Commit Graph

13592 Commits

Author SHA1 Message Date
ffxbld
7d339c345c No bug, Automated HSTS preload list update from host bld-linux64-spot-324 - a=hsts-update 2018-03-04 00:46:25 -08:00
shindli
68a1ed26ac Merge autoland to mozilla-central. a=merge 2018-03-03 01:05:23 +02:00
ffxbld
4744487bf0 No bug, Automated HPKP preload list update from host bld-linux64-spot-030 - a=hpkp-update 2018-03-02 12:57:40 -08:00
ffxbld
7bd2ace171 No bug, Automated HSTS preload list update from host bld-linux64-spot-030 - a=hsts-update 2018-03-02 12:57:36 -08:00
Dorel Luca
3ccafa2b66 Merge mozilla-inbound to mozilla-central. a=merge 2018-03-02 00:09:29 +02:00
Dorel Luca
109ad47bbf Merge autoland to mozilla-central. a=merge 2018-03-02 00:05:07 +02:00
ffxbld
84c76716c7 No bug, Automated HPKP preload list update from host bld-linux64-spot-302 - a=hpkp-update 2018-03-01 12:02:34 -08:00
ffxbld
e775e30412 No bug, Automated HSTS preload list update from host bld-linux64-spot-302 - a=hsts-update 2018-03-01 12:02:30 -08:00
Sebastian Hengst
118e03a936 merge mozilla-central to mozilla-inbound 2018-03-01 20:32:20 +02:00
Masatoshi Kimura
b1b043af08 Bug 1442266 - Stop including unnecessary <iostream>. r=froydnj
MozReview-Commit-ID: B0JDqyBanFE

--HG--
extra : rebase_source : dec1e2678083e3fb2b9a6b89322d1fa747ed6d4a
2018-03-01 23:07:56 +09:00
J.C. Jones
8144e93399 Bug 1442075 - Enforce Symantec distrust in Firefox 60 r=keeler
Per the Consensus plan, this patch enforces the distrust of Syamntec roots from
Bug 1409257. It is ultimately destined for Firefox 60.

MozReview-Commit-ID: 8Vpxdflk9Wu

--HG--
extra : rebase_source : 39dddbdc5fd18a692c0588c57c7fd8c4604ea76c
2018-03-01 17:09:21 -07:00
David Keeler
83942e01e1 bug 1441223 - add a new (overridable) error code to describe extra policy constraint failures r=jcj
Certificate verification failures that result from additional policy constraint
failures now use the error code
"MOZILLA_PKIX_ERROR_ADDITIONAL_POLICY_CONSTRAINT_FAILED" (also known as
"Result::ERROR_ADDITIONAL_POLICY_CONSTRAINT_FAILED", depending on the context).

MozReview-Commit-ID: 9rE7gRBapRF

--HG--
extra : rebase_source : 9a60900a86f9eebab58b973f3e8f776b2481a1ff
2018-02-27 11:21:51 -08:00
Bob Owen
8efbee5948 Bug 1441801 Part 2: Fix line endings in sandboxBroker.cpp. r=jimm 2018-03-01 14:37:26 +00:00
Bob Owen
be5a4dadac Bug 1441801 Part 1: Stop using the chromium sandbox DLL blocking mechanism on Nightly. r=jimm 2018-03-01 14:37:25 +00:00
Cosmin Sabou
a97105ec0d Merge inbound to mozilla-central. a=merge 2018-02-28 23:48:29 +02:00
ffxbld
08a7733d6d No bug, Automated HPKP preload list update from host bld-linux64-spot-302 - a=hpkp-update 2018-02-28 12:02:20 -08:00
ffxbld
0799f9b06e No bug, Automated HSTS preload list update from host bld-linux64-spot-302 - a=hsts-update 2018-02-28 12:02:16 -08:00
Florian Quèze
c714053d73 Bug 1433175 - scripted patch to replace Components.classes[, Components.interfaces.nsI, Components.utils. and Components.results. with Cc, Ci, Cu and Cr, r=Mossop. 2018-02-28 18:51:33 +01:00
Sebastian Hengst
769222fadf merge mozilla-inbound to mozilla-central. a=merge
--HG--
rename : browser/base/content/tabbrowser.xml => browser/base/content/tabbrowser.js
2018-02-28 12:54:12 +02:00
Sebastian Hengst
1761ef65c7 merge mozilla-central to mozilla-inbound. CLOSED TREE 2018-02-28 20:19:28 +02:00
Sebastian Hengst
1ded4e973b merge mozilla-central to mozilla-inbound 2018-02-28 12:58:05 +02:00
J.C. Jones
c1babbf4e1 Bug 1437754 - Add a pref and disable the Symantec distrust algorithm r=keeler
This adds the pref "security.pki.distrust_ca_policy" which, if set to 1,
enforces the graduated distrust from Bug 1409257, and if set to 0 (as it is in
this patch) disables that distrust.

This pref is intended to outlast the Symantec distrust, and instead be able to
extend to enable/disable future root policy actions. It would need its own
tests for that, in the future.

MozReview-Commit-ID: BAZfkapysfX

--HG--
extra : rebase_source : 02b00aa486e9f8efb81b32d38d80db5cae86bc6e
2018-02-27 16:04:51 -07:00
Kai Engert
16cfaba763 Bug 1432177, uplift NSS_3_36_BETA3, r=me
UPGRADE_NSS_RELEASE
2018-02-28 11:13:28 +01:00
Honza Bambas
281502cac6 Bug 1363284 - HTTP/2 anonymous/onymous session (connection) coalescing, r=mayhemer
--HG--
extra : rebase_source : 66192a32668de8a9cd99722d1e0860cce2f84030
2018-02-15 09:10:00 +02:00
J.C. Jones
4bc9fe0d27 Bug 1439378 - Re-enable the imminent distrust browser-console test r=fkiefer,keeler
This patch does a few things:
1) It removes the symantecRoot and symantec_affected certs from build/pgo/certs'
   DB.
2) It upgrades that DB from the old format to SQLite (and this 8/3 to 9/4).
3) It adds a new cert "imminently_distrusted" to that DB for the bc test.
4) It changes the Subject of the immient distrust test to only have the CN
   field: this is because certutil reorders C to come after CN, and just like
   with the real Symantec certs, I had put C first. So rather than deal with
   importing the end entity for the pgo tests, I decided to just make things
   simple and change the tested subject.
5) Finally, it re-enables the test that was disabled in Bug 1434300.

MozReview-Commit-ID: Bt2RKyInJje

--HG--
rename : build/pgo/certs/cert8.db => build/pgo/certs/cert9.db
rename : build/pgo/certs/key3.db => build/pgo/certs/key4.db
extra : rebase_source : efceb67ae16f0af617bbd8bec201d52eee0f467d
2018-02-26 15:55:35 -07:00
Franziskus Kiefer
2842796e4c Bug 1435713 - fix linter errors, a=bustage 2018-02-28 10:28:11 +01:00
Franziskus Kiefer
49889960b6 Bug 1435713 - collect cert fingerprints for failed CS verifications, r=keeler,francois
Reviewers: keeler, francois

Reviewed By: keeler, francois

Subscribers: francois, ulfr

Bug #: 1435713

Differential Revision: https://phabricator.services.mozilla.com/D623

--HG--
extra : rebase_source : 0142e9d970eb289cf9814ae2c9bdc1f0a2a4ac46
extra : amend_source : bc4b4ca15d167ee9f0574efad7934458e2facd9b
2018-02-28 09:26:30 +01:00
Valentin Gosu
ed218f0a19 Bug 1433958 - Change code that sets nsIURI.scheme to use nsIURIMutator r=mayhemer
MozReview-Commit-ID: GgyIkZSG2y3

--HG--
extra : rebase_source : 5398a29d8cb910c909ed88e1a6cbd9fd63e6b745
2018-02-26 20:43:47 +01:00
Valentin Gosu
7f3b09b694 Bug 1433958 - Change code that sets nsIURI.port to use nsIURIMutator r=mayhemer
MozReview-Commit-ID: 7Lu7JJvDUGF

--HG--
extra : rebase_source : 8d5a9bb1c4a5a525f7c5bc8d07c1e7029d2029a3
2018-02-26 20:43:46 +01:00
J.C. Jones
6d19459740 Bug 1440029 - Add a test for TrustOverrideUtils.h r=keeler
This is the test originally from Bug 1434300 that was pulled due to
Bug 1433015.

MozReview-Commit-ID: IEPCRVdS2v4

--HG--
extra : rebase_source : 843222f36b9fffe73cdf02aebb3f263897a943de
2018-02-21 16:54:52 -05:00
Tiberius Oros
22d5a6c371 Merge autoland to mozilla-central. a=merge 2018-02-27 00:18:03 +02:00
ffxbld
876968b0bb No bug, Automated HPKP preload list update from host bld-linux64-spot-030 - a=hpkp-update 2018-02-26 12:44:28 -08:00
ffxbld
92e1462566 No bug, Automated HSTS preload list update from host bld-linux64-spot-030 - a=hsts-update 2018-02-26 12:44:24 -08:00
ffxbld
f3a601c889 No bug, Automated HPKP preload list update from host bld-linux64-spot-302 - a=hpkp-update 2018-02-25 11:53:31 -08:00
ffxbld
a8acc056c9 No bug, Automated HSTS preload list update from host bld-linux64-spot-302 - a=hsts-update 2018-02-25 11:53:27 -08:00
Patrick McManus
4ece6279ba Bug 1439105 - Ban H2 Client Certs Post Handshake r=bagder,keeler
MozReview-Commit-ID: Dfx5bB5NOBp

--HG--
extra : rebase_source : ec0984aec6625950b139c06a4ae3da69f49afdf3
2018-02-17 08:10:13 -05:00
ffxbld
dbacae538a No bug, Automated HPKP preload list update from host bld-linux64-spot-324 - a=hpkp-update 2018-02-24 12:01:40 -08:00
ffxbld
da2f635f78 No bug, Automated HSTS preload list update from host bld-linux64-spot-324 - a=hsts-update 2018-02-24 12:01:36 -08:00
Sebastian Hengst
7be9fed7d0 merge mozilla-inbound to mozilla-central. a=merge 2018-02-24 02:58:35 +02:00
Florian Quèze
682b1ec3b2 Bug 1440284 - change this.EXPORTED_SYMBOLS back to var EXPORTED_SYMBOLS in JS modules, r=mccr8. 2018-02-23 20:50:01 +01:00
ffxbld
57247f5331 No bug, Automated HPKP preload list update from host bld-linux64-spot-302 - a=hpkp-update 2018-02-23 11:48:18 -08:00
ffxbld
37e4f549d7 No bug, Automated HSTS preload list update from host bld-linux64-spot-302 - a=hsts-update 2018-02-23 11:48:14 -08:00
ffxbld
0b6ee32aee No bug, Automated HPKP preload list update from host bld-linux64-spot-324 - a=hpkp-update 2018-02-22 11:50:18 -08:00
ffxbld
b779a894df No bug, Automated HSTS preload list update from host bld-linux64-spot-324 - a=hsts-update 2018-02-22 11:50:13 -08:00
Csoregi Natalia
dd63683685 Merge mozilla-central to autoland. a=merge CLOSED TREE 2018-02-21 23:52:24 +02:00
Csoregi Natalia
3011413f82 Merge inbound to mozilla-central. a=merge 2018-02-21 23:50:20 +02:00
Csoregi Natalia
4ae2fa641b Merge autoland to mozilla-central. a=merge 2018-02-21 23:49:19 +02:00
ffxbld
36baa4e37e No bug, Automated HPKP preload list update from host bld-linux64-spot-326 - a=hpkp-update 2018-02-21 11:46:16 -08:00
ffxbld
9c7bbae0ca No bug, Automated HSTS preload list update from host bld-linux64-spot-326 - a=hsts-update 2018-02-21 11:46:12 -08:00
Felipe Gomes
d261cc7c57 Bug 1429148 - Policy: Don't let a Master Password to be set. r=keeler
MozReview-Commit-ID: 8Adqg0KU7cZ

--HG--
extra : rebase_source : ec20e2f117d974edaa5df844091a086d12607771
2018-02-20 20:46:11 -03:00
Felipe Gomes
254ff126ef Bug 1429148 - Add nsIPK11Token.isInternalKeyToken. r=keeler,MattN
MozReview-Commit-ID: Gdd7MxDXoTC

--HG--
extra : rebase_source : a367c07755046657d7f2133d4858ea6e6b0c219a
2018-02-20 20:43:41 -03:00
ffxbld
2284608f88 No bug, Automated HPKP preload list update from host bld-linux64-spot-302 - a=hpkp-update 2018-02-20 11:59:25 -08:00
ffxbld
c098f7cf06 No bug, Automated HSTS preload list update from host bld-linux64-spot-302 - a=hsts-update 2018-02-20 11:59:21 -08:00
David Keeler
889e55fc5b bug 1439732 - fixup for backing out bug 1415991 post bug 1421084 (so Firefox 60 only) r=jcj
MozReview-Commit-ID: 4Hn9mt1TWwN

--HG--
extra : amend_source : 4cb25adb27986ec650d85762aecb5aae0cd29502
2018-02-20 12:28:01 -08:00
David Keeler
1d724da30f Backed out changeset 0a5795108e0a
MozReview-Commit-ID: DT67yB63lSn

--HG--
extra : rebase_source : ae106a256be2361a116cd1a14adb5a6d4b49ebe3
2018-02-20 12:21:55 -08:00
Jed Davis
9bdbd2d99f Bug 1438389 - Quietly disallow chown() in sandboxed content processes. r=gcp
Also covers fchownat() and attempts to be ready for newer archs like ARM64.

Bonus fix: extend bug 1354731 (mknod) fix to cover mknodat so this part
of the policy isn't glaringly inconsistent about "at" syscalls.

Tested locally by attaching gdb and injecting syscalls.

MozReview-Commit-ID: CCOk0jZVoG4

--HG--
extra : rebase_source : 1d0cafd9d91586eaec0233ff15b3bbb1ef7485f0
2018-02-15 16:10:00 -07:00
J.C. Jones
e5937633d9 Bug 1434300 - Add the DigiCert whitelisted SPKIs r=keeler
This adds the 4 digicert CAs to our whitelist as specified in Google's details
on the Chromium version of this plan [1].

[1] c022914eb2/net/data/ssl/symantec/README.md

MozReview-Commit-ID: BR7t1UheKeS

--HG--
rename : security/certverifier/TrustOverride-AppleGoogleData.inc => security/certverifier/TrustOverride-AppleGoogleDigiCertData.inc
extra : rebase_source : 406e42e805b3778ccce7ee85b18d5dea93e32b95
2018-02-21 14:08:59 -05:00
J.C. Jones
7d0730b216 Bug 1434300 - Change Symantec Distrust Algorithm's whitelist to SPKI-matching r=fkiefer,keeler
Because of the DigiCert-controlled sub-CAs and managed-CAs identified as also
needing to be whitelisted [1], and that those CAs are using an increasing number
of certificates all with different Subjects (but identical public keys) [2][3],
we will have to whitelist on SPKI rather than subject DN.

