Birunthan Mohanathas
a29151dc87
Bug 1182996 - Fix and add missing namespace comments. rs=ehsan
...
The bulk of this commit was generated by running:
run-clang-tidy.py \
-checks='-*,llvm-namespace-comment' \
-header-filter=^/.../mozilla-central/.* \
-fix
2015-07-13 08:25:42 -07:00
Eric Rahm
900b3ebc4d
Bug 1165515 - Part 13-2: Replace usage of PRLogModuleLevel and PR_LOG_*. rs=froydnj
...
This is straightforward mapping of PR_LOG levels to their LogLevel
counterparts:
PR_LOG_ERROR -> LogLevel::Error
PR_LOG_WARNING -> LogLevel::Warning
PR_LOG_WARN -> LogLevel::Warning
PR_LOG_INFO -> LogLevel::Info
PR_LOG_DEBUG -> LogLevel::Debug
PR_LOG_NOTICE -> LogLevel::Debug
PR_LOG_VERBOSE -> LogLevel::Verbose
Instances of PRLogModuleLevel were mapped to a fully qualified
mozilla::LogLevel, instances of PR_LOG levels in #defines were mapped to a
fully qualified mozilla::LogLevel::* level, and all other instances were
mapped to us a shorter format of LogLevel::*.
Bustage for usage of the non-fully qualified LogLevel were fixed by adding
|using mozilla::LogLevel;| where appropriate.
2015-06-03 15:25:57 -07:00
Eric Rahm
3e723153f7
Bug 1165515 - Part 9: Remove instances of using numeric log levels 1-5. rs=froydnj
2015-06-03 15:22:35 -07:00
Carsten "Tomcat" Book
89becff57d
Backed out 14 changesets (bug 1165515) for linux x64 e10s m2 test failures
...
Backed out changeset d68dcf2ef372 (bug 1165515)
Backed out changeset 7c3b45a47811 (bug 1165515)
Backed out changeset b668b617bef2 (bug 1165515)
Backed out changeset d0916e1283a2 (bug 1165515)
Backed out changeset ac4dc7489942 (bug 1165515)
Backed out changeset e9632ce8bc65 (bug 1165515)
Backed out changeset c16d215cc7e4 (bug 1165515)
Backed out changeset e4d474f3c51a (bug 1165515)
Backed out changeset d87680bf9f7c (bug 1165515)
Backed out changeset b3c0a45ba99e (bug 1165515)
Backed out changeset 9370fa197674 (bug 1165515)
Backed out changeset 50970d668ca1 (bug 1165515)
Backed out changeset ffa4eb6d24b9 (bug 1165515)
Backed out changeset 5fcf1203cc1d (bug 1165515)
2015-06-02 13:05:56 +02:00
Eric Rahm
f5003d5120
Bug 1165515 - Part 13-2: Replace usage of PRLogModuleLevel and PR_LOG_*. rs=froydnj
...
This is straightforward mapping of PR_LOG levels to their LogLevel
counterparts:
PR_LOG_ERROR -> LogLevel::Error
PR_LOG_WARNING -> LogLevel::Warning
PR_LOG_WARN -> LogLevel::Warning
PR_LOG_INFO -> LogLevel::Info
PR_LOG_DEBUG -> LogLevel::Debug
PR_LOG_NOTICE -> LogLevel::Debug
PR_LOG_VERBOSE -> LogLevel::Verbose
Instances of PRLogModuleLevel were mapped to a fully qualified
mozilla::LogLevel, instances of PR_LOG levels in #defines were mapped to a
fully qualified mozilla::LogLevel::* level, and all other instances were
mapped to us a shorter format of LogLevel::*.
Bustage for usage of the non-fully qualified LogLevel were fixed by adding
|using mozilla::LogLevel;| where appropriate.
2015-06-01 22:17:33 -07:00
Eric Rahm
9b77f0527c
Bug 1165515 - Part 9: Remove instances of using numeric log levels 1-5. rs=froydnj
2015-06-01 22:17:26 -07:00
Wes Kocher
2a7ed059f1
Backed out 14 changesets (bug 1165515) for b2g mochitest-6 permafail CLOSED TREE
...
