Commit Graph

346 Commits

Author SHA1 Message Date
Shih-Chiang Chien
c147e8fc9f Bug 1320744 - Part 3, implement nsIThreadRetargetableRequest in HttpChannelChild. r=mayhemer
MozReview-Commit-ID: FyLXlkQde3h
2017-03-20 17:29:07 +08:00
Shih-Chiang Chien
3888d1d0a4 Bug 1320744 - Part 2, Allow ChannelEventQueue to perform flush on multiple threads. r=mayhemer
MozReview-Commit-ID: Egu2mvwFTUF
2017-03-18 11:36:08 +08:00
Shih-Chiang Chien
8e63e1090f Bug 1320744 - Part 1, make refcounter of HttpChannelChild thread-safe. r=mayhemer
MozReview-Commit-ID: 5Br1WLlpvcR
2017-02-07 17:25:45 +08:00
Thinker K.F. Li
813e00ba2a Bug 1323076 - Part 5: Necko with flag checking for TaskTracer. r=mayhemer 2017-03-22 21:53:00 +01:00
Kershaw Chang
acf1c25201 Bug 1343750 - Part1: Add an API to get Dispatcher from nsILoadInfo, r=mayhemer 2017-03-23 23:31:00 +01:00
Valentin Gosu
c3bd7bfa12 Bug 1341343 - Make sure the channel returns the correct contentLength for alt-data without saving it to the metadata r=michal
MozReview-Commit-ID: 1pXspJwLfJa
* * *
[mq]: fixing.patch

MozReview-Commit-ID: KKS2x2aeHY3
2017-03-13 12:06:55 +01:00
Valentin Gosu
d44e39b190 Bug 1341343 - Don't send AltDataOutputStreamConstructor IPC message if mIPCOpen is false r=mayhemer,michal
MozReview-Commit-ID: 2cVpB2HOgSG
2017-03-13 12:06:52 +01:00
Kershaw Chang
efd55bce36 Bug 1326339 - Store top level outer content window id in http transaction and connMgr. r=mayhemer 2017-03-09 02:55:00 -05:00
Wei-Cheng Pan
60a2861056 Bug 1310127 - Part 4: Use MOZ_MUST_USE in netwerk/protocol/http r=mcmanus
This patch contains some changes that may alter control flows.

MozReview-Commit-ID: Kcc2DWJZ8L5
2016-12-28 14:43:47 +08:00
Wei-Cheng Pan
9f134bdbf1 Bug 1310127 - Part 3: Use MOZ_MUST_USE in netwerk/protocol/http r=mcmanus
Add assertions.

MozReview-Commit-ID: DPvgKzVr3ip
2017-01-12 17:48:45 +08:00
Wei-Cheng Pan
f9654c1dca Bug 1310127 - Part 2: Use MOZ_MUST_USE in netwerk/protocol/http r=Cykesiopka,mcmanus
Log failures or just ignore them, no control flow change.

MozReview-Commit-ID: D748DEjl3Fv
2016-12-27 19:05:13 +08:00
Patrick McManus
b282fad49d Bug 1340655 - remove h1 pipeline support r=mayhemer 2017-02-17 15:35:37 -05:00
Sebastian Hengst
0db5f85cf8 Backed out changeset 379093669b39 (bug 1340655) for warning as err.or at nsHttpConnection.cpp(875). r=backout on a CLOSED TREE 2017-03-01 20:20:57 +01:00
Patrick McManus
62881745c6 Bug 1340655 - remove h1 pipeline support r=mayhemer
HTTP/1.1 pipelines have been subsumed by the more effective mux of spdy, h2, and soon quic.

The feature was never able to overcome the limitations of HoL blocking
and TCP reset, and their impact on performance and reliability.

Fundamentally mux is the only way we should be approaching that problem.

The massive amount of code - mostly heuristics to try and deal with
the HoL problem (by classifying things onto different transactions,
timers for broken servers, etc..) has become a maintenance burden with
minimal value given the default off state of the feature.

