Re: Rust and Servo training sessions at Whistler

2015-06-08 Thread Jim Chen
Does the Servo session (which is earlier than the Rust session) require prior experience with Rust? Thanks, Jim On 6/8/15 3:44 PM, Lars Bergstrom wrote: The Research team will be holding a pair of 3 hour training sessions, with one on the new web rendering engine, Servo, and one on the new

Re: The War on Warnings

2015-06-08 Thread David Rajchenbach-Teller
Last time I looked at whitelisting non-fatal assertions, there was only the option to accept up-to a number of assertions. Have I missed something? Because a blank check to sweep assertions under the carpet is really an awful mechanism. Now, I fully agree that warnings that are not whitelisted

Re: nsIAboutModule::URI_SAFE_FOR_UNTRUSTED_CONTENT and add-on chrome

2015-06-08 Thread Bobby Holley
To specifically answer Geoff's question - the difference you're seeing between JS/CSS and docshell loads is that the former end up with the principal of the loader, whereas docshell loads end up with the principal of the loadee. Allowing content to load a chrome-privileged window is super

Re: The War on Warnings

2015-06-08 Thread ISHIKAWA,chiaki
Hi, On 2015/06/06 2:39, Eric Rahm wrote: On Friday, June 5, 2015 at 8:23:53 AM UTC-7, ISHIKAWA,chiaki wrote: After coping with voluminous messages in C-C TB |make mozmill| test suite log [much smaller volume than full FF logs], I think we should have NS_INFORMATION() macro that prints out an

Re: The War on Warnings

2015-06-08 Thread Ehsan Akhgari
On 2015-06-05 6:08 AM, David Rajchenbach-Teller wrote: This API covers all the needs I have encountered for warnings so far in JS code. I don't think it's terribly different in C++ code. For C++ non-fatal assertions, we already have a mechanism similar to this (but it doesn't rely on the

Re: The War on Warnings

2015-06-08 Thread Boris Zbarsky
On 6/8/15 4:28 PM, David Rajchenbach-Teller wrote: Last time I looked at whitelisting non-fatal assertions, there was only the option to accept up-to a number of assertions. You can specify an exact number or a range. But you're right that you can't specify the assertion text involved...

Re: nsIAboutModule::URI_SAFE_FOR_UNTRUSTED_CONTENT and add-on chrome

2015-06-08 Thread Geoff Lankow
Ah, perfect. Thanks Boris. On 09/06/15 03:18, Boris Zbarsky wrote: On 6/8/15 6:57 AM, Geoff Lankow wrote: If I have an about page marked URI_SAFE_FOR_UNTRUSTED_CONTENT, it happily loads css/js from chrome://browser (in fact, about:home does this), but throws a security error loading from

Re: Rust and Servo training sessions at Whistler

2015-06-08 Thread Lars Bergstrom
Jim, We won’t get into anything that requires prior Rust experience during the Servo session - the focus is intended to be more on architecture, web platform compat, and with a bit of poking around to make small changes (e.g., either fixing or breaking WPT and CSS WG ref tests with tiny code

Re: The War on Warnings

2015-06-08 Thread David Rajchenbach-Teller
The question is what is best: ignored warnings or ignored intermittent oranges? I assume that the latter have the best chance of being eventually fixed, but I'm not sure. On 05/06/15 18:17, Ryan VanderMeulen wrote: Uncaught Promise rejections were made fatal and for the most part go ignored

Re: Way to discarding xul is raising HTML.

2015-06-08 Thread Paul Rouget
Right. Not supported yet. On Mon, Jun 8, 2015 at 11:13 AM, 罗勇刚(Yonggang Luo) luoyongg...@gmail.com wrote: I also found in pure html window, there is no way to add support for context menu. And also popup. 2015-06-08 12:17 GMT+08:00 Paul Rouget p...@mozilla.com: B2G on desktop only uses

nsIAboutModule::URI_SAFE_FOR_UNTRUSTED_CONTENT and add-on chrome

2015-06-08 Thread Geoff Lankow
If I have an about page marked URI_SAFE_FOR_UNTRUSTED_CONTENT, it happily loads css/js from chrome://browser (in fact, about:home does this), but throws a security error loading from chrome://foo. Is this intentional? Should I be filing a bug somewhere? GL

Re: Way to discarding xul is raising HTML.

2015-06-08 Thread Yonggang Luo
I also found in pure html window, there is no way to add support for context menu. And also popup. 2015-06-08 12:17 GMT+08:00 Paul Rouget p...@mozilla.com: B2G on desktop only uses HTML. OS integration is poor, but we are working on it. See the larch branch

Re: Per-test chaos mode now available, use it to help win the war on orange!

2015-06-08 Thread kgupta
On Thursday, June 4, 2015 at 5:30:32 PM UTC-4, Chris Peterson wrote: Will chaos mode enabled tests run on Try and release branches? If a test has chaos mode enabled, then it will have chaos mode enabled on all branches, including Try and release branches. We don't know if chaos mode test

FW: [Firefox Desktop] Issues found: June 1st to June 5th

2015-06-08 Thread Florin Mezei
From: Firefox-qe [mailto:firefox-qe-boun...@mozilla.org] On Behalf Of Florin Mezei Sent: Monday, June 08, 2015 5:01 PM To: firefox...@mozilla.org; dev-platf...@mozilla.org; firefox-...@mozilla.org Cc: 'Lawrence Mandel' Subject: [Firefox Desktop] Issues found: June 1st to June 5th Hi

Re: mozglue.dll!jemalloc_crash

2015-06-08 Thread Meenakshi Shankar
On Friday, 5 June 2015 20:42:29 UTC+5:30, Kyle Huey wrote: You need to look further up the stack. jemalloc_crash is not an interesting stack frame. - Kyle On Fri, Jun 5, 2015 at 8:05 AM, Meenakshi Shankar hifromme...@gmail.com wrote: Hi, We are using Firefox SDKS for our FF

Re: Per-test chaos mode now available, use it to help win the war on orange!

2015-06-08 Thread kgupta
On Thursday, June 4, 2015 at 6:15:35 PM UTC-4, Chris AtLee wrote: Very interesting, thank you! Would there be a way to add an environment variable or harness flag to run all tests in chaos mode? There isn't at the moment but one can definitely be added if there is a use for it. At the

Re: nsIAboutModule::URI_SAFE_FOR_UNTRUSTED_CONTENT and add-on chrome

2015-06-08 Thread Boris Zbarsky
On 6/8/15 6:57 AM, Geoff Lankow wrote: If I have an about page marked URI_SAFE_FOR_UNTRUSTED_CONTENT, it happily loads css/js from chrome://browser (in fact, about:home does this), but throws a security error loading from chrome://foo. Is this intentional? Whether untrusted content can load