Commit Graph

483 Commits

Author SHA1 Message Date
Kyle Huey
7d56189a13 Merge m-c to bs. 2011-02-25 15:23:05 -05:00
Mitchell Field
2e8a7d546f Bug 627277 - Remove (broken) BeOS support. r=biesi,dwitte,gavin,joe,jorendorff,josh,khuey,mfinkle,neil,Pike,roc,shaver,smontagu,taras 2011-02-20 06:10:24 +11:00
Patrick McManus
16aeac69f7 Bug 635892 - HTTP/2.0 from SmarterTools Server. Fake it till you make it. a=hardblocker r=bz
--HG--
extra : rebase_source : 6a61e6e6a1ececf8d1d0827706e0755741930832
2011-02-22 21:02:19 -05:00
Honza Bambas
4b801dad80 Fix bug 573043. r=jmathies@mozilla.com, a=blocker.
--HG--
rename : security/manager/ssl/public/nsISSLStatus.idl => netwerk/base/public/nsISSLStatus.idl
rename : security/manager/boot/public/nsISSLStatusProvider.idl => netwerk/base/public/nsISSLStatusProvider.idl
rename : security/manager/ssl/public/nsIX509Cert.idl => netwerk/base/public/nsIX509Cert.idl
2011-02-08 16:12:29 -08:00
Patrick McManus
c1c1f7e184 Bug 632061 - Firefox 4 does not always properly handle HTTP/0.9 responses r=bz a=blocking-2.0
--HG--
extra : rebase_source : 8185a73da91b5327d5826d8945a044ac87fd41be
2011-02-08 18:26:33 -05:00
Neil Rashbrook
3a0f10932d Bug 616809 Remove CRs from netwerk r=biesi a=jst DONTBUILD 2011-02-06 00:04:14 +00:00
bjarne@runitsoft.com
931d1ac2ff Bug 612135: Content Encoding Error (partial content request) on galaxys.samsungmobile.com r=bzbarsky a=blocking2.0 2011-02-04 14:49:05 -05:00
Ehsan Akhgari
c07c875d05 Backout all of the bugs in the 7e12e3e16e6c pushlog because of the orange.
It is not clear which one of these bugs is at fault.
2011-02-04 16:34:02 -05:00
bjarne@runitsoft.com
29d9225a9a Bug 612135: Content Encoding Error (partial content request) on galaxys.samsungmobile.com r=bzbarsky a=blocking2.0
--HG--
extra : rebase_source : 32ff74259046fd2f3a673df39620acb10accf2cb
2011-02-04 14:49:05 -05:00
Dan Witte
6270b2354a Fix bug 624764. r=bsmedberg, a=betaN+ 2011-02-02 14:57:48 -08:00
Patrick McManus
727c1bc347 624374 - remove unused nsHttpConnection::mLock. r=honzab.moz@firemni.cz, a=jst@mozilla.com 2011-02-02 10:53:06 -08:00
Patrick McManus
0d5cfec907 bug 628832 - fix regression in http/0.9 detection from 363109; r=zbarsky a=blocking-2.0
* instead of making (dis)-allow 0.9 a property of connection info,
  work off a state machine that engages in the liberal skipping of
  junk before response headers only immediately after a no-content
  response on the same connection.

* when scanning for response headers in a large amount of junk place a
  non infinite limit on that (128KB).. the only known use case for
  this is skipping illegal message bodies in 304's and those just
  aren't that big.

