To get your code checked into mozilla.org's CVS repository you'll need to understand our code development cycle, coding practices, and checkin requirements. You probably also want to have a reasonable understanding about the project's organization.
(If you're looking for the document called Hacking Mozilla that used to live at this page, go to the first link below.)
A. Code Development
Life Cycle of a Patch (formerly "Hacking Mozilla")
An overview of how to get the source, develop patches, get them reviewed, super-reviewed and checked in the tree.
Mozilla Hacker's Getting Started Guide
How is the source code organized, where to start, critical tools, rules to follow to contribute.
Good First Bugs
Want to help, but don't know where to start? Here are a few suggestions.
Code review
An FAQ about mozilla.org's code review and super-review process - what it's for, how it works, what to expect.
Super-review
What code needs super-review, what to do if you're seeking a super-review, a list of super-reviewers, plus some tips about what to consider in your code before seeking super-review.
Development Strategies
Some strategies to help developers stay productive.
Tips on Contributing New Features to Mozilla
Design and implementation suggestions for large contributions.
B. Mozilla Coding practices
Mozilla Coding Style Guide
Explanation of the basic styles and patterns that are used in the Mozilla codebase. New code should try to conform to these standards.
Seamonkey Code Reviewer's Guide
A high level outline of what to look for when doing a code review.
Rules and Tips
Questions to ask about your code before you submit it for super-review.
C++ portability guide
Rules, guidelines, and tips for making C++ code portable across many machines and compilers.
C. Checking Code into the mozilla.org tree
Working with the Seamonkey Tree
Description of how to build and test your code before checkin, how mozilla.org manages checkins and each developer's responsibilities to the community when code is committed.
The Seamonkey Engineering Bible
An older but still useful document containing guidance on how to make checkins go smoothly.
Pre-checkin tests
The minimum tests that must be run before you check code in.
Hacking Mozilla with Bonsai (aka "Being on the Hook")
When your code is checked in you are "on the hook." Here's a description of what this means..
Tinderbox Performance tests
These are the tests Tinderbox runs to measure performance. They can be run on patches whose performance impact is suspect.
Performance Regression Policy
When the tree is to be closed due to performance regressions and how it is to be reopened.
Full Smoketests
Tests Mozilla Community QA runs each day on the verification builds.
Getting commit access to Mozilla source code
Steps required to obtain CVS write access to mozilla.org's CVS repository.
Using SSH to connect to cvs.mozilla.org FAQ
A guide to setting up access to cvs.mozilla.org using ssh.
How to complete the CVS Contributor Form
Information on completing the form one needs to fill out as part of the process of getting CVS write access, plus a link to the form itself.
D. Project Organization
Mozilla Roles and Responsibilities
A description of the formalized roles in the Mozilla community -- mozilla.org, drivers, module owners, etc.
Mozilla Modules and Module Ownership
Information on the nature of Mozilla modules, role of module owners, criteria for module ownership, and designating module owners.
Handling Mozilla Security Bugs
mozilla.org policy for handling bugs related to security issues.
分享到:
相关推荐
Table of Contents Hacking—The Art of Exploitation Preface Chapter 1 - 0x100—Introduction Chapter 2 - 0x200—Programming Chapter 3 - 0x300—NETWORKING Chapter 4 - 0x400—Cryptology ...
hacking the art of exploitation 2nd edition book erickson, J 2008 书签完好,非照片
Title: Python Application Hacking Essentials ...Table of Contents Basic Concept for a Windows Application Message Hooking Utilizing ctypes API hook utilizing pydbg module Image File Hacking
Hacking Point of Sale is a compelling book that tackles this enormous problem head-on. Exploring all aspects of the problem in detail – from how attacks are structured to the structure of magnetic ...
Hacking The Art Of Exploitation 2nd Edition
Hacking The Art Of Exploitation 2nd Edition 英文版
Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves ...
Hacking The Art of Exploitation 2nd Edition from No Starch Press
Hacking.The.Art.of.Exploitation,.2nd.Edition
Table of Contents Network Hacking Introduction Configure a Test Environment Vulnerability Analysis via Port Scanning Stealing Credentials Using Packet Sniffing Overview of a DoS Attack DoS - Ping of ...
Title: Python Hacking ...Table of Contents Chapter 1 Preparation for Hacking Chapter 2 Application Hacking Chapter 3 Web Hacking Chapter 4 Network Hacking Chapter 5 System Hacking Chapter 6 Conclusion
hacking hacking hacking hacking
The goal of this book is to share the art of hacking with everyone. Understanding hacking techniques is often difficult, since it requires both breadth and depth of knowledge. Many hacking texts seem ...
Learn the basics of ethical hacking and gain insights into the logic, algorithms, and syntax of Python. This book will set you up with a foundation that will help you understand the advanced concepts ...
The Basics of Hacking and Penetration Testing.pdf
文字版Hacking: The Art of Exploitation。包含书签,非常完美
This book explains the details of various hacking techniques, many of which get very technical. While the fundamental programming concepts that these hacking techniques build from are introduced in ...
Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker’s repertoire—why hack into something when you could just ask for access? Undetectable by firewalls and ...
Table of Contents Chapter 1 - Making Paper Cryptography Tools Chapter 2 - Installing Python Chapter 3 - The Interactive Shell Chapter 4 - Strings and Writing Programs Chapter 5 - The Reverse Cipher ...