Commit Graph

13315 Commits

Author SHA1 Message Date
Cosmin Sabou
66b7c55e79 Merge mozilla-central to inbound. a=merge CLOSED TREE 2018-03-21 00:51:18 +02:00
Cosmin Sabou
52c9a5448e Merge inbound to mozilla-central. a=merge 2018-03-21 00:24:33 +02:00
Cosmin Sabou
0457be96b5 Merge autoland to mozilla-central. a=merge 2018-03-21 00:23:17 +02:00
ffxbld
5fe3417f0b No bug, Automated HPKP preload list update from host bld-linux64-spot-301 - a=hpkp-update 2018-03-20 13:10:29 -07:00
ffxbld
ff82f5097d No bug, Automated HSTS preload list update from host bld-linux64-spot-301 - a=hsts-update 2018-03-20 13:10:25 -07:00
J.C. Jones
7780b45b3a Bug 1445731 - land NSS c5dffd6269ea UPGRADE_NSS_RELEASE, r=me
--HG--
extra : rebase_source : a740ebebda8a9894cfebcff25d21a9430c478f96
2018-03-20 10:17:35 -07:00
J.C. Jones
175c45e2dc Bug 1444440 - Ensure the correct error is emitted for policy distrusts r=keeler
Bug 1441223 added MOZILLA_PKIX_ERROR_ADDITIONAL_POLICY_CONSTRAINT_FAILED to be
emitted when we hit certificates affected by the Symantec distrust.

Since some sites have multiple certificate trust paths possible, sometimes
SEC_ERROR_UNKNOWN_ISSUER is emitted instead of the more specific error.

This patch uses a flag to ensure that the specific error is emitted out of the
Cert Verifier.

--HG--
extra : rebase_source : a961d2e713ae342222d85dff6f83ed3bcaa8006b
2018-03-14 14:01:35 -07:00
Margareta Eliza Balazs
922c555275 Merge mozilla-central to autoland. a=merge CLOSED TREE 2018-03-20 19:00:25 +02:00
David Keeler
bade5ee518 bug 1439383 - clean up the load loadable roots thread when we're done with it r=froydnj,jcj
MozReview-Commit-ID: J5GnpwxYguz

--HG--
extra : rebase_source : 14abdefbbee91b13ae26104d093e6fba20432c05
2018-03-16 16:50:19 -07:00
Bob Owen
cf86e40aa1 Bug 1445167 Part 2: Make LOG_FATAL messages in chromium sandbox code crash. r=jld 2018-03-20 10:45:31 +00:00
Bob Owen
af1e9f58c5 Bug 1445167 Part 1: Revert change to make USER_NON_ADMIN a blacklist. r=handyman
This is only used by default in the file content process now and we also have a
FILES_ALLOW_READONLY rule for all paths anyway.
2018-03-20 10:42:05 +00:00
ffxbld
19da7222e8 No bug, Automated HPKP preload list update from host bld-linux64-spot-326 - a=hpkp-update 2018-03-19 13:10:23 -07:00
ffxbld
43d9f7b3ef No bug, Automated HSTS preload list update from host bld-linux64-spot-326 - a=hsts-update 2018-03-19 13:10:19 -07:00
ffxbld
7f196c986b No bug, Automated HPKP preload list update from host bld-linux64-spot-307 - a=hpkp-update 2018-03-17 13:08:00 -07:00
ffxbld
36c23ec671 No bug, Automated HSTS preload list update from host bld-linux64-spot-307 - a=hsts-update 2018-03-17 13:07:56 -07:00
ffxbld
fed3513bca No bug, Automated HPKP preload list update from host bld-linux64-spot-302 - a=hpkp-update 2018-03-16 12:56:58 -07:00
ffxbld
b97ded4fa8 No bug, Automated HSTS preload list update from host bld-linux64-spot-302 - a=hsts-update 2018-03-16 12:56:54 -07:00
Sylvestre Ledru
fa45a3c670 Bug 1443080 - Use the static call for static methods (not instance) r=Ehsan
MozReview-Commit-ID: JwHh4bzxuTR

--HG--
extra : rebase_source : 5f5e37517aa80c2e7b5933962178d761074886e7
2018-03-16 14:29:15 +01:00
Haik Aftandilian
331dda9367 Bug 1444291 - Part 3 - Add read access to the Mac Flash sandbox, support sandbox levels r=Alex_Gaynor
Replace the boolean pref "security.sandbox.mac.flash.enabled"
with "dom.ipc.plugins.sandbox-level.flash" to support sandbox
levels and be consistent with the Windows pref name.

Adds filesystem read access to the sandbox using sandbox extensions
granted by the file dialog machinery (level 1).

Add support for level 2 which blocks read access.

Allow the sandbox to be disabled with MOZ_DISABLE_NPAPI_SANDBOX.


