- Nov 21, 2023
-
-
Malte Jürgens authored
Original Revision: https://phabricator.services.mozilla.com/D190468 Differential Revision: https://phabricator.services.mozilla.com/D193277
-
- Sep 22, 2023
-
-
valenting authored
Bug 1848694 - Remove/avoid global references to nsIIOService r=mccr8,necko-reviewers,kershaw, a=dmeehan This patch removes the static pointer to nsIIOService in nsContentUtils, replacing it to calls to mozilla::components::IO::Service. It also makes nsScriptSecurityManager::sIOService a StaticRefPtr. Differential Revision: https://phabricator.services.mozilla.com/D188714
-
- Jul 10, 2023
-
-
Tom Ritter authored
Bug 1830070: Correctly apply RFP Checks to about: documents and deal with pop-ups (ESR) r=smaug,emilio, a=dsmith This patch has three parts to it, in addition to the many tests it adds: 1) Use NS_IsContentAccessibleAboutURI to ensure that only safe about: documents get exempted. With this change, we will no longer allow about:blank or about:srcdoc to be exempted base on URI. If they are to be exempted, it will need to be base on other information. 2) In Document::RecomputeResistFingerprinting we previously deferred to a Parent Document if we had one, and either the principals matched or we were a null principal. We will do the same thing, except we will also defer to our opener as well as the parent document. Now about:blank documents can be exempted. However, this deferral only works if the opener is same-process. For cross-process openers, we make the decision ourselves. We can make the wrong decision though. CookieJarSettings is inherited through iframes but it is _not_ inherited through popups. (Yet. There's some discussion there, but it's not implemented.) Conceptually; however, we do want CJS to inherit, and we do want RFP to inherit as well. Because a popup can collude with its opener to bypass RFP and Storage restrictions, we should propagate the CJS information. This does lead to an unusual situation: if you have exempted b.com, and a.com (which is not exempted) creates a popup for b.com then that popup will not be exempted. But an open tab for b.com would be. And it might be hard to tell those two apart, or why they behave differently. The third part of the patch: 3) In LoadInfo we want to populate information down from the opener to the popup. This is needed because otherwise a cross-origin popup will not defer to its opener (because in Fission they're in different processes) and will decide if it should be exempted itself. It's the CookieJarSettings object that prevents the cross-origin document from thinking it should be exempted - CJS tells it 'No, you're a child (either a subdocument or a popup) and if I say you don't get an exemption, you don't.' Finally, there is one more caveat: we can only defer to a parent document or opener if it still exists. A popup may outlive its opener. If that happens, and something induces a call to RecomputeResistFingerprinting, then (e.g.) an about:blank popup may lose an RFP exemption that it had received from its parent. This isn't expected to happen in practice - RecomputeResistFingerprinting is only called on document creation and pref changes I believe. It is not possible for a popup to _gain_ an exemption though, because even if the parent document is gone, the CJS lives on and restricts it. Differential Revision: https://phabricator.services.mozilla.com/D183189
-
- May 31, 2023
-
-
Saira Abdulla authored
