On 04/25/2017 04:38 PM, Ehsan Akhgari wrote:
On 04/24/2017 06:04 PM, Martin Thomson wrote:
I think that 60Hz is too high a rate for this.
I suggest that we restrict this to top-level, foreground, and secure
contexts. Note that foreground is a necessary precondition for the
attack, so that
On 04/25/2017 08:20 PM, Boris Zbarsky wrote:
On 4/25/17 1:07 PM, Alexander Surkov wrote:
I bet there's always room for improvements, and I hope this was a counterpoint
for the example only, not for the bug organization approach.
Sort of.
It was a counterpoint to "just check the bug; all the
FWIW, I just yesterday suggested in #whatwg that the platform should have
something like IdlePromise or AsyncPromise.
And there is the related spec bug
https://github.com/whatwg/html/issues/512#issuecomment-171498578
On 05/18/2017 04:22 AM, Mark Hammond wrote:
Given our recent performance
On 05/09/2017 01:55 PM, Mike Hommey wrote:
On Tue, May 09, 2017 at 01:31:33PM +0300, Henri Sivonen wrote:
On Tue, May 9, 2017 at 12:58 PM, Emilio Cobos Álvarez wrote:
I think references help to encode that a bit more in the type system,
and help reasoning about the code
On 05/09/2017 04:52 PM, smaug wrote:
On 05/09/2017 01:55 PM, Mike Hommey wrote:
On Tue, May 09, 2017 at 01:31:33PM +0300, Henri Sivonen wrote:
On Tue, May 9, 2017 at 12:58 PM, Emilio Cobos Álvarez <emi...@crisal.io> wrote:
I think references help to encode that a bit more in the type
On 06/27/2017 12:12 AM, Armen Zambrano Gasparnian wrote:
Asking around, looking on dxr or MDN did not yield something easily.
I don't want to have to use Marionette in this specific automation context.
Thanks in advance,
Armen
Do you mean fullscreen in chrome level, or running web pages in
On 05/18/2017 09:25 PM, Domenic Denicola wrote:
On Thursday, May 18, 2017 at 4:34:37 AM UTC-4, smaug wrote:
FWIW, I just yesterday suggested in #whatwg that the platform should have
something like IdlePromise or AsyncPromise.
And there is the related spec bug
https://github.com/whatwg/html
On 06/16/2017 02:32 AM, Jim Porter wrote:
On 6/15/17 4:12 PM, Kartikaya Gupta wrote:
Not quite. For e10s, mouse events are sent across the process boundary
using the PBrowser ipdl protocol. On the parent side they go into
EventStateManager::DispatchCrossProcessEvent [1] which picks up the
On 05/23/2014 04:29 AM, Anthony Jones wrote:
Some of you may remember the discussion on clang-format and the `mach
clang-format` command. What we have in place right now is very temporary
but it is functional enough to give it a try. I have not put the effort
into upstreaming my changes.
On 10/11/2017 09:55 PM, Andreas Tolfsen wrote:
+tools-marionette
Also sprach Chris Cooper:
Many of the build peers have long review queues.
Is having a long review queue the actual issue? Isn't (too) high throughput
at least equally bad issue. Does the new setup somehow try to ensure
reviews
On 10/18/2017 08:08 AM, Jet Villegas wrote:
SGTM. BTW, bug 143038 was filed 16 years ago. Is that a bugzilla record for
oldest fixed bug?
whoohoo, didn't realize it was that old.
One day I'll start reading the bugs I review ;)
That is, do I owe you another steak? :-)
On Wed, Oct 18, 2017
This is basically an after the fact notification that
we're in progress of implementing Shadow DOM again, this time v1[1].
While doing this, the v0 implementation, which was never exposed to the web,
will be removed.
v1 is luckily way simpler, so this all should simplify various bits in DOM.
On 11/27/2017 02:20 PM, smaug wrote:
This is basically an after the fact notification that
we're in progress of implementing Shadow DOM again, this time v1[1].
While doing this, the v0 implementation, which was never exposed to the web,
will be removed.
v1 is luckily way simpler, so this all
On 11/27/2017 01:05 PM, Nicolas B. Pierron wrote:
On 11/26/2017 12:45 AM, smaug wrote:
On 11/24/2017 06:35 PM, Eric Rescorla wrote:
On Thu, Nov 23, 2017 at 4:00 PM, smaug <sm...@welho.com> wrote:
On 11/23/2017 11:54 PM, Botond Ballo wrote:
I think it makes sense to hide a 'new
On 11/28/2017 06:33 AM, Boris Zbarsky wrote:
On 11/27/17 7:45 PM, Eric Rescorla wrote:
As for the lifetime question, can you elaborate on the scenario you are
concerned about.
