Граф коммитов

583809 Коммитов

Автор SHA1 Сообщение Дата
Dorel Luca 0abbbf16b7 Backed out changeset 9ac28273f156 (bug 1440383) as requested by timdream 2018-03-01 20:32:29 +02:00
Tiberius Oros 61d400da1c Merge inbound to mozilla-central. a=merge 2018-03-01 19:29:00 +02:00
Tiberius Oros 1a3b814e9c Merge autoland to mozilla-central. a=merge 2018-03-01 19:10:44 +02:00
ffxbld 711ffa5a19 No bug - Tagging mozilla-central e33efdb3e1517d521deb949de3fcd6d9946ea440 with FIREFOX_BETA_60_BASE a=release DONTBUILD CLOSED TREE 2018-03-01 16:09:36 +00:00
Csoregi Natalia 1fd0486e23 Backed out 7 changesets (bug 1193394) for browser-chrome failures on browser_ext_popup_background.js. CLOSED TREE
Backed out changeset 9683f24ff8ec (bug 1193394)
Backed out changeset 0e7140a7c841 (bug 1193394)
Backed out changeset a0e26f6b2784 (bug 1193394)
Backed out changeset 29e1fceaf48d (bug 1193394)
Backed out changeset b8632bbbd273 (bug 1193394)
Backed out changeset a54ef2d8f896 (bug 1193394)
Backed out changeset 55c94c05c57f (bug 1193394)
2018-03-01 16:29:02 +02:00
Arthur Edelstein 84e459b0c3 Bug 1433592 - Don't spoof ctrl key modifier for privacy.resistFingerprinting=true r=masayuki 2018-03-01 16:25:00 +02:00
Alex Chronopoulos f74de1aee2 Bug 1410456 - Update cubeb from upstream to eb3409e.r=achronop
MozReview-Commit-ID: Ie9hhw1Prlw

--HG--
extra : rebase_source : 0e27932b3d22cf816a045b2fd4929d957a5684d6
2018-03-01 15:44:47 +02:00
Tooru Fujisawa e497c77767 Bug 1193394 - Part 6: Disable browser_devices_get_user_media_unprompted_access.js and browser_ext_commands_execute_browser_action.js. r=bustage CLOSED TREE 2018-03-01 22:26:20 +09:00
Johan Lorenzo 171f489600 Bug 1424482 - part 2: Remove upstream artifact when no path is defined r=mtabara a=bustage 2018-03-01 14:07:23 +01:00
Alex Chronopoulos 6bd9c1333c Bug 1410456 - Pass in cubeb JNIEnv instead of JavaVM. r=padenot
MozReview-Commit-ID: Cf8FvZzShVv

--HG--
extra : rebase_source : 28b4a8658e5be271af228a0d0398eaa2fba4320b
2018-03-01 12:11:32 +02:00
Sebastian Hengst 3eb3941bc5 Backed out 2 changesets (bug 1441133) for build bustage in beta simulations at dom/clients/manager/ClientSource.cpp:402: unused variable 'wp'. a=backout
Backed out changeset 275855621865 (bug 1441133)
Backed out changeset 7a4546e25adc (bug 1441133)

--HG--
extra : histedit_source : d38746923972091f05ad8f435c39e7fe38e57a18
2018-03-01 11:55:28 +02:00
Sebastian Hengst 3a10644021 Backed out 6 changesets (bug 888600) for beta simulation failures: build bustage on Linux and Windows opt (bug 1442036) and devtools failure browser_net_view-source-debugger.js (bug 1441961). a=backout
Backed out changeset 83c87140dc3d (bug 888600)
Backed out changeset 2efb9b1753f6 (bug 888600)
Backed out changeset af5303781961 (bug 888600)
Backed out changeset 79ef59047e63 (bug 888600)
Backed out changeset 30d568d628dd (bug 888600)
Backed out changeset c7bd4c6c9741 (bug 888600)

--HG--
extra : histedit_source : 791b22f6770f4fead2f909478a93d65d85829fe0%2Cbb387309e90f53e1dde45dcf8cf4ebedcc6e5c5e
2018-03-01 11:51:09 +02:00
Axel Hecht 9f2b269354 Bug 1442145, update fluent to 0.6.4, r=flod a=nightly-fix
This picks up an existing fix for variant keys, which we started
using in gecko. The lack of this fix broke l10n-merge, and thus
l10n nightlies.

