searching for reviewer(baku)
679ce0bdbf18780f08e6481f6aa3b8a9d1c082c1: Bug 1550633 - part6 : clear track's cues list whenever track element's src attribute set, changed or removed. r=jya,baku
alwu <alwu@mozilla.com> - Tue, 21 May 2019 09:21:16 +0000 - rev 475133
Push 113193 by dvarga@mozilla.com at Thu, 23 May 2019 16:04:39 +0000
Bug 1550633 - part6 : clear track's cues list whenever track element's src attribute set, changed or removed. r=jya,baku According to the spec [1], we should empty track's cue list whenever a track element has its src attribute set, changed, or removed. [1] https://html.spec.whatwg.org/multipage/media.html#sourcing-out-of-band-text-tracks:attr-track-src Differential Revision: https://phabricator.services.mozilla.com/D31552
1912d221317a9ba513e087d4775b105d95856078: Bug 1489669 - [1.4] Add Storage Controller API. r=baku,snorp
Eugen Sawin <esawin@me73.com> - Wed, 22 May 2019 20:21:09 +0000 - rev 475078
Push 113193 by dvarga@mozilla.com at Thu, 23 May 2019 16:04:39 +0000
Bug 1489669 - [1.4] Add Storage Controller API. r=baku,snorp Differential Revision: https://phabricator.services.mozilla.com/D32153
688e84498d3807b881d14645460e3015bbcbca19: Bug 1553400 - XMLHttpRequestDoneNotifier should own XHR, not vice-versa, r=baku
Olli Pettay <Olli.Pettay@helsinki.fi> - Wed, 22 May 2019 15:40:10 +0000 - rev 475077
Push 113193 by dvarga@mozilla.com at Thu, 23 May 2019 16:04:39 +0000
Bug 1553400 - XMLHttpRequestDoneNotifier should own XHR, not vice-versa, r=baku Differential Revision: https://phabricator.services.mozilla.com/D32142
756519a7cf79069510c83d82f7616a5cf5aa741e: Bug 1510569 - Port onStateChange notifications inside WebProgressChild.jsm to C++ r=baku,kmag
Barret Rennie <barret@brennie.ca> - Tue, 21 May 2019 21:35:04 +0000 - rev 475065
Push 113193 by dvarga@mozilla.com at Thu, 23 May 2019 16:04:39 +0000
Bug 1510569 - Port onStateChange notifications inside WebProgressChild.jsm to C++ r=baku,kmag We now also only access the document when the state is nsIWebProgress::STATE_STOP. The comments in the previous code indicated that touching the document inside the event handler when the state is not STATE_STOP would result in the content creating a new about:blank document to retrieve the values from. However, it then went on to do this in another location, causing a document to be created whenever we received an onStateChange event. This should no longer occur. Differential Revision: https://phabricator.services.mozilla.com/D28125
7fc705ad4f94b72b04eaaaa93e5147c3d791f712: Bug 1553328 - use browsing context to notify tab mute/unmute media. r=baku,farre
Alastor Wu <alwu@mozilla.com> - Wed, 22 May 2019 12:19:49 +0000 - rev 475002
Push 113187 by btara@mozilla.com at Thu, 23 May 2019 04:45:24 +0000
Bug 1553328 - use browsing context to notify tab mute/unmute media. r=baku,farre This bug will use the browsing context to notify content tab to mute/unmute media, instead of using MessageManager. We would use the top level canonical browsing context to set the media mute property for the top level window and propagate it to other top level windows in other processes. If we don't do so, we're not able to mute/unmute media in the different process when we we enable Fission, because the current way we use can only notify one process and would cause the media on other process can't be muted/unmuted. Differential Revision: https://phabricator.services.mozilla.com/D32077
3399e7c519424a82824f48abd3b2a4d75346d723: Bug 965637: Move CSP from Principal into Client, part 2: worker changes. r=baku
