Re: Treeherder New Login Flow

2018-02-09 Thread Phil Ringnalda
On 2/9/18 9:30 AM, ha...@mozilla.com wrote:
> - Treeherder session will stay alive as long as access to the site
> happens once every 24 hours. 3 days session expiry is no longer in
> effect.

This doesn't seem to be the case: I'm logged in when I go to bed, and 7
hours later when I get up I'm logged out; I'm logged in when I leave for
work, and 4.5 hours later when I get home on my lunch hour I'm logged out.
___
dev-platform mailing list
dev-platform@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-platform


Re: Improved wpt-sync now running experimentally

2018-02-09 Thread James Graham

On 09/02/2018 19:59, Josh Bowman-Matthews wrote:

On 2/9/18 1:26 PM, James Graham wrote:
* One bug per PR we downstream, filed in a component determined by the 
files changed in the PR.


What does this mean exactly? What is the desired outcome of these bugs?


They're tracking the process and will be closed when the PR lands in 
central. They are used for notifying gecko developers about the incoming 
change, and in particular contain the information about tests that went 
from passing to failing, and other problems during the import.


They are not essential to the sync so if they end up not working well at 
keeping people informed we can revisit the approach.

___
dev-platform mailing list
dev-platform@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-platform


Re: Improved wpt-sync now running experimentally

2018-02-09 Thread Josh Bowman-Matthews

On 2/9/18 1:26 PM, James Graham wrote:
* One bug per PR we downstream, filed in a component determined by the 
files changed in the PR.


What does this mean exactly? What is the desired outcome of these bugs?

Cheers,
Josh
___
dev-platform mailing list
dev-platform@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-platform


Re: Improved wpt-sync now running experimentally

2018-02-09 Thread Boris Zbarsky

On 2/9/18 1:26 PM, James Graham wrote:
The new code is intended to provide the following improvements over the 
old periodic batch sync approach:


Thank you.  This is awesome.

-Boris
___
dev-platform mailing list
dev-platform@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-platform


Improved wpt-sync now running experimentally

2018-02-09 Thread James Graham
The new sync for web-platform-tests is now running experimentally. This 
provides two way sync between the w3c/web-platform-tests repository on 
GitHub and mozilla-central, so allowing gecko developers to contribute 
to web-platform-tests using their normal gecko workflow, and ensuring 
that we get all the upstream changes submitted by the community 
including engineers at Google, Apple, and Microsoft.


The new code is intended to provide the following improvements over the 
old periodic batch sync approach:


* Faster sync. The code to actually land changes to mozilla-central is 
still undergoing testing, but the intent is that we can get at least one 
wpt update per day once the system is fully operational.


* One bug per PR we downstream, filed in a component determined by the 
files changed in the PR.


* One PR per bug we upstream. Currently this will be created when a 
patch lands on inbound or autoland and should be merged when the patch 
reaches central. In some hypothetical future world in which there's a 
single entry point for submitting code to land in gecko (e.g. 
phabricator) this will change so that the PR is created when the code is 
submitted for review, so that upstream test results are available before 
landing (see next point).


* Upstream CI jobs run on PRs originating from gecko repositories. 
Previously we skipped upstream travis jobs on pushes we landed, 
occasionally causing breakage as a result. Now these jobs are run on all 
our pushes and the original bug should get a notification if the jobs fail.


* Notifications of notable changes introduced by upstream PRs. In 
particular we will add a comment when tests that used to pass start to 
not pass, when there are crashes or disabled tests, and for new tests 
that fail. This notification happens in the bug for the sync, but there 
is already an issue open to move things that obviously require attention 
(e.g. crashes) into their own bug.


If you notice problems with the sync, please file an issue [1] or 
complain in #wpt-sync on irc.  The project team consists of:


* jgraham and maja_zf (development, primary contacts)
* AutomatedTester (project management)

Issues are not unanticipated at this time, so thanks in advance for your 
patience as we work out the kinks in the system.


[1] https://github.com/mozilla/wpt-sync/issues

___
dev-platform mailing list
dev-platform@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-platform


Treeherder New Login Flow

2018-02-09 Thread haali
Hi,

I am writing to inform you about Treeherder’s new login flow.  In the past, 
logging in with Treeherder meant being redirected to the login.taskcluster.net 
service. This had a couple of drawbacks, but one of the main annoyance was that 
credentials expired every 3 days. You are probably already familiar with the 
following error: "Your credentials are expired. They must expire every 3 days 
(Bug 1328434). Log out and back in again to refresh your credentials."

