Commit Graph

42739 Commits

Author SHA1 Message Date
Carsten "Tomcat" Book
c89ca66d22 Backed out changeset 826cc48624a3 (bug 1280590) for windows m-oth and xpc crashes
--HG--
extra : rebase_source : 895634096f3c1e275ab4f74f1d93691f5b55e22c
2016-09-29 15:28:53 +02:00
Gijs Kruitbosch
67b24ae5ac Bug 1301876, r=mconley
MozReview-Commit-ID: EV40sJD6yR2

--HG--
extra : rebase_source : 8c837c793e4a85116bbf365510c648d7320ec74c
2016-09-13 12:10:54 +01:00
Andrea Marchesini
f69927d55d Bug 1280590 - nsICookieManager2.cookieExists must use the originAttributes, r=smaug 2016-09-29 12:02:30 +02:00
Jonathan Kingston
8f10491335 Bug 1302157 - Remove images-in-menu and images-in-button code (& associated icons) since it's deprecated in GTK. r=bz,dholbert
MozReview-Commit-ID: IIj8PvgdaRp

--HG--
extra : rebase_source : 21eca47872a073b382c10fe84464fac8fafd6179
2016-09-29 00:22:32 +01:00
Haik Aftandilian
c7963e7731 Bug 1284588 - OS X: Disable content process write access to user files in the home directory; r=gcp
Changes the semantics of the security.sandbox.content.level pref on OS X with
respect to file access to the user's home directory. With the fix, Nightly
defaults to 2 while other releases will default to 1. The level values now
have the following meaning.

*) security.sandbox.content.level=0 disables content process sandboxing.
No change here.

*) security.sandbox.content.level=1 blocks write access to the majority of the
home directory.

*) security.sandbox.content.level=2 includes the write access blocking in
level 1, but also blocks both read and write access to ~/Library and $PROFILE
excluding the extensions and weave subdirectories.

Prior to this fix, Nightly defaulted to a value of 1 while all other releases
used 0. The value of 1 meant that read/write access to ~/Library and the
$PROFILE dir (excluding $PROFILE/{extensions,weave}) was prevented.

The strength of a level=1 sandbox is reduced by this with fix,
but level=1 becomes the first ride-the-trains content sandbox candidate,
Nightly changes to level=2, and higher levels still indicate a more
restrictive sandbox.

MozReview-Commit-ID: 7NJAe24T4pU

--HG--
extra : rebase_source : 8cb5ea82004ad631fe688bafffa9dc9979568679
2016-09-26 11:30:08 -07:00
Bob Silverberg
f9cd92ee79 Bug 1272686 - Change PlacesTestUtils.addVisits to use PlacesUtils.history.insertMany internally, r=mak
MozReview-Commit-ID: BarTJPc2Xfr

--HG--
extra : rebase_source : a43518b5cf8019086240e4f0aadae1b371dc851d
2016-09-22 13:00:55 -04:00
Gijs Kruitbosch
9eebf1b608 Bug 1191778 - remove references to mozapps content preferences.css stylesheet, r=jaws
MozReview-Commit-ID: JSVGbUZDxbB

--HG--
extra : rebase_source : 014abb3cdd0a780af1c6db18e08bb97a220f729a
2016-09-28 19:28:07 +01:00
Gregory Szorc
fe0d86377a Bug 1305444 - Move telemetry assignment, remove variable use; r=Yoric
We have an unused "telemetry" variable. Use this variable and move
the telemetry assignment to immediately after the operation it is
recording.

While I was here, I also cleaned up the timing variables. I eliminated
the end time variable and moved the declaration of the start time
variable so its scope is shorter.

MozReview-Commit-ID: IbGOK5pPkcR

--HG--
extra : rebase_source : a5ff906452cca9764eb52e1b54a83d26efa52e94
extra : source : d4c60188e82c85d8d324706961ecc56b09838b4b
2016-09-24 17:18:21 -07:00
Carsten "Tomcat" Book
762cd18602 Merge mozilla-central to autoland 2016-09-28 16:52:13 +02:00
Carsten "Tomcat" Book
572e74ee99 merge mozilla-inbound to mozilla-central a=merge 2016-09-28 15:56:33 +02:00
Phil Ringnalda
0ad3db41b5 Backed out changeset 5ef08ec39cd7 (bug 1305444) for failures in browser_upgrade_backup.js
CLOSED TREE
2016-09-27 19:59:59 -07:00
Gregory Szorc
5e8f0b027e Bug 1305444 - Move telemetry assignment, remove variable use; r=Yoric
We have an unused "telemetry" variable. Use this variable and move
the telemetry assignment to immediately after the operation it is
recording.

