Граф коммитов

13711 Коммитов

Автор SHA1 Сообщение Дата
Bogdan Tara 7ebba39407 Merge mozilla-central to autoland. a=merge CLOSED TREE 2018-09-18 01:02:05 +03:00
Dana Keeler 0f23e1458f bug 1488593 - move family safety root detection to background thread r=dipen,jcj
A previous patch in this bug made the incorrect assumption that we had disabled
the family safety root detection/importing feature by default. In reality, we
enabled it by default in bug 1282871.

In bug 1487258 we moved enterprise root loading to a background thread so as to
not block the main thread. This patch does the same with the family safety
feature.

Differential Revision: https://phabricator.services.mozilla.com/D5484

--HG--
extra : moz-landing-system : lando
2018-09-17 15:38:43 +00:00
Jed Davis 2fcf5c7252 Bug 1489735 - Quietly deny sched_setaffinity in content process sandbox r=gcp
Differential Revision: https://phabricator.services.mozilla.com/D5908

--HG--
extra : moz-landing-system : lando
2018-09-17 16:43:52 +00:00
Gurzau Raul c03510c273 Merge mozilla-central to inbound. a=merge CLOSED TREE 2018-09-17 19:48:54 +03:00
Masatoshi Kimura cddaaa8ed5 Bug 1491849 - Disable C5045 only if optimization is disabled. r=dmajor
I also changed security/certverifier/moz.build a bit while I am here:
* Using '-Xclang' to pass through '-Wall' on clang-cl.
* Now clang-cl will take clang/gcc path because most '-wd****' options have no
  effect on clang-cl. '-wd4010' will have an effect, but we already have the
  corresponding clang/gcc option ('-Wno-unused-parameter').

--HG--
extra : source : df566a1bd9087cc0bfc03fe19fd9d21bf58f5d9c
2018-09-15 21:20:32 +09:00
ffxbld 8c2208f569 No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D6021

--HG--
extra : moz-landing-system : lando
2018-09-17 13:15:55 +00:00
Ehsan Akhgari fa81a39327 Bug 1491558 - Remove the XPCOM registration for nsThreadPool; r=froydnj
Differential Revision: https://phabricator.services.mozilla.com/D5943
2018-09-15 12:13:57 -04:00
Dana Keeler 364a010e05 bug 748809 - remove nsIAssociatedContentSecurity and nsISecurityInfoProvider r=mayhemer,jrmuizel
nsIAssociatedContentSecurity and nsISecurityInfoProvider are unused as of
bug 832834, so this patch removes them.

Differential Revision: https://phabricator.services.mozilla.com/D5693

--HG--
extra : moz-landing-system : lando
2018-09-13 17:13:43 +00:00
ffxbld 1bd8340b0a No Bug, mozilla-central repo-update HSTS HPKP blocklist remote-settings - a=repo-update r=mtabara
Differential Revision: https://phabricator.services.mozilla.com/D5758

--HG--
extra : moz-landing-system : lando
2018-09-13 12:14:37 +00:00
Dana Keeler fae63f9b28 Bug 1487228 - (2/2) avoid holding CERTCertList instances long-term in nsNSSCertList r=jcj
Each instance of CERTCertList creates a PLArena with a chunk size of 2048 bytes,
but only needs space for 3 pointers per certificate in the list. The majority of
the time Gecko uses CERTCertList, we'll store ~3 certificates (although in some
cases we do store a few hundred, such as in tests or the certificate manager).
This is fairly inefficient. This patch starts the process of avoiding using
CERTCertList in Gecko by converting nsNSSCertList (i.e. nsIX509CertList) (as
well as nsNSSCertListEnumerator) to use a more efficient data structure to hold
references to certificates long-term. Future follow-up patches could (and
should) update certificate verification APIs in PSM to avoid CERTCertList as
well.

Depends on D5096

Differential Revision: https://phabricator.services.mozilla.com/D5097

--HG--
extra : moz-landing-system : lando
2018-09-12 18:14:03 +00:00
Dana Keeler 8f21632c33 Bug 1487228 - (1/2) remove nsIX509CertList.getRawCertList r=jcj
nsIX509CertList.getRawCertList is only used once and doesn't provide
particularly unique functionality (its one use can easily be re-worked in terms
of other APIs). Removing this API will ease refactoring work to avoid holding
long-lived references to CERTCertList instances in nsNSSCertList.

Differential Revision: https://phabricator.services.mozilla.com/D5096

--HG--
extra : moz-landing-system : lando
2018-09-12 17:54:45 +00:00
Bogdan Tara a23c3959b6 Merge inbound to mozilla-central. a=merge 2018-09-12 06:22:14 +03:00
Martin Thomson d1614a402d Bug 1487279 - Pref to control TLS downgrade check, r=keeler
Background here is that we are disabling a piece of the downgrade protection in TLS 1.3 and we want to turn it on.  We don't know if that is safe, so a pref (and an associated experiment) seems prudent.  This is that pref.

Differential Revision: https://phabricator.services.mozilla.com/D4629

--HG--
extra : moz-landing-system : lando
2018-09-11 18:01:50 +00:00
Ted Mielczarek d59bc31677 Bug 1399877 - globally define MOZ_DLL_PREFIX/MOZ_DLL_SUFFIX; r=gps
Several source files use DLL_PREFIX/DLL_SUFFIX defines, and they all set
them in moz.build using `DEFINES`.  This is problematic for the WSL
build because the quoting gets lost somewhere between bash and cl.exe.
We cannot simply set them globally in moz.configure because their
stringified definitions would conflict with the `set_config` of
DLL_PREFIX/DLL_SUFFIX.  Therefore, we globally define
MOZ_DLL_PREFIX/MOZ_DLL_SUFFIX and change all define-related uses of
DLL_PREFIX/DLL_SUFFIX to use their MOZ-equivalents instead.
2018-09-11 13:31:20 -04:00
Cosmin Sabou de7676288a Merge mozilla-inbound to mozilla-central. a=merge 2018-09-11 13:06:37 +03:00
Dipen Patel aeed887ff8 Bug 1468222 Consolidate nsISSLStatus info nsITransportSecurityInfo r=Gijs,snorp,jcj,mcmanus,sfraser,keeler,baku,ato
Move all fields of nsISSLStatus to nsITransportSecurityProvider
Remove nsISSLStatus interface and definition
Update all code and test references to nsISSLStatus
Maintain ability to read in older version of serialized nsISSLStatus.  This
is verified with psm_DeserializeCert gtest.

Differential Revision: https://phabricator.services.mozilla.com/D3704

--HG--
extra : moz-landing-system : lando
2018-09-11 00:07:30 +00:00
ffxbld 61242498b1 No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D5411

--HG--
extra : moz-landing-system : lando
2018-09-10 12:53:41 +00:00
Daniel Varga 1539df295b Merge mozilla-inbound to mozilla-central a=merge 2018-09-08 06:53:43 +03:00
Csoregi Natalia 0400fe7b57 Backed out changeset bd8baf88f373 (bug 1468222) for test_security-info-parser.js failures. CLOSED TREE 2018-09-08 03:16:25 +03:00
Dipen Patel 0679e09a9a Bug 1468222 Consolidate nsISSLStatus info nsITransportSecurityInfo r=snorp,ato,sfraser,keeler,baku,mcmanus,Gijs
Move all fields of nsISSLStatus to nsITransportSecurityProvider
Remove nsISSLStatus interface and definition
Update all code and test references to nsISSLStatus
Maintain ability to read in older version of serialized nsISSLStatus.  This
is verified with psm_DeserializeCert gtest.

Differential Revision: https://phabricator.services.mozilla.com/D3704

--HG--
extra : moz-landing-system : lando
2018-09-07 22:50:17 +00:00
Mike Hommey 32627430f6 Bug 1489363 - Replace some string.Append* with AppendLiteral. r=froydnj
Depends on D5224

Differential Revision: https://phabricator.services.mozilla.com/D5225

--HG--
extra : moz-landing-system : lando
2018-09-07 22:12:04 +00:00
Bogdan Tara 30c8b1bee3 Merge mozilla-central to mozilla-inbound. a=merge CLOSED TREE 2018-09-07 00:59:25 +03:00
ffxbld d5e21d1dc3 No Bug, mozilla-central repo-update HSTS HPKP blocklist remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D5141

--HG--
extra : moz-landing-system : lando
2018-09-06 12:40:37 +00:00
Dana Keeler 36505cb883 bug 1488593 - disable family safety detection by default r=jcj
As of bug 1346297, we don't collect telemetry for the family safety root
feature. At this point, it makes the most sense to disable the entire feature by
default.

