Commit Graph

670 Commits

Author SHA1 Message Date
Patrick McManus
cdc92cbfa8 bug 729133 - internal necko speculative connections r=honzab
race cache I/O events against TCP/SSL connections. Also drive
unused TCP connections to the completion of their SSL handshakes is
apropos.
2012-04-25 08:54:42 -04:00
Andrew Sutherland
f128a13798 Bug 717242, r=mcmanus 2012-04-25 14:50:20 +02:00
Patrick Wong
30fd6e9e6a Bug 745659 - Removed the nsPrintfCString constructor which takes a length and all corresponding instances that call that particular constructor. This is accomplished by removing the length component from the instantiation. r=jlebar 2012-04-24 14:43:00 -04:00
Patrick McManus
fec2a5c2d2 bug 746731 - nsHttpConnection::mIdleTimeout initialization fixes r=honzab 2012-04-24 15:12:06 -04:00
Patrick McManus
9d41be7518 bug 745379 - mistake in spdy/2 spec reversed actual priority values r=honzab 2012-04-15 13:11:23 -04:00
Patrick McManus
652e0400e5 bug 744788 - add httpconnmgrtick setTarget() in case of offline/online r=honzab 2012-04-13 15:47:43 -04:00
Ms2ger
945ee00ec1 Bug 605180 - Fix build warnings in netwerk/. r=jduell 2012-04-07 14:25:00 -07:00
Jason Duell
3ae3a71793 Bug 738484 - Handle Location: that won't parse to valid URI. r=mcmanus 2012-04-11 13:26:23 -07:00
Patrick McManus
8ebada0f34 bug 743747: fix landing with 603514 r=honzab 2012-04-11 13:49:32 -04:00
Patrick McManus
3405699629 bug 743587 Intermittent Linux talos crash [@ nsHttpConnection::CloseTransaction] r=honzab 2012-04-11 13:11:10 -04:00
Patrick McManus
c1a33ecaf0 bug 738812 timer serviced after thread exit nsHttpConnectionMgr::ReadTimeoutTick r=honzab 2012-04-11 13:11:09 -04:00
Jason Duell
12220d4111 Bug 742174 - Allow empty Location header. r=mcmanus 2012-04-09 16:50:35 -07:00
Patrick McManus
46695bea53 bug 742935: fix landing problem with 717759 r=honzab 2012-04-09 10:22:07 -04:00
Patrick McManus
0d8b095be3 bug 742935: fix landing problem with 717350 r=honzab
--HG--
rename : netwerk/test/unit/test_mismatch_lm.js => netwerk/test/unit/test_mismatch_last-modified.js
2012-04-09 10:21:28 -04:00
Patrick McManus
423247bf74 bug 742935: fix landing problem with 603512 r=honzab 2012-04-09 10:21:17 -04:00
Ben Bucksch
8ab5ea8974 #pragma O0 fails on GCC 4.4 with an Internal Compiler Error. -- bug 621446, r=honzab
This pragma was only to investigate another crash on Android, but breaks compile
on g++ 4.4 64bit, e.g. on Ubuntu 10.04 64bit.
Thus, enable that pragma only on Android.
2012-04-09 11:11:53 +02:00
Brian Smith
5b9f0dc036 Bug 743076 - Suppress warning warning C4355: 'this' : used in base member initializer list in HttpChannelChild and FTPChannelChild, r=cbiesinger 2012-04-05 00:03:14 -07:00
Brian Smith