This makes the security/manager/ssl/tests/unit/test_symantec_apple_google.js
integration test different, as it now uses a real Google certificate that is
in the whitelist with only a cert verification rather than a full connection
test.

This patch does not add the DigiCert SPKIs to the list; I will do that in its
own patch.


[1] https://chromium.googlesource.com/chromium/src/+/master/net/data/ssl/symantec/README.md
[2] https://chromium-review.googlesource.com/c/chromium/src/+/916730
[3] https://crt.sh/?spkisha256=ac50b5fb738aed6cb781cc35fbfff7786f77109ada7c08867c04a573fd5cf9ee

MozReview-Commit-ID: 4qVeogDbSb

--HG--
extra : rebase_source : abbdd432b190d059a3b2ceeccf89b85a12c214dd
2018-02-21 14:08:47 -05:00
J.C. Jones
aaaf57c831 Bug 1434300 - Add a utility to match certificates based on SPKI r=fkiefer,keeler
This modifies crtshToDNStruct.py to be able to produce SPKI or DN-based lists,
and adds a SPKI-search method to TrustOverrideUtils.h.

This also regenerates the TrustOverride files to use the new script.

MozReview-Commit-ID: BhMoJbYXs7Y

--HG--
rename : security/manager/tools/crtshToDNStruct/crtshToDNStruct.py => security/manager/tools/crtshToIdentifyingStruct/crtshToIdentifyingStruct.py
rename : security/manager/tools/crtshToDNStruct/requirements.txt => security/manager/tools/crtshToIdentifyingStruct/requirements.txt
extra : rebase_source : 9ae4999ceea2d4092119fe81b787c4d66a5e17b1
2018-02-21 14:08:44 -05:00
J.C. Jones
894d57b6bf Bug 1434300 - Implement the Symantec distrust plan from Bug 1409257 r=fkiefer,keeler
The algorithm from https://hg.mozilla.org/mozilla-central/rev/595e27212723
(Bug 1409259) is adapted in this patch from nsNSSCallbacks into the TrustDomain
decisions.

This patch does not change the algorithm to use SPKI matching, nor add the
additional whitelisted intermediates from DigiCert; that will be done in a
separate commit.

This patch also does not update the pre-existing browser chrome test.

MozReview-Commit-ID: 1PdCAqo71bI

--HG--
extra : rebase_source : f1c6d00e16682f9303b8b2bfdf1fe5773c515ac5
2018-02-21 14:08:18 -05:00
J.C. Jones
e72f46e3ff Bug 1434300 - Update Imminent Distrust status for future Symantec sanctions r=fkiefer,keeler
This patch does a few things:

1) It adds a permament test mechanism for the "imminent distrust" trust status
in nsNSSCallbacks: a simple xpcshell test to exercise a clause in the imminent
distrust logic in nsNSSCallbacks' IsCertificateDistrustImminent method.

2) This test removes test_symantec_apple_google_unaffected.js as its
functionality is rolled into the new test_imminent_distrust.js.

3) It updates the Symantec imminent distrust warning algorithm to remove the
validity date exception; this warns of the upcoming distrust for those affected
certs in Firefox 63.

This patch does not attempt to edit the browser chrome test that checks the
console; that is a subsequent patch.

MozReview-Commit-ID: 1HyVLfmEOP7

--HG--
extra : rebase_source : 3955e3dcd9a21421105d97bd65d3965041de9b8c
2018-02-21 07:39:36 -05:00
Jonathan Kingston
8afc412494 Bug 1435733 - Upgrade mixed display content pref. r=baku,ckerschb,francois,mayhemer
MozReview-Commit-ID: ETIgVF3zhRu

--HG--
extra : rebase_source : e4c59f50584158f4b31527347b10424b56692fa1
2018-02-05 15:37:27 +00:00
ffxbld
7dbd69b271 No bug, Automated HPKP preload list update from host bld-linux64-spot-302 - a=hpkp-update 2018-02-19 12:14:58 -08:00
ffxbld
4f4cdf70f5 No bug, Automated HSTS preload list update from host bld-linux64-spot-302 - a=hsts-update 2018-02-19 12:14:54 -08:00
ffxbld
3e2e7c414f No bug, Automated HPKP preload list update from host bld-linux64-spot-302 - a=hpkp-update 2018-02-18 11:51:04 -08:00
ffxbld
18e9f8b8e0 No bug, Automated HSTS preload list update from host bld-linux64-spot-302 - a=hsts-update 2018-02-18 11:51:00 -08:00
Chris Peterson
0129d900f3 Bug 1436263 - Part 2: Replace override final virtual function specifiers with just final. r=froydnj
MozReview-Commit-ID: 70gt5SUu4Dv

--HG--
extra : rebase_source : 71912c6bde22aaed01e70615a4ee794a36e70d0e
extra : source : 1c22d4c65d70b797ee3e963ec426c90e1f89b5e3
2018-02-05 22:50:00 -08:00
Chris Peterson
d09123f248 Bug 1436263 - Part 1: Replace final override virtual function specifiers with just final. r=froydnj
MozReview-Commit-ID: DE5HkIhsZ6D

--HG--
extra : rebase_source : 94831c1e13a840dd2ea0600f64bcf70c2bf938d9
extra : source : cf9283bf1b0bca3a6311c98e227329d451f80ecb
2018-02-05 22:46:57 -08:00
ffxbld
101516e4b4 No bug, Automated HPKP preload list update from host bld-linux64-spot-302 - a=hpkp-update 2018-02-17 11:53:22 -08:00
ffxbld
b22fc381ad No bug, Automated HSTS preload list update from host bld-linux64-spot-302 - a=hsts-update 2018-02-17 11:53:18 -08:00
David Keeler
12125be772 bug 1437214 - if PathBuildingStep::Check fails due to a problem with the subject certificate rather than the potential issuer, set keepGoing to false r=jcj
MozReview-Commit-ID: DEr4YgXfkOL

--HG--
extra : rebase_source : daea8346adeb56cc34c0fb284dba2e571fd3621e
2018-02-09 16:35:54 -08:00
Gurzau Raul
641a1a335b Merge autoland to mozilla-central. a=merge 2018-02-17 00:07:28 +02:00
ffxbld
aac4bf5025 No bug, Automated HPKP preload list update from host bld-linux64-spot-324 - a=hpkp-update 2018-02-16 12:17:39 -08:00
ffxbld
3e2d0c9e68 No bug, Automated HSTS preload list update from host bld-linux64-spot-324 - a=hsts-update 2018-02-16 12:17:35 -08:00
Narcis Beleuzu
2d9816273c Merge inbound to mozilla-central. a=merge 2018-02-16 11:49:59 +02:00
Margareta Eliza Balazs
55aa0e75d6 Merge mozilla-central to inbound. a=merge CLOSED TREE 2018-02-15 22:43:18 +02:00
ffxbld
9c28e67497 No bug, Automated HPKP preload list update from host bld-linux64-spot-302 - a=hpkp-update 2018-02-15 11:54:30 -08:00
ffxbld
eb8f2dd6d1 No bug, Automated HSTS preload list update from host bld-linux64-spot-302 - a=hsts-update 2018-02-15 11:54:26 -08:00
David Parks
9a797c5ce2 Bug 1415160: Part 2 - Add mitigations to plugin process if not running from network drive r=bobowen
Adds MITIGATION_IMAGE_LOAD_NO_REMOTE and MITIGATION_IMAGE_LOAD_NO_LOW_LABEL to the plugin process if we aren't running from a networked drive.  The same condition applies to these mitigations in the content process.

--HG--
extra : rebase_source : b61f91f3e56f6b4930a03331b7791a9173857518
2017-12-21 12:36:02 -08:00
David Parks
90d62139c0 Bug 1415160: Part 1 - Enable new NPAPI Windows Process Mitigations; r=bobowen
Enables new process mitigations that have been included from Chromium upstream.

--HG--
extra : rebase_source : 8997bef9c6a6c660b39e68ebfabf90f4de162bca
2017-12-20 22:58:26 -08:00
Dorel Luca
90035255ae Merge autoland to mozilla-central a=merge 2018-02-15 00:19:43 +02:00
ffxbld
b704aa3943 No bug, Automated HPKP preload list update from host bld-linux64-spot-302 - a=hpkp-update 2018-02-14 11:41:55 -08:00
ffxbld
c8cb4d8575 No bug, Automated HSTS preload list update from host bld-linux64-spot-302 - a=hsts-update 2018-02-14 11:41:51 -08:00
ffxbld
149e4575b0 No bug, Automated HPKP preload list update from host bld-linux64-spot-302 - a=hpkp-update 2018-02-13 11:40:34 -08:00
ffxbld
1bcdadf7b5 No bug, Automated HSTS preload list update from host bld-linux64-spot-302 - a=hsts-update 2018-02-13 11:40:30 -08:00
Haik Aftandilian
c90be35636 Bug 1436566 - [Mac] Land disabled-by-default sandboxing for the Flash NPAPI plugin process. r=Alex_Gaynor,jimm
MozReview-Commit-ID: Es0GbMLKvH5

--HG--
extra : rebase_source : 991f20ac25735508d790947991f59214fb06e54f
2018-02-12 15:46:31 -08:00
Ciure Andrei
72080bd73c Merge inbound to mozilla-central. a=merge 2018-02-13 00:08:37 +02:00
Ciure Andrei
6c55aa90ec Merge autoland to mozilla-central. a=merge 2018-02-13 00:06:52 +02:00
ffxbld
9eab54622b No bug, Automated HPKP preload list update from host bld-linux64-spot-302 - a=hpkp-update 2018-02-12 11:53:23 -08:00
ffxbld
91e80a354d No bug, Automated HSTS preload list update from host bld-linux64-spot-302 - a=hsts-update 2018-02-12 11:53:20 -08:00
Markus Stange
62e953a6b6 Bug 785440 - Disable warning C4324 when building security/certverifier. r=keeler
This warning is triggered by the use of alignas() in js/public/RootingAPI.h.
Now that GeckoProfiler.h includes RootingAPI.h, this warning is encountered
when building security/certverifier because GeckoProfiler.h is already being
included transitively, through this inclusion path:
CertVerifier.cpp -> CertVerifier.h -> Telemetry.h -> StartupTimeline.h -> GeckoProfiler.h

However, this explanation is not entirely satisfactory, because there seems to
be an existing inclusion path for RootingAPI.h already:
CertVerifier.cpp -> CertVerifier.h -> BasePrincipal.h -> OriginAttributes.h
 -> ChromeUtils.h -> ChromeUtilsBinding.h -> RootingAPI.h

So I'm not quite sure why this problem is only starting to happen now.

MozReview-Commit-ID: AFuXpTjdPsi

--HG--
extra : rebase_source : 60f74c8655d15fbc6acbf0ce8a2f208e198e231e
2018-02-11 00:32:14 -05:00
Tom Ritter
aa82f54ab6 Bug 1435296 Address test failures caused by bumping timer precision to 2 ms r=baku
There are a few different reasons why tests needed updating (not an exhaustive list):

- Tests assume that successive operations take place at different times.
- Tests assume that an operation took a minimum amount of time.
- Tests hardcodes a specific delay.

In most cases we hardcode the preference off. In some cases this is the best approach,
in others, we would like to improve. The bug for tracking those improvements is Bug 1429648

An improvement that is present in some tests is to hardcode a specific precision reduction
that is acceptable based on the confides of the test. (Obviously this needs to be a fix for
the test framework and not a requirement on the feature being tested.)

In a few places, the test itself can be fixed, for example to no longer require the end
time of an operation to be strictly greater than the start time, and allows it to be equal
to it.

MozReview-Commit-ID: J59c7xQtZZJ

--HG--
extra : rebase_source : df8a03e76eaf9cdc9524dbb3eb9035af237e534b
2018-02-12 11:39:41 -06:00
ffxbld
929f38c465 No bug, Automated HPKP preload list update from host bld-linux64-spot-302 - a=hpkp-update 2018-02-11 11:38:54 -08:00
ffxbld
89d2f51207 No bug, Automated HSTS preload list update from host bld-linux64-spot-302 - a=hsts-update 2018-02-11 11:38:50 -08:00
ffxbld
d8618c2516 No bug, Automated HPKP preload list update from host bld-linux64-spot-305 - a=hpkp-update 2018-02-10 12:36:17 -08:00
ffxbld
667ffc2f8f No bug, Automated HSTS preload list update from host bld-linux64-spot-305 - a=hsts-update 2018-02-10 12:36:13 -08:00
Bogdan Tara
5bbbbe17bc Merge inbound to mozilla-central. a=merge 2018-02-10 11:57:47 +02:00
Dorel Luca
5642ca2d02 Backed out changeset 06f87ee5bbbb (bug 1231203) for xpcshell and TV failures on security/manager/ssl/tests/unit/test_ocsp_private_caching.js on a CLOSED TREE 2018-02-10 05:34:40 +02:00
David Keeler
37cd996306 bug 1231203 - ensure OCSP responses to requests from private contexts aren't cached on disk r=jcj
MozReview-Commit-ID: 374f7hERLee

--HG--
extra : rebase_source : b424ee96d7f48e4f9d0b8fce91a675ae4477c43d
2018-02-08 17:16:03 -08:00
Sebastian Hengst
d1700a0b7a merge mozilla-central to autoland. CLOSED TREE 2018-02-10 00:34:30 +02:00
Coroiu Cristina
e2b150dd90 Merge autoland to mozilla-central. a=merge 2018-02-09 23:57:50 +02:00
ffxbld
967bc4dd14 No bug, Automated HPKP preload list update from host bld-linux64-spot-302 - a=hpkp-update 2018-02-09 12:01:52 -08:00
ffxbld
a0bae7c069 No bug, Automated HSTS preload list update from host bld-linux64-spot-302 - a=hsts-update 2018-02-09 12:01:49 -08:00
Jed Davis
f57faf8137 Bug 1436882 - Fix termination signal when clone()ing child processes. r=gcp
This fixes a mistake in bug 1401062: the termination signal was omitted,
so it's 0, and if it isn't exactly SIGCHLD, then a tracer/debugger will
receive PTRACE_EVENT_CLONE rather than PTRACE_EVENT_FORK.  This causes
GDB to see the child process as a thread instead of a separate process,
and it becomes very confused after the process calls execve().

MozReview-Commit-ID: Baf2RFHVWRU

--HG--
extra : rebase_source : 50839967fc766bb9db123fe1af99a88495f8421b
2018-02-08 17:30:03 -07:00
J.C. Jones
3d8ea4a710 Bug 1434936 - Rework ChainHasValidPins to use nsNSSCertList r=keeler r=fkiefer
This commit reworks PublicKeyPinningService::ChainHasValidPins and
PublicKeyPinningService::EvalChain to use nsNSSCertList directly.  It also
updates nsSiteSecurityService::ProcessPKPHeader. This will be made more
efficient in Bug 1406854, where the call to VerifySSLServerCert gets replaced
with one to GetSucceededCertChain. (Such a change is premeature now because
before Bug 731478 lands this would lead to a session resumption regression
causing pins to not be set properly, which is triggered repeatedly in the
xpcshell tests.)

MozReview-Commit-ID: 1l186n1lXLH

--HG--
extra : rebase_source : 88e40bbf41b324ece762abfa84a758380102e199
extra : histedit_source : addcddf253c2901a25b29f65046908f52df61345
2018-01-31 18:50:29 -07:00
J.C. Jones
69d7ddbfe8 Bug 1434936 - Use nsNSSCertList in NSSCertDBTrustDomain::IsChainValid r=keeler r=fkiefer
This change is to use the higher-level structure nsNSSCertList when checking
IsChainValid so that we can use the more powerful (and tested) methods of that
object instead of the ad-hoc iterators.

This will also permit the Symantec Distrust code in Bug 1434300 to use these
methods, which keeps the code the same from the earlier Bug 1409259.

MozReview-Commit-ID: B5KmDa1JLE

--HG--
extra : rebase_source : 397d3ef7189eb6f81a1ceaf920464d9e842a8981
extra : histedit_source : 26b22257cb5fcc3389630dd0a1aba24095c46158
2018-01-31 16:02:00 -07:00
J.C. Jones
6395c26d4a Bug 1434936 - Add method nsNSSCertList::GetRootCertificate r=keeler r=fkiefer
This adds another utility method to nsNSSCertList to perform CERT_LIST_TAIL on
the underlying certificate list and return the last entry -- e.g., the root.
This is a convenience method to let other parts of the certificate verifier
continue to work with the higher-level nsNSSCertificate objects instead of
having to convert them.

MozReview-Commit-ID: EEi9L5Iepc6

--HG--
extra : rebase_source : 2836767a7186f65debf338f8d1f2a981636ed29b
extra : histedit_source : 5b87ec6c522ac1b84d91052e21184f3c03d9ea52
2018-01-31 17:14:40 -07:00
Brendan Dahl
a1b881280b Bug 1434016 - Inline and remove the various security manager overlays. r=keeler
This is part of the work to remove XUL overlays. All of these overlays are
used only once and do not need to be in their own overlay files.

MozReview-Commit-ID: Ecwq2UN52o9

--HG--
extra : rebase_source : 5a9692c7d9965940847ae1d488d1b94a2abf66c7
2018-01-29 14:56:53 -08:00
Honza Bambas
e68b22643e Bug 1152332 - Let connection proxy filters return the result asynchronously - update/introduce tests, r=michal
--HG--
rename : netwerk/test/unit/test_protocolproxyservice.js => netwerk/test/unit/test_protocolproxyservice-async-filters.js
2018-02-08 05:49:00 +02:00
Jed Davis
927e70c7a5 Bug 1425274 - Filter socketpair() in content sandbox on 32-bit x86 with new-enough kernels. r=gcp
This replaces the globals for whether socket calls (and ipc(2) calls, but
we never used that) have real arguments with a parameter, which in hindsight
should have been done in bug 1273852, which is when we started handling
both socketcall(2) and separate socket calls in the same policy.  This
allows handling the two cases differently.

MozReview-Commit-ID: 1pfckmCpJlW

--HG--
extra : rebase_source : 4b8459f01e8748fea95cbcb6eeb689f01417ca5b
2018-01-29 17:36:06 -07:00
Jed Davis
4be220d5f3 Bug 1376910 - Remove SysV IPC access from Linux content sandbox when possible. r=gcp
There are a few things that use SysV IPC, which we discovered the last
time we tried to do this, which need to be accomodated:

1. The ALSA dmix plugin; if the build has ALSA support (off by default)
and if audio remoting is disabled, SysV IPC is allowed.

2. ATI/AMD's old proprietary graphics driver (fglrx), which is obsolete
and doesn't support newer hardware, but still has users; if it's
detected, SysV IPC is allowed.

3. Graphics libraries trying to use the MIT-SHM extension; this is
already turned off for other reasons (see bug 1271100), but that shim
seems to not load early enough in some cases, so it's copied into
libmozsandbox, which is preloaded before anything else in LD_PRELOAD.

Also, msgget is now blocked in all cases; the only case it was known
to be used involved ESET antivirus, which is now handled specially
(bug 1362601).  In any case, the seccomp-bpf policy has never allowed
actually *using* message queues, so creating them is not very useful.

MozReview-Commit-ID: 5bOOQcXFd9U

--HG--
extra : rebase_source : ea79c0a7e31f58f056be15b551c57dde974dfae2
2018-01-26 19:43:10 -07:00
ffxbld
e3330cdba4 No bug, Automated HPKP preload list update from host bld-linux64-spot-302 - a=hpkp-update 2018-02-07 21:47:26 -08:00
ffxbld
27f33391a6 No bug, Automated HSTS preload list update from host bld-linux64-spot-302 - a=hsts-update 2018-02-07 21:47:22 -08:00
Andrew McCreight
5dec0e0beb Bug 1432992, part 1 - Remove definitions of Ci, Cr, Cc, and Cu. r=florian
This patch was autogenerated by my decomponents.py

It covers almost every file with the extension js, jsm, html, py,
xhtml, or xul.

It removes blank lines after removed lines, when the removed lines are
preceded by either blank lines or the start of a new block. The "start
of a new block" is defined fairly hackily: either the line starts with
//, ends with */, ends with {, <![CDATA[, """ or '''. The first two
cover comments, the third one covers JS, the fourth covers JS embedded
in XUL, and the final two cover JS embedded in Python. This also
applies if the removed line was the first line of the file.

It covers the pattern matching cases like "var {classes: Cc,
interfaces: Ci, utils: Cu, results: Cr} = Components;". It'll remove
the entire thing if they are all either Ci, Cr, Cc or Cu, or it will
remove the appropriate ones and leave the residue behind. If there's
only one behind, then it will turn it into a normal, non-pattern
matching variable definition. (For instance, "const { classes: Cc,
Constructor: CC, interfaces: Ci, utils: Cu } = Components" becomes
"const CC = Components.Constructor".)

MozReview-Commit-ID: DeSHcClQ7cG

--HG--
extra : rebase_source : d9c41878036c1ef7766ef5e91a7005025bc1d72b
2018-02-06 09:36:57 -08:00
Gurzau Raul
476c3b3a55 Merge inbound to mozilla-central. a=merge 2018-02-06 23:53:56 +02:00
ffxbld
a806ff2842 No bug, Automated HPKP preload list update from host bld-linux64-spot-302 - a=hpkp-update 2018-02-06 11:29:26 -08:00
ffxbld
09d6ee7e84 No bug, Automated HSTS preload list update from host bld-linux64-spot-302 - a=hsts-update 2018-02-06 11:29:22 -08:00
Narcis Beleuzu
84cea84b12 Merge inbound to mozilla-central. a=merge 2018-02-06 11:54:42 +02:00
Narcis Beleuzu
41fa81fdee Merge autoland to mozilla-central. a=merge 2018-02-06 11:53:07 +02:00
ffxbld
77806927d6 No bug, Automated HPKP preload list update from host bld-linux64-spot-324 - a=hpkp-update 2018-02-05 12:04:25 -08:00
ffxbld
af8adb97bc No bug, Automated HSTS preload list update from host bld-linux64-spot-324 - a=hsts-update 2018-02-05 12:04:21 -08:00
Cykesiopka
9c11fda65f Bug 1435644 - Fix and regenerate test_cert_eku/ certs to get test_cert_eku.js passing again. r=keeler on a CLOSED TREE
ca.pem is used to sign certificates that are either verified at time 2016-08-25
or time "now", with the earliest such certificate having a notBefore of
2015-07-24. As such, ca.pem.certspec needs to have a notBefore time that is no
later than 2015-07-24, but be valid for a reasonably long time.
Therefore, ca.pem.certspec is changed so the cert has a notBefore of 2015-01-01,
and is valid for 20 years.

ee-int-nsSGC-*.pem are verified at time 2016-08-25, and so need to be valid
at that time.
Therefore, the ee-int-nsSGC-*.pem.certspec files are changed so the
corresponding certs have validity periods that match their intermediates.

MozReview-Commit-ID: duOnvGGcuD

--HG--
extra : amend_source : 307c9d95b617560a547081ff8924d05ec2f2d2a8
2018-02-05 10:32:54 -08:00
Sebastian Hengst
f80722d4f3 Bug 1435644: Revert update of certs which have to remain outdated or are checked at a fixed point in time, update metadata hardcoded in tests. r=Try a=Try on a CLOSED TREE 2018-02-05 18:14:35 +02:00
Emilio Cobos Álvarez
c4a30f7c9a Bug 1435644: Also regenerate the signed apps. r=me a=Aryx on a CLOSED TREE
MozReview-Commit-ID: Br0gNMNR6hl
2018-02-05 15:33:01 +01:00
Emilio Cobos Álvarez
01d663157f Bug 1435644: Regenerate the security/manager/ssl test certificates and keys. r=franziskus a=Aryx on a CLOSED TREE
For this, I've uncommented the relevant bits in moz.build files, then:

  ./mach build security/manager
  for dir in $(rg GeneratedTestCertificate | grep security | cut -d : -f 1); do
    cp obj-x86_64-pc-linux-gnu/$(dirname $dir)/*.pem $(dirname $dir);
  done

And same with GeneratedTestKey / *.key

MozReview-Commit-ID: C2bkSo6YYCU

--HG--
extra : amend_source : b59d21b695544a1a4b6c45ba9c00c40f8ceb0f1a
2018-02-05 12:14:22 +01:00
ffxbld
ab62d80275 No bug, Automated HPKP preload list update from host bld-linux64-spot-302 - a=hpkp-update 2018-02-04 11:28:16 -08:00
ffxbld
a69757cabc No bug, Automated HSTS preload list update from host bld-linux64-spot-302 - a=hsts-update 2018-02-04 11:28:12 -08:00
ffxbld
7cfb9cc4d2 No bug, Automated HPKP preload list update from host bld-linux64-spot-324 - a=hpkp-update 2018-02-03 11:23:38 -08:00
ffxbld
25db3d50af No bug, Automated HSTS preload list update from host bld-linux64-spot-324 - a=hsts-update 2018-02-03 11:23:34 -08:00
Noemi Erli
c1da6f3f85 Merge autoland to mozilla-central. a=merge 2018-02-03 11:50:53 +02:00
ffxbld
3a2e22a81a No bug, Automated HPKP preload list update from host bld-linux64-spot-325 - a=hpkp-update 2018-02-02 11:19:00 -08:00
ffxbld
b41d57ec50 No bug, Automated HSTS preload list update from host bld-linux64-spot-325 - a=hsts-update 2018-02-02 11:18:57 -08:00
Nathan Froyd
100be25160 Bug 1435708 - use mozilla::HashString in security/manager/ssl/; r=keeler
Using HashString is a little more explicit than
PLDHashTable::HashStringKey and brings us closer to the day where we can
delete the latter entirely.
2018-02-05 20:17:38 -05:00
Brendan Dahl
e2ebf215b1 Bug 1434151 - Inline and remove the various certificate viewer overlays. r=keeler
This is part of the work to remove XUL overlays. All of these overlays are
used only once and do not need to be in their own overlay files.

MozReview-Commit-ID: 9NBBTg5KHxb

--HG--
extra : rebase_source : 675a5baa91b93eeb7253ad5773cb76e7db6be4fd
2018-01-29 17:29:08 -08:00
Andrew Halberstadt
f354075c7a Bug 1434430 - [flake8] Fix blank 'except' statements r=rwood
This is a new issue that gets linted with flake8 3.5.0. Basically you should
never use a blank except: statement.

This will catch all exceptions, including KeyboardInterrupt and SystemExit
(which is likely not intended). If a catch all is needed, use
`except: Exception`.  If you *really* mean to also catch KeyboardInterrupt et
al, use `except: BaseException`.

Of course, being specific is often better than a catch all.

MozReview-Commit-ID: FKx80MLO4RN

--HG--
extra : rebase_source : 7c74a7d0d81f2c984b47aff3a0ee3448b791177b
2018-01-31 14:32:08 -05:00
David Keeler
c470850884 bug 1434831 - ensure nsITransportSecurityInfo.failedCertChain contains the *peer cert chain* r=jcj
In bug 1406856 the failedCertChain property of nsITransportSecurityInfo was
changed to hold the built certificate chain out parameter from the call to
CertVerifier::VerifySSLServerCert. However, this was incorrect for two reasons:
a) failedCertChain is supposed to be the peer cert chain delivered by the server
in the TLS handshake and
b) if VerifySSLServerCert returns a failing result, the out parameter is not
guaranteed to hold any meaningful information, and must not be used.
This patch sets failedCertChain to the appropriate value.

