Closed
Bug 54689
Opened 24 years ago
Closed 23 years ago
Blank page loads when trying to access pdf on a secure server
Categories
(Core Graveyard :: Plug-ins, defect, P1)
Core Graveyard
Plug-ins
Tracking
(Not tracked)
VERIFIED
FIXED
mozilla1.0
People
(Reporter: shrir, Assigned: peterlubczynski-bugs)
References
()
Details
(Keywords: regression, Whiteboard: rtm stopper [seeking reviews])
Attachments
(8 files)
1.44 KB,
text/plain
|
Details | |
1.46 KB,
text/plain
|
Details | |
264.07 KB,
application/octet-stream
|
Details | |
8.86 KB,
patch
|
Details | Diff | Splinter Review | |
9.38 KB,
patch
|
Details | Diff | Splinter Review | |
9.91 KB,
patch
|
Details | Diff | Splinter Review | |
20.24 KB,
patch
|
Details | Diff | Splinter Review | |
100.00 KB,
application/octet-stream
|
Details |
build: windows branch bits 20000928.
This test is from the adobe testsuite.
Steps to reproduce :
1 Launch seamonkey
2 Click on the url given above
3 Observe that nothing loads and a blank page appears in the browser window
Expected: Pdf file should load in the browser window.
This page loads fine in 4.72 browser.
I see 'The connection was refused when attempting to contact junruh.mcom.com'
dialog.
Comment 2•24 years ago
|
||
Not a Netscape 6 RTM blocker. FUTURE. This bug has been marked Future because
the Netscape engineer it is assigned to is overburdened.
Target Milestone: --- → Future
Comment 4•24 years ago
|
||
This bug is critical for anyone who needs to distribute or receive documents
securely. This affects financial institutions as well as online investment firms
and their clients.
Changing target to mozilla0.9.
Target Milestone: Future → mozilla0.9
I cannot reach any https: site to what happens here. Assume some problems with
security should be fixed (first).
Over to Security.
Assignee: av → mstoltz
Component: Plug-ins → Security: General
QA Contact: shrir → ckritzer
Comment 6•24 years ago
|
||
Please assign SSL-related bugs to Security:Crypto. Reassigning.
Assignee: mstoltz → ddrinan
Component: Security: General → Security: Crypto
QA Contact: ckritzer → junruh
Comment 7•24 years ago
|
||
Unsetting Target Milestone, adding nomination keyword. Nominating is done with
Keywords, not Target Milestone. Target Milestone is used by the developer to
communicate the development cycle in which he intends to fix the problem.
Keywords: mozilla0.9
Target Milestone: mozilla0.9 → ---
Updated•24 years ago
|
Component: Security: Crypto → Client Library
Product: Browser → PSM
Version: other → 2.0
Assignee | ||
Comment 8•24 years ago
|
||
I bet this is happening on all platform too, not sure. How important is this? I
nominate for mozilla 0.9.1
Keywords: mozilla0.9 → mozilla0.9.1
This works for me with the latest builds (with PSM 2.0). Please re-open if this
is still broken for you.
Status: NEW → RESOLVED
Closed: 24 years ago
Resolution: --- → WORKSFORME
Reporter | ||
Comment 10•24 years ago
|
||
where do I install psm 2.0 from ? Thnx!
Reporter | ||
Comment 11•24 years ago
|
||
Confirmed with Junruh, that this is still not working using today's commercial
build on windows(0430). John, pls cehck with Bob when you visit him today.
reopening...
Status: RESOLVED → REOPENED
Resolution: WORKSFORME → ---
Comment 12•24 years ago
|
||
Nominating nsbeta1 (it would appear that PSM 2 has some fixes on the way for
this bug). It is critical to several people.
Reporter | ||
Comment 13•24 years ago
|
||
john, any update on this one? Thx
Comment 14•24 years ago
|
||
John can you run test cases on WinME, WinNT, and Linux and see if you can
isolate the test case?
