Commit Graph

57 Commits

Author SHA1 Message Date
Birunthan Mohanathas
a29151dc87 Bug 1182996 - Fix and add missing namespace comments. rs=ehsan
The bulk of this commit was generated by running:

  run-clang-tidy.py \
    -checks='-*,llvm-namespace-comment' \
    -header-filter=^/.../mozilla-central/.* \
    -fix
2015-07-13 08:25:42 -07:00
Eric Rahm
900b3ebc4d Bug 1165515 - Part 13-2: Replace usage of PRLogModuleLevel and PR_LOG_*. rs=froydnj
This is straightforward mapping of PR_LOG levels to their LogLevel
counterparts:
  PR_LOG_ERROR   -> LogLevel::Error
  PR_LOG_WARNING -> LogLevel::Warning
  PR_LOG_WARN    -> LogLevel::Warning
  PR_LOG_INFO    -> LogLevel::Info
  PR_LOG_DEBUG   -> LogLevel::Debug
  PR_LOG_NOTICE  -> LogLevel::Debug
  PR_LOG_VERBOSE -> LogLevel::Verbose

Instances of PRLogModuleLevel were mapped to a fully qualified
mozilla::LogLevel, instances of PR_LOG levels in #defines were mapped to a
fully qualified mozilla::LogLevel::* level, and all other instances were
mapped to us a shorter format of LogLevel::*.

Bustage for usage of the non-fully qualified LogLevel were fixed by adding
|using mozilla::LogLevel;| where appropriate.
2015-06-03 15:25:57 -07:00
Eric Rahm
3e723153f7 Bug 1165515 - Part 9: Remove instances of using numeric log levels 1-5. rs=froydnj 2015-06-03 15:22:35 -07:00
Carsten "Tomcat" Book
89becff57d Backed out 14 changesets (bug 1165515) for linux x64 e10s m2 test failures
Backed out changeset d68dcf2ef372 (bug 1165515)
Backed out changeset 7c3b45a47811 (bug 1165515)
Backed out changeset b668b617bef2 (bug 1165515)
Backed out changeset d0916e1283a2 (bug 1165515)
Backed out changeset ac4dc7489942 (bug 1165515)
Backed out changeset e9632ce8bc65 (bug 1165515)
Backed out changeset c16d215cc7e4 (bug 1165515)
Backed out changeset e4d474f3c51a (bug 1165515)
Backed out changeset d87680bf9f7c (bug 1165515)
Backed out changeset b3c0a45ba99e (bug 1165515)
Backed out changeset 9370fa197674 (bug 1165515)
Backed out changeset 50970d668ca1 (bug 1165515)
Backed out changeset ffa4eb6d24b9 (bug 1165515)
Backed out changeset 5fcf1203cc1d (bug 1165515)
2015-06-02 13:05:56 +02:00
Eric Rahm
f5003d5120 Bug 1165515 - Part 13-2: Replace usage of PRLogModuleLevel and PR_LOG_*. rs=froydnj
This is straightforward mapping of PR_LOG levels to their LogLevel
counterparts:
  PR_LOG_ERROR   -> LogLevel::Error
  PR_LOG_WARNING -> LogLevel::Warning
  PR_LOG_WARN    -> LogLevel::Warning
  PR_LOG_INFO    -> LogLevel::Info
  PR_LOG_DEBUG   -> LogLevel::Debug
  PR_LOG_NOTICE  -> LogLevel::Debug
  PR_LOG_VERBOSE -> LogLevel::Verbose

Instances of PRLogModuleLevel were mapped to a fully qualified
mozilla::LogLevel, instances of PR_LOG levels in #defines were mapped to a
fully qualified mozilla::LogLevel::* level, and all other instances were
mapped to us a shorter format of LogLevel::*.

