Nicholas Nethercote
025461bde7
Bug 1390428 (part 1) - Remove many nsXPIDLCString local variables. r=erahm.
...
These are all easy cases where an nsXPIDLCString local variable is set via
getter_Copies() and then is only used in ways that nsCStrings can also be used
(i.e. no null checks or implicit conversions to |char*|).
In every case the patch trivially replaces the nsXPIDLCString with an
nsCString. (Also, there are a couple of unused nsXPIDLCString variables that
the patch simply removes.)
2017-08-16 13:58:35 +10:00
Sajjad Arshad
404facfbbc
Bug 1388925 - Add an opaque flags to have a fine-grained control over TLS configurations. r=mcmanus, r=keeler
...
This flags is added in the http channel interface by which developers can control the TLS
connections from JavaScript code (e.g. Add-ons). Basically, all the changes accounted for
plumbing this TLS flags from JavaScript level to C++ code responsible for calling NSS
module. We also added a unit test to make sure that separate connections are created if we
use different tlsFlags. Basically we used a concrete set of flag values that covers the
edge cases and check the hashkey generated in the connection info.
--HG--
rename : netwerk/test/unit/test_separate_connections.js => netwerk/test/unit/test_tls_flags_separate_connections.js
2017-08-16 12:41:16 -07:00
Dragana Damjanovic dd.mozilla@gmail.com
23c8b30d23
Bug 1381282 - Change nsScriptErrorBase::InitWithWindowID so that it does not call GetSensitiveInfoHiddenSpec as much as now. r=bz r=valentin
2017-08-07 15:56:30 +02:00
Nicholas Nethercote
f941156987
Bug 1386600 - Change nsIStringBundle methods to return |AString| instead of |wstring|. r=emk,sr=dbaron.
...
This removes about 2/3 of the occurrences of nsXPIDLString in the tree. The
places where nsXPIDLStrings are null-checked are replaced with |rv| checks.
The patch also removes a couple of unused declarations from
nsIStringBundle.idl.
Note that nsStringBundle::GetStringFromNameHelper() was merged into
GetStringFromName(), because they both would have had the same signature.
--HG--
extra : rebase_source : ac40bc31c2a4997f2db0bd5069cc008757a2df6d
2017-08-04 14:40:52 +10:00
Masatoshi Kimura
866d87ee67
Bug 1361579 - Remove nsISimpleContentPolicy. r=Ehsan
...
MozReview-Commit-ID: BsjkGpTpe8I
--HG--
extra : rebase_source : 640807623fc70797932a0ee592b887d5c134b5f9
2017-08-03 17:50:00 +09:00
Masatoshi Kimura
8ed4a80a4e
Bug 1322874 - Get rid of nsIURI.originCharset. r=valentin.gosu
...
nsIURI.originCharset had two use cases:
1) Dealing with the spec-incompliant feature of escapes in the hash
(reference) part of the URL.
2) For UI display of non-UTF-8 URLs.
For hash part handling, we use the document charset instead. For pretty
display of query strings on legacy-encoded pages, we no longer care to them
(see bug 817374 comment 18).
Also, the URL Standard has no concept of "origin charset". This patch
removes nsIURI.originCharset for reducing complexity and spec compliance.
MozReview-Commit-ID: 3tHd0VCWSqF
--HG--
extra : rebase_source : b2caa01f75e5dd26078a7679fd7caa319a65af14
2017-08-02 20:43:30 +09:00
Masatoshi Kimura
f143125cc2
Bug 1326520 - Rename nsIURI.path to pathQueryRef. r=valentin.gosu
...
MozReview-Commit-ID: DqJdTGopR9G
--HG--
extra : rebase_source : e8c9eb03468c075b79013b6e0bd8b367229c24cd
2017-07-29 20:50:21 +09:00
Shih-Chiang Chien
da2e0b2b35
Bug 1382380 - ensure mListener/mListenerContext/mCompressListener is released on main thread. r=dragana
...
During abnormal shutdown, HttpChannelChild might be released on STS thread. However, not all stream listener
that attached to the HTTP channel is thread-safe to be released on non-main thread. By following
HttpBaseChannel::ReleaseListener, we should ensure mListener/mListenerContext/mCompressListener is released on
main thread for both normal channel close and abnormal shutdown scenario.
MozReview-Commit-ID: Gqbk7dUOIcI
--HG--
extra : rebase_source : 1ce6eb1333b05c375469c2fef6284c11fda24f3e
2017-07-21 09:51:04 +08:00
Patrick McManus
850582d8f3
Bug 772589 - Implement the secureConnectionStart property for the PerformanceTiming interface r=bkelly,dragana,francois,Honza
...
Implements PerformanceTiming, nsITimedChannel, and devtools 'tls setup'
Also captures telemetry on this as we do for all other attributes of timedChannel
Also propogates some null transaction timings onto first real
transaction of a connection
MozReview-Commit-ID: 47TQJYVHnKC
--HG--
extra : rebase_source : a7723962986de0c2ab00d479a22c3f5fd185c8b2
2017-07-10 15:01:35 -04:00
Bill McCloskey
f115503a0b
Bug 1372405 - Provide names for all runnables in the tree (r=froydnj)
...
MozReview-Commit-ID: DKR6ROiHRS7
2017-06-26 14:19:58 -07:00
Carsten "Tomcat" Book
8a1350b5a6
Backed out changeset 4f6302a98ae4 (bug 1372405)
...
--HG--
extra : rebase_source : 41632f3158e88e692809731394a683d065a73dfb
2017-06-21 13:59:26 +02:00
Bill McCloskey
6b3e84ed5f
Bug 1372405 - Provide names for all runnables in the tree (r=froydnj)
...
MozReview-Commit-ID: DKR6ROiHRS7
2017-06-20 21:44:11 -07:00
Carsten "Tomcat" Book
ea1b86680c
Backed out changeset 9846de3bd954 (bug 1372405)
...
--HG--
extra : rebase_source : 5d4a48e8ec394c329994689d938d2a6e9b2752b0
2017-06-20 08:27:02 +02:00
Bill McCloskey
4592152411
Bug 1372405 - Provide names for all runnables in the tree (r=froydnj)
...
MozReview-Commit-ID: DKR6ROiHRS7
2017-06-19 22:25:47 -07:00
Honza Bambas
9e38f7b8fc
Bug 1319111 - Expose 'result principal URI' on LoadInfo as a source for NS_GetFinalChannelURI (removes some use of LOAD_REPLACE flag). r=bz, r=mikedeboer
...
--HG--
extra : rebase_source : c9690f4b8decd39a10da676bd50ec09cb2ad8892
2017-05-30 18:07:59 +02:00
Ben Kelly
45b30214c3
Bug 1363848 P2 Do not intercept internal redirects regardless of LOAD_BYPASS_SERVICE_WORKER flag. r=dragana
2017-06-15 07:52:41 -07:00
Ben Kelly
92ebf95b57
Bug 1363848 P1 Record the last redirect flags on the http channel. r=dragana
2017-06-15 07:52:41 -07:00
Kershaw Chang
14ca5d5894
Bug 1360581 - Part3: Add setTopWindowURIIfUnknown in nsIHttpChannelInternal, r=mayhemer
...
Since the uri classifier needs topWindowURI to decide whether or not to enable channel annotation, we have to allow to change this attribute in js for passing the test.
--HG--
extra : rebase_source : c5effa05fecef0d32600e4c9c926dbfa77c2ca6f
2017-06-13 01:21:00 +02:00
Honza Bambas
a3533ddf2a
Bug 1370340 - Carry TopLevelOuterContentWindowId to redirected HTTP channels. r=mcmanus
...
--HG--
extra : rebase_source : dc78c705f0c738b07352b4a7d6d80eac7e65b5b4
2017-06-10 03:47:00 -04:00
Shih-Chiang Chien
a06d325b04
Bug 1015466 - Part 0, fix warning/error covered by unified build. r=mayhemer
...
MozReview-Commit-ID: KUHl1ZBuddC
--HG--
extra : rebase_source : 1bc0649cbfc9cd5336d2fbec23fb8ee6eea5b44a
2017-01-16 18:20:42 +08:00
Honza Bambas
d02e6da08f
Bug 1356538 - Carry class-of-service flags to redirected channels. r=mcmanus
...
--HG--
extra : rebase_source : a0688aa4f470fe377de3cc377f2eb8a2c67bef0c
2017-05-31 05:06:00 -04:00
Dragana Damjanovic
edd1ee7e13
Bug 1357678 - Make stream converters do omt. r=mayhemer
2017-05-30 14:11:34 +02:00
Thomas Nguyen
262347b745
Bug 1351146 - P2 - Update test case and usage of nsIRedirectHistoryEntry interface. r=dragana
...
MozReview-Commit-ID: s61VV5CLx8
2017-05-25 19:42:00 +02:00
Honza Bambas
b852ed009a
Backout of 7f28c1084c47 (bug 1319111) for security checks breakage, r=me
2017-05-25 18:16:02 +02:00
Honza Bambas
5f3173e90f
Bug 1365306 - Remove net::ThrottlingService, don't suspend/resume download channels on page load. r=hurley
2017-05-18 14:09:00 -04:00
Honza Bambas
2dfe5d94b8
Bug 1319111 - Expose 'result principal URI' on LoadInfo as a source for NS_GetFinalChannelURI (removes some use of LOAD_REPLACE flag). r=bz
2017-05-23 08:09:00 -04:00
Honza Bambas
d6d727a69e
backout of f9abb9c83452 (bug 1319111) for crashes, r=bz
2017-05-13 13:55:11 +02:00
Wes Kocher
0a1e1fe23b
Backed out changeset 95ff98f1c2e5 (bug 1319111) for talos failures a=backout
...
MozReview-Commit-ID: Gs09moFm5rQ
2017-05-12 18:24:42 -07:00
Honza Bambas
70f62bdec1
backout of f9abb9c83452 (bug 1319111) for crashes, r=bz
2017-05-12 22:13:49 +02:00
Wes Kocher
3416c23dad
Backed out changeset 0a25a0fa3b32 (bug 1362822) for osx debug devtools timeouts a=merge
...
MozReview-Commit-ID: 3LMChZJEBHp
--HG--
extra : source : 50940861284c3c6f804a5c7e1ab90b4ddf55b684
2017-05-11 15:23:43 -07:00
Ehsan Akhgari
40f9159875
Bug 1362822 - Avoid needlessly holding locks when setting headers during the initialization of HTTP channel objects; r=schien,dragana
...
The channel objects cannot be handed off to other threads before the creation
process has been finished, so there is no point in trying to hold these locks
while the initialization code is running. These lockings have shown up in
profiles as being expensive.
2017-05-11 09:23:30 -04:00
Jonathan Watt
33cfc4aa43
Bug 1362891, part 2 - Make use of XRE_IsE10sParentProcess in code that could use it. r=froydnj
...
MozReview-Commit-ID: 81PFEgNH37m
--HG--
extra : rebase_source : 350b11b3bec652472565bd590ef13680e480a75e
2017-04-24 10:40:12 +01:00
Honza Bambas
a1b64b4694
Bug 1319111 - Expose URI to make security check against on LoadInfo (no LOAD_REPLACE flag). r=bz
2017-01-27 19:10:01 +01:00
Ehsan Akhgari
c696722eda
Bug 1360973 - Don't do the work needed for same origin referrer policies unless if we need to; r=tnguyen
...
CheckSameOriginURI() can be expensive and shows up under profiles, so we
should try to avoid calling it unless if we are going to use
isCrossOrigin.
2017-05-04 13:30:13 -04:00
Dragana Damjanovic
9a3cfa6017
Bug 1334776 - Store header names into nsHttpHeaderArray. r=mcmanus
2017-04-27 16:48:36 +02:00
Kershaw Chang
d2acdf1290
Bug 1343745 - Label runnables in /http, r=honzab
2017-04-23 19:59:00 +02:00
Valentin Gosu
0a4d506e21
Bug 1354349 - Add nsIChannel.isDocument that checks if LOAD_DOCUMENT_URI is set, or if LOAD_HTML_OBJECT_DATA and the channel has the appropriate MIME type r=mcmanus,mystor
...
MozReview-Commit-ID: K28Opd9JTr2
--HG--
extra : rebase_source : d1a786d9b4318be15f195fdc330489121ebd6ece
2017-04-20 10:15:06 +08:00
Carsten "Tomcat" Book
7ba1b88f0b
Backed out changeset ec9fb39f7133 (bug 1354349) for bustage
2017-04-18 08:52:14 +02:00
Valentin Gosu
8f33abcc56
Bug 1354349 - Add nsIChannel.isDocument that checks if LOAD_DOCUMENT_URI is set, or if LOAD_HTML_OBJECT_DATA and the channel has the appropriate MIME type r=mcmanus,mystor
...
MozReview-Commit-ID: K28Opd9JTr2
--HG--
extra : rebase_source : 226ef1e6685a9608aa7c07d3c83b048d6e1e7278
2017-04-18 11:25:47 +08:00
Ho-Pang Hsu
11560d7c31
Bug 1168875 - Part 1: Extend nsITimedChannel for logging service worker interception related timestamps. f=bkelly, r=valentin
...
--HG--
extra : rebase_source : 8c20cc8f2014f728038b8b9b214e888cc3215d0c
2017-04-10 21:13:21 +08:00
Christoph Kerschbaumer
fc56451c03
Bug 1353975 - Fix nullPrincipal edge case. r=bz, r=mcmanus
2017-04-07 20:35:00 +02:00
Sebastian Hengst
e71676d7ea
Backed out changeset 96596bdeb7ec (bug 1353975) for failing mochitest test_CrossSiteXHR.html and xpcshell test test_allowedDomainsXHR.js. r=backout
2017-04-07 20:00:06 +02:00
Christoph Kerschbaumer
5b6c60502e
Bug 1353975 - Use a NullPrincipal as the principalToInherit when undergoing an http redirect. r=bz, r=mcmanus
...
--HG--
extra : rebase_source : b50e4d79123a2f5f53f984f4a7943b4f7684dbc5
2017-04-06 21:35:40 +02:00
Nicholas Hurley
dc67ce7d71
Bug 1348461 - Use a process-unique uint64 instead of a uuid for channel ids r=mcmanus
2017-04-04 08:36:51 -07:00
Nicholas Hurley
89c508224f
Bug 1348462 - Use a process-unique uint64 instead of a uuid for request context ids r=mcmanus
...
--HG--
extra : rebase_source : 84541f78eeec1a5e202c12b57131ede9834f687a
2017-03-23 07:40:36 -07:00
Carsten "Tomcat" Book
5b9719c5fc
merge mozilla-inbound to mozilla-central a=merge
2017-03-28 13:03:25 +02:00
Shih-Chiang Chien
306b7f81c6
Bug 1320744 - Part 3, implement nsIThreadRetargetableRequest in HttpChannelChild. r=mayhemer
...
MozReview-Commit-ID: FyLXlkQde3h
--HG--
extra : rebase_source : 88e9c56a73d268e1313c654c78a14e7b7d04fd9b
2017-03-20 17:29:07 +08:00
Kershaw Chang
b9c0cd1f09
Bug 1312782 - Part 3: Test case. r=honzab
2017-03-27 04:10:00 -04:00
Valentin Gosu
a42ca87b4d
Bug 1341343 - Make sure the channel returns the correct contentLength for alt-data without saving it to the metadata r=michal
...
MozReview-Commit-ID: 1pXspJwLfJa
* * *
[mq]: fixing.patch
MozReview-Commit-ID: KKS2x2aeHY3
--HG--
extra : rebase_source : b6deb2a1caead735356aa4079462abc6f46c25e4
2017-03-13 12:06:55 +01:00
Kershaw Chang
3cf721745a
Bug 1326339 - Store top level outer content window id in http transaction and connMgr. r=mayhemer
...
--HG--
extra : rebase_source : 0ad395edaa8ae7760fb0057084f353d977964234
2017-03-09 02:55:00 -05:00
Andrea Marchesini
e9195daa8d
Bug 1345168 - Get rid of OriginAttributes::Inherit, r=tjr
2017-03-08 07:41:51 +01:00
Wei-Cheng Pan
ab2969cfa1
Bug 1310127 - Part 4: Use MOZ_MUST_USE in netwerk/protocol/http r=mcmanus
...
This patch contains some changes that may alter control flows.
MozReview-Commit-ID: Kcc2DWJZ8L5
--HG--
extra : rebase_source : ddb068f7c038f6f0ad75efda941dd6b8da8b949a
2016-12-28 14:43:47 +08:00
Wei-Cheng Pan
03ca0df8a1
Bug 1310127 - Part 3: Use MOZ_MUST_USE in netwerk/protocol/http r=mcmanus
...
Add assertions.
MozReview-Commit-ID: DPvgKzVr3ip
--HG--
extra : rebase_source : a96d658c8b76180fe5a904106de9a68de16e0383
2017-01-12 17:48:45 +08:00
Wei-Cheng Pan
7aa068fbb7
Bug 1310127 - Part 2: Use MOZ_MUST_USE in netwerk/protocol/http r=Cykesiopka,mcmanus
...
Log failures or just ignore them, no control flow change.
MozReview-Commit-ID: D748DEjl3Fv
--HG--
extra : rebase_source : cec54fe99637a2292e9d4ddc6f4131f083da509a
2016-12-27 19:05:13 +08:00
Patrick McManus
a980860d80
Bug 1340655 - remove h1 pipeline support r=mayhemer
2017-02-17 15:35:37 -05:00
Sebastian Hengst
71318f787d
Backed out changeset 379093669b39 (bug 1340655) for warning as err.or at nsHttpConnection.cpp(875). r=backout on a CLOSED TREE
2017-03-01 20:20:57 +01:00
Patrick McManus
63212ea3a1
Bug 1340655 - remove h1 pipeline support r=mayhemer
...
HTTP/1.1 pipelines have been subsumed by the more effective mux of spdy, h2, and soon quic.
The feature was never able to overcome the limitations of HoL blocking
and TCP reset, and their impact on performance and reliability.
Fundamentally mux is the only way we should be approaching that problem.
The massive amount of code - mostly heuristics to try and deal with
the HoL problem (by classifying things onto different transactions,
timers for broken servers, etc..) has become a maintenance burden with
minimal value given the default off state of the feature.
h2 is the new (working) strategy.
--HG--
extra : rebase_source : 5794957c1f078ca435480724d3caf9bdd861b7de
2017-02-17 15:35:37 -05:00
Honza Bambas
3c1d8fd7b1
Bug 1322355 - Cancel http:// channel when secure update (redirect) to https:// is vetoed to avoid duplicate OnStartRequest notification + added logs. r=michal
...
--HG--
extra : rebase_source : edb97c1bdfd700ed75c57d1af0018f63428036f0
2017-02-22 09:10:00 -05:00
Shih-Chiang Chien
9de058213e
Bug 1337721 - Part 1, preserve the channel priority after redirect. r=mayhemer
...
MozReview-Commit-ID: 14rIrhOcXXK
--HG--
extra : rebase_source : ec26484daa2684313990f54e4d579fe6b08daaa3
2017-02-10 10:45:28 +08:00
Thomas Nguyen
65d9ef988a
Bug 1288633 - Add more information when an URL matches Safe Browsing list. r=dragana,francois
...
MozReview-Commit-ID: 6u0dUOB838F
--HG--
extra : rebase_source : 8800e60e6a3b787f1ebaeafb48057e3a3d509468
2017-02-21 09:46:36 +08:00
Wes Kocher
8c4ce17711
Merge inbound to m-c a=merge
...
MozReview-Commit-ID: DCUf7VEDrTt
2017-02-17 13:38:51 -08:00
Honza Bambas
bb033696f7
Bug 1324419 - Use QueryObject for nsHttpChannel. r=mcmanus
...
--HG--
extra : rebase_source : 192a4705e4e91bc393a283743a1ad8880da6aeba
2017-02-17 08:08:00 -05:00
Tom Tromey
5f8f360823
Bug 1060419 - make log_print use Printf.h, r=froydnj
...
MozReview-Commit-ID: BIZ1GQEZ1vs
--HG--
extra : rebase_source : 2f1f0aa12493c44f352d9a7e8683e7bb72d2d75b
2016-12-15 20:16:31 -07:00
Nicholas Hurley
31b98bda83
Bug 1312754 - Add a service to throttle certain HTTP channels. r=mayhemer
...
This patch adds (and hooks up) a new service so that HTTP channels marked as
"Throttleable" will periodically be Suspend()ed and Resume()d when more
important operations are going (such as a page load).
While this patch is not responsible for marking channels as "Throttleable",
the general idea is that these would be less-important channels - background
downloads, beacons, etc, and perhaps even resources known to be trackers.
MozReview-Commit-ID: HEZsxS04rRK
--HG--
extra : rebase_source : 03cce85fe7df782e1f6e2da9e5a99997b796aba2
2017-01-10 06:39:18 -08:00
Shih-Chiang Chien
54bcd3b5da
Bug 1334068 - proxy release main-thread-only references in nsHttpChannel and HttpBaseChannel. r=mayhemer
...
MozReview-Commit-ID: 9lojerCPhSb
--HG--
extra : rebase_source : fe493862b74c9fc2be5358e70ef03deae318ad8d
2017-02-07 10:37:11 +08:00
Arthur Edelstein
29148d1da2
Bug 1305144 - Option to hide referrer when leaving a .onion domain. r=mcmanus
...
The boolean pref is named "network.http.referer.hideOnionSource"
--HG--
extra : rebase_source : b6e9af7de29e0f8a2457b777ba4703401ad45181
2017-02-02 23:47:00 -05:00
Tom Tung
e185f7bc4c
Bug 1220936 - Flush console report to innerWindowID by using nsIDocument and nsILoadGroup. r=bkelly.
2017-02-06 09:19:34 +08:00
Kris Maglione
440d6fcd02
Bug 1305162: Part 1a - Separate nsIMIMEInputStream headers from stream data. r=dragana
...
MozReview-Commit-ID: F1qZCBWUNRG
--HG--
extra : rebase_source : 7a4fdab3e4843a042a3d1101c5e58a6bb556ef7a
extra : source : de131f7c1fc1f60db42509aea646ef4540e6c5fe
2017-01-20 15:43:07 -08:00
Boris Zbarsky
aca020c034
Bug 1328761 part 1. Correctly propagate the Content-Type request header during redirects, for cases when it's _not_ set. r=dragana
2017-01-14 22:43:17 -05:00
Andrea Marchesini
359ae91eac
Bug 1328653 - Merging all the various *OriginAttributes to just one, r=huseby
2017-01-12 17:38:48 +01:00
Thomas Nguyen
40bcddbe8a
Bug 1329065 - Check the correct policy when setting referrer header. r=mcmanus
...
MozReview-Commit-ID: JG5DVBqGczS
2017-01-06 11:26:24 +08:00
Thomas Nguyen
8cd72c67ca
Bug 1304623 - Create a pref to control the default referrer policy- part 2. r=mcmanus, r=bkelly
...
MozReview-Commit-ID: GEUDZ8UZAT5
2017-01-05 11:30:03 +08:00
Ehsan Akhgari
cd895c94f2
Bug 1170190 - Part 2: Add the nsIHttpChannel::IsTrackingResource() API to query the channel's tracking annotation; r=mayhemer
2016-12-23 14:40:11 -05:00
Honza Bambas
b862dc4c74
Bug 1312243 - Block authentication dialog pop-ups by cancling 3 of them in a row, r=Dolske+mcmanus
2016-12-16 03:42:00 +01:00
Honza Bambas
706f18a2c8
Bug 1318759 - Properly query final class in HttpChannelParent::OnStartRequest to prevent evil static_cast, r=jduell
2016-12-09 05:52:00 +01:00
Honza Bambas
81f3e50ed7
Bug 1319606 - Prevent nsStreamListenerWrapper instance w/o mListener. r=jduell
2016-12-09 06:28:00 -05:00
Patrick McManus
eefe030798
Bug 1321783 - Make updater be networking conservative r=dkeeler r=rstrong r=dragana
2016-12-02 16:49:23 -05:00
Yoshi Huang
9daa7f0b97
Bug 1315602 - Remove the assertion of FirstPartyDomain should be empty in HTTP redirect. r=smaug
2016-12-01 15:49:07 +08:00
Ehsan Akhgari
fd99cf4221
Bug 1318888 - Remove a few other mentions of appId's from Necko; r=mcmanus
2016-11-21 15:00:49 -05:00
Ehsan Akhgari
a5c45faa60
Bug 1319118 - Don't clobber half of a 64-bit window ID by assigning it to a 32-bit variable; r=mcmanus
...
This is the textbook use case for the auto keyword. :)
2016-11-21 13:33:13 -05:00
Thomas Nguyen
b169621e2e
Bug 1264792 - Update request'referrer policy when redirect.r=bkelly,dragana.
...
MozReview-Commit-ID: 3V6W0fuRomZ
--HG--
extra : rebase_source : 4b708f9646ea42ef40c60ba0b7a86e14edf621e3
2016-11-14 15:15:32 +08:00
Iris Hsiao
703b663355
Backed out changeset a0f243dead30 (bug 1301649) for developers' request
2016-10-20 15:24:50 +08:00
Carsten "Tomcat" Book
85979d0405
Merge mozilla-central to mozilla-inbound
2016-10-13 11:58:40 +02:00
Tim Huang
17d537f0e1
Bug 1277803 - Part 4 : Make the NS_CompareLoadInfoAndLoadContext() skiping test if the request is the favicon loading from the XUL image. r=honzab
2016-10-13 15:43:59 +08:00
Francois Marier
54d1778d66
Bug 1307596 - Add a preference for trimming third-party referrers. r=dragana
...
