Patrick McManus
c07974e685
Bug 1238290 - fix bad necko deps on unified_sources r=valentin.gosu
...
---
netwerk/base/ARefBase.h | 2 ++
netwerk/base/CaptivePortalService.cpp | 1 +
netwerk/base/CaptivePortalService.h | 1 +
netwerk/base/EventTokenBucket.cpp | 4 +++-
netwerk/base/LoadContextInfo.cpp | 3 +++
netwerk/base/LoadInfo.cpp | 3 +++
netwerk/base/MemoryDownloader.cpp | 1 +
netwerk/base/Predictor.cpp | 1 +
netwerk/base/RedirectChannelRegistrar.h | 1 +
netwerk/base/nsBaseChannel.cpp | 1 +
netwerk/base/nsChannelClassifier.cpp | 1 +
netwerk/base/nsDirectoryIndexStream.cpp | 3 ++-
netwerk/base/nsDownloader.cpp | 1 +
netwerk/base/nsIOService.cpp | 1 +
netwerk/base/nsIncrementalDownload.cpp | 3 +++
netwerk/base/nsNetUtil.cpp | 4 ++++
netwerk/base/nsNetUtil.h | 1 +
netwerk/base/nsProtocolProxyService.cpp | 1 +
netwerk/base/nsSecCheckWrapChannel.cpp | 2 ++
netwerk/base/nsUDPSocket.cpp | 4 +++-
netwerk/cache/nsDiskCacheBinding.cpp | 2 +-
netwerk/cache/nsDiskCacheDeviceSQL.cpp | 2 ++
netwerk/cache/nsMemoryCacheDevice.cpp | 2 +-
netwerk/cache2/CacheFileUtils.cpp | 2 ++
netwerk/cache2/CacheStorageService.h | 1 +
netwerk/ipc/NeckoParent.cpp | 1 +
netwerk/ipc/RemoteOpenFileChild.cpp | 1 +
netwerk/protocol/about/nsAboutBloat.cpp | 1 +
netwerk/protocol/about/nsAboutCacheEntry.cpp | 1 +
netwerk/protocol/about/nsAboutProtocolHandler.cpp | 1 +
netwerk/protocol/data/DataChannelParent.cpp | 1 +
netwerk/protocol/file/nsFileProtocolHandler.cpp | 1 +
netwerk/protocol/ftp/FTPChannelParent.cpp | 2 ++
netwerk/protocol/ftp/FTPChannelParent.h | 1 +
netwerk/protocol/ftp/nsFtpConnectionThread.cpp | 1 +
netwerk/protocol/ftp/nsFtpProtocolHandler.h | 1 +
netwerk/protocol/http/Http2Compression.cpp | 1 +
netwerk/protocol/http/Http2Session.cpp | 1 +
netwerk/protocol/http/Http2Stream.h | 2 ++
netwerk/protocol/http/HttpBaseChannel.cpp | 4 ++++
netwerk/protocol/http/HttpBaseChannel.h | 1 +
netwerk/protocol/http/HttpChannelChild.cpp | 25 ++--------------------
netwerk/protocol/http/HttpChannelChild.h | 24 +++++++++++++++++++++
netwerk/protocol/http/HttpChannelParent.cpp | 1 +
netwerk/protocol/http/HttpChannelParent.h | 1 +
.../protocol/http/HttpChannelParentListener.cpp | 1 +
netwerk/protocol/http/HttpChannelParentListener.h | 1 +
netwerk/protocol/http/InterceptedChannel.cpp | 1 +
netwerk/protocol/http/NullHttpChannel.cpp | 1 +
netwerk/protocol/http/NullHttpTransaction.cpp | 1 +
netwerk/protocol/http/PackagedAppService.cpp | 14 ++++++++++--
netwerk/protocol/http/PackagedAppService.h | 4 +++-
netwerk/protocol/http/PackagedAppVerifier.cpp | 1 +
netwerk/protocol/http/nsCORSListenerProxy.cpp | 2 +-
netwerk/protocol/http/nsHttpBasicAuth.cpp | 1 +
netwerk/protocol/http/nsHttpChannel.cpp | 2 ++
netwerk/protocol/http/nsHttpChunkedDecoder.cpp | 1 +
netwerk/protocol/http/nsHttpConnectionInfo.cpp | 2 ++
netwerk/protocol/http/nsHttpConnectionMgr.cpp | 1 +
netwerk/protocol/http/nsHttpDigestAuth.cpp | 1 +
netwerk/protocol/viewsource/nsViewSourceHandler.h | 4 ++++
.../protocol/websocket/BaseWebSocketChannel.cpp | 1 +
.../websocket/WebSocketEventListenerParent.cpp | 1 +
.../protocol/websocket/WebSocketEventService.cpp | 3 +++
netwerk/protocol/websocket/WebSocketFrame.cpp | 2 ++
netwerk/protocol/wyciwyg/nsWyciwygChannel.cpp | 1 +
.../protocol/wyciwyg/nsWyciwygProtocolHandler.cpp | 1 +
netwerk/streamconv/converters/mozTXTToHTMLConv.cpp | 1 +
.../streamconv/converters/nsFTPDirListingConv.cpp | 1 +
.../streamconv/converters/nsHTTPCompressConv.cpp | 2 ++
netwerk/streamconv/converters/nsHTTPCompressConv.h | 1 +
netwerk/streamconv/converters/nsIndexedToHTML.cpp | 1 +
netwerk/streamconv/converters/nsMultiMixedConv.cpp | 2 ++
netwerk/streamconv/converters/nsTXTToHTMLConv.cpp | 2 ++
netwerk/streamconv/converters/nsUnknownDecoder.cpp | 2 ++
75 files changed, 147 insertions(+), 32 deletions(-)
2016-01-08 20:20:50 -05:00
Ehsan Akhgari
59305f7e65
Bug 1229369 - Part 2: Drop the aChannel argument to HttpChannelChild::ShouldInterceptURI()
2016-01-06 11:19:50 -05:00
Ehsan Akhgari
2f2ec6a22a
Bug 1229369 - Intercept redirected network fetches that have their request mode set to manual; r=jdm
...
In the non-e10s case, this is done by simply avoiding to set the
LOAD_BYPASS_SERVICE_WORKER flag when we detect a non-internal redirect
in the manual redirect mode.
The e10s solution is a bit more complicated. Only the child process
knows whether a URI needs to be intercepted, so we piggy back on the
code written to support the |event.respondWith(Response.redirect())|
case where we know in the child that the target of the redirect needs to
be intercepted.
This means that we need to check the same condition as in the non-e10s
case, but we also need to check whether the target of the redirection
needs to be intercepted, which means we need to properly take secure
upgrades into account as well. This is done by computing both whether
we should intercept and whether we should do a secure upgrade in
HttpChannelChild::SetupRedirect() and saving the information on the
HttpChannelChild for later usage in HttpChannelChild::AsyncOpen().
2016-01-05 21:02:00 -05:00
Ehsan Akhgari
852aa4f559
Bug 1214305 - Part 7: Decide in the child process whether an intercepted channel should go through a secure upgrade; r=mcmanus
...
This is OK from a security perspective, since this decision only affects
whether the channel will be intercepted with the secure URI in the child
process. If the intercepting service worker decides to fall back to an
actual network request, we send the request to the parent process with
the original pre-upgrade URI, and the parent process will still be in
charge of whether a network visible HTTP request should be upgraded.
2016-01-04 16:30:02 -05:00
Ehsan Akhgari
3dbe05dd7b
Bug 1214305 - Part 6: Use a non-IPC redirect for synthesized upgraded responses to ensure the response URL is correctly propagated; r=mcmanus
2016-01-04 16:30:02 -05:00
Wes Kocher
3ed0d4d1fb
Backed out 10 changesets (bug 1214305) for leaks on linux debug m-e10s(bc7)
...
Backed out changeset 1f482566235a (bug 1214305)
Backed out changeset 001b31489756 (bug 1214305)
Backed out changeset 4e94d2088219 (bug 1214305)
Backed out changeset fba4a5bcea41 (bug 1214305)
Backed out changeset 100f8e249007 (bug 1214305)
Backed out changeset a59c453192dc (bug 1214305)
Backed out changeset 2daa86fc1fb9 (bug 1214305)
Backed out changeset c04efb57b0ed (bug 1214305)
Backed out changeset 52046e843c60 (bug 1214305)
Backed out changeset ac4fd6615828 (bug 1214305)
2016-01-04 10:34:24 -08:00
Ehsan Akhgari
c7008cd2c4
Bug 1214305 - Part 7: Decide in the child process whether an intercepted channel should go through a secure upgrade; r=mcmanus
...
This is OK from a security perspective, since this decision only affects
whether the channel will be intercepted with the secure URI in the child
process. If the intercepting service worker decides to fall back to an
actual network request, we send the request to the parent process with
the original pre-upgrade URI, and the parent process will still be in
charge of whether a network visible HTTP request should be upgraded.
2016-01-04 09:52:47 -05:00
Ehsan Akhgari
c1c7e812fc
Bug 1214305 - Part 6: Use a non-IPC redirect for synthesized upgraded responses to ensure the response URL is correctly propagated; r=mcmanus
2016-01-04 09:52:45 -05:00
Ehsan Akhgari
b5332348f8
Bug 1219469 - Part 1: Revert the error reporting added in bug 1233845; r=jdm
2016-01-04 09:39:10 -05:00
Ben Kelly
5d318d35fd
Bug 1220681 P4 Automatically suspend the parent channel after synthesizing the response for diverison. r=jdm
2015-12-23 12:20:53 -08:00
Ben Kelly
b2d4063f89
Bug 1220681 P3 Delay diversion on parent side until response head has been synthesized. r=jdm
2015-12-23 12:20:53 -08:00
Ben Kelly
70f6cd6b79
Bug 1220681 P1 Make HttpChannelChild::DivertToParent() work with synthetic responses. r=jdm
2015-12-23 12:20:53 -08:00
Blake Kaplan
34a6db0953
Bug 1229177 - Show the tracking protection shield for fetch and XHR requests. r=jduell
2015-12-21 14:12:52 -08:00
Dragana Damjanovic
6090c0fca4
Bug 664163 - Fix Get(Local|Remote)(Address|Port) in HttpChannelChild. r=jduell
2015-12-19 16:11:39 -05:00
Josh Matthews
753726fd67
Bug 1233845 - Report an interception error and cancel the HTTP channel when encountering a known topcrash situation. r=ehsan
2015-12-19 09:40:06 -05:00
Tim Nguyen
5f2fc6c152
Bug 1137681 - Make user agent docshell overrides affect network requests. r=jduell
2015-12-08 09:27:00 +01:00
Jonas Sicking
736f70081e
Bug 1226909 part 3: Move logic of when to initiate CORS preflight into channels. Allow CORS preflight to happen when doing a same-origin to cross-origin redirect. r=ckerschb
2015-12-06 18:33:14 -05:00
Jonas Sicking
59d2f1fb08
Bug 1226909 part 2: Let CORS preflight logic grab information from nsILoadInfo rather than duplicate it. r=ckerschb
2015-12-06 18:33:14 -05:00
Sebastian Hengst
cdf4286868
Backed out changeset 09d64535bcda (bug 1216687), a7f1a289dd78, 4dbf06183e6c, 26318a5e3006, 9ae2af3cf86d (bug 1226909) for M(1,2,5) oranges. r=backout
2015-12-05 16:34:47 +01:00
Jonas Sicking
cd1c0c2552
Bug 1226909 part 3: Move logic of when to initiate CORS preflight into channels. Allow CORS preflight to happen when doing a same-origin to cross-origin redirect. r=ckerschb
2015-12-05 01:46:20 -08:00
Jonas Sicking
72e95852c2
Bug 1226909 part 2: Let CORS preflight logic grab information from nsILoadInfo rather than duplicate it. r=ckerschb
2015-12-05 01:46:20 -08:00
Christoph Kerschbaumer
6d34f2a6f1
Bug 1225641 - Change default security flags within NetUtil.newChannel (r=sicking)
2015-11-17 17:35:30 -08:00
Blake Kaplan
f7f69b05e6
Bug 1171215 - Compute third-partyness in the loadinfo instead of nsIHttpChannelInternal so that other protocols correctly respect the third-party cookie pref. r=sicking/ckerschb
2015-11-30 13:25:29 -08:00
Valentin Gosu
19f42d7aaf
Bug 1222352 - Resource Timing - nextHopProtocol does not work in e10s r=nwgh
2015-11-24 13:42:47 +01:00
Phil Ringnalda
158aa5a061
Back out 9 changesets (bug 1214305) for e10s devtools browser_bug1045902_console_csp_ignore_reflected_xss_message.js failures
...
