b3
Bug 1310845 - Remove support for mozapp iframes; r=fabrice,jryans,baku,mcmanus
...
This patch removes support for mozapp iframes, leaving support for
mozbrowser iframes intact. Some of the code has been rewritten in order
to phrase things in terms of mozbrowser only, as opposed to mozbrowser
or app. In some places, code that was only useful with apps has been
completely removed, so that the APIs consumed can also be removed. In
some places where the notion of appId was bleeding out of this API, now
we use NO_APP_ID. Other notions of appId which were restricted to this
API have been removed.
2016-11-15 18:31:46 -05:00
Gijs Kruitbosch
82d475be93
Bug 1309310, r=bz
...
MozReview-Commit-ID: KLaMv6zfxR8
--HG--
extra : rebase_source : ccb4d19c874230c512010d3891aae33a69947f62
2016-11-09 18:25:11 +00:00
Tim Huang
950b86072e
Bug 1313627 - Get the firstPartyDomain from the nodePrincipal of the document in nsDocShell::CanAccessItem() if the first party isolation is on. r=smaug
2016-11-10 14:20:38 +08:00
Christoph Kerschbaumer
f2776f1b8d
Bug 1308889 - Try to explicitly pass aTriggeringPrincipal and aPrincipalToInherit to DoURILoad(). r=bz
2016-11-08 07:23:12 +01:00
Valentin Gosu
656872593e
Bug 1315302 - Remove signedPkg from origin attributes r=baku
...
MozReview-Commit-ID: L1xvRgeO6De
--HG--
extra : rebase_source : dee943054af499b6e3f0aca2801fa9414f5567be
2016-11-06 16:15:36 +01:00
Sebastian Hengst
8ed57a9dc8
Bug 1310297 - Remove test annotations using b2g, mulet or gonk: caps. r=RyanVM
...
MozReview-Commit-ID: DXTWNHWatEv
--HG--
extra : rebase_source : da5e99ba431f1bc826101d8cc1e1bcb599aaa5fb
2016-11-05 11:29:13 +01:00
Kris Maglione
8b10d432c1
Bug 1308920: Part 1 - Add an EqualsIgnoringAddonId method to BasePrincipal. r=bholley
...
This is meant as a temporary stopgap until we can stop using origin attributes
to store add-on IDs.
MozReview-Commit-ID: DHstOTyu7pR
--HG--
extra : rebase_source : adb8fbfaadf6e914b5aa15c2693a35056669506c
2016-11-02 10:04:13 -07:00
Dave Huseby
ce82855c42
Bug 1189086 - Eliminate nsIPrincipal::jarPrefix. r=dveditz
2016-10-24 13:52:00 +02:00
Tom Tromey
0dc689acdd
Bug 553032 - use MOZ_FORMAT_PRINTF in js; r=evilpie
...
MozReview-Commit-ID: DD3DJRkOxmC
--HG--
extra : rebase_source : 61cdf0da1a82b626abc79209ee41e43c3bb152ca
2016-10-11 12:44:40 -06:00
Sebastian Hengst
9e31a95f74
Backed out changeset 2bfd163f23f9 (bug 553032)
2016-10-19 18:29:36 +02:00
Tom Tromey
5b851428f8
Bug 553032 - use MOZ_FORMAT_PRINTF in js; r=evilpie
...
MozReview-Commit-ID: DD3DJRkOxmC
--HG--
extra : rebase_source : 4f98705e5e2c5ff9860f04384abbc6f5dc18a7a9
2016-10-11 12:44:40 -06:00
Ehsan Akhgari
4a51ebacfa
Bug 1310378 - Remove support for mozwidget; r=baku
2016-10-17 13:15:36 -04:00
Ehsan Akhgari
9de6bbbaec
Bug 1261019 - Part 3: Remove Navigator.mozApps and code depending on it; r=myk,jryans,fabrice,mcmanus,peterv
2016-10-13 13:18:41 -04:00
Christoph Kerschbaumer
fb07f658e3
Bug 1305012 - Downgrade a new channel's principal to NullPrincipal. r=smaug
2016-10-05 21:19:51 +02:00
Cameron McCormack
418bfe72a3
Bug 1300720 - Part 2: Lazily initialize nsScriptSecurityManager::mFileURIWhitelist. r=bholley
...
MozReview-Commit-ID: 8cqHUlOnsEH
2016-10-03 12:43:17 +08:00
Olli Pettay
9f0454f829
Bug 1306300, null check nsILoadContext in GetLoadContextCodebasePrincipal, r=baku
2016-09-29 20:31:50 +03:00
Gijs Kruitbosch
7de765df42
Bug 1290668 - unbreak view-source links between http and https pages, r=smaug
...
MozReview-Commit-ID: B4nXTkMC5LE
--HG--
extra : rebase_source : ad7086b7ff58f44b12c3eaaf9b7be8c8955762a5
2016-09-27 13:31:53 +01:00
Tooru Fujisawa
10dd75211d
Bug 1289050 - Part 2: Use ASCII or Latin1 variants of JS_ReportError in not-simple cases. r=jwalden
2016-08-15 19:20:01 +09:00
Jonathan Hao
8a70bfa5fc
Bug 1302047 - Ignore userContextId and firstPartyDomain when matching permissions. r=baku
...
--HG--
extra : rebase_source : da81c21da92810d808ebe865a456cc9d04058ce3
2016-09-20 16:35:21 +08:00
Tracy Walker
ab9e34053d
Bug 1279087 - In caps/tests/mochitests/bug995943.xul, widen range of assertion check for OSX 10.10 to 5-9 to reduce intermittent test timeouts. r=emk
2016-09-26 08:13:38 -05:00
Ehsan Akhgari
9d56bec7a1
Bug 1297687 - Part 5: Require passing an OriginAttribute when constructing an nsExpandedPrincipal; r=bholley
2016-09-22 13:28:04 -04:00
Ehsan Akhgari
e45aad00ec
Bug 1297687 - Part 3: Ensure that the expanded principal of a sandbox has a sensible OriginAttributes; r=bholley
...
This patch allows specifying an OriginAttributes when creating a sandbox
using Components.utils.Sandbox() by specifying an originAttributes
member on the options dictionary.
If an OA is specified in this way, it is used for creating codebase
principals from the string arguments passed to the function. Otherwise,
if one or more principals are passed in the array argument to Sandbox(),
the OA of the principal(s) is used to construct codebase principals from
the strings inside the array. In this case, we check to make sure that
all of the passed principals have the same OA, otherwise we'll throw an
exception.
In case no explicit OA is specified and no principals are passed in the
array argument, we create the codebase principals using a default OA.
2016-09-22 13:27:51 -04:00
Ehsan Akhgari
5404c2dc93
Bug 1297687 - Part 2: Allow specifying an OriginAttribute when creating an expanded principal; r=bholley
2016-09-22 13:27:40 -04:00
Ehsan Akhgari
6b65aceec2
Bug 1297687 - Part 1: Remove nsIScriptSecurityManager.createExpandedPrincipal(); r=bholley
2016-09-22 13:27:33 -04:00
Christoph Kerschbaumer
bc9a70d964
Bug 1297338
- Introduce concept of principalToInherit to docshell and scriptSecurityManager. r=bz
2016-09-20 08:36:25 +02:00
Nicholas Nethercote
8c9e80a613
Bug 1297300 - Add missing checks to GetSpec() calls in caps/ and js/. r=mrbkap.
...
This required making GetScriptLocation() fallible.
--HG--
extra : rebase_source : a678e86c443988897d88550bec1cd1d21c3e919e
2016-08-30 14:22:04 +10:00
Michael Layzell
36e08437d0
Bug 1018486 - Part 8: Various other changes, r=smaug
...
MozReview-Commit-ID: B0dsomkWgEk
2016-09-07 10:50:45 -04:00
Yoshi Huang
10b437080c
Bug 1260931 - Part 3: Propagate firstPartyDomain. r=smaug
2016-09-06 10:25:58 +08:00
Yoshi Huang
85a594681d
Bug 1260931 - Part 1: add firstPartyDomain. r=smaug
...
Add an origin attribute called 'firstPartyDomain'.
This value will be extracted from the URL bar.
And the purpose of this attribute is used to isolate the data-jars.
Please see the tor documentation.
https://www.torproject.org/projects/torbrowser/design/#identifier-linkability
The idea is like a superset of 'reject third party cookies', but not
only apply for cookies, it also applies to all data-jars like localStorage,
indexedDB and so on.
So basically an iframe will have its own data-jar, and this data-jar is
isolated by the URL from URL bar, for instance, an iframe
https://facebook.com inside https://cnn.com won't share data-jar with
the iframe (https://facebook.com ) in https://bbc.com
2016-09-06 10:25:48 +08:00
Sebastian Hengst
60d03b201e
Backed out changeset 935ffd53f193 (bug 1260931) for failing xpcshell test test_packaged_app_service.js. r=backout
2016-09-05 21:16:10 +02:00
Sebastian Hengst
c9519f7c29
Backed out changeset b9afda2804fd (bug 1260931)
2016-09-05 21:15:29 +02:00
Yoshi Huang
6cca1d0c54
Bug 1260931 - Part 3: Propagate firstPartyDomain. r=smaug
2016-09-06 01:50:30 +08:00
Yoshi Huang
6c3b62e2fb
Bug 1260931 - Part 1: add firstPartyDomain. r=smaug
...
Add an origin attribute called 'firstPartyDomain'.
This value will be extracted from the URL bar.
And the purpose of this attribute is used to isolate the data-jars.
Please see the tor documentation.
https://www.torproject.org/projects/torbrowser/design/#identifier-linkability
The idea is like a superset of 'reject third party cookies', but not
only apply for cookies, it also applies to all data-jars like localStorage,
indexedDB and so on.
So basically an iframe will have its own data-jar, and this data-jar is
isolated by the URL from URL bar, for instance, an iframe
https://facebook.com inside https://cnn.com won't share data-jar with
the iframe (https://facebook.com ) in https://bbc.com
2016-09-06 01:50:15 +08:00
Wes Kocher
a2ca4e17ce
Backed out changeset 1e7eb0625d3e (bug 1297687) a=merge
2016-09-02 13:18:37 -07:00
Sebastian Hengst
7080f0c942
Backed out changeset dd200883aa79 (bug 1260931) for permafailing test_child_docshell.html on Android debug. r=backout
2016-09-02 15:33:51 +02:00
Sebastian Hengst
df3ad10e28
Backed out changeset 10da0eca7bbb (bug 1260931)
2016-09-02 15:33:51 +02:00
Sebastian Hengst
31c5f85098
Backed out 5 changesets (bug 1260931)
...
Backed out changeset 86e1a437021b (bug 1260931)
Backed out changeset be65e87da9e3 (bug 1260931)
Backed out changeset 39cff1d988fd (bug 1260931)
Backed out changeset 2fa7c4d8a5bc (bug 1260931)
Backed out changeset 075d612841fb (bug 1260931)
2016-09-02 14:55:59 +02:00
Sebastian Hengst
7db44d87f4
Backed out changeset dd200883aa79 (bug 1260931) for permafailing test_child_docshell.html on Android debug. r=backout
2016-09-02 14:39:43 +02:00
Sebastian Hengst
5bbaac898b
Backed out changeset 10da0eca7bbb (bug 1260931)
2016-09-02 14:38:42 +02:00
Yoshi Huang
88b9430165
Bug 1260931 - Part 3: Propagate firstPartyDomain. r=smaug
2016-09-02 15:04:40 +08:00
Yoshi Huang
e48e6c5e6c
Bug 1260931 - Part 1: add firstPartyDomain. r=smaug
...
Add an origin attribute called 'firstPartyDomain'.
This value will be extracted from the URL bar.
And the purpose of this attribute is used to isolate the data-jars.
Please see the tor documentation.
https://www.torproject.org/projects/torbrowser/design/#identifier-linkability
The idea is like a superset of 'reject third party cookies', but not
only apply for cookies, it also applies to all data-jars like localStorage,
indexedDB and so on.
So basically an iframe will have its own data-jar, and this data-jar is
isolated by the URL from URL bar, for instance, an iframe
https://facebook.com inside https://cnn.com won't share data-jar with
the iframe (https://facebook.com ) in https://bbc.com
2016-09-02 15:04:40 +08:00
Nicholas Nethercote
b71747b2ac
Bug 1299727 - Rename NS_WARN_IF_FALSE as NS_WARNING_ASSERTION. r=erahm.
...
The new name makes the sense of the condition much clearer. E.g. compare:
NS_WARN_IF_FALSE(!rv.Failed());
with:
NS_WARNING_ASSERTION(!rv.Failed());
The new name also makes it clearer that it only has effect in debug builds,
because that's standard for assertions.
--HG--
extra : rebase_source : 886e57a9e433e0cb6ed635cc075b34b7ebf81853
2016-09-01 15:01:16 +10:00
Ehsan Akhgari
7d8261a6b9
Bug 1297687 - Use the OriginAttributes associated with a window principal when creating a Sandbox with an expanded principal; r=baku
2016-09-01 14:34:23 -04:00
Andrea Marchesini
d4c8ccb2d4
Bug 1298664 - Indentation fix in nsPrincipal::SubsumesInternal, r=smaug
2016-08-29 05:26:41 +02:00
Yoshi Huang
69ed1a79e4
Bug 1244340 - Part 2: add setOriginAttributes in nsIXMLHttpRequest. r=sicking
...
Add a ChromeOnly method called 'setOriginAttributes' on the XMLHttpRequest,
so that we can override the origin attributes for those XHRs running by XUL
(which will use System Principal).
2016-08-26 18:59:00 +08:00
Kan-Ru Chen
b6d880aca1
Bug 1297276 - Rename mfbt/unused.h to mfbt/Unused.h for consistency. r=froydnj
...
The patch is generated from following command:
rgrep -l unused.h|xargs sed -i -e s,mozilla/unused.h,mozilla/Unused.h,
MozReview-Commit-ID: AtLcWApZfES
--HG--
rename : mfbt/unused.h => mfbt/Unused.h
2016-08-24 14:47:04 +08:00
Kan-Ru Chen
29b9a17a92
Bug 1295103 - Use MOZ_MUST_USE in OriginAttributes. r=allstars
...
MozReview-Commit-ID: PWUb81L8ya
--HG--
extra : rebase_source : 2bdc7adc7a6b5fd121a4621086fab6f87834dd20
2016-08-15 18:22:44 +08:00
Dragana Damjanovic
67635a6600
Bug 1295636 - SetHostPort should reset the port if the host parameter does not have a port number. r=valentin, r=smaug
...
--HG--
extra : rebase_source : 2e63afd5708c55810206f9bc47b6f078a0824400
2016-08-17 23:25:00 -04:00
Wes Kocher
e9097643d5
Merge inbound to central, a=merge
2016-08-12 13:44:29 -07:00
Jan de Mooij
0ad12515f4
Bug 1292892 part 1 - Stop using JSRuntime outside SpiderMonkey. r=bz,terrence,fitzgen,kanru
2016-08-11 14:39:22 +02:00
Nicholas Nethercote
bab6d17ebf
Bug 1293117 (part 4) - Change many NS_IMETHODIMP occurrences to NS_IMETHOD. r=froydnj.
...
This patch makes the following changes on many in-class methods.
- NS_IMETHODIMP F() override; --> NS_IMETHOD F() override;
- NS_IMETHODIMP F() override {...} --> NS_IMETHOD F() override {...}
- NS_IMETHODIMP F() final; --> NS_IMETHOD F() final;
- NS_IMETHODIMP F() final {...} --> NS_IMETHOD F() final {...}
Using NS_IMETHOD is the preferred way of marking in-class virtual methods.
Although these transformations add an explicit |virtual|, they are safe --
there's an implicit |virtual| anyway because |override| and |final| only work
with virtual methods.
--HG--
extra : rebase_source : 386ee4e4ea2ecd8d5001efabc3ac87b4d6c0659f
2016-08-08 10:54:47 +10:00
Rob Wu
9069fff35f
Bug 1197451 - Add clipboardWrite permission r=billm
...
MozReview-Commit-ID: 6d1mQSVWRPe
--HG--
extra : rebase_source : 2f19bab5c9d6db25c60b2b19c06c7027384a04ca
2016-07-08 17:19:17 -07:00
James Andreou
3585e16752
Bug 1283281 - Remove PB Flag from DOMStorage. r=jdm
2016-06-29 14:01:00 +02:00
Andrew McCreight
20456a6f50
Bug 1292289, part 2 - Remove includes of xpcprivate.h in caps/. r=mrbkap
...
Also remove some unused nsIXPConnect headers.
With the prior patch and this patch, touching xpcprivate.h does not
require rebuilding the caps directory.
MozReview-Commit-ID: HAL0FscGqjM
--HG--
extra : rebase_source : 6d0fcb66d5b6e2654919eb0d035c4365fb30273f
2016-08-04 11:19:24 -07:00
Thomas Wisniewski
6a1fb99d2b
Bug 709991 - Fire onerror instead of throwing on network errors for async XHRs. r=bz
2016-07-30 00:24:56 -04:00
Yoshi Huang
84039380cc
Bug 1287073 - remove SEC_FORCE_INHERIT_PRINCIPAL_WAS_DROPPED from nsILoadInfo r=sicking
2016-07-28 15:56:32 +08:00
Gijs Kruitbosch
61094e5a36
Bug 1280584 - implement cloneWithNewRef and thereby make hash/ref links use a simple unified codepath in the IO service, r=valentin
...
MozReview-Commit-ID: 8FIyclkJPDp
--HG--
extra : rebase_source : 49fb2b12488bd57a5417c7c3bff2211d651c5de7
extra : amend_source : d9940a1d9009930dc2f499417a7e1446d4601c20
2016-07-26 23:38:46 +01:00
Fabrice Desré
7846da76d6
Bug 1287107 - Making transition alive with gaia as chrome:// r=bholley,fabrice
...
MozReview-Commit-ID: 9uVUrmuVFXQ
--HG--
extra : rebase_source : 20f6f0235667530c21aca4889b5d33e39c2d1a48
2016-03-03 09:58:47 -08:00
Carsten "Tomcat" Book
c7846e126c
Backed out changeset 16aa7041c009 (bug 1287107) for causing xpcshell and mac tests
2016-07-22 11:30:23 +02:00
Fabrice Desré
f5b619fb28
Bug 1287107 - Making transition alive with gaia as chrome:// r=bholley,fabrice
...
MozReview-Commit-ID: 9uVUrmuVFXQ
--HG--
extra : rebase_source : d0c19fcda5c72ecdce3b0d0bbbafa5a7954d7a4c
2016-03-03 09:58:47 -08:00
Tom Tromey
5538d692d3
Bug 1286877 - do not set c-basic-offset for python-mode; r=gps
...
This removes the unnecessary setting of c-basic-offset from all
python-mode files.
