Commit graph

987472 commits

Author SHA1 Message Date
Thomas Wisniewski
b823dd5a90 Bug 1924167 - shim updates; a=dmeehan
Differential Revision: https://phabricator.services.mozilla.com/D228367
2024-11-07 22:37:41 +00:00
Simon Friedberger
d4164793c6 Bug 1929571: change PSL branch from master to main, r=jcristau a=NPOTB DONTBUILD 2024-11-06 22:01:37 +00:00
ffxbld
70d2732b2a No Bug, mozilla-esr128 repo-update HSTS HPKP remote-settings tld-suffixes - a=dmeehan
Differential Revision: https://phabricator.services.mozilla.com/D228324
2024-11-07 14:05:52 +00:00
Yannis Juglaret
48309dc0d3 Bug 1924623 - Only detour VariantClear in Firefox. a=dmeehan
Detouring VariantClear resulted in a huge crash spike for Thunderbird,
so let's do that only in Firefox.

Original Revision: https://phabricator.services.mozilla.com/D227957

Differential Revision: https://phabricator.services.mozilla.com/D228304
2024-11-07 13:21:37 +00:00
Fatih
1d8f91729f Bug 1928871: Fix browser_exslt_timezone_load.js. r=tjr, a=test-only 2024-11-06 15:28:55 +00:00
donal meehan
62f34b47ad Bug 1921079 - Update l10n-changesets.json. a=dmeehan 2024-11-06 11:29:39 -05:00
Kagami Sascha Rosylight
aab8368c04 Bug 1928124 - Implement push error metrics a=dmeehan
Differential Revision: https://phabricator.services.mozilla.com/D227855
2024-11-05 18:56:46 +00:00
Greg Stoll
0d9d8f3071 Bug 1921079 - make DLP agent name bold in panel a=dmeehan
I tried this for the hover text as well but unsurprisingly bold text
isn't styled any differently there.

Original Revision: https://phabricator.services.mozilla.com/D225856

Differential Revision: https://phabricator.services.mozilla.com/D227596
2024-11-05 15:35:39 +00:00
Greg Stoll
7e23c5c3f2 Bug 1919755 - correctly calculate content analysis URL for local PDF file a=dmeehan
This was already working for remote PDF files but I went ahead and
added tests for both.

Original Revision: https://phabricator.services.mozilla.com/D223639

Differential Revision: https://phabricator.services.mozilla.com/D227595
2024-11-05 15:35:38 +00:00
Greg Stoll
e1083a1ea4 Bug 1919537 - don't crash with DLP on when drag/drop text to a site on Deny list a=dmeehan
This prevents a problem where Content Analysis responds synchronously (because
the site is on the deny list), which causes a modal window to pop up, which
cancels the drag session. This causes MOZ_ASSERTs() where we expect the drag
session to still be active.

Original Revision: https://phabricator.services.mozilla.com/D222668

Differential Revision: https://phabricator.services.mozilla.com/D227594
2024-11-05 15:35:38 +00:00
Greg Stoll
ee74d9b1ca Bug 1918579 - don't crash when dropping with content analysis and focus changes a=dmeehan
Original Revision: https://phabricator.services.mozilla.com/D222290

Differential Revision: https://phabricator.services.mozilla.com/D227593
2024-11-05 15:35:38 +00:00
David Parks
c98cc41962 Bug 1916804: Make content analysis DND use getURIForDropEvent a=dmeehan
getURIForDropEvent delegates to getURIForBrowsingContext -- the ground truth for
CA URIs.

This also adds a check that getURIForDropEvent is correctly called in CA tests.
We do not yet test that it returns the right value -- that is future work.

Original Revision: https://phabricator.services.mozilla.com/D222192

Differential Revision: https://phabricator.services.mozilla.com/D227592
2024-11-05 15:35:37 +00:00
David Parks
3752ee37f2 Bug 1910452: Part 5 - Release content analysis cache request on main thread a=dmeehan
Without this, we assert when releasing the request on the background thread when
we hit an error, such as the DLP agent not running.

Original Revision: https://phabricator.services.mozilla.com/D220617

Differential Revision: https://phabricator.services.mozilla.com/D227591
2024-11-05 15:35:37 +00:00
David Parks
53506ab3c5 Bug 1910452: Part 4 - Wait for iframe to load in drag and drop tests a=dmeehan
This was causing "AbortError: Actor 'SpecialPowers' destroyed before query
'Spawn' was resolved" failures.

