Patrick McManus
cdc92cbfa8
bug 729133 - internal necko speculative connections r=honzab
...
race cache I/O events against TCP/SSL connections. Also drive
unused TCP connections to the completion of their SSL handshakes is
apropos.
2012-04-25 08:54:42 -04:00
Andrew Sutherland
f128a13798
Bug 717242, r=mcmanus
2012-04-25 14:50:20 +02:00
Patrick Wong
30fd6e9e6a
Bug 745659 - Removed the nsPrintfCString constructor which takes a length and all corresponding instances that call that particular constructor. This is accomplished by removing the length component from the instantiation. r=jlebar
2012-04-24 14:43:00 -04:00
Patrick McManus
fec2a5c2d2
bug 746731 - nsHttpConnection::mIdleTimeout initialization fixes r=honzab
2012-04-24 15:12:06 -04:00
Patrick McManus
9d41be7518
bug 745379 - mistake in spdy/2 spec reversed actual priority values r=honzab
2012-04-15 13:11:23 -04:00
Patrick McManus
652e0400e5
bug 744788 - add httpconnmgrtick setTarget() in case of offline/online r=honzab
2012-04-13 15:47:43 -04:00
Ms2ger
945ee00ec1
Bug 605180 - Fix build warnings in netwerk/. r=jduell
2012-04-07 14:25:00 -07:00
Jason Duell
3ae3a71793
Bug 738484 - Handle Location: that won't parse to valid URI. r=mcmanus
2012-04-11 13:26:23 -07:00
Patrick McManus
8ebada0f34
bug 743747: fix landing with 603514 r=honzab
2012-04-11 13:49:32 -04:00
Patrick McManus
3405699629
bug 743587 Intermittent Linux talos crash [@ nsHttpConnection::CloseTransaction] r=honzab
2012-04-11 13:11:10 -04:00
Patrick McManus
c1a33ecaf0
bug 738812 timer serviced after thread exit nsHttpConnectionMgr::ReadTimeoutTick r=honzab
2012-04-11 13:11:09 -04:00
Jason Duell
12220d4111
Bug 742174 - Allow empty Location header. r=mcmanus
2012-04-09 16:50:35 -07:00
Patrick McManus
46695bea53
bug 742935: fix landing problem with 717759 r=honzab
2012-04-09 10:22:07 -04:00
Patrick McManus
0d8b095be3
bug 742935: fix landing problem with 717350 r=honzab
...
--HG--
rename : netwerk/test/unit/test_mismatch_lm.js => netwerk/test/unit/test_mismatch_last-modified.js
2012-04-09 10:21:28 -04:00
Patrick McManus
423247bf74
bug 742935: fix landing problem with 603512 r=honzab
2012-04-09 10:21:17 -04:00
Ben Bucksch
8ab5ea8974
#pragma O0 fails on GCC 4.4 with an Internal Compiler Error. -- bug 621446, r=honzab
...
This pragma was only to investigate another crash on Android, but breaks compile
on g++ 4.4 64bit, e.g. on Ubuntu 10.04 64bit.
Thus, enable that pragma only on Android.
2012-04-09 11:11:53 +02:00
Brian Smith
5b9f0dc036
Bug 743076 - Suppress warning warning C4355: 'this' : used in base member initializer list in HttpChannelChild and FTPChannelChild, r=cbiesinger
2012-04-05 00:03:14 -07:00
Brian Smith
d938d31bab
Bug 742610 - Remove opportunistic caching support from nsHttpChannel, r=honzab
...
--HG--
extra : source : 8b98023b89ddef6e7b0bbed25463c68142877d8e
2012-04-05 00:14:35 -07:00
Patrick McManus
28a4a4e674
bug 742827 - fix problem with landing of bug 671591 r=honzab
2012-04-05 18:37:57 -04:00
Brian Smith
e34bab8946
Bug 736903: nsHttpChannel wraps the aOffset value it passes to its stream listener instead of clamping it, r=cbiesinger
...
