d8a065719d
Bug 1301407 - Ensure nss initialized during nsHttpHandler initialization. r=mcmanus, r=keeler
2016-10-25 10:43:00 -04:00
Yoshi Huang
1221944376
Bug 1308938: skip check for about: pages. r=baku
2016-10-19 15:16:34 +08:00
Valentin Gosu
69e93335ce
Bug 1307491 - (Part 1) Remove support for per-app-offline in netwerk/ [nukeb2g] r=bagder
...
* * *
Bug 1307491 - Remove support for per-app-offline [nukeb2g] r=bagder
MozReview-Commit-ID: FoweWBv9QyE
2016-10-17 03:54:46 +02:00
Tim Huang
91e4a3505d
Bug 1277803 - Part 4 : Make the NS_CompareLoadInfoAndLoadContext() skiping test if the request is the favicon loading from the XUL image. r=honzab
2016-10-13 15:43:59 +08:00
Wes Kocher
85edded572
Backed out 8 changesets (bug 1277803) for browser-chrome test failures a=backout
...
Backed out changeset 477890efdb88 (bug 1277803)
Backed out changeset 49da326bfe68 (bug 1277803)
Backed out changeset 2d17a40a9077 (bug 1277803)
Backed out changeset b1cb0a195ca1 (bug 1277803)
Backed out changeset c7d82459d152 (bug 1277803)
Backed out changeset 3be9a06248af (bug 1277803)
Backed out changeset 8d119ca96999 (bug 1277803)
Backed out changeset be767a6f7ecd (bug 1277803)
2016-10-12 14:26:00 -07:00
Tim Huang
b35f331a1c
Bug 1277803 - Part 4 : Make the NS_CompareLoadInfoAndLoadContext() skiping test if the request is the favicon loading from the XUL image. r=honzab
2016-10-12 17:32:08 +08:00
James Andreou
1e947fec6c
Bug 1282124 - Remove nsILoadInfo.usePrivateBrowsing and the SEC_FORCE_PRIVATE_BROWSING flag; r=smaug,jryans
2016-09-27 16:56:44 -04:00
Kate McKinley
90c8afbeac
Bug 1246540 - HSTS Priming Proof of Concept. r=ckerschb, r=mayhemer, r=jld, r=smaug, r=dkeeler, r=jmaher, p=ally
...
HSTS priming changes the order of mixed-content blocking and HSTS
upgrades, and adds a priming request to check if a mixed-content load is
accesible over HTTPS and the server supports upgrading via the
Strict-Transport-Security header.
Every call site that uses AsyncOpen2 passes through the mixed-content
blocker, and has a LoadInfo. If the mixed-content blocker marks the load as
needing HSTS priming, nsHttpChannel will build and send an HSTS priming
request on the same URI with the scheme upgraded to HTTPS. If the server
allows the upgrade, then channel performs an internal redirect to the HTTPS URI,
otherwise use the result of mixed-content blocker to allow or block the
load.
nsISiteSecurityService adds an optional boolean out parameter to
determine if the HSTS state is already cached for negative assertions.
If the host has been probed within the previous 24 hours, no HSTS
priming check will be sent.
MozReview-Commit-ID: ES1JruCtDdX
2016-09-27 11:27:00 -04:00
Ehsan Akhgari
2e75a8620c
Bug 1340712 - Remove MOZILLA_INTERNAL_API ifdef's from nsNetUtil.cpp; r=mcmanus
...
The C++ code inside libxul always uses the internal API.
2017-02-18 09:41:52 -05:00
Nicholas Nethercote
9adec6015b
Bug 1297961 (part 2) - Use nsIURI::GetSpecOrDefault() for comparisons to fixed URIs. r=hurley.
2016-08-26 16:02:32 +10:00
Nicholas Nethercote
62b6b0fce6
Bug 1297961 (part 1) - Introduce nsURI::GetSpecOrDefault(). r=hurley.
...