MozReview-Commit-ID: BEXs5XH9SpK

--HG--
extra : rebase_source : f50ea725ccb67408ab1ce33cd76d3956ebd10e29
2018-02-01 12:29:04 -08:00
Gurzau Raul
1315ffda06 Merge inbound to mozilla-central. a=merge 2018-02-02 00:22:39 +02:00
Gurzau Raul
8c0d0d0d16 Merge autoland to mozilla-central. a=merge 2018-02-01 23:52:41 +02:00
Florian Quèze
2b1c8dccb6 Bug 1339461 - script-generated patch to convert foo.indexOf(...) == -1 to foo.includes(), r=Mossop. 2018-02-01 20:45:22 +01:00
ffxbld
00e2288b74 No bug, Automated HPKP preload list update from host bld-linux64-spot-302 - a=hpkp-update 2018-02-01 11:21:30 -08:00
ffxbld
53f7b78ae2 No bug, Automated HSTS preload list update from host bld-linux64-spot-302 - a=hsts-update 2018-02-01 11:21:26 -08:00
Gian-Carlo Pascutto
ff91a17fb3 Bug 1386404 - Use the full tmpdir finding logic. r=jld
MozReview-Commit-ID: BDBslEZsctJ

--HG--
extra : rebase_source : 6814c3fc5183083b38bfe651f6c7e9d19965f785
extra : histedit_source : fb71245f51fefcc7c221f951316c16583239aefc%2C71d59492798b368e5d09f295f5e74bb32790c75b
2018-01-30 21:31:07 +01:00
David Keeler
087f092867 bug 1421084 - part 4/4 - remove nsNSSShutDown.h and (hopefully) all references to it r=mt,ttaubert
MozReview-Commit-ID: 2mhvHsC5Nil

--HG--
extra : rebase_source : 651c2bcf8655f75756ea2bac788eb8c0781dc90a
2018-01-24 14:44:01 -08:00
David Keeler
ad5cec4768 bug 1421084 - part 3/4 - remove nsNSSShutDownObject::shutdown and virtualDestroyNSSReference r=mt,ttaubert
MozReview-Commit-ID: ErL7ZjAGVVC

--HG--
extra : rebase_source : 2869aafaef729f0ad190f957919e8b9c40700477
2018-01-24 14:29:08 -08:00
David Keeler
a0e34baf27 bug 1421084 - part 2/4 - remove nsNSSShutDownObject::isAlreadyShutDown() r=mt,ttaubert
MozReview-Commit-ID: DlS16pHE0Ik

--HG--
extra : rebase_source : d7596a3571478adefae4ffa5d446ff5234ba9ed7
2018-01-23 12:22:56 -08:00
David Keeler
e8cc0ba1ce bug 1421084 - part 1/4 - remove now-unnecessary nsNSSShutDownPreventionLock r=mt,ttaubert
As of bug 1417680, the NSS shutdown tracking infrastructure is unnecessary (and
does nothing anyway). This series of changesets removes the remaining pieces in
a way that is hopefully easy to confirm is correct.

MozReview-Commit-ID: 8Y5wpsyNlGc

--HG--
extra : rebase_source : ef6b481510d949e404a4ef5615097d66e566c947
2018-01-23 10:37:47 -08:00
David Parks
312f33b8c5 Bug 1426733: Use restricting SIDs in Windows NPAPI process r=bobowen
Allow NPAPI sandbox to use restricting SIDs.

--HG--
extra : rebase_source : be53cfa3b05bd6d0f5b24b8f4f0b41e623d40e9a
2017-12-20 21:35:26 -08:00
Brindusan Cristian
47ba5a55dc Merge mozilla-central to inbound. a=merge CLOSED TREE 2018-02-06 12:07:56 +02:00
Bob Owen
92db53b861 Bug 1432381: Replace sidestep resolvers with stubs as they are not actually used. r=aklotz
These cause compilation issues for MinGW.
It looks like these are a legacy from the original sandbox code before it was
integrated into chromium.
2018-02-06 08:52:26 +00:00
Boris Zbarsky
12e9f78050 Bug 1435483 part 16. Switch to using dom::Exception, not nsIException, in C++ code. r=qdot
nsIException is builtinclass in idl, so whatever code we had to handle
non-dom::Exception nsIExceptions is dead code.

MozReview-Commit-ID: 6VnqDWt0041
2018-02-05 16:34:05 -05:00
Boris Zbarsky
c8bd8682bf Bug 1435483 part 10. Add infallible "asyncCaller" and "caller" getters on nsIStackFrame. r=qdot
MozReview-Commit-ID: 8pdMDFHWlVt
2018-02-05 16:34:05 -05:00
Boris Zbarsky
b7eaf4b6ae Bug 1435483 part 9. Add an infallible "name" getter on nsIStackFrame. r=qdot
MozReview-Commit-ID: ADxO2A8nkel
2018-02-05 16:34:05 -05:00
Boris Zbarsky
2c00c8c971 Bug 1435483 part 6. Add an infallible "lineNumber" getter on nsIStackFrame. r=qdot
MozReview-Commit-ID: 7aYg9kJhiab
2018-02-05 16:34:04 -05:00
Boris Zbarsky
02f7baafc0 Bug 1435483 part 5. Add an infallible "filename" getter on nsIStackFrame. r=qdot
MozReview-Commit-ID: D3uuehuDqOB
2018-02-05 16:34:04 -05:00
Gian-Carlo Pascutto
adc2daa77b Bug 1386404 - Whitelist the prefix used by the XPCOM leak logs. r=haik
MozReview-Commit-ID: HI68lvyJIPQ

--HG--
extra : rebase_source : b68015624aa02c911cd4361b8ea177ae585a5ef5
extra : histedit_source : ca88e3de7f3f7d76e82e259e03145d2f843d0a1b
2017-11-03 13:18:56 +01:00
Gian-Carlo Pascutto
220379341a Bug 1386404 - Only do the tmp remapping if needed. r=jld
This helps with getting the tests that are running out of /tmp
to pass, who get confused if their paths change underneath them.

It's also a bit faster.

MozReview-Commit-ID: CWtngVNhA0t

--HG--
extra : rebase_source : 1be7a99cd3640d15ddecd1c050d19d1b30e5202d
extra : histedit_source : 5787bfe610504356a04819039469083adf2ce77c
2017-10-26 18:02:10 +02:00
Gian-Carlo Pascutto
7fd8a36d1c Bug 1386404 - Intercept access to /tmp and rewrite to content process tempdir. r=jld
MozReview-Commit-ID: 2h9hw6opYof

--HG--
extra : rebase_source : 73c677be84d62ed958d07b0aca0947dd0e9448c7
extra : histedit_source : 499d483f58372b7b06a36da3fdf0ea3afc12feeb
2017-10-26 17:50:49 +02:00
Gian-Carlo Pascutto
5ce7639e7d Bug 1386404 - Enable access to the entire chrome dir from content. r=jld
This may be required if people have @import in their userContent.css, and
in any case our tests check for this.

MozReview-Commit-ID: 8uJcWiC2rli

--HG--
extra : rebase_source : a93dfc2c62d3ac35dece87e4b4596cde761de207
extra : histedit_source : 455e6a79527226f398a861a72c1cfdef2c1761df
2017-10-26 18:57:03 +02:00
Gian-Carlo Pascutto
6520179659 Bug 1386404 - Enable content-process specific tmpdir on Linux. r=jld
MozReview-Commit-ID: 6Hijq0to9MG

--HG--
extra : rebase_source : 8435b8e39d9723c52b0176a7686895185136aa6e
extra : histedit_source : 50c41172788fddead6357f1d566d0e48de8c90d6
2018-01-09 16:29:40 +01:00
Franziskus Kiefer
7c3c6a5ff9 Bug 1258647 - Content-Signature telemetry, r=keeler,francois
Differential Revision: https://phabricator.services.mozilla.com/D427

--HG--
extra : rebase_source : fb7f05afdc9b718a804190b1f4718ec2ae2d93cb
2018-01-22 15:28:32 +01:00
Jed Davis
8b8051496a Bug 1213998 - Apply chroot() to sandboxed content processes on Linux. r=gcp
MozReview-Commit-ID: DGepECmw3pq

--HG--
extra : rebase_source : c8fe74c8fa8ea91379499f1cbfd5424dc5e9be2c
2018-01-16 19:10:51 -07:00
Jed Davis
e3c2621d53 Bug 1430949 - Isolate network namespace in Linux content sandbox level 4. r=gcp
This is turned off if the X11 server is remote -- including TCP to
localhost -- because otherwise it would be blocked.  Note that ssh X
forwarding presents a TCP-only server.

The Nightly default for the force-namespace hidden pref is changed to
false, because we will now normally be using namespaces if available.

MozReview-Commit-ID: L9BbLdoLvLg

--HG--
extra : rebase_source : c737b65551deb134de18028714774e0aabb5baf5
2018-01-23 22:31:06 -07:00
Alex Gaynor
eee896973f Bug 1359566 - remove permissions related to audio from the macOS content process sandbox when cubeb remoting is enabled; r=haik
MozReview-Commit-ID: BmBNuSlsyBH

--HG--
extra : rebase_source : 366c8bcffc80b83b348462e13c4893e4854cf389
2017-12-21 09:59:47 -05:00
shindli
91bc2053a8 Merge autoland to mozilla-central. a=merge 2018-02-01 00:30:10 +02:00
ffxbld
03673b57d5 No bug, Automated HPKP preload list update from host bld-linux64-spot-302 - a=hpkp-update 2018-01-31 11:29:14 -08:00
ffxbld
d07a5ef4b0 No bug, Automated HSTS preload list update from host bld-linux64-spot-302 - a=hsts-update 2018-01-31 11:29:10 -08:00
Andreea Pavel
d652648d08 Merge mozilla-central to autoland a=merge on a CLOSED TREE
--HG--
rename : dom/media/webrtc/MediaEngine.h => dom/media/webrtc/MediaEnginePrefs.h
extra : rebase_source : 661454de54cac8d23010da02d0c0d68c1856500d
2018-01-31 19:39:52 +02:00
Tom Ritter
2d53d71b7b Bug 1431803 Disable a specific __try block on MinGW r=bobowen
This function is a technique to name a thread for debugging purposes,
and it always throws an exception (and then continues). On MinGW
we don't want it to throw an exception, so we do nothing.

This means on MinGW we won't get nice thread naming during debugging,
but we'll limp along.

MozReview-Commit-ID: JRKY4wp7sdu

--HG--
extra : rebase_source : 439205d83167dcde5306f9899244e7d336116111
2018-01-19 13:26:22 -06:00
ffxbld
90a41c3b7d No bug, Automated HPKP preload list update from host bld-linux64-spot-324 - a=hpkp-update 2018-01-30 18:26:16 -08:00
ffxbld
a75c2f5111 No bug, Automated HSTS preload list update from host bld-linux64-spot-324 - a=hsts-update 2018-01-30 18:26:13 -08:00
Kris Maglione
918ed6c474 Bug 1431533: Part 5a - Auto-rewrite code to use ChromeUtils import methods. r=florian
This was done using the following script:
37e3803c7a/processors/chromeutils-import.jsm

MozReview-Commit-ID: 1Nc3XDu0wGl

--HG--
extra : source : 12fc4dee861c812fd2bd032c63ef17af61800c70
extra : intermediate-source : 34c999fa006bffe8705cf50c54708aa21a962e62
extra : histedit_source : b2be2c5e5d226e6c347312456a6ae339c1e634b0
2018-01-29 15:20:18 -08:00
Jorg K
4c1552631d Bug 1433903 - Skip parts of test_nonascii_path.js for Thunderbird. r=emk 2018-01-29 14:48:00 +02:00
Gurzau Raul
c380dfe905 Merge inbound to mozilla-central. a=merge 2018-01-30 12:01:49 +02:00
ffxbld
ce878c3931 No bug, Automated HPKP preload list update from host bld-linux64-spot-302 - a=hpkp-update 2018-01-29 11:17:47 -08:00
ffxbld
d24a164454 No bug, Automated HSTS preload list update from host bld-linux64-spot-302 - a=hsts-update 2018-01-29 11:17:44 -08:00
Franziskus Kiefer
227ed43083 Bug 1432177 - land NSS 1b20549e1075 UPGRADE_NSS_RELEASE, r=me 2018-01-29 12:28:20 +01:00
ffxbld
bfe4421c0c No bug, Automated HPKP preload list update from host bld-linux64-spot-304 - a=hpkp-update 2018-01-28 11:13:29 -08:00
ffxbld
fa07960ab6 No bug, Automated HSTS preload list update from host bld-linux64-spot-304 - a=hsts-update 2018-01-28 11:13:25 -08:00
Coroiu Cristina
11d0ff9f36 Merge inbound to mozilla-central. a=merge 2018-01-28 12:40:33 +02:00
Cosmin Sabou
9a65a40178 Backed out 3 changesets (bug 1431533) for Android mochitest failures on testEventDispatcher on a CLOSED TREE
Backed out changeset a1eca62826a1 (bug 1431533)
Backed out changeset 34c999fa006b (bug 1431533)
Backed out changeset e2674287e57f (bug 1431533)
2018-01-30 07:17:48 +02:00
Boris Zbarsky
a9c83a1bf2 Bug 1432944 part 12. Change nsIFormProcessor to pass Element, not nsIDOMHTMLElement, for elements. r=mccr8
MozReview-Commit-ID: K6w7FR254UC
2018-01-29 23:29:11 -05:00
Boris Zbarsky
e565b1fe1b Bug 1432944 part 11. Remove nsIDOMElement::GetAttribute. r=mccr8
MozReview-Commit-ID: 2f1vFvRdCPG
2018-01-29 23:28:00 -05:00
Tiberius Oros
a530cab0d4 Merge mozilla-central to autoland. a=merge CLOSED TREE 2018-01-27 23:56:11 +02:00
ffxbld
6e0f9b3bb8 No bug, Automated HPKP preload list update from host bld-linux64-spot-302 - a=hpkp-update 2018-01-27 11:15:37 -08:00
ffxbld
d201ce429d No bug, Automated HSTS preload list update from host bld-linux64-spot-302 - a=hsts-update 2018-01-27 11:15:33 -08:00
Cosmin Sabou
3f242e7301 Merge autoland to mozilla-central. a=merge 2018-01-27 11:52:48 +02:00
ffxbld
41ba174657 No bug, Automated HPKP preload list update from host bld-linux64-spot-303 - a=hpkp-update 2018-01-26 11:34:15 -08:00
ffxbld
59fde784bc No bug, Automated HSTS preload list update from host bld-linux64-spot-303 - a=hsts-update 2018-01-26 11:34:12 -08:00
Kris Maglione
6476f95b13 Bug 1431533: Part 5a - Auto-rewrite code to use ChromeUtils import methods. r=florian
This was done using the following script:
37e3803c7a/processors/chromeutils-import.jsm

MozReview-Commit-ID: 1Nc3XDu0wGl

--HG--
extra : source : 12fc4dee861c812fd2bd032c63ef17af61800c70
2018-01-29 15:20:18 -08:00
Brindusan Cristian
af8879d1eb Backed out 2 changesets (bug 1431533) for ESlint failures on a CLOSED TREE
Backed out changeset 6e56f4c8843e (bug 1431533)
Backed out changeset 12fc4dee861c (bug 1431533)
2018-01-30 02:32:43 +02:00
Kris Maglione
c276bb9375 Bug 1431533: Part 5a - Auto-rewrite code to use ChromeUtils import methods. r=florian
This was done using the following script:
37e3803c7a/processors/chromeutils-import.jsm

MozReview-Commit-ID: 1Nc3XDu0wGl

--HG--
extra : rebase_source : c004a023389f1f6bf3d2f3efe93c13d423b23ccd
2018-01-29 15:20:18 -08:00
Masatoshi Kimura
ab82e7cb7b Bug 1430973 - Reression test to make sure non-ASCII file paths work. r=keeler
MozReview-Commit-ID: D77JALyAiWl

--HG--
rename : security/manager/ssl/tests/unit/test_cert_trust.js => security/manager/ssl/tests/unit/test_nonascii_path.js
extra : rebase_source : 8afa5894ce3e33056c62174d10b617c9e065c020
extra : intermediate-source : 1203a047d15ed9a954467fce4fb031e2b8800a39
extra : source : b59499341a42c7b7dd5d5bc6032cfcb9f5f23f7e
2017-12-30 14:52:10 +09:00
Doug Thayer
ac49bf6b85 Bug 1426721 - Add async/bulk encryption interface to SDR r=keeler,MattN
Since encryption can be somewhat CPU intensive, if we're encrypting
a large number of strings we want to be able to do so in a background
thread. This will be consumed by the profile migrators when importing
logins.