d938d31bab Bug 742610 - Remove opportunistic caching support from nsHttpChannel, r=honzab
--HG--
extra : source : 8b98023b89ddef6e7b0bbed25463c68142877d8e
2012-04-05 00:14:35 -07:00
Patrick McManus
28a4a4e674 bug 742827 - fix problem with landing of bug 671591 r=honzab 2012-04-05 18:37:57 -04:00
Brian Smith
e34bab8946 Bug 736903: nsHttpChannel wraps the aOffset value it passes to its stream listener instead of clamping it, r=cbiesinger
--HG--
extra : rebase_source : 28bc8bdddea0cac6a41482920d059b523197ef03
2012-04-04 18:57:22 -07:00
Brian Smith
a1f4a19633 Bug 736895: Suppress warning warning C4355: 'this' : used in base member initializer list in nsHttpChannel::nsHttpChannel, r=cbiesinger
--HG--
extra : rebase_source : bbcacf34a97671cb4750888a2468f6563c52b99a
2012-04-04 18:55:21 -07:00
Brian Smith
e808e67215 Bug 736887: Fix compiler warning in nsHttpChannel.cpp: warning C4244: 'argument' : conversion from 'double' to 'PRTime', possible loss of data, r=cbiesinger
--HG--
extra : rebase_source : 7c100821353b77133108e08f6bf0fd53195c0f9a
2012-04-04 18:54:03 -07:00
Patrick McManus
a68d7584b3 bug 739023 nightly crash in nshttpchannel::OnDataAvailable() from Restart r=honzab
--HG--
extra : rebase_source : ccb196fc38394d9ef5e0a4bdf51ea714a57e7224
2012-04-04 21:19:20 -04:00
Patrick McManus
5e33fbff0d bug 741056 - nightly crash https sites with authenticated proxy r=honzab 2012-04-04 09:39:21 -04:00
Ryan VanderMeulen
e30ff35d31 Backout 17deb5f61b4d (bug 150073) due to build bustage. a=shouldausedtryfirst 2012-04-03 20:22:42 -04:00
Shriram Kunchanapalli
05c95fc3b7 Bug 150073 - Remove nsCRT:: in nsCRT::strlen. f=sgautherie, r=dougt 2012-02-18 19:17:01 +05:30
Patrick McManus
f91dd06576 bug 739617 - cannot upload large files r=honzab
--HG--
extra : rebase_source : 5ea85a021233cf79a539980efc859a2d5372fe53
2012-04-02 20:36:11 -04:00
Patrick McManus
f18af8f9eb Bug 739023 - Disabling the Restart-in-progess logic temporarily since suspected of causing crashes, r=honzab 2012-03-30 00:40:42 +02:00
Patrick McManus
a7669f6540 bug 717759 - negative pipeline feedback on img decode problem r=bz r=jdrew r=honzab 2012-03-22 19:39:32 -04:00
Patrick McManus
e8210a8959 bug 717350 doom cache entry on last-modified mismatch r=honzab 2012-03-22 19:39:31 -04:00
Patrick McManus
2c1b0520f1 bug 671591 - restart partial http transaction (in progress) r=honzab 2012-03-22 19:39:31 -04:00
Patrick McManus
b42fe35654 bug 603514 - http stalled read detection r=honzab
When a connection that involves a pipelined transaction has been stalled (i.e.
idle with an open transaction, not an idle persistent connection) for a
second move any transactions that are pipelined after the current one onto
different connections (and implicitly close this connection when done with the
current transaction).

