Commit Graph

14848 Commits

Author SHA1 Message Date
Andreea Pavel
aa258365a2 Backed out changeset 2e0c2fea2799 (bug 1577428) linting doc failure on a CLOSED TREE
--HG--
rename : security/manager/ssl/tests/unit/test_allow_all_cert_errors.js => security/manager/ssl/tests/unit/test_js_cert_override_service.js
2019-09-03 18:25:52 +03:00
Kershaw Chang
f7c12de97f Bug 1577428 - Not allow nsICertOverrideService to be implemented in js r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D43931

--HG--
rename : security/manager/ssl/tests/unit/test_js_cert_override_service.js => security/manager/ssl/tests/unit/test_allow_all_cert_errors.js
extra : moz-landing-system : lando
2019-09-02 17:03:38 +00:00
Bob Owen
17bddfd388 Bug 1575906: Allow the GMP process to duplicate Section handles to the main process. r=handyman
Differential Revision: https://phabricator.services.mozilla.com/D44237

--HG--
extra : moz-landing-system : lando
2019-08-30 21:39:57 +00:00
J.C. Jones
61fc016d4c Bug 1564499 - land NSS NSS_3_46_RTM UPGRADE_NSS_RELEASE, r=kjacobs
2019-08-30  J.C. Jones  <jjones@mozilla.com>

	* lib/nss/nss.h, lib/softoken/softkver.h, lib/util/nssutil.h:
	Set version numbers to 3.46 final
	[decbf7bd40fd] [NSS_3_46_RTM]

2019-08-27  J.C. Jones  <jjones@mozilla.com>

	* .hgtags:
	Added tag NSS_3_46_BETA2 for changeset 24b0fc700203
	[29cd579e74e4]

Differential Revision: https://phabricator.services.mozilla.com/D44206

--HG--
extra : moz-landing-system : lando
2019-08-30 16:34:27 +00:00
ffxbld
3b375c8b7b No Bug, mozilla-central repo-update HSTS HPKP blocklist remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D43967

--HG--
extra : moz-landing-system : lando
2019-08-29 13:14:59 +00:00
Barret Rennie
b0cbc31990 Bug 1510569 - Implement serializers for nsITransportSecurityInfo, nsIX509Cert, and nsIX509CertList r=froydnj,keeler,mayhemer
As part of the ongoing effort to port the nsIWebProgress events from
RemoteWebProgress / WebProgressChild to BrowserParent / BrowserChild, we need
to (de)serialize the nsITransportSecurityInfo instance across the IPC layer.
The existing code was calling `NS_SerializeToString` which has the overhead of
(a) allocating a buffer and also performing base64 encoding/decoding. This
patch adds `IPC::ParamTraits` implementations for `nsITransportSecurityInfo`,
`nsIX509Certificate`, and `nsIX509CertList` that (de)serializes the params
directly onto and off of the IPC message so that we don't go through the
overhead of allocating and encoding/decoding an additional buffer.

This (de)serialization will address the performance issues present in the
current implementation.

As a side effect, I also make nsITransportSecurityInfo a builtinclass XPCOM
interface, since the existing serialization code was assuming it was, there is
only one implementation, and it is in C++.

Differential Revision: https://phabricator.services.mozilla.com/D35090

--HG--
extra : moz-landing-system : lando
2019-08-28 18:55:31 +00:00
Dorel Luca
b09fe526aa Backed out 4 changesets (bug 1510569) for build bustage. CLOSED TREE
Backed out changeset d7db6a1935ce (bug 1510569)
Backed out changeset 03b7cf756a7f (bug 1510569)
Backed out changeset fa318eec0e76 (bug 1510569)
Backed out changeset cecb17bd8c03 (bug 1510569)
2019-08-28 21:46:40 +03:00
Barret Rennie
4ab0fd7d38 Bug 1510569 - Implement serializers for nsITransportSecurityInfo, nsIX509Cert, and nsIX509CertList r=froydnj,keeler,mayhemer
As part of the ongoing effort to port the nsIWebProgress events from
RemoteWebProgress / WebProgressChild to BrowserParent / BrowserChild, we need
to (de)serialize the nsITransportSecurityInfo instance across the IPC layer.
The existing code was calling `NS_SerializeToString` which has the overhead of
(a) allocating a buffer and also performing base64 encoding/decoding. This
patch adds `IPC::ParamTraits` implementations for `nsITransportSecurityInfo`,
`nsIX509Certificate`, and `nsIX509CertList` that (de)serializes the params
directly onto and off of the IPC message so that we don't go through the
overhead of allocating and encoding/decoding an additional buffer.

This (de)serialization will address the performance issues present in the
current implementation.

As a side effect, I also make nsITransportSecurityInfo a builtinclass XPCOM
interface, since the existing serialization code was assuming it was, there is
only one implementation, and it is in C++.

Differential Revision: https://phabricator.services.mozilla.com/D35090

--HG--
extra : moz-landing-system : lando
2019-08-28 18:00:16 +00:00
J.C. Jones
95ca91b62f Bug 1564499 - land NSS NSS_3_46_BETA2 UPGRADE_NSS_RELEASE, r=kjacobs
2019-08-27  Kevin Jacobs  <kjacobs@mozilla.com>

        * automation/taskcluster/graph/src/extend.js,
        automation/taskcluster/scripts/build_gyp.sh,
        automation/taskcluster/windows/build_gyp.sh, fuzz/fuzz.gyp,
        gtests/pk11_gtest/pk11_gtest.gyp,
        gtests/softoken_gtest/softoken_gtest.gyp, tests/all.sh,
        tests/ssl/ssl.sh:
        Bug 1485533 - Close gaps in taskcluster SSL testing. r=mt

        This patch increases SSL testing on taskcluster, specifically,
        running an additional 395 tests on each SSL cycle (more for FIPS
        targets), and adding a new 'stress' cycle.

        Notable changes:

        1) This patch removes SSL stress tests from the default
        `NSS_SSL_RUN` list in all.sh and ssl.sh. If stress tests are needed,
        this variable must be set to include.

        2) The "normal_normal" case is added to `NSS_SSL_TESTS` for all
        targets. FIPS targets also run "normal_fips", "fips_normal", and
        "fips_fips".

        3) `--enable-libpkix` is now set for all taskcluster "build.sh"
        builds in order to support a number of OCSP tests that were
        previously not run.

        [24b0fc700203] [NSS_3_46_BETA2]

2019-08-23  Edouard Oger  <eoger@fastmail.com>

        * lib/sqlite/Makefile, lib/sqlite/sqlite.gyp:
        Bug 1549847 - Ignore sqlite compilation warnings. r=mt

        [7f146eb7adac]

2019-08-23  J.C. Jones  <jjones@mozilla.com>

        * .hgtags:
        Added tag NSS_3_46_BETA1 for changeset 44aa330de2aa
        [d3035cc9dc73]

Differential Revision: https://phabricator.services.mozilla.com/D43724

--HG--
extra : moz-landing-system : lando
2019-08-28 14:30:55 +00:00
Sylvestre Ledru
d264b841c9 Bug 1576502 - Fix some wording issues r=mhoye
Differential Revision: https://phabricator.services.mozilla.com/D43363

--HG--
extra : moz-landing-system : lando
2019-08-27 15:38:58 +00:00
ffxbld
36f90d0df0 No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D43457

--HG--
extra : moz-landing-system : lando
2019-08-26 14:49:18 +00:00
Ciure Andrei
0a6d4a24f8 Merge inbound to mozilla-central. a=merge 2019-08-24 12:51:09 +03:00
Alex Vincent
cec0c5cbdb Bug 1508169, Remove performAction* from nsITreeView.idl in mozilla-central. r=peterv, johannh
performAction, performActionOnRow and performActionOnCell are methods of the
nsITreeView interface that are never called.  This is to remove these methods.
A comm-central patch will be along shortly.

Differential Revision: https://phabricator.services.mozilla.com/D39273
2019-08-24 00:49:55 +02:00
J.C. Jones
73f0968aaa Bug 1564499 - land NSS NSS_3_46_BETA1 UPGRADE_NSS_RELEASE, r=kjacobs
2019-08-23  Kevin Jacobs  <kjacobs@mozilla.com>

	* tests/common/cleanup.sh:
	Bug 1560593 - Check that BUILD_OPT is defined before testing its
	value. r=jcj

	[44aa330de2aa] [NSS_3_46_BETA1]

	* cmd/strsclnt/strsclnt.c:
	Bug 1575968 - Add strsclnt option to enforce the use of either IPv4
	or IPv6 r=jcj

	[da284d8993ea]

2019-08-23  Marcus Burghardt  <mburghardt@mozilla.com>

	* gtests/softoken_gtest/softoken_gtest.cc:
	Bug 1573942 - Gtest for pkcs11.txt with different breaking line
	formats. r=kjacobs

	[d07a07eb0e40]

2019-08-21  Kevin Jacobs  <kjacobs@mozilla.com>

	* lib/util/utilmod.c:
	Bug 1564284: Added check for CR + LF, r=marcusburghardt,kjacobs

	Looks good and it was already tested locally with this gtest patch:

	[d1d2e1e320cd]

2019-08-22  Martin Thomson  <mt@lowentropy.net>

	* lib/ssl/ssl3con.c:
	Bug 1528666 - Formatting, a=bustage
	[60eeac76c8ec]

2019-08-20  Martin Thomson  <martin.thomson@gmail.com>

	* gtests/ssl_gtest/ssl_0rtt_unittest.cc,
	gtests/ssl_gtest/ssl_resumption_unittest.cc, lib/ssl/ssl3con.c:
	Bug 1528666 - Correct resumption validation checks, r=jcj

	We allowed cross-suite resumption before, but it didn't work. This
	enables that for clients.

	As a secondary minor tweak, clients will no longer validate the
	availability of a cipher suite based on their configured version
	range when attempting resumption. Instead, they will check whether
	the suite works for the version in the session that they are
	attempting to resume. In theory, this doesn't change anything
	because the previous session should not have selected an
	incompatible combination of version and cipher suite, but it's worth
	being extra precise.

	[cab2c8905214]

2019-08-22  Martin Thomson  <mt@lowentropy.net>

	* gtests/ssl_gtest/ssl_auth_unittest.cc,
	gtests/ssl_gtest/ssl_resumption_unittest.cc, lib/ssl/ssl3con.c:
	Bug 1568803 - More tests for client certificate authentication,
	r=kjacobs

	These were previously disabled because of difficulties (at the time)
	in writing these tests for TLS 1.3. The framework, and my
	understanding of it, has since improved, so these tests can be
	restored and expanded. This exposed a minor correctness issue that
	is also corrected.

	[95f97d31c313]

Differential Revision: https://phabricator.services.mozilla.com/D43308

--HG--
extra : moz-landing-system : lando
2019-08-23 22:45:47 +00:00
Gijs Kruitbosch
871832fcf9 Bug 1575564 - avoid non-mainthread use of NS_GetSpecialDirectory in linux sandboxbroker, r=jld,gcp
Differential Revision: https://phabricator.services.mozilla.com/D42951

--HG--
extra : moz-landing-system : lando
2019-08-22 16:37:18 +00:00
ffxbld
409e5b7a75 No Bug, mozilla-central repo-update HSTS HPKP blocklist remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D43052

--HG--
extra : moz-landing-system : lando
2019-08-22 13:43:50 +00:00
Mike Hommey
66d7fe943e Bug 1575420 - Replace MOZ_WIDGET_TOOLKIT value of "gtk3" with "gtk". r=froydnj
Differential Revision: https://phabricator.services.mozilla.com/D42765

--HG--
extra : moz-landing-system : lando
2019-08-21 12:25:42 +00:00
Oana Pop Rus
3223cd3dc2 Backed out 4 changesets (bug 1510569) for causing build bustage on a CLOSED TREE
Backed out changeset eae555c11f25 (bug 1510569)
Backed out changeset 2fb8938d16db (bug 1510569)
Backed out changeset b480af862022 (bug 1510569)
Backed out changeset 642cd6323cdc (bug 1510569)
2019-08-21 22:55:43 +03:00
Haik Aftandilian
3ad0ca9116 Bug 1570581 - Starting with Firefox 68.0.1, Adobe Acrobat Extension for Firefox fails to send apple events to target application (Acrobat) r=handyman
Relax our Hardened Runtime settings to allow the com.apple.security.automation.apple-events entitlement so that native messaging webextension helper apps (which are launched by and are child processes of Firefox) can use Apple Events to signal other processes. This will apply to Firefox and all child processes.

Differential Revision: https://phabricator.services.mozilla.com/D42929

--HG--
extra : moz-landing-system : lando
2019-08-21 18:42:55 +00:00
Geoff Brown
b7e778a5ea Bug 1554276 - Disable xpcshell test_certDB_import.js and test_certDB_import_with_master_password.js on geckoview; r=snorp
With these last two tests skipped we can run xpcshell tests against geckoview builds.

Differential Revision: https://phabricator.services.mozilla.com/D42893

--HG--
extra : moz-landing-system : lando
2019-08-21 18:24:47 +00:00
Barret Rennie
d8a4453540 Bug 1510569 - Implement serializers for nsITransportSecurityInfo, nsIX509Cert, and nsIX509CertList r=froydnj,keeler
As part of the ongoing effort to port the nsIWebProgress events from
RemoteWebProgress / WebProgressChild to BrowserParent / BrowserChild, we need
to (de)serialize the nsITransportSecurityInfo instance across the IPC layer.
The existing code was calling `NS_SerializeToString` which has the overhead of
(a) allocating a buffer and also performing base64 encoding/decoding. This
patch adds `IPC::ParamTraits` implementations for `nsITransportSecurityInfo`,
`nsIX509Certificate`, and `nsIX509CertList` that (de)serializes the params
directly onto and off of the IPC message so that we don't go through the
overhead of allocating and encoding/decoding an additional buffer.

This (de)serialization will address the performance issues present in the
current implementation.

As a side effect, I also make nsITransportSecurityInfo a builtinclass XPCOM
interface, since the existing serialization code was assuming it was, there is
only one implementation, and it is in C++.

Differential Revision: https://phabricator.services.mozilla.com/D35090

--HG--
extra : moz-landing-system : lando
2019-08-21 18:24:56 +00:00
J.C. Jones
6d66ec3bef Bug 1564499 - land NSS eeb9a6715a93 UPGRADE_NSS_RELEASE, r=kjacobs
2019-08-20  Marcus Burghardt  <mburghardt@mozilla.com>

	* lib/ckfw/builtins/certdata.txt:
	Bug 1574670 - Remove Expired root certificates - Class 2 Primary,
	UTN-USERFirst-Client, Deutsche Telekom Root CA 2.
	r=jcj,KathleenWilson

	[eeb9a6715a93] [tip]

2019-08-12  Kevin Jacobs  <kjacobs@mozilla.com>

	* lib/softoken/pkcs11c.c:
	Bug 1572164 - Don't unnecessarily free session in NSC_WrapKey r=jcj

	[b306ff3d6f4d]

Differential Revision: https://phabricator.services.mozilla.com/D42768

--HG--
extra : moz-landing-system : lando
2019-08-21 15:56:17 +00:00
Barret Rennie
3f90c2f83f Bug 1564221 - Make nsITransportSecurityInfo builtinclass r=keeler
There are no longer any consumers of the JS-implemented
`FakeTransportSecurityInfo` class, so it can be removed. That removes the last
JS-implemented `nsITransportSecurityInfo` instance and it therefore can be
marked `builtinclass`.

Differential Revision: https://phabricator.services.mozilla.com/D40355

--HG--
extra : moz-landing-system : lando
2019-08-20 21:38:24 +00:00
Barret Rennie
a72079afcb Bug 1564221 - Do not use FakeTransportSecurityInfo in test_sss_resetState.js r=keeler
As part of making `nsITranportSecurityInfo` builtinclass, we can no longer
use JS-implemented `nsITransportSecurityInfo` instances in test cases.
This patch migrates `test_sss_resetState.js` to use `add_connection_test()` to
get a valid `nsITransportSecurityInfo` instance for the unit tests.

Differential Revision: https://phabricator.services.mozilla.com/D40352

--HG--
extra : moz-landing-system : lando
2019-08-20 21:38:19 +00:00
Barret Rennie
85e3659e3d Bug 1564221 - Do not use FakeTransportSecurityInfo in test_sss_originAttributes.js r=keeler
As part of making `nsITranportSecurityInfo` builtinclass, we can no longer use
JS-implemented `nsITransportSecurityInfo` instances in test cases. This patch
migrates `test_sss_originAttributes.js` to use `add_connection_test()` to get a
valid `nsITransportSecurityInfo` instance for the unit tests.

Differential Revision: https://phabricator.services.mozilla.com/D40351

--HG--
extra : moz-landing-system : lando
2019-08-20 21:38:07 +00:00
Barret Rennie
f94a2e2dd7 Bug 1564221 - Do not use FakeTransportSecurityInfo in test_sss_enumerate.js r=keeler
As part of making `nsITranportSecurityInfo` builtinclass, we can no longer
use JS-implemented `nsITransportSecurityInfo` instances in test cases.
This patch migrates `test_sss_enumerate.js` to use `add_connection_test()` to
get a valid `nsITransportSecurityInfo` instance for the unit tests.

Differential Revision: https://phabricator.services.mozilla.com/D40350

--HG--
extra : moz-landing-system : lando
2019-08-20 21:38:04 +00:00
Barret Rennie
e206c0bf71 Bug 1564221 - Do not use FakeTransportSecurityInfo in test_pinning_header_parsing.js r=keeler
As part of making `nsITranportSecurityInfo` builtinclass, we can no longer use
JS-implemented `nsITransportSecurityInfo` instances in test cases. This patch
migrates `test_pinning_header_parsing.js` to use `add_connection_test()` to get
a valid `nsITransportSecurityInfo` instance for the unit tests.

Differential Revision: https://phabricator.services.mozilla.com/D40349

--HG--
extra : moz-landing-system : lando
2019-08-20 21:37:51 +00:00
Barret Rennie
8cbcec1089 Bug 1564221 - Do not use FakeTransportSecurityInfo in test_ocsp_must_staple.js r=keeler
As part of making `nsITranportSecurityInfo` builtinclass, we can no longer use
JS-implemented `nsITransportSecurityInfo` instances in test cases. This patch
migrates `test_ocsp_must_staple.js` to use `add_connection_test()` to get a
valid `nsITransportSecurityInfo` instance for the unit tests.

Differential Revision: https://phabricator.services.mozilla.com/D40348

--HG--
extra : moz-landing-system : lando
2019-08-20 21:37:47 +00:00
Barret Rennie
4fee6b8f31 Bug 1564221 - Do not use FakeTransportSecurityInfo in test_forget_about_site_security_headers.js r=keeler
As part of making `nsITranportSecurityInfo` builtinclass, we can no longer use
JS-implemented `nsITransportSecurityInfo` instances in test cases. This patch
migrates `test_forget_about_site_security_headers.js to use
`add_connection_test()` to get a valid `nsITransportSecurityInfo` instance for
the unit tests.

Differential Revision: https://phabricator.services.mozilla.com/D40347

--HG--
extra : moz-landing-system : lando
2019-08-20 21:37:38 +00:00
Barret Rennie
ac3d0eba23 Bug 1564221 - Add a contract ID for nsITransportSecurityInfo r=keeler
There is now a contract ID for `nsITransportSecurityInfo`, allowing
`mozilla::psm::TransportSecurityInfo` instances to be created from JS. Tests
using a JS-implemented `nsITransportSecurityInfo` that were not modifying,
e.g., the `serverCert` attribute have been updated to create a
`mozilla::psm::TransportSecurityInfo` via the contract.

Differential Revision: https://phabricator.services.mozilla.com/D40346

--HG--
extra : moz-landing-system : lando
2019-08-20 21:38:59 +00:00
J.C. Jones
c8cf90a75f Bug 1564499 - land NSS ea8bc9f43de3 UPGRADE_NSS_RELEASE, r=kjacobs
Revset: reverse(bbfc55939d75~-1::ea8bc9f43de3)

2019-08-19  Kai Engert  <kaie@kuix.de>

	* automation/release/nspr-version.txt:
	Bug 1562330 - require NSPR version 4.22 r=jcj
	[ea8bc9f43de3] [tip]

2019-08-16  J.C. Jones  <jjones@mozilla.com>

	* cmd/selfserv/selfserv.c:
	Bug 1574220 - Fixup clang-format r=bustage
	[165664ff322c]

2019-08-15  Marcus Burghardt  <mburghardt@mozilla.com>

	* cmd/selfserv/selfserv.c, cmd/tstclnt/tstclnt.c,
	cmd/vfyserv/vfyserv.c:
	Bug 1574220 - Improve controls after errors in tstcln, selfserv and
	vfyserv cmds. r=kjacobs

	Differential Revision:
	https://phabricator.services.mozilla.com/D42165
	[32766e60ffa8]

2019-08-16  Marcus Burghardt  <mburghardt@mozilla.com>

	* lib/sqlite/README, lib/sqlite/sqlite3.c, lib/sqlite/sqlite3.h:
	Bug 1550636 - Upgrade SQLite in NSS to v3.29 (2019-07-10). r=jcj

	#define SQLITE_VERSION "3.29.0" #define SQLITE_VERSION_NUMBER
	3029000 #define SQLITE_SOURCE_ID "2019-07-10 17:32:03
	fc82b73eaac8b36950e527f12c4b5dc1e147e6f4ad2217ae43ad82882a88bfa6"

	Differential Revision:
	https://phabricator.services.mozilla.com/D42332
	[ed55badc848d]

2019-08-15  Marcus Burghardt  <mburghardt@mozilla.com>

	* lib/ckfw/builtins/certdata.txt, lib/ckfw/builtins/nssckbi.h:
	Bug 1566569 - Remove Swisscom Root CA 2 root certificate. r=jcj

	Differential Revision:
	https://phabricator.services.mozilla.com/D42161
	[660d7c210878]

Differential Revision: https://phabricator.services.mozilla.com/D42554

--HG--
extra : moz-landing-system : lando
2019-08-20 14:59:04 +00:00
Gian-Carlo Pascutto
8b7a11d51c Bug 1573578 - Whitelist brk syscall if jemalloc is disabled. r=jld
Differential Revision: https://phabricator.services.mozilla.com/D41998

--HG--
extra : moz-landing-system : lando
2019-08-14 22:50:51 +00:00
Cosmin Sabou
2e5b997146 Backed out 9 changesets (bug 1564221) for devtools failures on browser_net_security-redirect.js.
Backed out changeset bcae1e55fc27 (bug 1564221)
Backed out changeset 0efeb9b1f5fa (bug 1564221)
Backed out changeset aaa8ffb687f2 (bug 1564221)
Backed out changeset a1947eef7d86 (bug 1564221)
Backed out changeset 6cd17e69d1c7 (bug 1564221)
Backed out changeset ede7219b9a9e (bug 1564221)
Backed out changeset 63d578684d29 (bug 1564221)
Backed out changeset e804c46a9541 (bug 1564221)
Backed out changeset 4cd81a6d3b25 (bug 1564221)

--HG--
extra : histedit_source : 3b34632390a828e53929751dd79fe800b08a0ecb
2019-08-19 23:59:28 +03:00
Barret Rennie
244c61a02f Bug 1564221 - Make nsITransportSecurityInfo builtinclass r=keeler
There are no longer any consumers of the JS-implemented
`FakeTransportSecurityInfo` class, so it can be removed. That removes the last
JS-implemented `nsITransportSecurityInfo` instance and it therefore can be
marked `builtinclass`.

Differential Revision: https://phabricator.services.mozilla.com/D40355

--HG--
extra : moz-landing-system : lando
2019-08-06 17:55:53 +00:00
Barret Rennie
a27ae13275 Bug 1564221 - Do not use FakeTransportSecurityInfo in test_sss_resetState.js r=keeler
As part of making `nsITranportSecurityInfo` builtinclass, we can no longer
use JS-implemented `nsITransportSecurityInfo` instances in test cases.
This patch migrates `test_sss_resetState.js` to use `add_connection_test()` to
get a valid `nsITransportSecurityInfo` instance for the unit tests.

Differential Revision: https://phabricator.services.mozilla.com/D40352

--HG--
extra : moz-landing-system : lando
2019-08-06 17:55:55 +00:00
Barret Rennie
4c2087cc62 Bug 1564221 - Do not use FakeTransportSecurityInfo in test_sss_originAttributes.js r=keeler
As part of making `nsITranportSecurityInfo` builtinclass, we can no longer use
JS-implemented `nsITransportSecurityInfo` instances in test cases. This patch
migrates `test_sss_originAttributes.js` to use `add_connection_test()` to get a
valid `nsITransportSecurityInfo` instance for the unit tests.

Differential Revision: https://phabricator.services.mozilla.com/D40351

--HG--
extra : moz-landing-system : lando
2019-08-06 17:55:56 +00:00
Barret Rennie
e50685ff95 Bug 1564221 - Do not use FakeTransportSecurityInfo in test_sss_enumerate.js r=keeler
As part of making `nsITranportSecurityInfo` builtinclass, we can no longer
use JS-implemented `nsITransportSecurityInfo` instances in test cases.
This patch migrates `test_sss_enumerate.js` to use `add_connection_test()` to
get a valid `nsITransportSecurityInfo` instance for the unit tests.

Differential Revision: https://phabricator.services.mozilla.com/D40350

--HG--
extra : moz-landing-system : lando
2019-08-06 17:55:58 +00:00
Barret Rennie
b50d3762cd Bug 1564221 - Do not use FakeTransportSecurityInfo in test_pinning_header_parsing.js r=keeler
As part of making `nsITranportSecurityInfo` builtinclass, we can no longer use
JS-implemented `nsITransportSecurityInfo` instances in test cases. This patch
migrates `test_pinning_header_parsing.js` to use `add_connection_test()` to get
a valid `nsITransportSecurityInfo` instance for the unit tests.

Differential Revision: https://phabricator.services.mozilla.com/D40349

--HG--
extra : moz-landing-system : lando
2019-08-06 17:56:00 +00:00
Barret Rennie
cc3aa27173 Bug 1564221 - Do not use FakeTransportSecurityInfo in test_ocsp_must_staple.js r=keeler
As part of making `nsITranportSecurityInfo` builtinclass, we can no longer use
JS-implemented `nsITransportSecurityInfo` instances in test cases. This patch
migrates `test_ocsp_must_staple.js` to use `add_connection_test()` to get a
valid `nsITransportSecurityInfo` instance for the unit tests.

Differential Revision: https://phabricator.services.mozilla.com/D40348

--HG--
extra : moz-landing-system : lando
2019-08-06 17:56:02 +00:00
Barret Rennie
fb73718374 Bug 1564221 - Do not use FakeTransportSecurityInfo in test_forget_about_site_security_headers.js r=keeler
As part of making `nsITranportSecurityInfo` builtinclass, we can no longer use
JS-implemented `nsITransportSecurityInfo` instances in test cases. This patch
migrates `test_forget_about_site_security_headers.js to use
`add_connection_test()` to get a valid `nsITransportSecurityInfo` instance for
the unit tests.

Differential Revision: https://phabricator.services.mozilla.com/D40347

--HG--
extra : moz-landing-system : lando
2019-08-06 17:56:04 +00:00
Barret Rennie
fa178b7009 Bug 1564221 - Add a contract ID for nsITransportSecurityInfo r=keeler
There is now a contract ID for `nsITransportSecurityInfo`, allowing
`mozilla::psm::TransportSecurityInfo` instances to be created from JS. Tests
using a JS-implemented `nsITransportSecurityInfo` that were not modifying,
e.g., the `serverCert` attribute have been updated to create a
`mozilla::psm::TransportSecurityInfo` via the contract.

Differential Revision: https://phabricator.services.mozilla.com/D40346

--HG--
extra : moz-landing-system : lando
2019-08-06 17:56:05 +00:00
Carolina
617b075a9c Bug 1572848 - Adjusts browser_certViewer.js tests for the new cert viewer (about:certificate).r=johannh
Differential Revision: https://phabricator.services.mozilla.com/D41470

--HG--
extra : moz-landing-system : lando
2019-08-19 13:09:46 +00:00
ffxbld
f1d77648cd No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D42498

--HG--
extra : moz-landing-system : lando
2019-08-19 14:33:17 +00:00
Christian Holler
601bb91a9b Bug 1566342 - Implement changes for HTTP2 fuzzing in Necko. r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D38182

--HG--
extra : moz-landing-system : lando
2019-08-19 13:46:18 +00:00
Mark Banner
b1970e6a2f Bug 1571466 - Cleanup unnecessary ESLint global definitions. r=mossop
These are raised as redeclares or unused variables by ESLint 6.

Differential Revision: https://phabricator.services.mozilla.com/D37268

--HG--
extra : moz-landing-system : lando
2019-08-19 07:11:56 +00:00
Matthew Noorenberghe
1af788f2cb Bug 1571555 - Mock the prompt service for the master password prompt in test_sdr.js. r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D42383

--HG--
extra : moz-landing-system : lando
2019-08-16 22:33:45 +00:00
Matthew Noorenberghe
91e9a4e6b4 Bug 1571555 - Use a blank string in place of the username or password when decryption fails. r=keeler
Don't show the login in about:logins if the username or password cannot be decrypted.

