Commit Graph

121 Commits

Author SHA1 Message Date
Jonathan Kingston
31441f82ea Bug 1560455 - rename CodebasePrincipal to ContentPrincipal. r=ckerschb
Differential Revision: https://phabricator.services.mozilla.com/D35504

--HG--
extra : moz-landing-system : lando
2019-07-08 16:37:45 +00:00
Victor Porof
af7d1d3b67 Bug 1561435 - Format browser/modules/, a=automatic-formatting
# ignore-this-changeset

Differential Revision: https://phabricator.services.mozilla.com/D36046

--HG--
extra : source : f3c632037a1064c41b1f8b02f477c854b2fb4362
2019-07-05 09:55:19 +02:00
Erica Wright
2c4d0c79fb Bug 1549830 - Create content blocking database. r=johannh
Differential Revision: https://phabricator.services.mozilla.com/D33716

--HG--
extra : moz-landing-system : lando
2019-06-21 22:45:47 +00:00
Nihanth Subramanya
c706261f70 Bug 1547015 - ClearDataService: Implement CertCleaner.deleteAll. r=johannh
Differential Revision: https://phabricator.services.mozilla.com/D32916

--HG--
extra : moz-landing-system : lando
2019-06-03 21:30:32 +00:00
Johann Hofmann
de6eaee5b4 Bug 1554167 - Remove pending shutdown sanitization immediately after shutdown sanitization finishes. r=mak,baku
In https://hg.mozilla.org/mozilla-central/rev/25397a6f8c4f#l1.35 we added an early return to
the SanitizeOnShutdown function to avoid cleaning principals by permission if the user had
set their preferences to clear all storage on shutdown anyway. This unfortunately ended
the function execution before it would call `removePendingSanitization("shutdown");` later on
and thus remove the pending shutdown sanitization (which, in fact, had completed successfully earlier).

The result is that the shutdown sanitization would be left dangling and run again on next startup,
where, for reasons I don't fully understand, it would race and conflict with loading the home page,
if that home page was from web content.

The solution is to remove the pending shutdown sanitization immediately after the sanitization is done.

As far as I can see there was never really a point in having it happen after session principal
cleanup finished, since in case of a crash it would not run the principal cleanup again next startup,
just the shutdown cleanup.

For good measure I also moved the new tab container sanitization to happen earlier in this function,
to prevent it from dangling as well.

Differential Revision: https://phabricator.services.mozilla.com/D33087

--HG--
extra : moz-landing-system : lando
2019-05-30 15:39:39 +00:00
Andrea Marchesini
d89d469dba Bug 1532948 - Sanitize principal on shutdown should behave like 'Manage cache and Site Data' cleanup, r=johannh
Differential Revision: https://phabricator.services.mozilla.com/D23825

--HG--
extra : moz-landing-system : lando
2019-04-05 10:35:54 +00:00
Andrea Marchesini
61e44c6220 Bug 1524200 - Add more debugging message to Sanitizer.jsm, r=mak
Differential Revision: https://phabricator.services.mozilla.com/D25289

--HG--
extra : moz-landing-system : lando
2019-04-01 13:46:56 +00:00
Erica Wright
fccf274cc5 Bug 1524883 - Clear storageAccessAPI permissions when history is cleared. r=johannh,Ehsan
When history is cleared, clear the flag that indicates a user has visited the domain.

Differential Revision: https://phabricator.services.mozilla.com/D24404

--HG--
extra : moz-landing-system : lando
2019-03-28 18:44:08 +00:00
Tom Tung
75324d92e3 Bug 1529301 - P3 - Use the listInitializedOrigins on Sanitizer.jsm; r=baku
Differential Revision: https://phabricator.services.mozilla.com/D21725

--HG--
extra : moz-landing-system : lando
2019-03-22 06:04:50 +00:00
Ian Moody
67fb55f3b9 Bug 1536653 - browser/ automated ESLint no-throw-literal fixes. r=Gijs
Result of running:
$ mach eslint -funix browser/ | sed -Ee 's/:.+//' - | xargs sed -E \
    -e 's/throw ((["`])[^"]+\2);/throw new Error(\1);/g' \
    -e 's/throw ((["`])[^"]+\2 \+ [^ ";]+);/throw new Error(\1);/g' \
    -e 's/throw \(/throw new Error(/g' -i

Differential Revision: https://phabricator.services.mozilla.com/D24110

--HG--
extra : moz-landing-system : lando
2019-03-20 10:17:42 +00:00
Felipe Gomes
178783f955 Bug 827976 - Make Sanitizer.jsm not use the hidden window. r=Gijs
It doesn't need a high precision performance.now() to count minutes. In addition, if there are no windows to be closed, it's not doing anything, so it doesn't need to open a new one.

