Commit Graph

339 Commits

Author SHA1 Message Date
Shih-Chiang Chien
1dc6ed1ca3 Bug 1334068 - proxy release main-thread-only references in nsHttpChannel and HttpBaseChannel. r=mayhemer
MozReview-Commit-ID: 9lojerCPhSb
2017-02-07 10:37:11 +08:00
Arthur Edelstein
21a0386b7c Bug 1305144 - Option to hide referrer when leaving a .onion domain. r=mcmanus
The boolean pref is named "network.http.referer.hideOnionSource"
2017-02-02 23:47:00 -05:00
Tom Tung
c08930401f Bug 1220936 - Flush console report to innerWindowID by using nsIDocument and nsILoadGroup. r=bkelly. 2017-02-06 09:19:34 +08:00
Kris Maglione
18ea150db3 Bug 1305162: Part 1a - Separate nsIMIMEInputStream headers from stream data. r=dragana
MozReview-Commit-ID: F1qZCBWUNRG
2017-01-20 15:43:07 -08:00
Boris Zbarsky
f99ca7dba3 Bug 1328761 part 1. Correctly propagate the Content-Type request header during redirects, for cases when it's _not_ set. r=dragana 2017-01-14 22:43:17 -05:00
Andrea Marchesini
46a9207d60 Bug 1328653 - Merging all the various *OriginAttributes to just one, r=huseby 2017-01-12 17:38:48 +01:00
Thomas Nguyen
94dbf97a10 Bug 1329065 - Check the correct policy when setting referrer header. r=mcmanus
MozReview-Commit-ID: JG5DVBqGczS
2017-01-06 11:26:24 +08:00
Thomas Nguyen
20c9180890 Bug 1304623 - Create a pref to control the default referrer policy- part 2. r=mcmanus, r=bkelly
MozReview-Commit-ID: GEUDZ8UZAT5
2017-01-05 11:30:03 +08:00
Ehsan Akhgari
337e003709 Bug 1170190 - Part 2: Add the nsIHttpChannel::IsTrackingResource() API to query the channel's tracking annotation; r=mayhemer 2016-12-23 14:40:11 -05:00
Honza Bambas
8a9271d13f Bug 1312243 - Block authentication dialog pop-ups by cancling 3 of them in a row, r=Dolske+mcmanus 2016-12-16 03:42:00 +01:00
Honza Bambas
a7b59f7374 Bug 1318759 - Properly query final class in HttpChannelParent::OnStartRequest to prevent evil static_cast, r=jduell 2016-12-09 05:52:00 +01:00
Honza Bambas
29b605de07 Bug 1319606 - Prevent nsStreamListenerWrapper instance w/o mListener. r=jduell 2016-12-09 06:28:00 -05:00
Patrick McManus
1889ab84d2 Bug 1321783 - Make updater be networking conservative r=dkeeler r=rstrong r=dragana 2016-12-02 16:49:23 -05:00
Yoshi Huang
955e9c647b Bug 1315602 - Remove the assertion of FirstPartyDomain should be empty in HTTP redirect. r=smaug 2016-12-01 15:49:07 +08:00
Ehsan Akhgari
5980492397 Bug 1318888 - Remove a few other mentions of appId's from Necko; r=mcmanus 2016-11-21 15:00:49 -05:00
Ehsan Akhgari
048cb69b68 Bug 1319118 - Don't clobber half of a 64-bit window ID by assigning it to a 32-bit variable; r=mcmanus
This is the textbook use case for the auto keyword. :)
2016-11-21 13:33:13 -05:00
Thomas Nguyen
5e424350fb Bug 1264792 - Update request'referrer policy when redirect.r=bkelly,dragana.
MozReview-Commit-ID: 3V6W0fuRomZ
2016-11-14 15:15:32 +08:00
Iris Hsiao
306897f2e0 Backed out changeset a0f243dead30 (bug 1301649) for developers' request 2016-10-20 15:24:50 +08:00
Carsten "Tomcat" Book
62c84c7131 Merge mozilla-central to mozilla-inbound 2016-10-13 11:58:40 +02:00
Tim Huang
91e4a3505d Bug 1277803 - Part 4 : Make the NS_CompareLoadInfoAndLoadContext() skiping test if the request is the favicon loading from the XUL image. r=honzab 2016-10-13 15:43:59 +08:00
Francois Marier
856df88207 Bug 1307596 - Add a preference for trimming third-party referrers. r=dragana
MozReview-Commit-ID: EL2L4yMnwAi
2016-10-05 16:36:16 -07:00
Francois Marier
e839512a3b Bug 1308725 - Remove network.http.sendSecureXSiteReferrer pref. r=dragana
MozReview-Commit-ID: LQgxMijXIaF
2016-10-08 12:06:03 -07:00
Wes Kocher
85edded572 Backed out 8 changesets (bug 1277803) for browser-chrome test failures a=backout
Backed out changeset 477890efdb88 (bug 1277803)
Backed out changeset 49da326bfe68 (bug 1277803)
Backed out changeset 2d17a40a9077 (bug 1277803)
Backed out changeset b1cb0a195ca1 (bug 1277803)
Backed out changeset c7d82459d152 (bug 1277803)
Backed out changeset 3be9a06248af (bug 1277803)
Backed out changeset 8d119ca96999 (bug 1277803)
Backed out changeset be767a6f7ecd (bug 1277803)
2016-10-12 14:26:00 -07:00
Tim Huang
b35f331a1c Bug 1277803 - Part 4 : Make the NS_CompareLoadInfoAndLoadContext() skiping test if the request is the favicon loading from the XUL image. r=honzab 2016-10-12 17:32:08 +08:00
Yoshi Huang
37e58688fe Bug 1301649 - nits for bug 1260931. r=smaug
- use MOZ_ASSERT_IF
- always call inherit function
2016-10-07 17:42:03 +08:00
Iris Hsiao
170b342938 Backed out changeset d17370e68325 (bug 1277803)
CLOSED TREE
2016-10-07 11:23:45 +08:00
Tim Huang
75440673ae Bug 1277803 - Part 4: Make the NS_CompareLoadInfoAndLoadContext() skiping test if the request is the favicon loading from the XUL image. r=honzab 2016-10-06 00:57:00 -04:00
Carsten "Tomcat" Book
d3896c257f merge mozilla-inbound to mozilla-central a=merge 2016-09-28 15:56:33 +02:00
Francois Marier
228144b30d Bug 1302938 - Explain why user referrer trimming policy can be overriden. r=dragana
MozReview-Commit-ID: GfmeIu2WEGX
2016-09-27 13:25:35 -07:00
Thomas Nguyen
d340fe6c90 Bug 1276836 - Implement same-origin, strict-origin, strict-origin-when-cross-origin referrer policy. r=mcmanus,jdm
MozReview-Commit-ID: 39AFT4RgHpl
2016-09-22 16:27:42 -07:00
Valentin Gosu
02eefbf4c3 Bug 1231565 - (Part 2) Allow storing alternate data in the HTTP cache r=honzab
* Add PAltDataOutputStream.ipdl to be able to open an OutputStream to the cache entry in the child process
* AltDataOutputStreamChild/Parent are Main Thread only for now.
* Adds methods for reading and writing alt-data to nsICacheInfoChannel.idl
* Keep a ref of the cache entry after OnStopRequest in case the consumer tries to open the alt-data output stream

