b71b58e40426eb7847f1461ca390422b10a88fed: Bug 1540839 - Don't set embedder element to null; r=nika
Kyle Machulis <kyle@nonpolynomial.com> - Wed, 08 May 2019 14:32:55 -0700 - rev 532526
Push 11268 by csabou@mozilla.com at Tue, 14 May 2019 15:24:22 +0000
Bug 1540839 - Don't set embedder element to null; r=nika When resetting the BrowsingContext embedder element, only do so if the FrameElement we're setting isn't already null. Differential Revision: https://phabricator.services.mozilla.com/D30562
484a546133586d3b1a10b77fb5043df8e4127827: Bug 1540839 - Assert on browsing context creation in chrome; r=nika
Kyle Machulis <kyle@nonpolynomial.com> - Mon, 06 May 2019 16:26:57 -0700 - rev 532525
Push 11268 by csabou@mozilla.com at Tue, 14 May 2019 15:24:22 +0000
Bug 1540839 - Assert on browsing context creation in chrome; r=nika We shouldn't be creating browsing contexts in chrome. Add assertion (behind pref that guards the rest of this patch set) to make sure that doesn't happen. Differential Revision: https://phabricator.services.mozilla.com/D30561
b34c4d71f20230205d4d676445e60a643108b94a: Bug 1540839 - Hold BrowsingContextGroups until ContentChild dies; r=nika
Kyle Machulis <kyle@nonpolynomial.com> - Thu, 02 May 2019 16:56:41 -0700 - rev 532524
Push 11268 by csabou@mozilla.com at Tue, 14 May 2019 15:24:22 +0000
Bug 1540839 - Hold BrowsingContextGroups until ContentChild dies; r=nika In order to not have detach called on non-existent BrowsingContexts, we need to hold browsing contexts alive until the lifetime of ContentChild has ended. Differential Revision: https://phabricator.services.mozilla.com/D29782
8ff2ff524489f0ae67d90ed4ce2c6d2fe4986d5d: Bug 1540839 - Don't reuse BCs on top level windows being made local; r=nika
Kyle Machulis <kyle@nonpolynomial.com> - Thu, 18 Apr 2019 17:31:41 -0700 - rev 532523
Push 11268 by csabou@mozilla.com at Tue, 14 May 2019 15:24:22 +0000
Bug 1540839 - Don't reuse BCs on top level windows being made local; r=nika Don't preserve contexts when we have a chrome window that's being made local. Differential Revision: https://phabricator.services.mozilla.com/D29044
27492a30286c2cc22509e7ccdd84ff22f1425841: Bug 1540839 - Add Cross Origin Opener Policy case for BC preservation; r=nika
Kyle Machulis <kyle@nonpolynomial.com> - Fri, 05 Apr 2019 17:18:08 -0700 - rev 532522
Push 11268 by csabou@mozilla.com at Tue, 14 May 2019 15:24:22 +0000
Bug 1540839 - Add Cross Origin Opener Policy case for BC preservation; r=nika If we're doing a process switch due to the cross origin opener policy being mismatched, we don't want to preserve the browsing context. Differential Revision: https://phabricator.services.mozilla.com/D26392
f1c35e8e84f6218ea00f81fd5fd849cdd1fc79e5: Bug 1540839 - Add ability to preserve browsing contexts between FrameLoaders; r=nika
Kyle Machulis <kyle@nonpolynomial.com> - Wed, 03 Apr 2019 15:40:28 -0700 - rev 532521
Push 11268 by csabou@mozilla.com at Tue, 14 May 2019 15:24:22 +0000
Bug 1540839 - Add ability to preserve browsing contexts between FrameLoaders; r=nika When changing processes and therefore destroying/rebuilding frameloaders, add ability to keep the browsing context around and add it to the new frameloader. Differential Revision: https://phabricator.services.mozilla.com/D26267
22a3a17e5a419109cb17d83d1803ae652145b6a7: Backed out changeset 60085ea6ff72 (bug 1543753) for causing debugger perma failures. CLOSED TREE
Razvan Maries <rmaries@mozilla.com> - Tue, 14 May 2019 03:20:20 +0300 - rev 532520
Push 11268 by csabou@mozilla.com at Tue, 14 May 2019 15:24:22 +0000
Backed out changeset 60085ea6ff72 (bug 1543753) for causing debugger perma failures. CLOSED TREE
3c5ff599ce3c6f922b8bb31f2344c199b82889e2: Bug 1547864 - Use a single debugger request to gather information needed to pause at a location, r=loganfsmyth.
Brian Hackett <bhackett1024@gmail.com> - Mon, 29 Apr 2019 06:40:23 -1000 - rev 532519
Push 11268 by csabou@mozilla.com at Tue, 14 May 2019 15:24:22 +0000
Bug 1547864 - Use a single debugger request to gather information needed to pause at a location, r=loganfsmyth. Differential Revision: https://phabricator.services.mozilla.com/D29292
60085ea6ff728115e1f61568702fd2348c15814d: Bug 1543753 - Don't view sources that can't be loaded in the debugger, r=loganfsmyth.
Brian Hackett <bhackett1024@gmail.com> - Wed, 01 May 2019 14:01:09 -1000 - rev 532518
Push 11268 by csabou@mozilla.com at Tue, 14 May 2019 15:24:22 +0000
Bug 1543753 - Don't view sources that can't be loaded in the debugger, r=loganfsmyth. Differential Revision: https://phabricator.services.mozilla.com/D29593
274fb69f7d77a018cf66f0179e41fca38f9baaad: Bug 1546138 - Baldr: remove indirection from table.get return value (r=lth)
Luke Wagner <luke@mozilla.com> - Wed, 01 May 2019 15:13:43 -0500 - rev 532517
Push 11268 by csabou@mozilla.com at Tue, 14 May 2019 15:24:22 +0000
Bug 1546138 - Baldr: remove indirection from table.get return value (r=lth) Differential Revision: https://phabricator.services.mozilla.com/D29596
8a9dd53d55f6913cf9510a207cf4fb2d44fd4cbb: Bug 1546138 - Baldr: do failure checking in masm.wasmCallBulitinInstanceMethod (r=lth)
Luke Wagner <luke@mozilla.com> - Wed, 01 May 2019 16:55:05 -0500 - rev 532516
Push 11268 by csabou@mozilla.com at Tue, 14 May 2019 15:24:22 +0000
Bug 1546138 - Baldr: do failure checking in masm.wasmCallBulitinInstanceMethod (r=lth) This patch further centralizes builtin signature information into SymbolicAddressSignature, removing more than 100 lines of code and preparing the way for the next patch, which will use this eager error check to return a JSObject* from Instance::tableGet. Differential Revision: https://phabricator.services.mozilla.com/D29595
831cb051385509ce1c25f54e4101ed8cfa439dab: Bug 1546138 - Baldr: rename TableKind::TypedFunction to AsmJS (r=lth)
Luke Wagner <luke@mozilla.com> - Wed, 24 Apr 2019 16:57:07 -0500 - rev 532515
Push 11268 by csabou@mozilla.com at Tue, 14 May 2019 15:24:22 +0000
Bug 1546138 - Baldr: rename TableKind::TypedFunction to AsmJS (r=lth) Differential Revision: https://phabricator.services.mozilla.com/D29299
5c7c24409605772c40e56e099d7b3d03d3f5881d: Bug 1546138 - Baldr: add FuncRef to ValType (r=lth)
Luke Wagner <luke@mozilla.com> - Mon, 29 Apr 2019 19:13:55 -0500 - rev 532514
Push 11268 by csabou@mozilla.com at Tue, 14 May 2019 15:24:22 +0000
Bug 1546138 - Baldr: add FuncRef to ValType (r=lth) Differential Revision: https://phabricator.services.mozilla.com/D28724 *** Bug 1546138 - Baldr: remove (ref T) special case from Val union (r=lth) Differential Revision: https://phabricator.services.mozilla.com/D29298
50a4ded4f51304e10ae6c1c9d3b540f6812824e9: Bug 1546138 - Baldr: reflect 'anyfunc' to 'funcref' renaming in methods (r=lth)
Luke Wagner <luke@mozilla.com> - Mon, 29 Apr 2019 18:00:26 -0500 - rev 532513
Push 11268 by csabou@mozilla.com at Tue, 14 May 2019 15:24:22 +0000
Bug 1546138 - Baldr: reflect 'anyfunc' to 'funcref' renaming in methods (r=lth) Differential Revision: https://phabricator.services.mozilla.com/D28723
96563508f9fed49ddc64469d05c9d3d7be46d547: Bug 1548393 - Generate a digestable password, free of ambiguous characters. r=mhoye,sfoster
Matthew Noorenberghe <mozilla@noorenberghe.ca> - Mon, 13 May 2019 20:55:46 +0000 - rev 532512
Push 11268 by csabou@mozilla.com at Tue, 14 May 2019 15:24:22 +0000
Bug 1548393 - Generate a digestable password, free of ambiguous characters. r=mhoye,sfoster Differential Revision: https://phabricator.services.mozilla.com/D30249
b1c78bd9fdc280ce52f84e105321a79a89e2177a: Bug 1506693: PDFJS range-based requests violate FPI r=bdahl
pospeselr <richard@torproject.org> - Mon, 13 May 2019 23:41:57 +0000 - rev 532511
Push 11268 by csabou@mozilla.com at Tue, 14 May 2019 15:24:22 +0000
Bug 1506693: PDFJS range-based requests violate FPI r=bdahl Large pdf files download in parts via range-based requests so that users can begin reading before the entire file has finished downloading. This is implemented using XMLHttpRequests. However, since these requests are created in the chrome, they are given the System Principal and lack the correct firstPartyDomain associated with the parent window. This patch manually sets the XMLHttpRequest's originAttributes to the one provided by the real owning window cached in the RangedChromeActions object. This is done via the chrome-only setOriginAttributes method. The method is called in the xhr_onreadystatechanged() callback rather than directly after construction in getXhr() because the setOriginAttributes implementation requires the internal nsIChannel object to have been created but not used. Fortunately, the XMLHttpRequest object fires the readStateChangedEvent precisely after the channel has been created in the XmlHttpRequest's Open() method. The nsIChannel's nsILoadInfo's OriginAttributes are now overwritten with the known OriginAttributes of the parent window before anything else has had a chance to use it. Differential Revision: https://phabricator.services.mozilla.com/D30689
419436973f91a86cee1fb0523be60f5b131847b4: Bug 1550807 - Load the baselinescript into scratch1 before calling emitTraceLoggerResume r=jandem
Denis Palmeiro <dpalmeiro@mozilla.com> - Mon, 13 May 2019 16:20:20 +0000 - rev 532510
Push 11268 by csabou@mozilla.com at Tue, 14 May 2019 15:24:22 +0000
Bug 1550807 - Load the baselinescript into scratch1 before calling emitTraceLoggerResume r=jandem Tracelogger is no longer functioning properly because of bad script event ids. The baselinescript load into scratch1 was accidentally removed leading garbage script ids to be passed into emitTraceLoggerResume. This fix aims to simply reload the correct value back into scratch1 before calling tracelogger. Differential Revision: https://phabricator.services.mozilla.com/D30680
7db0ea895005973d998409c051d9d7e69c2a896b: Bug 1549741 - Removed TrackingProtectionPrompt. r=VladBaicu
Nagy Mihaly <mihaly.nagy@softvision.com> - Mon, 13 May 2019 14:17:33 +0000 - rev 532509
Push 11268 by csabou@mozilla.com at Tue, 14 May 2019 15:24:22 +0000
Bug 1549741 - Removed TrackingProtectionPrompt. r=VladBaicu *** Differential Revision: https://phabricator.services.mozilla.com/D30918
ff2278c703c15245c7d8639f4fc10d13ba44b51c: Bug 1548385: Test CSP blocks scripts correctly within template. r=jkt
Christoph Kerschbaumer <ckerschb@christophkerschbaumer.com> - Mon, 13 May 2019 20:20:58 +0000 - rev 532508
Push 11268 by csabou@mozilla.com at Tue, 14 May 2019 15:24:22 +0000
Bug 1548385: Test CSP blocks scripts correctly within template. r=jkt Differential Revision: https://phabricator.services.mozilla.com/D30480
30c5aa2279c6d4f3952b0db3da22fed9ff21f949: Bug 1550289 - changing pocket url r=thecount
Gavin Lazar Suntop <gavin@gsuntop.com> - Mon, 13 May 2019 21:43:54 +0000 - rev 532507
Push 11268 by csabou@mozilla.com at Tue, 14 May 2019 15:24:22 +0000
Bug 1550289 - changing pocket url r=thecount Differential Revision: https://phabricator.services.mozilla.com/D30557
(0) -300000 -100000 -30000 -10000 -3000 -1000 -300 -100 -50 -20 +20 +50 +100 +300 +1000 tip