Differential Revision: https://phabricator.services.mozilla.com/D21083

--HG--
extra : moz-landing-system : lando
2019-03-04 18:53:07 +00:00
Cosmin Sabou
a706bb3916 Backed out 16 changesets (bug 827976) for causing bug 1532054. a=backout
Backed out changeset 54c0b12443ed (bug 827976)
Backed out changeset 92b45080d080 (bug 827976)
Backed out changeset 443087a359f9 (bug 827976)
Backed out changeset f976c2d4cebb (bug 827976)
Backed out changeset 66cffb171024 (bug 827976)
Backed out changeset 845e1d0b2402 (bug 827976)
Backed out changeset fd94066a1d76 (bug 827976)
Backed out changeset e253b264e7bd (bug 827976)
Backed out changeset 07ef335770a8 (bug 827976)
Backed out changeset 9d3805d77b99 (bug 827976)
Backed out changeset eed600ceb606 (bug 827976)
Backed out changeset 3b64368cff52 (bug 827976)
Backed out changeset 69d0378e0c09 (bug 827976)
Backed out changeset 9203871a5c6f (bug 827976)
Backed out changeset 96a507c818e2 (bug 827976)
Backed out changeset e254496ff95b (bug 827976)
2019-03-02 20:40:01 +02:00
Felipe Gomes
c15c6e8d12 Bug 827976 - Make Sanitizer.jsm not use the hidden window. r=Gijs
It doesn't need a high precision performance.now() to count minutes. In addition, if there are no windows to be closed, it's not doing anything, so it doesn't need to open a new one.

Differential Revision: https://phabricator.services.mozilla.com/D21083

--HG--
extra : moz-landing-system : lando
2019-03-01 21:07:09 +00:00
Andrea Marchesini
53e4ef9c09 Bug 1524200 - Sanitizer.jsm should retrieve the list of nsIPrincipal objects with site data only when needed, r=johannh
Differential Revision: https://phabricator.services.mozilla.com/D20995

--HG--
extra : moz-landing-system : lando
2019-02-26 17:27:52 +00:00
Andrea Marchesini
a22566dfa7 Bug 1524200 - Introduce additional debugging messages to Sanitizer.jsm, r=mak
Differential Revision: https://phabricator.services.mozilla.com/D20976

--HG--
extra : moz-landing-system : lando
2019-02-25 12:32:15 +00:00
Andrea Marchesini
1f455d1507 Bug 1524200 - Optimize the comparison of principals in Sanitizer.jsm, r=johannh
Differential Revision: https://phabricator.services.mozilla.com/D20331

--HG--
extra : moz-landing-system : lando
2019-02-21 11:28:55 +00:00
Andrea Marchesini
5c643138d6 Bug 1524200 - Diagnostic messages on Sanitizer.jsm, r=mak
Differential Revision: https://phabricator.services.mozilla.com/D19767

--HG--
extra : moz-landing-system : lando
2019-02-15 12:04:46 +00:00
Andrea Marchesini
eb7f0ac9fb Bug 1524674 - Cleanup site data with custom permissions per subdomains - check permissions, r=johannh
Differential Revision: https://phabricator.services.mozilla.com/D18497

--HG--
extra : moz-landing-system : lando
2019-02-04 14:25:47 +00:00
Andrea Marchesini
7a55ab0c97 Bug 1524674 - Cleanup site data with custom permissions per subdomains - debug messages, r=johannh
Differential Revision: https://phabricator.services.mozilla.com/D18496

--HG--
extra : moz-landing-system : lando
2019-02-04 14:24:33 +00:00
Kris Maglione
e930b89c34 Bug 1514594: Part 3 - Change ChromeUtils.import API.
***
Bug 1514594: Part 3a - Change ChromeUtils.import to return an exports object; not pollute global. r=mccr8

This changes the behavior of ChromeUtils.import() to return an exports object,
rather than a module global, in all cases except when `null` is passed as a
second argument, and changes the default behavior not to pollute the global
scope with the module's exports. Thus, the following code written for the old
model:

  ChromeUtils.import("resource://gre/modules/Services.jsm");

is approximately the same as the following, in the new model:

  var {Services} = ChromeUtils.import("resource://gre/modules/Services.jsm");

Since the two behaviors are mutually incompatible, this patch will land with a
scripted rewrite to update all existing callers to use the new model rather
than the old.
***
Bug 1514594: Part 3b - Mass rewrite all JS code to use the new ChromeUtils.import API. rs=Gijs

This was done using the followng script:

https://bitbucket.org/kmaglione/m-c-rewrites/src/tip/processors/cu-import-exports.jsm
***
Bug 1514594: Part 3c - Update ESLint plugin for ChromeUtils.import API changes. r=Standard8