This was automatically generated using
perl -pi -e 's/; *c-basic-offset: *[0-9]+//'
... on the affected files.
The bulk of these files are moz.build files but there a few others as
well.
MozReview-Commit-ID: 2pPf3DEiZqx
--HG--
extra : rebase_source : 0a7dcac80b924174a2c429b093791148ea6ac204
2016-07-14 10:16:42 -06:00
Carsten "Tomcat" Book
4a64baa9d4
merge mozilla-inbound to mozilla-central a=merge
2016-07-21 16:24:36 +02:00
Rob Wu
f8554fe4b9
Bug 1234677 - Introduce _generated_background_page.html r=billm
...
- Fixes bugzil.la/1234677
- Fixes bugzil.la/1286057
- Fixes bug: the URL failed to load if a query string or reference
fragment was present.
MozReview-Commit-ID: 4oMwI3IS7OX
--HG--
extra : rebase_source : 621878e4f62febdc34899192e254f8ec315b789e
2016-07-12 13:55:14 -07:00
Chris Peterson
b175c9fdd5
Bug 1277106 - Part 2: Expand MOZ_UTF16() strings to u"" string literals. r=Waldo
2016-07-20 22:03:25 -07:00
Gijs Kruitbosch
30cb692f62
Bug 1277583, tests, r=ckerschb
...
MozReview-Commit-ID: J3r7krW8dSH
--HG--
extra : rebase_source : 9505f797a770560c02461184dbc5cd0b8ac6bbe8
2016-06-02 19:42:29 +01:00
Gijs Kruitbosch
ca0706d1c4
Bug 1281787, r=bz
...
MozReview-Commit-ID: JLdLD57pF87
--HG--
extra : rebase_source : c656044a8448d2fa70e484e9c126fc1955201579
2016-07-13 12:05:22 +01:00
Jan de Mooij
e4ae5f26da
Bug 1283855
part 20 - Make more principals code take JSContext instead of JSRuntime. r=luke
...
--HG--
extra : rebase_source : ad5f2f5b5bef9d20e4e248898a3c754adb306683
2016-07-05 16:49:46 +02:00
Jan de Mooij
078a91ca56
Bug 1283855
part 19 - Make security callbacks take JSContext instead of JSRuntime. r=jorendorff
...
--HG--
extra : rebase_source : c106826540912b00550b2d6162dcae6e1fb616d4
2016-07-05 16:49:44 +02:00
Carsten "Tomcat" Book
2266139ee3
Merge mozilla-central to mozilla-inbound
2016-06-10 15:44:04 +02:00
Gijs Kruitbosch
6b557997b2
Bug 1274480 - followup: use image that exists on android, rs=bustage
...
MozReview-Commit-ID: 86ioFu6GrmB
2016-06-09 15:35:11 +01:00
Paolo Amadini
5797203ab2
Bug 1274480 - Part 1 - Use SVG for permission icons and notifications. r=Gijs
...
MozReview-Commit-ID: Dk0PajOppVL
--HG--
extra : rebase_source : eed692400919f5c126debb14b3ae2c2d17c7cb7d
2016-06-08 16:34:10 +01:00
Nicholas Nethercote
5592622f09
Bug 1277104 - Add strings to high-frequency MOZ_CRASH() occurrences. mccr8.
...
Some of these are guesses; it's not always clear from a crash report stack
trace which MOZ_CRASH() was hit.
2016-06-09 13:09:58 +10:00
Jonathan Watt
b15368cfcb
Bug 1279451 - Remove a lot of unnecessary includes of nsAutoPtr.h. rs=sparky
2016-06-07 21:10:18 +01:00
Jan Varga
af49dba19e
Bug 1195930 - Part 8: Fixed support for origin clearing, reworked internal origin patterns to use OriginAttributesPattern; r=asuth
2016-06-05 21:42:48 +02:00
Masatoshi Kimura
107cbffdc0
Bug 1205027 - Only size <img> to broken-image size if it's actually broken. r=dholbert
2016-06-03 07:05:46 +09:00
James Andreou
1d32e86b9c
Bug 1269361 - Add mPrivateBrowsingId to OriginAttributes r=ehsan,jdm
2016-06-02 17:03:11 -04:00
Gijs Kruitbosch
4d279191b4
Bug 1277583, r=bz
...
MozReview-Commit-ID: E9gNZAOQzG9
--HG--
extra : rebase_source : 302534c6ef5c064c3956188dd52fcf668db0d0e1
extra : histedit_source : c97f8279ebeea7b9a6c93d88f6809c38cac2ee14
2016-06-02 19:42:21 +01:00
Jonathan Hao
525c086187
Bug 1259871 - Replace getSimpleCodebasePrincipal with createCodebasePrincipal. r=sicking
...
MozReview-Commit-ID: Frx0CjBzuve
--HG--
extra : histedit_source : 036eb321d9ccb20e0e071ba588b0a1249eb34bdd
2016-05-24 18:01:34 +08:00
Boris Zbarsky
dc120449d2
Bug 1275698. Get rid of nsScriptSecurityManager::ScriptAllowed and replace it with xpc::Scriptability::Get(obj).Allowed() for better performance and less indirection. r=khuey
2016-05-27 20:26:56 -04:00
Boris Zbarsky
4ec7cc4fc1
Bug 1276138. Remove the current/safe JSContext getters from nsScriptSecurityManager. r=mrbkap
2016-05-27 13:28:14 -04:00
Chris Peterson
e343bcae34
Bug 1274415 - Fix -Wshadow warnings in caps/ directory. r=dveditz
...
caps/BasePrincipal.cpp:562:28 [-Wshadow] declaration shadows a local variable
caps/nsScriptSecurityManager.cpp:675:18 [-Wshadow] declaration shadows a local variable
caps/nsScriptSecurityManager.cpp:854:14 [-Wshadow] declaration shadows a local variable
2016-05-19 01:04:46 -07:00
Christoph Kerschbaumer
d7757bf8dd
Bug 1273364 - Trying to set a CSP on a SystemPrincipal should return NS_ERROR (r=njn)
2016-05-21 19:36:24 +02:00
Joel Maher
b6788df19c
Bug 1067022 - add expected assertion on windows for test_bug995943.xul. r=RyanVM
...