MozReview-Commit-ID: JoJGOgMzZ4u

--HG--
extra : rebase_source : 4677482b4e9b1df7c7ca70a0e817204ef6638cdf
2018-01-23 10:06:31 -08:00
David Keeler
7840435138 bug 1431791 - remove "Others" tab from certificate manager r=jaws,mgoodwin
MozReview-Commit-ID: HUPkIAMhNEX

--HG--
extra : rebase_source : a737297d8cb8800b03532d62b39e85711d6f0663
2018-01-19 13:09:22 -08:00
arthur.iakab
94ab855658 Merge inbound to mozilla-central. a=merge 2018-01-26 02:21:47 +02:00
ffxbld
723b975106 No bug, Automated HPKP preload list update from host bld-linux64-spot-302 - a=hpkp-update 2018-01-25 11:08:54 -08:00
ffxbld
0863879ac8 No bug, Automated HSTS preload list update from host bld-linux64-spot-302 - a=hsts-update 2018-01-25 11:08:50 -08:00
Bob Owen
af97855568 Bug 1433065: Make the Chromium sandbox DLL blocking Nightly only. r=jimm 2018-01-25 15:33:55 +00:00
Bob Owen
29a3f48beb Backed out changeset 541ea4baacba (bug 1433065) - due to missing variable in non-Nightly 2018-01-25 15:33:55 +00:00
Bob Owen
9281954b93 Bug 1433065: Make the Chromium sandbox DLL blocking Nightly only. r=jimm 2018-01-25 13:31:40 +00:00
Masatoshi Kimura
7783cc27f6 Bug 685236 - Stop using GetNativePath in PSM. r=keeler
GetPersistentDescriptor is good enough for logging purpose.

MozReview-Commit-ID: DmyW4lT5rT7

--HG--
extra : source : 3d2894427488acc3f9825e6ec4297b35ccbd44f1
extra : intermediate-source : 584662fbeb69351ab4e96afe2ed332916696b130
2017-12-17 01:24:44 +09:00
Bogdan Tara
1f15df5f24 Merge mozilla-central to mozilla-inbound. a=merge CLOSED TREE 2018-01-31 12:11:39 +02:00
Bob Owen
251c705683 Bug 1434292: Only use MITIGATION_IMAGE_LOAD_NO_LOW_LABEL flag for pdfium process when not running from a network drive. r=jimm 2018-01-31 08:56:11 +00:00
Bob Owen
70c724a921 Bug 1434276: Use MITIGATION_EXTENSION_POINT_DISABLE flag for GMP process. r=jimm 2018-01-31 08:56:11 +00:00
Alex Gaynor
106fa9d993 Bug 1405088 - Part 1 - remove file-write permissions from macOS content temporary directory; r=haik
With this change, the macOS content sandbox has no ability to create files
anywhere on disk (in release builds). If the content process needs a file to
write to, it needs to obtain a file descriptor from the parent process.

MozReview-Commit-ID: 7LoG1PW0UDR

--HG--
extra : rebase_source : 4ac0a7f187d45c9b6c0f8a658edfdae0509054ac
2017-10-02 10:48:01 -04:00
David Keeler
3d933b389e bug 1231203 - ensure OCSP responses to requests from private contexts aren't cached on disk r=jcj
MozReview-Commit-ID: 374f7hERLee

--HG--
extra : rebase_source : d4ea45f52a297e9bf6ba08e824169d993e4935c0
2018-02-08 17:16:03 -08:00
Thomas Wisniewski
72d29b6bc6 Bug 792808 - Change security/manager/tools scripts to import and instantiate XHRs from global properties rather than using Cc.createInstance(Ci.nsIXMLHttpRequest); r=keeler
MozReview-Commit-ID: 9lddED1IGeD

--HG--
extra : rebase_source : a5888307baddb6c293bf968c90590572b065d932
2017-09-19 11:40:14 -04:00
Tom Ritter
5a600ec834 Bug 1431797 Fix capitalization in mozilla files so the sandbox can compile on MinGW r=bobowen
This patch also adds the capitalization patch file to the chromium patches

MozReview-Commit-ID: BzAkEtCKAi4

--HG--
extra : rebase_source : 8f24d2b855e721f354f12b0d3fca5783cc66702e
2018-01-24 14:27:21 -06:00
Tom Ritter
2f2511d2e9 Bug 1431797 Correct the capitalization of headers inside the chromium code so MinGW can compile r=bobowen
MozReview-Commit-ID: DFlruq4iIUe

--HG--
extra : rebase_source : a883cb8264292143a90846f02a548c7da68fb168
2018-01-24 14:25:59 -06:00
Haik Aftandilian
1956e23936 Bug 1393259 - Enable sandbox read access extensions for font access. r=Alex_Gaynor
Enable sandbox read access extensions to allow content processes
to access fonts stored in non-standard locations without whitelisting
hardcoded directories. This is needed for configurations with third
party font managers that store fonts in their own directories or
user-specified directories.

Now that font access is not dependent on the filename extension
such as .otf and .ttf, remove the relevent tests.

MozReview-Commit-ID: 8hSMrocGwIm

--HG--
extra : rebase_source : b757480398e3f0d9720ab845e9f10fb70a794d77
2018-01-11 10:53:11 -08:00
Cosmin Sabou
7e6e71746a Merge mozilla-central to autoland. a=merge on a CLOSED TREE 2018-01-25 00:04:12 +02:00
Narcis Beleuzu
9279994eae Merge inbound to mozilla-central. a=merge 2018-01-24 23:56:14 +02:00
Narcis Beleuzu
f8bb2d707a Merge autoland to mozilla-central. a=merge 2018-01-24 23:54:03 +02:00
ffxbld
796f358182 No bug, Automated HPKP preload list update from host bld-linux64-spot-301 - a=hpkp-update 2018-01-24 11:16:16 -08:00
ffxbld
67f0726740 No bug, Automated HSTS preload list update from host bld-linux64-spot-301 - a=hsts-update 2018-01-24 11:16:12 -08:00
Margareta Eliza Balazs
4611b95418 Merge autoland to mozilla-central. a=merge 2018-01-24 12:07:37 +02:00
Tom Ritter
2f8e7d0c85 Bug 1432790 Fix MinGW Sandbox linking error about not being able to find _ReturnAddress() r=bobowen
This reverts 6e41201152dd (Bug 1431621) which compiled but did not link.
It also fixes the original issue by removing the stray \ at the end of the
line that was causing the error.

MozReview-Commit-ID: LgaxYK3EOwR

--HG--
extra : rebase_source : 7de3b5126417ea99ff7fee3a809e556b5a2de4a6
2018-01-23 22:08:21 -06:00
Ciure Andrei
4cf1735400 Merge autoland to mozilla-central. a=merge 2018-01-24 03:55:36 +02:00
ffxbld
4fbf357e0d No bug, Automated HPKP preload list update from host bld-linux64-spot-343 - a=hpkp-update 2018-01-23 11:14:24 -08:00
ffxbld
8df312ae60 No bug, Automated HSTS preload list update from host bld-linux64-spot-343 - a=hsts-update 2018-01-23 11:14:21 -08:00
Franziskus Kiefer
cdd881cf58 Bug 1432177 - land NSS 10f7e0179b18 UPGRADE_NSS_RELEASE, r=me
--HG--
extra : rebase_source : 73060b7dd79b86f22b4f53d2d3491266b1968904
2018-01-23 11:48:27 +01:00
Jed Davis
b7f2a67b3b Bug 1430756 - Remove check for unshare(), which we're no longer using. r=gcp
This also removes an assertion that was failing under external sandboxes
that deny unshare() even when it's a no-op.

MozReview-Commit-ID: KBEPJyDGU7M

--HG--
extra : rebase_source : 411a51d7707e506ca8cbe49553ada1de02f7c76b
2018-01-22 14:32:48 -07:00
Sebastian Hengst
78d2a3c1db Merge mozilla-central to mozilla-inbound 2018-01-24 14:24:05 +02:00
J.C. Jones
f2b1675473 Bug 1432542 - Enable Web Authentication r=keeler
Per the intent-to-ship [1], Web Authentication should be turned on by default
in Firefox.

[1] https://groups.google.com/forum/#!msg/mozilla.dev.platform/tsevyqfBHLE/lccldWNNBwAJ

MozReview-Commit-ID: CUL63zTAWUP

--HG--
extra : rebase_source : 07bf094ad3d7a3ac97c4965ba4f3fe36688b97d6
2018-01-23 10:50:37 -07:00
David Keeler
a18e312ebd bug 1385065 - enable GDCA TrustAUTH R5 ROOT certificate for EV in PSM r=fkiefer
MozReview-Commit-ID: 7pIs7sxUWS4

--HG--
extra : rebase_source : 5e2f351532609652ce236688d5e35048bd7bc1b7
2018-03-02 15:33:57 -08:00
Dorel Luca
bad2421650 Merge mozilla-central to autoland r=merge 2018-01-23 19:54:54 +02:00
Alex Gaynor
caeef41194 Bug 1428055 - Further lockdown the macOS content sandbox policy by restricting some allowed-by-default privileges; r=haik
MozReview-Commit-ID: DbJv5VIoKVV

--HG--
extra : rebase_source : bd27c190771a3ab036b4200c4a99af92722a7b1d
2018-01-03 14:07:41 -05:00
Tom Ritter
fcb5a78540 Bug 1432313 Convert the ui64 suffix to uLL r=bobowen
MinGW doesn't recognize the ui64 prefix, but uLL is equivalent.

MozReview-Commit-ID: Do3hikKzxY7

--HG--
extra : rebase_source : 501e958ce50e95ae1171acc10fb07c28834195d2
2018-01-22 16:16:08 -06:00
Tom Ritter
b009e6cd23 Bug 1432295 Cast GetProcAddress to (void*) r=bobowen
error: invalid conversion from 'FARPROC {aka int (__attribute__((__stdcall__)) *)()}' to 'void*' [-fpermissive]

According to http://stackoverflow.com/questions/13958081/, msvc does the fixup

MozReview-Commit-ID: HTghe9uL0EP

--HG--
extra : rebase_source : b083b9247aa07ba58c23b3b3a2e5b19c7393dafb
2018-01-23 09:15:44 -06:00
Alex Gaynor
0d04153faf Bug 1407693 - Part 1 - Expose method for sharing a HANDLE to a child process in the sandboxing API; r=bobowen
MozReview-Commit-ID: 3LBCzPS6Mzg

--HG--
extra : rebase_source : 7e1ea157eeea5810ad21d781e93b7046aebf2bd6
2017-11-27 14:34:48 -06:00
Tom Ritter
0446563c16 Bug 1431825 Map _Copy_s to copy for basic_string compatibility on MinGW r=bobowen
MozReview-Commit-ID: 48P2G9nBfGf

--HG--
extra : rebase_source : ffeb7ce3c41964e245097c2dc7665e2e99ae7a43
2018-01-19 14:48:13 -06:00
Tom Ritter
9b36d73842 Bug 1431807 Allow MinGW and silence warning about Windows SDK version r=bobowen
MozReview-Commit-ID: 3aVeqSzRGXB

--HG--
extra : rebase_source : c63064e6ae843c4fd0f2fc121ea325acc7771664
2017-08-30 09:48:34 -05:00
Jed Davis
d1f977c16c Bug 1386019 - Also remove ALSA-related sandbox rules if ALSA is remoted. r=gcp
MozReview-Commit-ID: FKebcgPi60x
2018-01-23 22:37:45 -07:00
Jed Davis
2985b5d72f Bug 1386019 - Remove PulseAudio-specific sandbox broker rules when remoting audio. r=gcp
This also moves those parts of the policy factory out of the constructor,
because the pref service isn't initialized yet at that point.

MozReview-Commit-ID: 6wbq4MHu1GJ
2018-01-23 22:37:44 -07:00
Jed Davis
c498f410a3 Bug 1386019 - At sandbox level 4, remove syscalls used only by PulseAudio. r=gcp
MozReview-Commit-ID: 7YbJ8uYub7f
2018-01-23 22:37:44 -07:00
Jed Davis
a739b10fb9 Bug 1126437 - Add Linux content sandbox level 4 for blocking socket APIs. r=gcp
Level 4 is now the default unless audio remoting (media.cubeb.sandbox pref) is disabled.

MozReview-Commit-ID: 4jUgiZnJImt
2018-01-23 22:35:44 -07:00
Jed Davis
ec6696c724 Bug 1126437 - Reorganize content sandbox params extracted from libxul APIs. r=gcp
The end goal is to allow the seccomp-bpf policy to vary based on the
content sandbox level.

Rather than add yet another parameter to SetContentProcessSandbox to
pass down the sandbox level, this collects the values that have to be
computed in libxul into a struct, and moves the code that computes it so
it's not cluttering up ContentChild.

MozReview-Commit-ID: L0dyQwHQKhc
2018-01-23 22:35:44 -07:00
Jed Davis
6d88e1e82d Bug 1438391 - Detect VirtualGL and weaken the sandbox enough for it to work. r=gcp
MozReview-Commit-ID: BXmm8JSfkeI

--HG--
extra : rebase_source : 7e56f39df23fa4cc2ad0e38702f8ad6353d74e69
2018-02-22 19:14:41 -07:00
Jed Davis
61d0766fcf Bug 1438401 - Quietly fail shmget() in sandboxed content processes. r=gcp
The X11 symbol interposition isn't enough, possibly because Cairo can
also use XCB.  Interposing XCB is more difficult because the API exposes
more protocol details.  Instead, just allow shmget to be called and
fail; this will tell Cairo that it can't use SysV IPC with the X server,
which is what we want.

MozReview-Commit-ID: 5y9tE7UXMTE

--HG--
extra : rebase_source : bb1e81116742a299bc4e412062327e69032ab3b3
2018-02-27 21:30:08 -07:00
David Keeler
8e5cc074fb bug 1410956 - enable SSL.com EV root certificates for EV in PSM r=fkiefer
MozReview-Commit-ID: 9UeTSwgSzUt

--HG--
extra : rebase_source : c7861e3e230ac9080ef09f4b4866bc0650be4c36
2018-03-02 15:44:43 -08:00
Tom Ritter
7ae3c27af4 Bug 1432239 Declare operator new [](size_t, sandbox::AllocationType, void*) r=bobowen
MozReview-Commit-ID: GCKj5Ao2Y2n

--HG--
extra : rebase_source : d3f9b5cf14f60ba4c51375931b3de5b71b8312cc
2017-03-08 19:16:46 +00:00
Tom Ritter
854473e64c Bug 1431801 Don't declare duplicate instantiations. r=bobowen
On MinGW, these typedefs are the same, and mingw complains about duplicate instantiations.
Rather than use -fpermissive, just comment out the second instantiation.

