Bogdan Postelnicu
43ffa675aa
Bug 1226526 - NS_ENSURE_ARG_POINTER on result to remove warning added by scan-build. r=mcmanus
...
--HG--
extra : rebase_source : 73ee1126287bbc2865568a074678564fd3372032
2016-01-13 11:41:04 +02:00
Honza Bambas
6bbabfc4b2
Bug 1121672 - Make CacheFile::IsDoomed() protect mHandle with lock, r=michal
2016-01-12 09:24:00 +01:00
Andrea Marchesini
caa2f9b456
Bug 1231378 - part 4 - Fix uninitialized members of classes in netwerk/widget/storage/uriloader/memory/tools, r=smaug
2016-01-12 18:16:59 +00:00
Carsten "Tomcat" Book
3589aeeb8a
Backed out changeset d6b0ffe1a7b3 (bug 1231378)
2016-01-12 15:48:54 +01:00
Andrea Marchesini
2609a149da
Bug 1231378 - part 4 - Fix uninitialized members of classes in netwerk/widget/storage/uriloader/memory/tools, r=smaug
2016-01-12 13:57:37 +00:00
Dragana Damjanovic
bdee941ae5
Bug 1236277 - Retry all connections not just the reused one. r=mcmanus
2016-01-11 05:20:00 +01:00
Eric Rahm
1828042c1f
Bug 1174972 - Add basic mozilla logging backend. r=froydnj,r=bwc,r=jduell
2016-01-05 13:05:19 -08:00
Xidorn Quan
f569fa65f9
Bug 1238404 - Use 'using' directive instead of having separate Dispatch impl in subclasses of nsIEventTarget. r=froydnj
...
--HG--
extra : source : 76255b192a7d6dae74f19c68653537d5f8f39775
2016-01-12 15:18:47 +11:00
Phil Ringnalda
52aade6b43
Back out 3e168e5a04bf (bug 1174972) for build bustage
...
CLOSED TREE
2016-01-11 20:04:40 -08:00
Eric Rahm
f8d0e8949c
Bug 1174972 - Add basic mozilla logging backend. r=froydnj,r=bwc,r=jduell
2016-01-05 13:05:19 -08:00
Patrick McManus
7ed406b2be
Bug 1238290 - fix bad necko deps on unified_sources r=valentin.gosu
...
---
netwerk/base/ARefBase.h | 2 ++
netwerk/base/CaptivePortalService.cpp | 1 +
netwerk/base/CaptivePortalService.h | 1 +
netwerk/base/EventTokenBucket.cpp | 4 +++-
netwerk/base/LoadContextInfo.cpp | 3 +++
netwerk/base/LoadInfo.cpp | 3 +++
netwerk/base/MemoryDownloader.cpp | 1 +
netwerk/base/Predictor.cpp | 1 +
netwerk/base/RedirectChannelRegistrar.h | 1 +
netwerk/base/nsBaseChannel.cpp | 1 +
netwerk/base/nsChannelClassifier.cpp | 1 +
netwerk/base/nsDirectoryIndexStream.cpp | 3 ++-
netwerk/base/nsDownloader.cpp | 1 +
netwerk/base/nsIOService.cpp | 1 +
netwerk/base/nsIncrementalDownload.cpp | 3 +++
netwerk/base/nsNetUtil.cpp | 4 ++++
netwerk/base/nsNetUtil.h | 1 +
netwerk/base/nsProtocolProxyService.cpp | 1 +
netwerk/base/nsSecCheckWrapChannel.cpp | 2 ++
netwerk/base/nsUDPSocket.cpp | 4 +++-
netwerk/cache/nsDiskCacheBinding.cpp | 2 +-
netwerk/cache/nsDiskCacheDeviceSQL.cpp | 2 ++
netwerk/cache/nsMemoryCacheDevice.cpp | 2 +-
netwerk/cache2/CacheFileUtils.cpp | 2 ++
netwerk/cache2/CacheStorageService.h | 1 +
netwerk/ipc/NeckoParent.cpp | 1 +
netwerk/ipc/RemoteOpenFileChild.cpp | 1 +
netwerk/protocol/about/nsAboutBloat.cpp | 1 +
netwerk/protocol/about/nsAboutCacheEntry.cpp | 1 +
netwerk/protocol/about/nsAboutProtocolHandler.cpp | 1 +