--HG--
extra : rebase_source : 433fd6aae237d29a9957b1a70cf1e756af5a8af0
2011-01-27 13:34:39 -05:00
Sid Stamm
0bbb185dcd Bug 628197. Implement do-not-track HTTP header to express user intent to halt tracking across site. r=dwitte, a=jst.
--HG--
extra : rebase_source : 29550c73f45bfefac311cdce4eef80e947869738
2011-01-05 11:53:21 -08:00
Dave Townsend
e51597dabb Backout of changeset 9acd51502a65 from bug 579846. a=bustage 2011-01-24 14:59:51 -08:00
Dave Townsend
0adf94b662 Backout of changeset 38d1b321c98b from bug 579846. a=bustage 2011-01-24 14:58:20 -08:00
Sid Stamm
c9a91d7bb6 bug 557598 - Support strict-transport-security (STS) in private browsing mode; r=ehsan,dveditz a=blocking-betaN+ 2010-10-06 10:07:39 -07:00
Honza Bambas
1cc1cc4167 Bug 579846 - nsIHttpChannel::SetResponseHeader should work after the stream has ended [Fennec part], r=jduell, a=betaN+ 2011-01-23 23:49:30 +01:00
Honza Bambas
63032f8fb3 Bug 579846 - nsIHttpChannel::SetResponseHeader should work after the stream has ended, r=bzbarsky+hsivonen, a=betaN+ 2011-01-23 23:49:30 +01:00
Patrick McManus
4016cea6b9 bug 623921: Out of an abundance of caution back out feature: 592284 - HTTP Syn Retry r=honzab a=backout 2011-01-07 11:11:22 -05:00
Patrick McManus
6adb71682b Bug 613977 - Intermittent invalid certificate error prompt in security tests causing timeouts r=honzab a=beta-N 2011-01-05 08:37:45 -05:00
Josh Matthews
13f17d7ceb Bug 616861 - Replicate behaviour of nsHttpChannel in regards to failure status codes in OnStopRequest. r=jduell a=blocking-fennec 2010-12-06 18:28:45 -05:00
Michal Novotny
6ded8b2b9f Bug 620194 - "ASSERTION: nsLoadGroup not thread-safe" under nsWyciwygCloseEvent::~nsWyciwygCloseEvent, r=bz, a=b 2010-12-23 01:56:26 +02:00
Mark Banner
0285053b7c Non-IPC Bustage fix from bug 613977/bug 614677/bug 614950 - add nsAutoPtr.h header to fix compilation bustage. a=Bustage fix 2010-12-16 14:35:12 +00:00
Patrick McManus
dd0c0a9a27 Bug 613977 - Intermittent invalid certificate error prompt (partial) r=honzab a=blocking-beta9
Bug 614677 - Connection is reset message appears intermittently
Bug 614950 - Connections stall occasionally after 592284 landed

A couple of follow-on changes to 592284 rolled together to prevent
diff conflicts

1] Set the securitycallback information for unused speculative
connections in the connection manager to be the new cloned connection
rather than the one they originated on. (613977)

2] When adding unused speculative connections to the connection
manager, due so with a short timeout (<= 5 seconds) as some servers
get grumpy if they haven't seen a request in that time. Most will
close the connection, but some will just sit there quietly and RST
things when the connection is used - so if you don't use the
connection quickly don't use it at all. This is probably a L4 load
balancer issue, actually. Mozillazine illustrates the
problem. Connections are made in bursts anyhow, so the reuse optimization is
likely still quite useful. (614677 and 614950)

3] mark every connection in the connection manager persistent
conneciton pool as "reused". This allows the transaction to be
restarted if a RST is recvd upon sending the requests (see #2) - with
the conservative timeout this is now a rare event, but still possible
so recovery is the right thing to do. (614677 and 614950)

4] obtain an nshttpconnection object from the connection manager,
subject to the max connection constraints, at the same time as
starting the backup conneciton. If we defer that until recycling time
the exceeded limits of the SocketService can cause problems for other
connections.

also re-enables the syn retry feature by default.

r+ honzab
2010-12-16 08:50:36 -05:00
Boris Zbarsky
f1fcc1b6fd Bug 616591 followup to fix a comment., a=DONTBUILD 2010-12-08 21:01:17 -05:00
Honza Bambas
46efa72797 Bug 616591. Fix crash due to http transactions trying to get connection info from the http pipeline while it's being closed. r=bzbarsky, a=blocker 2010-12-08 20:57:14 -05:00
Ehsan Akhgari
92d0d78683 Bug 616591 - Firefox 4.0b8pre crash in [@ nsHttpPipeline::GetConnectionInfo(nsHttpConnectionInfo**]; r=bzbarsky a=blocking-beta8+ 2010-12-04 04:21:03 -05:00
Ehsan Akhgari
c204727f4a Bug 614286 followup - Reorder the constructor initializer list to prevent compiler warnings
--HG--
extra : rebase_source : 3ab3d1371f8d8b396e665cffb5c57dc96a7187f3
2010-12-03 09:56:13 -05:00
Michal Novotny
c61b9b37d9 bug 363109 - body of HTTP 304 response is treated as a HTTP/0.9 response to subsequent HTTP request. r=biesi, sr=bz, a=blocker 2010-12-01 02:02:52 +02:00
Ehsan Akhgari
65d254c5c6 Bug 614286 - Don't initialize the socket transport service unless we know that we're online; r=bzbarsky a=blocking-beta8+ 2010-11-25 00:20:11 -05:00
Ehsan Akhgari
fd067b7b7d Backed out changeset 630b08a7fe63 because of xpcshell test failures 2010-11-30 13:57:24 -05:00
Ehsan Akhgari
932c374a07 Bug 614286 - Don't initialize the socket transport service unless we know that we're online; r=bzbarsky a=blocking-beta8+ 2010-11-25 00:20:11 -05:00
Christian Biesinger
5f1420c073 Backed out changeset dd249f45dc3d
Clearly I don't know hg well enough, didn't mean to commit all this. a=I-messed-up
2010-11-29 15:34:30 -08:00
Christian Biesinger
1c2cfa92d1 Bug 614717 Make test_bug369787.js not hang when the test fails by ensuring
that do_test_finished is called even when an exception is thrown.
Also make the test work in the presence of PAC, where the channel changes
between asyncOpen and onStartRequest.