Differential Revision: https://phabricator.services.mozilla.com/D40845

--HG--
extra : moz-landing-system : lando
2019-08-16 20:27:34 +00:00
Gabriele Svelto
14db2c37b8 Bug 1571711 - Factorize crash handling out of the various process IPC classes r=froydnj
Differential Revision: https://phabricator.services.mozilla.com/D41657

--HG--
extra : moz-landing-system : lando
2019-08-15 12:06:51 +00:00
Csoregi Natalia
7d39932994 Merge mozilla-central to autoland. CLOSED TREE 2019-08-15 22:38:37 +03:00
Csoregi Natalia
41813d2fc0 Merge autoland to mozilla-central. a=merge 2019-08-15 22:32:31 +03:00
Csoregi Natalia
058a6017fc Backed out changeset ee3e55708782 (bug 1570840) for breaking Netflix and Flash on Mac Nightly. a=backout 2019-08-15 22:00:21 +03:00
ffxbld
925db3aae7 No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D42137

--HG--
extra : moz-landing-system : lando
2019-08-15 15:04:59 +00:00
Bogdan Tara
f326b67e0e Backed out changeset c60ee628dd0e (bug 1571711) for RemoteSandboxBroker related bustages CLOSED TREE 2019-08-15 01:50:01 +03:00
Gabriele Svelto
d888c0a6b5 Bug 1571711 - Factorize crash handling out of the various process IPC classes r=froydnj
Differential Revision: https://phabricator.services.mozilla.com/D41657

--HG--
extra : moz-landing-system : lando
2019-08-13 21:43:00 +00:00
Haik Aftandilian
243b7d4b1e Bug 1570840 - Set com.apple.security.cs.disable-library-validation=false in Hardened Runtime entitlement files r=handyman
Set com.apple.security.cs.disable-library-validation=false in developer and production Hardened Runtime entitlements now that the definition has changed to mean allow/disallow unsigned libraries.

Differential Revision: https://phabricator.services.mozilla.com/D40525

--HG--
extra : moz-landing-system : lando
2019-08-14 19:42:19 +00:00
Nicholas Nethercote
281d296163 Bug 1573720 - Convert network.auth.force-generic-ntlm-v1 to a static pref. r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D41913

--HG--
extra : moz-landing-system : lando
2019-08-15 05:29:49 +00:00
arthur.iakab
b24139d864 Backed out changeset 5d42edca79d4 (bug 1560354) for causing mass failures on mozilla/Maybe.h:488 CLOSED TREE 2019-08-15 03:01:50 +03:00
Cosmin Sabou
62a26df9c6 Backed out changeset 55df21f1b7d6 (bug 1566342) for causing build bustages on FuzzyLayer.cpp. CLOSED TREE 2019-08-14 02:20:11 +03:00
Christian Holler
295a59729c Bug 1566342 - Implement changes for HTTP2 fuzzing in Necko. r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D38182

--HG--
extra : moz-landing-system : lando
2019-08-13 22:00:57 +00:00
J.C. Jones
32759c8ed5 Bug 1573662 - Rename sanctions test routines to make it easier to add new ones r=keeler
1) Multipurpose-ing the TLSServer specialization to `SanctionsTestServer`
2) Renaming the `security/manager/ssl/tests/unit/test_symantec_apple_google` folder of certs to `test_sanctions`
3) Prepend a `symantec-` to the start of all relevant certs in the new `test_sanctions` folder
4) Renaming the existing xpcshell test to `test_sanctions_symantec_apple_google.js`

Differential Revision: https://phabricator.services.mozilla.com/D39942

--HG--
rename : security/manager/ssl/tests/unit/test_symantec_apple_google/default-ee.key => security/manager/ssl/tests/unit/test_sanctions/default-ee.key
rename : security/manager/ssl/tests/unit/test_symantec_apple_google/default-ee.key.keyspec => security/manager/ssl/tests/unit/test_sanctions/default-ee.key.keyspec
rename : security/manager/ssl/tests/unit/test_symantec_apple_google/default-ee.pem => security/manager/ssl/tests/unit/test_sanctions/default-ee.pem
rename : security/manager/ssl/tests/unit/test_symantec_apple_google/default-ee.pem.certspec => security/manager/ssl/tests/unit/test_sanctions/default-ee.pem.certspec
rename : security/manager/ssl/tests/unit/test_symantec_apple_google/moz.build => security/manager/ssl/tests/unit/test_sanctions/moz.build
rename : security/manager/ssl/tests/unit/test_symantec_apple_google/ee-from-whitelist-after-cutoff.pem => security/manager/ssl/tests/unit/test_sanctions/symantec-ee-from-whitelist-after-cutoff.pem
rename : security/manager/ssl/tests/unit/test_symantec_apple_google/ee-from-whitelist-after-cutoff.pem.certspec => security/manager/ssl/tests/unit/test_sanctions/symantec-ee-from-whitelist-after-cutoff.pem.certspec
rename : security/manager/ssl/tests/unit/test_symantec_apple_google/ee-from-whitelist-before-cutoff.pem => security/manager/ssl/tests/unit/test_sanctions/symantec-ee-from-whitelist-before-cutoff.pem
rename : security/manager/ssl/tests/unit/test_symantec_apple_google/ee-from-whitelist-before-cutoff.pem.certspec => security/manager/ssl/tests/unit/test_sanctions/symantec-ee-from-whitelist-before-cutoff.pem.certspec
rename : security/manager/ssl/tests/unit/test_symantec_apple_google/ee-not-whitelisted-after-cutoff.pem => security/manager/ssl/tests/unit/test_sanctions/symantec-ee-not-whitelisted-after-cutoff.pem
rename : security/manager/ssl/tests/unit/test_symantec_apple_google/ee-not-whitelisted-after-cutoff.pem.certspec => security/manager/ssl/tests/unit/test_sanctions/symantec-ee-not-whitelisted-after-cutoff.pem.certspec
rename : security/manager/ssl/tests/unit/test_symantec_apple_google/ee-not-whitelisted-before-cutoff.pem => security/manager/ssl/tests/unit/test_sanctions/symantec-ee-not-whitelisted-before-cutoff.pem
rename : security/manager/ssl/tests/unit/test_symantec_apple_google/ee-not-whitelisted-before-cutoff.pem.certspec => security/manager/ssl/tests/unit/test_sanctions/symantec-ee-not-whitelisted-before-cutoff.pem.certspec
rename : security/manager/ssl/tests/unit/test_symantec_apple_google/intermediate-other-crossigned.pem => security/manager/ssl/tests/unit/test_sanctions/symantec-intermediate-other-crossigned.pem
rename : security/manager/ssl/tests/unit/test_symantec_apple_google/intermediate-other-crossigned.pem.certspec => security/manager/ssl/tests/unit/test_sanctions/symantec-intermediate-other-crossigned.pem.certspec
rename : security/manager/ssl/tests/unit/test_symantec_apple_google/intermediate-other.pem => security/manager/ssl/tests/unit/test_sanctions/symantec-intermediate-other.pem
rename : security/manager/ssl/tests/unit/test_symantec_apple_google/intermediate-other.pem.certspec => security/manager/ssl/tests/unit/test_sanctions/symantec-intermediate-other.pem.certspec
rename : security/manager/ssl/tests/unit/test_symantec_apple_google/intermediate-whitelisted.pem => security/manager/ssl/tests/unit/test_sanctions/symantec-intermediate-whitelisted.pem
rename : security/manager/ssl/tests/unit/test_symantec_apple_google/intermediate-whitelisted.pem.certspec => security/manager/ssl/tests/unit/test_sanctions/symantec-intermediate-whitelisted.pem.certspec
rename : security/manager/ssl/tests/unit/test_symantec_apple_google/real-google-g2-intermediate.pem => security/manager/ssl/tests/unit/test_sanctions/symantec-real-google-g2-intermediate.pem
rename : security/manager/ssl/tests/unit/test_symantec_apple_google/real-googlecom.pem => security/manager/ssl/tests/unit/test_sanctions/symantec-real-googlecom.pem
rename : security/manager/ssl/tests/unit/test_symantec_apple_google/test-ca.pem => security/manager/ssl/tests/unit/test_sanctions/symantec-test-ca.pem
rename : security/manager/ssl/tests/unit/test_symantec_apple_google/test-ca.pem.certspec => security/manager/ssl/tests/unit/test_sanctions/symantec-test-ca.pem.certspec
rename : security/manager/ssl/tests/unit/test_symantec_apple_google.js => security/manager/ssl/tests/unit/test_sanctions_symantec_apple_google.js
rename : security/manager/ssl/tests/unit/tlsserver/cmd/SymantecSanctionsServer.cpp => security/manager/ssl/tests/unit/tlsserver/cmd/SanctionsTestServer.cpp
extra : moz-landing-system : lando
2019-08-13 20:59:17 +00:00
Sylvestre Ledru
645f2d5773 Bug 1519636 - Reformat recent changes to the Google coding style r=Ehsan
# ignore-this-changeset

Differential Revision: https://phabricator.services.mozilla.com/D41559

--HG--
extra : moz-landing-system : lando
2019-08-13 07:15:25 +00:00
Haik Aftandilian
ecc3193420 Bug 1564434 - MT_safe_localtime generates incorrect value in sandboxed content process r=handyman
Allow access to timezone data files from the content/flash/GMP/utility sandbox.

Remove unneeded regex providing access to ^/private/tmp/KSInstallAction\. files.

Differential Revision: https://phabricator.services.mozilla.com/D41455

--HG--
extra : moz-landing-system : lando
2019-08-12 21:36:03 +00:00
J.C. Jones
66170e3716 Bug 1564499 - land NSS bbfc55939d75 UPGRADE_NSS_RELEASE, r=kjacobs
Revset: reverse(89aa19677e37~-1::bbfc55939d75)

2019-08-14  Kevin Jacobs  <kjacobs@mozilla.com>

	* gtests/ssl_gtest/tls_agent.cc:
	Bug 1572593 - Re-revert call to CheckCertReqAgainstDefaultCAs to
	avoid memory leak (filed as bug 1573945). r=jcj

	Revert back to the changes Franziskus had made. Updated the in-
	source bug number to point to the new memleak bug.

	Differential Revision:
	https://phabricator.services.mozilla.com/D42020
	[bbfc55939d75] [tip]

2019-08-12  Kevin Jacobs  <kjacobs@mozilla.com>

	* gtests/freebl_gtest/freebl_gtest.gyp,
	gtests/mozpkix_gtest/mozpkix_gtest.gyp:
	Bug 1415118 - Fix --enable-libpkix builds from build.sh r=mt,jcj

	Differential Revision:
	https://phabricator.services.mozilla.com/D41617
	[f8926908be71]

2019-08-14  J.C. Jones  <jjones@mozilla.com>

	* gtests/ssl_gtest/tls_agent.cc, lib/ssl/ssl3ext.c:
	Bug 1572593 - Reset advertised extensions in ssl_ConstructExtensions
	r=mt,kjacobs

	Reset the list of advertised extensions before sending a new set.

	This reverts the changes of https://hg.mozilla.org/projects/nss/rev/
	1ca362213631d6edc885b6b965b52ecffcf29afd

	Differential Revision:
	https://phabricator.services.mozilla.com/D41302
	[b03ff661491e]

2019-08-14  Kevin Jacobs  <kjacobs@mozilla.com>

	* lib/freebl/ctr.c:
	Bug 1539788 - UBSAN fixup for 128b counter. r=mt,jcj

	Differential Revision:
	https://phabricator.services.mozilla.com/D41884
	[9d1f5e71773d]

2019-08-13  Kevin Jacobs  <kjacobs@mozilla.com>

	* lib/freebl/chacha20poly1305.c, lib/freebl/ctr.c, lib/freebl/gcm.c,
	lib/freebl/intel-gcm-wrap.c, lib/freebl/rsapkcs.c:
	Bug 1539788 - Add length checks for cryptographic primitives
	r=mt,jcj

	This patch adds additional length checks around cryptographic
	primitives.

	Differential Revision:
	https://phabricator.services.mozilla.com/D36079
	[dfd6996fe742]

2019-08-13  Marcus Burghardt  <mburghardt@mozilla.com>

	* gtests/freebl_gtest/mpi_unittest.cc, lib/freebl/mpi/README,
	lib/freebl/mpi/mpi.c, lib/freebl/mpi/mpi.h:
	Bug 1542077 - Added extra controls and tests to mp_set_int and
	mp_set_ulong. r=jcj,kjacobs

	Differential Revision:
	https://phabricator.services.mozilla.com/D40649
	[9bc47e69613e]

2019-08-13  J.C. Jones  <jjones@mozilla.com>

	* gtests/ssl_gtest/ssl_resumption_unittest.cc,
	gtests/ssl_gtest/tls_agent.cc:
	Bug 1572791 - Fixup clang-format r=bustage
	[ec113de50cdd]

	* gtests/ssl_gtest/tls_agent.cc,
	gtests/ssl_gtest/tls_subcerts_unittest.cc, lib/ssl/tls13subcerts.c:
	Bug 1572791 - Check for nulls in SSLExp_DelegateCredential and its
	tests r=kjacobs

	This particularly catches test errors in tls_subcerts_unittest when
	the profile is stale.

	Differential Revision:
	https://phabricator.services.mozilla.com/D41429
	[ed5067857563]

2019-08-13  Kevin Jacobs  <kjacobs@mozilla.com>

	* gtests/ssl_gtest/ssl_auth_unittest.cc,
	gtests/ssl_gtest/ssl_cert_ext_unittest.cc,
	gtests/ssl_gtest/ssl_resumption_unittest.cc,
	gtests/ssl_gtest/tls_agent.cc:
	Bug 1572791 - Fix ASAN cert errors when SSL gtests run on empty
	profile r=jcj

	Differential Revision:
	https://phabricator.services.mozilla.com/D41787
	[cef2aa7f3b8c]

2019-08-09  Kevin Jacobs  <kjacobs@mozilla.com>

	* tests/common/cleanup.sh:
	Bug 1560593 - Cleanup.sh to treat core dumps as test failures on
	optimized builds. r=jcj

	Differential Revision:
	https://phabricator.services.mozilla.com/D41392
	[360010725fdb]

Differential Revision: https://phabricator.services.mozilla.com/D42139

--HG--
extra : moz-landing-system : lando
2019-08-15 16:06:15 +00:00
ffxbld
21d02cb6fe No Bug, mozilla-central repo-update HSTS HPKP blocklist remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D41541

--HG--
extra : moz-landing-system : lando
2019-08-12 13:08:23 +00:00
Daniel Varga
8f35473d07 Backed out changeset 65c6d801e7b4 (bug 1571555) for browser chrome failure at browser/components/aboutlogins/tests/browser/browser_masterPassword.js
--HG--
extra : rebase_source : 9182aebd42d50c9a502dc7fabaf99238ac5e62c5
2019-08-10 22:35:50 +03:00
Gabriele Svelto
beb62c4c31 Bug 1282776 - Finalize crash reports for child process crashes happening too early r=froydnj
This changes the way crash reports for child processes happening too early
during the child process' startup. Before bug 1547698 we wrote a partial
.extra file with those crashes that lacked the process type. The user would
not be notified of those crashes until she restarted Firefox and even when
submitted those crashes would be erroneously labeled as browser crashes.

