Commit Graph

2669 Commits

Author SHA1 Message Date
Brian Smith
2eef6d784d Bug 637361: Backout bug 573043, a=blocker 2011-03-01 19:16:22 -08:00
Brian Smith
a5edaf27e8 Bug 637361: Backout bug 573043 2011-03-01 19:11:22 -08:00
Patrick McManus
85bb7d9710 Bug 635892 - HTTP/2.0 from SmarterTools Server. Fake it till you make it. a=hardblocker r=bz
--HG--
extra : rebase_source : 6a61e6e6a1ececf8d1d0827706e0755741930832
2011-02-22 21:02:19 -05:00
Honza Bambas
48a2c64df8 Fix bug 573043. r=jmathies@mozilla.com, a=blocker.
--HG--
rename : security/manager/ssl/public/nsISSLStatus.idl => netwerk/base/public/nsISSLStatus.idl
rename : security/manager/boot/public/nsISSLStatusProvider.idl => netwerk/base/public/nsISSLStatusProvider.idl
rename : security/manager/ssl/public/nsIX509Cert.idl => netwerk/base/public/nsIX509Cert.idl
2011-02-08 16:12:29 -08:00
Patrick McManus
ae544d7e57 Bug 632061 - Firefox 4 does not always properly handle HTTP/0.9 responses r=bz a=blocking-2.0
--HG--
extra : rebase_source : 8185a73da91b5327d5826d8945a044ac87fd41be
2011-02-08 18:26:33 -05:00
Neil Rashbrook
32c305081f Bug 616809 Remove CRs from netwerk r=biesi a=jst DONTBUILD 2011-02-06 00:04:14 +00:00
bjarne@runitsoft.com
7453b6a04c Bug 612135: Content Encoding Error (partial content request) on galaxys.samsungmobile.com r=bzbarsky a=blocking2.0 2011-02-04 14:49:05 -05:00
Ehsan Akhgari
2312c4c0f3 Backout all of the bugs in the 7e12e3e16e6c pushlog because of the orange.
It is not clear which one of these bugs is at fault.
2011-02-04 16:34:02 -05:00
bjarne@runitsoft.com
490808e6df Bug 612135: Content Encoding Error (partial content request) on galaxys.samsungmobile.com r=bzbarsky a=blocking2.0
--HG--
extra : rebase_source : 32ff74259046fd2f3a673df39620acb10accf2cb
2011-02-04 14:49:05 -05:00
Dan Witte
9bba08d791 Fix bug 624764. r=bsmedberg, a=betaN+ 2011-02-02 14:57:48 -08:00
Patrick McManus
59dc59387e 624374 - remove unused nsHttpConnection::mLock. r=honzab.moz@firemni.cz, a=jst@mozilla.com 2011-02-02 10:53:06 -08:00
Patrick McManus
34e3663c3e bug 628832 - fix regression in http/0.9 detection from 363109; r=zbarsky a=blocking-2.0
* instead of making (dis)-allow 0.9 a property of connection info,
  work off a state machine that engages in the liberal skipping of
  junk before response headers only immediately after a no-content
  response on the same connection.

* when scanning for response headers in a large amount of junk place a
  non infinite limit on that (128KB).. the only known use case for
  this is skipping illegal message bodies in 304's and those just
  aren't that big.

