Commit Graph

509 Commits

Author SHA1 Message Date
Justin Lebar
7e2c5ae50d Bug 592557 - Eliminate uses of PR_Atomic{Increment,Decrement} functions in favor of PR_ATOMIC_{INCREMENT,DECREMENT} macros. r=bsmedberg,gal
--HG--
extra : rebase_source : 71069eb9c9d61131adee49279e136c8574dabc62
2011-03-28 15:58:49 -04:00
Ehsan Akhgari
395dbdf918 Merge cedar into mozilla-central 2011-03-25 14:21:07 -04:00
bjarne@runitsoft,com
d902fada99 Bug 482935 - Cancel() from OnStopRequest should not cause cache entry to be doomed; r=(dwitte, jduell). 2011-03-24 16:45:07 -04:00
L. David Baron
d78a10bc18 Backout changeset f406ffe65c08 (Bug 620931 part 1) for causing bug 644790. 2011-03-24 21:07:53 -07:00
L. David Baron
506701bba2 Backout changeset b9e6454362ef (Bug 620931 part 3) for causing bug 644790. 2011-03-24 21:07:05 -07:00
L. David Baron
5445f4ab8c Backout changeset 9df6e8117fe0 (Bug 620931 part 4) for causing bug 644790. 2011-03-24 21:06:44 -07:00
Joe Drew
1ba8c47fbd Back out bug 628561 (d5fad1ab2f00) on suspicion of causing Tp regressions. 2011-03-24 20:30:59 -04:00
Joe Drew
c4b6e8f543 Back out bug 643352 (118451f8ec76) on suspicion of causing Tp regressions. 2011-03-24 20:29:08 -04:00
Joe Drew
5f5b3c4c3b Back out bug 632419 (dbe8ef0649ac) on suspicion of causing Tp regressions. 2011-03-24 20:27:11 -04:00
Ehsan Akhgari
f83c604e6c Merge cedar onto mozilla-central 2011-03-24 14:42:21 -04:00
Patrick McManus
b13ecb026e bug 628561 DNS caching forcing one to restart Firefox to eliminate temporary DNS redirection; r=bzbarsky
A force-reload now clears persistent connections to the server related
to the force-reloaded resource. This will allow renogitation of DNS or
server load balancing.

--HG--
extra : rebase_source : 5c55e90ea64039b9cdc0a2d85a51086d2b1d40df
2011-03-24 12:01:57 -04:00
Ehsan Akhgari
5553692d78 Merge mozilla-central into cedar 2011-03-24 10:54:50 -04:00
Mike Hommey
f25c0e8cc3 Bug 620931 part 4 - Fix resource://app/ to always point to the same as resource:///. r=bsmedberg 2011-03-24 15:28:31 +01:00
Mike Hommey
2cfeef8160 Bug 620931 part 3 - Allow GRE and XUL application to use omni.jar independently. r=bsmedberg
We now store two independent locations for an omni.jar, allowing GRE/XRE and
XUL application to each have their own omni.jar. And since xulrunner setups
are very independent from the XUL applications, we implement support for both
omni.jar and non omni.jar cases in the same runtime, with the side effect of
allowing to switch from one to the other manually without rebuilding the
binaries.

We let the mozilla::Omnijar API handle both cases, so that callers don't need
too much work to support them.

We also make the preferences service load the same set of preferences in all
the various cases (unified vs. separate, omni.jar vs. no omni.jar).

The child process launcher for IPC is modified to pass the base directories
needed for the mozilla::Omnijar API initialization in the child process.

Finally, the startupcache file name canonicalization is modified to separate
APP and GRE resources.
2011-03-24 15:28:14 +01:00
Mike Hommey
765d4f1b6c Bug 620931 part 1 - Use chrome manifest to register resource://gre-resources/. r=bsmedberg 2011-03-24 15:27:37 +01:00
Ehsan Akhgari
35a76662aa Bug 616745 followup - fixed typo 2011-03-23 23:48:52 -04:00
Patrick McManus
61d74558d8 643352 keep-alive header syntax invalid r=bz
don't send the keep-alive request header. It is redundant to
connection: keep-alive and we don't send the right syntax anyhow.

--HG--
extra : rebase_source : c6d9cb95d2d1cac30bc718884eb3b909db0d6a43
2011-03-23 11:02:33 -04:00
Patrick McManus
91f82129c3 Bug 632419 - HTTP 100 level parser race condition r=bz
--HG--
extra : rebase_source : 0cd0a74bfe850d0c16d7f74b77c8ca0c286e1144
2011-03-23 10:59:58 -04:00
Ehsan Akhgari
47cf269311 Merge mozila-central onto cedar
--HG--
rename : toolkit/components/places/src/nsLivemarkService.js => toolkit/components/places/nsLivemarkService.js
2011-03-23 12:06:04 -04:00
bjarne@runitsoft.com
3b3f5bf40a Bug 561276 - Cookie dependency on cache determination for image redirects r=bz 2011-03-23 23:36:53 -04:00
Ms2ger
384aab2569 Bug 637186 - Ignoring return value of SendDeleteSelf in HttpChannelParent::Delete; r=honzab.moz 2011-03-22 15:16:33 -04:00
Mitchell Field
b6976ca587 Merge mozilla-central to build-system. 2011-03-02 20:38:54 +11:00
Brian Smith
99229eb36d Bug 637361: Backout bug 573043, a=blocker 2011-03-01 19:16:22 -08:00
Brian Smith
6e3249a44c Bug 637361: Backout bug 573043 2011-03-01 19:11:22 -08:00
Kyle Huey
7d56189a13 Merge m-c to bs. 2011-02-25 15:23:05 -05:00
Mitchell Field
2e8a7d546f Bug 627277 - Remove (broken) BeOS support. r=biesi,dwitte,gavin,joe,jorendorff,josh,khuey,mfinkle,neil,Pike,roc,shaver,smontagu,taras 2011-02-20 06:10:24 +11:00
Patrick McManus
16aeac69f7 Bug 635892 - HTTP/2.0 from SmarterTools Server. Fake it till you make it. a=hardblocker r=bz
--HG--
extra : rebase_source : 6a61e6e6a1ececf8d1d0827706e0755741930832
2011-02-22 21:02:19 -05:00
Honza Bambas
4b801dad80 Fix bug 573043. r=jmathies@mozilla.com, a=blocker.
--HG--
rename : security/manager/ssl/public/nsISSLStatus.idl => netwerk/base/public/nsISSLStatus.idl
rename : security/manager/boot/public/nsISSLStatusProvider.idl => netwerk/base/public/nsISSLStatusProvider.idl
rename : security/manager/ssl/public/nsIX509Cert.idl => netwerk/base/public/nsIX509Cert.idl
2011-02-08 16:12:29 -08:00
Patrick McManus
c1c1f7e184 Bug 632061 - Firefox 4 does not always properly handle HTTP/0.9 responses r=bz a=blocking-2.0
--HG--
extra : rebase_source : 8185a73da91b5327d5826d8945a044ac87fd41be
2011-02-08 18:26:33 -05:00
Neil Rashbrook
3a0f10932d Bug 616809 Remove CRs from netwerk r=biesi a=jst DONTBUILD 2011-02-06 00:04:14 +00:00
timeless@mozdev.org
971e36d6d8 Bug 584999 remove unused nsresult rv in nsHttpChannel::ContinueOnStartRequest2
r=biesi
2010-08-06 16:16:32 +03:00
timeless@mozdev.org
19d6a64f6e Bug 616745 warning: comparison between signed and unsigned integer expressions in nsHttpTransaction::LocateHttpStart
r=biesi
2011-03-23 23:31:28 -04:00
bjarne@runitsoft.com
931d1ac2ff Bug 612135: Content Encoding Error (partial content request) on galaxys.samsungmobile.com r=bzbarsky a=blocking2.0 2011-02-04 14:49:05 -05:00
Ehsan Akhgari
c07c875d05 Backout all of the bugs in the 7e12e3e16e6c pushlog because of the orange.
It is not clear which one of these bugs is at fault.
2011-02-04 16:34:02 -05:00
bjarne@runitsoft.com
29d9225a9a Bug 612135: Content Encoding Error (partial content request) on galaxys.samsungmobile.com r=bzbarsky a=blocking2.0
--HG--
extra : rebase_source : 32ff74259046fd2f3a673df39620acb10accf2cb
2011-02-04 14:49:05 -05:00
Dan Witte
6270b2354a Fix bug 624764. r=bsmedberg, a=betaN+ 2011-02-02 14:57:48 -08:00
Patrick McManus
727c1bc347 624374 - remove unused nsHttpConnection::mLock. r=honzab.moz@firemni.cz, a=jst@mozilla.com 2011-02-02 10:53:06 -08:00
Patrick McManus
0d5cfec907 bug 628832 - fix regression in http/0.9 detection from 363109; r=zbarsky a=blocking-2.0
* instead of making (dis)-allow 0.9 a property of connection info,
  work off a state machine that engages in the liberal skipping of
  junk before response headers only immediately after a no-content
  response on the same connection.

* when scanning for response headers in a large amount of junk place a
  non infinite limit on that (128KB).. the only known use case for
  this is skipping illegal message bodies in 304's and those just
  aren't that big.

--HG--
extra : rebase_source : 433fd6aae237d29a9957b1a70cf1e756af5a8af0
2011-01-27 13:34:39 -05:00
Sid Stamm
0bbb185dcd Bug 628197. Implement do-not-track HTTP header to express user intent to halt tracking across site. r=dwitte, a=jst.
--HG--
extra : rebase_source : 29550c73f45bfefac311cdce4eef80e947869738
2011-01-05 11:53:21 -08:00
Dave Townsend
e51597dabb Backout of changeset 9acd51502a65 from bug 579846. a=bustage 2011-01-24 14:59:51 -08:00
Dave Townsend
0adf94b662 Backout of changeset 38d1b321c98b from bug 579846. a=bustage 2011-01-24 14:58:20 -08:00
Sid Stamm
c9a91d7bb6 bug 557598 - Support strict-transport-security (STS) in private browsing mode; r=ehsan,dveditz a=blocking-betaN+ 2010-10-06 10:07:39 -07:00
Honza Bambas
1cc1cc4167 Bug 579846 - nsIHttpChannel::SetResponseHeader should work after the stream has ended [Fennec part], r=jduell, a=betaN+ 2011-01-23 23:49:30 +01:00
Honza Bambas
63032f8fb3 Bug 579846 - nsIHttpChannel::SetResponseHeader should work after the stream has ended, r=bzbarsky+hsivonen, a=betaN+ 2011-01-23 23:49:30 +01:00
Patrick McManus
4016cea6b9 bug 623921: Out of an abundance of caution back out feature: 592284 - HTTP Syn Retry r=honzab a=backout 2011-01-07 11:11:22 -05:00
Patrick McManus
6adb71682b Bug 613977 - Intermittent invalid certificate error prompt in security tests causing timeouts r=honzab a=beta-N 2011-01-05 08:37:45 -05:00
Josh Matthews
13f17d7ceb Bug 616861 - Replicate behaviour of nsHttpChannel in regards to failure status codes in OnStopRequest. r=jduell a=blocking-fennec 2010-12-06 18:28:45 -05:00
Michal Novotny
6ded8b2b9f Bug 620194 - "ASSERTION: nsLoadGroup not thread-safe" under nsWyciwygCloseEvent::~nsWyciwygCloseEvent, r=bz, a=b 2010-12-23 01:56:26 +02:00
Mark Banner
0285053b7c Non-IPC Bustage fix from bug 613977/bug 614677/bug 614950 - add nsAutoPtr.h header to fix compilation bustage. a=Bustage fix 2010-12-16 14:35:12 +00:00
Patrick McManus
dd0c0a9a27 Bug 613977 - Intermittent invalid certificate error prompt (partial) r=honzab a=blocking-beta9
Bug 614677 - Connection is reset message appears intermittently
Bug 614950 - Connections stall occasionally after 592284 landed

A couple of follow-on changes to 592284 rolled together to prevent
diff conflicts

1] Set the securitycallback information for unused speculative
connections in the connection manager to be the new cloned connection
rather than the one they originated on. (613977)

2] When adding unused speculative connections to the connection
manager, due so with a short timeout (<= 5 seconds) as some servers
get grumpy if they haven't seen a request in that time. Most will
close the connection, but some will just sit there quietly and RST
things when the connection is used - so if you don't use the
connection quickly don't use it at all. This is probably a L4 load
balancer issue, actually. Mozillazine illustrates the
problem. Connections are made in bursts anyhow, so the reuse optimization is
likely still quite useful. (614677 and 614950)

3] mark every connection in the connection manager persistent
conneciton pool as "reused". This allows the transaction to be
restarted if a RST is recvd upon sending the requests (see #2) - with
the conservative timeout this is now a rare event, but still possible
so recovery is the right thing to do. (614677 and 614950)

4] obtain an nshttpconnection object from the connection manager,
subject to the max connection constraints, at the same time as
starting the backup conneciton. If we defer that until recycling time
the exceeded limits of the SocketService can cause problems for other
connections.

also re-enables the syn retry feature by default.

r+ honzab
2010-12-16 08:50:36 -05:00