Backed out changeset 82929be36e95 (bug 1214305)
Backed out changeset e926606aefbf (bug 1214305)
Backed out changeset 226c83ca9a2a (bug 1214305)
Backed out changeset 88ab26108f2d (bug 1214305)
Backed out changeset 2e3e4f256d46 (bug 1214305)
Backed out changeset 347cd0f8f1e3 (bug 1214305)
Backed out changeset be072bba15fc (bug 1214305)
Backed out changeset 3b85acbe7be7 (bug 1214305)
Backed out changeset 49b930683c02 (bug 1214305)
2015-11-14 10:09:58 -08:00
Ehsan Akhgari
a59b309f54
Bug 1214305 - Part 7: Decide in the child process whether an intercepted channel should go through a secure upgrade; r=mcmanus
...
This is OK from a security perspective, since this decision only affects
whether the channel will be intercepted with the secure URI in the child
process. If the intercepting service worker decides to fall back to an
actual network request, we send the request to the parent process with
the original pre-upgrade URI, and the parent process will still be in
charge of whether a network visible HTTP request should be upgraded.
2015-11-02 11:27:00 -05:00
Ehsan Akhgari
2490afc624
Bug 1214305 - Part 6: Use a non-IPC redirect for synthesized upgraded responses to ensure the response URL is correctly propagated; r=mcmanus
2015-11-02 11:27:00 -05:00
Ben Kelly
735fce4eaa
Bug 1220678 Don't crash when DivertToParent() is called on an intercepted channel. r=jdm
2015-11-02 08:17:27 -08:00
Nate Hughes
26695fef92
Bug 1154309 - Add New Resource Timing Fields r=bz,hurley
2015-07-24 08:49:25 -07:00
Birunthan Mohanathas
ac37dec517
Bug 1219392 - Capitalize mozilla::unused to avoid conflicts. r=froydnj
2015-11-02 07:53:26 +02:00
Christoph Kerschbaumer
3b4ece9bd9
Bug 1194052 - Append to redirectchain before asyncopen() is called (r=sicking,mayhemer)
2015-10-31 15:22:01 -07:00
Christoph Kerschbaumer
fb42340904
Bug 1194052 - Add support for internal redirectchain to loadInfo (r=sicking)
2015-10-31 15:18:59 -07:00
Josh Matthews
38fc908caf
Bug 1173811 - Part 2: Propagate the response URL to intercepted channels when necessary (e10s). r=mayhemer,bkelly
2015-10-22 09:23:48 -04:00
Josh Matthews
2016b77367
Bug 1173811 - Part 1: Propagate the response URL to intercepted channels when necessary (non-e10s). r=mayhemer,bkelly
2015-10-22 09:23:39 -04:00
Phil Ringnalda
9b09c6aa10
Back out 2 changesets (bug 1173811) for test_synthesized_response.js timeouts
...
CLOSED TREE
Backed out changeset 56bc1314e660 (bug 1173811 )
Backed out changeset 0ad51d302ba9 (bug 1173811 )
2015-10-21 20:21:05 -07:00
Josh Matthews
9c357e8db7
Bug 1173811 - Part 2: Propagate the response URL to intercepted channels when necessary (e10s). r=mayhemer,bkelly
2015-10-21 00:05:40 -04:00
Josh Matthews
c9ea727e7e
Bug 1173811 - Part 1: Propagate the response URL to intercepted channels when necessary (non-e10s). r=mayhemer,bkelly
2015-10-21 00:05:40 -04:00
Nathan Froyd
4e6d8f6705
Bug 1207245 - part 6 - rename nsRefPtr<T> to RefPtr<T>; r=ehsan; a=Tomcat
...
The bulk of this commit was generated with a script, executed at the top
level of a typical source code checkout. The only non-machine-generated
part was modifying MFBT's moz.build to reflect the new naming.
CLOSED TREE makes big refactorings like this a piece of cake.
