gecko-dev/security/sandbox
Bob Owen f5aab0f5cb Bug 1625508: Use SetLockdownDefaultDacl for the socket process. r=handyman
Add rule to allow content processes to duplicate named pipes to other child
processes. This is why SetLockdownDefaultDacl wasn't working before because it
broke the local handle duplication.
This also reverts the change that was using USER_LIMITED from the start of the
process because that breaks DLL loading when installed somewhere that relies on
the user's own SID for access.

Differential Revision: https://phabricator.services.mozilla.com/D68850

--HG--
extra : moz-landing-system : lando
2020-03-30 18:05:08 +00:00
..
chromium Bug 1557282 Part 1: Take chromium commit c1ce57ea5d31208af589b4839390a44ab20b0c8f. r=handyman,gcp 2020-03-12 20:39:40 +00:00
chromium-shim Bug 1615401 - Part 2: Keep Chromium's file_version_info_win.cpp updated r=bobowen 2020-03-06 22:24:01 +02:00
common Bug 1613985 - Use default for equivalent-to-default constructors/destructors in security. r=rrelyea 2020-03-16 10:56:56 +00:00
linux Bug 1622728 - Allow file seals in content process sandbox policy, for Wayland. r=gcp 2020-03-30 16:14:17 +00:00
mac Bug 1614983 - Create a new sandbox profile for the socket process r=spohl 2020-03-11 22:20:13 +00:00
test Bug 1620542 - Automatically fix ESLint errors in .eslintrc.js files. r=mossop 2020-03-07 10:09:44 +00:00
win Bug 1625508: Use SetLockdownDefaultDacl for the socket process. r=handyman 2020-03-30 18:05:08 +00:00
moz.build Bug 1615401 - Part 1: Partially implement FileVersionInfoWin to use from OSInfo::Kernel32BaseVersion(). r=bobowen 2020-03-06 18:51:54 +02:00