searching for reviewer(bholley)
915aa6a1a0edaeb9d65bc87e7f2ef7c4693cabfc: Bug 1145314: Lock down CheckLoadURIFlags by dropping the check that lets any URI_IS_UI_RESOURCE URL link to any other URL with that flag. r=bholley
Christoph Kerschbaumer <ckerschb@christophkerschbaumer.com> - Tue, 15 Sep 2020 07:30:26 +0000 - rev 548647
Push 37786 by nerli@mozilla.com at Tue, 15 Sep 2020 15:47:19 +0000
Bug 1145314: Lock down CheckLoadURIFlags by dropping the check that lets any URI_IS_UI_RESOURCE URL link to any other URL with that flag. r=bholley Differential Revision: https://phabricator.services.mozilla.com/D80601
1edd9346c110b011ed87e50eb3d417202ea445fb: Bug 1658214: Only construct JS-implemented objects if inner window is current. r=bholley
Kris Maglione <maglione.k@gmail.com> - Fri, 14 Aug 2020 16:02:25 +0000 - rev 544686
Push 37700 by dluca@mozilla.com at Sat, 15 Aug 2020 09:31:17 +0000
Bug 1658214: Only construct JS-implemented objects if inner window is current. r=bholley Differential Revision: https://phabricator.services.mozilla.com/D86614
5492ac0e42f79107dbac41a838477c127ed364db: Bug 1145314: Lock down CheckLoadURIFlags by dropping the check that lets any URI_IS_UI_RESOURCE URL link to any other URL with that flag. r=bholley
Christoph Kerschbaumer <ckerschb@christophkerschbaumer.com> - Fri, 03 Jul 2020 08:11:59 +0000 - rev 538565
Push 37566 by ccoroiu@mozilla.com at Fri, 03 Jul 2020 15:35:32 +0000
Bug 1145314: Lock down CheckLoadURIFlags by dropping the check that lets any URI_IS_UI_RESOURCE URL link to any other URL with that flag. r=bholley Differential Revision: https://phabricator.services.mozilla.com/D80601
f524ffe669caa31102581e715275c35b49422fe3: Bug 1145314: Lock down CheckLoadURIFlags by dropping the check that lets any URI_IS_UI_RESOURCE URL link to any other URL with that flag. r=bholley
Christoph Kerschbaumer <ckerschb@christophkerschbaumer.com> - Thu, 02 Jul 2020 09:41:11 +0000 - rev 538452
Push 37563 by cbrindusan@mozilla.com at Thu, 02 Jul 2020 21:49:48 +0000
Bug 1145314: Lock down CheckLoadURIFlags by dropping the check that lets any URI_IS_UI_RESOURCE URL link to any other URL with that flag. r=bholley Differential Revision: https://phabricator.services.mozilla.com/D80601
93dbc3fe146abe287f615a8dab466874f9664727: Bug 1145314: Lock down CheckLoadURIFlags by dropping the check that lets any URI_IS_UI_RESOURCE URL link to any other URL with that flag. r=bholley
Christoph Kerschbaumer <ckerschb@christophkerschbaumer.com> - Thu, 02 Jul 2020 08:17:17 +0000 - rev 538381
Push 37562 by nerli@mozilla.com at Thu, 02 Jul 2020 15:21:09 +0000
Bug 1145314: Lock down CheckLoadURIFlags by dropping the check that lets any URI_IS_UI_RESOURCE URL link to any other URL with that flag. r=bholley Differential Revision: https://phabricator.services.mozilla.com/D80601
93bca0225002f5dae30b60b823cb73684031a348: Bug 1645510: Part 2 - Avoid using the unprivileged junk scope where possible. r=bholley
Kris Maglione <maglione.k@gmail.com> - Sat, 27 Jun 2020 03:06:28 +0000 - rev 537675
Push 37545 by nerli@mozilla.com at Sat, 27 Jun 2020 09:38:32 +0000
