Skip to content

Commit 0b73f65

Browse files
KipChelilimTrikolon
authored andcommitted
Bug 1905323 - Fully remove confirm auth prompts, prefs, and related tests. r=emz,necko-reviewers,extension-reviewers,valentin,robwu,urlbar-reviewers,Sasha
Differential Revision: https://phabricator.services.mozilla.com/D271294
1 parent c9aa05f commit 0b73f65

File tree

25 files changed

+2
-479
lines changed

25 files changed

+2
-479
lines changed

accessible/tests/browser/tree/browser_test_nsIAccessibleDocument_URL.js

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -35,9 +35,6 @@ add_task(async function testInDataURI() {
3535
});
3636

3737
add_task(async function testInHTTPSURIContainingPrivateThings() {
38-
await SpecialPowers.pushPrefEnv({
39-
set: [["network.auth.confirmAuth.enabled", false]],
40-
});
4138
const kURL =
4239
"https://username:[email protected]/browser/toolkit/content/tests/browser/file_empty.html?query=some#ref";
4340
const kURLWithoutUserPass =

browser/components/urlbar/tests/browser/browser_UrlbarInput_setURI.js

Lines changed: 0 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -4,18 +4,9 @@
44

55
function test() {
66
waitForExplicitFinish();
7-
8-
// avoid prompting about phishing
9-
Services.prefs.setIntPref(phishyUserPassPref, 32);
10-
registerCleanupFunction(function () {
11-
Services.prefs.clearUserPref(phishyUserPassPref);
12-
});
13-
147
nextTest();
158
}
169

17-
const phishyUserPassPref = "network.http.phishy-userpass-length";
18-
1910
function nextTest() {
2011
let testCase = tests.shift();
2112
if (testCase) {

browser/components/urlbar/tests/browser/browser_copying.js

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -28,8 +28,6 @@ async function test_copy_values(testValues, trimHttps) {
2828
["browser.urlbar.scotchBonnet.enableOverride", false],
2929
["browser.urlbar.trimURLs", true],
3030
["browser.urlbar.trimHttps", trimHttps],
31-
// avoid prompting about phishing
32-
["network.http.phishy-userpass-length", 32],
3331
],
3432
});
3533

browser/modules/test/browser/browser_SitePermissions_tab_urls.js

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -12,11 +12,6 @@ function newPrincipal(origin) {
1212

1313
// This tests the key used to store the URI -> permission map on a tab.
1414
add_task(async function testTemporaryPermissionTabURLs() {
15-
// Prevent showing a dialog for https://name:password@example.com
16-
SpecialPowers.pushPrefEnv({
17-
set: [["network.http.phishy-userpass-length", 2048]],
18-
});
19-
2015
// This usually takes about 60 seconds on 32bit Linux debug,
2116
// due to the combinatory nature of the test that is hard to fix.
2217
requestLongerTimeout(2);

dom/security/nsHTTPSOnlyUtils.cpp

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -775,7 +775,7 @@ bool nsHTTPSOnlyUtils::HttpsUpgradeUnrelatedErrorCode(nsresult aError) {
775775
NS_ERROR_UNKNOWN_HOST == aError || NS_ERROR_PHISHING_URI == aError ||
776776
NS_ERROR_MALWARE_URI == aError || NS_ERROR_UNWANTED_URI == aError ||
777777
NS_ERROR_HARMFUL_URI == aError || NS_ERROR_CONTENT_CRASHED == aError ||
778-
NS_ERROR_FRAME_CRASHED == aError || NS_ERROR_SUPERFLUOS_AUTH == aError;
778+
NS_ERROR_FRAME_CRASHED == aError;
779779
}
780780

781781
/* ------ Logging ------ */

dom/security/test/https-first/browser.toml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -101,8 +101,6 @@ support-files = [
101101
"file_subdocument_downgrade.sjs",
102102
]
103103

104-
["browser_superfluos_auth.js"]
105-
106104
["browser_tlds.js"]
107105

108106
["browser_upgrade_onion.js"]

dom/security/test/https-first/browser_superfluos_auth.js

Lines changed: 0 additions & 70 deletions
This file was deleted.

js/xpconnect/src/xpc.msg

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -139,7 +139,6 @@ XPC_MSG_DEF(NS_ERROR_FIRST_HEADER_FIELD_COMPONENT_EMPTY, "Couldn't extract first
139139
XPC_MSG_DEF(NS_ERROR_ALREADY_CONNECTED , "The connection is already established")
140140
XPC_MSG_DEF(NS_ERROR_NOT_CONNECTED , "The connection does not exist")
141141
XPC_MSG_DEF(NS_ERROR_CONNECTION_REFUSED , "The connection was refused")
142-
XPC_MSG_DEF(NS_ERROR_SUPERFLUOS_AUTH , "User refused navigation to potentially unsafe URL with embedded credentials/superfluos authentication")
143142
XPC_MSG_DEF(NS_ERROR_BASIC_HTTP_AUTH_DISABLED , "User attempted basic HTTP authentication when it is disabled")
144143
XPC_MSG_DEF(NS_ERROR_LOCAL_NETWORK_ACCESS_DENIED , "The access to local network is denied")
145144

modules/libpref/init/StaticPrefList.yaml

Lines changed: 0 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -13298,13 +13298,6 @@
1329813298
value: false
1329913299
mirror: always
1330013300

13301-
# Whether to show anti-spoof confirmation prompts when navigating to a url
13302-
# with userinfo
13303-
- name: network.auth.confirmAuth.enabled
13304-
type: bool
13305-
value: false
13306-
mirror: always
13307-
1330813301
# Whether to display auth prompts if X-Frame-Options header will block loading
1330913302
# page
1331013303
- name: network.auth.supress_auth_prompt_for_XFO_failures
@@ -16932,12 +16925,6 @@
1693216925
value: 2
1693316926
mirror: always
1693416927

16935-
# nsHttpChannelAuthProvider#ConfirmAuth anti-phishing prompts.
16936-
- name: prompts.modalType.confirmAuth
16937-
type: int32_t
16938-
value: 2
16939-
mirror: always
16940-
1694116928
#---------------------------------------------------------------------------
1694216929
# Prefs starting with "security."
1694316930
#---------------------------------------------------------------------------

netwerk/locales/en-US/necko.properties

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -13,9 +13,6 @@ DirColSize=Size
1313
DirColMTime=Last Modified
1414
DirFileLabel=File:
1515

16-
SuperfluousAuth=You are about to log in to the site “%1$S” with the username “%2$S”, but the website does not require authentication. This may be an attempt to trick you.\n\nIs “%1$S” the site you want to visit?
17-
AutomaticAuth=You are about to log in to the site “%1$S” with the username “%2$S”.
18-
1916
TrackerUriBlockedByETP=The resource at “%1$S” was blocked because Enhanced Tracking Protection is enabled.
2017
UnsafeUriBlocked=The resource at “%1$S” was blocked by Safe Browsing.
2118

0 commit comments

Comments
 (0)