searching for reviewer(baku)
1f82fe365272472c28fb2c988ce6124bdec1fd7c: Bug 1558628 - Add back nsIDocShell.hasTrackingContentBlocked since it is used in the webcompat report-site-issue extension; r=baku a=jcristau
Ehsan Akhgari <ehsan@mozilla.com> - Wed, 12 Jun 2019 09:01:51 +0000 - rev 533863
Push 11443 by opoprus@mozilla.com at Thu, 13 Jun 2019 14:12:08 +0000
Bug 1558628 - Add back nsIDocShell.hasTrackingContentBlocked since it is used in the webcompat report-site-issue extension; r=baku a=jcristau Differential Revision: https://phabricator.services.mozilla.com/D34613
736e8d1c1c44873cbd829ef9b97f890111700b51: Bug 1554167 - Remove pending shutdown sanitization immediately after shutdown sanitization finishes. r=mak,baku a=jcristau
Johann Hofmann <jhofmann@mozilla.com> - Thu, 30 May 2019 15:39:39 +0000 - rev 533565
Push 11360 by malexandru@mozilla.com at Mon, 03 Jun 2019 14:33:27 +0000
Bug 1554167 - Remove pending shutdown sanitization immediately after shutdown sanitization finishes. r=mak,baku a=jcristau In https://hg.mozilla.org/mozilla-central/rev/25397a6f8c4f#l1.35 we added an early return to the SanitizeOnShutdown function to avoid cleaning principals by permission if the user had set their preferences to clear all storage on shutdown anyway. This unfortunately ended the function execution before it would call `removePendingSanitization("shutdown");` later on and thus remove the pending shutdown sanitization (which, in fact, had completed successfully earlier). The result is that the shutdown sanitization would be left dangling and run again on next startup, where, for reasons I don't fully understand, it would race and conflict with loading the home page, if that home page was from web content. The solution is to remove the pending shutdown sanitization immediately after the sanitization is done. As far as I can see there was never really a point in having it happen after session principal cleanup finished, since in case of a crash it would not run the principal cleanup again next startup, just the shutdown cleanup. For good measure I also moved the new tab container sanitization to happen earlier in this function, to prevent it from dangling as well. Differential Revision: https://phabricator.services.mozilla.com/D33087
22734638bdcb7d90cdcce00aacaffad82cb8e3b7: Bug 1553400 - XMLHttpRequestDoneNotifier should own XHR, not vice-versa. r=baku a=jcristau
Olli Pettay <Olli.Pettay@helsinki.fi> - Wed, 22 May 2019 15:40:10 +0000 - rev 533396
Push 11308 by nbeleuzu@mozilla.com at Fri, 24 May 2019 19:41:29 +0000
Bug 1553400 - XMLHttpRequestDoneNotifier should own XHR, not vice-versa. r=baku a=jcristau Differential Revision: https://phabricator.services.mozilla.com/D32142
d6c54c50418ca7f3b4714a13a97455540e963785: Bug 1489669 - [1.4] Add Storage Controller API. r=baku,snorp a=jcristau
Eugen Sawin <esawin@me73.com> - Wed, 22 May 2019 20:21:09 +0000 - rev 533386
Push 11307 by nbeleuzu@mozilla.com at Fri, 24 May 2019 18:27:55 +0000
Bug 1489669 - [1.4] Add Storage Controller API. r=baku,snorp a=jcristau Differential Revision: https://phabricator.services.mozilla.com/D32153
ca347ea97ee31b859bc250936cf6e4256198c516: Bug 1548517 - Add hash for test entries added via HostInPrefTables. r=baku
dlee <dlee@mozilla.com> - Fri, 10 May 2019 19:39:24 +0000 - rev 532573
Push 11270 by rgurzau@mozilla.com at Wed, 15 May 2019 15:07:19 +0000
Bug 1548517 - Add hash for test entries added via HostInPrefTables. r=baku Origin telemetry expects every tracking channel has tracker's hash. Without hash value for test entries, it will trigger MOZ_ASSERT while running testcases. Differential Revision: https://phabricator.services.mozilla.com/D30061
8e51c8d00793669923134baaf44f32b552c6c991: Bug 1546296 - Correctly clear Service Workers by hostname. r=baku
Johann Hofmann <jhofmann@mozilla.com> - Mon, 13 May 2019 21:32:53 +0000 - rev 532486
Push 11268 by csabou@mozilla.com at Tue, 14 May 2019 15:24:22 +0000
Bug 1546296 - Correctly clear Service Workers by hostname. r=baku Differential Revision: https://phabricator.services.mozilla.com/D30455
dac784d695b31fcffe11a840c2c08e287b467ee6: Bug 1426562 - Don't crash on `Response` constructor in WebExtensions. r=baku
Perry Jiang <perry@mozilla.com> - Mon, 13 May 2019 17:03:58 +0000 - rev 532450
Push 11268 by csabou@mozilla.com at Tue, 14 May 2019 15:24:22 +0000
Bug 1426562 - Don't crash on `Response` constructor in WebExtensions. r=baku Differential Revision: https://phabricator.services.mozilla.com/D29365
1fa720d18b38e35831de185ac2f55356c88a7d21: Bug 1536762 - part2 : use first line box's size as positioning basic unit. r=heycam,baku
alwu <alwu@mozilla.com> - Thu, 09 May 2019 19:22:33 +0000 - rev 532130
Push 11265 by ffxbld-merge at Mon, 13 May 2019 10:53:39 +0000
Bug 1536762 - part2 : use first line box's size as positioning basic unit. r=heycam,baku According to the spec [1] 7.2.10.2, we should use the first line box's height or width as positioning unit to adjust box's position. We will also use this value to adjust box when `snap-to-line` is false. There, we implement a new chrome-only API to acquire this information, which would return the first line box's size in the `block` frame. [1] https://www.w3.org/TR/webvtt1/#ref-for-webvtt-cue-snap-to-lines-flag-12 Differential Revision: https://phabricator.services.mozilla.com/D29745
2d810269b72e198765af3d997f3b117d832afd38: Bug 1536762 - part1 : use unscaled bounding box'size as a cue box's size. r=baku,heycam
alwu <alwu@mozilla.com> - Thu, 09 May 2019 18:26:17 +0000 - rev 532129
Push 11265 by ffxbld-merge at Mon, 13 May 2019 10:53:39 +0000
Bug 1536762 - part1 : use unscaled bounding box'size as a cue box's size. r=baku,heycam When adjusting cue's position, the goal is to place cue boxes fully inside the rendering area, and place in the right place. In order to check whether the box is correctly inside the rendering area, we have to know the correct size of the cue box. Therefore, we implement the new chrome-only APIs to acquire this information (box's height and width), and this returned value won't be affected by CSS transformation, which is good for positioning. Differential Revision: https://phabricator.services.mozilla.com/D27178
dd551956b3329ccf67cd8d6f279b93f04f79eeab: Bug 1546296 - Correctly clear Service Workers by hostname. r=baku
Johann Hofmann <jhofmann@mozilla.com> - Thu, 09 May 2019 20:09:04 +0000 - rev 532115
Push 11265 by ffxbld-merge at Mon, 13 May 2019 10:53:39 +0000
Bug 1546296 - Correctly clear Service Workers by hostname. r=baku Differential Revision: https://phabricator.services.mozilla.com/D30455
91754861e8d845ea6d84ae52b4ebad339fd89d96: Bug 1550364 part 6. Stop using [array] in nsIUDPSocketInternal. r=baku
Boris Zbarsky <bzbarsky@mit.edu> - Thu, 09 May 2019 06:55:07 +0000 - rev 532110
Push 11265 by ffxbld-merge at Mon, 13 May 2019 10:53:39 +0000
Bug 1550364 part 6. Stop using [array] in nsIUDPSocketInternal. r=baku Differential Revision: https://phabricator.services.mozilla.com/D30449
1456c2b5efb899d210fb91f2ebedfcad7c094bea: Bug 1550364 part 5. Get rid of nsIUDPSocketChild. r=baku
Boris Zbarsky <bzbarsky@mit.edu> - Thu, 09 May 2019 06:55:06 +0000 - rev 532109
Push 11265 by ffxbld-merge at Mon, 13 May 2019 10:53:39 +0000
Bug 1550364 part 5. Get rid of nsIUDPSocketChild. r=baku Differential Revision: https://phabricator.services.mozilla.com/D30448
dfbb67a692f4c1a257edd0b441a84b8c01a8e9c7: Bug 1550364 part 4. Move various methods from nsIUDPSocketChild to dom::UDPSocketChild, and simplify their signatures where possible. r=baku
Boris Zbarsky <bzbarsky@mit.edu> - Thu, 09 May 2019 06:55:06 +0000 - rev 532108
Push 11265 by ffxbld-merge at Mon, 13 May 2019 10:53:39 +0000
Bug 1550364 part 4. Move various methods from nsIUDPSocketChild to dom::UDPSocketChild, and simplify their signatures where possible. r=baku Differential Revision: https://phabricator.services.mozilla.com/D30447
2e9edc96c3d22f6aab3cc9bb69125b134a381b82: Bug 1550364 part 3. Remove unused nsIUDPSocketChild methods. r=baku
Boris Zbarsky <bzbarsky@mit.edu> - Thu, 09 May 2019 06:55:06 +0000 - rev 532107
Push 11265 by ffxbld-merge at Mon, 13 May 2019 10:53:39 +0000
Bug 1550364 part 3. Remove unused nsIUDPSocketChild methods. r=baku Differential Revision: https://phabricator.services.mozilla.com/D30446
f9bdf7a91fbc79fc67c228bf0da8219f62465726: Bug 1550364 part 2. Use dom::UDPSocketChild, not nsIUDPSocketChild, in C++ code. r=baku
Boris Zbarsky <bzbarsky@mit.edu> - Thu, 09 May 2019 06:55:05 +0000 - rev 532106
Push 11265 by ffxbld-merge at Mon, 13 May 2019 10:53:39 +0000
Bug 1550364 part 2. Use dom::UDPSocketChild, not nsIUDPSocketChild, in C++ code. r=baku Differential Revision: https://phabricator.services.mozilla.com/D30445
6225b9daa9d3e537a24e85a7f36dae882ff0d90a: Bug 1550364 part 1. Stop claiming nsIUDPSocketChild is scriptable, since we never use it from script. r=baku
Boris Zbarsky <bzbarsky@mit.edu> - Thu, 09 May 2019 06:55:05 +0000 - rev 532105
Push 11265 by ffxbld-merge at Mon, 13 May 2019 10:53:39 +0000
Bug 1550364 part 1. Stop claiming nsIUDPSocketChild is scriptable, since we never use it from script. r=baku Differential Revision: https://phabricator.services.mozilla.com/D30444
98989127264bd94ee0030809e1a9019832198a8f: Bug 1547813 - Part 12: Add some tests for partitioning third-party storage/messaging with dynamic FPI; r=baku
Ehsan Akhgari <ehsan@mozilla.com> - Thu, 09 May 2019 07:14:19 +0000 - rev 532065
Push 11265 by ffxbld-merge at Mon, 13 May 2019 10:53:39 +0000
Bug 1547813 - Part 12: Add some tests for partitioning third-party storage/messaging with dynamic FPI; r=baku This patch doesn't port all of the existing tests because some of them do not pass yet and some others need more work to be ported. This will happen in follow-up bugs. Differential Revision: https://phabricator.services.mozilla.com/D30401
c1288949de1cc38beee2a6cea0704f59c46f2551: Bug 1547813 - Part 9: Ensure the cookie service does third-party checks when the cookie policy is set to nsICookieService::BEHAVIOR_REJECT_TRACKER_AND_PARTITION_FOREIGN; r=baku
Ehsan Akhgari <ehsan@mozilla.com> - Wed, 08 May 2019 19:38:08 +0000 - rev 532062
Push 11265 by ffxbld-merge at Mon, 13 May 2019 10:53:39 +0000
Bug 1547813 - Part 9: Ensure the cookie service does third-party checks when the cookie policy is set to nsICookieService::BEHAVIOR_REJECT_TRACKER_AND_PARTITION_FOREIGN; r=baku Differential Revision: https://phabricator.services.mozilla.com/D30118
8cad4fd197b1bdbee9e36bc54a12c48dd8c8e269: Bug 1547813 - Part 8: Introduce a CookieSettings API to query whether cookies from third-party trackers must be rejected and use it in Gecko; r=baku
Ehsan Akhgari <ehsan@mozilla.com> - Wed, 08 May 2019 20:22:18 +0000 - rev 532061
Push 11265 by ffxbld-merge at Mon, 13 May 2019 10:53:39 +0000
Bug 1547813 - Part 8: Introduce a CookieSettings API to query whether cookies from third-party trackers must be rejected and use it in Gecko; r=baku Differential Revision: https://phabricator.services.mozilla.com/D30117
807ce59e7e6eecbbb83b02d1ff45ecbda9896835: Bug 1547813 - Part 7: Introduce a storage partitioning API; r=baku
Ehsan Akhgari <ehsan@mozilla.com> - Wed, 08 May 2019 20:15:13 +0000 - rev 532060
Push 11265 by ffxbld-merge at Mon, 13 May 2019 10:53:39 +0000
Bug 1547813 - Part 7: Introduce a storage partitioning API; r=baku This API abstracts away the details of the decision on what context should be partitioned away from the consumers and centralizes the decision making into the same location in the code base. Differential Revision: https://phabricator.services.mozilla.com/D29742
06943593738cbfb00527317c54f8b58d324060ab: Bug 1547813 - Part 6: Return StorageAccess::ePartitionForeignOrDeny from storage access APIs when the antitracking backend mandates that; r=baku
Ehsan Akhgari <ehsan@mozilla.com> - Wed, 08 May 2019 20:13:23 +0000 - rev 532059
Push 11265 by ffxbld-merge at Mon, 13 May 2019 10:53:39 +0000
Bug 1547813 - Part 6: Return StorageAccess::ePartitionForeignOrDeny from storage access APIs when the antitracking backend mandates that; r=baku Differential Revision: https://phabricator.services.mozilla.com/D29741
4ced8d49ddc37cd3ecdb62c38e7df51f5603f475: Bug 1547813 - Part 5: Introduce StorageAccess::ePartitionForeignOrDeny; r=baku
Ehsan Akhgari <ehsan@mozilla.com> - Thu, 09 May 2019 07:14:34 +0000 - rev 532058
Push 11265 by ffxbld-merge at Mon, 13 May 2019 10:53:39 +0000
Bug 1547813 - Part 5: Introduce StorageAccess::ePartitionForeignOrDeny; r=baku This StorageAccess code tells callers that they must partition third-party storage, or deny storage access if that is not possible. Differential Revision: https://phabricator.services.mozilla.com/D29740
77a040f527e9903657ccc0910adb760aef281619: Bug 1547813 - Part 4: Rename StorageAccess::ePartitionedOrDeny to ePartitionTrackersOrDeny; r=baku
Ehsan Akhgari <ehsan@mozilla.com> - Wed, 08 May 2019 19:37:52 +0000 - rev 532057
Push 11265 by ffxbld-merge at Mon, 13 May 2019 10:53:39 +0000
Bug 1547813 - Part 4: Rename StorageAccess::ePartitionedOrDeny to ePartitionTrackersOrDeny; r=baku Differential Revision: https://phabricator.services.mozilla.com/D29739
b4651cfaff307a7f3f05538907045b1e24a07923: Bug 1547813 - Part 3: Modify the antitracking algorithms to work with nsICookieService::BEHAVIOR_REJECT_TRACKER_AND_PARTITION_FOREIGN; r=baku
Ehsan Akhgari <ehsan@mozilla.com> - Thu, 09 May 2019 14:00:55 +0000 - rev 532056
Push 11265 by ffxbld-merge at Mon, 13 May 2019 10:53:39 +0000
Bug 1547813 - Part 3: Modify the antitracking algorithms to work with nsICookieService::BEHAVIOR_REJECT_TRACKER_AND_PARTITION_FOREIGN; r=baku The policy that this patch implements in the antitracking backend is to treat third-party trackers exactly the same way as BEHAVIOR_REJECT_TRACKER, and additionally partition all third-party contexts as well. Differential Revision: https://phabricator.services.mozilla.com/D29738
279c140a4d71c537afd5eee36f3b9262f97c819b: Bug 1547813 - Part 2: Introduce nsIWebProgressListener::STATE_COOKIES_PARTITIONED_FOREIGN; r=baku
Ehsan Akhgari <ehsan@mozilla.com> - Wed, 08 May 2019 19:37:47 +0000 - rev 532055
Push 11265 by ffxbld-merge at Mon, 13 May 2019 10:53:39 +0000
Bug 1547813 - Part 2: Introduce nsIWebProgressListener::STATE_COOKIES_PARTITIONED_FOREIGN; r=baku This error code indicates the specific case where the antitracking backend rejects a particular access request because the resource is third-party and the cookie policy mandates that third-party resources must be partitioned. Differential Revision: https://phabricator.services.mozilla.com/D29737
0e0241f3d366f10b5eab0209897c2494064fadfb: Bug 1547813 - Part 1: Introduce nsICookieService::BEHAVIOR_REJECT_TRACKER_AND_PARTITION_FOREIGN; r=baku
Ehsan Akhgari <ehsan@mozilla.com> - Wed, 08 May 2019 19:37:40 +0000 - rev 532054
Push 11265 by ffxbld-merge at Mon, 13 May 2019 10:53:39 +0000
Bug 1547813 - Part 1: Introduce nsICookieService::BEHAVIOR_REJECT_TRACKER_AND_PARTITION_FOREIGN; r=baku This new code designates our new cookie policy for blocking cookies and storage access from third-party trackers and partitioning the cookie jar of the rest of third-party resources. Differential Revision: https://phabricator.services.mozilla.com/D29736
65dd82d198821a6107fe869e0a4aee4dc3feb89f: Bug 1549389 - Fix the expected value of attribute0023 wpt test; r=baku
Ehsan Akhgari <ehsan@mozilla.com> - Wed, 08 May 2019 08:47:25 +0000 - rev 531879
Push 11265 by ffxbld-merge at Mon, 13 May 2019 10:53:39 +0000
Bug 1549389 - Fix the expected value of attribute0023 wpt test; r=baku Differential Revision: https://phabricator.services.mozilla.com/D30051
e8597b0c4aab785871b6a2a8b7146aec80ad91e1: Bug 1549011 - Ignore cookie name-value-pair strings with an empty name; r=baku
Ehsan Akhgari <ehsan@mozilla.com> - Wed, 08 May 2019 08:51:42 +0000 - rev 531878
Push 11265 by ffxbld-merge at Mon, 13 May 2019 10:53:39 +0000
Bug 1549011 - Ignore cookie name-value-pair strings with an empty name; r=baku Differential Revision: https://phabricator.services.mozilla.com/D29929
cee398776b835ecb955e0ff7af1a457898808637: Bug 1549241 - disable payments-related feature-policy tests on GeckoView due to crashes r=baku
Marcos Cáceres <mcaceres@mozilla.com> - Wed, 08 May 2019 08:53:25 +0000 - rev 531857
Push 11265 by ffxbld-merge at Mon, 13 May 2019 10:53:39 +0000
Bug 1549241 - disable payments-related feature-policy tests on GeckoView due to crashes r=baku See https://bugzilla.mozilla.org/show_bug.cgi?id=1544637 Differential Revision: https://phabricator.services.mozilla.com/D29976
eb990c2653e061801885f4546e8da756a8464873: Bug 1548486 - Set tracking info in fingerprinting annotation & cryptoming annotation. r=baku
dlee <dlee@mozilla.com> - Thu, 02 May 2019 16:06:56 +0000 - rev 531480
Push 11265 by ffxbld-merge at Mon, 13 May 2019 10:53:39 +0000
Bug 1548486 - Set tracking info in fingerprinting annotation & cryptoming annotation. r=baku The enable channels classified by these two features contain tracker's hash value. Differential Revision: https://phabricator.services.mozilla.com/D29647
fc0ae629221af74287f6df6f2ffb8bcc0b52c123: Bug 1510569 - Port onStateChange notifications inside WebProgressChild.jsm to C++ r=baku,kmag
Barret Rennie <barret@brennie.ca> - Thu, 02 May 2019 23:36:24 +0000 - rev 531213
Push 11265 by ffxbld-merge at Mon, 13 May 2019 10:53:39 +0000
Bug 1510569 - Port onStateChange notifications inside WebProgressChild.jsm to C++ r=baku,kmag We now also only access the document when the state is nsIWebProgress::STATE_STOP. The comments in the previous code indicated that touching the document inside the event handler when the state is not STATE_STOP would result in the content creating a new about:blank document to retrieve the values from. However, it then went on to do this in another location, causing a document to be created whenever we received an onStateChange event. This should no longer occur. Differential Revision: https://phabricator.services.mozilla.com/D28125
24b46555e58ff7fc20b6c84db9c10f2fba79cc23: Bug 1548432 - Part 3: Enable http-state web-platform tests; r=baku
Ehsan Akhgari <ehsan@mozilla.com> - Thu, 02 May 2019 17:12:56 +0000 - rev 531188
Push 11265 by ffxbld-merge at Mon, 13 May 2019 10:53:39 +0000
Bug 1548432 - Part 3: Enable http-state web-platform tests; r=baku Differential Revision: https://phabricator.services.mozilla.com/D29620
c6c3e3d1ee6bb5b2787ee6acf2d1b09405a1b409: Bug 1548432 - Part 2: Ignore cookie name-value-pair strings without a "=" character; r=baku
Ehsan Akhgari <ehsan@mozilla.com> - Thu, 02 May 2019 17:12:55 +0000 - rev 531187
Push 11265 by ffxbld-merge at Mon, 13 May 2019 10:53:39 +0000
Bug 1548432 - Part 2: Ignore cookie name-value-pair strings without a "=" character; r=baku Differential Revision: https://phabricator.services.mozilla.com/D29619
407a7e536bac1be8d7924f942c7e2c8b2656cb79: Bug 1548432 - Part 1: Remove the passing tests from the set of expected: FAIL annotations in http-state tests; r=baku
Ehsan Akhgari <ehsan@mozilla.com> - Thu, 02 May 2019 17:12:55 +0000 - rev 531186
Push 11265 by ffxbld-merge at Mon, 13 May 2019 10:53:39 +0000
Bug 1548432 - Part 1: Remove the passing tests from the set of expected: FAIL annotations in http-state tests; r=baku Differential Revision: https://phabricator.services.mozilla.com/D29618
df6f7b36dda2424aecf030f4458aa16c1f086bde: Bug 1481771 - Fix a race condition in browser_privatebrowsing_favicon.js by ensuring the promises that wait on conditions that happen during opening a tab are created before starting to open the tab; r=baku
Ehsan Akhgari <ehsan@mozilla.com> - Thu, 02 May 2019 21:26:11 +0000 - rev 531185
Push 11265 by ffxbld-merge at Mon, 13 May 2019 10:53:39 +0000
Bug 1481771 - Fix a race condition in browser_privatebrowsing_favicon.js by ensuring the promises that wait on conditions that happen during opening a tab are created before starting to open the tab; r=baku Differential Revision: https://phabricator.services.mozilla.com/D29717
6de795fcf1fa66ba4275014bebd7eda321583d44: Bug 1540733 - Create a new IPCBlobInputStreamChild actor when migrating, r=baku
Nika Layzell <nika@thelayzells.com> - Thu, 02 May 2019 16:18:51 +0000 - rev 531149
Push 11265 by ffxbld-merge at Mon, 13 May 2019 10:53:39 +0000
Bug 1540733 - Create a new IPCBlobInputStreamChild actor when migrating, r=baku Differential Revision: https://phabricator.services.mozilla.com/D27970
13c5249d66a7fea13cac278964ad365564ae4478: Bug 1510569 - Port onStateChange notifications inside WebProgressChild.jsm to C++ r=baku,kmag
Barret Rennie <barret@brennie.ca> - Thu, 02 May 2019 16:20:34 +0000 - rev 531145
Push 11265 by ffxbld-merge at Mon, 13 May 2019 10:53:39 +0000
Bug 1510569 - Port onStateChange notifications inside WebProgressChild.jsm to C++ r=baku,kmag We now also only access the document when the state is nsIWebProgress::STATE_STOP. The comments in the previous code indicated that touching the document inside the event handler when the state is not STATE_STOP would result in the content creating a new about:blank document to retrieve the values from. However, it then went on to do this in another location, causing a document to be created whenever we received an onStateChange event. This should no longer occur. Differential Revision: https://phabricator.services.mozilla.com/D28125
840db546dc1f20159cb4674535910c4a24f26a0e: Bug 1548562 - require `nsThread::Init` to take a name; r=baku
Nathan Froyd <froydnj@mozilla.com> - Thu, 02 May 2019 16:05:50 +0000 - rev 531136
Push 11265 by ffxbld-merge at Mon, 13 May 2019 10:53:39 +0000
Bug 1548562 - require `nsThread::Init` to take a name; r=baku There's no good reason why we should let unnamed threads through this interface. Differential Revision: https://phabricator.services.mozilla.com/D29672
c477a96a488995459baab0948a10cb7231d7cbe3: Bug 1548349 - Make sure the image cache for third-party tracking subresources is keyed to the top-level document's eTLD+1; r=baku,aosmond
Ehsan Akhgari <ehsan@mozilla.com> - Thu, 02 May 2019 12:27:07 +0000 - rev 531127
Push 11265 by ffxbld-merge at Mon, 13 May 2019 10:53:39 +0000
Bug 1548349 - Make sure the image cache for third-party tracking subresources is keyed to the top-level document's eTLD+1; r=baku,aosmond Differential Revision: https://phabricator.services.mozilla.com/D29546
69fb960771d254fde9b7567fd3f527a205a60555: Bug 1548375 - Remove redundant canvas log info. r=baku
J. Ryan Stinnett <jryans@gmail.com> - Wed, 01 May 2019 21:54:43 +0000 - rev 531051
Push 11265 by ffxbld-merge at Mon, 13 May 2019 10:53:39 +0000
Bug 1548375 - Remove redundant canvas log info. r=baku Now that we're reporting to the page console, there's no need to include the top document URI, since that's obvious from the tab. In addition, the script file and line are already added by the console reporting path (and displayed with nicer formatting), so we don't need to add them to the message text. Differential Revision: https://phabricator.services.mozilla.com/D29573
1376a67f22b4d4d28c712bd74217644fbd5fb040: Bug 1548375 - Send canvas fingerprinting logs to page console. r=baku
J. Ryan Stinnett <jryans@gmail.com> - Wed, 01 May 2019 21:51:41 +0000 - rev 531050
Push 11265 by ffxbld-merge at Mon, 13 May 2019 10:53:39 +0000
Bug 1548375 - Send canvas fingerprinting logs to page console. r=baku By directing fingerprinting logs to the page console (instead of the browser console), web developers are much more likely to see them and understand what's wrong. Differential Revision: https://phabricator.services.mozilla.com/D29572
e1927f1c0f1e3c3eed9bde2a1bdd6ac0a434458a: Bug 1536154 - Make nsStringInputStream always report the full memory size of the backing string r=baku
Jon Coppeard <jcoppeard@mozilla.com> - Tue, 30 Apr 2019 11:53:42 +0100 - rev 530900
Push 11265 by ffxbld-merge at Mon, 13 May 2019 10:53:39 +0000
Bug 1536154 - Make nsStringInputStream always report the full memory size of the backing string r=baku Give nsIStringStream separate SizeOfIncludingThisIfUnshared and SizeOfIncludingThisEvenIfShared methods. Use the former for memory reporting and the latter for JS engine memory accounting. Differential Revision: https://phabricator.services.mozilla.com/D29336
19375055cd534807854b38205ef585d9154dd4a8: Bug 1548086 - Work around bug 1548085 in browser_referrerDefaultPolicy.js; r=baku
Ehsan Akhgari <ehsan@mozilla.com> - Tue, 30 Apr 2019 22:31:38 +0000 - rev 530853
Push 11265 by ffxbld-merge at Mon, 13 May 2019 10:53:39 +0000
Bug 1548086 - Work around bug 1548085 in browser_referrerDefaultPolicy.js; r=baku Differential Revision: https://phabricator.services.mozilla.com/D29399
7b30d0ee0b8c83cdc2786d79faa84ebcc6a5033d: Bug 1547889 - Part 3: Require the caller of the AntiTrackingCommon::IsFirstPartyStorageAccessGrantedFor(nsIPrincipal*) API pass in a cookie setting object; r=baku
Ehsan Akhgari <ehsan@mozilla.com> - Tue, 30 Apr 2019 14:27:43 +0000 - rev 530775
Push 11265 by ffxbld-merge at Mon, 13 May 2019 10:53:39 +0000
Bug 1547889 - Part 3: Require the caller of the AntiTrackingCommon::IsFirstPartyStorageAccessGrantedFor(nsIPrincipal*) API pass in a cookie setting object; r=baku Differential Revision: https://phabricator.services.mozilla.com/D29321
29f01b943d7fb3a16927b59606fae910896597a9: Bug 1547889 - Part 2: Port AntiTrackingCommon::MaybeIsFirstPartyStorageAccessGrantedFor() to the cookie settings API; r=baku
Ehsan Akhgari <ehsan@mozilla.com> - Tue, 30 Apr 2019 14:27:36 +0000 - rev 530774
Push 11265 by ffxbld-merge at Mon, 13 May 2019 10:53:39 +0000
Bug 1547889 - Part 2: Port AntiTrackingCommon::MaybeIsFirstPartyStorageAccessGrantedFor() to the cookie settings API; r=baku Differential Revision: https://phabricator.services.mozilla.com/D29320
43a08bca736a41a74e9473dac7a8c468790fcd29: Bug 1547889 - Part 1: Port AntiTrackingCommon::AddFirstPartyStorageAccessGrantedFor() to the cookie settings API; r=baku
Ehsan Akhgari <ehsan@mozilla.com> - Tue, 30 Apr 2019 14:27:34 +0000 - rev 530773
Push 11265 by ffxbld-merge at Mon, 13 May 2019 10:53:39 +0000
Bug 1547889 - Part 1: Port AntiTrackingCommon::AddFirstPartyStorageAccessGrantedFor() to the cookie settings API; r=baku Differential Revision: https://phabricator.services.mozilla.com/D29319
f3c896ea6e1693af54eb6515aad514869d68f057: Bug 1547397 - Part 3: Move the permission manager code to extensions/permissions; r=baku
Ehsan Akhgari <ehsan@mozilla.com> - Tue, 30 Apr 2019 14:06:53 +0000 - rev 530767
Push 11265 by ffxbld-merge at Mon, 13 May 2019 10:53:39 +0000
Bug 1547397 - Part 3: Move the permission manager code to extensions/permissions; r=baku Differential Revision: https://phabricator.services.mozilla.com/D29116
f6a701d4a8986f310c5867540a5cf5b60ed5dcea: Bug 1547397 - Part 2: Move some xpcshell tests for cookies out of extensions/cookies; r=baku
Ehsan Akhgari <ehsan@mozilla.com> - Tue, 30 Apr 2019 14:06:27 +0000 - rev 530766
Push 11265 by ffxbld-merge at Mon, 13 May 2019 10:53:39 +0000
Bug 1547397 - Part 2: Move some xpcshell tests for cookies out of extensions/cookies; r=baku Differential Revision: https://phabricator.services.mozilla.com/D29115
a80227abf82bcd52d816a2d855be72d5a54028ee: Bug 1547397 - Part 1: Move some mochitests and browser-chrome tests for cookies out of extensions/cookies; r=baku
Ehsan Akhgari <ehsan@mozilla.com> - Tue, 30 Apr 2019 14:07:12 +0000 - rev 530765
Push 11265 by ffxbld-merge at Mon, 13 May 2019 10:53:39 +0000
Bug 1547397 - Part 1: Move some mochitests and browser-chrome tests for cookies out of extensions/cookies; r=baku Differential Revision: https://phabricator.services.mozilla.com/D29117
51fa10aa3b4a99e220753f6c549d5e0ff732e52f: Bug 1547712: Remove unused variable nsIAddonPolicyService aps from Document.cpp. r=baku
Christoph Kerschbaumer <ckerschb@christophkerschbaumer.com> - Tue, 30 Apr 2019 14:11:57 +0000 - rev 530764
Push 11265 by ffxbld-merge at Mon, 13 May 2019 10:53:39 +0000
Bug 1547712: Remove unused variable nsIAddonPolicyService aps from Document.cpp. r=baku Differential Revision: https://phabricator.services.mozilla.com/D29202