Bug 1524674 - Cleanup site data with custom permissions per subdomains - check permissions, r=johannh
authorAndrea Marchesini <amarchesini@mozilla.com>
Mon, 04 Feb 2019 14:25:47 +0000
changeset 456624 48d3ec8e7ec6c039bb9867703266b81f16fc0bde
parent 456623 47c9a1bb89cc97c7a30c6d4ea232240c396cc6e3
child 456625 7d4ae80c96b29bdd39ae929a27903b9123bb848f
push id35496
push userbtara@mozilla.com
push dateMon, 04 Feb 2019 17:36:40 +0000
treeherdermozilla-central@be1beccfb86d [default view] [failures only]
perfherder[talos] [build metrics] [platform microbench] (compared to previous push)
reviewersjohannh
bugs1524674
milestone67.0a1
first release with
nightly linux32
nightly linux64
nightly mac
nightly win32
nightly win64
last release without
nightly linux32
nightly linux64
nightly mac
nightly win32
nightly win64
Bug 1524674 - Cleanup site data with custom permissions per subdomains - check permissions, r=johannh Differential Revision: https://phabricator.services.mozilla.com/D18497
browser/modules/Sanitizer.jsm
--- a/browser/modules/Sanitizer.jsm
+++ b/browser/modules/Sanitizer.jsm
@@ -713,21 +713,17 @@ async function sanitizeOnShutdown(progre
     if (!isSupportedURI(permission.principal.URI)) {
       continue;
     }
 
     log("Custom session cookie permission detected for: " + permission.principal.URI.spec);
 
     // We use just the URI here, because permissions ignore OriginAttributes.
     let principals = await getAllPrincipals(permission.principal.URI);
-    let promises = [];
-    principals.forEach(principal => {
-      promises.push(sanitizeSessionPrincipal(principal));
-    });
-    await Promise.all(promises);
+    await maybeSanitizeSessionPrincipals(principals);
   }
 
   if (Sanitizer.shouldSanitizeNewTabContainer) {
     sanitizeNewTabSegregation();
     removePendingSanitization("newtab-container");
   }
 
   if (Sanitizer.shouldSanitizeOnShutdown) {