MozReview-Commit-ID: Gy6U52rc6PH

--HG--
extra : amend_source : 8c5e29e877a24558b96dfa18ec5a0ae05a466b93
2018-03-01 10:28:34 +01:00
Georg Koppen f58841a715 Tests updated/added for bug 1382359 r=ckerschb CLOSED TREE 2018-03-01 10:13:22 +01:00
Georg Koppen dd4fb3ba9f Bug 1382359: Treat .onion as a secure context
Websites which collect passwords but don't use HTTPS start showing scary
warnings from Firefox 51 onwards and mixed context blocking has been
available even longer.

.onion sites without HTTPS support are affected as well, although their
traffic is encrypted and authenticated. This patch addresses this
shortcoming by making sure .onion sites are treated as potentially
trustworthy origins.

The secure context specification
(https://w3c.github.io/webappsec-secure-contexts/) is pretty much focused
on tying security and trustworthiness to the protocol over which domains
are accessed. However, it is not obvious why .onion sites should not be
treated as potentially trustworthy given:

"A potentially trustworthy origin is one which a user agent can
generally trust as delivering data securely.

This algorithms [sic] considers certain hosts, scheme, and origins as
potentially trustworthy, even though they might not be authenticated and
encrypted in the traditional sense."
(https://w3c.github.io/webappsec-secure-contexts/#is-origin-trustworthy)

We use step 8 in the algorithm to establish trustworthiness of .onion
sites by whitelisting them given the encrypted and authenticated nature
of their traffic.
2018-03-01 09:44:30 +01:00
Tooru Fujisawa 8809c05b7b Bug 1193394 - Part 5: Disable some tests that relies on descriptionHeightWorkaround. r=bustage CLOSED TREE 2018-03-01 20:03:13 +09:00
Tooru Fujisawa d0ece36aa1 Backed out changeset 29e1fceaf48d (bug 1193394) 2018-03-01 19:55:08 +09:00
Sebastian Hengst 6098a3cc4d merge mozilla-central to mozilla-inbound. CLOSED TREE 2018-03-01 12:29:42 +02:00
Tooru Fujisawa 25a9f5bb72 Bug 1193394 - Part 4: Wait for the next event tick before calling promiseDocumentFlushed in descriptionHeightWorkaround. r=bustage CLOSED TREE 2018-03-01 18:44:38 +09:00
Tooru Fujisawa c253fc2790 Bug 1193394 - Part 3: Disable browser_ext_browserAction_popup.js and browser_ext_browserAction_popup_resize.js. r=bustage 2018-03-01 18:42:14 +09:00
Jordan Lund 65270c07b0 Bug 1431363 - Tracking bug for 2018-03-13 migration work, a=testing r=mtabara
MozReview-Commit-ID: E8GqWJZLmLB

--HG--
rename : testing/mozharness/configs/merge_day/central_to_beta.py => testing/mozharness/configs/merge_day/bump_central.py
extra : source : 5c880ac8f013cbd01571d4939e40b08648c761ba
extra : amend_source : 905f2d818ad654f8b466252be75d9cdcbb212f71
2018-02-28 15:55:55 -08:00
Cosmin Sabou a97105ec0d Merge inbound to mozilla-central. a=merge 2018-02-28 23:48:29 +02:00
Cosmin Sabou 4d5798c0a5 Merge autoland to mozilla-central. a=merge 2018-02-28 23:47:09 +02:00
Timothy Guan-tin Chien 90a5e0e595 Bug 1440383 - Remove XBL accessibility role="xul:pane" and role="none" r=surkov
MozReview-Commit-ID: GJ0aouAzS77