MozReview-Commit-ID: 5prsrStgwKY

--HG--
extra : rebase_source : 843340df6e2ce835794b4f370f846b249babf93c
2017-03-07 18:23:57 +00:00
Tom Ritter
71c4b94aa4 Bug 1431621 Remove the gcc variant of BASE_WIN_GET_CALLER, because MinGW defines _ReturnAddress() r=bobowen
Note that MinGW defines it without __builtin_extract_return_addr which
means we're dropping that, but the gcc documentation indicates that
shouldn't be an issue. It is needed when a fixup is necessary:

> For example, on the 31-bit S/390 platform the highest bit has to
> be masked out, or on SPARC platforms an offset has to be added for
> the true next instruction to be executed.



MozReview-Commit-ID: 4D5bIT9Fei4

--HG--
extra : rebase_source : 3f959d72ab3a756e0d636b5eaaf3e883042e9865
2017-03-07 19:51:36 +00:00
Gurzau Raul
6675c62a6e Merge mozilla-central to autoland. a=merge CLOSED TREE 2018-01-23 02:24:22 +02:00
Gurzau Raul
9801931bda Merge inbound to mozilla-central. a=merge 2018-01-23 02:21:47 +02:00
Gurzau Raul
4717577633 Merge autoland to mozilla-central. a=merge 2018-01-23 02:20:15 +02:00
ffxbld
f47d7925ea No bug, Automated HPKP preload list update from host bld-linux64-spot-325 - a=hpkp-update 2018-01-22 11:26:08 -08:00
ffxbld
d7b5b60edf No bug, Automated HSTS preload list update from host bld-linux64-spot-325 - a=hsts-update 2018-01-22 11:26:04 -08:00
ffxbld
8b690f886d No bug, Automated HPKP preload list update from host bld-linux64-spot-302 - a=hpkp-update 2018-01-21 11:48:12 -08:00
ffxbld
03ec50d88d No bug, Automated HSTS preload list update from host bld-linux64-spot-302 - a=hsts-update 2018-01-21 11:48:08 -08:00
ffxbld
86fb67e64c No bug, Automated HPKP preload list update from host bld-linux64-spot-324 - a=hpkp-update 2018-01-20 11:10:51 -08:00
ffxbld
08fe73a4cf No bug, Automated HSTS preload list update from host bld-linux64-spot-324 - a=hsts-update 2018-01-20 11:10:48 -08:00
Jed Davis
bba4ea8274 Bug 1401062 - Avoid doing sandbox-related things to unsandboxed child processes. r=gcp
This is a small piece of cleanup that turned out to not be strictly
necessary for the rest of this, so I've made it a separate commit.

Sandbox-related launch adjustments (currently, interposing libc
functions and providing a file descriptor for the syscall reporter)
are no longer applied to processes that won't be sandboxed.  The
MOZ_SANDBOXED environment variable communicates this to the child
process, which allows SandboxEarlyInit to be skipped in that case as
well.  The idea is that disabling sandboxing for a process type, as part
of troubleshooting, should disable everything sandbox-related.

As a side-effect, this also skips some very minor but unnecessary
overhead for NPAPI process startup.

MozReview-Commit-ID: D0KxsRIIRN

--HG--
extra : rebase_source : 89836bea80d0a171324a8e3ff15c6b8e2a163ea9
2018-01-09 19:54:56 -07:00
David Keeler
5bfa1a1ac8 bug 1430906 - don't hold around a test key forever in mozilla::pkix gtests r=franziskus
Before this patch, mozilla::pkix gtests would generate a public/private key pair
and stash it in a global variable. Since this wasn't part of XPCOM nor tracked
by the PSM/NSS shutdown machinery, it wouldn't get released at the appropriate
time. The solution to this is to generate the key and then essentially export it
as data, so no NSS objects are held alive. Since NSS considers private keys
stored in the persistent database sensitive and won't export them in the clear,
we "encrypt" the key material with an empty password so we can import it when
necessary. (While the gtests don't use persistent keys, the test utilties in the
gtests are also used by some xpcshell tests that do use persistent keys, hence
the need to encrypt the key material.)

--HG--
extra : rebase_source : df10c25a462a3ba0396f5ba4a43a52fb924548ff
extra : amend_source : d95722891e49a99c471046cd9c758e914a02838e
2018-01-12 13:57:51 -08:00
Harald van Dijk
2877a35271 Bug 1430274 - Define MOZ_ALSA for more source files. r=jld 2018-01-18 15:18:37 -07:00
Ciure Andrei
dc1715ad21 Merge inbound to mozilla-central. a=merge 2018-01-18 23:53:03 +02:00
Ciure Andrei
0d6a403dd2 Merge autoland to mozilla-central. a=merge 2018-01-18 23:46:09 +02:00
ffxbld
12872ceb18 No bug, Automated HPKP preload list update from host bld-linux64-spot-302 - a=hpkp-update 2018-01-18 11:22:36 -08:00
ffxbld
3735019997 No bug, Automated HSTS preload list update from host bld-linux64-spot-302 - a=hsts-update 2018-01-18 11:22:32 -08:00
Tiberius Oros
92e228aa49 Merge inbound to mozilla-central. a=merge 2018-01-17 23:48:10 +02:00
ffxbld
37e9f519f9 No bug, Automated HPKP preload list update from host bld-linux64-spot-324 - a=hpkp-update 2018-01-17 11:37:03 -08:00
ffxbld
866b399106 No bug, Automated HSTS preload list update from host bld-linux64-spot-324 - a=hsts-update 2018-01-17 11:37:00 -08:00
Gian-Carlo Pascutto
e5687f9731 Bug 1430118 - Look for log file names in the passed environment. r=bobowen
MozReview-Commit-ID: HVUDYoEwjCd

--HG--
extra : rebase_source : 4121114558901489cd3954f433fe70bdea32a683
2018-01-17 09:54:48 +01:00
Tim Nguyen
6071f20f6c Bug 1430374 - Remove support for progressmeter tree cells. r=bz,dao
MozReview-Commit-ID: 3hydkeoneC0

--HG--
extra : rebase_source : eca404511d1fc2d9d7e9711fbd1accefd3781b16
2018-01-18 10:36:05 +00:00
Jorg K
00db3443a3 Bug 1355977 - don't show GMT twice in certificate details. r=zibi 2018-01-16 16:17:00 +02:00
Kai Engert
4040649e6d Bug 1420060, uplift NSS_3_35_RTM, no code change, only version number. Require version 3.35 for building. r=me
UPGRADE_NSS_RELEASE
2018-01-18 15:33:36 +01:00
David Keeler
1eadd3d4ac bug 1417680 - explore the feasibility of making XPCOM responsible for shutting down NSS r=jcj r=franziskus r=erahm
Historically, PSM has handled tracking NSS resources, releasing them, and
shutting down NSS in a coordinated manner (i.e. preventing races,
use-after-frees, etc.). This approach has proved intractable. This patch
introduces a new approach: have XPCOM shut down NSS after all threads have been
joined and the component manager has been shut down (and so there shouldn't be
any XPCOM objects holding NSS resources).

Note that this patch only attempts to determine if this approach will work. If
it does, we will have to go through alter and remove the remnants of the old
approach (i.e. nsNSSShutDownPreventionLock and related machinery). This will be
done in bug 1421084.

MozReview-Commit-ID: LjgEl1UZqkC

--HG--
extra : rebase_source : 2182e60d04e89a91278d5ee91610f8f37d99a9c9
2017-11-10 15:03:23 -08:00
J.C. Jones
970bcebf39 Bug 1418112 - Cleanup getHSTSPreloadList.js vars to lets r=keeler DONTBUILD NPOTB
This is a JS style cleanup; it changes all relevant `var` decls to `let`, and
also moves the `gSSService` up to the top where globals should go.

MozReview-Commit-ID: 2yycCum6mRC

--HG--
extra : rebase_source : 63563665d4d9991e181562acbd7e53f66e4c13b9
2018-01-17 17:04:31 -07:00
J.C. Jones
670b6e7a32 Bug 1418112 - Force HSTS Preloading for opt-in public suffixes r=keeler DONTBUILD NPOTB
The Chromium HSTS Preload list now includes a "policy" field that we can use
to filter and force some HSTS entries. This patch unconditionally accepts list
entries with the "google" or "public-suffix-requested" policies, and tests all
others via the existing connect-and-check (with failback tolerance) strategy.

In comment #0 of this bug [2], Lucas recommends we also filter the "all others"
to be the "bulk" entries. This patch does not do that to be conservative and
avoid de-listing sites at this time. We'll probably want a follow-on to
evaluate and potentially do that.

The patch also:

* renames `getHSTSStatuses` to `probeHSTSStatuses` to indicate more clearly that
  it's an active network load.

* Sets an X-Automated-Tool: https://hg.mozilla.org/mozilla-central/file/tip/security/manager/tools/getHSTSPreloadList.js

[1] https://github.com/chromium/hstspreload.org/wiki/Preload-List-Processes#manual-hsts-entries
[2] https://bugzilla.mozilla.org/show_bug.cgi?id=1418112#c0

MozReview-Commit-ID: 2r1QYXtDfjw

--HG--
extra : rebase_source : 3110915d15ffe9ea1916a6bd4957911bac0493fb
2017-12-06 11:10:04 -07:00
Jed Davis
6cc01043ce Bug 1401062 - Create Linux child processes with clone() for namespace/chroot sandboxing. r=gcp
Namespace isolation is now handled by using clone() at process creation
time, rather than calling unshare.

pthread_atfork will no longer apply to sandboxed child processes.
The two significant uses of it in Firefox currently are to (1) make
malloc work post-fork, which we already avoid depending on in IPC and
sandboxing, and (2) block SIGPROF while forking, which is taken care of;
see SandboxFork::Fork for details.  Note that if we need pthread_atfork
in the future it could be emulated by symbol interposition.

clone() is called via glibc's wrapper, for increased compatibility vs.
invoking the syscall directly, using longjmp to recover the syscall's
fork-like semantics the same way Chromium does; see comments for details.

The chroot helper is reimplemented; the general approach is similar,
but instead of a thread it's a process cloned with CLONE_FS (so the
filesystem root is shared) from the child process before it calls
exec, so that it still holds CAP_SYS_CHROOT in the newly created user
namespace.  This does mean that it will retain a CoW copy of the
parent's address space until the child starts sandboxing, but that is a
relatively short period of time, so the memory overhead should be small
and short-lived.

The chrooting now happens *after* the seccomp-bpf policy is applied;
previously this wasn't possible because the chroot thread would have
become seccomp-restricted and unable to chroot.  This fixes a potential
race condition where a thread could try to access the filesystem after
chrooting but before having its syscalls intercepted for brokering,
causing spurious failure.  (This failure mode hasn't been observed in
practice, but we may not be looking for it.)

This adds a hidden bool pref, security.sandbox.content.force-namespace,
which unshares the user namespace (if possible) even if no sandboxing
requires it.  It defaults to true on Nightly and false otherwise, to
get test coverage; the default will change to false once we're using
namespaces by default with content.

MozReview-Commit-ID: JhCXF9EgOt6

--HG--
rename : security/sandbox/linux/LinuxCapabilities.cpp => security/sandbox/linux/launch/LinuxCapabilities.cpp
rename : security/sandbox/linux/LinuxCapabilities.h => security/sandbox/linux/launch/LinuxCapabilities.h
extra : rebase_source : f37acacd4f79b0d6df0bcb9d1d5ceb4b9c5e6371
2017-10-06 17:16:41 -06:00
Margareta Eliza Balazs
757c55dc4f Merge mozilla-central to autoland. a=merge CLOSED TREE 2018-01-16 23:49:24 +02:00
ffxbld
312b6a44e5 No bug, Automated HPKP preload list update from host bld-linux64-spot-309 - a=hpkp-update 2018-01-16 12:59:54 -08:00
ffxbld
e4a2ac5bbe No bug, Automated HSTS preload list update from host bld-linux64-spot-309 - a=hsts-update 2018-01-16 12:59:50 -08:00
David Keeler
89f94440e6 bug 1263765 - remove nsIBadCertListener2 implementation from the add certificate exception dialog r=jcj
This reworks the certificate-fetching portion of the add certificate exception
dialog so as to not require a nsIBadCertListener2 implementation, which is
deprecated. The solution is simple: use the onerror/onload callbacks on the
XMLHttpRequest object to grab the appropriate information.

