Closed
Bug 1064496
Opened 10 years ago
Closed 10 years ago
Update pdf.js to version 1.0.801
Categories
(Firefox :: PDF Viewer, task, P2)
Firefox
PDF Viewer
Tracking
()
RESOLVED
FIXED
Firefox 35
People
(Reporter: jimm, Assigned: RyanVM)
References
(Blocks 1 open bug)
Details
(Whiteboard: [pdfjs-c-integration])
Attachments
(1 file, 3 obsolete files)
95.63 KB,
patch
|
yury
:
review+
|
Details | Diff | Splinter Review |
+++ This bug was initially created as a clone of Bug #995431 +++
+++ This bug was initially created as a clone of Bug #990852 +++
We're going to bring the e10s changes down with a fresh merge. This sill also need to land with a patch from bug 942707.
Reporter | ||
Comment 1•10 years ago
|
||
(In reply to Jim Mathies [:jimm] from comment #0)
> +++ This bug was initially created as a clone of Bug #995431 +++
>
> +++ This bug was initially created as a clone of Bug #990852 +++
>
> We're going to bring the e10s changes down with a fresh merge. This sill
> also need to land with a patch from bug 942707.
s/this sill/this will
Reporter | ||
Comment 3•10 years ago
|
||
Not yet apparently, yury is waiting on some reviews.
Updated•10 years ago
|
Priority: -- → P2
Whiteboard: [pdfjs-c-integration]
Assignee | ||
Comment 4•10 years ago
|
||
Changes since last update:
#5209 Set transformOrigin for text layer in css.
#5219 Avoid creating intermediate strings in sanitizeMetrics
#5232 Chrome extension: Isolate pageAction logic
#5240 In src/display/api.js, add documentation for the |progressCallback| parameter in |PDFJS.getDocument|
#5242 Fix for minutes tz calculation in document properties
#5237 Fix the placement of the findInput loading indicator in RTL locales
#5259 Handtool: Remove focus from previous node on click
#5251 Add basic support for ZapfDingbats
#5249 CCITTFaxStream parser: resolve xref if needed
#5260 Add more cases to |mapSpecialUnicodeValues| to fix the rendering of various Symbol encoded brackets
#5267 Version 1.0.712
#5226 Fix Zoom box resizing when it's hidden when the viewer loads (issue 5224)
#5248 Add getStats unit test
#5276 Fix handling of RGBA buffers in CalRGB colorspace (issue 5270)
#5235 Remove a duplicate PDF file from the test suite
#5221 Don't scale single-char text divs.
#5281 Fetches params in makeFilter
#5229 Auto zoom landscape documents (like slide presentations) to fit their height
#5271 Opera fixes
#5247 Fix links to wiki subsections and remove TextDecoder feature tests
#5284 Fetch decodeParams if it's a |Ref| in JBIG2Decode streams
#5289 Fixed typo in core/jpx.js #5227
#5287 Bug 1031612 - In PDF Viewer, the buggy XMP title "Untitled" overrides th...
#5286 Fix loading of inline JPEG images
#5254 Avoid showing 'blob..' as a title when using pdfjs from B2G
#5233 Workaround for TrueType fonts with exotic cmap tables (bug 1057544)
#5302 Removes examples from jsbin.com
#5275 Fix the exception propagation when rejecting workerReadyCapability
#5245 Further amend GlyphMapForStandardFonts (issue 5244)
#5306 Update zh-TW translation
#5305 Miscellaneous e10s fixes
Depends on: 1055570
Summary: Update pdf.js to version (?) → Update pdf.js to version 1.0.794
Assignee | ||
Comment 5•10 years ago
|
||
Attachment #8491639 -
Flags: review?(ydelendik)
Reporter | ||
Comment 6•10 years ago
|
||
Thanks for working on this! I think you'll get try failures though, we're going to need this patch too -
https://bugzilla.mozilla.org/attachment.cgi?id=8458044&action=diff
Assignee | ||
Comment 7•10 years ago
|
||
(In reply to Jim Mathies [:jimm] from comment #6)
> Thanks for working on this! I think you'll get try failures though, we're
> going to need this patch too -
>
> https://bugzilla.mozilla.org/attachment.cgi?id=8458044&action=diff
With that applied also:
https://tbpl.mozilla.org/?tree=Try&rev=343fcf7da46f
Reporter | ||
Comment 8•10 years ago
|
||
I guess e10s tests are still disabled, so both pushes will probably succeed. I'll need to land the browser.ini part of the tests patch and the e10s browser patch in bug 942707 in a follow up.
