Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

executeScript on an Angular2 site: Permission denied to access property "invoke" #515

Closed
pmneo opened this issue Mar 7, 2017 · 12 comments
Closed
Assignees

Comments

@pmneo
Copy link

pmneo commented Mar 7, 2017

Firefox Version

Firefox 51.0.1, 52.0, 54.0a1 (2017-03-06) (32-Bit) with geckodriver 14.0

Platform

Windows and OSX

Steps to reproduce -

FirefoxDriver ff = new FirefoxDriver( new DesiredCapabilities() );
ff.get( "https://material.angular.io/components/component/slide-toggle" );
System.out.println( ff.executeScript( "return true;" ) );

Expected result is an sysout with true but result is:

1488888328481	geckodriver	INFO	Listening on 127.0.0.1:43715
log4j:WARN No appenders could be found for logger (org.apache.http.client.protocol.RequestAddCookies).
log4j:WARN Please initialize the log4j system properly.
log4j:WARN See http://logging.apache.org/log4j/1.2/faq.html#noconfig for more info.
1488888329083	mozprofile::profile	INFO	Using profile path C:\Users\pmneo\AppData\Local\Temp\rust_mozprofile.Mm7rgeHkWLB6
1488888329092	geckodriver::marionette	INFO	Starting browser C:\Program Files (x86)\Mozilla Firefox\firefox.exe
1488888329101	geckodriver::marionette	INFO	Connecting to Marionette on localhost:62162
1488888329417	addons.manager	DEBUG	Application has been upgraded
1488888329458	addons.manager	DEBUG	Loaded provider scope for resource://gre/modules/addons/XPIProvider.jsm: ["XPIProvider"]
1488888329459	addons.manager	DEBUG	Loaded provider scope for resource://gre/modules/LightweightThemeManager.jsm: ["LightweightThemeManager"]
1488888329462	addons.manager	DEBUG	Loaded provider scope for resource://gre/modules/addons/GMPProvider.jsm
1488888329464	addons.manager	DEBUG	Loaded provider scope for resource://gre/modules/addons/PluginProvider.jsm
1488888329464	addons.manager	DEBUG	Starting provider: XPIProvider
1488888329465	addons.xpi	DEBUG	startup
1488888329465	addons.xpi	INFO	SystemAddonInstallLocation directory is missing
1488888329467	addons.xpi	INFO	Mapping aushelper@mozilla.org to C:\Program Files (x86)\Mozilla Firefox\browser\features\aushelper@mozilla.org.xpi
1488888329467	addons.xpi	INFO	Mapping e10srollout@mozilla.org to C:\Program Files (x86)\Mozilla Firefox\browser\features\e10srollout@mozilla.org.xpi
1488888329468	addons.xpi	INFO	Mapping firefox@getpocket.com to C:\Program Files (x86)\Mozilla Firefox\browser\features\firefox@getpocket.com.xpi
1488888329468	addons.xpi	INFO	Mapping webcompat@mozilla.org to C:\Program Files (x86)\Mozilla Firefox\browser\features\webcompat@mozilla.org.xpi
1488888329469	addons.xpi	INFO	Mapping {972ce4c6-7e08-4474-a285-3208198ce6fd} to C:\Program Files (x86)\Mozilla Firefox\browser\extensions\{972ce4c6-7e08-4474-a285-3208198ce6fd}.xpi
1488888329470	addons.xpi	DEBUG	checkForChanges
1488888329470	addons.xpi	INFO	SystemAddonInstallLocation directory is missing
1488888329471	addons.xpi	DEBUG	Loaded add-on state from prefs: {}
1488888329472	addons.xpi	DEBUG	New add-on aushelper@mozilla.org in app-system-defaults
1488888329473	addons.xpi	DEBUG	getModTime: Recursive scan of aushelper@mozilla.org
1488888329473	addons.xpi	DEBUG	New add-on e10srollout@mozilla.org in app-system-defaults
1488888329473	addons.xpi	DEBUG	getModTime: Recursive scan of e10srollout@mozilla.org
1488888329474	addons.xpi	DEBUG	New add-on firefox@getpocket.com in app-system-defaults
1488888329474	addons.xpi	DEBUG	getModTime: Recursive scan of firefox@getpocket.com
1488888329475	addons.xpi	DEBUG	New add-on webcompat@mozilla.org in app-system-defaults
1488888329475	addons.xpi	DEBUG	getModTime: Recursive scan of webcompat@mozilla.org
1488888329476	addons.xpi	DEBUG	New add-on {972ce4c6-7e08-4474-a285-3208198ce6fd} in app-global
1488888329476	addons.xpi	DEBUG	getModTime: Recursive scan of {972ce4c6-7e08-4474-a285-3208198ce6fd}
1488888329477	addons.xpi	DEBUG	getInstallState changed: true, state: {"app-system-defaults":{"aushelper@mozilla.org":{"d":"C:\\Program Files (x86)\\Mozilla Firefox\\browser\\features\\aushelper@mozilla.org.xpi","st":1487915143169},"e10srollout@mozilla.org":{"d":"C:\\Program Files (x86)\\Mozilla Firefox\\browser\\features\\e10srollout@mozilla.org.xpi","st":1487915143176},"firefox@getpocket.com":{"d":"C:\\Program Files (x86)\\Mozilla Firefox\\browser\\features\\firefox@getpocket.com.xpi","st":1487915151497},"webcompat@mozilla.org":{"d":"C:\\Program Files (x86)\\Mozilla Firefox\\browser\\features\\webcompat@mozilla.org.xpi","st":1487915143197}},"app-global":{"{972ce4c6-7e08-4474-a285-3208198ce6fd}":{"d":"C:\\Program Files (x86)\\Mozilla Firefox\\browser\\extensions\\{972ce4c6-7e08-4474-a285-3208198ce6fd}.xpi","st":1487915143264}}}
1488888329483	addons.xpi-utils	DEBUG	Opening XPI database C:\Users\pmneo\AppData\Local\Temp\rust_mozprofile.Mm7rgeHkWLB6\extensions.json
1488888329485	addons.xpi-utils	DEBUG	New add-on aushelper@mozilla.org installed in app-system-defaults
*** Blocklist::_loadBlocklistFromFile: blocklist is disabled
1488888329494	DeferredSave.extensions.json	DEBUG	Save changes
1488888329495	addons.xpi-utils	DEBUG	New add-on e10srollout@mozilla.org installed in app-system-defaults
1488888329500	DeferredSave.extensions.json	DEBUG	Starting timer
1488888329501	DeferredSave.extensions.json	DEBUG	Save changes
1488888329501	addons.xpi-utils	DEBUG	New add-on firefox@getpocket.com installed in app-system-defaults
1488888329507	DeferredSave.extensions.json	DEBUG	Save changes
1488888329508	addons.xpi-utils	DEBUG	New add-on webcompat@mozilla.org installed in app-system-defaults
1488888329512	DeferredSave.extensions.json	DEBUG	Save changes
1488888329513	addons.xpi-utils	DEBUG	New add-on {972ce4c6-7e08-4474-a285-3208198ce6fd} installed in app-global
1488888329518	DeferredSave.extensions.json	DEBUG	Save changes
1488888329518	addons.manager	DEBUG	Registering startup change 'installed' for aushelper@mozilla.org
1488888329524	addons.xpi	DEBUG	Loading bootstrap scope from C:\Program Files (x86)\Mozilla Firefox\browser\features\aushelper@mozilla.org.xpi
1488888329529	addons.xpi	DEBUG	Calling bootstrap method install on aushelper@mozilla.org version 2.0
1488888329529	addons.xpi-utils	DEBUG	Make addon app-system-defaults:aushelper@mozilla.org visible
1488888329530	DeferredSave.extensions.json	DEBUG	Save changes
1488888329531	addons.manager	DEBUG	Registering startup change 'installed' for e10srollout@mozilla.org
1488888329531	addons.xpi	DEBUG	Loading bootstrap scope from C:\Program Files (x86)\Mozilla Firefox\browser\features\e10srollout@mozilla.org.xpi
1488888329533	addons.xpi	DEBUG	Calling bootstrap method install on e10srollout@mozilla.org version 1.9
1488888329534	addons.xpi-utils	DEBUG	Make addon app-system-defaults:e10srollout@mozilla.org visible
1488888329535	DeferredSave.extensions.json	DEBUG	Save changes
1488888329535	addons.manager	DEBUG	Registering startup change 'installed' for firefox@getpocket.com
1488888329536	addons.xpi	DEBUG	Loading bootstrap scope from C:\Program Files (x86)\Mozilla Firefox\browser\features\firefox@getpocket.com.xpi
1488888329539	addons.xpi	DEBUG	Calling bootstrap method install on firefox@getpocket.com version 1.0.5
1488888329539	addons.xpi-utils	DEBUG	Make addon app-system-defaults:firefox@getpocket.com visible
1488888329540	DeferredSave.extensions.json	DEBUG	Save changes
1488888329540	addons.manager	DEBUG	Registering startup change 'installed' for webcompat@mozilla.org
1488888329541	addons.xpi	DEBUG	Loading bootstrap scope from C:\Program Files (x86)\Mozilla Firefox\browser\features\webcompat@mozilla.org.xpi
1488888329542	addons.xpi	DEBUG	Calling bootstrap method install on webcompat@mozilla.org version 1.0
1488888329542	addons.xpi-utils	DEBUG	Make addon app-system-defaults:webcompat@mozilla.org visible
1488888329542	DeferredSave.extensions.json	DEBUG	Save changes
1488888329542	addons.xpi-utils	DEBUG	Make addon app-global:{972ce4c6-7e08-4474-a285-3208198ce6fd} visible
1488888329543	DeferredSave.extensions.json	DEBUG	Save changes
1488888329543	addons.xpi	DEBUG	Updating XPIState for {"id":"aushelper@mozilla.org","syncGUID":"{cac4abc1-e97a-45fc-b920-dabdfaab8040}","location":"app-system-defaults","version":"2.0","type":"extension","internalName":null,"updateURL":null,"updateKey":null,"optionsURL":null,"optionsType":null,"aboutURL":null,"icons":{},"iconURL":null,"icon64URL":null,"defaultLocale":{"name":"Application Update Service Helper","description":"Sets value(s) in the update url based on custom checks.","creator":null,"homepageURL":null},"visible":true,"active":true,"userDisabled":false,"appDisabled":false,"descriptor":"C:\\Program Files (x86)\\Mozilla Firefox\\browser\\features\\aushelper@mozilla.org.xpi","installDate":1487915143169,"updateDate":1487915143169,"applyBackgroundUpdates":1,"bootstrap":true,"skinnable":false,"size":8486,"sourceURI":null,"releaseNotesURI":null,"softDisabled":false,"foreignInstall":false,"hasBinaryComponents":false,"strictCompatibility":false,"locales":[],"targetApplications":[{"id":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","minVersion":"52.0","maxVersion":"52.*"}],"targetPlatforms":[],"multiprocessCompatible":true,"seen":true,"dependencies":[],"hasEmbeddedWebExtension":false,"mpcOptedOut":false}
1488888329543	addons.xpi	DEBUG	getModTime: Recursive scan of aushelper@mozilla.org
1488888329543	addons.xpi	DEBUG	Updating XPIState for {"id":"e10srollout@mozilla.org","syncGUID":"{4e6d23df-ca58-4af5-9737-dfe5268535dd}","location":"app-system-defaults","version":"1.9","type":"extension","internalName":null,"updateURL":null,"updateKey":null,"optionsURL":null,"optionsType":null,"aboutURL":null,"icons":{},"iconURL":null,"icon64URL":null,"defaultLocale":{"name":"Multi-process staged rollout","description":"Staged rollout of Firefox multi-process feature.","creator":null,"homepageURL":null},"visible":true,"active":true,"userDisabled":false,"appDisabled":false,"descriptor":"C:\\Program Files (x86)\\Mozilla Firefox\\browser\\features\\e10srollout@mozilla.org.xpi","installDate":1487915143176,"updateDate":1487915143176,"applyBackgroundUpdates":1,"bootstrap":true,"skinnable":false,"size":7181,"sourceURI":null,"releaseNotesURI":null,"softDisabled":false,"foreignInstall":false,"hasBinaryComponents":false,"strictCompatibility":false,"locales":[],"targetApplications":[{"id":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","minVersion":"52.0","maxVersion":"52.*"}],"targetPlatforms":[],"multiprocessCompatible":true,"seen":true,"dependencies":[],"hasEmbeddedWebExtension":false,"mpcOptedOut":false}
1488888329544	addons.xpi	DEBUG	getModTime: Recursive scan of e10srollout@mozilla.org
1488888329544	addons.xpi	DEBUG	Updating XPIState for {"id":"firefox@getpocket.com","syncGUID":"{478cd2c1-3c14-4f9e-9d84-e9609d66131f}","location":"app-system-defaults","version":"1.0.5","type":"extension","internalName":null,"updateURL":null,"updateKey":null,"optionsURL":null,"optionsType":null,"aboutURL":null,"icons":{},"iconURL":null,"icon64URL":null,"defaultLocale":{"name":"Pocket","description":"When you find something you want to view later, put it in Pocket.","creator":null,"homepageURL":null},"visible":true,"active":true,"userDisabled":false,"appDisabled":false,"descriptor":"C:\\Program Files (x86)\\Mozilla Firefox\\browser\\features\\firefox@getpocket.com.xpi","installDate":1487915151497,"updateDate":1487915151497,"applyBackgroundUpdates":1,"bootstrap":true,"skinnable":false,"size":920535,"sourceURI":null,"releaseNotesURI":null,"softDisabled":false,"foreignInstall":false,"hasBinaryComponents":false,"strictCompatibility":false,"locales":[],"targetApplications":[{"id":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","minVersion":"52.0","maxVersion":"52.*"}],"targetPlatforms":[],"multiprocessCompatible":true,"seen":true,"dependencies":[],"hasEmbeddedWebExtension":false,"mpcOptedOut":false}
1488888329544	addons.xpi	DEBUG	getModTime: Recursive scan of firefox@getpocket.com
1488888329544	addons.xpi	DEBUG	Updating XPIState for {"id":"webcompat@mozilla.org","syncGUID":"{bb39d1cd-821f-4860-ba3e-af4c27e1c5bc}","location":"app-system-defaults","version":"1.0","type":"extension","internalName":null,"updateURL":null,"updateKey":null,"optionsURL":null,"optionsType":null,"aboutURL":null,"icons":{},"iconURL":null,"icon64URL":null,"defaultLocale":{"name":"Web Compat","description":"Urgent post-release fixes for web compatibility.","creator":null,"homepageURL":null},"visible":true,"active":true,"userDisabled":false,"appDisabled":false,"descriptor":"C:\\Program Files (x86)\\Mozilla Firefox\\browser\\features\\webcompat@mozilla.org.xpi","installDate":1487915143197,"updateDate":1487915143197,"applyBackgroundUpdates":1,"bootstrap":true,"skinnable":false,"size":1454,"sourceURI":null,"releaseNotesURI":null,"softDisabled":false,"foreignInstall":false,"hasBinaryComponents":false,"strictCompatibility":false,"locales":[],"targetApplications":[{"id":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","minVersion":"52.0","maxVersion":"52.*"}],"targetPlatforms":[],"multiprocessCompatible":true,"seen":true,"dependencies":[],"hasEmbeddedWebExtension":false,"mpcOptedOut":false}
1488888329544	addons.xpi	DEBUG	getModTime: Recursive scan of webcompat@mozilla.org
1488888329545	addons.xpi	DEBUG	Updating XPIState for {"id":"{972ce4c6-7e08-4474-a285-3208198ce6fd}","syncGUID":"{7458b869-f6d7-46ff-8e6f-eabe36a87598}","location":"app-global","version":"52.0","type":"theme","internalName":"classic/1.0","updateURL":null,"updateKey":null,"optionsURL":null,"optionsType":null,"aboutURL":null,"icons":{"32":"icon.png","48":"icon.png"},"iconURL":null,"icon64URL":null,"defaultLocale":{"name":"Default","description":"The default theme.","creator":"Mozilla","homepageURL":null,"contributors":["Mozilla Contributors"]},"visible":true,"active":true,"userDisabled":false,"appDisabled":false,"descriptor":"C:\\Program Files (x86)\\Mozilla Firefox\\browser\\extensions\\{972ce4c6-7e08-4474-a285-3208198ce6fd}.xpi","installDate":1487915143264,"updateDate":1487915143264,"applyBackgroundUpdates":1,"skinnable":true,"size":19581,"sourceURI":null,"releaseNotesURI":null,"softDisabled":false,"foreignInstall":false,"hasBinaryComponents":false,"strictCompatibility":true,"locales":[],"targetApplications":[{"id":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","minVersion":"52.0","maxVersion":"52.0"}],"targetPlatforms":[],"seen":true,"dependencies":[],"hasEmbeddedWebExtension":false}
1488888329545	addons.xpi	DEBUG	getModTime: Recursive scan of {972ce4c6-7e08-4474-a285-3208198ce6fd}
1488888329546	DeferredSave.extensions.json	DEBUG	Save changes
1488888329546	addons.xpi	DEBUG	Updating database with changes to installed add-ons
1488888329546	addons.xpi-utils	DEBUG	Updating add-on states
1488888329547	addons.xpi-utils	DEBUG	Writing add-ons list
1488888329551	addons.xpi	DEBUG	Registering manifest for C:\Program Files (x86)\Mozilla Firefox\browser\features\aushelper@mozilla.org.xpi
1488888329551	addons.xpi	DEBUG	Calling bootstrap method startup on aushelper@mozilla.org version 2.0
1488888329552	addons.xpi	DEBUG	Registering manifest for C:\Program Files (x86)\Mozilla Firefox\browser\features\e10srollout@mozilla.org.xpi
1488888329553	addons.xpi	DEBUG	Calling bootstrap method startup on e10srollout@mozilla.org version 1.9
1488888329554	addons.xpi	DEBUG	Registering manifest for C:\Program Files (x86)\Mozilla Firefox\browser\features\firefox@getpocket.com.xpi
1488888329554	addons.xpi	DEBUG	Calling bootstrap method startup on firefox@getpocket.com version 1.0.5
1488888329555	addons.xpi	DEBUG	Registering manifest for C:\Program Files (x86)\Mozilla Firefox\browser\features\webcompat@mozilla.org.xpi
1488888329556	addons.xpi	DEBUG	Calling bootstrap method startup on webcompat@mozilla.org version 1.0
1488888329557	addons.manager	DEBUG	Registering shutdown blocker for XPIProvider
1488888329558	addons.manager	DEBUG	Provider finished startup: XPIProvider
1488888329558	addons.manager	DEBUG	Starting provider: LightweightThemeManager
1488888329558	addons.manager	DEBUG	Registering shutdown blocker for LightweightThemeManager
1488888329558	addons.manager	DEBUG	Provider finished startup: LightweightThemeManager
1488888329558	addons.manager	DEBUG	Starting provider: GMPProvider
1488888329568	addons.manager	DEBUG	Registering shutdown blocker for GMPProvider
1488888329568	addons.manager	DEBUG	Provider finished startup: GMPProvider
1488888329568	addons.manager	DEBUG	Starting provider: PluginProvider
1488888329568	addons.manager	DEBUG	Registering shutdown blocker for PluginProvider
1488888329569	addons.manager	DEBUG	Provider finished startup: PluginProvider
1488888329569	addons.manager	DEBUG	Completed startup sequence
1488888329877	Marionette	INFO	Listening on port 62162
1488888330081	addons.manager	DEBUG	Starting provider: <unnamed-provider>
1488888330081	addons.manager	DEBUG	Registering shutdown blocker for <unnamed-provider>
1488888330081	addons.manager	DEBUG	Provider finished startup: <unnamed-provider>
1488888330108	addons.manager	DEBUG	Starting provider: PreviousExperimentProvider
1488888330109	addons.manager	DEBUG	Registering shutdown blocker for PreviousExperimentProvider
1488888330109	addons.manager	DEBUG	Provider finished startup: PreviousExperimentProvider
1488888330113	DeferredSave.extensions.json	DEBUG	Starting write
1488888330402	DeferredSave.extensions.json	DEBUG	Write succeeded
1488888330403	addons.xpi-utils	DEBUG	XPI Database saved, setting schema version preference to 19
Mär 07, 2017 1:05:31 PM org.openqa.selenium.remote.ProtocolHandshake createSession
INFORMATION: Detected dialect: W3C
Exception in thread "main" org.openqa.selenium.WebDriverException: Error: Permission denied to access property "invoke"
Build info: version: 'unknown', revision: '86a5d70', time: '2017-02-16 07:47:51 -0800'
System info: host: 'PMNEO7510', ip: '192.168.0.193', os.name: 'Windows 10', os.arch: 'amd64', os.version: '10.0', java.version: '1.8.0_112'
Driver info: org.openqa.selenium.firefox.FirefoxDriver
Capabilities [{moz:profile=C:\Users\pmneo\AppData\Local\Temp\rust_mozprofile.Mm7rgeHkWLB6, rotatable=false, timeouts={implicit=0, page load=300000, script=30000}, pageLoadStrategy=normal, platform=ANY, specificationLevel=0, moz:accessibilityChecks=false, acceptInsecureCerts=false, browserVersion=52.0, platformVersion=10.0, moz:processID=4688, browserName=firefox, platformName=windows_nt}]
Session ID: 817417e5-eb1e-4e58-b9ad-123a535445e3
	at sun.reflect.NativeConstructorAccessorImpl.newInstance0(Native Method)
	at sun.reflect.NativeConstructorAccessorImpl.newInstance(NativeConstructorAccessorImpl.java:62)
	at sun.reflect.DelegatingConstructorAccessorImpl.newInstance(DelegatingConstructorAccessorImpl.java:45)
	at java.lang.reflect.Constructor.newInstance(Constructor.java:423)
	at org.openqa.selenium.remote.http.W3CHttpResponseCodec.createException(W3CHttpResponseCodec.java:127)
	at org.openqa.selenium.remote.http.W3CHttpResponseCodec.decode(W3CHttpResponseCodec.java:93)
	at org.openqa.selenium.remote.http.W3CHttpResponseCodec.decode(W3CHttpResponseCodec.java:42)
	at org.openqa.selenium.remote.HttpCommandExecutor.execute(HttpCommandExecutor.java:163)
	at org.openqa.selenium.remote.service.DriverCommandExecutor.execute(DriverCommandExecutor.java:82)
	at org.openqa.selenium.remote.RemoteWebDriver.execute(RemoteWebDriver.java:601)
	at org.openqa.selenium.remote.RemoteWebDriver.executeScript(RemoteWebDriver.java:537)
	at FFInvokeError.main(FFInvokeError.java:18)

@andreastt
Copy link
Contributor

I think this was probably fixed in https://bugzilla.mozilla.org/show_bug.cgi?id=1322862. Can you test this again with Firefox Nightly?

@pmneo
Copy link
Author

pmneo commented Mar 7, 2017

Still not working with 54.0a1 (2017-03-06) (32-Bit):

1488891283573	geckodriver	INFO	Listening on 127.0.0.1:26292
log4j:WARN No appenders could be found for logger (org.apache.http.client.protocol.RequestAddCookies).
log4j:WARN Please initialize the log4j system properly.
log4j:WARN See http://logging.apache.org/log4j/1.2/faq.html#noconfig for more info.
1488891284185	mozprofile::profile	INFO	Using profile path C:\Users\pmneo\AppData\Local\Temp\rust_mozprofile.lASWaEu3b3ic
1488891284193	geckodriver::marionette	INFO	Starting browser C:\Program Files (x86)\Firefox Nightly\firefox.exe
1488891284214	geckodriver::marionette	INFO	Connecting to Marionette on localhost:64104
1488891284461	addons.manager	DEBUG	Application has been upgraded
1488891284497	addons.manager	DEBUG	Loaded provider scope for resource://gre/modules/addons/XPIProvider.jsm: ["XPIProvider"]
1488891284499	addons.manager	DEBUG	Loaded provider scope for resource://gre/modules/LightweightThemeManager.jsm: ["LightweightThemeManager"]
1488891284502	addons.manager	DEBUG	Loaded provider scope for resource://gre/modules/addons/GMPProvider.jsm
1488891284504	addons.manager	DEBUG	Loaded provider scope for resource://gre/modules/addons/PluginProvider.jsm
1488891284504	addons.manager	DEBUG	Starting provider: XPIProvider
1488891284504	addons.xpi	DEBUG	startup
1488891284505	addons.xpi	INFO	SystemAddonInstallLocation directory is missing
1488891284506	addons.xpi	INFO	Mapping aushelper@mozilla.org to C:\Program Files (x86)\Firefox Nightly\browser\features\aushelper@mozilla.org.xpi
1488891284507	addons.xpi	INFO	Mapping e10srollout@mozilla.org to C:\Program Files (x86)\Firefox Nightly\browser\features\e10srollout@mozilla.org.xpi
1488891284507	addons.xpi	INFO	Mapping firefox@getpocket.com to C:\Program Files (x86)\Firefox Nightly\browser\features\firefox@getpocket.com.xpi
1488891284507	addons.xpi	INFO	Mapping flyweb@mozilla.org to C:\Program Files (x86)\Firefox Nightly\browser\features\flyweb@mozilla.org.xpi
1488891284508	addons.xpi	INFO	Mapping formautofill@mozilla.org to C:\Program Files (x86)\Firefox Nightly\browser\features\formautofill@mozilla.org.xpi
1488891284508	addons.xpi	INFO	Mapping presentation@mozilla.org to C:\Program Files (x86)\Firefox Nightly\browser\features\presentation@mozilla.org.xpi
1488891284508	addons.xpi	INFO	Mapping shield-recipe-client@mozilla.org to C:\Program Files (x86)\Firefox Nightly\browser\features\shield-recipe-client@mozilla.org.xpi
1488891284508	addons.xpi	INFO	Mapping webcompat-reporter@mozilla.org to C:\Program Files (x86)\Firefox Nightly\browser\features\webcompat-reporter@mozilla.org.xpi
1488891284508	addons.xpi	INFO	Mapping webcompat@mozilla.org to C:\Program Files (x86)\Firefox Nightly\browser\features\webcompat@mozilla.org.xpi
1488891284509	addons.xpi	INFO	Mapping {972ce4c6-7e08-4474-a285-3208198ce6fd} to C:\Program Files (x86)\Firefox Nightly\browser\extensions\{972ce4c6-7e08-4474-a285-3208198ce6fd}.xpi
1488891284510	addons.xpi	DEBUG	checkForChanges
1488891284510	addons.xpi	INFO	SystemAddonInstallLocation directory is missing
1488891284510	addons.xpi	DEBUG	Loaded add-on state from prefs: {}
1488891284511	addons.xpi	DEBUG	New add-on aushelper@mozilla.org in app-system-defaults
1488891284512	addons.xpi	DEBUG	getModTime: Recursive scan of aushelper@mozilla.org
1488891284512	addons.xpi	DEBUG	New add-on e10srollout@mozilla.org in app-system-defaults
1488891284512	addons.xpi	DEBUG	getModTime: Recursive scan of e10srollout@mozilla.org
1488891284513	addons.xpi	DEBUG	New add-on firefox@getpocket.com in app-system-defaults
1488891284513	addons.xpi	DEBUG	getModTime: Recursive scan of firefox@getpocket.com
1488891284514	addons.xpi	DEBUG	New add-on flyweb@mozilla.org in app-system-defaults
1488891284514	addons.xpi	DEBUG	getModTime: Recursive scan of flyweb@mozilla.org
1488891284514	addons.xpi	DEBUG	New add-on formautofill@mozilla.org in app-system-defaults
1488891284514	addons.xpi	DEBUG	getModTime: Recursive scan of formautofill@mozilla.org
1488891284515	addons.xpi	DEBUG	New add-on presentation@mozilla.org in app-system-defaults
1488891284515	addons.xpi	DEBUG	getModTime: Recursive scan of presentation@mozilla.org
1488891284515	addons.xpi	DEBUG	New add-on shield-recipe-client@mozilla.org in app-system-defaults
1488891284515	addons.xpi	DEBUG	getModTime: Recursive scan of shield-recipe-client@mozilla.org
1488891284516	addons.xpi	DEBUG	New add-on webcompat-reporter@mozilla.org in app-system-defaults
1488891284516	addons.xpi	DEBUG	getModTime: Recursive scan of webcompat-reporter@mozilla.org
1488891284516	addons.xpi	DEBUG	New add-on webcompat@mozilla.org in app-system-defaults
1488891284516	addons.xpi	DEBUG	getModTime: Recursive scan of webcompat@mozilla.org
1488891284516	addons.xpi	DEBUG	New add-on {972ce4c6-7e08-4474-a285-3208198ce6fd} in app-global
1488891284517	addons.xpi	DEBUG	getModTime: Recursive scan of {972ce4c6-7e08-4474-a285-3208198ce6fd}
1488891284517	addons.xpi	DEBUG	getInstallState changed: true, state: {"app-system-defaults":{"aushelper@mozilla.org":{"d":"C:\\Program Files (x86)\\Firefox Nightly\\browser\\features\\aushelper@mozilla.org.xpi","st":1488824126679},"e10srollout@mozilla.org":{"d":"C:\\Program Files (x86)\\Firefox Nightly\\browser\\features\\e10srollout@mozilla.org.xpi","st":1488824126687},"firefox@getpocket.com":{"d":"C:\\Program Files (x86)\\Firefox Nightly\\browser\\features\\firefox@getpocket.com.xpi","st":1488824127609},"flyweb@mozilla.org":{"d":"C:\\Program Files (x86)\\Firefox Nightly\\browser\\features\\flyweb@mozilla.org.xpi","st":1488824126889},"formautofill@mozilla.org":{"d":"C:\\Program Files (x86)\\Firefox Nightly\\browser\\features\\formautofill@mozilla.org.xpi","st":1488824126860},"presentation@mozilla.org":{"d":"C:\\Program Files (x86)\\Firefox Nightly\\browser\\features\\presentation@mozilla.org.xpi","st":1488824126781},"shield-recipe-client@mozilla.org":{"d":"C:\\Program Files (x86)\\Firefox Nightly\\browser\\features\\shield-recipe-client@mozilla.org.xpi","st":1488824127092},"webcompat-reporter@mozilla.org":{"d":"C:\\Program Files (x86)\\Firefox Nightly\\browser\\features\\webcompat-reporter@mozilla.org.xpi","st":1488824126950},"webcompat@mozilla.org":{"d":"C:\\Program Files (x86)\\Firefox Nightly\\browser\\features\\webcompat@mozilla.org.xpi","st":1488824126937}},"app-global":{"{972ce4c6-7e08-4474-a285-3208198ce6fd}":{"d":"C:\\Program Files (x86)\\Firefox Nightly\\browser\\extensions\\{972ce4c6-7e08-4474-a285-3208198ce6fd}.xpi","st":1488824126721}}}
1488891284524	addons.xpi-utils	DEBUG	Opening XPI database C:\Users\pmneo\AppData\Local\Temp\rust_mozprofile.lASWaEu3b3ic\extensions.json
1488891284525	addons.xpi-utils	DEBUG	New add-on aushelper@mozilla.org installed in app-system-defaults
*** Blocklist::_loadBlocklistFromFile: blocklist is disabled
1488891284533	DeferredSave.extensions.json	DEBUG	Save changes
1488891284533	addons.xpi-utils	DEBUG	New add-on e10srollout@mozilla.org installed in app-system-defaults
1488891284536	DeferredSave.extensions.json	DEBUG	Starting timer
1488891284537	DeferredSave.extensions.json	DEBUG	Save changes
1488891284537	addons.xpi-utils	DEBUG	New add-on firefox@getpocket.com installed in app-system-defaults
1488891284543	DeferredSave.extensions.json	DEBUG	Save changes
1488891284544	addons.xpi-utils	DEBUG	New add-on flyweb@mozilla.org installed in app-system-defaults
1488891284548	DeferredSave.extensions.json	DEBUG	Save changes
1488891284549	addons.xpi-utils	DEBUG	New add-on formautofill@mozilla.org installed in app-system-defaults
1488891284552	DeferredSave.extensions.json	DEBUG	Save changes
1488891284552	addons.xpi-utils	DEBUG	New add-on presentation@mozilla.org installed in app-system-defaults
1488891284557	DeferredSave.extensions.json	DEBUG	Save changes
1488891284557	addons.xpi-utils	DEBUG	New add-on shield-recipe-client@mozilla.org installed in app-system-defaults
1488891284561	DeferredSave.extensions.json	DEBUG	Save changes
1488891284561	addons.xpi-utils	DEBUG	New add-on webcompat-reporter@mozilla.org installed in app-system-defaults
1488891284564	DeferredSave.extensions.json	DEBUG	Save changes
1488891284564	addons.xpi-utils	DEBUG	New add-on webcompat@mozilla.org installed in app-system-defaults
1488891284566	DeferredSave.extensions.json	DEBUG	Save changes
1488891284567	addons.xpi-utils	DEBUG	New add-on {972ce4c6-7e08-4474-a285-3208198ce6fd} installed in app-global
1488891284569	DeferredSave.extensions.json	DEBUG	Save changes
1488891284570	addons.manager	DEBUG	Registering startup change 'installed' for aushelper@mozilla.org
1488891284576	addons.xpi	DEBUG	Loading bootstrap scope from C:\Program Files (x86)\Firefox Nightly\browser\features\aushelper@mozilla.org.xpi
1488891284580	addons.xpi	DEBUG	Calling bootstrap method install on aushelper@mozilla.org version 2.0
1488891284580	addons.xpi-utils	DEBUG	Make addon app-system-defaults:aushelper@mozilla.org visible
1488891284581	DeferredSave.extensions.json	DEBUG	Save changes
1488891284581	addons.manager	DEBUG	Registering startup change 'installed' for e10srollout@mozilla.org
1488891284581	addons.xpi	DEBUG	Loading bootstrap scope from C:\Program Files (x86)\Firefox Nightly\browser\features\e10srollout@mozilla.org.xpi
1488891284583	addons.xpi	DEBUG	Calling bootstrap method install on e10srollout@mozilla.org version 1.11
1488891284584	addons.xpi-utils	DEBUG	Make addon app-system-defaults:e10srollout@mozilla.org visible
1488891284584	DeferredSave.extensions.json	DEBUG	Save changes
1488891284584	addons.manager	DEBUG	Registering startup change 'installed' for firefox@getpocket.com
1488891284585	addons.xpi	DEBUG	Loading bootstrap scope from C:\Program Files (x86)\Firefox Nightly\browser\features\firefox@getpocket.com.xpi
1488891284587	addons.xpi	DEBUG	Calling bootstrap method install on firefox@getpocket.com version 1.0.5
1488891284587	addons.xpi-utils	DEBUG	Make addon app-system-defaults:firefox@getpocket.com visible
1488891284588	DeferredSave.extensions.json	DEBUG	Save changes
1488891284588	addons.manager	DEBUG	Registering startup change 'installed' for flyweb@mozilla.org
1488891284588	addons.xpi	DEBUG	Loading bootstrap scope from C:\Program Files (x86)\Firefox Nightly\browser\features\flyweb@mozilla.org.xpi
1488891284590	addons.xpi	DEBUG	Calling bootstrap method install on flyweb@mozilla.org version 1.0.0
1488891284590	addons.xpi-utils	DEBUG	Make addon app-system-defaults:flyweb@mozilla.org visible
1488891284591	DeferredSave.extensions.json	DEBUG	Save changes
1488891284591	addons.manager	DEBUG	Registering startup change 'installed' for formautofill@mozilla.org
1488891284591	addons.xpi	DEBUG	Loading bootstrap scope from C:\Program Files (x86)\Firefox Nightly\browser\features\formautofill@mozilla.org.xpi
1488891284593	addons.xpi	DEBUG	Calling bootstrap method install on formautofill@mozilla.org version 1.0
1488891284593	addons.xpi-utils	DEBUG	Make addon app-system-defaults:formautofill@mozilla.org visible
1488891284594	DeferredSave.extensions.json	DEBUG	Save changes
1488891284594	addons.manager	DEBUG	Registering startup change 'installed' for presentation@mozilla.org
1488891284594	addons.xpi	DEBUG	Loading bootstrap scope from C:\Program Files (x86)\Firefox Nightly\browser\features\presentation@mozilla.org.xpi
1488891284596	addons.xpi	DEBUG	Calling bootstrap method install on presentation@mozilla.org version 1.0.0
1488891284596	addons.xpi-utils	DEBUG	Make addon app-system-defaults:presentation@mozilla.org visible
1488891284596	DeferredSave.extensions.json	DEBUG	Save changes
1488891284596	addons.manager	DEBUG	Registering startup change 'installed' for shield-recipe-client@mozilla.org
1488891284596	addons.xpi	DEBUG	Loading bootstrap scope from C:\Program Files (x86)\Firefox Nightly\browser\features\shield-recipe-client@mozilla.org.xpi
1488891284598	addons.xpi	DEBUG	Calling bootstrap method install on shield-recipe-client@mozilla.org version 1.0.0
1488891284598	addons.xpi-utils	DEBUG	Make addon app-system-defaults:shield-recipe-client@mozilla.org visible
1488891284598	DeferredSave.extensions.json	DEBUG	Save changes
1488891284599	addons.manager	DEBUG	Registering startup change 'installed' for webcompat-reporter@mozilla.org
1488891284600	addons.xpi	DEBUG	Loading bootstrap scope from C:\Program Files (x86)\Firefox Nightly\browser\features\webcompat-reporter@mozilla.org.xpi
1488891284602	addons.xpi	DEBUG	Calling bootstrap method install on webcompat-reporter@mozilla.org version 1.0.0
1488891284602	addons.xpi-utils	DEBUG	Make addon app-system-defaults:webcompat-reporter@mozilla.org visible
1488891284602	DeferredSave.extensions.json	DEBUG	Save changes
1488891284603	addons.manager	DEBUG	Registering startup change 'installed' for webcompat@mozilla.org
1488891284603	addons.xpi	DEBUG	Loading bootstrap scope from C:\Program Files (x86)\Firefox Nightly\browser\features\webcompat@mozilla.org.xpi
1488891284605	addons.xpi	DEBUG	Calling bootstrap method install on webcompat@mozilla.org version 1.1
1488891284606	addons.xpi-utils	DEBUG	Make addon app-system-defaults:webcompat@mozilla.org visible
1488891284606	DeferredSave.extensions.json	DEBUG	Save changes
1488891284606	addons.xpi-utils	DEBUG	Make addon app-global:{972ce4c6-7e08-4474-a285-3208198ce6fd} visible
1488891284606	DeferredSave.extensions.json	DEBUG	Save changes
1488891284607	addons.xpi	DEBUG	Updating XPIState for {"id":"aushelper@mozilla.org","syncGUID":"{05c799ad-072f-4005-b606-9048be54820d}","location":"app-system-defaults","version":"2.0","type":"extension","internalName":null,"updateURL":null,"updateKey":null,"optionsURL":null,"optionsType":null,"aboutURL":null,"icons":{},"iconURL":null,"icon64URL":null,"defaultLocale":{"name":"Application Update Service Helper","description":"Sets value(s) in the update url based on custom checks.","creator":null,"homepageURL":null},"visible":true,"active":true,"userDisabled":false,"appDisabled":false,"descriptor":"C:\\Program Files (x86)\\Firefox Nightly\\browser\\features\\aushelper@mozilla.org.xpi","installDate":1488824126679,"updateDate":1488824126679,"applyBackgroundUpdates":1,"bootstrap":true,"skinnable":false,"size":8490,"sourceURI":null,"releaseNotesURI":null,"softDisabled":false,"foreignInstall":false,"hasBinaryComponents":false,"strictCompatibility":false,"locales":[],"targetApplications":[{"id":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","minVersion":"54.0a1","maxVersion":"54.0a1"}],"targetPlatforms":[],"multiprocessCompatible":true,"seen":true,"dependencies":[],"hasEmbeddedWebExtension":false,"mpcOptedOut":false,"userPermissions":null}
1488891284607	addons.xpi	DEBUG	getModTime: Recursive scan of aushelper@mozilla.org
1488891284608	addons.xpi	DEBUG	Updating XPIState for {"id":"e10srollout@mozilla.org","syncGUID":"{3c21f4d0-4076-472b-8d14-98f403c47a43}","location":"app-system-defaults","version":"1.11","type":"extension","internalName":null,"updateURL":null,"updateKey":null,"optionsURL":null,"optionsType":null,"aboutURL":null,"icons":{},"iconURL":null,"icon64URL":null,"defaultLocale":{"name":"Multi-process staged rollout","description":"Staged rollout of Firefox multi-process feature.","creator":null,"homepageURL":null},"visible":true,"active":true,"userDisabled":false,"appDisabled":false,"descriptor":"C:\\Program Files (x86)\\Firefox Nightly\\browser\\features\\e10srollout@mozilla.org.xpi","installDate":1488824126687,"updateDate":1488824126687,"applyBackgroundUpdates":1,"bootstrap":true,"skinnable":false,"size":8072,"sourceURI":null,"releaseNotesURI":null,"softDisabled":false,"foreignInstall":false,"hasBinaryComponents":false,"strictCompatibility":false,"locales":[],"targetApplications":[{"id":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","minVersion":"54.0a1","maxVersion":"54.0a1"}],"targetPlatforms":[],"multiprocessCompatible":true,"seen":true,"dependencies":[],"hasEmbeddedWebExtension":false,"mpcOptedOut":false,"userPermissions":null}
1488891284608	addons.xpi	DEBUG	getModTime: Recursive scan of e10srollout@mozilla.org
1488891284609	addons.xpi	DEBUG	Updating XPIState for {"id":"firefox@getpocket.com","syncGUID":"{0c68b457-8235-49f4-831d-2b87ec2dea66}","location":"app-system-defaults","version":"1.0.5","type":"extension","internalName":null,"updateURL":null,"updateKey":null,"optionsURL":null,"optionsType":null,"aboutURL":null,"icons":{},"iconURL":null,"icon64URL":null,"defaultLocale":{"name":"Pocket","description":"When you find something you want to view later, put it in Pocket.","creator":null,"homepageURL":null},"visible":true,"active":true,"userDisabled":false,"appDisabled":false,"descriptor":"C:\\Program Files (x86)\\Firefox Nightly\\browser\\features\\firefox@getpocket.com.xpi","installDate":1488824127609,"updateDate":1488824127609,"applyBackgroundUpdates":1,"bootstrap":true,"skinnable":false,"size":914162,"sourceURI":null,"releaseNotesURI":null,"softDisabled":false,"foreignInstall":false,"hasBinaryComponents":false,"strictCompatibility":false,"locales":[],"targetApplications":[{"id":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","minVersion":"54.0a1","maxVersion":"54.0a1"}],"targetPlatforms":[],"multiprocessCompatible":true,"seen":true,"dependencies":[],"hasEmbeddedWebExtension":false,"mpcOptedOut":false,"userPermissions":null}
1488891284609	addons.xpi	DEBUG	getModTime: Recursive scan of firefox@getpocket.com
1488891284609	addons.xpi	DEBUG	Updating XPIState for {"id":"flyweb@mozilla.org","syncGUID":"{e6797f2a-6bc8-4142-a5cf-dd679c468652}","location":"app-system-defaults","version":"1.0.0","type":"extension","internalName":null,"updateURL":null,"updateKey":null,"optionsURL":null,"optionsType":null,"aboutURL":null,"icons":{},"iconURL":null,"icon64URL":null,"defaultLocale":{"name":"FlyWeb","description":"Discover nearby services in the browser","creator":null,"homepageURL":null},"visible":true,"active":true,"userDisabled":false,"appDisabled":false,"descriptor":"C:\\Program Files (x86)\\Firefox Nightly\\browser\\features\\flyweb@mozilla.org.xpi","installDate":1488824126889,"updateDate":1488824126889,"applyBackgroundUpdates":1,"bootstrap":true,"skinnable":false,"size":57000,"sourceURI":null,"releaseNotesURI":null,"softDisabled":false,"foreignInstall":false,"hasBinaryComponents":false,"strictCompatibility":false,"locales":[],"targetApplications":[{"id":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","minVersion":"54.0a1","maxVersion":"54.0a1"}],"targetPlatforms":[],"multiprocessCompatible":true,"seen":true,"dependencies":[],"hasEmbeddedWebExtension":false,"mpcOptedOut":false,"userPermissions":null}
1488891284609	addons.xpi	DEBUG	getModTime: Recursive scan of flyweb@mozilla.org
1488891284610	addons.xpi	DEBUG	Updating XPIState for {"id":"formautofill@mozilla.org","syncGUID":"{a83c0bc3-7b84-4ea8-98c4-0ae66da21e58}","location":"app-system-defaults","version":"1.0","type":"extension","internalName":null,"updateURL":null,"updateKey":null,"optionsURL":null,"optionsType":null,"aboutURL":null,"icons":{},"iconURL":null,"icon64URL":null,"defaultLocale":{"name":"Form Autofill","description":"Autofill forms with saved profiles","creator":null,"homepageURL":null},"visible":true,"active":true,"userDisabled":false,"appDisabled":false,"descriptor":"C:\\Program Files (x86)\\Firefox Nightly\\browser\\features\\formautofill@mozilla.org.xpi","installDate":1488824126860,"updateDate":1488824126860,"applyBackgroundUpdates":1,"bootstrap":true,"skinnable":false,"size":57067,"sourceURI":null,"releaseNotesURI":null,"softDisabled":false,"foreignInstall":false,"hasBinaryComponents":false,"strictCompatibility":false,"locales":[],"targetApplications":[{"id":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","minVersion":"54.0a1","maxVersion":"54.0a1"}],"targetPlatforms":[],"multiprocessCompatible":true,"seen":true,"dependencies":[],"hasEmbeddedWebExtension":false,"mpcOptedOut":false,"userPermissions":null}
1488891284610	addons.xpi	DEBUG	getModTime: Recursive scan of formautofill@mozilla.org
1488891284611	addons.xpi	DEBUG	Updating XPIState for {"id":"presentation@mozilla.org","syncGUID":"{6816df04-5c42-493c-8ea6-3e41112d4a3b}","location":"app-system-defaults","version":"1.0.0","type":"extension","internalName":null,"updateURL":null,"updateKey":null,"optionsURL":null,"optionsType":null,"aboutURL":null,"icons":{},"iconURL":null,"icon64URL":null,"defaultLocale":{"name":"Presentation","description":"Discover nearby devices in the browser","creator":null,"homepageURL":null},"visible":true,"active":true,"userDisabled":false,"appDisabled":false,"descriptor":"C:\\Program Files (x86)\\Firefox Nightly\\browser\\features\\presentation@mozilla.org.xpi","installDate":1488824126781,"updateDate":1488824126781,"applyBackgroundUpdates":1,"bootstrap":true,"skinnable":false,"size":14511,"sourceURI":null,"releaseNotesURI":null,"softDisabled":false,"foreignInstall":false,"hasBinaryComponents":false,"strictCompatibility":false,"locales":[],"targetApplications":[{"id":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","minVersion":"54.0a1","maxVersion":"54.0a1"}],"targetPlatforms":[],"multiprocessCompatible":true,"seen":true,"dependencies":[],"hasEmbeddedWebExtension":false,"mpcOptedOut":false,"userPermissions":null}
1488891284611	addons.xpi	DEBUG	getModTime: Recursive scan of presentation@mozilla.org
1488891284611	addons.xpi	DEBUG	Updating XPIState for {"id":"shield-recipe-client@mozilla.org","syncGUID":"{24c79336-0019-49a6-993e-65d3094c8e22}","location":"app-system-defaults","version":"1.0.0","type":"extension","internalName":null,"updateURL":null,"updateKey":null,"optionsURL":null,"optionsType":null,"aboutURL":null,"icons":{},"iconURL":null,"icon64URL":null,"defaultLocale":{"name":"Shield Recipe Client","description":"Client to download and run recipes for SHIELD, Heartbeat, etc.","creator":null,"homepageURL":null},"visible":true,"active":true,"userDisabled":false,"appDisabled":false,"descriptor":"C:\\Program Files (x86)\\Firefox Nightly\\browser\\features\\shield-recipe-client@mozilla.org.xpi","installDate":1488824127092,"updateDate":1488824127092,"applyBackgroundUpdates":1,"bootstrap":true,"skinnable":false,"size":121235,"sourceURI":null,"releaseNotesURI":null,"softDisabled":false,"foreignInstall":false,"hasBinaryComponents":false,"strictCompatibility":false,"locales":[],"targetApplications":[{"id":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","minVersion":"54.0a1","maxVersion":"54.0a1"}],"targetPlatforms":[],"multiprocessCompatible":true,"seen":true,"dependencies":[],"hasEmbeddedWebExtension":false,"mpcOptedOut":false,"userPermissions":null}
1488891284611	addons.xpi	DEBUG	getModTime: Recursive scan of shield-recipe-client@mozilla.org
1488891284612	addons.xpi	DEBUG	Updating XPIState for {"id":"webcompat-reporter@mozilla.org","syncGUID":"{b6df3285-5426-4370-865e-00484350c76c}","location":"app-system-defaults","version":"1.0.0","type":"extension","internalName":null,"updateURL":null,"updateKey":null,"optionsURL":null,"optionsType":null,"aboutURL":null,"icons":{},"iconURL":null,"icon64URL":null,"defaultLocale":{"name":"WebCompat Reporter","description":"Report site compatibility issues on webcompat.com.","creator":null,"homepageURL":null},"visible":true,"active":true,"userDisabled":false,"appDisabled":false,"descriptor":"C:\\Program Files (x86)\\Firefox Nightly\\browser\\features\\webcompat-reporter@mozilla.org.xpi","installDate":1488824126950,"updateDate":1488824126950,"applyBackgroundUpdates":1,"bootstrap":true,"skinnable":false,"size":15917,"sourceURI":null,"releaseNotesURI":null,"softDisabled":false,"foreignInstall":false,"hasBinaryComponents":false,"strictCompatibility":false,"locales":[],"targetApplications":[{"id":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","minVersion":"54.0a1","maxVersion":"54.0a1"}],"targetPlatforms":[],"multiprocessCompatible":true,"seen":true,"dependencies":[],"hasEmbeddedWebExtension":false,"mpcOptedOut":false,"userPermissions":null}
1488891284612	addons.xpi	DEBUG	getModTime: Recursive scan of webcompat-reporter@mozilla.org
1488891284612	addons.xpi	DEBUG	Updating XPIState for {"id":"webcompat@mozilla.org","syncGUID":"{813ac7f5-e9c4-4554-90d3-0049cfb4a630}","location":"app-system-defaults","version":"1.1","type":"extension","internalName":null,"updateURL":null,"updateKey":null,"optionsURL":null,"optionsType":null,"aboutURL":null,"icons":{},"iconURL":null,"icon64URL":null,"defaultLocale":{"name":"Web Compat","description":"Urgent post-release fixes for web compatibility.","creator":null,"homepageURL":null},"visible":true,"active":true,"userDisabled":false,"appDisabled":false,"descriptor":"C:\\Program Files (x86)\\Firefox Nightly\\browser\\features\\webcompat@mozilla.org.xpi","installDate":1488824126937,"updateDate":1488824126937,"applyBackgroundUpdates":1,"bootstrap":true,"skinnable":false,"size":9008,"sourceURI":null,"releaseNotesURI":null,"softDisabled":false,"foreignInstall":false,"hasBinaryComponents":false,"strictCompatibility":false,"locales":[],"targetApplications":[{"id":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","minVersion":"54.0a1","maxVersion":"54.0a1"}],"targetPlatforms":[],"multiprocessCompatible":true,"seen":true,"dependencies":[],"hasEmbeddedWebExtension":false,"mpcOptedOut":false,"userPermissions":null}
1488891284612	addons.xpi	DEBUG	getModTime: Recursive scan of webcompat@mozilla.org
1488891284613	addons.xpi	DEBUG	Updating XPIState for {"id":"{972ce4c6-7e08-4474-a285-3208198ce6fd}","syncGUID":"{a5cc7a90-28ab-430d-8fae-a96fa91dfdd7}","location":"app-global","version":"54.0a1","type":"theme","internalName":"classic/1.0","updateURL":null,"updateKey":null,"optionsURL":null,"optionsType":null,"aboutURL":null,"icons":{},"iconURL":"chrome://browser/content/default-theme-icon.svg","icon64URL":null,"defaultLocale":{"name":"Default","description":"The default theme.","creator":"Mozilla","homepageURL":null,"contributors":["Mozilla Contributors"]},"visible":true,"active":true,"userDisabled":false,"appDisabled":false,"descriptor":"C:\\Program Files (x86)\\Firefox Nightly\\browser\\extensions\\{972ce4c6-7e08-4474-a285-3208198ce6fd}.xpi","installDate":1488824126721,"updateDate":1488824126721,"applyBackgroundUpdates":1,"skinnable":true,"size":8207,"sourceURI":null,"releaseNotesURI":null,"softDisabled":false,"foreignInstall":false,"hasBinaryComponents":false,"strictCompatibility":true,"locales":[],"targetApplications":[{"id":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","minVersion":"54.0a1","maxVersion":"54.0a1"}],"targetPlatforms":[],"seen":true,"dependencies":[],"hasEmbeddedWebExtension":false,"userPermissions":null}
1488891284613	addons.xpi	DEBUG	getModTime: Recursive scan of {972ce4c6-7e08-4474-a285-3208198ce6fd}
1488891284614	DeferredSave.extensions.json	DEBUG	Save changes
1488891284614	addons.xpi	DEBUG	Updating database with changes to installed add-ons
1488891284614	addons.xpi-utils	DEBUG	Updating add-on states
1488891284616	addons.xpi-utils	DEBUG	Writing add-ons list
1488891284620	addons.xpi	DEBUG	Registering manifest for C:\Program Files (x86)\Firefox Nightly\browser\features\aushelper@mozilla.org.xpi
1488891284621	addons.xpi	DEBUG	Calling bootstrap method startup on aushelper@mozilla.org version 2.0
1488891284623	addons.xpi	DEBUG	Registering manifest for C:\Program Files (x86)\Firefox Nightly\browser\features\e10srollout@mozilla.org.xpi
1488891284623	addons.xpi	DEBUG	Calling bootstrap method startup on e10srollout@mozilla.org version 1.11
1488891284624	addons.xpi	DEBUG	Registering manifest for C:\Program Files (x86)\Firefox Nightly\browser\features\firefox@getpocket.com.xpi
1488891284624	addons.xpi	DEBUG	Calling bootstrap method startup on firefox@getpocket.com version 1.0.5
1488891284625	addons.xpi	DEBUG	Registering manifest for C:\Program Files (x86)\Firefox Nightly\browser\features\flyweb@mozilla.org.xpi
1488891284626	addons.xpi	DEBUG	Calling bootstrap method startup on flyweb@mozilla.org version 1.0.0
1488891284626	addons.xpi	DEBUG	Registering manifest for C:\Program Files (x86)\Firefox Nightly\browser\features\formautofill@mozilla.org.xpi
1488891284627	addons.xpi	DEBUG	Calling bootstrap method startup on formautofill@mozilla.org version 1.0
1488891284627	addons.xpi	DEBUG	Registering manifest for C:\Program Files (x86)\Firefox Nightly\browser\features\presentation@mozilla.org.xpi
1488891284627	addons.xpi	DEBUG	Calling bootstrap method startup on presentation@mozilla.org version 1.0.0
1488891284630	addons.xpi	DEBUG	Registering manifest for C:\Program Files (x86)\Firefox Nightly\browser\features\shield-recipe-client@mozilla.org.xpi
1488891284631	addons.xpi	DEBUG	Calling bootstrap method startup on shield-recipe-client@mozilla.org version 1.0.0
1488891284632	addons.xpi	DEBUG	Registering manifest for C:\Program Files (x86)\Firefox Nightly\browser\features\webcompat-reporter@mozilla.org.xpi
1488891284633	addons.xpi	DEBUG	Calling bootstrap method startup on webcompat-reporter@mozilla.org version 1.0.0
1488891284654	addons.xpi	DEBUG	Registering manifest for C:\Program Files (x86)\Firefox Nightly\browser\features\webcompat@mozilla.org.xpi
1488891284655	addons.xpi	DEBUG	Calling bootstrap method startup on webcompat@mozilla.org version 1.1
1488891284660	addons.manager	DEBUG	Registering shutdown blocker for XPIProvider
1488891284660	addons.manager	DEBUG	Provider finished startup: XPIProvider
1488891284661	addons.manager	DEBUG	Starting provider: LightweightThemeManager
1488891284661	addons.manager	DEBUG	Registering shutdown blocker for LightweightThemeManager
1488891284661	addons.manager	DEBUG	Provider finished startup: LightweightThemeManager
1488891284661	addons.manager	DEBUG	Starting provider: GMPProvider
1488891284665	addons.manager	DEBUG	Registering shutdown blocker for GMPProvider
1488891284666	addons.manager	DEBUG	Provider finished startup: GMPProvider
1488891284666	addons.manager	DEBUG	Starting provider: PluginProvider
1488891284666	addons.manager	DEBUG	Registering shutdown blocker for PluginProvider
1488891284666	addons.manager	DEBUG	Provider finished startup: PluginProvider
1488891284666	addons.manager	DEBUG	Completed startup sequence
1488891284935	Marionette	INFO	Listening on port 64104
1488891285136	addons.manager	DEBUG	Starting provider: <unnamed-provider>
1488891285136	addons.manager	DEBUG	Registering shutdown blocker for <unnamed-provider>
1488891285136	addons.manager	DEBUG	Provider finished startup: <unnamed-provider>
1488891285157	addons.manager	DEBUG	Starting provider: PreviousExperimentProvider
1488891285157	addons.manager	DEBUG	Registering shutdown blocker for PreviousExperimentProvider
1488891285158	addons.manager	DEBUG	Provider finished startup: PreviousExperimentProvider
1488891285161	DeferredSave.extensions.json	DEBUG	Starting write
1488891285387	DeferredSave.extensions.json	DEBUG	Write succeeded
1488891285388	addons.xpi-utils	DEBUG	XPI Database saved, setting schema version preference to 19
[Child 18144] WARNING: pipe error: 109: file c:/builds/moz2_slave/m-cen-w32-ntly-000000000000000/build/src/ipc/chromium/src/chrome/common/ipc_channel_win.cc, line 346
[Child 18144] WARNING: pipe error: 109: file c:/builds/moz2_slave/m-cen-w32-ntly-000000000000000/build/src/ipc/chromium/src/chrome/common/ipc_channel_win.cc, line 346
Mär 07, 2017 1:54:46 PM org.openqa.selenium.remote.ProtocolHandshake createSession
INFORMATION: Detected dialect: W3C
Exception in thread "main" org.openqa.selenium.WebDriverException: Error: Permission denied to access property "invoke"
Build info: version: 'unknown', revision: '86a5d70', time: '2017-02-16 07:47:51 -0800'
System info: host: 'PMNEO7510', ip: '192.168.215.80', os.name: 'Windows 10', os.arch: 'amd64', os.version: '10.0', java.version: '1.8.0_112'
Driver info: org.openqa.selenium.firefox.FirefoxDriver
Capabilities [{moz:profile=C:\Users\pmneo\AppData\Local\Temp\rust_mozprofile.lASWaEu3b3ic, rotatable=false, timeouts={implicit=0, page load=300000, script=30000}, pageLoadStrategy=normal, platform=ANY, specificationLevel=0, moz:accessibilityChecks=false, acceptInsecureCerts=false, browserVersion=54.0a1, platformVersion=10.0, moz:processID=14708, browserName=firefox, platformName=windows_nt}]
Session ID: ba9466e1-5a34-4956-9f2f-1f540d658a98
	at sun.reflect.NativeConstructorAccessorImpl.newInstance0(Native Method)
	at sun.reflect.NativeConstructorAccessorImpl.newInstance(NativeConstructorAccessorImpl.java:62)
	at sun.reflect.DelegatingConstructorAccessorImpl.newInstance(DelegatingConstructorAccessorImpl.java:45)
	at java.lang.reflect.Constructor.newInstance(Constructor.java:423)
	at org.openqa.selenium.remote.http.W3CHttpResponseCodec.createException(W3CHttpResponseCodec.java:127)
	at org.openqa.selenium.remote.http.W3CHttpResponseCodec.decode(W3CHttpResponseCodec.java:93)
	at org.openqa.selenium.remote.http.W3CHttpResponseCodec.decode(W3CHttpResponseCodec.java:42)
	at org.openqa.selenium.remote.HttpCommandExecutor.execute(HttpCommandExecutor.java:163)
	at org.openqa.selenium.remote.service.DriverCommandExecutor.execute(DriverCommandExecutor.java:82)
	at org.openqa.selenium.remote.RemoteWebDriver.execute(RemoteWebDriver.java:601)
	at org.openqa.selenium.remote.RemoteWebDriver.executeScript(RemoteWebDriver.java:537)
	at FFInvokeError.main(FFInvokeError.java:19)

@kansaz
Copy link

kansaz commented Apr 3, 2017

Hi all, it's actually cause block issue if I need to execute js to get information from control in page. So, could you please help me a date to have it fixed.
Thank you.

@andreastt
Copy link
Contributor

I’m able to reproduce this using Marionette directly on mozilla-central:

>>> m.execute_script("return true", sandbox=None)
Traceback (most recent call last):
  File "<stdin>", line 1, in <module>
  File "/home/ato/src/gecko/testing/marionette/client/marionette_driver/marionette.py", line 1861, in execute_script
    rv = self._send_message("executeScript", body, key="value")
  File "/home/ato/src/gecko/testing/marionette/client/marionette_driver/decorators.py", line 23, in _
    return func(*args, **kwargs)
  File "/home/ato/src/gecko/testing/marionette/client/marionette_driver/marionette.py", line 735, in _send_message
    self._handle_error(err)
  File "/home/ato/src/gecko/testing/marionette/client/marionette_driver/marionette.py", line 768, in _handle_error
    raise errors.lookup(error)(message, stacktrace=stacktrace)
marionette_driver.errors.MarionetteException: Error: Permission denied to access property "invoke"
stacktrace:
	invokeRemoveFunc@https://material.angular.io/vendor.cd86af5b77b0c0342f39.bundle.js:1417:16491
	u/<@https://material.angular.io/vendor.cd86af5b77b0c0342f39.bundle.js:1389:2620
	removeEventListener@https://material.angular.io/vendor.cd86af5b77b0c0342f39.bundle.js line 1389 > Function:3:46

This seems quite serious, so I will investigate.

@andreastt andreastt self-assigned this Apr 3, 2017
@andreastt
Copy link
Contributor

I’m struggling to figure out what is wrong here because of the amount of indirection in Angular. It’s extremely hard to reproduce because Angular files cannot be saved to disk and edited manually without a security error being raised and the content removed…

@andreastt
Copy link
Contributor

For some reason, the unload event listener Marionette installs gets called when return true is injected into this page. I can only assume that Angular overrides window.removeEventListener, which seems like a terrible idea.

Marionette calls this to remove unloadHandler in http://searchfox.org/mozilla-central/source/testing/marionette/evaluate.js#170, but because unloadHandler originates in chrome space it isn’t protected from arbitrary content invocation. My educated guess is that Angular tries to inspect objects passed to removeEventListener and that Error: Permission denied to access property "invoke" is thrown after it earlier fails to assign this property to unloadHandler.

@andreastt
Copy link
Contributor

@pmneo
Copy link
Author

pmneo commented Apr 3, 2017

Zone wich is User by Angular overrides the add and remove EH of document and window for change detection.

@andreastt
Copy link
Contributor

That’s… terrifying, but thanks for the information! I’ve submitted a fix for this in https://bugzilla.mozilla.org/show_bug.cgi?id=1353074.

moz-v2v-gh pushed a commit to mozilla/gecko-dev that referenced this issue Apr 7, 2017
…r=maja_zf

Marionette does not protect the unloadHandler in
testing/marionette/evaluate.js from content introspection or
modification, which can happen when web frameworks override
window.addEventListener/window.removeEventListener.

The script evaluation module used in Marionette relies on
sandbox.window.addEventListener/removeEventListener to throw an error when
script execution is aborted due to the document unloading itself.  If the
window.addEventListener/removeEventListener functions have been overridden
to introspect the objects that are passed, they may inadvertently touch
objects originating from chrome space, such as the unloadHandler.

Because the Gecko sandboxing system put in place strict security measures
to prevent accidental chrome-space modification from content, inspecting
the unloadHandler will throw a permission denied error once the script
has finished executing.

We have found examples in the wild of this in particular with the Angular
web framework.  This patch makes the unloadHandler safe for introspection
from web content.

Fixes: mozilla/geckodriver#515
MozReview-Commit-ID: E2LgPhLLuDT

--HG--
extra : rebase_source : 6fe4f61fd18f42fb5332a664189f3ea919db28c5
@mykmelez mykmelez closed this as completed Apr 7, 2017
@andreastt andreastt reopened this Apr 7, 2017
Manishearth pushed a commit to Manishearth/gecko-dev that referenced this issue Apr 11, 2017
…r=maja_zf

Marionette does not protect the unloadHandler in
testing/marionette/evaluate.js from content introspection or
modification, which can happen when web frameworks override
window.addEventListener/window.removeEventListener.

The script evaluation module used in Marionette relies on
sandbox.window.addEventListener/removeEventListener to throw an error when
script execution is aborted due to the document unloading itself.  If the
window.addEventListener/removeEventListener functions have been overridden
to introspect the objects that are passed, they may inadvertently touch
objects originating from chrome space, such as the unloadHandler.

Because the Gecko sandboxing system put in place strict security measures
to prevent accidental chrome-space modification from content, inspecting
the unloadHandler will throw a permission denied error once the script
has finished executing.

We have found examples in the wild of this in particular with the Angular
web framework.  This patch makes the unloadHandler safe for introspection
from web content.

Fixes: mozilla/geckodriver#515
MozReview-Commit-ID: E2LgPhLLuDT
JerryShih pushed a commit to JerryShih/gecko-dev that referenced this issue Apr 12, 2017
…r=maja_zf

Marionette does not protect the unloadHandler in
testing/marionette/evaluate.js from content introspection or
modification, which can happen when web frameworks override
window.addEventListener/window.removeEventListener.

The script evaluation module used in Marionette relies on
sandbox.window.addEventListener/removeEventListener to throw an error when
script execution is aborted due to the document unloading itself.  If the
window.addEventListener/removeEventListener functions have been overridden
to introspect the objects that are passed, they may inadvertently touch
objects originating from chrome space, such as the unloadHandler.

Because the Gecko sandboxing system put in place strict security measures
to prevent accidental chrome-space modification from content, inspecting
the unloadHandler will throw a permission denied error once the script
has finished executing.

We have found examples in the wild of this in particular with the Angular
web framework.  This patch makes the unloadHandler safe for introspection
from web content.

Fixes: mozilla/geckodriver#515
MozReview-Commit-ID: E2LgPhLLuDT
moz-v2v-gh pushed a commit to mozilla/gecko-dev that referenced this issue Apr 19, 2017
…r=maja_zf

Marionette does not protect the unloadHandler in
testing/marionette/evaluate.js from content introspection or
modification, which can happen when web frameworks override
window.addEventListener/window.removeEventListener.

The script evaluation module used in Marionette relies on
sandbox.window.addEventListener/removeEventListener to throw an error when
script execution is aborted due to the document unloading itself.  If the
window.addEventListener/removeEventListener functions have been overridden
to introspect the objects that are passed, they may inadvertently touch
objects originating from chrome space, such as the unloadHandler.

Because the Gecko sandboxing system put in place strict security measures
to prevent accidental chrome-space modification from content, inspecting
the unloadHandler will throw a permission denied error once the script
has finished executing.

We have found examples in the wild of this in particular with the Angular
web framework.  This patch makes the unloadHandler safe for introspection
from web content.

Fixes: mozilla/geckodriver#515
MozReview-Commit-ID: E2LgPhLLuDT

--HG--
extra : rebase_source : c7431630d24c42ebfd7ded3cf204c1ef245211d0
@andreastt andreastt reopened this Apr 19, 2017
Manishearth pushed a commit to Manishearth/gecko-dev that referenced this issue Apr 21, 2017
…r=maja_zf

Marionette does not protect the unloadHandler in
testing/marionette/evaluate.js from content introspection or
modification, which can happen when web frameworks override
window.addEventListener/window.removeEventListener.

The script evaluation module used in Marionette relies on
sandbox.window.addEventListener/removeEventListener to throw an error when
script execution is aborted due to the document unloading itself.  If the
window.addEventListener/removeEventListener functions have been overridden
to introspect the objects that are passed, they may inadvertently touch
objects originating from chrome space, such as the unloadHandler.

Because the Gecko sandboxing system put in place strict security measures
to prevent accidental chrome-space modification from content, inspecting
the unloadHandler will throw a permission denied error once the script
has finished executing.

We have found examples in the wild of this in particular with the Angular
web framework.  This patch makes the unloadHandler safe for introspection
from web content.

Fixes: mozilla/geckodriver#515
MozReview-Commit-ID: E2LgPhLLuDT
@juangj
Copy link
Contributor

juangj commented Apr 25, 2017

Thanks for making the fix in Firefox. Any plans to uplift it to FF54 or even 53? Or should Angular users depend on the Zone.JS fix being released?

moz-v2v-gh pushed a commit to mozilla/gecko-dev that referenced this issue Apr 26, 2017
…r=maja_zf

Marionette does not protect the unloadHandler in
testing/marionette/evaluate.js from content introspection or
modification, which can happen when web frameworks override
window.addEventListener/window.removeEventListener.

The script evaluation module used in Marionette relies on
sandbox.window.addEventListener/removeEventListener to throw an error when
script execution is aborted due to the document unloading itself.  If the
window.addEventListener/removeEventListener functions have been overridden
to introspect the objects that are passed, they may inadvertently touch
objects originating from chrome space, such as the unloadHandler.

Because the Gecko sandboxing system put in place strict security measures
to prevent accidental chrome-space modification from content, inspecting
the unloadHandler will throw a permission denied error once the script
has finished executing.

We have found examples in the wild of this in particular with the Angular
web framework.  This patch makes the unloadHandler safe for introspection
from web content.

Fixes: mozilla/geckodriver#515
MozReview-Commit-ID: E2LgPhLLuDT

--HG--
extra : rebase_source : 9948585b4ac2f464a9f31868bfd2d5967e61755e
@andreastt
Copy link
Contributor

@juangj See https://bugzilla.mozilla.org/show_bug.cgi?id=1353074#c96 regarding uplifting. A potential uplift would happen to 54 (Beta), since Aurora is now gone.

jryans pushed a commit to jryans/gecko-dev that referenced this issue May 3, 2017
…r=maja_zf

Marionette does not protect the unloadHandler in
testing/marionette/evaluate.js from content introspection or
modification, which can happen when web frameworks override
window.addEventListener/window.removeEventListener.

The script evaluation module used in Marionette relies on
sandbox.window.addEventListener/removeEventListener to throw an error when
script execution is aborted due to the document unloading itself.  If the
window.addEventListener/removeEventListener functions have been overridden
to introspect the objects that are passed, they may inadvertently touch
objects originating from chrome space, such as the unloadHandler.

Because the Gecko sandboxing system put in place strict security measures
to prevent accidental chrome-space modification from content, inspecting
the unloadHandler will throw a permission denied error once the script
has finished executing.

We have found examples in the wild of this in particular with the Angular
web framework.  This patch makes the unloadHandler safe for introspection
from web content.

Fixes: mozilla/geckodriver#515
MozReview-Commit-ID: E2LgPhLLuDT
moz-v2v-gh pushed a commit to mozilla/gecko-dev that referenced this issue May 15, 2017
…r=maja_zf, a=test-only

Marionette does not protect the unloadHandler in
testing/marionette/evaluate.js from content introspection or
modification, which can happen when web frameworks override
window.addEventListener/window.removeEventListener.

The script evaluation module used in Marionette relies on
sandbox.window.addEventListener/removeEventListener to throw an error when
script execution is aborted due to the document unloading itself.  If the
window.addEventListener/removeEventListener functions have been overridden
to introspect the objects that are passed, they may inadvertently touch
objects originating from chrome space, such as the unloadHandler.

Because the Gecko sandboxing system put in place strict security measures
to prevent accidental chrome-space modification from content, inspecting
the unloadHandler will throw a permission denied error once the script
has finished executing.

We have found examples in the wild of this in particular with the Angular
web framework.  This patch makes the unloadHandler safe for introspection
from web content.

Fixes: mozilla/geckodriver#515
MozReview-Commit-ID: E2LgPhLLuDT

--HG--
extra : source : fa0c99211baaaa10f530cdfed37234f2851b0c54
extra : histedit_source : c21fe86f75d7519c413cd8fde4ec8aba1ef57995
@lock
Copy link

lock bot commented Aug 17, 2019

This issue has been automatically locked since there has not been any recent activity after it was closed. If you have run into an issue you think is related, please open a new issue.

@lock lock bot locked and limited conversation to collaborators Aug 17, 2019
gecko-dev-updater pushed a commit to marco-c/gecko-dev-comments-removed that referenced this issue Oct 1, 2019
…r=maja_zf

Marionette does not protect the unloadHandler in
testing/marionette/evaluate.js from content introspection or
modification, which can happen when web frameworks override
window.addEventListener/window.removeEventListener.

The script evaluation module used in Marionette relies on
sandbox.window.addEventListener/removeEventListener to throw an error when
script execution is aborted due to the document unloading itself.  If the
window.addEventListener/removeEventListener functions have been overridden
to introspect the objects that are passed, they may inadvertently touch
objects originating from chrome space, such as the unloadHandler.

Because the Gecko sandboxing system put in place strict security measures
to prevent accidental chrome-space modification from content, inspecting
the unloadHandler will throw a permission denied error once the script
has finished executing.

We have found examples in the wild of this in particular with the Angular
web framework.  This patch makes the unloadHandler safe for introspection
from web content.

Fixes: mozilla/geckodriver#515
MozReview-Commit-ID: E2LgPhLLuDT

UltraBlame original commit: 2670eec1ed8ab10cb44c7010d996fa28af565442
gecko-dev-updater pushed a commit to marco-c/gecko-dev-comments-removed that referenced this issue Oct 1, 2019
…r=maja_zf

Marionette does not protect the unloadHandler in
testing/marionette/evaluate.js from content introspection or
modification, which can happen when web frameworks override
window.addEventListener/window.removeEventListener.

The script evaluation module used in Marionette relies on
sandbox.window.addEventListener/removeEventListener to throw an error when
script execution is aborted due to the document unloading itself.  If the
window.addEventListener/removeEventListener functions have been overridden
to introspect the objects that are passed, they may inadvertently touch
objects originating from chrome space, such as the unloadHandler.

Because the Gecko sandboxing system put in place strict security measures
to prevent accidental chrome-space modification from content, inspecting
the unloadHandler will throw a permission denied error once the script
has finished executing.

We have found examples in the wild of this in particular with the Angular
web framework.  This patch makes the unloadHandler safe for introspection
from web content.

Fixes: mozilla/geckodriver#515
MozReview-Commit-ID: E2LgPhLLuDT

UltraBlame original commit: d7af70f65c2ce11c6dda8aed276b9d5de45f38a5
gecko-dev-updater pushed a commit to marco-c/gecko-dev-comments-removed that referenced this issue Oct 1, 2019
…r=maja_zf

Marionette does not protect the unloadHandler in
testing/marionette/evaluate.js from content introspection or
modification, which can happen when web frameworks override
window.addEventListener/window.removeEventListener.

The script evaluation module used in Marionette relies on
sandbox.window.addEventListener/removeEventListener to throw an error when
script execution is aborted due to the document unloading itself.  If the
window.addEventListener/removeEventListener functions have been overridden
to introspect the objects that are passed, they may inadvertently touch
objects originating from chrome space, such as the unloadHandler.

Because the Gecko sandboxing system put in place strict security measures
to prevent accidental chrome-space modification from content, inspecting
the unloadHandler will throw a permission denied error once the script
has finished executing.

We have found examples in the wild of this in particular with the Angular
web framework.  This patch makes the unloadHandler safe for introspection
from web content.

Fixes: mozilla/geckodriver#515
MozReview-Commit-ID: E2LgPhLLuDT

UltraBlame original commit: fa0c99211baaaa10f530cdfed37234f2851b0c54
gecko-dev-updater pushed a commit to marco-c/gecko-dev-wordified that referenced this issue Oct 1, 2019
…r=maja_zf

Marionette does not protect the unloadHandler in
testing/marionette/evaluate.js from content introspection or
modification, which can happen when web frameworks override
window.addEventListener/window.removeEventListener.

The script evaluation module used in Marionette relies on
sandbox.window.addEventListener/removeEventListener to throw an error when
script execution is aborted due to the document unloading itself.  If the
window.addEventListener/removeEventListener functions have been overridden
to introspect the objects that are passed, they may inadvertently touch
objects originating from chrome space, such as the unloadHandler.

Because the Gecko sandboxing system put in place strict security measures
to prevent accidental chrome-space modification from content, inspecting
the unloadHandler will throw a permission denied error once the script
has finished executing.

We have found examples in the wild of this in particular with the Angular
web framework.  This patch makes the unloadHandler safe for introspection
from web content.

Fixes: mozilla/geckodriver#515
MozReview-Commit-ID: E2LgPhLLuDT

UltraBlame original commit: 2670eec1ed8ab10cb44c7010d996fa28af565442
gecko-dev-updater pushed a commit to marco-c/gecko-dev-wordified-and-comments-removed that referenced this issue Oct 1, 2019
…r=maja_zf

Marionette does not protect the unloadHandler in
testing/marionette/evaluate.js from content introspection or
modification, which can happen when web frameworks override
window.addEventListener/window.removeEventListener.

The script evaluation module used in Marionette relies on
sandbox.window.addEventListener/removeEventListener to throw an error when
script execution is aborted due to the document unloading itself.  If the
window.addEventListener/removeEventListener functions have been overridden
to introspect the objects that are passed, they may inadvertently touch
objects originating from chrome space, such as the unloadHandler.

Because the Gecko sandboxing system put in place strict security measures
to prevent accidental chrome-space modification from content, inspecting
the unloadHandler will throw a permission denied error once the script
has finished executing.

We have found examples in the wild of this in particular with the Angular
web framework.  This patch makes the unloadHandler safe for introspection
from web content.

Fixes: mozilla/geckodriver#515
MozReview-Commit-ID: E2LgPhLLuDT

UltraBlame original commit: 2670eec1ed8ab10cb44c7010d996fa28af565442
gecko-dev-updater pushed a commit to marco-c/gecko-dev-wordified that referenced this issue Oct 1, 2019
…r=maja_zf

Marionette does not protect the unloadHandler in
testing/marionette/evaluate.js from content introspection or
modification, which can happen when web frameworks override
window.addEventListener/window.removeEventListener.

The script evaluation module used in Marionette relies on
sandbox.window.addEventListener/removeEventListener to throw an error when
script execution is aborted due to the document unloading itself.  If the
window.addEventListener/removeEventListener functions have been overridden
to introspect the objects that are passed, they may inadvertently touch
objects originating from chrome space, such as the unloadHandler.

Because the Gecko sandboxing system put in place strict security measures
to prevent accidental chrome-space modification from content, inspecting
the unloadHandler will throw a permission denied error once the script
has finished executing.

We have found examples in the wild of this in particular with the Angular
web framework.  This patch makes the unloadHandler safe for introspection
from web content.

Fixes: mozilla/geckodriver#515
MozReview-Commit-ID: E2LgPhLLuDT

UltraBlame original commit: d7af70f65c2ce11c6dda8aed276b9d5de45f38a5
gecko-dev-updater pushed a commit to marco-c/gecko-dev-wordified that referenced this issue Oct 1, 2019
…r=maja_zf

Marionette does not protect the unloadHandler in
testing/marionette/evaluate.js from content introspection or
modification, which can happen when web frameworks override
window.addEventListener/window.removeEventListener.

The script evaluation module used in Marionette relies on
sandbox.window.addEventListener/removeEventListener to throw an error when
script execution is aborted due to the document unloading itself.  If the
window.addEventListener/removeEventListener functions have been overridden
to introspect the objects that are passed, they may inadvertently touch
objects originating from chrome space, such as the unloadHandler.

Because the Gecko sandboxing system put in place strict security measures
to prevent accidental chrome-space modification from content, inspecting
the unloadHandler will throw a permission denied error once the script
has finished executing.

We have found examples in the wild of this in particular with the Angular
web framework.  This patch makes the unloadHandler safe for introspection
from web content.

Fixes: mozilla/geckodriver#515
MozReview-Commit-ID: E2LgPhLLuDT

UltraBlame original commit: fa0c99211baaaa10f530cdfed37234f2851b0c54
gecko-dev-updater pushed a commit to marco-c/gecko-dev-wordified-and-comments-removed that referenced this issue Oct 1, 2019
…r=maja_zf

Marionette does not protect the unloadHandler in
testing/marionette/evaluate.js from content introspection or
modification, which can happen when web frameworks override
window.addEventListener/window.removeEventListener.

The script evaluation module used in Marionette relies on
sandbox.window.addEventListener/removeEventListener to throw an error when
script execution is aborted due to the document unloading itself.  If the
window.addEventListener/removeEventListener functions have been overridden
to introspect the objects that are passed, they may inadvertently touch
objects originating from chrome space, such as the unloadHandler.

Because the Gecko sandboxing system put in place strict security measures
to prevent accidental chrome-space modification from content, inspecting
the unloadHandler will throw a permission denied error once the script
has finished executing.

We have found examples in the wild of this in particular with the Angular
web framework.  This patch makes the unloadHandler safe for introspection
from web content.

Fixes: mozilla/geckodriver#515
MozReview-Commit-ID: E2LgPhLLuDT

UltraBlame original commit: d7af70f65c2ce11c6dda8aed276b9d5de45f38a5
gecko-dev-updater pushed a commit to marco-c/gecko-dev-wordified-and-comments-removed that referenced this issue Oct 1, 2019
…r=maja_zf

Marionette does not protect the unloadHandler in
testing/marionette/evaluate.js from content introspection or
modification, which can happen when web frameworks override
window.addEventListener/window.removeEventListener.

The script evaluation module used in Marionette relies on
sandbox.window.addEventListener/removeEventListener to throw an error when
script execution is aborted due to the document unloading itself.  If the
window.addEventListener/removeEventListener functions have been overridden
to introspect the objects that are passed, they may inadvertently touch
objects originating from chrome space, such as the unloadHandler.

Because the Gecko sandboxing system put in place strict security measures
to prevent accidental chrome-space modification from content, inspecting
the unloadHandler will throw a permission denied error once the script
has finished executing.

We have found examples in the wild of this in particular with the Angular
web framework.  This patch makes the unloadHandler safe for introspection
from web content.

Fixes: mozilla/geckodriver#515
MozReview-Commit-ID: E2LgPhLLuDT

UltraBlame original commit: fa0c99211baaaa10f530cdfed37234f2851b0c54
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Projects
None yet
Development

No branches or pull requests

4 participants