Commit Graph

150 Commits

Author SHA1 Message Date
Thomas Nguyen
8733d0e208 Bug 1351146 - P1 - Add more information to redirect chains. r=dragana
In order to provide more details context of how client arrived at the unsafe
page, particularly in redirect case, we may have to add more information to
redirect chains including:
- referrer (if any)
- remote address.
- URL

We may want to use an idl interface instead of nsIPrincipal to store these
information

MozReview-Commit-ID: 3Uh4r06w60C
2017-05-25 19:42:00 +02:00
Honza Bambas
00cefdc449 Backout of 7f28c1084c47 (bug 1319111) for security checks breakage, r=me 2017-05-25 18:16:02 +02:00
Honza Bambas
0487f42c85 Bug 1319111 - Expose 'result principal URI' on LoadInfo as a source for NS_GetFinalChannelURI (removes some use of LOAD_REPLACE flag). r=bz 2017-05-23 08:09:00 -04:00
Edouard Oger
1b5c435fa2 Bug 1365273 - Remove about:sync-tabs. r=markh
MozReview-Commit-ID: HFsc4xf8N3a
2017-05-17 11:39:22 -04:00
Sebastian Hengst
76a4246fc4 Backed out changeset b8d0fdf79562 (bug 1365273) for build bustage: Unused pattern 'sync/**' in browser/base/content/moz.build and unreferenced files detected by browser_all_files_referenced.js. r=backout 2017-05-18 19:09:55 +02:00
Edouard Oger
5f064d11bd Bug 1365273 - Remove about:sync-tabs. r=markh
MozReview-Commit-ID: HFsc4xf8N3a
2017-05-17 11:39:22 -04:00
Honza Bambas
f3b5a77a73 backout of f9abb9c83452 (bug 1319111) for crashes, r=bz 2017-05-13 13:55:11 +02:00
Wes Kocher
7b49a483cc Backed out changeset 95ff98f1c2e5 (bug 1319111) for talos failures a=backout
MozReview-Commit-ID: Gs09moFm5rQ
2017-05-12 18:24:42 -07:00
Honza Bambas
b05b600614 backout of f9abb9c83452 (bug 1319111) for crashes, r=bz 2017-05-12 22:13:49 +02:00
Kershaw Chang
641c6c9fc4 Bug 1352176 - Part1: Pass a labeled event target when initializing nsInputStreamPump, r=mayhemer
Since the mTargetThread in nsInputStreamPump is directly acquired from current or main thread, we need to pass another labeled main thread target to dispatch runnables to the correct tab/doc group.
2017-05-09 19:59:00 +02:00
Ehsan Akhgari
77bfd1ce32 Bug 1362806 - Optimize NS_GetDefaultPort() for HTTP(S); r=mcmanus 2017-05-07 22:34:02 -04:00
Honza Bambas
e8227e774f Bug 1319111 - Expose URI to make security check against on LoadInfo (no LOAD_REPLACE flag). r=bz 2017-01-27 19:10:01 +01:00
Yoshi Huang
053c2d92fc Bug 1284579 - Part 2: revise NS_ShouldCheckAppCache. r=valentin
There's one redudant NS_ShouldCheckAppCache(nsIURI*, bool) is not used
anymore. Also we remove the extra usePrivateBrowsing argument, since we
can get this information from nsIPrincipal.
2017-05-04 09:40:00 +08:00
Yoshi Huang
4774044bdc Bug 1284579 - Part 1:revise NS_UsePrivateBrowsing to get PB from origin attributes. r=valentin 2017-05-04 09:39:17 +08:00
Andi-Bogdan Postelnicu
ae2dcd9fb5 Bug 1359369 - prevent null pointer dereference in NS_GetIsDocumentChannel. r=valentin
MozReview-Commit-ID: I1iu2miXmjZ
2017-04-25 14:38:03 +03:00
Valentin Gosu
7e8ca8ee92 Bug 1354349 - Add nsIChannel.isDocument that checks if LOAD_DOCUMENT_URI is set, or if LOAD_HTML_OBJECT_DATA and the channel has the appropriate MIME type r=mcmanus,mystor
MozReview-Commit-ID: K28Opd9JTr2
2017-04-20 10:15:06 +08:00
Tom Tung
59db06337a Bug 1330297 - Part 1: Strip leading or trailing HTTP whitespace for Header value to follow the spec and share code bewteen fetch and XHR. r=baku 2017-04-10 16:15:29 +08:00
Kershaw Chang
fcebe82139 Bug 1309653 - Part1: Add new API for updating current top level outer content windowId - v2, r=honzab 2017-03-10 01:32:00 +01:00
Wei-Cheng Pan
9f134bdbf1 Bug 1310127 - Part 3: Use MOZ_MUST_USE in netwerk/protocol/http r=mcmanus
Add assertions.