The new login flow now uses Auth0 instead of login.taskcluster.net for SSO. 
Some relevant information to note:

- When you login for the first time, you will get a prompt asking permission 
for treeherder.mozilla.org to access “full-user-credentials”. It’s not 
something to be worried about. This is simply a request to access your 
taskcluster credentials. Bug 1437116 was created to change that to 
"taskcluster-credentials”.

- Treeherder session will stay alive as long as access to the site happens once 
every 24 hours. 3 days session expiry is no longer in effect.

- If an email is associated with multiple login providers, then the most secure 
login method should be used (LDAP > GitHub 2FA > GitHub > Google > 
Passwordless).

Thanks,
Hassan
___
dev-platform mailing list
dev-platform@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-platform


Re: Chrome will start marking HTTP pages as "Not secure"

2018-02-09 Thread Johann Hofmann
Yeah, there's a team working on this stuff (and they/we have been in
touch with the Chrome people for a long time) and this is not a call we
should make on a mailing list. There's a valid concern around warning
fatigue (plastering so many sites with "Insecure" that users easily
dismiss it) and we made those prefs to be able to run user studies on it.

I believe the original question was whether there are any blockers to
shipping this in Firefox right now. Technically? No. We should still
give product the chance to take a good look at the potential impact and
how it works in our design concept and not make this a race to the moon.

Thanks

Johann

Jonathan Kingston wrote:
> Hey,
> 
> So we have two issues here:
> - We have less testing on security.insecure_connection_text.enabled
> - security.insecure_connection_icon.enabled is a lot heavier handed as MT
> notes and also we use this for insecure passwords too.
> 
> We also have the pbmode variants if we wanted both enabled when in Private
> Browsing mode.
> 
> We are discussing the impact of shipping the "Not Secure" text with product
> at the moment which is likely much safer to ship right now.
> 
> Thanks
> Jonathan
> 
> On Fri, Feb 9, 2018 at 2:02 PM, Tom Schuster  wrote:
> 
>> If you flip just security.insecure_connection_text.enabled and not
>> security.insecure_connection_icon.enabled you get Chrome's behavior.
>> Flipping both gives you the broken lock and the "Not Secure" text. I
>> don't see a big difference there and I hope we can ship this as soon
>> as possible.
>>
>> On Fri, Feb 9, 2018 at 1:55 AM, Martin Thomson  wrote:
>>> +ffxdev
>>>
>>> There's a tangible difference between text saying "Not Secure" and a
>>> broken lock icon.  I think that we're close, but we'd be making a
>>> stronger statement than Chrome if we did this.
>>>
>>> On Fri, Feb 9, 2018 at 8:17 AM, Chris Peterson 
>> wrote:
 Chrome will start marking HTTP pages as "Not secure" in July 2018
>> (Chrome
 68):

 https://security.googleblog.com/2018/02/a-secure-web-is-
>> here-to-stay.html
 Firefox has a similar insecure HTTP warning icon, currently disabled by
>> the
 `security.insecure_connection_icon.enabled` pref added in bug 1310447.

 Are there any blockers for Firefox shipping this feature?
 ___
 dev-platform mailing list
 dev-platform@lists.mozilla.org
 https://lists.mozilla.org/listinfo/dev-platform
>>> ___
>>> firefox-dev mailing list
>>> firefox-...@mozilla.org
>>> https://mail.mozilla.org/listinfo/firefox-dev
>>>
>> ___
>> dev-platform mailing list
>> dev-platform@lists.mozilla.org
>> https://lists.mozilla.org/listinfo/dev-platform
>>
> ___
> dev-platform mailing list
> dev-platform@lists.mozilla.org
> https://lists.mozilla.org/listinfo/dev-platform
___
dev-platform mailing list
dev-platform@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-platform


Re: Chrome will start marking HTTP pages as "Not secure"

2018-02-09 Thread Jonathan Kingston
Hey,

So we have two issues here:
- We have less testing on security.insecure_connection_text.enabled
- security.insecure_connection_icon.enabled is a lot heavier handed as MT
notes and also we use this for insecure passwords too.

We also have the pbmode variants if we wanted both enabled when in Private
Browsing mode.

We are discussing the impact of shipping the "Not Secure" text with product
at the moment which is likely much safer to ship right now.