Backed out changeset 9b97e2aa2ed9 (bug 1165515)
Backed out changeset 150606c022a2 (bug 1165515)
Backed out changeset 4e875a488349 (bug 1165515)
Backed out changeset 467e7feeb546 (bug 1165515)
Backed out changeset d6b6cc373197 (bug 1165515)
Backed out changeset 0615265b593c (bug 1165515)
Backed out changeset fafd1dce9f08 (bug 1165515)
Backed out changeset d1df869245f9 (bug 1165515)
Backed out changeset 6876a7c63611 (bug 1165515)
Backed out changeset b7841c94a9a3 (bug 1165515)
Backed out changeset e5e3617f7c73 (bug 1165515)
Backed out changeset 39be3db95978 (bug 1165515)
Backed out changeset 0ec74176f8de (bug 1165515)
Backed out changeset 5b928dd10d71 (bug 1165515)
2015-06-01 17:57:58 -07:00
Eric Rahm
0baf91e33f
Bug 1165515 - Part 13-2: Replace usage of PRLogModuleLevel and PR_LOG_*. rs=froydnj
...
This is straightforward mapping of PR_LOG levels to their LogLevel
counterparts:
PR_LOG_ERROR -> LogLevel::Error
PR_LOG_WARNING -> LogLevel::Warning
PR_LOG_WARN -> LogLevel::Warning
PR_LOG_INFO -> LogLevel::Info
PR_LOG_DEBUG -> LogLevel::Debug
PR_LOG_NOTICE -> LogLevel::Debug
PR_LOG_VERBOSE -> LogLevel::Verbose
Instances of PRLogModuleLevel were mapped to a fully qualified
mozilla::LogLevel, instances of PR_LOG levels in #defines were mapped to a
fully qualified mozilla::LogLevel::* level, and all other instances were
mapped to us a shorter format of LogLevel::*.
Bustage for usage of the non-fully qualified LogLevel were fixed by adding
|using mozilla::LogLevel;| where appropriate.
2015-06-01 14:31:01 -07:00
Eric Rahm
d1d9bb5fb0
Bug 1165515 - Part 9: Remove instances of using numeric log levels 1-5. rs=froydnj
2015-06-01 14:31:00 -07:00
Ehsan Akhgari
e8c86479b9
Bug 1168208 - Refactor the existing logic for syncing the security info between Response and channel objects into a new helper class; r=nsm,jdm,bkelly
2015-05-27 14:22:53 -04:00
Carsten "Tomcat" Book
c58dbca945
Backed out changeset ae9c77fa58d1 (bug 1168208) for bustage on a CLOSED TREE
2015-05-27 14:50:43 +02:00
Ehsan Akhgari
f770eb78bf
Bug 1168208 - Refactor the existing logic for syncing the security info between Response and channel objects into a new helper class; r=nsm,jdm,bkelly
2015-05-27 08:25:03 -04:00
Eric Rahm
5b59cf4e0b
Bug 1165515 - Part 1: Convert PR_LOG to MOZ_LOG. r=froydnj
2015-05-21 13:22:04 -07:00
Patrick McManus
0d2c0e891e
bug 1153212 - 2/2 Necko explicitly track origin vs routed host and give psm only origin r=dkeeler r=hurley IGNORE IDL
...
Allow necko to simultaneously track the dual concept of routed host
and origin (authenticated host). The origin is given to the socket
provider and the routed host is inserted at DNS lookup time as if it
were a SRV or CNAME.
2015-04-09 11:31:59 -04:00
Patrick McManus
5f2fead9ba
bug 1153212 - 1/2 revert 90d6a38931fa to make room for better fix r=backout
2015-05-07 13:16:26 -04:00
Patrick McManus
fce968fc71
bug 1153212 - Alt-Svc Fixes r=dkeeler r=hurley
2015-04-13 17:11:59 -04:00
Patrick McManus
8c1be69bce
Bug 1154068 - rename relaxed to insecure scheme and add more runtime checks r=hurley
...
we used the term relaxed for http:// over tls; but someitmes we also
enforced the authentication if alt-svc changed the host involved. That
was all done correctly but the term relaxed wasn't very accurate in
those cases.
