Allow Accept-Encoding: Brotli on local connections (localhost/127.0.0.1/::1)
Categories
(Core :: Networking: HTTP, defect, P3)
Tracking
()
People
(Reporter: callahad, Assigned: denschub)
References
Details
(Keywords: dev-doc-needed, DevAdvocacy, Whiteboard: [necko-backlog][DevRel:P3])
Attachments
(2 files, 5 obsolete files)
6.66 KB,
patch
|
dragana
:
review+
|
Details | Diff | Splinter Review |
8.42 KB,
patch
|
dragana
:
review+
|
Details | Diff | Splinter Review |
Comment 1•9 years ago
|
||
Comment 2•9 years ago
|
||
Updated•9 years ago
|
Reporter | ||
Updated•9 years ago
|
Updated•8 years ago
|
Updated•8 years ago
|
Updated•8 years ago
|
Comment 3•7 years ago
|
||
Comment 4•7 years ago
|
||
Comment 5•6 years ago
|
||
Comment 6•6 years ago
|
||
Comment 7•6 years ago
|
||
Comment 8•6 years ago
|
||
Updated•6 years ago
|
Comment 9•6 years ago
|
||
Rebased. (And also fixed getting the bug number wrong in the commit message, embarrassingly.)
Comment 10•6 years ago
|
||
As suggested, names have been changed to avoid implying security when it's only potential trustworthiness.
Comment 11•6 years ago
|
||
It helps if I actually commit the changes before generating a patch, doesn't it?
Updated•6 years ago
|
Comment 12•6 years ago
|
||
Two questions that've occurred to me since yesterday:
-
If
IsOriginPotentiallyTrustworthy
can't get the principal or the security service, it doesn't setisPotentiallyTrustworthy
at all. Is that the desired behaviour, effectively leaving it up to the caller and expecting them to initialise the variable beforehand? I think I should document that, if so. Alternatively, should it prefer to fail closed? I have no idea under what circumstances those calls can fail. -
This is going to need an intent-to-implement/ship on m.d.platform, right? Would it be appropriate for me to send that, or should that be a Mozilla employee?
Comment 13•6 years ago
|
||
Comment 14•6 years ago
|
||
Comment 15•6 years ago
|
||
(In reply to quasicomputational from comment #12)
Two questions that've occurred to me since yesterday:
- If
IsOriginPotentiallyTrustworthy
can't get the principal or the security service, it doesn't setisPotentiallyTrustworthy
at all. Is that the desired behaviour, effectively leaving it up to the caller and expecting them to initialise the variable beforehand? I think I should document that, if so. Alternatively, should it prefer to fail closed? I have no idea under what circumstances those calls can fail.
we should set it to false at the beginning of IsOriginPotentiallyTrustworthy.
- This is going to need an intent-to-implement/ship on m.d.platform, right? Would it be appropriate for me to send that, or should that be a Mozilla employee?
You can send this as well it does not need to be a Mozilla employee.
Comment 16•6 years ago
|
||
Everything's 'trustworthy' now instead of 'secure', except for the pref name.
Comment 17•6 years ago
|
||
More trustworthification, as well as ensuring the trustworthiness check fails closed instead of fails undefined.
Comment 18•6 years ago
|
||
Comment 19•6 years ago
|
||
Comment 20•5 years ago
|
||
just got bit by this, is there any update on when this patch to fix brotli support will be merged?
Comment 21•5 years ago
|
||
No, sorry - I don't have the time/patience presently to shepherd it through the process and I don't expect to soon.
I think the patches are in a good state, though! I don't know if they need rebasing now, but if anyone wants to take them up and get them merged, please feel free.
Assignee | ||
Updated•3 years ago
|
Updated•2 years ago
|
Description
•