Christoph Kerschbaumer <ckerschb@christophkerschbaumer.com> - Tue, 21 May 2019 23:14:50 +0000 - rev 474896
Push 113174 by nerli@mozilla.com at Wed, 22 May 2019 03:46:05 +0000
Bug 965637: Move CSP from Principal into Client, part 2: worker changes. r=baku Differential Revision: https://phabricator.services.mozilla.com/D27655
723406ecb5f6063834f416606aea688d3cd56a95: Bug 1549825 - Create empty about:protections page. r=johannh,baku
Erica Wright <ewright@mozilla.com> - Tue, 21 May 2019 18:32:32 +0000 - rev 474853
Push 113174 by nerli@mozilla.com at Wed, 22 May 2019 03:46:05 +0000
Bug 1549825 - Create empty about:protections page. r=johannh,baku Differential Revision: https://phabricator.services.mozilla.com/D30652
c5488e2770a6273fae9d9ae62ab9bca888354b95: Bug 1510569 - Port onStateChange notifications inside WebProgressChild.jsm to C++ r=baku,kmag
Barret Rennie <barret@brennie.ca> - Tue, 21 May 2019 19:28:52 +0000 - rev 474852
Push 113174 by nerli@mozilla.com at Wed, 22 May 2019 03:46:05 +0000
Bug 1510569 - Port onStateChange notifications inside WebProgressChild.jsm to C++ r=baku,kmag We now also only access the document when the state is nsIWebProgress::STATE_STOP. The comments in the previous code indicated that touching the document inside the event handler when the state is not STATE_STOP would result in the content creating a new about:blank document to retrieve the values from. However, it then went on to do this in another location, causing a document to be created whenever we received an onStateChange event. This should no longer occur. Differential Revision: https://phabricator.services.mozilla.com/D28125
57f49df057be162a48618ed969f3859a087e0b77: Bug 1510569 - Port onStateChange notifications inside WebProgressChild.jsm to C++ r=baku,kmag
Barret Rennie <barret@brennie.ca> - Tue, 21 May 2019 17:09:14 +0000 - rev 474804
Push 113171 by aiakab@mozilla.com at Tue, 21 May 2019 21:56:33 +0000
Bug 1510569 - Port onStateChange notifications inside WebProgressChild.jsm to C++ r=baku,kmag We now also only access the document when the state is nsIWebProgress::STATE_STOP. The comments in the previous code indicated that touching the document inside the event handler when the state is not STATE_STOP would result in the content creating a new about:blank document to retrieve the values from. However, it then went on to do this in another location, causing a document to be created whenever we received an onStateChange event. This should no longer occur. Differential Revision: https://phabricator.services.mozilla.com/D28125
ca347ea97ee31b859bc250936cf6e4256198c516: Bug 1548517 - Add hash for test entries added via HostInPrefTables. r=baku
dlee <dlee@mozilla.com> - Fri, 10 May 2019 19:39:24 +0000 - rev 473753
Push 113107 by csabou@mozilla.com at Tue, 14 May 2019 16:12:57 +0000
Bug 1548517 - Add hash for test entries added via HostInPrefTables. r=baku Origin telemetry expects every tracking channel has tracker's hash. Without hash value for test entries, it will trigger MOZ_ASSERT while running testcases. Differential Revision: https://phabricator.services.mozilla.com/D30061
8e51c8d00793669923134baaf44f32b552c6c991: Bug 1546296 - Correctly clear Service Workers by hostname. r=baku
Johann Hofmann <jhofmann@mozilla.com> - Mon, 13 May 2019 21:32:53 +0000 - rev 473690
Push 113102 by apavel@mozilla.com at Tue, 14 May 2019 04:24:11 +0000
Bug 1546296 - Correctly clear Service Workers by hostname. r=baku Differential Revision: https://phabricator.services.mozilla.com/D30455
dac784d695b31fcffe11a840c2c08e287b467ee6: Bug 1426562 - Don't crash on `Response` constructor in WebExtensions. r=baku
