Closed
Bug 309335
Opened 19 years ago
Closed 19 years ago
Unknown content type dialog(helper app dialog) shows escaped file name if it has non-ASCII char
Categories
(Core :: Internationalization, defect, P1)
Tracking
()
VERIFIED
FIXED
mozilla1.8beta5
People
(Reporter: masayuki, Assigned: darin.moz)
References
Details
(Keywords: intl, verified1.8, Whiteboard: [Mozilla Japan wants to fix on 1.8 branch])
Attachments
(5 files, 7 obsolete files)
7.09 KB,
image/png
|
Details | |
10.59 KB,
patch
|
Details | Diff | Splinter Review | |
11.52 KB,
patch
|
Details | Diff | Splinter Review | |
32.18 KB,
patch
|
bzbarsky
:
review+
|
Details | Diff | Splinter Review |
41.36 KB,
patch
|
asa
:
approval1.8rc1+
|
Details | Diff | Splinter Review |
Unknown content type dialog shows escaped file name if it has non-ASCII char.
Reporter | ||
Comment 1•19 years ago
|
||
Reporter | ||
Comment 2•19 years ago
|
||
Maybe, this bug is happen on the os that file scheme isn't encoded by UTF-8. I don't know this patch is correct. result of nsIPlatformCharset::GetCharset and file scheme encoding is always same?
Attachment #196803 -
Flags: review?(jshin1987)
Reporter | ||
Comment 3•19 years ago
|
||
This bug is important for using non-ASCII charcters users. Please block next release.
Status: NEW → ASSIGNED
Flags: blocking1.8b5?
Priority: -- → P1
Target Milestone: --- → mozilla1.8beta5
Reporter | ||
Comment 4•19 years ago
|
||
I can reproduce on Turbo Linux.
OS: Windows XP → All
Priority: P1 → --
Target Milestone: mozilla1.8beta5 → ---
Reporter | ||
Updated•19 years ago
|
Summary: Unknown content type dialog shows escaped file name if it has non-ASCII char → Unknown content type dialog(helper app dialog) shows escaped file name if it has non-ASCII char
Reporter | ||
Comment 5•19 years ago
|
||
This patch works fine on Linux too. But I cannot test on Mac.
Reporter | ||
Updated•19 years ago
|
Priority: -- → P1
Target Milestone: --- → mozilla1.8beta5
Reporter | ||
Comment 6•19 years ago
|
||
On Mac, we use UTF-8 encoding for file scheme's URL encode. That is same as result of nsIPlatformCharset::GetCharset(kPlatformCharsetSel_FileName). The patch may work fine on Mac too.
Comment 7•19 years ago
|
||
biesi, can you review this soon if jshin doesn't get it quickly? Looks relatively straightforward to me...
Flags: blocking1.8b5? → blocking1.8b5+
Comment 8•19 years ago
|
||
OK, so this conflicts with bug 278161. Why not make the file protocol handler set the origin charset to whatever the URL is really encoded in?
Comment 9•19 years ago
|
||
That would make the most sense... Does it not, right now?
Reporter | ||
Comment 10•19 years ago
|
||
Currently, nsIURI's |GetOriginCharset| returns always "UTF-8". Maybe, the memeber is empty when it is file scheme.
Comment 11•19 years ago
|
||
Who's creating this URI? The newURI method takes a charset param, so it sounds like someone's just not passing it in...
Comment 12•19 years ago
|
||
If nothing else, note http://lxr.mozilla.org/seamonkey/source/netwerk/protocol/file/src/nsFileProtocolHandler.cpp#336 -- does fixing that help?
Comment 13•19 years ago
|
||
Comment on attachment 196803 [details] [diff] [review] Patch rv1.0 This is wrong. It'd just wallpaper over one place where things show up wrong instead of fixing the real issue.
Attachment #196803 -
Flags: review?(jshin1987) → review-
Reporter | ||
Comment 14•19 years ago
|
||
Attachment #196803 -
Attachment is obsolete: true
Attachment #197619 -
Flags: superreview?(bzbarsky)
Attachment #197619 -
Flags: review?(bzbarsky)
Comment 15•19 years ago
|
||
Comment on attachment 197619 [details] [diff] [review] Patch rv2.0 That seems wrong to me... If I init a file:// URI with a UTF-8 filename string, why would we use the platform charset here, exactly? Also, I think this should be handled by the relevant protocol handler instead of scattering random checks for "file" all over. What about the other file-based schemes, for example?
