Commit Graph

9656 Commits

Author SHA1 Message Date
Bob Owen
2e341f2ff1 Bug 1177594: Use a USER_RESTRICTED token level on GMP process when integrity levels are available. r=cpearce 2015-06-26 14:19:12 +01:00
Ryan VanderMeulen
5f5c327690 Backed out changeset 8b4e4083639e (bug 1171931) for B2G debug emulator bustage. 2015-06-25 19:48:42 -04:00
Juan Gomez
702a59d135 Bug 1171931 - Refactor duplicated code using XRE_IsParent/ContentProcess. r=froydnj
--HG--
extra : rebase_source : 2ecbe6c1dd8a7ad8dc529b53349ad431cf1116c9
2015-06-24 14:11:00 -04:00
Carsten "Tomcat" Book
87e3154dff merge mozilla-inbound to mozilla-central a=merge 2015-06-22 14:03:17 +02:00
Ryan VanderMeulen
2ff7670bf1 Bug 1029775 - Skip test_ocsp_stapling_expired.js on B2G debug for frequent intermittent failures.
--HG--
extra : rebase_source : 3eb53f648d6663ca0f3f1380eb8a81b66a491d1a
2015-06-21 21:22:08 -04:00
ffxbld
94d833221d No bug, Automated HPKP preload list update from host bld-linux64-spot-224 - a=hpkp-update 2015-06-20 03:33:00 -07:00
ffxbld
1a89ffacb7 No bug, Automated HSTS preload list update from host bld-linux64-spot-224 - a=hsts-update 2015-06-20 03:32:58 -07:00
Ryan VanderMeulen
42deb0e71d Bug 1176097 - Update NSS to NSS_3_19_2_RTM.
--HG--
extra : rebase_source : c668a4f77efd06e5914b69d06f5a2eab4233f9f3
2015-06-19 14:01:18 -04:00
Bob Owen
cc27f74877 Bug 1172388: Use a USER_RESTRICTED access level token on Windows 10. r=cpearce 2015-06-19 23:35:43 +01:00
Jed Davis
1fb9a20a64 Bug 1176085 - Fix second/nanosecond confusion in Linux sandbox start error case. r=kang
--HG--
extra : amend_source : e546416d9c058305f4cb00d1c015daaec8ab1362
2015-06-19 14:26:44 -07:00
Benoit Girard
8d6a67f6d3 Bug 1172216 - Move nsStackwalk to mozglue. r=glandium
--HG--
rename : xpcom/base/nsStackWalk.cpp => mozglue/misc/StackWalk.cpp
rename : xpcom/base/nsStackWalk.h => mozglue/misc/StackWalk.h
extra : commitid : EMbWGfjKvdq
extra : rebase_source : b7308eb569cc1a019d3b7a92aaff0de7a49b5682
2015-06-10 16:32:45 -04:00
Bob Owen
bef4807107 Bug 1165895: Add NPAPI sandbox rule for the crash server pipe and x64 Temp dir write access. r=bbondy 2015-06-18 12:01:38 +01:00
Masatoshi Kimura
e287cf641e Bug 1165549 - Update fallback whitelist. r=keeler 2015-06-17 20:52:33 +09:00
David Keeler
fdaeee62c1 bug 1173565 - convert test_pinning_dynamic.js to generate certificates at build time r=Cykesiopka
Also fixes up references to test_pinning_dynamic certificates in test_pinning_header_parsing.js
2015-06-09 10:35:47 -07:00
Cykesiopka
cfd306a839 Bug 1171820 - Convert test_bug483440.html mochitest to an xpcshell test. r=keeler
--HG--
rename : security/manager/ssl/tests/mochitest/bugs/test_bug483440.html => security/manager/ssl/tests/unit/test_certviewer_invalid_oids.js
rename : build/pgo/certs/bug483440-attack2b.ca => security/manager/ssl/tests/unit/test_certviewer_invalid_oids/bug483440-attack2b.pem
rename : build/pgo/certs/bug483440-attack7.ca => security/manager/ssl/tests/unit/test_certviewer_invalid_oids/bug483440-attack7.pem
rename : build/pgo/certs/bug483440-pk10oflo.ca => security/manager/ssl/tests/unit/test_certviewer_invalid_oids/bug483440-pk10oflo.pem
2015-06-13 00:51:00 +02:00
Birunthan Mohanathas
0544e6bf2c Bug 1164714 - Move netwerk/test/TestSTSParser.cpp into security/manager/ssl/tests/. r=keeler
--HG--
rename : netwerk/test/TestSTSParser.cpp => security/manager/ssl/tests/compiled/TestSTSParser.cpp
2015-06-14 21:37:12 -07:00
David Keeler
fe26522550 bug 1172615 - check for and return early in the case of authentication bypass in AuthCertificateHook r=mcmanus
--HG--
