searching for reviewer(francois)
7e0e03b9169e2c5046e8bd8b947edccf04fbdc1b: Bug 1501657 - Move early betas to use the strict list for the default cookie restrictions r=francois
Ehsan Akhgari <ehsan@mozilla.com> - Wed, 24 Oct 2018 18:52:04 +0000 - rev 491236
Push 247 by fmarier@mozilla.com at Sat, 27 Oct 2018 01:06:44 +0000
Bug 1501657 - Move early betas to use the strict list for the default cookie restrictions r=francois Differential Revision: https://phabricator.services.mozilla.com/D9657
f7fe04d00e18682a760b3fcb458c2be801e59184: Bug 1487559 - add new telemetry probe for the mime type causing suspension for back pressure r=francois,valentin
Junior Hsu <juhsu@mozilla.com> - Wed, 24 Oct 2018 16:26:19 +0000 - rev 491219
Push 247 by fmarier@mozilla.com at Sat, 27 Oct 2018 01:06:44 +0000
Bug 1487559 - add new telemetry probe for the mime type causing suspension for back pressure r=francois,valentin Differential Revision: https://phabricator.services.mozilla.com/D4729
3f5f46ca8ca0df1c34a9077fd4b479e291997a3f: Bug 1501461 - Use the strict list for default cookie restrictions in Nightly r=francois
Ehsan Akhgari <ehsan@mozilla.com> - Tue, 23 Oct 2018 23:02:18 +0000 - rev 491021
Push 247 by fmarier@mozilla.com at Sat, 27 Oct 2018 01:06:44 +0000
Bug 1501461 - Use the strict list for default cookie restrictions in Nightly r=francois Differential Revision: https://phabricator.services.mozilla.com/D9594
b872e2aa271c063a31219ee93455541198b99cbc: Bug 1190020 - P2. Testcase to ensure digest is not truncated. r=francois
Dimi Lee <dlee@mozilla.com> - Tue, 23 Oct 2018 20:03:44 +0000 - rev 491011
Push 247 by fmarier@mozilla.com at Sat, 27 Oct 2018 01:06:44 +0000
Bug 1190020 - P2. Testcase to ensure digest is not truncated. r=francois This test will trigger a remote lookup. Verify the protocol buffer sent by download protection service matches the hard-coded protocol buffer. This protcol buffer contains following information: 1. source URI 2. referrer URI 3. redirect UiRI 4. sha256 hash with '\x00' in the middle of the data 5. suggested file name Differential Revision: https://phabricator.services.mozilla.com/D9138
ffb7704a1bf8af534306427755e18cfe4db8da62: Bug 1190020 - P1. Fix truncated hashes in application reputation remote lookups. r=francois
Dimi <dimi@liweiguode-MacBook-Pro.local> - Fri, 19 Oct 2018 09:17:08 +0000 - rev 491010
Push 247 by fmarier@mozilla.com at Sat, 27 Oct 2018 01:06:44 +0000
Bug 1190020 - P1. Fix truncated hashes in application reputation remote lookups. r=francois When we set the remote lookup digest, we get char* from nsCString and convert char* to std::string without specifying size. If SHA256 data contains '00', std::string treats it as a null terminated sting so we have a shorter SHA256. This patch fixes this issue by specifying the size when converting char* to std::string. Differential Revision: https://phabricator.services.mozilla.com/D8830
3e62b3523fb5f8af9996e88ff5e15d5edd4742fd: Bug 1500208 - Disable FastBlock, hide FastBlock UI everywhere. r=francois,Ehsan
Johann Hofmann <jhofmann@mozilla.com> - Fri, 19 Oct 2018 06:53:32 +0000 - rev 490431
Push 247 by fmarier@mozilla.com at Sat, 27 Oct 2018 01:06:44 +0000
Bug 1500208 - Disable FastBlock, hide FastBlock UI everywhere. r=francois,Ehsan Differential Revision: https://phabricator.services.mozilla.com/D9140
6e0c72599e0b63fe2e4957184c40520c2fa6339c: Bug 1356427 - P3. Add a testcase to test download protection will skip checking whitelist for non-binary files. r=francois
Dimi Lee <dlee@mozilla.com> - Thu, 18 Oct 2018 14:39:41 +0000 - rev 490298
Push 247 by fmarier@mozilla.com at Sat, 27 Oct 2018 01:06:44 +0000
