Commit Graph

380 Commits

Author SHA1 Message Date
Malte Juergens
182878bbe0 Bug 1855734 - Use innermost nested URI in PopulateTopLevelInfoFromURI r=freddyb,timhuang
Differential Revision: https://phabricator.services.mozilla.com/D190468
2023-11-08 13:44:26 +00:00
Sandor Molnar
ae081ec358 Backed out changeset 36cd4787833a (bug 1724089) for causing xpc failures on docshell/test/unit/test_subframe_stop_after_parent_error.js CLOSED TREE 2023-11-08 03:04:53 +02:00
Gregory Pappas
2eec0c40d8 Bug 1724089 - Remove browser.tabs.remote.autostart pref r=webdriver-reviewers,perftest-reviewers,geckoview-reviewers,jgraham,extension-reviewers,mossop,sparky,robwu,owlish
Differential Revision: https://phabricator.services.mozilla.com/D192136
2023-11-07 21:44:01 +00:00
Joel Maher
76a53558da Bug 1853616 - add frequent condprof network requests to server-locations.txt. r=gbrown
Differential Revision: https://phabricator.services.mozilla.com/D189184
2023-09-26 15:39:37 +00:00
Cristian Tuns
ff69e79f19 Backed out changeset a8267c9267da (bug 1840902) for causing mochitest failures in automation.py CLOSED TREE 2023-08-08 19:40:55 -04:00
Harshit Sohaney
d79723acb5 Bug 1840902 - Adjusted browser chrome tests under the Anti-tracking test suite to support only secure context storage access. r=bvandersloot
Depends on D182366

Differential Revision: https://phabricator.services.mozilla.com/D184979
2023-08-08 20:21:44 +00:00
Kershaw Chang
52338d0637 Bug 1838829 - Update subjectAlternativeName for mochitest, r=necko-reviewers,valentin
Differential Revision: https://phabricator.services.mozilla.com/D181248
2023-06-22 19:44:53 +00:00
Norisz Fay
e86f1fa0e9 Backed out 5 changesets (bug 1838829) for causing mochitest failures CLOSED TREE
Backed out changeset 693d34c8447d (bug 1838829)
Backed out changeset 903d9ff4afaa (bug 1838829)
Backed out changeset 5e51feff7467 (bug 1838829)
Backed out changeset e125be49d2a6 (bug 1838829)
Backed out changeset 1a8cf3c83dc4 (bug 1838829)
2023-06-22 03:37:07 +03:00
Kershaw Chang
1f5939d82d Bug 1838829 - Update subjectAlternativeName for mochitest, r=necko-reviewers,valentin
This is to make the server support usual origins in mochitest

Differential Revision: https://phabricator.services.mozilla.com/D181248
2023-06-21 19:43:32 +00:00
Mark Banner
2a53076d43 Bug 1826063 - Automatic fixes for enabling Prettier on production xhtml and html files. r=mossop,webdriver-reviewers,webcompat-reviewers,geckoview-reviewers,extension-reviewers,settings-reviewers,application-update-reviewers,credential-management-reviewers,fxview-reviewers,sgalich,nalexander,devtools-reviewers,sclements,denschub,robwu,owlish
Differential Revision: https://phabricator.services.mozilla.com/D177938
2023-05-20 12:26:56 +00:00
Julian Descottes
7cfa924151 Bug 1829152 - Add example.net for http3 mochitests r=ahal
example.net is used in many devtools browser mochitests and should be available for http3 browser mochitests

Differential Revision: https://phabricator.services.mozilla.com/D176030
2023-04-20 20:05:10 +00:00
Dana Keeler
74407531f5 Bug 1289186 - wait for the server certificate to verify successfully before asking for a client auth certificate r=jschanck
If a TLS server asks for a client authentication certificate, no dialog asking
the user to select one should be shown until the server's certificate verifies
successfully.

Differential Revision: https://phabricator.services.mozilla.com/D175170
2023-04-13 18:52:18 +00:00
Narcis Beleuzu
4d86ceed60 Backed out changeset a5064c22d601 (bug 1289186) for Bp-hybrid bustages on NSSSocketControl.h . CLOSED TREE 2023-04-12 22:03:22 +03:00
Dana Keeler
bfba45ee49 Bug 1289186 - wait for the server certificate to verify successfully before asking for a client auth certificate r=jschanck
If a TLS server asks for a client authentication certificate, no dialog asking
the user to select one should be shown until the server's certificate verifies
successfully.

