Patrick McManus
d0d97ad7ef
bug 1072478 - h2 push hit not subject to max_concurrent 2/2 r=hurley
...
--HG--
extra : rebase_source : 4c49f74dc4b7ed8cead65dc3c78a2c8ae5ddf5e3
2015-01-13 15:26:37 -05:00
Patrick McManus
e2c3dd796f
bug 1072478 - h2 push loses fin bit race condition 1/2 r=hurley
...
--HG--
extra : rebase_source : 25ba5077d89f4cbf4c1a8e93a3c4da1536260d83
2015-01-13 15:26:23 -05:00
Patrick McManus
dfe84c8ed8
bug 1121706 - don't offer h2 in alpn if w/out mandatory suite r=hurley
...
--HG--
extra : rebase_source : 6220a4ace1df2f6cc7f02c98f46b331b251a42d2
2015-01-15 22:11:14 -05:00
Nicholas Nethercote
69fe655b04
Bug 1121304 (part 2, attempt 2) - Remove PLDHashTableOps::{alloc,free}Table. r=froydnj.
...
--HG--
extra : rebase_source : bc119bd0d3b6944e8c5a000950e0c4052cb70aef
2015-01-14 14:35:56 -08:00
Nicholas Nethercote
27ab169068
Bug 1121304 (part 1, attempt 2) - Minor type clean-ups for PLDHashTable. r=froydnj.
...
--HG--
extra : rebase_source : cccc747bf900804a566853d8eb7f16cf82a26978
2015-01-14 14:35:45 -08:00
Dragana Damjanovic
9ccb0f15a6
Bug 862856 - Send Http Activity notifications for speculative connections. r=mcmanus
2015-01-14 03:54:00 +01:00
Phil Ringnalda
e39f0adeca
Backed out 2 changesets (bug 1121304) for consistent b2g hangs in webgl-color-test.html?frame=1&__&preserve&premult&_____
...
Backed out changeset 20651ac19549 (bug 1121304)
Backed out changeset 758afec77c95 (bug 1121304)
2015-01-14 22:02:23 -08:00
Nicholas Nethercote
e9735966fa
Bug 1121304 (part 2) - Remove PLDHashTableOps::{alloc,free}Table. r=froydnj.
2015-01-14 14:35:56 -08:00
Nicholas Nethercote
41dc319a7c
Bug 1121304 (part 1) - Minor type clean-ups for PLDHashTable. r=froydnj.
2015-01-14 14:35:45 -08:00
Nicholas Nethercote
47221bc7f9
Bug 1120476 (part 4) - Remove PLDHashTableOps::finalize. r=froydnj.
...
--HG--
extra : rebase_source : b14dda8cdd5cd896d1e32950e38b2a9f7da4d99e
2015-01-13 19:02:35 -08:00
Nicholas Nethercote
c7538c9776
Bug 1120476 (part 3) - Remove PLDHashTable::data. r=froydnj.
...
--HG--
extra : rebase_source : 24d10af3dbce3ada5252503bc80bb1a4e31bc1c9
2015-01-13 16:42:13 -08:00
Monica Chew
269c62c45e
Bug 1100024: Don't call Connect if the principal is on a local or remote blocklist (r=mcmanus)
...
* * *
Bug 1120547 - Mark the overrides of nsIHttpChannelInternal::ContinueBeginConnect as override and rev the uuid of the interface; r=mmc
2015-01-09 13:25:13 -08:00
Patrick McManus
33e101f503
bug 1121058 - h2 assert stream id before cleanup r=hurley
2015-01-13 13:10:38 -05:00
Andrea Marchesini
f9e16e16fb
Bug 1111971
- patch 2 - private DTOR for ListenerAndContextContainer, CLOSED TREE
2015-01-13 19:26:59 +00:00
Andrea Marchesini
4fbc443f4e
Bug 1111971
- A better life-time management of aListener and aContext in WebSocketChannel. r=smaug
...
