Commit Graph

93 Commits

Author SHA1 Message Date
Christoph Kerschbaumer
50a614652d Bug 1475073: Pass individual CORS errors as categories to web console error messages. r=baku 2018-07-20 10:47:15 +02:00
Andrea Marchesini
c2055bb4ff Bug 1476306 - Moving NullPrincipal/ContentPrincipal/SystemPrincipal under mozilla namespace - part 1 - NullPrincipal, r=ckerschb 2018-07-17 21:37:48 +02:00
Ehsan Akhgari
0d9b1d2a99 Bug 1462432 - Part 1: Add an API to override the tracking status on an HTTP channel; r=mayhemer 2018-06-13 16:18:39 -04:00
Tom Ritter
d44ebbd80e Bug 1378552 - Reduce the liklihood of inadvertently misusing NullPrincipal::Create(). r=ckerschb
NullPrincipal::Create() (will null OA) may cause an OriginAttributes bypass.
We change Create() so OriginAttributes is no longer optional, and rename
Create() with no arguments to make it more explicit about what the caller is doing.

MozReview-Commit-ID: 7DQGlgh1tgJ
2018-03-22 13:36:20 -05:00
Valentin Gosu
80254c44d8 Bug 1426353 - Do not allow the parent process to consume alt-data generated in the content process. r=michal
MozReview-Commit-ID: htQ28muaBI
2018-03-06 02:44:51 +01:00
Valentin Gosu
ca5c5bbf19 Bug 1439931 - nsIIOService.extractScheme/net_ExtractURLScheme should lowercase its output r=mayhemer
MozReview-Commit-ID: LZ2rqIdIoXQ
2018-02-26 16:42:27 +01:00
Shane Caraveo
616ecb3d39 Bug 1149250 add support for https upgrades from webextensions, r=bz,mayhemer,rpl
MozReview-Commit-ID: ChIs2Q6bgEn
2017-12-08 12:12:37 -08:00
Honza Bambas
cc89fd6ccd Bug 1403998 - Make view-source channels return correct resultPrincipalURI via LoadInfo after redirect. r=bz 2017-10-02 10:12:00 -04:00
Chris Peterson
ce551e51b9 Bug 870698 - Part 4: Replace Equals("") with EqualsLiteral(""). r=erahm
MozReview-Commit-ID: G1GhyvD29WK
2017-09-06 01:13:45 -07:00
Masatoshi Kimura
c0943e4f30 Bug 1326520 - Rename nsIURI.path to pathQueryRef. r=valentin.gosu
MozReview-Commit-ID: DqJdTGopR9G
2017-07-29 20:50:21 +09:00
Kate McKinley
9d6898e4f6 Bug 1331730 - Log CORS messages from the content process r=bz,mayhemer
In e10s, a channel created by parent does not have a reliable reference
to the inner window ID that initiated the request. Without that, the
channel must request that the content process log and blocked messages
to the web console. This patch creates a new ipdl interface to pass the
message from the parent to the child process. The nsCORSListenerProxy
also needs to keep a reference to the nsIHttpChannel that created it so
it can find its way back to the child. Additionally, the
HttpChannelParent needs to be propagated when creating a new channel for
CORS.

