Meeting 2019-10-31

Round table:

P1 bugs:

Regression:

Intend to expose:

  • Bug 1544231 'image/webp' to default value of the 'Accept' header

DoH study data

Next on triage duty: Junior

Kershaw

Landed or to land:

  • Bug 1592296 - [socket process] Use SSLTokensCache when socket process is enabled
  • Bug 1546660 - Fix nsHttpActivityDistributor
  • Bug 1589448 - Add network id change event (MacOS)

Ongoing:

  • Bug 1579049 - Expose all proxy CONNECT response codes
  • Bug 1370132 - Intermittent dom/base/test/test_bug435425.html | Wrong event! - got "load", expected "progress" | Wrong event! - got "loadend", expected "load" etc
  • Bug 1512471 - Proxy certificate validation from Socket Process/Socket Thread to Parent Process
  • Plan for landing socket process codes
  • https://docs.google.com/document/d/1cWa8MAXftfsxnrjLh5I_V2TgWquQj_ncSe0LkN-hQw0/edit?usp=sharing

Michal

  • [landed] 1589447 Add network id change event (linux)
  • [landed] 1589461 Add network id change event (Android)
  • [landed] 1550815 Crash in [@ xtolong]
  • [landed] 1583735 Find out why accessing mmaped JAR file generates SIGBUS
  • 1590299 Secure websocket fails after 5 minutes
  • 1545909 Hitting Back sometimes shows old cached content
  • https://github.com/mozilla-mobile/fenix/issues/6356
  • https://github.com/mozilla-mobile/fenix/issues/6360
  • rebase patches in bug 1394778

Junior

Bug 1545423 - WebExtension API for the amount of data sent/received

Bug 1580288 - Crash [@ Length] through [@ mozilla::net::nsHttpTransaction::SetHttpTrailer] due to pointer race

Bug 1544231 - Missing 'image/webp' in default value of the 'Accept' header

Bug 1589609 - overwrite of response header under few circumstances with new version of mozila browser (misparsed header format), this can disable many security headers

Bug 1592477 - non-deterministic output on failure: html/cross-origin-opener-policy/popup-redirect-cache.https.html

Andy

Neqo

DoH

  • Reviewed doc for picking initial TRR when multiple are available
  • Will likely be presenting on global canary in IETF ABCD (Application Behavior Considering DNS) BoF mid next month

Dragana

Http3 landed -> backed out -> Bug 1592927 - Test test_anonymous-coalescing is racy -> waiting for review

neqo

WebTransport

Secure proxy

Scoping DoH follow up work

mayhemer

done:

  • reviews
  • needinfo requests

in progress:

  • BT visualization
  • rel=preload