Closed Bug 309335 Opened 19 years ago Closed 19 years ago

Unknown content type dialog(helper app dialog) shows escaped file name if it has non-ASCII char

Categories

(Core :: Internationalization, defect, P1)

x86
All
defect

Tracking

()

VERIFIED FIXED
mozilla1.8beta5

People

(Reporter: masayuki, Assigned: darin.moz)

References

Details

(Keywords: intl, verified1.8, Whiteboard: [Mozilla Japan wants to fix on 1.8 branch])

Attachments

(5 files, 7 obsolete files)

7.09 KB, image/png
Details
10.59 KB, patch
Details | Diff | Splinter Review
11.52 KB, patch
Details | Diff | Splinter Review
32.18 KB, patch
bzbarsky
: review+
Details | Diff | Splinter Review
41.36 KB, patch
Details | Diff | Splinter Review
Unknown content type dialog shows escaped file name if it has non-ASCII char.
Attached patch Patch rv1.0 (obsolete) — Splinter Review
Maybe, this bug is happen on the os that file scheme isn't encoded by UTF-8.
I don't know this patch is correct.
result of nsIPlatformCharset::GetCharset and file scheme encoding is always
same?
Attachment #196803 - Flags: review?(jshin1987)
This bug is important for using non-ASCII charcters users.
Please block next release.
Status: NEW → ASSIGNED
Flags: blocking1.8b5?
Priority: -- → P1
Target Milestone: --- → mozilla1.8beta5
I can reproduce on Turbo Linux.
OS: Windows XP → All
Priority: P1 → --
Target Milestone: mozilla1.8beta5 → ---
Summary: Unknown content type dialog shows escaped file name if it has non-ASCII char → Unknown content type dialog(helper app dialog) shows escaped file name if it has non-ASCII char
This patch works fine on Linux too. But I cannot test on Mac.
Priority: -- → P1
Target Milestone: --- → mozilla1.8beta5
On Mac, we use UTF-8 encoding for file scheme's URL encode. That is same as
result of nsIPlatformCharset::GetCharset(kPlatformCharsetSel_FileName). The
patch may work fine on Mac too.
biesi, can you review this soon if jshin doesn't get it quickly?  Looks
relatively straightforward to me...
Flags: blocking1.8b5? → blocking1.8b5+
OK, so this conflicts with bug 278161.

Why not make the file protocol handler set the origin charset to whatever the
URL is really encoded in?
That would make the most sense... Does it not, right now?
Currently, nsIURI's |GetOriginCharset| returns always "UTF-8". Maybe, the
memeber is empty when it is file scheme.
Who's creating this URI?  The newURI method takes a charset param, so it sounds
like someone's just not passing it in...
Comment on attachment 196803 [details] [diff] [review]
Patch rv1.0

This is wrong.	It'd just wallpaper over one place where things show up wrong
instead of fixing the real issue.
Attachment #196803 - Flags: review?(jshin1987) → review-
Attached patch Patch rv2.0 (obsolete) — Splinter Review
Attachment #196803 - Attachment is obsolete: true
Attachment #197619 - Flags: superreview?(bzbarsky)
Attachment #197619 - Flags: review?(bzbarsky)
Comment on attachment 197619 [details] [diff] [review]
Patch rv2.0

That seems wrong to me... If I init a file:// URI with a UTF-8 filename string,
why would we use the platform charset here, exactly?

Also, I think this should be handled by the relevant protocol handler instead
of scattering random checks for "file" all over.  What about the other
file-based schemes, for example?
Attachment #197619 - Flags: superreview?(bzbarsky)
Attachment #197619 - Flags: superreview-
Attachment #197619 - Flags: review?(bzbarsky)
Attachment #197619 - Flags: review-
Should I insert the code in nsStandardURL::SetFile?
In this case, the spec is not encoded by UTF-8 on non-UTF-8 system(Win, Linux...).
Either in SetFile or in the callers of SetFile, depending on who the callers
are, etc.  At least as I understand this stuff.  You really want Darin's review
on changes to that neck of the woods, though....
The callers of SetFile cannot change the charset. Because the charset is read
only attribute on nsIURI. I think that we can only insert to
nsStandardFile::SetFile.

