Commit Graph

117 Commits

Author SHA1 Message Date
Honza Bambas
2c84f607c4 Bug 1446117 - Make sure we also mark timeout epoch on a network socket when we are polling it for read/write, fix regression from bug 1444160. r=valentin 2018-03-19 07:48:00 -04:00
Honza Bambas
026a9abc88 Bug 1430659 - Network requests in "blocked" state for long time (1+ minute) when ipv6 hosts are no longer available. r=valentin 2018-03-16 09:06:00 -04:00
Daniel Stenberg
f774cbf4ee bug 1441256 - bypass cache when retrying connection without TRR r=mcmanus,valentin
Otherwise it will just load back the same (problematic) addresses from the
cache again the second time. This introduces a new resolver bit
(REFRESH_CACHE) that also invalidates the existing cache entry while doing the
new resolve.

MozReview-Commit-ID: 5Bc2KiAGYYA
2018-03-06 14:50:21 +01:00
Daniel Stenberg
cba42619ee bug 1434852 - introducing TRR (DOH); r=mcmanus,valentin
Provides an optional resolver mechanism for Firefox that allows running
together with or instead of the native resolver.

TRR offers resolving of host names using a dedicated DNS-over-HTTPS server
(HTTPS is required, HTTP/2 is preferable).

DNS-over-HTTPS (DOH) allows DNS resolves with enhanced privacy, secure
transfers and improved performance.

To keep the failure rate at a minimum, the TRR system manages a dynamic
persistent blacklist for host names that can't be resolved with DOH but works
with the native resolver. Blacklisted entries will not be retried over DOH for
a couple of days. "localhost" and names in the ".local" TLD will not be
resolved via DOH.

TRR is preffed OFF by default and you need to set a URI for an available DOH
server to be able to use it. Since the URI for DOH is set with a name itself,
it may have to use the native resolver for bootstrapping. (Optionally, the
user can set the IP address of the DOH server in a pref to avoid the required
initial native resolve.)

When TRR starts up, it will first verify that it works by checking a
"confirmation" domain name. This confirmation domain is a pref by default set
to "example.com". TRR will also by default await the captive-portal detection
to raise its green flag before getting activated.

All prefs for TRR are under the "network.trr" hierarchy.

The DNS-over-HTTPS spec: https://tools.ietf.org/html/draft-ietf-doh-dns-over-https-03

MozReview-Commit-ID: GuuU6vjTjlm
2018-02-01 10:20:49 +01:00
Masatoshi Kimura
c3d2ca2e93 Bug 685236 - Stop using GetNativePath in netwerk/. r=mayhemer
MozReview-Commit-ID: JdHhXPiS0fv
2017-12-15 20:21:19 +09:00
268547933a Bug 1430768 - Refine TFO telemetry. r=mcmanus 2018-01-17 06:47:00 +02:00
Dragana Damjanovic
f7097b7f88 Bug 1402879 - Make small changes to TFO: telemetry and use of backup socket that already has started. r-mcmanus 2017-12-20 15:40:07 +01:00
Bharat Raghunathan
fe7f9222b3 Bug 1422648 - Removed instances of nsSocketTransport::mNetAddrPreResolved r=valentin
MozReview-Commit-ID: 2qJ1l7KJKK2
2017-12-04 10:35:38 +05:30
Brindusan Cristian
76d3f072aa Merge inbound to mozilla-central a=merge r=merge 2017-11-28 11:50:57 +02:00
Dragana Damjanovic
f337579c17 Bug 1404069 - Revert bug 1363372. r=mayhemer 2017-11-27 21:12:31 +01:00
Johann Hofmann
14f7e20d7d Bug 1374574 - Remove the FlyWeb service and DOM interfaces. r=bz,djvj
MozReview-Commit-ID: 4hp9pLbMh4R
2017-11-22 15:00:10 +01:00
Nicholas Nethercote
29b25cc007 Bug 1409598 - Change nsIXPCScriptable::className and nsIClassInfo::{contractID,classDescription} from string to AUTF8String. r=froydnj.
This lets us replace moz_xstrdup() of string literals with AssignLiteral(),
among other improvements.
2017-10-18 13:17:26 +11:00
Chris Peterson
90bcd3c611 Bug 870698 - Part 8: Replace Equals(NS_LITERAL_CSTRING("")) with EqualsLiteral(""). r=erahm
The NS_LITERAL_CSTRING macro creates a temporary nsLiteralCString to encapsulate the string literal and its length, but AssignLiteral() can determine the string literal's length at compile-time without nsLiteralCString.

MozReview-Commit-ID: B5Y8KyExPQ8
2017-09-06 15:00:31 -07:00
Valentin Gosu
1e2d8edd75 Bug 1399300 - Backed out changeset a51cf9c048a1 (bug 910207) a=backout
MozReview-Commit-ID: 3l6B9n7VM1o
2017-09-13 10:51:18 +02:00
Honza Bambas
2b8812b8c8 Bug 910207 - Prevent client certificate pop-up coming from a speculative connection, r=dkeeler
MozReview-Commit-ID: IHKzHwsJUiQ
2017-09-01 10:42:00 +02:00
Sebastian Hengst
049b97c4d9 Backed out changeset 9c00078ce6ab (bug 910207) for eslint failure at browser/base/content/test/urlbar/browser_urlbar_search_no_speculative_connect_with_client_cert.js:48: Expected method shorthand. r=backout 2017-09-08 20:42:07 +02:00
Honza Bambas
acaf66387b Bug 910207 - Prevent client certificate pop-up coming from a speculative connection, r=dkeeler
MozReview-Commit-ID: CtNPV9kFqJM
2017-09-01 10:42:00 +02:00
Dragana Damjanovic
0ce2aa990c Bug 1393804 - The nspr function PR_FileDesc2PlatformOverlappedIOHandle has change its name. r=mayhemer 2017-08-25 19:04:40 +02:00
Dragana Damjanovic
6986f2e357 Bug 1390881 - Improve the TFO telemetry. r=mcmanus 2017-08-20 09:45:26 +02:00
Dragana Damjanovic
86d07559ec Bug 1390881 - Check whether TFO cookie or TFO cookie and data are sent on Windows. r=mcmanus 2017-08-20 09:45:17 +02:00
Sajjad Arshad
fcbd21c188 Bug 1388925 - Add an opaque flags to have a fine-grained control over TLS configurations. r=mcmanus, r=keeler
This flags is added in the http channel interface by which developers can control the TLS
connections from JavaScript code (e.g. Add-ons). Basically, all the changes accounted for
plumbing this TLS flags from JavaScript level to C++ code responsible for calling NSS
module. We also added a unit test to make sure that separate connections are created if we
use different tlsFlags. Basically we used a concrete set of flag values that covers the
edge cases and check the hashkey generated in the connection info.
2017-08-16 12:41:16 -07:00
7128df90c4 Bug 1390447 - Check for WSA_IO_INCOMPLETE error after GetOverlappedResult. r=mayhemer 2017-08-15 16:41:47 +02:00
Jim Blandy
c485df334d Bug 1390230 - Remove unneeded logging message. r=mayhemer 2017-08-14 10:59:23 -07:00
Dragana Damjanovic
9f6e2035a5 Bug 1389079 - A work around until bug 1386719 lands. r=mcmanus 2017-08-10 23:29:34 +02:00
Dragana Damjanovic
0dab63a969 Bug 1363372 - Wait until OVERLAPPED structure return a result before distroying a socket. r=mcmanus 2017-07-27 11:37:11 +02:00
Sylvestre Ledru
9d4a84d778 Bug 1378712 - Remove all trailing whitespaces r=Ehsan
MozReview-Commit-ID: Kdz2xtTF9EG
2017-07-06 14:00:35 +02:00
Bill McCloskey
ce42826bdf Bug 1372405 - Provide names for all runnables in the tree (r=froydnj)
MozReview-Commit-ID: DKR6ROiHRS7
2017-06-26 14:19:58 -07:00
Carsten "Tomcat" Book
238bf154d5 Backed out changeset 4f6302a98ae4 (bug 1372405) 2017-06-21 13:59:26 +02:00
Bill McCloskey
67e8af4720 Bug 1372405 - Provide names for all runnables in the tree (r=froydnj)
MozReview-Commit-ID: DKR6ROiHRS7
2017-06-20 21:44:11 -07:00
Carsten "Tomcat" Book
bbe9441993 Backed out changeset 9846de3bd954 (bug 1372405) 2017-06-20 08:27:02 +02:00