netwerk/protocol/data/DataChannelParent.cpp | 1 +
netwerk/protocol/file/nsFileProtocolHandler.cpp | 1 +
netwerk/protocol/ftp/FTPChannelParent.cpp | 2 ++
netwerk/protocol/ftp/FTPChannelParent.h | 1 +
netwerk/protocol/ftp/nsFtpConnectionThread.cpp | 1 +
netwerk/protocol/ftp/nsFtpProtocolHandler.h | 1 +
netwerk/protocol/http/Http2Compression.cpp | 1 +
netwerk/protocol/http/Http2Session.cpp | 1 +
netwerk/protocol/http/Http2Stream.h | 2 ++
netwerk/protocol/http/HttpBaseChannel.cpp | 4 ++++
netwerk/protocol/http/HttpBaseChannel.h | 1 +
netwerk/protocol/http/HttpChannelChild.cpp | 25 ++--------------------
netwerk/protocol/http/HttpChannelChild.h | 24 +++++++++++++++++++++
netwerk/protocol/http/HttpChannelParent.cpp | 1 +
netwerk/protocol/http/HttpChannelParent.h | 1 +
.../protocol/http/HttpChannelParentListener.cpp | 1 +
netwerk/protocol/http/HttpChannelParentListener.h | 1 +
netwerk/protocol/http/InterceptedChannel.cpp | 1 +
netwerk/protocol/http/NullHttpChannel.cpp | 1 +
netwerk/protocol/http/NullHttpTransaction.cpp | 1 +
netwerk/protocol/http/PackagedAppService.cpp | 14 ++++++++++--
netwerk/protocol/http/PackagedAppService.h | 4 +++-
netwerk/protocol/http/PackagedAppVerifier.cpp | 1 +
netwerk/protocol/http/nsCORSListenerProxy.cpp | 2 +-
netwerk/protocol/http/nsHttpBasicAuth.cpp | 1 +
netwerk/protocol/http/nsHttpChannel.cpp | 2 ++
netwerk/protocol/http/nsHttpChunkedDecoder.cpp | 1 +
netwerk/protocol/http/nsHttpConnectionInfo.cpp | 2 ++
netwerk/protocol/http/nsHttpConnectionMgr.cpp | 1 +
netwerk/protocol/http/nsHttpDigestAuth.cpp | 1 +
netwerk/protocol/viewsource/nsViewSourceHandler.h | 4 ++++
.../protocol/websocket/BaseWebSocketChannel.cpp | 1 +
.../websocket/WebSocketEventListenerParent.cpp | 1 +
.../protocol/websocket/WebSocketEventService.cpp | 3 +++
netwerk/protocol/websocket/WebSocketFrame.cpp | 2 ++
netwerk/protocol/wyciwyg/nsWyciwygChannel.cpp | 1 +
.../protocol/wyciwyg/nsWyciwygProtocolHandler.cpp | 1 +
netwerk/streamconv/converters/mozTXTToHTMLConv.cpp | 1 +
.../streamconv/converters/nsFTPDirListingConv.cpp | 1 +
.../streamconv/converters/nsHTTPCompressConv.cpp | 2 ++
netwerk/streamconv/converters/nsHTTPCompressConv.h | 1 +
netwerk/streamconv/converters/nsIndexedToHTML.cpp | 1 +
netwerk/streamconv/converters/nsMultiMixedConv.cpp | 2 ++
netwerk/streamconv/converters/nsTXTToHTMLConv.cpp | 2 ++
netwerk/streamconv/converters/nsUnknownDecoder.cpp | 2 ++
75 files changed, 147 insertions(+), 32 deletions(-)
2016-01-08 20:20:50 -05:00
Dragana Damjanovic
9992ced19f
Bug 1238010 - Turn off ClosingService. r=mcmanus
2016-01-08 15:10:00 -05:00
Phil Ringnalda
542a3fabcb
Merge f-t to m-c, a=merge
2016-01-09 11:44:32 -08:00
Patrick McManus
8788ebb50d
Bug 1236968 - autodial telemetry r=mayhemer
2016-01-05 12:16:02 -05:00
Henry Chang
c69d84d994
Bug 1234739 - Disable test on all platforms other than linux. r=kchen
2015-12-23 23:42:00 +01:00
