Commit Graph

6390 Commits

Author SHA1 Message Date
ffxbld
de627b48fd No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D10879

--HG--
extra : moz-landing-system : lando
2018-11-05 13:27:19 +00:00
Johann Hofmann
1c2de6c900 Bug 1501680 - Don't send credentials in ssl error reports. r=Gijs
Differential Revision: https://phabricator.services.mozilla.com/D10594

--HG--
extra : moz-landing-system : lando
2018-11-01 18:49:11 +00:00
Jan-Erik Rediger
50555e7773 Bug 1468761 - Migrate external Telemetry tests to handle packed histograms r=chutten
Depends on D9236

Differential Revision: https://phabricator.services.mozilla.com/D9237

--HG--
extra : moz-landing-system : lando
2018-11-01 13:46:59 +00:00
Ehsan Akhgari
164805ba94 Bug 1502774 - Part 2: Remove XPCOM component registrations for auth module classes r=valentin
Depends on D10025

Differential Revision: https://phabricator.services.mozilla.com/D10026

--HG--
extra : moz-landing-system : lando
2018-11-01 10:39:58 +00:00
ffxbld
1a798e34d6 No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D10545

--HG--
extra : moz-landing-system : lando
2018-11-01 12:52:20 +00:00
Andreea Pavel
3770da1a92 Backed out 3 changesets (bug 1502774) for causing multiple crashes - bug 1503201 a=backout
Backed out changeset 6b821f5b12ae (bug 1502774)
Backed out changeset b3bf57d996a7 (bug 1502774)
Backed out changeset 32a581482291 (bug 1502774)

--HG--
rename : extensions/auth/nsIAuthModule.cpp => extensions/auth/nsAuthFactory.cpp
2018-10-30 21:18:29 +02:00
Ehsan Akhgari
51908697bd Bug 1502774 - Part 2: Remove XPCOM component registrations for auth module classes r=valentin
Depends on D10025

Differential Revision: https://phabricator.services.mozilla.com/D10026

--HG--
extra : moz-landing-system : lando
2018-10-29 14:59:16 +00:00
Narcis Beleuzu
3467484554 Backed out 3 changesets (bug 1502774) for mingwclang bustages on include/sspi.h. CLOSED TREE
Backed out changeset a1f9c4666855 (bug 1502774)
Backed out changeset 07648e9d8400 (bug 1502774)
Backed out changeset b403c3c786ee (bug 1502774)

--HG--
rename : extensions/auth/nsIAuthModule.cpp => extensions/auth/nsAuthFactory.cpp
2018-10-29 17:01:21 +02:00
Ehsan Akhgari
acc9a12f81 Bug 1502774 - Part 2: Remove XPCOM component registrations for auth module classes r=valentin
Depends on D10025

Differential Revision: https://phabricator.services.mozilla.com/D10026

--HG--
extra : moz-landing-system : lando
2018-10-29 14:40:29 +00:00
ffxbld
36c0312102 No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D10049

--HG--
extra : moz-landing-system : lando
2018-10-29 12:26:11 +00:00
Jeff Gilbert
02e6ff5ccb Bug 1499587 - Fix win64 clang-cl -Wwritable-strings. r=ted
Differential Revision: https://phabricator.services.mozilla.com/D9031

--HG--
extra : moz-landing-system : lando
2018-10-25 14:16:27 +00:00
ffxbld
705e5f8284 No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D9775

--HG--
extra : moz-landing-system : lando
2018-10-25 14:05:03 +00:00
David Keeler
7473c7494c bug 1499846 - implement user reauthentication on MacOS r=franziskus,spohl
Differential Revision: https://phabricator.services.mozilla.com/D9025

--HG--
extra : moz-landing-system : lando
2018-10-25 00:24:04 +00:00
ffxbld
b260043af7 No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=bagder,RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D9534

--HG--
extra : moz-landing-system : lando
2018-10-23 20:24:21 +00:00
Ehsan Akhgari
f6b7bc0052 Bug 1501404 - Part 6: Remove the XPCOM registrations for socket provider classes r=valentin
Depends on D9574

Differential Revision: https://phabricator.services.mozilla.com/D9575

--HG--
extra : moz-landing-system : lando
2018-10-23 20:07:27 +00:00
Margareta Eliza Balazs
1a7c7d8823 Merge mozilla-central to autoland. a=merge CLOSED TREE 2018-10-23 12:31:53 +03:00
Margareta Eliza Balazs
a7f4d3ba4f Merge inbound to mozilla-central. a=merge 2018-10-23 12:27:03 +03:00
Franziskus Kiefer
4c3ce53100 Bug 1498518 - user authentication prompts for Windows, r=keeler,mhowell
Depends on D8480

Differential Revision: https://phabricator.services.mozilla.com/D8530

--HG--
extra : moz-landing-system : lando
2018-10-23 09:05:07 +00:00
Dana Keeler
5af8762bc6 bug 1499766 - rework the threading model of OSKeyStore r=jcj
The original threading model of OSKeyStore could lead to a deadlock if an
asynchronous event were dispatched and then the isNSSKeyStore attribute were
queried. This patch removes that pitfall by moving the determination of the
attribute to OSKeyStore rather than the underlying implementation.

