dd05e268e6ec0bad1ee3574f8e7eb92fc02535f4: Bug 1612376 - P6. Permission update in the parent process should only happen when the heurisitc is triggered by a first-party window r=timhuang,baku
Dimi Lee <dlee@mozilla.com> - Wed, 29 Apr 2020 14:48:47 +0000 - rev 526676
Push 37361 by malexandru@mozilla.com at Wed, 29 Apr 2020 21:55:39 +0000
Bug 1612376 - P6. Permission update in the parent process should only happen when the heurisitc is triggered by a first-party window r=timhuang,baku Differential Revision: https://phabricator.services.mozilla.com/D72657
6400cd18a2972f4eb48774b4dcc46325ad9ee109: Bug 1612376 - P5. Remove HasStoragePermission from WindowContext r=timhuang,baku
Dimi Lee <dlee@mozilla.com> - Wed, 29 Apr 2020 14:48:39 +0000 - rev 526675
Push 37361 by malexandru@mozilla.com at Wed, 29 Apr 2020 21:55:39 +0000
Bug 1612376 - P5. Remove HasStoragePermission from WindowContext r=timhuang,baku We don't access HasStoragePermission across process, so we don't need to store the permission in WindowContext. After this patch, HasStoragePermission will only be stored in the channel's LoadInfo, which is set when a channel is created in the parent and it won't be updated. Depends on D71985 Differential Revision: https://phabricator.services.mozilla.com/D72305
e2eb63c3ce5caf55069da424079d9ad293bf5999: Bug 1612376 - P4. ShouldAllowAccessFor use ContentBlocking::HasStorageAccessGranted r=timhuang,baku
Dimi Lee <dlee@mozilla.com> - Wed, 29 Apr 2020 14:48:35 +0000 - rev 526674
Push 37361 by malexandru@mozilla.com at Wed, 29 Apr 2020 21:55:39 +0000
Bug 1612376 - P4. ShouldAllowAccessFor use ContentBlocking::HasStorageAccessGranted r=timhuang,baku There are two places where we save storage permission: 1. LoadInfo hasStoragePermission attribute 2. mStorageAccessGranted in nsPIDOMWindowInner For LoadInfo.hasStoragePermission, it is set during channel creation and its value remains the same even when the storage permission is granted afterward. The updated storage permission for a window is saved in mStorageAccessGranted, which has a different meaning for fission and non-fission mode. In non-fission mode, mStorageAccessGranted is saved in the top-level window and it is an array containing all tracking subframes that are allowed to access storage. In fission mode, mStorageAccessGranted is set in individual tracking windows that we have granted its storage permission. Although it works like a boolean flag in fission, we still keep using an array to compatible with the use case in non-fission mode. Depends on D71984 Differential Revision: https://phabricator.services.mozilla.com/D71985
747f90b27d59cd0e7e20131135570420e515fbfa: Bug 1612376 - P3. Update storage access granted decision to all subframes with the same tracking origin. r=timhuang,baku
Dimi Lee <dlee@mozilla.com> - Wed, 29 Apr 2020 14:48:28 +0000 - rev 526673
Push 37361 by malexandru@mozilla.com at Wed, 29 Apr 2020 21:55:39 +0000
Bug 1612376 - P3. Update storage access granted decision to all subframes with the same tracking origin. r=timhuang,baku We only update the result to subframes within the same tab. Depends on D72304 Differential Revision: https://phabricator.services.mozilla.com/D71984
786f17810107b19355818a5300ca6387f38d08cc: Bug 1612376 - P2. Add GetInnerWindow utility function to AntiTrackingUtils r=timhuang,baku
Dimi Lee <dlee@mozilla.com> - Wed, 29 Apr 2020 14:48:20 +0000 - rev 526672
Push 37361 by malexandru@mozilla.com at Wed, 29 Apr 2020 21:55:39 +0000
Bug 1612376 - P2. Add GetInnerWindow utility function to AntiTrackingUtils r=timhuang,baku This patch includes: 1. Add AntiTrackingUtils::GetInnerWindow utility function 2. AntiTrackingUtils::GetPrincipalAndTrackingOrigin supports only getting tracking origin. Depends on D72303 Differential Revision: https://phabricator.services.mozilla.com/D72304
d96ffe342c9ed444717c412c77ed0a96f511f589: Bug 1612376 - P1. Add UpdateStorageAccessGranted ipc method to PWindowGlobal r=timhuang,baku
Dimi Lee <dlee@mozilla.com> - Wed, 29 Apr 2020 14:48:13 +0000 - rev 526671
