Closed Bug 1087739 Opened 10 years ago Closed 10 years ago

Make JS callers of ios.newChannel call ios.newChannel2 in netwerk/

Categories

(Core :: DOM: Security, defect)

defect
Not set
normal

Tracking

()

RESOLVED FIXED
mozilla37

People

(Reporter: ckerschb, Assigned: ckerschb)

References

Details

Attachments

(1 file)

No description provided.
Blocks: 1087720
Even though there are some dependencies that haven't cleared yet, we should start getting reviews. Especially for this patch, sine netwerk/ contains the most callsites of ioservice.newChannel which need to be updated. Can you please make sure that we pass the right principal, node, triggeringPrincipal?
Attachment #8525688 - Flags: review?(tanvi)
Attachment #8525688 - Flags: review?(jduell.mcbugs)
Assignee: nobody → mozilla
Status: NEW → ASSIGNED
Comment on attachment 8525688 [details] [diff] [review] js_12_netwerk.patch Steve volunteered to take a first peek at that monster-patch as well. Probably in the end we still want jduell to look over it since that is all security critical code.
Attachment #8525688 - Flags: review?(jduell.mcbugs) → review?(sworkman)
Comment on attachment 8525688 [details] [diff] [review] js_12_netwerk.patch Review of attachment 8525688 [details] [diff] [review]: ----------------------------------------------------------------- Looks fine to me. r=me. ::: netwerk/test/unit/test_NetUtil.js @@ +12,5 @@ > > Cu.import("resource://gre/modules/NetUtil.jsm"); > Cu.import("resource://gre/modules/Task.jsm"); > Cu.import("resource://gre/modules/Promise.jsm"); > +Cu.import("resource://gre/modules/Services.jsm"); Quick suggestion: add the following to shorten the arg lists: var getSystemPrincipal = Services.scriptSecurityManager.getSystemPrincipal; You should be able to call getSystemPrincipal() directly in the rest of the script now. Not a requirement; use it now or remember it for the future. ::: netwerk/test/unit/test_file_protocol.js @@ +37,5 @@ > function new_file_channel(file) { > var ios = > Cc["@mozilla.org/network/io-service;1"]. > getService(Ci.nsIIOService); > + return ios.newChannelFromURI2(ios.newFileURI(file0, s/file0/file/
Attachment #8525688 - Flags: review?(sworkman) → review+
Comment on attachment 8525688 [details] [diff] [review] js_12_netwerk.patch Looks like these are all tests and they all use: null for aLoadingNode system for aLoadingPrincipal null for aTriggeringPrincipal SEC_NORMAL for the security flags. TYPE_OTHER for content policy type Couple indentation issues here: https://bugzilla.mozilla.org/attachment.cgi?id=8525688&action=diff#a/netwerk/test/unit/test_http2.js_sec3 https://bugzilla.mozilla.org/attachment.cgi?id=8525688&action=diff#a/netwerk/test/unit/test_mismatch_last-modified.js_sec3 For the following data: uris, is SEC_NORMAL the right security flag to use? data: inherits principal (http://mxr.mozilla.org/mozilla-central/source/netwerk/protocol/data/nsDataHandler.cpp#53) so perhaps we should use SEC_FORCE_INHERIT_PRINCIPAL. https://bugzilla.mozilla.org/attachment.cgi?id=8525688&action=diff#a/netwerk/test/unit/test_NetUtil.js_sec6 (in test_asyncFetch_does_not_block()) https://bugzilla.mozilla.org/attachment.cgi?id=8525688&action=diff#a/netwerk/test/unit/test_bug376660.js_sec3
Attachment #8525688 - Flags: review?(tanvi) → review+
Status: ASSIGNED → RESOLVED
Closed: 10 years ago
Resolution: --- → FIXED
Depends on: 1138648
You need to log in before you can comment on or make changes to this bug.

Attachment

General

Created:
Updated:
Size: