searching for reviewer(bholley)
915aa6a1a0edaeb9d65bc87e7f2ef7c4693cabfc: Bug 1145314: Lock down CheckLoadURIFlags by dropping the check that lets any URI_IS_UI_RESOURCE URL link to any other URL with that flag. r=bholley
Christoph Kerschbaumer <ckerschb@christophkerschbaumer.com> - Tue, 15 Sep 2020 07:30:26 +0000 - rev 613938
Push 13943 by ffxbld-merge at Mon, 21 Sep 2020 13:41:08 +0000
Bug 1145314: Lock down CheckLoadURIFlags by dropping the check that lets any URI_IS_UI_RESOURCE URL link to any other URL with that flag. r=bholley Differential Revision: https://phabricator.services.mozilla.com/D80601
1edd9346c110b011ed87e50eb3d417202ea445fb: Bug 1658214: Only construct JS-implemented objects if inner window is current. r=bholley
Kris Maglione <maglione.k@gmail.com> - Fri, 14 Aug 2020 16:02:25 +0000 - rev 609335
Push 13553 by ffxbld-merge at Mon, 24 Aug 2020 12:51:36 +0000
Bug 1658214: Only construct JS-implemented objects if inner window is current. r=bholley Differential Revision: https://phabricator.services.mozilla.com/D86614
6fa858e9b31da85a008f121c61d39aac884f9e6c: Bug 1658214: Only construct JS-implemented objects if inner window is current. r=bholley, a=RyanVM
Kris Maglione <maglione.k@gmail.com> - Fri, 14 Aug 2020 16:02:25 +0000 - rev 606803
Push 13550 by ryanvm@gmail.com at Fri, 14 Aug 2020 20:13:39 +0000
Bug 1658214: Only construct JS-implemented objects if inner window is current. r=bholley, a=RyanVM Differential Revision: https://phabricator.services.mozilla.com/D86614
5492ac0e42f79107dbac41a838477c127ed364db: Bug 1145314: Lock down CheckLoadURIFlags by dropping the check that lets any URI_IS_UI_RESOURCE URL link to any other URL with that flag. r=bholley
Christoph Kerschbaumer <ckerschb@christophkerschbaumer.com> - Fri, 03 Jul 2020 08:11:59 +0000 - rev 602951
Push 13434 by ffxbld-merge at Mon, 27 Jul 2020 16:59:11 +0000
Bug 1145314: Lock down CheckLoadURIFlags by dropping the check that lets any URI_IS_UI_RESOURCE URL link to any other URL with that flag. r=bholley Differential Revision: https://phabricator.services.mozilla.com/D80601
f524ffe669caa31102581e715275c35b49422fe3: Bug 1145314: Lock down CheckLoadURIFlags by dropping the check that lets any URI_IS_UI_RESOURCE URL link to any other URL with that flag. r=bholley
Christoph Kerschbaumer <ckerschb@christophkerschbaumer.com> - Thu, 02 Jul 2020 09:41:11 +0000 - rev 602838
Push 13434 by ffxbld-merge at Mon, 27 Jul 2020 16:59:11 +0000
Bug 1145314: Lock down CheckLoadURIFlags by dropping the check that lets any URI_IS_UI_RESOURCE URL link to any other URL with that flag. r=bholley Differential Revision: https://phabricator.services.mozilla.com/D80601
93dbc3fe146abe287f615a8dab466874f9664727: Bug 1145314: Lock down CheckLoadURIFlags by dropping the check that lets any URI_IS_UI_RESOURCE URL link to any other URL with that flag. r=bholley
Christoph Kerschbaumer <ckerschb@christophkerschbaumer.com> - Thu, 02 Jul 2020 08:17:17 +0000 - rev 602767
Push 13434 by ffxbld-merge at Mon, 27 Jul 2020 16:59:11 +0000
Bug 1145314: Lock down CheckLoadURIFlags by dropping the check that lets any URI_IS_UI_RESOURCE URL link to any other URL with that flag. r=bholley Differential Revision: https://phabricator.services.mozilla.com/D80601
