Граф коммитов

13663 Коммитов

Автор SHA1 Сообщение Дата
Gurzau Raul cf965b1f59 Merge inbound to mozilla-central. a=merge 2018-07-12 01:04:09 +03:00
Jan de Mooij 4f7b2378dc Bug 1474273 - Add xpc::CurrentNativeGlobal and use it instead of NativeGlobal(JS::CurrentGlobalOrNull(cx)). r=bz 2018-07-11 14:07:02 +02:00
Mathieu Leplatre 4300c52ada Bug 1458917 - Register dedicated timer for Remote Settings r=Gijs
MozReview-Commit-ID: K5Rf1McJUHy

--HG--
extra : rebase_source : f6932e5c3014ce0bb8e29e08468e4e533130273e
2018-06-14 20:54:19 +02:00
Noemi Erli d218f98059 Backed out changeset 101f97abc1d4 (bug 1458917) for Talos failures on a CLOSED TREE 2018-07-11 05:11:11 +03:00
Mathieu Leplatre 068afbc416 Bug 1458917 - Register dedicated timer for Remote Settings r=Gijs
MozReview-Commit-ID: K5Rf1McJUHy

--HG--
extra : rebase_source : 171ed0ff11e2b60a17055412c64584dfe5ab90d5
2018-06-14 20:54:19 +02:00
David Keeler 4e4ecfddb6 bug 1470918 - use only one thread for all DataStorage instances r=franziskus,froydnj
This introduces a helper class that provides one thread all DataStorage
instances can use to do background work. This thread should have a light
workload which mainly consists of reading some files at startup, periodically
writing to these files, and writing them again at shutdown. One thread should be
able to handle this and in any case having multiple threads trying to perform
i/o at the same time would probably be less efficient than merely performing the
work sequentially.

Differential Revision: https://phabricator.services.mozilla.com/D1890

--HG--
extra : moz-landing-system : lando
2018-07-09 19:50:33 +00:00
David Keeler 2542b77071 bug 1471932 - avoid deadlock when loading 3rd party roots r=franziskus
ChangeCertTrustWithPossibleAuthentication should never be called while holding
nsNSSComponent::mMutex, because doing so can result in showing the master
password dialog, which spins the event loop, which can cause other code to run
that may attempt to acquire the same lock (e.g. speculative connect checking
nsNSSComponent to see if the user has smart cards or client certificates).

Differential Revision: https://phabricator.services.mozilla.com/D2011

--HG--
extra : moz-landing-system : lando
2018-07-09 19:34:02 +00:00
ffxbld 05d14001f5 No Bug, mozilla-central repo-update HSTS HPKP blocklist remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D2023

--HG--
extra : moz-landing-system : lando
2018-07-09 11:29:08 +00:00
Franziskus Kiefer f180fd777d Bug 1470914 - land NSS 247bf1dc3121 UPGRADE_NSS_RELEASE, r=me
--HG--
extra : rebase_source : 5f5889a767649aa6d223fbd3f72290c71f7ca74a
2018-07-06 15:56:42 +02:00
Aaron Klotz fab8ec82c6 Bug 1460022: Part 9 - Update sandboxing code to work with revised DLL interceptor interface; r=bobowen 2018-06-27 11:51:29 -06:00
shindli dd50d1646e Backed out 13 changesets (bug 1460022) for bustages in :/build/build/src/mozglue/tests/interceptor/TestDllInterceptor.cpp(113) on a CLOSED TREE
Backed out changeset b798c3689bbf (bug 1460022)
Backed out changeset c3b3b854affd (bug 1460022)
Backed out changeset ecb1b6fd3134 (bug 1460022)
Backed out changeset 91fed649dd5a (bug 1460022)
Backed out changeset be7032cddad2 (bug 1460022)
Backed out changeset d4a036b976e6 (bug 1460022)
Backed out changeset 5f3dfde41e38 (bug 1460022)
Backed out changeset a16486a6f685 (bug 1460022)
Backed out changeset 69eacc5c3ab8 (bug 1460022)
Backed out changeset 34aa7c29b31e (bug 1460022)
Backed out changeset 00b20c0a7637 (bug 1460022)
Backed out changeset b8e8aea4a01f (bug 1460022)
Backed out changeset 15822d9848d8 (bug 1460022)
2018-07-04 03:37:11 +03:00
Aaron Klotz a65c046384 Bug 1460022: Part 9 - Update sandboxing code to work with revised DLL interceptor interface; r=bobowen 2018-06-27 11:51:29 -06:00
shindli dcc88f33f9 Backed out 13 changesets (bug 1460022) for bustages in builds/worker/workspace/build/src/dom/plugins/ipc/FunctionHook.h💯24 on a CLOSED TREE
Backed out changeset 0734142a3f35 (bug 1460022)
Backed out changeset 18fbfa7ca685 (bug 1460022)
Backed out changeset 2df129bd5692 (bug 1460022)
Backed out changeset 02a7ed68933f (bug 1460022)
Backed out changeset 221137d1c2de (bug 1460022)
Backed out changeset 9cb0b7a15402 (bug 1460022)
Backed out changeset 18f8f85c0307 (bug 1460022)
Backed out changeset 867a1351efff (bug 1460022)
Backed out changeset 933e0b698f8e (bug 1460022)
Backed out changeset 09da660071e1 (bug 1460022)
Backed out changeset 8bb5142d3f53 (bug 1460022)
Backed out changeset 0ddf581bdaac (bug 1460022)
Backed out changeset 1cd5f9b4a6af (bug 1460022)
2018-07-04 02:49:24 +03:00
Aaron Klotz ca2a5b7f5d Bug 1460022: Part 9 - Update sandboxing code to work with revised DLL interceptor interface; r=bobowen
--HG--
extra : rebase_source : 03daf9a71dbeb6e27699dad0030a8baf831cbb56
2018-06-27 11:51:29 -06:00
Tiberius Oros 65a30935a5 Merge inbound to mozilla-central. a=merge 2018-07-03 00:53:57 +03:00
Mark Banner 312a9dd7f5 Bug 1470455 - Add the 'expected' arguments to throws/rejects for security/manager/ssl/tests/unit/test_sts_parser.js. r=keeler
MozReview-Commit-ID: 7eXMuESG1nF