Additionally, the original threading model was inefficient in that it created
and destroyed a thread per asynchronous operation. This patch reworks this to
only ever create one worker thread.

Differential Revision: https://phabricator.services.mozilla.com/D9299

--HG--
extra : moz-landing-system : lando
2018-10-23 01:14:14 +00:00
Dana Keeler
c6f2578c07 bug 1496736 - check if we actually have a new key DB before removing the old one r=jcj
In bug 1475775, we added code to remove the old NSS key DB if the user has set a
password on the grounds that the old DB could potentially be unencrypted and
contain secrets. However, we did so with the assumption that we were using the
new DB, which is not necessarily true when the system has been configured to
always use the old DB, as with some RedHat products. This patch checks for the
existence of the new DB before proceeding with deleting the old DB. Technically
this isn't sufficient, because the new DB could be present even if we're not
using it. However, we've already gone far into "this configuration isn't
supported" territory.

Differential Revision: https://phabricator.services.mozilla.com/D9318

--HG--
extra : moz-landing-system : lando
2018-10-22 19:52:10 +00:00
Timothy Guan-tin Chien
b2023e958b Bug 1486954 - Part I, Encrypt credit card numbers with OS key store. r=MattN
This patch morphs MasterPassword.jsm to OSKeyStore.jsm while keeping the same
API, as an adaptor between the API and the native API exposed as nsIOSKeyStore.idl.

Noted that OS Key Store has the concept of "recovery phrase" that we won't
be adopting here. The recovery phrase, together with our label, allow
the user to re-create the same key in OS key store.

Test case changes are needed because we have started asking for login in
places where we'll only do previously when "master password is enabled".
This also made some "when master password is enabled" tests invalid because
it is always considered enabled.

Some more test changes are needed simply because they previously rely on the
stable order of microtask resolutions (and the stable # of promises for a
specific operation). That has certainly changed with OSKeyStore.

The credit card form autofill is only enabled on Nightly.

Differential Revision: https://phabricator.services.mozilla.com/D4498

--HG--
rename : browser/extensions/formautofill/MasterPassword.jsm => browser/extensions/formautofill/OSKeyStore.jsm
rename : browser/extensions/formautofill/test/browser/browser_creditCard_fill_master_password.js => browser/extensions/formautofill/test/browser/browser_creditCard_fill_cancel_login.js
extra : rebase_source : cabbd8cdec86e5b3965cf1c8b6e635b73b6c2095
extra : histedit_source : 65e71057104465553fefa1d0b293580efed53075
2018-10-17 02:31:04 +00:00
ffxbld
a57a738829 No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=mtabara
Differential Revision: https://phabricator.services.mozilla.com/D9376

--HG--
extra : moz-landing-system : lando
2018-10-22 12:13:22 +00:00
Kershaw Chang
8d4d50662c Bug 1219935 - Skip OCSP request if PAC download is in progress r=keeler,bagder
This is a straightforward patch.
Just add a new attribute in nsIProtocolProxyService to indicate whether PAC is still loading. If yes, fail the OCSP request.

Differential Revision: https://phabricator.services.mozilla.com/D9154

--HG--
extra : moz-landing-system : lando
2018-10-22 09:07:51 +00:00
Johann Hofmann
d7b28163d3 Bug 1500020 - Update cert error page copy based on UX suggestions. r=nhnt11
Differential Revision: https://phabricator.services.mozilla.com/D9080

--HG--
extra : moz-landing-system : lando
2018-10-19 14:50:59 +00:00
Mark Banner
ceaeb93550 Bug 1486741 - Enable ESLint rule comma-dangle for all of mozilla-central (automatic fixes). r=mossop
Differential Revision: https://phabricator.services.mozilla.com/D8389

--HG--
extra : moz-landing-system : lando
2018-10-19 12:55:39 +00:00
Cosmin Sabou
d3c64e672f Merge mozilla-central to autoland. a=merge 2018-10-19 00:57:18 +03:00
Dana Keeler
1ccf5dc900 bug 1498686 - avoid acquiring TransportSecurityInfo::mMutex in hot code r=jesup,jcj
Before this patch, Necko functions polling the state of TLS sockets
(essentially, TransportSecurityInfo) would cause a considerable amount of
locking on TransportSecurityInfo::mMutex instances via GetErrorCode(). Most of
this code only cared if an error had been set via SetCanceled(), so this patch
adds an atomic boolean mCanceled (and associated accessor GetCanceled()) that
can be used to the same effect but without acquiring the lock.