MozReview-Commit-ID: jlraDI97Hg
2016-04-11 05:17:02 +02:00
amy
71cd1152bf Bug 1013635 - Removed the dispatch and call the notification service directly in HttpBaseChannel.cpp where this noticiation emits, r=honzab 2016-09-20 15:54:52 +08:00
Nicholas Nethercote
7b5df070f0 Bug 1297300 - Add missing checks to GetSpec() calls in netwerk/. r=hurley,dragana. 2016-08-26 16:40:57 +10:00
Tom Tung
aedb197f83 Bug 1187335 - P4 - Integrate fetch and cache with SRI & add nsIConsoleReportCollector to show console report. r=bkelly. 2016-09-07 10:20:23 +08:00
Tom Tung
1f61d7f9c3 Bug 1187335 - P1 - Add a way to report error to all clients for ServiceWorker and SharedWorker. r=bkelly. 2016-05-23 14:56:46 +08:00
Yoshi Huang
1389d96b20 Bug 1260931 - Part 4: update OriginAttributes when http redirect. r=smaug 2016-09-06 10:26:03 +08:00
Sebastian Hengst
41600c79cd Backed out changeset 9efc0a2bb306 (bug 1260931) 2016-09-05 21:15:25 +02:00
Yoshi Huang
c8329979cd Bug 1260931 - Part 4: update OriginAttributes when http redirect. r=smaug 2016-09-06 01:50:37 +08:00
Ryan VanderMeulen
0a34dacb49 Merge m-c to fx-team. a=merge 2016-08-23 10:11:52 -04:00
Ryan VanderMeulen
faf402f266 Merge inbound to m-c. a=merge 2016-08-23 10:05:18 -04:00
Tom Tromey
0a859c7b10 Bug 1244227 - Add nsIThrottledInputChannel.idl and implement. r=mcmanus
MozReview-Commit-ID: JVIjxEO901W
2016-08-23 07:36:52 -06:00
Wes Kocher
c9c496797e Backed out changeset e1f3ed984607 (bug 1261585) for causing bug 1292586 a=backout 2016-08-22 11:29:04 -07:00
Jonathan Hao
2e79af2e0a Bug 1283319 - Tests for connection info's hash key. r=mayhemer 2016-08-17 19:57:00 -04:00
Yoshi Huang
932b2340e4 Bug 1292450 - Check mPrivateBrowsingId is correct in LoadInfo and LoadContext. r=smaug, ehsan
Make sure the mPrivateBrowsingId of Origin Attributes is consistent
between LoadInfo and LoadContext.