Bill McCloskey
f69608368b Bug 1372405 - Provide names for all runnables in the tree (r=froydnj)
MozReview-Commit-ID: DKR6ROiHRS7
2017-06-19 22:25:47 -07:00
Bill McCloskey
5178a6e2ce Bug 1372426 - More detailed names for nsInputStreamReadyEvent (r=erahm)
MozReview-Commit-ID: 6beE0eMCxg7
2017-06-14 14:44:04 -07:00
Wes Kocher
c397d66c1e Backed out changeset 45b5cadadc22 (bug 1372426) because it's blocking a backout a=backout
MozReview-Commit-ID: Jl0zxef8R9k
2017-06-13 17:48:38 -07:00
Bill McCloskey
c59bb80767 Bug 1372426 - More detailed names for nsInputStreamReadyEvent (r=erahm)
MozReview-Commit-ID: 6beE0eMCxg7
2017-06-13 15:24:08 -07:00
Wes Kocher
88b69eef98 Backed out changeset e8a63038d787 (bug 1372426) for build failures in nsStringStream.cpp a=backout
MozReview-Commit-ID: 8ci8nKoiLhz
2017-06-13 15:20:12 -07:00
Bill McCloskey
99ffe24855 Bug 1372426 - More detailed names for nsInputStreamReadyEvent (r=erahm)
MozReview-Commit-ID: 6beE0eMCxg7
2017-06-13 14:53:26 -07:00
Bill McCloskey
5aec5bf1e9 Bug 1365101 - Convert NS_GetCurrentThread uses in netwerk/ (r=meyhemer)
MozReview-Commit-ID: IHBt6XAG8em
2017-06-12 20:21:43 -07:00
Dragana Damjanovic
831b686b9a Bug 1364189 - Make sure not to retry socketTransaction if nsHttpConnectionMgr cancels it. r=mcmanus 2017-05-24 11:19:40 +02:00
Carsten "Tomcat" Book
c807d58426 merge mozilla-inbound to mozilla-central a=merge 2017-05-10 15:07:28 +02:00
Wes Kocher
04034100b2 Merge inbound to m-c a=merge
MozReview-Commit-ID: Fp2oBAcru51
2017-05-09 14:34:34 -07:00
Andi-Bogdan Postelnicu
b983bd4fd0 Bug 1363336 - eliminate useless null-check in for |fd|. r=dragana
MozReview-Commit-ID: KQGPjDMviuj
2017-05-09 16:37:05 +03:00
Dragana Damjanovic
16e16dc647 Bug 1362959 - Call SetFastOpenConnected only if socketTransport has TFO in progress. r=mcmanus 2017-05-10 00:24:48 +02:00
Dragana Damjanovic
a18c3454b3 Bug 1363448 - Let nsHttpConnectionMgr behave properly if StartFastOpen fails (which is conn->Activate() failing). r=mcmanus 2017-05-10 00:18:27 +02:00
Dragana Damjanovic
746539e721 Bug 1363108 - Fix some small bugs connectied to tcp fast open. r=mcmanus 2017-05-08 22:15:26 +02:00
Dragana Damjanovic
615674a55d Bug 1362821 - Properly destroy a HalfOpeSocket that is used as a backup for a TFO connection if another H2 connection is established for the same host. r=mcmanus 2017-05-08 18:22:45 +02:00
Dragana Damjanovic
0c98ed442a Bug 1360515 - During TCP Fast Open let necko works as it is used to, but only limit amount of data we write to lower layers, i.e. nss, tcpFastOpenLayer, tcp socket. r=mcmanus 2017-05-04 12:15:33 +02:00
Dragana Damjanovic
898db49f4a Bug 1359938 - Fix socket status events for TCP Fast Open. r=mcmanus 2017-05-04 12:15:16 +02:00
Dragana Damjanovic
6d91eb6ea9 Bug 1359847 - Improve transaction restart if tfo is not supported. r=mcmanus 2017-05-04 12:15:10 +02:00
Dragana Damjanovic
6939d5a870 Bug 1352274 - Add response header indicator for TCP FastOpen suceeded. r=mcmanus 2017-05-04 12:14:54 +02:00
Dragana Damjanovic
ff02a1cd2b Bug 1188435 - Make TLS 0RTT work with TLS Fast Open. r=mcmanus 2017-05-04 12:14:13 +02:00