Commit Graph

540 Commits

Author SHA1 Message Date
Boris Zbarsky
a9b6918cce Bug 1551399 part 2. Stop using [array] in url-classifier's makeFindFullHashRequestV4. r=dimi,gcp
Differential Revision: https://phabricator.services.mozilla.com/D31022
2019-05-14 09:57:16 +00:00
Boris Zbarsky
d288f51dc3 Bug 1551399 part 1. Stop using [array] in url-classifier's makeUpdateRequestV4. r=dimi,gcp
Differential Revision: https://phabricator.services.mozilla.com/D31020
2019-05-14 09:50:42 +00:00
Geoff Brown
55ee3dbaff Bug 1551226 - Run Android x86_64 7.0/debug mochitests; r=snorp
We can run /debug mochitests against geckoview for the cost of another dozen
or so test annotations. Both /opt and /debug mochitests are nearly worthy of
tier 1, but still waiting for bug 1534732.

Differential Revision: https://phabricator.services.mozilla.com/D30931
2019-05-13 20:52:36 +00:00
Ehsan Akhgari
ec06a69fb8 Bug 1500533 - Ensure that TLS session resumption tickets are only consumed if the channel isn't isolated by anti-tracking checks; r=michal,baku
Differential Revision: https://phabricator.services.mozilla.com/D26996
2019-04-18 01:00:22 +00:00
Brian Grinstead
6bf5cf3d2a Bug 1544322 - Part 2.1 - Remove the [type] attribute for one-liner <script> tags loading files in /tests/SimpleTest/ in everything except for dom/ r=bzbarsky
This excludes dom/, otherwise the file size is too large for phabricator to handle.

This is an autogenerated commit to handle scripts loading mochitest harness files, in
the simple case where the script src is on the same line as the tag.

This was generated with https://bug1544322.bmoattachments.org/attachment.cgi?id=9058170
using the `--part 2` argument.

Differential Revision: https://phabricator.services.mozilla.com/D27456
2019-04-16 03:50:44 +00:00
Brian Grinstead
36c26fa2b9 Bug 1544322 - Part 1 - Remove the [type] attribute for one-liner <script> tags loading files in chrome://mochikit/content/ r=bzbarsky
This is an autogenerated commit to handle scripts loading mochitest harness files, in
the simple case where the script src is on the same line as the tag.

This was generated with https://bug1544322.bmoattachments.org/attachment.cgi?id=9058170
using the `--part 1` argument.

Differential Revision: https://phabricator.services.mozilla.com/D26812
2019-04-15 20:56:58 +00:00
Sylvestre Ledru
72e7e7d7e7 Bug 1519636 - Reformat recent changes to the Google coding style r=Ehsan
# ignore-this-changeset

Differential Revision: https://phabricator.services.mozilla.com/D27245
2019-04-12 13:14:25 +00:00
Oana Pop Rus
9757115ee8 Backed out changeset acb04833e713 (bug 1500533) for assertion failure in nsHttpChannel.cpp on a CLOSED TREE 2019-04-11 23:15:08 +03:00
Ehsan Akhgari
8648b0b8e6 Bug 1500533 - Ensure that TLS session resumption tickets are only consumed if the channel isn't isolated by anti-tracking checks; r=michal,baku
Differential Revision: https://phabricator.services.mozilla.com/D26996
2019-04-11 18:36:16 +00:00
dlee
7320ffd6ce Bug 1543319 - P2. Swap the byte order in-place. r=gcp
We don't need an additional array just for byte reordering, replace
it with in-place processing.

Testcase are modified because the LookupCacheV4::Build API now clears the
input parameter.