Perry Jiang <perry@mozilla.com> - Mon, 13 May 2019 17:03:58 +0000 - rev 473631
Push 113093 by apavel@mozilla.com at Mon, 13 May 2019 22:09:34 +0000
Bug 1426562 - Don't crash on `Response` constructor in WebExtensions. r=baku Differential Revision: https://phabricator.services.mozilla.com/D29365
1fa720d18b38e35831de185ac2f55356c88a7d21: Bug 1536762 - part2 : use first line box's size as positioning basic unit. r=heycam,baku
alwu <alwu@mozilla.com> - Thu, 09 May 2019 19:22:33 +0000 - rev 473315
Push 113072 by nbeleuzu@mozilla.com at Fri, 10 May 2019 02:59:17 +0000
Bug 1536762 - part2 : use first line box's size as positioning basic unit. r=heycam,baku According to the spec [1] 7.2.10.2, we should use the first line box's height or width as positioning unit to adjust box's position. We will also use this value to adjust box when `snap-to-line` is false. There, we implement a new chrome-only API to acquire this information, which would return the first line box's size in the `block` frame. [1] https://www.w3.org/TR/webvtt1/#ref-for-webvtt-cue-snap-to-lines-flag-12 Differential Revision: https://phabricator.services.mozilla.com/D29745
2d810269b72e198765af3d997f3b117d832afd38: Bug 1536762 - part1 : use unscaled bounding box'size as a cue box's size. r=baku,heycam
alwu <alwu@mozilla.com> - Thu, 09 May 2019 18:26:17 +0000 - rev 473314
Push 113072 by nbeleuzu@mozilla.com at Fri, 10 May 2019 02:59:17 +0000
Bug 1536762 - part1 : use unscaled bounding box'size as a cue box's size. r=baku,heycam When adjusting cue's position, the goal is to place cue boxes fully inside the rendering area, and place in the right place. In order to check whether the box is correctly inside the rendering area, we have to know the correct size of the cue box. Therefore, we implement the new chrome-only APIs to acquire this information (box's height and width), and this returned value won't be affected by CSS transformation, which is good for positioning. Differential Revision: https://phabricator.services.mozilla.com/D27178
dd551956b3329ccf67cd8d6f279b93f04f79eeab: Bug 1546296 - Correctly clear Service Workers by hostname. r=baku
Johann Hofmann <jhofmann@mozilla.com> - Thu, 09 May 2019 20:09:04 +0000 - rev 473300
Push 113072 by nbeleuzu@mozilla.com at Fri, 10 May 2019 02:59:17 +0000
Bug 1546296 - Correctly clear Service Workers by hostname. r=baku Differential Revision: https://phabricator.services.mozilla.com/D30455
91754861e8d845ea6d84ae52b4ebad339fd89d96: Bug 1550364 part 6. Stop using [array] in nsIUDPSocketInternal. r=baku
Boris Zbarsky <bzbarsky@mit.edu> - Thu, 09 May 2019 06:55:07 +0000 - rev 473295
Push 113072 by nbeleuzu@mozilla.com at Fri, 10 May 2019 02:59:17 +0000
Bug 1550364 part 6. Stop using [array] in nsIUDPSocketInternal. r=baku Differential Revision: https://phabricator.services.mozilla.com/D30449
1456c2b5efb899d210fb91f2ebedfcad7c094bea: Bug 1550364 part 5. Get rid of nsIUDPSocketChild. r=baku
Boris Zbarsky <bzbarsky@mit.edu> - Thu, 09 May 2019 06:55:06 +0000 - rev 473294
Push 113072 by nbeleuzu@mozilla.com at Fri, 10 May 2019 02:59:17 +0000
Bug 1550364 part 5. Get rid of nsIUDPSocketChild. r=baku Differential Revision: https://phabricator.services.mozilla.com/D30448
dfbb67a692f4c1a257edd0b441a84b8c01a8e9c7: Bug 1550364 part 4. Move various methods from nsIUDPSocketChild to dom::UDPSocketChild, and simplify their signatures where possible. r=baku
Boris Zbarsky <bzbarsky@mit.edu> - Thu, 09 May 2019 06:55:06 +0000 - rev 473293
Push 113072 by nbeleuzu@mozilla.com at Fri, 10 May 2019 02:59:17 +0000