MozReview-Commit-ID: 3cg9fQgorhG
--HG--
extra : rebase_source : 76c75b2fab084240c33eab1311ebb6c8f7b9f856
2016-05-16 06:47:59 -04:00
Chris Peterson
353ee65255
Bug 1272513 - Part 1: Suppress -Wshadow warnings-as-errors in some directories. r=glandium
2016-05-11 00:00:01 -07:00
Andrea Marchesini
487efd0283
Bug 1270679 - Ensure blob URLs are only accessible within the same usercontextId, r=bz
2016-05-11 19:53:13 +02:00
Jonathan Watt
73ea9dd190
Bug 1162772, part 3 - Add a getChannelResultPrincipalIfNotSandboxed method to nsIScriptSecurityManager. r=bz
...
MozReview-Commit-ID: 4QwM1y6wRb
2016-04-28 11:13:09 +01:00
Sebastian Hengst
bec59714da
Backed out changeset c32539fd746a (bug 1162772)
2016-04-30 09:54:01 +02:00
Jonathan Watt
c40b7e121f
Bug 1162772, part 3 - Add a getChannelResultPrincipalIfNotSandboxed method to nsIScriptSecurityManager. r=bz
...
MozReview-Commit-ID: 4QwM1y6wRb
2016-04-28 11:13:09 +01:00
Yoshi Huang
ba1bb72568
Bug 1263496 - Part 3: fix for nsNullPrincipal::Create
...
This fixed the locations listed by
http://searchfox.org/mozilla-central/search?q=nsNullPrincipal::Create (&redirect=true
that needs to inherit origin attributes.
2016-04-27 18:38:07 +08:00
Yoshi Huang
7ae2e09f40
Bug 1263496 - Part 2: fix for NS_NULLPRINCIPAL_CONTRACTID. r=bholley
...
This fixed the locations listed by
http://searchfox.org/mozilla-central/search?q=NS_NULLPRINCIPAL_CONTRACTID&redirect=true
2016-04-27 18:38:03 +08:00
Kris Maglione
6d36833e42
Bug 1254194: Apply a content security policy to all WebExtension documents. r=gabor
...
MozReview-Commit-ID: HsFFbWdq00b
--HG--
extra : rebase_source : 07e4b6ec8c32f696d5b5987091ffc5ebde2c3061
extra : histedit_source : 20983fe6a9590d7f410276fac248c3d2f711caaa
2016-04-23 20:56:56 -07:00
Kris Maglione
623a4f8665
Bug 1254194: [webext] Allow extensions to register custom content security policies. r=billm f=aswan
...
MozReview-Commit-ID: 8L6ZsyDjIpf
--HG--
extra : rebase_source : b6ccbcf849b0e7db835d14a0ba9de588c0188869
extra : histedit_source : 7f966c1d821641fc3551dc4c508f5ce8f990d5a3%2Cafa5697b301620119147292745a2007961907fa8
2016-04-23 21:29:15 -07:00
Kris Maglione
cc1c10dbae
Bug 1254194: Add a validator for custom add-on content security policies. r=billm f=aswan
...
MozReview-Commit-ID: LtBbXBCFc32
--HG--
extra : rebase_source : 1da81c92a1ffb75df071d1b32ff04b7d1a9b905a
2016-04-23 20:41:14 -07:00
Tanvi Vyas
c73e96a53d
Bug 1105556 - Call Create(originAttributes) when loadinfo->loadingPrincipal is null, instead of CreatePrincipalWithInheritedAttributes(). r=sicking
2016-04-13 16:30:22 -07:00
Dave Huseby
c01e63f1a5
Bug 1238177 - fix extension content needs to use the correct user context id origin attribute. r=sicking
...
(HEAD -> oa, refs/patches/oa/Bug_1238177)
Fixes Bug 1238177 -- extension content needs to use the correct user context id origin attribute
2016-04-04 12:20:00 +02:00
Chris Manchester
f7a1b3fb60
Bug 1242051 - Add inter-directory test support file dependencies to ini manifests. r=gps
...
Previously, every test and support file would be synced to the objdir
when running any test. Now that only those support files and tests requested
are synced, we note support files required beyond those in a test's
directory in ini manifests.
MozReview-Commit-ID: EmlDz9d4lqt
2016-04-04 14:56:52 -07:00
Carsten "Tomcat" Book
394034a83e
Backed out changeset 0519406b6e57 (bug 1238177) for eslint test failures
2016-04-03 09:30:03 +02:00
Dave Huseby
32251ddc37
Bug 1238177 - Extension content needs to use the correct user context id origin attribute. r=bholley
...
--HG--
extra : amend_source : f8d3bb6f6b1426ac73669491b651900614f6461c
2016-04-02 13:14:00 -04:00
Dave Huseby
b9cbf42ad8
Bug 1237479 -- nsScriptSecurityManager needs to use the correct user context id in the origin attributes in a few places. r=sicking
2016-04-01 22:36:00 -04:00
Matthew Wein
9c7f3d9e91
Bug 1185773 - Enable the moz-extension mochitest on android. r=kmag
...
MozReview-Commit-ID: ICxmwE1BI8A
--HG--
extra : transplant_source : %9B%BDd%0B%18%EC9Y%09%B9%25k%3F%9924%F2AaW
2016-03-28 10:04:59 -07:00
Benjamin Bouvier
70202e15a1
Bug 1251308; r=luke
...
MozReview-Commit-ID: AqsMX4m7Qh9
--HG--
extra : rebase_source : 519aef2cf8c0bb39771d4589069e8fd1a06970c3
2016-03-09 11:20:11 +01:00
Mike Hommey
fed1d8ce2b
Bug 1254906 - Change the annotation on JSPrincipals::dump's definition to match that of its declaration. r=bz
...
The current discrepancy works because gecko and js don't actually agree
on the meaning of JS_EXPORT_API and JS_PUBLIC_API, but moving the
configure flags that incluences their meaning is going to make them
agree, and that adds a fatal warning when building nsJSPrincipals.cpp
because of the discrepancy.
2016-03-11 09:38:28 +09:00
J. Ryan Stinnett
798c13a0fa
Bug 1238160 - Test frame principal when toggling isolation. r=bz
...
Test frame principals in different configurations to verify the new isolated
attribute works as expected.
MozReview-Commit-ID: CQNRo2bK9iU
2016-03-02 10:35:56 -06:00
J. Ryan Stinnett
95f8000ac8
Bug 1238160 - Add assertions in non-desktop code paths. r=bz,fabrice
...
