Commit Graph

53 Commits

Author SHA1 Message Date
Ehsan Akhgari
2475f22cbe Bug 919320 - Minimize the #includes in netwerk/protocol; r=mcmanus 2013-09-22 23:35:52 -04:00
Benoit Jacob
43fcdc2ede Bug 913847 - Include MainThreadUtils.h instead of nsThreadUtils.h - r=ehsan 2013-09-19 09:54:42 -04:00
Wes Kocher
ee41ec25e3 Backed out changeset 040522aacba4 (bug 913847) 2013-09-18 17:18:56 -07:00
Benoit Jacob
af97fdd40d Bug 913847 - Include MainThreadUtils.h instead of nsThreadUtils.h - r=ehsan 2013-09-18 18:50:32 -04:00
Patrick McManus
67639493be bug 907960 - backout 905460 r=backout 2013-08-21 21:01:19 -04:00
Patrick McManus
1d2044d59a bug 905460 - make http objects use smart pointers r=sworkman 2013-08-14 21:05:47 -04:00
Joshua Cranmer
9254ed8d14 Bug 884061 - Part 3q: Use NS_DECL_THREADSAFE_ISUPPORTS in netwerk/, r=macmanus
--HG--
extra : rebase_source : d029f73a1f27896c142f76dce263dd3542763b18
2013-07-18 21:24:13 -05:00
Patrick McManus
8c2b280e9b bug 888268 - wifi tickler for mitigating 802.11 psp mode on android r=dougt
--HG--
extra : rebase_source : a767b6c10501105b3c5d22043f11745807caf2f9
2013-07-11 11:39:36 -04:00
Patrick McManus
f8eb9535d0 bug 790388 part 3 - spdy/3 server push r=hurley
--HG--
extra : rebase_source : 1ed60ebda0b790f0ff1578abe7a7732676b495cf
2013-05-29 00:07:03 -04:00
Patrick McManus
2591c786a2 bug 871289 [2 of 2] fix trailing whitespace in netwerk/protocol/http/* r=jduell 2013-05-16 09:30:42 -04:00
Patrick McManus
ae5e534f2d bug 871289 [1 of 2] standardize netwerk/protocol/http on moz_assert r=jduell 2013-05-16 09:30:41 -04:00
Patrick McManus
fd3d3d767f bug 819734 - Token Bucket for Network Bursts part 1/2 [base] r=honzab 2013-04-15 08:50:35 -04:00
Josh Matthews
6f203f7db0 Bug 813489 - Update the HTTP connection's security callbacks from the socket thread. r=mayhemer 2012-12-05 17:10:19 -05:00
Patrick McManus
fcde44c64e bug 792438 - part 2 block network image loads on head css,js r=honzab sr=bz 2012-12-04 18:06:29 -05:00
Patrick McManus
d279b2b575 bug 816685 expand caps in protocol/http to 32bits r=jduell 2012-11-29 20:34:35 -05:00
Josh Matthews
164359236e Bug 804655 - Part 2: Wrap up interface aggregator callbacks with a target thread on which they should be released. r=mayhemer 2012-11-14 16:00:44 +00:00
Josh Matthews
33564b3f20 Bug 804655 - Part 1: Make updating an nsHttpChannel's loadgroup/callbacks update those of its transaction and connection as well. r=mayhemer 2012-11-14 16:00:43 +00:00
Valentin Gosu
3793f9760c Bug 791088 - Add telemetry for Connection Manager transaction time. r=mcmanus 2012-09-19 20:24:58 -04:00
Jason Duell
ca7ff3f2e0 Bug 767516 - Rename: s/SSLConnect/ProxyConnect/ r=mcmanus 2012-06-22 12:06:00 -07:00
Ehsan Akhgari
8c296bbcd4 Bug 579517 - Part 1: Automated conversion of NSPR numeric types to stdint types in Gecko; r=bsmedberg
This patch was generated by a script.  Here's the source of the script for
future reference:

function convert() {
echo "Converting $1 to $2..."
find . ! -wholename "*nsprpub*" \
       ! -wholename "*security/nss*" \
       ! -wholename "*/.hg*" \
       ! -wholename "obj-ff-dbg*" \
       ! -name nsXPCOMCID.h \
       ! -name prtypes.h \
         -type f \
      \( -iname "*.cpp" \
         -o -iname "*.h" \
         -o -iname "*.c" \
         -o -iname "*.cc" \
         -o -iname "*.idl" \
         -o -iname "*.ipdl" \
         -o -iname "*.ipdlh" \
         -o -iname "*.mm" \) | \
    xargs -n 1 sed -i -e "s/\b$1\b/$2/g"
}