Original Revision: https://phabricator.services.mozilla.com/D219551

Differential Revision: https://phabricator.services.mozilla.com/D227590
2024-11-05 15:35:36 +00:00
David Parks
f779efc910 Bug 1910452: Part 3 - Fix some issues with synthesizeMockDragAndDrop a=dmeehan
This fixes four issues:

1. The test didn't provide enough movement to generate a drag session on the
   source before moving to the target.  This meant that, when they were in
   different windows, Gecko wouldn't send dragleave to the source or dragenter
   to the target.  It also never sent dragenter to the source in the first
   place. This remedies that.
2. dragenter and dragleave weren't properly handled because the test was sending
   dragleaves instead of dragexits (the latter being what Gecko expects and the
   former being synthesized from that -- see e.g. nsNativeDragTarget::DragLeave).
   This now uses dragexits and sets the proper expectations.
3. expectProtectedDataTransferAccess was needlessly complicated and, after #1,
   gave the wrong answers for some events like dragenter called on the source.
4. The event handler wasn't checking for exceptions and the drop handler was
   intentionally causing one, which was causing it to miss the rest of its
   execution.

Original Revision: https://phabricator.services.mozilla.com/D219550

Differential Revision: https://phabricator.services.mozilla.com/D227589
2024-11-05 15:35:36 +00:00
David Parks
903070f690 Bug 1910452: Part 2 - Test that drag-drop respects content analysis a=dmeehan
This reuses parts of the dom/events test to test that content analysis is
consulted and respected for in-browser drags with drops in the same frame and
between frames/windows with same or different origin.

Original Revision: https://phabricator.services.mozilla.com/D219549

Differential Revision: https://phabricator.services.mozilla.com/D227588
2024-11-05 15:35:36 +00:00
David Parks
94e352a07b Bug 1910452: Part 1 - Intercept drop events for content analysis a=dmeehan
Sends OOP drop events to content analysis for approval before sending them to
the DOM.  It intercepts drop events at the browser level and sends them to CA
before calling stopPropagation and preventDefault on them.  (CA also presents a
modal dialog over the tab.) The drag session then ends as usual in the parent
process but remains open on the related browser in the process where it would be
sent to the DOM while the drop is being analyzed.  While CA runs, the browser
dispatches an eQueryDropTargetHittest event to locate the drop target while the
event screen coordinates are still valid.  When CA is complete, a drop or
dragexit event is sent to the drop target (drop if it was approved by CA). Calls
to EndDragSession are delayed during this.

Differential Revision: https://phabricator.services.mozilla.com/D227587
2024-11-05 15:35:35 +00:00
Richard Marti
094786271f Bug 1922961 - Don't append the browser subdirectory in Thunderbird. r=win-reviewers,handyman, a=dmeehan
Differential Revision: https://phabricator.services.mozilla.com/D225443
2024-10-27 10:47:01 +00:00
Brad Werth
71f5b7ee20 Bug 1916152: Make nsCocoaWindow handle failing to enter or exit fullscreen. r=mac-reviewers,mstange, a=dmeehan
Previously, we had relied on macOS eventually invoking the
windowDidEnterFullscreen and windowDidExitFullscreen delegate methods.
But in cases where macOS does not, and instead invokes the "fail"
methods, we can do the right thing to put the nsCocoaWindow in a
synchronized state with the DOM.

Differential Revision: https://phabricator.services.mozilla.com/D227295
2024-10-31 19:19:20 +00:00
Rob Wu
293307f40d Bug 1921353 - Ensure up-to-date flags in DNR cache a=dmeehan
Original Revision: https://phabricator.services.mozilla.com/D225005

Differential Revision: https://phabricator.services.mozilla.com/D227534
2024-11-04 15:32:51 +00:00
Andrew Osmond
788ee0eb39 Bug 1920197 - Add prefs to allow updating Widevine directly from the Chromium update service. a=dmeehan
This patch allows us to download Widevine updates directly from the
Chromium update service, bypassing balrog and fallback configuration
options. This will be useful in the early stages of testing Widevine
updates, allowing us to use whatever Google has pushed to its own users,
including beta updates, before we engage release engineering.

Relevant Widevine L3 prefs have been added:
- media.gmp-widevinecdm.force-chromium-update
- media.gmp-widevinecdm.force-chromium-beta

which force the use of the Chromium update service, and requesting beta
versions (if available) respectively.