Chris Peterson
03f5630fd2
Bug 1235298 - Annotate intentional switch fallthroughs to suppress -Wimplicit-fallthrough warnings in netwerk/. r=mcmanus
2015-11-22 21:58:33 -08:00
Phil Ringnalda
4929b34577
Back out 194d7968bf59 (bug 1195881) for e10s failures in browser_sessionStoreContainer.js
2016-01-07 20:28:38 -08:00
Nicholas Nethercote
ec89bbf7f2
Bug 1237151 (part 3) - Remove ignored qualifiers in all remaining code. r=froydnj.
2016-01-05 17:08:45 -08:00
Carsten "Tomcat" Book
56c4726070
Merge mozilla-central to fx-team on a CLOSED TREE
2016-01-08 15:24:08 +01:00
Florian Quèze
ca0c29f531
Bug 1237648 - remove the defaultEngine implementation and forward the getter/setter to currentEngine, r=adw.
2016-01-08 11:27:49 +01:00
Shu-yu Guo
1768759efb
Bug 1220564 - Update chrome code uses of genexprs and legacy comprehensions. (r=billm)
2016-01-06 16:02:16 -08:00
Kyle Huey
4e63031bf8
Bug 1237371: Asynchronously shutdown the predictor IO thread. r=hurley
2016-01-06 13:18:29 -08:00
Mike Taylor
d72068aa11
Bug 1237091. Remove WAP telemetry probe. r=mcmanus
2016-01-06 12:15:41 -06:00
Ehsan Akhgari
5f8c37f202
Bug 1229369
- Part 2: Drop the aChannel argument to HttpChannelChild::ShouldInterceptURI()
2016-01-06 11:19:50 -05:00
Ehsan Akhgari
ddf76b50b9
Bug 1229369
- Intercept redirected network fetches that have their request mode set to manual; r=jdm
...
In the non-e10s case, this is done by simply avoiding to set the
LOAD_BYPASS_SERVICE_WORKER flag when we detect a non-internal redirect
in the manual redirect mode.
The e10s solution is a bit more complicated. Only the child process
knows whether a URI needs to be intercepted, so we piggy back on the
code written to support the |event.respondWith(Response.redirect())|
case where we know in the child that the target of the redirect needs to
be intercepted.
This means that we need to check the same condition as in the non-e10s
case, but we also need to check whether the target of the redirection
needs to be intercepted, which means we need to properly take secure
upgrades into account as well. This is done by computing both whether
we should intercept and whether we should do a secure upgrade in
HttpChannelChild::SetupRedirect() and saving the information on the
HttpChannelChild for later usage in HttpChannelChild::AsyncOpen().
2016-01-05 21:02:00 -05:00
Patrick McManus
061f13abb6
Bug 1121447 - trust cache less for error codes r=mayhemer
2015-12-22 16:06:07 -05:00
Patrick McManus
b28062758e
Bug 299031 - heuristic cache rule for 410 should be longer r=mayhemer
2015-12-22 14:58:44 -05:00
Ehsan Akhgari
40c82fa10c
Bug 1236686 - Remove nsIFetchEventDispatcher; r=jdm
2016-01-05 15:04:41 -05:00
Patrick McManus
74c91a9068
Bug 524232 - cache about: protocol handlers r=mayhemer
2015-12-17 10:39:41 -05:00
Nicholas Hurley
af06028314
Bug 1236170 - Make Http2Session::UncompressAndDiscard push-aware. r=mcmanus
...
