Commit graph

53 commits

Author SHA1 Message Date
Mark Banner
5e786e8b26 Bug 1687932 - Remove use of nsISearchEngine.addEngineWithDetails from other xpcshell-tests. r=harry
Differential Revision: https://phabricator.services.mozilla.com/D108462
2021-03-19 14:06:06 +00:00
Florian Quèze
3090c6541a Bug 1647012 - Fix intermittent test_AboutHomeStartupCacheWorker.js failure - TypeError: can't access property "loaded", feed is undefined, r=mconley.
Depends on D108013

Differential Revision: https://phabricator.services.mozilla.com/D108014
2021-03-17 17:39:32 +00:00
Andrei Oprea
2bb63845fa Bug 1694257 - Add ability for targeted defaults for AboutWelcome r=k88hudson
Differential Revision: https://phabricator.services.mozilla.com/D106418
2021-03-16 17:49:41 +00:00
Mark Banner
0859249715 Bug 1680325 - Remove references to jshint from newtab. r=nanj
Differential Revision: https://phabricator.services.mozilla.com/D98519
2020-12-09 18:07:44 +00:00
Nan Jiang
8d91ace438 Bug 1676437 - Collect attribution data for Onboarding r=pdahiya
Differential Revision: https://phabricator.services.mozilla.com/D97236
2020-11-18 18:21:33 +00:00
Mike Conley
c7295a552a Bug 1673716 - Try to make sure the about:home startup cache worker construction Promise always resolves. r=Gijs
Differential Revision: https://phabricator.services.mozilla.com/D96269
2020-11-09 17:14:58 +00:00
Mike Conley
e5905f10e5 Bug 1674317 - Load about:home scripts via the subscript loader when hitting the about:home startup cache. r=k88hudson
Using the subscript loader is currently our best way of getting the loaded scripts recorded for entry
in the ScriptPreloader which is used to cache startup-related JavaScript within the startup window.

Originally, we were using <script> tags to load those scripts, but unfortunately, that loading mechanism
does not qualify for being noted by the ScriptPreloader.

This is a workaround until the Stencil project by the SpiderMonkey team Phase 2 is complete (see bug 1663956),
which should allow us to more easily note scripts to cache at runtime.

Differential Revision: https://phabricator.services.mozilla.com/D95407
2020-11-03 20:54:55 +00:00
Mike Conley
6f44750a41 Bug 1647757 - Terminate the about:home startup cache worker when experiencing memory-pressure. r=Gijs
Differential Revision: https://phabricator.services.mozilla.com/D94391
2020-10-21 22:44:50 +00:00
Punam Dahiya
d5c48f0477 Bug 1670908 - Display default welcome when addon info not available r=Mardak
Differential Revision: https://phabricator.services.mozilla.com/D93580
2020-10-14 23:14:18 +00:00
Nick Alexander
4c713eeeaf Bug 1525076 - Part 1: Fix macOS native getReferrerUrl by invoking system sqlite binary (from JS). r=mixedpuppy
The issue this is addresses is that
[`CFURLCopyResourcePropertyForKey`](https://searchfox.org/mozilla-central/rev/ea7f70dac1c5fd18400f6d2a92679777d4b21492/xpcom/io/CocoaFileUtils.mm#212)
does not return quarantine data when launched as a GUI App.  What
happens is that launching via the GUI requires the user to override
GateKeeper by going to Security & Privacy > Open Anyway.  Doing that
updates the GateKeeper flags, and then the macOS API denies access:
once the GK flags reach some state, quarantine information is not
returned.  This is not documented (as far as I can see) but moons ago,
[somebody else on the internet witnessed the same
thing](https://cocoa-dev.apple.narkive.com/kkYeAC8o/is-it-possible-to-read-your-own-quarantine-info-after-launch).

To work around, we run the system SQLite binary, to fish the relevant
information out of the per-user quarantine database.  (SQLite is
installed by default on all relevant macOS versions.)

