Ehsan Akhgari
9b10284f2d
Bug 1204581 - Add a deprecation warning for the usage of AppCache when service worker fetch interception is enabled; r=mcmanus,baku
2015-09-24 10:09:10 -04:00
Andrea Marchesini
a2ded5aeff
Bug 1163545 - Bypass AppCache completely when Service Workers supported & registered, r=jdm
2015-09-18 10:18:38 +08:00
Ehsan Akhgari
f79f2e437c
Bug 1199049 - Part 14: Cancel the original channel in case a CORS preflight fails using AsyncAbort(); r=jduell
2015-09-12 19:21:17 -04:00
Ehsan Akhgari
5087272ade
Bug 1199049 - Part 13: Cancel the preflight channel if the original channel gets canceled when a CORS preflight is in progress; r=jduell,sicking
2015-09-12 19:21:15 -04:00
Ehsan Akhgari
5ec75d3b4f
Bug 1199049 - Part 12: Move the calls on the listener object to OnPreflightFailed(); r=jduell
2015-09-12 19:21:13 -04:00
Ehsan Akhgari
03c38e6de5
Bug 1199049 - Part 11: Make it impossible to start CORS preflights from outside of Necko; r=jduell,ckerschb,sicking
2015-09-12 19:21:11 -04:00
Ehsan Akhgari
6892bdc874
Bug 1199049 - Part 4: Perform CORS preflights from nsHttpChannel before connecting to the network; r=jduell,ckerschb,sicking
2015-09-12 19:20:58 -04:00
Nikhil Marathe
4fad035dad
Bug 1167809 - Add skip size check flag to cache for use with ServiceWorkers. r=mayhemer
...
For non-e10s Service Worker, we use Cache entries to achieve interception.
While this is a temporary measure, the fact that cache enforces size limits on
cache entries (which make sense for the purpose it was designed) prevents large
files from being served via a Service Worker. This patch adds a skip size check
flag to CacheStorage that is relayed to CacheEntry and CacheFile. It is set to
false by default leading to normal cache behaviour.
The patch also adds nsICacheStorageService.synthesizedCacheStorage() that
retrieves a cache storage with this flag set to true, which is used by
nsHttpChannel in case of possible interception.
2015-09-03 16:05:42 -07:00
Kalpesh Krishna
22cb4eaaa7
Bug 1198387 - Remove use-cache preference and its references. r=mcmanus
2015-09-01 01:09:00 -04:00
Ben Kelly
98f587bd43
Bug 1184607 P10 Expose channel security info during e10s redirect. Support security info in redirecting interceptions. r=jduell
2015-08-31 14:26:30 -07:00
Nikhil Marathe
3d5fb839d0
Bug 1176988 - Patch 1 - Always hit cache irrespective of HTTP method if channel is being intercepted. r=jdm
2015-08-18 11:30:38 -07:00
Ehsan Akhgari
92f499f2e3
Bug 1194847 - Part 1: Make it possible to tell whether the response of a channel has been synthesized; r=michal
2015-08-25 21:26:14 -04:00
Valentin Gosu
d232257964
Bug 1196021 - Pass requesting channel to PackagedAppService::GetResource r=ckerschb
2015-08-25 03:06:24 +02:00
Valentin Gosu
912676341f
Bug 1196021 - Use asyncOpen2 in PackagedAppService r=ckerschb
2015-08-25 03:06:18 +02:00
Cykesiopka
d617cafaff
Bug 1195615 - Log a web console warning when a HPKP header is ignored due to a non-built in root cert. r=keeler
2015-08-20 14:33:29 -07:00
Josh Matthews
36ca41bfa2
Bug 1179399 - Add a flag to HttpBaseChannel indicating whether interception is occurring. r=mayhemer
...
Landed on a CLOSED TREE
2015-08-17 16:42:46 -04:00
Christoph Kerschbaumer
040351fa66
Bug 1193924 - Add assertion to AsyncOpen to make sure asyncOpen2() was called first when securityflags in loadInfo are set (r=sicking)
2015-08-12 21:36:33 -07:00
Ryan VanderMeulen
0618529665
Backed out changeset f99b27e40987 (bug 1193924) for B2G emulator bustage.
...
