Skip to content
Snippets Groups Projects
  1. May 10, 2023
  2. Apr 27, 2023
  3. Jan 31, 2023
  4. Jan 16, 2023
  5. Aug 09, 2022
  6. Oct 11, 2022
    • Eden Chuang's avatar
      Bug 1658869 - Propagate the InterceptedHttpChannel information to fetch's... · 566f5b90
      Eden Chuang authored
      Bug 1658869 - Propagate the InterceptedHttpChannel information to fetch's channel casued by FetchEvent.request. r=dom-worker-reviewers,dragana,jesup, a=dmeehan
      
      
      When a network load needs to be intercepted by ServiceWorker, we extract the Request from the InterceptedHttpChannel, and propagate the Request through FetchEvent.request.
      
      However, some needed information is not extracted or is modified during the Request propagation, so getting the wrong result when using the Request to fetch resources in the ServiceWorker script.
      
      Differential Revision: https://phabricator.services.mozilla.com/D145969
      566f5b90
  7. Sep 07, 2022
  8. Jun 03, 2022
    • Haik Aftandilian's avatar
      Bug 1770484 - Make Mac processes not depend on DYLD_LIBRARY_PATH to load... · 972716e6
      Haik Aftandilian authored
      Bug 1770484 - Make Mac processes not depend on DYLD_LIBRARY_PATH to load libraries r=glandium,gsvelto,mac-reviewers,necko-reviewers,dragana,spohl, a=dmeehan
      
      Change XUL and other dylibs to be built with an @rpath/<dylib> install name (LC_ID_DYLIB) instead of @executable_path/<dylib>.
      
      Change executables to be built with an @rpath dyld search path set to @executable_path by default so that @rpath/<dylib> dylibs in the same directory can be resolved. For executables not in the same directory as @rpath dylibs, such as plugin-container, set a relative @rpath such as @executable_path/../../../.
      
      Previously, dylib install names were set as @executable_path/<dylib> allowing them to be resolved by dyld for the loading executable if the executable resided in the same directory as the dylib. For executables not in the same directory as the dylibs, dyld resolved these dylibs using DYLD_LIBRARY_PATH set before launching the process by Firefox code. With this change, loading does not rely on DYLD environment variables. Instead, dylibs have an install name set as @rpath/<dylib> and each executable loading a dylib has its @rpath set at compile-time to refer to dylib directory.
      
      Differential Revision: https://phabricator.services.mozilla.com/D147360
      972716e6
  9. Jun 06, 2022
    • Haik Aftandilian's avatar
      Bug 1562756 - Code Injection in Firefox macOS desktop r=spohl, a=dmeehan · 8a8643de
      Haik Aftandilian authored
      Drop the com.apple.security.cs.allow-dyld-environment-variables entitlement to disallow use of dyld environment variables in signed production builds.
      
      Leave the entitlement in for signed developer builds.
      
      Firefox gtests depend on the use of DYLD_LIBRARY_PATH. However, testing infrastructure does not run gtests on signed builds and therefore gtests are not impacted by this change. gtests could be run on signed developer builds in the future which will still allow dyld environment variables after this change.
      
      browser.production.entitlements.xml and plugin-container.production.entitlements.xml are not used, but being kept up to date.
      
      Differential Revision: https://phabricator.services.mozilla.com/D148324
      8a8643de
  10. Jun 30, 2022
  11. May 27, 2022
  12. May 26, 2022
  13. May 25, 2022
  14. May 24, 2022
  15. May 23, 2022
  16. May 20, 2022
  17. May 19, 2022
  18. May 17, 2022
  19. May 16, 2022
  20. May 14, 2022
Loading