Backed out changeset 132bb5e7c5b8 (bug 1315332) for bustage. r=backout
authorSebastian Hengst <archaeopteryx@coole-files.de>
Sun, 27 Nov 2016 22:02:43 +0100
changeset 324406 cb3dc03015529ea5f36b51c360bb407357b7e5e2
parent 324405 3ad8afe2b2183f76c581adae0c4100ef1951b9ca
child 324407 bfee5b1a5508f7e7f31e737f97c82371e8916b67
push id24
push usermaklebus@msu.edu
push dateTue, 20 Dec 2016 03:11:33 +0000
reviewersbackout
bugs1315332
milestone53.0a1
backs out132bb5e7c5b8a80c3c3bc51e865a9562f857f1c7
Backed out changeset 132bb5e7c5b8 (bug 1315332) for bustage. r=backout
netwerk/protocol/http/nsHttpChannelAuthProvider.cpp
--- a/netwerk/protocol/http/nsHttpChannelAuthProvider.cpp
+++ b/netwerk/protocol/http/nsHttpChannelAuthProvider.cpp
@@ -1217,26 +1217,16 @@ nsHttpChannelAuthProvider::PromptForIden
         else
             holder->SetToHttpAuthIdentity(authFlags, ident);
     }
 
     // remember that we successfully showed the user an auth dialog
     if (!proxyAuth)
         mSuppressDefensiveAuth = true;
 
-    if (mConnectionBased) {
-        // Connection can be reset by the server in the meantime user is entering
-        // the credentials.  Result would be just a "Connection was reset" error.
-        // Hence, we drop the current regardless if the user would make it on time
-        // to provide credentials.
-        // It's OK to send the NTLM type 1 message (response to the plain "NTLM"
-        // challenge) on a new connection.
-        mAuthChannel->CloseStickyConnection();
-    }
-
     return rv;
 }
 
 NS_IMETHODIMP nsHttpChannelAuthProvider::OnAuthAvailable(nsISupports *aContext,
                                                          nsIAuthInformation *aAuthInfo)
 {
     LOG(("nsHttpChannelAuthProvider::OnAuthAvailable [this=%p channel=%p]",
         this, mAuthChannel));