CLOSED TREE
2015-08-13 12:45:05 -04:00
Christoph Kerschbaumer
65f6f74176
Bug 1193924 - Add assertion to AsyncOpen to make sure asyncOpen2() was called first when securityflags in loadInfo are set (r=sicking)
2015-08-12 21:36:33 -07:00
Valentin Gosu
0000d9d38a
Bug 1187159 - Pass principal and flags from the requesting channel to the packaged app channel r=honzab
2015-08-10 11:21:57 +02:00
Sebastian Hengst
a0b3a0ab5a
$ hg backout -r 618c213ed8db -r 78a61d56adae -r ca1510a96cc6 -m "Backed out 618c213ed8db (bug 1190502) and 78a61d56adae, ca1510a96cc6 (bug 1187159) for Linux x64 asan M5 fail: LeakSanitizer | leak at mozilla::net::GetLoadContextInfo, mozilla::net::nsHttpChannel::BeginConnect, mozilla::net::nsHttpChannel::OnProxyAvailable. r=backout"
2015-08-08 11:08:13 +02:00
Valentin Gosu
bc846374e7
Bug 1187159 - Pass principal and flags from the requesting channel to the packaged app channel r=honzab
2015-08-08 07:11:56 +02:00
Francois Marier
2074ff80bf
Bug 1141352 - add a pairwise allowlist to tracking protection. r=gcp
2015-08-07 13:08:22 -07:00
Cykesiopka
e0dea71384
Bug 1124649 - Part 1 - Add specific error messages for various types of STS and PKP header failures. r=keeler,hurley
2015-08-05 07:51:00 +02:00
Patrick McManus
642fc8dd80
Bug 1191291 - convert nsHttpChannel::RetargetDeliveryTo warning to log r=michal.novotny
2015-08-05 09:09:48 -04:00
Patrick McManus
27620ad9f9
bug 1189692 - add telem for quic advertisements r=hurley
2015-07-31 05:43:24 -04:00
Nicholas Hurley
6455fd1745
No bug - Remove extra printf left over from bug 1127618. r=smaug
2015-08-03 14:14:39 -07:00
Nicholas Hurley
bb76d521d7
Bug 1127618 - make push caches work in e10s. r=mcmanus r=froydnj IGNORE IDL
2015-07-31 13:50:08 -07:00
Carsten "Tomcat" Book
ca308afdc0
Backed out changeset fb2a27db76bc (bug 1032254) for OS X Static Build Bustage on a CLOSED TREE
2015-07-31 07:57:50 +02:00
Valentin Gosu
e4fd4909fb
Bug 1032254 - Provide a way to pin resources in the http cache r=honzab
2015-07-30 11:40:00 +02:00
Honza Bambas
c18c05705f
Bug 1182487 - Don't try to write to HTTP cache entry in nsHttpChannel when entry is open for reading only. r=michal
2015-07-15 13:30:00 +02:00
Christoph Kerschbaumer
2ea46a230d
Bug 1143922 - Add AsyncOpen2 to nsIChannel and perform security checks when opening a channel - channel changes (r=mcmanus,sicking)
2015-05-15 13:21:20 -07:00
Christoph Kerschbaumer
c5c237c336
Bug 1175803 - Store redirect chain within loadInfo - part 2 (r=sicking,mayhemer)
2015-07-19 19:43:09 -07:00
Francois Marier
e345e8d34e
Bug 1180323 - Only look at TP table before cancelling speculative connections. r=gcp
2015-07-11 19:19:29 +02:00
Birunthan Mohanathas
a29151dc87
Bug 1182996 - Fix and add missing namespace comments. rs=ehsan
...
The bulk of this commit was generated by running:
run-clang-tidy.py \
-checks='-*,llvm-namespace-comment' \
-header-filter=^/.../mozilla-central/.* \
-fix
2015-07-13 08:25:42 -07:00
Christoph Kerschbaumer
f2ea467736
Bug 1139297 - Implement CSP upgrade-insecure-requests directive - netwerk changes (r=sworkman)
2015-07-10 09:15:17 -07:00
Emanuel Hoogeveen
b30abdc582
Bug 905127 - Part 1 - Make some functions from nsNetUtil not inline. r=jduell
2015-07-07 04:17:00 +02:00
Valentin Gosu
266cd764c0
Bug 1048131 - Make some network events trigger a captive portal recheck r=mcmanus
2014-10-14 00:35:51 +03:00
Carsten "Tomcat" Book
097d90283b
Backed out changeset 49f72333b407 (bug 1048131)
2015-07-03 14:25:56 +02:00
Valentin Gosu
0054b891e7
Bug 1048131 - Make some network events trigger a captive portal recheck r=mcmanus
2014-10-14 00:35:51 +03:00
Dragana Damjanovic
a02aa928e5
Bug 1170197 - If a channel is suspended in http-on-modify-request, it should not send any trafic untill resumed. r=mayhemer
2015-06-18 10:57:00 -04:00
Ehsan Akhgari
bc9a990ade
Bug 1173069 - Don't accumulate the cache hit telemetry for intercepted channels; r=mayhemer,jdm
...
These channels will always have a fake cache entry associated with them,
so they can skew our telemetry results once we ship service workers.
2015-06-30 13:24:10 -04:00
Patrick McManus
aa986ed04d
Bug 1175545 - Dont process alt-svc on 421 r=hurley
2015-06-19 08:32:05 -04:00
Valentin Gosu
9e2e80c211
Bug 1172697 - URLs containing !// in the query or hash should not be handled as packaged app resources r=mcmanus
2015-06-09 02:20:02 +03:00
Valentin Gosu
683c37b61c
Bug 1142083 - IDN Unicode domain redirect is broken r=mcmanus
2015-06-18 16:05:21 +03:00
Ben Kelly
f38689ba99
Bug 1172884 P1 Properly decode body when intercepted response redirects. r=jduell
2015-06-12 07:20:21 -07:00
Phil Ringnalda
7fb3631f9f
Backed out 3 changesets (bug 1172884, bug 1169819) for OS X timeouts in browser_force_refresh.js in bc3
...
CLOSED TREE
Backed out changeset 7b23ff6ac3a2 (bug 1169819)
Backed out changeset 1434730c0e19 (bug 1172884)
Backed out changeset 17d6ecf1b4ec (bug 1172884)
2015-06-11 20:57:24 -07:00
Ben Kelly
5eb36b1933
Bug 1172884 P1 Properly decode body when intercepted response redirects. r=jduell
2015-06-11 18:29:28 -07:00
Wes Kocher
733d8cb4c9
Backed out changeset 6231a72d0557 (bug 1172884) for being the wrong patches landed a=backout
2015-06-11 17:57:51 -07:00
Ben Kelly
9def975899
Bug 1172884 P1 Properly decode body when intercepted response redirects. r=mayhemer a=kwierso
2015-06-11 17:52:01 -07:00