I can confirm that this does not work for me on today's Mozilla build on WinNT.
Setting target to 2.0.
Target Milestone: --- → 2.0
Reporter | ||
Comment 15•24 years ago
|
||
2.0 ? Isn't this an 'important' bug and on our "Must Fix" list for Adobe ?
Comment 16•24 years ago
|
||
This bug is present in at least WinNT, Win98 and Win95. WinME is untested. Mac
and Linux work OK.
Reporter | ||
Comment 17•24 years ago
|
||
how is this working on linux for you? acrobat does not launch as a plugin at all
on linux and if I try to load this secure document using acrobat as a helper
app, I get a message "this document can be opened from inside the browser only".
Checking on mac...
Reporter | ||
Comment 18•24 years ago
|
||
pls ignore my comment about linux..the pdf does_open_up as a helper app on
linux 0503. There is another bug filed for "Acrobat not working as a plugin on
linux".
Comment 19•24 years ago
|
||
Mac testing with shrirang present - Acrobat will open a secure pdf file as a
helper app, but when used as a plugin, a secure pdf file will not display.
Assignee | ||
Comment 20•24 years ago
|
||
I'm changing platform back to ALL as it's clear from testing, HTTPS links only
work outside of the browser. Adobe expects them to work inside as in IE and Nav
4.x.
OS: Windows NT → All
Hardware: PC → All
Assignee | ||
Comment 21•24 years ago
|
||
Note: bug 78741 may be preventing accurate testing of this.
Depends on: 78741
Comment 22•23 years ago
|
||
I can confirm that this one is pretty important to a great many users. Does the
PSM 2.0 release coincide with 0.9.1 etc.?
Comment 23•23 years ago
|
||
Can someone from the crypto team at least explain what the issue is here?
Comment 24•23 years ago
|
||
The issue is that opening a *.pdf file on a http:// web site works, whereas
opening a *.pdf file on a https:// web site opens a blank window.
Assignee | ||
Comment 25•23 years ago
|
||
How can I verify I have PSM built on my win32 machine. Is it built by default?
Seem like when i tried the url above, I got an endless loop of ASSERTIONs.
Here's the stack:
NTDLL! DbgBreakPoint@0 address 0x77f9eea9
nsDebug::Break(const char * 0x01a1ffe8, int 364) line 366
nsDebug::Assertion(const char * 0x01a2002c, const char * 0x01a20028, const char
* 0x01a1ffe8, int 364) line 290 + 13 bytes
nsUnknownDecoder::FireListenerNotifications(nsIRequest * 0x03770fb8, nsISupports
* 0x00000000) line 364 + 35 bytes
nsUnknownDecoder::OnStopRequest(nsUnknownDecoder * const 0x0345b9d8, nsIRequest
* 0x03770fb8, nsISupports * 0x00000000, unsigned int 2152398899) line 225 + 16
bytes
nsDocumentOpenInfo::OnStopRequest(nsDocumentOpenInfo * const 0x03770778,
nsIRequest * 0x03770fb8, nsISupports * 0x00000000, unsigned int 2152398899) line
255
XPTC_InvokeByIndex(nsISupports * 0x03770778, unsigned int 4, unsigned int 3,
nsXPTCVariant * 0x034009a0) line 139
EventHandler(PLEvent * 0x03400948) line 509 + 41 bytes
PL_HandleEvent(PLEvent * 0x03400948) line 588 + 10 bytes
PL_ProcessPendingEvents(PLEventQueue * 0x00d786e0) line 518 + 9 bytes
_md_EventReceiverProc(HWND__ * 0x002605de, unsigned int 49410, unsigned int 0,
long 14124768) line 1069 + 9 bytes
USER32! UserCallWinProc@20 + 24 bytes
USER32! DispatchMessageWorker@8 + 244 bytes
USER32! DispatchMessageA@4 + 11 bytes
nsAppShell::Run(nsAppShell * const 0x00e29760) line 108
nsAppShellService::Run(nsAppShellService * const 0x00e2ae28) line 418
main1(int 3, char * * 0x00357f88, nsISupports * 0x00000000) line 1010 + 32 bytes
main(int 3, char * * 0x00357f88) line 1308 + 37 bytes
mainCRTStartup() line 338 + 17 bytes
KERNEL32! BaseProcessStart@4 + 115547 bytes
Comment 26•23 years ago
|
||
Actually I was hoping more for something from the PSM team as to why this
fails. Maybe if we could find out what actually the technical problem is.