For chrome docshell, its mPrivateBrowsingId remains 0 even if its
UserPrivateBrowsing() is true (bug 1278664). So we sync the
mPrivateBrowsingId field in LoadInfo in the same way.
2016-08-15 19:03:24 +08:00
Nicholas Nethercote
0550795f93 Bug 1293117 (part 4) - Change many NS_IMETHODIMP occurrences to NS_IMETHOD. r=froydnj.
This patch makes the following changes on many in-class methods.

- NS_IMETHODIMP F() override;      --> NS_IMETHOD F() override;
- NS_IMETHODIMP F() override {...} --> NS_IMETHOD F() override {...}
- NS_IMETHODIMP F() final;         --> NS_IMETHOD F() final;
- NS_IMETHODIMP F() final {...}    --> NS_IMETHOD F() final {...}

Using NS_IMETHOD is the preferred way of marking in-class virtual methods.
Although these transformations add an explicit |virtual|, they are safe --
there's an implicit |virtual| anyway because |override| and |final| only work
with virtual methods.
2016-08-08 10:54:47 +10:00
Nicholas Nethercote
1f65390cc9 Bug 1293603 (part 2) - Make Run() declarations consistent. r=erahm.
This patch makes most Run() declarations in subclasses of nsIRunnable have the
same form: |NS_IMETHOD Run() override|.

As a result of these changes, I had to add |override| to a couple of other
functions to satisfy clang's -Winconsistent-missing-override warning.
2016-08-08 12:18:10 +10:00
Honza Bambas
c6abaec94e Bug 1171203 - Fix redirection limit underflow, don't count internal redirect to this limit, r=mcmanus 2016-08-01 04:12:00 +02:00
5beed3083d Bug 1261585 - Make nsITraceableChannel listener work with content encoding.r=jduell 2016-07-19 05:05:00 +02:00
Andrew Sutherland
d360897f50 Bug 1274250 - Referrer host should be IDN encoded when trimmed by policy. r=valentin
Since bug 822869 the referrer trimming has relied on using prePath when
trimming resulting in non-ASCII hosts being passed through in UTF-8 (or
whatever their encoding was.)

Prior to this patch, the logic when trimming was to generate the referrer
string using prePath and possibly nsIURL.filePath, then re-derive the
nsIURI from that string.

Concerned about the cost of introducing asciiPrePath just for this consumer,
I opted to have the code just combine the scheme and asciiHostPort to
approximate the prior use of prePath.  (userPass is explicitly cleared by
the code.)

Concerned about weirdness/loss of fidelity in the nsIURI, I replaced the
code that re-derived the URI from the spec string with manual clearing
of the parts of the URI/URL we were not including.  This may not be the
right thing to do.

I modified the existing Gecko-specific test coverage of SetReferrerPolicy.
The existing web platform tests and referrer policy didn't seem concerned
with this case, and the bug is indeed localized to a very small segment
of Gecko code.  Note that the userReferrerTrimmingPolicy=1 bug case can
only be triggered by explicit user preference setting and this is only
tested in test_referrer.js.  userReferrerTrimmingPolicy=2 need not be
set by preference if REFERRER_POLICY_ORIGIN or
REFERRER_POLICY_ORIGIN_WHEN_XORIGIN (when cross origin) is used.
2016-07-13 11:08:53 -04:00
Thomas Wisniewski
e9b4657969 Bug 1207233 - Part 1: Allow not sending a Content-Type header, or sending a blank string for it, and have XMLHttpRequest.setRequestHeader honor those possibilities. r=dragana 2016-07-11 14:27:36 -04:00