--HG--
extra : rebase_source : 0297376918f141cc7fc36b17192deb4f85e9cf00
2018-06-22 11:56:44 +01:00
ffxbld 45647ab56b No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=mtabara
Differential Revision: https://phabricator.services.mozilla.com/D1912

--HG--
extra : moz-landing-system : lando
2018-07-02 11:49:52 +00:00
Kai Engert 414d1a4cdd Bug 1470914, NSS 3.39 beta revision c84a61acb17d UPGRADE_NSS_RELEASE r=me 2018-06-29 22:49:35 +02:00
Franziskus Kiefer b3c2f7b624 Bug 1470030 - follow-up fixing covertiy null-deref issue, r=keeler
Summary: Coverity found this issue. We shouldn't continue if n is null because CERT_LIST_NEXT dereferences n.

Differential Revision: https://phabricator.services.mozilla.com/D1876

--HG--
extra : rebase_source : 8023a38425194099f334c6624ce2bd5f2e50cb95
extra : amend_source : 27947d33f9dbb0afa9ae5927dde874957eb4017c
2018-07-02 10:39:19 +02:00
Margareta Eliza Balazs b7abfb1fa3 Backed out changeset 9aa9b21d0108 (bug 1458917) for android reftest failures @ mozilla::net::nsSocketTransport::InitiateSocket on a CLOSED TREE 2018-06-28 15:47:07 +03:00
Tom Ritter a1f3223838 Bug 1461421 Add OffsetOf patch to chromium patch directory r=bobowen
MozReview-Commit-ID: 3td0bc2PHzu

--HG--
extra : rebase_source : c87cca0e316a5daabcf3ba955675b90240907340
2018-06-08 12:28:26 -05:00
Tom Ritter 6b740111c1 Bug 1461421 Use OffsetOf to calculate the location of parameters_ rather than making assumptions about the parent class r=bobowen
MozReview-Commit-ID: D7REZiAIMpN

--HG--
extra : rebase_source : 5b320ee658589feec6d95b01448def7eb0a56b69
2018-06-07 13:08:27 -05:00
Mathieu Leplatre 028d1b3c75 Bug 1458917 - Register dedicated timer for Remote Settings r=Gijs
MozReview-Commit-ID: K5Rf1McJUHy

--HG--
extra : rebase_source : 772245debd83d36396b8f37de5374af44908079b
2018-06-14 20:54:19 +02:00
David Keeler 9b69a30991 bug 1470030 - convert manually-written nsINSSComponent definition to idl r=fkiefer
Defining nsINSSComponent in idl rather than manually in a header file allows us
to make full use of the machinery that already exists to process and generate
the correct definitions. Furthermore, it enables us to define JS-accessible APIs
on nsINSSComponent, which enables us to build frontend features that can work
directly with the data and functionality the underlying implementation has
access to.

MozReview-Commit-ID: JFI9s12wmRE

--HG--
extra : rebase_source : 16b660e37db681c8823cbb6b7ff59dd0d35f7e73
2018-06-20 16:43:18 -07:00
Dorel Luca cb4cac9822 Backed out changeset 23948209664a (bug 1458917) for Eslint failure and reftest crashes. CLOSED TREE 2018-06-27 17:48:57 +03:00
Mathieu Leplatre ecf7e33ee7 Bug 1458917 - Register dedicated timer for Remote Settings r=Gijs
MozReview-Commit-ID: K5Rf1McJUHy

--HG--
extra : rebase_source : fd52d047a5355b3b454bf4171402b949b8e084e3
2018-06-14 20:54:19 +02:00
Margareta Eliza Balazs c866c30fcf Merge mozilla-central to inbound. a=merge CLOSED TREE 2018-06-26 12:24:32 +03:00
Haik Aftandilian 93adc15937 Bug 1469657 - Whitelist Extensis UTC fonts on 10.11 and Earlier r=Alex_Gaynor
Add whitelist rules to allow access to Extensis Universal Type Manager fonts
on 10.11 and earlier OS versions.

MozReview-Commit-ID: 3cPKlC1xCUW

--HG--
extra : rebase_source : 2f8b126cbc7dff2b4d660b6261c1a45d695e09d8
2018-06-19 11:39:41 -07:00
Kai Engert e2b3d42ec6 bug 1470914, NSS 3.39, beta revision 93cbd336eaca UPGRADE_NSS_RELEASE r=me
--HG--
extra : amend_source : 94593e49ce7b37239629e5c9aa5dbf6865c38b7c
2018-06-25 19:46:36 +02:00
Csoregi Natalia ed1521707f Merge inbound to mozilla-central. a=merge 2018-06-22 00:50:23 +03:00
ffxbld@mozilla.com e762be2e5e No Bug, mozilla-central repo-update HSTS HPKP remote-settings. a=repo-update r=mtabara
Differential Revision: https://phabricator.services.mozilla.com/D1745
2018-06-21 09:34:33 -04:00
Franziskus Kiefer c6f71b5376 Bug 1460617 - land NSS_3_38_RTM UPGRADE_NSS_RELEASE, r=me
--HG--
extra : rebase_source : 10934c67080bee8e451187f5e2470a2accb34d35
2018-06-21 11:38:18 +02:00
Gurzau Raul 18dd35caa7 Merge mozilla-central to inbound. a=merge CLOSED TREE 2018-06-19 13:05:34 +03:00
Andi-Bogdan Postelnicu 80f61e9bf9 Bug 1453795 - PSM-Security - Initialize member fields in classes/ structures. r=keeler
--HG--
extra : rebase_source : 80312f8c119e8b999216fcd99df3764e66d3c43a
2018-06-18 12:31:47 +03:00
ffxbld 49e314358a No Bug, mozilla-central repo-update HSTS HPKP remote-settings. r=mtabara
Differential Revision: https://phabricator.services.mozilla.com/D1693
2018-06-18 17:38:40 -04:00
Mark Banner b30ac6aacd Bug 1456762 - Remove now unnecessary import-globals-from statements in html files. r=mossop
Depends on D1643

MozReview-Commit-ID: 84M50HDg0wl

Differential Revision: https://phabricator.services.mozilla.com/D1644
2018-06-16 08:21:33 +00:00
Ciure Andrei 6eea08365e Merge inbound to mozilla-central. a=merge 2018-06-15 12:49:01 +03:00
J.C. Jones 29ed2577d2 Bug 1460617 - land NSS 30a4b03cd9d1 UPGRADE_NSS_RELEASE, r=me
--HG--
extra : rebase_source : 8be80145b56fa2da2f30ca62893900b4ff0c0517
2018-06-14 10:36:28 -07:00
Dorel Luca b53fbe3617 Merge mozilla-central to autoland 2018-06-15 05:43:31 +03:00
Andi-Bogdan Postelnicu 7fde349ad9 Bug 1453795 - Security/Sandbox - Initialize member fields in classes/ structures. r=haik 2018-06-14 12:26:21 +03:00
Andi-Bogdan Postelnicu 9acd552c83 Bug 1453795 - Security/Manager - Initialize member fields in classes/ structures. r=dkeeler 2018-06-14 11:31:03 +03:00
ffxbld bc0b3720c9 No Bug, mozilla-central repo-update HSTS HPKP blocklist remote-settings. r=mtabara
Differential Revision: https://phabricator.services.mozilla.com/D1615
2018-06-12 17:28:55 -04:00
Jed Davis b0a1468c01 Bug 1456911 - Rewrite the fd shuffling to be simpler & handle identity mappings correctly. r=froydnj
This replaces some old Chromium code that tries to minimally disentangle
an arbitrary file descriptor mapping with simpler algorithm, for several
reasons:

1. Do something appropriate when a file descriptor is mapped to the same
fd number in the child; currently they're ignored, which means they'll
be closed if they were close-on-exec.  This implementation duplicates
the fd twice in that case, which seems to be uncommon in practice; this
isn't maximally efficient but avoids special-case code.

2. Make this more generally applicable; the previous design is
specialized for arbitrary code running between fork and exec, but we
also want to use this on OS X with posix_spawn, which exposes a very
limited set of operations.

3. Avoid the use of C++ standard library iterators in async signal safe
code; the Chromium developers mention that this is a potential problem in
some debugging implementations that take locks.

4. In general the algorithm is simpler and should be more "obviously
correct"; more concretely, it should get complete coverage just by being
run normally in a debug build.

As a convenient side benefit, CloseSuperfluousFds now takes an arbitrary
predicate for which fds to leave open, which means it can be used in
other code that needs it without creating a fake fd mapping.

MozReview-Commit-ID: EoiRttrbrKL

--HG--
extra : rebase_source : 336e0ba9f56dc80f7347dc62617b4ad1efea7e7e
2018-04-25 17:44:08 -06:00
Coroiu Cristina 4b2243fe17 Merge mozilla-inbound to mozilla-central a=merge 2018-06-12 12:19:21 +03:00
Dipen Patel e9b298da8e Bug 1463936 - Set default security.pki.name_matching_mode to enforce (3) for all builds. r=jcj
MozReview-Commit-ID: CK3zoKfGfEr

--HG--
extra : rebase_source : fe20f240a66d809177d30043fd9f41682073cd34
2018-06-11 14:52:07 -07:00
Kai Engert d31699eaa2 Bug 1460617, land NSS 30a4b03cd9d1 UPGRADE_NSS_RELEASE, r=me 2018-06-11 20:12:02 +02:00
Joel Maher 50b91c0a14 Bug 1405428 - skip-if = verify on mochitests which do not pass test-verify. r=gbrown 2018-06-10 05:01:47 -04:00
Narcis Beleuzu 854ba596ee Backed out changeset 2b65a8f99622 (bug 1465562) for mochitest failures on test_cache_padding.html. CLOSED TREE 2018-06-09 00:14:44 +03:00
David Keeler 5d4f4e7312 bug 1439383 - clean up the load loadable roots thread when we're done with it r=froydnj,jcj
MozReview-Commit-ID: J5GnpwxYguz

--HG--
extra : rebase_source : 8e403d3619f2a6a9b726c9da512e8878e2703f21
2018-06-07 15:11:49 -07:00
David Keeler 8fc3ab5cf3 bug 1465562 - ensure succeededCertChain is set in TLS handshakes with session resumption r=fkiefer
When doing TLS session resumption, Firefox currently does not have enough
information to trivially reconstitute the original connection's security
information. Consequently, we have to rebuild the certificate chain in the
handshake callback. Before this patch, we determined the EV and CT status of the
connection but did not set the succeeded cert chain unless the certificate was
EV. This was insufficient. In this patch, we set the succeeded cert chain
regardless of if the certificate is EV or not (provided we found a valid chain).