Push 37361 by malexandru@mozilla.com at Wed, 29 Apr 2020 21:55:39 +0000
Bug 1612376 - P1. Add UpdateStorageAccessGranted ipc method to PWindowGlobal r=timhuang,baku This API will be used when we need to udpate a granted stroage permission to child processes. Differential Revision: https://phabricator.services.mozilla.com/D72303
8b824b3ef27f990b75987ff5429ce029444f0ce2: Bug 1634040 - Add test for discardBrowser removing potentially stale tab attributes. r=Gijs
Dão Gottwald <dao@mozilla.com> - Wed, 29 Apr 2020 14:39:17 +0000 - rev 526670
Push 37361 by malexandru@mozilla.com at Wed, 29 Apr 2020 21:55:39 +0000
Bug 1634040 - Add test for discardBrowser removing potentially stale tab attributes. r=Gijs Differential Revision: https://phabricator.services.mozilla.com/D73052
5142b1244ac27bfd58035fb041754d91a01e3111: Bug 1610437 - Only hard-pan the audio on older macbook pro. r=kinetik
Paul Adenot <paul@paul.cx> - Wed, 29 Apr 2020 10:38:53 +0000 - rev 526669
Push 37361 by malexandru@mozilla.com at Wed, 29 Apr 2020 21:55:39 +0000
Bug 1610437 - Only hard-pan the audio on older macbook pro. r=kinetik Differential Revision: https://phabricator.services.mozilla.com/D72821
878dc21be21147dd8e9f51a318aa72a92dd76d9e: Bug 1633809 - Suppress -Wpointer-bool-conversion in WrapNotNullUnchecked. r=miko
Simon Giesecke <sgiesecke@mozilla.com> - Wed, 29 Apr 2020 14:04:09 +0000 - rev 526668
Push 37361 by malexandru@mozilla.com at Wed, 29 Apr 2020 21:55:39 +0000
Bug 1633809 - Suppress -Wpointer-bool-conversion in WrapNotNullUnchecked. r=miko Differential Revision: https://phabricator.services.mozilla.com/D73013
74edce9ec6a3c94bcb00410d66493eccc738738f: Bug 1633401 - Make Document.HasStorageAccess fission compatible. r=baku
Tim Huang <tihuang@mozilla.com> - Wed, 29 Apr 2020 14:18:07 +0000 - rev 526667
Push 37361 by malexandru@mozilla.com at Wed, 29 Apr 2020 21:55:39 +0000
Bug 1633401 - Make Document.HasStorageAccess fission compatible. r=baku In Document::HasStorageAccess(), we try to get the top-level document. To check if the document is first-party to the top-level document. But, this won't work for Fission since the top-level document could be out-of-process. In this patch, we use broswing context to get the top-level principal to test if the document is thrid-party. If we cannot get the top-level outer window, the top-level document should be cross-origin. So, we know the answer. If the top-level document is available, we check the principal to see if the document is first-party. Differential Revision: https://phabricator.services.mozilla.com/D72664
8609782d78d127c495269680a7054cad13167d42: Bug 1633842 - Enable WR item cache r=jrmuizel
Miko Mynttinen <mikokm@gmail.com> - Wed, 29 Apr 2020 13:21:52 +0000 - rev 526666
Push 37361 by malexandru@mozilla.com at Wed, 29 Apr 2020 21:55:39 +0000
Bug 1633842 - Enable WR item cache r=jrmuizel Differential Revision: https://phabricator.services.mozilla.com/D72924
29ed956cc6c3a91db481750de108a8446d604286: Bug 1633453 - Clear display item cache when the display list send fails or WR backend changes r=jrmuizel
Miko Mynttinen <mikokm@gmail.com> - Wed, 29 Apr 2020 02:26:08 +0000 - rev 526665
Push 37361 by malexandru@mozilla.com at Wed, 29 Apr 2020 21:55:39 +0000
Bug 1633453 - Clear display item cache when the display list send fails or WR backend changes r=jrmuizel Differential Revision: https://phabricator.services.mozilla.com/D72692
a59c015f4369f818c77ec540cd9dbc5e2f9c5f88: Bug 1628635: Update MDN compatibility data. r=rcaliman
Daisuke Akatsuka <daisuke@birchill.co.jp> - Wed, 29 Apr 2020 13:58:28 +0000 - rev 526664
Push 37361 by malexandru@mozilla.com at Wed, 29 Apr 2020 21:55:39 +0000
Bug 1628635: Update MDN compatibility data. r=rcaliman Depends on D72606 Differential Revision: https://phabricator.services.mozilla.com/D72607
d22dbc3857ec6078574161bb7230f425f23d5896: Bug 1630234 - Manually persist layout history state when process flipping. r=peterv
Mike Conley <mconley@mozilla.com> - Wed, 29 Apr 2020 13:38:47 +0000 - rev 526663
Push 37361 by malexandru@mozilla.com at Wed, 29 Apr 2020 21:55:39 +0000