Bustage for usage of the non-fully qualified LogLevel were fixed by adding
|using mozilla::LogLevel;| where appropriate.
2015-06-01 22:17:33 -07:00
Eric Rahm
9b77f0527c Bug 1165515 - Part 9: Remove instances of using numeric log levels 1-5. rs=froydnj 2015-06-01 22:17:26 -07:00
Wes Kocher
2a7ed059f1 Backed out 14 changesets (bug 1165515) for b2g mochitest-6 permafail CLOSED TREE
Backed out changeset 9b97e2aa2ed9 (bug 1165515)
Backed out changeset 150606c022a2 (bug 1165515)
Backed out changeset 4e875a488349 (bug 1165515)
Backed out changeset 467e7feeb546 (bug 1165515)
Backed out changeset d6b6cc373197 (bug 1165515)
Backed out changeset 0615265b593c (bug 1165515)
Backed out changeset fafd1dce9f08 (bug 1165515)
Backed out changeset d1df869245f9 (bug 1165515)
Backed out changeset 6876a7c63611 (bug 1165515)
Backed out changeset b7841c94a9a3 (bug 1165515)
Backed out changeset e5e3617f7c73 (bug 1165515)
Backed out changeset 39be3db95978 (bug 1165515)
Backed out changeset 0ec74176f8de (bug 1165515)
Backed out changeset 5b928dd10d71 (bug 1165515)
2015-06-01 17:57:58 -07:00
Eric Rahm
0baf91e33f Bug 1165515 - Part 13-2: Replace usage of PRLogModuleLevel and PR_LOG_*. rs=froydnj
This is straightforward mapping of PR_LOG levels to their LogLevel
counterparts:
  PR_LOG_ERROR   -> LogLevel::Error
  PR_LOG_WARNING -> LogLevel::Warning
  PR_LOG_WARN    -> LogLevel::Warning
  PR_LOG_INFO    -> LogLevel::Info
  PR_LOG_DEBUG   -> LogLevel::Debug
  PR_LOG_NOTICE  -> LogLevel::Debug
  PR_LOG_VERBOSE -> LogLevel::Verbose

Instances of PRLogModuleLevel were mapped to a fully qualified
mozilla::LogLevel, instances of PR_LOG levels in #defines were mapped to a
fully qualified mozilla::LogLevel::* level, and all other instances were
mapped to us a shorter format of LogLevel::*.

Bustage for usage of the non-fully qualified LogLevel were fixed by adding
|using mozilla::LogLevel;| where appropriate.
2015-06-01 14:31:01 -07:00
Eric Rahm
d1d9bb5fb0 Bug 1165515 - Part 9: Remove instances of using numeric log levels 1-5. rs=froydnj 2015-06-01 14:31:00 -07:00
Ehsan Akhgari
e8c86479b9 Bug 1168208 - Refactor the existing logic for syncing the security info between Response and channel objects into a new helper class; r=nsm,jdm,bkelly 2015-05-27 14:22:53 -04:00
Carsten "Tomcat" Book
c58dbca945 Backed out changeset ae9c77fa58d1 (bug 1168208) for bustage on a CLOSED TREE 2015-05-27 14:50:43 +02:00
Ehsan Akhgari
f770eb78bf Bug 1168208 - Refactor the existing logic for syncing the security info between Response and channel objects into a new helper class; r=nsm,jdm,bkelly 2015-05-27 08:25:03 -04:00
Eric Rahm
5b59cf4e0b Bug 1165515 - Part 1: Convert PR_LOG to MOZ_LOG. r=froydnj 2015-05-21 13:22:04 -07:00
Patrick McManus
0d2c0e891e bug 1153212 - 2/2 Necko explicitly track origin vs routed host and give psm only origin r=dkeeler r=hurley IGNORE IDL
Allow necko to simultaneously track the dual concept of routed host
and origin (authenticated host). The origin is given to the socket
provider and the routed host is inserted at DNS lookup time as if it
were a SRV or CNAME.
2015-04-09 11:31:59 -04:00
Patrick McManus
5f2fead9ba bug 1153212 - 1/2 revert 90d6a38931fa to make room for better fix r=backout 2015-05-07 13:16:26 -04:00
Patrick McManus
fce968fc71 bug 1153212 - Alt-Svc Fixes r=dkeeler r=hurley 2015-04-13 17:11:59 -04:00
Patrick McManus
8c1be69bce Bug 1154068 - rename relaxed to insecure scheme and add more runtime checks r=hurley
we used the term relaxed for http:// over tls; but someitmes we also
enforced the authentication if alt-svc changed the host involved. That
was all done correctly but the term relaxed wasn't very accurate in
those cases.