MozReview-Commit-ID: AuKrlBwX1Qh

--HG--
extra : rebase_source : 357ec38ce8c768ac5218d05ccaea5d1b45af8dfd
2018-06-07 10:41:25 -07:00
Kris Maglione 7b7264f453 Bug 1464548: Part 3 - Update callers to use defineLazyGlobalGetters. r=mccr8
MozReview-Commit-ID: 9APGewiDDYB

--HG--
extra : rebase_source : 2931dd0eec0e4206414b698a9700fc20d922eb3a
2018-05-25 17:02:29 -07:00
ffxbld 9511e1aa4b No bug, mozilla-central repo-update. r=mtabara
No bug, Automated HSTS preload list update from task PFJDsn1_RJyPxtwQXtin8A

No bug, Automated HPKP preload list update from task PFJDsn1_RJyPxtwQXtin8A

No bug, Automated blocklist update from task PFJDsn1_RJyPxtwQXtin8A

No bug, Automated remote settings update from task PFJDsn1_RJyPxtwQXtin8A

Differential Revision: https://phabricator.services.mozilla.com/D1580
2018-06-07 14:03:58 -04:00
David Keeler d4901f4908 bug 1466942 - avoid l10n string bundles in nsNSSComponent initialization r=fkiefer
Before this patch, nsNSSComponent initialization would call PK11_ConfigurePKCS11
with some localized strings, which contributed to startup time. Also,
PK11_UnconfigurePKCS11 was never called, so the memory allocated to these
strings would stick around forever. This patch addresses both of these problems
by not calling PK11_ConfigurePKCS11. This means that some properties of NSS'
internal "PKCS#11 slots/tokens" have to be localized when displaying them to the
user.

MozReview-Commit-ID: BbAgbgpFfFG

--HG--
extra : rebase_source : b633da8fea683675d0c0514a378954332afeb024
2018-06-04 17:07:06 -07:00
Narcis Beleuzu cf464eabfe Merge inbound to mozilla-central. a=merge 2018-06-06 20:00:09 +03:00
Sylvestre Ledru a3ce8a59cd Bug 1464869 - Fix flake8/pep8 issue by hand in security/ r=fkiefer
MozReview-Commit-ID: ExDsMJ9KzJQ

--HG--
extra : rebase_source : e17c44e94c371d168f3c34ecbd640fb87cd2e863
2018-05-27 10:36:45 +02:00
Sylvestre Ledru 9fa6cfa8d4 Bug 1464869 - Run autopep8 on security/ r=fkiefer
MozReview-Commit-ID: K3aWVqsO0O8

--HG--
extra : rebase_source : 6bcf97b8b4a6e70113f36d8097f26816ce4b0acf
2018-05-26 06:47:27 -07:00
Narcis Beleuzu cce21bfe40 Merge mozilla-central to inbound. a=merge CLOSED TREE 2018-06-06 12:52:15 +03:00
Boris Zbarsky 5945884066 Bug 1466727 part 6. Stop using nsITreeColumn in layout. r=mossop 2018-06-05 23:01:37 -04:00
Boris Zbarsky 3473c823b2 Bug 1466727 part 2. Remove use of nsITreeColumn in xpidl interfaces. r=mossop
There is one actual behavior change here, in the webidl version of
TreeBoxObject::GetCellAt.  I believe this change fixes a leak of the
nsTreeColumn, but could use careful review.

I tried to avoid changes not needed to get this compiling.  There will be a lot
more cleanup in the next few changesets.
2018-06-05 23:01:36 -04:00
arthur.iakab fd0ee7c9b8 Merge inbound to mozilla-central a=merge 2018-06-06 00:58:30 +03:00
Boris Zbarsky d20d5e61f5 Bug 1466673 part 4. Stop using nsITreeColumns in various other C++ code. r=mossop 2018-06-05 13:30:17 -04:00
Miko Mynttinen 4c85ef17cc Bug 1465060 - Part 1: Fix warnings for std::move() use r=froydnj
MozReview-Commit-ID: HpdFXqQdIOO

--HG--
extra : rebase_source : 1e7eea4f2d4ec16ec0c559a8afb26976ddbf4d07
2018-06-01 17:59:07 +02:00
arthur.iakab 7e765f798b Backed out 2 changesets (bug 1465060) for build bustages on security/sandbox/linux/reporter/SandboxReporter.cpp
Backed out changeset 7c8905b6b226 (bug 1465060)
Backed out changeset 10446073eca8 (bug 1465060)
2018-06-03 19:25:41 +03:00
Miko Mynttinen 8d9dc85cd4 Bug 1465060 - Part 1: Fix warnings for std::move() use r=froydnj
MozReview-Commit-ID: HpdFXqQdIOO

--HG--
extra : rebase_source : 619d0e0ff63a2453c80f0c4d9beb906d43fa9b01
2018-06-01 17:59:07 +02:00
Andreea Pavel 4ced6e8b2d Merge mozilla-central to autoland. a=merge 2018-06-03 07:27:01 +03:00
Emilio Cobos Álvarez 1e9c395548 Bug 1466168: Remove mozilla::Forward in favor of std::forward. r=froydnj
Same approach as the other bug, mostly replacing automatically by removing
'using mozilla::Forward;' and then:

  s/mozilla::Forward/std::forward/
  s/Forward</std::forward</

The only file that required manual fixup was TestTreeTraversal.cpp, which had
a class called TestNodeForward with template parameters :)

