searching for reviewer(tanvi)
676326412547db43792eab78f60af55c810630ca: Bug 1581625 - Move fingerprinting blocking out of the Standard mode of content blocking; r=tanvi
Ehsan Akhgari <ehsan@mozilla.com> - Mon, 16 Sep 2019 19:55:09 +0000 - rev 554767
Push 12169 by ffxbld-merge at Mon, 14 Oct 2019 16:59:29 +0000
Bug 1581625 - Move fingerprinting blocking out of the Standard mode of content blocking; r=tanvi Differential Revision: https://phabricator.services.mozilla.com/D46062
a4c96ce0ff04709a8ef75c7e6921cc3100eaf75c: Bug 1581625 - Move fingerprinting blocking out of the Standard mode of content blocking; r=tanvi a=RyanVM
Ehsan Akhgari <ehsan@mozilla.com> - Mon, 16 Sep 2019 19:55:09 +0000 - rev 551899
Push 11991 by opoprus@mozilla.com at Thu, 19 Sep 2019 09:33:16 +0000
Bug 1581625 - Move fingerprinting blocking out of the Standard mode of content blocking; r=tanvi a=RyanVM Differential Revision: https://phabricator.services.mozilla.com/D46062
409bdbc32737a6404d60ae851a4fcfd98036b649: Bug 1546906 - use strict fingerprint category for telemetry; r=dragana,tanvi
Liang-Heng Chen <xeonchen@gmail.com> - Fri, 03 May 2019 10:05:30 +0000 - rev 531326
Push 11265 by ffxbld-merge at Mon, 13 May 2019 10:53:39 +0000
Bug 1546906 - use strict fingerprint category for telemetry; r=dragana,tanvi Differential Revision: https://phabricator.services.mozilla.com/D28801
7744f59e373546bd9545f14c0d945a5206b96efc: Bug 1543916 - Enable fingerprinting and cryptomining annotation everywhere, r=tanvi
Andrea Marchesini <amarchesini@mozilla.com> - Tue, 23 Apr 2019 19:41:50 +0000 - rev 529389
Push 11265 by ffxbld-merge at Mon, 13 May 2019 10:53:39 +0000
Bug 1543916 - Enable fingerprinting and cryptomining annotation everywhere, r=tanvi Differential Revision: https://phabricator.services.mozilla.com/D27237
724652219657e0f96797a43274feb9e575b4fb37: Bug 1514853 - network.cookie.cookieBehavior default to 0 in release, r=tanvi
Ehsan Akhgari <ehsan@mozilla.com> - Mon, 24 Dec 2018 10:24:29 -0500 - rev 508983
Push 10547 by ffxbld-merge at Mon, 21 Jan 2019 13:03:58 +0000
Bug 1514853 - network.cookie.cookieBehavior default to 0 in release, r=tanvi
12f70c0d3d1ebab2bf15967201303deb5fa91869: Bug 1514853 - network.cookie.cookieBehavior default to 0 in release, r=tanvi
Andrea Marchesini <amarchesini@mozilla.com> - Thu, 20 Dec 2018 14:32:48 +0100 - rev 508658
Push 10547 by ffxbld-merge at Mon, 21 Jan 2019 13:03:58 +0000
Bug 1514853 - network.cookie.cookieBehavior default to 0 in release, r=tanvi
17b0cf07401cc1fa9179d640e7d3142feba554aa: Bug 1514853 - network.cookie.cookieBehavior default to 0 in release, r=tanvi a=RyanVM
Ehsan Akhgari <ehsan@mozilla.com> - Mon, 24 Dec 2018 10:24:29 -0500 - rev 506382
Push 10390 by eakhgari@mozilla.com at Mon, 24 Dec 2018 16:27:55 +0000