# I will create new patch tomorrow. Because now 07:20 AM in Japan...I will sleep.
nsStandardFile::SetFile -> nsStandardURL::SetFile
So, the origin charset value should always be taken from the charset of the
document where the file:// link was extracted.  If the user enters the file://
link manually in the URL bar, or if the file:// link comes in through the
command line then we have to guess the origin charset.  From the bug report, it
is not clear to me how the file:// URL entered the system.
One more thing though.  It is also true that file:// URLs are today always
encoded in the platform charset.  Eventually, we should move to UTF-8 for all
file:// URLs, but we shouldn't wait for that to happen.  It does seem reasonable
to me given the way nsStandardURL::SetFile works today that we might just modify
nsStandardURL::SetFile to set mOriginCharset to the platform charset since that
is  effectively what net_GetURLSpecFromFile does.
(In reply to comment #16)
> In this case, the spec is not encoded by UTF-8 on non-UTF-8 system(Win, Linux...).

(today's linux distributions usually do use UTF-8 for filenames)
right, this is mainly an issue on windows.  linux and osx mainly use UTF-8, so
it's not an issue there.
> (today's linux distributions usually do use UTF-8 for filenames)

In Japan, not so. VineLinux and TurboLinux are using EUC-JP. These distributions
are used in Japan.
> From the bug report, it
> is not clear to me how the file:// URL entered the system.

I can reproduced when the file is dropped to Firefox/Suite and the dettached
files are opened by Thunderbird.
Attached patch Patch rv3.0 (obsolete) — Splinter Review
I cannot fix by this patch. We may not use nsFileProtocolHandler::NewFileURI...
Making a change like this to nsStandardURL this late in the release cycle scares
me greatly. 

masayuki, can you confirm if this is a regression over 1.0 behavior or did we
ship with this in 1.0?
This is not a regression.

Cannot we check-in the first patch to only 1.8 branch? I think that the first
patch has low risk.
No, the first patch is not acceptable to me as module owner, not on trunk nor
even more so not on branches.
I think this problem is serious on thunderbird only. Because we support
detaching the attachment in the mail. This problem is reproduced only detached
file has intl name, not reproduced the file is not detached.
Do you have any idea for simple fix?
Maybe, the 'detach' function makes a little confuse the users in non-ASCII area.

This is not a regression for Tb.
But this problem is reproduced only with Tb 1.5. Because we don't have 'detach'
in Tb1.0.
Attached patch Patch rv4.0 (obsolete) — Splinter Review
Attachment #197619 - Attachment is obsolete: true
Attachment #197728 - Attachment is obsolete: true
Attachment #197766 - Flags: review?(darin)
why are both changes required?
Comment on attachment 197766 [details] [diff] [review]
Patch rv4.0

>Index: netwerk/base/src/nsStandardURL.cpp
...
>     rv = net_GetURLSpecFromFile(file, url);
>     if (NS_FAILED(rv)) return rv;
> 
>+    // We should always override the charset until bug 278161 is fixed.
>+    mOriginCharset.Truncate();
>+    nsCOMPtr <nsIPlatformCharset> platformCharset =
>+        do_GetService(NS_PLATFORMCHARSET_CONTRACTID, &rv);
>+    if (NS_SUCCEEDED(rv)) {
>+        rv = platformCharset->GetCharset(kPlatformCharsetSel_FileName,
>+                                         mOriginCharset);
>+        if (NS_FAILED(rv) || (mOriginCharset.Length() > 3 &&
>+                              IsUTFCharset(mOriginCharset.get()))) {
>+            mOriginCharset.Truncate();
>+        }
>+    }
>+
>     rv = SetSpec(url);
> 
>     // must clone |file| since its value is not guaranteed to remain constant
>     if (NS_SUCCEEDED(rv)) {

I think it would be better to call Init, so that you do not need
to duplicate the mOriginCharset normalization for UTF-8 values.

For the defaultPort and urlType parameters, just pass mDefaultPort
and mURLType.  Pass nsnull as the baseURI parameter.


>Index: netwerk/protocol/file/src/nsFileProtocolHandler.cpp
...
>@@ -264,21 +265,32 @@ nsFileProtocolHandler::NewURI(const nsAC
...
>+    nsCAutoString urlCharset(charset);
>+    if (urlCharset.IsEmpty()) {
>+        // We should set file system charset until bug 278161 is fixed.
>+        nsresult rv;
>+        nsCOMPtr <nsIPlatformCharset> platformCharset =
>+            do_GetService(NS_PLATFORMCHARSET_CONTRACTID, &rv);
>+        if (NS_SUCCEEDED(rv)) {
>+            rv = platformCharset->GetCharset(kPlatformCharsetSel_FileName,
>+                                             urlCharset);
>+            if (NS_FAILED(rv))
>+                urlCharset.Truncate();
>+        }
>+    }
> 
>     nsresult rv = url->Init(nsIStandardURL::URLTYPE_NO_AUTHORITY, -1,
>-                            *specPtr, charset, baseURI);
>+                            *specPtr, urlCharset.get(), baseURI);

I think we always want to override the origin charset here since
an unescaped file:// URL should always be in the platform charset.
So, checking if |charset| is empty seems wrong to me.

Here's a trick that you can use here to avoid copying charset
into urlCharset needlessly:

    nsCAutoString buf;
    // We should set file system charset until bug 278161 is fixed.
    nsCOMPtr <nsIPlatformCharset> platformCharset =
	    do_GetService(NS_PLATFORMCHARSET_CONTRACTID);
    if (platformCharset) {
	platformCharset->GetCharset(kPlatformCharsetSel_FileName, buf);
	if (!buf.IsEmpty())
	    charset = buf.get();
    }

    nsresult rv = url->Init(nsIStandardURL::URLTYPE_NO_AUTHORITY, -1,
			    *specPtr, charset, baseURI);


> nsFileProtocolHandler::NewFileURI(nsIFile *file, nsIURI **result)
...
>-    // XXX shouldn't we set nsIURI::originCharset ??
>-
>     rv = url->SetFile(file);
>     if (NS_FAILED(rv)) return rv;
> 
>     return CallQueryInterface(url, result);
> }

I think you should change this XXX comment to a NOTE indicating
that the origin charset is assigned the value of the platform
charset by the SetFile method.
Attachment #197766 - Flags: review?(darin) → review-
Attached patch Patch rv4.1 (obsolete) — Splinter Review
Attachment #197766 - Attachment is obsolete: true
Attachment #197862 - Flags: review?(darin)
Whiteboard: Mozilla Japan wants to fix on 1.8 branch
I'm afraid of touching the file protocol handler this late in the game... darin,
what do you think about the branch-worthiness of this not causing any regressions?
Comment on attachment 197862 [details] [diff] [review]
Patch rv4.1

r+sr=darin
Attachment #197862 - Flags: superreview+
Attachment #197862 - Flags: review?(darin)
Attachment #197862 - Flags: review+
Attachment #197862 - Flags: approval1.8b5?
Darin, I'm nervous about changing nsStandardURL this late, even though I really
want this fix for Thunderbird. Can you comment on your confidence / risk level
for the patch? 

Masayuki, please get this landed on the trunk ASAP.
Let me encourage you to take this patch.  I think it is pretty safe.  The
changes only apply to file:// URLs, and then only to file:// URLs containing
escape sequences, which is nearly exclusive to non-english operating systems. 
Moreover, it is in very few codepaths that we actually care about the
originCharset property.
Attachment #197862 - Flags: approval1.8b5? → approval1.8b5+
checked-in to trunk and 1.8branch.
Thank you everyone.
Status: ASSIGNED → RESOLVED
Closed: 19 years ago
Keywords: fixed1.8
Resolution: --- → FIXED
This checkin seems to have caused the orange on the brad tinderbox.  I'm also
seeing a startup crash on my linux fc4 box, which goes away if I back out this
patch.  The crash doesn't happen if the build is started under the debugger,
which makes tracking down the cause a bit trickier.
tor:

Is the crash occured with only suite? Firefox doesn't happen?
My build is seamonkey.  Haven't built firefox up on this tree yet.

Can you attach your build options?
mk_add_options MOZ_CO_PROJECT=suite,browser
ac_add_options --enable-application=suite
ac_add_options --disable-tests
ac_add_options --disable-mailnews
ac_add_options --disable-ldap
ac_add_options --disable-composer
ac_add_options --disable-mathml
ac_add_options --disable-accessibility
ac_add_options --disable-installer
ac_add_options --disable-xpinstall
ac_add_options --enable-svg
ac_add_options --enable-canvas
Built firefox and see the crash there as well, again fixed by backing out this
patch.  Configuration for my firefox build (optimized, no debug):

mk_add_options MOZ_CO_PROJECT=browser
ac_add_options --enable-application=browser
ac_add_options --disable-tests
ac_add_options --enable-svg
ac_add_options --enable-canvas
Curiously, looking at the coredumps and valgrind output, it's dying inside
unrelated code in nsFrame.

(gdb) where
#0  0x40000402 in __kernel_vsyscall ()
#1  0x00b9c28a in raise () from /lib/libpthread.so.0
#2  0x08055e96 in nsProfileLock::FatalSignalHandler ()
#3  <signal handler called>
#4  0x409e50c9 in nsFrame::BoxReflow ()
   from /home/mozilla/trunk/opt-ff/dist/bin/components/libgklayout.so
#5  0x409e54fb in nsFrame::DoLayout ()
   from /home/mozilla/trunk/opt-ff/dist/bin/components/libgklayout.so
#6  0x40ac4c92 in nsIFrame::Layout ()
   from /home/mozilla/trunk/opt-ff/dist/bin/components/libgklayout.so
#7  0x40ac60a9 in nsBoxFrame::LayoutChildAt ()
   from /home/mozilla/trunk/opt-ff/dist/bin/components/libgklayout.so
#8  0x409f1123 in nsGfxScrollFrameInner::LayoutScrollbars ()
   from /home/mozilla/trunk/opt-ff/dist/bin/components/libgklayout.so
#9  0x409f1cf4 in nsHTMLScrollFrame::Reflow ()
   from /home/mozilla/trunk/opt-ff/dist/bin/components/libgklayout.so
#10 0x409df57b in nsContainerFrame::ReflowChild ()
   from /home/mozilla/trunk/opt-ff/dist/bin/components/libgklayout.so
#11 0x40a297af in ViewportFrame::Reflow ()
   from /home/mozilla/trunk/opt-ff/dist/bin/components/libgklayout.so
#12 0x409c2eb5 in PresShell::InitialReflow ()
   from /home/mozilla/trunk/opt-ff/dist/bin/components/libgklayout.so
#13 0x40afea17 in nsContentSink::StartLayout ()
   from /home/mozilla/trunk/opt-ff/dist/bin/components/libgklayout.so
#14 0x40bb42a0 in HTMLContentSink::StartLayout ()
   from /home/mozilla/trunk/opt-ff/dist/bin/components/libgklayout.so
#15 0x40bb7a08 in HTMLContentSink::OpenBody ()
   from /home/mozilla/trunk/opt-ff/dist/bin/components/libgklayout.so
...
Umm... I cannot reproduce with config of comment 45 on TurboLinux.

tor:

Can you reproduce after dist clean? And can you repduce on 1.8 branch?
My trunk firefox build was clean, as I don't normally build that product.  A
clean build of firefox on the branch also shows the startup crash, which again
goes away if I back out this patch.
Always crashed in nsFrame::BoxReflow?

I think this patch doesn't have a crash bug. Because other tinderbox are green.
If we back out this patch, we will not show the crash. But is it correct? We(MJ)
don't want to back out this patch. Because this bug is important for our
marketing. Isn't there another way?
Always seems to be in nsFrame::Reflow.  I'd suggest trying backing it out on
trunk to see if brad goes green.

There have a few other bugzilla reports today of firefox failing to start - bug
310686, bug 310688, and bug 310703.
O.K. I backed out the patch from trunk only.
Status: RESOLVED → REOPENED
Resolution: FIXED → ---
backed out from 1.8branch too.
Keywords: fixed1.8
Why this patch is caused to crash on some systems?
Keywords: helpwanted
I can reproduce on Linux after comment out nsFileProtocolHandler::NewURI's
changing. I'm checking the code.
Maybe, I think that file protocol is used by platformCharset initializing on Linux.
Yeah, nsPlatformCharset::InitGetCharset in nsUNIXCharset.cpp tries to read a
properties file, which means creating a file:// URI.

Perhaps we should do this charset thing only if the filename is non-ascii?  I
think that would solve the problem...
> Perhaps we should do this charset thing only if the filename is non-ascii?

Yes, it's simple approach. But I don't link this approach. Because the codes are
required two or more cpp files. I want to use it for final approach. I'm trying
on another approach that is using global variable.

Thank you.
Mac's yesterday crash may be caused by this bug.
nsMacCharset.cpp is using file protocol too.
Attached patch Patch rv5.0 (obsolete) — Splinter Review
I'm testing this patch.
Attachment #197862 - Attachment is obsolete: true
Status: REOPENED → ASSIGNED
Keywords: helpwanted
Comment on attachment 198230 [details] [diff] [review]
Patch rv5.0

This patch works fine on my linux environment. And on windows too.
Attachment #198230 - Flags: superreview?(darin)
Attachment #198230 - Flags: review?(darin)
Comment on attachment 197862 [details] [diff] [review]
Patch rv4.1

clearing approval request since this patch had some problems and is now
obsolete.
Attachment #197862 - Flags: approval1.8b5+
Someone:

Could you test the patch on your Linux or Mac system?
Also on Windows too.
Comment on attachment 198230 [details] [diff] [review]
Patch rv5.0

This has same problem on Linux.
Attachment #198230 - Flags: superreview?(darin)
Attachment #198230 - Flags: review?(darin)
Attachment #198230 - Flags: review-
Attached patch Patch rv5.1 (obsolete) — Splinter Review
Attachment #198230 - Attachment is obsolete: true
(In reply to comment #57)
> Perhaps we should do this charset thing only if the filename is non-ascii?  I
> think that would solve the problem...

That also requires checking if any escaped characters are present, does it not?
Yes, we need to check it.
Attachment #198321 - Attachment description: Patch 5.1 → Patch rv5.1
If we don't have a fully reviewed patch approved and landed by midnight tonight
(PDT) this isn't going to make 1.5
Flags: blocking1.8b5+ → blocking1.8b5-
Whiteboard: Mozilla Japan wants to fix on 1.8 branch → [Patch rv5.1 testing in Japan][Mozilla Japan wants to fix on 1.8 branch]
Comment on attachment 198321 [details] [diff] [review]
Patch rv5.1

A Japanese tester said this patch doesn't crash on Linux when starting and
opening the file that having non-ASCII char.
Attachment #198321 - Flags: superreview?(darin)
Attachment #198321 - Flags: review?(darin)
Whiteboard: [Patch rv5.1 testing in Japan][Mozilla Japan wants to fix on 1.8 branch] → [Mozilla Japan wants to fix on 1.8 branch]
Comment on attachment 198321 [details] [diff] [review]
Patch rv5.1

>Index: netwerk/base/src/nsStandardURL.cpp

>+nsCString nsStandardURL::gFileProtocolCharset;

Global (or class static) nsCString is not permitted.  It may not work
properly on some systems.


>+const char* nsStandardURL::kFileProtocolCharset = "MOZ_FPC";

What is this?  I think you need to document this.


>+        nsCAutoString fpCharset;
>+        platformCharset->GetCharset(kPlatformCharsetSel_FileName, fpCharset);
>+        gFileProtocolCharset = fpCharset;

Since gFileProtocolCharset is of type nsCString, you could have just used
it directly, like this:

	  platformCharset->GetCharset(kPlatformCharsetSel_FileName,
				      gFileProtocolCharset);


>+    else if (mOriginCharset.Equals(kFileProtocolCharset)) {
>+        if (gFileProtocolCharset.IsEmpty() &&
>+            (!IsASCII(spec) ||
>+             nsPromiseFlatCString(spec).FindChar('%', 0) != kNotFound)) {

This needs to be properly documented.  I'm also not very happy with
this approach, but I can't think of a good alternative.


>Index: netwerk/protocol/file/src/nsFileProtocolHandler.cpp

>     nsresult rv = url->Init(nsIStandardURL::URLTYPE_NO_AUTHORITY, -1,
>+                            *specPtr, nsStandardURL::kFileProtocolCharset,
>+                            baseURI);

Ah, I see... this kFileProtocolCharset thing really needs to be better
documented.


I wonder if there isn't a better way to work around the initialization
"chicken and the egg" problem.	We could perhaps solve it by pushing the
normalization of "MOZ_FPC" into GetOriginCharset.  Hmm...
Attachment #198321 - Flags: superreview?(darin)
Attachment #198321 - Flags: superreview-
Attachment #198321 - Flags: review?(darin)
Attachment #198321 - Flags: review-
(In reply to comment #71)
> We could perhaps solve it by pushing the
> normalization of "MOZ_FPC" into GetOriginCharset.  Hmm...
> 

We need mOriginCharset for BuildNormalizedSpec. Not only for GetOriginCharset.
Attached patch Patch rv5.2Splinter Review
Attachment #198321 - Attachment is obsolete: true
Attachment #198473 - Flags: superreview?(darin)
Attachment #198473 - Flags: review?(darin)
Another solution to this bug would be to make the nsIPlatformCharset
implementations not depend on being able to load URLs.  They could just use the
directory service and nsIFile to load the properties files.