The most significant security concern I see is whether we can trust
this binary (in /usr/bin/sqlite3). Some discussion within the
Install/Update team suggested that an attacker who could corrupt or
modify that binary already had write access to the disk, which is an
attack vector equal to a totally compromised Firefox. If we determine
that we can't use the system SQLite binary, then we could use
Firefox's compiled copy of SQLite, but we might see versioning
issues. The system SQLite binary feels more robust.

This is implemented as a JS component for convenience, mostly: there
is no API for capturing output from `nsIProcess`.  It would be
possible to maintain the existing XPCOM contract by renaming the
existing contract and adding a contract with a JS implementation that
passes through to the renamed implementation, but it doesn't seem
worth the effort.

In the next commits, we will generalize the existing caching mechanism
form Windows to also apply to macOS. This is mostly a performance
optimization, so that we sniff a single well-known location rather
than launching a process at each startup, although there is a
correctness argument here as well, since the quarantine database is
dynamic and the attribution URL could expire.

Differential Revision: https://phabricator.services.mozilla.com/D92693
2020-10-11 18:18:36 +00:00
Razvan Maries
d5e4596a8f Backed out 6 changesets (bug 1525076) for perma failures on browser_startup_mainthreadio.js. CLOSED TREE
Backed out changeset a425e504ae7e (bug 1525076)
Backed out changeset 5163df5430c1 (bug 1525076)
Backed out changeset 4313cfb9dfcb (bug 1525076)
Backed out changeset 9178ebc95da2 (bug 1525076)
Backed out changeset 7bde7f6ccbd8 (bug 1525076)
Backed out changeset 6c2c2e07b95f (bug 1525076)
2020-10-09 22:51:36 +03:00
Nick Alexander
95284b4d0f Bug 1525076 - Part 1: Fix macOS native getReferrerUrl by invoking system sqlite binary (from JS). r=mixedpuppy
The issue this is addresses is that
[`CFURLCopyResourcePropertyForKey`](https://searchfox.org/mozilla-central/rev/ea7f70dac1c5fd18400f6d2a92679777d4b21492/xpcom/io/CocoaFileUtils.mm#212)
does not return quarantine data when launched as a GUI App.  What
happens is that launching via the GUI requires the user to override
GateKeeper by going to Security & Privacy > Open Anyway.  Doing that
updates the GateKeeper flags, and then the macOS API denies access:
once the GK flags reach some state, quarantine information is not
returned.  This is not documented (as far as I can see) but moons ago,
[somebody else on the internet witnessed the same
thing](https://cocoa-dev.apple.narkive.com/kkYeAC8o/is-it-possible-to-read-your-own-quarantine-info-after-launch).

To work around, we run the system SQLite binary, to fish the relevant
information out of the per-user quarantine database.  (SQLite is
installed by default on all relevant macOS versions.)

The most significant security concern I see is whether we can trust
this binary (in /usr/bin/sqlite3). Some discussion within the
Install/Update team suggested that an attacker who could corrupt or
modify that binary already had write access to the disk, which is an
attack vector equal to a totally compromised Firefox. If we determine
that we can't use the system SQLite binary, then we could use
Firefox's compiled copy of SQLite, but we might see versioning
issues. The system SQLite binary feels more robust.

This is implemented as a JS component for convenience, mostly: there
is no API for capturing output from `nsIProcess`.  It would be
possible to maintain the existing XPCOM contract by renaming the
existing contract and adding a contract with a JS implementation that
passes through to the renamed implementation, but it doesn't seem
worth the effort.

In the next commits, we will generalize the existing caching mechanism
form Windows to also apply to macOS. This is mostly a performance
optimization, so that we sniff a single well-known location rather
than launching a process at each startup, although there is a
correctness argument here as well, since the quarantine database is
dynamic and the attribution URL could expire.

Differential Revision: https://phabricator.services.mozilla.com/D92693
2020-10-09 17:27:13 +00:00
Razvan Maries
9c16898a12 Backed out 6 changesets (bug 1525076) for ES Lint failure. CLOSED TREE
Backed out changeset 912fcc3cb274 (bug 1525076)
Backed out changeset 690d730341c6 (bug 1525076)
Backed out changeset 5dd08176812c (bug 1525076)
Backed out changeset 963c8d33d779 (bug 1525076)
Backed out changeset f7d26b270884 (bug 1525076)
Backed out changeset 95fd52531439 (bug 1525076)
2020-10-09 20:17:23 +03:00
Nick Alexander
68734ef79d Bug 1525076 - Part 1: Fix macOS native getReferrerUrl by invoking system sqlite binary (from JS). r=mixedpuppy
The issue this is addresses is that
[`CFURLCopyResourcePropertyForKey`](https://searchfox.org/mozilla-central/rev/ea7f70dac1c5fd18400f6d2a92679777d4b21492/xpcom/io/CocoaFileUtils.mm#212)
does not return quarantine data when launched as a GUI App.  What
happens is that launching via the GUI requires the user to override
GateKeeper by going to Security & Privacy > Open Anyway.  Doing that
updates the GateKeeper flags, and then the macOS API denies access:
once the GK flags reach some state, quarantine information is not
returned.  This is not documented (as far as I can see) but moons ago,
[somebody else on the internet witnessed the same
thing](https://cocoa-dev.apple.narkive.com/kkYeAC8o/is-it-possible-to-read-your-own-quarantine-info-after-launch).

To work around, we run the system SQLite binary, to fish the relevant
information out of the per-user quarantine database.  (SQLite is
installed by default on all relevant macOS versions.)

The most significant security concern I see is whether we can trust
this binary (in /usr/bin/sqlite3). Some discussion within the
Install/Update team suggested that an attacker who could corrupt or
modify that binary already had write access to the disk, which is an
attack vector equal to a totally compromised Firefox. If we determine
that we can't use the system SQLite binary, then we could use
Firefox's compiled copy of SQLite, but we might see versioning
issues. The system SQLite binary feels more robust.

This is implemented as a JS component for convenience, mostly: there
is no API for capturing output from `nsIProcess`.  It would be
possible to maintain the existing XPCOM contract by renaming the
existing contract and adding a contract with a JS implementation that
passes through to the renamed implementation, but it doesn't seem
worth the effort.

In the next commits, we will generalize the existing caching mechanism
form Windows to also apply to macOS. This is mostly a performance
optimization, so that we sniff a single well-known location rather
than launching a process at each startup, although there is a
correctness argument here as well, since the quarantine database is
dynamic and the attribution URL could expire.