# The main substitution.
find . -name '*.cpp' -o -name '*.cc' -o -name '*.h' -o -name '*.mm' -o -name '*.idl'| \
xargs perl -p -i -e '
s/nsRefPtr\.h/RefPtr\.h/g; # handle includes
s/nsRefPtr ?</RefPtr</g; # handle declarations and variables
'
# Handle a special friend declaration in gfx/layers/AtomicRefCountedWithFinalize.h.
perl -p -i -e 's/::nsRefPtr;/::RefPtr;/' gfx/layers/AtomicRefCountedWithFinalize.h
# Handle nsRefPtr.h itself, a couple places that define constructors
# from nsRefPtr, and code generators specially. We do this here, rather
# than indiscriminantly s/nsRefPtr/RefPtr/, because that would rename
# things like nsRefPtrHashtable.
perl -p -i -e 's/nsRefPtr/RefPtr/g' \
mfbt/nsRefPtr.h \
xpcom/glue/nsCOMPtr.h \
xpcom/base/OwningNonNull.h \
ipc/ipdl/ipdl/lower.py \
ipc/ipdl/ipdl/builtin.py \
dom/bindings/Codegen.py \
python/lldbutils/lldbutils/utils.py
# In our indiscriminate substitution above, we renamed
# nsRefPtrGetterAddRefs, the class behind getter_AddRefs. Fix that up.
find . -name '*.cpp' -o -name '*.h' -o -name '*.idl' | \
xargs perl -p -i -e 's/nsRefPtrGetterAddRefs/RefPtrGetterAddRefs/g'
if [ -d .git ]; then
git mv mfbt/nsRefPtr.h mfbt/RefPtr.h
else
hg mv mfbt/nsRefPtr.h mfbt/RefPtr.h
fi
2015-10-18 01:24:48 -04:00
ff0792d13d
Bug 1197679 - If nsUnknownDecoder is involved in e10s DivertToParent can break. r=jduell
2015-10-11 18:13:09 +02:00
Ehsan Akhgari
0d4e3cbe03
Bug 1210077 - Null check gNeckoChild in HttpChannelChild::ResetInterception(); r=mcmanus
2015-10-07 23:25:25 -04:00
Ben Kelly
0a707c5c04
Bug 1210413 P1 Propagate new channel load flags from child to parent on redirect. r=jduell a=dveditz
2015-10-07 14:33:31 -07:00
Ben Kelly
e0399323ae
Bug 1210941 P12 Remove http channel's ForceNoIntercept. r=jduell IGNORE IDL
2015-10-06 06:37:07 -07:00
Ehsan Akhgari
9b10284f2d
Bug 1204581 - Add a deprecation warning for the usage of AppCache when service worker fetch interception is enabled; r=mcmanus,baku
2015-09-24 10:09:10 -04:00
Patrick McManus
13da862969
bug 1204614 - use h2 per stream flow control to deal with suspended channels r=hurley
2015-09-11 15:53:27 -04:00
Ben Kelly
a6f3471285
Bug 1203680 P7 Fix e10s handling on interceptions resulting in redirect status codes. r=jdm
2015-09-15 10:15:45 -07:00
Ehsan Akhgari
430a7875d1
Bug 1199049 - Part 7: Remove entries from the CORS preflight cache in the parent process when a CORS check in the child process fails; r=jduell
...
This is necessary because it's possible for one request triggered from
a child to start a CORS preflight in the parent process and get an entry
into the preflight cache, and then a CORS check for the same URL to fail
in the child process later on. In this case, we need to tell the parent
process to clear its CORS preflight cache entry.
2015-09-12 19:21:03 -04:00
Ehsan Akhgari
7be5c95a3e
Bug 1199049 - Part 6: Transfer the preflight parameters to the parent process in e10s mode; r=jduell
2015-09-12 19:21:01 -04:00
Ehsan Akhgari
68e82a9a17
Bug 815299 - Part 1: Add an API for setting an empty request header on an HTTP channel; r=dragana
2015-09-09 07:53:09 -04:00
Nigel Babu
9476f7e7c9
Backed out changeset 8a798c03d76c (bug 815299) for M4 bustage ON A CLOSED TREE
2015-09-09 09:12:41 +05:30
Ehsan Akhgari
c5831b5f29
Bug 815299 - Part 1: Add an API for setting an empty request header on an HTTP channel; r=dragana
2015-09-08 20:08:31 -04:00