MozReview-Commit-ID: A88qFG5AccP
2018-06-02 09:33:26 +02:00
ffxbld ee72038b8e No bug, Automated HSTS preload list update from task BqRcopwHQbGAhBJA_2Vuzw
Summary:
No bug, Automated HPKP preload list update from task BqRcopwHQbGAhBJA_2Vuzw

No bug, Automated blocklist update from task BqRcopwHQbGAhBJA_2Vuzw

No bug, Automated remote settings update from task BqRcopwHQbGAhBJA_2Vuzw

Reviewers: mtabara, jlund

Reviewed By: mtabara

Differential Revision: https://phabricator.services.mozilla.com/D1473

--HG--
extra : rebase_source : 8326a0602e40d57f8fb3da5dd047a5b3840bc77f
2018-06-01 15:56:55 +01:00
Franziskus Kiefer 51cc7e1f8e Bug 1460617 - land NSS 8232a58332dd UPGRADE_NSS_RELEASE, r=me
--HG--
extra : rebase_source : a35fb046aab40741eefdb1361e5b323bfa0bc607
2018-06-01 09:44:01 +02:00
Emilio Cobos Álvarez fffb25b74f Bug 1465585: Switch from mozilla::Move to std::move. r=froydnj
This was done automatically replacing:

  s/mozilla::Move/std::move/
  s/ Move(/ std::move(/
  s/(Move(/(std::move(/

Removing the 'using mozilla::Move;' lines.

And then with a few manual fixups, see the bug for the split series..

MozReview-Commit-ID: Jxze3adipUh
2018-06-01 10:45:27 +02:00
Tom Ritter 2313bfe0d4 Bug 1457482 Add --enable-lto that turns on LTO r=glandium
MozReview-Commit-ID: DjICW7OKqzB

--HG--
extra : rebase_source : 92c766880845ec89305ef1e66ff13223421ac152
2018-04-13 15:55:39 -05:00
David Keeler 1fa719d5ca bug 1461803 - minor cleanup in PSM: (re)move nsNSSErrors to NSSErrorsService r=jcj
Also removes displayUnknownCertErrorAlert, which was declared but never used.
Also removes some unnecessary ns(I)CertOverrideService OID stuff.

MozReview-Commit-ID: 4o7c1TkKeKJ

--HG--
extra : rebase_source : a8069b76fc847e6b4d158e4b30a75bde3e290ed9
2018-06-01 16:23:17 -07:00
David Keeler 23798b7e5f bug 1465976 - remove all find*ByName APIs from PSM PKCS#11 module/slot/token interfaces r=fkiefer,jcj
Before this patch, we exposed a few interfaces that revolved around mapping a
name to a specific PKCS#11 module, slot, or token. These APIs were all either
problematic and/or unnecessary. In theory there could be two tokens in different
modules with the same name, so nsIPK11TokenDB.findTokenByName wasn't guaranteed
to return what the consumer expected it to. In general, these APIs were used by
front-end code to go from a handle on the specific object in question to a
string identifier and then back to a handle on the object. This was unnecessary
- we can just retain the original handle.

MozReview-Commit-ID: IbqLbV4wceA

--HG--
extra : rebase_source : 05d39afd6bed0aa5e7694e1c79baf836edc03214
2018-05-31 14:46:06 -07:00
Andreea Pavel 38bcf897f1 Merge mozilla-inbound to mozilla-central. a=merge 2018-05-31 13:04:21 +03:00
arthur.iakab f1046ac67f Merge mozilla-central to inbound 2018-05-31 01:08:35 +03:00
Andrea Marchesini 1273dc5391 Bug 1446933 - Remove 'using namespace mozilla::net' from BackgroundUtils.h, r=qdot 2018-05-30 21:21:17 +02:00
David Keeler b0ca052e73 bug 1465258 - remove load group workaround in new OCSP code r=jcj
The patch for bug 1456489 included a workaround for the issue that origin
attributes weren't honored on channels that didn't have a load group set (bug
1456742). Now that that's fixed, we don't need the workaround.

MozReview-Commit-ID: I4ExIqt6dYo

--HG--
extra : rebase_source : d323c0860989985b72933dcffd62743b9d73644d
2018-05-29 16:03:37 -07:00
David Keeler 6031c1d1be bug 1464505 - remove some unused localization helpers from nsNSSComponent r=fkiefer
nsNSSComponent::PIPBundleFormatStringFromName and ::GetNSSBundleString are now
unused. They can be removed (which means that nsNSSComponent::mNSSErrorsBundle
can be removed as well).

MozReview-Commit-ID: GAaGawSDL2n

--HG--
extra : rebase_source : 3f683a902e292c6b0cf736773e71fb893074c32b
2018-05-25 13:02:02 -07:00
David Keeler 4483c4670c bug 1464510 - test_ssl_status.js needs to be run sequentially (it uses hardcoded ports) r=mgoodwin
MozReview-Commit-ID: 7MeWq9ZCRd9

--HG--
extra : rebase_source : 421aa6246d71b3ea24f835769c8af61c7658fd02
2018-05-25 13:54:43 -07:00
David Keeler 571854a7c1 bug 1464520 - hard-code the builtin roots module name to avoid a dependency on l10n in nsNSSComponent r=fkiefer,jcj
nsNSSComponent startup and shutdown would be simpler if there were no direct
dependencies on localized strings. This patch removes a dependency on the
localized name of the builtin roots module by hard-coding the name internally
and then mapping it to/from the localized version as appropriate.

