2e9f31ee6571578ab190de831353a3a870609f07: Bug 1529684 - Part 6: Store a mIsInProcess flag to preserve WindowProxy behaviour, r=farre
Nika Layzell <nika@thelayzells.com> - Thu, 14 Mar 2019 18:50:54 +0000 - rev 521930
Push 10870 by nbeleuzu@mozilla.com at Fri, 15 Mar 2019 20:00:07 +0000
Bug 1529684 - Part 6: Store a mIsInProcess flag to preserve WindowProxy behaviour, r=farre Currently when we have an in-process WindowProxy object, we will attempt to either use the cached mWindowProxy value, or fetch the nsGlobalWindowOuter object from through the nsDocShell. Unfortunately, when the BrowsingContext is detached, we will fail to get the nsGlobalWindowOuter object. This happens to be OK for our test cases, as the cached mWindowProxy value doesn't have the chance to go away, but isn't acceptable long-term. These patches exascerbated that issue by causing the nsDocShell pointer itself to be cleared when it is destroyed, which caused the Remote WindowProxy logic to be triggered. To deal with that case, this patch adds a new mIsInProcess flag to continue to act like the old code-path. In the future, we will need to also handle ensuring that the nsGlobalWindowOuter lives for long enough, however that is not being done in this patch in order to land it sooner rather than later. Depends on D22763 Differential Revision: https://phabricator.services.mozilla.com/D22764
cb217921cf9a1aee8d4f3b43fe0209c0899ddcc4: Bug 1529684 - Part 5: Support using remote window proxy objects in the parent process, r=farre
Nika Layzell <nika@thelayzells.com> - Thu, 14 Mar 2019 18:50:52 +0000 - rev 521929
Push 10870 by nbeleuzu@mozilla.com at Fri, 15 Mar 2019 20:00:07 +0000
Bug 1529684 - Part 5: Support using remote window proxy objects in the parent process, r=farre Depends on D22762 Differential Revision: https://phabricator.services.mozilla.com/D22763
0a3848628be99cb7e072e992b6075e9ff069da12: Bug 1529684 - Part 4: Add a GetContentParent method to CanonicalBrowsingContext, r=farre
Nika Layzell <nika@thelayzells.com> - Thu, 14 Mar 2019 18:50:50 +0000 - rev 521928
Push 10870 by nbeleuzu@mozilla.com at Fri, 15 Mar 2019 20:00:07 +0000
Bug 1529684 - Part 4: Add a GetContentParent method to CanonicalBrowsingContext, r=farre Depends on D21097 Differential Revision: https://phabricator.services.mozilla.com/D22762
6e96eaaa1b90152fa4bdba42274af3dcc36880da: Bug 1529684 - Part 3: Create BrowsingContext for remote iframes in embedder, r=farre
Nika Layzell <nika@thelayzells.com> - Thu, 14 Mar 2019 18:50:47 +0000 - rev 521927
Push 10870 by nbeleuzu@mozilla.com at Fri, 15 Mar 2019 20:00:07 +0000
Bug 1529684 - Part 3: Create BrowsingContext for remote iframes in embedder, r=farre Depends on D21096 Differential Revision: https://phabricator.services.mozilla.com/D21097
a95dcf86a9b094e68f5783501325ad3e338f7a46: Bug 1529684 - Part 2: Create BrowsingContext for remote browsers in parent, r=farre
Nika Layzell <nika@thelayzells.com> - Thu, 14 Mar 2019 18:50:45 +0000 - rev 521926
Push 10870 by nbeleuzu@mozilla.com at Fri, 15 Mar 2019 20:00:07 +0000
Bug 1529684 - Part 2: Create BrowsingContext for remote browsers in parent, r=farre Depends on D21095 Differential Revision: https://phabricator.services.mozilla.com/D21096
29b316b9a0359f085ddd11330820b91733c1392f: Bug 1529684 - Part 1: Allow Attaching BrowsingContext from parent to child, r=farre
Nika Layzell <nika@thelayzells.com> - Thu, 14 Mar 2019 18:50:38 +0000 - rev 521925
Push 10870 by nbeleuzu@mozilla.com at Fri, 15 Mar 2019 20:00:07 +0000
Bug 1529684 - Part 1: Allow Attaching BrowsingContext from parent to child, r=farre This is important to allow creating BrowsingContexts outside of the process where they are going to be used. This is largely a re-arrangement of existing code. There is currently no way to do this type of attaching for browsing contexts in existing BrowsingContextGroups, which creates some limitations, but happens to be sufficient for us in the current situation. Differential Revision: https://phabricator.services.mozilla.com/D21095
8d51957df27ad95b830b8bb93c32ebc2727be918: Bug 1535291: Actually use aContentPolicyType argument within nsWebBrowserPersist::SaveURIInternal r=Gijs
Christoph Kerschbaumer <ckerschb@christophkerschbaumer.com> - Thu, 14 Mar 2019 18:42:47 +0000 - rev 521924
Push 10870 by nbeleuzu@mozilla.com at Fri, 15 Mar 2019 20:00:07 +0000
Bug 1535291: Actually use aContentPolicyType argument within nsWebBrowserPersist::SaveURIInternal r=Gijs Differential Revision: https://phabricator.services.mozilla.com/D23484
32112b7c202edccb5ec54ab18971e0a46af3ee58: Bug 1516862 - Fix test_ext_webrequest_basic intermittency while testing onError events fired on hostname resolving error. r=mixedpuppy
Luca Greco <lgreco@mozilla.com> - Thu, 14 Mar 2019 18:06:33 +0000 - rev 521923
Push 10870 by nbeleuzu@mozilla.com at Fri, 15 Mar 2019 20:00:07 +0000
Bug 1516862 - Fix test_ext_webrequest_basic intermittency while testing onError events fired on hostname resolving error. r=mixedpuppy When the dns resolution for an url's hostname fails, the webRequest API seems to be receiving (from time to time but more often on macos and windows) more then one call to the HttpObserverManager.observeActivity method for the activityType nsISocketTransport.STATUS_RESOLVING and nsISocketTransport.STATUS_RESOLVED while channel wrapper errorString property is still null. The observeActvity method goal seems to fire fallback WebRequest errors for error conditions that are not fired as ChannelWrapper error events, but the "NS_ERROR_UNKNOWN_HOST" error is also being fired right after the fallback webRequest error event fired as "NS_ERROR_NET_ON_RESOLVED" (or "NS_ERROR_NET_ON_RESOLVING"). This behavior consistently triggers the two intermittent failures on the test test_ext_webrequest_basic.html while executing the test_webRequest_frames task "expected error message received in onErrorOccurred - Expected: NS_ERROR_UNKNOWN_HOST, Actual: NS_ERROR_NET_ON_RESOLVED" (when the fallback NS_ERROR_NET_ON_RESOLVED is fired first) and then "received onErrorOccurred" (because the "NS_ERROR_UNKNOWN_HOST" error is also being fired right after the fallback error message). Differential Revision: https://phabricator.services.mozilla.com/D22587
495029aae21bbac7d75caafb3d67082715c6c63b: Bug 1471737 - ensure DOMFrameContentLoaded events in browser_subdialogs.js are actually for the right frame before continuing the test, r=jaws
Gijs Kruitbosch <gijskruitbosch@gmail.com> - Thu, 14 Mar 2019 17:49:58 +0000 - rev 521922
Push 10870 by nbeleuzu@mozilla.com at Fri, 15 Mar 2019 20:00:07 +0000
Bug 1471737 - ensure DOMFrameContentLoaded events in browser_subdialogs.js are actually for the right frame before continuing the test, r=jaws Differential Revision: https://phabricator.services.mozilla.com/D23548
b11e72c5c2689969dca14572488b46854d027da5: Bug 1535203 - Don't close and reopen the popup when an @alias offer is clicked. r=dao
Drew Willcoxon <adw@mozilla.com> - Thu, 14 Mar 2019 17:50:11 +0000 - rev 521921
Push 10870 by nbeleuzu@mozilla.com at Fri, 15 Mar 2019 20:00:07 +0000
Bug 1535203 - Don't close and reopen the popup when an @alias offer is clicked. r=dao Differential Revision: https://phabricator.services.mozilla.com/D23436
d3889d24569114ab55cc1d229d7c75c8bd7ecc90: Bug 1535188 - Make it impossible to do empty @alias searches. r=mak
Drew Willcoxon <adw@mozilla.com> - Thu, 14 Mar 2019 17:49:03 +0000 - rev 521920
Push 10870 by nbeleuzu@mozilla.com at Fri, 15 Mar 2019 20:00:07 +0000
Bug 1535188 - Make it impossible to do empty @alias searches. r=mak Differential Revision: https://phabricator.services.mozilla.com/D23435
8337beedb6356791514b1006c370afbc83320f08: Bug 1533074 - Implement Fingerprinting and Cryptomining annotation features - Part 5 - Correct pref checks, r=dimi
Andrea Marchesini <amarchesini@mozilla.com> - Thu, 14 Mar 2019 17:49:05 +0000 - rev 521919
Push 10870 by nbeleuzu@mozilla.com at Fri, 15 Mar 2019 20:00:07 +0000
Bug 1533074 - Implement Fingerprinting and Cryptomining annotation features - Part 5 - Correct pref checks, r=dimi Differential Revision: https://phabricator.services.mozilla.com/D23104
d5c86748df920cdd1130279b2b9cd45a0e217f30: Bug 1533074 - Implement Fingerprinting and Cryptomining annotation features - Part 4 - tests, r=dimi
Andrea Marchesini <amarchesini@mozilla.com> - Thu, 14 Mar 2019 17:48:50 +0000 - rev 521918
Push 10870 by nbeleuzu@mozilla.com at Fri, 15 Mar 2019 20:00:07 +0000
Bug 1533074 - Implement Fingerprinting and Cryptomining annotation features - Part 4 - tests, r=dimi Differential Revision: https://phabricator.services.mozilla.com/D22471
61efe2bbaf454d63a4ca5130e0aaebe077b34009: Bug 1533074 - Implement Fingerprinting and Cryptomining annotation features - Part 3 - Cryptomining-annotation, r=dimi
Andrea Marchesini <amarchesini@mozilla.com> - Thu, 14 Mar 2019 17:48:33 +0000 - rev 521917
Push 10870 by nbeleuzu@mozilla.com at Fri, 15 Mar 2019 20:00:07 +0000
Bug 1533074 - Implement Fingerprinting and Cryptomining annotation features - Part 3 - Cryptomining-annotation, r=dimi Differential Revision: https://phabricator.services.mozilla.com/D22344
83534ac4c0eb43b8cfa1c6f93431978fe11ba120: Bug 1533074 - Implement Fingerprinting and Cryptomining annotation features - Part 2 - Fingerprinting-annotation, r=dimi
Andrea Marchesini <amarchesini@mozilla.com> - Thu, 14 Mar 2019 17:48:20 +0000 - rev 521916
Push 10870 by nbeleuzu@mozilla.com at Fri, 15 Mar 2019 20:00:07 +0000
Bug 1533074 - Implement Fingerprinting and Cryptomining annotation features - Part 2 - Fingerprinting-annotation, r=dimi Differential Revision: https://phabricator.services.mozilla.com/D22342
a0c8d47ee188ee72fb0896dd80b02076f9bcafb5: Bug 1533074 - Implement Fingerprinting and Cryptomining annotation features - Part 1 - Classification flags in nsIHttpChannel, r=valentin,dimi
Andrea Marchesini <amarchesini@mozilla.com> - Thu, 14 Mar 2019 17:47:59 +0000 - rev 521915
Push 10870 by nbeleuzu@mozilla.com at Fri, 15 Mar 2019 20:00:07 +0000
Bug 1533074 - Implement Fingerprinting and Cryptomining annotation features - Part 1 - Classification flags in nsIHttpChannel, r=valentin,dimi Differential Revision: https://phabricator.services.mozilla.com/D22341
45024ae5b1b7a079cfa1913b63dd15c7ba050d87: Bug 1511749 - Fix a race condition in SharedWorker shutdown, r=asuth
Andrea Marchesini <amarchesini@mozilla.com> - Thu, 14 Mar 2019 17:42:50 +0000 - rev 521914
Push 10870 by nbeleuzu@mozilla.com at Fri, 15 Mar 2019 20:00:07 +0000
Bug 1511749 - Fix a race condition in SharedWorker shutdown, r=asuth Differential Revision: https://phabricator.services.mozilla.com/D23188
88f1641459184352c5bf333ef12aa7ac4c3a28e4: No bug: [mozharness] Use the absolute path when download secretes, to aid debugging; r=aki
Tom Prince <mozilla@hocat.ca> - Thu, 14 Mar 2019 16:22:02 +0000 - rev 521913
Push 10870 by nbeleuzu@mozilla.com at Fri, 15 Mar 2019 20:00:07 +0000
No bug: [mozharness] Use the absolute path when download secretes, to aid debugging; r=aki Differential Revision: https://phabricator.services.mozilla.com/D23465
2d742819b35b1b462b20614e583ec8dce773c946: Bug 1531400 - Missing bottom border on netmonitor table's header; r=ladybenko
Jan Odvarko <odvarko@gmail.com> - Thu, 14 Mar 2019 16:49:04 +0000 - rev 521912
Push 10870 by nbeleuzu@mozilla.com at Fri, 15 Mar 2019 20:00:07 +0000
Bug 1531400 - Missing bottom border on netmonitor table's header; r=ladybenko Differential Revision: https://phabricator.services.mozilla.com/D22959
9071e6d7836b7647c4698745b4e7fe67c4e40300: Bug 1534337: Add _ separator in certificate export filename. r=keeler
Trushita <trushita@gmail.com> - Thu, 14 Mar 2019 16:43:50 +0000 - rev 521911
Push 10870 by nbeleuzu@mozilla.com at Fri, 15 Mar 2019 20:00:07 +0000
Bug 1534337: Add _ separator in certificate export filename. r=keeler The certificate when exported had filename with no separator. Now added "_" separator to filename. Differential Revision: https://phabricator.services.mozilla.com/D23492
(0) -300000 -100000 -30000 -10000 -3000 -1000 -300 -100 -50 -20 +20 +50 +100 +300 +1000 +3000 +10000 tip