diff --git a/netwerk/protocol/http/nsHttp.h b/netwerk/protocol/http/nsHttp.h index 6d648ac75ae0..ff70a4b902ff 100644 --- a/netwerk/protocol/http/nsHttp.h +++ b/netwerk/protocol/http/nsHttp.h @@ -20,7 +20,7 @@ // 2) #include IPDL boilerplate, and then undef LOG so our LOG wins. // 3) nsNetModule.cpp does its own crazy stuff with #including prlog.h // multiple times; allow it to define ALLOW_LATE_NSHTTP_H_INCLUDE to bypass -// check. +// check. #if defined(PR_LOG) && !defined(ALLOW_LATE_NSHTTP_H_INCLUDE) #error "If nsHttp.h #included it must come before any IPDL-generated files or other files that #include prlog.h" #endif @@ -181,7 +181,7 @@ struct nsHttp } // Declare all atoms - // + // // The atom names and values are stored in nsHttpAtomList.h and are brought // to you by the magic of C preprocessing. Add new atoms to nsHttpAtomList // and all support logic will be auto-generated. diff --git a/netwerk/protocol/http/nsHttpHandler.cpp b/netwerk/protocol/http/nsHttpHandler.cpp index db198fd8e18f..422a7d5db7e3 100644 --- a/netwerk/protocol/http/nsHttpHandler.cpp +++ b/netwerk/protocol/http/nsHttpHandler.cpp @@ -234,7 +234,7 @@ nsHttpHandler::Init() if (prefBranch) { prefBranch->AddObserver(HTTP_PREF_PREFIX, this, true); prefBranch->AddObserver(UA_PREF_PREFIX, this, true); - prefBranch->AddObserver(INTL_ACCEPT_LANGUAGES, this, true); + prefBranch->AddObserver(INTL_ACCEPT_LANGUAGES, this, true); prefBranch->AddObserver(NETWORK_ENABLEIDN, this, true); prefBranch->AddObserver(BROWSER_PREF("disk_cache_ssl"), this, true); prefBranch->AddObserver(DONOTTRACK_HEADER_ENABLED, this, true); @@ -292,8 +292,8 @@ nsHttpHandler::Init() // Bring alive the objects in the http-protocol-startup category NS_CreateServicesFromCategory(NS_HTTP_STARTUP_CATEGORY, static_cast(static_cast(this)), - NS_HTTP_STARTUP_TOPIC); - + NS_HTTP_STARTUP_TOPIC); + mObserverService = mozilla::services::GetObserverService(); if (mObserverService) { mObserverService->AddObserver(this, "profile-change-net-teardown", true); @@ -303,7 +303,7 @@ nsHttpHandler::Init() mObserverService->AddObserver(this, "net:prune-dead-connections", true); mObserverService->AddObserver(this, "net:failed-to-process-uri-content", true); } - + return NS_OK; } @@ -363,10 +363,10 @@ nsHttpHandler::AddStandardRequestHeaders(nsHttpHeaderArray *request, // transparent proxies) can result. // // However, we need to send something so that we can use keepalive - // with HTTP/1.0 servers/proxies. We use "Proxy-Connection:" when + // with HTTP/1.0 servers/proxies. We use "Proxy-Connection:" when // we're talking to an http proxy, and "Connection:" otherwise. // We no longer send the Keep-Alive request header. - + NS_NAMED_LITERAL_CSTRING(close, "close"); NS_NAMED_LITERAL_CSTRING(keepAlive, "keep-alive"); @@ -435,7 +435,7 @@ nsHttpHandler::GetCookieService() return mCookieService; } -nsresult +nsresult nsHttpHandler::GetIOService(nsIIOService** result) { NS_ADDREF(*result = mIOService); @@ -452,7 +452,7 @@ nsHttpHandler::Get32BitsOfPseudoRandom() // 15 or 31 bits are common amounts. PR_STATIC_ASSERT(RAND_MAX >= 0xfff); - + #if RAND_MAX < 0xffffU return ((uint16_t) rand() << 20) | (((uint16_t) rand() & 0xfff) << 8) | @@ -521,10 +521,10 @@ nsHttpHandler::BuildUserAgent() // preallocate to worst-case size, which should always be better // than if we didn't preallocate at all. - mUserAgent.SetCapacity(mLegacyAppName.Length() + - mLegacyAppVersion.Length() + + mUserAgent.SetCapacity(mLegacyAppName.Length() + + mLegacyAppVersion.Length() + #ifndef UA_SPARE_PLATFORM - mPlatform.Length() + + mPlatform.Length() + #endif mOscpu.Length() + mMisc.Length() + @@ -674,7 +674,7 @@ nsHttpHandler::InitUserAgentComponents() } #elif defined (XP_UNIX) struct utsname name; - + int ret = uname(&name); if (ret >= 0) { nsCAutoString buf; @@ -981,7 +981,7 @@ nsHttpHandler::PrefsChanged(nsIPrefBranch *prefs, const char *pref) if (NS_SUCCEEDED(rv)) SetAccept(accept); } - + if (PREF_CHANGED(HTTP_PREF("accept-encoding"))) { nsXPIDLCString acceptEncodings; rv = prefs->GetCharPref(HTTP_PREF("accept-encoding"), @@ -1034,7 +1034,7 @@ nsHttpHandler::PrefsChanged(nsIPrefBranch *prefs, const char *pref) mEnforceAssocReq = cVar; } - // enable Persistent caching for HTTPS - bug#205921 + // enable Persistent caching for HTTPS - bug#205921 if (PREF_CHANGED(BROWSER_PREF("disk_cache_ssl"))) { cVar = false; rv = prefs->GetBoolPref(BROWSER_PREF("disk_cache_ssl"), &cVar); @@ -1141,7 +1141,7 @@ nsHttpHandler::PrefsChanged(nsIPrefBranch *prefs, const char *pref) pls->ToString(getter_Copies(uval)); if (uval) SetAcceptLanguages(NS_ConvertUTF16toUTF8(uval).get()); - } + } } // @@ -1278,7 +1278,7 @@ PrepareAcceptLanguages(const char *i_AcceptLanguages, nsACString &o_AcceptLangua } nsresult -nsHttpHandler::SetAcceptLanguages(const char *aAcceptLanguages) +nsHttpHandler::SetAcceptLanguages(const char *aAcceptLanguages) { nsCAutoString buf; nsresult rv = PrepareAcceptLanguages(aAcceptLanguages, buf); @@ -1288,14 +1288,14 @@ nsHttpHandler::SetAcceptLanguages(const char *aAcceptLanguages) } nsresult -nsHttpHandler::SetAccept(const char *aAccept) +nsHttpHandler::SetAccept(const char *aAccept) { mAccept = aAccept; return NS_OK; } nsresult -nsHttpHandler::SetAcceptEncodings(const char *aAcceptEncodings) +nsHttpHandler::SetAcceptEncodings(const char *aAcceptEncodings) { mAcceptEncodings = aAcceptEncodings; return NS_OK; @@ -1373,10 +1373,10 @@ nsHttpHandler::NewChannel(nsIURI *uri, nsIChannel **result) return NewProxiedChannel(uri, nullptr, result); } -NS_IMETHODIMP +NS_IMETHODIMP nsHttpHandler::AllowPort(int32_t port, const char *scheme, bool *_retval) { - // don't override anything. + // don't override anything. *_retval = false; return NS_OK; } @@ -1394,7 +1394,7 @@ nsHttpHandler::NewProxiedChannel(nsIURI *uri, LOG(("nsHttpHandler::NewProxiedChannel [proxyInfo=%p]\n", givenProxyInfo)); - + nsCOMPtr proxyInfo; if (givenProxyInfo) { proxyInfo = do_QueryInterface(givenProxyInfo); @@ -1532,7 +1532,7 @@ nsHttpHandler::Observe(nsISupports *subject, if (uri && mConnMgr) mConnMgr->ReportFailedToProcess(uri); } - + return NS_OK; } @@ -1547,7 +1547,7 @@ nsHttpHandler::SpeculativeConnect(nsIURI *aURI, bool isStsHost = false; if (!stss) return NS_OK; - + nsCOMPtr clone; if (NS_SUCCEEDED(stss->IsStsURI(aURI, &isStsHost)) && isStsHost) { if (NS_SUCCEEDED(aURI->Clone(getter_AddRefs(clone)))) { @@ -1657,7 +1657,7 @@ nsHttpsHandler::NewChannel(nsIURI *aURI, nsIChannel **_retval) NS_IMETHODIMP nsHttpsHandler::AllowPort(int32_t aPort, const char *aScheme, bool *_retval) { - // don't override anything. + // don't override anything. *_retval = false; return NS_OK; } diff --git a/netwerk/test/unit/xpcshell.ini b/netwerk/test/unit/xpcshell.ini index 32e8870193d9..e9e3d70fa8c3 100644 --- a/netwerk/test/unit/xpcshell.ini +++ b/netwerk/test/unit/xpcshell.ini @@ -42,7 +42,7 @@ skip-if = os == "android" [test_bug455311.js] [test_bug455598.js] [test_bug468426.js] -# Bug 675039: test hangs consistently on Android +# Bug 675039: test hangs consistently on Android skip-if = os == "android" [test_bug468594.js] [test_bug470716.js] @@ -53,7 +53,7 @@ skip-if = os == "android" [test_bug490095.js] [test_bug504014.js] [test_bug510359.js] -# Bug 675039: test hangs consistently on Android +# Bug 675039: test hangs consistently on Android skip-if = os == "android" [test_bug515583.js] [test_bug528292.js] @@ -71,16 +71,16 @@ skip-if = os == "android" [test_bug652761.js] [test_bug651100.js] # Bug 675044: test fails consistently on Android -fail-if = os == "android" +fail-if = os == "android" [test_bug654926.js] # Bug 675049: test fails consistently on Android -fail-if = os == "android" +fail-if = os == "android" [test_bug654926_doom_and_read.js] # Bug 675049: test fails consistently on Android -fail-if = os == "android" +fail-if = os == "android" [test_bug654926_test_seek.js] # Bug 675049: test fails consistently on Android -fail-if = os == "android" +fail-if = os == "android" [test_bug659569.js] [test_bug660066.js] [test_bug667907.js] @@ -103,28 +103,28 @@ fail-if = os == "android" [test_extract_charset_from_content_type.js] [test_force_sniffing.js] [test_fallback_no-cache-entry_canceled.js] -# Bug 675039: test hangs consistently on Android +# Bug 675039: test hangs consistently on Android skip-if = os == "android" [test_fallback_no-cache-entry_passing.js] -# Bug 675039: test hangs consistently on Android +# Bug 675039: test hangs consistently on Android skip-if = os == "android" [test_fallback_redirect-to-different-origin_canceled.js] -# Bug 675039: test hangs consistently on Android +# Bug 675039: test hangs consistently on Android skip-if = os == "android" [test_fallback_redirect-to-different-origin_passing.js] -# Bug 675039: test hangs consistently on Android +# Bug 675039: test hangs consistently on Android skip-if = os == "android" [test_fallback_request-error_canceled.js] -# Bug 675039: test hangs consistently on Android +# Bug 675039: test hangs consistently on Android skip-if = os == "android" [test_fallback_request-error_passing.js] -# Bug 675039: test hangs consistently on Android +# Bug 675039: test hangs consistently on Android skip-if = os == "android" [test_fallback_response-error_canceled.js] -# Bug 675039: test hangs consistently on Android +# Bug 675039: test hangs consistently on Android skip-if = os == "android" [test_fallback_response-error_passing.js] -# Bug 675039: test hangs consistently on Android +# Bug 675039: test hangs consistently on Android skip-if = os == "android" [test_file_partial_inputstream.js] [test_file_protocol.js]