Attachment #197619 -
Flags: superreview?(bzbarsky)
Attachment #197619 -
Flags: superreview-
Attachment #197619 -
Flags: review?(bzbarsky)
Attachment #197619 -
Flags: review-
Reporter | ||
Comment 16•19 years ago
|
||
Should I insert the code in nsStandardURL::SetFile? In this case, the spec is not encoded by UTF-8 on non-UTF-8 system(Win, Linux...).
Comment 17•19 years ago
|
||
Either in SetFile or in the callers of SetFile, depending on who the callers are, etc. At least as I understand this stuff. You really want Darin's review on changes to that neck of the woods, though....
Reporter | ||
Comment 18•19 years ago
|
||
The callers of SetFile cannot change the charset. Because the charset is read only attribute on nsIURI. I think that we can only insert to nsStandardFile::SetFile. # I will create new patch tomorrow. Because now 07:20 AM in Japan...I will sleep.
Reporter | ||
Comment 19•19 years ago
|
||
nsStandardFile::SetFile -> nsStandardURL::SetFile
Assignee | ||
Comment 20•19 years ago
|
||
So, the origin charset value should always be taken from the charset of the document where the file:// link was extracted. If the user enters the file:// link manually in the URL bar, or if the file:// link comes in through the command line then we have to guess the origin charset. From the bug report, it is not clear to me how the file:// URL entered the system.
Assignee | ||
Comment 21•19 years ago
|
||
One more thing though. It is also true that file:// URLs are today always encoded in the platform charset. Eventually, we should move to UTF-8 for all file:// URLs, but we shouldn't wait for that to happen. It does seem reasonable to me given the way nsStandardURL::SetFile works today that we might just modify nsStandardURL::SetFile to set mOriginCharset to the platform charset since that is effectively what net_GetURLSpecFromFile does.
Comment 22•19 years ago
|
||
(In reply to comment #16) > In this case, the spec is not encoded by UTF-8 on non-UTF-8 system(Win, Linux...). (today's linux distributions usually do use UTF-8 for filenames)
Assignee | ||
Comment 23•19 years ago
|
||
right, this is mainly an issue on windows. linux and osx mainly use UTF-8, so it's not an issue there.
Reporter | ||
Comment 24•19 years ago
|
||
> (today's linux distributions usually do use UTF-8 for filenames)
In Japan, not so. VineLinux and TurboLinux are using EUC-JP. These distributions
are used in Japan.
Reporter | ||
Comment 25•19 years ago
|
||
> From the bug report, it
> is not clear to me how the file:// URL entered the system.
I can reproduced when the file is dropped to Firefox/Suite and the dettached
files are opened by Thunderbird.
Reporter | ||
Comment 26•19 years ago
|
||
I cannot fix by this patch. We may not use nsFileProtocolHandler::NewFileURI...
Comment 27•19 years ago
|
||
Making a change like this to nsStandardURL this late in the release cycle scares me greatly. masayuki, can you confirm if this is a regression over 1.0 behavior or did we ship with this in 1.0?
Reporter | ||
Comment 28•19 years ago
|
||
This is not a regression. Cannot we check-in the first patch to only 1.8 branch? I think that the first patch has low risk.
Comment 29•19 years ago
|
||
No, the first patch is not acceptable to me as module owner, not on trunk nor even more so not on branches.
Reporter | ||
Comment 30•19 years ago
|
||
I think this problem is serious on thunderbird only. Because we support detaching the attachment in the mail. This problem is reproduced only detached file has intl name, not reproduced the file is not detached.
Reporter | ||
Comment 31•19 years ago
|
||
Do you have any idea for simple fix? Maybe, the 'detach' function makes a little confuse the users in non-ASCII area. This is not a regression for Tb. But this problem is reproduced only with Tb 1.5. Because we don't have 'detach' in Tb1.0.
Reporter | ||
Comment 32•19 years ago
|
||
Attachment #197619 -
Attachment is obsolete: true
Attachment #197728 -
Attachment is obsolete: true
Attachment #197766 -
Flags: review?(darin)
Comment 33•19 years ago
|
||
why are both changes required?