--HG--
extra : rebase_source : e6c6cefc73618f1815726566f6bc9e00561b236c
2018-02-28 13:09:29 -08:00
Sebastian Hengst 3d8dc1f748 Backed out changeset 322fb820d019 (bug 1442020) on suspicion of causing site identity related browser-chrome failures, e.g. in browser/base/content/test/siteIdentity/browser_bug822367.js. CLOSED TREE 2018-03-01 21:26:12 +02:00
Sebastian Hengst 6e20ddf78b Bug 1441882 - Update browser_parsable_css.js to check that variables that are defined are actually referenced: Remove --breakpoint-hover-background because it has been already fixed. r=bustage-fix CLOSED TREE
--HG--
extra : amend_source : b5415b3c1b2e2f41e94c7500fcbf866e8482a7cd
2018-03-01 20:56:45 +02:00
Dorel Luca c315029db6 Merge mozilla-central to autoland. a=merge on a CLOSED TREE
--HG--
extra : amend_source : 3130effcead9f6dea638a00319b5e0a99d43ead6
2018-03-01 20:50:13 +02:00
Dorel Luca 2807df93c4 Backed out 2 changesets (bug 1436096) for mochitest failure on tests/dom/media/webaudio/test/test_pannerNodeAtZeroDistance.html on a CLOSED TREE
Backed out changeset e9d7a3f92bcc (bug 1436096)
Backed out changeset 5dcbba40dd0c (bug 1436096)

--HG--
extra : amend_source : dace4365ca71014c74ca637f88681159f7a8d3fc
2018-03-01 20:44:31 +02:00
ffxbld 08a7733d6d No bug, Automated HPKP preload list update from host bld-linux64-spot-302 - a=hpkp-update 2018-02-28 12:02:20 -08:00
ffxbld 0799f9b06e No bug, Automated HSTS preload list update from host bld-linux64-spot-302 - a=hsts-update 2018-02-28 12:02:16 -08:00
Geoff Brown 9af214a4a5 Bug 1441869 - Specify DIGCF_DEVICEINTERFACE when calling SetupDiGetClassDevsW; r=milan 2018-02-28 11:49:09 -07:00
Geoff Brown 828cdfd870 Bug 1431125 - Increase max-run-time of test-verify and test-verify-wpt; r=jmaher
These tasks are expected to run quickly (5 - 30 minutes) normally, but there can be a wide range of run times.
2018-02-28 11:49:07 -07:00
Ben Hearsum 8b71e3533a bug 1432219: fix linting errors. r=me 2018-02-28 13:43:37 -05:00
Andrew Osmond fefdf99992 Bug 523950 - Part 10. Add mochitest for when we discard frames from an animated image. r=tnikkel
With the previous parts, for large animated images, we will now discard
previous frames after we reach the threshold. This mochitest configures
a very low threshold, such that it will trigger on a small animated
image. It then verifies that we are already to loop the animation a
couple of times.
2018-02-28 13:34:53 -05:00
Andrew Osmond 39b30d06d4 Bug 523950 - Part 9. Integrate AnimationSurfaceProvider with AnimationFrameBuffer. r=tnikkel 2018-02-28 13:34:53 -05:00
Andrew Osmond 01f0dbdb83 Bug 523950 - Part 8. Add gtests for AnimationFrameBuffer. r=tnikkel 2018-02-28 13:34:52 -05:00
Andrew Osmond 984f23cd9c Bug 523950 - Part 7. Add AnimatedFrameBuffer to manage storage and decoding of frames in an animation. r=tnikkel 2018-02-28 13:34:52 -05:00
Andrew Osmond 97d3a61a18 Bug 523950 - Part 6. Add DecoderFactory::CloneAnimationDecoder to clone an existing image decoder. r=tnikkel
Used later in the patch series, this API allows one to get an identical
decoder to the one given, but decodes from the beginning.
2018-02-28 13:34:52 -05:00
Andrew Osmond 54898d5d6c Bug 523950 - Part 5. Pass the currently displayed frame of an animation to its decoder. r=tnikkel
When we need to recreate an animated image decoder because it was
discarded, the animation may have progressed beyond the first frame.
Given that later in the patch series we need FrameAnimator to be driving
the decoding more actively, it simplifies its role by making it assume
the initial state of the decoder matches its initial state. Passing in
the currently displayed frame allows the decoder to advance its frame
buffer (and potentially discard unnecessary frames), such that when the
animation actually wants to advance as it normally would, the decoder
state matches what it would have been if it had never been discarded.
2018-02-28 13:34:52 -05:00
Andrew Osmond 646219b1e7 Bug 523950 - Part 4. Expose new surface provider APIs that will help drive animation decoding. r=tnikkel
Note that AnimationSurfaceProvider will override these methods to give a
proper implementation in a later patch in this series. For now, they are
mostly stubbed, using the default implementation from ISurfaceProvider.

