`
liudaoru
  • 浏览: 1575491 次
  • 性别: Icon_minigender_1
  • 来自: 北京
社区版块
存档分类
最新评论

Hacking Mozilla Table of Contents[z]

阅读更多

To get your code checked into mozilla.org's CVS repository you'll need to understand our code development cycle, coding practices, and checkin requirements. You probably also want to have a reasonable understanding about the project's organization.

(If you're looking for the document called Hacking Mozilla that used to live at this page, go to the first link below.)

A. Code Development

Life Cycle of a Patch (formerly "Hacking Mozilla")
An overview of how to get the source, develop patches, get them reviewed, super-reviewed and checked in the tree.

Mozilla Hacker's Getting Started Guide
How is the source code organized, where to start, critical tools, rules to follow to contribute.

Good First Bugs
Want to help, but don't know where to start? Here are a few suggestions.

Code review
An FAQ about mozilla.org's code review and super-review process - what it's for, how it works, what to expect.

Super-review
What code needs super-review, what to do if you're seeking a super-review, a list of super-reviewers, plus some tips about what to consider in your code before seeking super-review.

Development Strategies
Some strategies to help developers stay productive.

Tips on Contributing New Features to Mozilla
Design and implementation suggestions for large contributions.

B. Mozilla Coding practices

Mozilla Coding Style Guide
Explanation of the basic styles and patterns that are used in the Mozilla codebase. New code should try to conform to these standards.

Seamonkey Code Reviewer's Guide
A high level outline of what to look for when doing a code review.

Rules and Tips
Questions to ask about your code before you submit it for super-review.

C++ portability guide
Rules, guidelines, and tips for making C++ code portable across many machines and compilers.

C. Checking Code into the mozilla.org tree

Working with the Seamonkey Tree
Description of how to build and test your code before checkin, how mozilla.org manages checkins and each developer's responsibilities to the community when code is committed.

The Seamonkey Engineering Bible
An older but still useful document containing guidance on how to make checkins go smoothly.

Pre-checkin tests
The minimum tests that must be run before you check code in.

Hacking Mozilla with Bonsai (aka "Being on the Hook")
When your code is checked in you are "on the hook." Here's a description of what this means..

Tinderbox Performance tests
These are the tests Tinderbox runs to measure performance. They can be run on patches whose performance impact is suspect.

Performance Regression Policy
When the tree is to be closed due to performance regressions and how it is to be reopened.

Full Smoketests
Tests Mozilla Community QA runs each day on the verification builds.

Getting commit access to Mozilla source code
Steps required to obtain CVS write access to mozilla.org's CVS repository.

Using SSH to connect to cvs.mozilla.org FAQ
A guide to setting up access to cvs.mozilla.org using ssh.

How to complete the CVS Contributor Form
Information on completing the form one needs to fill out as part of the process of getting CVS write access, plus a link to the form itself.

D. Project Organization

Mozilla Roles and Responsibilities
A description of the formalized roles in the Mozilla community -- mozilla.org, drivers, module owners, etc.

Mozilla Modules and Module Ownership
Information on the nature of Mozilla modules, role of module owners, criteria for module ownership, and designating module owners.

Handling Mozilla Security Bugs
mozilla.org policy for handling bugs related to security issues.

分享到:
评论

相关推荐

    Hacking - The Art of Exploitation

    Table of Contents Hacking—The Art of Exploitation Preface Chapter 1 - 0x100—Introduction Chapter 2 - 0x200—Programming Chapter 3 - 0x300—NETWORKING Chapter 4 - 0x400—Cryptology ...

    Hacking - The Art of Exploitation, 2nd Ed

    The goal of this book is to share the art of hacking with everyone. Understanding hacking techniques is often difficult, since it requires both breadth and depth of knowledge. Many hacking texts seem ...

    Hacking Point of Sale(Wiley,2014)

    Hacking Point of Sale is a compelling book that tackles this enormous problem head-on. Exploring all aspects of the problem in detail – from how attacks are structured to the structure of magnetic ...

    Hacking The Art Of Exploitation 2nd Edition

    Hacking The Art Of Exploitation 2nd Edition

    Hacking: The Art of Exploitation, the 2nd edition

    在《Hacking: The Art of Exploitation, 第二版》这本书中,作者Jon Erickson深入探讨了黑客这一概念的本质,即解决问题的艺术。通常情况下,“黑客”这个词往往被误解为非法入侵计算机系统的犯罪分子,但实际上,...

    Hacking The Art of Exploitation 2nd Edition

    Hacking The Art of Exploitation 2nd Edition from No Starch Press

    Beginning Ethical Hacking with Python(Apress,2016)

    Learn the basics of ethical hacking and gain insights into the logic, algorithms, and syntax of Python. This book will set you up with a foundation that will help you understand the advanced concepts ...

    Hacking.The.Art.of.Exploitation,.2nd.Edition

    《黑客:漏洞利用的艺术》第二版是一本深入探讨网络安全与黑客技术的经典著作。作者通过详细的讲解和实践案例,引领读者走进黑客的世界,了解其背后的原理和技术。这本书是为那些对网络安全有浓厚兴趣,并希望深入...

    Hacking - The Art of Exploitation(2nd)高清无水印版

    《黑客:利用的艺术》(第二版)是一本深入探讨黑客技术与计算机安全的书籍,英文原版名为"Hacking: The Art of Exploitation, 2nd Edition",由作者Erickson撰写。这本书旨在帮助读者理解黑客攻击的本质,并提供了...

    Hacking: The Art of Exploitation

    文字版Hacking: The Art of Exploitation。包含书签,非常完美

    The art of exploitation.7z

    This book explains the details of various hacking techniques, many of which get very technical. While the fundamental programming concepts that these hacking techniques build from are introduced in ...

    Hacking.Secret.Ciphers.with.Python.B00WOY87ZU

    Table of Contents Chapter 1 - Making Paper Cryptography Tools Chapter 2 - Installing Python Chapter 3 - The Interactive Shell Chapter 4 - Strings and Writing Programs Chapter 5 - The Reverse Cipher ...

    Hacking_The_Art_of_Exploitation

    This text introduces the spirit and theory of hacking as well as the science behind it all; it also provides some core techniques and tricks of hacking so you can think like a hacker, write your own ...

    history and impact of hacking

    history and impact of hacking

    Gray.Hat.Hacking.The.Ethical.Hackers.Handbook.4th.Edition

    Table of Contents Part I Crash Course: Preparing for the War Chapter 1 Ethical Hacking and the Legal System Chapter 2 Programming Survival Skills Chapter 3 Static Analysis Chapter 4 Advanced Analysis ...

Global site tag (gtag.js) - Google Analytics