Benoit Girard
b4e210eae2
Bug 1182516 - Add Chaos Mode environment variable MOZ_CHAOSMODE. r=roc
2015-07-14 17:29:23 -04:00
Birunthan Mohanathas
a29151dc87
Bug 1182996 - Fix and add missing namespace comments. rs=ehsan
...
The bulk of this commit was generated by running:
run-clang-tidy.py \
-checks='-*,llvm-namespace-comment' \
-header-filter=^/.../mozilla-central/.* \
-fix
2015-07-13 08:25:42 -07:00
Patrick McManus
57091fde66
bug 1179560 - some 421 retries dont work r=hurley
2015-07-02 10:34:01 -04:00
Patrick McManus
0d2c0e891e
bug 1153212 - 2/2 Necko explicitly track origin vs routed host and give psm only origin r=dkeeler r=hurley IGNORE IDL
...
Allow necko to simultaneously track the dual concept of routed host
and origin (authenticated host). The origin is given to the socket
provider and the routed host is inserted at DNS lookup time as if it
were a SRV or CNAME.
2015-04-09 11:31:59 -04:00
Patrick McManus
8c1be69bce
Bug 1154068 - rename relaxed to insecure scheme and add more runtime checks r=hurley
...
we used the term relaxed for http:// over tls; but someitmes we also
enforced the authentication if alt-svc changed the host involved. That
was all done correctly but the term relaxed wasn't very accurate in
those cases.
For clarity rename "relaxed" to be "insecureScheme". Also add a
runtime check (with debug assert) to paths to enforce that bit isn't
set where it shouldn't be (it isn't known to be).
2015-04-06 17:30:29 -04:00
Patrick McManus
13af726282
Bug 1154061 - clear cached alt svc mappings on a variety of state changes r=hurley
...
an alt-svc map is just an optimization which can get out of phase like
any other piece of state.. therefore it makes sense to
drop them when a user presses some kind of "serenity now" button such
as force-reload, clear cache, etc..
2015-04-10 16:13:30 -04:00
Patrick McManus
1c75c5eabd
bug 1136140 - wss inside https proxy null deref r=hurley
2015-03-09 16:44:34 -04:00
Patrick McManus
c870cb3fa4
bug 1116867 - make nsIProgressEventSink and nsITransportEventSink safely scriptable r=mayhemer r=bz
...
These scriptable interfaces use uint_64 arguments with sentinel values
of UINT64_MAX. However, UINT64_MAX exceeds MAX_SAFE_INTEGER and cannot
be gatewayed to/from javascript - so they cannot be used
correctly. Change them to use signed 64 bit numbers and -1 as the
sentinnel. C++ implementations ought to be enough to audit as the
special value could never be used correctly in JS anyhow - also
audited OnProgressChange() uses for downstream use of this data.
---
dom/base/nsXMLHttpRequest.cpp | 19 +++++++----
dom/base/nsXMLHttpRequest.h | 10 +++---
dom/plugins/base/nsPluginStreamListenerPeer.cpp | 4 +--
.../webbrowserpersist/nsWebBrowserPersist.cpp | 14 ++++----
image/src/imgLoader.cpp | 4 +--
modules/libjar/nsJARChannel.cpp | 3 +-
netwerk/base/public/nsIProgressEventSink.idl | 8 ++---
netwerk/base/public/nsITransport.idl | 8 ++---
netwerk/base/public/nsNetUtil.h | 24 ++++++++++++++
netwerk/base/src/Dashboard.cpp | 2 +-
netwerk/base/src/nsBaseChannel.cpp | 12 +++----
netwerk/base/src/nsIncrementalDownload.cpp | 4 +--
netwerk/base/src/nsSocketTransport2.cpp | 5 +--
netwerk/base/src/nsStreamTransportService.cpp | 38 +++++++++++++---------
netwerk/base/src/nsTransportUtils.cpp | 12 +++----
netwerk/protocol/file/nsFileChannel.cpp | 8 +++--
netwerk/protocol/ftp/nsFtpConnectionThread.cpp | 4 +--
netwerk/protocol/http/Http2Push.cpp | 2 +-
netwerk/protocol/http/Http2Session.cpp | 2 +-
netwerk/protocol/http/HttpChannelChild.cpp | 31 +++++++++---------
netwerk/protocol/http/HttpChannelChild.h | 6 ++--
netwerk/protocol/http/HttpChannelParent.cpp | 4 +--
netwerk/protocol/http/HttpChannelParent.h | 4 +--
netwerk/protocol/http/NullHttpTransaction.cpp | 2 +-
netwerk/protocol/http/PHttpChannel.ipdl | 2 +-
netwerk/protocol/http/SpdyPush31.cpp | 2 +-
netwerk/protocol/http/SpdySession31.cpp | 2 +-
netwerk/protocol/http/TunnelUtils.cpp | 2 +-
netwerk/protocol/http/nsAHttpTransaction.h | 4 +--
netwerk/protocol/http/nsHttpChannel.cpp | 30 +++++++++++------
netwerk/protocol/http/nsHttpConnection.cpp | 4 +--
netwerk/protocol/http/nsHttpConnectionMgr.cpp | 4 +--
netwerk/protocol/http/nsHttpPipeline.cpp | 4 +--
netwerk/protocol/http/nsHttpPipeline.h | 6 ++--
netwerk/protocol/http/nsHttpResponseHead.cpp | 2 +-
netwerk/protocol/http/nsHttpResponseHead.h | 2 +-
netwerk/protocol/http/nsHttpTransaction.cpp | 32 +++++++++---------
netwerk/protocol/http/nsHttpTransaction.h | 2 +-
netwerk/protocol/wyciwyg/WyciwygChannelChild.cpp | 2 +-
netwerk/protocol/wyciwyg/nsWyciwygChannel.cpp | 3 +-
netwerk/test/TestIncrementalDownload.cpp | 7 ++--
uriloader/base/nsDocLoader.cpp | 14 ++++----
42 files changed, 203 insertions(+), 151 deletions(-)
2015-01-08 14:48:52 -05:00
Brian Smith
2f60cc4976
Bug 952863, Part 2: Remove dead code for non-ECDHE TLS False Start, r=keeler
2014-12-10 10:13:18 -08:00
Patrick McManus
6259a4169e
bug 865314 - backout 61ee2e053920 due to crashes 1089638 r=backout
2014-12-12 11:48:02 -05:00
Patrick McManus
1d63fd3557
bug 865314 - ssl parallelism to new host should not be 1 r=hurley
2014-01-30 03:56:36 -05:00
Nathan Froyd
340eac98ae
Bug 1099251 - make ChaosMode's behavior modifications more finely-grained selectable; r=roc
2014-11-14 13:12:51 -05:00
Patrick McManus
a63979c2f6
Bug 1090866 - wss over https proxy problem. r=hurley
2014-10-31 15:46:43 -04:00
Ryan VanderMeulen
1600e81962
Backed out changeset 06acd829f970 (bug 865314) for causing new topcrashes. a=me
2014-10-27 14:26:13 -04:00
Patrick McManus
aef989b7e4
bug 865314 - ssl parallelism to new host should not be 1 r=hurley
2014-01-30 03:56:36 -05:00
Patrick McManus
ee175b37cc
bug 865314 - backout for unused variable compiler bustage r=bustage CLOSED TREE
2014-10-24 11:52:18 -04:00
Patrick McManus
27c976115c
bug 865314 - ssl parallelism to new host should not be 1 r=hurley
2014-01-30 03:56:36 -05:00
Patrick McManus
30e70bb8f9
bug 1003448 - HTTP/2 Alternate Service and Opportunistic Security [2/2 necko] r=hurley
2014-08-21 10:50:17 -04:00
Daniel Stenberg
5b4c276b42
Bug 939318 - Find and close HTTP connections without traffic after network change. r=mcmanus
...
SPDY/http2 connections get a ping and be allowed N seconds to respond.
Active HTTP connections will be allowed N seconds to get traffic, if they
don't afer N seconds they get closed to avoid risking stalled transfers.
N is 5 by default: pref is "network.http.network-changed.timeout"
2014-09-11 06:55:00 -04:00
Ed Morley
cc6bc5ce84
Backed out changeset 0a066b7ffa46 (bug 939318)
2014-09-24 16:17:32 +01:00
Daniel Stenberg
9ac9528ccf
Bug 939318 - Find and close HTTP connections without traffic after network change, r=mcmanus
...
SPDY/http2 connections get a ping and be allowed N seconds to respond.
Active HTTP connections will be allowed N seconds to get traffic, if they
don't afer N seconds they get closed to avoid risking stalled transfers.
N is 5 by default: pref is "network.http.network-changed.timeout"
2014-09-11 06:55:00 -04:00
Tom Tromey
a050e72780
Bug 1069387 - Fix "Transaction" typos in netwerk/protocol/http. r=mcmanus
2014-09-18 08:13:00 -04:00
Patrick McManus
be8b2fae1d
bug 1050063 - consider tls client hello version in alpn/npn offer list r=hurley r=keeler
2014-08-15 09:39:53 -04:00
Patrick McManus
7b3f72782b
bug 1047698 - reorder alpn/npn offer lists r=hurley
2014-08-04 16:54:08 -04:00
Patrick McManus
b6208f8bcb
Bug 354493 - revert Add nsINetworkZonePolicy to protect resources loaded from private IPs r=backout a=backout
2014-07-24 10:05:36 -04:00
Patrick McManus
b7e13fa383
bug 1040930 - part 4 wss over https proxying r=hurley
2014-07-18 14:59:01 -04:00
Patrick McManus
7a9df88f72
bug 1040930 - part 3 https is a transaction property not a connection property r=hurley
2014-07-17 20:52:23 -04:00
Steve Workman
368b902162
Bug 354493 - Add nsINetworkZonePolicy to protect resources loaded from private IPs r=mcmanus
2014-07-17 11:08:20 -07:00
Patrick McManus
3b584604e6
bug 1037082 - part 3/3 407 proxy auth for https over https r=hurley
2014-07-07 11:43:11 -04:00
Steve Workman
f0ecd41b1f
Bug 1024015 - Only enable HTTP response timeout when TCP Keepalives are disabled for HTTP r=mcmanus
2014-06-26 11:03:45 -07:00
David Fifield
38b16d851d
Bug 1017769 - Make the CONNECT Host header the same as the Request-URI. r=mcmanus
...