Bug 1824612 - Convert consumers of toolkit/components/extensions to ES modules. r=robwu,webcompat-reviewers,geckoview-reviewers,settings-reviewers,application-update-reviewers,credential-management-reviewers,devtools-reviewers,cookie-reviewers,twisniewski,sgalich,valentin,nalexander,mconley,m_kato Depends on D175553 Differential Revision: https://phabricator.services.mozilla.com/D176005
-
Iulian Moraru authored
Backed out 2 changesets (bug 1824612) for causing dt failures on browser_dbg-features-source-tree.js. CLOSED TREE Backed out changeset c3f38adc818e (bug 1824612) Backed out changeset 58ba8bb3398a (bug 1824612)
-
Saira Abdulla authored
Bug 1824612 - Convert consumers of toolkit/components/extensions to ES modules. r=robwu,webcompat-reviewers,geckoview-reviewers,settings-reviewers,application-update-reviewers,credential-management-reviewers,devtools-reviewers,cookie-reviewers,twisniewski,sgalich,valentin,nalexander,mconley,m_kato Depends on D175553 Differential Revision: https://phabricator.services.mozilla.com/D176005
-
- May 20, 2023
-
-
Mark Banner authored
Bug 1826062 - Automatic fixes for upgrading Prettier to 2.8.8. r=mossop,perftest-reviewers,webcompat-reviewers,geckoview-reviewers,denschub,devtools-reviewers,sparky,calu Differential Revision: https://phabricator.services.mozilla.com/D177027
-
Mark Banner authored
Bug 1826062 - Automatic fixes for Prettier 2.0.5 upgrade. r=mossop,perftest-reviewers,webcompat-reviewers,geckoview-reviewers,denschub,devtools-reviewers,sparky,owlish Differential Revision: https://phabricator.services.mozilla.com/D177025
-
- May 15, 2023
-
-
nicklas boman authored
Differential Revision: https://phabricator.services.mozilla.com/D177690
-
- May 03, 2023
-
-
anonymous0000007 authored
Bug 1710232 - remove dead code unused function UseSiteForFirstPartyDomain in OriginAttributes.h. r=timhuang Differential Revision: https://phabricator.services.mozilla.com/D176790
-
- Mar 30, 2023
-
-
Nika Layzell authored
Bug 1825360 - Remove the NS_DISPATCH_SYNC flag, r=necko-reviewers,geckoview-reviewers,media-playback-reviewers,karlt,jesup,m_kato,emilio This flag is not supported by most event targets and can have unexpected side effects (namely spinning a nested event loop). All consumers have been replaced with a new function which is more explicit about this side effect. Differential Revision: https://phabricator.services.mozilla.com/D173985
-
- Mar 24, 2023
-
-
Mark Banner authored
Bug 1824173 - Automatically fix some ESLint issues raised by the valid-jsdoc configuration. r=mossop,webcompat-reviewers,denschub Differential Revision: https://phabricator.services.mozilla.com/D173450
-
- Mar 21, 2023
-
-
Kershaw Chang authored
Bug 1809843 - Skip Failed tests, r=necko-reviewers,extension-reviewers,credential-management-reviewers,valentin,sgalich,robwu Differential Revision: https://phabricator.services.mozilla.com/D171842
-
- Mar 13, 2023
-
-
june wilde authored
Differential Revision: https://phabricator.services.mozilla.com/D161450
-
Marian-Vasile Laza authored
Backed out changeset 5c494680f448 (bug 1809843) Backed out changeset 02742b38edab (bug 1809843) Backed out changeset 2b9b32ca8294 (bug 1809843) Backed out changeset 56631cb02ae6 (bug 1809843) Backed out changeset 37e35a60a71f (bug 1809843)
-
Kershaw Chang authored
Bug 1809843 - Skip Failed tests, r=necko-reviewers,extension-reviewers,credential-management-reviewers,valentin,sgalich,robwu Differential Revision: https://phabricator.services.mozilla.com/D171842
-
- Feb 27, 2023
-
-
serge-sans-paille authored
Depends on D170728 Differential Revision: https://phabricator.services.mozilla.com/D170729
-
- Feb 14, 2023
-
-
Butkovits Atila authored
Backed out changeset 3cdcc72baa6e (bug 1776755) for causing failures at test_ext_contentscript_triggeringPrincipal.js.