Thanks
Jonathan

On Fri, Feb 9, 2018 at 2:02 PM, Tom Schuster  wrote:

> If you flip just security.insecure_connection_text.enabled and not
> security.insecure_connection_icon.enabled you get Chrome's behavior.
> Flipping both gives you the broken lock and the "Not Secure" text. I
> don't see a big difference there and I hope we can ship this as soon
> as possible.
>
> On Fri, Feb 9, 2018 at 1:55 AM, Martin Thomson  wrote:
> > +ffxdev
> >
> > There's a tangible difference between text saying "Not Secure" and a
> > broken lock icon.  I think that we're close, but we'd be making a
> > stronger statement than Chrome if we did this.
> >
> > On Fri, Feb 9, 2018 at 8:17 AM, Chris Peterson 
> wrote:
> >> Chrome will start marking HTTP pages as "Not secure" in July 2018
> (Chrome
> >> 68):
> >>
> >> https://security.googleblog.com/2018/02/a-secure-web-is-
> here-to-stay.html
> >>
> >> Firefox has a similar insecure HTTP warning icon, currently disabled by
> the
> >> `security.insecure_connection_icon.enabled` pref added in bug 1310447.
> >>
> >> Are there any blockers for Firefox shipping this feature?
> >> ___
> >> dev-platform mailing list
> >> dev-platform@lists.mozilla.org
> >> https://lists.mozilla.org/listinfo/dev-platform
> >
> > ___
> > firefox-dev mailing list
> > firefox-...@mozilla.org
> > https://mail.mozilla.org/listinfo/firefox-dev
> >
> ___
> dev-platform mailing list
> dev-platform@lists.mozilla.org
> https://lists.mozilla.org/listinfo/dev-platform
>
___
dev-platform mailing list
dev-platform@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-platform


Intent to remove: Throttling of timeouts from tracking scripts

2018-02-09 Thread Andreas Farre
TL;DR We have decided to not (re-)turn on throttling of timeouts from
tracking scripts, and also remove throttling of timeouts from tracking
scripts altogether.

This feature was, in the beginning, only intended for tabs in the
background, but experiments were also conducted to see the effect of
throttling for foreground tabs. These experiments showed that users
became inclined to abandon pages to a higher degree than before, and
after letting the feature be turned on for Nightly for a period of
time, issues that would actually block user interaction were noticed.

Actually being able to resolve these issues for foreground tabs is
difficult, especially in light of how we schedule timeout events after
the rewrite that allowed us to only use a single timer per
window[1,2]. Even being able to solve the issues related to throttling
of background tracking timeouts would introduce unwarranted
complexity, and by instead removing throttling of timeouts from
tracking scripts we would reduce complexity of timeout handling.

The silver lining is that the importance of throttling of timeouts
from tracking scripts has been reduced since we started throttling all
timeouts from background windows using the background execution
budget, to the degree that we are confident that throttling of
tracking timeouts is not as necessary anymore.

Cheers,
Andreas

[1] Bug 1363829: https://bugzilla.mozilla.org/show_bug.cgi?id=1363829
[2] Bug 1371787: https://bugzilla.mozilla.org/show_bug.cgi?id=1371787
___
dev-platform mailing list
dev-platform@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-platform


Re: Chrome will start marking HTTP pages as "Not secure"

2018-02-09 Thread Tom Schuster
If you flip just security.insecure_connection_text.enabled and not
security.insecure_connection_icon.enabled you get Chrome's behavior.
Flipping both gives you the broken lock and the "Not Secure" text. I
don't see a big difference there and I hope we can ship this as soon
as possible.

On Fri, Feb 9, 2018 at 1:55 AM, Martin Thomson  wrote:
> +ffxdev
>
> There's a tangible difference between text saying "Not Secure" and a
> broken lock icon.  I think that we're close, but we'd be making a
> stronger statement than Chrome if we did this.
>
> On Fri, Feb 9, 2018 at 8:17 AM, Chris Peterson  wrote:
>> Chrome will start marking HTTP pages as "Not secure" in July 2018 (Chrome
>> 68):
>>
>> https://security.googleblog.com/2018/02/a-secure-web-is-here-to-stay.html
>>
>> Firefox has a similar insecure HTTP warning icon, currently disabled by the
>> `security.insecure_connection_icon.enabled` pref added in bug 1310447.
>>
>> Are there any blockers for Firefox shipping this feature?
>> ___
>> dev-platform mailing list
>> dev-platform@lists.mozilla.org
>> https://lists.mozilla.org/listinfo/dev-platform
>
> ___
> firefox-dev mailing list
> firefox-...@mozilla.org
> https://mail.mozilla.org/listinfo/firefox-dev
>
___
dev-platform mailing list
dev-platform@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-platform