It's possible to construct a request where the Host header differs from
the authority in the URL, for example in an extension with
nsIHttpChannel and setRequestHeader. MakeConnectString generates a
host:port string for the CONNECT Request-Line, but peeks into the
tunneled request in order to copy the Host header to the proxy request.
Instead, use the same host:port string for Host as is used in the
Request-URI, to avoid revealing the plaintext of the Host header outside
of the tunnel.
2014-05-29 11:01:02 -07:00
Patrick McManus
ded9716b57
bug 1014589 - problem with https proxying and http pipelines r=hurley
2014-05-22 17:49:04 -04:00
Patrick McManus
59df435113
bug 378637 part 13 - https proxying changes to casting and trans lifecycle r=hurley
2014-05-16 11:46:12 -04:00
Patrick McManus
c42552a198
bug 378637 part 12 - proxy over TLS (i.e. https proxying) r=hurley
2014-04-16 09:52:43 -04:00
Patrick McManus
e3828dcc00
bug 378637 part 11 - move MakeConnectString() to nsHttpHandler r=hurley
2014-04-22 15:46:06 -04:00
Patrick McManus
ed1caf1722
bug 378637 part 9 - https proxy info added to connection info and reqeuest head r=hurley
2014-04-16 09:23:20 -04:00
Patrick McManus
d59917f107
bug 378637 part 7 - new spdysession() no longer takes first transaction r=hurley
2014-05-16 11:46:11 -04:00
Patrick McManus
4903c7e4e6
bug 378637 part 4 - more proactive failed to connect detection in nsHttpConnection r=hurley
2014-04-02 17:26:58 -04:00
Patrick McManus
e4716c63eb
bug 378637 part 3 - fix http style: comments, whitespace, formatters r=hurley
2014-04-17 19:55:04 -04:00
Ryan VanderMeulen
9ee7c1593b
Backed out 11 changesets (bug 378637) for Android crashes.
...
Backed out changeset 2a607cddc4cb (bug 378637)
Backed out changeset e416503aea99 (bug 378637)
Backed out changeset b2257226899f (bug 378637)
Backed out changeset dafd618c3f52 (bug 378637)
Backed out changeset dfde9d47d8c4 (bug 378637)
Backed out changeset cf9de5c367a5 (bug 378637)
Backed out changeset 62aa68e8b499 (bug 378637)
Backed out changeset 38efa8f2e56e (bug 378637)
Backed out changeset 2b5753e09a92 (bug 378637)
Backed out changeset 7a73873e133d (bug 378637)
Backed out changeset f58ce7ac1c7f (bug 378637)
2014-05-09 15:25:55 -04:00
Patrick McManus
7c5417cb13
bug 378637 part 11 - proxy over TLS (i.e. https proxying) r=hurley
2014-04-16 09:52:43 -04:00
Patrick McManus
23fd23b778
bug 378637 part 10 - move MakeConnectString() to nsHttpHandler r=hurley
2014-04-22 15:46:06 -04:00
Patrick McManus
85890aeefd
bug 378637 part 8 - https proxy info added to connection info and reqeuest head r=hurley
2014-04-16 09:23:20 -04:00
Patrick McManus
97eae8f74e
bug 378637 part 6 - implement nsAHttpTransaction::QueryHttpTransaction r=hurley
2014-04-15 17:40:23 -04:00
Patrick McManus
c05031622a
bug 378637 part 4 - more proactive failed to connect detection in nsHttpConnection r=hurley
2014-04-02 17:26:58 -04:00
Patrick McManus
243f1be072
bug 378637 part 3 - fix http style: comments, whitespace, formatters r=hurley
2014-04-17 19:55:04 -04:00
Birunthan Mohanathas
eeb9aaaa94
Bug 900908 - Part 3: Change uses of numbered macros in nsIClassInfoImpl.h/nsISupportsImpl.h to the variadic variants. r=froydnj
2014-04-27 03:06:00 -04:00
Patrick McManus
c3d0d7907a
Bug 997690 - nsHttpConnection::IdleTimeout default can be set internally r=hurley
2014-04-16 12:34:56 -04:00
Patrick McManus
54d57b278b
bug 477578 - http methods should be case sensitive r=hurley
2014-03-18 12:36:18 -04:00
Robert O'Callahan
f02c66b97e
Bug 955888. Part 6: In chaos mode, when reading from an HTTP connection, sometimes read less than the full amount of available data. r=jduell
2014-03-03 18:12:42 +13:00