Simon Giesecke
ff33957d91
Bug 1613985 - Use default for equivalent-to-default constructors/destructors in dom/security. r=smaug
...
Depends on D65181
Differential Revision: https://phabricator.services.mozilla.com/D65182
--HG--
extra : moz-landing-system : lando
2020-03-03 22:07:43 +00:00
Sebastian Streich
e333553994
Bug 1579094 - Allow not having a Port for RessourceURI if the Scheme has no Default Port r=ckerschb
...
Differential Revision: https://phabricator.services.mozilla.com/D60521
--HG--
extra : moz-landing-system : lando
2020-02-10 18:23:29 +00:00
Jonathan Kingston
f4f8e6b1d9
Bug 1605123 - Fix CSP keyword invalidation assertion crash. r=ckerschb
...
Differential Revision: https://phabricator.services.mozilla.com/D57803
--HG--
extra : moz-landing-system : lando
2019-12-19 15:19:04 +00:00
Gabriele Svelto
ace6d1063f
Bug 1600545 - Remove useless inclusions of header files generated from IDL files in dom/ r=Ehsan
...
The inclusions were removed with the following very crude script and the
resulting breakage was fixed up by hand. The manual fixups did either
revert the changes done by the script, replace a generic header with a more
specific one or replace a header with a forward declaration.
find . -name "*.idl" | grep -v web-platform | grep -v third_party | while read path; do
interfaces=$(grep "^\(class\|interface\).*:.*" "$path" | cut -d' ' -f2)
if [ -n "$interfaces" ]; then
if [[ "$interfaces" == *$'\n'* ]]; then
regexp="\("
for i in $interfaces; do regexp="$regexp$i\|"; done
regexp="${regexp%%\\\|}\)"
else
regexp="$interfaces"
fi
interface=$(basename "$path")
rg -l "#include.*${interface%%.idl}.h" . | while read path2; do
hits=$(grep -v "#include.*${interface%%.idl}.h" "$path2" | grep -c "$regexp" )
if [ $hits -eq 0 ]; then
echo "Removing ${interface} from ${path2}"
grep -v "#include.*${interface%%.idl}.h" "$path2" > "$path2".tmp
mv -f "$path2".tmp "$path2"
fi
done
fi
done
Differential Revision: https://phabricator.services.mozilla.com/D55442
--HG--
extra : moz-landing-system : lando
2019-12-06 09:24:56 +00:00
Dorel Luca
a381d5c96d
Backed out changeset f6e53d1c6518 (bug 1600545) for Android build bustage. CLOSED TREE
2019-12-04 17:32:27 +02:00
Gabriele Svelto
bc9290f767
Bug 1600545 - Remove useless inclusions of header files generated from IDL files in dom/ r=Ehsan
...
The inclusions were removed with the following very crude script and the
resulting breakage was fixed up by hand. The manual fixups did either
revert the changes done by the script, replace a generic header with a more
specific one or replace a header with a forward declaration.
find . -name "*.idl" | grep -v web-platform | grep -v third_party | while read path; do
interfaces=$(grep "^\(class\|interface\).*:.*" "$path" | cut -d' ' -f2)
if [ -n "$interfaces" ]; then
if [[ "$interfaces" == *$'\n'* ]]; then
regexp="\("
for i in $interfaces; do regexp="$regexp$i\|"; done
regexp="${regexp%%\\\|}\)"
else
regexp="$interfaces"
fi
interface=$(basename "$path")
rg -l "#include.*${interface%%.idl}.h" . | while read path2; do
hits=$(grep -v "#include.*${interface%%.idl}.h" "$path2" | grep -c "$regexp" )
if [ $hits -eq 0 ]; then
echo "Removing ${interface} from ${path2}"
grep -v "#include.*${interface%%.idl}.h" "$path2" > "$path2".tmp
mv -f "$path2".tmp "$path2"
fi
done
fi
done
Differential Revision: https://phabricator.services.mozilla.com/D55442
--HG--
extra : moz-landing-system : lando
2019-12-04 15:01:19 +00:00
Benjamin
934da4e096
Bug 1529068 - Implementation of the navigate-to CSP directive as defined in CSP Level 3. r=ckerschb,mccr8
...
https://www.w3.org/TR/CSP3/#directive-navigate-to
Differential Revision: https://phabricator.services.mozilla.com/D37139
--HG--
extra : moz-landing-system : lando
2019-09-10 22:33:51 +00:00
Dorel Luca
ec62854d68
Backed out changeset 890bcaee9b7d (bug 1529068) for causing massive tier2 failures on central in dom/security/test/csp/test_navigate_to.html. CLOSED TREE
2019-09-05 09:47:35 +03:00
Benjamin
2202fa3333
Bug 1529068 - Implementation of the navigate-to CSP directive as defined in CSP Level 3. r=ckerschb,mccr8
...
https://www.w3.org/TR/CSP3/#directive-navigate-to
Differential Revision: https://phabricator.services.mozilla.com/D37139
--HG--
extra : moz-landing-system : lando
2019-09-04 20:29:37 +00:00
Csoregi Natalia
2dd3b18187
Backed out changeset 99b313550fb8 (bug 1529068) for eslint failure on test_navigate_to.html. CLOSED TREE
2019-09-04 21:15:18 +03:00
Benjamin
33379674f8
Bug 1529068 - Implementation of the navigate-to CSP directive as defined in CSP Level 3. r=ckerschb,mccr8
...
https://www.w3.org/TR/CSP3/#directive-navigate-to
Differential Revision: https://phabricator.services.mozilla.com/D37139
--HG--
extra : moz-landing-system : lando
2019-09-04 17:44:14 +00:00
Sebastian Streich
6a4c76882f
Bug 1505412 - Skip CSP-Nonce check for CSP-Ro+Redirected Channels r=ckerschb
...
***
- Another test setup
Differential Revision: https://phabricator.services.mozilla.com/D36916
--HG--
extra : moz-landing-system : lando
2019-09-02 14:49:27 +00:00
Noemi Erli
2d0fff3267
Backed out changeset 4bedbc45e231 (bug 1505412) for failures in test_bug1505412.html CLOSED TREE
2019-08-22 19:52:49 +03:00
Sebastian Streich
5c3cba344d
Bug 1505412 - Skip CSP-Nonce check for CSP-Ro+Redirected Channels r=ckerschb
...
Differential Revision: https://phabricator.services.mozilla.com/D36916
--HG--
extra : moz-landing-system : lando
2019-08-22 15:23:17 +00:00
Daniel Varga
952e8654d9
Backed out changeset 983ff93a11ad (bug 1505412) for debug-test-verify-e10s failure at dom/security/test/csp/test_bug1505412.html. On a CLOSED TREE
2019-08-16 13:19:32 +03:00
Sebastian Streich
645ecf6d90
Bug 1505412 - Skip CSP-Nonce check for CSP-Ro+Redirected Channels r=ckerschb
...
Differential Revision: https://phabricator.services.mozilla.com/D36916
--HG--
extra : moz-landing-system : lando
2019-08-15 15:51:33 +00:00
Andreea Pavel
8f56db01f7
Backed out changeset d0aae34d9b95 (bug 1529068) for failing form-redirected-blocked.sub.html on a CLOSED TREE
...
--HG--
extra : rebase_source : 4d7a73e1f40de001031c61fba240c57961a902d8
2019-08-07 01:39:29 +03:00
Benjamin
455d7a7789
Bug 1529068 - navigate-to r=ckerschb,mccr8
...
Implementation of the navigate-to CSP directive as defined in CSP Level 3, https://www.w3.org/TR/CSP3/#directive-navigate-to
Differential Revision: https://phabricator.services.mozilla.com/D37139
--HG--
extra : moz-landing-system : lando
2019-08-06 18:27:45 +00:00
Tom Schuster
af8f619ad2
Bug 1558915 - Use infallible nsIURI::SchemeIs in dom/security. r=ckerschb
...
Differential Revision: https://phabricator.services.mozilla.com/D39779
--HG--
extra : moz-landing-system : lando
2019-07-30 07:23:18 +00:00
Christoph Kerschbaumer
ad40847192
Bug 1567877: Apply Meta CSP to about:devtools-toolbox. r=jdescottes,Ehsan
...
Differential Revision: https://phabricator.services.mozilla.com/D39328
--HG--
extra : moz-landing-system : lando
2019-07-30 07:14:09 +00:00
Sebastian Streich
c60f801089
Bug 1388015 - Add checks to respect CSP-wildcard + Ports r=ckerschb
...
Differential Revision: https://phabricator.services.mozilla.com/D35432
--HG--
extra : moz-landing-system : lando
2019-07-04 11:30:17 +00:00
Alex Catarineu
dbce01f2ff
Bug 467035 - Add new internal DTD content types r=ckerschb
...
Differential Revision: https://phabricator.services.mozilla.com/D35232
--HG--
extra : moz-landing-system : lando
2019-07-03 17:28:25 +00:00
Boris Zbarsky
9de72a3ac6
Bug 1557793 part 2. Stop using [array] in nsIStringBundle. r=Pike
...
Differential Revision: https://phabricator.services.mozilla.com/D34196
--HG--
extra : moz-landing-system : lando
2019-06-11 15:51:51 +00:00
Christoph Kerschbaumer
b633427366
Bug 965637: Move CSP from Principal into Client, part 1: backend changes. r=mccr8
...
Differential Revision: https://phabricator.services.mozilla.com/D27654
--HG--
extra : moz-landing-system : lando
2019-05-21 23:14:27 +00:00
Eden Chuang
72b79c6fbd
Bug 1442778 - Add "chromeContext" parameter to console API and console service messages. r=smaug
...
1. Adding a new attribute chromeContext in ConsoleEvent
2. Adding a new boolean attribute isFromChromeContext in nsIConsoleMessage
3. Sending IsFromChromeContext to the parent process
Differential Revision: https://phabricator.services.mozilla.com/D23330
--HG--
extra : moz-landing-system : lando
2019-04-01 22:42:34 +00:00
Sebastian Streich
82fb5d3ddf
Bug 1386214 - Remove require-sri from the CSP-Module r=ckerschb,qdot
...
Differential Revision: https://phabricator.services.mozilla.com/D24880
--HG--
extra : moz-landing-system : lando
2019-03-26 21:58:48 +00:00
Cosmin Sabou
78fc71e3c3
Backed out changeset 7fa7d6e6dedc (bug 1442778) for devtools failures on browser_webconsole_check_stubs_console_api.js CLOSED TREE
2019-03-26 20:27:55 +02:00
Eden Chuang
5e4df764d9
Bug 1442778 - Add "chromeContext" parameter to console API and console service messages. r=smaug
...
1. Adding a new attribute chromeContext in ConsoleEvent
2. Adding a new boolean attribute isFromChromeContext in nsIConsoleMessage
3. Sending IsFromChromeContext to the parent process
Differential Revision: https://phabricator.services.mozilla.com/D23330
--HG--
extra : moz-landing-system : lando
2019-03-26 15:18:20 +00:00
Tom Schuster
a60d06b5ef
Bug 1525006 - Add a new internal ContentPolicyType for ES6 modules. r=ckerschb
...
Differential Revision: https://phabricator.services.mozilla.com/D19269
--HG--
extra : moz-landing-system : lando
2019-02-12 13:16:32 +00:00
Sylvestre Ledru
265e672179
Bug 1511181 - Reformat everything to the Google coding style r=ehsan a=clang-format
...
# ignore-this-changeset
--HG--
extra : amend_source : 4d301d3b0b8711c4692392aa76088ba7fd7d1022
2018-11-30 11:46:48 +01:00
Andrea Marchesini
dbb1bf7e31
Bug 1438945 - Part 6: CSP via IPC. r=ckerschb
...
--HG--
extra : rebase_source : 8ea27a931619ec0bf75035039c9b4d66d23d7e70
2018-11-19 15:18:21 -08:00
Henri Sivonen
0b01108591
Bug 1489098 - Remove useless use of PromiseFlatString. r=peterv
...
MozReview-Commit-ID: 10JE4PRp8i0
Differential Revision: https://phabricator.services.mozilla.com/D5237
--HG--
extra : moz-landing-system : lando
2018-09-11 17:17:05 +00:00
Mike Hommey
32627430f6
Bug 1489363 - Replace some string.Append* with AppendLiteral. r=froydnj
...
Depends on D5224
Differential Revision: https://phabricator.services.mozilla.com/D5225
--HG--
extra : moz-landing-system : lando
2018-09-07 22:12:04 +00:00
Christoph Kerschbaumer
49eaf535cb
Bug 1474537 - CSP 'self' should translate to 'self' and not be resolved to actual self URI. r=dveditz
2018-07-22 18:08:17 +02:00
Christoph Kerschbaumer
adac33969a
Bug 1304645: Pass individual CSP errors as categories to web console error messages. r=baku
2018-07-20 19:57:21 +02:00
Andreea Pavel
b5a482c899
Backed out 3 changesets (bug 1475073, bug 1304645, bug 1474537) for failing wpt and mochitest on a CLOSED TREE
...
Backed out changeset 4fbeea69b10d (bug 1475073)
Backed out changeset d3ac68d9ead9 (bug 1304645)
Backed out changeset 113b601a3b59 (bug 1474537)
2018-07-20 14:00:09 +03:00
Christoph Kerschbaumer
1de27c0297
Bug 1304645: Pass individual CSP errors as categories to web console error messages. r=baku
2018-07-20 10:42:46 +02:00
Christoph Kerschbaumer
f33c5faa8f
Bug 1474537 - CSP 'self' should translate to 'self' and not be resolved to actual self URI. r=dveditz
2018-07-20 10:39:31 +02:00
Andrea Marchesini
6c9f589b45
Bug 1476589 - Fix a wrong use of a char16_t string in nsCSPUtils, r=ckerschb
2018-07-19 11:11:43 +02:00
Andrea Marchesini
9042bfbc94
Bug 1473218 - Implement report-sample support for CSP directives, r=ckerschb
2018-07-06 08:01:49 +02:00
Emilio Cobos Álvarez
fffb25b74f
Bug 1465585: Switch from mozilla::Move to std::move. r=froydnj
...
This was done automatically replacing:
s/mozilla::Move/std::move/
s/ Move(/ std::move(/
s/(Move(/(std::move(/
Removing the 'using mozilla::Move;' lines.
And then with a few manual fixups, see the bug for the split series..
MozReview-Commit-ID: Jxze3adipUh
2018-06-01 10:45:27 +02:00
Andrea Marchesini
b5118e1ddf
Bug 1302449 - Remove the "referrer" directive in CSP, r=ckerschb
2018-05-09 13:15:08 +02:00
vinoth
ea1f6cdedb
Bug 1439330 - Condition added to block eval if only strict-dynamic is present without unsafe-eval keyword. r=ckerschb
...
Differential Revision: https://phabricator.services.mozilla.com/D859
2018-05-07 14:59:51 -04:00
Jonathan Kingston
0d79353b7d
Bug 1439425 - Ignore empty CSP directives. r=ckerschb
...
MozReview-Commit-ID: 67Ach2vCs8A
--HG--
rename : dom/security/test/csp/file_self_none_as_hostname_confusion.html => dom/security/test/csp/file_empty_directive.html
rename : dom/security/test/csp/file_self_none_as_hostname_confusion.html^headers^ => dom/security/test/csp/file_empty_directive.html^headers^
rename : dom/security/test/csp/test_self_none_as_hostname_confusion.html => dom/security/test/csp/test_empty_directive.html
extra : rebase_source : 1270d3d1aa8d53389e8708d29d2e363e52c02029
2018-03-06 18:48:26 -08:00
Dave Townsend
e2dffad4ac
Bug 1448500: Add speculative request content policy type. r=bz, r=kmag
...
Adds a new TYPE_SPECULATIVE to nsIContentPolicy uses it as the type for
speculative connection channels from the IO service. I believe I've added it to
all the content policies in tree to make sure it behaves the same as TYPE_OTHER
used to.
The webextension test shows that the webextension proxy API sees speculative
lookups requested through the IO service.
MozReview-Commit-ID: DQ4Kq0xdUOD
--HG--
extra : rebase_source : d9460fdac118bc68f0db79749a16f181b580f2e7
2018-03-23 15:27:08 -07:00
Andrea Marchesini
5784769019
Bug 1443079 - nsScriptError.isFromPrivateWindow must match the correct value also in e10s mode, r=smaug
2018-03-13 06:40:38 +01:00
Chung-Sheng Fu
d1124b72c7
Bug 1418243 - Fix SecurityPolicyViolationEvent.violatedDirective. r=ckerschb
...
MozReview-Commit-ID: 8DQ7CI5exUL
--HG--
extra : rebase_source : 69181c5e5f61f6fee5224def74c54985c3b47dee
2018-01-16 22:59:00 +02:00
Andrea Marchesini
a1765c1a3c
Bug 1430758 - No CSP directive for nsIContentPolicy::TYPE_SAVEAS_DOWNLOAD, r=ckerschb
2018-01-16 15:03:02 +01:00
Andreea Pavel
77efdcf21a
Backed out 2 changesets (bug 1418243) for failing mochitest at dom/security/test/csp/test_frame_ancestors_ro.html and mochitest devtools at devtools/client/webconsole/test/browser_webconsole_bug_1010953_cspro.js a=merge
...
Backed out changeset 5357dbb6df2b (bug 1418243)
Backed out changeset 778a37000696 (bug 1418243)
2018-01-16 13:02:32 +02:00
Chung-Sheng Fu
eaddf31393
Bug 1418243 - Fix SecurityPolicyViolationEvent.violatedDirective. r=ckerschb
...
MozReview-Commit-ID: 8DQ7CI5exUL
2018-01-15 23:30:00 +02:00