Ehsan Akhgari
2475f22cbe
Bug 919320 - Minimize the #includes in netwerk/protocol; r=mcmanus
2013-09-22 23:35:52 -04:00
Benoit Jacob
43fcdc2ede
Bug 913847 - Include MainThreadUtils.h instead of nsThreadUtils.h - r=ehsan
2013-09-19 09:54:42 -04:00
Wes Kocher
ee41ec25e3
Backed out changeset 040522aacba4 (bug 913847)
2013-09-18 17:18:56 -07:00
Benoit Jacob
af97fdd40d
Bug 913847 - Include MainThreadUtils.h instead of nsThreadUtils.h - r=ehsan
2013-09-18 18:50:32 -04:00
Patrick McManus
67639493be
bug 907960 - backout 905460 r=backout
2013-08-21 21:01:19 -04:00
Patrick McManus
1d2044d59a
bug 905460 - make http objects use smart pointers r=sworkman
2013-08-14 21:05:47 -04:00
Joshua Cranmer
9254ed8d14
Bug 884061 - Part 3q: Use NS_DECL_THREADSAFE_ISUPPORTS in netwerk/, r=macmanus
...
--HG--
extra : rebase_source : d029f73a1f27896c142f76dce263dd3542763b18
2013-07-18 21:24:13 -05:00
Patrick McManus
8c2b280e9b
bug 888268 - wifi tickler for mitigating 802.11 psp mode on android r=dougt
...
--HG--
extra : rebase_source : a767b6c10501105b3c5d22043f11745807caf2f9
2013-07-11 11:39:36 -04:00
Patrick McManus
f8eb9535d0
bug 790388 part 3 - spdy/3 server push r=hurley
...
--HG--
extra : rebase_source : 1ed60ebda0b790f0ff1578abe7a7732676b495cf
2013-05-29 00:07:03 -04:00
Patrick McManus
2591c786a2
bug 871289 [2 of 2] fix trailing whitespace in netwerk/protocol/http/* r=jduell
2013-05-16 09:30:42 -04:00
Patrick McManus
ae5e534f2d
bug 871289 [1 of 2] standardize netwerk/protocol/http on moz_assert r=jduell
2013-05-16 09:30:41 -04:00
Patrick McManus
fd3d3d767f
bug 819734 - Token Bucket for Network Bursts part 1/2 [base] r=honzab
2013-04-15 08:50:35 -04:00
Josh Matthews
6f203f7db0
Bug 813489 - Update the HTTP connection's security callbacks from the socket thread. r=mayhemer
2012-12-05 17:10:19 -05:00
Patrick McManus
fcde44c64e
bug 792438 - part 2 block network image loads on head css,js r=honzab sr=bz
2012-12-04 18:06:29 -05:00
Patrick McManus
d279b2b575
bug 816685 expand caps in protocol/http to 32bits r=jduell
2012-11-29 20:34:35 -05:00
Josh Matthews
164359236e
Bug 804655 - Part 2: Wrap up interface aggregator callbacks with a target thread on which they should be released. r=mayhemer
2012-11-14 16:00:44 +00:00
Josh Matthews
33564b3f20
Bug 804655 - Part 1: Make updating an nsHttpChannel's loadgroup/callbacks update those of its transaction and connection as well. r=mayhemer
2012-11-14 16:00:43 +00:00
Valentin Gosu
3793f9760c
Bug 791088 - Add telemetry for Connection Manager transaction time. r=mcmanus
2012-09-19 20:24:58 -04:00
Jason Duell
ca7ff3f2e0
Bug 767516 - Rename: s/SSLConnect/ProxyConnect/ r=mcmanus
2012-06-22 12:06:00 -07:00
Ehsan Akhgari
8c296bbcd4
Bug 579517 - Part 1: Automated conversion of NSPR numeric types to stdint types in Gecko; r=bsmedberg
...
This patch was generated by a script. Here's the source of the script for
future reference:
function convert() {
echo "Converting $1 to $2..."
find . ! -wholename "*nsprpub*" \
! -wholename "*security/nss*" \
! -wholename "*/.hg*" \
! -wholename "obj-ff-dbg*" \
! -name nsXPCOMCID.h \
! -name prtypes.h \
-type f \
\( -iname "*.cpp" \
-o -iname "*.h" \
-o -iname "*.c" \
-o -iname "*.cc" \
-o -iname "*.idl" \
-o -iname "*.ipdl" \
-o -iname "*.ipdlh" \
-o -iname "*.mm" \) | \
xargs -n 1 sed -i -e "s/\b$1\b/$2/g"
}
convert PRInt8 int8_t
convert PRUint8 uint8_t
convert PRInt16 int16_t
convert PRUint16 uint16_t
convert PRInt32 int32_t
convert PRUint32 uint32_t
convert PRInt64 int64_t
convert PRUint64 uint64_t
convert PRIntn int
convert PRUintn unsigned
convert PRSize size_t
convert PROffset32 int32_t
convert PROffset64 int64_t
convert PRPtrdiff ptrdiff_t
convert PRFloat64 double
2012-08-22 11:56:38 -04:00
Michal Novotny
6bac041e62
Bug 475444 - HTTP standard violation, Content-length header appears to be ignored under some circumstances, r=bz sr=biesi
2012-08-16 12:37:52 +02:00
Honza Bambas
5fe7a22e2c
Bug 215450: Allow uploading of files greater than 2gb in size. Involves making input streams 64-bit capable. Significant work done by Makoto Kato, finished by Honza Bambas. r=hbambas,bsmedberg,jdrew,sicking
2012-08-10 22:44:11 -04:00
Aryeh Gregor
57c0ad57fb
Bug 777292 part 2 - Change all nsnull to nullptr
2012-07-30 17:20:58 +03:00
Patrick McManus
cfcdc84aac
bug 770264 - http connection diagnostics r=honzab
2012-07-09 18:07:57 -04:00
Ed Morley
25157b328a
Backout d45ca69b67a3 (bug 767516), 4ff98d3e4d8d (bug 767512), 70cc47076115 (bug 767505), 4eca26d02c84 (bug 766929) for mochitest-plain-5 failures
2012-06-25 21:38:10 +01:00
Jason Duell
663bc3d4fa
Bug 767516 - Rename: s/SSLConnect/ProxyConnect/g r=mcmanus
2012-06-25 12:48:50 -07:00
Gervase Markham
87620f5676
Bug 716478 - update licence to MPL 2.
2012-05-21 12:12:37 +01:00
Patrick McManus
541629f9a6
bug 742827 - fix problem with landing of bug 671591 r=honzab
2012-04-05 18:37:57 -04:00
Patrick McManus
bd0154c665
bug 671591 - restart partial http transaction (in progress) r=honzab
2012-03-22 19:39:31 -04:00
Patrick McManus
f5c0c33db7
bug 603512 - large objects block pipelines r=honzab
...
the type and state patch tries hard not to form pipelines behind resources that
could become head of line blockers. But of course that requires the ability to
predict the future, and won't be perfect.
This patch reacts to a transaction that has a large response body (defined by
either a large content-length header or actually reading a large number of
chunked bytes) by cancelling any transactions that have been pipelined down the
same connection and rescheduling them elsewhere. It also changes the type of
the connection to "solo", which prevents new transactions from being pipelined
onto this one and provides class-specific negative feedback to the pipeline
manager so that near-future requests to the same host of the same type (e.g.
general) will not be pipelined but other types (e.g. img or js/css) can still
do that.
Content-Length is ideal, because it allows us to identify the problem so early.
But even actually reading the document for a fairly long time gives it a fairly
high probability of not ending soon. (i.e. long document sizes are spread over
a larger range than small ones. duh.)
The pref network.http.pipelining.maxsize controls the threshold. I set the
default at 300KB, which is roughly the bandwidth delay product of a 2mbit 120ms
rtt connection and 1 rtt is mostly what you are giving up by canceling it on
one connection and sending it on another. (modulo maybe needing a handshake).
2012-03-22 19:39:31 -04:00
Patrick McManus
15a48d8534
bug 599164 pipeline with type and state r=honzab
2012-03-22 19:39:31 -04:00
Patrick McManus
bba26f5a30
bug 597684 Implement HTTP Assoc-req and Banned Pipelines on nsHttpConnectionInfo r=honzab
2012-03-22 19:39:31 -04:00
Patrick McManus
afefeddb70
bug 447866 http pipelining is bursty r=honzab
...