MozReview-Commit-ID: 4rfobEoxQpF

--HG--
extra : rebase_source : 05dc54b46063967e959bc3fced21c61e5463de48
2018-03-15 20:23:19 -07:00
Haik Aftandilian
b8c5b2eae6 Bug 1444291 - Part 2 - Add additional sysctl access to the Mac Flash sandbox r=Alex_Gaynor
Adds additional sysctls that are used by the Flash plugin process and alphabetize the list.

MozReview-Commit-ID: 7CaPtaKe874

--HG--
extra : rebase_source : 909228ef9617029eaf7cb16565751150cd1c7404
2018-03-07 22:07:27 -08:00
Haik Aftandilian
09693ee75d Bug 1444291 - Part 1 - Reduce Mac Flash sandbox cache and temp dir permissions r=Alex_Gaynor
Remove access to DARWIN_USER_CACHE_DIR. Limit DARWIN_USER_TEMP_DIR
access to the FlashTmp subdirectory. Remove xattr read access to
~/Library/Caches/ and ~/Library/Preferences.

MozReview-Commit-ID: 9svk0BoxVXs

--HG--
extra : rebase_source : 5ea9c7ecc0189455eceb190fb300170d42d0b890
2018-03-15 17:33:12 -07:00
Sebastian Hengst
d247fb5f4e Bug 1445763 - Update moz.build meta data with "Firefox Build System". r=froydnj
MozReview-Commit-ID: 3FrWJ6441pe

--HG--
extra : rebase_source : c8f1dc45041132252e28869ada6a386270267431
2018-03-14 21:44:46 +01:00
Coroiu Cristina
62bb56ad86 Backed out 3 changesets (bug 1444291) for bustage at build/src/dom/plugins/ipc/PluginProcessChild.cpp
Backed out changeset 48a9c2131347 (bug 1444291)
Backed out changeset dfc31b6c9f53 (bug 1444291)
Backed out changeset 8ee3e65465ed (bug 1444291)
2018-03-16 03:07:35 +02:00
Haik Aftandilian
3aaa8d9f78 Bug 1444291 - Part 3 - Add read access to the Mac Flash sandbox, support sandbox levels r=Alex_Gaynor
Replace the boolean pref "security.sandbox.mac.flash.enabled"
with "dom.ipc.plugins.sandbox-level.flash" to support sandbox
levels and be consistent with the Windows pref name.

Adds filesystem read access to the sandbox using sandbox extensions
granted by the file dialog machinery (level 1).

Add support for level 2 which blocks read access.

Allow the sandbox to be disabled with MOZ_DISABLE_NPAPI_SANDBOX.


MozReview-Commit-ID: 4rfobEoxQpF

--HG--
extra : rebase_source : 87f2f00867c4522ae3102abbc44fd05db63c7ec7
2018-03-13 15:38:11 -07:00
Haik Aftandilian
d1fbc6bb50 Bug 1444291 - Part 2 - Add additional sysctl access to the Mac Flash sandbox r=Alex_Gaynor
Adds additional sysctls that are used by the Flash plugin process and alphabetize the list.

MozReview-Commit-ID: 7CaPtaKe874

--HG--
extra : rebase_source : 078697987ac7fec77c75953035b924422fc93066
2018-03-07 22:07:27 -08:00
Haik Aftandilian
018807a65d Bug 1444291 - Part 1 - Reduce Mac Flash sandbox cache and temp dir permissions r=Alex_Gaynor
Remove access to DARWIN_USER_CACHE_DIR. Limit DARWIN_USER_TEMP_DIR
access to the FlashTmp subdirectory. Remove xattr read access to
~/Library/Caches/ and ~/Library/Preferences.

MozReview-Commit-ID: 9svk0BoxVXs

--HG--
extra : rebase_source : 669c4fa446c9cab6b32cf60091e91eae2d08625f
2018-03-15 17:33:12 -07:00
Coroiu Cristina
51fd916771 Merge mozilla-central to autoland a=merge on a CLOSED TREE 2018-03-16 01:43:13 +02:00
J.C. Jones
7c82a66a30 Bug 1445731 - land NSS f0d4789c8916 UPGRADE_NSS_RELEASE, r=me
--HG--
extra : rebase_source : e5f6d2e5e607bc624847e5b95904be2901832368
2018-03-15 09:00:48 -07:00
David Keeler
c4fc9f6fe3 bug 1444943 - set NSS_SDB_USE_CACHE to yes if the profile is on an nfs mount r=jcj
MozReview-Commit-ID: 44DxZxmlSlG