Bug 1550364 part 4. Move various methods from nsIUDPSocketChild to dom::UDPSocketChild, and simplify their signatures where possible. r=baku Differential Revision: https://phabricator.services.mozilla.com/D30447
2e9edc96c3d22f6aab3cc9bb69125b134a381b82: Bug 1550364 part 3. Remove unused nsIUDPSocketChild methods. r=baku
Boris Zbarsky <bzbarsky@mit.edu> - Thu, 09 May 2019 06:55:06 +0000 - rev 473292
Push 113072 by nbeleuzu@mozilla.com at Fri, 10 May 2019 02:59:17 +0000
Bug 1550364 part 3. Remove unused nsIUDPSocketChild methods. r=baku Differential Revision: https://phabricator.services.mozilla.com/D30446
f9bdf7a91fbc79fc67c228bf0da8219f62465726: Bug 1550364 part 2. Use dom::UDPSocketChild, not nsIUDPSocketChild, in C++ code. r=baku
Boris Zbarsky <bzbarsky@mit.edu> - Thu, 09 May 2019 06:55:05 +0000 - rev 473291
Push 113072 by nbeleuzu@mozilla.com at Fri, 10 May 2019 02:59:17 +0000
Bug 1550364 part 2. Use dom::UDPSocketChild, not nsIUDPSocketChild, in C++ code. r=baku Differential Revision: https://phabricator.services.mozilla.com/D30445
6225b9daa9d3e537a24e85a7f36dae882ff0d90a: Bug 1550364 part 1. Stop claiming nsIUDPSocketChild is scriptable, since we never use it from script. r=baku
Boris Zbarsky <bzbarsky@mit.edu> - Thu, 09 May 2019 06:55:05 +0000 - rev 473290
Push 113072 by nbeleuzu@mozilla.com at Fri, 10 May 2019 02:59:17 +0000
Bug 1550364 part 1. Stop claiming nsIUDPSocketChild is scriptable, since we never use it from script. r=baku Differential Revision: https://phabricator.services.mozilla.com/D30444
98989127264bd94ee0030809e1a9019832198a8f: Bug 1547813 - Part 12: Add some tests for partitioning third-party storage/messaging with dynamic FPI; r=baku
Ehsan Akhgari <ehsan@mozilla.com> - Thu, 09 May 2019 07:14:19 +0000 - rev 473250
Push 113072 by nbeleuzu@mozilla.com at Fri, 10 May 2019 02:59:17 +0000
Bug 1547813 - Part 12: Add some tests for partitioning third-party storage/messaging with dynamic FPI; r=baku This patch doesn't port all of the existing tests because some of them do not pass yet and some others need more work to be ported. This will happen in follow-up bugs. Differential Revision: https://phabricator.services.mozilla.com/D30401
c1288949de1cc38beee2a6cea0704f59c46f2551: Bug 1547813 - Part 9: Ensure the cookie service does third-party checks when the cookie policy is set to nsICookieService::BEHAVIOR_REJECT_TRACKER_AND_PARTITION_FOREIGN; r=baku
Ehsan Akhgari <ehsan@mozilla.com> - Wed, 08 May 2019 19:38:08 +0000 - rev 473247
Push 113072 by nbeleuzu@mozilla.com at Fri, 10 May 2019 02:59:17 +0000
Bug 1547813 - Part 9: Ensure the cookie service does third-party checks when the cookie policy is set to nsICookieService::BEHAVIOR_REJECT_TRACKER_AND_PARTITION_FOREIGN; r=baku Differential Revision: https://phabricator.services.mozilla.com/D30118
8cad4fd197b1bdbee9e36bc54a12c48dd8c8e269: Bug 1547813 - Part 8: Introduce a CookieSettings API to query whether cookies from third-party trackers must be rejected and use it in Gecko; r=baku
Ehsan Akhgari <ehsan@mozilla.com> - Wed, 08 May 2019 20:22:18 +0000 - rev 473246
Push 113072 by nbeleuzu@mozilla.com at Fri, 10 May 2019 02:59:17 +0000
Bug 1547813 - Part 8: Introduce a CookieSettings API to query whether cookies from third-party trackers must be rejected and use it in Gecko; r=baku Differential Revision: https://phabricator.services.mozilla.com/D30117
807ce59e7e6eecbbb83b02d1ff45ecbda9896835: Bug 1547813 - Part 7: Introduce a storage partitioning API; r=baku
Ehsan Akhgari <ehsan@mozilla.com> - Wed, 08 May 2019 20:15:13 +0000 - rev 473245
Push 113072 by nbeleuzu@mozilla.com at Fri, 10 May 2019 02:59:17 +0000
