Is this just preventing auto-loading (like "click to play") or
completely disable Flash for non-http(s) contents?
Can users get back old behavior by flipping a preference?
We have developed a Firefox based tool to edit/view local EPub files,
which may contain Flash.
If this feature can't be
Hi Joel,
I spent about an hour tonight trying to debug a test failure, and I'm
writing this email in frustration at how difficult it is. It seems like the
process has actually gotten a lot worse over the last few years (although
it was never good). Here's the situation I ran into:
A test is failin
On Tuesday, February 7, 2017 at 10:16:27 PM UTC+1, Benjamin Smedberg wrote:
> I intend to ship a change which will prevent Flash from loading from file:,
> ftp:, or any other URL scheme other than http: or https:. The purpose of
> this change is to increase security and limit Flash to well-tested
On Tuesday, February 7, 2017 at 2:33:05 PM UTC-8, Gijs Kruitbosch wrote:
> Please can you add an alias into Services.jsm so that
> Services.locale. works ?
Yeah, filed bug https://bugzilla.mozilla.org/show_bug.cgi?id=1337551
>
> Also, that particular API looks like it might as well be a readonl
On 07/02/2017 19:38, zbranie...@mozilla.com wrote:
JS [2]:
```
const localeService = Components.classes["@mozilla.org/intl/localeservice;1"]
.getService(Components.interfaces.mozILocaleService);
const appLocales = localeService.getAppLocales();
Please can you add an alias into Services.jsm
On Tue, Feb 7, 2017, at 03:50 PM, Johnny Stenback wrote:
> Hey all,
>
> Over the coming weeks/months/years we'll be adding more and more Rust
> code
> into Gecko. As that work progresses (it's already in full swing in case
> you
> haven't been paying attention) it'll become more and more important
On 2/7/2017 1:15 PM, Benjamin Smedberg wrote:
I intend to ship a change which will prevent Flash from loading from file:,
ftp:, or any other URL scheme other than http: or https:. The purpose of
this change is to increase security and limit Flash to well-tested
configuraitons.
Do you want to a
I intend to ship a change which will prevent Flash from loading from file:,
ftp:, or any other URL scheme other than http: or https:. The purpose of
this change is to increase security and limit Flash to well-tested
configuraitons.
- file: same-origin security mechanism is different, and so t
TL;DR the Geolocation API will be restricted to secure contexts in
Firefox 55 (due in August).
Hi there,
as a follow-up to [1], we're moving forward to restrict Geolocation
API only to secure contexts.
This is due to a number of important reasons:
1. Chrome and Safari have already deprecated ins
Hey all,
Over the coming weeks/months/years we'll be adding more and more Rust code
into Gecko. As that work progresses (it's already in full swing in case you
haven't been paying attention) it'll become more and more important that we
collectively help ensure that we're being intentional in how t
On Tue, Feb 7, 2017 at 2:38 PM, Harald Kirschner wrote:
>
> To better understand the long tail of slow process startup, 95th
> percentile is over 5s, the context of this metric could :
>
I doubt that I'm the right person to own a deep dive into this, but I will
attempt to provide the answers I c
Hi devs,
intl/locale is going through a refactor phase to get us ready for the new
localization framework and the new l10n UX [0].
As part of it, we just landed a new LocaleService that is going to take over
from nsLocaleService and nsChromeRegistry as the API for locale negotiation for
the pl
Thanks Benjamin for kicking off this process understand how lower level
metrics fit into the higher level quality tracking.
To better understand the long tail of slow process startup, 95th percentile
is over 5s, the context of this metric could :
1) How often is a content process started during a
tl;dr - HARD tree closure from 0800PT - 1230PT
Builds in progress may burn - it's up to developers to re-trigger anything
they need.
-- Forwarded message --
From:
Date: Tue, Feb 7, 2017 at 11:18 AM
Subject: [Mozilla status] Scheduled : [TCW] Scheduled Tree Closing
Maintenance W
> Also, is there a way to get numbers for the
>> time from process launch to the point when we start loading the first URL
I think there is. There's this "startup timeline" stuff that we record
timestamps for:
http://searchfox.org/mozilla-central/rev/848c29538ab007fb95dc6cff194f0e3d3809613d/toolki
Thanks a lot for these numbers! Also, is there a way to get numbers for the
time from process launch to the point when we start loading the first URL
in the new content process? We run a lot of frame and process scripts
sooner than we would get there, and I'm afraid we would get even worse
numbers
This is the second update of project stockwell (first update:
https://goo.gl/1X31t8).
This month we will be recommending and asking that intermittent failures that
occur >=30 times/week be resolved within 2 weeks of triaging them.
Yesterday we had these stats:
Orange Factor: 10.75 (https://goo.
https://telemetry.mozilla.org/new-pipeline/dist.html#!cumulative=0&end_date=2017-02-06&keys=__none__!__none__!__none__&max_channel_version=aurora%252F53&measure=CONTENT_PROCESS_LAUNCH_TIME_MS&min_channel_version=null&product=Firefox&sanitize=1&sort_keys=submissions&start_date=2017-01-26&table=0&tri
On Tue, Feb 7, 2017 at 1:03 AM, Makoto Kato wrote:
> I will land bug 1215247 [1] this week since Fennec's team approves it,
> so all platform will use ICU and JS Intl API as default.
>
This is a huge amount of work -- congratulations to all involved!
Nick
___
On Tue, Feb 7, 2017, at 08:00 PM, Boris Zbarsky wrote:
> On 2/7/17 3:03 AM, Ku(顧思捷)CJ wrote:
> > https://drafts.fxtf.org/css-masking-1/#the-clip-path
> > https://drafts.csswg.org/css-shapes-1/#supported-basic-shapes
>
> How stable are these specs? They don't seem to be anywhere near CR, and
We plan to enable Pointer Events for mouse, touch and pen input in Firefox
Nightly builds (on Windows) within the next few weeks.
Related Bugs:
Bug 1315189 - Pointer events related bugs on Windows
Link to standard:
https://w3c.github.io/pointerevents/
Platform coverage: Windows
Target release:
On 2/7/17 3:03 AM, Ku(顧思捷)CJ wrote:
https://drafts.fxtf.org/css-masking-1/#the-clip-path
https://drafts.csswg.org/css-shapes-1/#supported-basic-shapes
How stable are these specs? They don't seem to be anywhere near CR, and
while I realize that's not a requirement, it would be good to have
I will land bug 1215247 [1] this week since Fennec's team approves it,
so all platform will use ICU and JS Intl API as default.
Also, some non-tier-1 platforms such as big endian architecture CPU
might require --with-system-icu to build Firefox with ICU [2].
-- Makoto / :m_kato
[1] https://bugz
After bug 1247229 is landed, we will turn clip-path basic shape clipping on
by default on all platforms and releases. It has been developed behind the
layout.css.clip-path-shapes.enabled flag from mozilla53.
Status in other browsers:
http://caniuse.com/#search=clip-path
Chrome: geometry-box is
24 matches
Mail list logo