Re: gkrust compilation RAM requirements and 32-bit systems

2018-02-09 Thread Henri Sivonen
On Fri, Feb 9, 2018 at 12:00 PM, Emilio Cobos Álvarez  wrote:
> On 02/09/2018 10:49 AM, Henri Sivonen wrote:
>> Is there some trick to make gkrust compilation succeed on a 32-bit system?
>
> The BSD folks seem to be using --disable-debug-symbols for that, see
> https://bugzilla.mozilla.org/show_bug.cgi?id=1401093

Thanks. Filed https://bugzilla.mozilla.org/show_bug.cgi?id=1436981 .
(gkrust completed. libxul linking still ahead. Building with -j 1
isn't very fast...)

On Fri, Feb 9, 2018 at 1:31 PM, Ted Mielczarek  wrote:
> https://convolv.es/blog/2017/08/25/building-firefox-for-linux-32-bit/

There seems to be a step that involves running code within the chroot
environment to set thing up. I take it that to target armv7, the host
would then need to be aarch64 and not x86_64? Or maybe one could run
mach bootstrap on a real ARMv7 system and then dump the file system to
an external disk and move that over?

Anyway, considering how complicated this is, it would be great to have
try server targets for ARMv7+NEON GNU/Linux and aarch64 GNU/Linux for
testing stuff in a hopefully Android-representative way when using
actual Android looks even messier. (Running gtest microbenchmarks on
hardware that, unlike phones, has stable clock speed under
single-threaded 100% load but hopefully is close enough to phones in
terms of core design to be representative.)

-- 
Henri Sivonen
hsivo...@hsivonen.fi
https://hsivonen.fi/
___
dev-platform mailing list
dev-platform@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-platform


Re: PSA: HTML injection in chrome documents is now automatically sanitized

2018-02-09 Thread Frederik Braun
My bad! This is certainly a bug in the linter.
The fix is underway.

On 09.02.2018 12:35, Gijs Kruitbosch wrote:
> Sorry about the waste of time. :-(
> 
> Re: difficulty: it depends on your measure of 'very'. Internally the
> sanitization is whitelist-based. It is used in many places (not just for
> chrome-privileged docs), where it would be wrong to show warnings
> (possibly very *many* warnings!). It may be possible to add a flag to
> the sanitizer to log warnings for every removed attribute/element, and
> to pass that explicitly from the callsites that Kris added. It'd be
> worth filing a bug for that.
> 
> To be honest, I would have expected there to have been an eslint error
> if using innerHTML/createContextualFragment with anything other than a
> fixed string, which might have saved you a lot of headache. If that
> linter isn't catching createContextualFragment, then we need to fix the
> linter so that it does. If you were using a fixed string that got
> sanitized, can you point me to the bug/patch that you're working on? I'm
> having trouble thinking of cases where we use innerHTML with fixed
> content that would get sanitized in this way, without any
> injection/replacement, but perhaps I'm missing something.
> 
> ~ Gijs
> 
> On 09/02/2018 02:18, Brendan Dahl wrote:
>> Would it be very difficult to warn when something is sanitized and
>> removed?
>>
>> I wasted a good deal of time trying to figure out why
>> createContextualFragment wasn't working.
>>
>> On Fri, Feb 2, 2018 at 2:10 AM, Gijs Kruitbosch
>> 
>> wrote:
>>
>>> FWIW, if you're running into this with the usecase "I have a localized
>>> string that needs to have links (or other markup) in it" and were
>>> formerly
>>> using getFormattedString combined with innerHTML, we now have a utility
>>> method that can help a little bit. Rather than hand-rolling splitting
>>> the
>>> string etc., on nightly you can use BrowserUtils.getLocalizedFragment as
>>> a replacement. Given a document, raw string (fetch using getString /
>>> GetStringFromName instead of the "formatted" APIs), and DOM nodes to
>>> insert, it'll produce a DocumentFragment that you can
>>> appendChild/insertBefore etc., take care of splitting your strings
>>> for you,
>>> and will work with both indexed (%1$S) and non-indexed (%S) replacement
>>> points in the localized string. In the further future, I expect this
>>> type
>>> of problem will go away entirely because of Fluent.
>>>
>>> ~ Gijs
>>>
>>>
>>> On 02/02/2018 07:13, Kris Maglione wrote:
>>>
 As of bug 1432966, any HTML injected into chrome-privileged
 documents[1]
 is automatically sanitized to remove any possibility of script
 execution.
 The sanitization is whitelist-based, and only allows a limited set
 of HTML
 elements and attributes. All scripts, XUL nodes, or privileged URLs
 will
 automatically be removed. This change has been uplifted all the way
 to 58
 release.