Assignee | ||
Comment 34•19 years ago
|
||
Comment on attachment 197766 [details] [diff] [review] Patch rv4.0 >Index: netwerk/base/src/nsStandardURL.cpp ... > rv = net_GetURLSpecFromFile(file, url); > if (NS_FAILED(rv)) return rv; > >+ // We should always override the charset until bug 278161 is fixed. >+ mOriginCharset.Truncate(); >+ nsCOMPtr <nsIPlatformCharset> platformCharset = >+ do_GetService(NS_PLATFORMCHARSET_CONTRACTID, &rv); >+ if (NS_SUCCEEDED(rv)) { >+ rv = platformCharset->GetCharset(kPlatformCharsetSel_FileName, >+ mOriginCharset); >+ if (NS_FAILED(rv) || (mOriginCharset.Length() > 3 && >+ IsUTFCharset(mOriginCharset.get()))) { >+ mOriginCharset.Truncate(); >+ } >+ } >+ > rv = SetSpec(url); > > // must clone |file| since its value is not guaranteed to remain constant > if (NS_SUCCEEDED(rv)) { I think it would be better to call Init, so that you do not need to duplicate the mOriginCharset normalization for UTF-8 values. For the defaultPort and urlType parameters, just pass mDefaultPort and mURLType. Pass nsnull as the baseURI parameter. >Index: netwerk/protocol/file/src/nsFileProtocolHandler.cpp ... >@@ -264,21 +265,32 @@ nsFileProtocolHandler::NewURI(const nsAC ... >+ nsCAutoString urlCharset(charset); >+ if (urlCharset.IsEmpty()) { >+ // We should set file system charset until bug 278161 is fixed. >+ nsresult rv; >+ nsCOMPtr <nsIPlatformCharset> platformCharset = >+ do_GetService(NS_PLATFORMCHARSET_CONTRACTID, &rv); >+ if (NS_SUCCEEDED(rv)) { >+ rv = platformCharset->GetCharset(kPlatformCharsetSel_FileName, >+ urlCharset); >+ if (NS_FAILED(rv)) >+ urlCharset.Truncate(); >+ } >+ } > > nsresult rv = url->Init(nsIStandardURL::URLTYPE_NO_AUTHORITY, -1, >- *specPtr, charset, baseURI); >+ *specPtr, urlCharset.get(), baseURI); I think we always want to override the origin charset here since an unescaped file:// URL should always be in the platform charset. So, checking if |charset| is empty seems wrong to me. Here's a trick that you can use here to avoid copying charset into urlCharset needlessly: nsCAutoString buf; // We should set file system charset until bug 278161 is fixed. nsCOMPtr <nsIPlatformCharset> platformCharset = do_GetService(NS_PLATFORMCHARSET_CONTRACTID); if (platformCharset) { platformCharset->GetCharset(kPlatformCharsetSel_FileName, buf); if (!buf.IsEmpty()) charset = buf.get(); } nsresult rv = url->Init(nsIStandardURL::URLTYPE_NO_AUTHORITY, -1, *specPtr, charset, baseURI); > nsFileProtocolHandler::NewFileURI(nsIFile *file, nsIURI **result) ... >- // XXX shouldn't we set nsIURI::originCharset ?? >- > rv = url->SetFile(file); > if (NS_FAILED(rv)) return rv; > > return CallQueryInterface(url, result); > } I think you should change this XXX comment to a NOTE indicating that the origin charset is assigned the value of the platform charset by the SetFile method.
Attachment #197766 -
Flags: review?(darin) → review-
Reporter | ||
Comment 35•19 years ago
|
||
Attachment #197766 -
Attachment is obsolete: true
Attachment #197862 -
Flags: review?(darin)
Reporter | ||
Updated•19 years ago
|
Whiteboard: Mozilla Japan wants to fix on 1.8 branch
Comment 36•19 years ago
|
||
I'm afraid of touching the file protocol handler this late in the game... darin, what do you think about the branch-worthiness of this not causing any regressions?
Assignee | ||
Comment 37•19 years ago
|
||
Comment on attachment 197862 [details] [diff] [review] Patch rv4.1 r+sr=darin
Attachment #197862 -
Flags: superreview+
Attachment #197862 -
Flags: review?(darin)
Attachment #197862 -
Flags: review+
Updated•19 years ago
|
Attachment #197862 -
Flags: approval1.8b5?