Similarly, Widevine L1 prefs have been added as well:
- media.gmp-widevinecdm-l1.force-chromium-update
- media.gmp-widevinecdm-l1.force-chromium-beta

Original Revision: https://phabricator.services.mozilla.com/D223017

Differential Revision: https://phabricator.services.mozilla.com/D227229
2024-11-04 15:26:57 +00:00
Stephanie Cunnane
bcd24d121b Bug 1927151 - Fix Bing follow-on searches incorrectly recorded as organic:none in telemetry. a=dmeehan
Original Revision: https://phabricator.services.mozilla.com/D227266

Differential Revision: https://phabricator.services.mozilla.com/D227716
2024-11-04 13:58:14 +00:00
ffxbld
f44124425a No Bug, mozilla-esr128 repo-update HSTS HPKP remote-settings tld-suffixes - a=dmeehan
Differential Revision: https://phabricator.services.mozilla.com/D227810
2024-11-04 13:05:42 +00:00
Edgar Chen
3c4447c7bd Bug 1909535 - Don't show select dropdown in background tabs; a=dmeehan
Original Revision: https://phabricator.services.mozilla.com/D225706

Differential Revision: https://phabricator.services.mozilla.com/D227607
2024-11-02 14:02:59 +00:00
Marco Bonardo
36a9e50e29 Bug 1921458. a=dmeehan
Original Revision: https://phabricator.services.mozilla.com/D226775

Differential Revision: https://phabricator.services.mozilla.com/D227221
2024-11-02 13:58:36 +00:00
donal meehan
ddac3dab9d Backed out 1 changesets (bug 1919755) from esr128 for causing test failures
Backed out changeset 19beee0b6d7d (bug 1919755)
2024-10-31 15:42:46 -04:00
Greg Stoll
e99d78b4cd Bug 1919755 - correctly calculate content analysis URL for local PDF file a=dmeehan
This was already working for remote PDF files but I went ahead and
added tests for both.

Original Revision: https://phabricator.services.mozilla.com/D223639

Differential Revision: https://phabricator.services.mozilla.com/D226391
2024-10-31 17:40:35 +00:00
ffxbld
ca35f40858 No Bug, mozilla-esr128 repo-update HSTS HPKP remote-settings tld-suffixes - a=dmeehan
Differential Revision: https://phabricator.services.mozilla.com/D227484
2024-10-31 12:35:05 +00:00
donal meehan
be842b752f Backed out 1 changesets (bug 1917632) for causing perma test failures on esr128
Backed out changeset 2de0c38ef21d (bug 1917632)
2024-10-30 16:43:11 -04:00
Gijs Kruitbosch
fb37733ab9 Bug 1923655 - stop browser_protocol_ask_dialog_permission.js failing on esr a=dmeehan
Differential Revision: https://phabricator.services.mozilla.com/D226852
2024-10-30 14:54:22 +00:00
Nikki Sharpley
2afdb99960 Bug 1917632 - Apply the sidebar revamp in the same window that pref is enabled in a=dmeehan
`adoptFromWindow` sets the sidebar width based on the "opener" window. If the opener
does not have a sidebar, no width is remembered. Previously, flipping the sidebar revamp
pref required opening a new window to see the revamped sidebar, and hence meant the opener
did not have a sidebar.

This patch ensures the revamp is applied in the current/opener window and hence the width
of the sidebar opened in that window is used to determine the width of the sidebar in future
windows opened. This should resolve the issue some users have found when closing the browser
via the X button and reopening the browser doesn't remember the sidebar width.

Differential Revision: https://phabricator.services.mozilla.com/D226942
2024-10-30 13:50:17 +00:00
Jonathan Kew
d3ce586511 Bug 1898184 - Don't set the forPreview flag if the prefer_system_dialog pref is set, to avoid blocking forever in nsGlobalWindowOuter::Print. a=dmeehan
Original Revision: https://phabricator.services.mozilla.com/D224950

Differential Revision: https://phabricator.services.mozilla.com/D226807
2024-10-30 13:44:50 +00:00
Mike Kaply
14e09f3679 Bug 1927117 - Add policy to the schema file. a=dmeehan
Original Revision: https://phabricator.services.mozilla.com/D226896