MozReview-Commit-ID: 30kbpWFYbzm

--HG--
extra : rebase_source : 3d384af5a9fa45d5ac1f78e1fcb0dd9e4b94267d
2018-05-25 11:22:48 -07:00
Haik Aftandilian 0dfa17d31a Bug 1463353 - contentSandboxRules does not explcitly list 'com.apple.fonts' mach service. r=Alex_Gaynor
Add font servers to sandbox policies instead of relying
on them to be registered before the sandbox is enabled.

MozReview-Commit-ID: IoVJhAqoEEW

--HG--
extra : rebase_source : 448cc9e556056c44cf76f79c126fbfe56e948e1e
2018-05-29 14:55:12 -07:00
Franziskus Kiefer 7eaf562442 Bug 1460617 - land NSS 3d3e34bb7517 UPGRADE_NSS_RELEASE, r=me
--HG--
extra : rebase_source : 45b9c45b31b55dc1f5fcc043336b2ddc386f740c
extra : histedit_source : 221357b0e59b2a82786cc83d6b980062ec2b7ce9
2018-05-28 15:45:28 +02:00
Brindusan Cristian 309ff0bd1f Merge mozilla-central to autoland. a=merge CLOSED TREE 2018-05-25 03:08:34 +03:00
David Keeler d0f63cd6ba bug 1463901 - re-arrange some nsNSSComponent initialization/shutdown operations to avoid hanging r=jcj
Before this patch, if nsNSSComponent initialization failed after allocating the
XPCOM object for the component but before dispatching the load loadable roots
task, BlockUntilLoadableRootsLoaded would block indefinitely in ShutdownNSS
(called from ~nsNSSComponent).

This patch re-arranges some things so that nsNSSComponent cleanup won't block on
the load loadable roots task if it never fired. It also splits the cleanup into
idempotent operations and operations that can only be run once.

Unfortunately if nsNSSComponent initialization fails, Firefox is likely to exit
or fail promptly anyway (since it is essential to so many other components).
However, quitting outright is probably a better experience than hanging
indefinitely.

MozReview-Commit-ID: RWmBUV2pEU

--HG--
extra : rebase_source : e2d06178ecc8ca8681eef18cb3af0a9ac8f83d1c
2018-05-23 15:39:38 -07:00
Haik Aftandilian fcb3b190fe Bug 1432567 - [Mac] Add a test that renders fonts from non-standard directories r=jfkthame
Adds a test to validate that content sandboxing is allowing content
processes to access fonts from non-standard locations on the
filesystem. The test copies the Fira Sans font to the root of the
home directory and renders a page that should use Fira Sans when it
is installed and registered with the OS. The test checks for the use
of the ".LastResort" font which is an indication of the the content
process failing to load the font.

MozReview-Commit-ID: GPWqHdF3vhG

--HG--
extra : rebase_source : c0ea283d496517812202d068c610bdcc0ece640d
2018-05-22 12:31:03 -07:00
David Keeler ca855468dd bug 1461037 - lossily convert invalid UTF8 in certificates for display purposes r=jcj
In debug builds, we assert if any UTF8-to-UTF16 conversion fails. If we have
invalid UTF8 in a certificate, we don't want to assert. So, we now lossily
convert invalid UTF8 in certificates for any display purposes.
This also handles fields that are supposed to be ASCII in a similar way.

MozReview-Commit-ID: 6TdVPDTmNlh

--HG--
extra : rebase_source : 17000bd0671551bbdae534a4eaf4946c1b0beb83
2018-05-15 16:41:46 -07:00
J.C. Jones 45e31a5ac7 Bug 1460617 - land NSS 328d235fc7ee UPGRADE_NSS_RELEASE, r=me
--HG--
extra : rebase_source : 0a6e32201241c835e3ea05b2c7290d5a0fc811dd
2018-05-24 08:08:55 -07:00
David Keeler f4f551dca4 bug 1465562 - ensure succeededCertChain is set in TLS handshakes with session resumption r=fkiefer
When doing TLS session resumption, Firefox currently does not have enough
information to trivially reconstitute the original connection's security
information. Consequently, we have to rebuild the certificate chain in the
handshake callback. Before this patch, we determined the EV and CT status of the
connection but did not set the succeeded cert chain unless the certificate was
EV. This was insufficient. In this patch, we set the succeeded cert chain
regardless of if the certificate is EV or not (provided we found a valid chain).

MozReview-Commit-ID: AuKrlBwX1Qh

--HG--
extra : rebase_source : cafb17548666f6330038012e36fa23ef382f361a
2018-06-07 10:41:25 -07:00
ffxbld af37fd8a7f No Bug, mozilla-central repo-update HSTS HPKP remote-settings. r=mtabara
Differential Revision: https://phabricator.services.mozilla.com/D1652
2018-06-14 13:01:41 -04:00
Csoregi Natalia 2f779be8d9 Merge mozilla-central to autoland. a=merge CLOSED TREE 2018-06-02 01:03:45 +03:00
David Keeler 0dec465e26 bug 1465933 - remove GetPIPNSSBundleString from nsINSSComponent r=fkiefer
At this point, all uses of GetPIPNSSBundleString *should* be on the main thread,
so we can just remove the nsINSSComponent version and rely on the
nsNSSCertHelper instance.