Bug 1547813 - Part 7: Introduce a storage partitioning API; r=baku This API abstracts away the details of the decision on what context should be partitioned away from the consumers and centralizes the decision making into the same location in the code base. Differential Revision: https://phabricator.services.mozilla.com/D29742
06943593738cbfb00527317c54f8b58d324060ab: Bug 1547813 - Part 6: Return StorageAccess::ePartitionForeignOrDeny from storage access APIs when the antitracking backend mandates that; r=baku
Ehsan Akhgari <ehsan@mozilla.com> - Wed, 08 May 2019 20:13:23 +0000 - rev 473244
Push 113072 by nbeleuzu@mozilla.com at Fri, 10 May 2019 02:59:17 +0000
Bug 1547813 - Part 6: Return StorageAccess::ePartitionForeignOrDeny from storage access APIs when the antitracking backend mandates that; r=baku Differential Revision: https://phabricator.services.mozilla.com/D29741
4ced8d49ddc37cd3ecdb62c38e7df51f5603f475: Bug 1547813 - Part 5: Introduce StorageAccess::ePartitionForeignOrDeny; r=baku
Ehsan Akhgari <ehsan@mozilla.com> - Thu, 09 May 2019 07:14:34 +0000 - rev 473243
Push 113072 by nbeleuzu@mozilla.com at Fri, 10 May 2019 02:59:17 +0000
Bug 1547813 - Part 5: Introduce StorageAccess::ePartitionForeignOrDeny; r=baku This StorageAccess code tells callers that they must partition third-party storage, or deny storage access if that is not possible. Differential Revision: https://phabricator.services.mozilla.com/D29740
77a040f527e9903657ccc0910adb760aef281619: Bug 1547813 - Part 4: Rename StorageAccess::ePartitionedOrDeny to ePartitionTrackersOrDeny; r=baku
Ehsan Akhgari <ehsan@mozilla.com> - Wed, 08 May 2019 19:37:52 +0000 - rev 473242
Push 113072 by nbeleuzu@mozilla.com at Fri, 10 May 2019 02:59:17 +0000
Bug 1547813 - Part 4: Rename StorageAccess::ePartitionedOrDeny to ePartitionTrackersOrDeny; r=baku Differential Revision: https://phabricator.services.mozilla.com/D29739
b4651cfaff307a7f3f05538907045b1e24a07923: Bug 1547813 - Part 3: Modify the antitracking algorithms to work with nsICookieService::BEHAVIOR_REJECT_TRACKER_AND_PARTITION_FOREIGN; r=baku
Ehsan Akhgari <ehsan@mozilla.com> - Thu, 09 May 2019 14:00:55 +0000 - rev 473241
Push 113072 by nbeleuzu@mozilla.com at Fri, 10 May 2019 02:59:17 +0000
Bug 1547813 - Part 3: Modify the antitracking algorithms to work with nsICookieService::BEHAVIOR_REJECT_TRACKER_AND_PARTITION_FOREIGN; r=baku The policy that this patch implements in the antitracking backend is to treat third-party trackers exactly the same way as BEHAVIOR_REJECT_TRACKER, and additionally partition all third-party contexts as well. Differential Revision: https://phabricator.services.mozilla.com/D29738
279c140a4d71c537afd5eee36f3b9262f97c819b: Bug 1547813 - Part 2: Introduce nsIWebProgressListener::STATE_COOKIES_PARTITIONED_FOREIGN; r=baku
Ehsan Akhgari <ehsan@mozilla.com> - Wed, 08 May 2019 19:37:47 +0000 - rev 473240
Push 113072 by nbeleuzu@mozilla.com at Fri, 10 May 2019 02:59:17 +0000
Bug 1547813 - Part 2: Introduce nsIWebProgressListener::STATE_COOKIES_PARTITIONED_FOREIGN; r=baku This error code indicates the specific case where the antitracking backend rejects a particular access request because the resource is third-party and the cookie policy mandates that third-party resources must be partitioned. Differential Revision: https://phabricator.services.mozilla.com/D29737
0e0241f3d366f10b5eab0209897c2494064fadfb: Bug 1547813 - Part 1: Introduce nsICookieService::BEHAVIOR_REJECT_TRACKER_AND_PARTITION_FOREIGN; r=baku
Ehsan Akhgari <ehsan@mozilla.com> - Wed, 08 May 2019 19:37:40 +0000 - rev 473239
Push 113072 by nbeleuzu@mozilla.com at Fri, 10 May 2019 02:59:17 +0000
Bug 1547813 - Part 1: Introduce nsICookieService::BEHAVIOR_REJECT_TRACKER_AND_PARTITION_FOREIGN; r=baku This new code designates our new cookie policy for blocking cookies and storage access from third-party trackers and partitioning the cookie jar of the rest of third-party resources. Differential Revision: https://phabricator.services.mozilla.com/D29736
65dd82d198821a6107fe869e0a4aee4dc3feb89f: Bug 1549389 - Fix the expected value of attribute0023 wpt test; r=baku
Ehsan Akhgari <ehsan@mozilla.com> - Wed, 08 May 2019 08:47:25 +0000 - rev 473065
Push 113065 by opoprus@mozilla.com at Thu, 09 May 2019 03:46:59 +0000
Bug 1549389 - Fix the expected value of attribute0023 wpt test; r=baku Differential Revision: https://phabricator.services.mozilla.com/D30051
e8597b0c4aab785871b6a2a8b7146aec80ad91e1: Bug 1549011 - Ignore cookie name-value-pair strings with an empty name; r=baku
Ehsan Akhgari <ehsan@mozilla.com> - Wed, 08 May 2019 08:51:42 +0000 - rev 473064
Push 113065 by opoprus@mozilla.com at Thu, 09 May 2019 03:46:59 +0000
Bug 1549011 - Ignore cookie name-value-pair strings with an empty name; r=baku Differential Revision: https://phabricator.services.mozilla.com/D29929
cee398776b835ecb955e0ff7af1a457898808637: Bug 1549241 - disable payments-related feature-policy tests on GeckoView due to crashes r=baku
Marcos Cáceres <mcaceres@mozilla.com> - Wed, 08 May 2019 08:53:25 +0000 - rev 473050
Push 113063 by opoprus@mozilla.com at Wed, 08 May 2019 22:02:04 +0000
Bug 1549241 - disable payments-related feature-policy tests on GeckoView due to crashes r=baku See https://bugzilla.mozilla.org/show_bug.cgi?id=1544637 Differential Revision: https://phabricator.services.mozilla.com/D29976
eb990c2653e061801885f4546e8da756a8464873: Bug 1548486 - Set tracking info in fingerprinting annotation & cryptoming annotation. r=baku
dlee <dlee@mozilla.com> - Thu, 02 May 2019 16:06:56 +0000 - rev 472678
Push 113042 by opoprus@mozilla.com at Mon, 06 May 2019 22:36:56 +0000
Bug 1548486 - Set tracking info in fingerprinting annotation & cryptoming annotation. r=baku The enable channels classified by these two features contain tracker's hash value. Differential Revision: https://phabricator.services.mozilla.com/D29647
fc0ae629221af74287f6df6f2ffb8bcc0b52c123: Bug 1510569 - Port onStateChange notifications inside WebProgressChild.jsm to C++ r=baku,kmag
Barret Rennie <barret@brennie.ca> - Thu, 02 May 2019 23:36:24 +0000 - rev 472416
Push 113012 by dluca@mozilla.com at Fri, 03 May 2019 13:13:31 +0000
Bug 1510569 - Port onStateChange notifications inside WebProgressChild.jsm to C++ r=baku,kmag We now also only access the document when the state is nsIWebProgress::STATE_STOP. The comments in the previous code indicated that touching the document inside the event handler when the state is not STATE_STOP would result in the content creating a new about:blank document to retrieve the values from. However, it then went on to do this in another location, causing a document to be created whenever we received an onStateChange event. This should no longer occur. Differential Revision: https://phabricator.services.mozilla.com/D28125
24b46555e58ff7fc20b6c84db9c10f2fba79cc23: Bug 1548432 - Part 3: Enable http-state web-platform tests; r=baku
Ehsan Akhgari <ehsan@mozilla.com> - Thu, 02 May 2019 17:12:56 +0000 - rev 472395
Push 113004 by rgurzau@mozilla.com at Fri, 03 May 2019 04:25:36 +0000
Bug 1548432 - Part 3: Enable http-state web-platform tests; r=baku Differential Revision: https://phabricator.services.mozilla.com/D29620
c6c3e3d1ee6bb5b2787ee6acf2d1b09405a1b409: Bug 1548432 - Part 2: Ignore cookie name-value-pair strings without a "=" character; r=baku