--HG--
extra : rebase_source : 28bc8bdddea0cac6a41482920d059b523197ef03
2012-04-04 18:57:22 -07:00
Brian Smith
a1f4a19633
Bug 736895: Suppress warning warning C4355: 'this' : used in base member initializer list in nsHttpChannel::nsHttpChannel, r=cbiesinger
...
--HG--
extra : rebase_source : bbcacf34a97671cb4750888a2468f6563c52b99a
2012-04-04 18:55:21 -07:00
Brian Smith
e808e67215
Bug 736887: Fix compiler warning in nsHttpChannel.cpp: warning C4244: 'argument' : conversion from 'double' to 'PRTime', possible loss of data, r=cbiesinger
...
--HG--
extra : rebase_source : 7c100821353b77133108e08f6bf0fd53195c0f9a
2012-04-04 18:54:03 -07:00
Patrick McManus
a68d7584b3
bug 739023 nightly crash in nshttpchannel::OnDataAvailable() from Restart r=honzab
...
--HG--
extra : rebase_source : ccb196fc38394d9ef5e0a4bdf51ea714a57e7224
2012-04-04 21:19:20 -04:00
Patrick McManus
5e33fbff0d
bug 741056 - nightly crash https sites with authenticated proxy r=honzab
2012-04-04 09:39:21 -04:00
Ryan VanderMeulen
e30ff35d31
Backout 17deb5f61b4d (bug 150073) due to build bustage. a=shouldausedtryfirst
2012-04-03 20:22:42 -04:00
Shriram Kunchanapalli
05c95fc3b7
Bug 150073 - Remove nsCRT:: in nsCRT::strlen. f=sgautherie, r=dougt
2012-02-18 19:17:01 +05:30
Patrick McManus
f91dd06576
bug 739617 - cannot upload large files r=honzab
...
--HG--
extra : rebase_source : 5ea85a021233cf79a539980efc859a2d5372fe53
2012-04-02 20:36:11 -04:00
Patrick McManus
f18af8f9eb
Bug 739023 - Disabling the Restart-in-progess logic temporarily since suspected of causing crashes, r=honzab
2012-03-30 00:40:42 +02:00
Patrick McManus
a7669f6540
bug 717759 - negative pipeline feedback on img decode problem r=bz r=jdrew r=honzab
2012-03-22 19:39:32 -04:00
Patrick McManus
e8210a8959
bug 717350 doom cache entry on last-modified mismatch r=honzab
2012-03-22 19:39:31 -04:00
Patrick McManus
2c1b0520f1
bug 671591 - restart partial http transaction (in progress) r=honzab
2012-03-22 19:39:31 -04:00
Patrick McManus
b42fe35654
bug 603514 - http stalled read detection r=honzab
...
When a connection that involves a pipelined transaction has been stalled (i.e.
idle with an open transaction, not an idle persistent connection) for a
second move any transactions that are pipelined after the current one onto
different connections (and implicitly close this connection when done with the
current transaction).
when it has been stalled for 10 seconds (pref configurable), cancel the current
transaction itself too - depending on its state it can hopefully be restarted
on a clean connection.
2012-03-22 19:39:31 -04:00
Patrick McManus
f04f8c8cf1
bug 603512 - large objects block pipelines r=honzab
...
the type and state patch tries hard not to form pipelines behind resources that
could become head of line blockers. But of course that requires the ability to
predict the future, and won't be perfect.
This patch reacts to a transaction that has a large response body (defined by
either a large content-length header or actually reading a large number of
chunked bytes) by cancelling any transactions that have been pipelined down the
same connection and rescheduling them elsewhere. It also changes the type of
the connection to "solo", which prevents new transactions from being pipelined
onto this one and provides class-specific negative feedback to the pipeline
manager so that near-future requests to the same host of the same type (e.g.
general) will not be pipelined but other types (e.g. img or js/css) can still
do that.
