gecko-dev/dom/security
Nathan Froyd 1e6cdad33c Bug 1153988 - create nsNullPrincipals directly, rather than going through do_CreateInstance; r=smaug
There's a better way to create null principals than
do_CreateInstance("@mozilla.org/nullprincipal;1").  Let's do that and
save ourselves some XPCOM overhead.
2015-04-13 14:47:41 -04:00
..
moz.build Backed out 4 changesets (bug 1117650) because moving tests causes WebRTC tests to move from running first in a linux64 debug mochitest-e10s chunk to running last in another chunk, and they fail if they run last in a chunk 2015-01-20 22:48:32 -08:00
nsCORSListenerProxy.cpp Bug 1153988 - create nsNullPrincipals directly, rather than going through do_CreateInstance; r=smaug 2015-04-13 14:47:41 -04:00
nsCORSListenerProxy.h Bug 1147695 - Enable interception of beacons through service workers; r=nsm 2015-03-28 16:28:37 -04:00
nsCSPContext.cpp Bug 1153988 - create nsNullPrincipals directly, rather than going through do_CreateInstance; r=smaug 2015-04-13 14:47:41 -04:00
nsCSPContext.h Bug 1147996 - Enable interception of CSP reports through service workers; r=nsm 2015-03-28 16:28:40 -04:00
nsCSPParser.cpp Bug 1004703 - ignore 'unsafe-inline' if nonce- or hash-source specified (r=sstamm) 2015-04-07 09:06:05 -07:00
nsCSPParser.h Bug 1004703 - ignore 'unsafe-inline' if nonce- or hash-source specified (r=sstamm) 2015-04-07 09:06:05 -07:00
nsCSPService.cpp Bug 1086999 - CSP: Asterisk (*) wildcard should not allow blob:, data:, or filesystem: when matching source expressions (r=fabrice,pauljt) 2015-03-25 15:54:13 -07:00
nsCSPService.h
nsCSPUtils.cpp Bug 1004703 - ignore 'unsafe-inline' if nonce- or hash-source specified (r=sstamm) 2015-04-07 09:06:05 -07:00
nsCSPUtils.h Bug 1004703 - ignore 'unsafe-inline' if nonce- or hash-source specified (r=sstamm) 2015-04-07 09:06:05 -07:00
nsMixedContentBlocker.cpp Bug 1148732 - When checking a document's scheme, check the innermost uri. r=dveditz, smaug 2015-04-15 10:18:27 -07:00
nsMixedContentBlocker.h Bug 1082837 - Call content policies on cached image redirects in imgLoader::ValidateSecurityInfo. Content policies check the last hop (final uri) of the cached image. For Mixed Content Blocker, we do an additional check to see if any of the intermediary hops went through an insecure redirect. r=smaug, feedback=seth 2015-03-24 09:18:48 -07:00