--HG--
extra : rebase_source : 87370228074eaff2615b8dcef9b3c0c9b919b3c3
2012-03-22 19:39:31 -04:00
Patrick McManus
3ba70e69a9
bug 528288 - reland spdy after libxul weightloss a=khuey CLOSED TREE
2011-12-13 10:55:50 -05:00
Ed Morley
dd38904e41
Backout SPDY to keep us under the MSVC virtual address space limit during win PGO builds (bug 709193)
...
Backs out 952d14a9e508 (bug 707173), c170c678c9ac (bug 708305), 0a5f66d5d8e4 (bug 707662), 3204b70435fe (bug 706236) and the main landing range 48807fde0339:0bd45ead1676 (bug 528288).
2011-12-10 22:36:26 +00:00
Patrick McManus
82c9bf6d8e
bug 528222 Basic SPDY web transport support. r=honzab r=bsmith sr=biesi
...
patch 0
2011-12-02 10:28:56 -05:00
Michael Wu
d8e503c38b
Bug 675553 - Switch from PRBool to bool on a CLOSED TREE , r=bsmedberg,khuey,bz,cjones
...
--HG--
rename : tools/trace-malloc/bloatblame.c => tools/trace-malloc/bloatblame.cpp
2011-09-28 23:19:26 -07:00
Patrick McManus
14fd4e9ce5
bug 597706 - response header smuggling r=honzab
...
reject responses with multiple non identical or invalid
content-length headers
2011-05-31 19:51:51 -04:00
Christian Biesinger
c93ab7d02c
Bug 576006 - Implement timing interface for channels
...
r=jduell sr=bz
2011-05-21 03:03:36 -07:00
Patrick McManus
ec459a736d
bugzilla 640213 Implement RFC 2616 "Upgrade" (Section 14.42) r=biesi sr=bz
2011-05-19 19:43:37 -04:00
Phil Ringnalda
732ca210bc
Back out 40d44ce2377e (bug 640213) on suspicion of causing Windows crashes and timeouts in media tests
2011-05-14 20:13:57 -07:00
Patrick McManus
9bffb83e96
Bug 640213 - Implement HTTP 2616 Upgrade. r=biesi, sr=bz.
2011-05-14 18:55:54 +01:00
Patrick McManus
f8e3139764
bugzilla 595316 remove static cast of nsAHttp* objs r=honzab
...
--HG--
extra : rebase_source : 1226b809dc071fa71340e461a6fde36c8da7d39b
2011-04-08 14:37:16 -04:00
Julian Seward
0ac527c26e
Bug 560579 - bitfield-induced race in class nsHttpTransaction; r=biesi
2011-03-24 15:51:00 -04:00
Ehsan Akhgari
73dd5db57d
Bug 646071 - Part 3: Remove nsInt64.h, and convert all uses of nsInt64 and nsUint64 in the tree to PRInt64 and PRUint64, respectively; r=bsmedberg
2011-03-31 20:15:27 -04:00
Ehsan Akhgari
49fceed112
Backout the latest cedar merge wholesale until I test the correctness of the merge locally. This commit takes the tree state back to changeset 8d3f6093c425 (the last known good changeset before the merge)
2011-04-01 12:23:48 -04:00
Julian Seward
c3040d3e8c
Bug 560579 - bitfield-induced race in class nsHttpTransaction; r=biesi
2011-03-24 15:51:00 -04:00
Ehsan Akhgari
f4575bfe5e
Bug 646071 - Part 3: Remove nsInt64.h, and convert all uses of nsInt64 and nsUint64 in the tree to PRInt64 and PRUint64, respectively; r=bsmedberg
2011-03-31 20:15:27 -04:00
Patrick McManus
0d5cfec907
bug 628832 - fix regression in http/0.9 detection from 363109; r=zbarsky a=blocking-2.0
...
* instead of making (dis)-allow 0.9 a property of connection info,
work off a state machine that engages in the liberal skipping of
junk before response headers only immediately after a no-content
response on the same connection.
* when scanning for response headers in a large amount of junk place a
non infinite limit on that (128KB).. the only known use case for
this is skipping illegal message bodies in 304's and those just
aren't that big.
--HG--
extra : rebase_source : 433fd6aae237d29a9957b1a70cf1e756af5a8af0
2011-01-27 13:34:39 -05:00
Michal Novotny
c61b9b37d9
bug 363109 - body of HTTP 304 response is treated as a HTTP/0.9 response to subsequent HTTP request. r=biesi, sr=bz, a=blocker
2010-12-01 02:02:52 +02:00