extra : amend_source : 305df6e1ea028333d3077653f3e3fc098f40dd3f
2015-06-08 13:18:23 -07:00
Jed Davis
8ac1db457e Bug 1168555 - Work around Nuwa not always being single-threaded when a normal content process is. r=kang 2015-06-10 13:38:00 -04:00
Kai Engert
4de03b092c Bug 1174102 - Update to NSS 3.19.2, landing NSS_3_19_2_BETA1, r=nss-confcall 2015-06-12 11:10:17 +02:00
Cykesiopka
c7d8bf951d Bug 1171819 - Convert test_cert_eku-*.js to generate certificates at build time. r=keeler
--HG--
extra : rebase_source : a683669da992833336c6aa03961b143d428ee0b7
2015-06-10 22:50:00 +02:00
Mike Perry
1c707fb2d0 Bug 629558 - Pref to make Intermediate Cert Store memory-only. r=keeler
--HG--
extra : rebase_source : 2678d1f74624fe1aa7db44053647a39fb8c8f8dc
2015-06-10 14:14:00 +02:00
Atul Kumar
246d750391 Bug 1136301 - Null check for mCert->slot added in destructorSafeDestroyNSSReference & MarkForPermDeletion. Formatting update in MarkForPermDeletion. r=keeler 2015-06-10 09:46:16 -07:00
David Keeler
d67edd7f93 bug 1170303 - treat malformed name information in certificates as a domain name mismatch r=Cykesiopka 2015-06-01 13:55:23 -07:00
David Keeler
9091a35bfb bug 1171557 - make test_cert_trust.js certs a bit more realistic r=mgoodwin
According to the Baseline Requirements, root certificates MUST NOT
have the extendedKeyUsage extension. The extension is optional for
intermediates and required for end-entity certificates. This change
modifies the test certificates so they're more in line with the BRs.
2015-06-03 15:37:38 -07:00
David Keeler
c3704cadb3 bug 1171557 - convert test_cert_trust.js to generate certificates at build time r=mgoodwin 2015-06-03 15:12:00 -07:00
Eric Rahm
6ac04795af Bug 1145893 - Shutdown nsNSSComponent background threads during xpcom-shutdown. r=keeler, a=me 2015-03-23 10:58:25 -07:00
Richard Barnes
8a4bc22436 Bug 1010068 - Disable OCSP for DV certificates in Firefox for Android r=keeler 2015-05-28 13:29:13 -07:00
Ryan VanderMeulen
56574135d1 Backed out changeset fda85020d842 (bug 1010068) for Android test_cert_overrides.js failures.
CLOSED TREE
2015-06-08 11:37:33 -04:00
Richard Barnes
3824033dee Bug 1010068 - Disable OCSP for DV certificates in Firefox for Android r=keeler 2015-05-28 13:29:13 -07:00
Carsten "Tomcat" Book
ac2974150a merge mozilla-inbound to mozilla-central a=merge 2015-06-08 11:55:30 +02:00
ffxbld
9df7fce9a4 No bug, Automated HPKP preload list update from host bld-linux64-spot-1061 - a=hpkp-update 2015-06-06 03:26:59 -07:00
ffxbld
671e873521 No bug, Automated HSTS preload list update from host bld-linux64-spot-1061 - a=hsts-update 2015-06-06 03:26:57 -07:00
Jed Davis
9db695d73b Bug 1055310 - Step 3: Move syscall interceptions into SandboxFilter.cpp. r=kang
We can now keep the part of the policy implemented by upcalls to
userspace in the same place as the part of the policy that's handled
entirely in the kernel.  This will become more useful in the future
(e.g., bug 930258).
2015-06-05 15:17:40 -07:00
Jed Davis
5e4e0f9184 Bug 1055310 - Step 2: Move SIGSYS handling to Chromium TrapRegistry. r=kang
This is more complicated than I'd like it to be, because we don't have
a good way to combine a specific trap function's knowledge that we want
to get a crash dump with the SIGSYS handler's copy of the unprocessed
signal info (which breakpad wants).  The bpf_dsl interface requires a
specific trap function type (via the TrapRegistry superclass), so even
if we implement our own registry we can't change what's passed to it.
Normally we could use thread-local storage to get around that, but it's
not async signal safe.