Several code paths try to ask the principal if it's in a browser element, but
the principal now only knows about *isolated* browser elements. All such code
paths are currently unused on desktop. The frame loader now asserts that
isolation remains enabled for cases where apps are used.
MozReview-Commit-ID: 775DZecc35t
2016-03-02 10:35:56 -06:00
J. Ryan Stinnett
2a55d065b7
Bug 1238160 - Rename OriginAttributes.mInBrowser and associated methods. r=bz,mayhemer
...
This change renames OriginAttributes.mInBrowser to mInIsolatedMozBrowser and
nsIPrincipal::GetIsInBrowserElement to GetIsInIsolatedMozBrowserElement. Other
methods that pass these values around also have name changes.
Tokens such as "inBrowser" have previously been serialized into cache keys, used
as DB column names, stored in app registries, etc. No changes are made to any
serialization formats. Only runtime method and variable names are updated.
No behavior changes are made in this patch, so some renamed methods may have
nonsensical implementations. These are corrected in subsequent patches
focused on behavior.
MozReview-Commit-ID: 66HfMlsXFLs
2016-03-02 10:35:56 -06:00
Dave Huseby
4fdeeb7cf9
Bug 1229222 - tests for bug 1229222. r=sicking
...
(HEAD -> oa, refs/patches/oa/Bug_1229222_Tests)
Tests Bug 1229222
--HG--
extra : rebase_source : baf12ec8819e0e82b7d6f7cf4975636172d98eb6
2016-02-29 12:27:00 +01:00
Dave Huseby
0c0cf070cf
Bug 1229222 - add chromeutils for the creation of origin attributes with the correct default values. r=sicking
...
(HEAD -> oa, refs/patches/oa/Bug_1229222)
Fixes Bug 1229222
--HG--
extra : rebase_source : 299742335452d5b5ac3cf25a3bd2d71ec655049f
2016-02-29 12:26:00 +01:00
Boris Zbarsky
87574e4920
Bug 1251311. JS::DescribeScriptedCaller can't throw JS exceptions. Adjust some callers accordingly. r=khuey
2016-02-26 15:23:13 -05:00
Carsten "Tomcat" Book
9164177faa
Backed out changeset 736daf4b4a56 (bug 1229222) for bc6 test failures in browser_339445.js
2016-02-19 15:56:27 +01:00
Dave Huseby
4f029016db
Bug 1229222 - tests bug 1229222. r=sicking
...
(HEAD -> oa, refs/patches/oa/Bug_1229222_Tests)
Tests Bug 1229222
2016-02-17 12:19:00 +01:00
Bill McCloskey
d70c91802b
Bug 1210099 - Fix structured clone of expanded principal (r=bholley)
2016-02-04 22:30:21 -08:00
Yoshi Huang
be5bd39145
Bug 1240651 - Annotate addonId into crash report (r=bholley)
2016-02-01 16:05:53 -08:00
Gijs Kruitbosch
ef04fd0f90
Bug 1172165 - check all nested URI schemes in CAPS. Make view-source dangerous to load, and about: URIs use per-URI flags so they keep working, r=bz
...
Also, add an opt-out for crashtest/reftest for the view-source thing so they don't all break, r=bz
--HG--
extra : commitid : 8NqvmbphSgh
extra : rebase_source : bbe0b6f11a77d7e6241a5733931d9baa95bb3fed
2015-12-11 08:06:41 -05:00
Henry Chang
b02a011eef
Bug 1211590 - Inherits OriginAttributes from loading principal for GetChannelURIPrincipal. r=sicking
2016-01-13 05:30:00 +01:00
Luke Wagner
72ea23c63e
Bug 1239601 - improve the UniquePtr situation (r=jandem)
...
--HG--
extra : commitid : JegWAoGsuQ9
extra : rebase_source : 995c1b6ab8e4fd3b83c44741cd84a2d7b0d934d7
2016-01-15 18:26:20 -06:00
Christoph Kerschbaumer
fecee7be59
Bug 1224694 - Unify and clean up initialization of CSP (r=sicking)
2016-01-14 13:21:31 -08:00
Nigel Babu
ccbf22eae8
Backed out changeset f001a01c85d7 (bug 1224694) for browser-chrome bustage on a CLOSED TREE
...
--HG--
extra : commitid : 5BUjoFsY8bv
2016-01-14 08:04:50 +05:30
Christoph Kerschbaumer
86457169b6
Bug 1224694 - Unify and clean up initialization of CSP (r=sicking)
2016-01-13 15:51:30 -08:00
Blake Kaplan
5749c2ed94
Bug 1237141 - Make this test pass in e10s. r=felipe
...
--HG--
extra : rebase_source : e9aad0388bea8401c08f137357ca10720622bc05
2016-01-07 10:28:27 -08:00
Andrea Marchesini
a365470b87
Bug 1235657 - Session storage needs to handle origin attributes correctly - part 1 - createOriginAttributesWithUserContextId, r=huseby
2016-01-06 10:08:30 +00:00
Honza Bambas
a0a6f7e23c
Bug 1165214 - Use OriginAttributes in DOM Storage. r=smaug, r=bholley
...
--HG--
extra : rebase_source : b63ddb5a24a335f771a856cd20c69cdeb0c92ca0
2016-01-05 07:25:00 -05:00
Jonas Sicking
6cc5074df0
Bug 1226909 part 1: Do security checks in a redirect handler rather than when opening the redirected channel. r=ckerschb
2015-12-06 18:33:14 -05:00
Sebastian Hengst
774236075d
Backed out changeset 09d64535bcda (bug 1216687), a7f1a289dd78, 4dbf06183e6c, 26318a5e3006, 9ae2af3cf86d (bug 1226909) for M(1,2,5) oranges. r=backout
2015-12-05 16:34:47 +01:00
Jonas Sicking
df33e62850
Bug 1226909 part 1: Do security checks in a redirect handler rather than when opening the redirected channel. r=ckerschb
2015-12-05 01:46:20 -08:00
Yoshi Huang
4b500464f5
Bug 1209162 - Create OriginAttributes subtypes. IGNORE IDL r=sicking.
2015-11-03 09:50:54 +08:00
Christoph Kerschbaumer
b967444f19
Bug 663570 - MetaCSP Part 2: Principal changes (r=bz)
2015-11-14 19:28:23 -08:00
Christoph Kerschbaumer
a876eba5c9
Bug 1188028 - Use channel->ascynOpen2 in dom/security/nsCSPContext.cpp (r=sicking)
2015-07-27 11:57:56 -07:00
Gijs Kruitbosch
f1d4d15e39
Bug 1210703 - followup: fix test file used in caps and fix assertions to have actual/expected value in the right order, rs=bustage on a CLOSED TREE
...
--HG--
extra : commitid : 29mAEwGdSuM
2015-11-09 19:10:23 +00:00
Jan de Mooij
a84c33ecb0
Bug 1125423 part 1 - Attach WindowProxies to globals instead of using innerObject/outerObject hooks. r=bz,luke
2015-11-06 19:03:51 +01:00
Jonathan Watt
8c3ca7675f
Bug 1220602 - Make the documentation for nsIPrincipal.domain useful. r=bholley IGNORE IDL
2015-09-24 00:36:04 +01:00
Birunthan Mohanathas
9985829ecc
Bug 1219392 - Capitalize mozilla::unused to avoid conflicts. r=froydnj
2015-11-02 07:53:26 +02:00
Bobby Holley
86c97bb3f4
Bug 1218039 - Add a nice interface for both C++ and JS to access the principal kind. r=gabor
2015-10-26 11:18:14 -07:00
Nathan Froyd
01583602a9
Bug 1207245 - part 6 - rename nsRefPtr<T> to RefPtr<T>; r=ehsan; a=Tomcat
...
The bulk of this commit was generated with a script, executed at the top
level of a typical source code checkout. The only non-machine-generated
part was modifying MFBT's moz.build to reflect the new naming.
CLOSED TREE makes big refactorings like this a piece of cake.
# The main substitution.
find . -name '*.cpp' -o -name '*.cc' -o -name '*.h' -o -name '*.mm' -o -name '*.idl'| \
xargs perl -p -i -e '
s/nsRefPtr\.h/RefPtr\.h/g; # handle includes
s/nsRefPtr ?</RefPtr</g; # handle declarations and variables
'
# Handle a special friend declaration in gfx/layers/AtomicRefCountedWithFinalize.h.
perl -p -i -e 's/::nsRefPtr;/::RefPtr;/' gfx/layers/AtomicRefCountedWithFinalize.h
# Handle nsRefPtr.h itself, a couple places that define constructors
# from nsRefPtr, and code generators specially. We do this here, rather
# than indiscriminantly s/nsRefPtr/RefPtr/, because that would rename
# things like nsRefPtrHashtable.
perl -p -i -e 's/nsRefPtr/RefPtr/g' \
mfbt/nsRefPtr.h \
xpcom/glue/nsCOMPtr.h \
xpcom/base/OwningNonNull.h \
ipc/ipdl/ipdl/lower.py \
ipc/ipdl/ipdl/builtin.py \
dom/bindings/Codegen.py \
python/lldbutils/lldbutils/utils.py
# In our indiscriminate substitution above, we renamed
# nsRefPtrGetterAddRefs, the class behind getter_AddRefs. Fix that up.
find . -name '*.cpp' -o -name '*.h' -o -name '*.idl' | \
xargs perl -p -i -e 's/nsRefPtrGetterAddRefs/RefPtrGetterAddRefs/g'
if [ -d .git ]; then
git mv mfbt/nsRefPtr.h mfbt/RefPtr.h
else
hg mv mfbt/nsRefPtr.h mfbt/RefPtr.h
fi
--HG--
rename : mfbt/nsRefPtr.h => mfbt/RefPtr.h
2015-10-18 01:24:48 -04:00
Yoshi Huang
fb57af4ae6
Bug 1191653 - Listen to clear-origin-data in nsPermissionManager. r=bholley
2015-10-13 10:27:42 +08:00
Wes Kocher
5dc7315e7b
Merge b2ginbound to central, a=merge
2015-10-07 11:04:26 -07:00
Carsten "Tomcat" Book
08997000eb
Backed out 2 changesets (bug 1202902
) to recking bug 1202902
to be able to reopen inbound on a CLOSED TREE
...
Backed out changeset 647025383676 (bug 1202902
)
Backed out changeset d70c7fe532c6 (bug 1202902
)
2015-10-07 14:03:21 +02:00
Carsten "Tomcat" Book
e7ef778c9d
Backed out 1 changesets (bug 1202902
) for causing merge conflicts to mozilla-central
...
Backed out changeset cfc1820361f5 (bug 1202902
)
--HG--
extra : rebase_source : 5d3db72337754bc7ab0ed0c30b2896100411ff92
2015-10-07 12:13:45 +02:00
Shu-yu Guo
d06b6030f6
Bug 1202902
- Scripted fix the world.
2015-10-06 14:00:31 -07:00
Yoshi Huang
02f27f9218
Bug 1211636 - use ToInteger64 in PopulateFromSuffix. r=bholley
...
From 76c9c3f887d6bce8b15abd37d5921887a187e18d Mon Sep 17 00:00:00 2001
---
caps/BasePrincipal.cpp | 16 ++++++-------
caps/moz.build | 3 +++
caps/tests/gtest/TestOriginAttributes.cpp | 37 +++++++++++++++++++++++++++++++
caps/tests/gtest/moz.build | 13 +++++++++++
4 files changed, 61 insertions(+), 8 deletions(-)
create mode 100644 caps/tests/gtest/TestOriginAttributes.cpp
create mode 100644 caps/tests/gtest/moz.build
2015-10-06 15:36:10 +08:00
Nick Fitzgerald
ee543a3018
Bug 1209263 - Allow embedders to tell SpiderMonkey how to structured clone principals; r=bz
...
--HG--
extra : rebase_source : 04835c034431953344e83203e7753043461474ba
2015-10-02 16:44:00 +02:00
Bobby Holley
073c406ca3
Bug 1208756 - Tests. r=billm
2015-10-02 15:02:09 -07:00
Bobby Holley
75a560dba5
Bug 1208756 - Introduce URI_FETCHABLE_BY_ANYONE and use it for moz-extension. r=bz
...
This matches the behavior described in
https://developer.chrome.com/extensions/manifest/web_accessible_resources
2015-10-02 15:02:07 -07:00
Bobby Holley
dca7589731
Bug 1208756 - Hoist shared CheckMayLoad logic into BasePrincipal. r=bz
...
This is a pure refactoring.