Differential Revision: https://phabricator.services.mozilla.com/D92693
2020-10-09 16:51:39 +00:00
Punam Dahiya
154225ecec Bug 1659150 - Remove about:welcome trailhead, full page and ReturnToAMO templates r=perftest-reviewers,Mardak,mkaply,nanj,sparky
Differential Revision: https://phabricator.services.mozilla.com/D89077
2020-09-11 16:35:04 +00:00
Cosmin Sabou
00b09a0063 Backed out changeset 08f94ba4c50c (bug 1659150) for bc failures on browser_all_files_referenced.js. CLOSED TREE 2020-09-11 08:32:46 +03:00
Punam Dahiya
744a5e4c1e Bug 1659150 - Remove about:welcome trailhead, full page and ReturnToAMO templates r=perftest-reviewers,Mardak,mkaply,nanj,sparky
Differential Revision: https://phabricator.services.mozilla.com/D89077
2020-09-11 00:31:11 +00:00
Christoph Kerschbaumer
d29c3dd45d Bug 1654258: Package all activity-stream css files and load them using the internal chrome: protocol. r=mconley,k88hudson,perftest-reviewers,zombie,sparky
Differential Revision: https://phabricator.services.mozilla.com/D85022
2020-09-09 16:11:28 +00:00
Scott
c273cf653d Bug 1620409 - New logic for handling collection dismiss. r=perftest-reviewers,gvn,sparky
Differential Revision: https://phabricator.services.mozilla.com/D84018
2020-07-20 20:05:37 +00:00
Mike Conley
6c6c2928e6 Bug 1622088 - Part 1: Write a test for the about:home startup cache worker. r=k88hudson
Differential Revision: https://phabricator.services.mozilla.com/D70954
2020-06-16 20:51:52 +00:00
Dorel Luca
13c718e2f2 Backed out 3 changesets (bug 1622088) for XPCshell and Browser-chrome failurs on browser/abouthomecache/browser_process_crash.js. CLOSED TREE
Backed out changeset 238fa307504a (bug 1622088)
Backed out changeset ceaa7857baea (bug 1622088)
Backed out changeset 9c75ae56f50e (bug 1622088)
2020-06-08 20:17:42 +03:00
Mike Conley
8552e27d40 Bug 1622088 - Part 1: Write a test for the about:home startup cache worker. r=k88hudson
Differential Revision: https://phabricator.services.mozilla.com/D70954
2020-06-08 15:56:01 +00:00
Csoregi Natalia
9955440e45 Backed out 3 changesets (bug 1622088) for sanitizer failures on RootingAPI.h. CLOSED TREE
Backed out changeset 43477ef52982 (bug 1622088)
Backed out changeset 35c3d2b322fa (bug 1622088)
Backed out changeset 77f71cbc61ec (bug 1622088)
2020-05-06 01:32:41 +03:00
Mike Conley
298efaca0a Bug 1622088 - Part 1: Write a test for the about:home startup cache worker. r=k88hudson
Differential Revision: https://phabricator.services.mozilla.com/D70954
2020-05-05 21:03:16 +00:00
Kate Hudson
b1d26ed383 Bug 1620021 - Integrate aboutwelcome with ExperimentManager r=andreio
Differential Revision: https://phabricator.services.mozilla.com/D65367
2020-04-18 05:23:02 +00:00
Punam Dahiya
b87759bac5 Bug 1624460 - Implement pull factor re-inforcement experiment telemetry r=k88hudson,nanj
Differential Revision: https://phabricator.services.mozilla.com/D69439

--HG--
extra : moz-landing-system : lando
2020-04-03 20:51:36 +00:00
Punam Dahiya
99ba796141 Bug 1622474 - Enabled new About:Welcome experience by default; turned on dynamic triplets r=k88hudson
Differential Revision: https://phabricator.services.mozilla.com/D67199

--HG--
extra : moz-landing-system : lando
2020-03-25 16:13:09 +00:00
Razvan Maries
3c20c122d2 Backed out changeset ba7de7a93a71 (bug 1622474) for perma failures on browser_ext_themes_ntp_colors.js. CLOSED TREE 2020-03-24 01:23:08 +02:00
Punam Dahiya
b38003f702 Bug 1622474 - Enabled new About:Welcome experience by default; turned on dynamic triplets r=k88hudson
Differential Revision: https://phabricator.services.mozilla.com/D67199

--HG--
extra : moz-landing-system : lando
2020-03-23 19:51:57 +00:00
Andrei Oprea
ea13fa2229 Bug 1619702 - Use Sinon.jsm for about:welcome mochitests and xpcshell r=pdahiya
Differential Revision: https://phabricator.services.mozilla.com/D66624

--HG--
extra : moz-landing-system : lando
2020-03-19 10:50:25 +00:00
Kate Hudson
29879537e0 Bug 1622915 - Create test experiment data for about:welcome r=pdahiya
Differential Revision: https://phabricator.services.mozilla.com/D67072

--HG--
extra : moz-landing-system : lando
2020-03-17 00:03:16 +00:00
Mike Conley
8ba260392e Bug 1619992 - Split AboutNewTabService into AboutNewTabParentService and AboutNewTabChildService. r=perftest-reviewers,Mardak,sparky
This patch does the following:
* Moves most logic for initiating about:home / about:newtab into AboutNewTab.jsm
* Makes AboutNewTab the API surface for overriding the default about:newtab URLs.
* Reduces the surface of nsIAboutNewTabService, and makes the properties read-only
* Splits the remaining code in the nsIAboutNewTabService into an implementation for
  the parent process, and one for content processes.

This split will hopefully help reduce confusion about which code in
AboutNewTabService is running in which process.

Differential Revision: https://phabricator.services.mozilla.com/D65569

--HG--
rename : browser/components/newtab/test/xpcshell/test_AboutNewTabService.js => browser/components/newtab/test/xpcshell/test_AboutNewTab.js
extra : moz-landing-system : lando
2020-03-11 03:10:29 +00:00
Dorel Luca
6c6fc9f3dc Backed out changeset 9160f18bc24e (bug 1619992) for XPCshell failures in newtab/test/xpcshell/test_AboutNewTab.js
--HG--
rename : browser/components/newtab/test/xpcshell/test_AboutNewTab.js => browser/components/newtab/test/xpcshell/test_AboutNewTabService.js
2020-03-11 04:20:31 +02:00
Mike Conley
4cb59612e3 Bug 1619992 - Split AboutNewTabService into AboutNewTabParentService and AboutNewTabChildService. r=perftest-reviewers,Mardak,sparky
This patch does the following:
* Moves most logic for initiating about:home / about:newtab into AboutNewTab.jsm
* Makes AboutNewTab the API surface for overriding the default about:newtab URLs.
* Reduces the surface of nsIAboutNewTabService, and makes the properties read-only
* Splits the remaining code in the nsIAboutNewTabService into an implementation for
  the parent process, and one for content processes.

This split will hopefully help reduce confusion about which code in
AboutNewTabService is running in which process.

Differential Revision: https://phabricator.services.mozilla.com/D65569

--HG--
rename : browser/components/newtab/test/xpcshell/test_AboutNewTabService.js => browser/components/newtab/test/xpcshell/test_AboutNewTab.js
extra : moz-landing-system : lando
2020-03-11 01:25:31 +00:00
Andrei Oprea
8c21b13bfa Bug 1616371 - Add Event telemetry to simplified full page about:welcome r=k88hudson,nanj
Differential Revision: https://phabricator.services.mozilla.com/D65110

--HG--
extra : moz-landing-system : lando
2020-03-04 14:16:04 +00:00
Emma Malysz
57215abe07 Bug 1601094, rename the remaining .xul files in browser/ to .xhtml r=marionette-reviewers,whimboo,mossop
Differential Revision: https://phabricator.services.mozilla.com/D55751

--HG--
rename : browser/base/content/aboutDialog.xul => browser/base/content/aboutDialog.xhtml
rename : browser/base/content/newInstall.xul => browser/base/content/newInstall.xhtml
rename : browser/base/content/pageinfo/pageInfo.xul => browser/base/content/pageinfo/pageInfo.xhtml
rename : browser/base/content/safeMode.xul => browser/base/content/safeMode.xhtml
rename : browser/base/content/sanitize.xul => browser/base/content/sanitize.xhtml
rename : browser/base/content/titlebar-items.inc.xul => browser/base/content/titlebar-items.inc.xhtml
rename : browser/base/content/webext-panels.xul => browser/base/content/webext-panels.xhtml
rename : browser/base/content/webrtcIndicator.xul => browser/base/content/webrtcIndicator.xhtml
rename : browser/components/downloads/content/contentAreaDownloadsView.xul => browser/components/downloads/content/contentAreaDownloadsView.xhtml
rename : browser/components/migration/content/migration.xul => browser/components/migration/content/migration.xhtml
rename : browser/components/places/content/bookmarkProperties.xul => browser/components/places/content/bookmarkProperties.xhtml
rename : browser/components/places/content/bookmarksSidebar.xul => browser/components/places/content/bookmarksSidebar.xhtml
rename : browser/components/places/content/historySidebar.xul => browser/components/places/content/historySidebar.xhtml
rename : browser/components/places/content/places.xul => browser/components/places/content/places.xhtml
rename : browser/components/shell/content/setDesktopBackground.xul => browser/components/shell/content/setDesktopBackground.xhtml
extra : moz-landing-system : lando
2019-12-11 00:27:19 +00:00
Victor Porof
1f830c96da Bug 1561435 - Format browser/components/, a=automatic-formatting
# ignore-this-changeset