93bca0225002f5dae30b60b823cb73684031a348: Bug 1645510: Part 2 - Avoid using the unprivileged junk scope where possible. r=bholley
Kris Maglione <maglione.k@gmail.com> - Sat, 27 Jun 2020 03:06:28 +0000 - rev 601760
Push 13310 by ffxbld-merge at Mon, 29 Jun 2020 14:50:06 +0000
Bug 1645510: Part 2 - Avoid using the unprivileged junk scope where possible. r=bholley Differential Revision: https://phabricator.services.mozilla.com/D79720
821960c5fa97cbe6fabaa26182c35d1e76a3ae4e: Bug 1645510: Part 1 - Make unprivileged junk scope creation lazy, weak, and fallible. r=mccr8,bholley
Kris Maglione <maglione.k@gmail.com> - Sat, 27 Jun 2020 03:06:26 +0000 - rev 601759
Push 13310 by ffxbld-merge at Mon, 29 Jun 2020 14:50:06 +0000
Bug 1645510: Part 1 - Make unprivileged junk scope creation lazy, weak, and fallible. r=mccr8,bholley Differential Revision: https://phabricator.services.mozilla.com/D79719
e15bba6c88109431499115ac47773205064acd5a: Bug 1648093: Rename hasFlags variables to something more descriptive within nsScriptSecurityManager. r=bholley
Christoph Kerschbaumer <ckerschb@christophkerschbaumer.com> - Wed, 24 Jun 2020 16:57:18 +0000 - rev 601302
Push 13310 by ffxbld-merge at Mon, 29 Jun 2020 14:50:06 +0000
Bug 1648093: Rename hasFlags variables to something more descriptive within nsScriptSecurityManager. r=bholley Differential Revision: https://phabricator.services.mozilla.com/D80886
f6c685e4b84159a009137c7579ee0e4c3c021c54: Bug 1641737 - P4. Add UseDirectTaskDispatch/UseSynchronousDispatch to MozPromiseHolder. r=bholley
Jean-Yves Avenard <jyavenard@mozilla.com> - Fri, 12 Jun 2020 05:56:39 +0000 - rev 599341
Push 13310 by ffxbld-merge at Mon, 29 Jun 2020 14:50:06 +0000
Bug 1641737 - P4. Add UseDirectTaskDispatch/UseSynchronousDispatch to MozPromiseHolder. r=bholley The allows to not have to deal with MozPromise::Private directly. Differential Revision: https://phabricator.services.mozilla.com/D78208
02f45f660107900ceb10cde467365bec7e891310: Bug 1641737 - P1. Set dispatch type to chained promises. r=bholley
Jean-Yves Avenard <jyavenard@mozilla.com> - Fri, 12 Jun 2020 05:56:26 +0000 - rev 599338
Push 13310 by ffxbld-merge at Mon, 29 Jun 2020 14:50:06 +0000
Bug 1641737 - P1. Set dispatch type to chained promises. r=bholley When chaining a MozPromise set to be dispatched via the direct task queue (or synchronous), it makes sense for the chained promise to be dispatched in the same fashion. All MozPromises generated by the IPC bindings are set to use the direct task queue in order to prevent the then runnable to run out of order with other IPC tasks. We want to preserve that task ordering by default. Differential Revision: https://phabricator.services.mozilla.com/D78178
86419b2114e5ad91785281094c5323851a642b51: Bug 1644009 - P14. Fallback to normal dispatch on release. r=bholley
Jean-Yves Avenard <jyavenard@mozilla.com> - Fri, 12 Jun 2020 05:10:57 +0000 - rev 599337
Push 13310 by ffxbld-merge at Mon, 29 Jun 2020 14:50:06 +0000
Bug 1644009 - P14. Fallback to normal dispatch on release. r=bholley We shouldn't ever get there, but just in case, better than a null deref. Differential Revision: https://phabricator.services.mozilla.com/D79097
d985d78962c7a4b6a446803ae98ade7eaf9e05ec: Bug 1644009 - P13. Don't have AutoTaskGuard inherit from AutoTaskDispatcher. r=bholley.
