DoH settings expanding broken when compiling with MOZ_NORMANDY set to False
Categories
(Firefox :: Settings UI, defect, P1)
Tracking
()
People
(Reporter: k4sum1, Assigned: maltejur)
References
(Regression)
Details
(Keywords: regression)
Attachments
(4 files)
57.84 KB,
video/mp4
|
Details | |
48 bytes,
text/x-phabricator-request
|
Details | Review | |
48 bytes,
text/x-phabricator-request
|
phab-bot
:
approval-mozilla-beta+
|
Details | Review |
48 bytes,
text/x-phabricator-request
|
phab-bot
:
approval-mozilla-esr128+
|
Details | Review |
User Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64; rv:128.0) Gecko/20100101 Firefox/128.0 r3dfox/128.0.2
Steps to reproduce:
Compiling 128.0.2 or later with MOZ_NORMANDY set to False in browser/moz.configure
I've traced the issue to Bug 1908312 or https://hg.mozilla.org/releases/mozilla-release/rev/5a64403f8125
Actual results:
In settings or about:preferences, under Privacy & Security, at the very bottom, the arrows to expand the DNS over HTTPS settings do nothing.
This does not affect stock Firefox as it is built with MOZ_NORMANDY set to True. For this reason, the recording is from a fork that builds with MOZ_NORMANDY set to False.
Expected results:
These arrows should work and expand the settings like in 128.0.1 and earlier.
Comment 1•3 months ago
|
||
The Bugbug bot thinks this bug should belong to the 'Core::Networking: DNS' component, and is moving the bug to that component. Please correct in case you think the bot is wrong.
Updated•3 months ago
|
Comment 2•3 months ago
|
||
:Gijs, since you are the author of the regressor, bug 1908312, could you take a look? Also, could you set the severity field?
For more information, please visit BugBot documentation.
Assignee | ||
Comment 3•3 months ago
|
||
This also is producible with MOZ_DATA_REPORTING
disabled (I assume MOZ_NORMANDY
is somehow related to that).
What seems to be happening is the following: Preferences.get(PREF_UPLOAD_ENABLED)
returns null
here, causing a error in privacy.js and preventing other code from running (the HTTPS-Only section for example is also broken). It is null
because Preferences.addAll
isn't being called for PREF_UPLOAD_ENABLED
here as MOZ_DATA_REPORTING
is disabled.
This wasn't a problem previously, because this code was only called with a previous check to MOZ_DATA_REPORTING
here. But Bug 1908312 added a new call here that doesn't check for MOZ_DATA_REPORTING
.
I will submit a patch shortly adding that check.
Assignee | ||
Comment 4•3 months ago
|
||
Disabling MOZ_DATA_REPORTING
results in the PREF_UPLOAD_ENABLED
pref not
being loaded with Preferences.add
. This means
Preferences.get(PREF_UPLOAD_ENABLED)
can possibly be null
, which was
previously not handled and resulted in an error for the whole privacy.js file.
So only call dataCollectionCheckboxHandler
for the privateAttribution
checkbox if MOZ_DATA_REPORTING
is enabled (otherwise the privateAttribution
checkbox also just doesn't exist). Also move the call into separate
initPrivateAttributionCheckbox
function to be more consistent with previous
code.
Updated•3 months ago
|
Comment 5•3 months ago
|
||
Set release status flags based on info from the regressing bug 1908312
(In reply to Malte Jürgens from comment #3)
This also is producible with
MOZ_DATA_REPORTING
disabled (I assumeMOZ_NORMANDY
is somehow related to that).
I might have gotten those backwards when making the bugzilla issue thinking about it now.
Updated•3 months ago
|
Comment 7•3 months ago
|
||
Set release status flags based on info from the regressing bug 1908312
Updated•3 months ago
|
Comment 10•3 months ago
|
||
Updated•3 months ago
|
Comment 11•3 months ago
|
||
bugherder |
Reporter | ||
Comment 12•3 months ago
|
||
Would it be possible for uplifts to beta and release please?
Updated•3 months ago
|
Updated•3 months ago
|
Assignee | ||
Comment 13•3 months ago
|
||
Disabling MOZ_DATA_REPORTING
results in the PREF_UPLOAD_ENABLED
pref not
being loaded with Preferences.add
. This means
Preferences.get(PREF_UPLOAD_ENABLED)
can possibly be null
, which was
previously not handled and resulted in an error for the whole privacy.js file.
So only call dataCollectionCheckboxHandler
for the privateAttribution
checkbox if MOZ_DATA_REPORTING
is enabled (otherwise the privateAttribution
checkbox also just doesn't exist). Also move the call into separate
initPrivateAttributionCheckbox
function to be more consistent with previous
code.
Original Revision: https://phabricator.services.mozilla.com/D218265
Updated•3 months ago
|
Comment 14•3 months ago
|
||
beta Uplift Approval Request
- User impact if declined: Privacy & Security settings will be broken on builds having MOZ_DATA_REPORTING disabled
- Code covered by automated testing: no
- Fix verified in Nightly: yes
- Needs manual QE test: no
- Steps to reproduce for manual QE testing: -
- Risk associated with taking this patch: Low
- Explanation of risk level: This is a very simple change, only adding a single extra check before initializing a checkbox in the settings
- String changes made/needed: -
- Is Android affected?: no
Assignee | ||
Comment 15•3 months ago
|
||
Disabling MOZ_DATA_REPORTING
results in the PREF_UPLOAD_ENABLED
pref not
being loaded with Preferences.add
. This means
Preferences.get(PREF_UPLOAD_ENABLED)
can possibly be null
, which was
previously not handled and resulted in an error for the whole privacy.js file.
So only call dataCollectionCheckboxHandler
for the privateAttribution
checkbox if MOZ_DATA_REPORTING
is enabled (otherwise the privateAttribution
checkbox also just doesn't exist). Also move the call into separate
initPrivateAttributionCheckbox
function to be more consistent with previous
code.
Original Revision: https://phabricator.services.mozilla.com/D218265
Updated•3 months ago
|
Comment 16•3 months ago
|
||
esr128 Uplift Approval Request
- User impact if declined: Privacy & Security settings will be broken on builds having MOZ_DATA_REPORTING disabled (such as the Tor browser, which is why this ESR uplift is especially important)
- Code covered by automated testing: no
- Fix verified in Nightly: yes
- Needs manual QE test: no
- Steps to reproduce for manual QE testing: -
- Risk associated with taking this patch: Low
- Explanation of risk level: This is a very simple change, only adding a single extra check before initializing a checkbox in the settings
- String changes made/needed: -
- Is Android affected?: no
Assignee | ||
Comment 17•3 months ago
|
||
Requested ESR and beta uplift, judging from the tracking flags I don't think a release uplift is wanted
Updated•3 months ago
|
Comment 18•3 months ago
|
||
uplift |
Updated•3 months ago
|
Updated•3 months ago
|
Updated•3 months ago
|
Comment 19•3 months ago
|
||
uplift |
Updated•2 months ago
|
Description
•