For clarity rename "relaxed" to be "insecureScheme". Also add a
runtime check (with debug assert) to paths to enforce that bit isn't
set where it shouldn't be (it isn't known to be).
2015-04-06 17:30:29 -04:00
Henry Chang
c70ec57ff4 Bug 1053650 - Part 2: Populate networkInterfaceId to SocketTransport. r=mcmanus 2015-04-07 11:45:57 -04:00
Patrick McManus
8a829824a9 bug 1130874 - update h2 alternate service extension to draft-06 r=hurley 2015-02-06 17:45:05 -05:00
Patrick McManus
ccdf3f12e1 Bug 1082039 - nsIHttpChannelInternal.allowSpdy is racy r=hurley 2014-10-13 12:40:45 -04:00
Carsten "Tomcat" Book
fca5a61285 Backed out changeset d9026e7165e8 (bug 1082039) for webapp 4 test failures 2014-10-23 14:52:32 +02:00
Patrick McManus
cdc62071cb bug 1082039 - nsIHttpChannelInternal.allowSpdy is racy r=hurley 2014-10-13 12:40:45 -04:00
Patrick McManus
30e70bb8f9 bug 1003448 - HTTP/2 Alternate Service and Opportunistic Security [2/2 necko] r=hurley 2014-08-21 10:50:17 -04:00
Benoit Jacob
5e533adf74 Bug 1027251 - Fix or whitelist dangerous public destructors in netwerk/ - r=mcmanus 2014-06-20 07:08:24 -04:00
Patrick McManus
c42552a198 bug 378637 part 12 - proxy over TLS (i.e. https proxying) r=hurley 2014-04-16 09:52:43 -04:00
Patrick McManus
ed1caf1722 bug 378637 part 9 - https proxy info added to connection info and reqeuest head r=hurley 2014-04-16 09:23:20 -04:00
Ryan VanderMeulen
9ee7c1593b Backed out 11 changesets (bug 378637) for Android crashes.
Backed out changeset 2a607cddc4cb (bug 378637)
Backed out changeset e416503aea99 (bug 378637)
Backed out changeset b2257226899f (bug 378637)
Backed out changeset dafd618c3f52 (bug 378637)
Backed out changeset dfde9d47d8c4 (bug 378637)
Backed out changeset cf9de5c367a5 (bug 378637)
Backed out changeset 62aa68e8b499 (bug 378637)
Backed out changeset 38efa8f2e56e (bug 378637)
Backed out changeset 2b5753e09a92 (bug 378637)
Backed out changeset 7a73873e133d (bug 378637)
Backed out changeset f58ce7ac1c7f (bug 378637)
2014-05-09 15:25:55 -04:00
Patrick McManus
7c5417cb13 bug 378637 part 11 - proxy over TLS (i.e. https proxying) r=hurley 2014-04-16 09:52:43 -04:00
Patrick McManus
85890aeefd bug 378637 part 8 - https proxy info added to connection info and reqeuest head r=hurley 2014-04-16 09:23:20 -04:00
R Kent James
324efa34ed Bug 698730 - Add username to connection cache hash so NTLM gets correct connection, r=mcmanus 2014-04-26 12:01:39 -07:00
Patrick McManus
d93b7ba831 bug 957093 - namespace consistency for netwerk/protocol/http r=sworkman 2014-01-07 17:05:56 -05:00
Patrick McManus
cb277bb69d bug 956890 - nshttpconnectioninfo should use ns_inline_decl_refcounting r=sworkman 2014-01-06 16:58:48 -05:00
Steve Workman
9eeca403bf Bug 853423 - Block speculative connections for local IP addresses r=mcmanus 2013-11-10 22:59:40 -08:00
Ehsan Akhgari
deb5a6a21b Bug 919320 - Minimize the #includes in netwerk/protocol; r=mcmanus 2013-09-22 23:35:52 -04:00
Joshua Cranmer
2bde801f36 Bug 884061 - Part 3q: Use NS_DECL_THREADSAFE_ISUPPORTS in netwerk/, r=macmanus 2013-07-18 21:24:13 -05:00
Jason Duell
1c8005d335 Bug 558623 - Split out HTTP LOG macro definition from nsHttp.h r=jdm 2013-06-22 09:01:06 -07:00
Patrick McManus
8b9ed05d20 bug 871289 [2 of 2] fix trailing whitespace in netwerk/protocol/http/* r=jduell 2013-05-16 09:30:42 -04:00
Patrick McManus
770e4a7ad9 bug 790321 - dont coalesce spdy hosts with socks proxy r=honzab 2012-10-27 15:24:19 -04:00
Ehsan Akhgari
243c878d26 Bug 579517 - Part 1: Automated conversion of NSPR numeric types to stdint types in Gecko; r=bsmedberg
This patch was generated by a script.  Here's the source of the script for
future reference:

function convert() {
echo "Converting $1 to $2..."
find . ! -wholename "*nsprpub*" \
       ! -wholename "*security/nss*" \
       ! -wholename "*/.hg*" \
       ! -wholename "obj-ff-dbg*" \
       ! -name nsXPCOMCID.h \
       ! -name prtypes.h \
         -type f \
      \( -iname "*.cpp" \
         -o -iname "*.h" \
         -o -iname "*.c" \
         -o -iname "*.cc" \
         -o -iname "*.idl" \
         -o -iname "*.ipdl" \
         -o -iname "*.ipdlh" \
         -o -iname "*.mm" \) | \
    xargs -n 1 sed -i -e "s/\b$1\b/$2/g"
}

convert PRInt8 int8_t
convert PRUint8 uint8_t
convert PRInt16 int16_t
convert PRUint16 uint16_t
convert PRInt32 int32_t
convert PRUint32 uint32_t
convert PRInt64 int64_t
convert PRUint64 uint64_t

convert PRIntn int
convert PRUintn unsigned

convert PRSize size_t

convert PROffset32 int32_t
convert PROffset64 int64_t

convert PRPtrdiff ptrdiff_t

convert PRFloat64 double
2012-08-22 11:56:38 -04:00
Aryeh Gregor
8b4a23fc4c Bug 777292 part 2 - Change all nsnull to nullptr 2012-07-30 17:20:58 +03:00
Jason Duell
b89875384b Bug 713026 - websockets bootstrap via proxy should always CONNECT. r=mcmanus 2012-06-18 22:50:20 -07:00
Josh Matthews
65aa9270f6 Bug 722845 - Part 1: Add private browsing information to HTTP channels. r=jduell,mayhemer 2012-05-24 16:31:53 +01:00
Gervase Markham
cb6a072c2a Bug 716478 - update licence to MPL 2. 2012-05-21 12:12:37 +01:00
Patrick McManus
7b89aa5681 bug 729133 - internal necko speculative connections r=honzab
race cache I/O events against TCP/SSL connections. Also drive
unused TCP connections to the completion of their SSL handshakes is
apropos.
2012-04-25 08:54:42 -04:00
Patrick McManus
fe31432cfb bug 599164 pipeline with type and state r=honzab 2012-03-22 19:39:31 -04:00
Patrick McManus
850582271a bug 597684 Implement HTTP Assoc-req and Banned Pipelines on nsHttpConnectionInfo r=honzab 2012-03-22 19:39:31 -04:00
Patrick McManus
048047f5f0 bug 447866 http pipelining is bursty r=honzab 2012-03-22 19:39:31 -04:00
Patrick McManus
128aa03e76 bug 528288 - reland spdy after libxul weightloss a=khuey CLOSED TREE 2011-12-13 10:55:50 -05:00
Ed Morley
e1230df916 Backout SPDY to keep us under the MSVC virtual address space limit during win PGO builds (bug 709193)
Backs out 952d14a9e508 (bug 707173), c170c678c9ac (bug 708305), 0a5f66d5d8e4 (bug 707662), 3204b70435fe (bug 706236) and the main landing range 48807fde0339:0bd45ead1676 (bug 528288).
2011-12-10 22:36:26 +00:00
Patrick McManus
ae474353b4 bug 528288 spdy - when coalescing hosts use anonymous flag as part of hash key r=honzab
patch 10
2011-12-02 10:28:57 -05:00