MozReview-Commit-ID: EL2L4yMnwAi
--HG--
extra : rebase_source : 6046849abb11560b7073b7fe30f46297e45d16e9
2016-10-05 16:36:16 -07:00
Francois Marier
65552ada0a
Bug 1308725 - Remove network.http.sendSecureXSiteReferrer pref. r=dragana
...
MozReview-Commit-ID: LQgxMijXIaF
--HG--
extra : rebase_source : 62482337ee35edbdcd0cb76efd8614f295ea9099
2016-10-08 12:06:03 -07:00
Wes Kocher
2142de26c1
Backed out 8 changesets (bug 1277803) for browser-chrome test failures a=backout
...
Backed out changeset 477890efdb88 (bug 1277803)
Backed out changeset 49da326bfe68 (bug 1277803)
Backed out changeset 2d17a40a9077 (bug 1277803)
Backed out changeset b1cb0a195ca1 (bug 1277803)
Backed out changeset c7d82459d152 (bug 1277803)
Backed out changeset 3be9a06248af (bug 1277803)
Backed out changeset 8d119ca96999 (bug 1277803)
Backed out changeset be767a6f7ecd (bug 1277803)
2016-10-12 14:26:00 -07:00
Tim Huang
6e27a2a6a1
Bug 1277803 - Part 4 : Make the NS_CompareLoadInfoAndLoadContext() skiping test if the request is the favicon loading from the XUL image. r=honzab
2016-10-12 17:32:08 +08:00
Yoshi Huang
00f6846c07
Bug 1301649 - nits for bug 1260931. r=smaug
...
- use MOZ_ASSERT_IF
- always call inherit function
2016-10-07 17:42:03 +08:00
Iris Hsiao
5abee5efd3
Backed out changeset d17370e68325 (bug 1277803)
...
CLOSED TREE
2016-10-07 11:23:45 +08:00
Tim Huang
33effa2da2
Bug 1277803 - Part 4: Make the NS_CompareLoadInfoAndLoadContext() skiping test if the request is the favicon loading from the XUL image. r=honzab
2016-10-06 00:57:00 -04:00
Carsten "Tomcat" Book
572e74ee99
merge mozilla-inbound to mozilla-central a=merge
2016-09-28 15:56:33 +02:00
Francois Marier
16c0d80286
Bug 1302938 - Explain why user referrer trimming policy can be overriden. r=dragana
...
MozReview-Commit-ID: GfmeIu2WEGX
--HG--
extra : rebase_source : 386c056f51dd351e7713806cec2292f5a226e8ef
2016-09-27 13:25:35 -07:00
Thomas Nguyen
8c6badef26
Bug 1276836 - Implement same-origin, strict-origin, strict-origin-when-cross-origin referrer policy. r=mcmanus,jdm
...
MozReview-Commit-ID: 39AFT4RgHpl
--HG--
extra : rebase_source : 1512555cb0da30a0fbbfd58c27e4a4d48a93586e
2016-09-22 16:27:42 -07:00
Valentin Gosu
76d2cd8b5d
Bug 1231565 - (Part 2) Allow storing alternate data in the HTTP cache r=honzab
...
* Add PAltDataOutputStream.ipdl to be able to open an OutputStream to the cache entry in the child process
* AltDataOutputStreamChild/Parent are Main Thread only for now.
* Adds methods for reading and writing alt-data to nsICacheInfoChannel.idl
* Keep a ref of the cache entry after OnStopRequest in case the consumer tries to open the alt-data output stream
MozReview-Commit-ID: jlraDI97Hg
2016-04-11 05:17:02 +02:00
amy
49df78fa51
Bug 1013635 - Removed the dispatch and call the notification service directly in HttpBaseChannel.cpp where this noticiation emits, r=honzab
2016-09-20 15:54:52 +08:00
Nicholas Nethercote
37301e25ad
Bug 1297300 - Add missing checks to GetSpec() calls in netwerk/. r=hurley,dragana.
...
--HG--
extra : rebase_source : 961a82fb6e723688837e5250f57121c14ca958cb
2016-08-26 16:40:57 +10:00
Tom Tung
a167b66e90
Bug 1187335 - P4 - Integrate fetch and cache with SRI & add nsIConsoleReportCollector to show console report. r=bkelly.
2016-09-07 10:20:23 +08:00
Tom Tung
c34ee7095c
Bug 1187335 - P1 - Add a way to report error to all clients for ServiceWorker and SharedWorker. r=bkelly.
2016-05-23 14:56:46 +08:00
Yoshi Huang
02dbef1f56
Bug 1260931 - Part 4: update OriginAttributes when http redirect. r=smaug
2016-09-06 10:26:03 +08:00
Sebastian Hengst
4f2b803d06
Backed out changeset 9efc0a2bb306 (bug 1260931)
2016-09-05 21:15:25 +02:00
Yoshi Huang
0f48c1a7b5
Bug 1260931 - Part 4: update OriginAttributes when http redirect. r=smaug
2016-09-06 01:50:37 +08:00
Ryan VanderMeulen
baeaac9b10
Merge m-c to fx-team. a=merge
2016-08-23 10:11:52 -04:00
Ryan VanderMeulen
82663d8710
Merge inbound to m-c. a=merge
2016-08-23 10:05:18 -04:00
Tom Tromey
ef548d271d
Bug 1244227 - Add nsIThrottledInputChannel.idl and implement. r=mcmanus
...
MozReview-Commit-ID: JVIjxEO901W
2016-08-23 07:36:52 -06:00
Wes Kocher
730c59fce4
Backed out changeset e1f3ed984607 (bug 1261585) for causing bug 1292586 a=backout
2016-08-22 11:29:04 -07:00
Jonathan Hao
cc481ebca7
Bug 1283319 - Tests for connection info's hash key. r=mayhemer
...
--HG--
extra : rebase_source : 78cc39299d247146be49078976f1671a8bb89811
2016-08-17 19:57:00 -04:00
Yoshi Huang
9895a88a2a
Bug 1292450 - Check mPrivateBrowsingId is correct in LoadInfo and LoadContext. r=smaug, ehsan
...
Make sure the mPrivateBrowsingId of Origin Attributes is consistent
between LoadInfo and LoadContext.
For chrome docshell, its mPrivateBrowsingId remains 0 even if its
UserPrivateBrowsing() is true (bug 1278664). So we sync the
mPrivateBrowsingId field in LoadInfo in the same way.
2016-08-15 19:03:24 +08:00
Nicholas Nethercote
bab6d17ebf
Bug 1293117 (part 4) - Change many NS_IMETHODIMP occurrences to NS_IMETHOD. r=froydnj.
...
This patch makes the following changes on many in-class methods.
- NS_IMETHODIMP F() override; --> NS_IMETHOD F() override;
- NS_IMETHODIMP F() override {...} --> NS_IMETHOD F() override {...}
- NS_IMETHODIMP F() final; --> NS_IMETHOD F() final;
- NS_IMETHODIMP F() final {...} --> NS_IMETHOD F() final {...}
Using NS_IMETHOD is the preferred way of marking in-class virtual methods.
Although these transformations add an explicit |virtual|, they are safe --
there's an implicit |virtual| anyway because |override| and |final| only work
with virtual methods.
--HG--
extra : rebase_source : 386ee4e4ea2ecd8d5001efabc3ac87b4d6c0659f
2016-08-08 10:54:47 +10:00
Nicholas Nethercote
e7f10a07fd
Bug 1293603 (part 2) - Make Run() declarations consistent. r=erahm.
...
This patch makes most Run() declarations in subclasses of nsIRunnable have the
same form: |NS_IMETHOD Run() override|.
As a result of these changes, I had to add |override| to a couple of other
functions to satisfy clang's -Winconsistent-missing-override warning.
--HG--
extra : rebase_source : 815d0018b0b13329bb5698c410f500dddcc3ee12
2016-08-08 12:18:10 +10:00
Honza Bambas
14d285bdcd
Bug 1171203 - Fix redirection limit underflow, don't count internal redirect to this limit, r=mcmanus
2016-08-01 04:12:00 +02:00
Dragana Damjanovic dd.mozilla@gmail.com
35cecae1b6
Bug 1261585 - Make nsITraceableChannel listener work with content encoding.r=jduell
...
--HG--
extra : rebase_source : 98c549ada53f64f66eb716801f0140da6b7252ef
2016-07-19 05:05:00 +02:00
Andrew Sutherland
4d5d691957
Bug 1274250 - Referrer host should be IDN encoded when trimmed by policy. r=valentin
...
Since bug 822869 the referrer trimming has relied on using prePath when
trimming resulting in non-ASCII hosts being passed through in UTF-8 (or
whatever their encoding was.)
Prior to this patch, the logic when trimming was to generate the referrer
string using prePath and possibly nsIURL.filePath, then re-derive the
nsIURI from that string.