Differential Revision: https://phabricator.services.mozilla.com/D8754

--HG--
extra : moz-landing-system : lando
2018-10-18 20:08:02 +00:00
Ciure Andrei
bae4d8bacf Merge mozilla-central to mozilla-inbound. a=merge CLOSED TREE 2018-10-18 19:40:31 +03:00
ffxbld
74122af621 No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D9085

--HG--
extra : moz-landing-system : lando
2018-10-18 12:21:07 +00:00
Margareta Eliza Balazs
f4ce95166f Merge autoland to mozilla-central. a=merge 2018-10-18 13:19:19 +03:00
Margareta Eliza Balazs
53fc8ddacd Backed out 4 changesets (bug 1486954) for hangs on Linux. a=backout
Backed out changeset c895888bdddc (bug 1486954)
Backed out changeset 27e9286503e8 (bug 1486954)
Backed out changeset 87e64652386d (bug 1486954)
Backed out changeset 96a6e1ceb697 (bug 1486954)

--HG--
rename : browser/extensions/formautofill/OSKeyStore.jsm => browser/extensions/formautofill/MasterPassword.jsm
rename : browser/extensions/formautofill/test/browser/browser_creditCard_fill_cancel_login.js => browser/extensions/formautofill/test/browser/browser_creditCard_fill_master_password.js
2018-10-18 12:40:21 +03:00
Dana Keeler
d4ce8fc140 bug 1497555 - filter out same-document location changes in nsSecureBrowserUIImpl::OnLocationChange r=Ehsan
If nsSecureBrowserUIImpl::OnLocationChange receives a
LOCATION_CHANGE_SAME_DOCUMENT notification, it doesn't need to (and in fact
shouldn't) update its security state or notify downstream listeners.

Differential Revision: https://phabricator.services.mozilla.com/D8900

--HG--
extra : moz-landing-system : lando
2018-10-17 21:38:24 +00:00
Dana Keeler
c4dab46f9c bug 1497258 - remove unsound OCSP assertion from NSSCertDBTrustDomain::CheckRevocation r=mayhemer
In reimplementing the OCSP fetching code in bug 1456489, we improperly
translated an assertion that relied on the nullness of a pointer to rely on the
length of a data structure that was populated by reference. It turns out that
this made the assertion invalid because we could return a successful result and
have filled the data structure with zero-length data and it still would be valid
to operate on (the decoding code returns a malformed input result in this case).
To fix this, we can simply remove the assertion. This patch also adds a test to
exercise this case.

Differential Revision: https://phabricator.services.mozilla.com/D8883

--HG--
extra : moz-landing-system : lando
2018-10-17 19:35:28 +00:00
Paolo Amadini
3a2f47fd3f Bug 1428869 - Use html:progress in front-end code. r=bgrins,Gijs
Differential Revision: https://phabricator.services.mozilla.com/D9009

--HG--
extra : rebase_source : 0e2d20dc6060a4c0ee278ef05d67668aec12e64f
2018-10-18 15:41:21 +01:00
Johann Hofmann
a63c05f4b8 Bug 1484255 - Add Telemetry Events for the certificate error pages. r=nhnt11,keeler
Differential Revision: https://phabricator.services.mozilla.com/D8281

--HG--
extra : moz-landing-system : lando
2018-10-17 13:10:26 +00:00
Timothy Guan-tin Chien
f47a796bf6 Bug 1486954 - Part I, (Nighty-only feature) Encrypt credit card numbers with OS key store r=MattN
This patch morphs MasterPassword.jsm to OSKeyStore.jsm while keeping the same
API, as an adaptor between the API and the native API exposed as nsIOSKeyStore.idl.

Noted that OS Key Store has the concept of "recovery phrase" that we won't
be adopting here. The recovery phrase, together with our label, allow
the user to re-create the same key in OS key store.

Test case changes are needed because we have started asking for login in
places where we'll only do previously when "master password is enabled".
This also made some "when master password is enabled" tests invalid because
it is always considered enabled.

Some more test changes are needed simply because they previously rely on the
stable order of microtask resolutions (and the stable # of promises for a
specific operation). That has certainly changed with OSKeyStore.

The credit card form autofill is only enabled on Nightly.

Differential Revision: https://phabricator.services.mozilla.com/D4498

--HG--
rename : browser/extensions/formautofill/MasterPassword.jsm => browser/extensions/formautofill/OSKeyStore.jsm
rename : browser/extensions/formautofill/test/browser/browser_creditCard_fill_master_password.js => browser/extensions/formautofill/test/browser/browser_creditCard_fill_cancel_login.js
extra : moz-landing-system : lando
2018-10-17 02:31:04 +00:00
Dana Keeler
e7838236e8 bug 1498351 - add interface to allow OS-specific user re-authentication r=franziskus
This patch introduces the interface with a stub implementation that does
nothing. Follow-up bugs will add platform-specific implementations.

