gecko-dev/dom/security
Ricky Stewart 02a7b4ebdf Bug 1654103: Standardize on Black for Python code in `mozilla-central`.
Allow-list all Python code in tree for use with the black linter, and re-format all code in-tree accordingly.

To produce this patch I did all of the following:

1. Make changes to tools/lint/black.yml to remove include: stanza and update list of source extensions.

2. Run ./mach lint --linter black --fix

3. Make some ad-hoc manual updates to python/mozbuild/mozbuild/test/configure/test_configure.py -- it has some hard-coded line numbers that the reformat breaks.

4. Make some ad-hoc manual updates to `testing/marionette/client/setup.py`, `testing/marionette/harness/setup.py`, and `testing/firefox-ui/harness/setup.py`, which have hard-coded regexes that break after the reformat.

5. Add a set of exclusions to black.yml. These will be deleted in a follow-up bug (1672023).

# ignore-this-changeset

Differential Revision: https://phabricator.services.mozilla.com/D94045
2020-10-26 18:34:53 +00:00
..
featurepolicy Bug 1654103: Standardize on Black for Python code in `mozilla-central`. 2020-10-26 18:34:53 +00:00
fuzztest Bug 1654103: Standardize on Black for Python code in `mozilla-central`. 2020-10-26 18:34:53 +00:00
sanitizer Bug 1654103: Standardize on Black for Python code in `mozilla-central`. 2020-10-26 18:34:53 +00:00
test Bug 1654103: Standardize on Black for Python code in `mozilla-central`. 2020-10-26 18:34:53 +00:00
CSPEvalChecker.cpp Bug 1650145 - Replace all value uses of Empty[C]String by 0-length _ns literals. r=froydnj,geckoview-reviewers,agi 2020-09-23 15:17:15 +00:00
CSPEvalChecker.h
DOMSecurityMonitor.cpp Bug 1648010 - Replace uses of NS_LITERAL_STRING/NS_LITERAL_CSTRING macros by _ns literals. r=geckoview-reviewers,jgilbert,agi,hsivonen,froydnj 2020-07-01 08:29:29 +00:00
DOMSecurityMonitor.h
FramingChecker.cpp Bug 1650145 - Replace all value uses of Empty[C]String by 0-length _ns literals. r=froydnj,geckoview-reviewers,agi 2020-09-23 15:17:15 +00:00
FramingChecker.h
PolicyTokenizer.cpp
PolicyTokenizer.h Bug 1626570 - Improve handling of copying arrays in dom/security/. r=ckerschb 2020-05-06 11:16:49 +00:00
ReferrerInfo.cpp Bug 1608074 - Set channel ReferrerInfo in privileged code instead of referrer header r=nchevobbe,mixedpuppy,valentin 2020-10-13 12:27:26 +00:00
ReferrerInfo.h Backed out changeset f12c895fc5e7 (bug 1605305) for causing bustage on nsHttpChannel.cpp on mc. CLOSED TREE 2020-09-25 09:58:22 +03:00
SRICheck.cpp Bug 1667326: Remove unnecessary pref for SRI. r=freddyb 2020-09-25 10:04:08 +00:00
SRICheck.h
SRILogHelper.h
SRIMetadata.cpp Bug 1623953 - Provide comparative method on SRIMetadata to allow trust delegation to a stronger or identical SRI, r=emilio,ckerschb 2020-05-12 12:40:00 +00:00
SRIMetadata.h Bug 1623953 - Provide comparative method on SRIMetadata to allow trust delegation to a stronger or identical SRI, r=emilio,ckerschb 2020-05-12 12:40:00 +00:00
SecFetch.cpp Bug 1655716 - Introduce TYPE_INTERNAL_FETCH_PRELOAD and use in HTMLLinkElement::AsValueToContentPolicy() - r=emilio,mayhemer,ckerschb 2020-08-11 12:33:14 +00:00
SecFetch.h
moz.build Bug 1654103: Standardize on Black for Python code in `mozilla-central`. 2020-10-26 18:34:53 +00:00
nsCSPContext.cpp Bug 1668071: Use Principal URI instead of document URI when doing CSP frame-ancestors checks so origins which inherit the security context work correctly. r=smaug 2020-10-14 08:48:52 +00:00
nsCSPContext.h Bug 1626570 - Remove obsolete copy enabling machinery. r=froydnj 2020-05-11 08:23:03 +00:00
nsCSPParser.cpp Bug 1667337: Remove unnecessary pref security.csp.enableStrictDynamic and security.csp.experimentalEnabled r=freddyb 2020-09-28 10:10:21 +00:00
nsCSPParser.h
nsCSPService.cpp Bug 1650145 - Replace all value uses of Empty[C]String by 0-length _ns literals. r=froydnj,geckoview-reviewers,agi 2020-09-23 15:17:15 +00:00
nsCSPService.h
nsCSPUtils.cpp Bug 1650145 - Replace all value uses of Empty[C]String by 0-length _ns literals. r=froydnj,geckoview-reviewers,agi 2020-09-23 15:17:15 +00:00
nsCSPUtils.h Bug 1642808 - Remove whitelist from dom security. r=Gijs 2020-06-02 23:15:13 +00:00
nsContentSecurityManager.cpp Backed out changeset 7aa5ac524911 (bug 1608074) for assertion failure on nsContentSecurityUtils.cpp. CLOSED TREE 2020-10-13 16:08:21 +03:00
nsContentSecurityManager.h Bug 1650163 - Part 1: Switch native remoteType values to nsCString, r=farre,geckoview-reviewers,agi 2020-07-08 20:15:59 +00:00
nsContentSecurityUtils.cpp Backed out changeset 7aa5ac524911 (bug 1608074) for assertion failure on nsContentSecurityUtils.cpp. CLOSED TREE 2020-10-13 16:08:21 +03:00
nsContentSecurityUtils.h Backed out changeset 7aa5ac524911 (bug 1608074) for assertion failure on nsContentSecurityUtils.cpp. CLOSED TREE 2020-10-13 16:08:21 +03:00
nsHTTPSOnlyStreamListener.cpp Bug 1653026 - Added HTTPS-Only Mode upgrade info to browser UI state. r=mattwoodrow,necko-reviewers,dragana 2020-10-06 00:34:55 +00:00
nsHTTPSOnlyStreamListener.h Bug 1653026 - Added HTTPS-Only Mode upgrade info to browser UI state. r=mattwoodrow,necko-reviewers,dragana 2020-10-06 00:34:55 +00:00
nsHTTPSOnlyUtils.cpp Bug 1671720: HTTPS-Only Mode: Query if channel is auth only if we can query nsIHttpChannelInternal. r=dragana 2020-10-19 09:05:12 +00:00
nsHTTPSOnlyUtils.h Bug 1662359 - Don't upgrade subresources whose triggering principal is exempt from HTTPS-Only mode. r=ckerschb 2020-09-25 11:23:56 +00:00
nsIHttpsOnlyModePermission.idl Bug 1644456 - Manage HTTPS-Only Mode permission with SitePermissions interface. r=necko-reviewers,pbz,dragana 2020-07-08 12:06:02 +00:00
nsMixedContentBlocker.cpp Bug 1220810 - Hardcode localhost to loopback, r=ckerschb,necko-reviewers,dragana 2020-10-22 07:36:15 +00:00
nsMixedContentBlocker.h Bug 1220810 - Hardcode localhost to loopback, r=ckerschb,necko-reviewers,dragana 2020-10-22 07:36:15 +00:00