Here is a better testcase:
Go to:
http://www.nasire.org/hotissues/justice/
Scroll down. click on:
Governance Models - Draft Report [158KB PDF]
The plugin loads, but the file doesn't come up.
As far as PSM 2 goes, it IS built by default on Windows and this problem still
happens.
Comment 27•23 years ago
|
||
*** Bug 81489 has been marked as a duplicate of this bug. ***
Comment 28•23 years ago
|
||
Argh
https://www.nasire.org/hotissues/justice/
This page is available BOTH secure and nonsecure.
If you use the https version which I put in, you do see the problem loading the
PDF file from a secure link.
Comment 29•23 years ago
|
||
it would be a win of gargantuan proportions if this made it in by 0.9.1 time
frame (for obvious reasons). certain parties are extremely interested in the
fate of this one ...
Assignee | ||
Comment 30•23 years ago
|
||
Just spoke with DougT and this is not a PSM problem. Necko does not cache https
transfers so there won't be a file there for Acrobat to pick up. Doug suggested
having the plugin code do the temporary file management as is done in Necko.
Reassigning to myself. Attempting to move to "plugins"
PDT, do you feel this is a beta stopper?
Assignee: ddrinan → peterlubczynski
Status: REOPENED → NEW
Component: Client Library → Plug-ins
Product: PSM → Browser
Target Milestone: 2.0 → ---
Version: 2.0 → other
Comment 31•23 years ago
|
||
i hate to do this, but i didn't mark this bug originally as a beta stopper
because i was led to believe that it was fixed (psm 2.0). chrisn believes this
is beta stopper material -- cc'ing chrisn and marek. phil, if you & pdt
approve, could you change the target milestone?
Comment 32•23 years ago
|
||
I can't connect to either https://junruh.mcom.com or https://www.nasire.org
My opinion is that if this worked in 6.0, and doesn't work now, I'd pursue a fix
for 0.9.1 *after* the byte range bug and the Macromedia crashes. If it didn't
work in 6.0, I'd push to 0.9.2.
Comment 33•23 years ago
|
||
nope, did not work on 6.0.
unless chrisn jumps in based on the reasons i raised in the e-mail to everyone
concerned, i agree with phil.
Comment 34•23 years ago
|
||
All, https is not cached. Plugin's requires that disk cache is enabled.
For this to work is that the plugin code must handle file downloading (writing
to disk) if it want to support an OnFileAvail callback with either the HTTPS
protocol, or if disk cache is disabled.
Reporter | ||
Comment 35•23 years ago
|
||
*** Bug 81953 has been marked as a duplicate of this bug. ***
Assignee | ||
Comment 36•23 years ago
|
||
Assignee | ||
Comment 37•23 years ago
|
||
Assignee | ||
Comment 38•23 years ago
|
||
As is apparent from the attached traces, we were writing out https delivered
bits to the local disk....eeek!
Liz, will Acrobat work with just NP_WRITE calls vs. using a file? It's kind of
bad to write securly delivered bits to a magnetic disk. If so, I can probably
just convert NP_ASFILE streams to NP_NORMAL ones for https as a test.
If not, a cache like Dougt proposed needs to be made.
Assignee | ||
Comment 39•23 years ago
|
||
Oh, btw, to build PSM 2.0 on Windows you need to set BUILD_PSM2=1
Comment 40•23 years ago
|
||
Why is this any different than when you get a PDF document from a secure server
to use as a helper app? It is cached to disk then.