Olli may have a different concern, but I'm thinking something like this:
for (auto foo : myFoos) {
foo->bar();
On 11/24/2017 06:35 PM, Eric Rescorla wrote:
On Thu, Nov 23, 2017 at 4:00 PM, smaug <sm...@welho.com> wrote:
On 11/23/2017 11:54 PM, Botond Ballo wrote:
I think it makes sense to hide a 'new' call in a Make* function when
you're writing an abstraction that handles allo
rom
it. Sure, prove it out. But we really don't need more moz-specific
constructs. We should choose our deviations carefully.
On Mon, Nov 27, 2017 at 3:24 AM, smaug <sm...@welho.com> wrote:
On 11/27/2017 01:05 PM, Nicolas B. Pierron wrote:
On 11/26/2017 12:45 AM, smaug wrote:
On 11/24/2
On 11/23/2017 11:54 PM, Botond Ballo wrote:
I think it makes sense to hide a 'new' call in a Make* function when
you're writing an abstraction that handles allocation *and*
deallocation.
So MakeUnique makes sense, because UniquePtr takes ownership of the
allocated object, and will deallocate it
Great work on wpt!
On 12/15/2017 05:38 PM, James Graham wrote:
Following the summary of what we achieved in wpt in the last year, I'd
like to solicit input from the gecko community to inform the
priorities of various pieces of wpt work for the next year.
In order to maximise the compatibility
On 11/17/2017 12:55 AM, Chung-Sheng Fu wrote:
Content Security Policy suggests Security Policy Violation DOM Events [1].
In case any of the directives within a policy are violated, such a
SecurityPolicyViolationEvent is generated and sent out to a reporting
endpoint associated with the policy.
This has been an issue forever, and there aren't really good tools on any
browser, as far as
I know, for web devs to debug their leaks.
Internally we do have useful data (CC and GC graphs and such), but would need
quite some ux skills to design some good
UI to deal with leaks. Also, the data to
On 11/02/2017 10:01 PM, Kris Maglione wrote:
On Thu, Nov 02, 2017 at 05:37:30PM +0200, smaug wrote:
This has been an issue forever, and there aren't really good tools on any
browser, as far as
I know, for web devs to debug their leaks.
Internally we do have useful data (CC and GC graphs
On 11/02/2017 09:58 PM, Kris Maglione wrote:
Related: I've been thinking for a long time that we need better tools for
tracking what sites/usage patterns are responsible for the time we spend in
CC (and possibly GC, but I think that tends to be less of a problem).
I've noticed, in particular,
since the end
of last year to push this forward by providing a correct microtask
scheduling (Thanks Olli(:smaug) for the major work of the new scheduling
patch) and fixing the test failures in our implementation discovered by the
scheduling change.
Good news is that we have all WPT green no
And let's be careful with the new C++ features, pretty please.
We managed to not be careful when we started to use auto, or ranged-for or
lambdas.
I'd prefer to not fix more security critical bugs or memory leaks just because
of fancy hip and cool
language features ;)
-Olli
On 10/30/2017
On 10/30/2017 04:52 PM, Simon Sapin wrote:
On 30/10/17 15:05, smaug wrote:
And let's be careful with the new C++ features, pretty please. We
managed to not be careful when we started to use auto, or ranged-for
or lambdas. I'd prefer to not fix more security critical bugs or
memory leaks just
On 10/21/2017 11:45 PM, Yura Zenevich wrote:
I would also like to bring to the team's attention another force worth
being on the radar (in terms of "forces on the system") - accessibility.
One theme that seems to consistently happen with re-writes such as the ones
from xul to React is
On 10/21/2017 01:14 PM, Philipp Kewisch wrote:
On 10/20/17 7:47 PM, Dave Townsend wrote:
For some time now we've been talking about moving away from XUL and XBL.
The browser architecture team has been hard at work figuring out how to go
about doing that and we're ready to share the first of our
+1
On Mon, Oct 30, 2017 at 8:03 AM, smaug <sm...@welho.com> wrote:
On 10/30/2017 04:52 PM, Simon Sapin wrote:
On 30/10/17 15:05, smaug wrote:
And let's be careful with the new C++ features, pretty please. We
managed to not be careful when we started to use auto, or ranged-for
or lambdas.
