Commit Graph

1537 Commits

Author SHA1 Message Date
Kyle Huey
7d56189a13 Merge m-c to bs. 2011-02-25 15:23:05 -05:00
Mike Hommey
291fe1848f Bug 584474 part 6 - Remove duplicate libxpcomglue_s in link flags. r=ted 2011-02-25 15:02:04 +01:00
Boris Zbarsky
908c57b9ab Bug 635977. Make sure to always send OnStartRequest to our listener from nsIndexedToHTML. r=jduell, a=bsmedberg 2011-02-24 13:42:15 -05:00
Mitchell Field
2e8a7d546f Bug 627277 - Remove (broken) BeOS support. r=biesi,dwitte,gavin,joe,jorendorff,josh,khuey,mfinkle,neil,Pike,roc,shaver,smontagu,taras 2011-02-20 06:10:24 +11:00
Patrick McManus
16aeac69f7 Bug 635892 - HTTP/2.0 from SmarterTools Server. Fake it till you make it. a=hardblocker r=bz
--HG--
extra : rebase_source : 6a61e6e6a1ececf8d1d0827706e0755741930832
2011-02-22 21:02:19 -05:00
Jonathan Kew
eda599e429 bug 635705 - reorder code in GetParameterInternal. r+a=bzbarsky 2011-02-23 07:29:26 +00:00
Honza Bambas
6acd0a66d9 Bug 623996 - Offline Application Cache Breaks with Iframe and Shared Empty Files, r=michal.novotny, a2.0=jst 2011-02-12 14:06:02 +01:00
Sean Dunn
85046fcaa6 Bug 632280 - Remove NS_NOTREACHED occurrences near nsCacheEntryDescriptor.cpp:686; r=bzbarsky,khuey a=bsmedberg 2011-02-11 16:49:07 -05:00
Honza Bambas
4b801dad80 Fix bug 573043. r=jmathies@mozilla.com, a=blocker.
--HG--
rename : security/manager/ssl/public/nsISSLStatus.idl => netwerk/base/public/nsISSLStatus.idl
rename : security/manager/boot/public/nsISSLStatusProvider.idl => netwerk/base/public/nsISSLStatusProvider.idl
rename : security/manager/ssl/public/nsIX509Cert.idl => netwerk/base/public/nsIX509Cert.idl
2011-02-08 16:12:29 -08:00
Patrick McManus
c1c1f7e184 Bug 632061 - Firefox 4 does not always properly handle HTTP/0.9 responses r=bz a=blocking-2.0
--HG--
extra : rebase_source : 8185a73da91b5327d5826d8945a044ac87fd41be
2011-02-08 18:26:33 -05:00
Neil Rashbrook
3a0f10932d Bug 616809 Remove CRs from netwerk r=biesi a=jst DONTBUILD 2011-02-06 00:04:14 +00:00
bjarne@runitsoft.com
931d1ac2ff Bug 612135: Content Encoding Error (partial content request) on galaxys.samsungmobile.com r=bzbarsky a=blocking2.0 2011-02-04 14:49:05 -05:00
Ehsan Akhgari
c07c875d05 Backout all of the bugs in the 7e12e3e16e6c pushlog because of the orange.
It is not clear which one of these bugs is at fault.
2011-02-04 16:34:02 -05:00
bjarne@runitsoft.com
29d9225a9a Bug 612135: Content Encoding Error (partial content request) on galaxys.samsungmobile.com r=bzbarsky a=blocking2.0
--HG--
extra : rebase_source : 32ff74259046fd2f3a673df39620acb10accf2cb
2011-02-04 14:49:05 -05:00
Boris Zbarsky
dfc5ea8e25 Bug 629291. Don't use native leaf names in safe output streams; they lose information. r=bsmedberg, a=jst 2011-02-03 09:36:46 -08:00
Dan Witte
6270b2354a Fix bug 624764. r=bsmedberg, a=betaN+ 2011-02-02 14:57:48 -08:00
Patrick McManus
727c1bc347 624374 - remove unused nsHttpConnection::mLock. r=honzab.moz@firemni.cz, a=jst@mozilla.com 2011-02-02 10:53:06 -08:00
Ehsan Akhgari
1e3a9a31ab Bug 625991 - Let the server socket code deal with the cases where we don't have a live socket transport service due to being offline; r=bzbarsky a=blocking-final+ 2011-01-18 16:39:21 -05:00
Patrick McManus
0d5cfec907 bug 628832 - fix regression in http/0.9 detection from 363109; r=zbarsky a=blocking-2.0
* instead of making (dis)-allow 0.9 a property of connection info,
  work off a state machine that engages in the liberal skipping of
  junk before response headers only immediately after a no-content
  response on the same connection.