For clarity rename "relaxed" to be "insecureScheme". Also add a
runtime check (with debug assert) to paths to enforce that bit isn't
set where it shouldn't be (it isn't known to be).
2015-04-06 17:30:29 -04:00
Henry Chang
c70ec57ff4
Bug 1053650 - Part 2: Populate networkInterfaceId to SocketTransport. r=mcmanus
2015-04-07 11:45:57 -04:00
Patrick McManus
8a829824a9
bug 1130874 - update h2 alternate service extension to draft-06 r=hurley
2015-02-06 17:45:05 -05:00
Patrick McManus
ccdf3f12e1
Bug 1082039 - nsIHttpChannelInternal.allowSpdy is racy r=hurley
2014-10-13 12:40:45 -04:00
Carsten "Tomcat" Book
fca5a61285
Backed out changeset d9026e7165e8 (bug 1082039) for webapp 4 test failures
2014-10-23 14:52:32 +02:00
Patrick McManus
cdc62071cb
bug 1082039 - nsIHttpChannelInternal.allowSpdy is racy r=hurley
2014-10-13 12:40:45 -04:00
Patrick McManus
30e70bb8f9
bug 1003448 - HTTP/2 Alternate Service and Opportunistic Security [2/2 necko] r=hurley
2014-08-21 10:50:17 -04:00
Benoit Jacob
5e533adf74
Bug 1027251 - Fix or whitelist dangerous public destructors in netwerk/ - r=mcmanus
2014-06-20 07:08:24 -04:00
Patrick McManus
c42552a198
bug 378637 part 12 - proxy over TLS (i.e. https proxying) r=hurley
2014-04-16 09:52:43 -04:00
Patrick McManus
ed1caf1722
bug 378637 part 9 - https proxy info added to connection info and reqeuest head r=hurley
2014-04-16 09:23:20 -04:00
Ryan VanderMeulen
9ee7c1593b
Backed out 11 changesets (bug 378637) for Android crashes.
...
Backed out changeset 2a607cddc4cb (bug 378637)
Backed out changeset e416503aea99 (bug 378637)
Backed out changeset b2257226899f (bug 378637)
Backed out changeset dafd618c3f52 (bug 378637)
Backed out changeset dfde9d47d8c4 (bug 378637)
Backed out changeset cf9de5c367a5 (bug 378637)
Backed out changeset 62aa68e8b499 (bug 378637)
Backed out changeset 38efa8f2e56e (bug 378637)
Backed out changeset 2b5753e09a92 (bug 378637)
Backed out changeset 7a73873e133d (bug 378637)
Backed out changeset f58ce7ac1c7f (bug 378637)
2014-05-09 15:25:55 -04:00
Patrick McManus
7c5417cb13
bug 378637 part 11 - proxy over TLS (i.e. https proxying) r=hurley
2014-04-16 09:52:43 -04:00
Patrick McManus
85890aeefd
bug 378637 part 8 - https proxy info added to connection info and reqeuest head r=hurley
2014-04-16 09:23:20 -04:00
R Kent James
324efa34ed
Bug 698730 - Add username to connection cache hash so NTLM gets correct connection, r=mcmanus
2014-04-26 12:01:39 -07:00
Patrick McManus
d93b7ba831
bug 957093 - namespace consistency for netwerk/protocol/http r=sworkman
2014-01-07 17:05:56 -05:00
Patrick McManus
cb277bb69d
bug 956890 - nshttpconnectioninfo should use ns_inline_decl_refcounting r=sworkman
2014-01-06 16:58:48 -05:00
Steve Workman
9eeca403bf
Bug 853423 - Block speculative connections for local IP addresses r=mcmanus
2013-11-10 22:59:40 -08:00
Ehsan Akhgari
deb5a6a21b
Bug 919320 - Minimize the #includes in netwerk/protocol; r=mcmanus
2013-09-22 23:35:52 -04:00
Joshua Cranmer
2bde801f36
Bug 884061 - Part 3q: Use NS_DECL_THREADSAFE_ISUPPORTS in netwerk/, r=macmanus
2013-07-18 21:24:13 -05:00
Jason Duell
1c8005d335
Bug 558623 - Split out HTTP LOG macro definition from nsHttp.h r=jdm
2013-06-22 09:01:06 -07:00
Patrick McManus
8b9ed05d20
bug 871289 [2 of 2] fix trailing whitespace in netwerk/protocol/http/* r=jduell
2013-05-16 09:30:42 -04:00
Patrick McManus
770e4a7ad9
bug 790321 - dont coalesce spdy hosts with socks proxy r=honzab
2012-10-27 15:24:19 -04:00
Ehsan Akhgari
243c878d26
Bug 579517 - Part 1: Automated conversion of NSPR numeric types to stdint types in Gecko; r=bsmedberg
...