Differential Revision: https://phabricator.services.mozilla.com/D8480

--HG--
extra : moz-landing-system : lando
2018-10-16 16:06:30 +00:00
Ciure Andrei
673efa0461 Backed out changeset 1119f9458b5d (bug 1484255) for browser_aboutCertError_telemetry.js failures CLOSED TREE 2018-10-16 03:33:42 +03:00
Johann Hofmann
9f4cd70201 Bug 1484255 - Add Telemetry Events for the certificate error pages. r=nhnt11,keeler
Differential Revision: https://phabricator.services.mozilla.com/D8281

--HG--
extra : moz-landing-system : lando
2018-10-15 23:00:08 +00:00
Dana Keeler
b2486273b8 bug 1391207 - error pages are always not secure r=Gijs
Before this patch, if a TLS handshake completed but the server then closed the
connection without reading or writing, Firefox would display a connection reset
error page with a secure lock icon. This is misleading and confusing, so in this
patch, nsSecureBrowserUIImpl::OnLocationChange checks if an error page is being
loaded and sets the state to not secure.

Differential Revision: https://phabricator.services.mozilla.com/D8472

--HG--
extra : moz-landing-system : lando
2018-10-15 19:34:14 +00:00
ffxbld
7266b6209a No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D8712

--HG--
extra : moz-landing-system : lando
2018-10-15 12:23:43 +00:00
Paolo Amadini
5cbdb109d0 Bug 1498258 - Remove grouping from the PSM dialogs. r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D8394

--HG--
extra : source : e70c545bc0333a7b28bc2aac9f86f38b88a67c97
2018-10-11 16:09:16 +01:00
Narcis Beleuzu
d30168f45c Merge inbound to mozilla-central. a=merge 2018-10-12 00:48:03 +03:00
Dana Keeler
5af51d1085 bug 1495321 - only allow https URIs to be considered secure in nsSecureBrowserUIImpl r=Gijs
Summary:
Resources that aren't secure (e.g. http) can be routed over secure transports
(e.g. http/2 alt-svc, https proxies). For display purposes (the site identity
widget) we don't want to treat these as secure. Bug 1040323 addressed this exact
issue but didn't include tests. Thus, when nsSecureBrowserUIImpl was
reimplemented in bug 832834, this aspect was neglected. This time, there is a
test.

Reviewers: Gijs

Tags: #secure-revision

Bug #: 1495321

Differential Revision: https://phabricator.services.mozilla.com/D7746

--HG--
extra : rebase_source : e17ec47938f41a692b41a7cf65f1d5e4b880e8a7
extra : amend_source : c445c2f5c7eff94be027e238c2f2befc91b3905a
2018-10-11 10:07:49 -07:00
ffxbld
ba5c8367b3 No Bug, mozilla-central repo-update HSTS HPKP blocklist remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D8370

--HG--
extra : moz-landing-system : lando
2018-10-11 12:54:54 +00:00
Noemi Erli
a9748223c6 Merge inbound to mozilla-central. a=merge 2018-10-09 07:03:30 +03:00
ffxbld
aad29c0aa1 No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D7993

--HG--
extra : moz-landing-system : lando
2018-10-08 21:16:08 +00:00
Noemi Erli
4b6737ba40 Merge inbound to mozilla-central. a=merge 2018-10-06 12:27:35 +03:00
Gregory Mierzwinski
19ecc0e49a Bug 1496791 - Disable linux64-jsdcov completely. r=jmaher
This patch removes linux64-jsdcov from the available builds on taskcluster along with any hacks used to run it. It also removes any 'coverage' entries that were added to skip tests.

Differential Revision: https://phabricator.services.mozilla.com/D7919

--HG--
extra : moz-landing-system : lando
2018-10-05 21:06:25 +00:00
Dana Keeler
879dd8b15e bug 1496340 - make sure each nsISupports is an nsIX509Cert in nsNSSCertList::Read r=jcj
Reviewers: jcj

Tags: #secure-revision

Bug #: 1496340

Differential Revision: https://phabricator.services.mozilla.com/D7803

--HG--
extra : rebase_source : 928faeb3d071ea12dd8b3e7bc2261bb4260d793b
extra : amend_source : 458e1a7794ea73c3f709a60594e21f8cca4ac907
2018-10-04 16:30:50 -07:00
J.C. Jones
dad8ff2db4 Bug 1496467 - Enable Symantec Distrust in Firefox 64 r=keeler
The symantec distrust should now ride-the-trains in Firefox 64 Beta and Release.
Set security.pki.distrust_ca_policy to 2.