Bug 1630234 - Manually persist layout history state when process flipping. r=peterv Differential Revision: https://phabricator.services.mozilla.com/D72399
c680742a7917c052cc44cbe2a30cf49741a61f39: Bug 1627336 Add Blocklist.jsm to browser_startup.js blacklist r=florian
Andrew Swan <aswan@mozilla.com> - Wed, 29 Apr 2020 13:47:37 +0000 - rev 526662
Push 37361 by malexandru@mozilla.com at Wed, 29 Apr 2020 21:55:39 +0000
Bug 1627336 Add Blocklist.jsm to browser_startup.js blacklist r=florian Differential Revision: https://phabricator.services.mozilla.com/D69604
3c481a4aa0815995625978e642ecd77fa75f10a2: Bug 1623301 - Implement the custom ping API for FOG. r=chutten
Jan-Erik Rediger <jrediger@mozilla.com> - Wed, 29 Apr 2020 08:05:50 +0000 - rev 526661
Push 37361 by malexandru@mozilla.com at Wed, 29 Apr 2020 21:55:39 +0000
Bug 1623301 - Implement the custom ping API for FOG. r=chutten Differential Revision: https://phabricator.services.mozilla.com/D72820
38245c49aea72a342cbe3b189b998a3bc835f49d: Bug 1632150 - Implement the labeled boolean metric type for Project FOG. r=chutten,Dexter
Jan-Erik Rediger <jrediger@mozilla.com> - Wed, 29 Apr 2020 08:14:11 +0000 - rev 526660
Push 37361 by malexandru@mozilla.com at Wed, 29 Apr 2020 21:55:39 +0000
Bug 1632150 - Implement the labeled boolean metric type for Project FOG. r=chutten,Dexter This turned out to be a bit more tricky than anticipated: * We want users to see the type this crate exposes, so we need to wrap it all. * We don't want to deal with validating labels here, so we need to delegate. * We need it to be thread-safe, so that we can generate globals. But we also don't want users to deal with locking. * We want a nice-ish API. This now achieves all of this with just one little trick: a sealed trait. That way we can easily extend it to more types, without adding much more code. Note: It might have been nice to use the index operator (`[]`), but that's defined by a trait in Rust and returns a reference to existing data. We thus can't use it and instead provide a simple `get()` method. Differential Revision: https://phabricator.services.mozilla.com/D72805
9b71539e316fe92112e5afd94d1fbf2e3699d56a: Bug 1632098 - P3. Enable the ParentProcessDocumentChannel. r=mattwoodrow
Jean-Yves Avenard <jyavenard@mozilla.com> - Wed, 29 Apr 2020 13:51:19 +0000 - rev 526659
Push 37361 by malexandru@mozilla.com at Wed, 29 Apr 2020 21:55:39 +0000
Bug 1632098 - P3. Enable the ParentProcessDocumentChannel. r=mattwoodrow Differential Revision: https://phabricator.services.mozilla.com/D72297
fa0f7359881f88cb36f6f8826d0599d6525eaa15: Bug 1634017 - Pass BrowserParent, instead of nsFrameLoader, to EventStateManager::DispatchCrossProcessEvent; r=smaug
Edgar Chen <echen@mozilla.com> - Wed, 29 Apr 2020 11:58:14 +0000 - rev 526658
Push 37361 by malexandru@mozilla.com at Wed, 29 Apr 2020 21:55:39 +0000
Bug 1634017 - Pass BrowserParent, instead of nsFrameLoader, to EventStateManager::DispatchCrossProcessEvent; r=smaug We currently pass nsFrameLoader to DispatchCrossProcessEvent and then try to get BrowserParent from nsFrameLoader, but the call site actually ensures the passed nsFrameLoader is a remote target that could get BrowserParent on it. So we could simplify this by passing BrowserParent to DispatchCrossProcessEvent and also could get rid of unnecessary conversion code in EventStateManager::HandleCrossProcessEvent. Differential Revision: https://phabricator.services.mozilla.com/D73037
8ee7ec2f4b9794e467730f347705d3b62ca4ef1c: Bug 1633451 - Re-disable synthetic mousemoves on Android. r=geckoview-reviewers,m_kato
Kartikaya Gupta <kgupta@mozilla.com> - Wed, 29 Apr 2020 13:44:11 +0000 - rev 526657
Push 37361 by malexandru@mozilla.com at Wed, 29 Apr 2020 21:55:39 +0000
Bug 1633451 - Re-disable synthetic mousemoves on Android. r=geckoview-reviewers,m_kato Differential Revision: https://phabricator.services.mozilla.com/D72691
(0) -300000 -100000 -30000 -10000 -3000 -1000 -300 -100 -50 -20 +20 +50 +100 +300 +1000 +3000 +10000 +30000 tip