After bug 1547698 we stopped writing .extra files entirely for those crashes
which left orphaned .dmp files among the pending crash reports.

This patch does three things to improve the situation:

* It writes a partial .extra file so that the crashes are detected at the next
  startup. So the user is still not notified directly of these crashes but she
  can report them later.
* It adds the process type to the .extra file so that the crash reporters are
  labelled correctly.
* It fixes a leak in the `pidToMinidump` hash-map. Since the crashes were
  not finalized the `ChildProcessData` strucutre associated with them would
  never be fred.

Differential Revision: https://phabricator.services.mozilla.com/D40810

--HG--
extra : moz-landing-system : lando
2019-08-09 14:23:19 +00:00
Jared Wein
018b8a1983 Bug 1571555 - Use a blank string in place of the username or password when decryption fails. r=keeler
Don't show the login in about:logins if the username or password cannot be decrypted.

Differential Revision: https://phabricator.services.mozilla.com/D40845

--HG--
extra : moz-landing-system : lando
2019-08-10 00:19:48 +00:00
Gabriele Svelto
53d4ac9807 Bug 1572565 - Make the remote sandbox broker process' telemetry string consistent r=jld
Differential Revision: https://phabricator.services.mozilla.com/D41291

--HG--
extra : moz-landing-system : lando
2019-08-09 00:03:33 +00:00
Tom Schuster
2c4cb96468 Bug 1558915 - Use infallible nsIURI::SchemeIs everywhere. r=smaug
Differential Revision: https://phabricator.services.mozilla.com/D41367

--HG--
extra : moz-landing-system : lando
2019-08-09 15:17:06 +00:00
Nicholas Nethercote
b256ece713 Bug 1571934 - Inline security-prefs.js into all.js. r=keeler
security-prefs.js is #included into greprefs.js, but there's no good reason for
it to be separate from all.js. Having it separate makes it easier to overlook,
and all.js has a bunch of `security.*` prefs in it anyway.

This patch inlines it into all.js. It inlines it at the start of the file to
minimize the risk of the change, so that the prefs end up in greprefs.js in the
same order as before.

Differential Revision: https://phabricator.services.mozilla.com/D40919

--HG--
extra : moz-landing-system : lando
2019-08-07 17:41:22 +00:00
Jed Davis
660156542f Bug 1559368 - When determining sandbox capabilities, check for the specific X11 socket that would be used. r=gcp
Differential Revision: https://phabricator.services.mozilla.com/D40915

--HG--
extra : moz-landing-system : lando
2019-08-07 22:34:50 +00:00
Kevin Jacobs
019f597297 Bug 1564499 - land NSS 89aa19677e37 UPGRADE_NSS_RELEASE, r=jcj
Differential Revision: https://phabricator.services.mozilla.com/D40907

--HG--
extra : moz-landing-system : lando
2019-08-07 16:20:37 +00:00
Moritz Birghan
899a70f4b9 Bug 1563849 - Get btoa(getDERString(cert)) from an API r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D39970

--HG--
extra : moz-landing-system : lando
2019-08-06 09:03:38 +00:00
Andreea Pavel
53820aa30c Backed out 9 changesets (bug 1564221) xpcshell failures on a CLOSED TREE
Backed out changeset 36e33a3b59f0 (bug 1564221)
Backed out changeset 12d1607c1415 (bug 1564221)
Backed out changeset 8c3157ad3ac9 (bug 1564221)
Backed out changeset ad7a644c5a8d (bug 1564221)
Backed out changeset 31f730109760 (bug 1564221)
Backed out changeset a140da3467e0 (bug 1564221)
Backed out changeset 02a324e713d6 (bug 1564221)
Backed out changeset dc76eeb3a74a (bug 1564221)
Backed out changeset bc933f236434 (bug 1564221)
2019-08-06 20:49:21 +03:00
Barret Rennie
3df3c840f0 Bug 1564221 - Make nsITransportSecurityInfo builtinclass r=keeler
There are no longer any consumers of the JS-implemented
`FakeTransportSecurityInfo` class, so it can be removed. That removes the last
JS-implemented `nsITransportSecurityInfo` instance and it therefore can be
marked `builtinclass`.

Differential Revision: https://phabricator.services.mozilla.com/D40355

--HG--
extra : moz-landing-system : lando
2019-08-06 15:36:52 +00:00
Barret Rennie
82b162a511 Bug 1564221 - Do not use FakeTransportSecurityInfo in test_sss_resetState.js r=keeler
As part of making `nsITranportSecurityInfo` builtinclass, we can no longer
use JS-implemented `nsITransportSecurityInfo` instances in test cases.
This patch migrates `test_sss_resetState.js` to use `add_connection_test()` to
get a valid `nsITransportSecurityInfo` instance for the unit tests.

Differential Revision: https://phabricator.services.mozilla.com/D40352

--HG--
extra : moz-landing-system : lando
2019-08-06 16:14:34 +00:00
Barret Rennie
62b5e6bead Bug 1564221 - Do not use FakeTransportSecurityInfo in test_sss_originAttributes.js r=keeler
As part of making `nsITranportSecurityInfo` builtinclass, we can no longer use
JS-implemented `nsITransportSecurityInfo` instances in test cases. This patch
migrates `test_sss_originAttributes.js` to use `add_connection_test()` to get a
valid `nsITransportSecurityInfo` instance for the unit tests.

Differential Revision: https://phabricator.services.mozilla.com/D40351

--HG--
extra : moz-landing-system : lando
2019-08-06 15:36:18 +00:00
Barret Rennie
e7f9be23da Bug 1564221 - Do not use FakeTransportSecurityInfo in test_sss_enumerate.js r=keeler
As part of making `nsITranportSecurityInfo` builtinclass, we can no longer
use JS-implemented `nsITransportSecurityInfo` instances in test cases.
This patch migrates `test_sss_enumerate.js` to use `add_connection_test()` to
get a valid `nsITransportSecurityInfo` instance for the unit tests.

Differential Revision: https://phabricator.services.mozilla.com/D40350

--HG--
extra : moz-landing-system : lando
2019-08-06 16:17:35 +00:00
Barret Rennie
b829b4078b Bug 1564221 - Do not use FakeTransportSecurityInfo in test_pinning_header_parsing.js r=keeler
As part of making `nsITranportSecurityInfo` builtinclass, we can no longer use
JS-implemented `nsITransportSecurityInfo` instances in test cases. This patch
migrates `test_pinning_header_parsing.js` to use `add_connection_test()` to get
a valid `nsITransportSecurityInfo` instance for the unit tests.

Differential Revision: https://phabricator.services.mozilla.com/D40349

--HG--
extra : moz-landing-system : lando
2019-08-06 15:35:51 +00:00
Barret Rennie
a1140840ab Bug 1564221 - Do not use FakeTransportSecurityInfo in test_ocsp_must_staple.js r=keeler
As part of making `nsITranportSecurityInfo` builtinclass, we can no longer use
JS-implemented `nsITransportSecurityInfo` instances in test cases. This patch
migrates `test_ocsp_must_staple.js` to use `add_connection_test()` to get a
valid `nsITransportSecurityInfo` instance for the unit tests.

Differential Revision: https://phabricator.services.mozilla.com/D40348

--HG--
extra : moz-landing-system : lando
2019-08-06 15:35:32 +00:00
Barret Rennie
2629fef012 Bug 1564221 - Do not use FakeTransportSecurityInfo in test_forget_about_site_security_headers.js r=keeler
As part of making `nsITranportSecurityInfo` builtinclass, we can no longer use
JS-implemented `nsITransportSecurityInfo` instances in test cases. This patch
migrates `test_forget_about_site_security_headers.js to use
`add_connection_test()` to get a valid `nsITransportSecurityInfo` instance for
the unit tests.

Differential Revision: https://phabricator.services.mozilla.com/D40347

--HG--
extra : moz-landing-system : lando
2019-08-06 16:03:52 +00:00
Barret Rennie
adf4a3e19e Bug 1564221 - Add a contract ID for nsITransportSecurityInfo r=keeler
There is now a contract ID for `nsITransportSecurityInfo`, allowing
`mozilla::psm::TransportSecurityInfo` instances to be created from JS. Tests
using a JS-implemented `nsITransportSecurityInfo` that were not modifying,
e.g., the `serverCert` attribute have been updated to create a
`mozilla::psm::TransportSecurityInfo` via the contract.

Differential Revision: https://phabricator.services.mozilla.com/D40346

--HG--
extra : moz-landing-system : lando
2019-08-06 15:35:04 +00:00
J.C. Jones
83fd5c4742 Bug 1564499 - land NSS 777b6070fe76 UPGRADE_NSS_RELEASE, r=me
--HG--
extra : rebase_source : 6a0e320432b452bc692f712c63c0cc66699cd130
2019-08-05 15:58:54 +00:00
Moritz Birghan
978fb0351d Bug 1360307 - Improves the arguments to mozilla::psm::InitializeNSS r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D39011

--HG--
extra : moz-landing-system : lando
2019-08-02 17:51:22 +00:00
Cosmin Sabou
9b936b2958 Merge autoland to mozilla-central. a=merge 2019-08-02 18:59:53 +03:00
Mihai Alexandru Michis
e9b6a4610d Backed out changeset f742215abea8 (bug 1564499) for causing Bug 1570891. UPGRADE_NSS_RELEASE a=backout 2019-08-02 12:45:49 +03:00
Razvan Maries
f57bfff083 Merge mozilla-inbound to mozilla-central a=merge
--HG--
rename : dom/media/encoder/EncodedFrameContainer.h => dom/media/encoder/EncodedFrame.h
2019-08-02 06:50:08 +03:00
J.C. Jones
8c9ade1d25 Bug 1564499 - land NSS 009a7163c80a UPGRADE_NSS_RELEASE, r=me
--HG--
extra : rebase_source : 6f459dfb1cd7238d9c4b258d41b8b411941acb6e
2019-07-31 20:20:02 +00:00
ffxbld
6dfb6ea6a1 No Bug, mozilla-central repo-update HSTS HPKP blocklist remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D40198

--HG--
extra : moz-landing-system : lando
2019-08-01 13:24:01 +00:00
Bob Owen
6a19f3eb75 Bug 1569139: Add a static pref to enable win32k lockdown in the Windows content process sandbox policy. r=aklotz
Differential Revision: https://phabricator.services.mozilla.com/D39870

--HG--
extra : moz-landing-system : lando
2019-08-01 10:55:54 +00:00
Moritz Birghan
31f729e8c4 Bug 1004308 - rename BadCertServer to BadCertAndPinningServer r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D39748

--HG--
rename : security/manager/ssl/tests/unit/tlsserver/cmd/BadCertServer.cpp => security/manager/ssl/tests/unit/tlsserver/cmd/BadCertAndPinningServer.cpp
extra : moz-landing-system : lando
2019-07-31 17:06:07 +00:00
Kershaw Chang
39ab60f95d Bug 1267643 - Remove client certificate filtering based on CA names r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D39345

--HG--
extra : moz-landing-system : lando
2019-08-02 12:45:51 +00:00
Gurzau Raul
08ddcd8a5a Backed out changeset 4a66bfcbaca5 (bug 1360307) for build bustage at Logging.h on a CLOSED TREE. 2019-07-31 20:22:43 +03:00
Moritz Birghan
356d25bd08 Bug 1360307 - Improves the arguments to mozilla::psm::InitializeNSS r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D39011

--HG--
extra : moz-landing-system : lando
2019-07-31 16:52:02 +00:00
Johann Hofmann
7b984428e8 Bug 1567826 - Don't mark any secureContext pages as insecure. r=nhnt11,keeler,Ehsan
Differential Revision: https://phabricator.services.mozilla.com/D39012

--HG--
extra : moz-landing-system : lando
2019-07-30 12:31:22 +00:00
Ciure Andrei
e432090afa Backed out changeset ded87cc3f3ee (bug 1567826) for causing browser_check_identity_state.js to perma fail CLOSED TREE 2019-07-30 12:50:29 +03:00
Johann Hofmann
04c28108fc Bug 1567826 - Don't mark any secureContext pages as insecure. r=nhnt11,keeler,Ehsan
Differential Revision: https://phabricator.services.mozilla.com/D39012

--HG--
extra : moz-landing-system : lando
2019-07-30 07:52:59 +00:00
ffxbld
9ee911f801 No Bug, mozilla-central repo-update HSTS HPKP blocklist remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D39676

--HG--
extra : moz-landing-system : lando
2019-07-29 13:29:43 +00:00
Bogdan Tara
7658261678 Backed out changeset 9bed62de3d16 (bug 1267643) for browser_urlbar_speculative_connect_not_with_client_cert.js failures CLOSED TREE 2019-07-29 13:02:17 +03:00
Kershaw Chang
2d553f2a61 Bug 1267643 - Remove client certificate filtering based on CA names r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D39345

--HG--
extra : moz-landing-system : lando
2019-07-29 08:48:01 +00:00
J.C. Jones
3295f36c36 Bug 1569223 - Add support to pykey.py for exporting EC keys r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D39520

--HG--
extra : moz-landing-system : lando
2019-07-26 17:56:31 +00:00
J.C. Jones
7d89d6183a Bug 1569223 - Support EC keys in TLSServer.cpp r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D39519

--HG--
extra : moz-landing-system : lando
2019-07-26 19:17:40 +00:00
J.C. Jones
aca1e19c11 Bug 1569221 - Change TLSServer.cpp to support the modern SSL_ConfigServerCert r=keeler
This patch does not change the existing servers to use the new mechanism, rather
attempting to be minimalist. I filed Bug 1569222 for that.

Differential Revision: https://phabricator.services.mozilla.com/D39518

--HG--
extra : moz-landing-system : lando
2019-07-26 20:09:43 +00:00
Jared Wein
d2b2321cc8 Bug 1567667 - Decrypted strings returned from asyncDecryptStrings need to be converted to UTF16. r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D39443

--HG--
extra : moz-landing-system : lando
2019-07-26 19:13:11 +00:00
Tom Ritter
334edd038c Bug 1563774 - Enable Binary Signature Policy on the RDD process r=bobowen
To do this, we preload the AV libraries. They may not be needed right now,
but by doing this now we ensure that future RDD work won't mysteriously
fail during development for some poor coworker.

Differential Revision: https://phabricator.services.mozilla.com/D37928

--HG--
extra : moz-landing-system : lando
2019-07-23 17:49:55 +00:00
Kannan Vijayan
3fb6190ec6 Bug 1559414 - Rename unaudited pre-fission methods with SameProcess for future audit burndown. r=nika
Differential Revision: https://phabricator.services.mozilla.com/D39378

--HG--
extra : moz-landing-system : lando
2019-07-26 16:48:31 +00:00
Gian-Carlo Pascutto
c43f365472 Bug 1565996 - Handle relative paths in linker config parsing. r=jld
Differential Revision: https://phabricator.services.mozilla.com/D38634

--HG--
extra : moz-landing-system : lando
2019-07-26 14:03:53 +00:00
Bob Owen
23d09ead45 Bug 1565848: Revert latest change to MITIGATION_DLL_SEARCH_ORDER. r=aklotz
This is until any regressions can be fixed, see bug 1568850.

Differential Revision: https://phabricator.services.mozilla.com/D39357

--HG--
extra : moz-landing-system : lando
2019-07-25 17:44:24 +00:00
ffxbld
b7828720b0 No Bug, mozilla-central repo-update HSTS HPKP blocklist remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D39331

--HG--
extra : moz-landing-system : lando
2019-07-25 13:20:25 +00:00
Andreea Pavel
e4263c00eb Merge mozilla-inbound to mozilla-central. a=merge 2019-07-25 08:59:39 +03:00
Moritz Birghan
1b9a759258 Bug 1549818 - Removes expired FIPS_ENABLED telemetry probe r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D39027

--HG--
extra : moz-landing-system : lando
2019-07-24 19:59:27 +00:00
Haik Aftandilian
a19efece81 Bug 1566540 - [10.15] Crash in [@ CrashReporter::TerminateHandler] r=spohl
To avoid crashing in macOS 10.15, allow access to the proc_info PROC_INFO_CALL_SETCONTROL syscall variant in the GMP and RDD sandboxes.

Differential Revision: https://phabricator.services.mozilla.com/D39079

--HG--
extra : moz-landing-system : lando
2019-07-24 14:48:41 +00:00
Moritz Birghan
e58c39f78e Bug 1549015 - Removes privilegedPackageRoot r=keeler
nsIX509CertDB::PrivilegedPackageRoot was added in bug 1178518 to support privileged packaged apps for Firefox OS. However, we no longer need to support this use-case.

Differential Revision: https://phabricator.services.mozilla.com/D38655

--HG--
extra : moz-landing-system : lando
2019-07-24 19:54:41 +00:00
Kershaw Chang
0bcf85d6e8 Bug 1566030 - Remove nsIClientAuthUserDecision r=keeler,snorp
This patch removes nsIClientAuthUserDecision and add another output parameter to nsIClientAuthDialogs.chooseCertificate.

Differential Revision: https://phabricator.services.mozilla.com/D38074

--HG--
extra : moz-landing-system : lando
2019-07-24 17:49:45 +00:00
Moritz Birghan
206270643c Bug 1567005 - Deletes SECKEYEncryptedPrivateKeyInfo_true r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D39007

--HG--
extra : moz-landing-system : lando
2019-07-24 17:08:15 +00:00
J.C. Jones
b979163b23 Bug 1564499 - land NSS a31fc0eefc4c UPGRADE_NSS_RELEASE, r=me
--HG--
extra : rebase_source : 49049f21b591cf139ea6f4c7fc91f53dfb4e4e1e
2019-07-23 19:31:53 +00:00
J.C. Jones
b2cd117111 Bug 1562773 - Add a preference to enable Delegated Credentials in NSS r=keeler
This patch adds a new pref, "security.tls.enable_delegated_credentials",
default false, which controls the NSS option SSL_ENABLE_DELEGATED_CREDENTIALS.

Tests are in D37918.

Differential Revision: https://phabricator.services.mozilla.com/D37907

--HG--
extra : moz-landing-system : lando
2019-07-22 20:53:48 +00:00
Boris Zbarsky
0f70d08ec8 Bug 1566595. Stop using [array] in nsIBinaryOutputStream. r=froydnj
Differential Revision: https://phabricator.services.mozilla.com/D38387

--HG--
extra : moz-landing-system : lando
2019-07-22 20:27:39 +00:00
Moritz Birghan
c3b9c4615e Bug 1559520 - Removes nsIX509CertDB::DeveloperImportedRoot r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D38052

--HG--
extra : moz-landing-system : lando
2019-07-22 13:16:13 +00:00
Ciure Andrei
98278afa46 Backed out changeset a858e4411532 (bug 1566595) for causing Windows MinGW builds bustages CLOSED TREE 2019-07-22 21:39:08 +03:00
Boris Zbarsky
9c74919340 Bug 1566595. Stop using [array] in nsIBinaryOutputStream. r=froydnj
Differential Revision: https://phabricator.services.mozilla.com/D38387

--HG--
extra : moz-landing-system : lando
2019-07-22 14:52:04 +00:00
Paul Adenot
6d321304a4 Bug 1565575 - Allow access to AudioComponentRegistrar when doing audio remoting on OSX to be able to use system decoders. r=haik
When audio remoting is enabled, we can remove most of the sandbox exceptions,
except one, that allows using system calls to do decoding of audio and video
using system decoders (h264 and aac). Not doing that results in most mp4 files
to be unplayable, erroring out when doing calls like this:

https://searchfox.org/mozilla-central/rev/da855d65d1fbdd714190cab2c46130f7422f3699/dom/media/platforms/apple/AppleATDecoder.cpp:336
https://searchfox.org/mozilla-central/rev/da855d65d1fbdd714190cab2c46130f7422f3699/dom/media/platforms/apple/AppleATDecoder.cpp:545

We'll be able to remove it again when we'll use the RDD for everything, but in
the meantime, this exception is needed.

Differential Revision: https://phabricator.services.mozilla.com/D38465

--HG--
extra : moz-landing-system : lando
2019-07-22 08:22:40 +00:00
ffxbld
6f481990b3 No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D38858

--HG--
extra : moz-landing-system : lando
2019-07-22 13:21:35 +00:00
Kris Maglione
e40b418215 Bug 1566952: Part 2 - Update Fission failure annotations after skipping crashes. r=mccr8
When a test crashes, the harness skips all of the remaining tests in the
directory. That means that with crashes skipped, we now try to run a whole lot
more tests than we did before, and a lot of them fail under Fission.

This patch adds annotations to the new failures that show up after part 1.

Differential Revision: https://phabricator.services.mozilla.com/D38726

--HG--
extra : rebase_source : 292157039c88fc615f5de41679e96e72766ac4db
2019-07-19 12:30:10 -07:00
Dragana Damjanovic
1ed2904c50 Bug 1560354 - Transform some nss types into gecko types. r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D35566

--HG--
extra : moz-landing-system : lando
2019-07-02 21:26:36 +00:00
Dana Keeler
e32b862175 bug 1560403 - leave cert_storage's lmdb open in rw mode r=nanj
Bug 1543795 configured lmdb to use less memory when opening a database in
read/write mode, so we can remove the workaround code in cert_storage that was
added in bug 1538093 as a way to mitigate the memory usage.

Differential Revision: https://phabricator.services.mozilla.com/D38525

--HG--
extra : moz-landing-system : lando
2019-07-18 21:43:14 +00:00
ffxbld
28af937c05 No Bug, mozilla-central repo-update HSTS HPKP blocklist remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D38478

--HG--
extra : moz-landing-system : lando
2019-07-18 12:58:04 +00:00
Kris Maglione
0962c2b731 Bug 1566182: Annotate mochitests that fail with Fission enabled. r=mccr8
My preference was to annotate most of the failing tests with `fail-if` so that
if they start passing, the `fail-if` needs to be removed and they need to keep
passing. That doesn't work for tests that timeout, or which trigger failures
from their cleanup functions, however, so those tests need skip-if. And tests
with fail in their cleanup functions likely leave the browser in an
inconsistent state for subsequent tests, anyway, so really should be skipped
regardless.

There are some remaining tests which still fail because of crashes. I chose
not to skip them here, but to fix the crashes in separate bugs instead.

Differential Revision: https://phabricator.services.mozilla.com/D38247

--HG--
extra : rebase_source : 39ba8fec2e882cfe577c5f2b58ab7e4b461f1178
2019-07-15 16:19:32 -07:00
Gurzau Raul
a40be3ff67 Merge mozilla-central to autoland. a=merge CLOSED TREE 2019-07-17 06:53:00 +03:00
Gurzau Raul
21df1f7413 Merge inbound to mozilla-central. a=merge 2019-07-17 06:48:50 +03:00
Moritz Birghan
0b20e8b949 Bug 1297357 - Switch work from nsNSSCertificateDB::AddCertFromBase64() to nsNSSCertificateDB::AddCert(). r=keeler
Before the nsNSSCertificateDB::AddCert() function encoded the given DER input into Base64 and then called nsNSSCertificateDB::AddCertFromBase64() to do the remaining work. In nsNSSCertificateDB::AddCertFromBase64() the input was then eventually decoded back into DER.
Now nsNSSCertificateDB::AddCertFromBase64() encodes its input into DER and then calls nsNSSCertificateDB::AddCert() which now does the remaining work without converting between formats.

Differential Revision: https://phabricator.services.mozilla.com/D37738

--HG--
extra : moz-landing-system : lando
2019-07-16 18:02:49 +00:00
Dana Keeler
18e9f3ba80 bug 1564481 - reset HSTS/HPKP state to factory settings rather than storing knockout entries for preloaded sites r=jcj r=KevinJacobs
As originally implemented, nsISiteSecurityService.removeState allowed direct
access to remove HSTS state. It also provided the implementation for when the
browser encountered an HSTS header with "max-age=0". In bug 775370, it was
updated to store an entry that would override preloaded information when
processing such headers. However, this meant that the semantics of the direct
access API had changed. Preloaded information could be overridden if a user
invoked the "forget about this site" feature. This change fixes the public API
(and renames it to "resetState") so it actually behaves as its consumers expect.

Reviewers: jcj!, KevinJacobs!

Tags: #secure-revision

Bug #: 1564481

Differential Revision: https://phabricator.services.mozilla.com/D38108

--HG--
extra : rebase_source : 8dd5460d3fd3c0ce92746cc83fae220d6e2a83cf
extra : amend_source : 171ebb015e9f9ae775f0caa22e161d41970f3d51
2019-07-11 13:48:28 -07:00
Mihai Alexandru Michis
22b330ecb3 Merge inbound to mozilla-central. a=merge 2019-07-16 07:08:15 +03:00
J.C. Jones
0b2f8f9f7c Bug 1564499 - land NSS 8c6fad5544a6 UPGRADE_NSS_RELEASE, r=me
--HG--
extra : rebase_source : 5434866d8339b5c9f91a5114d37b863e7880f6e8
2019-07-15 21:40:37 +00:00
ffxbld
4ede446d10 No Bug, mozilla-central repo-update HSTS HPKP blocklist remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D38063

--HG--
extra : moz-landing-system : lando
2019-07-15 17:06:26 +00:00
Bob Owen
95b19e37ff Bug 1564899: Make CloseHandleWrapper CHECK a DCHECK on non-Nightly builds. r=handyman
This is because we are hitting it frequently during PolicyBase::OnJobEmpty and
currently we can't work out how this can happen.

Differential Revision: https://phabricator.services.mozilla.com/D38090

--HG--
extra : moz-landing-system : lando
2019-07-15 17:19:17 +00:00
Tim Nguyen
f9b01dd5b0 Bug 1565921 - Load editMenuOverlay.js and globalOverlay.js on documents with HTML inputs. r=Gijs
Differential Revision: https://phabricator.services.mozilla.com/D38018

--HG--
extra : moz-landing-system : lando
2019-07-15 11:14:44 +00:00
Carolina
9196c76343 Bug 1560538 - Opens a new tab to show the certificate. r=johannh,keeler
Not sure what to do in pippki.js, for the moment I put an incorrect id.

Differential Revision: https://phabricator.services.mozilla.com/D35531

--HG--
extra : moz-landing-system : lando
2019-07-15 12:32:43 +00:00
Boris Zbarsky
5062731c15 Bug 1565688. Remove unused IOService arg from NS_NewURI. r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D37968

--HG--
extra : moz-landing-system : lando
2019-07-15 13:39:51 +00:00
ffxbld
7c0acde6a7 No Bug, mozilla-central repo-update HSTS HPKP blocklist remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D37716

--HG--
extra : moz-landing-system : lando
2019-07-11 12:55:28 +00:00
Bob Owen
7b91f43ece Bug 1557282: SetLockdownDefaultDacl for content process sandbox policy for Windows 10 or later. r=jmathies
Differential Revision: https://phabricator.services.mozilla.com/D33301

--HG--
extra : moz-landing-system : lando
2019-07-10 14:57:01 +00:00
Dana Keeler
ba0c7e0e3a bug 1563056 - download the most recent CRLite filter and all following incremental filters r=jcj
Differential Revision: https://phabricator.services.mozilla.com/D37333

--HG--
extra : moz-landing-system : lando
2019-07-11 00:29:44 +00:00
Bobby Holley
3b7fbc734f Bug 1562763 - Move some types around. r=jld
Having to namespace these into GeckoChildProcessHost is annoying. The
|using| declarations help to some extent, but it's easier to just put
them in mozilla::ipc.

Differential Revision: https://phabricator.services.mozilla.com/D36538

--HG--
extra : moz-landing-system : lando
2019-07-10 22:37:35 +00:00
Barret Rennie
acd77aae10 Bug 1289211 - Rename InfallibleTArray to nsTArray in security/manager/ r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D36967

--HG--
extra : moz-landing-system : lando
2019-07-10 03:33:22 +00:00
Ciure Andrei
310109bd2e Merge mozilla-central to autoland. a=merge CLOSED TREE
--HG--
extra : rebase_source : 3b80d073fd836431e45fa7bfd52e0af0bf065f66
2019-07-10 18:47:38 +03:00
Haik Aftandilian
7105b782dc Bug 1556846 - [10.15] Crash in [@ mozilla::plugins::PluginUtilsOSX::SetProcessName] r=spohl
Allow limited access to the proc_pidinfo() syscall from the Mac utility process sandbox.

Differential Revision: https://phabricator.services.mozilla.com/D37533

--HG--
extra : moz-landing-system : lando
2019-07-10 15:00:05 +00:00
J.C. Jones
12e7f4d58f Bug 1564499 - land NSS 264f19e7ede7 UPGRADE_NSS_RELEASE, r=me
--HG--
extra : rebase_source : ff8107777ed0677caaa7249d77f5cf3871c25de2
extra : amend_source : bc8998d1b575164552d4b44396a7db4122a04777
2019-07-09 18:01:15 +00:00
Narcis Beleuzu
59c3fccd33 Merge inbound to mozilla-central. a=merge 2019-07-09 06:45:48 +03:00
Sebastian Hengst
654b6e825b merge mozilla-central to mozilla-inbound. a=merge CLOSED TREE 2019-07-08 15:11:29 +02:00
Sebastian Hengst
3134e9d91c Backed out 3 changesets (bug 1541557) for failures in SpecialPowersObserverAPI.js. a=backout CLOSED TREE
Backed out changeset 5b91c8869f42 (bug 1541557)
Backed out changeset a636725ad217 (bug 1541557)
Backed out changeset 7e6657f88b76 (bug 1561150)

--HG--
rename : testing/specialpowers/content/MozillaLogger.js => testing/mochitest/tests/SimpleTest/MozillaLogger.js
rename : testing/specialpowers/content/specialpowersAPI.js => testing/specialpowers/content/SpecialPowersAPI.jsm
rename : testing/specialpowers/content/SpecialPowersObserverAPI.js => testing/specialpowers/content/SpecialPowersAPIParent.jsm
rename : testing/specialpowers/content/specialpowers.js => testing/specialpowers/content/SpecialPowersChild.jsm
rename : testing/specialpowers/content/SpecialPowersObserver.jsm => testing/specialpowers/content/SpecialPowersParent.jsm
extra : amend_source : 158c9e896d32778e71f4fd343227f531d693e511
2019-07-08 14:38:45 +02:00
Sebastian Hengst
515d14403f Backed out 34 changesets (bug 1561150, bug 1541557, bug 1561724, bug 1561999, bug 1558298, bug 1561061, bug 1532795, bug 1560400, bug 1561122) for beta simulation failures (bug 1563905, bug 1564001). a=backout
Backed out changeset 210d6d52e8b0 (bug 1541557)
Backed out changeset 3115db154c45 (bug 1561122)
Backed out changeset b42748878b6e (bug 1561122)
Backed out changeset 266160ca8e9d (bug 1561999)
Backed out changeset 00e935828f41 (bug 1561724)
Backed out changeset 4aaf4882780d (bug 1561150)
Backed out changeset 6644e38a6692 (bug 1561150)
Backed out changeset 72cd895b1613 (bug 1561061)
Backed out changeset f0bac27bad8a (bug 1560400)
Backed out changeset 95da39224eab (bug 1560400)
Backed out changeset 3fe4d4942fd2 (bug 1532795)
Backed out changeset 23e90c6fec2b (bug 1532795)
Backed out changeset a7f093fbef06 (bug 1532795)
Backed out changeset c873f0eb94be (bug 1532795)
Backed out changeset cf359a8ec753 (bug 1532795)
Backed out changeset f2c260cae4b5 (bug 1541557)
Backed out changeset 054a0b7aa81d (bug 1541557)
Backed out changeset f808ec45ff9c (bug 1541557)
Backed out changeset 1025eeef0954 (bug 1541557)
Backed out changeset fe88b250e418 (bug 1541557)
Backed out changeset 6680278c231b (bug 1541557)
Backed out changeset 255735c1ff63 (bug 1541557)
Backed out changeset 51969e1c9c44 (bug 1558298)
Backed out changeset d12525990565 (bug 1558298)
Backed out changeset ef4ec8f0f886 (bug 1558298)
Backed out changeset 45a9599d9641 (bug 1558298)
Backed out changeset 4ccecdba1c34 (bug 1558298)
Backed out changeset 0e91fc9541c2 (bug 1558298)
Backed out changeset edd1cc6badf7 (bug 1558298)
Backed out changeset ba24251835fb (bug 1558298)
Backed out changeset ca88016511bb (bug 1558298)
Backed out changeset c95e6e599836 (bug 1558298)
Backed out changeset 9b1a9d802434 (bug 1558298)
Backed out changeset f859e4de0007 (bug 1558298)

--HG--
rename : testing/mochitest/tests/SimpleTest/MozillaLogger.js => testing/specialpowers/content/MozillaLogger.js
rename : testing/specialpowers/content/SpecialPowersParent.jsm => testing/specialpowers/content/SpecialPowersObserver.jsm
rename : testing/specialpowers/content/SpecialPowersAPIParent.jsm => testing/specialpowers/content/SpecialPowersObserverAPI.js
rename : testing/specialpowers/content/SpecialPowersChild.jsm => testing/specialpowers/content/specialpowers.js
rename : testing/specialpowers/content/SpecialPowersAPI.jsm => testing/specialpowers/content/specialpowersAPI.js
extra : rebase_source : 223d2e49710b016c9973765d402c61692004518e
extra : amend_source : ec773fe82334e6da536bb21e83a994a5f2d03091
2019-07-08 10:37:28 +02:00
Jed Davis
0ba66c379f Bug 1534780 - Add free interconversion between UniqueFileHandle and ipc::FileDescriptor and use it in a few places. r=froydnj
Now that UniqueFileHandle can be used more widely, and with
ipc::FileDescriptor being essentially a copyable UniqueFileHandle, it
makes sense to add a move constructor and a "forget"-like method to
convert between them when needed.

Depends on D26737

Differential Revision: https://phabricator.services.mozilla.com/D26738

--HG--
extra : moz-landing-system : lando
2019-06-28 19:46:58 +00:00
ffxbld
18132fb6de No Bug, mozilla-central repo-update HSTS HPKP blocklist remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D37242

--HG--
extra : moz-landing-system : lando
2019-07-08 12:47:22 +00:00
Sylvestre Ledru
e77bfc655d Bug 1519636 - Reformat recent changes to the Google coding style r=Ehsan
# ignore-this-changeset

Differential Revision: https://phabricator.services.mozilla.com/D38057

--HG--
extra : moz-landing-system : lando
2019-07-16 07:33:44 +00:00
Noemi Erli
ad06a86a88 Merge mozilla-central to inbound. a=merge CLOSED TREE 2019-07-08 12:53:36 +03:00
J.C. Jones
61484db444 Bug 1550889 - land NSS NSS_3_45_RTM UPGRADE_NSS_RELEASE, r=me
--HG--
extra : rebase_source : d983d1f4fbb04332d4cf317e36cff87523c56636
2019-07-05 17:57:05 +00:00
Victor Porof
221861fb7c Bug 1561435 - Fix linting errors for security/, r=standard8
# ignore-this-changeset

Differential Revision: https://phabricator.services.mozilla.com/D35929

--HG--
extra : source : d6f4b7c214863a85893d946968caeeec07126be1
extra : intermediate-source : 03e188f8f4f00d8eae72ff1a690c9cbacc2313da
2019-06-21 16:21:34 -07:00
Victor Porof
858f3b554b Bug 1561435 - Format security/, a=automatic-formatting
# ignore-this-changeset

Differential Revision: https://phabricator.services.mozilla.com/D35928

--HG--
extra : source : 4e926f91b17c2b13cdaf13e017629286275dbc00
2019-07-05 10:57:28 +02:00
Victor Porof
b5a4cb3848 Bug 1558517 - Pre 3.0: Remove conflicting eslint rules, and turn on "curly: all" everywhere, r=standard8
Differential Revision: https://phabricator.services.mozilla.com/D34535

--HG--
extra : source : 74ed7ee773393d305c4e948a57a1b1e32b1f12e8
extra : intermediate-source : 403d0757d61683e0a85d0bb07768eb39fbd0af72
2019-06-28 17:14:01 +02:00
Razvan Maries
daed363fd7 Merge mozilla-inbound to mozilla-central a=merge 2019-07-05 00:40:17 +03:00
Csoregi Natalia
0c754625a9 Merge mozilla-central to mozilla-inbound. CLOSED TREE 2019-07-04 12:54:22 +03:00
Oana Pop Rus
2ad74ef9f7 Merge mozilla-central to inbound. a=merge CLOSED TREE 2019-07-04 06:38:21 +03:00
Narcis Beleuzu
6d2dcfb90a Backed out changeset 08ff2f330260 (bug 1562809) for bc failures on browser_exportP12_passwordUI.js . CLOSED TREE 2019-07-03 23:39:29 +03:00
J.C. Jones
bc5c1226d8 Bug 1550889 - land NSS NSS_3_45_BETA2 UPGRADE_NSS_RELEASE, r=me
--HG--
extra : rebase_source : 9dbabf7a7500a34854642e5c55cc4507c4c1aa4a
2019-07-03 17:02:31 +00:00
ffxbld
c3dff17808 No Bug, mozilla-central repo-update HSTS HPKP blocklist remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D36908

--HG--
extra : moz-landing-system : lando
2019-07-04 13:06:12 +00:00
Tim Nguyen
6374da2c07 Bug 1562809 - Convert XUL textboxes in setp12password.xul and changepassword.xul to HTML inputs. r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D36560

--HG--
extra : moz-landing-system : lando
2019-07-03 17:32:25 +00:00
Dana Keeler
ca691e2faf bug 1553550 - removing expiring intermediate preloading telemetry r=jcj
Differential Revision: https://phabricator.services.mozilla.com/D36516

--HG--
extra : moz-landing-system : lando
2019-07-03 16:49:18 +00:00
Haik Aftandilian
a218f608fc Bug 1558924 - [10.15] Widevine crashes on macOS Catalina Beta r=handyman
Allow limited access to the proc_pidinfo() syscall from the GMP sandbox.

Differential Revision: https://phabricator.services.mozilla.com/D36810

--HG--
extra : moz-landing-system : lando
2019-07-03 18:17:55 +00:00
Tim Nguyen
02f77cdcee Bug 1562809 - Convert XUL textboxes in setp12password.xul and changepassword.xul to HTML inputs. r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D36560

--HG--
extra : moz-landing-system : lando
2019-07-03 21:59:55 +00:00
Dorel Luca
0671407b7b Merge mozilla-inbound to mozilla-central. a=merge 2019-07-02 12:38:01 +03:00
Dorel Luca
4bbd01493b Backed out 43 changesets (bug 1561724, bug 1561150, bug 1541557, bug 1561122, bug 1560400, bug 1558298, bug 1561999, bug 1532795, bug 1561061) for multiple failures. CLOSED TREE
Backed out changeset 1a4fe24a016c (bug 1541557)
Backed out changeset 6fc41e51bcee (bug 1561061)
Backed out changeset d916d89a5c90 (bug 1561122)
Backed out changeset 757d285aafdd (bug 1560400)
Backed out changeset a7eab5ca061d (bug 1541557)
Backed out changeset d972bbdfe039 (bug 1541557)
Backed out changeset 8802daac6779 (bug 1541557)
Backed out changeset 92c01418b96f (bug 1561150)
Backed out changeset fa5e186e1635 (bug 1561061)
Backed out changeset aa2bee0b18c3 (bug 1560400)
Backed out changeset adf832af8e48 (bug 1561150)
Backed out changeset 72630a7c6e67 (bug 1561999)
Backed out changeset c35aff2a9336 (bug 1561724)
Backed out changeset 19e0edc92077 (bug 1561150)
Backed out changeset 0b3e2164f128 (bug 1561150)
Backed out changeset 43211ebfe738 (bug 1561122)
Backed out changeset c2d0956f41d8 (bug 1561061)
Backed out changeset bf0f0e95c61c (bug 1560400)
Backed out changeset 84633034590f (bug 1560400)
Backed out changeset d5415970da5f (bug 1532795)
Backed out changeset 119caddcb066 (bug 1532795)
Backed out changeset fbbe113aeef2 (bug 1532795)
Backed out changeset 8a3d311c7fac (bug 1532795)
Backed out changeset 1471732eca80 (bug 1532795)
Backed out changeset 46ff845a7b0c (bug 1541557)
Backed out changeset c2697f04d38c (bug 1541557)
Backed out changeset 75ebd6fce136 (bug 1541557)
Backed out changeset 189dc8a35981 (bug 1541557)
Backed out changeset b4ed40bea269 (bug 1541557)
Backed out changeset 158a4000c44b (bug 1541557)
Backed out changeset 61fa2745733f (bug 1541557)
Backed out changeset d2ee912c5189 (bug 1558298)
Backed out changeset 7a0aab00327b (bug 1558298)
Backed out changeset fddf2808fedf (bug 1558298)
Backed out changeset 0f6b382f0626 (bug 1558298)
Backed out changeset 6ccaa25367f2 (bug 1558298)
Backed out changeset d27574cfbb0e (bug 1558298)
Backed out changeset 162bc1fc2730 (bug 1558298)
Backed out changeset f94500dd11e3 (bug 1558298)
Backed out changeset fb67ac962bc5 (bug 1558298)
Backed out changeset c634099abb9d (bug 1558298)
Backed out changeset 8d4419c439e1 (bug 1558298)
Backed out changeset d8b7ed5e149f (bug 1558298)

--HG--
rename : testing/mochitest/tests/SimpleTest/MozillaLogger.js => testing/specialpowers/content/MozillaLogger.js
rename : testing/specialpowers/content/SpecialPowersParent.jsm => testing/specialpowers/content/SpecialPowersObserver.jsm
rename : testing/specialpowers/content/SpecialPowersAPIParent.jsm => testing/specialpowers/content/SpecialPowersObserverAPI.js
rename : testing/specialpowers/content/SpecialPowersChild.jsm => testing/specialpowers/content/specialpowers.js
rename : testing/specialpowers/content/SpecialPowersAPI.jsm => testing/specialpowers/content/specialpowersAPI.js
2019-07-02 10:51:56 +03:00
Tim Nguyen
b5736ca41a Bug 1562654 - Replace XUL textbox with HTML input in security/manager/pki/resources/content/certViewer.js r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D36490

--HG--
extra : moz-landing-system : lando
2019-07-01 21:05:26 +00:00
Tim Nguyen
21dbb12196 Bug 1562652 - Convert security/manager/pki/resources/content/exceptionDialog.xul XUL textbox to HTML input. r=Gijs
Differential Revision: https://phabricator.services.mozilla.com/D36489

--HG--
extra : moz-landing-system : lando
2019-07-01 15:29:27 +00:00
Kris Maglione
fcb799ab11 Bug 1541557: Part 3 - Update callers of sync SpecialPowers functions to await the return value. r=nika
When we migrate SpecialPowers to a JSWindowActor, it will no longer be able to
use synchronous IPC messaging, which means that its current synchronous APIs
will have to become asynchronous.