So assuming the first try push comes up green (probably will) you can land that, and I'll get the rest landed after the work here is on mc.
Assignee | ||
Comment 9•10 years ago
|
||
Comment on attachment 8491639 [details] [diff] [review]
Update pdf.js to version 1.0.794
This has changes that need Mossop's blessing as well.
Attachment #8491639 -
Flags: review?(dtownsend+bugmail)
Comment 10•10 years ago
|
||
Comment on attachment 8491639 [details] [diff] [review]
Update pdf.js to version 1.0.794
Review of attachment 8491639 [details] [diff] [review]:
-----------------------------------------------------------------
The amount of synchronous messaging here concerns me and I'd like to know that there re bugs on file to deal with that.
::: browser/extensions/pdfjs/content/PdfJs.jsm
@@ +42,5 @@
> XPCOMUtils.defineLazyServiceGetter(Svc, 'pluginHost',
> '@mozilla.org/plugin/host;1',
> 'nsIPluginHost');
> +XPCOMUtils.defineLazyModuleGetter(this, "BrowserUtils",
> + "resource://gre/modules/BrowserUtils.jsm");
Seems to be unused
::: browser/extensions/pdfjs/content/PdfStreamConverter.jsm
@@ +51,5 @@
> +XPCOMUtils.defineLazyModuleGetter(this, 'PdfjsContentUtils',
> + 'resource://pdf.js/PdfjsContentUtils.jsm');
> +
> +XPCOMUtils.defineLazyModuleGetter(this, "BrowserUtils",
> + 'resource://gre/modules/BrowserUtils.jsm');
Also unused
::: browser/extensions/pdfjs/content/PdfjsChromeUtils.jsm
@@ +31,5 @@
> +Cu.import('resource://gre/modules/XPCOMUtils.jsm');
> +Cu.import('resource://gre/modules/Services.jsm');
> +
> +XPCOMUtils.defineLazyModuleGetter(this, "BrowserUtils",
> + "resource://gre/modules/BrowserUtils.jsm");
Again, not used
@@ +138,5 @@
> + // with the content process. _ppmm is currently the global process
> + // manager, which means this is going to fire to every child process
> + // we have open. Unfortunately I can't find a way to get at that
> + // process specific mm from js.
> + this._ppmm.broadcastAsyncMessage("PDFJS:Child:refreshSettings", {});
Unless you're going to track which of the child processes have pdfjs instances in them I don't think this is really a problem.
@@ +261,5 @@
> + * Display a notification warning when the renderer isn't sure
> + * a pdf displayed correctly.
> + */
> + _displayWarning: function (aMsg) {
> + let json = aMsg.json;
json is deprecated, use aMsg.data, and throughout the rest of this patch
::: browser/extensions/pdfjs/content/PdfjsContentUtils.jsm
@@ +25,5 @@
> +Cu.import('resource://gre/modules/XPCOMUtils.jsm');
> +Cu.import('resource://gre/modules/Services.jsm');
> +
> +XPCOMUtils.defineLazyModuleGetter(this, "BrowserUtils",
> + "resource://gre/modules/BrowserUtils.jsm");
And again
@@ +115,5 @@
> + .getInterface(Ci.nsIDocShell)
> + .sameTypeRootTreeItem
> + .QueryInterface(Ci.nsIDocShell)
> + .QueryInterface(Ci.nsIInterfaceRequestor)
> + .getInterface(Ci.nsIContentFrameMessageManager);
I think this can be simplified to:
let winmm = aWindow.QueryInterface(Ci.nsIInterfaceRequestor)
.getInterface(Ci.nsIDocShell)
.QueryInterface(Ci.nsIInterfaceRequestor)
.getInterface(Ci.nsIContentFrameMessageManager);
@@ +192,5 @@
> + "failed for unknown reasons.");
> + return null;
> + }
> + return suitcase._findbar;
> + }
What is the plan for removing all this CPOW usage?
Attachment #8491639 -
Flags: review?(dtownsend+bugmail) → review+
Reporter | ||
Comment 11•10 years ago
|
||
(In reply to Dave Townsend [:mossop] from comment #10)
> > +XPCOMUtils.defineLazyModuleGetter(this, "BrowserUtils",
> > + "resource://gre/modules/BrowserUtils.jsm");
>
> Seems to be unused
My fault on this, I use dumpLn a lot for debugging but forgot to remove BrowserUtils from my patches.
> > + "failed for unknown reasons.");
> > + return null;
> > + }
> > + return suitcase._findbar;
> > + }
>
> What is the plan for removing all this CPOW usage?
Why remove this? This seems like a perfect example of how cpows are incredibly useful. We don't have to add any apis outside of the extension code to get things working.
Comment 12•10 years ago
|
||
(In reply to Jim Mathies [:jimm] from comment #11)
> (In reply to Dave Townsend [:mossop] from comment #10)
> > > +XPCOMUtils.defineLazyModuleGetter(this, "BrowserUtils",
> > > + "resource://gre/modules/BrowserUtils.jsm");
> >
> > Seems to be unused
>
> My fault on this, I use dumpLn a lot for debugging but forgot to remove
> BrowserUtils from my patches.
>
> > > + "failed for unknown reasons.");
> > > + return null;
> > > + }
> > > + return suitcase._findbar;
> > > + }
> >
> > What is the plan for removing all this CPOW usage?
>
> Why remove this? This seems like a perfect example of how cpows are
> incredibly useful. We don't have to add any apis outside of the extension
> code to get things working.
Aren't CPOWs going away at some point? It's causing chrome to block content and vice-versa.
Reporter | ||
Comment 13•10 years ago
|
||
Comment on attachment 8491639 [details] [diff] [review]
Update pdf.js to version 1.0.794
Review of attachment 8491639 [details] [diff] [review]:
-----------------------------------------------------------------
::: browser/extensions/pdfjs/content/PdfjsChromeUtils.jsm
@@ +38,5 @@
> +XPCOMUtils.defineLazyServiceGetter(Svc, 'mime',
> + '@mozilla.org/mime;1',
> + 'nsIMIMEService');
> +
> +/* -*- Mode: Java; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
nit - somehow we got double headers in this file as well.
Reporter | ||
Comment 14•10 years ago
|
||
> > > What is the plan for removing all this CPOW usage?
> >
> > Why remove this? This seems like a perfect example of how cpows are
> > incredibly useful. We don't have to add any apis outside of the extension
> > code to get things working.
>
> Aren't CPOWs going away at some point? It's causing chrome to block content
> and vice-versa.
Spoke with Mossop, we'll file a follow up on trying to remove these and make the pdf.js code work with whatever new api we come up with for it.
Assignee | ||
Comment 15•10 years ago
|
||
Changes since last update:
#5315 Adds preprocessor directive to the X-Content-Security-Policy stuff
#5317 Bug 1064496 review changes
#5312 For |make firefox/mozcentral| builds, add cleanupJSSource to remove duplicate file headers in extensions/firefox/content/PdfjsChromeUtils.jsm
Summary: Update pdf.js to version 1.0.794 → Update pdf.js to version 1.0.800
Assignee | ||
Comment 16•10 years ago
|
||
Attachment #8491639 -
Attachment is obsolete: true
Attachment #8491639 -
Flags: review?(ydelendik)
Attachment #8492375 -
Flags: review?(ydelendik)
Assignee | ||
Comment 17•10 years ago
|
||
Comment on attachment 8492375 [details] [diff] [review]
Update pdf.js to version 1.0.800
Carrying over Mossop's previous r+
Attachment #8492375 -
Flags: review+
Assignee | ||
Comment 18•10 years ago
|
||
Assignee | ||
Comment 19•10 years ago
|
||
Yury noticed that a new file wasn't being packaged and fixed the upstream build script to include it.