Bug 1645510: Part 2 - Avoid using the unprivileged junk scope where possible. r=bholley Differential Revision: https://phabricator.services.mozilla.com/D79720
821960c5fa97cbe6fabaa26182c35d1e76a3ae4e: Bug 1645510: Part 1 - Make unprivileged junk scope creation lazy, weak, and fallible. r=mccr8,bholley
Kris Maglione <maglione.k@gmail.com> - Sat, 27 Jun 2020 03:06:26 +0000 - rev 537674
Push 37545 by nerli@mozilla.com at Sat, 27 Jun 2020 09:38:32 +0000
Bug 1645510: Part 1 - Make unprivileged junk scope creation lazy, weak, and fallible. r=mccr8,bholley Differential Revision: https://phabricator.services.mozilla.com/D79719
e15bba6c88109431499115ac47773205064acd5a: Bug 1648093: Rename hasFlags variables to something more descriptive within nsScriptSecurityManager. r=bholley
Christoph Kerschbaumer <ckerschb@christophkerschbaumer.com> - Wed, 24 Jun 2020 16:57:18 +0000 - rev 537218
Push 37539 by nerli@mozilla.com at Thu, 25 Jun 2020 03:22:32 +0000
Bug 1648093: Rename hasFlags variables to something more descriptive within nsScriptSecurityManager. r=bholley Differential Revision: https://phabricator.services.mozilla.com/D80886
f6c685e4b84159a009137c7579ee0e4c3c021c54: Bug 1641737 - P4. Add UseDirectTaskDispatch/UseSynchronousDispatch to MozPromiseHolder. r=bholley
Jean-Yves Avenard <jyavenard@mozilla.com> - Fri, 12 Jun 2020 05:56:39 +0000 - rev 535256
Push 37500 by ncsoregi@mozilla.com at Fri, 12 Jun 2020 14:56:55 +0000
Bug 1641737 - P4. Add UseDirectTaskDispatch/UseSynchronousDispatch to MozPromiseHolder. r=bholley The allows to not have to deal with MozPromise::Private directly. Differential Revision: https://phabricator.services.mozilla.com/D78208
02f45f660107900ceb10cde467365bec7e891310: Bug 1641737 - P1. Set dispatch type to chained promises. r=bholley
Jean-Yves Avenard <jyavenard@mozilla.com> - Fri, 12 Jun 2020 05:56:26 +0000 - rev 535253
Push 37500 by ncsoregi@mozilla.com at Fri, 12 Jun 2020 14:56:55 +0000
Bug 1641737 - P1. Set dispatch type to chained promises. r=bholley When chaining a MozPromise set to be dispatched via the direct task queue (or synchronous), it makes sense for the chained promise to be dispatched in the same fashion. All MozPromises generated by the IPC bindings are set to use the direct task queue in order to prevent the then runnable to run out of order with other IPC tasks. We want to preserve that task ordering by default. Differential Revision: https://phabricator.services.mozilla.com/D78178
86419b2114e5ad91785281094c5323851a642b51: Bug 1644009 - P14. Fallback to normal dispatch on release. r=bholley
Jean-Yves Avenard <jyavenard@mozilla.com> - Fri, 12 Jun 2020 05:10:57 +0000 - rev 535252
Push 37500 by ncsoregi@mozilla.com at Fri, 12 Jun 2020 14:56:55 +0000
Bug 1644009 - P14. Fallback to normal dispatch on release. r=bholley We shouldn't ever get there, but just in case, better than a null deref. Differential Revision: https://phabricator.services.mozilla.com/D79097
d985d78962c7a4b6a446803ae98ade7eaf9e05ec: Bug 1644009 - P13. Don't have AutoTaskGuard inherit from AutoTaskDispatcher. r=bholley.