Comment 38•19 years ago
|
||
Darin, I'm nervous about changing nsStandardURL this late, even though I really want this fix for Thunderbird. Can you comment on your confidence / risk level for the patch? Masayuki, please get this landed on the trunk ASAP.
Assignee | ||
Comment 39•19 years ago
|
||
Let me encourage you to take this patch. I think it is pretty safe. The changes only apply to file:// URLs, and then only to file:// URLs containing escape sequences, which is nearly exclusive to non-english operating systems. Moreover, it is in very few codepaths that we actually care about the originCharset property.
Updated•19 years ago
|
Attachment #197862 -
Flags: approval1.8b5? → approval1.8b5+
Reporter | ||
Comment 40•19 years ago
|
||
checked-in to trunk and 1.8branch. Thank you everyone.
Comment 41•19 years ago
|
||
This checkin seems to have caused the orange on the brad tinderbox. I'm also seeing a startup crash on my linux fc4 box, which goes away if I back out this patch. The crash doesn't happen if the build is started under the debugger, which makes tracking down the cause a bit trickier.
Reporter | ||
Comment 42•19 years ago
|
||
tor: Is the crash occured with only suite? Firefox doesn't happen?
Comment 43•19 years ago
|
||
My build is seamonkey. Haven't built firefox up on this tree yet.
Reporter | ||
Comment 44•19 years ago
|
||
Can you attach your build options?
Comment 45•19 years ago
|
||
mk_add_options MOZ_CO_PROJECT=suite,browser ac_add_options --enable-application=suite ac_add_options --disable-tests ac_add_options --disable-mailnews ac_add_options --disable-ldap ac_add_options --disable-composer ac_add_options --disable-mathml ac_add_options --disable-accessibility ac_add_options --disable-installer ac_add_options --disable-xpinstall ac_add_options --enable-svg ac_add_options --enable-canvas
Comment 46•19 years ago
|
||
Built firefox and see the crash there as well, again fixed by backing out this patch. Configuration for my firefox build (optimized, no debug): mk_add_options MOZ_CO_PROJECT=browser ac_add_options --enable-application=browser ac_add_options --disable-tests ac_add_options --enable-svg ac_add_options --enable-canvas
Comment 47•19 years ago
|
||
Curiously, looking at the coredumps and valgrind output, it's dying inside unrelated code in nsFrame. (gdb) where #0 0x40000402 in __kernel_vsyscall () #1 0x00b9c28a in raise () from /lib/libpthread.so.0 #2 0x08055e96 in nsProfileLock::FatalSignalHandler () #3 <signal handler called> #4 0x409e50c9 in nsFrame::BoxReflow () from /home/mozilla/trunk/opt-ff/dist/bin/components/libgklayout.so #5 0x409e54fb in nsFrame::DoLayout () from /home/mozilla/trunk/opt-ff/dist/bin/components/libgklayout.so #6 0x40ac4c92 in nsIFrame::Layout () from /home/mozilla/trunk/opt-ff/dist/bin/components/libgklayout.so #7 0x40ac60a9 in nsBoxFrame::LayoutChildAt () from /home/mozilla/trunk/opt-ff/dist/bin/components/libgklayout.so #8 0x409f1123 in nsGfxScrollFrameInner::LayoutScrollbars () from /home/mozilla/trunk/opt-ff/dist/bin/components/libgklayout.so #9 0x409f1cf4 in nsHTMLScrollFrame::Reflow () from /home/mozilla/trunk/opt-ff/dist/bin/components/libgklayout.so #10 0x409df57b in nsContainerFrame::ReflowChild () from /home/mozilla/trunk/opt-ff/dist/bin/components/libgklayout.so #11 0x40a297af in ViewportFrame::Reflow () from /home/mozilla/trunk/opt-ff/dist/bin/components/libgklayout.so #12 0x409c2eb5 in PresShell::InitialReflow () from /home/mozilla/trunk/opt-ff/dist/bin/components/libgklayout.so #13 0x40afea17 in nsContentSink::StartLayout () from /home/mozilla/trunk/opt-ff/dist/bin/components/libgklayout.so #14 0x40bb42a0 in HTMLContentSink::StartLayout () from /home/mozilla/trunk/opt-ff/dist/bin/components/libgklayout.so #15 0x40bb7a08 in HTMLContentSink::OpenBody () from /home/mozilla/trunk/opt-ff/dist/bin/components/libgklayout.so ...