This function is an infallible alternative to nsIURI::GetSpec(). It's useful
when it's appropriate to handle a GetSpec() failure with a failure string, e.g.
for log/warning/error messages. It allows code like this:
nsAutoCString spec;
uri->GetSpec(spec);
printf("uri: %s", spec.get());
to be changed to this:
printf("uri: %s", uri->GetSpecOrDefault().get());
This introduces a slight behavioural change. Previously, if GetSpec() failed,
an empty string would be used here. Now, "[nsIURI::GetSpec failed]" will be
produced instead. In most cases this failure string will make for a clearer
log/warning/error message than the empty string.
* * *
Bug 1297961 (part 1b) - More GetSpecOrDefault() additions. r=hurley.
I will fold this into part 1 before landing.
2016-08-26 16:02:31 +10:00
Tim Huang
72d82b415d
Bug 1291652 - Part 2: Make sure that we fetch originAttributes from the nsIloadInfo, but not from the nsIloadContext. r=mayhemer
2016-08-23 07:20:00 -04:00
Yoshi Huang
94d19b5783
Bug 1291652 - Part 1: Return origin attributes from nsILoadInfo in NS_GetOriginAttributes. r=sicking
2016-08-22 08:42:00 -04:00
Nicholas Nethercote
1cef4f427a
Bug 1294620 - Use infallible XPIDL attribute getters more. r=erahm.
...
This makes a lot of code more compact, and also avoids some redundant nsresult
checks.
The patch also removes a handful of redundant checks on infallible setters.
2016-08-12 15:19:29 +10:00
Yoshi Huang
932b2340e4
Bug 1292450 - Check mPrivateBrowsingId is correct in LoadInfo and LoadContext. r=smaug, ehsan
...
Make sure the mPrivateBrowsingId of Origin Attributes is consistent
between LoadInfo and LoadContext.
For chrome docshell, its mPrivateBrowsingId remains 0 even if its
UserPrivateBrowsing() is true (bug 1278664). So we sync the
mPrivateBrowsingId field in LoadInfo in the same way.
2016-08-15 19:03:24 +08:00
Yoshi Huang
e49d36ad7f
Bug 1264231 - Part 2: skip checking for about:newtab and about:sync-tabs r=sicking
2016-08-05 19:44:57 +08:00
Chris Peterson
6c0f810682
Bug 1277106 - Part 2: Expand MOZ_UTF16() strings to u"" string literals. r=Waldo
2016-07-20 22:03:25 -07:00
Christoph Kerschbaumer
10f5cbac7e
Bug 1240193 - Skip TYPE_DOCUMENT assertions for loads initiated by JS tests (r=tanvi)
2016-06-29 12:59:45 +02:00
Christoph Kerschbaumer
9707ba1a13
Bug 1282554 - Provide helper function to check if channel can be openen using open2() and asyncOpen2() r=bholly
2016-06-28 19:03:56 +02:00
Tim Huang
c58138f510
Bug 1270678 - Part 1: Make the NS_GetOriginAttributes() acquires originAttributes from the loadInfo when loadContext is not available. r=valentin
2016-06-06 01:22:00 +02:00
James Andreou
ebb9105232
Bug 1269361 - Add mPrivateBrowsingId to OriginAttributes r=ehsan,jdm
2016-06-02 17:03:11 -04:00
Christoph Kerschbaumer
fb9b394b86
Bug 1272320 - Convert NS_ImplementChannelOpen to support asyncOpen2() r=mcmanus
2016-05-12 19:38:59 +02:00
Nicholas Nethercote
6e6467ffa0
Bug 1267912 - Rename nsNetUtil.inl as nsNetUtilInlines.h. r=valentin.
2016-04-27 14:20:31 +10:00
Dragana Damjanovic
554915156b
Bug 1125916 - Check whether loadInfo and loadContext match. r=sicking, r=jduell
2016-04-13 10:23:26 +02:00
Tanvi Vyas
1ff728e62c
Bug 1105556 - test fixes. r=sicking, ckerschb
2016-04-13 16:30:33 -07:00
Daniel Holbert
ddef67330c
Bug 1249450 part 1: Move GetSecureUpgradedURI from HttpBaseChannel to nsNetUtil. r=mcmanus
2016-03-10 15:23:45 -08:00
Blake Kaplan
bd476fb1d1
Bug 1113196 - Pass a sane set of parameters to loadinfo for top-level loads in e10s. r=sicking
2016-03-04 08:54:07 -08:00
J. Ryan Stinnett
43eb79b373
Bug 1238160 - Rename nsILoadContext::GetIsInBrowserElement. r=smaug,mayhemer
...
This change renames nsILoadContext::GetIsInBrowserElement to
GetIsInIsolatedMozBrowserElement. Other methods that pass these values around
also have name changes.
Tokens such as "isInBrowserElement" have previously been serialized into cache
keys, used as DB column names, stored in app registries, etc. No changes are
made to any serialization formats. Only runtime method and variable names are
updated.
No behavior changes are made in this patch, so some renamed methods may have
nonsensical implementations. These are corrected in subsequent patches
focused on behavior.
MozReview-Commit-ID: CUttXANQjSv
2016-03-02 10:35:56 -06:00
J. Ryan Stinnett
f6d23d0dde
Bug 1238160 - Rename OriginAttributes.mInBrowser and associated methods. r=bz,mayhemer
...
This change renames OriginAttributes.mInBrowser to mInIsolatedMozBrowser and
nsIPrincipal::GetIsInBrowserElement to GetIsInIsolatedMozBrowserElement. Other
methods that pass these values around also have name changes.
Tokens such as "inBrowser" have previously been serialized into cache keys, used
as DB column names, stored in app registries, etc. No changes are made to any
serialization formats. Only runtime method and variable names are updated.
No behavior changes are made in this patch, so some renamed methods may have
nonsensical implementations. These are corrected in subsequent patches
focused on behavior.
MozReview-Commit-ID: 66HfMlsXFLs
2016-03-02 10:35:56 -06:00
Daniel Holbert
440d815e95
Bug 1248452: Rewrite NS_IsHSTSUpgradeRedirect to use HttpBaseChannel::GetSecureUpgradedURI. r=jduell
2016-02-17 19:03:41 -08:00
Honza Bambas
e176d53a4e
Bug 451081 - Introduce ORIGIN_IS_FULL_SPEC protocol handler flag, r=bz+standard8 IGNORE IDL
2016-01-20 20:02:23 +01:00
Christoph Kerschbaumer
fe3f1cdf0a
Bug 1233098 - Refactor CSP upgrade insecure requests flag within loadInfo (r=sicking)
2016-01-14 12:38:15 -08:00
Nigel Babu
282b0d0ae0
Backed out changeset f51b921e1ccf (bug 1233098) for browser-chrome bustage
2016-01-14 08:04:37 +05:30
Christoph Kerschbaumer
be2601f810
Bug 1233098 - Refactor CSP upgrade insecure requests flag within loadInfo (r=sicking)
2016-01-13 15:51:43 -08:00
Patrick McManus
c07974e685
Bug 1238290 - fix bad necko deps on unified_sources r=valentin.gosu
...
---
netwerk/base/ARefBase.h | 2 ++
netwerk/base/CaptivePortalService.cpp | 1 +
netwerk/base/CaptivePortalService.h | 1 +
netwerk/base/EventTokenBucket.cpp | 4 +++-
netwerk/base/LoadContextInfo.cpp | 3 +++
netwerk/base/LoadInfo.cpp | 3 +++
netwerk/base/MemoryDownloader.cpp | 1 +
netwerk/base/Predictor.cpp | 1 +
netwerk/base/RedirectChannelRegistrar.h | 1 +
netwerk/base/nsBaseChannel.cpp | 1 +
netwerk/base/nsChannelClassifier.cpp | 1 +
netwerk/base/nsDirectoryIndexStream.cpp | 3 ++-
netwerk/base/nsDownloader.cpp | 1 +
netwerk/base/nsIOService.cpp | 1 +
netwerk/base/nsIncrementalDownload.cpp | 3 +++
netwerk/base/nsNetUtil.cpp | 4 ++++
netwerk/base/nsNetUtil.h | 1 +
netwerk/base/nsProtocolProxyService.cpp | 1 +
netwerk/base/nsSecCheckWrapChannel.cpp | 2 ++
netwerk/base/nsUDPSocket.cpp | 4 +++-
netwerk/cache/nsDiskCacheBinding.cpp | 2 +-
netwerk/cache/nsDiskCacheDeviceSQL.cpp | 2 ++
netwerk/cache/nsMemoryCacheDevice.cpp | 2 +-
netwerk/cache2/CacheFileUtils.cpp | 2 ++
netwerk/cache2/CacheStorageService.h | 1 +
netwerk/ipc/NeckoParent.cpp | 1 +
netwerk/ipc/RemoteOpenFileChild.cpp | 1 +
netwerk/protocol/about/nsAboutBloat.cpp | 1 +
netwerk/protocol/about/nsAboutCacheEntry.cpp | 1 +
netwerk/protocol/about/nsAboutProtocolHandler.cpp | 1 +
netwerk/protocol/data/DataChannelParent.cpp | 1 +
netwerk/protocol/file/nsFileProtocolHandler.cpp | 1 +
netwerk/protocol/ftp/FTPChannelParent.cpp | 2 ++
netwerk/protocol/ftp/FTPChannelParent.h | 1 +
netwerk/protocol/ftp/nsFtpConnectionThread.cpp | 1 +
netwerk/protocol/ftp/nsFtpProtocolHandler.h | 1 +
netwerk/protocol/http/Http2Compression.cpp | 1 +
netwerk/protocol/http/Http2Session.cpp | 1 +
netwerk/protocol/http/Http2Stream.h | 2 ++
netwerk/protocol/http/HttpBaseChannel.cpp | 4 ++++
netwerk/protocol/http/HttpBaseChannel.h | 1 +
netwerk/protocol/http/HttpChannelChild.cpp | 25 ++--------------------
netwerk/protocol/http/HttpChannelChild.h | 24 +++++++++++++++++++++
netwerk/protocol/http/HttpChannelParent.cpp | 1 +
netwerk/protocol/http/HttpChannelParent.h | 1 +
.../protocol/http/HttpChannelParentListener.cpp | 1 +
netwerk/protocol/http/HttpChannelParentListener.h | 1 +
netwerk/protocol/http/InterceptedChannel.cpp | 1 +
netwerk/protocol/http/NullHttpChannel.cpp | 1 +
netwerk/protocol/http/NullHttpTransaction.cpp | 1 +
netwerk/protocol/http/PackagedAppService.cpp | 14 ++++++++++--
netwerk/protocol/http/PackagedAppService.h | 4 +++-
netwerk/protocol/http/PackagedAppVerifier.cpp | 1 +
netwerk/protocol/http/nsCORSListenerProxy.cpp | 2 +-
netwerk/protocol/http/nsHttpBasicAuth.cpp | 1 +
netwerk/protocol/http/nsHttpChannel.cpp | 2 ++
netwerk/protocol/http/nsHttpChunkedDecoder.cpp | 1 +
netwerk/protocol/http/nsHttpConnectionInfo.cpp | 2 ++
netwerk/protocol/http/nsHttpConnectionMgr.cpp | 1 +
netwerk/protocol/http/nsHttpDigestAuth.cpp | 1 +
netwerk/protocol/viewsource/nsViewSourceHandler.h | 4 ++++
.../protocol/websocket/BaseWebSocketChannel.cpp | 1 +
.../websocket/WebSocketEventListenerParent.cpp | 1 +
.../protocol/websocket/WebSocketEventService.cpp | 3 +++
netwerk/protocol/websocket/WebSocketFrame.cpp | 2 ++
netwerk/protocol/wyciwyg/nsWyciwygChannel.cpp | 1 +
.../protocol/wyciwyg/nsWyciwygProtocolHandler.cpp | 1 +
netwerk/streamconv/converters/mozTXTToHTMLConv.cpp | 1 +
.../streamconv/converters/nsFTPDirListingConv.cpp | 1 +
.../streamconv/converters/nsHTTPCompressConv.cpp | 2 ++
netwerk/streamconv/converters/nsHTTPCompressConv.h | 1 +
netwerk/streamconv/converters/nsIndexedToHTML.cpp | 1 +
netwerk/streamconv/converters/nsMultiMixedConv.cpp | 2 ++
netwerk/streamconv/converters/nsTXTToHTMLConv.cpp | 2 ++
netwerk/streamconv/converters/nsUnknownDecoder.cpp | 2 ++
75 files changed, 147 insertions(+), 32 deletions(-)
2016-01-08 20:20:50 -05:00
Ehsan Akhgari
d51f33c21b
Bug 1214305 - Part 1: Refactor the logic for querying whether a connection should go through a secure upgrade into NS_ShouldSecureUpgrade; r=mcmanus
2016-01-04 16:30:02 -05:00
Wes Kocher
3ed0d4d1fb
Backed out 10 changesets (bug 1214305) for leaks on linux debug m-e10s(bc7)
...