Differential Revision: https://phabricator.services.mozilla.com/D16747
***
Bug 1514594: Part 3d - Remove/fix hundreds of duplicate imports from sync tests. r=Gijs

Differential Revision: https://phabricator.services.mozilla.com/D16748
***
Bug 1514594: Part 3e - Remove no-op ChromeUtils.import() calls. r=Gijs

Differential Revision: https://phabricator.services.mozilla.com/D16749
***
Bug 1514594: Part 3f.1 - Cleanup various test corner cases after mass rewrite. r=Gijs
***
Bug 1514594: Part 3f.2 - Cleanup various non-test corner cases after mass rewrite. r=Gijs

Differential Revision: https://phabricator.services.mozilla.com/D16750

--HG--
extra : rebase_source : 359574ee3064c90f33bf36c2ebe3159a24cc8895
extra : histedit_source : b93c8f42808b1599f9122d7842d2c0b3e656a594%2C64a3a4e3359dc889e2ab2b49461bab9e27fc10a7
2019-01-17 10:18:31 -08:00
Andrea Marchesini
8b89f2aaf9 Bug 1522776 - Unsupported permission values should be ignored by Sanitizer.jsm, r=johannh 2019-01-25 11:44:40 +01:00
Andrea Marchesini
ae7e7d4c3a Bug 1521051 - Get rid of nsICookiePermission.ACCESS_ALLOW_FIRST_PARTY_ONLY, r=johannh, r=flod 2019-01-23 19:19:19 +01:00
Andrea Marchesini
dc777dc7a6 Bug 1521051 - nsICookiePermission.ACCESS_LIMIT_THIRD_PARTY, r=valentin, r=johannh 2019-01-23 19:19:18 +01:00
Razvan Maries
7ccb4bf803 Backed out 2 changesets (bug 1521051) for xpcshell fails on extensions/cookie/test/unit/test_cookies_thirdparty.js. CLOSED TREE
Backed out changeset 90bb620dd870 (bug 1521051)
Backed out changeset 483fa314e45e (bug 1521051)
2019-01-23 22:09:32 +02:00
Andrea Marchesini
8e0c688733 Bug 1521051 - Get rid of nsICookiePermission.ACCESS_ALLOW_FIRST_PARTY_ONLY, r=johannh, r=flod 2019-01-23 19:19:19 +01:00
Andrea Marchesini
fb5e2a4f57 Bug 1521051 - nsICookiePermission.ACCESS_LIMIT_THIRD_PARTY, r=valentin, r=johannh 2019-01-23 19:19:18 +01:00
Andrea Marchesini
562202c9bd Bug 1512485 - Introduce nsIClearDataService.deleteDataFromOriginAttributesPattern, r=johannh 2018-12-09 13:19:04 +01:00
Andrea Marchesini
e8cb35c9b3 Bug 1507171 - Cleanup data on shutdown just for http, https and file URLs, r=johannh 2018-11-19 16:02:23 +01:00
Nika Layzell
fe2f2478f7 Bug 1477432 - Part 2: Avoid using nsIJSID in GenerateQI, and produce better diagnostics, r=kmag
This is the first part of hiding the implementation of nsIJSID behind the
interface added in Part 1, such that we can substitute that implementation out.

I had to make a couple of changes to fix the errors caused by the new behaviour
in GenerateQI.

Differential Revision: https://phabricator.services.mozilla.com/D2279
2018-11-16 17:27:31 -05:00
Andrea Marchesini
1a3d20aa4f Bug 1505071 - Cleanup cookies should ignore OriginAttributes on shutdown, r=johannh 2018-11-13 16:49:01 +01:00
Kris Maglione
ade8c9ede8 Bug 1482091: Part 2 - Remove TelemetryStopwatch.jsm in favor of native implementation. r=chutten
Differential Revision: https://phabricator.services.mozilla.com/D9888

--HG--
extra : source : afd0a13bcfff4c92ad2497ec687f466484481667
extra : amend_source : 501bca3f94a0cb0c8bec1f30d0b3f64a50b04e48
extra : intermediate-source : bc03f101937e373fdaca735f3f356960a5239bc0
2018-10-25 19:04:01 -07:00
arthur.iakab
0c81738411 Backed out 2 changesets (bug 1482091) for bc failures on browser_domFullscreen_fullscreenMode.js
Backed out changeset bc03f101937e (bug 1482091)
Backed out changeset 28a19b7290ab (bug 1482091)
2018-11-03 01:08:36 +02:00
Kris Maglione
7fa01216a4 Bug 1482091: Part 2 - Remove TelemetryStopwatch.jsm in favor of native implementation. r=chutten
Differential Revision: https://phabricator.services.mozilla.com/D9888

--HG--
extra : source : afd0a13bcfff4c92ad2497ec687f466484481667
extra : amend_source : bf22d8e9ce5c081902bd5c75b892cc434a167300
2018-10-25 19:04:01 -07:00
arthur.iakab
cf2aa54f83 Backed out 2 changesets (bug 1482091)for failing browser chrome failures on browser_panelUINotifications_fullscreen_noAutoHideToolbar.js
Backed out changeset afd0a13bcfff (bug 1482091)
Backed out changeset a19c6b3e0402 (bug 1482091)
2018-11-02 23:01:15 +02:00
Kris Maglione
96f3e16d1a Bug 1482091: Part 2 - Remove TelemetryStopwatch.jsm in favor of native implementation. r=chutten
Differential Revision: https://phabricator.services.mozilla.com/D9888

--HG--
extra : rebase_source : a9daea3a9efea37acdbcaecda8bf0b7f69631de4
extra : histedit_source : bb8b416b1387da9de3bd95c7a171f10426a22602
2018-10-25 19:04:01 -07:00
Andrea Marchesini
e7cd4e9921 Bug 1503217 - When deleting session data on shutdown, we should check 'cookie' permissions also for sub-domains, r=johannh 2018-11-01 07:34:43 +01:00
Andrea Marchesini
e78ef32074 Bug 1482055 - Cleanup cookie at shutdown must support domain cookies, r=johannh 2018-10-27 10:26:31 +02:00
Andrea Marchesini
1f9d9c2fc3 Bug 1482055 - Cleanup old cookies at shutdown if network.cookie.lifetimePolicy is ACCEPT_SESSION, r=johannh 2018-10-24 17:48:17 +02:00
Ryan VanderMeulen
7482d4da97 Backed out changeset 2c633215c514 (bug 1482055) for causing bug 1500505. 2018-10-19 13:32:56 -04:00
Andrea Marchesini
20405b112f Bug 1482055 - Cleanup old cookies at shutdown if network.cookie.lifetimePolicy is ACCEPT_SESSION, r=johannh 2018-10-17 19:53:51 +02:00
Mark Banner
691543ee89 Bug 1486739 - Add missing dangling commas in browser/, services/, taskcluster/ and toolkit/. r=mossop
Automatic changes by ESLint, except for manual corrections for .xml files.

Differential Revision: https://phabricator.services.mozilla.com/D4439

--HG--
extra : moz-landing-system : lando
2018-08-31 05:59:17 +00:00
Kris Maglione
80327d3561 Bug 1484496: Part 5a - Convert browser/ nsISimpleEnumerator users to use JS iteration. r=Gijs
Differential Revision: https://phabricator.services.mozilla.com/D3729

--HG--
extra : rebase_source : e187b8e9a6b6db7ebc762adda5e489b25c7a7e43
extra : histedit_source : 868cb99d09954a51d6be321fcb516475ef70eb33
2018-08-18 19:27:33 -07:00
Andrea Marchesini
a2d7453121 Bug 1477539 - Sanitizer.jsm must cleanup content preferences, r=Gijs 2018-07-30 23:15:15 +02:00
Brian Grinstead
96dc530924 Bug 1476333 - Refer to AppConstants.BROWSER_CHROME_URL to get the browser URL from the frontend;r=Gijs
Before this change, we accessed the browser URL in the following ways:

- "chrome://browser/content/browser.xul"
- "chrome://browser/content/" (which redirects to chrome://browser/content/browser.xul)
- Services.prefs.getCharPref("browser.chromeURL") which returns "chrome://browser/content/"
- getBrowserURL() from utilityOverlay.js

MozReview-Commit-ID: I5vtRke1x9t

--HG--
extra : rebase_source : c525350a1954740873e85b045cbb14a8b43aa89d
2018-07-24 08:12:50 -07:00
Jonathan Kew
7a02cac781 Bug 1469518 - Ensure history sanitization for "today" reaches all the way back to exactly midnight. r=mak 2018-06-20 12:34:02 +01:00
Andrea Marchesini
4eee763067 Bug 1422365 - Introduce nsIClearDataService - part 18 - custom flags for ForgetAboutSite, r=johannh 2018-06-01 14:31:26 +02:00
Andrea Marchesini
ebedd40a12 Bug 1422365 - Introduce nsIClearDataService - part 16 - security settings, r=johannh 2018-06-01 14:31:02 +02:00
Andrea Marchesini
18aa82d9fc Bug 1422365 - Introduce nsIClearDataService - part 15 - permissions and preferences, r=johannh 2018-06-01 14:30:50 +02:00
Andrea Marchesini
fe0853f6f2 Bug 1422365 - Introduce nsIClearDataService - part 14 - logins, r=johannh 2018-06-01 14:30:01 +02:00
Andrea Marchesini
bd85ed6605 Bug 1422365 - Introduce nsIClearDataService - part 13 - auth tokens, r=johannh 2018-06-01 14:30:01 +02:00