Commit Graph

182 Commits

Author SHA1 Message Date
Benoit Girard
b4e210eae2 Bug 1182516 - Add Chaos Mode environment variable MOZ_CHAOSMODE. r=roc 2015-07-14 17:29:23 -04:00
Birunthan Mohanathas
a29151dc87 Bug 1182996 - Fix and add missing namespace comments. rs=ehsan
The bulk of this commit was generated by running:

  run-clang-tidy.py \
    -checks='-*,llvm-namespace-comment' \
    -header-filter=^/.../mozilla-central/.* \
    -fix
2015-07-13 08:25:42 -07:00
Patrick McManus
57091fde66 bug 1179560 - some 421 retries dont work r=hurley 2015-07-02 10:34:01 -04:00
Patrick McManus
0d2c0e891e bug 1153212 - 2/2 Necko explicitly track origin vs routed host and give psm only origin r=dkeeler r=hurley IGNORE IDL
Allow necko to simultaneously track the dual concept of routed host
and origin (authenticated host). The origin is given to the socket
provider and the routed host is inserted at DNS lookup time as if it
were a SRV or CNAME.
2015-04-09 11:31:59 -04:00
Patrick McManus
8c1be69bce Bug 1154068 - rename relaxed to insecure scheme and add more runtime checks r=hurley
we used the term relaxed for http:// over tls; but someitmes we also
enforced the authentication if alt-svc changed the host involved. That
was all done correctly but the term relaxed wasn't very accurate in
those cases.

For clarity rename "relaxed" to be "insecureScheme". Also add a
runtime check (with debug assert) to paths to enforce that bit isn't
set where it shouldn't be (it isn't known to be).
2015-04-06 17:30:29 -04:00
Patrick McManus
13af726282 Bug 1154061 - clear cached alt svc mappings on a variety of state changes r=hurley
an alt-svc map is just an optimization which can get out of phase like
any other piece of state.. therefore it makes sense to
drop them when a user presses some kind of "serenity now" button such
as force-reload, clear cache, etc..
2015-04-10 16:13:30 -04:00
Patrick McManus
1c75c5eabd bug 1136140 - wss inside https proxy null deref r=hurley 2015-03-09 16:44:34 -04:00
Patrick McManus
c870cb3fa4 bug 1116867 - make nsIProgressEventSink and nsITransportEventSink safely scriptable r=mayhemer r=bz
These scriptable interfaces use uint_64 arguments with sentinel values
of UINT64_MAX. However, UINT64_MAX exceeds MAX_SAFE_INTEGER and cannot
be gatewayed to/from javascript - so they cannot be used
correctly. Change them to use signed 64 bit numbers and -1 as the
sentinnel. C++ implementations ought to be enough to audit as the
special value could never be used correctly in JS anyhow - also
audited OnProgressChange() uses for downstream use of this data.
---
 dom/base/nsXMLHttpRequest.cpp                      | 19 +++++++----
 dom/base/nsXMLHttpRequest.h                        | 10 +++---
 dom/plugins/base/nsPluginStreamListenerPeer.cpp    |  4 +--
 .../webbrowserpersist/nsWebBrowserPersist.cpp      | 14 ++++----
 image/src/imgLoader.cpp                            |  4 +--
 modules/libjar/nsJARChannel.cpp                    |  3 +-
 netwerk/base/public/nsIProgressEventSink.idl       |  8 ++---
 netwerk/base/public/nsITransport.idl               |  8 ++---
 netwerk/base/public/nsNetUtil.h                    | 24 ++++++++++++++
 netwerk/base/src/Dashboard.cpp                     |  2 +-
 netwerk/base/src/nsBaseChannel.cpp                 | 12 +++----
 netwerk/base/src/nsIncrementalDownload.cpp         |  4 +--
 netwerk/base/src/nsSocketTransport2.cpp            |  5 +--
 netwerk/base/src/nsStreamTransportService.cpp      | 38 +++++++++++++---------
 netwerk/base/src/nsTransportUtils.cpp              | 12 +++----
 netwerk/protocol/file/nsFileChannel.cpp            |  8 +++--
 netwerk/protocol/ftp/nsFtpConnectionThread.cpp     |  4 +--
 netwerk/protocol/http/Http2Push.cpp                |  2 +-
 netwerk/protocol/http/Http2Session.cpp             |  2 +-
 netwerk/protocol/http/HttpChannelChild.cpp         | 31 +++++++++---------
 netwerk/protocol/http/HttpChannelChild.h           |  6 ++--
 netwerk/protocol/http/HttpChannelParent.cpp        |  4 +--
 netwerk/protocol/http/HttpChannelParent.h          |  4 +--
 netwerk/protocol/http/NullHttpTransaction.cpp      |  2 +-
 netwerk/protocol/http/PHttpChannel.ipdl            |  2 +-
 netwerk/protocol/http/SpdyPush31.cpp               |  2 +-
 netwerk/protocol/http/SpdySession31.cpp            |  2 +-
 netwerk/protocol/http/TunnelUtils.cpp              |  2 +-
 netwerk/protocol/http/nsAHttpTransaction.h         |  4 +--
 netwerk/protocol/http/nsHttpChannel.cpp            | 30 +++++++++++------
 netwerk/protocol/http/nsHttpConnection.cpp         |  4 +--
 netwerk/protocol/http/nsHttpConnectionMgr.cpp      |  4 +--
 netwerk/protocol/http/nsHttpPipeline.cpp           |  4 +--
 netwerk/protocol/http/nsHttpPipeline.h             |  6 ++--
 netwerk/protocol/http/nsHttpResponseHead.cpp       |  2 +-
 netwerk/protocol/http/nsHttpResponseHead.h         |  2 +-
 netwerk/protocol/http/nsHttpTransaction.cpp        | 32 +++++++++---------
 netwerk/protocol/http/nsHttpTransaction.h          |  2 +-
 netwerk/protocol/wyciwyg/WyciwygChannelChild.cpp   |  2 +-
 netwerk/protocol/wyciwyg/nsWyciwygChannel.cpp      |  3 +-
 netwerk/test/TestIncrementalDownload.cpp           |  7 ++--
 uriloader/base/nsDocLoader.cpp                     | 14 ++++----
 42 files changed, 203 insertions(+), 151 deletions(-)
2015-01-08 14:48:52 -05:00
Brian Smith
2f60cc4976 Bug 952863, Part 2: Remove dead code for non-ECDHE TLS False Start, r=keeler 2014-12-10 10:13:18 -08:00
Patrick McManus
6259a4169e bug 865314 - backout 61ee2e053920 due to crashes 1089638 r=backout 2014-12-12 11:48:02 -05:00
Patrick McManus
1d63fd3557 bug 865314 - ssl parallelism to new host should not be 1 r=hurley 2014-01-30 03:56:36 -05:00
Nathan Froyd
340eac98ae Bug 1099251 - make ChaosMode's behavior modifications more finely-grained selectable; r=roc 2014-11-14 13:12:51 -05:00
Patrick McManus
a63979c2f6 Bug 1090866 - wss over https proxy problem. r=hurley 2014-10-31 15:46:43 -04:00
Ryan VanderMeulen
1600e81962 Backed out changeset 06acd829f970 (bug 865314) for causing new topcrashes. a=me 2014-10-27 14:26:13 -04:00
Patrick McManus
aef989b7e4 bug 865314 - ssl parallelism to new host should not be 1 r=hurley 2014-01-30 03:56:36 -05:00
Patrick McManus
ee175b37cc bug 865314 - backout for unused variable compiler bustage r=bustage CLOSED TREE 2014-10-24 11:52:18 -04:00
Patrick McManus
27c976115c bug 865314 - ssl parallelism to new host should not be 1 r=hurley 2014-01-30 03:56:36 -05:00
Patrick McManus
30e70bb8f9 bug 1003448 - HTTP/2 Alternate Service and Opportunistic Security [2/2 necko] r=hurley 2014-08-21 10:50:17 -04:00
Daniel Stenberg
5b4c276b42 Bug 939318 - Find and close HTTP connections without traffic after network change. r=mcmanus
SPDY/http2 connections get a ping and be allowed N seconds to respond.