Concerned about the cost of introducing asciiPrePath just for this consumer,
I opted to have the code just combine the scheme and asciiHostPort to
approximate the prior use of prePath. (userPass is explicitly cleared by
the code.)
Concerned about weirdness/loss of fidelity in the nsIURI, I replaced the
code that re-derived the URI from the spec string with manual clearing
of the parts of the URI/URL we were not including. This may not be the
right thing to do.
I modified the existing Gecko-specific test coverage of SetReferrerPolicy.
The existing web platform tests and referrer policy didn't seem concerned
with this case, and the bug is indeed localized to a very small segment
of Gecko code. Note that the userReferrerTrimmingPolicy=1 bug case can
only be triggered by explicit user preference setting and this is only
tested in test_referrer.js. userReferrerTrimmingPolicy=2 need not be
set by preference if REFERRER_POLICY_ORIGIN or
REFERRER_POLICY_ORIGIN_WHEN_XORIGIN (when cross origin) is used.
2016-07-13 11:08:53 -04:00
Thomas Wisniewski
ef7d665ee0
Bug 1207233 - Part 1: Allow not sending a Content-Type header, or sending a blank string for it, and have XMLHttpRequest.setRequestHeader honor those possibilities. r=dragana
2016-07-11 14:27:36 -04:00
Carsten "Tomcat" Book
b40f905f49
Backed out changeset 643bfa8b72ba (bug 1207233) for bustage
2016-07-12 11:40:16 +02:00
Thomas Wisniewski
291ec7772c
Bug 1207233 - Part 1: Allow not sending a Content-Type header, or sending a blank string for it, and have XMLHttpRequest.setRequestHeader honor those possibilities. r=dragana
...
--HG--
extra : rebase_source : f4063c85716f899545878f89fc7f2225ef95c7cd
2016-07-11 14:27:36 -04:00
Thomas Nguyen
53c1367728
Bug 1279494 - Fix crash in SetReferrerWithPolicy, add null check the triggeringPrincipal. r=ckerschb
...
MozReview-Commit-ID: ho0StGNqc8
2016-07-04 17:05:57 +08:00
Andrea Marchesini
64734bf74c
Bug 1278838 - Remove separate worker binding for Performance API, r=smaug
...
--HG--
rename : dom/performance/nsPerformance.cpp => dom/performance/Performance.cpp
rename : dom/performance/nsPerformance.h => dom/performance/Performance.h
rename : dom/workers/Performance.cpp => dom/performance/PerformanceWorker.cpp
rename : dom/workers/Performance.h => dom/performance/PerformanceWorker.h
2016-06-09 19:04:42 +02:00
Andrew Sutherland
af016de2cb
Bug 1272436 - P0: Implement "only-if-cached" RequestCache mode. r=mayhemer, r=bkelly, r=bzbarsky for WebIDL change
...
The fetch spec has re-introduced "only-if-cached" mode which loads only from
the cache. There are privacy implications to this so for the time being it
is required that "same-origin" mode is used.
2016-06-08 12:10:15 -04:00
Jarda Snajdr
4948ad52d6
Bug 1274556 - Add a channelId attribute to nsIHttpChannel r=hurley
2016-06-01 12:29:21 -07:00
Christoph Kerschbaumer
8ca38235c0
Bug 1267754 - Replace WARNING about missing triggeringPrincipal with LOG() r=mcmanus
...
MozReview-Commit-ID: ESHG6geGqAD
--HG--
extra : rebase_source : 0c2ead7341d796f9d2bb129752f2093038ea7972
2016-05-11 10:58:06 +02:00
Valentin Gosu
3525b6a693
Bug 1254688 - Use mLoadInfo to get the performance object. r=bz, r=tanvi
...
MozReview-Commit-ID: KMbwR7J8FLm
--HG--
extra : rebase_source : f0be0322cdd6cacd5d047e003e4e8d71433ea54f
2016-05-09 20:42:22 +02:00
Dragana Damjanovic
c10122236d
Bug 507571 - Lock nsHttpResponseHead. r=mcmanus
2016-05-24 06:07:00 +02:00
Dragana Damjanovic dd.mozilla@gmail.com
3041af917a
Bug 1274509 - Use ReentrantMonitor for nsHttpRequestHead because VisitHeaders calls Visitor lock. r=mcmanus
...
--HG--
extra : rebase_source : 8ce7de7678b1f53254914ac8c1ef278c165fcd0c
2016-05-24 04:17:00 +02:00
Carsten "Tomcat" Book
011399bbde
Backed out changeset d34a99623615 (bug 1274509) for bustage on a CLOSED TREE
2016-05-24 11:22:23 +02:00
Dragana Damjanovic dd.mozilla@gmail.com
a499148e40
Bug 1274509 - Use ReentrantMonitor for nsHttpRequestHead because VisitHeaders calls Visitor lock. r=mcmanus
2016-05-23 00:24:00 +02:00
Chris Peterson
2dec5055ef
Bug 1274162 - Fix -Wshadow warnings in netwerk/protocol/http/ directory. r=mcmanus
...
netwerk/protocol/http/nsHttpHeaderArray.h:96:63 [-Wshadow] declaration shadows a field of 'mozilla::net::nsHttpHeaderArray::nsEntry'
netwerk/protocol/http/Http2Session.cpp:2766:14 [-Wshadow] declaration shadows a local variable
netwerk/protocol/http/HttpBaseChannel.cpp:1886:14 [-Wshadow] declaration shadows a local variable
netwerk/protocol/http/HttpChannelChild.cpp:265:53 [-Wshadow] declaration shadows a field of 'mozilla::net::AssociateApplicationCacheEvent'
netwerk/protocol/http/HttpChannelChild.cpp:266:53 [-Wshadow] declaration shadows a field of 'mozilla::net::AssociateApplicationCacheEvent'
netwerk/protocol/http/HttpChannelChild.cpp:2566:14 [-Wshadow] declaration shadows a local variable
netwerk/protocol/http/HttpChannelParent.cpp:397:17 [-Wshadow] declaration shadows a local variable
netwerk/protocol/http/InterceptedChannel.cpp:276:14 [-Wshadow] declaration shadows a local variable
netwerk/protocol/http/InterceptedChannel.cpp:285:14 [-Wshadow] declaration shadows a local variable
netwerk/protocol/http/SpdySession31.cpp:2177:14 [-Wshadow] declaration shadows a local variable
netwerk/protocol/http/nsCORSListenerProxy.cpp:304:30 [-Wshadow] declaration shadows a local variable
netwerk/protocol/http/nsHttpChannel.cpp:796:17 [-Wshadow] declaration shadows a local variable
netwerk/protocol/http/nsHttpChannel.cpp:4474:35 [-Wshadow] declaration shadows a local variable
netwerk/protocol/http/nsHttpChannel.cpp:5915:18 [-Wshadow] declaration shadows a local variable
netwerk/protocol/http/nsHttpConnection.cpp:982:21 [-Wshadow] declaration shadows a local variable
netwerk/protocol/http/nsHttpConnectionMgr.cpp:1220:43 [-Wshadow] declaration shadows a local variable
netwerk/protocol/http/nsHttpConnectionMgr.cpp:1240:43 [-Wshadow] declaration shadows a local variable
netwerk/protocol/http/nsHttpConnectionMgr.cpp:2247:27 [-Wshadow] declaration shadows a local variable
netwerk/protocol/http/nsHttpConnectionMgr.cpp:2758:23 [-Wshadow] declaration shadows a local variable
netwerk/protocol/http/nsHttpPipeline.cpp:709:30 [-Wshadow] declaration shadows a local variable
2016-05-10 23:57:24 -07:00
Dragana Damjanovic
7cf5152088
Bug 669259 - Expose original header received from a peer. r=mcmanus
2016-05-12 14:33:00 -04:00
Kyle Huey
941ab1f522
Bug 1268313: Part 7 - Move NS_NewRunnableMethod and friends to mozilla::NewRunnableMethod. r=froydnj
2016-05-05 01:45:00 -07:00
Dragana Damjanovic
485736ee81
Bug 1247982 - Lock request headers. r=mcmanus
2016-05-03 00:06:00 +02:00
Carsten "Tomcat" Book
ba3fe0975c
Backed out changeset 85ce8cb0639a (bug 1268313)
...
--HG--
extra : rebase_source : 56d1cf41a2dc4959b67f834e07192a5c772176a8
2016-04-29 14:21:16 +02:00
Kyle Huey
48a594a09e
Bug 1268313: Part 7 - Move NS_NewRunnableMethod and friends to mozilla::NewRunnableMethod. r=froydnj
2016-04-28 14:08:25 -07:00
Kyle Huey
c73656947b
Bug 1265927: Move nsRunnable to mozilla::Runnable, CancelableRunnable to mozilla::CancelableRunnable. r=froydnj
2016-04-25 17:23:21 -07:00
Valentin Gosu
c8a94789bb
Bug 1262326 - Make test_user_agent_overrides.html work in e10s r=nwgh
...
* Rename SchedulingContext to RequestContext
* Move SetLoadGroupUserAgentOverride to nsHttpChannel
* Cache the userAgentOverride in RequestContext instead of LoadGroup
MozReview-Commit-ID: FQS9uSRR8kd
--HG--
rename : netwerk/base/SchedulingContextService.cpp => netwerk/base/RequestContextService.cpp
rename : netwerk/base/SchedulingContextService.h => netwerk/base/RequestContextService.h
rename : netwerk/base/nsISchedulingContext.idl => netwerk/base/nsIRequestContext.idl
2016-04-21 16:59:17 +02:00
Nicholas Hurley
fd7a5d97b5
Bug 1016628 - Add prefetch abilities to the predictor. r=mayhemer
2016-04-21 12:32:30 -07:00
Ben Kelly
a669ad97ac
Bug 1263469 P1 Set FetchEvent.request.cache value correctly for non-fetch channels. r=mayhemer
2016-04-15 11:15:58 -07:00
Honza Bambas
4d038ffd77
Bug 1240929 - Copy some HTTP request headers automatically on redirect, r=mcmanus
2016-04-06 09:28:00 +02:00
Tanvi Vyas
297217ffc0
Bug 1105556 - nsPerformance::CheckAllowedOrigin should return early for TYPE_DOCUMENT loads. TYPE_DOCUMENT loads don't go through a TimingAllowedCheck(). r=bz, vgosu
2016-04-13 16:30:31 -07:00
Nicholas Hurley
1ede81765d
Bug 1236650 - make h2 push work in the face of redirects. r=mcmanus
...
--HG--
extra : rebase_source : 2ebbaf8d42802575fc3f51db8c1b84629cb0e53b
2016-04-12 11:43:39 -07:00
Dragana Damjanovic dd.mozilla@gmail.com
5d5fb10507
Bug 1261632 - Assert that OnStopRequest is called only once. r=michal
...
--HG--
extra : rebase_source : fef5faba65c878b3f3528de054a0601c3ad74035
2016-04-06 04:47:00 -04:00
Franziskus Kiefer
1a47cfb77a
Bug 1186072 - Add trailing slash to origin referer header when policy is set. r=sworkman
...
MozReview-Commit-ID: 3PYuODmqpbL
--HG--
extra : source : ac4148f22b2d6f76762dac3fd94a6452da80bdde
2016-02-24 10:51:54 +01:00
Ehsan Akhgari
ac9a100c66
Bug 1120715 - Part 1: Add Necko APIs to preserve the Request cache mode on the channel; r=mayhemer
2016-03-11 14:40:33 -05:00
Ryan VanderMeulen
e98112b9bd
Backed out 8 changesets (bug 1120715) for Android dom/u2f/tests/test_no_token.html permafail.
...
Backed out changeset 043770204431 (bug 1120715)
Backed out changeset e10c375353f4 (bug 1120715)
Backed out changeset c2871dbeb7cc (bug 1120715)
Backed out changeset 79158f028ad3 (bug 1120715)
Backed out changeset c74866f52320 (bug 1120715)
Backed out changeset c731944ecc64 (bug 1120715)
Backed out changeset 44f346712a3a (bug 1120715)
Backed out changeset 60d6045125e2 (bug 1120715)
CLOSED TREE
2016-03-10 20:20:05 -05:00
Daniel Holbert
9b70d28e34
Bug 1249450 part 1: Move GetSecureUpgradedURI from HttpBaseChannel to nsNetUtil. r=mcmanus
2016-03-10 15:23:45 -08:00
Ehsan Akhgari
9874b83667
Bug 1120715 - Part 1: Add Necko APIs to preserve the Request cache mode on the channel; r=mayhemer
2016-03-10 17:29:11 -05:00
Wes Kocher
53011a6a05
Backed out 6 changesets (bug 1120715) for wpt bustage in request-cache.html
...
Backed out changeset 2ee4b18f6b3a (bug 1120715)
Backed out changeset f87a25ade31e (bug 1120715)
Backed out changeset 9391f22c08c2 (bug 1120715)
Backed out changeset c5bf9f7bb86e (bug 1120715)
Backed out changeset 7e003fb64d41 (bug 1120715)
Backed out changeset ef66b64e9f8a (bug 1120715)
MozReview-Commit-ID: AI47IhtGWea
2016-03-09 15:57:43 -08:00
Ehsan Akhgari
fded90051d
Bug 1120715 - Part 1: Add Necko APIs to preserve the Request cache mode on the channel; r=mayhemer
2016-03-09 16:42:53 -05:00
Carsten "Tomcat" Book
eb98199ac0
Backed out changeset ac4148f22b2d (bug 1186072) for referrer test failures
...
--HG--
extra : rebase_source : 124130bb041418eb97862a131ae6365df5cfbdc6
2016-03-03 09:23:59 +01:00
Franziskus Kiefer
55e0623947
Bug 1186072 - add trailing slash to origin referer header when policy is set, r=sworkman
...
MozReview-Commit-ID: 3PYuODmqpbL
--HG--
extra : transplant_source : %E5P%B1%1F%82%08%07%2A%1C%26%AF%C5%C8%29%B1y%97O%877
2016-02-24 10:51:54 +01:00
Ehsan Akhgari
baf9a67550
Bug 1251873 - Store the trimmed referrer URL on HTTP channel if a trimming referrer policy is in effect; r=mcmanus
...
Failure to do this will result in the consumers of
nsIHttpChannel::GetReferrer() observing the wrong referrer. The test in this
patch shows the scenarios which would fail under such conditions.
2016-03-01 09:15:25 -05:00
Wes Kocher
e2f9524db9
Backed out changeset fc5cc380ddb3 (bug 1251873) for wpt cross-origin.swap-origin-redirect.http.html failures
...
MozReview-Commit-ID: Anr0ilrYczq
2016-02-29 13:34:55 -08:00
Ehsan Akhgari
befc43a124
Bug 1251873 - Store the trimmed referrer URL on HTTP channel if a trimming referrer policy is in effect; r=mcmanus
...
Failure to do this will result in the consumers of
nsIHttpChannel::GetReferrer() observing the wrong referrer. The test in this
patch shows the scenarios which would fail under such conditions.
2016-02-29 14:51:16 -05:00
Dylan Roeh
93886420a6
Bug 1148544 - Figure out UA override once per LoadGroup and cache it, rather than once per channel. r=nwgh
2016-02-22 15:57:18 -06:00
Honza Bambas
d9866a3576
Bug 1247998 - Let nsHttpChannel::AsyncOpen* throw after nsHttpHandler has been shutdown, r=mcmanus
2016-02-18 08:54:00 +01:00
Daniel Holbert
e064e82632
Bug 1247733 part 2: Give nsIStandardURL an API to set its default port, and use it when upgrading HTTP connections to HTTPS. r=valentin
2016-02-17 19:24:36 -08:00
Aidin Gharibnavaz
686438c658
Bug 1164581 - Adding an overload for NS_ProxyRelease that accepts already_AddRefed, and removing all the others. r=bobbyholley
2016-02-10 08:23:00 +01:00
Honza Bambas
403865b110
Bug 1231512 - Allow nsIHttpChannel.redirectTo() work also on an open channel, r=jduell
...
--HG--
rename : netwerk/test/unit/test_redirect_from_script.js => netwerk/test/unit/test_redirect_from_script_after-open_passing.js
2016-02-05 07:45:00 +01:00
Blake Kaplan
6dbe3327a3
Bug 1242472 - Properly propagate mTopWindowURI through redirects. r=francois/ckerschb
2016-02-02 13:44:11 -08:00
Kyle Huey
91efc5a86c
Bug 1241764: Replace nsPIDOMWindow with nsPIDOMWindowInner/Outer. r=mrbkap,smaug
2016-01-30 09:05:36 -08:00
Michael Madsen
150b645ebb
Bug 1241377 - Part 1: Implement nsIFormPOSTActionChannel for the channel accepts form POST. r=mayhemer
2016-01-28 19:38:34 +09:00
Andrea Marchesini
e9160985c2
Bug 1221320 - XMLHttpRequest authentication should not require auth prompt dialog, r=honzab.moz
2015-12-30 18:47:55 +00:00
Honza Bambas
31fe69aff2
Bug 1087320 - On charset reload set LOAD_FROM_CACHE only on the default channel, r=bz r=jduell
2016-01-19 15:28:00 +01:00
Patrick McManus
7ed406b2be
Bug 1238290 - fix bad necko deps on unified_sources r=valentin.gosu
...
---
netwerk/base/ARefBase.h | 2 ++
netwerk/base/CaptivePortalService.cpp | 1 +
netwerk/base/CaptivePortalService.h | 1 +
netwerk/base/EventTokenBucket.cpp | 4 +++-
netwerk/base/LoadContextInfo.cpp | 3 +++
netwerk/base/LoadInfo.cpp | 3 +++
netwerk/base/MemoryDownloader.cpp | 1 +
netwerk/base/Predictor.cpp | 1 +
netwerk/base/RedirectChannelRegistrar.h | 1 +
netwerk/base/nsBaseChannel.cpp | 1 +
netwerk/base/nsChannelClassifier.cpp | 1 +
netwerk/base/nsDirectoryIndexStream.cpp | 3 ++-
netwerk/base/nsDownloader.cpp | 1 +
netwerk/base/nsIOService.cpp | 1 +
netwerk/base/nsIncrementalDownload.cpp | 3 +++
netwerk/base/nsNetUtil.cpp | 4 ++++
netwerk/base/nsNetUtil.h | 1 +
netwerk/base/nsProtocolProxyService.cpp | 1 +
netwerk/base/nsSecCheckWrapChannel.cpp | 2 ++
netwerk/base/nsUDPSocket.cpp | 4 +++-
netwerk/cache/nsDiskCacheBinding.cpp | 2 +-
netwerk/cache/nsDiskCacheDeviceSQL.cpp | 2 ++
netwerk/cache/nsMemoryCacheDevice.cpp | 2 +-
netwerk/cache2/CacheFileUtils.cpp | 2 ++
netwerk/cache2/CacheStorageService.h | 1 +
netwerk/ipc/NeckoParent.cpp | 1 +
netwerk/ipc/RemoteOpenFileChild.cpp | 1 +
netwerk/protocol/about/nsAboutBloat.cpp | 1 +
netwerk/protocol/about/nsAboutCacheEntry.cpp | 1 +
netwerk/protocol/about/nsAboutProtocolHandler.cpp | 1 +
netwerk/protocol/data/DataChannelParent.cpp | 1 +
netwerk/protocol/file/nsFileProtocolHandler.cpp | 1 +
netwerk/protocol/ftp/FTPChannelParent.cpp | 2 ++
netwerk/protocol/ftp/FTPChannelParent.h | 1 +
netwerk/protocol/ftp/nsFtpConnectionThread.cpp | 1 +
netwerk/protocol/ftp/nsFtpProtocolHandler.h | 1 +
netwerk/protocol/http/Http2Compression.cpp | 1 +
netwerk/protocol/http/Http2Session.cpp | 1 +
netwerk/protocol/http/Http2Stream.h | 2 ++
netwerk/protocol/http/HttpBaseChannel.cpp | 4 ++++
netwerk/protocol/http/HttpBaseChannel.h | 1 +
netwerk/protocol/http/HttpChannelChild.cpp | 25 ++--------------------
netwerk/protocol/http/HttpChannelChild.h | 24 +++++++++++++++++++++
netwerk/protocol/http/HttpChannelParent.cpp | 1 +
netwerk/protocol/http/HttpChannelParent.h | 1 +
.../protocol/http/HttpChannelParentListener.cpp | 1 +
netwerk/protocol/http/HttpChannelParentListener.h | 1 +
netwerk/protocol/http/InterceptedChannel.cpp | 1 +
netwerk/protocol/http/NullHttpChannel.cpp | 1 +
netwerk/protocol/http/NullHttpTransaction.cpp | 1 +
netwerk/protocol/http/PackagedAppService.cpp | 14 ++++++++++--
netwerk/protocol/http/PackagedAppService.h | 4 +++-
netwerk/protocol/http/PackagedAppVerifier.cpp | 1 +
netwerk/protocol/http/nsCORSListenerProxy.cpp | 2 +-
netwerk/protocol/http/nsHttpBasicAuth.cpp | 1 +
netwerk/protocol/http/nsHttpChannel.cpp | 2 ++
netwerk/protocol/http/nsHttpChunkedDecoder.cpp | 1 +
netwerk/protocol/http/nsHttpConnectionInfo.cpp | 2 ++
netwerk/protocol/http/nsHttpConnectionMgr.cpp | 1 +
netwerk/protocol/http/nsHttpDigestAuth.cpp | 1 +
netwerk/protocol/viewsource/nsViewSourceHandler.h | 4 ++++
.../protocol/websocket/BaseWebSocketChannel.cpp | 1 +
.../websocket/WebSocketEventListenerParent.cpp | 1 +
.../protocol/websocket/WebSocketEventService.cpp | 3 +++
netwerk/protocol/websocket/WebSocketFrame.cpp | 2 ++
netwerk/protocol/wyciwyg/nsWyciwygChannel.cpp | 1 +
.../protocol/wyciwyg/nsWyciwygProtocolHandler.cpp | 1 +
netwerk/streamconv/converters/mozTXTToHTMLConv.cpp | 1 +
.../streamconv/converters/nsFTPDirListingConv.cpp | 1 +
.../streamconv/converters/nsHTTPCompressConv.cpp | 2 ++
netwerk/streamconv/converters/nsHTTPCompressConv.h | 1 +
netwerk/streamconv/converters/nsIndexedToHTML.cpp | 1 +
netwerk/streamconv/converters/nsMultiMixedConv.cpp | 2 ++
netwerk/streamconv/converters/nsTXTToHTMLConv.cpp | 2 ++
netwerk/streamconv/converters/nsUnknownDecoder.cpp | 2 ++
75 files changed, 147 insertions(+), 32 deletions(-)
2016-01-08 20:20:50 -05:00
Ehsan Akhgari
9f447f6c4f
Bug 1214305 - Part 7: Decide in the child process whether an intercepted channel should go through a secure upgrade; r=mcmanus
...
This is OK from a security perspective, since this decision only affects
whether the channel will be intercepted with the secure URI in the child
process. If the intercepting service worker decides to fall back to an
actual network request, we send the request to the parent process with
the original pre-upgrade URI, and the parent process will still be in
charge of whether a network visible HTTP request should be upgraded.
2016-01-04 16:30:02 -05:00
Ehsan Akhgari
9d105a6fd7
Bug 1214305 - Part 2: Refactor the logic for obtaining the secure upgraded URI into HttpBaseChannel; r=mcmanus
2016-01-04 16:30:02 -05:00
Wes Kocher
dbbade6e75
Backed out 10 changesets (bug 1214305) for leaks on linux debug m-e10s(bc7)
...
Backed out changeset 1f482566235a (bug 1214305)
Backed out changeset 001b31489756 (bug 1214305)
Backed out changeset 4e94d2088219 (bug 1214305)
Backed out changeset fba4a5bcea41 (bug 1214305)
Backed out changeset 100f8e249007 (bug 1214305)
Backed out changeset a59c453192dc (bug 1214305)
Backed out changeset 2daa86fc1fb9 (bug 1214305)
Backed out changeset c04efb57b0ed (bug 1214305)
Backed out changeset 52046e843c60 (bug 1214305)
Backed out changeset ac4fd6615828 (bug 1214305)
--HG--
extra : commitid : ILmaVumvmvH
2016-01-04 10:34:24 -08:00
Ehsan Akhgari
96c8327a92
Bug 1214305 - Part 7: Decide in the child process whether an intercepted channel should go through a secure upgrade; r=mcmanus
...
This is OK from a security perspective, since this decision only affects
whether the channel will be intercepted with the secure URI in the child
process. If the intercepting service worker decides to fall back to an
actual network request, we send the request to the parent process with
the original pre-upgrade URI, and the parent process will still be in
charge of whether a network visible HTTP request should be upgraded.
2016-01-04 09:52:47 -05:00
Ehsan Akhgari
478b7b9bc3
Bug 1214305 - Part 2: Refactor the logic for obtaining the secure upgraded URI into HttpBaseChannel; r=mcmanus
2016-01-04 09:52:39 -05:00
Jason Duell
b091fa291e
Bug 1199841 - Restructure private browsing to remember status after OnStopRequest r=jdm
2015-12-30 17:51:21 -05:00
Tim Nguyen
8fe11e6a5d
Bug 1137681 - Make user agent docshell overrides affect network requests. r=jduell
2015-12-08 09:27:00 +01:00
Jonas Sicking
28de02f687
Bug 1226909 part 3: Move logic of when to initiate CORS preflight into channels. Allow CORS preflight to happen when doing a same-origin to cross-origin redirect. r=ckerschb
2015-12-06 18:33:14 -05:00
Jonas Sicking
0e0c8c52ea
Bug 1226909 part 2: Let CORS preflight logic grab information from nsILoadInfo rather than duplicate it. r=ckerschb
2015-12-06 18:33:14 -05:00
Sebastian Hengst
774236075d
Backed out changeset 09d64535bcda (bug 1216687), a7f1a289dd78, 4dbf06183e6c, 26318a5e3006, 9ae2af3cf86d (bug 1226909) for M(1,2,5) oranges. r=backout
2015-12-05 16:34:47 +01:00
Jonas Sicking
ff12f48c5a
Bug 1226909 part 3: Move logic of when to initiate CORS preflight into channels. Allow CORS preflight to happen when doing a same-origin to cross-origin redirect. r=ckerschb
2015-12-05 01:46:20 -08:00
Jonas Sicking
918c689657
Bug 1226909 part 2: Let CORS preflight logic grab information from nsILoadInfo rather than duplicate it. r=ckerschb
2015-12-05 01:46:20 -08:00
Mike Hommey
b2e31e6ade
Bug 1225682 - Don't use nsAuto{,C}String as class member variables in netwerk/. r=mcmanus
2015-12-02 11:04:37 +09:00
Nicholas Nethercote
4a7f327575
Bug 1186783 (part 4) - Replace nsBaseHashtable::EnumerateRead() calls in netwerk/ with iterators. r=valentin.
2015-11-19 16:46:24 -08:00
Phil Ringnalda
596e8ff827
Back out 9 changesets (bug 1214305) for e10s devtools browser_bug1045902_console_csp_ignore_reflected_xss_message.js failures
...
Backed out changeset 82929be36e95 (bug 1214305)
Backed out changeset e926606aefbf (bug 1214305)
Backed out changeset 226c83ca9a2a (bug 1214305)
Backed out changeset 88ab26108f2d (bug 1214305)
Backed out changeset 2e3e4f256d46 (bug 1214305)
Backed out changeset 347cd0f8f1e3 (bug 1214305)
Backed out changeset be072bba15fc (bug 1214305)
Backed out changeset 3b85acbe7be7 (bug 1214305)
Backed out changeset 49b930683c02 (bug 1214305)
2015-11-14 10:09:58 -08:00
Ehsan Akhgari
f51834eac5
Bug 1214305 - Part 7: Decide in the child process whether an intercepted channel should go through a secure upgrade; r=mcmanus
...
This is OK from a security perspective, since this decision only affects
whether the channel will be intercepted with the secure URI in the child
process. If the intercepting service worker decides to fall back to an
actual network request, we send the request to the parent process with
the original pre-upgrade URI, and the parent process will still be in
charge of whether a network visible HTTP request should be upgraded.
2015-11-02 11:27:00 -05:00
Ehsan Akhgari
1295fc0d03
Bug 1214305 - Part 2: Refactor the logic for obtaining the secure upgraded URI into HttpBaseChannel; r=mcmanus
2015-11-02 11:27:00 -05:00
Ben Kelly
c59018c14a
Bug 1220007 P1 Allow ConsoleReportCollectors to flush to another collector. r=bz
2015-11-03 11:20:56 -08:00
Carsten "Tomcat" Book
507e90cf52
Backed out changeset c253b6bd00b1 (bug 1220007) for causing a bustage on B2g-emulator L builds which is only visible on b2g-inbound on a CLOSED TREE
2015-11-03 14:08:50 +01:00
Ben Kelly
671d5644f9
Bug 1220007 P1 Allow ConsoleReportCollectors to flush to another collector. r=bz
2015-11-02 12:04:29 -08:00
Nate Hughes ext:(%2C%20Valentin%20Gosu%20%3Cvalentin.gosu%40gmail.com%3E)
7e19134192
Bug 1154309 - Add New Resource Timing Fields r=bz,hurley
2015-07-24 08:49:25 -07:00
Christoph Kerschbaumer
7dd3e47cb3
Bug 1194052 - Append to redirectchain before asyncopen() is called (r=sicking,mayhemer)
2015-10-31 15:22:01 -07:00
Ben Kelly
5f3adc2e2b
Bug 1215140 P3 Flush pending console reports on http channels. r=bz
2015-10-29 19:53:25 -07:00
Ben Kelly
569cd6e587
Bug 1215140 P2 Make HttpBaseChannel implement nsIConsoleReportCollector. r=bz
2015-10-29 19:53:25 -07:00
Josh Matthews
d3726427db
Bug 1173811 - Part 1: Propagate the response URL to intercepted channels when necessary (non-e10s). r=mayhemer,bkelly
2015-10-22 09:23:39 -04:00
Phil Ringnalda
6401c0185c
Back out 2 changesets (bug 1173811) for test_synthesized_response.js timeouts
...
CLOSED TREE
Backed out changeset 56bc1314e660 (bug 1173811 )
Backed out changeset 0ad51d302ba9 (bug 1173811 )
2015-10-21 20:21:05 -07:00
Josh Matthews
591281df75
Bug 1173811 - Part 1: Propagate the response URL to intercepted channels when necessary (non-e10s). r=mayhemer,bkelly
2015-10-21 00:05:40 -04:00
Nathan Froyd
01583602a9
Bug 1207245 - part 6 - rename nsRefPtr<T> to RefPtr<T>; r=ehsan; a=Tomcat
...
The bulk of this commit was generated with a script, executed at the top
level of a typical source code checkout. The only non-machine-generated
part was modifying MFBT's moz.build to reflect the new naming.
CLOSED TREE makes big refactorings like this a piece of cake.
# The main substitution.
find . -name '*.cpp' -o -name '*.cc' -o -name '*.h' -o -name '*.mm' -o -name '*.idl'| \
xargs perl -p -i -e '
s/nsRefPtr\.h/RefPtr\.h/g; # handle includes
s/nsRefPtr ?</RefPtr</g; # handle declarations and variables
'
# Handle a special friend declaration in gfx/layers/AtomicRefCountedWithFinalize.h.
perl -p -i -e 's/::nsRefPtr;/::RefPtr;/' gfx/layers/AtomicRefCountedWithFinalize.h
# Handle nsRefPtr.h itself, a couple places that define constructors
# from nsRefPtr, and code generators specially. We do this here, rather
# than indiscriminantly s/nsRefPtr/RefPtr/, because that would rename
# things like nsRefPtrHashtable.
perl -p -i -e 's/nsRefPtr/RefPtr/g' \
mfbt/nsRefPtr.h \
xpcom/glue/nsCOMPtr.h \
xpcom/base/OwningNonNull.h \
ipc/ipdl/ipdl/lower.py \
ipc/ipdl/ipdl/builtin.py \
dom/bindings/Codegen.py \
python/lldbutils/lldbutils/utils.py
# In our indiscriminate substitution above, we renamed
# nsRefPtrGetterAddRefs, the class behind getter_AddRefs. Fix that up.
find . -name '*.cpp' -o -name '*.h' -o -name '*.idl' | \
xargs perl -p -i -e 's/nsRefPtrGetterAddRefs/RefPtrGetterAddRefs/g'
if [ -d .git ]; then
git mv mfbt/nsRefPtr.h mfbt/RefPtr.h
else
hg mv mfbt/nsRefPtr.h mfbt/RefPtr.h
fi
--HG--
rename : mfbt/nsRefPtr.h => mfbt/RefPtr.h
2015-10-18 01:24:48 -04:00
Michael Layzell
d4beae866a
Backout of bug 1207233 due to web-compat concerns
2015-10-14 16:06:35 -04:00
Ehsan Akhgari
d5f5467827
Bug 1213150 follow-up: fix build bustage
2015-10-09 11:27:05 -04:00
Ehsan Akhgari
f303ed36f2
Bug 1213150 - Part 2: Rework ShouldPrepareForIntercept() in terms of subresource requests; r=jdm
2015-10-09 10:52:55 -04:00
Patrick McManus
0793f32151
bug 1211916 - rename brotli http coding to br r=bagder
2015-10-06 11:03:50 -04:00
Patrick McManus
295fd4fa05
bug 1211580 - cancel brotli failures from channel instead of converter r=bagder
2015-10-05 14:11:26 -04:00
Ben Kelly
031144370f
Bug 1210941 P12 Remove http channel's ForceNoIntercept. r=jduell IGNORE IDL
2015-10-06 06:37:07 -07:00
Ben Kelly
5f0bbc9218
Bug 1210941 P2 Use LOAD_BYPASS_SERVICE_WORKER in HttpBaseChannel instead of mForceNoIntercept. r=jduell
2015-10-06 06:37:06 -07:00
Andrea Marchesini
48bc6c454b
Bug 1147749 - View source should go through service worker interception, r=bz, r=jduell
2015-10-05 14:46:24 +01:00
Ehsan Akhgari
7f68257bc6
Bug 1204596 - Part 1: Avoid overriding the channel final URI when it gets intercepted; r=nsm,bkelly
2015-10-01 18:47:04 -04:00