Commit graph

672 commits

Author SHA1 Message Date
Jonathan Hao
bc22b048bf Bug 1283319 - Add origin attributes to nsHttpConnectionInfo's hash key. r=mayhemer
--HG--
extra : rebase_source : a3f95ed223d6658e78daba0268407b7be0b7e16f
2016-08-04 01:17:00 -04:00
Christoph Kerschbaumer
3976be42ff Bug 1288361 - Return a network error for requests whose type is script and response has a MIME type that starts with image. r=dveditz 2016-08-22 08:55:35 +02:00
Honza Bambas
70d3208f45 Bug 1293765 - Don't release upload stream in HTTP channel until authentication loop is done. r=valentin 2016-08-17 07:08:00 -04:00
Chris Peterson
b64548f6c6 Bug 1295085 - Replace PR_snprintf and s[n]printf calls with SprintfLiteral in netwerk/. r=jduell 2016-08-15 01:09:06 -07:00
Yoshi Huang
9895a88a2a Bug 1292450 - Check mPrivateBrowsingId is correct in LoadInfo and LoadContext. r=smaug, ehsan
Make sure the mPrivateBrowsingId of Origin Attributes is consistent
between LoadInfo and LoadContext.

For chrome docshell, its mPrivateBrowsingId remains 0 even if its
UserPrivateBrowsing() is true (bug 1278664). So we sync the
mPrivateBrowsingId field in LoadInfo in the same way.
2016-08-15 19:03:24 +08:00
Christoph Kerschbaumer
f2589e5050 Bug 1294411 - Update XCTO: nosniff implementation to accept images which content type starts with 'image/'. r=dveditz 2016-08-11 14:49:02 +02:00
Nicholas Nethercote
e7f10a07fd Bug 1293603 (part 2) - Make Run() declarations consistent. r=erahm.
This patch makes most Run() declarations in subclasses of nsIRunnable have the
same form: |NS_IMETHOD Run() override|.

As a result of these changes, I had to add |override| to a couple of other
functions to satisfy clang's -Winconsistent-missing-override warning.

--HG--
extra : rebase_source : 815d0018b0b13329bb5698c410f500dddcc3ee12
2016-08-08 12:18:10 +10:00
Decky Coss
646f325157 Bug 1277019 - Change header and status parsing methods to take nsACString instead of char array. r=mayhemer
MozReview-Commit-ID: 7ZNwvnTMCzo

--HG--
extra : transplant_source : %E7T%DC%83%08%22%11%92%A4%2C%89G%1C%88%B3L%0D%7D%FA%FC
2016-05-31 12:42:15 -04:00
Iris Hsiao
caea40742f Backed out changeset 8dc198cd46ff (bug 1246540) for Mochitest failures 2016-07-27 13:14:07 +08:00
Kate McKinley
c6650db185 Bug 1246540 HSTS Priming Proof of Concept
HSTS priming changes the order of mixed-content blocking and HSTS
upgrades, and adds a priming request to check if a mixed-content load is
accesible over HTTPS and the server supports upgrading via the
Strict-Transport-Security header.

Every call site that uses AsyncOpen2 passes through the mixed-content
blocker, and has a LoadInfo. If the mixed-content blocker marks the load as
needing HSTS priming, nsHttpChannel will build and send an HSTS priming
request on the same URI with the scheme upgraded to HTTPS. If the server
allows the upgrade, then channel performs an internal redirect to the HTTPS URI,
otherwise use the result of mixed-content blocker to allow or block the
load.

nsISiteSecurityService adds an optional boolean out parameter to
determine if the HSTS state is already cached for negative assertions.
If the host has been probed within the previous 24 hours, no HSTS
priming check will be sent.

(r=ckerschb,r=mayhemer,r=jld,r=smaug,r=dkeeler,r=jmaher,p=ally)
2016-07-26 13:03:00 +08:00
Iris Hsiao
a7c8429fc4 Backed out changeset d7e39be85498 (bug 1246540) for Mochitest failures 2016-07-27 11:15:52 +08:00
Kate McKinley
567ebcf321 Bug 1246540 - HSTS Priming Proof of Concept. r=ckerschb, r=mayhemer, r=jld, r=smaug, r=dkeeler, r=jmaher, p=ally
HSTS priming changes the order of mixed-content blocking and HSTS
upgrades, and adds a priming request to check if a mixed-content load is
accesible over HTTPS and the server supports upgrading via the
Strict-Transport-Security header.