On 04/27/2018 12:14 AM, Ben Kelly wrote:
Hi all,
I just pushed another helper class that I thought others might find useful.
CopyableErrorResult is a specialized form of ErrorResult. Its intended to
allow slightly more rich error values to be passed through things like ipdl
structure and
Sounds very reasonable.
(Hoping the r=documentation flag won't be misused ;))
On 10/19/2017 04:37 PM, Andreas Tolfsen wrote:
Some time ago there was a discussion on dev-builds@ regarding
the state of our in-tree source code documentation. The main
focus was that MDN, moving forward, will
On 01/16/2018 11:41 PM, Mike Hommey wrote:
On Tue, Jan 16, 2018 at 10:02:12AM -0800, Ralph Giles wrote:
On Tue, Jan 16, 2018 at 7:51 AM, Jean-Yves Avenard
wrote:
But I would be interested in knowing how long that same Lenovo P710 takes
to compile *today*….
On my
On 02/09/2018 10:39 PM, James Graham wrote:
On 09/02/2018 19:59, Josh Bowman-Matthews wrote:
On 2/9/18 1:26 PM, James Graham wrote:
* One bug per PR we downstream, filed in a component determined by the files
changed in the PR.
What does this mean exactly? What is the desired outcome of
On 01/04/2018 12:30 AM, Ben Kelly wrote:
On Wed, Jan 3, 2018 at 5:09 PM, Gabriele Svelto wrote:
So after validating my approach in that bug (which is almost ready) I've
thought that it might be time to give the observer service the same
treatment. First of all we'd have a
On 06/20/2018 04:14 PM, Andrea Marchesini wrote:
Summary: The Clear-Site-Data header allows a secure origin to send a header
requesting the deletion of its own browsing data.
Bug: https://bugzilla.mozilla.org/show_bug.cgi?id=1268889
Link to standard:
I'm planning to keep Shadow DOM and Custom Elements turned on on beta/release
builds.
Target release is Firefox 63.
prefs are dom.webcomponents.customelements.enabled and
dom.webcomponents.shadowdom.enabled.
Custom elements has been enabled in Nightly since January and Shadow DOM since
late
sites, but there isn't too much
we can do other than trying to ship.
David
On 10 August 2018 at 15:49, smaug wrote:
I'm planning to keep Shadow DOM and Custom Elements turned on on
beta/release builds.
Target release is Firefox 63.
prefs are dom.webcomponents.customelements.enabled
Hi all,
I think it is good to let people know that some of the review requests in
Phabricator don't show up in Bugzilla.
https://bugzilla.mozilla.org/show_bug.cgi?id=1482110
So, if some review seems to take too much time, better to ping the requestee.
-Olli
On 08/15/2018 06:06 PM, darin.hens...@gmail.com wrote:
On Wednesday, August 15, 2018 at 5:56:06 AM UTC-5, smaug wrote:
On 08/15/2018 01:54 PM, smaug wrote:
On 08/14/2018 09:43 PM, darin wrote:
When it ships in version 63 will shadowdom and webcomponent be shipped disabled
or enabled
On 09/05/2018 06:40 AM, Kris Maglione wrote:
On Tue, Sep 04, 2018 at 07:37:28PM +0200, Dão Gottwald wrote:
This may have been discussed before since it's kind of an obvious question:
Was there a conscious decision not to post phabricator review comments to
bugzilla? It's a somewhat significant
On 07/12/2018 11:08 PM, Randell Jesup wrote:
I do hope that the 100 process figures scenario that was given is a worse case
scenario though...
It's not. Worst case is a LOT worse.
Shutting down threads/threadpools when not needed or off an idle timer
is a Good thing. There may be some perf
On 04/24/2018 09:25 AM, Andreas Tolfsen wrote:
Also sprach Bobby Holley:
For reasons outlined in bug 1450827, the DOM peers have decided to
deprecate support for JS-implemented WebIDL APIs. This means that
new additions of |JSImplementation="foo"| are no longer permitted.
Out of curiosity,
Hi all,
just some random notes about Phabricator.
I've been reviewing now a bunch of patches in Phabricator and the initial
feeling from
reviewer's point of view is that it is ok. Not great, but ok.