Differential Revision: https://phabricator.services.mozilla.com/D4994

--HG--
extra : moz-landing-system : lando
2018-09-05 23:58:21 +00:00
Tiberius Oros a325c6ef11 Merge mozilla-central to autoland. a=merge CLOSED TREE 2018-09-06 01:27:49 +03:00
Andreea Pavel 36c5e5b56a Backed out changeset df1f14eb13ef (bug 1488593) for build bustages on a CLOSED TREE 2018-09-06 01:17:56 +03:00
Dana Keeler 8f28b1fc59 bug 1488593 - disable family safety detection by default r=jcj
As of bug 1346297, we don't collect telemetry for the family safety root
feature. At this point, it makes the most sense to disable the entire feature by
default.

Differential Revision: https://phabricator.services.mozilla.com/D4994

--HG--
extra : moz-landing-system : lando
2018-09-05 20:05:11 +00:00
Dana Keeler 3c7bb27e9f bug 1487258 - load enterprise roots on a background at startup r=jcj
Loading enterprise roots could potentially take a while, so we certainly
shouldn't do it on the main thread at startup. Note that this doesn't address
the case where a user enables the feature while Firefox is running. This isn't
great but since it's an about:config preference rather than a first-class
preference exposed in about:preferences, we can probably get away with it for
now.

Differential Revision: https://phabricator.services.mozilla.com/D4708

--HG--
extra : moz-landing-system : lando
2018-09-05 17:15:53 +00:00
J.C. Jones 3def42e421 Bug 1488622 - land NSS 229a3a57f42a UPGRADE_NSS_RELEASE, r=me
--HG--
extra : rebase_source : 4f7f3eaabf04e02d91d483158c9220929a316da6
2018-09-05 08:20:33 -07:00
Dana Keeler 8b93bfbb06 bug 832834 - reimplement nsSecureBrowserUIImpl r=franziskus,Felipe
It turns out nsSecureBrowserUIImpl is considerably more complicated than it
needs to be. This patch reimplements it in terms of OnLocationChange only, which
is all it needs to produce the same behavior as before.

Differential Revision: https://phabricator.services.mozilla.com/D3548

--HG--
extra : moz-landing-system : lando
2018-09-05 17:12:36 +00:00
Ehsan Akhgari 8ee774da84 Bug 1487396 - Part 1: Enable the secure browser UI object to keep track of the newly added content blocking states for each document; r=baku
Differential Revision: https://phabricator.services.mozilla.com/D4809
2018-09-04 14:20:22 -04:00
shindli fd77c051cb Backed out changeset 99e8a7cd7726 (bug 1484761) as requested by the developer on IRC on a CLOSED TREE 2018-09-04 09:09:49 +03:00
Daniel Varga f46d581d52 Merge mozilla-inbound to mozilla-central. a=merge 2018-09-04 00:54:07 +03:00
ffxbld 9e951cf226 No Bug, mozilla-central repo-update HSTS HPKP blocklist remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D4852

--HG--
extra : moz-landing-system : lando
2018-09-03 13:16:32 +00:00
trisha 88400e06ef Bug 1484761 - Change "security certificates" to "certificates" on the new cert error pages r=johannh 2018-08-31 19:12:02 +05:30
Kai Engert 05d5185f12 Bug 1470914, NSS_3_39_RTM, no code changes, only version number, r=me
UPGRADE_NSS_RELEASE
DONTBUILD
2018-08-31 15:41:00 +02:00
Dave Townsend e63bb1c465 Bug 1487246: Enable the eslint no-sequences rule. r=Standard8
Differential Revision: https://phabricator.services.mozilla.com/D4681

--HG--
extra : rebase_source : ae253571d7d47c4a113a98a8b7c29bf712a0d764
2018-08-29 16:15:33 -07:00
J.C. Jones 0f1a889215 Bug 1488622 - cleanup incorrectly-landed .orig files UPGRADE_NSS_RELEASE, r=me
--HG--
extra : rebase_source : 900e72219bf53a84f136f482a25fefd280a6b13b
2018-09-07 11:49:21 -07:00
Dana Keeler 1d12fc8a92 bug 1487517 - un-do ciphersuite hiding from bug 1279479 and bug 1316300 r=mt
In bug 1279479 and bug 1316300 we hid some ciphersuites from TLS 1.3
handshakes, assuming we would fall back to TLS 1.2 if the peer needed them.
However, as of bug 1479501, we don't fall back by default, so this just means
we can't negotiate these ciphersuites. This patch un-hides these ciphersuites
from the TLS 1.3 handshake.