Every call site that uses AsyncOpen2 passes through the mixed-content
blocker, and has a LoadInfo. If the mixed-content blocker marks the load as
needing HSTS priming, nsHttpChannel will build and send an HSTS priming
request on the same URI with the scheme upgraded to HTTPS. If the server
allows the upgrade, then channel performs an internal redirect to the HTTPS URI,
otherwise use the result of mixed-content blocker to allow or block the
load.

nsISiteSecurityService adds an optional boolean out parameter to
determine if the HSTS state is already cached for negative assertions.
If the host has been probed within the previous 24 hours, no HSTS
priming check will be sent.
2016-07-26 13:03:00 -04:00
Carsten "Tomcat" Book
25aa8617fc Backed out changeset 1825b8fa636a (bug 1246540) for bustage
--HG--
extra : rebase_source : 45defacae713b2c2f75813fea6f2f289ebc481cd
2016-07-26 12:52:15 +02:00
Kate McKinley
01cbd73591 Bug 1246540 - HSTS Priming Proof of Concept. r=ckerschb,r=mayhemer,r=jld,r=smaug,r=dkeeler,r=jmaher,p=ally
HSTS priming changes the order of mixed-content blocking and HSTS
upgrades, and adds a priming request to check if a mixed-content load is
accesible over HTTPS and the server supports upgrading via the
Strict-Transport-Security header.

Every call site that uses AsyncOpen2 passes through the mixed-content
blocker, and has a LoadInfo. If the mixed-content blocker marks the load as
needing HSTS priming, nsHttpChannel will build and send an HSTS priming
request on the same URI with the scheme upgraded to HTTPS. If the server
allows the upgrade, then channel performs an internal redirect to the HTTPS URI,
otherwise use the result of mixed-content blocker to allow or block the
load.

nsISiteSecurityService adds an optional boolean out parameter to
determine if the HSTS state is already cached for negative assertions.
If the host has been probed within the previous 24 hours, no HSTS
priming check will be sent.

(r=ckerschb,r=mayhemer,r=jld,r=smaug,r=dkeeler,r=jmaher,p=ally)
2016-07-25 12:37:00 +02:00
Carsten "Tomcat" Book
0a5622c093 Backed out changeset 640247e978ba (bug 1246540) for bustage 2016-07-24 15:59:31 +02:00
Kate McKinley
547500d5a7 Bug 1246540 - HSTS Priming Proof of Concept. r=honzab
HSTS priming changes the order of mixed-content blocking and HSTS
upgrades, and adds a priming request to check if a mixed-content load is
accesible over HTTPS and the server supports upgrading via the
Strict-Transport-Security header.

Every call site that uses AsyncOpen2 passes through the mixed-content
blocker, and has a LoadInfo. If the mixed-content blocker marks the load as
needing HSTS priming, nsHttpChannel will build and send an HSTS priming
request on the same URI with the scheme upgraded to HTTPS. If the server
allows the upgrade, then channel performs an internal redirect to the HTTPS URI,
otherwise use the result of mixed-content blocker to allow or block the
load.

nsISiteSecurityService adds an optional boolean out parameter to
determine if the HSTS state is already cached for negative assertions.
If the host has been probed within the previous 24 hours, no HSTS
priming check will be sent.

(r=ckerschb,r=mayhemer,r=jld,r=smaug,r=dkeeler,r=jmaher,p=ally)
2016-07-22 18:35:00 +02:00
Wei-Cheng Pan
eab2098c99 Bug 1264566 - Part 3: Release upload stream after request complete. r=valentin
MozReview-Commit-ID: 5r1fEkOy9vU

--HG--
extra : transplant_source : %1Dc6%99%3F%5C%81%F6%FDu%FD%C0l%B8-%CD%AF%BBx%01
extra : histedit_source : b407a427fa4cd3fedfd71f7d7f56958fce1099ca
2016-06-24 18:12:32 +08:00
Franziskus Kiefer
dd5231632f Bug 1263793 - Using content signature verifier for verifying remote newtab, r=keeler,mayhemer
MozReview-Commit-ID: ABXYYseKImq

--HG--
extra : rebase_source : 79614e5215e738dff9683ad447245bd830c887bf
2016-05-19 10:59:48 +02:00
Chris Peterson
b175c9fdd5 Bug 1277106 - Part 2: Expand MOZ_UTF16() strings to u"" string literals. r=Waldo 2016-07-20 22:03:25 -07:00
Wes Kocher
e2d9911273 Backed out changeset 21d8bb5af7b4 (bug 1263793) for leaks in various jobs CLOSED TREE 2016-07-20 11:16:37 -07:00
Franziskus Kiefer
9b9c643025 Bug 1263793 - Using content signature verifier for verifying remote newtab, r=keeler,mayhemer
MozReview-Commit-ID: CHUPgBr8WaC

--HG--
extra : rebase_source : 969bd058a157c7307b7a4d3c2a4c5d62e82b7489
2016-05-19 10:59:48 +02:00
Christoph Kerschbaumer
9ec95d3d9d Bug 471020 - Implement X-Content-Type-Options: nosniff. r=dveditz,bz,mcmanus 2016-07-20 12:22:27 +02:00
Dragana Damjanovic
56aa665f1b Bug 1274818 - Early return from nsHttpChannel::CallOnStartRequest on its second call, r=dragana 2016-07-15 12:14:00 +02:00
Wes Kocher
c9783f64cb Backed out 4 changesets (bug 471020) for frequent Windows w(2) failures CLOSED TREE a=merge
Backed out changeset d9675ab3d203 (bug 471020)
Backed out changeset 3ee328c56de0 (bug 471020)
Backed out changeset 000576e264bd (bug 471020)
Backed out changeset ffe60708c457 (bug 471020)
2016-07-18 16:07:28 -07:00
Christoph Kerschbaumer
f897b7df7e Bug 471020 - Implement X-Content-Type-Options: nosniff. r=dveditz,bz,mcmanus 2016-07-18 14:47:48 +02:00
Honza Bambas
0c62c74b9f Bug 1273918 - Revalidate no-store responses even when offline, r=mcmanus
--HG--
extra : rebase_source : 1d2d2b336c78e3d7ac84d7173b75d5b615f25404
2016-06-08 05:25:00 +02:00
Andrea Marchesini
64734bf74c Bug 1278838 - Remove separate worker binding for Performance API, r=smaug
--HG--
rename : dom/performance/nsPerformance.cpp => dom/performance/Performance.cpp
rename : dom/performance/nsPerformance.h => dom/performance/Performance.h
rename : dom/workers/Performance.cpp => dom/performance/PerformanceWorker.cpp
rename : dom/workers/Performance.h => dom/performance/PerformanceWorker.h
2016-06-09 19:04:42 +02:00
Honza Bambas
e7758d8a8c Bug 1188387 - On failure of nsHttpChannel::ProcessNotModified redirect to reload from network, r=michal
--HG--
extra : rebase_source : f714c545a6a1b7fba0691ee5032257f291a558be
2016-06-08 04:24:00 +02:00
dimi
74a630e7b1 Bug 1258033 - Part 3: Set DNT header based on preference and tracking protection. r=mcmanus
MozReview-Commit-ID: JIOIomOvUhN

--HG--
extra : rebase_source : a3b7780ad1a3f71e18b4cdd15a40eb281b0e0c82
2016-06-02 10:23:46 +08:00
Jarda Snajdr
4948ad52d6 Bug 1274556 - Add a channelId attribute to nsIHttpChannel r=hurley 2016-06-01 12:29:21 -07:00
Honza Bambas
4218070bbb Bug 1276673 - Adjust |doomOnFailure| argument when calling CloseCacheEntry properly, r=michal 2016-06-01 12:25:43 -07:00
Dragana Damjanovic dd.mozilla@gmail.com
15abb6f63e Bug 1274917 - Add net original headers to cache.r=mayhemer 2016-06-01 06:25:00 +02:00
Dragana Damjanovic dd.mozilla@gmail.com
d53c07485b Bug 1271987 - After on-***-request observers and loadGroup::AddRequest are called, on a failure AsyncOpen() must return async.r=mcmanus, r=mayhemer
MozReview-Commit-ID: AAi6R0pb6It

--HG--
extra : histedit_source : 8c7f0f46745958c7d3aa7e8a5521bb5a38e6e10e
2016-05-31 22:13:23 -07:00
Honza Bambas
97f671937b Bug 428916 - support Cache-control directives in HTTP requests, r=mcmanus+michal+froydnj 2016-05-20 08:33:00 +02:00
Jason Duell
ee5595f78a Backed out changeset 0d5cc353d9e0 a=crashes 2016-05-26 23:07:57 -07:00
Dragana Damjanovic
c10122236d Bug 507571 - Lock nsHttpResponseHead. r=mcmanus 2016-05-24 06:07:00 +02:00
Chris Peterson
2dec5055ef Bug 1274162 - Fix -Wshadow warnings in netwerk/protocol/http/ directory. r=mcmanus
netwerk/protocol/http/nsHttpHeaderArray.h:96:63 [-Wshadow] declaration shadows a field of 'mozilla::net::nsHttpHeaderArray::nsEntry'
netwerk/protocol/http/Http2Session.cpp:2766:14 [-Wshadow] declaration shadows a local variable
netwerk/protocol/http/HttpBaseChannel.cpp:1886:14 [-Wshadow] declaration shadows a local variable
netwerk/protocol/http/HttpChannelChild.cpp:265:53 [-Wshadow] declaration shadows a field of 'mozilla::net::AssociateApplicationCacheEvent'
netwerk/protocol/http/HttpChannelChild.cpp:266:53 [-Wshadow] declaration shadows a field of 'mozilla::net::AssociateApplicationCacheEvent'
netwerk/protocol/http/HttpChannelChild.cpp:2566:14 [-Wshadow] declaration shadows a local variable
netwerk/protocol/http/HttpChannelParent.cpp:397:17 [-Wshadow] declaration shadows a local variable
netwerk/protocol/http/InterceptedChannel.cpp:276:14 [-Wshadow] declaration shadows a local variable
netwerk/protocol/http/InterceptedChannel.cpp:285:14 [-Wshadow] declaration shadows a local variable
netwerk/protocol/http/SpdySession31.cpp:2177:14 [-Wshadow] declaration shadows a local variable
netwerk/protocol/http/nsCORSListenerProxy.cpp:304:30 [-Wshadow] declaration shadows a local variable
netwerk/protocol/http/nsHttpChannel.cpp:796:17 [-Wshadow] declaration shadows a local variable
netwerk/protocol/http/nsHttpChannel.cpp:4474:35 [-Wshadow] declaration shadows a local variable
netwerk/protocol/http/nsHttpChannel.cpp:5915:18 [-Wshadow] declaration shadows a local variable
netwerk/protocol/http/nsHttpConnection.cpp:982:21 [-Wshadow] declaration shadows a local variable
netwerk/protocol/http/nsHttpConnectionMgr.cpp:1220:43 [-Wshadow] declaration shadows a local variable
netwerk/protocol/http/nsHttpConnectionMgr.cpp:1240:43 [-Wshadow] declaration shadows a local variable
netwerk/protocol/http/nsHttpConnectionMgr.cpp:2247:27 [-Wshadow] declaration shadows a local variable
netwerk/protocol/http/nsHttpConnectionMgr.cpp:2758:23 [-Wshadow] declaration shadows a local variable
netwerk/protocol/http/nsHttpPipeline.cpp:709:30 [-Wshadow] declaration shadows a local variable
2016-05-10 23:57:24 -07:00
Valentin Gosu
26adbcb7e5 Bug 816866 - Trigger a captive portal recheck when a certificate error occurs r=mcmanus 2016-05-17 23:55:52 +02:00
Jason Duell
c3ec8327dc Bug 759819 - necko objects not releasing nsIRequestObservers after OnStop r=mcmanus 2016-05-16 15:13:39 -07:00
Christoph Kerschbaumer
978f0ba0a2 Bug 1272345 - Gather Telemetry on URL redirects (r=valentin) 2016-05-12 19:38:22 +02:00
Patrick McManus
a7bc1a51b1 Bug 1267474 - cache-control: immutable 2/3 r=mayhemer
--HG--
extra : rebase_source : 672e836ef7ce70c20f7f8da8baf9f109254246fe
2016-05-04 22:37:53 -04:00
Patrick McManus
2722b75b4d Bug 1267474 - only revalidate strongly framed responses 1/3 r=mayhemer
--HG--
extra : rebase_source : 9e00df6a46684032e62da6e2e607a7f65ff63d87
2016-05-04 17:03:59 -04:00
Wes Kocher
1806870b06 Backed out 3 changesets (bug 1267474) foor test_immutable.js failures in xpcshell jobs
Backed out changeset 057f3f50441f (bug 1267474)
Backed out changeset 960d93f30c66 (bug 1267474)
Backed out changeset 0c059a0e87d7 (bug 1267474)
2016-05-11 10:32:33 -07:00
Patrick McManus
aaaa179e7c Bug 1267474 - cache-control: immutable 2/3 r=mayhemer
--HG--
extra : rebase_source : 5022699f221ecd3cb66336ef11c6863b89e8de88
2016-05-04 22:37:53 -04:00
Patrick McManus
7f770ceea1 Bug 1267474 - only revalidate strongly framed responses 1/3 r=mayhemer
--HG--
extra : rebase_source : 7cd8ceea26962af47daaab5fc786b24a773f3e47
2016-05-04 17:03:59 -04:00
Carsten "Tomcat" Book
79ae391df9 Backed out changeset 81d69d7cf909 (bug 1267474) for bustage on a CLOSED TREE 2016-05-11 16:10:51 +02:00
Carsten "Tomcat" Book
3ff5ccb3a0 Backed out changeset 928d0afa32b7 (bug 1267474) 2016-05-11 16:10:28 +02:00
Patrick McManus
068dddd27e Bug 1267474 - cache-control: immutable 2/3 r=mayhemer 2016-05-04 22:37:53 -04:00
Patrick McManus
5bce2b10a7 Bug 1267474 - only revalidate strongly framed responses 1/3 r=mayhemer 2016-05-04 17:03:59 -04:00
Nicholas Hurley
cd0ff9abb0 Bug 1269448 - Fix test assertions. r=mayhemer
MozReview-Commit-ID: HQyi9SJmIC2
2016-05-04 08:44:21 -07:00