Patrick McManus
13da862969
bug 1204614 - use h2 per stream flow control to deal with suspended channels r=hurley
2015-09-11 15:53:27 -04:00
Birunthan Mohanathas
a29151dc87
Bug 1182996 - Fix and add missing namespace comments. rs=ehsan
...
The bulk of this commit was generated by running:
run-clang-tidy.py \
-checks='-*,llvm-namespace-comment' \
-header-filter=^/.../mozilla-central/.* \
-fix
2015-07-13 08:25:42 -07:00
Andrea Marchesini
ad97ae68b8
Bug 1148527 - Indentation fix after bug 1145631, r=ehsan
2015-03-27 18:52:19 +00:00
Ehsan Akhgari
ea41d8de48
Bug 1145631 - Part 1: Replace MOZ_OVERRIDE and MOZ_FINAL with override and final in the tree; r=froydnj
...
This patch was automatically generated using the following script:
function convert() {
echo "Converting $1 to $2..."
find . \
! -wholename "*/.git*" \
! -wholename "obj-ff-dbg*" \
-type f \
\( -iname "*.cpp" \
-o -iname "*.h" \
-o -iname "*.c" \
-o -iname "*.cc" \
-o -iname "*.idl" \
-o -iname "*.ipdl" \
-o -iname "*.ipdlh" \
-o -iname "*.mm" \) | \
xargs -n 1 sed -i -e "s/\b$1\b/$2/g"
}
convert MOZ_OVERRIDE override
convert MOZ_FINAL final
2015-03-21 12:28:04 -04:00
Ehsan Akhgari
7943855e34
Bug 1117042 - Mark virtual overridden functions as MOZ_OVERRIDE in netwerk; r=mcmanus
2015-01-02 09:04:04 -05:00
Patrick McManus
30e70bb8f9
bug 1003448 - HTTP/2 Alternate Service and Opportunistic Security [2/2 necko] r=hurley
2014-08-21 10:50:17 -04:00
Patrick McManus
b6208f8bcb
Bug 354493 - revert Add nsINetworkZonePolicy to protect resources loaded from private IPs r=backout a=backout
2014-07-24 10:05:36 -04:00
Steve Workman
368b902162
Bug 354493 - Add nsINetworkZonePolicy to protect resources loaded from private IPs r=mcmanus
2014-07-17 11:08:20 -07:00
Patrick McManus
59df435113
bug 378637 part 13 - https proxying changes to casting and trans lifecycle r=hurley
2014-05-16 11:46:12 -04:00
Patrick McManus
c42552a198
bug 378637 part 12 - proxy over TLS (i.e. https proxying) r=hurley
2014-04-16 09:52:43 -04:00
Ryan VanderMeulen
9ee7c1593b
Backed out 11 changesets (bug 378637) for Android crashes.
...
Backed out changeset 2a607cddc4cb (bug 378637)
Backed out changeset e416503aea99 (bug 378637)
Backed out changeset b2257226899f (bug 378637)
Backed out changeset dafd618c3f52 (bug 378637)
Backed out changeset dfde9d47d8c4 (bug 378637)
Backed out changeset cf9de5c367a5 (bug 378637)
Backed out changeset 62aa68e8b499 (bug 378637)
Backed out changeset 38efa8f2e56e (bug 378637)
Backed out changeset 2b5753e09a92 (bug 378637)
Backed out changeset 7a73873e133d (bug 378637)
Backed out changeset f58ce7ac1c7f (bug 378637)
2014-05-09 15:25:55 -04:00
Patrick McManus
7c5417cb13
bug 378637 part 11 - proxy over TLS (i.e. https proxying) r=hurley
2014-04-16 09:52:43 -04:00
Patrick McManus
d93b7ba831
bug 957093 - namespace consistency for netwerk/protocol/http r=sworkman
2014-01-07 17:05:56 -05:00
Patrick McManus
c1f809cc7d
bug 790388 part 3 - spdy/3 server push r=hurley
2013-05-29 00:07:03 -04:00
Josh Matthews
c4ee11b542
Bug 812203 - Ensure we don't try to set security callbacks on missing connections. r=mayhemer
2012-11-17 13:27:01 +00:00
Josh Matthews
c88986c829
Bug 804655 - Part 2: Wrap up interface aggregator callbacks with a target thread on which they should be released. r=mayhemer
2012-11-14 16:00:44 +00:00
Josh Matthews
bb236b6062
Bug 804655 - Part 1: Make updating an nsHttpChannel's loadgroup/callbacks update those of its transaction and connection as well. r=mayhemer
2012-11-14 16:00:43 +00:00
Ehsan Akhgari
243c878d26
Bug 579517 - Part 1: Automated conversion of NSPR numeric types to stdint types in Gecko; r=bsmedberg
...