Jean-Yves Avenard <jyavenard@mozilla.com> - Fri, 12 Jun 2020 05:10:55 +0000 - rev 535251
Push 37500 by ncsoregi@mozilla.com at Fri, 12 Jun 2020 14:56:55 +0000
Bug 1644009 - P13. Don't have AutoTaskGuard inherit from AutoTaskDispatcher. r=bholley. This prevent being able to assert in the AutoTaskDispatcher that we are using it from the right thread/taskqueue as the SimpleTaskQueue object isn't thread-safe. We want to assert that all nsIDirectTaskDispatcher methods are only ever accessed on the underlying thread. To do so require that the scope of AutoTaskDispatcher to terminate prior the AutoTaskGuard one. Differential Revision: https://phabricator.services.mozilla.com/D79096
a0fe9db3ab56403070c8ff9122bcb5b83c29835b: Bug 1644009 - P10. Make MozPromise access direct task dispatcher using QI(nsIDirectTaskDispatcher). r=bholley
Jean-Yves Avenard <jyavenard@mozilla.com> - Fri, 12 Jun 2020 05:10:32 +0000 - rev 535248
Push 37500 by ncsoregi@mozilla.com at Fri, 12 Jun 2020 14:56:55 +0000
Bug 1644009 - P10. Make MozPromise access direct task dispatcher using QI(nsIDirectTaskDispatcher). r=bholley Differential Revision: https://phabricator.services.mozilla.com/D79094
e3bf9a45db6afe5fa55afa7e6b5d3992ea2b4b8d: Bug 1641737 - P4. Add UseDirectTaskDispatch/UseSynchronousDispatch to MozPromiseHolder. r=bholley
Jean-Yves Avenard <jyavenard@mozilla.com> - Tue, 09 Jun 2020 07:23:57 +0000 - rev 534607
Push 37492 by apavel@mozilla.com at Tue, 09 Jun 2020 15:16:49 +0000
Bug 1641737 - P4. Add UseDirectTaskDispatch/UseSynchronousDispatch to MozPromiseHolder. r=bholley The allows to not have to deal with MozPromise::Private directly. Differential Revision: https://phabricator.services.mozilla.com/D78208
0296d0f6c1d120225f2279f378d33f83bdc02eae: Bug 1641737 - P1. Set dispatch type to chained promises. r=bholley
Jean-Yves Avenard <jyavenard@mozilla.com> - Tue, 09 Jun 2020 07:23:29 +0000 - rev 534604
Push 37492 by apavel@mozilla.com at Tue, 09 Jun 2020 15:16:49 +0000
Bug 1641737 - P1. Set dispatch type to chained promises. r=bholley When chaining a MozPromise set to be dispatched via the direct task queue (or synchronous), it makes sense for the chained promise to be dispatched in the same fashion. All MozPromises generated by the IPC bindings are set to use the direct task queue in order to prevent the then runnable to run out of order with other IPC tasks. We want to preserve that task ordering by default. Differential Revision: https://phabricator.services.mozilla.com/D78178
ab519b8a47f1d3583e17b0105ed54d38fa3839a7: Bug 1641936 - Add a generic principal hash key. r=bholley
Emilio Cobos Álvarez <emilio@crisal.io> - Fri, 29 May 2020 22:18:01 +0000 - rev 533077
Push 37462 by malexandru@mozilla.com at Sat, 30 May 2020 09:46:43 +0000
Bug 1641936 - Add a generic principal hash key. r=bholley Differential Revision: https://phabricator.services.mozilla.com/D77501
5871f4ecce8716009e676c18ce496e5f3bbd8651: Bug 1634135: Update test_xrayToJS to handle Regexp.prototype.dotAll r=bholley
Iain Ireland <iireland@mozilla.com> - Wed, 13 May 2020 16:23:33 +0000 - rev 529655
Push 37412 by cbrindusan@mozilla.com at Wed, 13 May 2020 21:46:27 +0000
Bug 1634135: Update test_xrayToJS to handle Regexp.prototype.dotAll r=bholley We are adding support for the dotAll (/s) RegExp flag, so the list of expected properties on the RegExp prototype has to be updated. Differential Revision: https://phabricator.services.mozilla.com/D74149
4b0f7ee4f17d5102d55d3d1e37f7b83dcb019f0c: Bug 1592488 - P13. Add TailDispatchingTarget class. r=bholley
Jean-Yves Avenard <jyavenard@mozilla.com> - Tue, 12 May 2020 10:45:23 +0000 - rev 529530
Push 37410 by ncsoregi@mozilla.com at Wed, 13 May 2020 09:49:18 +0000
Bug 1592488 - P13. Add TailDispatchingTarget class. r=bholley This wraps the current thread such that a call to Dispatch will be done as direct task dispatch instead so that the task will be run in the current event loop. This allows for have similar (but not identical to) the microtask semantics of JS promises Differential Revision: https://phabricator.services.mozilla.com/D69995
09f0c7ef9cd31f76bbc394684af755313199736c: Bug 1592488 - P2. Add MozPromise::Private::UseDirectTaskDispatch. r=bholley
Jean-Yves Avenard <jyavenard@mozilla.com> - Tue, 12 May 2020 10:42:44 +0000 - rev 529520
Push 37410 by ncsoregi@mozilla.com at Wed, 13 May 2020 09:49:18 +0000
Bug 1592488 - P2. Add MozPromise::Private::UseDirectTaskDispatch. r=bholley If set, the callback will be dispatched via a direct task. Direct tasks are run via the current thread's tail dispatcher. This mechanism is only available if both the caller and the target are on the same thread and an AbstractThread is available Differential Revision: https://phabricator.services.mozilla.com/D71592
74ff142216da6b218960a1ec7d2e62a51ad80bab: Bug 1592488 - P1. Add MozPromise::Private::UseSynchronousTaskDispatch. r=bholley
Jean-Yves Avenard <jyavenard@mozilla.com> - Tue, 12 May 2020 10:53:48 +0000 - rev 529519
Push 37410 by ncsoregi@mozilla.com at Wed, 13 May 2020 09:49:18 +0000
Bug 1592488 - P1. Add MozPromise::Private::UseSynchronousTaskDispatch. r=bholley If set, the callback will be run synchronously when the promise is resolved or rejected. Differential Revision: https://phabricator.services.mozilla.com/D71591
4eda5acc8e1f141fc8a7df052ed6b2bc4fd322c4: Bug 1634135: Update test_xrayToJS to handle Regexp.prototype.dotAll r=bholley
Iain Ireland <iireland@mozilla.com> - Sun, 10 May 2020 16:00:27 +0000 - rev 529224
Push 37405 by csabou@mozilla.com at Tue, 12 May 2020 04:04:10 +0000
Bug 1634135: Update test_xrayToJS to handle Regexp.prototype.dotAll r=bholley We are adding support for the dotAll (/s) RegExp flag, so the list of expected properties on the RegExp prototype has to be updated. Differential Revision: https://phabricator.services.mozilla.com/D74149
ce0291e3f74342d7543ad191b52f84f611012787: Bug 1630802 - P9. EventTargetWrapper runners don't need to be cancellable. r=bholley
Jean-Yves Avenard <jyavenard@mozilla.com> - Mon, 20 Apr 2020 02:08:23 +0000 - rev 525022
Push 37333 by cbrindusan@mozilla.com at Tue, 21 Apr 2020 09:42:20 +0000
Bug 1630802 - P9. EventTargetWrapper runners don't need to be cancellable. r=bholley It was required once upon a time to be able to use MozPromise on Workers. Today a MozPromise work with nsISerialEventTarget and no longer rely on this. It can go. Differential Revision: https://phabricator.services.mozilla.com/D71442
c2a43696053ddaf1e5043577a71b1fd3a8bd3271: Bug 1630802 - P8. Remove unnecessary AutoEnter. r=bholley
Jean-Yves Avenard <jyavenard@mozilla.com> - Mon, 20 Apr 2020 02:13:31 +0000 - rev 525021
Push 37333 by cbrindusan@mozilla.com at Tue, 21 Apr 2020 09:42:20 +0000
Bug 1630802 - P8. Remove unnecessary AutoEnter. r=bholley AutoEnter was an attempt around a race between AbstractThread and MessageLoopAbstractThreadWrap that would cause AbstractThread::GetCurrent() to return an incorrect value. MessageLoopAbstractThreadWrapper is no more and as such AutoEnter is no longer required. Differential Revision: https://phabricator.services.mozilla.com/D71279
7d104d25415caf1c2df93e07d846aa62e5ba6122: Bug 1630802 - P7. Remove CreateEventTargetWrapper and ensure that only a single AbstractThread exists par nsIThread. r=bholley
Jean-Yves Avenard <jyavenard@mozilla.com> - Tue, 21 Apr 2020 03:02:39 +0000 - rev 525020
Push 37333 by cbrindusan@mozilla.com at Tue, 21 Apr 2020 09:42:20 +0000
Bug 1630802 - P7. Remove CreateEventTargetWrapper and ensure that only a single AbstractThread exists par nsIThread. r=bholley Differential Revision: https://phabricator.services.mozilla.com/D71492
8d9486cd19e8d9c289c80ce9bb4357974576d7d4: Bug 1630802 - P6. Always return AbstractThread::MainThread for AbstractMainThreadFor. r=bholley
Jean-Yves Avenard <jyavenard@mozilla.com> - Mon, 20 Apr 2020 19:18:34 +0000 - rev 525019
Push 37333 by cbrindusan@mozilla.com at Tue, 21 Apr 2020 09:42:20 +0000
Bug 1630802 - P6. Always return AbstractThread::MainThread for AbstractMainThreadFor. r=bholley This mechanism is currently unused (see bug 1624819), we can re-assess the issue once it becomes needed. Differential Revision: https://phabricator.services.mozilla.com/D71491
b94e2c408ecc4666fd57bda45aa2307d3f066fd6: Bug 1630802 - P4. Remove unused member. r=bholley
Jean-Yves Avenard <jyavenard@mozilla.com> - Tue, 21 Apr 2020 03:08:55 +0000 - rev 525017
Push 37333 by cbrindusan@mozilla.com at Tue, 21 Apr 2020 09:42:20 +0000
Bug 1630802 - P4. Remove unused member. r=bholley It lead the AbstractThread's assumption that there can only be one active per thread be invalid. Differential Revision: https://phabricator.services.mozilla.com/D71441
9ecfeb1915cdcb4a54c5bfd813628a035dbd4c47: Bug 1630802 - P3. Make AbstractThread::GetCurrent() return MainThread on the main thread. r=bholley
Jean-Yves Avenard <jyavenard@mozilla.com> - Mon, 20 Apr 2020 02:07:10 +0000 - rev 525016
Push 37333 by cbrindusan@mozilla.com at Tue, 21 Apr 2020 09:42:20 +0000
Bug 1630802 - P3. Make AbstractThread::GetCurrent() return MainThread on the main thread. r=bholley prior bug 1364821, AbstractThread::GetCurrent() would always return AbstractThread::MainThread() when called from the main thread. After this change, we had to run within an AutoEnter scope. A hidden side effect of this change was that under most cases AbstractThread::MainThread::Dispatch() would no longer use the tail dispatcher to dispatch a task. It can be safely assume that whenever you're on the main thread, the equivalent AbstractThread is usable. In the next commit, we will be removing AutoEnter entirely. Differential Revision: https://phabricator.services.mozilla.com/D71148
f7b5e8af625b395d8f70141e9462cead2d9f9576: Bug 1627994 - Fix 'expection' typos. r=bholley
Andrew McCreight <continuation@gmail.com> - Tue, 07 Apr 2020 17:00:54 +0000 - rev 522706
Push 37293 by apavel@mozilla.com at Tue, 07 Apr 2020 21:44:02 +0000
Bug 1627994 - Fix 'expection' typos. r=bholley Differential Revision: https://phabricator.services.mozilla.com/D70035
f4981f4405d978e04676ce53028c15451558d20e: Bug 1188538: Ensure every protocol handler sets a valid security flag. r=bholley,mixedpuppy
Christoph Kerschbaumer <ckerschb@christophkerschbaumer.com> - Fri, 20 Mar 2020 08:25:18 +0000 - rev 519791
Push 37233 by csabou@mozilla.com at Fri, 20 Mar 2020 17:31:27 +0000
Bug 1188538: Ensure every protocol handler sets a valid security flag. r=bholley,mixedpuppy Differential Revision: https://phabricator.services.mozilla.com/D67496
8e197e2c37390f81ced8c150c7781fe7f0d05fb1: Bug 1373042. Remove the FileList special-case in ExportHelpers. r=bholley
Boris Zbarsky <bzbarsky@mit.edu> - Thu, 12 Mar 2020 16:12:45 +0000 - rev 518428
Push 37209 by dvarga@mozilla.com at Thu, 12 Mar 2020 21:53:13 +0000
Bug 1373042. Remove the FileList special-case in ExportHelpers. r=bholley Differential Revision: https://phabricator.services.mozilla.com/D66596
f6f02d0b050dba135ac1bf16b3b5d2ad0b89842a: Bug 1448992. Get rid of nsXPCComponentsBase. r=bholley
Boris Zbarsky <bzbarsky@mit.edu> - Fri, 06 Mar 2020 17:40:57 +0000 - rev 517275
Push 37189 by cbrindusan@mozilla.com at Sat, 07 Mar 2020 09:32:21 +0000
Bug 1448992. Get rid of nsXPCComponentsBase. r=bholley Differential Revision: https://phabricator.services.mozilla.com/D65737
5cc15a99429bccfbf852df2e234f7e35cbf7bbdd: Bug 1417655: Mark private operator= delete for NullPrincipalURI since there is a private copy constr.r=bholley
Christoph Kerschbaumer <ckerschb@christophkerschbaumer.com> - Thu, 05 Mar 2020 16:42:57 +0000 - rev 517082
Push 37186 by malexandru@mozilla.com at Fri, 06 Mar 2020 09:47:39 +0000
Bug 1417655: Mark private operator= delete for NullPrincipalURI since there is a private copy constr.r=bholley Differential Revision: https://phabricator.services.mozilla.com/D65371
e681c2a6d14686c358fad4602943793f9242b78f: Bug 911444 part 4. Expose a print method on PDF viewer windows. r=bholley
Boris Zbarsky <bzbarsky@mit.edu> - Thu, 27 Feb 2020 14:54:53 +0000 - rev 515912
Push 37165 by aiakab@mozilla.com at Fri, 28 Feb 2020 09:24:28 +0000
Bug 911444 part 4. Expose a print method on PDF viewer windows. r=bholley The method is exposed only if the consumer has the same principal as the PDF would have if it were not getting the PDF viewer treatment. The method just calls the print() method in the PDF viewer window. It's enough to expose this on nsOuterWindowProxy, not RemoteOuterWindowProxy, because PDF documents end up in the process they would have been in based on their pre-PDF-viewer principal, since we do process determination in the parent process but only run the pdfjs stream converter in the content process, once we have decided which one to use. Differential Revision: https://phabricator.services.mozilla.com/D63711
c0e52b90c5225bd962be44cff0f5b5a3f10d26fe: Bug 911444 part 3. Store the principal a PDF viewer document would have had if the PDF viewer had not messed with the principal. r=bdahl,bholley
Boris Zbarsky <bzbarsky@mit.edu> - Thu, 27 Feb 2020 14:54:53 +0000 - rev 515911
Push 37165 by aiakab@mozilla.com at Fri, 28 Feb 2020 09:24:28 +0000
Bug 911444 part 3. Store the principal a PDF viewer document would have had if the PDF viewer had not messed with the principal. r=bdahl,bholley Differential Revision: https://phabricator.services.mozilla.com/D63709
c27d113d6f617e62679d88609abeb84eec431f4f: Bug 911444 part 1. Factor out the "is pdf viewer" code so we can reuse it. r=bholley
Boris Zbarsky <bzbarsky@mit.edu> - Thu, 27 Feb 2020 14:54:53 +0000 - rev 515909
Push 37165 by aiakab@mozilla.com at Fri, 28 Feb 2020 09:24:28 +0000
Bug 911444 part 1. Factor out the "is pdf viewer" code so we can reuse it. r=bholley Differential Revision: https://phabricator.services.mozilla.com/D63707
d156bbaabbd5cb440fdea7721faa0fb954eb7739: Bug 911444 part 4. Expose a print method on PDF viewer windows. r=bholley
Boris Zbarsky <bzbarsky@mit.edu> - Sat, 22 Feb 2020 05:25:35 +0000 - rev 515345
Push 37155 by ccoroiu@mozilla.com at Tue, 25 Feb 2020 04:23:07 +0000