Reporter | ||
Comment 48•19 years ago
|
||
Umm... I cannot reproduce with config of comment 45 on TurboLinux. tor: Can you reproduce after dist clean? And can you repduce on 1.8 branch?
Comment 49•19 years ago
|
||
My trunk firefox build was clean, as I don't normally build that product. A clean build of firefox on the branch also shows the startup crash, which again goes away if I back out this patch.
Reporter | ||
Comment 50•19 years ago
|
||
Always crashed in nsFrame::BoxReflow? I think this patch doesn't have a crash bug. Because other tinderbox are green. If we back out this patch, we will not show the crash. But is it correct? We(MJ) don't want to back out this patch. Because this bug is important for our marketing. Isn't there another way?
Comment 51•19 years ago
|
||
Always seems to be in nsFrame::Reflow. I'd suggest trying backing it out on trunk to see if brad goes green. There have a few other bugzilla reports today of firefox failing to start - bug 310686, bug 310688, and bug 310703.
Reporter | ||
Comment 52•19 years ago
|
||
O.K. I backed out the patch from trunk only.
Status: RESOLVED → REOPENED
Resolution: FIXED → ---
Reporter | ||
Comment 54•19 years ago
|
||
Why this patch is caused to crash on some systems?
Keywords: helpwanted
Reporter | ||
Comment 55•19 years ago
|
||
I can reproduce on Linux after comment out nsFileProtocolHandler::NewURI's changing. I'm checking the code.
Reporter | ||
Comment 56•19 years ago
|
||
Maybe, I think that file protocol is used by platformCharset initializing on Linux.
Comment 57•19 years ago
|
||
Yeah, nsPlatformCharset::InitGetCharset in nsUNIXCharset.cpp tries to read a properties file, which means creating a file:// URI. Perhaps we should do this charset thing only if the filename is non-ascii? I think that would solve the problem...
Reporter | ||
Comment 58•19 years ago
|
||
> Perhaps we should do this charset thing only if the filename is non-ascii?
Yes, it's simple approach. But I don't link this approach. Because the codes are
required two or more cpp files. I want to use it for final approach. I'm trying
on another approach that is using global variable.
Thank you.
Reporter | ||
Comment 59•19 years ago
|
||
Mac's yesterday crash may be caused by this bug. nsMacCharset.cpp is using file protocol too.
Reporter | ||
Comment 60•19 years ago
|
||
I'm testing this patch.
Attachment #197862 -
Attachment is obsolete: true
Reporter | ||
Updated•19 years ago
|
Status: REOPENED → ASSIGNED
Keywords: helpwanted
Reporter | ||
Comment 61•19 years ago
|
||
Comment on attachment 198230 [details] [diff] [review] Patch rv5.0 This patch works fine on my linux environment. And on windows too.
Attachment #198230 -
Flags: superreview?(darin)
Attachment #198230 -
Flags: review?(darin)
Comment 62•19 years ago
|
||
Comment on attachment 197862 [details] [diff] [review] Patch rv4.1 clearing approval request since this patch had some problems and is now obsolete.
Attachment #197862 -
Flags: approval1.8b5+
Reporter | ||
Comment 63•19 years ago
|
||
Someone: Could you test the patch on your Linux or Mac system?
Reporter | ||
Comment 64•19 years ago
|
||
Also on Windows too.
Reporter | ||
Comment 65•19 years ago
|
||
Comment on attachment 198230 [details] [diff] [review] Patch rv5.0 This has same problem on Linux.
Attachment #198230 -
Flags: superreview?(darin)
Attachment #198230 -
Flags: review?(darin)
Attachment #198230 -
Flags: review-
Reporter | ||
Comment 66•19 years ago
|
||
Attachment #198230 -
Attachment is obsolete: true
Comment 67•19 years ago
|
||
(In reply to comment #57) > Perhaps we should do this charset thing only if the filename is non-ascii? I > think that would solve the problem... That also requires checking if any escaped characters are present, does it not?
Reporter | ||
Comment 68•19 years ago
|
||
Yes, we need to check it.