--HG--
extra : rebase_source : 433fd6aae237d29a9957b1a70cf1e756af5a8af0
2011-01-27 13:34:39 -05:00
Sid Stamm
d2c0789cb6 Bug 628197. Implement do-not-track HTTP header to express user intent to halt tracking across site. r=dwitte, a=jst.
--HG--
extra : rebase_source : 29550c73f45bfefac311cdce4eef80e947869738
2011-01-05 11:53:21 -08:00
Dave Townsend
23fdf3025d Backout of changeset 9acd51502a65 from bug 579846. a=bustage 2011-01-24 14:59:51 -08:00
Dave Townsend
d6e35158cb Backout of changeset 38d1b321c98b from bug 579846. a=bustage 2011-01-24 14:58:20 -08:00
Sid Stamm
ea85829c9d bug 557598 - Support strict-transport-security (STS) in private browsing mode; r=ehsan,dveditz a=blocking-betaN+ 2010-10-06 10:07:39 -07:00
Honza Bambas
ee2433f53e Bug 579846 - nsIHttpChannel::SetResponseHeader should work after the stream has ended [Fennec part], r=jduell, a=betaN+ 2011-01-23 23:49:30 +01:00
Honza Bambas
46257e93e3 Bug 579846 - nsIHttpChannel::SetResponseHeader should work after the stream has ended, r=bzbarsky+hsivonen, a=betaN+ 2011-01-23 23:49:30 +01:00
Patrick McManus
9979419bae bug 623921: Out of an abundance of caution back out feature: 592284 - HTTP Syn Retry r=honzab a=backout 2011-01-07 11:11:22 -05:00
Patrick McManus
8ad761ea74 Bug 613977 - Intermittent invalid certificate error prompt in security tests causing timeouts r=honzab a=beta-N 2011-01-05 08:37:45 -05:00
Josh Matthews
6e7b0137b9 Bug 616861 - Replicate behaviour of nsHttpChannel in regards to failure status codes in OnStopRequest. r=jduell a=blocking-fennec 2010-12-06 18:28:45 -05:00
Michal Novotny
bf47b4a294 Bug 620194 - "ASSERTION: nsLoadGroup not thread-safe" under nsWyciwygCloseEvent::~nsWyciwygCloseEvent, r=bz, a=b 2010-12-23 01:56:26 +02:00
Mark Banner
3b22162d5b Non-IPC Bustage fix from bug 613977/bug 614677/bug 614950 - add nsAutoPtr.h header to fix compilation bustage. a=Bustage fix 2010-12-16 14:35:12 +00:00
Patrick McManus
6993d42063 Bug 613977 - Intermittent invalid certificate error prompt (partial) r=honzab a=blocking-beta9
Bug 614677 - Connection is reset message appears intermittently
Bug 614950 - Connections stall occasionally after 592284 landed

A couple of follow-on changes to 592284 rolled together to prevent
diff conflicts

1] Set the securitycallback information for unused speculative
connections in the connection manager to be the new cloned connection
rather than the one they originated on. (613977)

2] When adding unused speculative connections to the connection
manager, due so with a short timeout (<= 5 seconds) as some servers
get grumpy if they haven't seen a request in that time. Most will
close the connection, but some will just sit there quietly and RST
things when the connection is used - so if you don't use the
connection quickly don't use it at all. This is probably a L4 load
balancer issue, actually. Mozillazine illustrates the
problem. Connections are made in bursts anyhow, so the reuse optimization is
likely still quite useful. (614677 and 614950)

3] mark every connection in the connection manager persistent
conneciton pool as "reused". This allows the transaction to be
restarted if a RST is recvd upon sending the requests (see #2) - with
the conservative timeout this is now a rare event, but still possible
so recovery is the right thing to do. (614677 and 614950)

4] obtain an nshttpconnection object from the connection manager,
subject to the max connection constraints, at the same time as
starting the backup conneciton. If we defer that until recycling time
the exceeded limits of the SocketService can cause problems for other
connections.

also re-enables the syn retry feature by default.

r+ honzab
2010-12-16 08:50:36 -05:00
Boris Zbarsky
b8f0570173 Bug 616591 followup to fix a comment., a=DONTBUILD 2010-12-08 21:01:17 -05:00
Honza Bambas
37984326e6 Bug 616591. Fix crash due to http transactions trying to get connection info from the http pipeline while it's being closed. r=bzbarsky, a=blocker 2010-12-08 20:57:14 -05:00
Ehsan Akhgari
0e50f704ba Bug 616591 - Firefox 4.0b8pre crash in [@ nsHttpPipeline::GetConnectionInfo(nsHttpConnectionInfo**]; r=bzbarsky a=blocking-beta8+ 2010-12-04 04:21:03 -05:00
Ehsan Akhgari
8c6bb3c99a Bug 614286 followup - Reorder the constructor initializer list to prevent compiler warnings
--HG--
extra : rebase_source : 3ab3d1371f8d8b396e665cffb5c57dc96a7187f3
2010-12-03 09:56:13 -05:00
Michal Novotny
877de0a1b4 bug 363109 - body of HTTP 304 response is treated as a HTTP/0.9 response to subsequent HTTP request. r=biesi, sr=bz, a=blocker 2010-12-01 02:02:52 +02:00
Ehsan Akhgari
6651ae9849 Bug 614286 - Don't initialize the socket transport service unless we know that we're online; r=bzbarsky a=blocking-beta8+ 2010-11-25 00:20:11 -05:00
Ehsan Akhgari
7daaa00ea9 Backed out changeset 630b08a7fe63 because of xpcshell test failures 2010-11-30 13:57:24 -05:00
Ehsan Akhgari
dfed869c9f Bug 614286 - Don't initialize the socket transport service unless we know that we're online; r=bzbarsky a=blocking-beta8+ 2010-11-25 00:20:11 -05:00
Christian Biesinger
88ff626760 Backed out changeset dd249f45dc3d
Clearly I don't know hg well enough, didn't mean to commit all this. a=I-messed-up
2010-11-29 15:34:30 -08:00
Christian Biesinger
6f6cd3b97a Bug 614717 Make test_bug369787.js not hang when the test fails by ensuring
that do_test_finished is called even when an exception is thrown.
Also make the test work in the presence of PAC, where the channel changes
between asyncOpen and onStartRequest.