Jean-Yves Avenard <jyavenard@mozilla.com> - Fri, 12 Jun 2020 05:10:55 +0000 - rev 599336
Push 13310 by ffxbld-merge at Mon, 29 Jun 2020 14:50:06 +0000
Bug 1644009 - P13. Don't have AutoTaskGuard inherit from AutoTaskDispatcher. r=bholley. This prevent being able to assert in the AutoTaskDispatcher that we are using it from the right thread/taskqueue as the SimpleTaskQueue object isn't thread-safe. We want to assert that all nsIDirectTaskDispatcher methods are only ever accessed on the underlying thread. To do so require that the scope of AutoTaskDispatcher to terminate prior the AutoTaskGuard one. Differential Revision: https://phabricator.services.mozilla.com/D79096
a0fe9db3ab56403070c8ff9122bcb5b83c29835b: Bug 1644009 - P10. Make MozPromise access direct task dispatcher using QI(nsIDirectTaskDispatcher). r=bholley
Jean-Yves Avenard <jyavenard@mozilla.com> - Fri, 12 Jun 2020 05:10:32 +0000 - rev 599333
Push 13310 by ffxbld-merge at Mon, 29 Jun 2020 14:50:06 +0000
Bug 1644009 - P10. Make MozPromise access direct task dispatcher using QI(nsIDirectTaskDispatcher). r=bholley Differential Revision: https://phabricator.services.mozilla.com/D79094
e3bf9a45db6afe5fa55afa7e6b5d3992ea2b4b8d: Bug 1641737 - P4. Add UseDirectTaskDispatch/UseSynchronousDispatch to MozPromiseHolder. r=bholley
Jean-Yves Avenard <jyavenard@mozilla.com> - Tue, 09 Jun 2020 07:23:57 +0000 - rev 598692
Push 13310 by ffxbld-merge at Mon, 29 Jun 2020 14:50:06 +0000
Bug 1641737 - P4. Add UseDirectTaskDispatch/UseSynchronousDispatch to MozPromiseHolder. r=bholley The allows to not have to deal with MozPromise::Private directly. Differential Revision: https://phabricator.services.mozilla.com/D78208
0296d0f6c1d120225f2279f378d33f83bdc02eae: Bug 1641737 - P1. Set dispatch type to chained promises. r=bholley
Jean-Yves Avenard <jyavenard@mozilla.com> - Tue, 09 Jun 2020 07:23:29 +0000 - rev 598689
Push 13310 by ffxbld-merge at Mon, 29 Jun 2020 14:50:06 +0000
Bug 1641737 - P1. Set dispatch type to chained promises. r=bholley When chaining a MozPromise set to be dispatched via the direct task queue (or synchronous), it makes sense for the chained promise to be dispatched in the same fashion. All MozPromises generated by the IPC bindings are set to use the direct task queue in order to prevent the then runnable to run out of order with other IPC tasks. We want to preserve that task ordering by default. Differential Revision: https://phabricator.services.mozilla.com/D78178
ab519b8a47f1d3583e17b0105ed54d38fa3839a7: Bug 1641936 - Add a generic principal hash key. r=bholley
Emilio Cobos Álvarez <emilio@crisal.io> - Fri, 29 May 2020 22:18:01 +0000 - rev 596828
Push 13186 by ffxbld-merge at Mon, 01 Jun 2020 09:52:46 +0000
Bug 1641936 - Add a generic principal hash key. r=bholley Differential Revision: https://phabricator.services.mozilla.com/D77501
5871f4ecce8716009e676c18ce496e5f3bbd8651: Bug 1634135: Update test_xrayToJS to handle Regexp.prototype.dotAll r=bholley
Iain Ireland <iireland@mozilla.com> - Wed, 13 May 2020 16:23:33 +0000 - rev 593406
Push 13186 by ffxbld-merge at Mon, 01 Jun 2020 09:52:46 +0000
Bug 1634135: Update test_xrayToJS to handle Regexp.prototype.dotAll r=bholley We are adding support for the dotAll (/s) RegExp flag, so the list of expected properties on the RegExp prototype has to be updated. Differential Revision: https://phabricator.services.mozilla.com/D74149
4b0f7ee4f17d5102d55d3d1e37f7b83dcb019f0c: Bug 1592488 - P13. Add TailDispatchingTarget class. r=bholley
Jean-Yves Avenard <jyavenard@mozilla.com> - Tue, 12 May 2020 10:45:23 +0000 - rev 593280
Push 13186 by ffxbld-merge at Mon, 01 Jun 2020 09:52:46 +0000
Bug 1592488 - P13. Add TailDispatchingTarget class. r=bholley This wraps the current thread such that a call to Dispatch will be done as direct task dispatch instead so that the task will be run in the current event loop. This allows for have similar (but not identical to) the microtask semantics of JS promises Differential Revision: https://phabricator.services.mozilla.com/D69995
09f0c7ef9cd31f76bbc394684af755313199736c: Bug 1592488 - P2. Add MozPromise::Private::UseDirectTaskDispatch. r=bholley
Jean-Yves Avenard <jyavenard@mozilla.com> - Tue, 12 May 2020 10:42:44 +0000 - rev 593270
Push 13186 by ffxbld-merge at Mon, 01 Jun 2020 09:52:46 +0000
Bug 1592488 - P2. Add MozPromise::Private::UseDirectTaskDispatch. r=bholley If set, the callback will be dispatched via a direct task. Direct tasks are run via the current thread's tail dispatcher. This mechanism is only available if both the caller and the target are on the same thread and an AbstractThread is available Differential Revision: https://phabricator.services.mozilla.com/D71592
74ff142216da6b218960a1ec7d2e62a51ad80bab: Bug 1592488 - P1. Add MozPromise::Private::UseSynchronousTaskDispatch. r=bholley
Jean-Yves Avenard <jyavenard@mozilla.com> - Tue, 12 May 2020 10:53:48 +0000 - rev 593269
Push 13186 by ffxbld-merge at Mon, 01 Jun 2020 09:52:46 +0000
Bug 1592488 - P1. Add MozPromise::Private::UseSynchronousTaskDispatch. r=bholley If set, the callback will be run synchronously when the promise is resolved or rejected. Differential Revision: https://phabricator.services.mozilla.com/D71591
4eda5acc8e1f141fc8a7df052ed6b2bc4fd322c4: Bug 1634135: Update test_xrayToJS to handle Regexp.prototype.dotAll r=bholley
Iain Ireland <iireland@mozilla.com> - Sun, 10 May 2020 16:00:27 +0000 - rev 592975
Push 13186 by ffxbld-merge at Mon, 01 Jun 2020 09:52:46 +0000
Bug 1634135: Update test_xrayToJS to handle Regexp.prototype.dotAll r=bholley We are adding support for the dotAll (/s) RegExp flag, so the list of expected properties on the RegExp prototype has to be updated. Differential Revision: https://phabricator.services.mozilla.com/D74149
ce0291e3f74342d7543ad191b52f84f611012787: Bug 1630802 - P9. EventTargetWrapper runners don't need to be cancellable. r=bholley
Jean-Yves Avenard <jyavenard@mozilla.com> - Mon, 20 Apr 2020 02:08:23 +0000 - rev 588537
Push 13072 by ffxbld-merge at Mon, 04 May 2020 14:22:08 +0000
Bug 1630802 - P9. EventTargetWrapper runners don't need to be cancellable. r=bholley It was required once upon a time to be able to use MozPromise on Workers. Today a MozPromise work with nsISerialEventTarget and no longer rely on this. It can go. Differential Revision: https://phabricator.services.mozilla.com/D71442
c2a43696053ddaf1e5043577a71b1fd3a8bd3271: Bug 1630802 - P8. Remove unnecessary AutoEnter. r=bholley
Jean-Yves Avenard <jyavenard@mozilla.com> - Mon, 20 Apr 2020 02:13:31 +0000 - rev 588536
Push 13072 by ffxbld-merge at Mon, 04 May 2020 14:22:08 +0000
Bug 1630802 - P8. Remove unnecessary AutoEnter. r=bholley AutoEnter was an attempt around a race between AbstractThread and MessageLoopAbstractThreadWrap that would cause AbstractThread::GetCurrent() to return an incorrect value. MessageLoopAbstractThreadWrapper is no more and as such AutoEnter is no longer required. Differential Revision: https://phabricator.services.mozilla.com/D71279
7d104d25415caf1c2df93e07d846aa62e5ba6122: Bug 1630802 - P7. Remove CreateEventTargetWrapper and ensure that only a single AbstractThread exists par nsIThread. r=bholley
Jean-Yves Avenard <jyavenard@mozilla.com> - Tue, 21 Apr 2020 03:02:39 +0000 - rev 588535
Push 13072 by ffxbld-merge at Mon, 04 May 2020 14:22:08 +0000
Bug 1630802 - P7. Remove CreateEventTargetWrapper and ensure that only a single AbstractThread exists par nsIThread. r=bholley Differential Revision: https://phabricator.services.mozilla.com/D71492
8d9486cd19e8d9c289c80ce9bb4357974576d7d4: Bug 1630802 - P6. Always return AbstractThread::MainThread for AbstractMainThreadFor. r=bholley
Jean-Yves Avenard <jyavenard@mozilla.com> - Mon, 20 Apr 2020 19:18:34 +0000 - rev 588534
Push 13072 by ffxbld-merge at Mon, 04 May 2020 14:22:08 +0000
Bug 1630802 - P6. Always return AbstractThread::MainThread for AbstractMainThreadFor. r=bholley This mechanism is currently unused (see bug 1624819), we can re-assess the issue once it becomes needed. Differential Revision: https://phabricator.services.mozilla.com/D71491
b94e2c408ecc4666fd57bda45aa2307d3f066fd6: Bug 1630802 - P4. Remove unused member. r=bholley
Jean-Yves Avenard <jyavenard@mozilla.com> - Tue, 21 Apr 2020 03:08:55 +0000 - rev 588532
Push 13072 by ffxbld-merge at Mon, 04 May 2020 14:22:08 +0000
Bug 1630802 - P4. Remove unused member. r=bholley It lead the AbstractThread's assumption that there can only be one active per thread be invalid. Differential Revision: https://phabricator.services.mozilla.com/D71441
9ecfeb1915cdcb4a54c5bfd813628a035dbd4c47: Bug 1630802 - P3. Make AbstractThread::GetCurrent() return MainThread on the main thread. r=bholley
Jean-Yves Avenard <jyavenard@mozilla.com> - Mon, 20 Apr 2020 02:07:10 +0000 - rev 588531
Push 13072 by ffxbld-merge at Mon, 04 May 2020 14:22:08 +0000
Bug 1630802 - P3. Make AbstractThread::GetCurrent() return MainThread on the main thread. r=bholley prior bug 1364821, AbstractThread::GetCurrent() would always return AbstractThread::MainThread() when called from the main thread. After this change, we had to run within an AutoEnter scope. A hidden side effect of this change was that under most cases AbstractThread::MainThread::Dispatch() would no longer use the tail dispatcher to dispatch a task. It can be safely assume that whenever you're on the main thread, the equivalent AbstractThread is usable. In the next commit, we will be removing AutoEnter entirely. Differential Revision: https://phabricator.services.mozilla.com/D71148
f7b5e8af625b395d8f70141e9462cead2d9f9576: Bug 1627994 - Fix 'expection' typos. r=bholley
Andrew McCreight <continuation@gmail.com> - Tue, 07 Apr 2020 17:00:54 +0000 - rev 586221
Push 13072 by ffxbld-merge at Mon, 04 May 2020 14:22:08 +0000
Bug 1627994 - Fix 'expection' typos. r=bholley Differential Revision: https://phabricator.services.mozilla.com/D70035
f4981f4405d978e04676ce53028c15451558d20e: Bug 1188538: Ensure every protocol handler sets a valid security flag. r=bholley,mixedpuppy
Christoph Kerschbaumer <ckerschb@christophkerschbaumer.com> - Fri, 20 Mar 2020 08:25:18 +0000 - rev 583032
Push 12945 by ffxbld-merge at Mon, 06 Apr 2020 13:49:11 +0000
Bug 1188538: Ensure every protocol handler sets a valid security flag. r=bholley,mixedpuppy Differential Revision: https://phabricator.services.mozilla.com/D67496
8e197e2c37390f81ced8c150c7781fe7f0d05fb1: Bug 1373042. Remove the FileList special-case in ExportHelpers. r=bholley
Boris Zbarsky <bzbarsky@mit.edu> - Thu, 12 Mar 2020 16:12:45 +0000 - rev 581670
Push 12945 by ffxbld-merge at Mon, 06 Apr 2020 13:49:11 +0000
Bug 1373042. Remove the FileList special-case in ExportHelpers. r=bholley Differential Revision: https://phabricator.services.mozilla.com/D66596
f6f02d0b050dba135ac1bf16b3b5d2ad0b89842a: Bug 1448992. Get rid of nsXPCComponentsBase. r=bholley
Boris Zbarsky <bzbarsky@mit.edu> - Fri, 06 Mar 2020 17:40:57 +0000 - rev 580232
Push 12808 by ffxbld-merge at Mon, 09 Mar 2020 15:29:44 +0000
Bug 1448992. Get rid of nsXPCComponentsBase. r=bholley Differential Revision: https://phabricator.services.mozilla.com/D65737
5cc15a99429bccfbf852df2e234f7e35cbf7bbdd: Bug 1417655: Mark private operator= delete for NullPrincipalURI since there is a private copy constr.r=bholley
Christoph Kerschbaumer <ckerschb@christophkerschbaumer.com> - Thu, 05 Mar 2020 16:42:57 +0000 - rev 580039
Push 12808 by ffxbld-merge at Mon, 09 Mar 2020 15:29:44 +0000
Bug 1417655: Mark private operator= delete for NullPrincipalURI since there is a private copy constr.r=bholley Differential Revision: https://phabricator.services.mozilla.com/D65371
e681c2a6d14686c358fad4602943793f9242b78f: Bug 911444 part 4. Expose a print method on PDF viewer windows. r=bholley
Boris Zbarsky <bzbarsky@mit.edu> - Thu, 27 Feb 2020 14:54:53 +0000 - rev 578869
Push 12808 by ffxbld-merge at Mon, 09 Mar 2020 15:29:44 +0000
Bug 911444 part 4. Expose a print method on PDF viewer windows. r=bholley The method is exposed only if the consumer has the same principal as the PDF would have if it were not getting the PDF viewer treatment. The method just calls the print() method in the PDF viewer window. It's enough to expose this on nsOuterWindowProxy, not RemoteOuterWindowProxy, because PDF documents end up in the process they would have been in based on their pre-PDF-viewer principal, since we do process determination in the parent process but only run the pdfjs stream converter in the content process, once we have decided which one to use. Differential Revision: https://phabricator.services.mozilla.com/D63711
c0e52b90c5225bd962be44cff0f5b5a3f10d26fe: Bug 911444 part 3. Store the principal a PDF viewer document would have had if the PDF viewer had not messed with the principal. r=bdahl,bholley
Boris Zbarsky <bzbarsky@mit.edu> - Thu, 27 Feb 2020 14:54:53 +0000 - rev 578868
Push 12808 by ffxbld-merge at Mon, 09 Mar 2020 15:29:44 +0000
Bug 911444 part 3. Store the principal a PDF viewer document would have had if the PDF viewer had not messed with the principal. r=bdahl,bholley Differential Revision: https://phabricator.services.mozilla.com/D63709
c27d113d6f617e62679d88609abeb84eec431f4f: Bug 911444 part 1. Factor out the "is pdf viewer" code so we can reuse it. r=bholley
Boris Zbarsky <bzbarsky@mit.edu> - Thu, 27 Feb 2020 14:54:53 +0000 - rev 578866
Push 12808 by ffxbld-merge at Mon, 09 Mar 2020 15:29:44 +0000
Bug 911444 part 1. Factor out the "is pdf viewer" code so we can reuse it. r=bholley Differential Revision: https://phabricator.services.mozilla.com/D63707
d156bbaabbd5cb440fdea7721faa0fb954eb7739: Bug 911444 part 4. Expose a print method on PDF viewer windows. r=bholley
Boris Zbarsky <bzbarsky@mit.edu> - Sat, 22 Feb 2020 05:25:35 +0000 - rev 578302
Push 12808 by ffxbld-merge at Mon, 09 Mar 2020 15:29:44 +0000
Bug 911444 part 4. Expose a print method on PDF viewer windows. r=bholley The method is exposed only if the consumer has the same principal as the PDF would have if it were not getting the PDF viewer treatment. The method just calls the print() method in the PDF viewer window. It's enough to expose this on nsOuterWindowProxy, not RemoteOuterWindowProxy, because PDF documents end up in the process they would have been in based on their pre-PDF-viewer principal, since we do process determination in the parent process but only run the pdfjs stream converter in the content process, once we have decided which one to use. Differential Revision: https://phabricator.services.mozilla.com/D63711
a32592af0b113106a6637558bcabe735bcb7dd48: Bug 911444 part 3. Store the principal a PDF viewer document would have had if the PDF viewer had not messed with the principal. r=bdahl,bholley
Boris Zbarsky <bzbarsky@mit.edu> - Mon, 24 Feb 2020 21:05:04 +0000 - rev 578301
Push 12808 by ffxbld-merge at Mon, 09 Mar 2020 15:29:44 +0000
Bug 911444 part 3. Store the principal a PDF viewer document would have had if the PDF viewer had not messed with the principal. r=bdahl,bholley Differential Revision: https://phabricator.services.mozilla.com/D63709
fd2e3e8728d91b8a5002defa2b04a3c2e8be9e2a: Bug 911444 part 1. Factor out the "is pdf viewer" code so we can reuse it. r=bholley
Boris Zbarsky <bzbarsky@mit.edu> - Fri, 21 Feb 2020 22:19:53 +0000 - rev 578299
Push 12808 by ffxbld-merge at Mon, 09 Mar 2020 15:29:44 +0000
Bug 911444 part 1. Factor out the "is pdf viewer" code so we can reuse it. r=bholley Differential Revision: https://phabricator.services.mozilla.com/D63707
039e8fd2928d8d368ad892fb065bb2471e13d86e: Bug 267645 part 2. Sanitize exceptions from exported functions. r=xeonchen,bholley
Boris Zbarsky <bzbarsky@mit.edu> - Sat, 22 Feb 2020 05:01:59 +0000 - rev 578057
Push 12808 by ffxbld-merge at Mon, 09 Mar 2020 15:29:44 +0000
Bug 267645 part 2. Sanitize exceptions from exported functions. r=xeonchen,bholley Differential Revision: https://phabricator.services.mozilla.com/D35996
942a92874526e7a18167af89e358d69cbaeab268: Bug 267645 part 1. Add a way to ask for DOMException to be exposed in sandboxes. r=bholley
Boris Zbarsky <bzbarsky@mit.edu> - Sat, 22 Feb 2020 04:56:52 +0000 - rev 578056
Push 12808 by ffxbld-merge at Mon, 09 Mar 2020 15:29:44 +0000
Bug 267645 part 1. Add a way to ask for DOMException to be exposed in sandboxes. r=bholley Differential Revision: https://phabricator.services.mozilla.com/D63278
b0149bf227890bb0fe04b1d0b9fcb54d872358de: Bug 1333140 - Require SecureContext for WebCrypto r=bholley,keeler,baku
J.C. Jones <jjones@mozilla.com> - Tue, 11 Feb 2020 09:25:09 +0000 - rev 576315
Push 12808 by ffxbld-merge at Mon, 09 Mar 2020 15:29:44 +0000
Bug 1333140 - Require SecureContext for WebCrypto r=bholley,keeler,baku Adds [SecureContext] for crypto.subtle, CryptoKey, and SubtleCrypto, retiring the WebCrypto WPT overrides for WebCryptoAPI/historical.any.js. Rebased on https://phabricator.services.mozilla.com/D58743 Differential Revision: https://phabricator.services.mozilla.com/D58555
6d51893bde02885bac3dd53114b7d26455541076: Bug 1273687 - Add isSecureContext to xpconnect sandboxes r=bholley
Jonathan Kingston <jkt@mozilla.com> - Fri, 07 Feb 2020 16:16:13 +0000 - rev 575419
Push 12662 by ffxbld-merge at Mon, 10 Feb 2020 10:43:10 +0000
Bug 1273687 - Add isSecureContext to xpconnect sandboxes r=bholley Differential Revision: https://phabricator.services.mozilla.com/D58743
7fbae42f209dc12e287f479de03ea1a7f13fb5c8: Bug 1607702 - Extract nsuri displaynames to nsNameSpaceManager r=bholley
Christoph Walcher <christoph-wa@gmx.de> - Fri, 10 Jan 2020 18:45:12 +0000 - rev 572295
Push 12662 by ffxbld-merge at Mon, 10 Feb 2020 10:43:10 +0000
Bug 1607702 - Extract nsuri displaynames to nsNameSpaceManager r=bholley Differential Revision: https://phabricator.services.mozilla.com/D59274
d476185742e635cb23150ae1f769eb1d6fc9a196: Bug 1596476 - Remove nsuri_xbl static atom r=bholley
Christoph Walcher <christoph-wa@gmx.de> - Wed, 08 Jan 2020 04:44:33 +0000 - rev 571802
Push 12662 by ffxbld-merge at Mon, 10 Feb 2020 10:43:10 +0000
Bug 1596476 - Remove nsuri_xbl static atom r=bholley Differential Revision: https://phabricator.services.mozilla.com/D53333
fca21807338b1ad6e77f05499aa19d037a987e37: Bug 1603055 - Handle BigInt values in XPCVariant code. r=bholley a=lizzard
Jan de Mooij <jdemooij@mozilla.com> - Wed, 11 Dec 2019 15:27:28 +0200 - rev 566967
Push 12489 by apavel@mozilla.com at Mon, 30 Dec 2019 00:49:39 +0000
Bug 1603055 - Handle BigInt values in XPCVariant code. r=bholley a=lizzard Ideally this code would use JS::ValueType with a switch-statement and rely on compiler exhaustiveness checking, but this is the safer patch. Differential Revision: https://phabricator.services.mozilla.com//D56727
56ac0284574922f408585caa1b45162421d04c5b: Bug 1595890 part 4. Remove XPCWrappedNativeScope::EnsureContentXBLScope. r=bholley
Boris Zbarsky <bzbarsky@mit.edu> - Thu, 14 Nov 2019 05:20:41 +0000 - rev 563734
Push 12351 by ffxbld-merge at Mon, 02 Dec 2019 11:32:26 +0000
Bug 1595890 part 4. Remove XPCWrappedNativeScope::EnsureContentXBLScope. r=bholley It's dead code. Differential Revision: https://phabricator.services.mozilla.com/D52747
810924c606882d4c235729bed6690e713f5bca9e: Bug 1595890 part 3. Remove xpc::IsContentXBLCompartment and its various callsites. r=bholley
Boris Zbarsky <bzbarsky@mit.edu> - Thu, 14 Nov 2019 05:20:18 +0000 - rev 563733
Push 12351 by ffxbld-merge at Mon, 02 Dec 2019 11:32:26 +0000
Bug 1595890 part 3. Remove xpc::IsContentXBLCompartment and its various callsites. r=bholley It always returns false. Differential Revision: https://phabricator.services.mozilla.com/D52746
abee66548e14e53e74efc32050bfea474edce916: Bug 1595890 part 2. Remove isContentXBLCompartment from CompartmentPrivate. r=bholley
Boris Zbarsky <bzbarsky@mit.edu> - Thu, 14 Nov 2019 05:18:54 +0000 - rev 563732
Push 12351 by ffxbld-merge at Mon, 02 Dec 2019 11:32:26 +0000
Bug 1595890 part 2. Remove isContentXBLCompartment from CompartmentPrivate. r=bholley It's always false. Differential Revision: https://phabricator.services.mozilla.com/D52743
cd89e23dd64d2c4e3bd846bdf5437167163abc7d: Bug 1595890 part 1. Remove isContentXBLScope from SandboxOptions. r=bholley
Boris Zbarsky <bzbarsky@mit.edu> - Thu, 14 Nov 2019 05:17:28 +0000 - rev 563731
Push 12351 by ffxbld-merge at Mon, 02 Dec 2019 11:32:26 +0000
Bug 1595890 part 1. Remove isContentXBLScope from SandboxOptions. r=bholley It's always false. Differential Revision: https://phabricator.services.mozilla.com/D52742