r=bz a=test-only
2010-11-29 15:28:40 -08:00
bjarne@runitsoft.com
11cc4ac3c8 Bug 468426 - improved support for "Vary: Cookie"-headers , r=biesi a=bsmedberg 2010-11-26 12:13:37 -05:00
Benjamin Smedberg
7a8f43edcd Bug 614229 - nsHttpHandler getting the private-browsing service can cause recursive initialization of layout, and I suspect can cause incorrect behavior in Firefox because we may end up creating HTTP URIs before we're finished with XPCOM registration, r=honza+ehsan a=blocking bug 581335 which blocks Fennec b3 2010-11-24 08:58:42 -05:00
Honza Bambas
4b0ec7f1c3 Bug 591707 - e10s: handle redirects from HTTP to a different protocol, r=jduell, a=blocking-fennec2.0b3+ 2010-11-23 23:56:06 +01:00
Ehsan Akhgari
8c6b82b73f Bug 599127 - Build bustage; a=me
--HG--
extra : rebase_source : fdf486565a6f0edcf4879500c5002f65303dd9e1
2010-11-23 10:07:00 -05:00
Michal Novotny
941be03f10 bug 599127 - Wyciwyg channel writes end up doing synchronous disk IO. r=jduell, a=betaN 2010-11-23 14:01:30 +02:00
Patrick McManus
b46439ff28 Bug 592284 - Accelerate TCP connection retries in HTTP. r=honzab a=blocking2.0
Losing a TCP SYN requires a long painful (typically 3 second) delay
before being retried. This patch creates a second parallel connection
attempt for any nsHttpConnection which has not become writable before
a timeout occurs.

If you assume .5% packet loss, this converts a full 3 second delay
from a 1 in 200 event into a 1 in 40,000 event.

Whichever connection establishes itself first is used. If another one
has been started and it does connect before the one being used is
closed then the extra one is handed to the connection manager for use
by a different transaction - essentially a persistent connection with
0 previous transactions on it. (Another way to think about is
pre-fetching a 3WHS on a high latency connection).

The pref network.http.connection-retry-timeout controls the amount of
time in ms to wait for success on the initial connection before beginning
the second one. Setting it to 0 disables the parallel connection, the
default is 250.
2010-11-21 09:50:36 +01:00
Josh Matthews
14b2a8b06d Bug 605327 - Add proper cancellation to e10s wyciwyg channels. r=dwitte a=blocking-fennec 2010-11-19 16:12:45 -05:00
Michael Wu
30098037eb Backed out changeset 090046fc6891 bug 482935 due to a=orange 2010-11-10 19:29:51 -08:00
bjarne@runitsoft.com
b9e7d659bd Bug 482935 - Cancel() from OnStopRequest should not cause cache entry to be doomed;
(Av1f) Allow content to be cached if it was loaded successfully.
r=(dwitte, jduell) a2.0=benjamin.
2010-11-11 01:02:15 +01:00
Ehsan Akhgari
056fc8aba7 Backed out changeset c85c2f1b0566 because of oranges on mochitest-1 2010-11-10 17:46:32 -05:00
bjarne@runitsoft.com
c6a0351901 Bug 482935 - Cancel() from OnStopRequest should not cause cache entry to be doomed;
(Av1e) Allow content to be cached if it was loaded successfully.
r=(dwitte, jduell) a2.0=benjamin.
2010-11-10 22:28:54 +01:00
Chris Jones
703c658a1c Bug 562424: Switch IPDL interfaces to infallible TArray. r=bent a=blocking 2010-11-08 20:49:00 -06:00
Mark Finkle
275d1802e2 Bug 608258 - Crash at visiting AMO [r=jdm a=blocking-fennecb2] 2010-10-29 11:38:26 -04:00
Kai Engert
d15be2e952 Bug 566478 - Invalid SSL cert error is not mobile-friendly [r=mayhemer a=blocking-fennecb2] 2010-10-28 11:46:00 -04:00
Patrick McManus
eff9996630 Bug 606719 - Browser stalls with connections left hanging in TCP close wait state. Part 2: fix it. r=dwitte, a=b7+ 2010-10-28 10:10:03 -07:00
Mark Finkle
e0a3cc5dd7 Backout bug 566478 due to test orange a=orangehurts 2010-10-28 12:17:01 -04:00