Emilio Cobos Álvarez
71bf77b3fe
Bug 1904442 - Rename GlobalTeardownObserver::GetOwner to GetOwnerWindow. r=smaug,media-playback-reviewers,dom-storage-reviewers,aosmond,padenot,asuth
...
Also HasOrHasHadOwner to HasOrHasHadOwnerWindow.
Differential Revision: https://phabricator.services.mozilla.com/D214772
2024-07-01 11:49:59 +00:00
Thomas Wisniewski
11e391c9f5
Bug 697151 - distinguish between SYNC and ASYNC XMLHttpRequests in nsIContentPolicy types, and have ChannelEventQueue::MaybeSuspendIfEventsAreSuppressed only suspend async ones; r=nika,necko-reviewers,peterv,dom-storage-reviewers,asuth,kershaw
...
Differential Revision: https://phabricator.services.mozilla.com/D213516
2024-06-24 18:45:18 +00:00
Andrew Sutherland
874595e828
Bug 1900681 - Worker XHR self-manages XHRMT lifecycle. r=dom-worker-reviewers,smaug
...
We don't want the XHRMT to self-Abort() when the XHRWT state machine
is built assuming this doesn't happen. This is likely the source of a
number of weird hangs and crashes we have hardened the implementation
against in the past, and potentially still some ongoing hangs and
weirdness.
Differential Revision: https://phabricator.services.mozilla.com/D212609
2024-06-10 17:57:15 +00:00
Valentin Gosu
59d84590f7
Bug 1840182 - Do not create new XHR channel during shutdown r=necko-reviewers,kershaw
...
Differential Revision: https://phabricator.services.mozilla.com/D213018
2024-06-10 13:32:45 +00:00
Sean
a18c979054
Bug 1894288 - Remove network.fetch.redirect.stripAuthHeader and network.http.redirect.stripAuthHeader prefs r=sunil,edgul,necko-reviewers,valentin
...
Differential Revision: https://phabricator.services.mozilla.com/D209393
2024-05-22 15:10:48 +00:00
Emilio Cobos Álvarez
2808374848
Bug 1892257 - Move nsStringBuffer to mfbt. r=nika,xpcom-reviewers,glandium
...
Inline Create() and Realloc() so that we don't get negative leaks, since
were that code end up in mozglue, it wouldn't have access to the logging
machinery.
Differential Revision: https://phabricator.services.mozilla.com/D209663
2024-05-14 14:24:26 +00:00
Joshua Marshall
de7f577463
Bug 1855699 - Disable WorkerRef instrumentation to cut down on intermittent noise. r=dom-worker-reviewers,asuth
...
Differential Revision: https://phabricator.services.mozilla.com/D205052
2024-03-26 00:57:56 +00:00
Joshua Marshall
a65ecb038b
Bug 1855699 - Add a mutex for the ThreadSafeWorkerRef r=dom-worker-reviewers,asuth
...
Differential Revision: https://phabricator.services.mozilla.com/D203911
2024-03-15 15:16:40 +00:00
Thomas Wisniewski
70221d18ca
Bug 1847358 part 3: add a fullMimeType attribute to nsIBaseChannel and use it to make our Data URI content-type header parsing standards-compliant for XHR and Fetch; r=dlrobertson,necko-reviewers,jesup
...
Differential Revision: https://phabricator.services.mozilla.com/D203380
2024-03-04 21:34:27 +00:00
Thomas Wisniewski
d782822b0f
Bug 1847358 part 2: create and use nsIBaseChannel to reduce code debt and better-encapsulate logic for range-requests on nsBaseChannel classes; r=dlrobertson,necko-reviewers,jesup
...
Differential Revision: https://phabricator.services.mozilla.com/D203379
2024-03-04 21:34:27 +00:00
Thomas Wisniewski
cb7f1f5558
Bug 1847358 part 1: move nsBaseChannel::ContentRange content out into its own class as mozilla::net::ContentRange; r=dlrobertson,necko-reviewers,valentin
...
Differential Revision: https://phabricator.services.mozilla.com/D203378
2024-03-04 21:34:27 +00:00
Joshua Marshall
0d726961c7
Bug 1877921 - Own WorkerRef during DebugWorkerRefs r=dom-worker-reviewers,asuth
...
The Proxy is released on the Worker thread when an iframe with a Worker is destroyed. This removes the ThreadSafeWorkerRef from the XMLHttpRequestMainThread. Then the main thread destroys the docshell, calling XMLHttpRequestMainThread::Abort, which relies on the Worker still being alive.