MozReview's interdiff, when it works, is easier to use or at least to discover
than
On 03/19/2018 09:30 PM, Kris Maglione wrote:
On Mon, Mar 19, 2018 at 08:49:10PM +0200, Henri Sivonen wrote:
It appears that currently we allow atomicizing invalid UTF-16 string,
which are impossible to look up by UTF-8 key and we don't allow
atomicizing invalid UTF-8.
I need to change some
On 04/25/2018 08:38 PM, Bobby Holley wrote:
On Wed, Apr 25, 2018 at 10:21 AM, Ted Mielczarek wrote:
On Wed, Apr 25, 2018, at 12:32 PM, Jeff Muizelaar wrote:
At minimum we should make --enable-profiling build with rust-opt.
This sounds reasonable, although the quirk is
On 08/30/2018 11:21 AM, Henri Sivonen wrote:
We have the following that a pattern in our code base:
1) SetCapacity(newCapacity) is called on an XPCOM string.
2) A pointer obtained from BeginWriting() is used for writing more
than Length() but no more than newCapacity code units to the XPCOM
On 09/19/2018 08:34 PM, Nicholas Alexander wrote:
2.
Making the main browser window be an HTML document with (mostly) HTML
DOM elements instead of a XUL document with (mostly) XUL DOM elements.
It is still mystery to me how the performance can be anywhere close to XUL when
starting
On 09/20/2018 04:21 PM, Mike Hommey wrote:
On Thu, Sep 20, 2018 at 12:18:49PM +0300, smaug wrote:
On 09/19/2018 08:34 PM, Nicholas Alexander wrote:
2.
Making the main browser window be an HTML document with (mostly) HTML
DOM elements instead of a XUL document with (mostly) XUL DOM
Hi all,
looks like I didn't send email about, IMO, rather useful environment variable
[1]:
MOZ_ALLOW_DOWNGRADE does the same thing as --allow-downgrade passed to firefox,
bypasses the profile downgrade protection.
(At least I need to bypass that all the time when testing various local and/or
Hi all,
I'm trying to disable document.createEvent("TouchEvent"), document.createTouch*
and ontouch* event handlers on desktop in
order to follow what has been done in other browsers.
See https://bugzilla.mozilla.org/show_bug.cgi?id=1412485
The issue is that some web pages use those features
Summary: queueMicrotask exposes the platform primitive to queue microtasks.
Without the API, web pages have used hacks around MutationObserver or Promise.
Bug: https://bugzilla.mozilla.org/show_bug.cgi?id=1480236
Link to standard:
And as with other data structures, be careful with modifications when using
range-based for.
We had plenty of crash issue with nsTArray + range-based for when we started to
use it.
-Olli
On 10/2/19 1:15 PM, Simon Giesecke wrote:
Hi,
I recently [1] added STL-style iterators and
FWIW, apparently the UI is in the devtools profiler UI, not in the profiler
addon.
https://profiler.firefox.com/ still tells users to install the addon from there.
I was told that one can get the button similar to the addon by enabling
devtools.performance.popup.enabled boolean pref and then
On 10/24/19 9:17 AM, Marcos Caceres wrote:
On Thursday, October 24, 2019 at 6:46:08 AM UTC+11, Christopher Manchester
wrote:
As announced in this week's project call, sccache-dist schedulers have been
deployed to mozilla offices, and those with hardware available can enroll
servers based on
Hi all,
during the past year, while optimizing page load by changing how various tasks
within Gecko are scheduled,
intermittently failing tests have often caused trouble and required fixes to
them or occasionally
disabling them. Now with Fission we are seeing even more issues and we will do
Hi all,
during the past year, while optimizing page load by changing how various tasks
within Gecko are scheduled,
intermittently failing tests have often caused trouble and required fixes to
them or occasionally
disabling them. Now with Fission we are seeing even more issues and we will do
On 10/3/19 1:18 AM, Andrew McCreight wrote:
On Wed, Oct 2, 2019 at 2:35 PM Geoff Lankow wrote:
Hi all, I need some advice.
I'm trying to enable Mochitest on debug builds of Thunderbird. It works
fine, except for the leak check, which finds a number of leaked windows
and docshells. Obviously
Summary: https://github.com/whatwg/dom/issues/911 proposes to add signal
property to AddEventListenerOptions
const ac = new AbortController();
target.addEventListener('fooEvent', (e) => { ... }, { signal: ac.signal } );
so that one can easily remove the event listener when AbortController is
201 - 258 of 258 matches
Mail list logo