Bug 1356427 - P3. Add a testcase to test download protection will skip checking whitelist for non-binary files. r=francois Add xpcshell test test_whitelisted_non_binary_source. In this test, we pass a whitelisted sourceURI and a non-binary file extension. Check the returned result is NO_LIST to ensure no whitelisted local db query has been made. This patch also adds binary filename for testcases require whitelist query being made. Differential Revision: https://phabricator.services.mozilla.com/D8702
c3e09876ab13c1b27355f2d0680b0e34a40bbcf4: Bug 1356427 - P2. Only check binary files against the Application Reputation whitelist, r=francois
Dimi Lee <dlee@mozilla.com> - Thu, 18 Oct 2018 14:40:56 +0000 - rev 490297
Push 247 by fmarier@mozilla.com at Sat, 27 Oct 2018 01:06:44 +0000
Bug 1356427 - P2. Only check binary files against the Application Reputation whitelist, r=francois We already skip checking whitelist for redirects and referrer in Bug 1434741 So this patch just does the following to remove redundant whitelist check: 1. Skip checking whitelist for the final URL if it is not a binary 2. Skip parsing certificate for non-binary files After applying this patch, whitelist will only be used for final URL of binary file and certificates of binary file Differential Revision: https://phabricator.services.mozilla.com/D8687
ced08ec47ace994bf5c5f1e4052052e7cb9bab30: Bug 1356427 - P1. Remove redundant code from PendingLookup::LookupNext. r=francois
Dimi Lee <dlee@mozilla.com> - Thu, 18 Oct 2018 14:38:14 +0000 - rev 490296
Push 247 by fmarier@mozilla.com at Sat, 27 Oct 2018 01:06:44 +0000
Bug 1356427 - P1. Remove redundant code from PendingLookup::LookupNext. r=francois When mBlocklistCount is set, we will call PendingLookup::OnComplete() to block this download. The |if(mBlocklistCount)| in PendingLookup::LookupNext will never be true. mBlocklistCount member variable is also useless after removing the code. But I think we can keep it since we have mAllowlistCount and we might also need it in the future. Differential Revision: https://phabricator.services.mozilla.com/D8682
b6780702981d863bfd913ca404d5b5209b952066: Bug 1499149 - Better telemetry for alt-svc headers seen in the wild. r=francois,valentin
Nicholas Hurley <hurley@mozilla.com> - Wed, 17 Oct 2018 18:14:56 +0000 - rev 490117
Push 247 by fmarier@mozilla.com at Sat, 27 Oct 2018 01:06:44 +0000
Bug 1499149 - Better telemetry for alt-svc headers seen in the wild. r=francois,valentin Right now, we have no idea how often an origin may offer us multiple alt-svc options. As we are considering racing multiple alt-svc connections (if they're available), it would be good to know how often we actually have (or would have, were we to store them) multiple options available. It would also be good to know how often an origin may change the target of its alt-svc mapping (even if there is only one target), as changes in target may make it useful to store/race multiple targets, as well. Differential Revision: https://phabricator.services.mozilla.com/D8878
762299961b3f7d84e36def128fbb5bb4c5403f5e: Bug 1499549 - Ensure that we only check the corresponding Content Blocking exception list when testing whether a top-level document is on the Content Blocking allow list r=francois
Ehsan Akhgari <ehsan@mozilla.com> - Wed, 17 Oct 2018 17:06:00 +0000 - rev 490099
Push 247 by fmarier@mozilla.com at Sat, 27 Oct 2018 01:06:44 +0000
Bug 1499549 - Ensure that we only check the corresponding Content Blocking exception list when testing whether a top-level document is on the Content Blocking allow list r=francois Differential Revision: https://phabricator.services.mozilla.com/D8927
37d138b1e58b9c45ee3baef530bb133597b14eb3: Bug 1439450 - Ignore has_first_value() check in ProtocolParser. r=francois