Differential Revision: https://phabricator.services.mozilla.com/D7745

--HG--
extra : moz-landing-system : lando
2018-10-04 17:48:53 +00:00
ffxbld
073a4836d6 No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D7716

--HG--
extra : moz-landing-system : lando
2018-10-04 12:48:56 +00:00
trisha
565dcd8412 Bug 1484761 - Change "security certificates" to "certificates" on the new cert error pages r=johannh
--HG--
extra : rebase_source : a48cbe38cbbaa7d5c0190af83dcc54fd37876526
2018-09-27 17:04:41 +08:00
Daniel Varga
2e77181988 Merge mozilla-central to autoland. a=merge on a CLOSED TREE
--HG--
extra : rebase_source : 62429b85fcd6af71ca898dc36c3f0f4a2c4ee5ae
2018-10-03 00:49:53 +03:00
Dana Keeler
9c05614e43 bug 1493427 - use the docShell to call OnSecurityChange in nsSecureBrowserUIImpl::OnLocationChange r=Gijs
When navigating to an about: page that doesn't exist (e.g.
"about:somethingthatdoesnotexist"), the docShell will call
nsSecureBrowserUIImpl::OnLocationChange with a request that is null.
Consequently, we can't use that to QueryInterface to a nsISecurityEventSink to
call OnSecurityChange. The previous implementation would use the prior
request's nsISecurityEventSink, which was a bug but luckily this produced the
correct behavior. Since the original docShell the nsSecureBrowserUIImpl was
initialized with is what needs to be notified, we can just QueryInterface that
to an nsISecurityEventSink and call OnSecurityChange directly instead.

Differential Revision: https://phabricator.services.mozilla.com/D6951

--HG--
rename : browser/base/content/test/siteIdentity/browser_tls_handshake_failure.js => browser/base/content/test/siteIdentity/browser_navigation_failures.js
extra : moz-landing-system : lando
2018-10-02 20:26:40 +00:00
Gurzau Raul
ede1418858 Merge mozilla-central to inbound. a=merge CLOSED TREE 2018-10-02 19:08:39 +03:00
Andrew McCreight
837f0af066 Bug 1493737 - Fix many trivial calls to do_QueryInterface r=smaug
If class A is derived from class B, then an instance of class A can be
converted to B via a static cast, so a slower QI is not needed.

Differential Revision: https://phabricator.services.mozilla.com/D6861

--HG--
extra : moz-landing-system : lando
2018-10-01 21:38:01 +00:00
Dana Keeler
1661adeb86 Bug 1493788 - convert mozilla::Vector to std::vector in certificate transparency implementation r=jcj
In order to make our certificate transparency implementation standalone, we
have to remove mozilla-specific dependencies such as mozilla::Vector.

Depends on D6844

Differential Revision: https://phabricator.services.mozilla.com/D6845

--HG--
extra : moz-landing-system : lando
2018-10-01 20:27:13 +00:00
Julien Vehent
92ca2d1e89 Bug 1494431 - Pin *.firefox.com to mozilla services whitelisted roots r=keeler,jcj
Put the entire *.firefox.com domain in the list of sites covered by the mozilla services whitelisted roots, which currently include Digicert and Let's Encrypt.

Differential Revision: https://phabricator.services.mozilla.com/D7219

--HG--
extra : moz-landing-system : lando
2018-09-28 23:37:51 +00:00
ffxbld
428aa0f16f No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D7276

--HG--
extra : moz-landing-system : lando
2018-10-01 12:34:47 +00:00
EKR
030f8b7c79 Bug 1495120 - Wire up ESNI r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D7221

--HG--
extra : source : d2edbb87f3d283ab2c2fb6f8ad3408f792a6bd27
2018-09-28 22:37:20 +00:00
arthur.iakab
f0410f8d4b Merge mozilla-central to mozilla-inbound 2018-09-29 01:00:35 +03:00
Ehsan Akhgari
5f0be07390 Bug 1493563 - Part 5: Present the old state and the content blocking log to the web progress listeners; r=baku
Differential Revision: https://phabricator.services.mozilla.com/D6595
2018-09-28 14:46:02 -04:00
Ehsan Akhgari
355485be9f Bug 1493563 - Part 4: Present the old state and the content blocking log to the security event sink; r=baku
Differential Revision: https://phabricator.services.mozilla.com/D6594
2018-09-28 14:46:02 -04:00
Noemi Erli
4419e20e14 Backed out 12 changesets (bug 1493563) for failures in test_css-logic-getCssPath.html CLOSED TREE
Backed out changeset d2e83655082f (bug 1493563)
Backed out changeset 1ce58f004593 (bug 1493563)
Backed out changeset 344298c73ee7 (bug 1493563)
Backed out changeset 02b8b073f7d7 (bug 1493563)
Backed out changeset 3ef707008502 (bug 1493563)
Backed out changeset bb2720a401fe (bug 1493563)
Backed out changeset ce0211be57a1 (bug 1493563)
Backed out changeset 83d6c2bf8dc6 (bug 1493563)
Backed out changeset 1844af4cc25b (bug 1493563)
Backed out changeset c8ab17addb7a (bug 1493563)
Backed out changeset a1ff0cd62563 (bug 1493563)
Backed out changeset 932b41e211e0 (bug 1493563)
2018-09-28 21:31:18 +03:00
Ehsan Akhgari
f0108e78c2 Bug 1493563 - Part 5: Present the old state and the content blocking log to the web progress listeners; r=baku
Differential Revision: https://phabricator.services.mozilla.com/D6595
2018-09-28 13:24:41 -04:00
Ehsan Akhgari
4895fd4963 Bug 1493563 - Part 4: Present the old state and the content blocking log to the security event sink; r=baku
Differential Revision: https://phabricator.services.mozilla.com/D6594
2018-09-28 13:24:40 -04:00
Dana Keeler
6004dbc02b bug 1492188 - avoid using the directory service off the main thread when loading loadable roots r=jcj
Differential Revision: https://phabricator.services.mozilla.com/D6692

--HG--
extra : moz-landing-system : lando
2018-09-27 22:45:56 +00:00
Coroiu Cristina
62682de0ba Backed out changeset 39762ef5d56e (bug 1493427) for frequent talos chrome failures a=backout
--HG--
rename : browser/base/content/test/siteIdentity/browser_navigation_failures.js => browser/base/content/test/siteIdentity/browser_tls_handshake_failure.js
2018-09-28 07:29:39 +03:00
Coroiu Cristina
71988c7b7e Merge inbound to mozilla-central a=merge 2018-09-28 00:36:46 +03:00
Dana Keeler
b3b9e414bc bug 1493427 - use the docShell to call OnSecurityChange in nsSecureBrowserUIImpl::OnLocationChange r=Gijs
When navigating to an about: page that doesn't exist (e.g.
"about:somethingthatdoesnotexist"), the docShell will call
nsSecureBrowserUIImpl::OnLocationChange with a request that is null.
Consequently, we can't use that to QueryInterface to a nsISecurityEventSink to
call OnSecurityChange. The previous implementation would use the prior
request's nsISecurityEventSink, which was a bug but luckily this produced the
correct behavior. Since the original docShell the nsSecureBrowserUIImpl was
initialized with is what needs to be notified, we can just QueryInterface that
to an nsISecurityEventSink and call OnSecurityChange directly instead.

Differential Revision: https://phabricator.services.mozilla.com/D6951

--HG--
rename : browser/base/content/test/siteIdentity/browser_tls_handshake_failure.js => browser/base/content/test/siteIdentity/browser_navigation_failures.js
extra : moz-landing-system : lando
2018-09-27 17:26:00 +00:00
ffxbld
dbf253a4b5 No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D7081

--HG--
extra : moz-landing-system : lando
2018-09-27 12:07:07 +00:00
Gijs Kruitbosch
76afb51661 Bug 1493655 - make nsISecureBrowserUI initialize from a docshell instead of a window, r=keeler,nika
This also removes the (afaict, unused) stub implementation from TabParent. The netwerk header
inclusions were necessary because those files included TabParent.h and through it,
nsISecureBrowserUI, but now TabParent.h no longer does that.

Differential Revision: https://phabricator.services.mozilla.com/D6829

--HG--
extra : moz-landing-system : lando
2018-09-26 17:48:38 +00:00
Mark Goodwin
41b314b255 Bug 1492414 - Modify CertBlocklist interface to a form that should work with Rust XPCom bindings r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D6260

--HG--
extra : moz-landing-system : lando
2018-09-21 13:10:40 +00:00
Andrew McCreight
de17b449c6 Bug 1494079 - Clean up some code in ShowProtectedAuthPrompt r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D6852

--HG--
extra : moz-landing-system : lando
2018-09-25 22:54:37 +00:00
ffxbld
78dd007268 No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D6652

--HG--
extra : moz-landing-system : lando
2018-09-24 12:05:01 +00:00
Dragana Damjanovic
9cadc84486 Bug 1473736 - Implement necko part of ESNI r=mak,kmag,mcmanus
--HG--
extra : rebase_source : be79870960953ef9535ccb6a440515ec4a8232d5
extra : histedit_source : 8096ab2eaf246cbbeb97bace0531b86b8c69ff66
2018-09-22 23:54:11 +03:00
Gurzau Raul
07d30b811f Backed out changeset dc225279994a (bug 1473736) for web platform leaks 2018-09-21 04:30:10 +03:00
Dana Keeler
984d5aecee bug 1492424 - check if the TLS handshake failed in nsSecureBrowserUIImpl r=Gijs
The site identity security indicator machinery treats connections where the TLS
handshake failed as insecure (also referred to as "unknown identity"). Before
bug 1468222, such cases were easily detectable as the SSLStatus field of the
relevant nsITransportSecurityInfo would be null. When we merged nsISSLStatus
into nsITransportSecurityInfo, we didn't take this differentiation into account.
This patch brings back the prior behavior by checking if the securityInfo's
securityState indicates that the handshake failed (i.e. it is
STATE_IS_INSECURE).

