Bug 1496220 - 3. Disable Necko IPC security for test_saveHeapSnapshot_e10s_01; r=fitzgen
☠☠ backed out by 0bd0dc3c8183 ☠ ☠
authorJim Chen <nchen@mozilla.com>
Tue, 09 Oct 2018 16:30:46 +0000
changeset 496349 70505741627fe29e79facb7fab0e3297320f0421
parent 496348 daf7ced3bbccbbf3a17d2bdc3d65d97def353762
child 496350 300a08d9762e3efcfdedb292d540420ba9c9083f
push id9984
push userffxbld-merge
push dateMon, 15 Oct 2018 21:07:35 +0000
treeherdermozilla-beta@183d27ea8570 [default view] [failures only]
perfherder[talos] [build metrics] [platform microbench] (compared to previous push)
reviewersfitzgen
bugs1496220
milestone64.0a1
first release with
nightly linux32
nightly linux64
nightly mac
nightly win32
nightly win64
last release without
nightly linux32
nightly linux64
nightly mac
nightly win32
nightly win64
Bug 1496220 - 3. Disable Necko IPC security for test_saveHeapSnapshot_e10s_01; r=fitzgen The use of <iframe mozbrowser> in test_saveHeapSnapshot_e10s_01.html has implicitly depended on the "network.disable.ipc.security" pref set to false, which is the default for desktop and not applicable for Fennec. With the new mobile test harness, this pref needs to be set explicitly by the test. Differential Revision: https://phabricator.services.mozilla.com/D7786
devtools/shared/heapsnapshot/tests/mochitest/test_saveHeapSnapshot_e10s_01.html
--- a/devtools/shared/heapsnapshot/tests/mochitest/test_saveHeapSnapshot_e10s_01.html
+++ b/devtools/shared/heapsnapshot/tests/mochitest/test_saveHeapSnapshot_e10s_01.html
@@ -38,17 +38,18 @@ Bug 1201597 - Sanity test that we can ta
     // Kick everything off on load.
     window.onload = function() {
       info("window.onload fired");
       SpecialPowers.addPermission("browser", true, document);
       SpecialPowers.pushPrefEnv({
          "set": [
              ["dom.ipc.browser_frames.oop_by_default", true],
              ["dom.mozBrowserFramesEnabled", true],
-             ["browser.pagethumbnails.capturing_disabled", true]
+             ["browser.pagethumbnails.capturing_disabled", true],
+             ["network.disable.ipc.security", true],
          ]
       }, function() {
         const iframe = document.createElement("iframe");
         SpecialPowers.wrap(iframe).mozbrowser = true;
         iframe.id = "iframe";
         iframe.src = childFrameURL;
 
         iframe.addEventListener("mozbrowserloadend", function() {