* when scanning for response headers in a large amount of junk place a
  non infinite limit on that (128KB).. the only known use case for
  this is skipping illegal message bodies in 304's and those just
  aren't that big.

--HG--
extra : rebase_source : 433fd6aae237d29a9957b1a70cf1e756af5a8af0
2011-01-27 13:34:39 -05:00
Sid Stamm
0bbb185dcd Bug 628197. Implement do-not-track HTTP header to express user intent to halt tracking across site. r=dwitte, a=jst.
--HG--
extra : rebase_source : 29550c73f45bfefac311cdce4eef80e947869738
2011-01-05 11:53:21 -08:00
Frank Yan
5b1008b96c Bug 627332 - add-ons compatibility check always presents "Minefield is working offline" dialog when network link state detection is disabled. r=roc a=dolske 2011-01-27 16:07:30 -08:00
Michal Novotny
d0331cfa9d Bug 614513 - Crash in nsCacheService::DeactivateEntry during Linux Talos. r=bzbarsky@mit.edu, a=blocker 2011-01-27 17:02:44 +02:00
Gervase Markham
c83afdd723 Bug 615530 - update .bt entry in PSL. a=jst. 2011-01-27 15:01:19 +00:00
Dave Townsend
e51597dabb Backout of changeset 9acd51502a65 from bug 579846. a=bustage 2011-01-24 14:59:51 -08:00
Dave Townsend
0adf94b662 Backout of changeset 38d1b321c98b from bug 579846. a=bustage 2011-01-24 14:58:20 -08:00
Sid Stamm
c9a91d7bb6 bug 557598 - Support strict-transport-security (STS) in private browsing mode; r=ehsan,dveditz a=blocking-betaN+ 2010-10-06 10:07:39 -07:00
Honza Bambas
1cc1cc4167 Bug 579846 - nsIHttpChannel::SetResponseHeader should work after the stream has ended [Fennec part], r=jduell, a=betaN+ 2011-01-23 23:49:30 +01:00
Honza Bambas
63032f8fb3 Bug 579846 - nsIHttpChannel::SetResponseHeader should work after the stream has ended, r=bzbarsky+hsivonen, a=betaN+ 2011-01-23 23:49:30 +01:00
bjarne@runitsoft.com
295120a137 Bug 467392 - Docshell leak with document.write(document.body.innerHTML) and window.location.reload r=michal.novotny, a=blocking-final+ 2011-01-21 15:13:26 -05:00
Daniel Holbert
eb0c1dcaf4 Bug 626741 - Downgrade assertion to warning, for failed modifications to immutable urls. r=bz a=NPOTB (debug-only) 2011-01-20 19:49:09 -08:00
Bjarne
a1913869ad Bug 620660 - Ensure the disk-cache stays around until all cache-operations have finished. r=michal.novotny a=jst 2011-01-20 13:41:10 -08:00
Makoto Kato
e30bc616e7 Bug 616075 - HTML5 offline event support for Android. r=mwu a=blocking-fennec 2011-01-20 20:06:13 +09:00
Michal Novotny
b43d447142 Bug 604897 - Unable to cache small entries when _CACHE_00[1-3]_ is full; r=mayhemer a=blocking-betaN+ 2011-01-18 16:12:10 +02:00
Michal Novotny
9f62941f24 bug 543805 - FTP list parse error when list returns twice space between date and file name. r=honzab.moz@firemni.cz, a=blocker 2011-01-17 20:50:08 +02:00
Mounir Lamouri
b550e1a0a6 Bug 623482 - Present error page when someone tries to access remote XUL. r+a=sicking
--HG--
extra : rebase_source : 2786e51db70ca0c66f6388376711e74816828c2d
2011-01-14 16:33:57 +01:00
Michal Novotny
81ec8f913f Bug 614513 - Crash in nsCacheService::DeactivateEntry during Linux Talos. r=bzbarsky@mit.edu, a=blocker 2010-12-29 03:25:14 +02:00
Steven Michaud
1a30fa02e4 Bug 620733 - java.security.AccessControlException when calling privileged Java methods from chrome. r=bz,jst a2.0=jst 2011-01-11 10:00:36 -06:00
Patrick McManus
4016cea6b9 bug 623921: Out of an abundance of caution back out feature: 592284 - HTTP Syn Retry r=honzab a=backout 2011-01-07 11:11:22 -05:00
Patrick McManus
6adb71682b Bug 613977 - Intermittent invalid certificate error prompt in security tests causing timeouts r=honzab a=beta-N 2011-01-05 08:37:45 -05:00
Josh Matthews
13f17d7ceb Bug 616861 - Replicate behaviour of nsHttpChannel in regards to failure status codes in OnStopRequest. r=jduell a=blocking-fennec 2010-12-06 18:28:45 -05:00
Michal Novotny
6ded8b2b9f Bug 620194 - "ASSERTION: nsLoadGroup not thread-safe" under nsWyciwygCloseEvent::~nsWyciwygCloseEvent, r=bz, a=b 2010-12-23 01:56:26 +02:00
Dan Witte
2685d64a45 Fix bug 616264. r=ehsan,sdwilsh, a=beta9+ 2010-12-22 13:50:56 -08:00
Honza Bambas
ee0f3def92 Backout changeset f397877da0dd, a=backout 2010-12-22 18:25:15 +01:00
Honza Bambas
1e7a9fc658 Bug 613977 - Intermittent invalid certificate error prompt in security tests causing timeouts, r=mcmannus, a=blocking:beta9+ 2010-12-22 16:44:27 +01:00
Mark Banner
0285053b7c Non-IPC Bustage fix from bug 613977/bug 614677/bug 614950 - add nsAutoPtr.h header to fix compilation bustage. a=Bustage fix 2010-12-16 14:35:12 +00:00
Patrick McManus
dd0c0a9a27 Bug 613977 - Intermittent invalid certificate error prompt (partial) r=honzab a=blocking-beta9
Bug 614677 - Connection is reset message appears intermittently
Bug 614950 - Connections stall occasionally after 592284 landed