-
june wilde authored
Differential Revision: https://phabricator.services.mozilla.com/D161450
-
Peter Van der Beken authored
Depends on D166953 Differential Revision: https://phabricator.services.mozilla.com/D166954
-
Peter Van der Beken authored
Depends on D166810 Differential Revision: https://phabricator.services.mozilla.com/D166953
-
Peter Van der Beken authored
Depends on D166783 Differential Revision: https://phabricator.services.mozilla.com/D166810
-
Andreas Farre authored
Base64 encoding is done to top-level principal and the sub-principals of expanded principals. Getting rid of the Base64 encoding entirely also lets us use jsoncpp consider expanded principals to be entirely serialized as JSON. Differential Revision: https://phabricator.services.mozilla.com/D166783
-
- Feb 08, 2023
-
-
Cristina Horotan authored
Backed out changeset c4f9e74d6164 (bug 1795312) Backed out changeset 2594a213283c (bug 1795312) Backed out changeset bc1c5b1c2d85 (bug 1795312) Backed out changeset 38f9e767cc32 (bug 1795312) Backed out changeset a732c5bcc392 (bug 1795312)
-
Andreas Farre authored
Differential Revision: https://phabricator.services.mozilla.com/D169205
-
Peter Van der Beken authored
Differential Revision: https://phabricator.services.mozilla.com/D166954
-
Peter Van der Beken authored
Differential Revision: https://phabricator.services.mozilla.com/D166953
-
Peter Van der Beken authored
Differential Revision: https://phabricator.services.mozilla.com/D166810
-
Andreas Farre authored
Base64 encoding is done to top-level principal and the sub-principals of expanded principals. Getting rid of the Base64 encoding entirely also lets us use jsoncpp consider expanded principals to be entirely serialized as JSON. Differential Revision: https://phabricator.services.mozilla.com/D166783
-
- Feb 07, 2023
-
-
Cristian Tuns authored
-
june wilde authored
Differential Revision: https://phabricator.services.mozilla.com/D161450
-
- Feb 01, 2023
-
-
Andrew McCreight authored
XPConnect has been single threaded for a long time, so this flag doesn't do anything. Differential Revision: https://phabricator.services.mozilla.com/D168442
-
- Jan 07, 2023
-
-
Dave Townsend authored
Bug 1792138: Show the extension's name in permission prompts for opening external links. r=ckerschb,robwu,fluent-reviewers,pbz,flod In order to handle the content script case correctly we must expose the contentScriptAddonPolicy to JavaScript. With that we can always see what extension is trying to perform an action and use its name rather than internal ID in the dialog. Differential Revision: https://phabricator.services.mozilla.com/D161282
-
- Dec 28, 2022
-
-
Sylvestre Ledru authored
Bug 1802288 - remove trailing whitespaces in idl/webidl files r=credential-management-reviewers,webidl,smaug,sgalich Differential Revision: https://phabricator.services.mozilla.com/D165559
-
- Dec 13, 2022
-
-
Stanca Serban authored
Backed out changeset 514642d76faa (bug 1792138) for causing mochitests failures in test_ext_protocolHandlers.html. CLOSED TREE
-
Dave Townsend authored
Bug 1792138: Show the extension's name in permission prompts for opening external links. r=ckerschb,robwu,fluent-reviewers,pbz,flod In order to handle the content script case correctly we must expose the contentScriptAddonPolicy to JavaScript. With that we can always see what extension is trying to perform an action and use its name rather than internal ID in the dialog. Differential Revision: https://phabricator.services.mozilla.com/D161282
-
- Dec 12, 2022
-
-
Nika Layzell authored
Differential Revision: https://phabricator.services.mozilla.com/D163856
-
Nika Layzell authored
Differential Revision: https://phabricator.services.mozilla.com/D163855
-
- Dec 02, 2022
-
-
Nika Layzell authored
These are far from comprehensive, and act mostly as smoke-tests that the principal code is usable from off-main-thread. Differential Revision: https://phabricator.services.mozilla.com/D163042
-
Nika Layzell authored
After the previous changes, the majority of methods on nsIPrincipal are now threadsafe. This patch documents which methods are still bound to the main thread, and adds thread assertions to them to avoid potential misuse. Differential Revision: https://phabricator.services.mozilla.com/D163041
-