MozReview-Commit-ID: DPvgKzVr3ip
2017-01-12 17:48:45 +08:00
Nick
821a8e24f1 Bug 1343545 - Moved necessary code out of nsNetUtilInlines.h and removed the file r=bsmedberg
MozReview-Commit-ID: AazctrDbCdf
2017-03-02 09:32:37 -05:00
Andrea Marchesini
837add14a5 Bug 1339710 - Remove nsIPartialFileInputStream, r=smaug 2017-02-22 09:41:51 +01:00
Iris Hsiao
0230dfa2c7 Backed out 5 changesets (bug 1339710) for GTest failures in TestSlicedInputStream.StartBiggerThan
Backed out changeset 7c0ec55b44dc (bug 1339710)
Backed out changeset cbb4e1c2aada (bug 1339710)
Backed out changeset c685dca493f5 (bug 1339710)
Backed out changeset 4761a15d45fd (bug 1339710)
Backed out changeset 7561692c1bc7 (bug 1339710)
2017-02-22 16:19:50 +08:00
Andrea Marchesini
3bb60b8a9c Bug 1339710 - Remove nsIPartialFileInputStream, r=smaug 2017-02-22 07:56:29 +01:00
Ehsan Akhgari
f4fb81ab69 Bug 1340677 - Stop supporting ORIGIN_IS_FULL_SPEC for Firefox; r=mcmanus
This is only used in Thunderbird and SeaMonkey and makes origin
comparisons needlessly slow in Firefox.
2017-02-21 10:37:37 -05:00
Carsten "Tomcat" Book
3dcf68221c Merge mozilla-central to autoland 2017-02-20 14:12:30 +01:00
Jonathan Hao
585dbfd246 Bug 1323644 - Isolate the HSTS and HPKP storage by first party domain (Necko) r=ckerschb
MozReview-Commit-ID: 6DFPXTXoykc
2017-02-14 10:29:41 +08:00
Tim Huang
b3fb2c8458 Bug 1336802 - Part 2: Updating the whole code base to make sure nsILoadInfo get null check. r=smaug 2017-02-07 11:49:34 +08:00
Andrea Marchesini
46a9207d60 Bug 1328653 - Merging all the various *OriginAttributes to just one, r=huseby 2017-01-12 17:38:48 +01:00
Thomas Nguyen
20c9180890 Bug 1304623 - Create a pref to control the default referrer policy- part 2. r=mcmanus, r=bkelly
MozReview-Commit-ID: GEUDZ8UZAT5
2017-01-05 11:30:03 +08:00
Christoph Kerschbaumer
65b9eed2df Bug 1182569: Update ContentSecurityManager to handle docshell loads. r=smaug 2017-01-03 20:59:30 +01:00
Wei-Cheng Pan
641ed7284e Bug 1323947 - Use Use MOZ_MUST_USE in netwerk/protocol/viewsource r=valentin
MozReview-Commit-ID: 5JAkF53s42X
2016-11-23 17:21:17 +08:00
Ehsan Akhgari
5980492397 Bug 1318888 - Remove a few other mentions of appId's from Necko; r=mcmanus 2016-11-21 15:00:49 -05:00
Ehsan Akhgari
90f8d7c831 Bug 1318887 - Remove NS_GetAppInfo; r=mcmanus
This function is now only used to populate some write-only data members.
2016-11-21 15:00:46 -05:00
Ehsan Akhgari
516a4de699 Bug 1318206 - Remove some unused code for clearing app data; r=baku,mcmanus 2016-11-17 08:30:21 -05:00
Ehsan Akhgari
917a5e63fc Bug 1310845 - Remove support for mozapp iframes; r=fabrice,jryans,baku,mcmanus
This patch removes support for mozapp iframes, leaving support for
mozbrowser iframes intact.  Some of the code has been rewritten in order
to phrase things in terms of mozbrowser only, as opposed to mozbrowser
or app.  In some places, code that was only useful with apps has been
completely removed, so that the APIs consumed can also be removed.  In
some places where the notion of appId was bleeding out of this API, now
we use NO_APP_ID.  Other notions of appId which were restricted to this
API have been removed.
2016-11-16 09:13:38 -05:00
Carsten "Tomcat" Book
84568d0bc2 Backed out changeset 7d1f7dd996f7 (bug 1310845) 2016-11-16 14:50:44 +01:00
Ehsan Akhgari
2d792bd2ad Bug 1310845 - Remove support for mozapp iframes; r=fabrice,jryans,baku,mcmanus
This patch removes support for mozapp iframes, leaving support for
mozbrowser iframes intact.  Some of the code has been rewritten in order
to phrase things in terms of mozbrowser only, as opposed to mozbrowser
or app.  In some places, code that was only useful with apps has been
completely removed, so that the APIs consumed can also be removed.  In
some places where the notion of appId was bleeding out of this API, now
we use NO_APP_ID.  Other notions of appId which were restricted to this
API have been removed.
2016-11-15 18:31:46 -05:00
Dragana Damjanovic
36e29aafb9 Bug 1301407 - Remove release assert for nss initialization. r=keeler 2016-11-08 00:13:00 +01:00
d8a065719d Bug 1301407 - Ensure nss initialized during nsHttpHandler initialization. r=mcmanus, r=keeler 2016-10-25 10:43:00 -04:00
Yoshi Huang
1221944376 Bug 1308938: skip check for about: pages. r=baku 2016-10-19 15:16:34 +08:00
Valentin Gosu
69e93335ce Bug 1307491 - (Part 1) Remove support for per-app-offline in netwerk/ [nukeb2g] r=bagder
* * *
Bug 1307491 - Remove support for per-app-offline [nukeb2g] r=bagder

