Closed
Bug 1335134
Opened 7 years ago
Closed 7 years ago
Put the security.mixed_content.send_hsts_priming pref behind the RELEASE_OR_BETA ifdef
Categories
(Core :: DOM: Security, defect)
Tracking
()
People
(Reporter: kmckinley, Assigned: kmckinley)
References
Details
Attachments
(2 files, 1 obsolete file)
59 bytes,
text/x-review-board-request
|
mayhemer
:
review+
ritu
:
approval-mozilla-aurora+
lizzard
:
approval-mozilla-beta+
lizzard
:
approval-mozilla-release+
|
Details |
1.50 KB,
patch
|
Details | Diff | Splinter Review |
No description provided.
Assignee | ||
Comment 1•7 years ago
|
||
Comment 2•7 years ago
|
||
[Tracking Requested - why for this release]: Raised on r-d. nomming for tracing although I'm not yet clear on whether this warrants a point release or should be fixed in a followup release.
status-firefox51:
--- → affected
status-firefox52:
--- → ?
status-firefox53:
--- → ?
status-firefox54:
--- → ?
tracking-firefox51:
--- → ?
tracking-firefox52:
--- → ?
tracking-firefox53:
--- → ?
tracking-firefox54:
--- → ?
Comment 4•7 years ago
|
||
Kate, who is going to review this patch, and what is the relationship between this change in all.js and the similar rules in security-prefs.js ?
Flags: needinfo?(kmckinley)
Assignee | ||
Updated•7 years ago
|
Attachment #8831773 -
Attachment is obsolete: true
Comment hidden (mozreview-request) |
Setting this as blocking 51/52. This looks like a dot release driver to me.
Assignee | ||
Comment 7•7 years ago
|
||
Bug 1311807 has a site that can be used to verify the patch.
Flags: needinfo?(kmckinley)
We should explore pushing a hotfix or system add-on update for this before we start planning a dot release. This is a pref flip and afaik hotfix/SAO update are both good mechanisms of doing this.
Comment 9•7 years ago
|
||
We should do both a hotfix extension and ship and update. The hotfix would allow us to address a significant part of the userbase quickly. I recall our findings from websense hotfixes that we ended up with several million people who never got the hotfix, is there anything that has changed since that finding? Shipping an update has better penetration.
I agree, we should go ahead and ship the system add-on quickly as possible. We can plan a dot release for later to improve uptake (And that dot release would likely include more fixes)
Felipe, ckprice, can you help Kate with this as needed? Or is there someone else you can suggest to help out with this over the next couple of days? Thanks!
Flags: needinfo?(felipc)
Flags: needinfo?(cprice)
Comment 12•7 years ago
|
||
From the process side, we need a sign off from QA, and a signed XPI posted to this bug (I think Liz linked to our docs). Here are a couple of relevant resources - Example pref flip tracking bug: https://bugzilla.mozilla.org/show_bug.cgi?id=1307108 - Repository with some boilerplate code: https://github.com/mozilla/one-off-system-add-ons/tree/master/addons/asyncrendering You could open a PR on that repository, or create a patch on this bug for review.
Flags: needinfo?(cprice)
Updated•7 years ago
|
Flags: needinfo?(felipc)
Comment 13•7 years ago
|
||
Yeah, and https://github.com/mozilla/one-off-system-add-ons is the de facto repo for these add-ons now. So the easiest will be to make a copy of one of the existing system addons there and change what you need.
![]() |
||
Comment 14•7 years ago
|
||
mozreview-review |
Comment on attachment 8831782 [details] Bug 1335134 - pref security.mixed_content.send_hsts_priming to false https://reviewboard.mozilla.org/r/108318/#review109604 thanks
Attachment #8831782 -
Flags: review?(honzab.moz) → review+
Comment 15•7 years ago
|
||
Comment on attachment 8831782 [details] Bug 1335134 - pref security.mixed_content.send_hsts_priming to false Approval Request Comment [Feature/Bug causing the regression]: Bug 1246540. [User impact if declined]: Some discussion references here Bug 1335134 Comment 9. We're shipping as a system add-on in Bug 1335224, uplifting here in the case of a dot release. [Is this code covered by automated tests?]: I don't know. [Has the fix been verified in Nightly?]: No [Needs manual test from QE? If yes, steps to reproduce]: Yes, Bug 1335224 Comment 7 [List of other uplifts needed for the feature/fix]: None [Is the change risky?]: No [Why is the change risky/not risky?]: It's a pref flip [String changes made/needed]: No
Attachment #8831782 -
Flags: approval-mozilla-release?