MozReview-Commit-ID: IjNrNfYA28P

--HG--
extra : rebase_source : 4a09b2eaf81d675444553156a0e098be54703115
2018-01-11 15:25:05 -08:00
ffxbld
54161e9fb9 No bug, Automated HPKP preload list update from host bld-linux64-spot-306 - a=hpkp-update 2018-01-15 10:59:32 -08:00
ffxbld
52c9e21d6b No bug, Automated HSTS preload list update from host bld-linux64-spot-306 - a=hsts-update 2018-01-15 10:59:29 -08:00
ffxbld
4579f798bf No bug, Automated HPKP preload list update from host bld-linux64-spot-302 - a=hpkp-update 2018-01-14 11:03:43 -08:00
ffxbld
6f34584a20 No bug, Automated HSTS preload list update from host bld-linux64-spot-302 - a=hsts-update 2018-01-14 11:03:40 -08:00
Chris Peterson
37efe4d0e6 Bug 1428535 - Add missing override specifiers to overridden virtual functions. r=froydnj
MozReview-Commit-ID: DCPTnyBooIe

--HG--
extra : rebase_source : cfec2d96faeb11656d86d760a34e0a04cacddb13
extra : intermediate-source : 6176724d63788b0fe8caa3f91607c2d93dbaa7ec
extra : source : eebbb0600447f9b64aae3bcd47b4be66c02a51ea
2017-11-05 19:37:28 -08:00
Andreea Pavel
e32752514d Merge mozilla-inbound to mozilla-central. a=merge 2018-01-13 23:49:24 +02:00
ffxbld
9781fa968b No bug, Automated HPKP preload list update from host bld-linux64-spot-302 - a=hpkp-update 2018-01-13 11:04:33 -08:00
ffxbld
e2ae589f60 No bug, Automated HSTS preload list update from host bld-linux64-spot-302 - a=hsts-update 2018-01-13 11:04:29 -08:00
EKR
ede3b33617 Bug 1430268 - Unconditionally enable compat mode. r=keeler
Summary: Needed for real TLS 1.3 deployment

Reviewers: mt

Differential Revision: https://phabricator.services.mozilla.com/D342
2018-01-13 10:18:53 -08:00
Csoregi Natalia
7476b71e00 Merge inbound to mozilla-central r=merge a=merge 2018-01-12 23:59:06 +02:00
ffxbld
bcf400ed70 No bug, Automated HPKP preload list update from host bld-linux64-spot-324 - a=hpkp-update 2018-01-12 10:58:23 -08:00
ffxbld
600c92d089 No bug, Automated HSTS preload list update from host bld-linux64-spot-324 - a=hsts-update 2018-01-12 10:58:19 -08:00
ffxbld
508c6b8852 No bug, Automated HPKP preload list update from host bld-linux64-spot-326 - a=hpkp-update 2018-01-11 11:24:52 -08:00
ffxbld
74d31a9bf9 No bug, Automated HSTS preload list update from host bld-linux64-spot-326 - a=hsts-update 2018-01-11 11:24:48 -08:00
Ciure Andrei
f7400ad72e Merge inbound to mozilla-central r=merge a=merge 2018-01-11 11:54:56 +02:00
Kate McKinley
e97980a95e Bug 1424917 - Remove support for HSTS Priming. r=mayhemer, r=ckerschb
This patch removes support and tests for HSTS priming from the tree.
2018-01-10 11:07:00 -05:00
arthur.iakab
5e902ff6cd Backed out changeset 28f876e75d47 (bug 1417680)for failing GTest
--HG--
extra : rebase_source : 2890c797a7cf05d6e82d84e64fd4cd5ed6ec5eb9
2018-01-11 02:56:49 +02:00
Masatoshi Kimura
8c8754b21f Bug 1428538 - Use UTF-8 file paths for NSS database. r=keeler 2017-12-28 20:56:33 +09:00
Kai Engert
e1c5635b55 Bug 1420060, restrict export of symbols to Windows, suggested by Masatoshi Kimura, r=kaie 2018-01-11 15:04:17 +01:00
Kai Engert
46f290697e Bug 1420060, export new NSS APIs in Firefox' specific API export list, r=franziskus 2018-01-11 14:42:09 +01:00
Kai Engert
14be89415f Bug 1420060, NSS_3_35_BETA1, r=franziskus
UPGRADE_NSS_RELEASE
2018-01-11 14:09:34 +01:00
Dorel Luca
ccebfc1873 Merge mozilla-central to autoland r=merge 2018-01-11 00:03:38 +02:00
ffxbld
59fa32fd74 No bug, Automated HPKP preload list update from host bld-linux64-spot-302 - a=hpkp-update 2018-01-10 11:13:16 -08:00
ffxbld
69f2798cbe No bug, Automated HSTS preload list update from host bld-linux64-spot-302 - a=hsts-update 2018-01-10 11:13:12 -08:00
Haik Aftandilian
68c0e33233 Bug 1429133 - Some FontExplorer managed fonts are not rendered. r=Alex_Gaynor
MozReview-Commit-ID: L5x3GNb3HGU

--HG--
extra : rebase_source : fd123e19142e98f4712db19d240b5c636aeb3ecf
2018-01-10 11:33:47 -08:00
Narcis Beleuzu
fb578c1b74 Merge mozilla-central to inbound. r=merge a=merge on a CLOSED TREE 2018-01-10 02:02:13 +02:00
ffxbld
3c8c1653f7 No bug, Automated HPKP preload list update from host bld-linux64-spot-302 - a=hpkp-update 2018-01-09 11:06:09 -08:00
ffxbld
782a0a23af No bug, Automated HSTS preload list update from host bld-linux64-spot-302 - a=hsts-update 2018-01-09 11:06:06 -08:00
Franziskus Kiefer
a881c4a167 Bug 1403844 - Verify COSE signature on add-ons, r=keeler
Summary:
MozReview-Commit-ID: 6YorBs4mY8B

Check for COSE signatures in add-ons.

Reviewers: keeler

Bug #: 1403844

Differential Revision: https://phabricator.services.mozilla.com/D298

--HG--
rename : security/manager/ssl/tests/unit/test_signed_apps/cose_multiple_signed.zip => security/manager/ssl/tests/unit/test_signed_apps/cose_multiple_signed_with_pkcs7.zip
rename : security/manager/ssl/tests/unit/test_signed_apps/cose_signed.zip => security/manager/ssl/tests/unit/test_signed_apps/cose_signed_with_pkcs7.zip
rename : third_party/rust/cose/src/cbor/mod.rs => third_party/rust/moz_cbor/src/lib.rs
extra : rebase_source : 0494590eb222e2c936e353e4dd6cf9fac8d822f3
2018-01-08 11:46:51 +01:00
J.C. Jones
3ba27ce458 Bug 1428918 - Enable Web Authentication in Nightly r=keeler,smaug
In advance of enabling Web Authentication in Firefox 60 [1], let's turn it on
for Nightly users.

[1] https://groups.google.com/forum/#!msg/mozilla.dev.platform/tsevyqfBHLE/lccldWNNBwAJ

MozReview-Commit-ID: ALyjBwojKtA

--HG--
extra : rebase_source : c51aef6bf12e1e26faa3d86269132eef7057c889
2018-01-08 18:37:35 -07:00
Csoregi Natalia
d07dee65a2 Backed out 6 changesets (bug 1386404) for failing /webdriver/test/ tests on Linux. r=backout on a CLOSED TREE
Backed out changeset be1441859e8b (bug 1386404)
Backed out changeset 8dca7ef74c4a (bug 1386404)
Backed out changeset b7ca6ae185f2 (bug 1386404)
Backed out changeset 2c007d385ce4 (bug 1386404)
Backed out changeset fbe717b9a664 (bug 1386404)
Backed out changeset 14f1fbe5263a (bug 1386404)
2018-01-10 14:08:51 +02:00
Csoregi Natalia
bbfcdcd760 Merge mozilla-central to autoland. r=merge a=merge CLOSED TREE
--HG--
rename : security/manager/ssl/tests/unit/test_signed_apps/cose_multiple_signed.zip => security/manager/ssl/tests/unit/test_signed_apps/cose_multiple_signed_with_pkcs7.zip
rename : security/manager/ssl/tests/unit/test_signed_apps/cose_signed.zip => security/manager/ssl/tests/unit/test_signed_apps/cose_signed_with_pkcs7.zip
rename : third_party/rust/cose/src/cbor/mod.rs => third_party/rust/moz_cbor/src/lib.rs
extra : rebase_source : 5f16e3d25e86d41e201b8c28ead361fd6ac25c42
2018-01-10 12:07:47 +02:00
David Keeler
0c092c0ffe bug 1428498 - don't require importing the server certificate for overrides to succeed r=jcj
Previously, adding a permanent certificate error override would depend on
successfully importing the server's certificate into the user's certificate
database. Consequently, if the user's database were in read-only mode (or if the
database couldn't be created due to code page issues on Windows), this would
prevent adding new certificate error overrides. It turns out this isn't even
necessary, because the implementation relies on the stored hash of the
certificate rather than the certificate itself. The stored certificate is only
for display purposes (and there's a fallback if the certificate can't be
stored).

There are remaining issues with non-ASCII characters in 8.3 paths on Windows
when the code page isn't western, but this is a larger issue that must be
addressed in other layers (i.e. NSS/NSPR).

MozReview-Commit-ID: KEzjxtAoeb4

--HG--
rename : security/manager/ssl/tests/unit/test_cert_overrides.js => security/manager/ssl/tests/unit/test_cert_overrides_read_only.js
extra : rebase_source : b41e863d8c85d80335dd56c8f5765b19b1de4e0c
2018-01-04 11:31:22 -08:00
Gian-Carlo Pascutto
61cf15cc85 Bug 1297740. r=jld 2018-01-08 10:07:16 +01:00
ffxbld
4f97a97069 No bug, Automated HPKP preload list update from host bld-linux64-spot-302 - a=hpkp-update 2018-01-07 11:04:07 -08:00
ffxbld
80e05c0b9a No bug, Automated HSTS preload list update from host bld-linux64-spot-302 - a=hsts-update 2018-01-07 11:04:03 -08:00
ffxbld
9a6945c623 No bug, Automated HPKP preload list update from host bld-linux64-spot-302 - a=hpkp-update 2018-01-06 11:09:40 -08:00
ffxbld
892f4bd3a1 No bug, Automated HSTS preload list update from host bld-linux64-spot-302 - a=hsts-update 2018-01-06 11:09:36 -08:00
ffxbld
0f63741b8e No bug, Automated HPKP preload list update from host bld-linux64-spot-037 - a=hpkp-update 2018-01-05 12:22:25 -08:00
ffxbld
0046f0f438 No bug, Automated HSTS preload list update from host bld-linux64-spot-037 - a=hsts-update 2018-01-05 12:22:21 -08:00
ffxbld
a2f5eacf1f No bug, Automated HPKP preload list update from host bld-linux64-spot-034 - a=hpkp-update 2018-01-04 14:13:48 -08:00
ffxbld
df3bec329c No bug, Automated HSTS preload list update from host bld-linux64-spot-034 - a=hsts-update 2018-01-04 14:13:44 -08:00
ffxbld
ac67a1c73c No bug, Automated HPKP preload list update from host bld-linux64-spot-036 - a=hpkp-update 2018-01-03 14:38:40 -08:00
ffxbld
f4ac363948 No bug, Automated HSTS preload list update from host bld-linux64-spot-036 - a=hsts-update 2018-01-03 14:38:36 -08:00
Haik Aftandilian
f6cdb35b8f Bug 1421262 - [Mac] Add access to hw.cachelinesize sysctl, /Library/GPUBundles to content sandbox rules. r=Alex_Gaynor
MozReview-Commit-ID: LBWA8XD64h

--HG--
extra : rebase_source : dac2ea615fdcbbd4d029bbbb28e3d935a4416deb
2017-12-21 14:15:29 -08:00
Mark Banner
770685e15e Bug 1425688 - Enable ESLint rule mozilla/use-services for security/. r=gcp,keeler
MozReview-Commit-ID: 4Kd9L8ExNGl

--HG--
extra : rebase_source : 02a5242629c7b597d7fd4e5e1373781fcbb82905
2017-12-16 13:10:40 -06:00
Mark Banner
a825aadc8a Bug 1425688 - Rework definitions of Cu/Cc/etc and inclusion of Services.jsm in pippki.js related files to reduce duplication. r=keeler
MozReview-Commit-ID: 1BN0Z5lOKYh

--HG--
extra : rebase_source : bc873871f02a2616aa5d54922e29b16750b3424e
2017-12-16 12:52:53 -06:00
ffxbld
d8534b8f72 No bug, Automated HPKP preload list update from host bld-linux64-spot-031 - a=hpkp-update 2018-01-01 12:43:20 -08:00
ffxbld
0a2ba4b6b2 No bug, Automated HSTS preload list update from host bld-linux64-spot-031 - a=hsts-update 2018-01-01 12:43:16 -08:00
ffxbld
223ae3afdc No bug, Automated HPKP preload list update from host bld-linux64-spot-033 - a=hpkp-update 2017-12-31 22:11:20 -08:00
ffxbld
9cb7fb2148 No bug, Automated HSTS preload list update from host bld-linux64-spot-033 - a=hsts-update 2017-12-31 22:11:16 -08:00
ffxbld
dd07d453a1 No bug, Automated HPKP preload list update from host bld-linux64-spot-031 - a=hpkp-update 2017-12-30 13:43:47 -08:00
ffxbld
c510020205 No bug, Automated HSTS preload list update from host bld-linux64-spot-031 - a=hsts-update 2017-12-30 13:43:44 -08:00
ffxbld
42fc6a7ffa No bug, Automated HPKP preload list update from host bld-linux64-spot-030 - a=hpkp-update 2017-12-29 15:38:33 -08:00
ffxbld
8195cf9180 No bug, Automated HSTS preload list update from host bld-linux64-spot-030 - a=hsts-update 2017-12-29 15:38:29 -08:00
ffxbld
65b3bb229e No bug, Automated HPKP preload list update from host bld-linux64-spot-302 - a=hpkp-update 2017-12-28 11:09:38 -08:00
ffxbld
33bbc65536 No bug, Automated HSTS preload list update from host bld-linux64-spot-302 - a=hsts-update 2017-12-28 11:09:34 -08:00
Cosmin Sabou
6c33dde6ca Backed out 2 changesets (bug 1425688) on request from jorgk for breaking the Certificate Manager r=backout a=backout
Backed out changeset f73324a4d033 (bug 1425688)
Backed out changeset bd2bf7b7fead (bug 1425688)
2017-12-28 15:26:09 +02:00
ffxbld
257b1043cb No bug, Automated HPKP preload list update from host bld-linux64-spot-302 - a=hpkp-update 2017-12-27 11:02:53 -08:00
ffxbld
3fb919b0ad No bug, Automated HSTS preload list update from host bld-linux64-spot-302 - a=hsts-update 2017-12-27 11:02:49 -08:00
ffxbld
0ab5eb206e No bug, Automated HPKP preload list update from host bld-linux64-spot-303 - a=hpkp-update 2017-12-26 10:57:37 -08:00
ffxbld
f305f918c6 No bug, Automated HSTS preload list update from host bld-linux64-spot-303 - a=hsts-update 2017-12-26 10:57:33 -08:00
ffxbld
2fd2c44b24 No bug, Automated HPKP preload list update from host bld-linux64-spot-302 - a=hpkp-update 2017-12-25 10:35:57 -08:00
ffxbld
245024e56a No bug, Automated HSTS preload list update from host bld-linux64-spot-302 - a=hsts-update 2017-12-25 10:35:54 -08:00
ffxbld
4194d5dc45 No bug, Automated HPKP preload list update from host bld-linux64-spot-302 - a=hpkp-update 2017-12-24 10:42:34 -08:00
ffxbld
a72af473e1 No bug, Automated HSTS preload list update from host bld-linux64-spot-302 - a=hsts-update 2017-12-24 10:42:31 -08:00
ffxbld
b1c15473e8 No bug, Automated HPKP preload list update from host bld-linux64-spot-302 - a=hpkp-update 2017-12-23 10:38:20 -08:00
ffxbld
4f04e9c623 No bug, Automated HSTS preload list update from host bld-linux64-spot-302 - a=hsts-update 2017-12-23 10:38:17 -08:00
ffxbld
56c9489582 No bug, Automated HPKP preload list update from host bld-linux64-spot-302 - a=hpkp-update 2017-12-22 10:35:04 -08:00
ffxbld
c8bb922a65 No bug, Automated HSTS preload list update from host bld-linux64-spot-302 - a=hsts-update 2017-12-22 10:35:01 -08:00
arthur.iakab
610ad46e20 Merge Autoland to mozilla-central r=merge a=merge 2017-12-22 00:15:51 +02:00
ffxbld
60a54d3ea6 No bug, Automated HPKP preload list update from host bld-linux64-spot-324 - a=hpkp-update 2017-12-21 10:34:39 -08:00
ffxbld
54e9b9f089 No bug, Automated HSTS preload list update from host bld-linux64-spot-324 - a=hsts-update 2017-12-21 10:34:36 -08:00
Florian Quèze
0f55cd45be Bug 1421992 - script-generated patch to replace do_execute_soon, do_print and do_register_cleanup with executeSoon, info and registerCleanupFunction, rs=Gijs. 2017-12-21 11:10:23 +01:00
Florian Quèze
032c961e0a Bug 1421992 - script-generated patch to replace do_check_* functions with their Assert.* equivalents, rs=Gijs. 2017-12-21 11:08:17 +01:00
Jed Davis
eec54d4531 Bug 1393287 - Intercept sigaction() to fix signal masks for sandboxing. r=gcp
Also changes gSeccompTsyncBroadcastSignum to an atomic, in case these
wrappers race with starting the sandbox, and optimizes the wrappers
slightly by avoiding unnecessary copying of signal sets or sigactions.