when it has been stalled for 10 seconds (pref configurable), cancel the current
transaction itself too - depending on its state it can hopefully be restarted
on a clean connection.
2012-03-22 19:39:31 -04:00
Patrick McManus
f04f8c8cf1 bug 603512 - large objects block pipelines r=honzab
the type and state patch tries hard not to form pipelines behind resources that
could become head of line blockers. But of course that requires the ability to
predict the future, and won't be perfect.

This patch reacts to a transaction that has a large response body (defined by
either a large content-length header or actually reading a large number of
chunked bytes) by cancelling any transactions that have been pipelined down the
same connection and rescheduling them elsewhere. It also changes the type of
the connection to "solo", which prevents new transactions from being pipelined
onto this one and provides class-specific negative feedback to the pipeline
manager so that near-future requests to the same host of the same type (e.g.
general) will not be pipelined but other types (e.g. img or js/css) can still
do that.

Content-Length is ideal, because it allows us to identify the problem so early.
But even actually reading the document for a fairly long time gives it a fairly
high probability of not ending soon. (i.e. long document sizes are spread over
a larger range than small ones. duh.)

The pref network.http.pipelining.maxsize controls the threshold. I set the
default at 300KB, which is roughly the bandwidth delay product of a 2mbit 120ms
rtt connection and 1 rtt is mostly what you are giving up by canceling it on
one connection and sending it on another. (modulo maybe needing a handshake).
2012-03-22 19:39:31 -04:00
Patrick McManus
6642e5f564 bug 665885 respect keepalive: "max=" attribute r=honzab 2012-03-22 19:39:31 -04:00
Patrick McManus
665466cf6f bug 737155 - httpconnectionmgr::processPendingQ allow more than 1 with pipeline r=honzab 2012-03-22 19:39:31 -04:00
Patrick McManus
dd00f9250a bug 599164 pipeline with type and state r=honzab 2012-03-22 19:39:31 -04:00
Patrick McManus
69d6b34474 bug 597684 Implement HTTP Assoc-req and Banned Pipelines on nsHttpConnectionInfo r=honzab 2012-03-22 19:39:31 -04:00
Patrick McManus
2f6e970bde bug 447866 http pipelining is bursty r=honzab
--HG--
extra : rebase_source : 87370228074eaff2615b8dcef9b3c0c9b919b3c3
2012-03-22 19:39:31 -04:00
Patrick McManus
18371ac44a bug 447866 - patch pre.1 for empty nsHttpPipeline::TakeSubTransactions r=honzab
--HG--
extra : rebase_source : 5c21007525883fc74dc70332cf74d8d0bacd9147
2012-03-22 19:39:28 -04:00
Michal Novotny
fc7977fd47 Bug 722033 - Invalidate cache entry in nsHttpChannel::DoInvalidateCacheEntry() asynchronously 2012-03-22 23:54:20 +01:00
Michal Novotny
351c4791da Bug 722033 - Use asyncOpenCacheEntry() in nsHttpChannel::OpenOfflineCacheEntryForWriting() 2012-03-22 23:53:55 +01:00
Michal Novotny
df4890a620 Bug 722033 - Use asyncOpenCacheEntry() in nsHttpChannel when flag LOAD_BYPASS_LOCAL_CACHE_IF_BUSY is set 2012-03-22 23:53:10 +01:00
julian.reschke@gmx.de
0b667bf265 Bug 714302: add suport for HTTP status code 308 r=mcmanus
--HG--
extra : rebase_source : 2e4a46ac5ebe89a36fb4b12b1985d07d674db5e8
2012-03-21 16:13:42 -04:00
Jason Duell
6e4a5e4792 Backed out changeset 5aaec7f808b6 2012-03-15 20:55:44 -07:00
Jason Duell
e683c892ab Bug 664163: I will back this out when xpcshell test_traceable.js fails eventually. r=jduell 2012-03-15 18:54:58 -07:00
Jason Duell
25bb7c605c Backed out changeset c9265ada6f40 2012-03-15 15:05:22 -07:00
Jason Duell
1427947aa0 Bug 648878 - I will backout: investigating inbound-only failure r=jduell 2012-03-15 13:00:20 -07:00
Patrick McManus
3060ca04b8 bug 735552 - wrong assert on shutdown in nsHttpConnectionMgr::ReportSpdyConnection r=honzab
--HG--
extra : rebase_source : 8baf5fbae8d9ad8196fd699191c0013f7ea8f424
2012-03-15 00:03:04 -04:00
Phil Ringnalda
03c791f19f Back out 9899522b6ad9 (bug 664163) 2012-03-13 22:11:55 -07:00
Jason Duell
293e6966d2 Bug 664163: Yes this will get backed out: see bug. r=jdm 2012-03-13 18:46:30 -07:00