I know we don't have a lot of time for this release, but the current patch
(rv5.2) is really hacky.  I wish we could do something better like fix
nsIPlatformCharset.
Yes, we don't have much time. But this is very serious bug for Thunderbird
marketing in Japan. We need to fix this...
OK, nevermind hacking the platform charset implementation.  That seems beyond
the scope of this bug.  I still wish we could do something less hacky here.
Should I recreate smaller patch?
I have no idea for smaller and more safety patch...
maybe something like this? this isn't finished yet, but it works on windows
already. if people are interested I can finish the patch.
biesi: Yeah, that is exactly the kind of patch I was thinking of!  it would make
it possible to use Masayuki's v4.1 patch.  Do you think you can finish that patch?
Attached patch v6 patchSplinter Review
OK.  This patch includes a complete implementation of nsGREResProperties.  It
also has Masayuki's v4.1 patch.
Attachment #198518 - Flags: review?(bzbarsky)
Comment on attachment 198518 [details] [diff] [review]
v6 patch

>Index: intl/uconv/src/Makefile.in
> 		nsURLProperties.cpp \

Remove that line, since you're removing those files?

And remove the references (unused?) to nsURLProperties from
nsWinUConvService.cpp

r=bzbarsky with that.
Attachment #198518 - Flags: review?(bzbarsky) → review+
I asked dougt about nsWinUConvService, and this is what he had to say:

> [15:36] darinf19: yt?
> [15:37] darinf19: you know about nsWinUConvService.cpp, right?
> [15:37] darinf19: it seems like there are no makefile rules to build it, and 
> it looks like it wouldn't compile/link if there were.  is this something that 
> can or should be cvs removed?
> [16:12] *** "darinf19" signed off at Tue Oct 04 16:12:51 2005.
> 
> Yeah, it was Alec's attempt at making a native uconv.  I looked at using it, >
but decided to do my own for WinCE.  I do not think that the one I wrote can >
be used as a general purpose Win32 converter as mine makes the assumption 
> that the backend is always Unicode (which is only true for WinCE).
> 
> I think we can cvs remove nsWinUConvService. 
Attachment #198473 - Flags: superreview?(darin)
Attachment #198473 - Flags: review?(darin)
Flags: blocking1.8rc1+
Comment on attachment 198518 [details] [diff] [review]
v6 patch

We decided to keep this patch out of 1.5 beta 2 with agreement that this would
go in for 1.5 rc1.  Please approve :)
Attachment #198518 - Flags: approval1.8rc1?
reassigning to me so I can more easily keep track of getting this checked in.
Assignee: masayuki → darin
Status: ASSIGNED → NEW
Can we get this landed on the trukn and verified as working there and causing no
regressions?
(In reply to comment #85)
> Can we get this landed on the trukn and verified as working there and causing no
> regressions?

Working on that now.
fixed-on-trunk
Status: NEW → RESOLVED
Closed: 19 years ago19 years ago
Resolution: --- → FIXED
This is the version of the patch that I landed on the trunk.
Attachment #199468 - Flags: approval1.8rc1?
Attachment #198518 - Flags: approval1.8rc1?
Masayuki, can you verify that this is fixed on the trunk and look for any
possible regressions related to this change?
This has a regression. This patch breakes nsMsgCompose::AttachmentPrettyName.
However, this regression may be fixed by bug 274264(current patch).
Bug 274264 should block rc release.

I cannot find other regression(s) on Firefox and Thunderbird.
I verified the regression is fixed by current patch of bug 274264.
Let's fix this and bug 274264!

-> v.
Status: RESOLVED → VERIFIED
Attachment #199468 - Flags: approval1.8rc1? → approval1.8rc1+
Bug 274264 is fixed on 1.8 branch. We don't have regression by this patch.

Drain:
Please check in to Branch!
fixed1.8
Keywords: fixed1.8
I confirmed this is fixed on 1.8 branch. Thank you!
Keywords: fixed1.8verified1.8
You need to log in before you can comment on or make changes to this bug.

Attachment

General

Created:
Updated:
Size: