searching for reviewer(dragana)
e28a399f05e8d7295955f2ce79484e64421427b5: Bug 1469117 - Make sure we reset network socket timeout epoch to 0 when timeout on a socket is turned off r=dragana
Honza Bambas <honzab.moz@firemni.cz> - Tue, 21 Aug 2018 14:33:52 +0000 - rev 830669
Push 118847 by bmo:hskupin@gmail.com at Wed, 22 Aug 2018 09:09:03 +0000
Bug 1469117 - Make sure we reset network socket timeout epoch to 0 when timeout on a socket is turned off r=dragana Differential Revision: https://phabricator.services.mozilla.com/D3880
ffb2036e3283325cc68ef0c91d906b65b88348d3: Bug 1483445 - Change string from tracking protection to content blocking r=dragana!
Valentin Gosu <valentin.gosu@gmail.com> - Mon, 20 Aug 2018 08:43:08 +0000 - rev 830229
Push 118825 by bmo:rob@robwu.nl at Mon, 20 Aug 2018 17:24:40 +0000
Bug 1483445 - Change string from tracking protection to content blocking r=dragana! Differential Revision: https://phabricator.services.mozilla.com/D3440
ec225468adb7fe22aa21f94ffb6969254b471d23: Bug 1280629 - Part 2: telemetry of e10 back pressure suspension rate r=dragana
Junior Hsu <juhsu@mozilla.com> - Wed, 15 Aug 2018 22:36:42 +0000 - rev 829686
Push 118788 by bmo:dharvey@mozilla.com at Thu, 16 Aug 2018 11:52:55 +0000
Bug 1280629 - Part 2: telemetry of e10 back pressure suspension rate r=dragana Split this patch for data review Differential Revision: https://phabricator.services.mozilla.com/D2747
45e540e5e0fc2bfca60fe015a546fdb6f2f01318: Bug 1280629 - Part 1: Suspend the http channel if the child process is not able to consume on time r=dragana
Junior Hsu <juhsu@mozilla.com> - Wed, 15 Aug 2018 22:35:58 +0000 - rev 829685
Push 118788 by bmo:dharvey@mozilla.com at Thu, 16 Aug 2018 11:52:55 +0000
Bug 1280629 - Part 1: Suspend the http channel if the child process is not able to consume on time r=dragana Differential Revision: https://phabricator.services.mozilla.com/D2745
64648fd6ef5ee1dece183850a31c05471fb3dabb: Bug 1280629 - Part 2: telemetry of e10 back pressure suspension rate. r=dragana
Junior Hsu <juhsu@mozilla.com> - Wed, 15 Aug 2018 10:07:04 +0300 - rev 829332
Push 118765 by bmo:dharvey@mozilla.com at Wed, 15 Aug 2018 13:08:04 +0000
Bug 1280629 - Part 2: telemetry of e10 back pressure suspension rate. r=dragana Summary: Split this patch for data review Reviewers: dragana Reviewed By: dragana Subscribers: janerik Bug #: 1280629 Differential Revision: https://phabricator.services.mozilla.com/D2747
e654f2b128f6483738646728911b29fcf426b76f: Bug 1280629 - Part 1: Suspend the http channel if the child process is not able to consume on time. r=dragana
Junior Hsu <juhsu@mozilla.com> - Wed, 15 Aug 2018 10:04:50 +0300 - rev 829331
Push 118765 by bmo:dharvey@mozilla.com at Wed, 15 Aug 2018 13:08:04 +0000
Bug 1280629 - Part 1: Suspend the http channel if the child process is not able to consume on time. r=dragana Reviewers: dragana Reviewed By: dragana Subscribers: reviewbot Bug #: 1280629 Differential Revision: https://phabricator.services.mozilla.com/D2745
6ebbf1710455b1c0778d85598c50e940323aeb16: Bug 1477592 - Prevent TCP connection for CONNECT-only HTTP channel with non-http proxy r?dragana draft
Paul Vitale <paul.m.vitale@gmail.com> - Sun, 22 Jul 2018 14:04:07 -0500 - rev 825460
Push 118122 by bmo:paul.m.vitale@gmail.com at Wed, 01 Aug 2018 21:12:39 +0000
Bug 1477592 - Prevent TCP connection for CONNECT-only HTTP channel with non-http proxy r?dragana This moves the check for a non-http proxy from the socket transport callbacks in nsHttpConnection to nsHttpChannel before the connection occurs. MozReview-Commit-ID: CJIozDInXWz
fe9c353b57a11241b0ad6095e31136cfc454b085: Bug 1448846: Ignore POLLERR on UDP sockets. r=dragana
Byron Campen [:bwc] <docfaraday@gmail.com> - Mon, 02 Jul 2018 11:52:02 -0500 - rev 821725
Push 117187 by bmo:alwu@mozilla.com at Tue, 24 Jul 2018 00:39:37 +0000
Bug 1448846: Ignore POLLERR on UDP sockets. r=dragana MozReview-Commit-ID: 1FxhHbH8Neg
4789a350ec7ff9ed4d6f300bcecdde771f54cc77: Bug 1452130 - nsHttpConnection.cpp should compare time intervals in the same units r=dragana
Petr Sumbera <petr.sumbera@oracle.com> - Fri, 15 Jun 2018 04:52:52 -0700 - rev 809879
Push 113833 by bmo:ato@sny.no at Sat, 23 Jun 2018 12:17:51 +0000
Bug 1452130 - nsHttpConnection.cpp should compare time intervals in the same units r=dragana
6a6e61fb16661ee52992f0171e5d84d82986918f: Bug 1460310 - Separate HTTP and SPDY identifiers into separate namespaces. r=dragana
Nicholas Hurley <hurley@mozilla.com> - Fri, 01 Jun 2018 11:32:05 -0700 - rev 805539
Push 112687 by bdanforth@mozilla.com at Thu, 07 Jun 2018 22:45:04 +0000
Bug 1460310 - Separate HTTP and SPDY identifiers into separate namespaces. r=dragana MozReview-Commit-ID: E55YpGK7PXI
8303c9587a1445920ea4c99937f995bc2d7c72df: Bug 1459666 - Ensure that DivertToParent is only called during OnStartRequest r=dragana
Valentin Gosu <valentin.gosu@gmail.com> - Mon, 04 Jun 2018 20:05:56 +0200 - rev 803878
Push 112225 by bmo:rbarker@mozilla.com at Mon, 04 Jun 2018 23:42:11 +0000
Bug 1459666 - Ensure that DivertToParent is only called during OnStartRequest r=dragana The bug was caused by the tcp connection not sending back any data, and just being closed right away. So we get something like this: FTPChannelChild::DoOnStartRequest FTPChannelChild::DoOnStopRequest -> nsUnknownDecoder::OnStopRequest -> (data is empty) -> nsUnknownDecoder::FireListenerNotifications -> nsDocumentOpenInfo::OnStartRequest -> ExternalHelperAppChild::OnStartRequest -> ExternalHelperAppChild::DivertToParent -> FTPChannelChild::DivertToParent. However, in nsIDivertableChannel.idl the description for divertToParent() is "divertToParent is called in the child process. It can only be called during OnStartRequest()." Enforcing this condition seems to be enough to avoid an infinite loop. The crash was fixed by bug 1436311.
0fcc885b89ccf06c2d06c55f16e5696f605f646b: Bug 1442178 - Do a busy wait of socket poll() shortly after network change detection, r=dragana
Honza Bambas <honzab.moz@firemni.cz> - Wed, 30 May 2018 17:36:42 +0300 - rev 801703
Push 111714 by paul@paul.cx at Wed, 30 May 2018 16:44:23 +0000
Bug 1442178 - Do a busy wait of socket poll() shortly after network change detection, r=dragana
74619c5d019ccb8aed9c9785af84c48d46388180: Bug 1442178 - Repair broken socket polling wakeup mechanism after a network change to prevent long load hangs, r=dragana
Honza Bambas <honzab.moz@firemni.cz> - Wed, 30 May 2018 17:31:09 +0300 - rev 801702
Push 111714 by paul@paul.cx at Wed, 30 May 2018 16:44:23 +0000
Bug 1442178 - Repair broken socket polling wakeup mechanism after a network change to prevent long load hangs, r=dragana
6cb4b8d4daad7ecd3335352c505ab2262ca2141e: Bug 1459666 - Ensure that DivertToParent is only called during OnStartRequest r=dragana
Valentin Gosu <valentin.gosu@gmail.com> - Mon, 21 May 2018 21:16:10 +0200 - rev 799969
Push 111232 by rwood@mozilla.com at Fri, 25 May 2018 18:01:23 +0000
Bug 1459666 - Ensure that DivertToParent is only called during OnStartRequest r=dragana
b9204fc0f79e4ddac792087717b8a32f81815f4d: Bug 1459666 - Ensure that DivertToParent is only called during OnStartRequest r=dragana draft
Valentin Gosu <valentin.gosu@gmail.com> - Mon, 21 May 2018 21:16:24 +0200 - rev 797845
Push 110599 by valentin.gosu@gmail.com at Mon, 21 May 2018 20:25:12 +0000
Bug 1459666 - Ensure that DivertToParent is only called during OnStartRequest r=dragana
c5f309cfe1cb9a07b09235b16f44312c40c97e6e: Bug 1455446: Set CLOEXEC on socket FDs. r=dragana
Kris Maglione <maglione.k@gmail.com> - Thu, 19 Apr 2018 14:23:25 -0700 - rev 785944
Push 107361 by maglione.k@gmail.com at Fri, 20 Apr 2018 20:54:53 +0000
Bug 1455446: Set CLOEXEC on socket FDs. r=dragana MozReview-Commit-ID: L617m03Z3RS
af41f47a6da2d206104aad7f9ec194215eb630d5: Bug 1455446: Set CLOEXEC on socket FDs. r?dragana draft
Kris Maglione <maglione.k@gmail.com> - Thu, 19 Apr 2018 14:23:25 -0700 - rev 785316
Push 107187 by maglione.k@gmail.com at Thu, 19 Apr 2018 21:31:31 +0000
Bug 1455446: Set CLOEXEC on socket FDs. r?dragana MozReview-Commit-ID: L617m03Z3RS
0da15d6e0f3a10809b7940b9a8d1908bc15ef56d: Bug 1413854 - Remove nsTXTToHTMLConv as it is no longer used. r=dragana
Marco Castelluccio <mcastelluccio@mozilla.com> - Sat, 31 Mar 2018 16:08:37 +0200 - rev 781759
Push 106412 by kgupta@mozilla.com at Fri, 13 Apr 2018 16:52:27 +0000
Bug 1413854 - Remove nsTXTToHTMLConv as it is no longer used. r=dragana
2caa8dcfef0f6ac8c95c6ed0dd81fb3a5381213f: Bug 792808 - Change dom/push to import and instantiate XHRs from global properties rather than using Cc.createInstance(Ci.nsIXMLHttpRequest); r=bz,dragana
Thomas Wisniewski <wisniewskit@gmail.com> - Tue, 19 Sep 2017 11:47:55 -0400 - rev 756379
Push 99483 by bmo:daniel@haxx.se at Fri, 16 Feb 2018 22:46:48 +0000
Bug 792808 - Change dom/push to import and instantiate XHRs from global properties rather than using Cc.createInstance(Ci.nsIXMLHttpRequest); r=bz,dragana MozReview-Commit-ID: KbyYOz9ZWHq
ed3ba4b507e4220e59db80bb3204d7baecae5819: Bug 792808 - Change dom/push to import and instantiate XHRs from global properties rather than using Cc.createInstance(Ci.nsIXMLHttpRequest); r?dragana draft
Thomas Wisniewski <wisniewskit@gmail.com> - Tue, 19 Sep 2017 11:47:55 -0400 - rev 756142
Push 99394 by wisniewskit@gmail.com at Fri, 16 Feb 2018 14:37:01 +0000
Bug 792808 - Change dom/push to import and instantiate XHRs from global properties rather than using Cc.createInstance(Ci.nsIXMLHttpRequest); r?dragana MozReview-Commit-ID: KbyYOz9ZWHq
bceb96ececc52a6c86da8fd31b4eadd8945f0ff0: Bug 792808 - Change dom/push to import and instantiate XHRs from global properties rather than using Cc.createInstance(Ci.nsIXMLHttpRequest); r?dragana draft
Thomas Wisniewski <wisniewskit@gmail.com> - Tue, 19 Sep 2017 11:47:55 -0400 - rev 755612
Push 99218 by wisniewskit@gmail.com at Thu, 15 Feb 2018 15:57:25 +0000
Bug 792808 - Change dom/push to import and instantiate XHRs from global properties rather than using Cc.createInstance(Ci.nsIXMLHttpRequest); r?dragana MozReview-Commit-ID: KbyYOz9ZWHq
a4662b0c8d92c668756be46af692f1baedfc05a5: Bug 792808 - Change dom/push to import and instantiate XHRs from global properties rather than using Cc.createInstance(Ci.nsIXMLHttpRequest); r?dragana draft
Thomas Wisniewski <wisniewskit@gmail.com> - Tue, 19 Sep 2017 11:47:55 -0400 - rev 755254
Push 99137 by wisniewskit@gmail.com at Thu, 15 Feb 2018 02:38:32 +0000
Bug 792808 - Change dom/push to import and instantiate XHRs from global properties rather than using Cc.createInstance(Ci.nsIXMLHttpRequest); r?dragana MozReview-Commit-ID: KbyYOz9ZWHq
86ba26a98381e474145f646b54ba2a84321a6233: Bug 1430508 - Return 0 for ProcessId() when channel IPC is closed. r=dragana, a=jcristau
Kris Maglione <maglione.k@gmail.com> - Sun, 14 Jan 2018 17:40:09 -0800 - rev 754685
Push 98954 by mozilla@kaply.com at Tue, 13 Feb 2018 23:01:04 +0000
Bug 1430508 - Return 0 for ProcessId() when channel IPC is closed. r=dragana, a=jcristau There are some corner cases where we try to attach StreamFilter endpoints to a channel after its IPC has been closed from from the other side, but request listeners haven't been notified. This causes crashes in any of several places. This patch changes nsHttpChannel::ProcessId to return 0 when IPC is closed, so callers can detect that it's no longer possible to attach endpoints to it. MozReview-Commit-ID: BZTOqezih0P
06f766e7640a3cd180f7da7c092823e500a3d674: Bug 1430508: Return 0 for ProcessId() when channel IPC is closed. r=dragana
Kris Maglione <maglione.k@gmail.com> - Sun, 14 Jan 2018 17:40:09 -0800 - rev 720736
Push 95615 by masayuki@d-toybox.com at Tue, 16 Jan 2018 05:00:28 +0000
Bug 1430508: Return 0 for ProcessId() when channel IPC is closed. r=dragana There are some corner cases where we try to attach StreamFilter endpoints to a channel after its IPC has been closed from from the other side, but request listeners haven't been notified. This causes crashes in any of several places. This patch changes nsHttpChannel::ProcessId to return 0 when IPC is closed, so callers can detect that it's no longer possible to attach endpoints to it. MozReview-Commit-ID: BZTOqezih0P
b25053487f291f4adf6bee3497940231a8b905b8: Bug 1430508: Return 0 for ProcessId() when channel IPC is closed. r?dragana draft
Kris Maglione <maglione.k@gmail.com> - Sun, 14 Jan 2018 17:40:09 -0800 - rev 720182
Push 95470 by maglione.k@gmail.com at Mon, 15 Jan 2018 01:41:13 +0000
Bug 1430508: Return 0 for ProcessId() when channel IPC is closed. r?dragana There are some corner cases where we try to attach StreamFilter endpoints to a channel after its IPC has been closed from from the other side, but request listeners haven't been notified. This causes crashes in any of several places. This patch changes nsHttpChannel::ProcessId to return 0 when IPC is closed, so callers can detect that it's no longer possible to attach endpoints to it. MozReview-Commit-ID: BZTOqezih0P
f6bd79484f2311acb4ebd7c1ee2071d9d2e29710: Bug 1405446 - Connections created for urgent-start requests are of limits for non-urgent-start ones, r=dragana
Honza Bambas <honzab.moz@firemni.cz> - Tue, 09 Jan 2018 07:58:00 -0500 - rev 718727
Push 95038 by maglione.k@gmail.com at Wed, 10 Jan 2018 20:53:05 +0000
Bug 1405446 - Connections created for urgent-start requests are of limits for non-urgent-start ones, r=dragana
0152d097672f7e99504815cf7b06d9f303419fba: Bug 1399520 - Avoid race condition. r=dragana, a=ritu
Liang-Heng Chen <xeonchen@gmail.com> - Thu, 19 Oct 2017 22:29:41 -0400 - rev 718157
Push 94831 by mozilla@kaply.com at Tue, 09 Jan 2018 21:23:29 +0000
Bug 1399520 - Avoid race condition. r=dragana, a=ritu MozReview-Commit-ID: 6Pd2HXqBgX4
04e3b5c1f0b2118c3bdea182f3bd470956cbdd46: Bug 1408990 - Only add the entry to the performance object if the loading document's principal is the same as the triggering principal. r=bz, r=dragana, a=lizzard
Valentin Gosu <valentin.gosu@gmail.com> - Sat, 28 Oct 2017 00:15:01 +0200 - rev 718022
Push 94831 by mozilla@kaply.com at Tue, 09 Jan 2018 21:23:29 +0000
Bug 1408990 - Only add the entry to the performance object if the loading document's principal is the same as the triggering principal. r=bz, r=dragana, a=lizzard MozReview-Commit-ID: 7o8XKHioP1p
cf08f8b8d13bc8df6cacc40e0833d3199880464e: Bug 1425301 - Progressively decrease the 6 seconds maximum quantum delay of tracker script tailing, r=dragana
Honza Bambas <honzab.moz@firemni.cz> - Mon, 08 Jan 2018 06:01:00 +0200 - rev 717351
Push 94642 by bmo:ntim.bugs@gmail.com at Mon, 08 Jan 2018 19:11:44 +0000
Bug 1425301 - Progressively decrease the 6 seconds maximum quantum delay of tracker script tailing, r=dragana
d6ad893078b23c1a2c546ca7b1509013fa10e89e: Bug 1413999 - Part4: Test case r=dragana
Kershaw Chang <kechang@mozilla.com> - Wed, 03 Jan 2018 18:59:00 +0200 - rev 715887
Push 94287 by bmo:hikezoe@mozilla.com at Thu, 04 Jan 2018 21:37:30 +0000
Bug 1413999 - Part4: Test case r=dragana
c29cf020715fafc192c31713abc42db87f91dc13: Bug 1413999 - Part3: IPC part, send trailers to child process r=dragana
Kershaw Chang <kechang@mozilla.com> - Wed, 03 Jan 2018 02:05:00 +0200 - rev 715886
Push 94287 by bmo:hikezoe@mozilla.com at Thu, 04 Jan 2018 21:37:30 +0000
Bug 1413999 - Part3: IPC part, send trailers to child process r=dragana The aim of this patch is to send trailers to child process via SendOnStopRequest.
c92b27c7f6bd143650616f438961c3bbe5c7f8dd: Bug 1413999 Part2: Take http trailers from chunk decoder and add serverTiming attribute in nsITimedChannel r=dragana
Kershaw Chang <kechang@mozilla.com> - Wed, 03 Jan 2018 02:04:00 +0200 - rev 715885
Push 94287 by bmo:hikezoe@mozilla.com at Thu, 04 Jan 2018 21:37:30 +0000
Bug 1413999 Part2: Take http trailers from chunk decoder and add serverTiming attribute in nsITimedChannel r=dragana This patch includes: 1. Save http trailers in the header array in chunk decoder. 2. Take trailers from chunk decoder in OnStopRequest(). 3. Add serverTiming attribute in nsITimedChannel. 4. Parse server timing header when GetServerTiming() is called.
b226b0cff55a22cf3e7e707945c59f26d12fb56c: Bug 1413999 - Part1: Parse Serve-Timing header r=dragana
Kershaw Chang <kechang@mozilla.com> - Wed, 03 Jan 2018 02:04:00 +0200 - rev 715884
Push 94287 by bmo:hikezoe@mozilla.com at Thu, 04 Jan 2018 21:37:30 +0000
Bug 1413999 - Part1: Parse Serve-Timing header r=dragana 1. Add a helper function Tokenize() which is able to handle quoted-string and quoted-pair. 2. Modify ParsedHeaderValueListList - Use Tokenize() to split string by ','. 3. Modify ParsedHeaderValueList - Use Tokenize() to split string by ';'. - Function ParseNameAndValue() is for getting name and value from the string containing '='. 4. Handle backslash escapes for quoted string. 5. Reuse ParsedHeaderValueListList to parse server-timing header.
c01621ab393389deec9e2c0ce28aac1a0c515712: Bug 1404454 - use about:blank as the inital page of the testing iframe. r=dragana, a=test-only
Shih-Chiang Chien <schien@mozilla.com> - Sat, 09 Dec 2017 20:31:29 -0600 - rev 715005
Push 94055 by bmo:agl@chromium.org at Sun, 31 Dec 2017 23:39:06 +0000
Bug 1404454 - use about:blank as the inital page of the testing iframe. r=dragana, a=test-only In our test script we set the unload handler on the inner iframe earlier than the page is loaded, therefore it pass the origin check since the contentWindow object is for about:blank. Security error will raise if the OnStartRequest for that iframe is received beforehand. Use about:blank can guarantee to have same-origin window on the inner iframe. MozReview-Commit-ID: 8AiwGIfoF4
32eb8bbad8cbdbbdd0bec756409064a3f331b7b9: Bug 1404454 - use about:blank as the inital page of the testing iframe. r=dragana
Shih-Chiang Chien <schien@mozilla.com> - Sat, 09 Dec 2017 20:31:29 -0600 - rev 713068
Push 93528 by kgupta@mozilla.com at Tue, 19 Dec 2017 14:18:06 +0000
Bug 1404454 - use about:blank as the inital page of the testing iframe. r=dragana In our test script we set the unload handler on the inner iframe earlier than the page is loaded, therefore it pass the origin check since the contentWindow object is for about:blank. Security error will raise if the OnStartRequest for that iframe is received beforehand. Use about:blank can guarantee to have same-origin window on the inner iframe. MozReview-Commit-ID: 8AiwGIfoF4
897e27aea19220cd14780542139129b4346204b3: Bug 1404454 - use about:blank as the inital page of the testing iframe. r?dragana draft
Shih-Chiang Chien <schien@mozilla.com> - Sat, 09 Dec 2017 20:31:29 -0600 - rev 712175
Push 93259 by bmo:schien@mozilla.com at Fri, 15 Dec 2017 18:42:00 +0000
Bug 1404454 - use about:blank as the inital page of the testing iframe. r?dragana In our test script we set the unload handler on the inner iframe earlier than the page is loaded, therefore it pass the origin check since the contentWindow object is for about:blank. Security error will raise if the OnStartRequest for that iframe is received beforehand. Use about:blank can guarantee to have same-origin window on the inner iframe. MozReview-Commit-ID: 8AiwGIfoF4
46b0f7f066e3fd5a9f6480a50c75f6e47d23a3c6: Bug 1411316 - necko api for cancelling all transactions r=dragana
Patrick McManus <mcmanus@ducksong.com> - Tue, 24 Oct 2017 09:17:02 -0700 - rev 711096
Push 93001 by bmo:m_kato@ga2.so-net.ne.jp at Wed, 13 Dec 2017 10:20:18 +0000
Bug 1411316 - necko api for cancelling all transactions r=dragana test by: :kershaw MozReview-Commit-ID: BwjsDMiEGZY
7fa1640fde63907d96b6afdadda788e6fd4298d4: Bug 1411316 - necko api for cancelling all transactions r=dragana draft
Patrick McManus <mcmanus@ducksong.com> - Tue, 24 Oct 2017 09:17:02 -0700 - rev 710899
Push 92934 by bmo:mcmanus@ducksong.com at Tue, 12 Dec 2017 18:25:17 +0000
Bug 1411316 - necko api for cancelling all transactions r=dragana test by: :kershaw MozReview-Commit-ID: BwjsDMiEGZY
61951ddb904f3c7d5ca6c0ef480f34e57602f632: Bug 1411316 - necko api for cancelling all transactions r=dragana,keeler draft
Patrick McManus <mcmanus@ducksong.com> - Tue, 24 Oct 2017 09:17:02 -0700 - rev 710898
Push 92933 by bmo:mcmanus@ducksong.com at Tue, 12 Dec 2017 17:45:15 +0000
Bug 1411316 - necko api for cancelling all transactions r=dragana,keeler test by: :kershaw MozReview-Commit-ID: BwjsDMiEGZY
7342b9360f3e277f595d24ac955836e7061c70d6: Bug 1411316 - necko api for cancelling all transactions r=dragana,keeler draft
Patrick McManus <mcmanus@ducksong.com> - Tue, 24 Oct 2017 09:17:02 -0700 - rev 710879
Push 92926 by bmo:mcmanus@ducksong.com at Tue, 12 Dec 2017 15:56:31 +0000
Bug 1411316 - necko api for cancelling all transactions r=dragana,keeler test by: :kershaw MozReview-Commit-ID: BwjsDMiEGZY
0eeb0184d8d9033219f9177cc49cb90aaa19abd5: Bug 1404454 - use about:blank as the inital page of the testing iframe. r?dragana draft
Shih-Chiang Chien <schien@mozilla.com> - Sat, 09 Dec 2017 20:31:29 -0600 - rev 710803
Push 92901 by bmo:schien@mozilla.com at Tue, 12 Dec 2017 03:47:55 +0000
Bug 1404454 - use about:blank as the inital page of the testing iframe. r?dragana Setting unload handler for the inner iframe of http://example.com sometimes failed for accessing attribute on a cross-origin window. Use about:blank can guarantee to have same-origin window on the inner iframe. MozReview-Commit-ID: 8AiwGIfoF4
7d2792c6423a8857e7de3ba12c7b3fa39362e338: Bug 446344 - Implement Origin header CSRF mitigation. r=ckerschb,dragana
Francois Marier <francois@mozilla.com> - Fri, 24 Nov 2017 17:35:05 -0800 - rev 707108
Push 92016 by kgupta@mozilla.com at Mon, 04 Dec 2017 20:24:12 +0000
Bug 446344 - Implement Origin header CSRF mitigation. r=ckerschb,dragana MozReview-Commit-ID: EZpGo0UfmUP
b4fc7aa1aa746423c23cad1051075c4cfa7b66d3: Bug 446344 - Implement Origin header CSRF mitigation. r?dragana,r?ckerschb draft
Francois Marier <francois@mozilla.com> - Fri, 24 Nov 2017 17:35:05 -0800 - rev 706978
Push 91978 by fmarier@mozilla.com at Mon, 04 Dec 2017 16:13:44 +0000
Bug 446344 - Implement Origin header CSRF mitigation. r?dragana,r?ckerschb MozReview-Commit-ID: EZpGo0UfmUP
f4517d8f56fbff59855201ddc689e9a9d2489477: Bug 446344 - Implement Origin header CSRF mitigation. r?dragana,r?ckerschb draft
Francois Marier <francois@mozilla.com> - Fri, 24 Nov 2017 17:35:05 -0800 - rev 705362
Push 91458 by fmarier@mozilla.com at Thu, 30 Nov 2017 00:29:22 +0000
Bug 446344 - Implement Origin header CSRF mitigation. r?dragana,r?ckerschb MozReview-Commit-ID: EZpGo0UfmUP
798b87f3066808d7bb9c8f165a37631f0f7cba26: Bug 1420407, land NSPR 4.18 beta2 (r=me) and remove local NSPR patch that's no longer necessary (r=dragana)
Kai Engert <kaie@kuix.de> - Wed, 29 Nov 2017 15:53:43 +0100 - rev 705341
Push 91454 by dholbert@mozilla.com at Wed, 29 Nov 2017 23:44:13 +0000
Bug 1420407, land NSPR 4.18 beta2 (r=me) and remove local NSPR patch that's no longer necessary (r=dragana) UPGRADE_NSPR_RELEASE
5c0d90f042ad435c3de2014fe070ca26133d9839: Bug 446344 - Implement Origin header CSRF mitigation. r?dragana,r?ckerschb draft
Francois Marier <francois@mozilla.com> - Fri, 24 Nov 2017 17:35:05 -0800 - rev 705237
Push 91418 by fmarier@mozilla.com at Wed, 29 Nov 2017 18:27:05 +0000
Bug 446344 - Implement Origin header CSRF mitigation. r?dragana,r?ckerschb MozReview-Commit-ID: EZpGo0UfmUP
683843c2001abd6edf7e1a9295af17670983bf5c: Bug 446344 - Implement Origin header CSRF mitigation. r?dragana,r?ckerschb draft
Francois Marier <francois@mozilla.com> - Fri, 24 Nov 2017 17:35:05 -0800 - rev 704723
Push 91222 by fmarier@mozilla.com at Tue, 28 Nov 2017 22:07:19 +0000
Bug 446344 - Implement Origin header CSRF mitigation. r?dragana,r?ckerschb MozReview-Commit-ID: EZpGo0UfmUP
f7f814a5a9577b545036f9be69aeb5293d8feda0: Bug 1420407, land NSPR 4.18.1 beta1 (r=me) and remove local NSPR patch that's no longer necessary (r=dragana)
Kai Engert <kaie@kuix.de> - Mon, 27 Nov 2017 21:01:35 +0100 - rev 703830
Push 90984 by bmo:gl@mozilla.com at Mon, 27 Nov 2017 20:54:52 +0000
Bug 1420407, land NSPR 4.18.1 beta1 (r=me) and remove local NSPR patch that's no longer necessary (r=dragana) UPGRADE_NSPR_RELEASE
56640b28da0f95d4b694a04ed0a6d7e08e9e1c5a: Bug 446344 - Implement Origin header CSRF mitigation. r?dragana,r?ckerschb draft
Francois Marier <francois@mozilla.com> - Fri, 24 Nov 2017 17:35:05 -0800 - rev 703794
Push 90976 by fmarier@mozilla.com at Mon, 27 Nov 2017 19:41:41 +0000
Bug 446344 - Implement Origin header CSRF mitigation. r?dragana,r?ckerschb MozReview-Commit-ID: EZpGo0UfmUP
c9b2f6a7be36ea66169201a9ea846807ee48d14f: Bug 446344 - Implement Origin header CSRF mitigation. r?dragana draft
Francois Marier <francois@mozilla.com> - Fri, 03 Nov 2017 11:33:44 -0700 - rev 698752
Push 89351 by fmarier@mozilla.com at Thu, 16 Nov 2017 03:00:33 +0000
Bug 446344 - Implement Origin header CSRF mitigation. r?dragana MozReview-Commit-ID: EZpGo0UfmUP