As a result there is an imperfect compromise: the trap function returns
a failure with ENOSYS, Chromium's SIGSYS handler writes it into the
context, our SIGSYS handler reads it back out and uses a copy of
the original signal context for the crash dump.  Other error codes
(and returning ENOSYS via the seccomp-bpf policy itself) are handled
normally.
2015-06-05 15:17:35 -07:00
Jed Davis
3bd337c32c Bug 1055310 - Step 1: Convert seccomp-bpf policies to Chromium PolicyCompiler. r=kang
This completely rewrites SandboxFilter.cpp and removes SandboxAssembler.
System calls are now loosely grouped by what they do, now that order
doesn't matter, and most of the intersection the content and media
plugin whitelists is moved into a common superclass.  Hopefully this
improves the readability and comprehensibility of the syscall policies.

Also, the macros that take the syscall name are gone, because a plain
case label usually suffices now (the CASES_FOR_thing macros are a little
unsightly, but they're relatively simple), and at one point we saw
strange macro expansion issues with system header files that #define'd
some syscall names.

The signal handling is not migrated yet, so Trap() actions can't be used
yet; the next patch will take care of that, and to keep the intermediate
state working there's a minimal shim.

Bonus fix: non-const global variables use the "g" prefix; "s" is for
static class members and static variables in a function (where the
default is to allocate a separate copy per instance/activation).
2015-06-05 15:17:32 -07:00
David Keeler
1658fa2a61 bug 969985 - cleanup of test_certificate_usages.js - see the rest of this commit message r=mgoodwin
Converts test_certificate_usages.js to generate certificates at build time.
Also does miscellaneous cleanup to use modern JS practices.
Since the test_cert_eku-* suite of tests covers the extended key usage extension,
removes superfluous testcases involving EKU.
Finally, renames test_certificate_usages.js to test_cert_keyUsage.js for a more
consistent naming scheme.

--HG--
rename : security/manager/ssl/tests/unit/test_certificate_usages.js => security/manager/ssl/tests/unit/test_cert_keyUsage.js
2015-06-02 10:58:59 -07:00
Eric Rahm
75c4bebb79 Bug 1165515 - Part 13-2: Replace usage of PRLogModuleLevel and PR_LOG_*. rs=froydnj
This is straightforward mapping of PR_LOG levels to their LogLevel
counterparts:
  PR_LOG_ERROR   -> LogLevel::Error
  PR_LOG_WARNING -> LogLevel::Warning
  PR_LOG_WARN    -> LogLevel::Warning
  PR_LOG_INFO    -> LogLevel::Info
  PR_LOG_DEBUG   -> LogLevel::Debug
  PR_LOG_NOTICE  -> LogLevel::Debug
  PR_LOG_VERBOSE -> LogLevel::Verbose

Instances of PRLogModuleLevel were mapped to a fully qualified
mozilla::LogLevel, instances of PR_LOG levels in #defines were mapped to a
fully qualified mozilla::LogLevel::* level, and all other instances were
mapped to us a shorter format of LogLevel::*.

Bustage for usage of the non-fully qualified LogLevel were fixed by adding
|using mozilla::LogLevel;| where appropriate.
2015-06-03 15:25:57 -07:00
Eric Rahm
67f6de2a30 Bug 1165515 - Part 9: Remove instances of using numeric log levels 1-5. rs=froydnj 2015-06-03 15:22:35 -07:00
Eric Rahm
cc58068318 Bug 1165515 - Part 5: Convert instances of PR_LOG_ALWAYS. r=froydnj
Most instances were converted to PR_LOG_INFO, some to PR_LOG_DEBUG, and some
to PR_LOG_ERROR.
2015-06-03 15:22:30 -07:00
Eric Rahm
f50b813989 Bug 1165515 - Part 3: Convert PR_LOG_TEST to MOZ_LOG_TEST. r=froydnj 2015-06-03 15:22:28 -07:00
Cykesiopka
0d334e23eb Bug 1169195 - Convert test_bug644006.html mochitest to an xpcshell test. r=keeler
--HG--
rename : security/manager/ssl/tests/mochitest/bugs/test_bug644006.html => security/manager/ssl/tests/unit/test_constructX509FromBase64.js
2015-06-02 22:49:00 -04:00
Bob Owen
07490a1951 Bug 1166669: Enable process-level mitigations for the Windows content process sandbox. r=tabraldes 2015-06-03 09:13:00 +01:00
Nicholas Nethercote
e849e6588b Bug 1170416 (part 3) - Remove the PLDHashTable2 typedef. r=froydnj.
--HG--
extra : rebase_source : 9510ea47204fffa163cac43aeaaac6ae1ad80419
2015-05-19 16:46:17 -07:00
Mike Hommey
d060bd3d86 Bug 1170431 - Pass buildid as input to pycert.py. r=gps 2015-06-03 07:10:25 +09:00
Mike Hommey
79ea9f2368 Bug 1170431 part 0 - Use the *Path classes for GENERATED_FILES scripts and inputs. r=gps 2015-06-03 07:10:12 +09:00
Carsten "Tomcat" Book
5471309381 Backed out 14 changesets (bug 1165515) for linux x64 e10s m2 test failures
Backed out changeset d68dcf2ef372 (bug 1165515)
Backed out changeset 7c3b45a47811 (bug 1165515)
Backed out changeset b668b617bef2 (bug 1165515)
Backed out changeset d0916e1283a2 (bug 1165515)
Backed out changeset ac4dc7489942 (bug 1165515)
Backed out changeset e9632ce8bc65 (bug 1165515)
Backed out changeset c16d215cc7e4 (bug 1165515)
Backed out changeset e4d474f3c51a (bug 1165515)
Backed out changeset d87680bf9f7c (bug 1165515)
Backed out changeset b3c0a45ba99e (bug 1165515)
Backed out changeset 9370fa197674 (bug 1165515)
Backed out changeset 50970d668ca1 (bug 1165515)
Backed out changeset ffa4eb6d24b9 (bug 1165515)
Backed out changeset 5fcf1203cc1d (bug 1165515)

--HG--
extra : rebase_source : 6fb850d063cbabe738f97f0380302153e3eae97a
2015-06-02 13:05:56 +02:00
Eric Rahm
a9afd68cef Bug 1165515 - Part 13-2: Replace usage of PRLogModuleLevel and PR_LOG_*. rs=froydnj
This is straightforward mapping of PR_LOG levels to their LogLevel
counterparts:
  PR_LOG_ERROR   -> LogLevel::Error
  PR_LOG_WARNING -> LogLevel::Warning
  PR_LOG_WARN    -> LogLevel::Warning
  PR_LOG_INFO    -> LogLevel::Info
  PR_LOG_DEBUG   -> LogLevel::Debug
  PR_LOG_NOTICE  -> LogLevel::Debug
  PR_LOG_VERBOSE -> LogLevel::Verbose

Instances of PRLogModuleLevel were mapped to a fully qualified
mozilla::LogLevel, instances of PR_LOG levels in #defines were mapped to a
fully qualified mozilla::LogLevel::* level, and all other instances were
mapped to us a shorter format of LogLevel::*.

Bustage for usage of the non-fully qualified LogLevel were fixed by adding
|using mozilla::LogLevel;| where appropriate.
2015-06-01 22:17:33 -07:00
Eric Rahm
fb40eb5516 Bug 1165515 - Part 9: Remove instances of using numeric log levels 1-5. rs=froydnj 2015-06-01 22:17:26 -07:00
Eric Rahm
28978ade8c Bug 1165515 - Part 5: Convert instances of PR_LOG_ALWAYS. r=froydnj
Most instances were converted to PR_LOG_INFO, some to PR_LOG_DEBUG, and some
to PR_LOG_ERROR.
2015-06-01 22:17:21 -07:00
Eric Rahm
141e0ff4a2 Bug 1165515 - Part 3: Convert PR_LOG_TEST to MOZ_LOG_TEST. r=froydnj 2015-06-01 22:17:19 -07:00