Closed Bug 1194519 Opened 9 years ago Closed 9 years ago

Call AsyncOpen2 within child and parent if securityFlags are present

Categories

(Core :: DOM: Security, defect)

defect
Not set
normal

Tracking

()

RESOLVED FIXED
mozilla43
Tracking Status
firefox43 --- fixed

People

(Reporter: ckerschb, Assigned: ckerschb)

References

Details

Attachments

(1 file, 1 obsolete file)

No description provided.
We should also branch within HttpChannelChild redirects and potentially call asyncOpen2() if securityFlags are present.
Assignee: nobody → mozilla
Blocks: 1143922
Comment on attachment 8647793 [details] [diff] [review] bug_1194519_asyncopen2_in_httpchannelchild.patch Review of attachment 8647793 [details] [diff] [review]: ----------------------------------------------------------------- I don't actually know this code well enough to be sure that this is correct :( Can you get someone else to review?
Attachment #8647793 - Flags: review?(jonas)
Comment on attachment 8647793 [details] [diff] [review] bug_1194519_asyncopen2_in_httpchannelchild.patch Bill, whenever we open a redirected channel (in regular mode), we check if the 'enforcesecurity' flag is set in the loadInfo, which basically indicates, if the original channel was openend using asyncOpen2, then also open the redirected channel using asyncOpen2. I am pretty sure we should do the same thing in e10s. Does that sound reasonable? [1] http://mxr.mozilla.org/mozilla-central/source/netwerk/protocol/http/nsHttpChannel.cpp#2056
Attachment #8647793 - Flags: review?(wmccloskey)
Comment on attachment 8647793 [details] [diff] [review] bug_1194519_asyncopen2_in_httpchannelchild.patch Review of attachment 8647793 [details] [diff] [review]: ----------------------------------------------------------------- This seems fine to me, but Jason should probably review it.
Comment on attachment 8647793 [details] [diff] [review] bug_1194519_asyncopen2_in_httpchannelchild.patch Jason, any chance you could look at that?
Attachment #8647793 - Flags: review?(jduell.mcbugs)
Comment on attachment 8647793 [details] [diff] [review] bug_1194519_asyncopen2_in_httpchannelchild.patch Review of attachment 8647793 [details] [diff] [review]: ----------------------------------------------------------------- Makes sense to me.
Attachment #8647793 - Flags: review?(wmccloskey)
Attachment #8647793 - Flags: review?(jduell.mcbugs)
Attachment #8647793 - Flags: review+
Summary: Call AsyncOpen2() within HttpChannelChild if enforceSecurityFlags are set → Call AsyncOpen2 within child and parent if securityFlags are present
Jason, I just realized that there are more callsites of AsyncOpen() within *Child.cpp as well as *Parent.cpp which we have to inspect and update. Sorry, I haven't included those the first time I flagged you for review. Anyway, whenever securityFlags are set to true, we should call AsyncOpen2 instead of AsyncOpen(), otherwise we security checks are bypassed.
Attachment #8647793 - Attachment is obsolete: true
Attachment #8650696 - Flags: review?(jduell.mcbugs)
Comment on attachment 8650696 [details] [diff] [review] bug_1194519_asyncopen2_child_parent.patch Review of attachment 8650696 [details] [diff] [review]: ----------------------------------------------------------------- Sorry, I feel like a dope for missing those too :)
Attachment #8650696 - Flags: review?(jduell.mcbugs) → review+
url: https://hg.mozilla.org/integration/mozilla-inbound/rev/8a5579a007a9e78fe78bd83b4dce4a2a3dc53bf3 changeset: 8a5579a007a9e78fe78bd83b4dce4a2a3dc53bf3 user: Christoph Kerschbaumer <mozilla@christophkerschbaumer.com> date: Fri Aug 21 20:33:56 2015 -0700 description: Bug 1194519 - call AsyncOpen2 within child and parent if securityFlags are present (r=jduell)
Status: NEW → RESOLVED
Closed: 9 years ago
Resolution: --- → FIXED
Target Milestone: --- → mozilla43
You need to log in before you can comment on or make changes to this bug.

Attachment

General

Created:
Updated:
Size: