Commit Graph

14029 Commits

Author SHA1 Message Date
Ehsan Akhgari
5ebc9bcaf0 Bug 1523106 - DeCOMtaminate nsISecurityEventSink; r=baku
Differential Revision: https://phabricator.services.mozilla.com/D17742

--HG--
extra : moz-landing-system : lando
2019-01-28 16:40:21 +00:00
ffxbld
fce6da994d No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D17819

--HG--
extra : moz-landing-system : lando
2019-01-28 14:06:22 +00:00
J.C. Jones
78fdef6013 Bug 1512719 - land NSS NSS_3_42_BETA2 UPGRADE_NSS_RELEASE, r=me
--HG--
extra : rebase_source : a7bdacf3c87aabba837467d5f1209f320f171008
2019-01-25 23:38:02 +00:00
J.C. Jones
354f799704 Bug 1522735 - Set enable_sslkeylogfile for NSS gyp build r=firefox-build-system-reviewers,erahm,ted
NSS 3.42 added a new build flag, enable_sslkeylogfile, to toggle the
availability of the SSLKEYLOGFILE variable (see Bug 1515236 and Bug 1519209).

Differential Revision: https://phabricator.services.mozilla.com/D17588

--HG--
extra : moz-landing-system : lando
2019-01-25 18:43:23 +00:00
ffxbld
daf55e3ab4 No Bug, mozilla-central repo-update HSTS HPKP blocklist remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D17491

--HG--
extra : moz-landing-system : lando
2019-01-24 14:11:31 +00:00
Sylvestre Ledru
b61d90492b Bug 1519636 - Reformat recent changes to the Google coding style r=Ehsan
# ignore-this-changeset

Depends on D17388

Differential Revision: https://phabricator.services.mozilla.com/D17389

--HG--
extra : moz-landing-system : lando
2019-01-24 08:11:00 +00:00
Ciure Andrei
763557eef3 Merge mozilla-central to autoland. a=merge CLOSED TREE 2019-01-24 05:47:10 +02:00
Ciure Andrei
c035ee7d3a Merge inbound to mozilla-central. a=merge 2019-01-24 05:44:33 +02:00
Tim Nguyen
e5124ab3fe Bug 1521294 - Remove XUL grid layout from security/manager/pki/resources/content/changepassword.xul. r=nhnt11
Differential Revision: https://phabricator.services.mozilla.com/D17059

--HG--
extra : moz-landing-system : lando
2019-01-24 01:00:43 +00:00
Tim Nguyen
ea8cc54265 Bug 1521290 - Remove XUL grid layout from security/manager/pki/resources/content/device_manager.xul. r=nhnt11
Differential Revision: https://phabricator.services.mozilla.com/D17058

--HG--
extra : moz-landing-system : lando
2019-01-24 00:37:26 +00:00
Ciure Andrei
a4eeeccf1d Merge mozilla-central to mozilla-inbound. a=merge CLOSED TREE 2019-01-23 20:55:29 +02:00
J.C. Jones
376e2e4fdd Bug 1512719 - land NSS NSS_3_42_BETA1 UPGRADE_NSS_RELEASE, r=me
--HG--
extra : rebase_source : b5b0f18427d33d3d88c514a5de3a0e799881a183
extra : amend_source : 56a9b6c2c58b0ef459a03c13626225c09eebbf0c
2019-01-23 17:46:08 +00:00
Sebastian Hengst
2ecf173b14 Merge mozilla-central to autoland 2019-01-23 11:31:44 +02:00
Tim Nguyen
a6618d3147 Bug 1521296 - Remove XUL grid layout from security/manager/pki/resources/content/setp12password.xul. r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D17061

--HG--
extra : moz-landing-system : lando
2019-01-23 00:08:20 +00:00
Tim Nguyen
35ede052b3 Bug 1521295 - Remove XUL grid layout from security/manager/pki/resources/content/downloadcert.xul. r=jaws
Differential Revision: https://phabricator.services.mozilla.com/D17062

--HG--
extra : moz-landing-system : lando
2019-01-22 20:51:29 +00:00
Gurzau Raul
136dc5e8bc Merge mozilla-central to inbound. a=merge CLOSED TREE 2019-01-23 02:05:32 +02:00
Sylvestre Ledru
0b4021fcad Bug 1521460 - Also reformat objective-c files r=mstange,ehsan,spohl
# ignore-this-changeset

Differential Revision: https://phabricator.services.mozilla.com/D17139

--HG--
extra : histedit_source : 084f340503d2e1a2d9e1753c38b2c4ee9c7819f3
2019-01-21 18:18:16 +01:00
Haik Aftandilian
f6ee38ea4d Bug 1521167 [Mac] Sandbox violation logging is always enabled with early startup r=Alex_Gaynor
For sandbox early startup, ensure violation logging is only enabled when the parent passes the -sbLogging flag.

Differential Revision: https://phabricator.services.mozilla.com/D17013

--HG--
extra : moz-landing-system : lando
2019-01-22 14:00:27 +00:00
Tom Ritter
9666744312 Bug 1520310 - Disable SANDBOX_EXPORTS for the mingw-clang build as well r=bobowen 2019-01-21 11:42:03 -06:00
Cosmin Sabou
951d31e64d Merge mozilla-inbound to mozilla-central. a=merge 2019-01-22 05:56:10 +02:00
Tom Ritter
77cce78dd3 Bug 1520310 - Backout the patch from Bug 1498695 and cast to void*. r=bobowen
In Bug 1462100 we started casting to void* because mingw doesn't do
automatic conversions like MSVC does.  In Bug 1498695 I backed out that
change because I (mistakenly) thought it wasn't necessary for mingw-clang
when in actuality, I simply wasn't hitting the code path due to
SANDBOX_EXPORTS being defined.

Since we want to _not_ define SANDBOX_EXPORTS I need to put the original
patch back in place.

--HG--
extra : amend_source : a26eec746e7881fa88b963c8dd3c1fa900b6a8b6
2019-01-21 14:13:17 -06:00
Noemi Erli
92a09b4912 Backed out changeset d8e4a86e306a (bug 1520310) for bustages in filesystem_dispatcher.cc 2019-01-21 21:47:43 +02:00
Tom Ritter
aaa41182a0 Bug 1520310 - Disable SANDBOX_EXPORTS for the mingw-clang build as well r=bobowen
--HG--
extra : amend_source : 3fd0fda02e8d7fabef0657fb3be520e37d59e97d
2019-01-21 11:42:03 -06:00
Ehsan Akhgari
4137a92662 Bug 1514340 - Part 2: Break out the content blocking related notifications into nsIWebProgressListener.onContentBlockingEvent(); r=baku,johannh
Differential Revision: https://phabricator.services.mozilla.com/D16052
2019-01-21 09:58:50 -05:00
Valentin Gosu
75ba4e1542 Bug 1513458 - Add more specific MOZ_DIAGNOSTIC_ASSERTS to TransportSecurityInfo::Read in order to pinpoint crashes r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D16828

--HG--
extra : moz-landing-system : lando
2019-01-21 18:12:12 +00:00
Cosmin Sabou
7ccc9d8b0b Merge mozilla-inbound to mozilla-central. a=merge 2019-01-19 11:57:49 +02:00
J.C. Jones
55f31ee1a6 Bug 1512719 - land NSS da45424cb9a0 UPGRADE_NSS_RELEASE, r=me
--HG--
extra : rebase_source : 982b8538e03e4e0c87d4354629dfbf5bbce3f918
2019-01-18 17:48:59 +00:00
Jared Wein
856c566817 Bug 1520865 - Use the return value of Array.concat when building the list of nodes that are being localized before window.sizeToContent. r=Gijs
Differential Revision: https://phabricator.services.mozilla.com/D16887

--HG--
extra : moz-landing-system : lando
2019-01-17 23:16:36 +00:00
ffxbld
9de89e0706 No Bug, mozilla-central repo-update HSTS HPKP blocklist remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D16819

--HG--
extra : moz-landing-system : lando
2019-01-17 13:27:23 +00:00
Jared Wein
e79eecd7af Bug 1518786 - Wait until Fluent strings have been applied before sizing the window to content. r=Gijs
Differential Revision: https://phabricator.services.mozilla.com/D16587

--HG--
extra : moz-landing-system : lando
2019-01-16 20:56:55 +00:00
ui.manish
37bbffd19c Bug 1346298 Update or Remove Telemetry Probe: SSL_OBSERVED_END_ENTITY_CERTIFICATE_LIFETIME r=jcj
Differential Revision: https://phabricator.services.mozilla.com/D16631

--HG--
extra : moz-landing-system : lando
2019-01-16 19:35:05 +00:00
Dana Keeler
f1b40f3220 bug 1519492 - reorganize NSSCertDBTrustDomain::FindIssuer to facilitate future improvements r=jcj
Before this patch, NSSCertDBTrustDomain::FindIssuer would iterate over its
candidate list (a CERTCertList) twice. This would have made it difficult to add
in candidate issuers from other sources (see e.g. bug 1514118, wherein the goal
is to bypass NSS' view of what certificates exist to facilitate third
party/enterprise roots). This patch reorganizes this function to make future
improvements easier.

Differential Revision: https://phabricator.services.mozilla.com/D16341

--HG--
extra : moz-landing-system : lando
2019-01-15 23:34:44 +00:00
J.C. Jones
cf499123c2 Bug 657228: Preload all known intermediate certificates for CAs in our root store r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D12115

--HG--
extra : moz-landing-system : lando
2019-01-15 21:23:31 +00:00
Dorel Luca
51fd390584 Backed out changeset cac9133e5572 (bug 657228) for xpcshell failure in security/manager/ssl/tests/unit/test_intermediate_preloads.js. CLOSED TREE 2019-01-15 22:55:14 +02:00
J.C. Jones
52a65b0c4c Bug 657228: Preload all known intermediate certificates for CAs in our root store r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D12115

--HG--
extra : moz-landing-system : lando
2019-01-15 18:32:47 +00:00
Oana Pop Rus
c42c2ac75f Merge mozilla-central to autoland. a=merge CLOSED TREE 2019-01-15 11:39:31 +02:00
Franziskus Kiefer
81355de44a Bug 1508936 - Fix conversion to wide characters in OSReauthenticator r=keeler,mhowell
Fix conversion to wide characters in OSReauthenticator

Differential Revision: https://phabricator.services.mozilla.com/D12727

--HG--
extra : moz-landing-system : lando
2019-01-15 01:21:00 +00:00
ffxbld
b78c9b6665 No Bug, mozilla-central repo-update HSTS HPKP blocklist remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D16453

--HG--
extra : moz-landing-system : lando
2019-01-14 13:28:46 +00:00
Dana Keeler
9b29562c1f bug 1518679 - install 32-bit libsecret so secret storage tests can use libsecret on 32-bit test systems r=jmaher
Differential Revision: https://phabricator.services.mozilla.com/D16085

--HG--
extra : moz-landing-system : lando
2019-01-09 22:43:10 +00:00
Dana Keeler
a523734aa1 bug 1517337 - make secret overwriting consistent across backends r=jcj
As originally written, the keychain-backed secret storing implementation would
not overwrite a secret if prompted to generate or recover one with a label that
was already in use. Since libsecret and credential manager both do this by
default, this change makes the keychain-backed implementation behave the same
way.

Differential Revision: https://phabricator.services.mozilla.com/D15697

--HG--
extra : moz-landing-system : lando
2019-01-09 18:25:46 +00:00
Ehsan Akhgari
e5e885ae31 Bug 1521000 - Part 2: Adjust our clang-format rules to include spaces after the hash for nested preprocessor directives r=sylvestre
# ignore-this-changeset

--HG--
extra : amend_source : 7221c8d15a765df71171099468e7c7faa648f37c
extra : histedit_source : a0cce6015636202bff09e35a13f72e03257a7695
2019-01-18 10:16:18 +01:00
Ehsan Akhgari
06c3d29113 Bug 1521000 - Part 1: Reformat the tree to ensure everything is formatted correctly with clang-format r=sylvestre
Summary: # ignore-this-changeset

Reviewers: sylvestre

Reviewed By: sylvestre

Subscribers: reviewbot, emilio, jandem, bbouvier, karlt, jya

Bug #: 1521000

Differential Revision: https://phabricator.services.mozilla.com/D16936

--HG--
extra : histedit_source : 4add583bfa729ccc1aef934629ed45ff095189b0
2019-01-18 10:12:56 +01:00
Ehsan Akhgari
a0455cf9bc Bug 1517136 - Devirtualize and inline the calls in nsSecureBrowserUIImpl::CheckForBlockedContent(); r=baku
Differential Revision: https://phabricator.services.mozilla.com/D15574
2019-01-07 17:56:07 -05:00
Neil Deakin
cb10352f4b Bug 1482389, replace TreeBoxObject with XULTreeElement inherited from XULElement, r=peterv,paolo
--HG--
rename : dom/webidl/TreeBoxObject.webidl => dom/chrome-webidl/XULTreeElement.webidl
rename : layout/xul/tree/TreeBoxObject.cpp => dom/xul/XULTreeElement.cpp
rename : layout/xul/tree/TreeBoxObject.h => dom/xul/XULTreeElement.h
2018-12-04 11:25:30 -05:00
Gian-Carlo Pascutto
2ea3add3ad Bug 1511099 - Make MAY_CREATE handling more consistent. r=jld
Differential Revision: https://phabricator.services.mozilla.com/D13523

--HG--
extra : moz-landing-system : lando
2019-01-07 15:21:32 +00:00
ffxbld
20300bbf03 No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D15837

--HG--
extra : moz-landing-system : lando
2019-01-07 14:34:21 +00:00
Ciure Andrei
a8af06aea2 Merge inbound to mozilla-central. a=merge 2019-01-04 00:04:46 +02:00
Kyle Machulis
030ac758f5 Bug 1095602 - Remove STATE_SECURE flags from nsIWebProgressListener; r=Ehsan
Only STATE_SECURE_HIGH is used, and that's only in instances where
STATE_IS_SECURE is also used, so we can remove the security level
flags and just assume STATE_IS_SECURE is also STATE_SECURE_HIGH.

Differential Revision: https://phabricator.services.mozilla.com/D15600

--HG--
extra : moz-landing-system : lando
2019-01-03 17:35:48 +00:00
ffxbld
4bef5d51fd No Bug, mozilla-central repo-update HSTS HPKP blocklist remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D15643

--HG--
extra : moz-landing-system : lando
2019-01-03 13:39:23 +00:00
Dana Keeler
74e6b5cabe bug 1498909 - dynamically load libsecret at runtime if available r=franziskus,jcj
Enough linux-based systems don't have libsecret that we can't make it a
requirement on linux. For those that do, however, we can dynamically load the
library at runtime. For those that don't, we can fall back to NSS.

Differential Revision: https://phabricator.services.mozilla.com/D9969

--HG--
extra : moz-landing-system : lando
2019-01-03 00:39:45 +00:00