author | Cristian Tuns <ctuns@mozilla.com> |
Mon, 23 May 2022 06:53:28 -0400 | |
changeset 618530 | a520a5c1a007e898aca68385b8517c28a92649a0 |
parent 618529 | f5495c74793db90bdc7a1b75dad36e61938d1066 |
child 618531 | a703c001c31e6b9d88924318292975dd45c13a80 |
push id | 163313 |
push user | ctuns@mozilla.com |
push date | Mon, 23 May 2022 10:54:41 +0000 |
treeherder | autoland@a520a5c1a007 [default view] [failures only] |
perfherder | [talos] [build metrics] [platform microbench] (compared to previous push) |
bugs | 1763367 |
milestone | 102.0a1 |
backs out | 9b27117a24c837bf96feab38e2e3c6915e09a81f cd28d8497f99225274585842cd223a2b73df753e |
first release with | nightly linux32
nightly linux64
nightly mac
nightly win32
nightly win64
|
last release without | nightly linux32
nightly linux64
nightly mac
nightly win32
nightly win64
|
--- a/devtools/client/webconsole/test/browser/browser_webconsole_warning_group_content_blocking.js +++ b/devtools/client/webconsole/test/browser/browser_webconsole_warning_group_content_blocking.js @@ -174,21 +174,16 @@ add_task(cleanUp); * It should contain "<URL>". */ async function testStorageAccessBlockedGrouping(groupLabel) { const { hud, win, tab } = await openNewWindowAndConsole(TEST_URI); const now = Date.now(); await clearOutput(hud); - // Bug 1763367 - Filter out message like: - // Cookie “name=value” has been rejected as third-party. - // that appear in a random order. - await setFilterState(hud, { text: "-has been rejected" }); - const getWarningMessage = url => groupLabel.replace("<URL>", url); const onStorageAccessBlockedMessage = waitForMessage( hud, getWarningMessage(`${TRACKER_IMG}?1&${now}`), ".warn" ); emitStorageAccessBlockedMessage(tab, `${TRACKER_IMG}?1&${now}`);
--- a/netwerk/protocol/http/HttpBaseChannel.cpp +++ b/netwerk/protocol/http/HttpBaseChannel.cpp @@ -5735,22 +5735,16 @@ NS_IMETHODIMP HttpBaseChannel::HasCrossOriginOpenerPolicyMismatch(bool* aIsMismatch) { // This should only be called in parent process. MOZ_ASSERT(XRE_IsParentProcess()); *aIsMismatch = LoadHasCrossOriginOpenerPolicyMismatch(); return NS_OK; } void HttpBaseChannel::MaybeFlushConsoleReports() { - // Flush if we have a known window ID. - if (mLoadInfo->GetInnerWindowID() > 0) { - FlushReportsToConsole(mLoadInfo->GetInnerWindowID()); - return; - } - // If this channel is part of a loadGroup, we can flush the console reports // immediately. nsCOMPtr<nsILoadGroup> loadGroup; nsresult rv = GetLoadGroup(getter_AddRefs(loadGroup)); if (NS_SUCCEEDED(rv) && loadGroup) { FlushConsoleReports(loadGroup); } }