Content-Length is ideal, because it allows us to identify the problem so early.
But even actually reading the document for a fairly long time gives it a fairly
high probability of not ending soon. (i.e. long document sizes are spread over
a larger range than small ones. duh.)
The pref network.http.pipelining.maxsize controls the threshold. I set the
default at 300KB, which is roughly the bandwidth delay product of a 2mbit 120ms
rtt connection and 1 rtt is mostly what you are giving up by canceling it on
one connection and sending it on another. (modulo maybe needing a handshake).
2012-03-22 19:39:31 -04:00
Patrick McManus
6642e5f564
bug 665885 respect keepalive: "max=" attribute r=honzab
2012-03-22 19:39:31 -04:00
Patrick McManus
665466cf6f
bug 737155 - httpconnectionmgr::processPendingQ allow more than 1 with pipeline r=honzab
2012-03-22 19:39:31 -04:00
Patrick McManus
dd00f9250a
bug 599164 pipeline with type and state r=honzab
2012-03-22 19:39:31 -04:00
Patrick McManus
69d6b34474
bug 597684 Implement HTTP Assoc-req and Banned Pipelines on nsHttpConnectionInfo r=honzab
2012-03-22 19:39:31 -04:00
Patrick McManus
2f6e970bde
bug 447866 http pipelining is bursty r=honzab
...
--HG--
extra : rebase_source : 87370228074eaff2615b8dcef9b3c0c9b919b3c3
2012-03-22 19:39:31 -04:00
Patrick McManus
18371ac44a
bug 447866 - patch pre.1 for empty nsHttpPipeline::TakeSubTransactions r=honzab
...
--HG--
extra : rebase_source : 5c21007525883fc74dc70332cf74d8d0bacd9147
2012-03-22 19:39:28 -04:00
Michal Novotny
fc7977fd47
Bug 722033 - Invalidate cache entry in nsHttpChannel::DoInvalidateCacheEntry() asynchronously
2012-03-22 23:54:20 +01:00
Michal Novotny
351c4791da
Bug 722033 - Use asyncOpenCacheEntry() in nsHttpChannel::OpenOfflineCacheEntryForWriting()
2012-03-22 23:53:55 +01:00
Michal Novotny
df4890a620
Bug 722033 - Use asyncOpenCacheEntry() in nsHttpChannel when flag LOAD_BYPASS_LOCAL_CACHE_IF_BUSY is set
2012-03-22 23:53:10 +01:00
julian.reschke@gmx.de
0b667bf265
Bug 714302: add suport for HTTP status code 308 r=mcmanus
...
--HG--
extra : rebase_source : 2e4a46ac5ebe89a36fb4b12b1985d07d674db5e8
2012-03-21 16:13:42 -04:00
Jason Duell
6e4a5e4792
Backed out changeset 5aaec7f808b6
2012-03-15 20:55:44 -07:00
Jason Duell
e683c892ab
Bug 664163: I will back this out when xpcshell test_traceable.js fails eventually. r=jduell
2012-03-15 18:54:58 -07:00
Jason Duell
25bb7c605c
Backed out changeset c9265ada6f40
2012-03-15 15:05:22 -07:00
Jason Duell
1427947aa0
Bug 648878 - I will backout: investigating inbound-only failure r=jduell
2012-03-15 13:00:20 -07:00
Patrick McManus
3060ca04b8
bug 735552 - wrong assert on shutdown in nsHttpConnectionMgr::ReportSpdyConnection r=honzab
...
--HG--
extra : rebase_source : 8baf5fbae8d9ad8196fd699191c0013f7ea8f424
2012-03-15 00:03:04 -04:00
Phil Ringnalda
03c791f19f
Back out 9899522b6ad9 (bug 664163)
2012-03-13 22:11:55 -07:00
Jason Duell
293e6966d2
Bug 664163: Yes this will get backed out: see bug. r=jdm
2012-03-13 18:46:30 -07:00