Differential Revision: https://phabricator.services.mozilla.com/D227219
2024-10-29 15:52:07 +00:00
Mozilla Releng Treescript
7598fec854 No bug - Tagging c4a5d008ee64fab523384408fa2868e2d028025d with FIREFOX_128_4_0esr_RELEASE a=release CLOSED TREE DONTBUILD 2024-10-29 13:01:22 +00:00
Mozilla Releng Treescript
a163c9b26d Update configs. IGNORE BROKEN CHANGESETS CLOSED TREE NO BUG a=release ba=release 2024-10-28 14:39:05 +00:00
Mozilla Releng Treescript
c11e5a3b9b No bug - Tagging c4a5d008ee64fab523384408fa2868e2d028025d with FIREFOX_128_4_0esr_BUILD1 a=release CLOSED TREE DONTBUILD 2024-10-22 00:05:56 +00:00
David Parks
cc058e14a5 Bug 1917201: Remove cancel button from modal while waiting for user to respond to Windows geolocation dialog r=Gijs a=RyanVM
The cancel button is not really useful here and is probably confusing some
users, since they are pressing it anyway, and it is causing this crash. The
ideal fix would be for the Windows dialog to be modal instead of just immovable,
but it isn't.

Differential Revision: https://phabricator.services.mozilla.com/D225154
2024-10-18 21:58:28 +00:00
David Parks
5f342def31 Bug 1900225: Part 6 - Wait for Windows permission dialog to be dismissed before requesting geolocation r=emilio,win-reviewers,gstoll a=RyanVM
When Windows presents the dialog asking the user to give geolocation permission
to Firefox, we need to wait for the user to make a choice before running the
geolocation request.    Previously, we were not waiting for the user's response
so most requests would timeout and fail, even if the user replied "Yes".

This dialog is only ever presented once -- the first time that Firefox asks
Windows for a wifi scan.  It does not reappear on restarts or reinstalls.   This
dedicated Yes/No system prompt is a bit more user-friendly than system settings.

This "system will prompt for permission" case could be completely avoided since
wifi scanning is not useful to us when it requires geolocation permissions as
geolocation would override it.  We would need the MLSFallback behavior to skip
scanning wifi when geolocation permission wasn't already granted, or else the
MLSFallback would present the system prompt in question, despite the user having
already denied permission.  On the other hand, we need the old scanning behavior
for this case when running versions of Windows 10 and 11 that don't have these
updates.  (The updates are set to appear in the 24H2 version of Windows 11.)
This approach avoids that kind of version special-casing.

Differential Revision: https://phabricator.services.mozilla.com/D218589
2024-08-27 22:47:33 +00:00
David Parks
7353dad1ee Bug 1900225: Part 5 - On Windows, do not show message about wifi scan permission if no wifi is present r=win-reviewers,necko-reviewers,valentin,gstoll a=RyanVM
We added a note to the geolocation doorhanger, warning the user when Windows is
going to repeat the request for user permission (although it asks for permission
for Firefox, not for the web page).  However, Windows won't do this if there is
no wifi adapter that could perform the scan.  Here, we avoid adding the note in
that case.

Differential Revision: https://phabricator.services.mozilla.com/D218588
2024-08-27 22:47:33 +00:00
David P
b5f3201f9f Bug 1900225: Part 4 - Add geo.prompt.open_system_prefs to block opening system preferences r=gstoll a=RyanVM
Also adds this as the default for mochitests, in anticipation of the day that
the implementation is supported by the computers in automation.

Differential Revision: https://phabricator.services.mozilla.com/D216475
2024-08-27 22:47:32 +00:00
David P
02741f5f68 Bug 1900225: Part 3 - Implement system geolocation permission UX on Windows r=win-reviewers,gstoll a=RyanVM
This implements PresentSystemSettings, LocationIsPermittedHint and
SystemWillPromptForPermissionHint for Windows.  The Windows APIs are not always
available -- some are currently only available in Windows 11 Canary builds
(slated for September release).  In the event that APIs are not available, this
should do nothing.  At present, this is detailed here:

https://learn.microsoft.com/en-us/windows/win32/nativewifi/wi-fi-access-location-changes

There are two issues that this is intended to handle:

1. The system will display a one-time (or so) dialog to the user when Firefox
requests geolocation but doesn't have permission.  For that case, we inform the
user that they will be asked to grant location permission again.  This system
dialog is only presented in versions of Windows that support all of the relevant
APIs.
2. We open system settings to the right page and post a cancelable modal dialog
on the tab if the user grants geolocation to the page but geolocation permission
isn't currently granted in the OS.  This case will not happen if case #1 did.
Unfortunately, we can't get information about the permission status without a
location request on old versions of Windows, so this also does nothing unless
the recent APIs are supported (in this case, AppCapability::CheckAccess).