This patch was generated by a script. Here's the source of the script for
future reference:
function convert() {
echo "Converting $1 to $2..."
find . ! -wholename "*nsprpub*" \
! -wholename "*security/nss*" \
! -wholename "*/.hg*" \
! -wholename "obj-ff-dbg*" \
! -name nsXPCOMCID.h \
! -name prtypes.h \
-type f \
\( -iname "*.cpp" \
-o -iname "*.h" \
-o -iname "*.c" \
-o -iname "*.cc" \
-o -iname "*.idl" \
-o -iname "*.ipdl" \
-o -iname "*.ipdlh" \
-o -iname "*.mm" \) | \
xargs -n 1 sed -i -e "s/\b$1\b/$2/g"
}
convert PRInt8 int8_t
convert PRUint8 uint8_t
convert PRInt16 int16_t
convert PRUint16 uint16_t
convert PRInt32 int32_t
convert PRUint32 uint32_t
convert PRInt64 int64_t
convert PRUint64 uint64_t
convert PRIntn int
convert PRUintn unsigned
convert PRSize size_t
convert PROffset32 int32_t
convert PROffset64 int64_t
convert PRPtrdiff ptrdiff_t
convert PRFloat64 double
2012-08-22 11:56:38 -04:00
Aryeh Gregor
8b4a23fc4c
Bug 777292 part 2 - Change all nsnull to nullptr
2012-07-30 17:20:58 +03:00
Jason Duell
b89875384b
Bug 713026 - websockets bootstrap via proxy should always CONNECT. r=mcmanus
2012-06-18 22:50:20 -07:00
Josh Matthews
65aa9270f6
Bug 722845 - Part 1: Add private browsing information to HTTP channels. r=jduell,mayhemer
2012-05-24 16:31:53 +01:00
Gervase Markham
cb6a072c2a
Bug 716478 - update licence to MPL 2.
2012-05-21 12:12:37 +01:00
Patrick McManus
7b89aa5681
bug 729133 - internal necko speculative connections r=honzab
...
race cache I/O events against TCP/SSL connections. Also drive
unused TCP connections to the completion of their SSL handshakes is
apropos.
2012-04-25 08:54:42 -04:00
Patrick McManus
fe31432cfb
bug 599164 pipeline with type and state r=honzab
2012-03-22 19:39:31 -04:00
Patrick McManus
850582271a
bug 597684 Implement HTTP Assoc-req and Banned Pipelines on nsHttpConnectionInfo r=honzab
2012-03-22 19:39:31 -04:00
Patrick McManus
048047f5f0
bug 447866 http pipelining is bursty r=honzab
2012-03-22 19:39:31 -04:00
Patrick McManus
128aa03e76
bug 528288 - reland spdy after libxul weightloss a=khuey CLOSED TREE
2011-12-13 10:55:50 -05:00
Ed Morley
e1230df916
Backout SPDY to keep us under the MSVC virtual address space limit during win PGO builds (bug 709193)
...
Backs out 952d14a9e508 (bug 707173), c170c678c9ac (bug 708305), 0a5f66d5d8e4 (bug 707662), 3204b70435fe (bug 706236) and the main landing range 48807fde0339:0bd45ead1676 (bug 528288).
2011-12-10 22:36:26 +00:00
Patrick McManus
ae474353b4
bug 528288 spdy - when coalescing hosts use anonymous flag as part of hash key r=honzab
...
patch 10
2011-12-02 10:28:57 -05:00