CLOSED TREE
2015-01-13 14:03:56 -05:00
James Cheng
5eb957de27
Bug 1104422 - Use PBrowserOrId to replace tabChild in SendAsyncOpen. r=honzab
2015-01-11 18:35:00 +01:00
Patrick McManus
a12670699c
bug 1119280 - fix large spdy/h2 transfer truncation r=hurley
2015-01-09 10:18:28 -05:00
Monica Chew
d2b4dc884c
Bug 1100024: CLOSED TREE Backout https://hg.mozilla.org/integration/mozilla-inbound/rev/671ad56e6e12 for causing crashes on ClassifyLocal lookups (r=backout)
2015-01-12 10:05:58 -08:00
Masatoshi Kimura
bf312ad056
Bug 1120062 - Part 1: Remove most Nullptr.h includes. r=waldo
2015-01-11 11:34:52 +09:00
Chris Peterson
9e23388ca8
Bug 1118076 - Remove MOZ_THIS_IN_INITIALIZER_LIST. r=Waldo
2015-01-06 21:39:46 -08:00
Jim Chen
db34c64f29
Bug 1116589 - Use templated JNI classes in generated bindings; r=snorp
2015-01-09 19:33:57 -05:00
Monica Chew
3023f46c51
Bug 1100024: Don't call Connect if the principal is on a local or remote blocklist (r=mcmanus)
2015-01-09 13:25:13 -08:00
Patrick McManus
37f307d56d
bug 1072478 backout 047afa953b9c for 1119810 and 1119926 r=backout
...
--HG--
extra : rebase_source : b8b40dc036ed2c49ab82691d339ee2a90a03ad4b
2015-01-09 15:33:58 -05:00
Patrick McManus
b8b9d7491a
bug 1072478 backout 28fff54451dd for 1119810 and 1119926 r=backout
...
--HG--
extra : rebase_source : 46e7ccae81bf27f468171c240a926d421366a33b
2015-01-09 15:33:27 -05:00
Alex Verstak
4149a976d9
Bug 1113438 - Update SetReferrerWithPolicy to (a) send referrer when https->http and policy is ORIGIN_WHEN_XORIGIN and (b) use the triggering principal for this cross-origin check. r=sstamm,mcmanus
2015-01-08 01:46:00 +01:00
Dragana Damjanovic
dbfb26f4e1
Bug 1112112 - Adding logging for e10s channel. r=jduell
2015-01-08 06:27:00 +01:00
Michael Pruett
411a94b05a
Bug 1118024 - Use new PL_DHashTable{Add,Lookup,Remove} functions. r=nfroyd
2015-01-05 20:27:28 -06:00
Christoph Kerschbaumer
05d08f5899
Bug 1107638 - Add innerWindowID to LoadInfo (r=sicking,jduell)
2015-01-07 15:51:20 -08:00
Botond Ballo
edd363abd6
Bug 1073003 - Fix more -Wunused-variable and -Wunused-but-set-variable warnings. r=ehsan
...
--HG--
extra : rebase_source : bb768dd07c19dc39994d5cca6e0f59048d12130a
2014-12-17 18:05:28 -05:00
Ryan VanderMeulen
63e600eaf7
Backed out changeset 577febac3790 (bug 1100024) for Talos xperf regressions.
...
CLOSED TREE
2015-01-06 17:41:15 -05:00
Monica Chew
ee4eedd81b
Bug 1100024: Don't call Connect if the principal is on a local or remote blocklist (r=mcmanus)
2015-01-06 10:49:47 -08:00
Valentin Gosu
13c4ff02cb
Bug 1113683 - Add dummy NullHttpChannel r=mcmanus
2015-01-06 19:26:10 +02:00
Patrick McManus
e7a182ce97
bug 1072478 - h2 push hit not subject to max_concurrent 2/2 r=hurley
2014-10-15 11:51:25 -04:00
Patrick McManus
f4c9705ef9
bug 1072478 - h2 push loses fin bit race condition 1/2 r=hurley
2014-10-16 16:42:14 -04:00
Andrew Bartlett
1b02f46484
Bug 423758 - Add NTLMv2 to internal NTLM handler. r=keeler
...
NTLMv2 is the default.
This adds a new preference:
network.ntlm.force-generic-ntlm-v1
This is to allow use of NTLMv1 in case issues are found in the NTLMv2
handler, or when contacting a server or backing DC that does not
support NTLMv2 for any reason.
