Commit Graph

13176 Commits

Author SHA1 Message Date
ffxbld
2284608f88 No bug, Automated HPKP preload list update from host bld-linux64-spot-302 - a=hpkp-update 2018-02-20 11:59:25 -08:00
ffxbld
c098f7cf06 No bug, Automated HSTS preload list update from host bld-linux64-spot-302 - a=hsts-update 2018-02-20 11:59:21 -08:00
ffxbld
7dbd69b271 No bug, Automated HPKP preload list update from host bld-linux64-spot-302 - a=hpkp-update 2018-02-19 12:14:58 -08:00
ffxbld
4f4cdf70f5 No bug, Automated HSTS preload list update from host bld-linux64-spot-302 - a=hsts-update 2018-02-19 12:14:54 -08:00
ffxbld
3e2e7c414f No bug, Automated HPKP preload list update from host bld-linux64-spot-302 - a=hpkp-update 2018-02-18 11:51:04 -08:00
ffxbld
18e9f8b8e0 No bug, Automated HSTS preload list update from host bld-linux64-spot-302 - a=hsts-update 2018-02-18 11:51:00 -08:00
Chris Peterson
0129d900f3 Bug 1436263 - Part 2: Replace override final virtual function specifiers with just final. r=froydnj
MozReview-Commit-ID: 70gt5SUu4Dv

--HG--
extra : rebase_source : 71912c6bde22aaed01e70615a4ee794a36e70d0e
extra : source : 1c22d4c65d70b797ee3e963ec426c90e1f89b5e3
2018-02-05 22:50:00 -08:00
Chris Peterson
d09123f248 Bug 1436263 - Part 1: Replace final override virtual function specifiers with just final. r=froydnj
MozReview-Commit-ID: DE5HkIhsZ6D

--HG--
extra : rebase_source : 94831c1e13a840dd2ea0600f64bcf70c2bf938d9
extra : source : cf9283bf1b0bca3a6311c98e227329d451f80ecb
2018-02-05 22:46:57 -08:00
ffxbld
101516e4b4 No bug, Automated HPKP preload list update from host bld-linux64-spot-302 - a=hpkp-update 2018-02-17 11:53:22 -08:00
ffxbld
b22fc381ad No bug, Automated HSTS preload list update from host bld-linux64-spot-302 - a=hsts-update 2018-02-17 11:53:18 -08:00
David Keeler
12125be772 bug 1437214 - if PathBuildingStep::Check fails due to a problem with the subject certificate rather than the potential issuer, set keepGoing to false r=jcj
MozReview-Commit-ID: DEr4YgXfkOL

--HG--
extra : rebase_source : daea8346adeb56cc34c0fb284dba2e571fd3621e
2018-02-09 16:35:54 -08:00
Gurzau Raul
641a1a335b Merge autoland to mozilla-central. a=merge 2018-02-17 00:07:28 +02:00
ffxbld
aac4bf5025 No bug, Automated HPKP preload list update from host bld-linux64-spot-324 - a=hpkp-update 2018-02-16 12:17:39 -08:00
ffxbld
3e2d0c9e68 No bug, Automated HSTS preload list update from host bld-linux64-spot-324 - a=hsts-update 2018-02-16 12:17:35 -08:00
Narcis Beleuzu
2d9816273c Merge inbound to mozilla-central. a=merge 2018-02-16 11:49:59 +02:00
Margareta Eliza Balazs
55aa0e75d6 Merge mozilla-central to inbound. a=merge CLOSED TREE 2018-02-15 22:43:18 +02:00
ffxbld
9c28e67497 No bug, Automated HPKP preload list update from host bld-linux64-spot-302 - a=hpkp-update 2018-02-15 11:54:30 -08:00
ffxbld
eb8f2dd6d1 No bug, Automated HSTS preload list update from host bld-linux64-spot-302 - a=hsts-update 2018-02-15 11:54:26 -08:00
David Parks
9a797c5ce2 Bug 1415160: Part 2 - Add mitigations to plugin process if not running from network drive r=bobowen
Adds MITIGATION_IMAGE_LOAD_NO_REMOTE and MITIGATION_IMAGE_LOAD_NO_LOW_LABEL to the plugin process if we aren't running from a networked drive.  The same condition applies to these mitigations in the content process.

--HG--
extra : rebase_source : b61f91f3e56f6b4930a03331b7791a9173857518
2017-12-21 12:36:02 -08:00
David Parks
90d62139c0 Bug 1415160: Part 1 - Enable new NPAPI Windows Process Mitigations; r=bobowen
Enables new process mitigations that have been included from Chromium upstream.