MozReview-Commit-ID: Lt7AgokGKRH

--HG--
extra : rebase_source : 95d3cf6e011468e2aa9df9bb69372ac4d3430286
2018-05-31 12:26:04 -07:00
Narcis Beleuzu 59ffb03449 Backed out changeset 01b407d8a5af (bug 1453795) for build bustages on CertVerifier.h . CLOSED TREE 2018-06-19 07:38:57 +03:00
Andi-Bogdan Postelnicu be47373507 Bug 1453795 - PSM-Security - Initialize member fields in classes/ structures. r=keeler
--HG--
extra : rebase_source : 4e22100b95356d8f36f26459c985dbfb064453d1
2018-06-18 12:31:47 +03:00
Jed Davis 2788528721 Bug 1462640 - Allow content processes to mincore() individual pages. r=gcp
MozReview-Commit-ID: IclghYFyMPp

--HG--
extra : rebase_source : 5096ced288cfd120a6d28c87a7528851617a70e9
2018-05-18 17:36:47 -06:00
J.C. Jones 4c5afa060e Bug 1460617 - land NSS c8ee333b84a0 UPGRADE_NSS_RELEASE, r=me
--HG--
extra : rebase_source : 6324109576a15237b4d629c75109a49fe2274f5f
2018-05-21 08:33:12 -07:00
Tom Ritter 9800e813cf Bug 1462100 Add the 'cast to void*' MinGW sandbox patch to the chromium patchlist r=bobowen
MozReview-Commit-ID: 457xxFsnjTL

--HG--
extra : rebase_source : c1cb170c13cc408a4c1562e5bfd001bb9597a54c
2018-05-17 10:10:50 -05:00
Tom Ritter e8c4e33bea Bug 1462100 Cast to void* to avoid conversion errors on MinGW, which does not do the automatic conversion like msvc r=bobowen
MozReview-Commit-ID: 8fO9Nu9gaxh

--HG--
extra : rebase_source : 896c58b8050304c6a47dcbd9f7744923a721fa69
2018-05-16 14:18:20 -05:00
David Keeler d8f748b996 bug 401240 - part 2/2 - reimplement PKCS#12 import/export without goto r=fkiefer
MozReview-Commit-ID: JUMmTPrEYND

--HG--
rename : security/manager/ssl/tests/unit/test_certDB_import_with_master_password.js => security/manager/ssl/tests/unit/test_certDB_export_pkcs12.js
rename : security/manager/ssl/tests/unit/test_certDB_import_with_master_password.js => security/manager/ssl/tests/unit/test_certDB_export_pkcs12_with_master_password.js
extra : rebase_source : 3bf01e722f496b4dba634ed5d0345ce1fe0ceea7
2018-05-11 11:37:50 -07:00
David Keeler 18117a994a bug 401240 - part 1/2 - run ./mach clang-format on nsPKCS12Blob r=fkiefer
MozReview-Commit-ID: 81m6dxhg8Pv

--HG--
extra : rebase_source : c9d3bed637e163cc6347f6626067aaf9b773db8c
2018-05-11 11:09:00 -07:00
Tom Ritter af3c5e06a6 Bug 1460882 Disable SANDBOX_EXPORTS for the MinGW Build r=bobowen
MozReview-Commit-ID: 2muTxIYUx6F

--HG--
extra : rebase_source : c61e7de55319fd5eb156dd3c46ed4a8efe6dc42b
2018-05-11 08:16:13 -05:00
Haik Aftandilian 5e0cbf519a Bug 1460917 - Fonts not displaying with FontExplorer X fonts in Firefox 60 r=handyman
Add back font whitelist rules removed by the fix for bug 1393259
to workaround font sandbox extensions not being issued automatically
on OS X 10.11 and earlier.

MozReview-Commit-ID: 2hT0BzN3Ggq

--HG--
extra : rebase_source : 4fe9ce43eb7efe0c6a91c908c149126da6eb708e
2018-05-14 16:04:55 -07:00
J.C. Jones 0843035f6b Bug 1460617 - land NSS 6e4b0141df2f UPGRADE_NSS_RELEASE, r=me
--HG--
extra : rebase_source : c82ceabece6bd1c9b0d079a0a69eedeba4214c5e
2018-05-14 14:47:52 -07:00
Nika Layzell 2d188849ae Bug 1455217 - Part 3: Use the new xpidl Promise type instead of nsISupports, r=bz 2018-05-14 17:55:54 -04:00
J.C. Jones db950df22f Bug 1461373 - Set BRNameMatchingPolicy to "Enforce" for Nightly r=keeler
Summary:
Change the security.pki.name_matching_mode pref to 3 for Enforce on Nightly.

BR_9_2_1_SUBJECT_ALT_NAMES show that ~99.98% of encountered certificates have
an acceptable SAN, so our compatibility risk is about 0.02%.

BR_9_2_2_SUBJECT_COMMON_NAME also shows, 99.89% of certificate common names are
present in a subject alternative name extension, giving a worst-case of 0.11%
risk, though BR_9_2_1_SUBJECT_ALT_NAMES is more what we're affecting here.

Test Plan: none

Reviewers: keeler

Tags: #secure-revision

Bug #: 1461373

Differential Revision: https://phabricator.services.mozilla.com/D1277

--HG--
extra : transplant_source : %BF%7D%DEi%C7%9BhE%D0%C2d%9D0%AC%F8%9EM%E0%60U
2018-05-14 09:55:15 -07:00
Kris Maglione 250e7028e3 Bug 1385057: Remove most code for handling unpacked side-loaded extensions. r=aswan,keeler
MozReview-Commit-ID: H4cSRBws4Ml

--HG--
extra : rebase_source : ddddef92344b6414ae4e5635b9841fcc274dfca9
2018-05-09 16:04:04 -07:00
Margareta Eliza Balazs 4f9a2ba08e Merge inbound to mozilla-central. a=merge 2018-05-11 12:36:02 +03:00
J.C. Jones 08d83d7258 Bug 1441914 - Fix Windows build on a CLOSED TREE r=me
Don't use MOZ_MAKE_ENUM_CLASS_BITWISE_OPERATORS; it's unneeded here right now,
and occludes "PSM::Result" on Windows.