This patch doesn't change the behavior of those functions, but it does change
their callers to `await` their return values rather than using them directly.
This pattern will work the same whether the functions return a promise or a
plain value, which simplifies the migration.

Differential Revision: https://phabricator.services.mozilla.com/D35053

--HG--
extra : rebase_source : baffba2107b175250573baae3f54d48becbd2a16
extra : source : b4ed40bea2698802ef562a0931c0b560737fb89d
2019-06-12 11:41:32 -07:00
Kris Maglione
a722f15dd6 Bug 1541557: Part 3 - Update callers of sync SpecialPowers functions to await the return value. r=nika
When we migrate SpecialPowers to a JSWindowActor, it will no longer be able to
use synchronous IPC messaging, which means that its current synchronous APIs
will have to become asynchronous.

This patch doesn't change the behavior of those functions, but it does change
their callers to `await` their return values rather than using them directly.
This pattern will work the same whether the functions return a promise or a
plain value, which simplifies the migration.

Differential Revision: https://phabricator.services.mozilla.com/D35053

--HG--
extra : rebase_source : 71821b4292a7c8f76d37ce372ddd9c2612973e7e
2019-06-12 11:41:32 -07:00
Gurzau Raul
4ca4adcdd7 Merge mozilla-central to inbound. a=merge CLOSED TREE 2019-07-02 01:21:33 +03:00
J.C. Jones
e24b9a2678 Bug 1550889 - land NSS NSS_3_45_BETA1 UPGRADE_NSS_RELEASE, r=me 2019-07-01 21:19:55 +00:00
Csoregi Natalia
29f8e6aebd Merge inbound to mozilla-central. a=merge 2019-06-29 12:59:53 +03:00
Dana Keeler
8a253dd58e bug 1559108 - remove unnecessary code in test_blocklist_onecrl.js that was causing unrelated failures r=KevinJacobs
Previously, OneCRL was part of the add-on blocklist system. Now that we use
kinto/remote settings, using AddonTestUtils in test_blocklist_onecrl.js is
unnecessary (and it was exposing a preexisting issue with how CacheObserver uses
prefs).

Differential Revision: https://phabricator.services.mozilla.com/D36377

--HG--
extra : moz-landing-system : lando
2019-06-28 23:06:20 +00:00
Narcis Beleuzu
a89b67e772 Backed out 15 changesets (bug 1479960, bug 1426526, bug 1534780, bug 1536697) for toolchain bustages on UniquePtrExtensions.h . CLOSED TREE
Backed out changeset a8518ea4b594 (bug 1479960)
Backed out changeset 7172762c4b87 (bug 1536697)
Backed out changeset 2ea5ccb8f3a1 (bug 1426526)
Backed out changeset d892a888fe9c (bug 1426526)
Backed out changeset 2c4d12bdfec3 (bug 1479960)
Backed out changeset 8a322064cf6d (bug 1479960)
Backed out changeset 47d387b6cd4a (bug 1479960)
Backed out changeset 8332565a6943 (bug 1479960)
Backed out changeset 9d7f1835f96f (bug 1479960)
Backed out changeset 0aa8af4965c5 (bug 1479960)
Backed out changeset 036809330a51 (bug 1479960)
Backed out changeset 39e18373e3d3 (bug 1479960)
Backed out changeset 6c2b995a9d30 (bug 1479960)
Backed out changeset 3c2b31744645 (bug 1534780)
Backed out changeset 26bb00a94d5d (bug 1534780)
2019-06-28 22:42:00 +03:00
shindli
67c134b492 Merge mozilla-central to inbound. a=merge CLOSED TREE 2019-06-29 02:23:28 +03:00
Julien Cristau
b7763aca9f Bug 1561994 - Fix test_enterprise_roots.js so it passes when security.enterprise_roots.enabled is enabled by default. r=keeler
Avoid race between off-main-thread loading of roots and flipping the
pref by making sure initialization is done.

Differential Revision: https://phabricator.services.mozilla.com/D36348

--HG--
extra : rebase_source : 56c035d5a8c429f99c8b1dfcfe3e014d8f02a6c0
2019-06-28 17:21:15 +02:00
Jared Wein
9f9906e4a9 Bug 1560447 - Add a decryptMany method to crypto-SDR.js for batch decrypting of stored logins. r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D35879

--HG--
extra : moz-landing-system : lando
2019-06-28 16:53:11 +00:00
Tom Ritter
01f7b56cf8 Bug 1552706 - Update MinGW version and remove MinGW sandbox hacks r=bobowen
Differential Revision: https://phabricator.services.mozilla.com/D36218

--HG--
extra : moz-landing-system : lando
2019-06-28 09:53:12 +00:00
Aaron Klotz
6d7a4fd701 Bug 1553249: Only set the Win32k disable policy for the RDD process when running on Win8+; r=bobowen
Differential Revision: https://phabricator.services.mozilla.com/D36239

--HG--
extra : moz-landing-system : lando
2019-06-28 09:44:03 +00:00
ffxbld
ab68b05adf No Bug, mozilla-central repo-update HSTS HPKP blocklist remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D36187

--HG--
extra : moz-landing-system : lando
2019-06-27 12:57:42 +00:00
J.C. Jones
e7523bd63a Bug 1550889 - land NSS 0c5d37301637 UPGRADE_NSS_RELEASE, r=me
--HG--
extra : rebase_source : 95c4646b380b9a784ba7404d62e7e73c22a28cee
2019-06-26 21:18:33 +00:00
ffxbld
bba7a6fe2b No Bug, mozilla-central repo-update HSTS HPKP blocklist remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D36484

--HG--
extra : moz-landing-system : lando
2019-07-01 13:15:39 +00:00
J.C. Jones
462ff49535 Bug 1550889 - land NSS ebc93d6daeaa UPGRADE_NSS_RELEASE, r=me
--HG--
extra : rebase_source : ab7873318ae458442c82321dbb9ec5cf72875fbf
2019-06-23 03:45:47 +00:00
Andrea Marchesini
872502eaf3 Bug 1560040 - Introduce 2 new URL-Classifier features to annotate and block social trackers, r=dimi
Differential Revision: https://phabricator.services.mozilla.com/D35421

--HG--
extra : moz-landing-system : lando
2019-06-22 16:53:50 +00:00
Noemi Erli
663a1c9ddc Backed out changeset 0a7f56cabe97 (bug 1560211) for failing in browser_startup_mainthreadio.js CLOSED TREE 2019-06-21 03:18:48 +03:00
Jed Davis
d32b9ba525 Bug 1534780 - Add free interconversion between UniqueFileHandle and ipc::FileDescriptor and use it in a few places. r=froydnj
Now that UniqueFileHandle can be used more widely, and with
ipc::FileDescriptor being essentially a copyable UniqueFileHandle, it
makes sense to add a move constructor and a "forget"-like method to
convert between them when needed.

Depends on D26737

Differential Revision: https://phabricator.services.mozilla.com/D26738

--HG--
extra : moz-landing-system : lando
2019-06-20 22:40:15 +00:00
Myk Melez
d91cc5fa28 Bug 1560211 - reopen env after creating store r=nanj,keeler
Differential Revision: https://phabricator.services.mozilla.com/D35381

--HG--
extra : moz-landing-system : lando
2019-06-20 20:55:19 +00:00
Ciure Andrei
72f3f971fb Backed out 15 changesets (bug 1479960, bug 1426526, bug 1534780, bug 1536697) for causing build bustages CLOSED TREE
Backed out changeset 5645e0cc3915 (bug 1479960)
Backed out changeset a7c09894c6a0 (bug 1536697)
Backed out changeset 510f03381af9 (bug 1426526)
Backed out changeset 7cf4735a088f (bug 1426526)
Backed out changeset 41080844e645 (bug 1479960)
Backed out changeset fdba3c5f8fd0 (bug 1479960)
Backed out changeset 26a8ebcb2db4 (bug 1479960)
Backed out changeset d0d383e5bae1 (bug 1479960)
Backed out changeset c418095bb7b7 (bug 1479960)
Backed out changeset 7b78b1945532 (bug 1479960)
Backed out changeset c47d47d4073d (bug 1479960)
Backed out changeset 71253b62a633 (bug 1479960)
Backed out changeset ae525f20bdbb (bug 1479960)
Backed out changeset 7fba719355d7 (bug 1534780)
Backed out changeset 771db331860a (bug 1534780)
2019-06-20 19:54:57 +03:00
Jed Davis
f32394bec8 Bug 1534780 - Add free interconversion between UniqueFileHandle and ipc::FileDescriptor and use it in a few places. r=froydnj
Now that UniqueFileHandle can be used more widely, and with
ipc::FileDescriptor being essentially a copyable UniqueFileHandle, it
makes sense to add a move constructor and a "forget"-like method to
convert between them when needed.

Depends on D26737

Differential Revision: https://phabricator.services.mozilla.com/D26738

--HG--
extra : moz-landing-system : lando
2019-06-17 02:19:37 +00:00
ffxbld
91d0636848 No Bug, mozilla-central repo-update HSTS HPKP blocklist remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D35423

--HG--
extra : moz-landing-system : lando
2019-06-20 15:37:06 +00:00
Mathieu Leplatre
9d4d46eb0b Bug 1559114 - Optimize CRLite intermediates download r=glasserc,jcj,keeler
Differential Revision: https://phabricator.services.mozilla.com/D34880

--HG--
extra : moz-landing-system : lando
2019-06-18 23:18:59 +00:00
Masatoshi Kimura
a98a095bd4 Bug 1559322 - Use "GreD" and "GreBinD" instead of "CurProcD" to remove macOS-specific hack and influence from firefox-appdir. r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D35011

--HG--
extra : moz-landing-system : lando
2019-06-18 18:43:05 +00:00
prathiksha
b901cf9927 Bug 1552333 - Move onCertErrorDetails from NetErrorChild.jsm to aboutNetError.js. r=johannh,flod,fluent-reviewers
Differential Revision: https://phabricator.services.mozilla.com/D31901

--HG--
extra : moz-landing-system : lando
2019-06-18 03:54:21 +00:00
ffxbld
b3eeba3ad1 No Bug, mozilla-central repo-update HSTS HPKP blocklist remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D35180

--HG--
extra : moz-landing-system : lando
2019-06-17 14:27:42 +00:00
Ciure Andrei
667c8abf86 Backed out 2 changesets (bug 1546816) for causing test_navigation.py and test_js_cert_override_service.js to permafail CLOSED TREE
Backed out changeset 4d299dcdcaaa (bug 1546816)
Backed out changeset dbb07b64cdf9 (bug 1546816)
2019-06-15 10:55:58 +03:00
Dragana Damjanovic
4c2b903df4 Bug 1546816 - Part 2: Change nsNSSCallback to prepare for moving cert verifications to the parent process if the socket process performs network access. r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D28742

--HG--
extra : moz-landing-system : lando
2019-06-04 22:20:30 +00:00
Dragana Damjanovic
7eedf007fd Bug 1546816 - Part 1: Changes needed for performing cert verification on the parent proces while networking access is on the socket process. r=keeler
This patche changes only security/manager/ssl/SSLServerCertVerification.cpp.

Differential Revision: https://phabricator.services.mozilla.com/D28741

--HG--
extra : moz-landing-system : lando
2019-06-14 12:40:12 +00:00
Boris Zbarsky
7add525d55 Bug 1558735 part 2. Stop using [array] in nsIX509Cert.getEmailAddresses. r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D34671

--HG--
extra : moz-landing-system : lando
2019-06-15 03:51:58 +00:00
Boris Zbarsky
d40a269ffc Bug 1558735 part 1. Stop using [array] in nsIX509Cert.getRawDER. r=keeler,mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D34670

--HG--
extra : moz-landing-system : lando
2019-06-14 18:17:20 +00:00
Haik Aftandilian
d302444d67 Bug 1498742 - Part 2 - Start the GMP sandbox earlier during process startup r=jya,cpearce
Change the Mac GMP process launch to include sandboxing params on the command line to allow the sandbox to be started earlier during GMP process launch. Content, extension, and RDD processes have already been changed to start the sandbox earlier.

Update GMPProcessParent to override GeckoChildProcessHost methods used to construct sandboxing parameters. Pass the plugin path as a sandbox parameter so that the sandbox rules can whitelist the plugin directory which is now read after the sandbox is enabled in the plugin process. On development builds, pass "testingReadPath" params so directories needed during automated tests can be whitelisted.

Update Mac sandboxing code to detect GMP sandbox params on the command line and enable the sandbox with additional arguments needed for early sandbox start.

Allow reverting to the old implementation by setting security.sandbox.gmp.mac.earlyinit to false.

Differential Revision: https://phabricator.services.mozilla.com/D34085

--HG--
extra : moz-landing-system : lando
2019-06-14 22:55:27 +00:00
Dorel Luca
fb616d00a6 Backed out 2 changesets (bug 1498742) for OSX build bustages. CLOSED TREE
Backed out changeset f6da94d90350 (bug 1498742)
Backed out changeset 4f3e83d8de59 (bug 1498742)
2019-06-15 00:13:05 +03:00
Haik Aftandilian
c0874f2dba Bug 1498742 - Part 2 - Start the GMP sandbox earlier during process startup r=jya,cpearce
Change the Mac GMP process launch to include sandboxing params on the command line to allow the sandbox to be started earlier during GMP process launch. Content, extension, and RDD processes have already been changed to start the sandbox earlier.

Update GMPProcessParent to override GeckoChildProcessHost methods used to construct sandboxing parameters. Pass the plugin path as a sandbox parameter so that the sandbox rules can whitelist the plugin directory which is now read after the sandbox is enabled in the plugin process. On development builds, pass "testingReadPath" params so directories needed during automated tests can be whitelisted.

Update Mac sandboxing code to detect GMP sandbox params on the command line and enable the sandbox with additional arguments needed for early sandbox start.

Allow reverting to the old implementation by setting security.sandbox.gmp.mac.earlyinit to false.