Differential Revision: https://phabricator.services.mozilla.com/D202454
2024-02-27 15:53:15 +00:00
Gregory Pappas
761c021898
Bug 1881188 - Remove nsLayoutCID.h r=emilio
...
All of this stuff has been converted to static registration, making this file
unneeded.
Differential Revision: https://phabricator.services.mozilla.com/D202291
2024-02-21 13:04:30 +00:00
Thomas Wisniewski
cc9c21a500
Bug 1848004 - Refactor event type code in XMLHttpRequest code; r=sunil,necko-reviewers,valentin
...
Differential Revision: https://phabricator.services.mozilla.com/D185919
2024-02-12 23:34:21 +00:00
Kelsey Gilbert
7cf6146205
Bug 1874226 - Use unique_ptr not Scoped in xpcom/*. r=xpcom-reviewers,necko-reviewers,valentin,emilio
...
Differential Revision: https://phabricator.services.mozilla.com/D200250
2024-02-07 18:30:22 +00:00
Cosmin Sabou
ce591ce37b
Backed out 2 changesets (bug 1874226) for causing bustages on dom/ContentParent.h. CLOSED TREE
...
Backed out changeset 3efd59369cd6 (bug 1874226)
Backed out changeset cd7b0bd12dae (bug 1874226)
2024-02-06 03:08:23 +02:00
Kelsey Gilbert
34bc48eb8c
Bug 1874226 - Use unique_ptr not Scoped in xpcom/*. r=xpcom-reviewers,necko-reviewers,valentin,emilio
...
Differential Revision: https://phabricator.services.mozilla.com/D200250
2024-02-06 00:21:43 +00:00
Joshua Marshall
0ae04b396e
Bug 1805613 - Add a mutable status to WorkerRefs for logging. r=dom-worker-reviewers,asuth
...
In DEBUG mode, add a settable string to WorkerRefs. Record what we're doing in
the XHR request worker, and log the status if we seem to be hanging (see
WorkerPrivate::DumpCrashInformation).
Differential Revision: https://phabricator.services.mozilla.com/D190054
2024-01-28 14:28:44 +00:00
Daisuke Akatsuka
ac8b9154e4
Bug 1864985: Use nsIURI::hasUserPass instead of checking user pass string r=necko-reviewers,valentin
...
Depends on D193623
Differential Revision: https://phabricator.services.mozilla.com/D193624
2023-11-17 20:12:11 +00:00
Emilio Cobos Álvarez
d02e297b2d
Bug 1624819 - Remove TaskCategory and other quantum dom remnants. r=smaug,media-playback-reviewers,credential-management-reviewers,cookie-reviewers,places-reviewers,win-reviewers,valentin,mhowell,sgalich,alwu
...
Sorry this is not a particularly easy patch to review. But it should be
mostly straight-forward.
I kept Document::Dispatch mostly for convenience, but could be
cleaned-up too / changed by SchedulerGroup::Dispatch. Similarly maybe
that can just be NS_DispatchToMainThread if we add an NS_IsMainThread
check there or something (to preserve shutdown semantics).
Differential Revision: https://phabricator.services.mozilla.com/D190450
2023-10-10 08:51:12 +00:00
edgul
8a3fe3f0c8
Bug 1838013 - Make XHR URL failure throw syntax error DOMException to pass failure.html WPTs. r=valentin
...
Differential Revision: https://phabricator.services.mozilla.com/D180995
2023-09-15 20:38:48 +00:00
Natalia Csoregi
04f2d433d4
Backed out changeset ddf986b83075 (bug 697151) for causing assertion failures on XMLHttpRequestMainThread.cpp. CLOSED TREE
2023-08-09 18:25:17 +03:00
Thomas Wisniewski
6150b763aa
Bug 697151 - suspend all other (non-navigation) channels in the docgroup of a sync XHR as its syncloop begins, and resume them after its syncloop completes; r=smaug,necko-reviewers,valentin
...
Differential Revision: https://phabricator.services.mozilla.com/D185161
2023-08-09 14:42:32 +00:00
Dan Robertson
b581fd233e
Bug 1846780: responseXML is populated for a blob with an empty type. r=twisniewski
...
A blob with an empty content type or any other invalid content type should
return a value for responseXML.
Differential Revision: https://phabricator.services.mozilla.com/D185185
2023-08-08 00:34:03 +00:00
Thomas Wisniewski
57d1a22908
Bug 1846699 - fix a logic error in bug 1784880 which causes Raptor and streaming videos to break; r=dlrobertson
...