While I was here, I also cleaned up the timing variables. I eliminated
the end time variable and moved the declaration of the start time
variable so its scope is shorter.

MozReview-Commit-ID: IbGOK5pPkcR

--HG--
extra : rebase_source : 7ab28e2ebeaf5ac8a9af8e9f79a58aebb61e1793
2016-09-24 17:18:21 -07:00
Phil Ringnalda
6f3a9050ba Backed out changeset 9b6a4552a5c2 (bug 1254221) for test_ext_cookies.html timeouts and lint failures
CLOSED TREE
2016-09-27 18:21:01 -07:00
Bill McCloskey
e26fb466f2 Bug 1304359 - Don't break browser for tabswitch assertions (r=mconley) 2016-09-27 18:46:35 -07:00
Bill McCloskey
1af5239b38 Bug 1283681 - Update list of CPOW-whitelisted add-ons based on new data 2016-09-27 15:15:25 -07:00
Kate McKinley
c57d400961 Bug 1246540 - HSTS Priming Proof of Concept. r=ckerschb, r=mayhemer, r=jld, r=smaug, r=dkeeler, r=jmaher, p=ally
HSTS priming changes the order of mixed-content blocking and HSTS
upgrades, and adds a priming request to check if a mixed-content load is
accesible over HTTPS and the server supports upgrading via the
Strict-Transport-Security header.

Every call site that uses AsyncOpen2 passes through the mixed-content
blocker, and has a LoadInfo. If the mixed-content blocker marks the load as
needing HSTS priming, nsHttpChannel will build and send an HSTS priming
request on the same URI with the scheme upgraded to HTTPS. If the server
allows the upgrade, then channel performs an internal redirect to the HTTPS URI,
otherwise use the result of mixed-content blocker to allow or block the
load.

nsISiteSecurityService adds an optional boolean out parameter to
determine if the HSTS state is already cached for negative assertions.
If the host has been probed within the previous 24 hours, no HSTS
priming check will be sent.

MozReview-Commit-ID: ES1JruCtDdX

--HG--
extra : rebase_source : 2ac6c93c49f2862fc0b9e595eb0598cd1ea4bedf
2016-09-27 11:27:00 -04:00
Dão Gottwald
b2c4616ac5 Bug 1304363 followup, fixing typo
--HG--
extra : rebase_source : 23835aa735d7ee4fbed6d4c6c0404db8f6fcc9b4
2016-09-27 13:39:21 +02:00
Dão Gottwald
08bcfd5279 Bug 1304363 - Use preprocessing instead of CSS variables for identity block icon variants. r=gijs 2016-09-27 11:57:38 +02:00
Carsten "Tomcat" Book
ceb8695fd3 Merge mozilla-central to mozilla-inbound 2016-09-27 11:26:17 +02:00
James Cheng
48efb9caad Bug 1300654 Part1-Remove MOZ_EME from code base. r=cpearce,smaug
MozReview-Commit-ID: JboGO0w4tcE

--HG--
extra : rebase_source : abfe53f30081f74fc39c900cab48d08c7574bfec
2016-09-08 18:06:20 +08:00
Gijs Kruitbosch
17db78f2b5 Bug 1284395, r=bz,mconley,baku
MozReview-Commit-ID: 1nPyv7G3q7d

--HG--
extra : rebase_source : 9b0b75c43d441a13992f085ce6f766aee0614666
extra : source : 6036b8acdab58eb565f15e12f8184f8abe7c6413
2016-09-06 14:19:45 +01:00
Iris Hsiao
bea139e001 Merge mozilla-central to autoland 2016-09-26 19:14:57 +08:00
Iris Hsiao
767e1e9b11 merge mozilla-inbound to mozilla-central a=merge 2016-09-26 18:34:20 +08:00
Iris Hsiao
a95e0164c0 merge fx-team to mozilla-central a=merge 2016-09-26 18:29:38 +08:00
Iris Hsiao
eed5d11870 merge autoland to mozilla-central a=merge 2016-09-26 18:04:27 +08:00
Mike Conley
6936fd4dde Bug 1304677 - Make browser_UnsubmittedCrashHandler.js properly uninit a disabled UnsubmittedCrashHandler. r=Felipe
MozReview-Commit-ID: 4xjeWOCCvjg

--HG--
extra : rebase_source : e861a87df922e94642212710e815de6f3c38e4ee
2016-09-24 14:15:52 -04:00
ffxbld
05ed82e50b No bug, Automated blocklist update from host bld-linux64-spot-389 - a=blocklist-update 2016-09-24 06:03:55 -07:00
Sebastian Hengst
1c9ffd7194 Backed out changeset 20d78ac1c18a (bug 1283076) for failing xpcshell test test_browserGlue_corrupt_nobackup_default.js. r=backout 2016-09-23 19:12:01 +02:00
Sylvestre Ledru
c68ee7842a Bug 1305037 - simplify the declaration of loadFlags r=fkiefer
MozReview-Commit-ID: GNpwDjPp631

--HG--
extra : rebase_source : 0a2475c9a14a4028736f7038998a0161df92ff9f
2016-09-23 15:06:52 +02:00
Carsten "Tomcat" Book
a65e4225ef merge mozilla-inbound to mozilla-central a=merge 2016-09-23 12:05:53 +02:00
Chris Pearce
09ea97e46f Bug 1304899 - Don't download Adobe Primetime CDM by default. r=kentuckyfriedtakahe
Disabling the Adobe CDM but leaving it visible means that we won't download it
and if a site tries to use it we will prompt the user to enable DRM and only
then download it.

MozReview-Commit-ID: LtEr0NJMiQM

--HG--
extra : rebase_source : b7c6f005fb6173c41af6a583c22473066a47a5eb
2016-09-23 10:31:16 +12:00
Mark Hammond
adc2fdcc9f Bug 1293181 - remove the override of entrypoint=uitour for FxA-server collected metrics. r=kitcambridge
MozReview-Commit-ID: FmH9nIZTd75

--HG--
extra : rebase_source : 2008e34dbb4dd11f413a6a2bca98143ea2d4ad89
2016-09-22 17:34:50 +10:00
Fischer.json
37de9268dd Bug 1028029 - Improve accesskeys in Sync pane of in-content preferences. r=jaws
MozReview-Commit-ID: JL4qlQavo0l

--HG--
extra : transplant_source : %3C%99%D4s%82%18%AE%B1%B3%8Dl%CD%8D%EF%D2%0A%86%B9%05%FE
2016-09-13 15:27:43 +08:00
Pascal Chevrel
d624ba76c0 Bug 1283076 - "Change default bookmarks for Nightly". r=dolske 2016-09-23 07:06:00 +02:00
Florian Quèze
e920cecf91 Bug 1304798 - Fix opening video streams for pages with persistent permissions, r=gcp. 2016-09-23 16:20:29 +02:00
Vincent Lequertier
70b86104c9 Bug 1301351 - Remove the toolbarbutton class; r=dao 2016-09-22 23:18:33 +02:00
Felipe Gomes
e98a6cf869 Bug 1304164 - Bump e10srollout version to 1.3. r=mconley
MozReview-Commit-ID: J1X3TNOaqN
2016-09-22 15:55:11 -03:00
Felipe Gomes
bb0e889212 Bug 1304164 - Temporarily disable e10s for users on the Russian locale. r=mconley
MozReview-Commit-ID: FDkbVkzZhJH
2016-09-22 15:55:11 -03:00
Felipe Gomes
bdd586f2e9 Bug 1304164 - Allow the e10srollout system add-on to control temporary disqualifications. r=mconley
MozReview-Commit-ID: Lm6PqVe5eb1
2016-09-22 15:55:11 -03:00
Rob Wu
467b53928a Bug 1296900 - Hide commands API if manifest key is missing r=kmag
MozReview-Commit-ID: 7vld6MgSlqG

--HG--
extra : rebase_source : 8569bb3f878adf1c25216ad5a0ddae90b0d50dda
2016-08-20 23:01:43 -07:00
Rob Wu
cbe00aff2e Bug 1296900 - Add test for availability of default WebExtension APIs r=kmag
MozReview-Commit-ID: LIr5Nsv51I3

--HG--
extra : rebase_source : 54e4b9169c545cb6359c7a0273dfaa54369da231
2016-08-20 22:21:45 -07:00
Sebastian Hengst
7b48d9ae89 Backed out changeset 1e8a7c6dcea1 (bug 1284588) for leaks in browser-chrome tests on OS X 10.10 debug. r=backout 2016-09-24 11:51:01 +02:00
Haik Aftandilian
37f44f499e Bug 1284588 - OS X: Disable content process write access to user files in the home directory; r=gcp
Changes the semantics of the security.sandbox.content.level pref on OS X with
respect to file access to the user's home directory. With the fix, Nightly
defaults to 2 while other releases will default to 1. The level values now
have the following meaning.

*) security.sandbox.content.level=0 disables content process sandboxing.
No change here.

*) security.sandbox.content.level=1 blocks write access to the majority of the
home directory.

*) security.sandbox.content.level=2 includes the write access blocking in
level 1, but also blocks both read and write access to ~/Library and $PROFILE
excluding the extensions and weave subdirectories.

Prior to this fix, Nightly defaulted to a value of 1 while all other releases
used 0. The value of 1 meant that read/write access to ~/Library and the
$PROFILE dir (excluding $PROFILE/{extensions,weave}) was prevented.

The strength of a level=1 sandbox is reduced by this with fix,
but level=1 becomes the first ride-the-trains content sandbox candidate,
Nightly changes to level=2, and higher levels still indicate a more
restrictive sandbox.

MozReview-Commit-ID: 7NJAe24T4pU

--HG--
extra : rebase_source : 6e678cc6d23c604d8ed0888d6ceeeb4bf797cb1f
2016-09-22 19:21:13 -07:00
Wes Kocher
b77ba3eb2a Backed out 2 changesets (bug 1296900) for mochitest failures in test_ext_all_apis.html a=backout
Backed out changeset c37cf3cfd39c (bug 1296900)
Backed out changeset 998ed8336288 (bug 1296900)
2016-09-23 16:15:05 -07:00
Rob Wu
2487486fb5 Bug 1296900 - Hide commands API if manifest key is missing r=kmag
MozReview-Commit-ID: 7vld6MgSlqG

--HG--
extra : rebase_source : c86bdd4fefa357655c5fb95e2934b79320fd2fa8
2016-08-20 23:01:43 -07:00
Rob Wu
e31aa32c80 Bug 1296900 - Add test for availability of default WebExtension APIs r=kmag
MozReview-Commit-ID: LIr5Nsv51I3

--HG--
extra : rebase_source : 00f17e5b9b38b4a658b4b2a011ff6061a3f520b0
2016-08-20 22:21:45 -07:00
Phil Ringnalda
8b351624d3 Backed out 2 changesets (bug 1304815) for continuing to fail to build on OS X despite being clobbered twice
CLOSED TREE

Backed out changeset 11e6496ab698 (bug 1304815)
Backed out changeset a2cbbd85a818 (bug 1304815)
2016-09-22 19:57:04 -07:00
Tomislav Jovanovic
4e44ccab20 bug 1269421 - enable HTML tooltips in extension popups, r=aswan
MozReview-Commit-ID: 6pyJKgKGW5F

--HG--
extra : rebase_source : ccb839e4a8bed8fff2f384d095893ec0ada26f6b
2016-09-22 03:22:15 +02:00
Tomislav Jovanovic
6c44e70416 bug 1274809 - Add missing properties to OnClicked data, r=aswan
MozReview-Commit-ID: 4BodpIuKCz2

--HG--
extra : rebase_source : 981fe298e821c872898f503707ccd59fcb85b869
2016-09-21 02:12:11 +02:00
Ralph Giles
95ff90e711 Bug 1304815 - Update mac builders to rustc 1.12.0-beta.5. r=ted
Move to a late beta of 1.12 to work around the llvm-dsymutil
crashes from running `./mach buildsymbols` with the rustc 1.11
output on current m-c. See bug 1301751 for details.

MozReview-Commit-ID: 1gbAGLOxkaO

--HG--
extra : rebase_source : 14ce15d9890a9e052f67bb795de209220179d70e
2016-09-22 11:36:12 -07:00