Reporter | ||
Updated•19 years ago
|
Attachment #198321 -
Attachment description: Patch 5.1 → Patch rv5.1
Comment 69•19 years ago
|
||
If we don't have a fully reviewed patch approved and landed by midnight tonight (PDT) this isn't going to make 1.5
Flags: blocking1.8b5+ → blocking1.8b5-
Reporter | ||
Updated•19 years ago
|
Whiteboard: Mozilla Japan wants to fix on 1.8 branch → [Patch rv5.1 testing in Japan][Mozilla Japan wants to fix on 1.8 branch]
Reporter | ||
Comment 70•19 years ago
|
||
Comment on attachment 198321 [details] [diff] [review] Patch rv5.1 A Japanese tester said this patch doesn't crash on Linux when starting and opening the file that having non-ASCII char.
Attachment #198321 -
Flags: superreview?(darin)
Attachment #198321 -
Flags: review?(darin)
Reporter | ||
Updated•19 years ago
|
Whiteboard: [Patch rv5.1 testing in Japan][Mozilla Japan wants to fix on 1.8 branch] → [Mozilla Japan wants to fix on 1.8 branch]
Assignee | ||
Comment 71•19 years ago
|
||
Comment on attachment 198321 [details] [diff] [review] Patch rv5.1 >Index: netwerk/base/src/nsStandardURL.cpp >+nsCString nsStandardURL::gFileProtocolCharset; Global (or class static) nsCString is not permitted. It may not work properly on some systems. >+const char* nsStandardURL::kFileProtocolCharset = "MOZ_FPC"; What is this? I think you need to document this. >+ nsCAutoString fpCharset; >+ platformCharset->GetCharset(kPlatformCharsetSel_FileName, fpCharset); >+ gFileProtocolCharset = fpCharset; Since gFileProtocolCharset is of type nsCString, you could have just used it directly, like this: platformCharset->GetCharset(kPlatformCharsetSel_FileName, gFileProtocolCharset); >+ else if (mOriginCharset.Equals(kFileProtocolCharset)) { >+ if (gFileProtocolCharset.IsEmpty() && >+ (!IsASCII(spec) || >+ nsPromiseFlatCString(spec).FindChar('%', 0) != kNotFound)) { This needs to be properly documented. I'm also not very happy with this approach, but I can't think of a good alternative. >Index: netwerk/protocol/file/src/nsFileProtocolHandler.cpp > nsresult rv = url->Init(nsIStandardURL::URLTYPE_NO_AUTHORITY, -1, >+ *specPtr, nsStandardURL::kFileProtocolCharset, >+ baseURI); Ah, I see... this kFileProtocolCharset thing really needs to be better documented. I wonder if there isn't a better way to work around the initialization "chicken and the egg" problem. We could perhaps solve it by pushing the normalization of "MOZ_FPC" into GetOriginCharset. Hmm...
Attachment #198321 -
Flags: superreview?(darin)
Attachment #198321 -
Flags: superreview-
Attachment #198321 -
Flags: review?(darin)
Attachment #198321 -
Flags: review-
Reporter | ||
Comment 72•19 years ago
|
||
(In reply to comment #71) > We could perhaps solve it by pushing the > normalization of "MOZ_FPC" into GetOriginCharset. Hmm... > We need mOriginCharset for BuildNormalizedSpec. Not only for GetOriginCharset.
Reporter | ||
Comment 73•19 years ago
|
||
Attachment #198321 -
Attachment is obsolete: true
Attachment #198473 -
Flags: superreview?(darin)
Attachment #198473 -
Flags: review?(darin)
Assignee | ||
Comment 74•19 years ago
|
||
Another solution to this bug would be to make the nsIPlatformCharset implementations not depend on being able to load URLs. They could just use the directory service and nsIFile to load the properties files. I know we don't have a lot of time for this release, but the current patch (rv5.2) is really hacky. I wish we could do something better like fix nsIPlatformCharset.
Reporter | ||
Comment 75•19 years ago
|
||
Yes, we don't have much time. But this is very serious bug for Thunderbird marketing in Japan. We need to fix this...
Assignee | ||
Comment 76•19 years ago
|
||
OK, nevermind hacking the platform charset implementation. That seems beyond the scope of this bug. I still wish we could do something less hacky here.
Reporter | ||
Comment 77•19 years ago
|
||
Should I recreate smaller patch? I have no idea for smaller and more safety patch...
Comment 78•19 years ago
|
||
maybe something like this? this isn't finished yet, but it works on windows already. if people are interested I can finish the patch.