Differential Revision: https://phabricator.services.mozilla.com/D4725

--HG--
extra : moz-landing-system : lando
2018-08-31 00:18:36 +00:00
J.C. Jones f27f0bf4d1 Bug 1486838 - Enable EV treatment for Symantec/DigiCert cross signatures r=keeler
There is a late-breaking EV compatibility concern with cross signatures for EV
certificates:

Firefox's EV handling code always validates EV using the first EV policy OID
expressed in a certificate. For compatibility certificates issued under a cross-
signed root, if the first EV policy OID matches the original Symantec EV policy
OID, then Firefox will attempt to verify that the root CA matches the original
Symantec EV CA -- which it won't, as the root will be one of DigiCert's. Without
a patch, EV treatment will break.

This patch removes all EV policy OIDs for roots mentioned in TrustOverride-
SymantecData.inc, letting the moz::pkix algorithm pick other EV policy OIDs to
validate. I verified that I removed all affected OIDs using the BASH shell
commands:

$ cd security/certverifier
$ grep "CN=" TrustOverride-SymantecData.inc | sed -e 's/.*\(CN=.*\).*/\1/' |
  sort | uniq | while read r; do
    echo $r; grep "$r" ExtendedValidation.cpp;
  done

Reviewers should help me ensure that I did not remove any unexpected EV policy
OIDs.

Differential Revision: https://phabricator.services.mozilla.com/D4709

--HG--
extra : moz-landing-system : lando
2018-08-30 18:29:39 +00:00
Henri Sivonen 580f807a65 Bug 1487310 - Let XPCOM strings manage their own buffer in LossyUTF8ToUTF16(). r=keeler
This does not change the outward behavior of LossyUTF8ToUTF16(). Both
ToNewUnicode() and CopyASCIItoUTF16() convert from Latin1 to UTF-16.

MozReview-Commit-ID: 8SDgvoGaN4A

Differential Revision: https://phabricator.services.mozilla.com/D4639

--HG--
extra : moz-landing-system : lando
2018-08-30 17:29:51 +00:00
ffxbld 055f6b25a3 No Bug, mozilla-central repo-update HSTS HPKP blocklist remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D4660

--HG--
extra : moz-landing-system : lando
2018-08-30 12:53:09 +00:00
Alexander Surkov b27e40d606 Bug 1486674 - get rid of nsIDOMXULCheckboxElement, r=smaug 2018-08-30 08:17:11 +08:00
J.C. Jones 80120fa560 Bug 1488622 - land NSS 8f6014565b91 UPGRADE_NSS_RELEASE, r=me
--HG--
extra : rebase_source : 1180690809ff920138698dd60c6c9177fa8d4331
2018-09-06 10:42:40 -07:00
Nicholas Nethercote e51afbee7e Bug 1486690 - Remove unnecessary checks after moz_xrealloc() calls. r=glandium
--HG--
extra : rebase_source : c036680008cef1f87ed94700f9146022ce879e53
2018-08-28 15:56:23 +10:00
Nicholas Nethercote ac5efebb4b Bug 1486690 - Remove unnecessary checks after moz_xmalloc() calls. r=glandium
There are surprisingly many of them.

(Plus a couple of unnecessary checks after `new` calls that were nearby.)

--HG--
extra : rebase_source : 47b6d5d7c5c99b1b50b396daf7a3b67abfd74fc1
2018-08-28 15:56:01 +10:00
Kai Engert e699c5e39a Bug 1470914, NSS_3_39_BETA2, r=me
UPGRADE_NSS_RELEASE

--HG--
extra : amend_source : fd3d0d2da3b2c64e41ae8c15b1b203479eef7e04
2018-08-28 16:18:25 +02:00
ffxbld 73e4fdc8f6 No Bug, mozilla-central repo-update HSTS HPKP blocklist remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D4325

--HG--
extra : moz-landing-system : lando
2018-08-27 12:53:01 +00:00
Johann Hofmann a05ff7f01f Bug 1484246 - Part 1 - Add more explanation to certificate errors caused by Symantec distrust. r=Gijs,keeler
Differential Revision: https://phabricator.services.mozilla.com/D3877

--HG--
extra : rebase_source : 0f45bb71e4e2d9437c687a991c55f33ab492b7bf
2018-08-21 15:04:02 +02:00
Brendan Dahl f6923ccc24 Bug 1485426 - Use createXULElement instead of createElement in XUL docs. r=bgrins
Preparing for transitioning to XHTML.

MozReview-Commit-ID: JLlmUxsvhIB

Differential Revision: https://phabricator.services.mozilla.com/D4265

--HG--
extra : moz-landing-system : lando
2018-08-25 00:16:27 +00:00