I can picture cases where people might be sending very large things via http
servers - the idea that they can't ever be written to disk might cause some
memory problems...
Comment 41•23 years ago
|
||
Just to clarify the security requirments in this case, it is just to discourage
3rd party snooping of traffic. The end user storing stuff on their machine is
not such a concern. The machines are all in private homes. It's a chrarity
extranet.
Comment 42•23 years ago
|
||
Note that all previous versions of mozilla and Netscape don't write data
retrieved over https into the disk cache. I want PDF documents loaded over https
to work, but would like mstolz's opinion about the security ramifications.
cc'ing him
Comment 43•23 years ago
|
||
Mike, the difference is that the helper application code handles the reading
from the secure stream and writing to disk. The plugin code
(modules/plugin/nglsrc) relies on the fact that it can pull local files from the
necko cache. I really don't think it is a good idea to put non-persistant files
in the disk cache. This is why the plugin code has to write the stream to disk
like the helper application code does.
Comment 44•23 years ago
|
||
note, that the right person to review putting secure documents into the necko
cache is david drinan. I am sure that he would agree that this is a bad idea.
Comment 45•23 years ago
|
||
In response to Peter's Q: when you have the Acrobat plug-in installed,
using just NPP_Write calls to deliver the data to Acrobat is not
only OK, that is what we expect. It doesn't matter if the data
is secure or not.
When Acrobat is installed as a helper app, the browser writes the data
to a temp file and Acrobat opens that.
Comment 46•23 years ago
|
||
Peter --
Yikes -- unfortunately, the Acrobat plug-in is telling mozilla that
we want the data as a file due to a bug work around that we put
in. Here are the details (open NP_PDFX.cpp in
the project and look for "httpshack" or read below):
NPN_Version(&pmjr, &pmnr, &nmgr, &nmnr);
/* **ER - Hack to workaround PR#308636. See bug report for full
details.
Basically, with Netscape 4.x, they refuse to cache HTTPS
files (unless
requested by a plug-in) on disk, but will cache them in
memory if they
are small enough. If part of the file (for the initial read)
gets cached
in memory, and we make a range request, the range request
will fail because
they decide that it can be served from the cache, even though
it cannot.
Yucky - read the bug report. Anyhow, we try to detect this
condition (using
hardcoded guess at memory cache size - don't want to dig
through their prefs
file), and in this case we'll ask NS just to download the
file to their
cache and give us the filename. Because of the backdoor that
lets files
from HTTPS that are requested by plug-ins be cached, this
will work.
We don't need this hack if the stream isn't seekable (no
byteserving, thus
no range requests). If the server doesn't pass back a
content-length,
stream->end is 0, so we aren't going to freak out. This hack
makes things
less efficient, as any HTTPS file <= 1 megabyte gets
downloaded entirely,
but that's better than not working at all. However, if
Netscape's bug
gets fixed in a future version, we should bound the use of
this hack only
to relevant versions.
*/
DoHTTPSHack = ( seekable && ( nmnr > 10 ) &&
( strnicmp( (char*)stream->url, "https:/", 7 ) == 0 ) &&
( stream->end <= DEFAULT_MEM_CACHE_SIZE ) );
/* Do we want to ask Netscape to download the file to its cache
and give us the
filename to open directly, or to let us use a seekable
stream? */
if ( !seekable || DoLocalFileHack || DoHTTPSHack )
{
/* Ask Netscape to download the file to the cache and
give us the filename
to open from */
*stype = NP_ASFILE;
stream->pdata = s;
s->mode = PDFX_STREAM_ASFILE;
}
****************************************************************************
*****
The DoHTTPSHack is set to true because:
The stream is seekable and the nmnr is 12 (greater than 10), and
the other conditions also exist.
OK -- What to do? For some future version of Acrobat, I can change
that code to make sure it applies to the Netscape 4.X product only
by looking at the other variable that NPN_Version returns. I will
check with management to see if they would allow such a simple
fix to be in the patch release that is under development.
On your side, you could change what mozilla returns in NPN_Version
so that the nmnr is 10 or less. I don't know if this is a good idea
since other folks may be writing code to key off of this. OR, you
could modify mozilla so that it allowed HTTPS files to be written
to a temp file, since that is the behavior of 4.X, which you are emulating.
While you are thinking about this, I will check with my management.
Liz
Comment 47•23 years ago
|
||
I took at NPN_Version and what it returns in Netscape 4.77 versus Mozilla,
to see if I could bound our HTTPS hack bug work around (see above):
Moz Nav 4.77
Plugin major 0 0
Plugin minor 11 11
Netscape major 0 0
Netscape minor 11 12
We can, therefore, only put a bounds on our hack if the Nav 4.X product
line will never exceed 11 for Netscape minor (or they fix the bug
we were trying to work around). Since Netscape minor has been
11 for quite a while, it may be safe to assume this (do you know
anyone in the sustaining engineering group for 4.X? Marek was the last
person I knew, but apparently he is now working on mozilla, right?)
Comment 48•23 years ago
|
||
I'm guessing that that last line should read:
Netscape minor 12 11
The version was bumped to 12 for mozilla development when support for some new
values were added. It is a safe bet that no structural changes will be made to
the plugin support in 4.x so the version won't be changing again.
Assignee | ||
Comment 49•23 years ago
|
||
Liz, what do you need us to do on our side? How can we test? Even though no
milestone is set, "they" would really like this for beta.
Status: NEW → ASSIGNED
Comment 50•23 years ago
|
||
Hi folks:
I am going to be able to put a bounds in for that bug workaround for
our patch release for Acrobat 5. Customers who experience this bug
should be able to therefore upgrade to the patch release.
I would therefore make the priority of this bug MUCH LESS than
getting the DDE support (WWW_OpenURL working with Acrobat), as
well as any fixes to byte range support, which I am going to start
testing right now (hopefully all will be fine ... BUT...).
Comment 51•23 years ago
|
||
On OS/2, the only Acrobat Reader we have is 3.0 and we have this problem. We
can't get Adobe to fix this. (If we could, I have a few other things that need
fixing :)
Anyway, I was hoping the fix would be in Mozilla so that it would go into the
OS/2 version.
I don't think hacking around this in Acrobat is the right thing. This isn't a
Windows only problem.
Comment 52•23 years ago
|
||
A quick test of this in 4.x shows that we do indeed cache the file to disk (to
cacheXXXXXXX.pdf). This file is subsequently deleted when the page is left. You
can, however, duplicate the file while the page is open thus bypassing its
deletion.
Comment 53•23 years ago
|
||
I just modified the Acrobat plug-in to NOT request the PDF file
served via HTTPS as a file if the browser is mozilla ... and this
modification fixed this bug. I will be checking this code into the first
service pack for Acrobat 5, ETA early fall.
This means that there **will be** an upgrade path for customers who
experience this bug, if the mozilla team can not get another type of
fix in.
There are, however, many millions of older versions of Acrobat out
there (like there are many millions of older versions of Netscape
browsers). A mozilla fix, therefore, would also be desireable.
Assignee | ||
Comment 54•23 years ago
|
||
So "new" Acrobat installs should just work once the fix is in the service pack,
right?
As for older Acrobats, I wonder if there is a way we can hack this? Should I
spend any time on trying to do this or should we rel-note it?
Whiteboard: [will be fixed with Adobe refresh]
Target Milestone: --- → mozilla0.9.2
Comment 55•23 years ago
|
||
I beg you to try to come up with a fix for this.
some platforms (as in most non Windows) don't get Acrobat updates.
This might be fixed on Windows by Adobe, but it is still a Mozilla bug.
