Firefox should be still sending headers even if there are missing ones
Categories
(Core :: Networking: HTTP, defect, P2)
Tracking
()
People
(Reporter: sekim, Assigned: sekim)
References
(Blocks 2 open bugs)
Details
(Keywords: webcompat:platform-bug, Whiteboard: [necko-triaged][necko-priority-queue])
Attachments
(3 files)
48 bytes,
text/x-phabricator-request
|
Details | Review | |
48 bytes,
text/x-phabricator-request
|
phab-bot
:
approval-mozilla-beta+
|
Details | Review |
48 bytes,
text/x-phabricator-request
|
phab-bot
:
approval-mozilla-esr128+
|
Details | Review |
We should avoid returning from the delegate even if there are missing headers
As discussed with Microsoft earlier, the correct approach for handling cookie headers is for the browser to include in its requests and allow the server to deal with them. Previously, we just returned from the delegate if we have missing headers. We should simply let the server deal with it instead of handling it ourselves.
Updated•28 days ago
|
Updated•28 days ago
|
Original Revision: https://phabricator.services.mozilla.com/D236568
Updated•28 days ago
|
Comment 5•28 days ago
|
||
beta Uplift Approval Request
- User impact if declined: When Microsoft's broker sends a cookie without device header, the SSO would not complete (on macOS).
- Code covered by automated testing: no
- Fix verified in Nightly: yes
- Needs manual QE test: no
- Steps to reproduce for manual QE testing: N/A
- Risk associated with taking this patch: Minimal
- Explanation of risk level: We are simply appending the headers instead of quickly returning (when there is less than two headers attached. Tested via a local signed Nightly build.
- String changes made/needed: N/A
- Is Android affected?: no
Updated•28 days ago
|
Comment 6•27 days ago
|
||
bugherder |
Updated•27 days ago
|
Updated•26 days ago
|
Updated•26 days ago
|
Comment 9•26 days ago
|
||
(In reply to Mike Kaply [:mkaply] from comment #8)
We'll need to uplift to ESR as well for parity.
Adding an NI for Sean re: Comment 8.
Note, the depends on the Bug 1944119 is only in Fx136+
Assignee | ||
Comment 10•26 days ago
|
||
(In reply to Donal Meehan [:dmeehan] from comment #9)
(In reply to Mike Kaply [:mkaply] from comment #8)
We'll need to uplift to ESR as well for parity.
Adding an NI for Sean re: Comment 8.
Note, the depends on the Bug 1944119 is only in Fx136+
Considering that Bug 1944119 is a low risk refactor, we can probably uplift both.
Assignee | ||
Comment 11•26 days ago
|
||
Original Revision: https://phabricator.services.mozilla.com/D236568
Updated•26 days ago
|
Comment 12•26 days ago
|
||
esr128 Uplift Approval Request
- User impact if declined: When Microsoft's broker sends a cookie without device header, the SSO would not complete (on macOS).
- Code covered by automated testing: no
- Fix verified in Nightly: yes
- Needs manual QE test: no
- Steps to reproduce for manual QE testing: N/A
- Risk associated with taking this patch: Low
- Explanation of risk level: We are simply appending the headers instead of quickly returning (when there is less than two headers attached. Tested via a local signed Nightly build.
- String changes made/needed: N/A
- Is Android affected?: no
Updated•19 days ago
|
Comment 13•19 days ago
|
||
uplift |
Updated•19 days ago
|
Description
•