Bug 1514853 - network.cookie.cookieBehavior default to 0 in release, r=tanvi a=RyanVM
7af67b7f5f7959417bce93aeb0ab963c874dcd02: Bug 1514853 - network.cookie.cookieBehavior default to 0 in release. r=tanvi, a=RyanVM
Andrea Marchesini <amarchesini@mozilla.com> - Thu, 20 Dec 2018 14:32:48 +0100 - rev 506358
Push 10382 by ryanvm@gmail.com at Fri, 21 Dec 2018 19:48:15 +0000
Bug 1514853 - network.cookie.cookieBehavior default to 0 in release. r=tanvi, a=RyanVM
e0d9fa7008148d25f9c880d9f0f85a0992d0d540: Bug 1457929 Enable ontainer-based segregation of newtab thumbnails on all channels r=tanvi
Tom Ritter <tom@mozilla.com> - Fri, 18 May 2018 09:18:26 -0500 - rev 475063
Push 9374 by jlund@mozilla.com at Mon, 18 Jun 2018 21:43:20 +0000
Bug 1457929 Enable ontainer-based segregation of newtab thumbnails on all channels r=tanvi MozReview-Commit-ID: IpNBIWu2fXh
119d817c5c5063391cf549e56e5f792e52220c97: Bug 1457929 - Enable container-based segregation of newtab thumbnails on all channels. r=tanvi, a=RyanVM
Tom Ritter <tom@mozilla.com> - Fri, 18 May 2018 09:18:26 -0500 - rev 471129
Push 9307 by ryanvm@gmail.com at Sun, 03 Jun 2018 00:24:54 +0000
Bug 1457929 - Enable container-based segregation of newtab thumbnails on all channels. r=tanvi, a=RyanVM MozReview-Commit-ID: IpNBIWu2fXh
1ba25bdb87550c98e011c0af9d0933429b758961: Bug 1190623 - Add a pref to consider object sub requests as active. r=tanvi, r=ckerschb
Jonathan Kingston <jkt@mozilla.com> - Sat, 11 Nov 2017 01:15:06 +0000 - rev 445905
Push 8527 by Callek@gmail.com at Thu, 11 Jan 2018 21:05:50 +0000
Bug 1190623 - Add a pref to consider object sub requests as active. r=tanvi, r=ckerschb MozReview-Commit-ID: Br2F89IfWng
6b4cebf12e3fd1d1603f03b84a6cfdeb200204fc: Bug 1398229 - Save-link-as feature should use the loading principal - part 3 - implementation of nsIContentPolicy.TYPE_SAVE_AS_DOWNLOAD, r=ckerschb, r=tanvi
Andrea Marchesini <amarchesini@mozilla.com> - Thu, 16 Nov 2017 12:27:01 +0100 - rev 444009
Push 8527 by Callek@gmail.com at Thu, 11 Jan 2018 21:05:50 +0000
Bug 1398229 - Save-link-as feature should use the loading principal - part 3 - implementation of nsIContentPolicy.TYPE_SAVE_AS_DOWNLOAD, r=ckerschb, r=tanvi
fcefba24074f60e2d3296996e20a8dd8bc6bebe0: Bug 1402363: Test Mixed Content Redirect Blocking. r=tanvi,kate
Christoph Kerschbaumer <ckerschb@christophkerschbaumer.com> - Mon, 02 Oct 2017 09:12:12 +0200 - rev 434740
Push 8114 by jlorenzo@mozilla.com at Thu, 02 Nov 2017 16:33:21 +0000
Bug 1402363: Test Mixed Content Redirect Blocking. r=tanvi,kate
37d18f6628dcecba2f3f59a3d853071b7ca799e0: Bug 1402363 - Test Mixed Content Redirect Blocking. r=tanvi, r=kate, a=ritu DEVEDITION_57_0b5_RELEASE FIREFOX_57_0b5_BUILD1 FIREFOX_57_0b5_RELEASE
Christoph Kerschbaumer <ckerschb@christophkerschbaumer.com> - Mon, 02 Oct 2017 09:12:12 +0200 - rev 432102