Differential Revision: https://phabricator.services.mozilla.com/D175170
2023-04-12 16:21:38 +00:00
Kershaw Chang
79403e1620 Bug 1809843 - Add DoH server and Http/3 server into mochitest, r=necko-reviewers,ahal,valentin,gbrown,jmaher
Differential Revision: https://phabricator.services.mozilla.com/D166644
2023-03-16 21:28:58 +00:00
Marian-Vasile Laza
ee72efd1e9 Backed out 5 changesets (bug 1809843) for causing Cargo related build bustages. CLOSED TREE
Backed out changeset 5c494680f448 (bug 1809843)
Backed out changeset 02742b38edab (bug 1809843)
Backed out changeset 2b9b32ca8294 (bug 1809843)
Backed out changeset 56631cb02ae6 (bug 1809843)
Backed out changeset 37e35a60a71f (bug 1809843)
2023-03-13 13:53:26 +02:00
Kershaw Chang
2b54ddaca8 Bug 1809843 - Add DoH server and Http/3 server into mochitest, r=necko-reviewers,ahal,valentin,gbrown,jmaher
Differential Revision: https://phabricator.services.mozilla.com/D166644
2023-03-13 11:12:32 +00:00
Sebastian Hengst
0bf957f909 Bug 1815090 - regenerate certificates in build/pgo/certs/. a=me
* the build/pgo/certs/ changes were made using
  `./mach python build/pgo/genpgocert.py`
2023-02-05 13:12:06 +01:00
Marco Castelluccio
ecb54845b0 Bug 1790816 - Reformat build/ with isort. r=linter-reviewers,ahal DONTBUILD
# ignore-this-changeset

Differential Revision: https://phabricator.services.mozilla.com/D162668
2022-11-24 17:23:47 +00:00
Manuel Bucher
2f9b6fc184 Bug 1782992 - Update link to new location of mochitest documentation r=sylvestre DONTBUILD
Differential Revision: https://phabricator.services.mozilla.com/D155991
2022-08-31 07:56:57 +00:00
Andrew McCreight
a3fb85df7b Bug 1769791, part 1 - Remove support for setting permissions in mozprofile. r=jmaher
The only permission that is set is allowXULXBL, and we don't want
to set that by default, because we don't normally allow XUL in
web content. It can be enabled on an individual test by adding
allow_xul_xbl = true to a test manifest, or by using pushPermissions
within the test.

This also removes the noxul test server, because no XUL is now
the default behavior.

Differential Revision: https://phabricator.services.mozilla.com/D148136
2022-08-18 22:14:53 +00:00
Tim Huang
eb8738dda3 Bug 1773701 - Part 4: Add a test to verify the email tracking telemetry. r=dimi
Differential Revision: https://phabricator.services.mozilla.com/D151524
2022-07-19 20:04:25 +00:00
Cosmin Sabou
3835f734ac Backed out 4 changesets (bug 1773701) for causing hybrid build bustages. CLOSED TREE
Backed out changeset 8ec2108b4a5b (bug 1773701)
Backed out changeset 2d2f3f95544d (bug 1773701)
Backed out changeset 8d3727e19ade (bug 1773701)
Backed out changeset fab41f0c857f (bug 1773701)
2022-07-19 18:45:05 +03:00
Tim Huang
9879eb3b7d Bug 1773701 - Part 4: Add a test to verify the email tracking telemetry. r=dimi
Differential Revision: https://phabricator.services.mozilla.com/D151524
2022-07-19 14:46:08 +00:00
Tim Huang
335b48ca92 Bug 1773695 - Part 5: Add a test for the email tracking protection. r=dimi
Differential Revision: https://phabricator.services.mozilla.com/D151051
2022-07-18 21:48:16 +00:00
criss
b77dc7a479 Backed out 6 changesets (bug 1773691, bug 1773695) for causing Bp-hybrid bustages on UrlClassifierFeatureEmailTrackingProtection
Backed out changeset f402f1bd4caa (bug 1773695)
Backed out changeset 001c38822c53 (bug 1773695)
Backed out changeset 8ef4d3597d92 (bug 1773695)
Backed out changeset f4770b2fe53d (bug 1773695)
Backed out changeset fb625ae08f73 (bug 1773695)
Backed out changeset 6c23adf9184f (bug 1773691)
2022-07-14 23:41:50 +03:00
Tim Huang
b6d609f852 Bug 1773695 - Part 5: Add a test for the email tracking protection. r=dimi
Differential Revision: https://phabricator.services.mozilla.com/D151051
2022-07-14 19:39:33 +00:00
criss
abacf107c6 Backed out changeset 670004b987ac (bug 1769791) for causing multiple failures.CLOSED TREE 2022-06-10 23:01:04 +03:00
Andrew McCreight
6f1169fa3f Bug 1769791 - Remove support for setting permissions in mozprofile. r=jmaher
The only permission that is set is allowXULXBL, and we don't want
to set that by default, because we don't normally allow XUL in
web content. It can be enabled on an individual test by adding
allow_xul_xbl = true to a test manifest, or by using pushPermissions
within the test.

This also removes the noxul test server, because no XUL is now
the default behavior.

Differential Revision: https://phabricator.services.mozilla.com/D148136
2022-06-10 17:47:47 +00:00
Jonathan Kew
7973e4e6c3 Bug 1771609 - patch 1 - Add a simple perf test for nsLineIterator performance on large blocks. r=perftest-reviewers,emilio,sparky
This uses selection-modification APIs to move up and down by lines in a large text block,
which relies on the block frame's nsILineIterator.

In my local m-c trunk build on macOS, this testcase currently reports times of around 1800ms.
Once the patch in this bug is applied, that drops to around 1300ms.

Differential Revision: https://phabricator.services.mozilla.com/D147577
2022-06-01 17:39:04 +00:00
Cathy Lu
803a4e8449 Bug 1721220 - Add BAD_STS_CERT error r=geckoview-reviewers,nika,agi,owlish
Differential Revision: https://phabricator.services.mozilla.com/D146234
2022-05-25 17:51:11 +00:00
Jonathan Kew
9fbe563a70 Bug 1765093 - Add perf tests for SVG text based on the testcase here. r=perftest-reviewers,emilio,sparky
Differential Revision: https://phabricator.services.mozilla.com/D145727
2022-05-07 13:12:00 +00:00
Cristian Tuns
f1a3cc8348 Backed out 4 changesets (bug 1765093) for causing web-platform-test failures on boundary-shaping-010.html CLOSED TREE
Backed out changeset 4f24833ac254 (bug 1765093)
Backed out changeset 6e5b336588d1 (bug 1765093)
Backed out changeset 17d5218d84b7 (bug 1765093)
Backed out changeset bbc194412080 (bug 1765093)
2022-05-06 17:08:52 -04:00
Jonathan Kew
2923fa9995 Bug 1765093 - Add perf tests for SVG text based on the testcase here. r=perftest-reviewers,emilio,sparky
Differential Revision: https://phabricator.services.mozilla.com/D145727
2022-05-06 17:47:24 +00:00
John Schanck
6028a138e9 Bug 1691122 - Remove subject common name fallback support in CertVerifier. r=keeler,necko-reviewers,kershaw
Differential Revision: https://phabricator.services.mozilla.com/D143808
2022-04-28 19:48:06 +00:00
Butkovits Atila
94e2a597f6 Backed out changeset 0599b2a0913a (bug 1691122) for causing failures at test_peerConnection_basicAudioNATRelayTLS.html. CLOSED TREE 2022-04-28 03:58:05 +03:00
John Schanck
ea5479a8d7 Bug 1691122 - Remove subject common name fallback support in CertVerifier. r=keeler,necko-reviewers,kershaw
Differential Revision: https://phabricator.services.mozilla.com/D143808
2022-04-27 20:57:31 +00:00
Mike Hommey
dcb88b4ebb Bug 1758617 - Make Firefox abort in case of content crash during PGO run. r=firefox-build-system-reviewers,mhentges
The expected behavior during a PGO run is that a browser is started and
exited once, and then it is started again on a page that runs various
workloads and once finished, exits.
When workload happens to crash the content process, the browser is left
running indefinitely, until the taskcluster task itself times out. This
leaves us with no possibility of knowing what actually went wrong during
the run, which is about the worst thing that can happen.
With the browser shutting down on its own in case of crash, the harness
can find the minidumps and report the crash, which is more useful.

Differential Revision: https://phabricator.services.mozilla.com/D140678
2022-03-09 21:46:18 +00:00
Alexis Beingessner
ec10d290e7 Bug 1755602 - consistently use minidump-stackwalk instead of minidump_stackwalk. r=glandium
Inconsistency confuses some of our tools. As part of this, I:

* Updated some docs to point to rust-minidump
* Added a fallback to mozcrash.py to try both versions
* Make mozcrash.py use --brief output when the local mdsw is used
* Remove the renaming hack from build-minidump-stackwalk.sh

This isn't as simple as a sed because we still have breakpad in tree
for minidump-analyzer. I did my best to replace the right strings.

Differential Revision: https://phabricator.services.mozilla.com/D138971
2022-03-09 16:44:42 +00:00
Dana Keeler
740734288a Bug 1748409 - regenerate expiring test certificates for 2022 r=jschanck
* the certificates were regenerated using `./mach generate-test-certs`
* the build/pgo/certs/ changes were made using
  `./mach python build/pgo/genpgocert.py`
* the zip files in security/manager/ssl/tests/unit/test_signed_apps/ were
  updated per the directions in the corresponding moz.build file
* security/manager/ssl/tests/unit/test_cert_override_read.js needed manual
  updating

Differential Revision: https://phabricator.services.mozilla.com/D135283
2022-01-07 02:13:06 +00:00
Niklas Goegge
5ef444d868 Bug 1732069: Consider loopback origin for Sec-Fetch-Site: same-site r=ckerschb
Differential Revision: https://phabricator.services.mozilla.com/D129152
2021-11-04 08:56:29 +00:00
Julian Descottes
3921691c94 Bug 1736509 - Add https://sub*.test*.example.org:443 to build/pgo/server-locations.txt r=jmaher
Differential Revision: https://phabricator.services.mozilla.com/D128865
2021-10-21 13:58:55 +00:00
Christoph Kerschbaumer
bc498bd4aa Bug 1736016: Add https://www.example.com:443 to build/pgo/server-locations.txt r=jmaher
Differential Revision: https://phabricator.services.mozilla.com/D128591
2021-10-15 16:54:26 +00:00
Julian Descottes
081e1015d9 Bug 1734787 - Add https://example.net:443 to build/pgo/server-locations.txt r=jmaher
Having 3 regular domains to test fission scenarios will help migrating to https-first for DevTools mochitests.
example.org and example.com are both available in http and https, but example.net is only available in http for now.

This patch was created by adding https://example.net to build/pgo/server-locations.txt and then running `./mach python build/pgo/genpgocert.py`

Differential Revision: https://phabricator.services.mozilla.com/D127922
2021-10-13 14:17:14 +00:00
Dana Keeler
3b68845290 Bug 1724072 - allow enabling 3DES only when deprecated versions of TLS are enabled r=rmf
Chrome has removed 3DES completely[0], but we're still seeing some uses of it
in telemetry. Our assumption is that this is either due to old devices that
can't be upgraded, and hence probably use TLS 1.0, or servers that bafflingly
choose 3DES when there are other, better, ciphersuites in common.
This patch allows 3DES to only be enabled when deprecated versions of TLS are
enabled. This should protect users against the latter case (where 3DES is
unnecessary) while allowing them to use it in the former case (where it may be
necessary).

NB: The only 3DES ciphersuite gecko makes possible to enable is
TLS_RSA_WITH_3DES_EDE_CBC_SHA. This patch also changes the preference
corresponding to this ciphersuite from "security.ssl3.rsa_des_ede3_sha" to
"security.ssl3.deprecated.rsa_des_ede3_sha".

[0] https://www.chromestatus.com/feature/6678134168485888

Differential Revision: https://phabricator.services.mozilla.com/D121797
2021-08-24 01:25:07 +00:00
Dana Keeler
259e0bfa1a Bug 1724072 - replace RC4 capabilities in ssltunnel with 3DES r=rmf
This patch updates ssltunnel to have a configuration where it only uses a 3DES
ciphersuite, rather than RC4 ciphersuites. This has to be done in stages
because otherwise android tests will fail, because their hostutils doesn't
actually use what's in-tree, and has to be updated separately.

Differential Revision: https://phabricator.services.mozilla.com/D122393
2021-08-18 20:20:12 +00:00
Narcis Beleuzu
625f7a5de1 Backed out changeset 4f793a75cd93 (bug 1724072) for geckoview failures . CLOSED TREE 2021-08-10 19:19:35 +03:00
Dana Keeler
2a64c08522 Bug 1724072 - allow enabling 3DES only when deprecated versions of TLS are enabled r=rmf
Chrome has removed 3DES completely[0], but we're still seeing some uses of it
in telemetry. Our assumption is that this is either due to old devices that
can't be upgraded, and hence probably use TLS 1.0, or servers that bafflingly
choose 3DES when there are other, better, ciphersuites in common.
This patch allows 3DES to only be enabled when deprecated versions of TLS are
enabled. This should protect users against the latter case (where 3DES is
unnecessary) while allowing them to use it in the former case (where it may be
necessary).

NB: The only 3DES ciphersuite gecko makes possible to enable is
TLS_RSA_WITH_3DES_EDE_CBC_SHA. This patch also changes the preference
corresponding to this ciphersuite from "security.ssl3.rsa_des_ede3_sha" to
"security.ssl3.deprecated.rsa_des_ede3_sha".

[0] https://www.chromestatus.com/feature/6678134168485888

Differential Revision: https://phabricator.services.mozilla.com/D121797
2021-08-10 15:25:37 +00:00
lyavor
34292f2736 Bug 1719309 - HTTPS-First test for bad certifactes. r=ckerschb
Differential Revision: https://phabricator.services.mozilla.com/D119779
2021-07-14 12:34:01 +00:00
lyavor
cc7f254576 Bug 1706126 - HTTPS- First doesn't upgrade redirection from exempt target domain to subdomain (which supports https) r=ckerschb,necko-reviewers,dragana
Differential Revision: https://phabricator.services.mozilla.com/D118704
2021-07-07 14:19:09 +00:00