Active HTTP connections will be allowed N seconds to get traffic, if they
don't afer N seconds they get closed to avoid risking stalled transfers.

N is 5 by default: pref is "network.http.network-changed.timeout"
2014-09-11 06:55:00 -04:00
Ed Morley
cc6bc5ce84 Backed out changeset 0a066b7ffa46 (bug 939318) 2014-09-24 16:17:32 +01:00
Daniel Stenberg
9ac9528ccf Bug 939318 - Find and close HTTP connections without traffic after network change, r=mcmanus
SPDY/http2 connections get a ping and be allowed N seconds to respond.

Active HTTP connections will be allowed N seconds to get traffic, if they
don't afer N seconds they get closed to avoid risking stalled transfers.

N is 5 by default: pref is "network.http.network-changed.timeout"
2014-09-11 06:55:00 -04:00
Tom Tromey
a050e72780 Bug 1069387 - Fix "Transaction" typos in netwerk/protocol/http. r=mcmanus 2014-09-18 08:13:00 -04:00
Patrick McManus
be8b2fae1d bug 1050063 - consider tls client hello version in alpn/npn offer list r=hurley r=keeler 2014-08-15 09:39:53 -04:00
Patrick McManus
7b3f72782b bug 1047698 - reorder alpn/npn offer lists r=hurley 2014-08-04 16:54:08 -04:00
Patrick McManus
b6208f8bcb Bug 354493 - revert Add nsINetworkZonePolicy to protect resources loaded from private IPs r=backout a=backout 2014-07-24 10:05:36 -04:00
Patrick McManus
b7e13fa383 bug 1040930 - part 4 wss over https proxying r=hurley 2014-07-18 14:59:01 -04:00
Patrick McManus
7a9df88f72 bug 1040930 - part 3 https is a transaction property not a connection property r=hurley 2014-07-17 20:52:23 -04:00
Steve Workman
368b902162 Bug 354493 - Add nsINetworkZonePolicy to protect resources loaded from private IPs r=mcmanus 2014-07-17 11:08:20 -07:00
Patrick McManus
3b584604e6 bug 1037082 - part 3/3 407 proxy auth for https over https r=hurley 2014-07-07 11:43:11 -04:00
Steve Workman
f0ecd41b1f Bug 1024015 - Only enable HTTP response timeout when TCP Keepalives are disabled for HTTP r=mcmanus 2014-06-26 11:03:45 -07:00
David Fifield
38b16d851d Bug 1017769 - Make the CONNECT Host header the same as the Request-URI. r=mcmanus
It's possible to construct a request where the Host header differs from
the authority in the URL, for example in an extension with
nsIHttpChannel and setRequestHeader. MakeConnectString generates a
host:port string for the CONNECT Request-Line, but peeks into the
tunneled request in order to copy the Host header to the proxy request.