r=bz a=test-only
2010-11-29 15:28:40 -08:00
bjarne@runitsoft.com
5f604506d6 Bug 468426 - improved support for "Vary: Cookie"-headers , r=biesi a=bsmedberg 2010-11-26 12:13:37 -05:00
Benjamin Smedberg
77ee3458b6 Bug 614229 - nsHttpHandler getting the private-browsing service can cause recursive initialization of layout, and I suspect can cause incorrect behavior in Firefox because we may end up creating HTTP URIs before we're finished with XPCOM registration, r=honza+ehsan a=blocking bug 581335 which blocks Fennec b3 2010-11-24 08:58:42 -05:00
Honza Bambas
2e67f4a1bb Bug 591707 - e10s: handle redirects from HTTP to a different protocol, r=jduell, a=blocking-fennec2.0b3+ 2010-11-23 23:56:06 +01:00
Ehsan Akhgari
52c7a07101 Bug 599127 - Build bustage; a=me
--HG--
extra : rebase_source : fdf486565a6f0edcf4879500c5002f65303dd9e1
2010-11-23 10:07:00 -05:00
Michal Novotny
fe7523b44a bug 599127 - Wyciwyg channel writes end up doing synchronous disk IO. r=jduell, a=betaN 2010-11-23 14:01:30 +02:00
Patrick McManus
e64f7b855a Bug 592284 - Accelerate TCP connection retries in HTTP. r=honzab a=blocking2.0
Losing a TCP SYN requires a long painful (typically 3 second) delay
before being retried. This patch creates a second parallel connection
attempt for any nsHttpConnection which has not become writable before
a timeout occurs.

If you assume .5% packet loss, this converts a full 3 second delay
from a 1 in 200 event into a 1 in 40,000 event.

Whichever connection establishes itself first is used. If another one
has been started and it does connect before the one being used is
closed then the extra one is handed to the connection manager for use
by a different transaction - essentially a persistent connection with
0 previous transactions on it. (Another way to think about is
pre-fetching a 3WHS on a high latency connection).

The pref network.http.connection-retry-timeout controls the amount of
time in ms to wait for success on the initial connection before beginning
the second one. Setting it to 0 disables the parallel connection, the
default is 250.
2010-11-21 09:50:36 +01:00
Josh Matthews
79d095acc1 Bug 605327 - Add proper cancellation to e10s wyciwyg channels. r=dwitte a=blocking-fennec 2010-11-19 16:12:45 -05:00
Michael Wu
f8ed923585 Backed out changeset 090046fc6891 bug 482935 due to a=orange 2010-11-10 19:29:51 -08:00
bjarne@runitsoft.com
935a3cd3d5 Bug 482935 - Cancel() from OnStopRequest should not cause cache entry to be doomed;
(Av1f) Allow content to be cached if it was loaded successfully.
r=(dwitte, jduell) a2.0=benjamin.
2010-11-11 01:02:15 +01:00
Ehsan Akhgari
a968458dc9 Backed out changeset c85c2f1b0566 because of oranges on mochitest-1 2010-11-10 17:46:32 -05:00
bjarne@runitsoft.com
a181c1aca6 Bug 482935 - Cancel() from OnStopRequest should not cause cache entry to be doomed;
(Av1e) Allow content to be cached if it was loaded successfully.
r=(dwitte, jduell) a2.0=benjamin.
2010-11-10 22:28:54 +01:00
Chris Jones
339106b788 Bug 562424: Switch IPDL interfaces to infallible TArray. r=bent a=blocking 2010-11-08 20:49:00 -06:00
Mark Finkle
0535b6b4e4 Bug 608258 - Crash at visiting AMO [r=jdm a=blocking-fennecb2] 2010-10-29 11:38:26 -04:00
Kai Engert
09c3a31272 Bug 566478 - Invalid SSL cert error is not mobile-friendly [r=mayhemer a=blocking-fennecb2] 2010-10-28 11:46:00 -04:00
Patrick McManus
cbcb299a21 Bug 606719 - Browser stalls with connections left hanging in TCP close wait state. Part 2: fix it. r=dwitte, a=b7+ 2010-10-28 10:10:03 -07:00
Mark Finkle
e1dcc97a16 Backout bug 566478 due to test orange a=orangehurts 2010-10-28 12:17:01 -04:00