Differential Revision: https://phabricator.services.mozilla.com/D6316

--HG--
extra : moz-landing-system : lando
2018-09-21 00:17:47 +00:00
Dragana Damjanovic
70e0646d75 Bug 1473736 - Implement necko part of ESNI r=mak,kmag,mcmanus
Implement necko part of ESNI

Differential Revision: https://phabricator.services.mozilla.com/D2716

--HG--
extra : moz-landing-system : lando
2018-09-20 20:53:28 +00:00
Andreea Pavel
f5f6c0b588 Merge mozilla-inbound to mozilla-central. a=merge 2018-09-21 00:54:47 +03:00
Nathan Froyd
e7b3b3140d Bug 1415980 - make hash keys movable and not copyable; r=erahm
Everything that goes in a PLDHashtable (and its derivatives, like
nsTHashtable) needs to inherit from PLDHashEntryHdr. But through a lack
of enforcement, copy constructors for these derived classes didn't
explicitly invoke the copy constructor for PLDHashEntryHdr (and the
compiler didn't invoke the copy constructor for us). Instead,
PLDHashTable explicitly copied around the bits that the copy constructor
would have.

The current setup has two problems:

1) Derived classes should be using move construction, not copy
   construction, since anything that's shuffling hash table keys/entries
   around will be using move construction.

2) Derived classes should take responsibility for transferring bits of
   superclass state around, and not rely on something else to handle that.

The second point is not a huge problem for PLDHashTable (PLDHashTable
only has to copy PLDHashEntryHdr's bits in a single place), but future
hash table implementations that might move entries around more
aggressively would have to insert compensation code all over the
place. Additionally, if moving entries is implemented via memcpy (which
is quite common), PLDHashTable copying around bits *again* is
inefficient.

Let's fix all these problems in one go, by:

1) Explicitly declaring the set of constructors that PLDHashEntryHdr
   implements (and does not implement). In particular, the copy
   constructor is deleted, so any derived classes that attempt to make
   themselves copyable will be detected at compile time: the compiler
   will complain that the superclass type is not copyable.

This change on its own will result in many compiler errors, so...

2) Change any derived classes to implement move constructors instead of
   copy constructors. Note that some of these move constructors are,
   strictly speaking, unnecessary, since the relevant classes are moved
   via memcpy in nsTHashtable and its derivatives.
2018-09-20 11:20:36 -04:00
ffxbld
1263cc5298 No Bug, mozilla-central repo-update HSTS HPKP blocklist remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D6386

--HG--
extra : moz-landing-system : lando
2018-09-20 12:47:19 +00:00
Bogdan Tara
86023d88c4 Merge inbound to mozilla-central. a=merge 2018-09-20 07:13:05 +03:00
Bogdan Tara
9f17cab93a Merge mozilla-central to autoland. a=merge CLOSED TREE 2018-09-20 01:03:35 +03:00
Dana Keeler
d13840ed4c bug 1490982 - filter out OnLocationChange events that aren't top-level in nsSecureBrowserUIImpl r=Gijs
Differential Revision: https://phabricator.services.mozilla.com/D5920

--HG--
extra : moz-landing-system : lando
2018-09-19 19:57:37 +00:00
Noemi Erli
efdd6a208a Backed out changeset 7aa742bff8fb (bug 1473736) for xpcshell failures and bc failures in browser_urlbarSearchSingleWordNotification.js 2018-09-18 22:07:58 +03:00
Dragana Damjanovic
f000a5b4b0 Bug 1473736 - Implement necko part of ESNI r=mcmanus
Implement necko part of ESNI

Differential Revision: https://phabricator.services.mozilla.com/D2716

--HG--
extra : moz-landing-system : lando
2018-09-17 23:08:14 +00:00
Dana Keeler
0f23e1458f bug 1488593 - move family safety root detection to background thread r=dipen,jcj
A previous patch in this bug made the incorrect assumption that we had disabled
the family safety root detection/importing feature by default. In reality, we
enabled it by default in bug 1282871.

In bug 1487258 we moved enterprise root loading to a background thread so as to
not block the main thread. This patch does the same with the family safety
feature.