MozReview-Commit-ID: 8CUhlVCTWxt
2017-02-15 12:40:41 +09:00
Sylvestre Ledru
9d4a84d778 Bug 1378712 - Remove all trailing whitespaces r=Ehsan
MozReview-Commit-ID: Kdz2xtTF9EG
2017-07-06 14:00:35 +02:00
Valentin Gosu
7e8ca8ee92 Bug 1354349 - Add nsIChannel.isDocument that checks if LOAD_DOCUMENT_URI is set, or if LOAD_HTML_OBJECT_DATA and the channel has the appropriate MIME type r=mcmanus,mystor
MozReview-Commit-ID: K28Opd9JTr2
2017-04-20 10:15:06 +08:00
Carsten "Tomcat" Book
fc32e97d4c Backed out changeset ec9fb39f7133 (bug 1354349) for bustage 2017-04-18 08:52:14 +02:00
Valentin Gosu
a4d4a67955 Bug 1354349 - Add nsIChannel.isDocument that checks if LOAD_DOCUMENT_URI is set, or if LOAD_HTML_OBJECT_DATA and the channel has the appropriate MIME type r=mcmanus,mystor
MozReview-Commit-ID: K28Opd9JTr2
2017-04-18 11:25:47 +08:00
Nicholas Hurley
4144de0ff3 Bug 1348461 - Use a process-unique uint64 instead of a uuid for channel ids r=mcmanus 2017-04-04 08:36:51 -07:00
Nicholas Hurley
e6544ae502 Bug 1348462 - Use a process-unique uint64 instead of a uuid for request context ids r=mcmanus 2017-03-23 07:40:36 -07:00
Kershaw Chang
66ab47e3d8 Bug 1312782 - Part 3: Test case. r=honzab 2017-03-27 04:10:00 -04:00
Andrea Marchesini
8f5f953fba Bug 1343933 - Renaming Principal classes - part 2 - NullPrincipal, r=qdot 2017-03-22 11:38:40 +01:00
Wei-Cheng Pan
98764ef691 Bug 1310127 - Part 6: Use MOZ_MUST_USE in netwerk/protocol/http r=dragana
MozReview-Commit-ID: 6zF76CsegSn
2017-01-12 15:17:52 +08:00
Wei-Cheng Pan
60a2861056 Bug 1310127 - Part 4: Use MOZ_MUST_USE in netwerk/protocol/http r=mcmanus
This patch contains some changes that may alter control flows.

MozReview-Commit-ID: Kcc2DWJZ8L5
2016-12-28 14:43:47 +08:00
Honza Bambas
f35b32aebc Bug 1324419 - Use QueryObject for nsHttpChannel. r=mcmanus 2017-02-17 08:08:00 -05:00
Michael Layzell
c57a209423 Bug 1339153 - Part 1: Correctly emulate missing headers in nsViewSourceChannel::GetResponseHeader, r=bz
MozReview-Commit-ID: 34bCA7wKkmh
2017-02-13 14:42:24 -05:00
Ehsan Akhgari
337e003709 Bug 1170190 - Part 2: Add the nsIHttpChannel::IsTrackingResource() API to query the channel's tracking annotation; r=mayhemer 2016-12-23 14:40:11 -05:00
Honza Bambas
8a9271d13f Bug 1312243 - Block authentication dialog pop-ups by cancling 3 of them in a row, r=Dolske+mcmanus 2016-12-16 03:42:00 +01:00
Honza Bambas
a7b59f7374 Bug 1318759 - Properly query final class in HttpChannelParent::OnStartRequest to prevent evil static_cast, r=jduell 2016-12-09 05:52:00 +01:00
Nicholas Nethercote
7b5df070f0 Bug 1297300 - Add missing checks to GetSpec() calls in netwerk/. r=hurley,dragana. 2016-08-26 16:40:57 +10:00
Christoph Kerschbaumer
9707ba1a13 Bug 1282554 - Provide helper function to check if channel can be openen using open2() and asyncOpen2() r=bholly 2016-06-28 19:03:56 +02:00
Jarda Snajdr
2eed757419 Bug 1274556 - Add a channelId attribute to nsIHttpChannel r=hurley 2016-06-01 12:29:21 -07:00
Dragana Damjanovic
77712d265b Bug 669259 - Expose original header received from a peer. r=mcmanus 2016-05-12 14:33:00 -04:00
Yoshi Huang
2b116e8616 Bug 1263496 - Part 3: fix for nsNullPrincipal::Create
This fixed the locations listed by
http://searchfox.org/mozilla-central/search?q=nsNullPrincipal::Create(&redirect=true
that needs to inherit origin attributes.
2016-04-27 18:38:07 +08:00
Valentin Gosu
684bb7e7c6 Bug 1262326 - Make test_user_agent_overrides.html work in e10s r=nwgh
* Rename SchedulingContext to RequestContext
* Move SetLoadGroupUserAgentOverride to nsHttpChannel
* Cache the userAgentOverride in RequestContext instead of LoadGroup

MozReview-Commit-ID: FQS9uSRR8kd
2016-04-21 16:59:17 +02:00
Christoph Kerschbaumer
136a31bb4c Bug 1254689 - Remove SEC_NORMAL where loadingPrincipal is SystemPrincipal or NullPrincipal. r=sicking 2016-03-09 13:55:59 -08:00
Wes Kocher
77087623ff Backed out changeset 7cbab9ec76d5 (bug 1254689) for browser_dbg_addon-sources.js failures
MozReview-Commit-ID: 3zPliH7mmPj
2016-03-09 10:56:23 -08:00
Christoph Kerschbaumer
3b1ca5ae52 Bug 1254689 - Remove SEC_NORMAL where loadingPrincipal is SystemPrincipal or NullPrincipal (r=sicking)
MozReview-Commit-ID: LKK3MGMODNI
2016-03-09 09:01:45 -08:00
Blake Kaplan
bd476fb1d1 Bug 1113196 - Pass a sane set of parameters to loadinfo for top-level loads in e10s. r=sicking 2016-03-04 08:54:07 -08:00
Michael Madsen
9517189b48 Bug 1241377 - Part 1: Implement nsIFormPOSTActionChannel for the channel accepts form POST. r=mayhemer 2016-01-28 19:38:34 +09:00
Jonas Sicking
736f70081e Bug 1226909 part 3: Move logic of when to initiate CORS preflight into channels. Allow CORS preflight to happen when doing a same-origin to cross-origin redirect. r=ckerschb 2015-12-06 18:33:14 -05:00
Sebastian Hengst
cdf4286868 Backed out changeset 09d64535bcda (bug 1216687), a7f1a289dd78, 4dbf06183e6c, 26318a5e3006, 9ae2af3cf86d (bug 1226909) for M(1,2,5) oranges. r=backout 2015-12-05 16:34:47 +01:00
Jonas Sicking
cd1c0c2552 Bug 1226909 part 3: Move logic of when to initiate CORS preflight into channels. Allow CORS preflight to happen when doing a same-origin to cross-origin redirect. r=ckerschb 2015-12-05 01:46:20 -08:00
Nate Hughes
26695fef92 Bug 1154309 - Add New Resource Timing Fields r=bz,hurley 2015-07-24 08:49:25 -07:00
Andrea Marchesini
526d67c413 Bug 1147749 - View source should go through service worker interception, r=bz, r=jduell 2015-10-05 14:46:24 +01:00
Michael Layzell
4aa2d0bee4 Bug 1200337 - Part 1: Don't expose standard HTTP headers during interception in non-e10s mode, r=mcmanus 2015-09-12 12:46:09 -04:00
Ehsan Akhgari
68e82a9a17 Bug 815299 - Part 1: Add an API for setting an empty request header on an HTTP channel; r=dragana 2015-09-09 07:53:09 -04:00
Nigel Babu
9476f7e7c9 Backed out changeset 8a798c03d76c (bug 815299) for M4 bustage ON A CLOSED TREE 2015-09-09 09:12:41 +05:30
Ehsan Akhgari
95141592e9 Bug 1201229 - Return an empty string for a header when an error occurs; r=dragana
This fixes nsIHttpChannel::GetRequestHeader() and
nsIHttpChannel::GetResponseHeader() to always empty out their string
argument even when they fail.  This prevents programming mistakes of
passing the same string object to multiple of these calls and using the
string value without checking the nsresult error code, since otherwise
the string value may be unchanged from a previous call.

Note that this doesn't affect JS consumers of these APIs since we only
empty out the string argument in case the method fails, which will be
translated to a JS exception, and the JS code will never get to see the
emptied string.
2015-09-08 20:08:35 -04:00
Ehsan Akhgari
c5831b5f29 Bug 815299 - Part 1: Add an API for setting an empty request header on an HTTP channel; r=dragana 2015-09-08 20:08:31 -04:00
Christoph Kerschbaumer
8ab48ef209 Bug 1193552 - Remove baseURI from LoadInfo (r=sicking,jkitch) 2015-08-19 10:43:30 -07:00
Christoph Kerschbaumer
040351fa66 Bug 1193924 - Add assertion to AsyncOpen to make sure asyncOpen2() was called first when securityflags in loadInfo are set (r=sicking) 2015-08-12 21:36:33 -07:00
Ryan VanderMeulen
0618529665 Backed out changeset f99b27e40987 (bug 1193924) for B2G emulator bustage.
CLOSED TREE
2015-08-13 12:45:05 -04:00