Commit Graph

234 Commits

Author SHA1 Message Date
Simon Giesecke
a69d79b6db Bug 1648010 - Replace uses of NS_LITERAL_STRING/NS_LITERAL_CSTRING macros by _ns literals. r=geckoview-reviewers,jgilbert,agi,hsivonen,froydnj
Differential Revision: https://phabricator.services.mozilla.com/D80860
2020-07-01 08:29:29 +00:00
Jonathan Kingston
3dfd41f522 Bug 1642808 - Remove whitelist from dom security. r=Gijs
Differential Revision: https://phabricator.services.mozilla.com/D77949
2020-06-02 23:15:13 +00:00
Alexis Beingessner
7de69c24d2 Bug 1637727 - convert nsIOService prefs to StaticPrefs. r=KrisWright,necko-reviewers
converts:
 * security.data_uri.block_toplevel_data_uri_navigations
 * network.offline-mirrors-connectivity

Differential Revision: https://phabricator.services.mozilla.com/D77104
2020-05-28 18:23:25 +00:00
Frederik Braun
517b8c6989 Bug 1613609 - prototype patch with whitelist for sysrequest r=ckerschb
Differential Revision: https://phabricator.services.mozilla.com/D75064
2020-05-20 13:01:35 +00:00
Dorel Luca
fd6f1e4641 Backed out changeset be2d763a80d8 (bug 1613609) for making nightlies not being able to connecto to sites fi add-ons are installed. a=backout DONTBUILD 2020-05-20 06:35:48 +03:00
Frederik Braun
1fb29120be Bug 1613609 - prototype patch with whitelist for sysrequest r=ckerschb
Differential Revision: https://phabricator.services.mozilla.com/D75064
2020-05-19 08:55:06 +00:00
Mihai Alexandru Michis
5401969a27 Backed out 2 changesets (bug 1613609) for causing bustages.
CLOSED TREE

Backed out changeset dd6e395dc342 (bug 1613609)
Backed out changeset 5bcb7b13a4ad (bug 1613609)
2020-05-18 16:38:58 +03:00
Frederik Braun
e37f268030 Bug 1613609 - prototype patch with whitelist for sysrequest r=ckerschb
Differential Revision: https://phabricator.services.mozilla.com/D75064
2020-05-18 10:59:12 +00:00
Csoregi Natalia
cd1d2be4b0 Backed out 2 changesets (bug 1613609) for failures on nsXPConnect.cpp. CLOSED TREE
Backed out changeset c593a7296df4 (bug 1613609)
Backed out changeset 72199fc4ea2b (bug 1613609)
2020-05-18 13:05:12 +03:00
Frederik Braun
7f7b21c67a Bug 1613609 - prototype patch with whitelist for sysrequest r=ckerschb
Differential Revision: https://phabricator.services.mozilla.com/D75064
2020-05-18 09:19:28 +00:00
Christoph Kerschbaumer
37db6fc017 Bug 1636900: Remove TYPE_XBL from nsIContentPolicy. r=remote-protocol-reviewers,emilio,whimboo
Differential Revision: https://phabricator.services.mozilla.com/D74835
2020-05-13 06:53:28 +00:00
Frederik Braun
86b1dcf693 Bug 1613609 - allow requests with new loadinfo flag to succeeed r=ckerschb
Differential Revision: https://phabricator.services.mozilla.com/D68391
2020-04-07 11:55:23 +00:00
Emilio Cobos Álvarez
46f64ba715 Bug 1627707 - Rename LoadInfo::LoadingPrincipal to GetLoadingPrincipal as it can return null. r=ckerschb
Mostly a matter of:

  rg -l '\->LoadingPrincipal' | xargs sed -i 's/->LoadingPrincipal/->GetLoadingPrincipal/g'

And then clang-format. But I tweaked manually nsHttpChannelAuthProvider (move
the variable where it's used, don't take a useless strong ref),
AddonContentPolicy (move the declaration of the variable to the if condition),
and BackgroundUtils (same).

Differential Revision: https://phabricator.services.mozilla.com/D69828
2020-04-06 18:57:36 +00:00
Cosmin Sabou
8ca4dd2b6f Backed out 3 changesets (bug 1627707) for build bustages @ mozilla::net::LoadInfo.
Backed out changeset 65d6a90651ce (bug 1627707)
Backed out changeset 378ec30d9979 (bug 1627707)
Backed out changeset 058a19e11b06 (bug 1627707)
2020-04-06 20:07:04 +03:00
Emilio Cobos Álvarez
d828790f70 Bug 1627707 - Rename LoadInfo::LoadingPrincipal to GetLoadingPrincipal as it can return null. r=ckerschb
Mostly a matter of:

  rg -l '\->LoadingPrincipal' | xargs sed -i 's/->LoadingPrincipal/->GetLoadingPrincipal/g'

And then clang-format. But I tweaked manually nsHttpChannelAuthProvider (move
the variable where it's used, don't take a useless strong ref),
AddonContentPolicy (move the declaration of the variable to the if condition),
and BackgroundUtils (same).

Differential Revision: https://phabricator.services.mozilla.com/D69828
2020-04-06 16:00:43 +00:00
Sebastian Streich
d3c62706af Bug 1622042 - Refactor NsContentUtils:Allowsl10n r=ckerschb
Differential Revision: https://phabricator.services.mozilla.com/D66633
2020-03-26 13:18:40 +00:00
Christoph Kerschbaumer
b96b600470 Bug 1188538: Ensure every protocol handler sets a valid security flag. r=bholley,mixedpuppy
Differential Revision: https://phabricator.services.mozilla.com/D67496
2020-03-20 08:25:18 +00:00
Stefan Hindli
bb21fc71f7 Backed out 4 changesets (bug 1622042) for causing AddonInstallException: Could not install add-on: c:\users\task_1584560140\appdata\local\temp\tmpbg9_h7.zip: ERROR_FILE_ACCESS: There was an error accessing the filesystem. CLOSED TREE
Backed out changeset 929043330599 (bug 1622042)
Backed out changeset b08cdd075e20 (bug 1622042)
Backed out changeset ca87f1c6b90b (bug 1622042)
Backed out changeset 27dbbb7cd590 (bug 1622042)
2020-03-18 22:49:23 +02:00
Sebastian Streich
db935b0263 Bug 1622042 - Refactor NsContentUtils:Allowsl10n r=ckerschb
Differential Revision: https://phabricator.services.mozilla.com/D66633
2020-03-18 16:00:40 +00:00
Cosmin Sabou
48ff1e921d Backed out 4 changesets (bug 1622042) for causing build bustages on nsContentUtils.cpp. CLOSED TREE
Backed out changeset dc7af5abb8de (bug 1622042)
Backed out changeset 16e3b4a1fefc (bug 1622042)
Backed out changeset f60b16588dad (bug 1622042)
Backed out changeset 4193aea26e28 (bug 1622042)
2020-03-17 20:38:35 +02:00
Sebastian Streich
2bbb4de4de Bug 1622042 - Refactor NsContentUtils:Allowsl10n r=ckerschb
Differential Revision: https://phabricator.services.mozilla.com/D66633
2020-03-17 17:11:42 +00:00
Frederik Braun
65952d7886 Bug 1544011 - remove exception that SystemPrincipal may open discovery pane r=ckerschb
Differential Revision: https://phabricator.services.mozilla.com/D65541
2020-03-05 18:43:04 +00:00
Frederik Braun
fb639185ea Bug 1561318 - rm exception that fennec Settings may load accounts.firefox.com using the system principal r=Gijs
This breaks fennec builds from mozilla-central, but fennec will only be built from
esr branches, so this code-exception that adds complexity can be removed

Differential Revision: https://phabricator.services.mozilla.com/D64384
2020-02-28 12:35:34 +00:00
David Major
1b0767a47d Bug 1610978 - Fix a clang 10 warning in DebugSecFlagType r=ckerschb
Clang 10 warns about the loop variable creating a copy.

Differential Revision: https://phabricator.services.mozilla.com/D60751
2020-02-04 08:38:14 +00:00
Christoph Kerschbaumer
73f3b32892 Bug 1609877: Convert prefs for domsecurity to use static prefs. r=tjr
Differential Revision: https://phabricator.services.mozilla.com/D60403
2020-01-22 11:04:17 +00:00
Razvan Maries
c21a78144e Backed out changeset dbaa31392a53 (bug 1609877) for build bustages on DOMSecurityMonitor.cpp. CLOSED TREE 2020-01-20 22:08:07 +02:00
Christoph Kerschbaumer
d15b16e6df Bug 1609877: Convert prefs for domsecurity to use static prefs. r=tjr
Differential Revision: https://phabricator.services.mozilla.com/D60403
2020-01-20 18:10:38 +00:00
Christoph Kerschbaumer
1fb30a1274 Bug 1607483: Disallow loading http(s) scripts into system privileged contexts. r=tjr
Differential Revision: https://phabricator.services.mozilla.com/D58962
2020-01-17 17:29:47 +00:00
Narcis Beleuzu
39e7d3dcbc Backed out changeset caa23b535218 (bug 1607483) for mochitest failures on test_input.html. CLOSED TREE 2020-01-17 14:45:45 +02:00
Christoph Kerschbaumer
074adfe0a2 Bug 1607483: Disallow loading http(s) scripts into system privileged contexts. r=tjr
Differential Revision: https://phabricator.services.mozilla.com/D58962
2020-01-17 10:17:07 +00:00
Matt Woodrow
f3883f930b Bug 1599438 - Store sandbox flags on the LoadInfo when creating a channel for a docshell, so that we don't read a stale value from the BrowsingContext later. r=bzbarsky
Differential Revision: https://phabricator.services.mozilla.com/D59263
2020-01-15 08:02:57 +00:00
Narcis Beleuzu
bf2b2d612d Backed out changeset b3538b7016aa (bug 1599438) for bustages on TestHttpFuzzing.cpp . CLOSED TREE 2020-01-15 06:03:55 +02:00
Matt Woodrow
5f6fd6d997 Bug 1599438 - Store sandbox flags on the LoadInfo when creating a channel for a docshell, so that we don't read a stale value from the BrowsingContext later. r=bzbarsky
Differential Revision: https://phabricator.services.mozilla.com/D59263
2020-01-15 02:05:57 +00:00
Narcis Beleuzu
7950cebfaf Backed out changeset 3d924e2a2e54 (bug 1607483) for assertion failures on nsContentSecurityManager.cpp . CLOSED TREE 2020-01-14 22:28:32 +02:00
Christoph Kerschbaumer
a5fc626f1a Bug 1607483: Disallow loading http(s) scripts into system privileged contexts. r=tjr
Differential Revision: https://phabricator.services.mozilla.com/D58962
2020-01-14 17:42:18 +00:00
Boris Zbarsky
89980d90cb Bug 1603806. Add a blocking reason when loads with the SEC_REQUIRE_SAME_ORIGIN_* security flags are blocked due to not being same-origin. r=ckerschb,ochameau
Differential Revision: https://phabricator.services.mozilla.com/D57147
2019-12-16 09:36:45 +00:00
Boris Zbarsky
8f97398a08 Bug 1602483 part 2. Add a window id argument to CheckLoadURIWithPrincipal. r=ckerschb
Differential Revision: https://phabricator.services.mozilla.com/D56428
2019-12-12 16:41:19 +00:00
Boris Zbarsky
fcb04b87e4 Bug 1602090 part 2. Create separate CheckMayLoad and CheckMayLoadWithReporting APIs. r=ckerschb
CheckMayLoadAndReport takes a window ID.  This allows us to report
errors from it to the web console as needed.  Most consumers know statically
whether they want reporting or not, so there's no reason to force the ones that
don't to provide window ids.

Differential Revision: https://phabricator.services.mozilla.com/D56388
2019-12-13 06:24:12 +00:00
Ciure Andrei
2e0157c747 Backed out 4 changesets (bug 1602483, bug 1602090) for causing perma leackchecks CLOSED TREE
Backed out changeset 6b057ba06b4a (bug 1602483)
Backed out changeset 9be3269d781d (bug 1602483)
Backed out changeset e3e2c1d7478e (bug 1602090)
Backed out changeset fdc4a588912e (bug 1602090)
2019-12-12 18:37:01 +02:00
Boris Zbarsky
f99de7f9a0 Bug 1602483 part 2. Add a window id argument to CheckLoadURIWithPrincipal. r=ckerschb
Differential Revision: https://phabricator.services.mozilla.com/D56428
2019-12-12 13:05:12 +00:00
Boris Zbarsky
d9b66ffabd Bug 1602090 part 2. Create separate CheckMayLoad and CheckMayLoadWithReporting APIs. r=ckerschb
CheckMayLoadAndReport takes a window ID.  This allows us to report
errors from it to the web console as needed.  Most consumers know statically
whether they want reporting or not, so there's no reason to force the ones that
don't to provide window ids.

Differential Revision: https://phabricator.services.mozilla.com/D56388
2019-12-12 13:03:42 +00:00
Boris Zbarsky
33b5758e6f Bug 1601377 part 1. Make it clear that nsContentUtils::PrincipalAllowsL10n never takes a null nsIPrincipal. r=smaug
Differential Revision: https://phabricator.services.mozilla.com/D56216
2019-12-09 15:10:32 +00:00
Gabriele Svelto
eb403b8785 Bug 1600545 - Remove useless inclusions of header files generated from IDL files in dom/ r=Ehsan
The inclusions were removed with the following very crude script and the
resulting breakage was fixed up by hand. The manual fixups did either
revert the changes done by the script, replace a generic header with a more
specific one or replace a header with a forward declaration.

find . -name "*.idl" | grep -v web-platform | grep -v third_party | while read path; do
    interfaces=$(grep "^\(class\|interface\).*:.*" "$path" | cut -d' ' -f2)
    if [ -n "$interfaces" ]; then
        if [[ "$interfaces" == *$'\n'* ]]; then
          regexp="\("
          for i in $interfaces; do regexp="$regexp$i\|"; done
          regexp="${regexp%%\\\|}\)"
        else
          regexp="$interfaces"
        fi
        interface=$(basename "$path")
        rg -l "#include.*${interface%%.idl}.h" . | while read path2; do
            hits=$(grep -v "#include.*${interface%%.idl}.h" "$path2" | grep -c "$regexp" )
            if [ $hits -eq 0 ]; then
                echo "Removing ${interface} from ${path2}"
                grep -v "#include.*${interface%%.idl}.h" "$path2" > "$path2".tmp
                mv -f "$path2".tmp "$path2"
            fi
        done
    fi
done

Differential Revision: https://phabricator.services.mozilla.com/D55442
2019-12-06 09:24:56 +00:00
Sebastian Streich
5dbfc609f3 Bug 1597704 - Move is OriginPotentially Trustworthy into Principal r=ckerschb
Differential Revision: https://phabricator.services.mozilla.com/D53830
2019-12-05 16:04:53 +00:00
Boris Zbarsky
2df1df0176 Bug 1517588. Use nsIPrincipal::IsSystemPrincipal instead of nsContentUtils::IsSystemPrincipal r=bzbarsky
Differential Revision: https://phabricator.services.mozilla.com/D53067
2019-12-05 04:44:32 +00:00
Dorel Luca
67889e1013 Backed out changeset f6e53d1c6518 (bug 1600545) for Android build bustage. CLOSED TREE 2019-12-04 17:32:27 +02:00
Gabriele Svelto
dc6fa2e86c Bug 1600545 - Remove useless inclusions of header files generated from IDL files in dom/ r=Ehsan
The inclusions were removed with the following very crude script and the
resulting breakage was fixed up by hand. The manual fixups did either
revert the changes done by the script, replace a generic header with a more
specific one or replace a header with a forward declaration.

find . -name "*.idl" | grep -v web-platform | grep -v third_party | while read path; do
    interfaces=$(grep "^\(class\|interface\).*:.*" "$path" | cut -d' ' -f2)
    if [ -n "$interfaces" ]; then
        if [[ "$interfaces" == *$'\n'* ]]; then
          regexp="\("
          for i in $interfaces; do regexp="$regexp$i\|"; done
          regexp="${regexp%%\\\|}\)"
        else
          regexp="$interfaces"
        fi
        interface=$(basename "$path")
        rg -l "#include.*${interface%%.idl}.h" . | while read path2; do
            hits=$(grep -v "#include.*${interface%%.idl}.h" "$path2" | grep -c "$regexp" )
            if [ $hits -eq 0 ]; then
                echo "Removing ${interface} from ${path2}"
                grep -v "#include.*${interface%%.idl}.h" "$path2" > "$path2".tmp
                mv -f "$path2".tmp "$path2"
            fi
        done
    fi
done

Differential Revision: https://phabricator.services.mozilla.com/D55442
2019-12-04 15:01:19 +00:00
Frederik Braun
6d8a652d4b Bug 1543579 - Disallow SystemPrincipal for Remote documents on all channels r=ckerschb,tjr
Differential Revision: https://phabricator.services.mozilla.com/D54091
2019-12-02 10:45:23 +00:00
shindli
145f206006 Backed out changeset 68ff34ec8e96 (bug 1597704) for causing perma bc3 failures in browser/extensions/formautofill/test/browser/browser_autocomplete_footer.js CLOSED TREE 2019-11-28 16:12:45 +02:00
Sebastian Streich
f5a4e64086 Bug 1597704 - Move is OriginPotentially Trustworthy into Principal r=ckerschb
Differential Revision: https://phabricator.services.mozilla.com/D53830
2019-11-28 12:44:29 +00:00