Dimi Lee <dlee@mozilla.com> - Tue, 16 Oct 2018 10:36:01 +0000 - rev 489789
Push 247 by fmarier@mozilla.com at Sat, 27 Oct 2018 01:06:44 +0000
Bug 1439450 - Ignore has_first_value() check in ProtocolParser. r=francois Sometimes the protocol buffer data (RiceEncodingData) sent by Google's Safe Browsing server has the following properties: 1. |has_first_value| is false 2. |num_entries| > 0 In this case, we can still parse the data and apply partial update correctly by assuming that the first value is equal to 0. Differential Revision: https://phabricator.services.mozilla.com/D6393
bb8d7ab5e55fea5d8a962b59364d35eb955d8d94: Bug 1489493 - Add a scalar telemetry for the size of content windows r=Gijs,francois
Tim Huang <tihuang@mozilla.com> - Thu, 11 Oct 2018 19:46:25 +0000 - rev 489319
Push 247 by fmarier@mozilla.com at Sat, 27 Oct 2018 01:06:44 +0000
Bug 1489493 - Add a scalar telemetry for the size of content windows r=Gijs,francois In order to improve the window rounding fingerprinting protection, we want to find a proper rounding value which provides good protection as well as good user experience. With a better understanding of the content window size, we can answer the question that which strategy we should use for improving this protection: should we use certain fixed window sizes or still stick with the current rounding strategy? Also, if we still stick with the current approach, then what is the best rounding value which allows users to utilize their window as much as possible without losing too much protection. Differential Revision: https://phabricator.services.mozilla.com/D7236
75ed7377db616cdeb922a9ebf28e17aa7f97b492: Bug 1495285 - Introduce TrackingDummyChannel to annotate channels before being intercepted by ServiceWorkers, r=francois, r=mayhemer, f=asuth
Andrea Marchesini <amarchesini@mozilla.com> - Fri, 12 Oct 2018 11:40:36 +0200 - rev 489156
Push 246 by fmarier@mozilla.com at Sat, 13 Oct 2018 00:15:40 +0000
Bug 1495285 - Introduce TrackingDummyChannel to annotate channels before being intercepted by ServiceWorkers, r=francois, r=mayhemer, f=asuth
7ed2dd1cac5420a828628b08a39ddbeacf458af1: Bug 1477064 - Collect PLUGIN_DRAWING_MODEL histogram data on release. r=francois, data=francois
Jim Mathies <jmathies@mozilla.com> - Fri, 28 Sep 2018 09:51:39 -0500 - rev 487104
Push 246 by fmarier@mozilla.com at Sat, 13 Oct 2018 00:15:40 +0000
Bug 1477064 - Collect PLUGIN_DRAWING_MODEL histogram data on release. r=francois, data=francois
12f48815d40f0133f86b774469abf455546b9ed7: Bug 1479898 - P3. Increase the application reputation remote lookup timeout to 15sec. r=francois
Dimi Lee <dlee@mozilla.com> - Fri, 07 Sep 2018 18:28:35 +0000 - rev 485835
Push 241 by fmarier@mozilla.com at Mon, 24 Sep 2018 21:48:02 +0000
Bug 1479898 - P3. Increase the application reputation remote lookup timeout to 15sec. r=francois 3% download protection remote lookup failures are from timeout. Increase the timeout from 10sec to 15sec to see if this help. Differential Revision: https://phabricator.services.mozilla.com/D5265
4d2c3be4d7256e678be7189dedddaeaea7126f8f: Bug 1479898 - P2. Add telemetry to know the response time of download protection remote lookup. r=francois
Dimi Lee <dlee@mozilla.com> - Thu, 20 Sep 2018 14:04:31 +0000 - rev 485834
Push 241 by fmarier@mozilla.com at Mon, 24 Sep 2018 21:48:02 +0000
Bug 1479898 - P2. Add telemetry to know the response time of download protection remote lookup. r=francois Telemetry::APPLICATION_REPUTATION_REMOTE_LOOKUP_RESPONSE_TIME can be used to give us an idea how could we adjust the timeout accordingly. Differential Revision: https://phabricator.services.mozilla.com/D5264