To support this, we also:
- Revert "Bug 1030426 - network.negotiate-auth.allow-insecure-ntlm-v1-https allows sending NTLMv1 credentials in plain to HTTP proxies, r=mcmanus"
- Revert "Bug 1023748 - Allow NTLMv1 over SSL/TLS by default, r=jduell"
- Remove LM code from internal NTLM handler
The LM response should essentially never be sent, the last practical
use case was CIFS connections to Windows 9X, I have never seen a web
server that could only do LM
It is removed before the NTLMv2 work is done so as to avoid having 3
possible states here (LM, NTLM, NTLMv2) to control via preferences.
Developed with Garming Sam <garming@catalyst.net.nz>
2014-12-22 15:55:00 -05:00
Patrick McManus
cf01ffcedf
bug 1110707 - dont assume seekable stream on sending_to http events r=valentin
2015-01-05 12:08:21 -05:00
Patrick McManus
c8acfd64a8
bug 1113065 - spdy should not close session on imglib error r=bagder r=seth
2014-12-22 11:03:05 -05:00
Ehsan Akhgari
52593ee3bd
Bug 1117042 follow-up: Fix a build bustage
2015-01-02 09:28:37 -05:00
Ehsan Akhgari
e9499ce141
Bug 1117042 - Mark virtual overridden functions as MOZ_OVERRIDE in netwerk; r=mcmanus
2015-01-02 09:04:04 -05:00
Jason Duell
c5514df608
Bug 1108916 - app:// channels could skip calling OnStopRequest. r=hurley
2014-12-31 18:23:58 -08:00
Honza Bambas
2a3843999d
Bug 1102172 - Fix possible appache update hang. r=jduell
2014-12-31 18:22:46 -08:00
Michal Novotny
db0d15813e
Bug 792831 - WebSocket permessage compression extension, r=jduell
2014-12-29 12:43:40 +01:00
Patrick McManus
4ab4a2e414
bug 1111217 - Http2Session::CloseTransaction can delete this while on stack from OnMsgCancelTransaction r=hurley
2014-12-15 13:00:13 -05:00
Carsten "Tomcat" Book
c3edf3a511
Backed out changeset 8fd0df8e208c (bug 423758) for bustage
2014-12-22 09:05:34 +01:00
Andrew Bartlett
d741102951
Bug 423758 - Add NTLMv2 to internal NTLM handler. r=keeler
...
NTLMv2 is the default.
This adds a new preference:
network.ntlm.force-generic-ntlm-v1
This is to allow use of NTLMv1 in case issues are found in the NTLMv2
handler, or when contacting a server or backing DC that does not
support NTLMv2 for any reason.
To support this, we also:
- Revert "Bug 1030426 - network.negotiate-auth.allow-insecure-ntlm-v1-https allows sending NTLMv1 credentials in plain to HTTP proxies, r=mcmanus"
- Revert "Bug 1023748 - Allow NTLMv1 over SSL/TLS by default, r=jduell"
- Remove LM code from internal NTLM handler
The LM response should essentially never be sent, the last practical
use case was CIFS connections to Windows 9X, I have never seen a web
server that could only do LM
It is removed before the NTLMv2 work is done so as to avoid having 3
possible states here (LM, NTLM, NTLMv2) to control via preferences.
Developed with Garming Sam <garming@catalyst.net.nz>
2014-12-18 17:25:00 +01:00
Patrick McManus
9a8c661ddd
bug 1113661 - broken h2 dependency id r=hurley
2014-12-19 13:01:21 -05:00
Patrick McManus
bbf86bc8fc
bug 1003450 - [3/3] Group Dependency Nodes require >= h2-16 r=hurley
2014-12-11 17:00:19 -05:00
Patrick McManus
7edbeec28f
bug 1003450 - [2/3] Group Dependency nodes for HTTP/2 r=hurley
2014-12-06 14:26:50 -05:00
Patrick McManus
08a4a502ff
bug 1111875 - remove assertion on http size input error r=keeler
...
--HG--
extra : rebase_source : 952fa806d6598c00412bd9b27cf3af65e78e9452
2014-12-16 21:35:57 -05:00
Patrick McManus
25337cfd79
Bug 952863, Part 3: Remove more dead code, r=briansmith
...
--HG--
extra : rebase_source : 2f1793584597aed0d559538aa1ed00c0d3afc788
2014-12-17 12:58:49 -08:00