A couple of follow-on changes to 592284 rolled together to prevent
diff conflicts

1] Set the securitycallback information for unused speculative
connections in the connection manager to be the new cloned connection
rather than the one they originated on. (613977)

2] When adding unused speculative connections to the connection
manager, due so with a short timeout (<= 5 seconds) as some servers
get grumpy if they haven't seen a request in that time. Most will
close the connection, but some will just sit there quietly and RST
things when the connection is used - so if you don't use the
connection quickly don't use it at all. This is probably a L4 load
balancer issue, actually. Mozillazine illustrates the
problem. Connections are made in bursts anyhow, so the reuse optimization is
likely still quite useful. (614677 and 614950)

3] mark every connection in the connection manager persistent
conneciton pool as "reused". This allows the transaction to be
restarted if a RST is recvd upon sending the requests (see #2) - with
the conservative timeout this is now a rare event, but still possible
so recovery is the right thing to do. (614677 and 614950)

4] obtain an nshttpconnection object from the connection manager,
subject to the max connection constraints, at the same time as
starting the backup conneciton. If we defer that until recycling time
the exceeded limits of the SocketService can cause problems for other
connections.

also re-enables the syn retry feature by default.

r+ honzab
2010-12-16 08:50:36 -05:00
Shawn Wilsher
08e6bfdd2e Merge Places and mozilla-central
a=bsmedberg
2010-12-15 19:24:51 -08:00
Shawn Wilsher
ade39d2c6a Merge mozilla-central to Places. 2010-12-13 15:08:04 -08:00
Shawn Wilsher
5f893d748b Merge mozilla-central into Places. 2010-12-07 15:06:32 -08:00
Shawn Wilsher
2ed7d826a8 Merge mozilla-central into Places 2010-12-06 09:48:54 -08:00