h2 is the new (working) strategy.
2017-02-17 15:35:37 -05:00
Thomas Nguyen
6ca9c778d6 Bug 1288633 - Add more information when an URL matches Safe Browsing list. r=dragana,francois
MozReview-Commit-ID: 6u0dUOB838F
2017-02-21 09:46:36 +08:00
Jonathan Hao
585dbfd246 Bug 1323644 - Isolate the HSTS and HPKP storage by first party domain (Necko) r=ckerschb
MozReview-Commit-ID: 6DFPXTXoykc
2017-02-14 10:29:41 +08:00
Tom Tromey
a4b717ab39 Bug 1060419 - make log_print use Printf.h, r=froydnj
MozReview-Commit-ID: BIZ1GQEZ1vs
2016-12-15 20:16:31 -07:00
Shih-Chiang Chien
5371bc5f02 Bug 1338096 - correct the data type used in PHttpChannel.SetPriority(). r=mayhemer
MozReview-Commit-ID: k5paB7XsTV
2017-02-09 17:28:54 +08:00
Shih-Chiang Chien
6c91df26cc Bug 1325915 - Part 2, update comment for reseting event target of event queue after the completion of ServiceWorker interception. r=mayhemer
MozReview-Commit-ID: Dc2TbCwQfpO
2017-02-07 16:56:06 +08:00
Shih-Chiang Chien
6efc132f81 Bug 1325915 - Part 1, derive transportStatus in HttpChannelParent ODA and derive progress/progressMax in child side. r=mayhemer
MozReview-Commit-ID: 41qlyHKMSFm
2017-02-02 15:20:04 +08:00
Valentin Gosu
7df4f16ff1 Bug 1321878 - Disable diagnostic assert and make test less racy r=me
MozReview-Commit-ID: LKiseNvd7t2
2017-02-02 15:03:32 +01:00
Ben Kelly
057031e272 Bug 1321878 P1 Don't exclude child process and IPC transit time from Performance API network timings. r=mayhemer
MozReview-Commit-ID: 4JVFq40YvvF
2016-12-08 14:56:00 +01:00
Wes Kocher
958b373ea0 Backed out 3 changesets (bug 1321878) for wpt lint failures a=backout
Backed out changeset 7259adb4d564 (bug 1321878)
Backed out changeset 745f2862bc05 (bug 1321878)
Backed out changeset ea9c1598f049 (bug 1321878)

MozReview-Commit-ID: 8kfwt1SNoXQ
2017-02-01 16:49:44 -08:00
Valentin Gosu
92fd4772c8 Bug 1321878 - Disable diagnostic assert and make test less racy r=me
MozReview-Commit-ID: LKiseNvd7t2
2017-02-02 01:25:48 +01:00
Ben Kelly
4dc9ee63a1 Bug 1321878 P1 Don't exclude child process and IPC transit time from Performance API network timings. r=mayhemer
MozReview-Commit-ID: LWZNIoBZHUd
2016-12-08 14:56:00 +01:00
Wei-Cheng Pan
076b9bca8e Bug 1329911 - Fix incorrect releasing of POST data. r=mayhemer
This patch reverts bug 1264566 (part 3) and bug 1293765.

MozReview-Commit-ID: AsSxxAMGHvV
2017-01-13 17:33:36 +08:00
Ben Kelly
fdf0e340ec Backout efe8228d192b and e1b7a57826e0 (bug 1321878) r=me 2017-01-10 13:24:40 -08:00
Thomas Nguyen
20c9180890 Bug 1304623 - Create a pref to control the default referrer policy- part 2. r=mcmanus, r=bkelly
MozReview-Commit-ID: GEUDZ8UZAT5
2017-01-05 11:30:03 +08:00
Bill McCloskey
509599310e Bug 1318506 - Label HttpChannelChild actors with DocGroup/TabGroup (r=jduell)
This patch tries to figure out which DocGroup or TabGroup a network request
belongs to and then assign the IPC actor to that group. A DocGroup roughly
corresponds to a document and a TabGroup to a tab. Once the assignment is
made, all incoming IPC messages will be labeled with that DocGroup/TabGroup.

MozReview-Commit-ID: EzGCeGdREHl
2016-12-23 11:48:13 -08:00
Ehsan Akhgari
bbba4de2e9 Bug 1170190 - Part 3: Add tests for the e10s case too; r=mayhemer 2016-12-23 14:40:11 -05:00
Ehsan Akhgari
337e003709 Bug 1170190 - Part 2: Add the nsIHttpChannel::IsTrackingResource() API to query the channel's tracking annotation; r=mayhemer 2016-12-23 14:40:11 -05:00
Honza Bambas
8a9271d13f Bug 1312243 - Block authentication dialog pop-ups by cancling 3 of them in a row, r=Dolske+mcmanus 2016-12-16 03:42:00 +01:00
Ben Kelly
b052faa1d6 Bug 1321878 P1 Don't exclude child process and IPC transit time from Performance API network timings. r=mayhemer 2016-12-14 19:42:08 -08:00
Thinker K.F. Li
b11f188442 Bug 1319669 - Handle TaskTracer at STS thread and Cache thread. r=honzab 2016-12-09 14:09:00 -05:00
Patrick McManus
1889ab84d2 Bug 1321783 - Make updater be networking conservative r=dkeeler r=rstrong r=dragana 2016-12-02 16:49:23 -05:00
Kan-Ru Chen
1b9dd22e2d Bug 1314254 - Add mozilla::ipc::IPCResult type and convert IPDL handlers to use new return type. r=billm
We will use the new type for the generated IPDL message handler
prototype to make sure correct error handling method is called.

MozReview-Commit-ID: AzVbApxFGZ0
2016-11-15 04:26:00 +01:00
Thomas Nguyen
5e424350fb Bug 1264792 - Update request'referrer policy when redirect.r=bkelly,dragana.
MozReview-Commit-ID: 3V6W0fuRomZ
2016-11-14 15:15:32 +08:00
Gerald Squelart
9a3fb4229e Bug 1316432 - Fix nsCOMPtr constructions&assignments from 0 - r=froydnj
Giving '0' (literal zero) to nsCOMPtr is now ambiguous, as both
nsCOMPtr(decltype(nullptr)) and nsCOMPtr(T*) could be used.
In any case, our coding standards mandate the use of 'nullptr' for pointers.
So I'm changing all zeroes into nullptr's where necessary.

MozReview-Commit-ID: LXiZTu87Ck6
2016-11-10 14:11:27 +11:00
Valentin Gosu
3149a2f558 Bug 1313740 - Handle null mNewChannel in OverrideWithSynthesizedResponse r=jdm
MozReview-Commit-ID: 702H0eJKdx1
2016-11-06 23:15:51 +01:00
Valentin Gosu
1b4f235b22 Bug 1294719 - Make sure HttpChannelParent stops sending IPC messages before calling Send__delete__() r=honzab
MozReview-Commit-ID: 4lb0gs32tOq
2016-10-28 04:30:58 +02:00
Honza Bambas
9e9537d7f9 Bug 1312646 - Carry ChooseApplicationCache flag from child after redirect callback is done. r=jduell 2016-10-27 06:13:00 -04:00
Josh Matthews
c7c2e5955a Bug 1277681 - Send HTTP request bodies in chunks. r=mayhemer 2016-09-28 18:38:26 -04:00
Valentin Gosu
627f2d36fe Bug 1302400 - Set docshell UA override for redirected channels in the child r=mcmanus
MozReview-Commit-ID: 3rmoAfpvml0
2016-10-13 15:50:50 +02:00
Tim Huang
91e4a3505d Bug 1277803 - Part 4 : Make the NS_CompareLoadInfoAndLoadContext() skiping test if the request is the favicon loading from the XUL image. r=honzab 2016-10-13 15:43:59 +08:00
Wes Kocher
85edded572 Backed out 8 changesets (bug 1277803) for browser-chrome test failures a=backout
Backed out changeset 477890efdb88 (bug 1277803)
Backed out changeset 49da326bfe68 (bug 1277803)
Backed out changeset 2d17a40a9077 (bug 1277803)
Backed out changeset b1cb0a195ca1 (bug 1277803)
Backed out changeset c7d82459d152 (bug 1277803)
Backed out changeset 3be9a06248af (bug 1277803)
Backed out changeset 8d119ca96999 (bug 1277803)
Backed out changeset be767a6f7ecd (bug 1277803)
2016-10-12 14:26:00 -07:00
Tim Huang
b35f331a1c Bug 1277803 - Part 4 : Make the NS_CompareLoadInfoAndLoadContext() skiping test if the request is the favicon loading from the XUL image. r=honzab 2016-10-12 17:32:08 +08:00
James Andreou
1e947fec6c Bug 1282124 - Remove nsILoadInfo.usePrivateBrowsing and the SEC_FORCE_PRIVATE_BROWSING flag; r=smaug,jryans 2016-09-27 16:56:44 -04:00
Kate McKinley
90c8afbeac Bug 1246540 - HSTS Priming Proof of Concept. r=ckerschb, r=mayhemer, r=jld, r=smaug, r=dkeeler, r=jmaher, p=ally
HSTS priming changes the order of mixed-content blocking and HSTS
upgrades, and adds a priming request to check if a mixed-content load is
accesible over HTTPS and the server supports upgrading via the
Strict-Transport-Security header.

Every call site that uses AsyncOpen2 passes through the mixed-content
blocker, and has a LoadInfo. If the mixed-content blocker marks the load as
needing HSTS priming, nsHttpChannel will build and send an HSTS priming
request on the same URI with the scheme upgraded to HTTPS. If the server
allows the upgrade, then channel performs an internal redirect to the HTTPS URI,
otherwise use the result of mixed-content blocker to allow or block the
load.

nsISiteSecurityService adds an optional boolean out parameter to
determine if the HSTS state is already cached for negative assertions.
If the host has been probed within the previous 24 hours, no HSTS
priming check will be sent.

MozReview-Commit-ID: ES1JruCtDdX
2016-09-27 11:27:00 -04:00
Valentin Gosu
02eefbf4c3 Bug 1231565 - (Part 2) Allow storing alternate data in the HTTP cache r=honzab
* Add PAltDataOutputStream.ipdl to be able to open an OutputStream to the cache entry in the child process
* AltDataOutputStreamChild/Parent are Main Thread only for now.
* Adds methods for reading and writing alt-data to nsICacheInfoChannel.idl
* Keep a ref of the cache entry after OnStopRequest in case the consumer tries to open the alt-data output stream

MozReview-Commit-ID: jlraDI97Hg
2016-04-11 05:17:02 +02:00
Josh Matthews
b4670ec700 Bug 1300464 - Avoid overriding security info with null. r=orange 2016-09-23 13:04:33 -04:00