This patch was generated by a script. Here's the source of the script for
future reference:
function convert() {
echo "Converting $1 to $2..."
find . ! -wholename "*nsprpub*" \
! -wholename "*security/nss*" \
! -wholename "*/.hg*" \
! -wholename "obj-ff-dbg*" \
! -name nsXPCOMCID.h \
! -name prtypes.h \
-type f \
\( -iname "*.cpp" \
-o -iname "*.h" \
-o -iname "*.c" \
-o -iname "*.cc" \
-o -iname "*.idl" \
-o -iname "*.ipdl" \
-o -iname "*.ipdlh" \
-o -iname "*.mm" \) | \
xargs -n 1 sed -i -e "s/\b$1\b/$2/g"
}
convert PRInt8 int8_t
convert PRUint8 uint8_t
convert PRInt16 int16_t
convert PRUint16 uint16_t
convert PRInt32 int32_t
convert PRUint32 uint32_t
convert PRInt64 int64_t
convert PRUint64 uint64_t
convert PRIntn int
convert PRUintn unsigned
convert PRSize size_t
convert PROffset32 int32_t
convert PROffset64 int64_t
convert PRPtrdiff ptrdiff_t
convert PRFloat64 double
2012-08-22 11:56:38 -04:00
Aryeh Gregor
8b4a23fc4c
Bug 777292 part 2 - Change all nsnull to nullptr
2012-07-30 17:20:58 +03:00
Patrick McManus
56a0c93679
bug 757882 replace 250+ lines of redundant nsAHttpConnection implementations with macros r=jduell
2012-05-25 17:56:41 -04:00
Gervase Markham
cb6a072c2a
Bug 716478 - update licence to MPL 2.
2012-05-21 12:12:37 +01:00
Patrick McManus
c9e9cca669
bug 752648 - fix regression with restarting due to tls intolerance r=honzab
2012-05-14 13:25:28 -04:00
Patrick McManus
36d5f8f033
bug 742935: fix landing problem with 603512 r=honzab
2012-04-09 10:21:17 -04:00
Patrick McManus
4187cc4bd6
bug 603512 - large objects block pipelines r=honzab
...
the type and state patch tries hard not to form pipelines behind resources that
could become head of line blockers. But of course that requires the ability to
predict the future, and won't be perfect.
This patch reacts to a transaction that has a large response body (defined by
either a large content-length header or actually reading a large number of
chunked bytes) by cancelling any transactions that have been pipelined down the
same connection and rescheduling them elsewhere. It also changes the type of
the connection to "solo", which prevents new transactions from being pipelined
onto this one and provides class-specific negative feedback to the pipeline
manager so that near-future requests to the same host of the same type (e.g.
general) will not be pipelined but other types (e.g. img or js/css) can still
do that.
Content-Length is ideal, because it allows us to identify the problem so early.
But even actually reading the document for a fairly long time gives it a fairly
high probability of not ending soon. (i.e. long document sizes are spread over
a larger range than small ones. duh.)
The pref network.http.pipelining.maxsize controls the threshold. I set the
default at 300KB, which is roughly the bandwidth delay product of a 2mbit 120ms
rtt connection and 1 rtt is mostly what you are giving up by canceling it on
one connection and sending it on another. (modulo maybe needing a handshake).
2012-03-22 19:39:31 -04:00
Patrick McManus
048047f5f0
bug 447866 http pipelining is bursty r=honzab
2012-03-22 19:39:31 -04:00
Patrick McManus
d800668388
bug 708415 spdysession review comments r=honzab
2012-01-26 00:15:26 -05:00
Patrick McManus
128aa03e76
bug 528288 - reland spdy after libxul weightloss a=khuey CLOSED TREE
2011-12-13 10:55:50 -05:00
Ed Morley
e1230df916
Backout SPDY to keep us under the MSVC virtual address space limit during win PGO builds (bug 709193)
...
Backs out 952d14a9e508 (bug 707173), c170c678c9ac (bug 708305), 0a5f66d5d8e4 (bug 707662), 3204b70435fe (bug 706236) and the main landing range 48807fde0339:0bd45ead1676 (bug 528288).
2011-12-10 22:36:26 +00:00
Patrick McManus
4ade0830ac
bug 528222 Basic SPDY web transport support. r=honzab r=bsmith sr=biesi
...
patch 0
2011-12-02 10:28:56 -05:00
Patrick McManus
16b9ee1ab9
bug 671875 pipeline transport event fixups r=honzab
2011-12-01 09:19:41 -05:00
Michael Wu
0fe7772ece
Bug 675553 - Switch from PRBool to bool on a CLOSED TREE , r=bsmedberg,khuey,bz,cjones
2011-09-28 23:19:26 -07:00
Patrick McManus
057d9b2801
bugzilla 640213 Implement RFC 2616 "Upgrade" (Section 14.42) r=biesi sr=bz
2011-05-19 19:43:37 -04:00
Phil Ringnalda
d1ce898fd9
Back out 40d44ce2377e (bug 640213) on suspicion of causing Windows crashes and timeouts in media tests
2011-05-14 20:13:57 -07:00
Patrick McManus
0d44042e98
Bug 640213 - Implement HTTP 2616 Upgrade. r=biesi, sr=bz.
2011-05-14 18:55:54 +01:00
Patrick McManus
df2c4d6aaf
bugzilla 595316 remove static cast of nsAHttp* objs r=honzab
2011-04-08 14:37:16 -04:00
Patrick McManus
1986f956e3
bug 628832 - fix regression in http/0.9 detection from 363109; r=zbarsky a=blocking-2.0
...
* instead of making (dis)-allow 0.9 a property of connection info,
work off a state machine that engages in the liberal skipping of
junk before response headers only immediately after a no-content
response on the same connection.
* when scanning for response headers in a large amount of junk place a
non infinite limit on that (128KB).. the only known use case for
this is skipping illegal message bodies in 304's and those just
aren't that big.
2011-01-27 13:34:39 -05:00
Mitchell Field
bc63774d7e
Bug 542222 - Reduce recursion in netwerk makefiles.
2010-06-05 21:18:12 -04:00