--HG--
extra : rebase_source : 46c5860085730c828efd709132ba0e5860762bb5
2018-03-13 13:34:17 -07:00
Andreea Pavel
46575fad3b Merge mozilla-central to autoland. a=merge on a CLOSED TREE 2018-03-15 00:10:23 +02:00
Bob Owen
f2f76a9b94 Bug 1445614: Only warn when SetAlternateDesktop fails. r=jimm 2018-03-14 18:39:36 +00:00
Gurzau Raul
f785df755d Merge mozilla-central to inbound. a=merge CLOSED TREE 2018-03-14 00:44:06 +02:00
Boris Zbarsky
3857fba2a3 Bug 1444686 part 9. Remove use of nsIDOMDataTransfer from nsITreeView. r=mystor
MozReview-Commit-ID: Dpn7YSZpDsc
2018-03-13 16:24:00 -04:00
ffxbld
b5dd183a38 No bug, Automated HPKP preload list update from host bld-linux64-spot-304 - a=hpkp-update 2018-03-13 13:05:28 -07:00
ffxbld
b49fb0c95f No bug, Automated HSTS preload list update from host bld-linux64-spot-304 - a=hsts-update 2018-03-13 13:05:24 -07:00
Andreea Pavel
8fa0b32c84 Merge mozilla-inbound to mozilla-cenral. a=merge 2018-03-13 19:01:32 +02:00
Narcis Beleuzu
298d1d55b5 Merge mozilla-central to inbound. a=merge CLOSED TREE 2018-03-13 12:36:54 +02:00
Gian-Carlo Pascutto
4fb9bf8576 Bug 1416016 - Resolve symlinks in the file broker as a last resort. r=jld
MozReview-Commit-ID: B7OMyARk9u8

--HG--
extra : rebase_source : 1106c8f877f748a2ef7e6af3b8e6965a3cf67e33
2018-03-09 21:14:39 +01:00
Jed Davis
0b5eeab7a5 Bug 1445003 - Detect RenderDoc and adjust the sandbox policy so it can work. r=gcp
RenderDoc, a graphics debugging tool, uses a preload library that
creates a listening socket (Internet-domain) early in startup and
accepts connections from the frontend.  If it's detected (via env vars),
we allow accept/accept4 (but not socket/bind/listen), and remain in
the parent process's network namespace so that other processes can
connect to the socket.

This doesn't change the sandbox policy if not running under RenderDoc.

MozReview-Commit-ID: 964RW4BFh4u

--HG--
extra : rebase_source : d4a954e68431d84fa2e0edea4171421a948794af
2018-03-12 20:21:08 -06:00
Noemi Erli
ac0a30f58c Merge mozilla-central to autoland. a=merge CLOSED TREE 2018-03-13 01:16:04 +02:00
Margareta Eliza Balazs
d6d1b8a6a5 Merge inbound to mozilla-central. a=merge 2018-03-13 01:10:10 +02:00
ffxbld
1373cc1dac No bug, Automated HPKP preload list update from host bld-linux64-spot-302 - a=hpkp-update 2018-03-12 12:54:30 -07:00
ffxbld
34f58199be No bug, Automated HSTS preload list update from host bld-linux64-spot-302 - a=hsts-update 2018-03-12 12:54:26 -07:00
ffxbld
426a7d1158 No bug, Automated HPKP preload list update from host bld-linux64-spot-302 - a=hpkp-update 2018-03-11 13:00:15 -07:00
ffxbld
1c871585db No bug, Automated HSTS preload list update from host bld-linux64-spot-302 - a=hsts-update 2018-03-11 13:00:11 -07:00
ffxbld
a815a036e1 No bug, Automated HPKP preload list update from host bld-linux64-spot-302 - a=hpkp-update 2018-03-10 12:28:53 -08:00
ffxbld
88badf8d2f No bug, Automated HSTS preload list update from host bld-linux64-spot-302 - a=hsts-update 2018-03-10 12:28:49 -08:00
Noemi Erli
40b1baaab5 Merge inbound to mozilla-central. a=merge 2018-03-10 11:58:34 +02:00
Jed Davis
6c8bcd4625 Bug 1440206 - Allow brokered access to a subset of connect() in the Linux content sandbox. r=gcp
This is to support WebGL with hybrid graphics drivers that connect to
a secondary X server for GL (Primus and VirtualGL), without allowing
access to arbitrary sockets.  In addition to local X11 connections,
Primus needs to connect to the Bumblebee daemon (otherwise it will exit
the calling process).

The broker support is limited to AF_UNIX, to non-datagram sockets (see
bug 1066750), and to pathname addresses.  Abstract addresses could
theoretically be handled but there isn't currently a compelling reason
to, and the broker very much assumes it's dealing with a C-style string
referring to a filesystem path and not an arbitrary byte sequence
(including NULs).

At a higher level: If the GPU X server is remote then it won't work,
but it won't work anyway because WebGL requires features that aren't
supported by indirect GLX.  If the GPU X server is local but the browser
is inside a chroot, it will fail to connect unless /tmp/.X11-unix is
bind-mounted into the chroot; hopefully this use case is not common.

MozReview-Commit-ID: IvI2jYDRZZ2
2018-03-09 19:31:23 -07:00
ffxbld
1ab76f70a0 No bug, Automated HPKP preload list update from host bld-linux64-spot-302 - a=hpkp-update 2018-03-09 12:00:09 -08:00