 If you're thinking about writing new code that injects HTML strings
 into
 chrome-privileged documents, please think again. Unless it's extremely
 simple, it probably won't be compatible with these changes (and will
 also
 be rejected by our default ESLint rules).

 Existing HTML injection in chrome documents is being gradually removed.
 Once that's done, the sanitization may be replaced with an outright
 prohibition.


 -Kris

 [1]: Using the usual HTML fragment creation methods such as
 `innerHTML`,
 `outerHTML`, `insertAdjacentHTML`, and `createContextualFragment`. Not,
 notably, when using document.write().
 ___
 firefox-dev mailing list
 firefox-...@mozilla.org
 https://mail.mozilla.org/listinfo/firefox-dev

>>>
>>>
>>> ___
>>> firefox-dev mailing list
>>> firefox-...@mozilla.org
>>> https://mail.mozilla.org/listinfo/firefox-dev
>>>
> 
> ___
> dev-platform mailing list
> dev-platform@lists.mozilla.org
> https://lists.mozilla.org/listinfo/dev-platform
___
dev-platform mailing list
dev-platform@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-platform


Re: PSA: HTML injection in chrome documents is now automatically sanitized

2018-02-09 Thread Gijs Kruitbosch

Sorry about the waste of time. :-(

Re: difficulty: it depends on your measure of 'very'. Internally the 
sanitization is whitelist-based. It is used in many places (not just for 
chrome-privileged docs), where it would be wrong to show warnings 
(possibly very *many* warnings!). It may be possible to add a flag to 
the sanitizer to log warnings for every removed attribute/element, and 
to pass that explicitly from the callsites that Kris added. It'd be 
worth filing a bug for that.


To be honest, I would have expected there to have been an eslint error 
if using innerHTML/createContextualFragment with anything other than a 
fixed string, which might have saved you a lot of headache. If that 
linter isn't catching createContextualFragment, then we need to fix the 
linter so that it does. If you were using a fixed string that got 
sanitized, can you point me to the bug/patch that you're working on? I'm 
having trouble thinking of cases where we use innerHTML with fixed 
content that would get sanitized in this way, without any 
injection/replacement, but perhaps I'm missing something.


~ Gijs

On 09/02/2018 02:18, Brendan Dahl wrote:

Would it be very difficult to warn when something is sanitized and removed?

I wasted a good deal of time trying to figure out why
createContextualFragment wasn't working.

On Fri, Feb 2, 2018 at 2:10 AM, Gijs Kruitbosch 
wrote:


FWIW, if you're running into this with the usecase "I have a localized
string that needs to have links (or other markup) in it" and were formerly
using getFormattedString combined with innerHTML, we now have a utility
method that can help a little bit. Rather than hand-rolling splitting the
string etc., on nightly you can use BrowserUtils.getLocalizedFragment as
a replacement. Given a document, raw string (fetch using getString /
GetStringFromName instead of the "formatted" APIs), and DOM nodes to
insert, it'll produce a DocumentFragment that you can
appendChild/insertBefore etc., take care of splitting your strings for you,
and will work with both indexed (%1$S) and non-indexed (%S) replacement
points in the localized string. In the further future, I expect this type
of problem will go away entirely because of Fluent.

~ Gijs


On 02/02/2018 07:13, Kris Maglione wrote:


As of bug 1432966, any HTML injected into chrome-privileged documents[1]
is automatically sanitized to remove any possibility of script execution.
The sanitization is whitelist-based, and only allows a limited set of HTML
elements and attributes. All scripts, XUL nodes, or privileged URLs will
automatically be removed. This change has been uplifted all the way to 58
release.

If you're thinking about writing new code that injects HTML strings into
chrome-privileged documents, please think again. Unless it's extremely
simple, it probably won't be compatible with these changes (and will also
be rejected by our default ESLint rules).

Existing HTML injection in chrome documents is being gradually removed.
Once that's done, the sanitization may be replaced with an outright
prohibition.