--HG--
extra : rebase_source : 8997bef9c6a6c660b39e68ebfabf90f4de162bca
2017-12-20 22:58:26 -08:00
Dorel Luca
90035255ae Merge autoland to mozilla-central a=merge 2018-02-15 00:19:43 +02:00
ffxbld
b704aa3943 No bug, Automated HPKP preload list update from host bld-linux64-spot-302 - a=hpkp-update 2018-02-14 11:41:55 -08:00
ffxbld
c8cb4d8575 No bug, Automated HSTS preload list update from host bld-linux64-spot-302 - a=hsts-update 2018-02-14 11:41:51 -08:00
ffxbld
149e4575b0 No bug, Automated HPKP preload list update from host bld-linux64-spot-302 - a=hpkp-update 2018-02-13 11:40:34 -08:00
ffxbld
1bcdadf7b5 No bug, Automated HSTS preload list update from host bld-linux64-spot-302 - a=hsts-update 2018-02-13 11:40:30 -08:00
Haik Aftandilian
c90be35636 Bug 1436566 - [Mac] Land disabled-by-default sandboxing for the Flash NPAPI plugin process. r=Alex_Gaynor,jimm
MozReview-Commit-ID: Es0GbMLKvH5

--HG--
extra : rebase_source : 991f20ac25735508d790947991f59214fb06e54f
2018-02-12 15:46:31 -08:00
Ciure Andrei
72080bd73c Merge inbound to mozilla-central. a=merge 2018-02-13 00:08:37 +02:00
Ciure Andrei
6c55aa90ec Merge autoland to mozilla-central. a=merge 2018-02-13 00:06:52 +02:00
ffxbld
9eab54622b No bug, Automated HPKP preload list update from host bld-linux64-spot-302 - a=hpkp-update 2018-02-12 11:53:23 -08:00
ffxbld
91e80a354d No bug, Automated HSTS preload list update from host bld-linux64-spot-302 - a=hsts-update 2018-02-12 11:53:20 -08:00
Markus Stange
62e953a6b6 Bug 785440 - Disable warning C4324 when building security/certverifier. r=keeler
This warning is triggered by the use of alignas() in js/public/RootingAPI.h.
Now that GeckoProfiler.h includes RootingAPI.h, this warning is encountered
when building security/certverifier because GeckoProfiler.h is already being
included transitively, through this inclusion path:
CertVerifier.cpp -> CertVerifier.h -> Telemetry.h -> StartupTimeline.h -> GeckoProfiler.h

However, this explanation is not entirely satisfactory, because there seems to
be an existing inclusion path for RootingAPI.h already:
CertVerifier.cpp -> CertVerifier.h -> BasePrincipal.h -> OriginAttributes.h
 -> ChromeUtils.h -> ChromeUtilsBinding.h -> RootingAPI.h

So I'm not quite sure why this problem is only starting to happen now.

MozReview-Commit-ID: AFuXpTjdPsi

--HG--
extra : rebase_source : 60f74c8655d15fbc6acbf0ce8a2f208e198e231e
2018-02-11 00:32:14 -05:00
Tom Ritter
aa82f54ab6 Bug 1435296 Address test failures caused by bumping timer precision to 2 ms r=baku
There are a few different reasons why tests needed updating (not an exhaustive list):

- Tests assume that successive operations take place at different times.
- Tests assume that an operation took a minimum amount of time.
- Tests hardcodes a specific delay.

In most cases we hardcode the preference off. In some cases this is the best approach,
in others, we would like to improve. The bug for tracking those improvements is Bug 1429648

An improvement that is present in some tests is to hardcode a specific precision reduction
that is acceptable based on the confides of the test. (Obviously this needs to be a fix for
the test framework and not a requirement on the feature being tested.)

In a few places, the test itself can be fixed, for example to no longer require the end
time of an operation to be strictly greater than the start time, and allows it to be equal
to it.

MozReview-Commit-ID: J59c7xQtZZJ

--HG--
extra : rebase_source : df8a03e76eaf9cdc9524dbb3eb9035af237e534b
2018-02-12 11:39:41 -06:00
ffxbld
929f38c465 No bug, Automated HPKP preload list update from host bld-linux64-spot-302 - a=hpkp-update 2018-02-11 11:38:54 -08:00
ffxbld
89d2f51207 No bug, Automated HSTS preload list update from host bld-linux64-spot-302 - a=hsts-update 2018-02-11 11:38:50 -08:00
ffxbld
d8618c2516 No bug, Automated HPKP preload list update from host bld-linux64-spot-305 - a=hpkp-update 2018-02-10 12:36:17 -08:00
ffxbld
667ffc2f8f No bug, Automated HSTS preload list update from host bld-linux64-spot-305 - a=hsts-update 2018-02-10 12:36:13 -08:00
Bogdan Tara
5bbbbe17bc Merge inbound to mozilla-central. a=merge 2018-02-10 11:57:47 +02:00
Dorel Luca
5642ca2d02 Backed out changeset 06f87ee5bbbb (bug 1231203) for xpcshell and TV failures on security/manager/ssl/tests/unit/test_ocsp_private_caching.js on a CLOSED TREE 2018-02-10 05:34:40 +02:00
David Keeler
37cd996306 bug 1231203 - ensure OCSP responses to requests from private contexts aren't cached on disk r=jcj
MozReview-Commit-ID: 374f7hERLee