They focus on the main operations we perform on an animation:

1) Progressing through the animation, e.g. advancing a frame. If we
don't decode the whole animation up front, we need to know at the
decoder level where we are in the display of the animation.

2) Restarting an animation from the beginning. This is a specialized
case of the above, where we want to skip explicitly advancing through
the remaining frames and instead restart at the beginning. The decoder
may have already discarded the earliest frames and must start redecoding
them.

3) Knowing whether or not the decoder is still active, e.g. can we be
missing frames.
2018-02-28 13:34:52 -05:00
Andrew Osmond 2088409e88 Bug 523950 - Part 3. Add preferences to control animated image decoding behaviour. r=tnikkel
image.animated.decode-on-demand.threshold-kb is the maximum size in kB
that the aggregate frames of an animation can use before it starts to
discard already displayed frames, and redecode them as necessary. The
lower it is set to, the less overall memory we will consume at the
expense of execution time for as long as the tab with the animation(s)
above the threshold are kept open.

image.animated.decode-on-demand.batch-size is the minimum number of
frames we want to have buffered ahead of an animation's currently
displayed frame. The decoding will request this number of frames at a
time to maximize use of memory caching. Note that this is related to the
above preference as well; increasing the batch size will in effect raise
what the minimum threshold. This simplifies the logic in patches later
in the series.
2018-02-28 13:34:52 -05:00
Andrew Osmond 28978c4f66 Bug 523950 - Part 2. Expose image decoder type and SourceBuffer to owners. r=tnikkel
Later in the patch series, we use the new APIs to facilitate cloning of
an existing decoder. This is useful when you want to redecode the same
image with the exact same configuration but from the very beginning.
2018-02-28 13:34:52 -05:00
Andrew Osmond 1a18b79e50 Bug 523950 - Part 1. Do some unified build accounting, missing headers and namespaces. r=tnikkel 2018-02-28 13:34:51 -05:00
Ben Kelly 65554b944c Bug 1440565 P2 Add a mochitest that verifies we throw TypeError for fetch() with a view-source URL. r=asuth 2018-02-28 10:34:13 -08:00
Ben Kelly 251a6dfaf4 Bug 1440565 P1 Make sure to clear any existing cache related load flags when setting the default fetch() RequestCache value. r=asuth 2018-02-28 10:34:13 -08:00
Ben Kelly 8c55bc6898 Bug 1440705 P3 Assert that a client and its controlling service worker have a matching principal. r=asuth 2018-02-28 10:32:50 -08:00
Ben Kelly 0dd1174a39 Bug 1440705 P2 Separate ClientMatchPrincipalInfo() into a separate method and header. r=asuth 2018-02-28 10:32:50 -08:00
Ben Kelly 93c381f6bd Bug 1440705 P1 Make SWM clear the reserved client when performing an STS upgrade with child-process interception. r=asuth 2018-02-28 10:32:50 -08:00
Ben Kelly 897d177592 Bug 1441133 P2 Verify inherited frames do not trigger service worker storage assertions. r=asuth 2018-02-28 10:31:29 -08:00
Ben Kelly c6a37e4357 Bug 1441133 P1 Don't assert storage permission on windows that inherit the service worker. r=asuth 2018-02-28 10:31:29 -08:00