Ehsan Akhgari <ehsan@mozilla.com> - Thu, 02 May 2019 17:12:55 +0000 - rev 472394
Push 113004 by rgurzau@mozilla.com at Fri, 03 May 2019 04:25:36 +0000
Bug 1548432 - Part 2: Ignore cookie name-value-pair strings without a "=" character; r=baku Differential Revision: https://phabricator.services.mozilla.com/D29619
407a7e536bac1be8d7924f942c7e2c8b2656cb79: Bug 1548432 - Part 1: Remove the passing tests from the set of expected: FAIL annotations in http-state tests; r=baku
Ehsan Akhgari <ehsan@mozilla.com> - Thu, 02 May 2019 17:12:55 +0000 - rev 472393
Push 113004 by rgurzau@mozilla.com at Fri, 03 May 2019 04:25:36 +0000
Bug 1548432 - Part 1: Remove the passing tests from the set of expected: FAIL annotations in http-state tests; r=baku Differential Revision: https://phabricator.services.mozilla.com/D29618
df6f7b36dda2424aecf030f4458aa16c1f086bde: Bug 1481771 - Fix a race condition in browser_privatebrowsing_favicon.js by ensuring the promises that wait on conditions that happen during opening a tab are created before starting to open the tab; r=baku
Ehsan Akhgari <ehsan@mozilla.com> - Thu, 02 May 2019 21:26:11 +0000 - rev 472392
Push 113004 by rgurzau@mozilla.com at Fri, 03 May 2019 04:25:36 +0000
Bug 1481771 - Fix a race condition in browser_privatebrowsing_favicon.js by ensuring the promises that wait on conditions that happen during opening a tab are created before starting to open the tab; r=baku Differential Revision: https://phabricator.services.mozilla.com/D29717
6de795fcf1fa66ba4275014bebd7eda321583d44: Bug 1540733 - Create a new IPCBlobInputStreamChild actor when migrating, r=baku
Nika Layzell <nika@thelayzells.com> - Thu, 02 May 2019 16:18:51 +0000 - rev 472356
Push 113004 by rgurzau@mozilla.com at Fri, 03 May 2019 04:25:36 +0000
Bug 1540733 - Create a new IPCBlobInputStreamChild actor when migrating, r=baku Differential Revision: https://phabricator.services.mozilla.com/D27970
13c5249d66a7fea13cac278964ad365564ae4478: Bug 1510569 - Port onStateChange notifications inside WebProgressChild.jsm to C++ r=baku,kmag
Barret Rennie <barret@brennie.ca> - Thu, 02 May 2019 16:20:34 +0000 - rev 472352
Push 113004 by rgurzau@mozilla.com at Fri, 03 May 2019 04:25:36 +0000
Bug 1510569 - Port onStateChange notifications inside WebProgressChild.jsm to C++ r=baku,kmag We now also only access the document when the state is nsIWebProgress::STATE_STOP. The comments in the previous code indicated that touching the document inside the event handler when the state is not STATE_STOP would result in the content creating a new about:blank document to retrieve the values from. However, it then went on to do this in another location, causing a document to be created whenever we received an onStateChange event. This should no longer occur. Differential Revision: https://phabricator.services.mozilla.com/D28125
840db546dc1f20159cb4674535910c4a24f26a0e: Bug 1548562 - require `nsThread::Init` to take a name; r=baku
Nathan Froyd <froydnj@mozilla.com> - Thu, 02 May 2019 16:05:50 +0000 - rev 472343
Push 113004 by rgurzau@mozilla.com at Fri, 03 May 2019 04:25:36 +0000
Bug 1548562 - require `nsThread::Init` to take a name; r=baku There's no good reason why we should let unnamed threads through this interface. Differential Revision: https://phabricator.services.mozilla.com/D29672
c477a96a488995459baab0948a10cb7231d7cbe3: Bug 1548349 - Make sure the image cache for third-party tracking subresources is keyed to the top-level document's eTLD+1; r=baku,aosmond
Ehsan Akhgari <ehsan@mozilla.com> - Thu, 02 May 2019 12:27:07 +0000 - rev 472334