Backed out changeset 1f482566235a (bug 1214305)
Backed out changeset 001b31489756 (bug 1214305)
Backed out changeset 4e94d2088219 (bug 1214305)
Backed out changeset fba4a5bcea41 (bug 1214305)
Backed out changeset 100f8e249007 (bug 1214305)
Backed out changeset a59c453192dc (bug 1214305)
Backed out changeset 2daa86fc1fb9 (bug 1214305)
Backed out changeset c04efb57b0ed (bug 1214305)
Backed out changeset 52046e843c60 (bug 1214305)
Backed out changeset ac4fd6615828 (bug 1214305)
2016-01-04 10:34:24 -08:00
Ehsan Akhgari
f4f097cf25
Bug 1214305 - Part 1: Refactor the logic for querying whether a connection should go through a secure upgrade into NS_ShouldSecureUpgrade; r=mcmanus
2016-01-04 09:52:37 -05:00
Jason Duell
feb53bcc72
Bug 1199841 - Restructure private browsing to remember status after OnStopRequest r=jdm
2015-12-30 17:51:21 -05:00
Gian-Carlo Pascutto
b8b94b4d65
Bug 1211090 - Don't fail to open databases if we can't do buffered IO. r=froydnj
2015-12-21 17:51:03 +01:00
Jonas Sicking
2d5d18d181
Bug 1226909 part 4: Make AsyncOpen2 set taining information on channels. Use this information in XHR and fetch(). r=bkelly
2015-12-06 18:33:15 -05:00
Sebastian Hengst
cdf4286868
Backed out changeset 09d64535bcda (bug 1216687), a7f1a289dd78, 4dbf06183e6c, 26318a5e3006, 9ae2af3cf86d (bug 1226909) for M(1,2,5) oranges. r=backout
2015-12-05 16:34:47 +01:00
Jonas Sicking
43dffbee2a
Bug 1226909 part 4: Make AsyncOpen2 set taining information on channels. Use this information in XHR and fetch(). r=bkelly
2015-12-05 01:46:20 -08:00
Yury Delendik
e2f6e193ca
Bug 1218029 - Adds IncrementalStreamLoader interface stubs. r=djvj
2015-11-30 08:54:11 -06:00
Yoshi Huang
47c69d1edb
Bug 1209162 - Create OriginAttributes subtypes. IGNORE IDL r=sicking.
2015-11-03 09:50:54 +08:00
Christoph Kerschbaumer
e4ac27d8ff
Bug 1222297 - Use channel->Open2() in netwerk/base/nsNetUtil.cpp (r=sicking)
2015-11-08 18:54:38 -08:00
Christoph Kerschbaumer
22059fcb29
Bug 1206964 - Use channel->AsyncOpen2() in netwerk/base/nsNetUtil.cpp (r=sicking)
2015-11-02 17:31:08 -08:00
Christoph Kerschbaumer
5733d2e57b
Bug 1204983 - Allow about: pages to load remote content (r=bholley,bz,florian,dragana)
2015-10-09 22:03:27 -07:00
Wes Kocher
71442eb6eb
Backed out 3 changesets (bug 1204983) for talos(g2) failures
...
Backed out changeset 00c07b02c8a8 (bug 1204983)
Backed out changeset a4879b180d2d (bug 1204983)
Backed out changeset 38b6f878608a (bug 1204983)
2015-10-19 16:09:33 -07:00
Christoph Kerschbaumer
930e6eff12
Bug 1204983 - Allow about: pages to load remote content (r=bholley,bz,florian,dragana)
2015-10-09 22:03:27 -07:00