Differential Revision: https://phabricator.services.mozilla.com/D185243
2023-08-03 05:05:09 +00:00
Stanca Serban
6a91a084bf
Backed out changeset ae54734e8b25 (bug 1846699) for causing mochitests failures in test_bug945152.html. CLOSED TREE
2023-08-03 07:36:22 +03:00
Thomas Wisniewski
d5025096ce
Bug 1846699 - fix a logic error in bug 1784880 which causes Raptor and streaming videos to break; r=dlrobertson
...
Differential Revision: https://phabricator.services.mozilla.com/D185243
2023-08-03 03:57:55 +00:00
Thomas Wisniewski
489aea0550
Bug 1845006 - store the fully-serialized MimeType on data url channels so XHR and fetch may use it for content-type response headers, and clean up the data url parsing code to better match the spec. r=kershaw,sunil,necko-reviewers
...
Differential Revision: https://phabricator.services.mozilla.com/D184713
2023-08-02 23:41:24 +00:00
Narcis Beleuzu
701fed4368
Backed out changeset f96e24bbd71c (bug 1845006) for bustages on nsDataHandler.cpp
2023-08-02 22:39:40 +03:00
Thomas Wisniewski
453464c0ca
Bug 1845006 - store the fully-serialized MimeType on data url channels so XHR and fetch may use it for content-type response headers, and clean up the data url parsing code to better match the spec. r=kershaw,sunil,necko-reviewers
...
Differential Revision: https://phabricator.services.mozilla.com/D184713
2023-08-02 16:33:41 +00:00
Cristina Horotan
8c78774d7d
Backed out changeset 8d98996f824c (bug 1845006) for causing build bustage at FetchDriver.cpp CLOSED TREE
2023-08-02 17:22:58 +03:00
Thomas Wisniewski
4faa886152
Bug 1845006 - store the fully-serialized MimeType on data url channels so XHR and fetch may use it for content-type response headers, and clean up the data url parsing code to better match the spec. r=kershaw,sunil,necko-reviewers
...
Differential Revision: https://phabricator.services.mozilla.com/D184713
2023-08-02 13:39:48 +00:00
Thomas Wisniewski
1ffb72e885
Bug 1784880 - Support range requests on blob URLs in fetch/XMLHttpRequest; r=dlrobertson,necko-reviewers,jesup
...
Differential Revision: https://phabricator.services.mozilla.com/D184281
2023-08-01 18:50:37 +00:00
Cristian Tuns
8acd1060a3
Backed out changeset 384e4f88f047 (bug 1784880) for causing wpt failures in parsedepth.html CLOSED TREE
2023-08-01 05:41:04 -04:00
Thomas Wisniewski
21f4de34c5
Bug 1784880 - Support range requests on blob URLs in fetch/XMLHttpRequest; r=dlrobertson,necko-reviewers,jesup
...
Differential Revision: https://phabricator.services.mozilla.com/D184281
2023-08-01 02:48:47 +00:00
Logan Rosen
37080886fa
Bug 1843815 - Improve link for sync XHR warning. r=necko-reviewers,kershaw
...
Differential Revision: https://phabricator.services.mozilla.com/D183699
2023-07-26 09:18:01 +00:00
Thomas Wisniewski
0412a44244
Bug 1695216 - Follow the XMLHttpRequest spec more closely for network and other errors; r=kershaw,sunil
...
- clear the response on network failure (bad chunks, etc).
- throw the expected error for abort/timeout/error for sync XHR failures.
Differential Revision: https://phabricator.services.mozilla.com/D183782
2023-07-21 02:41:22 +00:00
Thomas Wisniewski
55a011c8ab
Bug 1576602 - fetch response body should be empty for HEAD/CONNECT requests, per spec; r=kershaw,sunil
...
Differential Revision: https://phabricator.services.mozilla.com/D183434
2023-07-19 02:44:01 +00:00
Gregory Pappas
5d4acf4d8f
Bug 1842468 - Remove dom.xhr.standard_content_type_normalization pref r=dom-core,edgar
...
Differential Revision: https://phabricator.services.mozilla.com/D183798
2023-07-18 16:11:35 +00:00
André Bargull
0326e13101
Bug 1841314 - Part 6: Add marker to NewArrayBufferWithContents. r=sfink
...
Differential Revision: https://phabricator.services.mozilla.com/D182644
2023-07-06 20:51:00 +00:00
Sandor Molnar
8f7bcab6f5
Backed out 7 changesets (bug 1841314) for causing hazard failures. CLOSED TREE
...