Differential Revision: https://phabricator.services.mozilla.com/D26861
2019-04-10 20:53:17 +00:00
Sylvestre Ledru
1666e92b07 Bug 1542146 - Apply the change with the option StatementMacros from clang-format-8 r=andi
# ignore-this-changeset

Differential Revision: https://phabricator.services.mozilla.com/D26280
2019-04-05 21:42:17 +00:00
Csoregi Natalia
2ded4ab36d Backed out changeset 4ad80127f89f (bug 1519636) for bustage on MarkupMap.h and nsAccessibilityService.cpp. CLOSED TREE 2019-04-05 09:48:19 +03:00
Sylvestre Ledru
ebe9c62d30 Bug 1519636 - clang-format-8: Reformat recent changes to the Google coding style r=Ehsan
clang-format-8 upstream had some improvements wrt macros
See: https://reviews.llvm.org/D33440
This is why the diff is bigger than usual

# ignore-this-changeset

Differential Revision: https://phabricator.services.mozilla.com/D26098
2019-04-04 21:36:16 +00:00
Narcis Beleuzu
6b9ce2a82b Backed out changeset 389b6bbd76db (bug 1519636) for bustages on MarkupMap.h . CLOSED TREE 2019-04-05 00:27:56 +03:00
Sylvestre Ledru
194039a8d9 Bug 1519636 - clang-format-8: Reformat recent changes to the Google coding style r=Ehsan
clang-format-8 upstream had some improvements wrt macros
See: https://reviews.llvm.org/D33440
This is why the diff is bigger than usual

# ignore-this-changeset

Differential Revision: https://phabricator.services.mozilla.com/D26098
2019-04-04 20:12:23 +00:00
dlee
84d4c57544 Bug 1539150 - Use window.open instead of setting iframe src in test_classify_by_default.html. ?baku r=baku
In the test_classify_by_default.html, we use "network.cookie.cookieBehavior"
to test if a channel is correctly classified.

Cookie restriction is only enabled in nightly and early beta so the
default preference is not always set. Although we set the preference
in the testcase, it is too late because that the channel's cookie
setting might inherit from it's parent and may end up with getting
the old(default) value.

In this patch, we use window.open to test the tracker frame to make
sure we use the udpated prefrence.

Differential Revision: https://phabricator.services.mozilla.com/D25657
2019-04-02 08:00:37 +00:00
Mark Banner
d5029e0dae Bug 1415265 - Remove now unnecessary .eslintrc.js files or entries. r=mossop
Differential Revision: https://phabricator.services.mozilla.com/D23850
2019-03-28 09:38:14 +00:00
Dimi Lee
606b46098e Bug 1522412 - P7. A mochitest to test different channel open call sites are classified. r=Ehsan
The goal of this testcase is to provide an easier way to add callsites
to test if it is correctly classified. This is a first step, more callsites should be added to
the testcase(See Bug 1532691)

Flow of the test case:
1. setup the server(trackerFrame.sjs) with the expceted number of request it should receive
2. load the test frame(trackerFrame.html) with cookie restriction off, to ensure all the tracking requests contain cookies
3. server responses a list of tracker's request with cookie after reciving all the requests
4. the list should contain all the trackers in the test frame.
5. enable cookie restriction and load the test frame again.
6. server responses a list of tracker's request without cookie after reciving all the requests
7. the list should contain all the trackers in the test frame.

Differential Revision: https://phabricator.services.mozilla.com/D22116
2019-03-25 12:51:58 +00:00
Dimi Lee
c830b2c5d0 Bug 1522412 - P6. Add a xpcshell-test for default classification. r=Ehsan
This patch adds a xpcsehll-test which tests all the combinations of
those parameters used by the heuristic classification algorithm.

Differential Revision: https://phabricator.services.mozilla.com/D22115
2019-03-25 12:50:29 +00:00
dlee
382ced01ab Bug 1522412 - P5. Do not use system principal in testcase to test tracking protection. r=Ehsan
Some testcases are chrome scope testcase hence the resources it loads are triggered by
"system principal". This will exempt the resource from classification.

So in this patch, we used a new window to for the tracker test frame.
The window creation code is referenced from test_privatebrowsing_trackingprotection.html.

Differential Revision: https://phabricator.services.mozilla.com/D22114
2019-03-25 12:49:28 +00:00
Gurzau Raul
8cd94b1658 Backed out 7 changesets (bug 1522412) for xpcshell failures at test_shouldclassify.js on a CLOSED TREE.
Backed out changeset 7c998456e1fd (bug 1522412)
Backed out changeset ebb581ddf1d1 (bug 1522412)
Backed out changeset 850e1c68d978 (bug 1522412)
Backed out changeset fe288a48cecb (bug 1522412)
Backed out changeset 5399bca472b1 (bug 1522412)
Backed out changeset 91e5b339fe11 (bug 1522412)
Backed out changeset b80098d0a5c4 (bug 1522412)
2019-03-21 11:02:09 +02:00
Dimi Lee
5f0ab01a26 Bug 1522412 - P7. A mochitest to test different channel open call sites are classified. r=Ehsan
The goal of this testcase is to provide an easier way to add callsites
to test if it is correctly classified. This is a first step, more callsites should be added to
the testcase(See Bug 1532691)

Flow of the test case:
1. setup the server(trackerFrame.sjs) with the expceted number of request it should receive
2. load the test frame(trackerFrame.html) with cookie restriction off, to ensure all the tracking requests contain cookies
3. server responses a list of tracker's request with cookie after reciving all the requests
4. the list should contain all the trackers in the test frame.
5. enable cookie restriction and load the test frame again.
6. server responses a list of tracker's request without cookie after reciving all the requests
7. the list should contain all the trackers in the test frame.

Differential Revision: https://phabricator.services.mozilla.com/D22116
2019-03-21 07:35:50 +00:00
Dimi Lee
126ede093d Bug 1522412 - P6. Add a xpcshell-test for default classification. r=Ehsan
This patch adds a xpcsehll-test which tests all the combinations of
those parameters used by the heuristic classification algorithm.

Differential Revision: https://phabricator.services.mozilla.com/D22115
2019-03-21 07:35:44 +00:00
dlee
71f2d7ef13 Bug 1522412 - P5. Do not use system principal in testcase to test tracking protection. r=Ehsan
Some testcases are chrome scope testcase hence the resources it loads are triggered by
"system principal". This will exempt the resource from classification.

So in this patch, we used a new window to for the tracker test frame.
The window creation code is referenced from test_privatebrowsing_trackingprotection.html.

Differential Revision: https://phabricator.services.mozilla.com/D22114
2019-03-21 07:34:17 +00:00
Andrea Marchesini
bab3563e61 Bug 1535799 - nsIHttpChannel.isTrackingResource should be a method, r=Ehsan
Differential Revision: https://phabricator.services.mozilla.com/D23765
2019-03-17 06:55:50 +00:00
Andrea Marchesini
52ec51612e Bug 1533074 - Implement Fingerprinting and Cryptomining annotation features - Part 4 - tests, r=dimi
Differential Revision: https://phabricator.services.mozilla.com/D22471
2019-03-14 17:48:50 +00:00
Sylvestre Ledru
b31009da86 Bug 1519636 - Reformat recent changes to the Google coding style r=Ehsan
# ignore-this-changeset

Differential Revision: https://phabricator.services.mozilla.com/D22514
2019-03-13 10:19:06 +01:00
Sylvestre Ledru
e24f1ec1e1 Bug 1531176 - Split the Google key management between gls and safe browsing r=glandium
Differential Revision: https://phabricator.services.mozilla.com/D21459
2019-03-10 15:29:41 +00:00
Johann Hofmann
10a476a3da Bug 1511111 - Add nsIUrlClassifierSkipListService to integrate url-classifier with RemoteSettings and pref list updates. r=Ehsan,baku,leplatrem
Differential Revision: https://phabricator.services.mozilla.com/D18597
2019-03-08 22:21:32 +00:00
Brindusan Cristian
1ad5d5ff94 Backed out changeset e908fbc7b930 (bug 1531176) for bc failures at browser_Troubleshoot.js. CLOSED TREE 2019-03-08 00:07:56 +02:00
Sylvestre Ledru
acb1b96014 Bug 1531176 - Split the Google key management between gls and safe browsing r=glandium
Differential Revision: https://phabricator.services.mozilla.com/D21459
2019-03-07 21:05:32 +00:00
dlee
130c74dd3c Bug 1353956 - P7. Add gtest to ensure .pset is correctly loaded and removed. r=gcp
Differential Revision: https://phabricator.services.mozilla.com/D22490
2019-03-07 14:43:16 +00:00
dlee
c975e636dd Bug 1353956 - P4. Add header and CRC32 checksum to SafeBrowsing V4 prefix files. r=gcp
After this patch, we may have the following files in SafeBrowsing
directory:
- (v2) .sbstore  : Store V2 chunkdata, for update, MD5 integrity check
                   while load
- (v2) .pset     : Store V2 prefixset, for lookup, load upon startup, no
                  integrity check
- (v4) .metadata : Store V4 state, for update, no integrity check
- (v4) .vlpset   : Store V4 prefixset, for lookup, load upon startup,
                   CRC32 integrity check
- (v4) .pset     : V4 prefix set before this patch, should be removed

The magic string is also added to ".vlpset" header so we can add
a telemetry to see if sanity check is good enough for prefix set
integrity check (The telemetry is not yet added). If yes, we can remove
the CRC32 in the future for even better performance.

Differential Revision: https://phabricator.services.mozilla.com/D21463
2019-03-07 14:41:25 +00:00
Dimi Lee
e1ed95ebdf Bug 1353956 - P3. Separate file processing and prefix data processing for SafeBrowsing prefix set. r=gcp
SafeBrowsing prefix files LOAD/SAVE operations are handled in xxxPrefixSet.cpp.
It would be more clear if xxxPrefixSet.cpp only processes prefix data,
while LookupCacheV2/LookupCacheV4 which use prefix set process file.

This patch doesn't change any behavior, testcases need to update because
the LookupCache & xxxPrefixSet APIs are changed.

Differential Revision: https://phabricator.services.mozilla.com/D21462
2019-03-07 14:40:56 +00:00
Dimi Lee
0b4d6efd3f Bug 1353956 - P1. Rename checksum used in SafeBrowsing V4 to SHA256. r=gcp
SafeBrowsing V4 protocol use SHA-256 as the checksum to check integrity
of update data and also the integrity of prefix files.

SafeBrowsing V2 HashStore use MD5 as the checksum to check integrity of
.sbstore

Since we are going to use CRC32 as the integrity check of V4 prefix files,
I think rename V4 "checksum" to SHA256 can improve readability.

Differential Revision: https://phabricator.services.mozilla.com/D21460
2019-03-07 14:40:14 +00:00
Ciure Andrei
1ee28bb982 Backed out changeset 3fb6c01dd2b0 (bug 1531176) for causing gradle toolchain bustage CLOSED TREE 2019-03-07 14:23:03 +02:00
Sylvestre Ledru
abe9ef2691 Bug 1531176 - Split the Google key management between gls and safe browsing r=glandium
Differential Revision: https://phabricator.services.mozilla.com/D21459
2019-03-07 12:04:53 +00:00
Ciure Andrei
3c926ea22f Backed out changeset 0f2b9b0bf9b9 (bug 1531176) for google-geolocation-api-keyfile build bustages CLOSED TREE 2019-03-07 13:58:33 +02:00
Sylvestre Ledru
cb15c544b5 Bug 1531176 - Split the Google key management between gls and safe browsing r=glandium
Differential Revision: https://phabricator.services.mozilla.com/D21459
2019-03-07 11:31:18 +00:00
Ciure Andrei
d4b3b08047 Backed out changeset 6c2e00bcd2bb (bug 1531176) due to google-location-api-keyfile build busatges CLOSED TREE 2019-03-07 10:49:26 +02:00
Sylvestre Ledru
c07450d96f Bug 1531176 - Split the Google key management between gls and safe browsing r=glandium
Differential Revision: https://phabricator.services.mozilla.com/D21459
2019-03-06 23:06:10 +00:00
Dorel Luca
688429d9d6 Backed out 6 changesets (bug 1353956) for Linux Build bustage
Backed out changeset 71dafccc22ae (bug 1353956)
Backed out changeset f1f29fe519cf (bug 1353956)
Backed out changeset 4978556a66f6 (bug 1353956)
Backed out changeset bc0b91abce9b (bug 1353956)
Backed out changeset 6b8412db5a05 (bug 1353956)
Backed out changeset 3d326cfcd002 (bug 1353956)
2019-03-07 01:49:03 +02:00
dlee
cd1fa6d7c2 Bug 1353956 - P4. Add header and CRC32 checksum to SafeBrowsing V4 prefix files. r=gcp
After this patch, we may have the following files in SafeBrowsing
directory:
- (v2) .sbstore  : Store V2 chunkdata, for update, MD5 integrity check
                   while load
- (v2) .pset     : Store V2 prefixset, for lookup, load upon startup, no
                  integrity check
- (v4) .metadata : Store V4 state, for update, no integrity check
- (v4) .vlpset   : Store V4 prefixset, for lookup, load upon startup,
                   CRC32 integrity check
- (v4) .pset     : V4 prefix set before this patch, should be removed

The magic string is also added to ".vlpset" header so we can add
a telemetry to see if sanity check is good enough for prefix set
integrity check (The telemetry is not yet added). If yes, we can remove
the CRC32 in the future for even better performance.

Differential Revision: https://phabricator.services.mozilla.com/D21463
2019-03-06 22:57:12 +00:00
Dimi Lee
82b58b495d Bug 1353956 - P3. Separate file processing and prefix data processing for SafeBrowsing prefix set. r=gcp
SafeBrowsing prefix files LOAD/SAVE operations are handled in xxxPrefixSet.cpp.
It would be more clear if xxxPrefixSet.cpp only processes prefix data,
while LookupCacheV2/LookupCacheV4 which use prefix set process file.

This patch doesn't change any behavior, testcases need to update because
the LookupCache & xxxPrefixSet APIs are changed.

Differential Revision: https://phabricator.services.mozilla.com/D21462
2019-03-04 21:22:46 +00:00
Dimi Lee
15191963de Bug 1353956 - P1. Rename checksum used in SafeBrowsing V4 to SHA256. r=gcp
SafeBrowsing V4 protocol use SHA-256 as the checksum to check integrity
of update data and also the integrity of prefix files.

SafeBrowsing V2 HashStore use MD5 as the checksum to check integrity of
.sbstore

Since we are going to use CRC32 as the integrity check of V4 prefix files,
I think rename V4 "checksum" to SHA256 can improve readability.

Differential Revision: https://phabricator.services.mozilla.com/D21460
2019-02-28 08:12:36 +00:00
dlee
9b4fea92b0 Bug 1529728 - P2. Remove previous testcase workaround. r=baku
Remove the workaround in Bug 1525458 because the issue is fixed.

Differential Revision: https://phabricator.services.mozilla.com/D21781
2019-03-04 08:26:17 +00:00
Ehsan Akhgari
e44136bf76 Bug 1525458 - Part 3: Work around bug 1529728 by disabling tracking annotations in flash blocking classifier tests; r=baku
Differential Revision: https://phabricator.services.mozilla.com/D20876
2019-02-28 17:10:18 -05:00
Bogdan Tara
6b584210a2 Merge mozilla-central to autoland. a=merge CLOSED TREE 2019-02-19 19:36:33 +02:00
Andrea Marchesini
0fd63f6e02 Bug 1528596 - Devirtualize accesses to nsUrlClassifierUtils, r=dimi
Differential Revision: https://phabricator.services.mozilla.com/D20086
2019-02-19 14:35:57 +00:00
Masatoshi Kimura
26288e989f Bug 1528651 - Re-enable warnings-as-errors on Windows in some directories. r=dmajor 2019-02-17 15:03:02 +09:00