MozReview-Commit-ID: FoweWBv9QyE
2016-10-17 03:54:46 +02:00
Tim Huang
91e4a3505d Bug 1277803 - Part 4 : Make the NS_CompareLoadInfoAndLoadContext() skiping test if the request is the favicon loading from the XUL image. r=honzab 2016-10-13 15:43:59 +08:00
Wes Kocher
85edded572 Backed out 8 changesets (bug 1277803) for browser-chrome test failures a=backout
Backed out changeset 477890efdb88 (bug 1277803)
Backed out changeset 49da326bfe68 (bug 1277803)
Backed out changeset 2d17a40a9077 (bug 1277803)
Backed out changeset b1cb0a195ca1 (bug 1277803)
Backed out changeset c7d82459d152 (bug 1277803)
Backed out changeset 3be9a06248af (bug 1277803)
Backed out changeset 8d119ca96999 (bug 1277803)
Backed out changeset be767a6f7ecd (bug 1277803)
2016-10-12 14:26:00 -07:00
Tim Huang
b35f331a1c Bug 1277803 - Part 4 : Make the NS_CompareLoadInfoAndLoadContext() skiping test if the request is the favicon loading from the XUL image. r=honzab 2016-10-12 17:32:08 +08:00
James Andreou
1e947fec6c Bug 1282124 - Remove nsILoadInfo.usePrivateBrowsing and the SEC_FORCE_PRIVATE_BROWSING flag; r=smaug,jryans 2016-09-27 16:56:44 -04:00
Kate McKinley
90c8afbeac Bug 1246540 - HSTS Priming Proof of Concept. r=ckerschb, r=mayhemer, r=jld, r=smaug, r=dkeeler, r=jmaher, p=ally
HSTS priming changes the order of mixed-content blocking and HSTS
upgrades, and adds a priming request to check if a mixed-content load is
accesible over HTTPS and the server supports upgrading via the
Strict-Transport-Security header.

Every call site that uses AsyncOpen2 passes through the mixed-content
blocker, and has a LoadInfo. If the mixed-content blocker marks the load as
needing HSTS priming, nsHttpChannel will build and send an HSTS priming
request on the same URI with the scheme upgraded to HTTPS. If the server
allows the upgrade, then channel performs an internal redirect to the HTTPS URI,
otherwise use the result of mixed-content blocker to allow or block the
load.

nsISiteSecurityService adds an optional boolean out parameter to
determine if the HSTS state is already cached for negative assertions.
If the host has been probed within the previous 24 hours, no HSTS
priming check will be sent.

MozReview-Commit-ID: ES1JruCtDdX
2016-09-27 11:27:00 -04:00
Ehsan Akhgari
2e75a8620c Bug 1340712 - Remove MOZILLA_INTERNAL_API ifdef's from nsNetUtil.cpp; r=mcmanus
The C++ code inside libxul always uses the internal API.
2017-02-18 09:41:52 -05:00
Nicholas Nethercote
9adec6015b Bug 1297961 (part 2) - Use nsIURI::GetSpecOrDefault() for comparisons to fixed URIs. r=hurley. 2016-08-26 16:02:32 +10:00
Nicholas Nethercote
62b6b0fce6 Bug 1297961 (part 1) - Introduce nsURI::GetSpecOrDefault(). r=hurley.
This function is an infallible alternative to nsIURI::GetSpec(). It's useful
when it's appropriate to handle a GetSpec() failure with a failure string, e.g.
for log/warning/error messages. It allows code like this:

  nsAutoCString spec;
  uri->GetSpec(spec);
  printf("uri: %s", spec.get());

to be changed to this:

  printf("uri: %s", uri->GetSpecOrDefault().get());

This introduces a slight behavioural change. Previously, if GetSpec() failed,
an empty string would be used here. Now, "[nsIURI::GetSpec failed]" will be
produced instead. In most cases this failure string will make for a clearer
log/warning/error message than the empty string.
* * *
Bug 1297961 (part 1b) - More GetSpecOrDefault() additions. r=hurley.

I will fold this into part 1 before landing.
2016-08-26 16:02:31 +10:00
Tim Huang
72d82b415d Bug 1291652 - Part 2: Make sure that we fetch originAttributes from the nsIloadInfo, but not from the nsIloadContext. r=mayhemer 2016-08-23 07:20:00 -04:00