Bug 911444 part 4. Expose a print method on PDF viewer windows. r=bholley The method is exposed only if the consumer has the same principal as the PDF would have if it were not getting the PDF viewer treatment. The method just calls the print() method in the PDF viewer window. It's enough to expose this on nsOuterWindowProxy, not RemoteOuterWindowProxy, because PDF documents end up in the process they would have been in based on their pre-PDF-viewer principal, since we do process determination in the parent process but only run the pdfjs stream converter in the content process, once we have decided which one to use. Differential Revision: https://phabricator.services.mozilla.com/D63711
a32592af0b113106a6637558bcabe735bcb7dd48: Bug 911444 part 3. Store the principal a PDF viewer document would have had if the PDF viewer had not messed with the principal. r=bdahl,bholley
Boris Zbarsky <bzbarsky@mit.edu> - Mon, 24 Feb 2020 21:05:04 +0000 - rev 515344
Push 37155 by ccoroiu@mozilla.com at Tue, 25 Feb 2020 04:23:07 +0000
Bug 911444 part 3. Store the principal a PDF viewer document would have had if the PDF viewer had not messed with the principal. r=bdahl,bholley Differential Revision: https://phabricator.services.mozilla.com/D63709
fd2e3e8728d91b8a5002defa2b04a3c2e8be9e2a: Bug 911444 part 1. Factor out the "is pdf viewer" code so we can reuse it. r=bholley
Boris Zbarsky <bzbarsky@mit.edu> - Fri, 21 Feb 2020 22:19:53 +0000 - rev 515342
Push 37155 by ccoroiu@mozilla.com at Tue, 25 Feb 2020 04:23:07 +0000
Bug 911444 part 1. Factor out the "is pdf viewer" code so we can reuse it. r=bholley Differential Revision: https://phabricator.services.mozilla.com/D63707
039e8fd2928d8d368ad892fb065bb2471e13d86e: Bug 267645 part 2. Sanitize exceptions from exported functions. r=xeonchen,bholley
Boris Zbarsky <bzbarsky@mit.edu> - Sat, 22 Feb 2020 05:01:59 +0000 - rev 515100
Push 37149 by dvarga@mozilla.com at Sat, 22 Feb 2020 09:52:08 +0000
Bug 267645 part 2. Sanitize exceptions from exported functions. r=xeonchen,bholley Differential Revision: https://phabricator.services.mozilla.com/D35996
942a92874526e7a18167af89e358d69cbaeab268: Bug 267645 part 1. Add a way to ask for DOMException to be exposed in sandboxes. r=bholley
Boris Zbarsky <bzbarsky@mit.edu> - Sat, 22 Feb 2020 04:56:52 +0000 - rev 515099
Push 37149 by dvarga@mozilla.com at Sat, 22 Feb 2020 09:52:08 +0000
Bug 267645 part 1. Add a way to ask for DOMException to be exposed in sandboxes. r=bholley Differential Revision: https://phabricator.services.mozilla.com/D63278
b0149bf227890bb0fe04b1d0b9fcb54d872358de: Bug 1333140 - Require SecureContext for WebCrypto r=bholley,keeler,baku
J.C. Jones <jjones@mozilla.com> - Tue, 11 Feb 2020 09:25:09 +0000 - rev 513358
Push 37112 by btara@mozilla.com at Tue, 11 Feb 2020 21:47:36 +0000
Bug 1333140 - Require SecureContext for WebCrypto r=bholley,keeler,baku Adds [SecureContext] for crypto.subtle, CryptoKey, and SubtleCrypto, retiring the WebCrypto WPT overrides for WebCryptoAPI/historical.any.js. Rebased on https://phabricator.services.mozilla.com/D58743 Differential Revision: https://phabricator.services.mozilla.com/D58555
6d51893bde02885bac3dd53114b7d26455541076: Bug 1273687 - Add isSecureContext to xpconnect sandboxes r=bholley
Jonathan Kingston <jkt@mozilla.com> - Fri, 07 Feb 2020 16:16:13 +0000 - rev 512913
Push 37101 by nerli@mozilla.com at Sat, 08 Feb 2020 09:25:03 +0000
Bug 1273687 - Add isSecureContext to xpconnect sandboxes r=bholley Differential Revision: https://phabricator.services.mozilla.com/D58743
7fbae42f209dc12e287f479de03ea1a7f13fb5c8: Bug 1607702 - Extract nsuri displaynames to nsNameSpaceManager r=bholley