2015-10-02 14:59:45 -07:00
Yoshi Huang
f97211a451
Bug 1167100 - User originAttribute in ContentPrincipalInfo. r=bholley
2015-09-23 18:19:06 +08:00
Bobby Holley
ca4a8095de
Bug 1209843 - Stop checking for UNKNOWN_APP_ID in all places except those where AppId() is explicitly queried. r=sicking
2015-09-30 16:29:36 -07:00
Stephanie Ouillon
5e14a3b3a8
Bug 1178533 - Add nsIInstallPackagedWebapp for registering permissions when navigating to signed packages r=bholley,fabrice,valentin
2015-08-26 13:12:13 +02:00
Wes Kocher
df21b43278
Backed out changeset d0e88c95f3c5 (bug 1167100) for crashes a=backout
2015-09-29 10:25:20 -07:00
Yoshi Huang
872722fe37
Bug 1167100 - User nsIPrincipal.originAttribute in ContentPrincipalInfo. r=bholley
2015-09-23 18:19:06 +08:00
Yoshi Huang
d38b78ae54
Bug 1165466 - Fix up docshell and loadcontext inheriting code in nsIScriptSecurityManager. r=bholley
2015-09-23 16:10:21 +08:00
Henry Chang
b6b5862949
Bug 1163254 - Add signedPkg to OriginAttributes. r=bholley
2015-09-18 15:11:58 +08:00
Bobby Holley
43144ea83c
Bug 1205456 - Check for UNKNOWN_APP_ID when serializing principals. r=sicking
2015-09-18 16:20:06 -07:00
Andrew McCreight
dd7dd30236
Bug 1204610 - Use a smart pointer in nsNullPrincipalURI. r=mrbkap
2015-09-14 12:43:00 +02:00
Carsten "Tomcat" Book
c5551bace9
Backed out 2 changesets (bug 1169633, bug 1163254) for linux Mn-e10s test bustage on a CLOSED TREE
...
Backed out changeset 47ccf6689101 (bug 1169633)
Backed out changeset 503eab197a2d (bug 1163254)
2015-09-17 16:01:25 +02:00
hchang
2e884ff477
Bug 1163254 - Add signedPkg to OriginAttributes. r=bholley
2015-09-16 19:42:00 +02:00
Nicholas Nethercote
f44287005f
Bug 1198334 (part 1) - Replace the opt-in FAIL_ON_WARNINGS with the opt-out ALLOW_COMPILER_WARNINGS. r=glandium.
...
The patch removes 455 occurrences of FAIL_ON_WARNINGS from moz.build files, and
adds 78 instances of ALLOW_COMPILER_WARNINGS. About half of those 78 are in
code we control and which should be removable with a little effort.
--HG--
extra : rebase_source : 82e3387abfbd5f1471e953961d301d3d97ed2973
2015-08-27 20:44:53 -07:00
Yoshi Huang
e6070e9062
Bug 1165272 - Part 2: replace getNoAppCodebasePrincipal. r=bholley
2015-08-18 15:01:42 +08:00
Yoshi Huang
4347bb2318
Bug 1165272 - Part 1: remove getAppCodebasePrincipal. r=bholley
2015-08-17 17:03:19 +08:00
Bobby Holley
edfe287f26
Backed out 3 changesets (bug 1165272) for b2g sanity blocker.
2015-08-25 11:16:21 -07:00
Ryan VanderMeulen
1d04070e5b
Merge fx-team to m-c. a=merge
2015-08-24 20:57:36 -04:00
Dave Townsend
cbedcf3b95
Bug 1042699: Block cross-origin add-on install requests. r=dveditz
...
--HG--
extra : commitid : FdVvNum7B1w
extra : rebase_source : db8d8aff572798f35b80e20feb6aaaa9094cf79c
extra : amend_source : 14e54c9a677784e9f520a454ee579208f8385384
2015-08-18 17:21:05 -07:00
Yoshi Huang
de47f4b89f
Bug 1165272 - Part 2: Replace getNoAppCodebasePrincipal. r=bholley
2015-08-24 01:18:00 -04:00
Yoshi Huang
12efacfa8c
Bug 1165272 - Part 1: Remove getAppCodebasePrincipal. r=bholley
2015-08-24 01:31:00 -04:00
Bobby Holley
ce93138568
Bug 1196371 - Add a runtime assertion against illegal string characters in OriginAttributes suffix creation. r=janv,r=mystor
2015-08-19 21:14:34 -07:00
Wes Kocher
dab7b8a1ea
Backed out changeset f00b7bf7b9f8 (bug 1196371) for build bustage CLOSED TREE
2015-08-19 15:49:30 -07:00
Bobby Holley
36e1d5fccf
Bug 1196371 - Add a runtime assertion against illegal string characters in OriginAttributes suffix creation. r=janv,r=mystor
2015-08-19 14:51:58 -07:00
Michael Layzell
945c9a35f4
Bug 1195415 - Add asciiHostPort field to nsIURI, and use it in the implementation of nsPrincipal::GetOriginForURI, r=bholley
2015-08-18 14:52:24 -04:00
Michael Layzell
274d644ee1
Bug 1192666 - Emit '[]' around origin strings for ipv6 origins, r=ehsan
2015-08-11 15:09:52 -04:00
Bobby Holley
a281e74201
Bug 1184387 - Bail out of file:// loads for all non-chrome:// URIs. r=Gijs
2015-08-06 16:37:00 -07:00
Ryan VanderMeulen
f2cc7352a6
Backed out changesets f4fa8c49ebc6 and 78e2ba8842d4 (bug 1184387) for browser_parsable_css.js failures.
...
CLOSED TREE
2015-08-05 14:39:28 -04:00
Bobby Holley
82a19a631c
Bug 1184387 - Bail out of file:// loads for all non-chrome:// URIs. r=Gijs
2015-08-05 10:43:22 -07:00
Steven Englehardt
754fd36b97
Bug 1179557 - Add getters for userContextId. r=bholley, r=tanvi
...
--HG--
extra : histedit_source : 29a5fb5f2a3204d27d0f620d6f3c03e134699fb9
2015-07-30 14:15:00 -04:00
Steven Englehardt
9d4063da89
Bug 1179557 - Add userContextId to originAttributes with tests. r=bholley, r=tanvi
...
--HG--
extra : histedit_source : 4d033ad9aef7b71c7ebbbe77242c94e9b8e94f0c
2015-07-28 17:32:00 -04:00
Bobby Holley
5da44c2396
Bug 1186732 - Implement an about:blank page inside of moz-extension. r=billm
2015-07-28 17:18:05 -07:00