By the way, does anyone know if any other plugins have this problem? Have we
tried Java applets or wav files on a secure server?
Comment 56•23 years ago
|
||
Hmm.. Liz McQuarrie repeatedly tells us that this isn't one of two important
bugs (bug 53363 and bug 25699). However, secure PDF is *crucial* to other
folks. Peter, see if you can throw together something for older Acrobats. If
not, more evangelism for me :-). I'd like chrisn to make the final call.
Assignee | ||
Comment 57•23 years ago
|
||
Looks like you won't have to evangelize too much because Liz will be making the
changes. Maybe we should bump it up another version so we can come up with a
hack for older Acrobats.
We need caching code in plugins anyway for when the disk cache is turned off. I
wonder if we could detect the version of the Adobe plugin or perhaps have a
failsafe---cache the file if all else fails. Is this possible, Andrei, Dougt?
PDT: What do you think? Should we cache https only as a last resort only in
plugins? I don't like the idea, but it doesn't seem that bad if it's a last
resort and Nav 4.x and IE Mac do it. Perhaps a security rel-note?
Whiteboard: [will be fixed with Adobe refresh]
Comment 58•23 years ago
|
||
I'm interested in how mkaply's examples work, or any other data to help us
decide if this is more of a compatibility issue or more of a security hole.
Would still like to hear from mstoltz and/or lord on the latter issue.
Comment 59•23 years ago
|
||
Reporter | ||
Comment 60•23 years ago
|
||
yep, works fine with the attached plugin on today's branch 0605 windows.
Assignee | ||
Comment 61•23 years ago
|
||
Because a solution is close at hand by an Acrobat refresh, I'm moving this off
to mozilla0.9.3. If I run out of bugs, I'll come back to this.
Also, still need a security opinion....
Keywords: mozilla0.9.1
Whiteboard: [Fixed with Acrobat refresh]
Target Milestone: mozilla0.9.2 → mozilla0.9.3
Comment 62•23 years ago
|
||
We need someone on the PSM team to give a security opinion here. I know there
was a good reason for not caching SSL-delivered content, and the risk of bending
that rule seems to be the issue here. I don't know how big that risk is.
Comment 63•23 years ago
|
||
OK, now I am just going to beg.
We need this fix for platforms BESIDES Windows.
Adobe's fix is ONLY for Windows.
If someone could just tell me how to hack around this in Mozilla, I would let
this be pushed to 0.9.3, but right now I have banks that are rolling out stuff
and this bug is huge.
The fix from Adobe only helps Adobe Windows customers.
Thanks for your support.
Comment 64•23 years ago
|
||
It sounds like this is turning into a request for HTTPS object caching. I
didn't see any PSM bug of that sort, so I created bug 84311.
Updated•23 years ago
|
Whiteboard: [Fixed with Acrobat refresh] → [Fixed with Acrobat refresh]rtm stopper
Target Milestone: mozilla0.9.3 → mozilla0.9.2
Comment 65•23 years ago
|
||
This is what you get when you propose the solution: more work ;-)
Assignee: peterlubczynski → dougt
Status: ASSIGNED → NEW
Updated•23 years ago
|
Depends on: 86041
Whiteboard: [Fixed with Acrobat refresh]rtm stopper → rtm stopper
Comment 66•23 years ago
|
||
Comment 67•23 years ago
|
||
The last patch along with the patch in 86041 allow plugins to work over https.
I have tested this *only* with the above link and have verified that (a) the PDF
loads, (b) when exiting all temp files are removed, and (c) non-https PDFs still
load correctly.
A couple of concerns with the last patch:
a) The patch only cleans up temp files on exit. Is this OKAY? What about
profile switching? This task is still blocked by some of Peter's work...
b} Are we saving the location in the right places. Currently is temp files are
saved to <profile>/plugtmp. What should the default location of these kinds of
temp files be? Please don't tell me /tmp or the equiv.
c) Diskspace. Maybe we should be checking for low disk space and cleanly
failing. Well, maybe necko should be doing this in ALOT of places... So, maybe
it is not a serious concern now.
d) Embedders. What if they want to change the destination of these files. I
think that we need to invent a new directory service location that references a
"plugin temp directory".
e) byte range requests over a security connection that also wants to do file
cacheing... this 'boundary' case I don't want to even think about right now.