--HG--
extra : commitid : 16EiVpkRWzq
extra : rebase_source : 6146a35424871e8de7cc989acb3479b35921a2a9
2016-01-04 12:17:39 -08:00
Ehsan Akhgari
9f447f6c4f
Bug 1214305 - Part 7: Decide in the child process whether an intercepted channel should go through a secure upgrade; r=mcmanus
...
This is OK from a security perspective, since this decision only affects
whether the channel will be intercepted with the secure URI in the child
process. If the intercepting service worker decides to fall back to an
actual network request, we send the request to the parent process with
the original pre-upgrade URI, and the parent process will still be in
charge of whether a network visible HTTP request should be upgraded.
2016-01-04 16:30:02 -05:00
Ehsan Akhgari
69ce1d24d9
Bug 1214305 - Part 6: Use a non-IPC redirect for synthesized upgraded responses to ensure the response URL is correctly propagated; r=mcmanus
2016-01-04 16:30:02 -05:00
Ehsan Akhgari
a48f3795ae
Bug 1214305 - Part 3: Add a nsIInterceptedChannel.secureUpgradedChannelURI helper; r=jdm
2016-01-04 16:30:02 -05:00
Ehsan Akhgari
9d105a6fd7
Bug 1214305 - Part 2: Refactor the logic for obtaining the secure upgraded URI into HttpBaseChannel; r=mcmanus
2016-01-04 16:30:02 -05:00
Ehsan Akhgari
377b919b76
Bug 1214305 - Part 1: Refactor the logic for querying whether a connection should go through a secure upgrade into NS_ShouldSecureUpgrade; r=mcmanus
2016-01-04 16:30:02 -05:00
Wes Kocher
dbbade6e75
Backed out 10 changesets (bug 1214305) for leaks on linux debug m-e10s(bc7)
...
Backed out changeset 1f482566235a (bug 1214305)
Backed out changeset 001b31489756 (bug 1214305)
Backed out changeset 4e94d2088219 (bug 1214305)
Backed out changeset fba4a5bcea41 (bug 1214305)
Backed out changeset 100f8e249007 (bug 1214305)
Backed out changeset a59c453192dc (bug 1214305)
Backed out changeset 2daa86fc1fb9 (bug 1214305)
Backed out changeset c04efb57b0ed (bug 1214305)
Backed out changeset 52046e843c60 (bug 1214305)
Backed out changeset ac4fd6615828 (bug 1214305)
--HG--
extra : commitid : ILmaVumvmvH
2016-01-04 10:34:24 -08:00
Ehsan Akhgari
96c8327a92
Bug 1214305 - Part 7: Decide in the child process whether an intercepted channel should go through a secure upgrade; r=mcmanus
...
This is OK from a security perspective, since this decision only affects
whether the channel will be intercepted with the secure URI in the child
process. If the intercepting service worker decides to fall back to an
actual network request, we send the request to the parent process with
the original pre-upgrade URI, and the parent process will still be in
charge of whether a network visible HTTP request should be upgraded.
2016-01-04 09:52:47 -05:00
Ehsan Akhgari
1927591d62
Bug 1214305 - Part 6: Use a non-IPC redirect for synthesized upgraded responses to ensure the response URL is correctly propagated; r=mcmanus
2016-01-04 09:52:45 -05:00
Ehsan Akhgari
17e63f2856
Bug 1214305 - Part 3: Add a nsIInterceptedChannel.secureUpgradedChannelURI helper; r=jdm
2016-01-04 09:52:40 -05:00
Ehsan Akhgari
478b7b9bc3
Bug 1214305 - Part 2: Refactor the logic for obtaining the secure upgraded URI into HttpBaseChannel; r=mcmanus
2016-01-04 09:52:39 -05:00
Ehsan Akhgari
3e8d2fe85d
Bug 1214305 - Part 1: Refactor the logic for querying whether a connection should go through a secure upgrade into NS_ShouldSecureUpgrade; r=mcmanus
2016-01-04 09:52:37 -05:00
Ehsan Akhgari
bbc181b4fe
Bug 1219469 - Part 2: Make HttpChannelParentListener be the controller; r=jdm,jduell
...