convert PRInt8 int8_t
convert PRUint8 uint8_t
convert PRInt16 int16_t
convert PRUint16 uint16_t
convert PRInt32 int32_t
convert PRUint32 uint32_t
convert PRInt64 int64_t
convert PRUint64 uint64_t

convert PRIntn int
convert PRUintn unsigned

convert PRSize size_t

convert PROffset32 int32_t
convert PROffset64 int64_t

convert PRPtrdiff ptrdiff_t

convert PRFloat64 double
2012-08-22 11:56:38 -04:00
Michal Novotny
6bac041e62 Bug 475444 - HTTP standard violation, Content-length header appears to be ignored under some circumstances, r=bz sr=biesi 2012-08-16 12:37:52 +02:00
Honza Bambas
5fe7a22e2c Bug 215450: Allow uploading of files greater than 2gb in size. Involves making input streams 64-bit capable. Significant work done by Makoto Kato, finished by Honza Bambas. r=hbambas,bsmedberg,jdrew,sicking 2012-08-10 22:44:11 -04:00
Aryeh Gregor
57c0ad57fb Bug 777292 part 2 - Change all nsnull to nullptr 2012-07-30 17:20:58 +03:00
Patrick McManus
cfcdc84aac bug 770264 - http connection diagnostics r=honzab 2012-07-09 18:07:57 -04:00
Ed Morley
25157b328a Backout d45ca69b67a3 (bug 767516), 4ff98d3e4d8d (bug 767512), 70cc47076115 (bug 767505), 4eca26d02c84 (bug 766929) for mochitest-plain-5 failures 2012-06-25 21:38:10 +01:00
Jason Duell
663bc3d4fa Bug 767516 - Rename: s/SSLConnect/ProxyConnect/g r=mcmanus 2012-06-25 12:48:50 -07:00
Gervase Markham
87620f5676 Bug 716478 - update licence to MPL 2. 2012-05-21 12:12:37 +01:00
Patrick McManus
541629f9a6 bug 742827 - fix problem with landing of bug 671591 r=honzab 2012-04-05 18:37:57 -04:00
Patrick McManus
bd0154c665 bug 671591 - restart partial http transaction (in progress) r=honzab 2012-03-22 19:39:31 -04:00
Patrick McManus
f5c0c33db7 bug 603512 - large objects block pipelines r=honzab
the type and state patch tries hard not to form pipelines behind resources that
could become head of line blockers. But of course that requires the ability to
predict the future, and won't be perfect.

This patch reacts to a transaction that has a large response body (defined by
either a large content-length header or actually reading a large number of
chunked bytes) by cancelling any transactions that have been pipelined down the
same connection and rescheduling them elsewhere. It also changes the type of
the connection to "solo", which prevents new transactions from being pipelined
onto this one and provides class-specific negative feedback to the pipeline
manager so that near-future requests to the same host of the same type (e.g.
general) will not be pipelined but other types (e.g. img or js/css) can still
do that.

Content-Length is ideal, because it allows us to identify the problem so early.
But even actually reading the document for a fairly long time gives it a fairly
high probability of not ending soon. (i.e. long document sizes are spread over
a larger range than small ones. duh.)

The pref network.http.pipelining.maxsize controls the threshold. I set the
default at 300KB, which is roughly the bandwidth delay product of a 2mbit 120ms
rtt connection and 1 rtt is mostly what you are giving up by canceling it on
one connection and sending it on another. (modulo maybe needing a handshake).
2012-03-22 19:39:31 -04:00
Patrick McManus
15a48d8534 bug 599164 pipeline with type and state r=honzab 2012-03-22 19:39:31 -04:00
Patrick McManus
bba26f5a30 bug 597684 Implement HTTP Assoc-req and Banned Pipelines on nsHttpConnectionInfo r=honzab 2012-03-22 19:39:31 -04:00
Patrick McManus
afefeddb70 bug 447866 http pipelining is bursty r=honzab
--HG--
extra : rebase_source : 87370228074eaff2615b8dcef9b3c0c9b919b3c3
2012-03-22 19:39:31 -04:00
Patrick McManus
3ba70e69a9 bug 528288 - reland spdy after libxul weightloss a=khuey CLOSED TREE 2011-12-13 10:55:50 -05:00
Ed Morley
dd38904e41 Backout SPDY to keep us under the MSVC virtual address space limit during win PGO builds (bug 709193)
Backs out 952d14a9e508 (bug 707173), c170c678c9ac (bug 708305), 0a5f66d5d8e4 (bug 707662), 3204b70435fe (bug 706236) and the main landing range 48807fde0339:0bd45ead1676 (bug 528288).
2011-12-10 22:36:26 +00:00
Patrick McManus
82c9bf6d8e bug 528222 Basic SPDY web transport support. r=honzab r=bsmith sr=biesi
patch 0
2011-12-02 10:28:56 -05:00
Michael Wu
d8e503c38b Bug 675553 - Switch from PRBool to bool on a CLOSED TREE , r=bsmedberg,khuey,bz,cjones
--HG--
rename : tools/trace-malloc/bloatblame.c => tools/trace-malloc/bloatblame.cpp
2011-09-28 23:19:26 -07:00
Patrick McManus
14fd4e9ce5 bug 597706 - response header smuggling r=honzab
reject responses with multiple non identical or invalid
content-length headers
2011-05-31 19:51:51 -04:00
Christian Biesinger
c93ab7d02c Bug 576006 - Implement timing interface for channels
r=jduell sr=bz
2011-05-21 03:03:36 -07:00
Patrick McManus
ec459a736d bugzilla 640213 Implement RFC 2616 "Upgrade" (Section 14.42) r=biesi sr=bz 2011-05-19 19:43:37 -04:00
Phil Ringnalda
732ca210bc Back out 40d44ce2377e (bug 640213) on suspicion of causing Windows crashes and timeouts in media tests 2011-05-14 20:13:57 -07:00
Patrick McManus
9bffb83e96 Bug 640213 - Implement HTTP 2616 Upgrade. r=biesi, sr=bz. 2011-05-14 18:55:54 +01:00
Patrick McManus
f8e3139764 bugzilla 595316 remove static cast of nsAHttp* objs r=honzab
--HG--
extra : rebase_source : 1226b809dc071fa71340e461a6fde36c8da7d39b
2011-04-08 14:37:16 -04:00
Julian Seward
0ac527c26e Bug 560579 - bitfield-induced race in class nsHttpTransaction; r=biesi 2011-03-24 15:51:00 -04:00
Ehsan Akhgari
73dd5db57d Bug 646071 - Part 3: Remove nsInt64.h, and convert all uses of nsInt64 and nsUint64 in the tree to PRInt64 and PRUint64, respectively; r=bsmedberg 2011-03-31 20:15:27 -04:00
Ehsan Akhgari
49fceed112 Backout the latest cedar merge wholesale until I test the correctness of the merge locally. This commit takes the tree state back to changeset 8d3f6093c425 (the last known good changeset before the merge) 2011-04-01 12:23:48 -04:00
Julian Seward
c3040d3e8c Bug 560579 - bitfield-induced race in class nsHttpTransaction; r=biesi 2011-03-24 15:51:00 -04:00
Ehsan Akhgari
f4575bfe5e Bug 646071 - Part 3: Remove nsInt64.h, and convert all uses of nsInt64 and nsUint64 in the tree to PRInt64 and PRUint64, respectively; r=bsmedberg 2011-03-31 20:15:27 -04:00
Patrick McManus
0d5cfec907 bug 628832 - fix regression in http/0.9 detection from 363109; r=zbarsky a=blocking-2.0
* instead of making (dis)-allow 0.9 a property of connection info,
  work off a state machine that engages in the liberal skipping of
  junk before response headers only immediately after a no-content
  response on the same connection.

* when scanning for response headers in a large amount of junk place a
  non infinite limit on that (128KB).. the only known use case for
  this is skipping illegal message bodies in 304's and those just
  aren't that big.

--HG--
extra : rebase_source : 433fd6aae237d29a9957b1a70cf1e756af5a8af0
2011-01-27 13:34:39 -05:00
Michal Novotny
c61b9b37d9 bug 363109 - body of HTTP 304 response is treated as a HTTP/0.9 response to subsequent HTTP request. r=biesi, sr=bz, a=blocker 2010-12-01 02:02:52 +02:00