Backed out changeset 82a53d6ea95a (bug 1841314)
Backed out changeset 524607b471a2 (bug 1841314)
Backed out changeset ce128e10bddb (bug 1841314)
Backed out changeset cdae4fbbdaff (bug 1841314)
Backed out changeset f1035b6c08fe (bug 1841314)
Backed out changeset 5897ad8ef181 (bug 1841314)
Backed out changeset 09618a767080 (bug 1841314)
2023-07-06 16:59:47 +03:00
André Bargull
922836287d
Bug 1841314 - Part 6: Add marker to NewArrayBufferWithContents. r=sfink
...
Differential Revision: https://phabricator.services.mozilla.com/D182644
2023-07-06 12:26:54 +00:00
Cristina Horotan
8f230bf05e
Backed out 7 changesets (bug 1841314) for causing hazard failures at js.cpp CLOSED TREE
...
Backed out changeset becc2fa2c186 (bug 1841314)
Backed out changeset e5b723317177 (bug 1841314)
Backed out changeset 61ae850b25e5 (bug 1841314)
Backed out changeset 9ff320c779b8 (bug 1841314)
Backed out changeset debf1172f794 (bug 1841314)
Backed out changeset 8ac4fa317006 (bug 1841314)
Backed out changeset eccacbb3b620 (bug 1841314)
2023-07-06 15:11:47 +03:00
André Bargull
f5c5fc31e1
Bug 1841314 - Part 6: Add marker to NewArrayBufferWithContents. r=sfink
...
Differential Revision: https://phabricator.services.mozilla.com/D182644
2023-07-06 11:41:18 +00:00
dylan
0e594e415f
Bug 1811837 - removed instances of mInLoadProgressEvent r=manuel
...
Differential Revision: https://phabricator.services.mozilla.com/D177403
2023-05-09 07:40:26 +00:00
Kershaw Chang
f446ba9e37
Bug 1808323 - Add telemetry for the page load time and the time to first paint for sites that supports Early Hints response, r=manuel,necko-reviewers,valentin
...
Differential Revision: https://phabricator.services.mozilla.com/D165966
2023-05-02 08:08:44 +00:00
sunil mayya
231604e35b
Bug 1823502 - do not drop auth header for HSTS and internal redirects. r=necko-reviewers,valentin
...
Differential Revision: https://phabricator.services.mozilla.com/D173523
2023-03-28 00:56:23 +00:00
Emilio Cobos Álvarez
8dabbf6590
Bug 1823686 - Share URLExtraData between SVG attribute mapping and style attribute. r=smaug
...
I don't think there's ever a way these should differ.
Got some include hell from removing ReferrerInfo.h from Document.h but
hopefully should be straight-forward to review.
Depends on D173154
Differential Revision: https://phabricator.services.mozilla.com/D173155
2023-03-22 14:54:43 +00:00
sunil mayya
6160bd9c95
Bug 1817980 - replace ReferrerInfo::IsCrossOriginRequest with nsScriptSecurityManager::CheckSameOriginURI for determining cross-origin redirects. r=necko-reviewers,valentin
...
Since Bug 1802086, we strip authentication headers when redirected to a cross-origin page. However, the api ReferrerInfo::IsCrossOriginRequest used for determining whether a request is cross-origin cannot be used as it compares the triggering principal's uri with the redirected channel's uri. This comparison might sometimes yield to false positives.
For e.g consider the following scenario:
1. Load `https://example.org/ ` and send the following fetch request from browser console
```
fetch("https://test.com/some_location ", {
"headers": {
"Authorization": "Token foo"
}
});
```
2. Server responds with a redirect to https://test.com/another_location
In the above scenario, the api ReferrerInfo::IsCrossOriginRequest will yield the above request as cross origin since the triggering principal uri here is example.com. Hence, this will be treated as cross-origin redirect resulting in removal of auth headers.
Thus ReferrerInfo::IsCrossOriginRequest has been replaced with nsScriptSecurityManager::CheckSameOriginURI where we directly compare the origins for the two requests.
Differential Revision: https://phabricator.services.mozilla.com/D170868
2023-02-28 12:06:36 +00:00
Ho Cheung
bc7fd13e94
Bug 1777218 - Remove unused XMLHTTPRequestMainThread::SetRequestObserver() r=manuel
...
Remove unused XMLHTTPRequestMainThread::SetRequestObserver() in code
Differential Revision: https://phabricator.services.mozilla.com/D167347
2023-01-23 12:55:30 +00:00