The controller needs to be able to handle redirects.
HttpChannelParentListener is a listener object that can attach to
multiple HttpChannelParent objects as part of a single logical Necko
channel (meaning that the listener object will be reused for redirected
channels) so it seems like the better choice for the object that should
implement nsINetworkInterceptController. This patch moves the
implementation of the nsINetworkInterceptController interface to
HttpChannelParentListener.
2016-01-04 09:39:12 -05:00
Ehsan Akhgari
77182bbd83
Bug 1219469 - Part 1: Revert the error reporting added in bug 1233845; r=jdm
2016-01-04 09:39:10 -05:00
Ehsan Akhgari
208f93e405
Bug 1233245 - Propagate the interception information in the non-e10s case for all HTTP redirects, not just the internal ones; r=jdm
...
Doing this work in StartRedirectChannelToURI() was causing us to not set
the bypass service worker flag properly in the case of real HTTP redirects.
This patch also fixes the incorrect test expectation value.
2016-01-04 09:39:09 -05:00
Kate McKinley
82579c5c6c
Bug 1195881 - Pass userContext through NeckoParent and TabChild. r=tanvi, r=sicking
2016-01-07 10:51:04 -08:00
Honza Bambas
5b430fab1f
Bug 996836 - Merge CLOSE and WRITE priority in cache2 I/O thread. r=michal
...
--HG--
extra : rebase_source : 2d16c6fb54061dfa87b338da22e019295e9c299f
2016-01-05 11:50:00 -05:00
Valentin Gosu
f86b01846d
Bug 1233610 - IDN service should return NS_ERROR_MALFORMED_URI instead of NS_ERROR_FAILURE r=mcmanus
...
--HG--
extra : rebase_source : ed7923a472a3da8c1dcc4161daf4836c8565629c
2016-01-07 14:31:22 +01:00
Jason Duell
b091fa291e
Bug 1199841 - Restructure private browsing to remember status after OnStopRequest r=jdm
2015-12-30 17:51:21 -05:00
Jeff Walden
5be7be38a1
Bug 1235615 - Split JS::CompartmentOptions into JS::CompartmentCreationOptions that are immutable characteristics of a compartment, and JS::CompartmentBehaviors that may be changed after the compartment's been created. r=terrence
...
--HG--
extra : rebase_source : f08c380ae247d3308d4c36788ac765de1b75af50
2015-12-28 16:15:52 -06:00
Mike Hommey
ce3914c897
Bug 1225384 - Change how the default resource "host names" are handled. r=michal
...
The meaning of resource:///, resource://app/ and resource://gre/ needs to
remain constant. Unfortunately, the model of the resource protocol handler
is that it is possible to set substitutions that change their meaning.
So, we forbid setting overwriting the substitutions for those three
special "host names".
Unfortunately, with e10s, the full list of substitutions is also sent to
the content process, which then sets substitutions, making it harder to
know in which cases SetSubstitution is valid for those three "host names"
or not.
So instead of trying to find the right heuristics, use the recently added
SubstitutingProtocolHandler::ResolveSpecialCases API to handle the three
"host names" instead of storing them as "normal" substitutions.
Still actively reject SetSubstitution with the three special "host names"
so as to find issues such as bug 1224000 instead of allowing the chrome
manifest entry and have it silently ignored.
Additionally, make GetSubstitution return the URIs for the three special
"host names" through GetSubstitutionInternal, replacing what was originally
added in bug 257162. Those changes from bug 257162 relied on the
resource:app string being handled by nsXREDirProvider::GetFile, but that was
removed in bug 620931, effectively making that code now in
GetSubstitutionInternal useless.
2015-12-28 06:49:05 +09:00