This work is necessitated not only by the new (occasional) system dialog but
also by Microsoft's plans to block wifi scanning if geolocation isn't available.
We have used wifi scanning as part of a fallback when system geolocation isn't
available -- that approach is no longer viable here.  A user would confusingly
get repeated errors or very poor results (e.g. IP lookup results) without
information as to why, if that happened.  This is what happens in the current
Windows Canary build if system geolocation is turned off.  The fallback remains
useful on other platforms, although Linux is in flux (but it is not in the
scope of this bug).

Differential Revision: https://phabricator.services.mozilla.com/D216474
2024-08-27 22:47:32 +00:00
David P
4457936d80 Bug 1900225: Part 2 - Inform user of system UX issues initiated by geolocation request r=gstoll,emilio,bolsson,pbz a=RyanVM
This patch installs the framework for various platforms to inform the user of
one of two things: 1) a coming system dialog asking for system geolocation
permission that will be presented after the Firefox doorhanger asking for
permission for the page, and 2) that we will open a system preferences window,
where the user can enable geolocation for Firefox because it is currently not
enabled.  The code that handles this has been remoted to the parent process
since implementations will not be able to operate in the content process
sandbox.

Here, it stubs the behavior so this does nothing on every platform.
In this patch series, the behavior will be implemented for Windows.

Note: The code will run the geolocation for the page if the user granted it in
Firefox, regardless of whether the user granted or canceled the system
permission.  This respects the user's instruction and provides a work-around in
the event of a bug, although it would usually either fail to get a location or
it will get a very poor one (e.g. via IP lookup).

Differential Revision: https://phabricator.services.mozilla.com/D216473
2024-08-27 22:47:32 +00:00
David Parks
d7a066ab36 Bug 1900225: Part 1 - Add dismissPrompts to Windows geolocation UI utils r=Gijs a=RyanVM
Will be used later in this series to remove a cancel dialog that is presented
over a tab while Gecko waits for the user to grant geolocation permission in the
OS.

Differential Revision: https://phabricator.services.mozilla.com/D217015
2024-08-27 22:47:31 +00:00
Eitan Isaacson
e23be1e206 Bug 1919087 - Defer PushNameOrDescriptionChange to WillRefresh tick. a=RyanVM
Since the method is deferred we need to do extra guesswork for possible
situtations where the name has changed because we don't have the
privilege to calculate the name in-line when content is deleted.

I tried to account for all cases as we have in our test coverage. I
hope that if there are edge cases they are false positives, and we are
firing extra name changes and not the opposite.

Original Revision: https://phabricator.services.mozilla.com/D223877

Differential Revision: https://phabricator.services.mozilla.com/D225716
2024-10-20 18:53:42 +00:00
ffxbld
6f20ec137d No Bug, mozilla-esr128 repo-update HSTS HPKP remote-settings tld-suffixes - a=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D226304
2024-10-21 12:33:03 +00:00
Kagami Sascha Rosylight
f9036a9a1d Bug 1924154 - Disallow too small record a=RyanVM
Original Revision: https://phabricator.services.mozilla.com/D225687

Differential Revision: https://phabricator.services.mozilla.com/D226147
2024-10-18 16:31:52 +00:00
Thomas Wisniewski
88ec901b2c Bug 1925270 - uplift webcompat interventions for v133.2.0 to ESR 128; r=denschub a=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D226038
2024-10-18 16:31:00 +00:00
Ryan VanderMeulen
7d979155b4 Bug 1768724 - Update l10n-changesets.json. a=RyanVM 2024-10-17 13:06:08 -04:00
Sean
f29745d917 Bug 1917664 - Ensure mMSAuthorities is loaded even when the preference is switched a=RyanVM
Original Revision: https://phabricator.services.mozilla.com/D221532

Differential Revision: https://phabricator.services.mozilla.com/D226000
2024-10-17 16:36:56 +00:00
Sean
96cc4f152b Bug 1768724 - Part 3: Add support for Microsoft SSO on macOS (Necko Part) a=RyanVM
Original Revision: https://phabricator.services.mozilla.com/D218355

Differential Revision: https://phabricator.services.mozilla.com/D225994
2024-10-17 16:36:55 +00:00