Closed Bug 1468213 Opened Last year Closed Last year

propagate nsILoadInfo.serviceWorkerTaintingSynthesized and tainting value from parent to child process

Categories

(Core :: DOM: Service Workers, enhancement)

enhancement
Not set

Tracking

()

RESOLVED FIXED
mozilla62
Tracking Status
firefox62 --- fixed

People

(Reporter: bkelly, Assigned: bkelly)

References

(Blocks 1 open bug)

Details

Attachments

(1 file)

In order for parent-side intercept to work with the e10s pref flipped we need to propagate whether or not the tainting value was synthesized by a service worker.  This means getting the nsILoadInfo.serviceWorkerTaintingSynthesized boolean and the actual tainting value back from the parent process to the child process.
Comment on attachment 8984847 [details] [diff] [review]
Propagate nsILoadInfo.serviceWorkerTaintingSynthesized and tainting values from parent process to child process. r=valentin

Valentin, when parent-side intercept is in use the service worker will end up setting tainting information on the LoadInfo.  This must be propagated back to the child process in order for the synthesized response to be interpreted correctly.

Note, with bug 1468209 this also effectively propagates back the "is this channel synthesized" state as well.
Attachment #8984847 - Flags: review?(valentin.gosu)
Attachment #8984847 - Flags: review?(valentin.gosu) → review+
Pushed by bkelly@mozilla.com:
https://hg.mozilla.org/integration/mozilla-inbound/rev/d241a10ff148
Propagate nsILoadInfo.serviceWorkerTaintingSynthesized and tainting values from parent process to child process. r=valentin
https://hg.mozilla.org/mozilla-central/rev/d241a10ff148
Status: ASSIGNED → RESOLVED
Closed: Last year
Resolution: --- → FIXED
Target Milestone: --- → mozilla62
You need to log in before you can comment on or make changes to this bug.