5d39eab1a17c0d19916cabd1ab7cc8ac8eeec2ac: Bug 1479898 - P1. Only set false to APPLICATION_REPUTATION_REMOTE_LOOKUP_TIMEOUT when it is not timeout. r=francois
Dimi Lee <dlee@mozilla.com> - Thu, 20 Sep 2018 00:18:12 +0000 - rev 485833
Push 241 by fmarier@mozilla.com at Mon, 24 Sep 2018 21:48:02 +0000
Bug 1479898 - P1. Only set false to APPLICATION_REPUTATION_REMOTE_LOOKUP_TIMEOUT when it is not timeout. r=francois Right now no matter it is timeout or not, we will always add the counter to the false case of APPLICATION_REPUTATION_REMOTE_LOOKUP_TIMEOUT. We should only set the counter(false) when it is not timeout. Differential Revision: https://phabricator.services.mozilla.com/D5263
1d9298b20b46aacf52eb69bf024c188b354fb00e: Bug 1481819 - Make Safe Browsing directory-based file copy interruptible. r=francois
Dimi Lee <dlee@mozilla.com> - Tue, 18 Sep 2018 14:29:20 +0000 - rev 485442
Push 241 by fmarier@mozilla.com at Mon, 24 Sep 2018 21:48:02 +0000
Bug 1481819 - Make Safe Browsing directory-based file copy interruptible. r=francois A directory-based file copy without checkpoint to abort may take lots of time to finish. This cause an issue that if firefox is shutting down and try to close an ongoing update thread, main-thread may be blocked for a long time. This patch adds a wrapper for copying an entire directory, within this wrapper, we use file-based copy and add checkpoints to let update thread has a chance to abort. Differential Revision: https://phabricator.services.mozilla.com/D3414
6f6886c89554f9face1b3e8a7090cc0e85800375: Bug 1481819 - Make Safe Browsing directory-based file copy interruptible. r=francois
Dimi Lee <dlee@mozilla.com> - Fri, 14 Sep 2018 15:33:24 +0000 - rev 484777
Push 241 by fmarier@mozilla.com at Mon, 24 Sep 2018 21:48:02 +0000
Bug 1481819 - Make Safe Browsing directory-based file copy interruptible. r=francois A directory-based file copy without checkpoint to abort may take lots of time to finish. This cause an issue that if firefox is shutting down and try to close an ongoing update thread, main-thread may be blocked for a long time. This patch adds a wrapper for copying an entire directory, within this wrapper, we use file-based copy and add checkpoints to let update thread has a chance to abort. Differential Revision: https://phabricator.services.mozilla.com/D3414
84fbf23400d5d4de19df9254039fc80a73557b28: Bug 1490074 - add Telemetry to know how long the AudioContext become audible since it was created. r=padenot,francois
alwu <alwu@mozilla.com> - Thu, 13 Sep 2018 16:58:05 +0000 - rev 484555
Push 241 by fmarier@mozilla.com at Mon, 24 Sep 2018 21:48:02 +0000
Bug 1490074 - add Telemetry to know how long the AudioContext become audible since it was created. r=padenot,francois I want to know how many sites will have that scenario which is to create AudioContext in advance and produces sound later (ex. when user click the page or certain button). I will add a Telemetry probe to meausure how long the AudioContext would become audible since it was created. Differential Revision: https://phabricator.services.mozilla.com/D5453
1082415e378fab5986f9c6b90d638d8a03690574: Bug 1480443 - Part 3: Disable FastBlock in URL Classifier tests. r=dimi,francois
Cosmin Sabou <csabou@mozilla.com> - Sat, 01 Sep 2018 11:06:32 +0300 - rev 482744
Push 232 by fmarier@mozilla.com at Wed, 05 Sep 2018 20:45:54 +0000
Bug 1480443 - Part 3: Disable FastBlock in URL Classifier tests. r=dimi,francois
5e01b236471ee1b3b8210d1fbc7f90e9bb11c767: Bug 1480443 - Enable FastBlock by default on Nightly. r=francois
Cosmin Sabou <csabou@mozilla.com> - Sat, 01 Sep 2018 11:01:06 +0300 - rev 482742
Push 232 by fmarier@mozilla.com at Wed, 05 Sep 2018 20:45:54 +0000
Bug 1480443 - Enable FastBlock by default on Nightly. r=francois
953cfa4e5a85bc7126c1500eb537765e9b785aaa: Bug 1476118 - Add .oxt to the list of executable extensions in download protection. r=francois
Dimi Lee <dlee@mozilla.com> - Fri, 31 Aug 2018 14:57:24 +0000 - rev 482650
Push 232 by fmarier@mozilla.com at Wed, 05 Sep 2018 20:45:54 +0000
Bug 1476118 - Add .oxt to the list of executable extensions in download protection. r=francois Differential Revision: https://phabricator.services.mozilla.com/D4341
6f25c83bb4d5e17285cb4f4f62d71e2cabe20801: Bug 1485342 - Avoid isdigit() and isxdigit() in URL classifier. r=francois
Henri Sivonen <hsivonen@hsivonen.fi> - Mon, 27 Aug 2018 15:55:13 +0000 - rev 481938
Push 232 by fmarier@mozilla.com at Wed, 05 Sep 2018 20:45:54 +0000
Bug 1485342 - Avoid isdigit() and isxdigit() in URL classifier. r=francois MozReview-Commit-ID: IvadP10PFEZ Differential Revision: https://phabricator.services.mozilla.com/D4312
5092029dac4e2fd24b985c0a438437879e333b07: Bug 1476967 - Allow the adding of tracking-protection entries via prefs, r=francois
Andrea Marchesini <amarchesini@mozilla.com> - Mon, 27 Aug 2018 21:01:14 +0200 - rev 481822
Push 232 by fmarier@mozilla.com at Wed, 05 Sep 2018 20:45:54 +0000
Bug 1476967 - Allow the adding of tracking-protection entries via prefs, r=francois
34ee6df8cb72825769ac3fc3cb946fea424e0f9e: Bug 1484024: add Telemetry histogram for DTLS ciphers on RTCPeerConnection r=francois,mt
Nils Ohlmeier [:drno] <drno@ohlmeier.org> - Fri, 24 Aug 2018 22:49:42 +0000 - rev 481723
Push 232 by fmarier@mozilla.com at Wed, 05 Sep 2018 20:45:54 +0000
Bug 1484024: add Telemetry histogram for DTLS ciphers on RTCPeerConnection r=francois,mt Added a Telemetry histrogram which collects which DTLS cipher got negotiated when a RTCPeerConnection connected. Differential Revision: https://phabricator.services.mozilla.com/D3551
258c008b1915370a62269b2d2b29d36ba888c09f: Bug 1485743 - Don't show the Content Blocking tour in private windows. r=francois
Johann Hofmann <jhofmann@mozilla.com> - Fri, 24 Aug 2018 19:46:07 +0000 - rev 481702
Push 232 by fmarier@mozilla.com at Wed, 05 Sep 2018 20:45:54 +0000
Bug 1485743 - Don't show the Content Blocking tour in private windows. r=francois Differential Revision: https://phabricator.services.mozilla.com/D4197
8cb3938281bca5c56fffad7cd13794e2c4f826ec: Bug 1484776: Extend Browser Error Collection telemetry to 67. r=francois
Michael Kelly <mkelly@mozilla.com> - Fri, 24 Aug 2018 18:35:51 +0000 - rev 481685
Push 232 by fmarier@mozilla.com at Wed, 05 Sep 2018 20:45:54 +0000
Bug 1484776: Extend Browser Error Collection telemetry to 67. r=francois Differential Revision: https://phabricator.services.mozilla.com/D3808
2622040931e64baff36decfec3cec21301f02270: Bug 1483727 - Correctly test the TP UI state when CB UI is off. r=francois
Johann Hofmann <jhofmann@mozilla.com> - Thu, 23 Aug 2018 21:31:22 +0000 - rev 481560
Push 232 by fmarier@mozilla.com at Wed, 05 Sep 2018 20:45:54 +0000
Bug 1483727 - Correctly test the TP UI state when CB UI is off. r=francois Differential Revision: https://phabricator.services.mozilla.com/D4167
fa1966cf5f5c2efe0475c5d684f619ccde2e3779: Bug 1485325 - Avoid nsTSubstring::GetMutableData() in URL classifier. r=francois
Henri Sivonen <hsivonen@hsivonen.fi> - Wed, 22 Aug 2018 23:07:59 +0000 - rev 481311
Push 232 by fmarier@mozilla.com at Wed, 05 Sep 2018 20:45:54 +0000
Bug 1485325 - Avoid nsTSubstring::GetMutableData() in URL classifier. r=francois MozReview-Commit-ID: EzyOTuEZ9Ot Differential Revision: https://phabricator.services.mozilla.com/D3966
bb9759881cd75c2a0cba3510f35166d160074e79: Bug 1483703 - part4 : modify current telemtry scalar because we won't block media without audio track anymore. r=cpearce,francois
alwu <alwu@mozilla.com> - Wed, 22 Aug 2018 22:54:05 +0000 - rev 481289
Push 232 by fmarier@mozilla.com at Wed, 05 Sep 2018 20:45:54 +0000
Bug 1483703 - part4 : modify current telemtry scalar because we won't block media without audio track anymore. r=cpearce,francois Since we don't block media without audio track anymore, the original telemetry scalar becomes useless. We need to change its meaning in order to know the number of allowed autoplay without audio track. Differential Revision: https://phabricator.services.mozilla.com/D3673
3326c0e920d4c9a180a26561a1a9d49b886c0eb7: Bug 1483703 - part2 : add telemetry for the media which was blocked before loading metadata and ended up being without audio track. r=cpearce,francois
alwu <alwu@mozilla.com> - Wed, 22 Aug 2018 22:50:54 +0000 - rev 481287
Push 232 by fmarier@mozilla.com at Wed, 05 Sep 2018 20:45:54 +0000
Bug 1483703 - part2 : add telemetry for the media which was blocked before loading metadata and ended up being without audio track. r=cpearce,francois Add two telemetry scarlar, "MEDIA_BLOCKED_NO_METADATA" records how many media which was blocked because it hadn't loaded metadata yet. "MEDIA_BLOCKED_NO_METADATA_ENDUP_NO_AUDIO_TRACK" records how many media which was blocked because it hadn't loaded metadata and ended up for being no audio track. By collecting those data, we can know the proportion of media which should be autoplay but was blocked because of lacking metadata. Differential Revision: https://phabricator.services.mozilla.com/D3671
d4222536f35f51c8f97e8bfbd2537bd90814a54f: Bug 1484876 - Part 6: Truncate the tracking URIs in the anti-tracking logs to 128 characters since they may be really long; r=francois
Ehsan Akhgari <ehsan@mozilla.com> - Wed, 22 Aug 2018 09:07:00 -0400 - rev 481162
Push 232 by fmarier@mozilla.com at Wed, 05 Sep 2018 20:45:54 +0000
Bug 1484876 - Part 6: Truncate the tracking URIs in the anti-tracking logs to 128 characters since they may be really long; r=francois
5ffff7652f8762a0fa411692b929316f8f36e756: Bug 1484876 - Part 3: Refactor the code responsible for checking whether the top window URI is on the content blocking allow list into AntiTrackingCommon; r=francois
Ehsan Akhgari <ehsan@mozilla.com> - Mon, 20 Aug 2018 20:09:52 -0400 - rev 481159
Push 232 by fmarier@mozilla.com at Wed, 05 Sep 2018 20:45:54 +0000
Bug 1484876 - Part 3: Refactor the code responsible for checking whether the top window URI is on the content blocking allow list into AntiTrackingCommon; r=francois
66519e95427ef0744b84e3dd292867ccb8c3a854: Bug 1484876 - Part 2: Check the trackingprotection-pb permission in the channel classifier code instead of accessing nsIPrivateBrowsingTrackingProtectionWhitelist; r=francois
Ehsan Akhgari <ehsan@mozilla.com> - Mon, 20 Aug 2018 19:46:58 -0400 - rev 481158
Push 232 by fmarier@mozilla.com at Wed, 05 Sep 2018 20:45:54 +0000
Bug 1484876 - Part 2: Check the trackingprotection-pb permission in the channel classifier code instead of accessing nsIPrivateBrowsingTrackingProtectionWhitelist; r=francois
e80737d6af552187ffeb8099c8d6fd936febed5e: Bug 1484876 - Part 6: Truncate the tracking URIs in the anti-tracking logs to 128 characters since they may be really long; r=francois
Ehsan Akhgari <ehsan@mozilla.com> - Wed, 22 Aug 2018 09:07:00 -0400 - rev 481131
Push 232 by fmarier@mozilla.com at Wed, 05 Sep 2018 20:45:54 +0000
Bug 1484876 - Part 6: Truncate the tracking URIs in the anti-tracking logs to 128 characters since they may be really long; r=francois
d31e39a477046ed8a574e43dc6bbd4192829680d: Bug 1484876 - Part 3: Refactor the code responsible for checking whether the top window URI is on the content blocking allow list into AntiTrackingCommon; r=francois
Ehsan Akhgari <ehsan@mozilla.com> - Mon, 20 Aug 2018 20:09:52 -0400 - rev 481128
Push 232 by fmarier@mozilla.com at Wed, 05 Sep 2018 20:45:54 +0000
Bug 1484876 - Part 3: Refactor the code responsible for checking whether the top window URI is on the content blocking allow list into AntiTrackingCommon; r=francois
babf6abc7f4cc189f17f73c7ddff8987da69a43a: Bug 1484876 - Part 2: Check the trackingprotection-pb permission in the channel classifier code instead of accessing nsIPrivateBrowsingTrackingProtectionWhitelist; r=francois
Ehsan Akhgari <ehsan@mozilla.com> - Mon, 20 Aug 2018 19:46:58 -0400 - rev 481127
Push 232 by fmarier@mozilla.com at Wed, 05 Sep 2018 20:45:54 +0000
Bug 1484876 - Part 2: Check the trackingprotection-pb permission in the channel classifier code instead of accessing nsIPrivateBrowsingTrackingProtectionWhitelist; r=francois
aa640b891abd0109df4552663e20318c48877d88: Bug 1481252 - Part 2: Report Tracking Protection status to docshell; r=valentin,francois
Liang-Heng Chen <xeonchen@gmail.com> - Mon, 13 Aug 2018 10:23:57 +0000 - rev 480480
Push 227 by fmarier@mozilla.com at Sat, 18 Aug 2018 09:02:59 +0000
Bug 1481252 - Part 2: Report Tracking Protection status to docshell; r=valentin,francois Differential Revision: https://phabricator.services.mozilla.com/D3025
47e290808d8e401d70ef5fc4a8f523388de6dd96: Bug 1483342 - [1.1] Add GeckoRuntime Safe Browsing API. r=snorp,jchen,francois
Eugen Sawin <esawin@mozilla.com> - Tue, 14 Aug 2018 21:40:50 +0200 - rev 480215
Push 227 by fmarier@mozilla.com at Sat, 18 Aug 2018 09:02:59 +0000
Bug 1483342 - [1.1] Add GeckoRuntime Safe Browsing API. r=snorp,jchen,francois
8fbba4053aa0032f7ea5ced9b94c1c3972deee29: Bug 1482259 - Add Telemetry to know the proportion of silent part in the whole audio track. r=cpearce,francois
alwu <alwu@mozilla.com> - Wed, 15 Aug 2018 16:35:51 +0000 - rev 480150
Push 224 by fmarier@mozilla.com at Fri, 17 Aug 2018 00:53:15 +0000
Bug 1482259 - Add Telemetry to know the proportion of silent part in the whole audio track. r=cpearce,francois Use new telemetry histogram ID 'AUDIO_TRACK_SILENCE_PROPORTION' to know the proportion of silent part in the whole audio track. Differential Revision: https://phabricator.services.mozilla.com/D3066
174bb3e3138c56cef6073ed5ba6e40367a1803de: Bug 1480923 - Part 2: Remove the checks for the restrict3rdpartystorage pref from the channel classifier and only rely on the annotate_channels pref; r=francois
Ehsan Akhgari <ehsan@mozilla.com> - Fri, 10 Aug 2018 14:12:28 -0400 - rev 480044
Push 224 by fmarier@mozilla.com at Fri, 17 Aug 2018 00:53:15 +0000
Bug 1480923 - Part 2: Remove the checks for the restrict3rdpartystorage pref from the channel classifier and only rely on the annotate_channels pref; r=francois
ecdc0137474760b86511b53627204d53e4aa320e: Bug 1480923 - Part 1: Remove the centralized third-party checks from nsChannelClassifier::ShouldEnableTrackingProtectionInternal in annotation-only mode; r=francois
Ehsan Akhgari <ehsan@mozilla.com> - Fri, 10 Aug 2018 19:42:21 -0400 - rev 480043
Push 224 by fmarier@mozilla.com at Fri, 17 Aug 2018 00:53:15 +0000
Bug 1480923 - Part 1: Remove the centralized third-party checks from nsChannelClassifier::ShouldEnableTrackingProtectionInternal in annotation-only mode; r=francois
71e7d262b066533be92742a227ea498117a36c35: Bug 1479901 - Add telemetry probe for measuring more detailed network status of download protection remote lookup. r=francois
Dimi Lee <dlee@mozilla.com> - Thu, 09 Aug 2018 08:34:12 +0000 - rev 479092
Push 215 by fmarier@mozilla.com at Fri, 10 Aug 2018 00:07:31 +0000
Bug 1479901 - Add telemetry probe for measuring more detailed network status of download protection remote lookup. r=francois We only recorded "fail" or "invalid protobuf response" when we received an error while sending remote lookup. However, this is not enough for us to analyze the problem if the error rate is high. This patch introduced a more fine-grained telemetry probe that could help us understand the result better. Differential Revision: https://phabricator.services.mozilla.com/D2844
753fc72a27d586f8aa562f1ddb2c3fa90f9ec4f5: Bug 1480484 - add telemetry scalar to measure the count for blocked media element without audio track. r=cpearce,francois
alwu <alwu@mozilla.com> - Fri, 03 Aug 2018 13:21:03 -0700 - rev 478805
Push 215 by fmarier@mozilla.com at Fri, 10 Aug 2018 00:07:31 +0000
Bug 1480484 - add telemetry scalar to measure the count for blocked media element without audio track. r=cpearce,francois This is used to count the potiential number of the blocked autoplay media element without audio track even if user was enable autoplay. It might happen on three cases, 1. play -> loadedmetadata 2. loadedmetadata -> play 3. loadedmetadata -> has 'autoplay' keyword In first case we need to check whether the play invocation has been called, and check other other cases before the media starts playing. In addition, the scalar name isn't consist with other names is because of the 40 maximum limitation of the ping name. MozReview-Commit-ID: 6Qm6TD4ME8I
a7067dbdc7b5690d781490c80f5cd5212a00c7c5: Bug 1480484 - add telemetry scalar to measure the count for blocked media element without audio track. r=cpearce,francois
alwu <alwu@mozilla.com> - Fri, 03 Aug 2018 13:21:03 -0700 - rev 478794
Push 215 by fmarier@mozilla.com at Fri, 10 Aug 2018 00:07:31 +0000
Bug 1480484 - add telemetry scalar to measure the count for blocked media element without audio track. r=cpearce,francois This is used to count the potiential number of the blocked autoplay media element without audio track even if user was enable autoplay. It might happen on three cases, 1. play -> loadedmetadata 2. loadedmetadata -> play 3. loadedmetadata -> has 'autoplay' keyword In first case we need to check whether the play invocation has been called, and check other other cases before the media starts playing. In addition, the scalar name isn't consist with other names is because of the 40 maximum limitation of the ping name. MozReview-Commit-ID: 6Qm6TD4ME8I
68ecfbb3f0a44b3091397b2c02a3dd4cb75b62dc: Bug 1479438 - Use correct resource url for chrome scope test_privatebrowsing_trackingprotection.html. r=francois
Dimi Lee <dlee@mozilla.com> - Mon, 06 Aug 2018 10:11:37 +0000 - rev 478630
Push 215 by fmarier@mozilla.com at Fri, 10 Aug 2018 00:07:31 +0000
Bug 1479438 - Use correct resource url for chrome scope test_privatebrowsing_trackingprotection.html. r=francois Differential Revision: https://phabricator.services.mozilla.com/D2512
cb8a7a9f4a73af98d63ea696d20fda8660aae7e4: Bug 1476715 - low priority connection for 3rd party + tracking resource only, r=francois
Andrea Marchesini <amarchesini@mozilla.com> - Mon, 06 Aug 2018 13:42:43 +0200 - rev 478512
Push 215 by fmarier@mozilla.com at Fri, 10 Aug 2018 00:07:31 +0000
Bug 1476715 - low priority connection for 3rd party + tracking resource only, r=francois
76a4475d0523fd717865ea434db89085af815465: Bug 1432955: Implemented sdp parsing comparer, r=bwc,francois
Johannes Willbold <j.willbold@mozilla.com> - Thu, 05 Jul 2018 16:06:41 -0700 - rev 477125
Push 211 by fmarier@mozilla.com at Wed, 01 Aug 2018 21:19:47 +0000
Bug 1432955: Implemented sdp parsing comparer, r=bwc,francois Added signaling/src/sdp/ParsingResultComparer.h/.cpp Added SDP comparer with telemetry and debug logging MozReview-Commit-ID: ErdnLGPxHHF