Differential Revision: https://phabricator.services.mozilla.com/D36042

--HG--
extra : source : d3afcafdce650a6f36cebbc126ee93b17f13cf52
2019-07-05 09:53:32 +02:00
Ed Lee
c863d3c77b Bug 1555450 - Remove locale-specific behavior when fully fluent (no longer using properties/json) r=k88hudson
Depends on D36764

Differential Revision: https://phabricator.services.mozilla.com/D36769

--HG--
rename : browser/components/newtab/prerendered/static/activity-stream-debug.html => browser/components/newtab/prerendered/activity-stream-debug.html
rename : browser/components/newtab/prerendered/locales/en-US/activity-stream-noscripts.html => browser/components/newtab/prerendered/activity-stream-noscripts.html
rename : browser/components/newtab/prerendered/locales/en-US/activity-stream.html => browser/components/newtab/prerendered/activity-stream.html
extra : moz-landing-system : lando
2019-07-03 23:49:07 +00:00
Ed Lee
bd822928e5 Bug 1555507 - Add modal escaping, simple prerendering and bug fixes to Activity Stream r=k88hudson
Differential Revision: https://phabricator.services.mozilla.com/D33089

--HG--
extra : moz-landing-system : lando
2019-05-30 15:04:19 +00:00
Mark Banner
dba6983e75 Bug 1415265 - Remove now unnecessary .eslintrc.js files or entries. r=mossop
Differential Revision: https://phabricator.services.mozilla.com/D23850

--HG--
extra : moz-landing-system : lando
2019-03-28 09:38:14 +00:00
Kris Maglione
e930b89c34 Bug 1514594: Part 3 - Change ChromeUtils.import API.
***
Bug 1514594: Part 3a - Change ChromeUtils.import to return an exports object; not pollute global. r=mccr8

This changes the behavior of ChromeUtils.import() to return an exports object,
rather than a module global, in all cases except when `null` is passed as a
second argument, and changes the default behavior not to pollute the global
scope with the module's exports. Thus, the following code written for the old
model:

  ChromeUtils.import("resource://gre/modules/Services.jsm");

is approximately the same as the following, in the new model:

  var {Services} = ChromeUtils.import("resource://gre/modules/Services.jsm");

Since the two behaviors are mutually incompatible, this patch will land with a
scripted rewrite to update all existing callers to use the new model rather
than the old.
***
Bug 1514594: Part 3b - Mass rewrite all JS code to use the new ChromeUtils.import API. rs=Gijs

This was done using the followng script:

https://bitbucket.org/kmaglione/m-c-rewrites/src/tip/processors/cu-import-exports.jsm
***
Bug 1514594: Part 3c - Update ESLint plugin for ChromeUtils.import API changes. r=Standard8

Differential Revision: https://phabricator.services.mozilla.com/D16747
***
Bug 1514594: Part 3d - Remove/fix hundreds of duplicate imports from sync tests. r=Gijs

Differential Revision: https://phabricator.services.mozilla.com/D16748
***
Bug 1514594: Part 3e - Remove no-op ChromeUtils.import() calls. r=Gijs

Differential Revision: https://phabricator.services.mozilla.com/D16749
***
Bug 1514594: Part 3f.1 - Cleanup various test corner cases after mass rewrite. r=Gijs
***
Bug 1514594: Part 3f.2 - Cleanup various non-test corner cases after mass rewrite. r=Gijs

Differential Revision: https://phabricator.services.mozilla.com/D16750

--HG--
extra : rebase_source : 359574ee3064c90f33bf36c2ebe3159a24cc8895
extra : histedit_source : b93c8f42808b1599f9122d7842d2c0b3e656a594%2C64a3a4e3359dc889e2ab2b49461bab9e27fc10a7
2019-01-17 10:18:31 -08:00
Ed Lee
02ecb969f0 Bug 1510766 - Add AMO firstrun, FxA defaults and bug fixes to Activity Stream r=k88hudson
Differential Revision: https://phabricator.services.mozilla.com/D13317

--HG--
extra : moz-landing-system : lando
2018-11-29 05:26:55 +00:00
Ricky Rosario
c8ffa188eb Bug 1505929 - Add FxA onboarding card, pref on CFR and ASR and bug fixes to Activity Stream r=k88hudson,Mardak
Differential Revision: https://phabricator.services.mozilla.com/D11375

--HG--
extra : moz-landing-system : lando
2018-11-10 19:13:10 +00:00
Cosmin Sabou
edecf57f25 Backed out changeset 9fce755a1262 (bug 1505929) for causing browser chrome nightly failures when tryin to connect to snippets.cdn.mozilla.net. a=backout 2018-11-10 16:45:39 +02:00
Ricky Rosario
f48e0b6314 Bug 1505929 - Add FxA onboarding card, pref on CFR and ASR and bug fixes to Activity Stream r=k88hudson
MozReview-Commit-ID: 2NdTCG1NWe8

Differential Revision: https://phabricator.services.mozilla.com/D11375

--HG--
extra : moz-landing-system : lando
2018-11-09 21:46:11 +00:00
k88hudson
4ac3617dfe Bug 1503989 - Add JEXL targeting, remove smallest breakpoint, test-related fixes to Activity Stream r=ursula
Differential Revision: https://phabricator.services.mozilla.com/D10619

--HG--
extra : moz-landing-system : lando
2018-11-01 20:55:03 +00:00
imjching
97d6a5d8a2 Bug 1472212 - Update URLs to include the noscripts version in xpcshell and browser tests for newtab. r=Mardak
MozReview-Commit-ID: EA4YminghNs

--HG--
extra : source : 101903689bc0ee0bc178fc5c333e198b16166fe2
extra : intermediate-source : 48242d39d5328fd57aa8223262e988bd1e837bd6
extra : histedit_source : 692f5890fb0d3d0d4f771e72418d5888022103bc
2018-07-11 17:18:21 -04:00
Ciure Andrei
60ea98ca60 Backed out 10 changesets (bug 1501044, bug 1472212) for fetch-destination.https.html perma failure CLOSED TREE
Backed out changeset aa35078cabaa (bug 1472212)
Backed out changeset bf02793f802d (bug 1472212)
Backed out changeset 95a7ef6102a6 (bug 1472212)
Backed out changeset 7b7fa6ab2229 (bug 1472212)
Backed out changeset 4fe4ec18f2f3 (bug 1472212)
Backed out changeset 18f824674b76 (bug 1472212)
Backed out changeset 1978a7837502 (bug 1472212)
Backed out changeset 21a6f1a83c73 (bug 1472212)
Backed out changeset 48242d39d532 (bug 1472212)
Backed out changeset 0b5cf2f4305a (bug 1501044)
2018-10-30 23:31:10 +02:00
imjching
0c4aac09cd Bug 1472212 - Update URLs to include the noscripts version in xpcshell and browser tests for newtab. r=Mardak
MozReview-Commit-ID: EA4YminghNs

--HG--
extra : rebase_source : 6516413046fb3fc08b5b635971f799d56f1fa234
extra : intermediate-source : b4baa63e5b1b6bbfe41e80f258a6af85e3d0c5d3
extra : source : 101903689bc0ee0bc178fc5c333e198b16166fe2
2018-07-11 17:18:21 -04:00
Csoregi Natalia
cc313f779c Backed out 9 changesets (bug 1472212) for browser-chrome tests run issues on Linux x64 asan and failures on browser_ext_windows_create_tabId.js. CLOSED TREE
Backed out changeset 18e46df44cd1 (bug 1472212)
Backed out changeset 2e5de66c1f60 (bug 1472212)
Backed out changeset b94f9883aef0 (bug 1472212)
Backed out changeset ebdca743668c (bug 1472212)
Backed out changeset f8a06d01437e (bug 1472212)
Backed out changeset b6996abc7d90 (bug 1472212)
Backed out changeset 24c257cd18c3 (bug 1472212)
Backed out changeset 176f3ee14e67 (bug 1472212)
Backed out changeset b4baa63e5b1b (bug 1472212)
2018-10-30 01:58:21 +02:00