Maybe someone can try it out and report back how bad this doesn't work.
Peter, Mike, Av, can you please review my changes.
Comment 68•23 years ago
|
||
Just a couple of things. Why not to delete the file right after we close the
stream? May it be needed for navigation? And second, would probably be cleaner
to define "plugtmp" somewhere in the header file.
Assignee | ||
Comment 69•23 years ago
|
||
FYI: 4.x reference of what to do whith https and byte range streams:
http://lxr.netscape.com/nova/source/lib/plugin/npglue.c#2980
Comment 70•23 years ago
|
||
Av, Why not to delete the file right after we close the stream... Well, if we
do, then the plugin never sees the file. For whatever reasons, the stream is
closed as soon as onStopRequest if fired. I origanally had the file being
deleted in the stream ~() but that didn't work. Maybe peter can hook this
"early delete" up later?
new patch coming up which moves "plugtmp" static string to a header...
Comment 71•23 years ago
|
||
Comment 72•23 years ago
|
||
can I get a r=/sr= on the last patch? Peter, can you investigate what it will
take to have the temp file be deleted on page transition? I think you have a
similar bug wrt leaks.
Assignee | ||
Comment 73•23 years ago
|
||
Doug,
In this patch:
http://bugzilla.mozilla.org/showattachment.cgi?attach_id=38711
I'm having the link list of "active" plugin instances,
nsPluginHostImpl::mActivePluginList, take hold a reference to the stream peer
for the "full-page" case. You can probably move that logic to the more general
case of nsPluginHostImpl::NewPluginURLStream.
Comment 74•23 years ago
|
||
peter, I was hoping that you could solve this problem.
Assignee | ||
Comment 75•23 years ago
|
||
Okay, how about this: Can you put the delete file code in the destructor of the
stream (peer?) and I'll ensure the stream has a reference for the duration of
the plugin instance so the destructor won't get called until after the plugin
goes away?
Both of these patch will probably have to go in at the same time.
Comment 76•23 years ago
|
||
peter, I would rather not do this. This would break this patch and I could not
mark this bug as FIX when I checked in.
Let do this. Write up a new bug wrt the page transition delete, give me a r=,
and get av to look at this patch. :-)
Status: NEW → ASSIGNED
Comment 77•23 years ago
|
||
I added code to the destructor nsPluginStreamInfo::~nsPluginStreamInfo() but
with peter's suggested patch, I am not hitting this delete (possible leak!)
Assignee | ||
Comment 78•23 years ago
|
||
Doug, my logic was completely wrong in that patch. Can you try my fixed up one:
http://bugzilla.mozilla.org/showattachment.cgi?attach_id=38936
I confirm that with this patch, nsPluginStreamInfo::~nsPluginStreamInfo() is
called when leaving the page.
Comment 79•23 years ago
|
||
Okay. that works for me. I will add a delete in ~nsPluginStreamInfo(). I will
KEEP the delete in the nsPluginHostImpl::Destroy just to be safe. Patch coming up.
Comment 80•23 years ago
|
||
Comment 81•23 years ago
|
||
The last patch can only be used with peter's stream changes.
Assignee | ||
Comment 82•23 years ago
|
||
Do we need a special server to issue byte ranges?
junruh: can you put up one of the byte range testcase in bug 53363 on your
secure server for testing? My favorite is:
http://access.adobe.com/browser/netscape/readtesting/gotopage5.pdf
Comment 83•23 years ago
|
||
Here it is:
https://junruh.mcom.com/gotopage5.pdf
Comment 84•23 years ago
|
||
The heavy lifting is done. Reassigning to peter to seek permission to check in.