Push 113004 by rgurzau@mozilla.com at Fri, 03 May 2019 04:25:36 +0000
Bug 1548349 - Make sure the image cache for third-party tracking subresources is keyed to the top-level document's eTLD+1; r=baku,aosmond Differential Revision: https://phabricator.services.mozilla.com/D29546
69fb960771d254fde9b7567fd3f527a205a60555: Bug 1548375 - Remove redundant canvas log info. r=baku
J. Ryan Stinnett <jryans@gmail.com> - Wed, 01 May 2019 21:54:43 +0000 - rev 472246
Push 112987 by cbrindusan@mozilla.com at Thu, 02 May 2019 15:35:11 +0000
Bug 1548375 - Remove redundant canvas log info. r=baku Now that we're reporting to the page console, there's no need to include the top document URI, since that's obvious from the tab. In addition, the script file and line are already added by the console reporting path (and displayed with nicer formatting), so we don't need to add them to the message text. Differential Revision: https://phabricator.services.mozilla.com/D29573
1376a67f22b4d4d28c712bd74217644fbd5fb040: Bug 1548375 - Send canvas fingerprinting logs to page console. r=baku
J. Ryan Stinnett <jryans@gmail.com> - Wed, 01 May 2019 21:51:41 +0000 - rev 472245
Push 112987 by cbrindusan@mozilla.com at Thu, 02 May 2019 15:35:11 +0000
Bug 1548375 - Send canvas fingerprinting logs to page console. r=baku By directing fingerprinting logs to the page console (instead of the browser console), web developers are much more likely to see them and understand what's wrong. Differential Revision: https://phabricator.services.mozilla.com/D29572
19375055cd534807854b38205ef585d9154dd4a8: Bug 1548086 - Work around bug 1548085 in browser_referrerDefaultPolicy.js; r=baku
Ehsan Akhgari <ehsan@mozilla.com> - Tue, 30 Apr 2019 22:31:38 +0000 - rev 472070
Push 112974 by ccoroiu@mozilla.com at Wed, 01 May 2019 04:27:55 +0000
Bug 1548086 - Work around bug 1548085 in browser_referrerDefaultPolicy.js; r=baku Differential Revision: https://phabricator.services.mozilla.com/D29399
7b30d0ee0b8c83cdc2786d79faa84ebcc6a5033d: Bug 1547889 - Part 3: Require the caller of the AntiTrackingCommon::IsFirstPartyStorageAccessGrantedFor(nsIPrincipal*) API pass in a cookie setting object; r=baku
Ehsan Akhgari <ehsan@mozilla.com> - Tue, 30 Apr 2019 14:27:43 +0000 - rev 471989
Push 112971 by ccoroiu@mozilla.com at Tue, 30 Apr 2019 21:59:18 +0000
Bug 1547889 - Part 3: Require the caller of the AntiTrackingCommon::IsFirstPartyStorageAccessGrantedFor(nsIPrincipal*) API pass in a cookie setting object; r=baku Differential Revision: https://phabricator.services.mozilla.com/D29321
29f01b943d7fb3a16927b59606fae910896597a9: Bug 1547889 - Part 2: Port AntiTrackingCommon::MaybeIsFirstPartyStorageAccessGrantedFor() to the cookie settings API; r=baku
Ehsan Akhgari <ehsan@mozilla.com> - Tue, 30 Apr 2019 14:27:36 +0000 - rev 471988
Push 112971 by ccoroiu@mozilla.com at Tue, 30 Apr 2019 21:59:18 +0000
Bug 1547889 - Part 2: Port AntiTrackingCommon::MaybeIsFirstPartyStorageAccessGrantedFor() to the cookie settings API; r=baku Differential Revision: https://phabricator.services.mozilla.com/D29320
43a08bca736a41a74e9473dac7a8c468790fcd29: Bug 1547889 - Part 1: Port AntiTrackingCommon::AddFirstPartyStorageAccessGrantedFor() to the cookie settings API; r=baku
Ehsan Akhgari <ehsan@mozilla.com> - Tue, 30 Apr 2019 14:27:34 +0000 - rev 471987
Push 112971 by ccoroiu@mozilla.com at Tue, 30 Apr 2019 21:59:18 +0000
Bug 1547889 - Part 1: Port AntiTrackingCommon::AddFirstPartyStorageAccessGrantedFor() to the cookie settings API; r=baku Differential Revision: https://phabricator.services.mozilla.com/D29319