--HG--
extra : rebase_source : b424ee96d7f48e4f9d0b8fce91a675ae4477c43d
2018-02-08 17:16:03 -08:00
Sebastian Hengst
d1700a0b7a merge mozilla-central to autoland. CLOSED TREE 2018-02-10 00:34:30 +02:00
Coroiu Cristina
e2b150dd90 Merge autoland to mozilla-central. a=merge 2018-02-09 23:57:50 +02:00
ffxbld
967bc4dd14 No bug, Automated HPKP preload list update from host bld-linux64-spot-302 - a=hpkp-update 2018-02-09 12:01:52 -08:00
ffxbld
a0bae7c069 No bug, Automated HSTS preload list update from host bld-linux64-spot-302 - a=hsts-update 2018-02-09 12:01:49 -08:00
Jed Davis
f57faf8137 Bug 1436882 - Fix termination signal when clone()ing child processes. r=gcp
This fixes a mistake in bug 1401062: the termination signal was omitted,
so it's 0, and if it isn't exactly SIGCHLD, then a tracer/debugger will
receive PTRACE_EVENT_CLONE rather than PTRACE_EVENT_FORK.  This causes
GDB to see the child process as a thread instead of a separate process,
and it becomes very confused after the process calls execve().

MozReview-Commit-ID: Baf2RFHVWRU

--HG--
extra : rebase_source : 50839967fc766bb9db123fe1af99a88495f8421b
2018-02-08 17:30:03 -07:00
J.C. Jones
3d8ea4a710 Bug 1434936 - Rework ChainHasValidPins to use nsNSSCertList r=keeler r=fkiefer
This commit reworks PublicKeyPinningService::ChainHasValidPins and
PublicKeyPinningService::EvalChain to use nsNSSCertList directly.  It also
updates nsSiteSecurityService::ProcessPKPHeader. This will be made more
efficient in Bug 1406854, where the call to VerifySSLServerCert gets replaced
with one to GetSucceededCertChain. (Such a change is premeature now because
before Bug 731478 lands this would lead to a session resumption regression
causing pins to not be set properly, which is triggered repeatedly in the
xpcshell tests.)

MozReview-Commit-ID: 1l186n1lXLH

--HG--
extra : rebase_source : 88e40bbf41b324ece762abfa84a758380102e199
extra : histedit_source : addcddf253c2901a25b29f65046908f52df61345
2018-01-31 18:50:29 -07:00
J.C. Jones
69d7ddbfe8 Bug 1434936 - Use nsNSSCertList in NSSCertDBTrustDomain::IsChainValid r=keeler r=fkiefer
This change is to use the higher-level structure nsNSSCertList when checking
IsChainValid so that we can use the more powerful (and tested) methods of that
object instead of the ad-hoc iterators.

This will also permit the Symantec Distrust code in Bug 1434300 to use these
methods, which keeps the code the same from the earlier Bug 1409259.

MozReview-Commit-ID: B5KmDa1JLE

--HG--
extra : rebase_source : 397d3ef7189eb6f81a1ceaf920464d9e842a8981
extra : histedit_source : 26b22257cb5fcc3389630dd0a1aba24095c46158
2018-01-31 16:02:00 -07:00
J.C. Jones
6395c26d4a Bug 1434936 - Add method nsNSSCertList::GetRootCertificate r=keeler r=fkiefer
This adds another utility method to nsNSSCertList to perform CERT_LIST_TAIL on
the underlying certificate list and return the last entry -- e.g., the root.
This is a convenience method to let other parts of the certificate verifier
continue to work with the higher-level nsNSSCertificate objects instead of
having to convert them.

MozReview-Commit-ID: EEi9L5Iepc6

--HG--
extra : rebase_source : 2836767a7186f65debf338f8d1f2a981636ed29b
extra : histedit_source : 5b87ec6c522ac1b84d91052e21184f3c03d9ea52
2018-01-31 17:14:40 -07:00
Brendan Dahl
a1b881280b Bug 1434016 - Inline and remove the various security manager overlays. r=keeler
This is part of the work to remove XUL overlays. All of these overlays are
used only once and do not need to be in their own overlay files.

MozReview-Commit-ID: Ecwq2UN52o9

--HG--
extra : rebase_source : 5a9692c7d9965940847ae1d488d1b94a2abf66c7
2018-01-29 14:56:53 -08:00
Honza Bambas
e68b22643e Bug 1152332 - Let connection proxy filters return the result asynchronously - update/introduce tests, r=michal
--HG--
rename : netwerk/test/unit/test_protocolproxyservice.js => netwerk/test/unit/test_protocolproxyservice-async-filters.js
2018-02-08 05:49:00 +02:00
Jed Davis
927e70c7a5 Bug 1425274 - Filter socketpair() in content sandbox on 32-bit x86 with new-enough kernels. r=gcp
This replaces the globals for whether socket calls (and ipc(2) calls, but
we never used that) have real arguments with a parameter, which in hindsight
should have been done in bug 1273852, which is when we started handling
both socketcall(2) and separate socket calls in the same policy.  This
allows handling the two cases differently.

MozReview-Commit-ID: 1pfckmCpJlW

--HG--
extra : rebase_source : 4b8459f01e8748fea95cbcb6eeb689f01417ca5b
2018-01-29 17:36:06 -07:00