Summary: Update pdf.js to version 1.0.800 → Update pdf.js to version 1.0.801
Assignee | ||
Comment 20•10 years ago
|
||
Attachment #8492375 -
Attachment is obsolete: true
Attachment #8492386 -
Attachment is obsolete: true
Attachment #8492375 -
Flags: review?(ydelendik)
Attachment #8492392 -
Flags: review?(ydelendik)
Comment 21•10 years ago
|
||
Comment on attachment 8492392 [details] [diff] [review]
Update pdf.js to version 1.0.801
Thanks
Attachment #8492392 -
Flags: review?(ydelendik) → review+
Assignee | ||
Comment 22•10 years ago
|
||
Flags: in-testsuite+
Whiteboard: [pdfjs-c-integration] → [pdfjs-c-integration][fixed-in-fx-team]
Comment 23•10 years ago
|
||
Status: NEW → RESOLVED
Closed: 10 years ago
Resolution: --- → FIXED
Whiteboard: [pdfjs-c-integration][fixed-in-fx-team] → [pdfjs-c-integration]
Target Milestone: --- → Firefox 35
Reporter | ||
Comment 24•10 years ago
|
||
(In reply to Jim Mathies [:jimm] from comment #14)
> > > > What is the plan for removing all this CPOW usage?
> > >
> > > Why remove this? This seems like a perfect example of how cpows are
> > > incredibly useful. We don't have to add any apis outside of the extension
> > > code to get things working.
> >
> > Aren't CPOWs going away at some point? It's causing chrome to block content
> > and vice-versa.
>
> Spoke with Mossop, we'll file a follow up on trying to remove these and make
> the pdf.js code work with whatever new api we come up with for it.
filed bug 1071082
Comment 25•10 years ago
|
||
Hi Yury,
It looks like this patch added new non-trivial usage of __exposedProps__, which is verboten per [1]. Did that all happen in this bug, or is there another more-specific bug where this was discussed?
The normal policy on these is a backout, but given that this is on the critical e10s path, we'll probably want a less heavy-handed solution here (i.e. a prompt followup bug).
[1] https://groups.google.com/forum/#!msg/mozilla.dev.platform/yNKS1Z6UYQo/qloD9G0AdkcJ
Flags: needinfo?(ydelendik)
Reporter | ||
Comment 26•10 years ago
|
||
(In reply to Bobby Holley (:bholley) from comment #25)
> Hi Yury,
>
> It looks like this patch added new non-trivial usage of __exposedProps__,
> which is verboten per [1]. Did that all happen in this bug, or is there
> another more-specific bug where this was discussed?
>
> The normal policy on these is a backout, but given that this is on the
> critical e10s path, we'll probably want a less heavy-handed solution here
> (i.e. a prompt followup bug).
>
> [1]
> https://groups.google.com/forum/#!msg/mozilla.dev.platform/yNKS1Z6UYQo/
> qloD9G0AdkcJ
CPOWs rely on exposedprops for security. You should speak with billm on this I think.
Comment 27•10 years ago
|
||
(In reply to Jim Mathies [:jimm] from comment #26)
> CPOWs rely on exposedprops for security.
No, they rely on routing access from the child process to the parent process through an unprivileged scope in the parent. The only supported operation on any such object is CALL, which does not interact with __exposedProps__.
> You should speak with billm on this I think.
I have, at length.
Sorry, my fault. I forgot that we're not supposed to use __exposedProps__. It looks like we can avoid it here without too much trouble. I filed bug 1074426.
Comment 29•9 years ago
|
||
(In reply to Bobby Holley (busy) from comment #25)
> It looks like this patch added new non-trivial usage of __exposedProps__,
> which is verboten per [1]. Did that all happen in this bug, or is there
> another more-specific bug where this was discussed?
>
> The normal policy on these is a backout, but given that this is on the
> critical e10s path, we'll probably want a less heavy-handed solution here
> (i.e. a prompt followup bug).
Addressed by bug 1074426.
Flags: needinfo?(ydelendik)
Assignee | ||
Updated•5 years ago
|
You need to log in
before you can comment on or make changes to this bug.
Description
•