Differential Revision: https://phabricator.services.mozilla.com/D34085

--HG--
extra : moz-landing-system : lando
2019-06-14 20:12:01 +00:00
Bogdan Tara
d62176d3d7 Backed out 2 changesets (bug 1498742) for nsMacUtilsImpl.cpp related build bustage a=backout
Backed out changeset 6729dc168afd (bug 1498742)
Backed out changeset e5eed57a9111 (bug 1498742)
2019-06-14 12:50:04 +03:00
shindli
95037e5b4e Merge mozilla-central to autoland. a=merge CLOSED TREE 2019-06-14 00:51:32 +03:00
shindli
0534ae5951 Merge inbound to mozilla-central. a=merge 2019-06-14 00:46:21 +03:00
Myk Melez
9c002b4396 Bug 1557161 - enable rkv consumers to migrate LMDB environments across architecture changes r=lina,keeler,froydnj
Differential Revision: https://phabricator.services.mozilla.com/D33863

--HG--
extra : moz-landing-system : lando
2019-06-13 19:14:59 +00:00
J.C. Jones
967507bdb6 Bug 1550889 - land NSS 313dfef345bd UPGRADE_NSS_RELEASE, r=me 2019-06-13 15:27:11 +00:00
Andreea Pavel
307e3f181b Backed out 2 changesets (bug 1498742) for build bustages at GMPProcessParent.cpp on a CLOSED TREE
Backed out changeset 5f9d32e26c71 (bug 1498742)
Backed out changeset ffc8d151cf3a (bug 1498742)
2019-06-13 04:38:56 +03:00
Haik Aftandilian
0f858863b6 Bug 1498742 - Part 2 - Start the GMP sandbox earlier during process startup r=jya,cpearce
Change the Mac GMP process launch to include sandboxing params on the command line to allow the sandbox to be started earlier during GMP process launch. Content, extension, and RDD processes have already been changed to start the sandbox earlier.

Update GMPProcessParent to override GeckoChildProcessHost methods used to construct sandboxing parameters. Pass the plugin path as a sandbox parameter so that the sandbox rules can whitelist the plugin directory which is now read after the sandbox is enabled in the plugin process. On development builds, pass "testingReadPath" params so directories needed during automated tests can be whitelisted.

Update Mac sandboxing code to detect GMP sandbox params on the command line and enable the sandbox with additional arguments needed for early sandbox start.

Allow reverting to the old implementation by setting security.sandbox.gmp.mac.earlyinit to false.

Differential Revision: https://phabricator.services.mozilla.com/D34085

--HG--
extra : moz-landing-system : lando
2019-06-12 23:41:53 +00:00
Haik Aftandilian
a195f66f52 Bug 1498742 - Part 1 - Move GetRepoDir(), GetObjDir(), IsDevelopmentBuild() from ContentChild to nsMacUtilsImpl r=spohl
Differential Revision: https://phabricator.services.mozilla.com/D34084

--HG--
extra : moz-landing-system : lando
2019-06-12 23:41:39 +00:00
Boris Zbarsky
2e99da1fb9 Bug 1558650. Stop using [array] in nsIOSKeyStore. r=keeler
This also removes the two extra copies of the byte buffer that we had; we don't
need to copy it more than once.  Once we have it in an std::vector, we can pass
that around by reference, not by value or by creating new vectors from copies
of its buffer.

Differential Revision: https://phabricator.services.mozilla.com/D34630

--HG--
extra : moz-landing-system : lando
2019-06-12 23:25:27 +00:00
Boris Zbarsky
ac7fb32487 Bug 1558739. Stop using [array] in nsIX509CertDB.exportPKCS12File. r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D34676

--HG--
extra : moz-landing-system : lando
2019-06-12 23:06:48 +00:00
Dorel Luca
75f0f73de5 Merge mozilla-central to mozilla-inbound 2019-06-12 15:17:56 +03:00
Boris Zbarsky
f891b30286 Bug 1558557. Stop using [array] in nsISecretDecoderRing. r=keeler
The UTF-16 to UTF-8 conversion is now handled by XPConnect, because we're using AUTF8String for the type.

Differential Revision: https://phabricator.services.mozilla.com/D34560

--HG--
extra : moz-landing-system : lando
2019-06-12 02:15:23 +00:00
Dana Keeler
5a208d1853 bug 1557092 - add fast path to avoid calling CERT_CreateSubjectList for most certificate verifications r=jcj,KevinJacobs
Differential Revision: https://phabricator.services.mozilla.com/D34042

--HG--
extra : moz-landing-system : lando
2019-06-11 22:45:26 +00:00
Boris Zbarsky
bc935e6c04 Bug 1558569. Stop using [array] in nsISiteSecurityService. r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D34568

--HG--
extra : moz-landing-system : lando
2019-06-11 21:23:21 +00:00
Masatoshi Kimura
345598abc1 Bug 1557931 - Stop using ACString parameters in nsICertOverrideService. r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D34274

--HG--
extra : moz-landing-system : lando
2019-06-11 16:50:38 +00:00
Boris Zbarsky
9de72a3ac6 Bug 1557793 part 2. Stop using [array] in nsIStringBundle. r=Pike
Differential Revision: https://phabricator.services.mozilla.com/D34196

--HG--
extra : moz-landing-system : lando
2019-06-11 15:51:51 +00:00
Mathieu Leplatre
a102f01554 Bug 1543598 - Move OneCRL and Pinning blocklist clients out of services r=jcj,glasserc
Differential Revision: https://phabricator.services.mozilla.com/D32297

--HG--
rename : services/common/tests/unit/test_blocklist_onecrl.js => security/manager/ssl/tests/unit/test_blocklist_onecrl.js
rename : services/common/tests/unit/test_blocklist_pinning.js => security/manager/ssl/tests/unit/test_blocklist_pinning.js
extra : moz-landing-system : lando
2019-06-11 10:14:40 +00:00
Boris Zbarsky
a4410ccb51 Bug 1558726. Stop using [array] in nsISocketTransportService. r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D34668

--HG--
extra : moz-landing-system : lando
2019-06-13 04:21:32 +00:00
ffxbld
6a9bae1546 No Bug, mozilla-central repo-update HSTS HPKP blocklist remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D34868

--HG--
extra : moz-landing-system : lando
2019-06-13 13:48:29 +00:00
Masatoshi Kimura
af5c37e3a4 Bug 1558056 - Exit tlsserver when parent process died. r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D34288

--HG--
extra : moz-landing-system : lando
2019-06-12 23:19:45 +00:00
Jonathan Kingston
a5ba216f93 Bug 1315460 - Removal of keygen element r=keeler,baku,jld,hsivonen
Differential Revision: https://phabricator.services.mozilla.com/D22810

--HG--
extra : moz-landing-system : lando
2019-06-13 08:58:07 +00:00
Haik Aftandilian
f87e72036e Bug 1498742 - Part 2 - Start the GMP sandbox earlier during process startup r=jya,cpearce
Change the Mac GMP process launch to include sandboxing params on the command line to allow the sandbox to be started earlier during GMP process launch. Content, extension, and RDD processes have already been changed to start the sandbox earlier.

Update GMPProcessParent to override GeckoChildProcessHost methods used to construct sandboxing parameters. Pass the plugin path as a sandbox parameter so that the sandbox rules can whitelist the plugin directory which is now read after the sandbox is enabled in the plugin process. On development builds, pass "testingReadPath" params so directories needed during automated tests can be whitelisted.

Update Mac sandboxing code to detect GMP sandbox params on the command line and enable the sandbox with additional arguments needed for early sandbox start.

Allow reverting to the old implementation by setting security.sandbox.gmp.mac.earlyinit to false.

Differential Revision: https://phabricator.services.mozilla.com/D34085

--HG--
extra : moz-landing-system : lando
2019-06-13 06:32:37 +00:00
Cosmin Sabou
0ab9a65596 Backed out changeset ce509bb0895a (bug 1557161) for Windows 2012 AArch64 build bustages. CLOSED TREE 2019-06-10 21:45:55 +03:00
Myk Melez
9edec819af Bug 1557161 - enable rkv consumers to migrate LMDB environments across architecture changes r=lina,keeler,froydnj
Differential Revision: https://phabricator.services.mozilla.com/D33863

--HG--
extra : moz-landing-system : lando
2019-06-10 18:14:46 +00:00
ffxbld
d70372dc0c No Bug, mozilla-central repo-update HSTS HPKP blocklist remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D34344

--HG--
extra : moz-landing-system : lando
2019-06-10 13:57:19 +00:00
J.C. Jones
1ab58c0d27 Bug 1550889 - land NSS d17569aa9d56 UPGRADE_NSS_RELEASE, r=me
--HG--
extra : rebase_source : 4fdf16aeb31e95f10548c847907eeffdbddb2d19
2019-06-07 17:51:08 +00:00
Dana Keeler
66f092c690 bug 1555392 - remove unnecessary things from test_cert_storage.js that were causing intermittent failures r=KevinJacobs
At some point in the past, test_cert_storage.js needed to initialize the add-on
system to start the blocklist system, which is where revocation updates used to
come from. This appears to no longer be the case and the code in question can be
removed (and it should be removed because it's causing intermittent failures).

Differential Revision: https://phabricator.services.mozilla.com/D33993

--HG--
extra : moz-landing-system : lando
2019-06-06 21:11:25 +00:00
Dana Keeler
1a1341430b bug 1488865 - import CRLite enrollment state r=jcj,KevinJacobs
This patch saves the CRLite enrollment state of every preloaded intermediate to
cert_storage. This is an intermediate (hah) step towards actually checking
CRLite state. We still have to implement downloading and updating the CRLite
bloom filter cascades and implement checking these filters when we encounter a
certificate issued from an enrolled intermediate (this work will be done in
future bugs).

Differential Revision: https://phabricator.services.mozilla.com/D33074

--HG--
extra : moz-landing-system : lando
2019-06-06 16:42:41 +00:00
Zibi Braniecki
a49f5263f1 Bug 1552714 - Fix tests to compare the result of getAttributes against L10nKeys. r=smaug
Differential Revision: https://phabricator.services.mozilla.com/D33740

--HG--
extra : moz-landing-system : lando
2019-06-06 16:33:09 +00:00
J.C. Jones
2f955dea5e Bug 1550889 - land NSS 8082be3a6363 UPGRADE_NSS_RELEASE, r=me
--HG--
extra : rebase_source : 84cb27998d0b4e36d9a7d388e3a8b2a4fc3bb886
2019-06-04 19:39:40 +00:00
Gian-Carlo Pascutto
84108d4e2b Bug 1555589 - Include sys/prctl.h not linux/prctl.h. r=jld
Differential Revision: https://phabricator.services.mozilla.com/D33517

--HG--
extra : moz-landing-system : lando
2019-06-03 21:35:44 +00:00
Dana Keeler
098bc1f91c bug 1555854 - avoid creating transient threads in PSM (particularly CryptoTask) r=KevinJacobs
CryptoTask is a helper class that makes it easier to implement code that runs on
a background thread and then notifies completion on the main thread (this is
useful for not blocking the main thread with long-running cryptography or I/O).
Before this patch, each CryptoTask would create a new thread each time it ran,
which was inefficient. This patch updates CryptoTask to use the stream transport
service (which is essentially a pool of threads for doing exactly these kinds of
things and notably is not to be confused with the socket transport service) to
run each task. Additionally, there were a few places in PSM where we
unnecessarily created new threads to perform similar tasks. These now use the
stream transport service as well.

Differential Revision: https://phabricator.services.mozilla.com/D33534

--HG--
extra : moz-landing-system : lando
2019-06-03 23:47:48 +00:00
Nihanth Subramanya
3d82fc9a8a Bug 1547015 - Implement a clearAllOverrides method in nsICertOverrideService. r=johannh,keeler
Differential Revision: https://phabricator.services.mozilla.com/D32886

--HG--
extra : moz-landing-system : lando
2019-06-03 21:29:56 +00:00
J.C. Jones
2b5a2efa96 Bug 1555425 - Enable Web Authentication in all Fennec Android channels r=cpeterson,KevinJacobs
Disable for Geckoview, but enable for Fennec.

Differential Revision: https://phabricator.services.mozilla.com/D33050

--HG--
extra : moz-landing-system : lando
2019-06-03 17:51:57 +00:00
ffxbld
5cd2a9bc7d No Bug, mozilla-central repo-update HSTS HPKP blocklist remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D33506

--HG--
extra : moz-landing-system : lando
2019-06-03 15:44:26 +00:00
Dana Keeler
4a553d09d1 bug 1554152 - use the auto-clearing TLS context for connections with origin attributes from private contexts r=KevinJacobs
PSM has two instances of TLS bookkeeping structures ("SharedSSLState"): a
"public" one for most connections and a "private" one that automatically clears
its state when the last private browsing context (usually a window) closes.
Since we moved to separating connections by origin attributes, the latter is
largely redundant because keying by origin attributes already separates
connections from different contexts, even when using the "public" shared TLS
state structure. However, it still has the advantage of clearing its state when
the last private browsing context closes. This patch updates the decision of
which SharedSSLState to use by taking into account origin attributes. That is,
if the origin attributes of the connection has a private browsing ID that isn't
the default (unset), we'll use the auto-clearing SharedSSLState. This has the
effect of auto-clearing cached client auth certificate state for private
contexts when the last private browsing window closes. It also clears
accumulated TLS intolerance state in the private context, but that isn't as
relevant any more since we don't do TLS fallback by default.

Differential Revision: https://phabricator.services.mozilla.com/D33099

--HG--
extra : moz-landing-system : lando
2019-05-31 21:59:10 +00:00
Andrea Marchesini
b1b122fb20 Bug 1554464 - Merge nsICookie2 and nsICookie in 1 single interface, r=Ehsan
Differential Revision: https://phabricator.services.mozilla.com/D33031

--HG--
extra : moz-landing-system : lando
2019-05-31 09:36:44 +00:00
Boris Zbarsky
794039bf74 Bug 1553018 part 3. Add various preferences bindings use in Pref annotations on interfaces to StaticPrefs. r=edgar
Differential Revision: https://phabricator.services.mozilla.com/D32944

--HG--
extra : moz-landing-system : lando
2019-05-30 17:23:04 +00:00
ffxbld
669d19df08 No Bug, mozilla-central repo-update HSTS HPKP blocklist remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D33154

--HG--
extra : moz-landing-system : lando
2019-05-30 13:07:37 +00:00
Mihai Alexandru Michis
2454605299 Merge mozilla-central to autoland. CLOSED TREE 2019-05-30 12:49:36 +03:00
prathiksha
325e222d30 Bug 1549561 - Move _setTechDetails from NetErrorChild.jsm to aboutNetError.js. r=johannh,flod
Differential Revision: https://phabricator.services.mozilla.com/D30852

--HG--
extra : moz-landing-system : lando
2019-05-30 06:43:14 +00:00
shindli
8b24790fb3 Merge mozilla-central to inbound. a=merge CLOSED TREE 2019-05-30 00:58:01 +03:00