-Kris

[1]: Using the usual HTML fragment creation methods such as `innerHTML`,
`outerHTML`, `insertAdjacentHTML`, and `createContextualFragment`. Not,
notably, when using document.write().
___
firefox-dev mailing list
firefox-...@mozilla.org
https://mail.mozilla.org/listinfo/firefox-dev




___
firefox-dev mailing list
firefox-...@mozilla.org
https://mail.mozilla.org/listinfo/firefox-dev



___
dev-platform mailing list
dev-platform@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-platform


Re: gkrust compilation RAM requirements and 32-bit systems

2018-02-09 Thread Ted Mielczarek
On Fri, Feb 9, 2018, at 4:49 AM, Henri Sivonen wrote:
> Is it expected that Firefox can no longer be built on a 32-bit system?

Yes.
 
> The cross-compilation documentation on MDN seems to predate Rust code
> in Firefox. Is there an up-to-date guide for compiling Firefox for
> ARMv7+NEON (or aarch64 for that matter) GNU/Linux on an x86_64
> GNU/Linux host?

I don't know that there have ever been good docs for this scenario--our 
well-supported cross-compile scenario is Android, which has its own SDK. 
Cross-compiling other things on Linux without a chroot is a giant PITA. jryans 
did write a good blog post[1] last year about building a 32-bit Firefox on 
64-bit Linux, which might be useful. AFAIK Rust is the easy part, since you can 
just `rustup target add armv7-unknown-linux-gnueabihf` or whatever target you 
need. Getting all the -dev packages for various system libraries is the hard 
part.

-Ted

1. https://convolv.es/blog/2017/08/25/building-firefox-for-linux-32-bit/
___
dev-platform mailing list
dev-platform@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-platform


Re: gkrust compilation RAM requirements and 32-bit systems

2018-02-09 Thread Emilio Cobos Álvarez


On 02/09/2018 10:49 AM, Henri Sivonen wrote:
> Is there some trick to make gkrust compilation succeed on a 32-bit system?

The BSD folks seem to be using --disable-debug-symbols for that, see
https://bugzilla.mozilla.org/show_bug.cgi?id=1401093

 -- Emilio
___
dev-platform mailing list
dev-platform@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-platform


gkrust compilation RAM requirements and 32-bit systems

2018-02-09 Thread Henri Sivonen
Previously, the RAM-critical operation during Firefox build was
linking libxul, which on Linux was known not to work with 1 GB of RAM
but did work with 2 GB of RAM.

Now, when trying to build Firefox (opt build) on ARMv7 Linux with 2.3
GB of *free* RAM at the start of the build, building gkrust fails.
(Nightly rustc OOMs and stable rustc causes the system to reboot.)

Do I understand correctly that even on an ARMv7 system that has more
than 2 GB of physical RAM, a userspace process (rustc) can address
only 2 GB and, therefore, with 2.4 GB free at the start of the build
and build failing with -j 1, rustc got the maximal RAM it can possibly
get?

(The reboot bit suggest something other than mere userland virtual
address space exhaustion, though. This is with a Chrome OS kernel that
doesn't let me enable swap.)

Is it expected that Firefox can no longer be built on a 32-bit system?

Is there some trick to make gkrust compilation succeed on a 32-bit system?

The cross-compilation documentation on MDN seems to predate Rust code
in Firefox. Is there an up-to-date guide for compiling Firefox for
ARMv7+NEON (or aarch64 for that matter) GNU/Linux on an x86_64
GNU/Linux host?

-- 
Henri Sivonen
hsivo...@hsivonen.fi
https://hsivonen.fi/
___
dev-platform mailing list
dev-platform@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-platform


Re: PSA: HTML injection in chrome documents is now automatically sanitized

2018-02-09 Thread zbraniecki
On Friday, February 2, 2018 at 2:11:02 AM UTC-8, Gijs Kruitbosch wrote: 
> In the further future, I expect this type of problem will go away 
> entirely because of Fluent.


That's correct! Fluent brings the concept of DOM Overlays which allow for safe 
mixing between developer provided DOM fragments and localization.

We're currently completing the feature set of DOM Overlays to allow for element 
ordering (to allow translations to reorder elements in a localizable fragment), 
but the core functionality is in tree and is used in the current migration of 
Preferences to Fluent.

It's all sanitized and safe following W3C localization guidelines. :)

zb.
p.s. the timeline for when you'll be able to use Fluent is a bit in flux. We're 
currently testing Fluent migrating Preferences to it and need a bit more time 
to gain confidence that all parts of the system are ready - we wouldn't want 
you to start using it for your component and then have to tell you to stop, 
because some feature is not ready yet. Hope to unblock Fluent for new code soon!
___
dev-platform mailing list
dev-platform@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-platform