Instead, use the same host:port string for Host as is used in the
Request-URI, to avoid revealing the plaintext of the Host header outside
of the tunnel.
2014-05-29 11:01:02 -07:00
Patrick McManus
ded9716b57 bug 1014589 - problem with https proxying and http pipelines r=hurley 2014-05-22 17:49:04 -04:00
Patrick McManus
59df435113 bug 378637 part 13 - https proxying changes to casting and trans lifecycle r=hurley 2014-05-16 11:46:12 -04:00
Patrick McManus
c42552a198 bug 378637 part 12 - proxy over TLS (i.e. https proxying) r=hurley 2014-04-16 09:52:43 -04:00
Patrick McManus
e3828dcc00 bug 378637 part 11 - move MakeConnectString() to nsHttpHandler r=hurley 2014-04-22 15:46:06 -04:00
Patrick McManus
ed1caf1722 bug 378637 part 9 - https proxy info added to connection info and reqeuest head r=hurley 2014-04-16 09:23:20 -04:00
Patrick McManus
d59917f107 bug 378637 part 7 - new spdysession() no longer takes first transaction r=hurley 2014-05-16 11:46:11 -04:00
Patrick McManus
4903c7e4e6 bug 378637 part 4 - more proactive failed to connect detection in nsHttpConnection r=hurley 2014-04-02 17:26:58 -04:00
Patrick McManus
e4716c63eb bug 378637 part 3 - fix http style: comments, whitespace, formatters r=hurley 2014-04-17 19:55:04 -04:00
Ryan VanderMeulen
9ee7c1593b Backed out 11 changesets (bug 378637) for Android crashes.
Backed out changeset 2a607cddc4cb (bug 378637)
Backed out changeset e416503aea99 (bug 378637)
Backed out changeset b2257226899f (bug 378637)
Backed out changeset dafd618c3f52 (bug 378637)
Backed out changeset dfde9d47d8c4 (bug 378637)
Backed out changeset cf9de5c367a5 (bug 378637)
Backed out changeset 62aa68e8b499 (bug 378637)
Backed out changeset 38efa8f2e56e (bug 378637)
Backed out changeset 2b5753e09a92 (bug 378637)
Backed out changeset 7a73873e133d (bug 378637)
Backed out changeset f58ce7ac1c7f (bug 378637)
2014-05-09 15:25:55 -04:00
Patrick McManus
7c5417cb13 bug 378637 part 11 - proxy over TLS (i.e. https proxying) r=hurley 2014-04-16 09:52:43 -04:00
Patrick McManus
23fd23b778 bug 378637 part 10 - move MakeConnectString() to nsHttpHandler r=hurley 2014-04-22 15:46:06 -04:00
Patrick McManus
85890aeefd bug 378637 part 8 - https proxy info added to connection info and reqeuest head r=hurley 2014-04-16 09:23:20 -04:00
Patrick McManus
97eae8f74e bug 378637 part 6 - implement nsAHttpTransaction::QueryHttpTransaction r=hurley 2014-04-15 17:40:23 -04:00
Patrick McManus
c05031622a bug 378637 part 4 - more proactive failed to connect detection in nsHttpConnection r=hurley 2014-04-02 17:26:58 -04:00
Patrick McManus
243f1be072 bug 378637 part 3 - fix http style: comments, whitespace, formatters r=hurley 2014-04-17 19:55:04 -04:00
Birunthan Mohanathas
eeb9aaaa94 Bug 900908 - Part 3: Change uses of numbered macros in nsIClassInfoImpl.h/nsISupportsImpl.h to the variadic variants. r=froydnj 2014-04-27 03:06:00 -04:00
Patrick McManus
c3d0d7907a Bug 997690 - nsHttpConnection::IdleTimeout default can be set internally r=hurley 2014-04-16 12:34:56 -04:00
Patrick McManus
54d57b278b bug 477578 - http methods should be case sensitive r=hurley 2014-03-18 12:36:18 -04:00
Robert O'Callahan
f02c66b97e Bug 955888. Part 6: In chaos mode, when reading from an HTTP connection, sometimes read less than the full amount of available data. r=jduell 2014-03-03 18:12:42 +13:00