Assignee | ||
Comment 79•19 years ago
|
||
biesi: Yeah, that is exactly the kind of patch I was thinking of! it would make it possible to use Masayuki's v4.1 patch. Do you think you can finish that patch?
Assignee | ||
Comment 80•19 years ago
|
||
OK. This patch includes a complete implementation of nsGREResProperties. It also has Masayuki's v4.1 patch.
Attachment #198518 -
Flags: review?(bzbarsky)
Comment 81•19 years ago
|
||
Comment on attachment 198518 [details] [diff] [review] v6 patch >Index: intl/uconv/src/Makefile.in > nsURLProperties.cpp \ Remove that line, since you're removing those files? And remove the references (unused?) to nsURLProperties from nsWinUConvService.cpp r=bzbarsky with that.
Attachment #198518 -
Flags: review?(bzbarsky) → review+
Assignee | ||
Comment 82•19 years ago
|
||
I asked dougt about nsWinUConvService, and this is what he had to say: > [15:36] darinf19: yt? > [15:37] darinf19: you know about nsWinUConvService.cpp, right? > [15:37] darinf19: it seems like there are no makefile rules to build it, and > it looks like it wouldn't compile/link if there were. is this something that > can or should be cvs removed? > [16:12] *** "darinf19" signed off at Tue Oct 04 16:12:51 2005. > > Yeah, it was Alec's attempt at making a native uconv. I looked at using it, > but decided to do my own for WinCE. I do not think that the one I wrote can > be used as a general purpose Win32 converter as mine makes the assumption > that the backend is always Unicode (which is only true for WinCE). > > I think we can cvs remove nsWinUConvService.
Reporter | ||
Updated•19 years ago
|
Attachment #198473 -
Flags: superreview?(darin)
Attachment #198473 -
Flags: review?(darin)
Updated•19 years ago
|
Flags: blocking1.8rc1+
Assignee | ||
Comment 83•19 years ago
|
||
Comment on attachment 198518 [details] [diff] [review] v6 patch We decided to keep this patch out of 1.5 beta 2 with agreement that this would go in for 1.5 rc1. Please approve :)
Attachment #198518 -
Flags: approval1.8rc1?
Assignee | ||
Comment 84•19 years ago
|
||
reassigning to me so I can more easily keep track of getting this checked in.
Assignee: masayuki → darin
Status: ASSIGNED → NEW
Comment 85•19 years ago
|
||
Can we get this landed on the trukn and verified as working there and causing no regressions?
Assignee | ||
Comment 86•19 years ago
|
||
(In reply to comment #85) > Can we get this landed on the trukn and verified as working there and causing no > regressions? Working on that now.
Assignee | ||
Comment 87•19 years ago
|
||
fixed-on-trunk
Status: NEW → RESOLVED
Closed: 19 years ago → 19 years ago
Resolution: --- → FIXED
Assignee | ||
Comment 88•19 years ago
|
||
This is the version of the patch that I landed on the trunk.
Attachment #199468 -
Flags: approval1.8rc1?
Assignee | ||
Updated•19 years ago
|
Attachment #198518 -
Flags: approval1.8rc1?
Comment 89•19 years ago
|
||
Masayuki, can you verify that this is fixed on the trunk and look for any possible regressions related to this change?
Reporter | ||
Comment 90•19 years ago
|
||
This has a regression. This patch breakes nsMsgCompose::AttachmentPrettyName. However, this regression may be fixed by bug 274264(current patch). Bug 274264 should block rc release. I cannot find other regression(s) on Firefox and Thunderbird.
Reporter | ||
Comment 91•19 years ago
|
||
I verified the regression is fixed by current patch of bug 274264. Let's fix this and bug 274264! -> v.
Status: RESOLVED → VERIFIED
Updated•19 years ago
|
Attachment #199468 -
Flags: approval1.8rc1? → approval1.8rc1+
Reporter | ||
Comment 92•19 years ago
|
||
Bug 274264 is fixed on 1.8 branch. We don't have regression by this patch. Drain: Please check in to Branch!
Reporter | ||
Comment 94•19 years ago
|
||
I confirmed this is fixed on 1.8 branch. Thank you!
Keywords: fixed1.8 → verified1.8
You need to log in
before you can comment on or make changes to this bug.
Description
•