Attachment #8831782 -
Flags: approval-mozilla-beta?
Comment on attachment 8831782 [details] Bug 1335134 - pref security.mixed_content.send_hsts_priming to false Let's uplift these changes in case we end up doing a dot release for 51. The patch should make it into beta 3 later this week.
Attachment #8831782 -
Flags: approval-mozilla-release?
Attachment #8831782 -
Flags: approval-mozilla-release+
Attachment #8831782 -
Flags: approval-mozilla-beta?
Attachment #8831782 -
Flags: approval-mozilla-beta+
Comment 17•7 years ago
|
||
seems this need rebasing for beta like : patching file modules/libpref/init/all.js Hunk #1 FAILED at 5537 1 out of 1 hunks FAILED -- saving rejects to file modules/libpref/init/all.js.rej abort: patch failed to apply
Flags: needinfo?(kmckinley)
Assignee | ||
Comment 18•7 years ago
|
||
Flags: needinfo?(kmckinley)
Attachment #8832663 -
Flags: checkin?(cbook)
Updated•7 years ago
|
Attachment #8832663 -
Flags: checkin?(cbook)
Comment 19•7 years ago
|
||
bugherder uplift |
https://hg.mozilla.org/releases/mozilla-beta/rev/04c9d97c4cd7
Comment 20•7 years ago
|
||
bugherder uplift |
https://hg.mozilla.org/releases/mozilla-release/rev/222836684f2a
Comment 21•7 years ago
|
||
But we're not intending to land this on 53+?
![]() |
||
Comment 22•7 years ago
|
||
(In reply to Ryan VanderMeulen [:RyanVM] from comment #21) > But we're not intending to land this on 53+? We should to keep this change. Until this feature's perf impact is carefully evaluated it must not be allowed on release/beta.
Comment 23•7 years ago
|
||
Thanks. I'll land this on trunk now and ping RelMan about getting an Aurora approval as well then.
Summary: Set security.mixed_content.send_hsts_priming to false in release and beta → Put the security.mixed_content.send_hsts_priming pref behind the RELEASE_OR_BETA ifdef
Comment 24•7 years ago
|
||
Pushed by ryanvm@gmail.com: https://hg.mozilla.org/integration/autoland/rev/bdc513580a45 pref security.mixed_content.send_hsts_priming to false r=mayhemer
Comment on attachment 8831782 [details] Bug 1335134 - pref security.mixed_content.send_hsts_priming to false I've been told this pref flip is also needed in Aurora53.
Attachment #8831782 -
Flags: approval-mozilla-aurora+
Comment 26•7 years ago
|
||
bugherder uplift |
https://hg.mozilla.org/releases/mozilla-aurora/rev/cfb67ac16037
Comment 27•7 years ago
|
||
bugherder |
https://hg.mozilla.org/mozilla-central/rev/bdc513580a45
Status: ASSIGNED → RESOLVED
Closed: 7 years ago
Resolution: --- → FIXED
Target Milestone: --- → mozilla54
Updated•7 years ago
|
Flags: qe-verify+
Comment 28•7 years ago
|
||
The security.mixed_content.send_hsts_priming pref is set to 'False' on Firefox 52.0b9 and set to 'True' on Latest Aurora 53.0a2 (2017-02-24) and on Latest Nightly 54.0a1 (2017-02-24). The tests were performed under Windows 10 x64.
Status: RESOLVED → VERIFIED
Flags: qe-verify+
You need to log in
before you can comment on or make changes to this bug.
Description
•