Tested by manaully LD_PRELOADing libmozsandbox in the parent process,
because it already has a few signal handlers with block-by-default
masks.

MozReview-Commit-ID: CiHsA6rOCrQ

--HG--
extra : rebase_source : 176c156116a44fb8dff3a5f421499b7e61175047
2017-12-08 17:31:07 -07:00
Gian-Carlo Pascutto
4f260fc76e Bug 1386404 - Whitelist the prefix used by the XPCOM leak logs. r=haik
MozReview-Commit-ID: HI68lvyJIPQ

--HG--
extra : rebase_source : 75da730d240881928a6db230a85031e24cef23e0
2017-11-03 13:18:56 +01:00
Gian-Carlo Pascutto
874a243297 Bug 1386404 - Only do the tmp remapping if needed. r=jld
This helps with getting the tests that are running out of /tmp
to pass, who get confused if their paths change underneath them.

It's also a bit faster.

MozReview-Commit-ID: CWtngVNhA0t

--HG--
extra : rebase_source : ec91614556601e32f2604c3fb9f7d08156f834f3
2017-10-26 18:02:10 +02:00
Gian-Carlo Pascutto
9178b61a3d Bug 1386404 - Intercept access to /tmp and rewrite to content process tempdir. r=jld
MozReview-Commit-ID: 2h9hw6opYof

--HG--
extra : rebase_source : f331071eeba9fc0714a0df09ca102273b4ee7320
2017-10-26 17:50:49 +02:00
Gian-Carlo Pascutto
57d5d1c52a Bug 1386404 - Enable access to the entire chrome dir from content. r=jld
This may be required if people have @import in their userContent.css, and
in any case our tests check for this.

MozReview-Commit-ID: 8uJcWiC2rli

--HG--
extra : rebase_source : 3384cb599a6d7b1aeba64e552ec4778ddab03f39
2017-10-26 18:57:03 +02:00
Gian-Carlo Pascutto
1a580a77b4 Bug 1386404 - Enable content-process specific tmpdir on Linux. r=haik,jld
MozReview-Commit-ID: 6Hijq0to9MG

--HG--
extra : rebase_source : 7ff43ffe52f32ebbc7c866428e0d1d64dd05cbcb
2018-01-09 16:29:40 +01:00
Mark Banner
bed9b1d6c8 Bug 1425688 - Enable ESLint rule mozilla/use-services for security/. r=gcp,keeler
MozReview-Commit-ID: 4Kd9L8ExNGl

--HG--
extra : rebase_source : d8383ef464e9f0d19c7642a07967f3e2fa56d0dc
2017-12-16 13:10:40 -06:00
Mark Banner
b72f59ba4f Bug 1425688 - Rework definitions of Cu/Cc/etc and inclusion of Services.jsm in pippki.js related files to reduce duplication. r=keeler
MozReview-Commit-ID: 1BN0Z5lOKYh

--HG--
extra : rebase_source : 9e70b14b5fcf65544bacdce5db53889c99ff313e
2017-12-16 12:52:53 -06:00
Dorel Luca
a19f5582cc Merge mozilla-central to mozilla-inbound r=merge 2018-01-11 00:05:23 +02:00
David Keeler
dc98f8d1f2 bug 1417680 - explore the feasibility of making XPCOM responsible for shutting down NSS r=jcj r=franziskus r=erahm
Historically, PSM has handled tracking NSS resources, releasing them, and
shutting down NSS in a coordinated manner (i.e. preventing races,
use-after-frees, etc.). This approach has proved intractable. This patch
introduces a new approach: have XPCOM shut down NSS after all threads have been
joined and the component manager has been shut down (and so there shouldn't be
any XPCOM objects holding NSS resources).

Note that this patch only attempts to determine if this approach will work. If
it does, we will have to go through alter and remove the remnants of the old
approach (i.e. nsNSSShutDownPreventionLock and related machinery). This will be
done in bug 1421084.

MozReview-Commit-ID: LjgEl1UZqkC

--HG--
extra : rebase_source : 95050b060a93223c6f2fce90f44e563fa6ed4fa2
2017-11-10 15:03:23 -08:00
Cosmin Sabou
bf4a9b39b7 Merge autoland to mozilla-central r=merge a=merge 2017-12-20 23:40:31 +02:00
ffxbld
1c0199be67 No bug, Automated HPKP preload list update from host bld-linux64-spot-302 - a=hpkp-update 2017-12-20 10:37:32 -08:00
ffxbld
e95c193a16 No bug, Automated HSTS preload list update from host bld-linux64-spot-302 - a=hsts-update 2017-12-20 10:37:28 -08:00
Haik Aftandilian
4e95d558ac Bug 1404298 - Crashes with read-access content sandboxing triggered by mounted volumes. r=Alex_Gaynor
Allow read-metadata access to top-level directory entries.

MozReview-Commit-ID: 1Q7QXN2gX36

--HG--
extra : rebase_source : 86e3cc1906bb805e158c70c703ec204f11452199
2017-12-18 12:58:30 -08:00
Michal Novotny
32a0630b56 Bug 1418752 - Firefox instahang on start after landing patch from bug #1392841.vr=honzab
Initialize in advance all security services whose initialization on background thread could cause a deadlock.

--HG--
extra : rebase_source : 399f9acf736f9a06665d45a71b354076c1b85fa6
2017-12-19 21:08:15 -05:00
Bogdan Tara
9ac9aa3461 Merge mozilla-central to inbound. r=merge a=merge on a CLOSED TREE 2017-12-20 00:17:00 +02:00
ffxbld
f64b319956 No bug, Automated HPKP preload list update from host bld-linux64-spot-302 - a=hpkp-update 2017-12-19 10:36:42 -08:00
ffxbld
f3af52924b No bug, Automated HSTS preload list update from host bld-linux64-spot-302 - a=hsts-update 2017-12-19 10:36:38 -08:00
Franziskus Kiefer
da627bdc03 Bug 1420060 - land NSS 04fc9a90997b UPGRADE_NSS_RELEASE, r=me
MozReview-Commit-ID: 5VMV4wtzMKA

--HG--
extra : rebase_source : 43ea63a50d243bcc46fbae3b65f5d117e8fba771
2017-12-19 15:26:12 +01:00
Csoregi Natalia
0393c9235f Backed out changeset 8a71f6e05783 (bug 1393287) for Hazard Build Bustage. r=backout on a CLOSED TREE 2017-12-19 02:49:50 +02:00
Jed Davis
b99c2f8096 Bug 1393287 - Intercept sigaction() to fix signal masks for sandboxing. r=gcp
Also changes gSeccompTsyncBroadcastSignum to an atomic, in case these
wrappers race with starting the sandbox, and optimizes the wrappers
slightly by avoiding unnecessary copying of signal sets or sigactions.

Tested by manaully LD_PRELOADing libmozsandbox in the parent process,
because it already has a few signal handlers with block-by-default
masks.

MozReview-Commit-ID: CiHsA6rOCrQ

--HG--
extra : rebase_source : 43c52a1169d6f510c3dc83143736b9be7ed7141d
2017-12-08 17:31:07 -07:00
Jed Davis
7dcac56405 Bug 1422198 - Log about failure to send a sandbox broker reply. r=gcp
MozReview-Commit-ID: eDcoMHGFxo

--HG--
extra : rebase_source : 6033f39a290b7b3dcbcebfaa8712e838e63fc09e
2017-12-08 14:43:36 -07:00
ffxbld
869f194506 No bug, Automated HPKP preload list update from host bld-linux64-spot-302 - a=hpkp-update 2017-12-17 10:58:36 -08:00
ffxbld
c9d95edd9f No bug, Automated HSTS preload list update from host bld-linux64-spot-302 - a=hsts-update 2017-12-17 10:58:33 -08:00
ffxbld
0e3e215a27 No bug, Automated HPKP preload list update from host bld-linux64-spot-302 - a=hpkp-update 2017-12-16 10:39:43 -08:00
ffxbld
d762c29622 No bug, Automated HSTS preload list update from host bld-linux64-spot-302 - a=hsts-update 2017-12-16 10:39:40 -08:00
David Keeler
27da53bcf6 bug 1425032 - use new "cancel all connections" notification for PKCS#11 logout r=mgoodwin
When the user performs a PKCS#11 logout, we need to cancel all in-progress
network connections. Before this patch, PSM would track all the sockets it
created to implement this feature. However, bug 1411316 added the ability to
cancel these connections by sending the notification
"net:cancel-all-connections". This patch removes the now-unnecessary tracking
machinery in favor of delegating this to necko.

MozReview-Commit-ID: 7IzC14bH2R4

--HG--
extra : rebase_source : 57ff2121a2395cb2b012785ec3a11f75d923e675
2017-12-13 17:41:02 -06:00
ffxbld
eea8fcf5e8 No bug, Automated HPKP preload list update from host bld-linux64-spot-306 - a=hpkp-update 2017-12-15 11:20:42 -08:00
ffxbld
cce9ab656b No bug, Automated HSTS preload list update from host bld-linux64-spot-306 - a=hsts-update 2017-12-15 11:20:38 -08:00
ffxbld
e5088d2dbb No bug, Automated HPKP preload list update from host bld-linux64-spot-302 - a=hpkp-update 2017-12-15 11:02:59 -08:00
ffxbld
b18ce43492 No bug, Automated HSTS preload list update from host bld-linux64-spot-302 - a=hsts-update 2017-12-15 11:02:55 -08:00
Narcis Beleuzu
b73dac9611 Merge autoland to mozilla-central. r=merge a=merge on a CLOSED TREE 2017-12-15 03:43:08 +02:00
ffxbld
4c5305936a No bug, Automated HPKP preload list update from host bld-linux64-spot-306 - a=hpkp-update 2017-12-14 11:19:41 -08:00
ffxbld
96bf1438a5 No bug, Automated HSTS preload list update from host bld-linux64-spot-306 - a=hsts-update 2017-12-14 11:19:38 -08:00
ffxbld
7fccec6502 No bug, Automated HPKP preload list update from host bld-linux64-spot-302 - a=hpkp-update 2017-12-14 10:39:44 -08:00
ffxbld
5d995473be No bug, Automated HSTS preload list update from host bld-linux64-spot-302 - a=hsts-update 2017-12-14 10:39:40 -08:00
David Keeler
95159e1851 bug 1424392 - remove unnecessary nsINSSComponent usage in nsNSSCallbacks r=mgoodwin
PK11PasswordPromptRunnable::RunOnTargetThread instantiates nsINSSComponent and
calls GetPIPNSSBundleString/PIPBundleFormatStringFromName to get some localized
strings. Since that runs on the main thread, we can call the helpers in
nsNSSCertHelper instead.

MozReview-Commit-ID: GsHoGDKBKdB

--HG--
extra : rebase_source : 7c18498ad0d01ab01f6e7d8c3d2ccdb1d6e20734
2017-12-08 14:07:04 -08:00
Csoregi Natalia
1134c27c23 Merge mozilla-central to autoland. r=merge a=merge CLOSED TREE 2017-12-14 00:15:40 +02:00
ffxbld
c958fc3b7b No bug, Automated HPKP preload list update from host bld-linux64-spot-034 - a=hpkp-update 2017-12-13 12:01:21 -08:00
ffxbld
1377bf03a3 No bug, Automated HSTS preload list update from host bld-linux64-spot-034 - a=hsts-update 2017-12-13 12:01:17 -08:00
ffxbld
354a4163c6 No bug, Automated HPKP preload list update from host bld-linux64-spot-030 - a=hpkp-update 2017-12-13 11:24:25 -08:00
ffxbld
2db6eb28d0 No bug, Automated HSTS preload list update from host bld-linux64-spot-030 - a=hsts-update 2017-12-13 11:24:21 -08:00
Alex Gaynor
bf2d3984cb Bug 1424942 - Remove fallback code for old macOS releases in the sandbox policy; r=haik
MozReview-Commit-ID: LCU4TWNMs8T

--HG--
extra : rebase_source : b01ba6c163da653717c9201cba70b89540676330
2017-12-12 14:58:46 -06:00
Margareta Eliza Balazs
4551f2e31e Merge inbound to mozilla-central r=merge a=merge 2017-12-12 23:58:36 +02:00
ffxbld
01c7631757 No bug, Automated HPKP preload list update from host bld-linux64-spot-035 - a=hpkp-update 2017-12-12 12:10:25 -08:00
ffxbld
561b61d3ff No bug, Automated HSTS preload list update from host bld-linux64-spot-035 - a=hsts-update 2017-12-12 12:10:21 -08:00
ffxbld
fc20a5a0ab No bug, Automated HPKP preload list update from host bld-linux64-spot-030 - a=hpkp-update 2017-12-12 11:23:12 -08:00
ffxbld
4338c47957 No bug, Automated HSTS preload list update from host bld-linux64-spot-030 - a=hsts-update 2017-12-12 11:23:09 -08:00
ffxbld
7a8fc93f68 No bug, Automated HPKP preload list update from host bld-linux64-spot-037 - a=hpkp-update 2017-12-11 12:07:39 -08:00
ffxbld
00d93b43c8 No bug, Automated HSTS preload list update from host bld-linux64-spot-037 - a=hsts-update 2017-12-11 12:07:35 -08:00
ffxbld
cba1cda89a No bug, Automated HPKP preload list update from host bld-linux64-spot-030 - a=hpkp-update 2017-12-11 11:37:07 -08:00