If there are any problems that come up, please let me know asap.
Assignee: dougt → peterlubczynski
Status: ASSIGNED → NEW
Comment 85•23 years ago
|
||
r=av. Although it is not easy to review two patches at once.
Assignee | ||
Comment 86•23 years ago
|
||
Assignee | ||
Updated•23 years ago
|
Whiteboard: rtm stopper → rtm stopper [seeking reviews]
Comment 87•23 years ago
|
||
Well, if you all have decided that it is really OK to write https data to the
filesystem, then sr=attinasi on the patcy (id=38998) - sounds like a security
hole to me though (especially with access permissions set to 777).
Comment 88•23 years ago
|
||
a= asa@mozilla.org for checkin to the trunk.
(on behalf of drivers)
Blocks: 83989
Assignee | ||
Comment 89•23 years ago
|
||
I agree. Adding keyword relnote.
Arun, how do you ensure a relnote is added to the product?
Liz: How will these changes effect yours in Acrobat? We still want to stream
directly to Acrobat 5.x with your changes. Should we increment the version?
Patch checked in, marking FIXED.
Comment 90•23 years ago
|
||
Marc, double check that. The cached file should be opened as 00600.
Comment 91•23 years ago
|
||
verify fix works in trunk build 2001-06-18-23/Win2k
Comment 92•23 years ago
|
||
Verified on WinNT branch. On Mac, I get a crash.
Comment 93•23 years ago
|
||
john, do you have a stack trace? lets open a new bug for this problem.
Comment 94•23 years ago
|
||
Marking verified. I am opening a new bug for Mac and possibly Linux.
Status: RESOLVED → VERIFIED
Comment 95•23 years ago
|
||
Reopening. This is reproducible again.
Status: VERIFIED → REOPENED
Resolution: FIXED → ---
Target Milestone: mozilla0.9.2 → mozilla1.0
Comment 96•23 years ago
|
||
WFM: w2k, Gecko/20020306 Netscape6/6.2.1+, https://pki.mcom.com/pingform.pdf
But there is a possibility to hang mozilla or 4.x on *.pdf file if something
bad happened in previous rpc session between acrobat plugin and Acrobat process,
actually last one can just stall, in this case you won't be able to open any
local pdf file.
The solution: kill Acrobat.exe
Assignee | ||
Comment 97•23 years ago
|
||
Yes, confirming that this is happening, but ONLY with Acrobat 5.05. The
orriginal Acrobat 5.0 works correctly. Strange....Liz, did anything change?
From the logs, everything looks correct that we are getting byte ranges and a
plugin instance is being created. However, the data never gets to the plugin!
We're not even updating progress in the status bar. A look in the debugger is
needed.
Although the symptoms may be the same, let's open a new bug as I don't think
this is going to be the same issue as this bug.
Status: REOPENED → RESOLVED
Closed: 23 years ago → 23 years ago
Resolution: --- → FIXED
Comment 99•23 years ago
|
||
I have just installed 5.1 and see blank page too.
Comment 100•23 years ago
|
||
Hi Folks:
We have an the same pingform.pdf test case (or similar) on a secure
server here, but I am not seeing a blank page problem. I am, seeing, however,
that the forms submission does not work with the 3/8 build.
I will do a little more debugging on the forms submission problem.
In the meantime, it looks like I will need you folks to help
me get access to your test case for the blank page, since I can not
repo it here.
Assignee | ||
Comment 101•23 years ago
|
||
Confirming signing PDF's fails on NPN_Post on:
http://acroeng.adobe.com/BrowserTestSuite/forms/SubmitAsPDF.pdf
Created bug 130080 for this issue.
Comment 102•23 years ago
|
||
Comment 103•23 years ago
|
||
woops, wrong bug report:(
Updated•2 years ago
|
Product: Core → Core Graveyard
You need to log in
before you can comment on or make changes to this bug.
Description
•