Push 7876 by ryanvm@gmail.com at Mon, 02 Oct 2017 18:15:26 +0000
Bug 1402363 - Test Mixed Content Redirect Blocking. r=tanvi, r=kate, a=ritu
39a912717bb61b9ec0b0f3536b9d66b809ba185d: Bug 1337622 - Temporarily fall back to SystemPrincipal if History entry does not have a valid triggeringPrincipal. r=tanvi,bz
Christoph Kerschbaumer <ckerschb@christophkerschbaumer.com> - Wed, 08 Feb 2017 10:30:47 +0800 - rev 388257
Push 7198 by jlorenzo@mozilla.com at Tue, 18 Apr 2017 12:07:49 +0000
Bug 1337622 - Temporarily fall back to SystemPrincipal if History entry does not have a valid triggeringPrincipal. r=tanvi,bz
6e2ea518c2b25ae4190d6304c20e423e39d93e46: Bug 1337622 - Temporarily fall back to SystemPrincipal if History entry does not have a valid triggeringPrincipal. r=tanvi,bz a=gchang
Christoph Kerschbaumer <ckerschb@christophkerschbaumer.com> - Wed, 08 Feb 2017 10:30:47 +0800 - rev 376085
Push 6996 by jlorenzo@mozilla.com at Mon, 06 Mar 2017 20:48:21 +0000
Bug 1337622 - Temporarily fall back to SystemPrincipal if History entry does not have a valid triggeringPrincipal. r=tanvi,bz a=gchang
80d47de5e1bf04fd59ba08df1e438ee4640e04d1: Bug 1332901 - Land revised strings for the insecure login field contextual warning in 53. r=tanvi
Matthew Noorenberghe <mozilla@noorenberghe.ca> - Sun, 22 Jan 2017 02:21:10 -0800 - rev 375569
Push 6996 by jlorenzo@mozilla.com at Mon, 06 Mar 2017 20:48:21 +0000
Bug 1332901 - Land revised strings for the insecure login field contextual warning in 53. r=tanvi MozReview-Commit-ID: ArhoxqejnGS
21a56b3ad9e4d68182d705b8c985c64a2e315c3a: Bug 1270338 - Add a mochitest to ensure Sanitizer clears data for all containers. r=baku,tanvi
Jonathan Hao <jhao@mozilla.com> - Tue, 27 Dec 2016 15:05:16 +0800 - rev 373222
Push 6996 by jlorenzo@mozilla.com at Mon, 06 Mar 2017 20:48:21 +0000
Bug 1270338 - Add a mochitest to ensure Sanitizer clears data for all containers. r=baku,tanvi
330262e55c87b92a13d49cfafc0869e67d927127: Bug 1282655 - Test if site permissions are universal across origin attributes. r=tanvi
Jonathan Hao <jhao@mozilla.com> - Mon, 26 Dec 2016 22:38:00 -0500 - rev 372439
Push 6996 by jlorenzo@mozilla.com at Mon, 06 Mar 2017 20:48:21 +0000
Bug 1282655 - Test if site permissions are universal across origin attributes. r=tanvi
c2c07c7606bcdd7eec12c79c4d78949b5919c247: Bug 1318911. When creating an about:blank content viewer during a history navigation to a javascript: URI, use the right principal. r=tanvi
Boris Zbarsky <bzbarsky@mit.edu> - Tue, 06 Dec 2016 07:41:42 -1000 - rev 370271
Push 6996 by jlorenzo@mozilla.com at Mon, 06 Mar 2017 20:48:21 +0000
Bug 1318911. When creating an about:blank content viewer during a history navigation to a javascript: URI, use the right principal. r=tanvi
9a2e6dec94683a27a35908494abd6dbe1188cb8f: Bug 1318911. When creating an about:blank content viewer during a history navigation to a javascript: URI, use the right principal. r=tanvi a=lizzard
Boris Zbarsky <bzbarsky@mit.edu> - Tue, 06 Dec 2016 07:41:42 -1000 - rev 366025
Push 6795 by jlund@mozilla.com at Mon, 23 Jan 2017 14:19:46 +0000
Bug 1318911. When creating an about:blank content viewer during a history navigation to a javascript: URI, use the right principal. r=tanvi a=lizzard
81835ba272e0bf66123d56249100d052aacdb48b: Bug 1307720 - Assert that docshell loads of TYPE_SUDOCUMENT always get a valid principal. r=tanvi
Christoph Kerschbaumer <ckerschb@christophkerschbaumer.com> - Wed, 05 Oct 2016 14:24:38 +0200 - rev 359636
Push 6795 by jlund@mozilla.com at Mon, 23 Jan 2017 14:19:46 +0000
Bug 1307720 - Assert that docshell loads of TYPE_SUDOCUMENT always get a valid principal. r=tanvi
b001b0ed40e187bdc36132421e0c37f77ce84060: Bug 1305996 - Tweak Documentation for nsILoadInfo. r=tanvi
Christoph Kerschbaumer <ckerschb@christophkerschbaumer.com> - Tue, 04 Oct 2016 10:07:08 +0200 - rev 359280
Push 6795 by jlund@mozilla.com at Mon, 23 Jan 2017 14:19:46 +0000
Bug 1305996 - Tweak Documentation for nsILoadInfo. r=tanvi
008c6f3dc23937d9c5883a088b2ba5afe249c908: Bug 1291458 - Update documentation for nsILoadInfo. r=tanvi
Christoph Kerschbaumer <ckerschb@christophkerschbaumer.com> - Tue, 20 Sep 2016 08:34:40 +0200 - rev 357433
Push 6795 by jlund@mozilla.com at Mon, 23 Jan 2017 14:19:46 +0000
Bug 1291458 - Update documentation for nsILoadInfo. r=tanvi
82e3f2a1196a227ce83ae8e0d53d5c2b273205a5: Bug 1277524 - Add moz-extension to the list of potentially trustworthy origins. r=tanvi
Johann Hofmann <jhofmann@mozilla.com> - Thu, 02 Jun 2016 17:14:27 +0200 - rev 346675
Push 6389 by raliiev@mozilla.com at Mon, 19 Sep 2016 13:38:22 +0000
Bug 1277524 - Add moz-extension to the list of potentially trustworthy origins. r=tanvi MozReview-Commit-ID: BvR7Xb0AE9N
90f9475f974640c8ccbadfaef6ab442752d869f5: Bug 1273430 - Test CSP upgrade-insecure-requests for doc.write(iframe). r=tanvi
Christoph Kerschbaumer <ckerschb@christophkerschbaumer.com> - Wed, 20 Jul 2016 09:26:16 +0200 - rev 345842
Push 6389 by raliiev@mozilla.com at Mon, 19 Sep 2016 13:38:22 +0000
Bug 1273430 - Test CSP upgrade-insecure-requests for doc.write(iframe). r=tanvi
d13afbb70d7b600ccf688ac62e9c2871c7e87850: Bug 1253771 - Add previous state info to mixed content callback. r=tanvi r=florian
Johann Hofmann <jhofmann@mozilla.com> - Wed, 27 Apr 2016 10:38:26 +0200 - rev 344558
Push 6389 by raliiev@mozilla.com at Mon, 19 Sep 2016 13:38:22 +0000
Bug 1253771 - Add previous state info to mixed content callback. r=tanvi r=florian MozReview-Commit-ID: 5msNz97psok
d7cddb7c5b31e438afaec434faa9fecab5f526a3: Bug 1284202 - Add deprecation warning for SEC_NORMAL. r=tanvi
Christoph Kerschbaumer <ckerschb@christophkerschbaumer.com> - Mon, 04 Jul 2016 10:20:05 +0200 - rev 344235
Push 6389 by raliiev@mozilla.com at Mon, 19 Sep 2016 13:38:22 +0000
Bug 1284202 - Add deprecation warning for SEC_NORMAL. r=tanvi
3883d00c447ee8a27f56f8cd4e8bb2e6c167004f: Bug 1240193 - Skip TYPE_DOCUMENT assertions for loads initiated by JS tests (r=tanvi)
Christoph Kerschbaumer <ckerschb@christophkerschbaumer.com> - Wed, 29 Jun 2016 12:59:45 +0200 - rev 343187
Push 6389 by raliiev@mozilla.com at Mon, 19 Sep 2016 13:38:22 +0000
Bug 1240193 - Skip TYPE_DOCUMENT assertions for loads initiated by JS tests (r=tanvi)
6b0802bc324cd7d7924a6fa9ecbf1ba00883a61b: Bug 1119989 - Assert that mPrincipal and doc's Principal are same origin in WebSocket.cpp. r=tanvi
Christoph Kerschbaumer <ckerschb@christophkerschbaumer.com> - Tue, 21 Jun 2016 13:31:56 +0200 - rev 343181
Push 6389 by raliiev@mozilla.com at Mon, 19 Sep 2016 13:38:22 +0000
Bug 1119989 - Assert that mPrincipal and doc's Principal are same origin in WebSocket.cpp. r=tanvi
7c8f205224d861b25d963c0cc7340b6d73939281: Bug 1148732 - (CVE-2015-4483) feed: protocol + POST method => mixed scripting. r=tanvi
Dimi Lee <dlee@mozilla.com> - Mon, 23 May 2016 12:11:02 +0800 - rev 341918
Push 6389 by raliiev@mozilla.com at Mon, 19 Sep 2016 13:38:22 +0000
Bug 1148732 - (CVE-2015-4483) feed: protocol + POST method => mixed scripting. r=tanvi
e94cc9fec841d5f0d4edc7ef3fccdfa642594d75: Bug 1280006 - Backout "Bug 1270680 - Part 1: Double-key the image cache by origin attribute." r=tanvi
Jonathan Hao <jhao@mozilla.com> - Tue, 14 Jun 2016 12:43:21 +0100 - rev 341784
Push 6389 by raliiev@mozilla.com at Mon, 19 Sep 2016 13:38:22 +0000
Bug 1280006 - Backout "Bug 1270680 - Part 1: Double-key the image cache by origin attribute." r=tanvi This reverts commit bb0482fe09fbfad9be89384ec5cb8b6518187379.
bb5956cb6cec650799844edc85c53d9f1bce658a: Bug 1280006 - Backout "Bug 1270680 - Part 2: Tests that make sure image cache respect originAttributes." r=tanvi
Jonathan Hao <jhao@mozilla.com> - Tue, 14 Jun 2016 12:43:17 +0100 - rev 341783
Push 6389 by raliiev@mozilla.com at Mon, 19 Sep 2016 13:38:22 +0000
Bug 1280006 - Backout "Bug 1270680 - Part 2: Tests that make sure image cache respect originAttributes." r=tanvi This reverts commit c3ca86b9a6a787a8d81331453f5ff064de096038.
69f96df556e6ec71e447326438ad57ef56598865: Bug 1280006 - Backout "Bug 1270680 - Part 3 - Get origin attributes from loadInfo in LoadImageWithChannel()." r=tanvi
Jonathan Hao <jhao@mozilla.com> - Tue, 14 Jun 2016 12:43:14 +0100 - rev 341782
Push 6389 by raliiev@mozilla.com at Mon, 19 Sep 2016 13:38:22 +0000
Bug 1280006 - Backout "Bug 1270680 - Part 3 - Get origin attributes from loadInfo in LoadImageWithChannel()." r=tanvi This reverts commit 8ef7edb6a790df9128558e6eb520701f4fc600a0.
518708a725d51167927dc6f502115c031952a3bb: Bug 1270680 - Part 3 - Get origin attributes from loadInfo in LoadImageWithChannel(). r=tanvi
Jonathan Hao <jhao@mozilla.com> - Thu, 02 Jun 2016 20:50:00 +0200 - rev 340834
Push 6389 by raliiev@mozilla.com at Mon, 19 Sep 2016 13:38:22 +0000
Bug 1270680 - Part 3 - Get origin attributes from loadInfo in LoadImageWithChannel(). r=tanvi
eb3278ed4eb3e3924c556ef92ef4763008a537f3: Bug 1230462 - Change the authentiation dialog message. r=mayhemer,dolske,margaret,tanvi
Dragana Damjanovic <dd.mozilla@gmail.com> - Mon, 06 Jun 2016 01:06:00 +0200 - rev 340696
Push 6389 by raliiev@mozilla.com at Mon, 19 Sep 2016 13:38:22 +0000
Bug 1230462 - Change the authentiation dialog message. r=mayhemer,dolske,margaret,tanvi
490d3460a197ab1d468250b5ca661741868a4337: Bug 1230462 - Change the authentiation dialog message. r=mayhemer,dolske,margaret,tanvi
Dragana Damjanovic <dd.mozilla@gmail.com> - Fri, 03 Jun 2016 09:09:00 +0200 - rev 339545
Push 6249 by jlund@mozilla.com at Mon, 01 Aug 2016 13:59:36 +0000
Bug 1230462 - Change the authentiation dialog message. r=mayhemer,dolske,margaret,tanvi
88c344a56eac7c61656af0c56294ebd73317a3af: Bug 1254688 - Use mLoadInfo to get the performance object. r=bz, r=tanvi
Valentin Gosu <valentin.gosu@gmail.com> - Mon, 09 May 2016 20:42:22 +0200 - rev 338605
Push 6249 by jlund@mozilla.com at Mon, 01 Aug 2016 13:59:36 +0000
Bug 1254688 - Use mLoadInfo to get the performance object. r=bz, r=tanvi MozReview-Commit-ID: KMbwR7J8FLm
25805491cfe83f5750156a4447ae71456c2983d0: Bug 1273418 - CSP: Test evaluate upgrade-insecure-requests before block-all-mixed-content (r=tanvi)
Christoph Kerschbaumer <ckerschb@christophkerschbaumer.com> - Sat, 21 May 2016 19:36:02 +0200 - rev 337381
Push 6249 by jlund@mozilla.com at Mon, 01 Aug 2016 13:59:36 +0000
Bug 1273418 - CSP: Test evaluate upgrade-insecure-requests before block-all-mixed-content (r=tanvi)
bd62602ddbf6b84c7e80c415fd34ad4456274548: Bug 1273418 - CSP: Evaluate upgrade-insecure-requests before block-all-mixed-content (r=tanvi)
Christoph Kerschbaumer <ckerschb@christophkerschbaumer.com> - Sat, 21 May 2016 19:35:45 +0200 - rev 337380
Push 6249 by jlund@mozilla.com at Mon, 01 Aug 2016 13:59:36 +0000
Bug 1273418 - CSP: Evaluate upgrade-insecure-requests before block-all-mixed-content (r=tanvi)
3ee93ef1f7ed3852c517585e93b6680607533515: Bug 1237077 - Part 4: check referrer is empty. r=tanvi
Yoshi Huang <allstars.chh@mozilla.com> - Tue, 26 Apr 2016 16:33:10 +0800 - rev 334125
Push 6249 by jlund@mozilla.com at Mon, 01 Aug 2016 13:59:36 +0000
Bug 1237077 - Part 4: check referrer is empty. r=tanvi
804144abc693e090223679d429c131b1029b02f0: Bug 1237077 - Part 3: use createCodebasePrincipal. r=tanvi
Yoshi Huang <allstars.chh@mozilla.com> - Mon, 18 Apr 2016 11:43:48 +0800 - rev 334124
Push 6249 by jlund@mozilla.com at Mon, 01 Aug 2016 13:59:36 +0000
Bug 1237077 - Part 3: use createCodebasePrincipal. r=tanvi
5cbd332e6cfa9dd17d88fb1246dddb3fab702777: Bug 1237077 - Part 2: drag an URL into an existing tab. r=Gijs, tanvi
Yoshi Huang <allstars.chh@mozilla.com> - Thu, 21 Apr 2016 15:53:08 +0800 - rev 334123
Push 6249 by jlund@mozilla.com at Mon, 01 Aug 2016 13:59:36 +0000
Bug 1237077 - Part 2: drag an URL into an existing tab. r=Gijs, tanvi Drag an URL into an existing tab should inherit the existing tab's userContextId. See the table from https://bugzilla.mozilla.org/show_bug.cgi?id=1237077#c11
c569dc7fca7001e33e6d45839166db1a15d4e4da: Bug 1237077 - Part 1: drag an URL into new tab should inherit userContextId. r=Gijs, tanvi
Yoshi Huang <allstars.chh@mozilla.com> - Mon, 11 Apr 2016 10:16:13 +0800 - rev 334122
Push 6249 by jlund@mozilla.com at Mon, 01 Aug 2016 13:59:36 +0000
Bug 1237077 - Part 1: drag an URL into new tab should inherit userContextId. r=Gijs, tanvi
85854d2b443e6a7a846e29539ccd00f92e1b2027: Bug 1254688 - Use mLoadInfo to get the performance object. r=bz, r=tanvi, a=dveditz
Valentin Gosu <valentin.gosu@gmail.com> - Fri, 03 Jun 2016 13:32:05 +0200 - rev 333215
Push 6048 by kmoir@mozilla.com at Mon, 06 Jun 2016 19:02:08 +0000
Bug 1254688 - Use mLoadInfo to get the performance object. r=bz, r=tanvi, a=dveditz MozReview-Commit-ID: KMbwR7J8FLm
c89874eb124ba5673eb943779176370ec00aacf7: Bug 1273418 - CSP: Test evaluate upgrade-insecure-requests before block-all-mixed-content. r=tanvi
Christoph Kerschbaumer <ckerschb@christophkerschbaumer.com> - Sat, 21 May 2016 19:36:02 +0200 - rev 333181
Push 6048 by kmoir@mozilla.com at Mon, 06 Jun 2016 19:02:08 +0000
Bug 1273418 - CSP: Test evaluate upgrade-insecure-requests before block-all-mixed-content. r=tanvi
0f4311875cc5fbc7d6a8cf95c19641a7399258ae: Bug 1273418 - CSP: Evaluate upgrade-insecure-requests before block-all-mixed-content. r=tanvi, a=sylvestre
Christoph Kerschbaumer <ckerschb@christophkerschbaumer.com> - Sat, 21 May 2016 19:35:45 +0200 - rev 333180
Push 6048 by kmoir@mozilla.com at Mon, 06 Jun 2016 19:02:08 +0000
Bug 1273418 - CSP: Evaluate upgrade-insecure-requests before block-all-mixed-content. r=tanvi, a=sylvestre
c6b548af3126ba9e95aa9d2f840d14785e396a37: Bug 1093642 - Part 2: Decide if we allow mixed content before sending click event to remote tab. r=tanvi.
Henry Chang <hchang@mozilla.com> - Thu, 21 Apr 2016 11:07:40 +0800 - rev 332157
Push 6048 by kmoir@mozilla.com at Mon, 06 Jun 2016 19:02:08 +0000
Bug 1093642 - Part 2: Decide if we allow mixed content before sending click event to remote tab. r=tanvi.
220a41ef6ffa6801ad923650d182234a2d956588: Bug 1093642 - Part 1: Use parentAllowsMixedContent to decide if child tab should load mixed content. r=tanvi, r=MattN
Henry Chang <hchang@mozilla.com> - Thu, 21 Apr 2016 11:07:34 +0800 - rev 332156
Push 6048 by kmoir@mozilla.com at Mon, 06 Jun 2016 19:02:08 +0000
Bug 1093642 - Part 1: Use parentAllowsMixedContent to decide if child tab should load mixed content. r=tanvi, r=MattN This patch is to fix the "Right click and open in a new tab" case.
3f43e85a0cfd4281451cc0049fd1638885a1e670: Bug 1262009 - Treat all file connections (including chrome uris) as non secure connections;r=tanvi
Brian Grinstead <bgrinstead@mozilla.com> - Wed, 13 Apr 2016 10:42:37 -0700 - rev 330922
Push 6048 by kmoir@mozilla.com at Mon, 06 Jun 2016 19:02:08 +0000
Bug 1262009 - Treat all file connections (including chrome uris) as non secure connections;r=tanvi If a <browser> is included within a chrome document, then this._state will refer to the security state for the <browser> and not the top level document. In this case, don't upgrade the security state in the UI with the secure state of the embedded <browser>.