Differential Revision: https://phabricator.services.mozilla.com/D5484

--HG--
extra : moz-landing-system : lando
2018-09-17 15:38:43 +00:00
Boris Zbarsky
891631d98c Bug 1494524. Stop using the same function for both webidl and xpidl selectionChanged on treeviews. r=mccr8 2018-09-27 13:46:25 -04:00
Jonathan Kingston
2ce3b8373f Bug 1485305 - misc Ensure loadURI always passes a triggeringPrincipal() r=Gijs
Differential Revision: https://phabricator.services.mozilla.com/D4560

--HG--
extra : source : 3e184da8273decac0f3e7d88be89125a2a027588
extra : intermediate-source : ddea69395fbca528529f4491bc8ea7c701ff45b4
2018-08-29 15:48:52 +01:00
Brindusan Cristian
1db0587c0e Backed out 10 changesets (bug 1485305) for browser-chrome failures on docshell/test/browser/browser_loadURI.js. CLOSED TREE
Backed out changeset 50439ec01661 (bug 1485305)
Backed out changeset a05e40ef7215 (bug 1485305)
Backed out changeset c99b97b4348b (bug 1485305)
Backed out changeset 75220b2f6669 (bug 1485305)
Backed out changeset e698f2fc1c1a (bug 1485305)
Backed out changeset acce14683c13 (bug 1485305)
Backed out changeset 323773a395cc (bug 1485305)
Backed out changeset 1b74152cabc1 (bug 1485305)
Backed out changeset 4b5c9d5929fc (bug 1485305)
Backed out changeset 238d92348159 (bug 1485305)
2018-09-19 18:47:27 +03:00
Jonathan Kingston
c161024465 Bug 1485305 - misc Ensure loadURI always passes a triggeringPrincipal() r=Gijs
Differential Revision: https://phabricator.services.mozilla.com/D4560

--HG--
extra : source : 5a82993174e363a1e06cd35fcec98fddd6250d64
2018-08-29 15:48:52 +01:00
ffxbld
8c2208f569 No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D6021

--HG--
extra : moz-landing-system : lando
2018-09-17 13:15:55 +00:00
Ehsan Akhgari
fa81a39327 Bug 1491558 - Remove the XPCOM registration for nsThreadPool; r=froydnj
Differential Revision: https://phabricator.services.mozilla.com/D5943
2018-09-15 12:13:57 -04:00
Dana Keeler
364a010e05 bug 748809 - remove nsIAssociatedContentSecurity and nsISecurityInfoProvider r=mayhemer,jrmuizel
nsIAssociatedContentSecurity and nsISecurityInfoProvider are unused as of
bug 832834, so this patch removes them.

Differential Revision: https://phabricator.services.mozilla.com/D5693

--HG--
extra : moz-landing-system : lando
2018-09-13 17:13:43 +00:00
ffxbld
1bd8340b0a No Bug, mozilla-central repo-update HSTS HPKP blocklist remote-settings - a=repo-update r=mtabara
Differential Revision: https://phabricator.services.mozilla.com/D5758

--HG--
extra : moz-landing-system : lando
2018-09-13 12:14:37 +00:00
Dana Keeler
fae63f9b28 Bug 1487228 - (2/2) avoid holding CERTCertList instances long-term in nsNSSCertList r=jcj
Each instance of CERTCertList creates a PLArena with a chunk size of 2048 bytes,
but only needs space for 3 pointers per certificate in the list. The majority of
the time Gecko uses CERTCertList, we'll store ~3 certificates (although in some
cases we do store a few hundred, such as in tests or the certificate manager).
This is fairly inefficient. This patch starts the process of avoiding using
CERTCertList in Gecko by converting nsNSSCertList (i.e. nsIX509CertList) (as
well as nsNSSCertListEnumerator) to use a more efficient data structure to hold
references to certificates long-term. Future follow-up patches could (and
should) update certificate verification APIs in PSM to avoid CERTCertList as
well.

Depends on D5096

Differential Revision: https://phabricator.services.mozilla.com/D5097

--HG--
extra : moz-landing-system : lando
2018-09-12 18:14:03 +00:00
Dana Keeler
8f21632c33 Bug 1487228 - (1/2) remove nsIX509CertList.getRawCertList r=jcj
nsIX509CertList.getRawCertList is only used once and doesn't provide
particularly unique functionality (its one use can easily be re-worked in terms
of other APIs). Removing this API will ease refactoring work to avoid holding
long-lived references to CERTCertList instances in nsNSSCertList.

Differential Revision: https://phabricator.services.mozilla.com/D5096

--HG--
extra : moz-landing-system : lando
2018-09-12 17:54:45 +00:00
Bogdan Tara
a23c3959b6 Merge inbound to mozilla-central. a=merge 2018-09-12 06:22:14 +03:00