New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Implement HSTS (preload-only) #6490
Commits on Jul 21, 2015
-
Preload an HSTS domain list from chromium
This resolves the first part of #6105. The remaining part is to update the list based on the STS headers from the server.
samfoo committedJul 21, 2015 -
Do not allow IP address in HSTS list
As per [rfc6797](https://tools.ietf.org/html/rfc6797#section-8.1.1), do not allow IPv4 or IPv6 addresses as host entries into the HSTS list. #6105
samfoo committedJul 21, 2015 -
Shift checking for IP address host for HSTS entry to constructor
samfoo committedJul 21, 2015 -
samfoo committed
Jul 21, 2015 -
Evict HSTS entries when a max-age of 0 is seen
samfoo committedJul 21, 2015 -
Abstract out ResourceManager messaging from impl
De-coupling makes testing a bit easier.
samfoo committedJul 21, 2015 -
Adds control message for HSTS headers
samfoo committedJul 21, 2015 -
Re-parse URL to not have inconsistent state
samfoo committedJul 21, 2015 -
samfoo committed
Jul 21, 2015 -
Don't unnecessarily clone strings
samfoo committedJul 21, 2015 -
Commit HSTS preload list to source control
* No longer download the HSTS list as a bootstrap step * Check the current revision of the HSTS list into source
samfoo committedJul 21, 2015 -
* Lots of rust-isms * Mutable iterator for modifying entries (much better)
samfoo committedJul 21, 2015 -
Resolves remaining code review issues
* Don't pass a boolean to the HSTSEntry constructor, use an enum instead * Don't clone when securing load data * Comment about the Url bug * Change remaining assert!(... == ...) to assert_eq!(..., ...)
samfoo committedJul 21, 2015 -
Moves HSTS code to it's own module
samfoo committedJul 21, 2015 -
Moves the HSTS replacement code to http_loader
This respects STS for redirects as well.
samfoo committedJul 21, 2015 -
Responds to more code review feedback
* Use regex from resource task * Don't have an option of an HSTS list, default to empty
samfoo committedJul 21, 2015 -
Passes an Arc<Mutex<HSTSList>> to threads instead of cloning
samfoo committedJul 21, 2015 -
Moves HSTS includeSubdomains enum to net_traits
samfoo committedJul 21, 2015 -
Only secure URL's that aren't already to HTTPS.
Cuts down on logger spam, and unnecessary Url::clone's
samfoo committedJul 21, 2015