Christoph Walcher <christoph-wa@gmx.de> - Fri, 10 Jan 2020 18:45:12 +0000 - rev 509789
Push 37004 by shindli@mozilla.com at Sat, 11 Jan 2020 09:48:29 +0000
Bug 1607702 - Extract nsuri displaynames to nsNameSpaceManager r=bholley Differential Revision: https://phabricator.services.mozilla.com/D59274
d476185742e635cb23150ae1f769eb1d6fc9a196: Bug 1596476 - Remove nsuri_xbl static atom r=bholley
Christoph Walcher <christoph-wa@gmx.de> - Wed, 08 Jan 2020 04:44:33 +0000 - rev 509296
Push 36993 by dluca@mozilla.com at Wed, 08 Jan 2020 09:41:58 +0000
Bug 1596476 - Remove nsuri_xbl static atom r=bholley Differential Revision: https://phabricator.services.mozilla.com/D53333
56ac0284574922f408585caa1b45162421d04c5b: Bug 1595890 part 4. Remove XPCWrappedNativeScope::EnsureContentXBLScope. r=bholley
Boris Zbarsky <bzbarsky@mit.edu> - Thu, 14 Nov 2019 05:20:41 +0000 - rev 501885
Push 36801 by dvarga@mozilla.com at Thu, 14 Nov 2019 17:12:31 +0000
Bug 1595890 part 4. Remove XPCWrappedNativeScope::EnsureContentXBLScope. r=bholley It's dead code. Differential Revision: https://phabricator.services.mozilla.com/D52747
810924c606882d4c235729bed6690e713f5bca9e: Bug 1595890 part 3. Remove xpc::IsContentXBLCompartment and its various callsites. r=bholley
Boris Zbarsky <bzbarsky@mit.edu> - Thu, 14 Nov 2019 05:20:18 +0000 - rev 501884
Push 36801 by dvarga@mozilla.com at Thu, 14 Nov 2019 17:12:31 +0000
Bug 1595890 part 3. Remove xpc::IsContentXBLCompartment and its various callsites. r=bholley It always returns false. Differential Revision: https://phabricator.services.mozilla.com/D52746
abee66548e14e53e74efc32050bfea474edce916: Bug 1595890 part 2. Remove isContentXBLCompartment from CompartmentPrivate. r=bholley
Boris Zbarsky <bzbarsky@mit.edu> - Thu, 14 Nov 2019 05:18:54 +0000 - rev 501883
Push 36801 by dvarga@mozilla.com at Thu, 14 Nov 2019 17:12:31 +0000
Bug 1595890 part 2. Remove isContentXBLCompartment from CompartmentPrivate. r=bholley It's always false. Differential Revision: https://phabricator.services.mozilla.com/D52743
cd89e23dd64d2c4e3bd846bdf5437167163abc7d: Bug 1595890 part 1. Remove isContentXBLScope from SandboxOptions. r=bholley
Boris Zbarsky <bzbarsky@mit.edu> - Thu, 14 Nov 2019 05:17:28 +0000 - rev 501882
Push 36801 by dvarga@mozilla.com at Thu, 14 Nov 2019 17:12:31 +0000
Bug 1595890 part 1. Remove isContentXBLScope from SandboxOptions. r=bholley It's always false. Differential Revision: https://phabricator.services.mozilla.com/D52742
8e130f2d480900e87c3a398b7a9f90ba6dfb5dde: Bug 1588356 - Store the underlying sandbox object instead of a wrapper to UAWidgetScopeMap; r=bholley
Edgar Chen <echen@mozilla.com> - Fri, 25 Oct 2019 23:34:29 +0000 - rev 499369
Push 36737 by rgurzau@mozilla.com at Sun, 27 Oct 2019 09:46:41 +0000
Bug 1588356 - Store the underlying sandbox object instead of a wrapper to UAWidgetScopeMap; r=bholley If the wrapper is for extension, it could possibly be nuked after extension's window is destroyed. Then we will end up getting a DeadWrapper for same extension next time (if the UAWidgetScopeMap is not yet swept). Differential Revision: https://phabricator.services.mozilla.com/D50582
79ac597adb58c9b4946b82a78eebe7b5aa71e19b: Bug 1582857. Fix security checks around this-unwrapping. r=peterv,bholley
Boris Zbarsky <bzbarsky@mit.edu> - Tue, 24 Sep 2019 01:02:25 +0000 - rev 494613
Push 36611 by cbrindusan@mozilla.com at Tue, 24 Sep 2019 09:43:48 +0000
Bug 1582857. Fix security checks around this-unwrapping. r=peterv,bholley Differential Revision: https://phabricator.services.mozilla.com/D46692