--HG--
extra : transplant_source : %B9%24%7FR%A8%1B%B0%3B%D44%ED%C5%3F%CD%1E%96%1F%22m%A3
2018-05-10 17:15:22 -07:00
J.C. Jones 4139925b80 Bug 1441914 - Make security.pki.distrust_ca_policy a bitmask r=fkiefer r=keeler
Per Bug 1437754 comment 10, the pref security.pki.distrust_ca_policy makes more
sense as a bitmask than a state. To permit future nuance, let's go ahead and do
that before people start implementing atop Bug 1456112.

This does permit both 0b10 and 0b11 to enable the functionality for Firefox 63.

--HG--
extra : transplant_source : %84%AF%89%E0%89dT%01%10%84%A0%3B%A5%28%2A%D3%E1%B0%0D%E7
2018-05-07 15:46:22 -07:00
David Keeler 6499399d3c bug 1427248 - avoid changing certificate trust in nsNSSComponent initialization r=fkiefer,jcj
If a user has set a master password on their NSS DB(s), when we try to change
the trust of a certificate, we may have to authenticate to the DB. This involves
bringing up a dialog box, executing javascript, spinning the event loop, etc.
In some cases (particularly when antivirus software has injected code into
Firefox), this can cause the nsNSSComponent to be initialized if it hasn't
already been. So, it's a really, really bad idea to attempt to change the trust
of a certificate while we're initializing nsNSSComponent, because this results
in a recursive component dependency and everything breaks. To get around this,
if we need to load 3rd party roots (e.g. enterprise roots or the family safety
root), we defer any trust changes to a later event loop tick. In theory this
could cause verification failures early in startup. We'll have to see if this
is an issue in practice.

MozReview-Commit-ID: FvjHP5dTmpP

--HG--
extra : rebase_source : 73d39788ce39adcbe01c89867061f64d05a3876b
2018-05-07 17:05:30 -07:00
Coroiu Cristina 683720f5ee Backed out changeset 0693ec09dd68 (bug 1427248) for bustage at build/src/security/manager/ssl/nsNSSComponent.cpp on a CLOSED TREE 2018-05-10 23:32:46 +03:00
David Keeler 65635d2855 bug 1427248 - avoid changing certificate trust in nsNSSComponent initialization r=fkiefer,jcj
If a user has set a master password on their NSS DB(s), when we try to change
the trust of a certificate, we may have to authenticate to the DB. This involves
bringing up a dialog box, executing javascript, spinning the event loop, etc.
In some cases (particularly when antivirus software has injected code into
Firefox), this can cause the nsNSSComponent to be initialized if it hasn't
already been. So, it's a really, really bad idea to attempt to change the trust
of a certificate while we're initializing nsNSSComponent, because this results
in a recursive component dependency and everything breaks. To get around this,
if we need to load 3rd party roots (e.g. enterprise roots or the family safety
root), we defer any trust changes to a later event loop tick. In theory this
could cause verification failures early in startup. We'll have to see if this
is an issue in practice.

MozReview-Commit-ID: FvjHP5dTmpP

--HG--
extra : rebase_source : ad0fb83a0de3632e3a967e91aec3d8070b22dedc
2018-05-07 17:05:30 -07:00
ffxbld 7c7bbfe6e0 No bug, Automated HSTS preload list update from task XSqPd8faStCdsylVmzvQ6w
Summary:
No bug, Automated HPKP preload list update from task XSqPd8faStCdsylVmzvQ6w

No bug, Automated blocklist update from task XSqPd8faStCdsylVmzvQ6w

Reviewers: sfraser, aki

Reviewed By: sfraser

Differential Revision: https://phabricator.services.mozilla.com/D1256

--HG--
extra : rebase_source : 855e19990c75e2613bd311976297fb6513e02b94
2018-05-10 12:14:28 +01:00
Csoregi Natalia f034c0ab5d Merge mozilla-central to inbound. a=merge CLOSED TREE 2018-05-10 12:52:31 +03:00
David Keeler 3b971d708e bug 1460312 - cancel the timeout timer in OCSP request implementation r=jcj
Bug 1456489 cleaned up our OCSP request implementation a bit. One simplification
it made was to not cancel the timeout timer. It turns out that if we don't, the
OCSPRequest that constitutes the timeout callback's closure might not be valid
if the request has completed (because the timer doesn't own a strong reference
to it). The fix is simple: cancel the timer when the request completes. Note
that we don't have to do the reverse because necko has a strong reference to the
request.

MozReview-Commit-ID: 2WHFLAcGBAw

--HG--
extra : rebase_source : c4216f6792c1d62cbd046b1b3802226c51fbe8af
2018-05-09 10:06:49 -07:00
David Keeler e218ab3e3b bug 1460350 - re-land bug 1415991 (remove support for verifying signed unpacked add-ons) r=kmag
(Backed out changeset 6bbf8dc0b86e (which was a backout of changeset 0a5795108e0a))

MozReview-Commit-ID: EZFn7dLBcdh

--HG--
extra : rebase_source : 8fac1e33a7f108a248ecde35779b2c63ce7d9172
2018-05-09 10:19:37 -07:00
Kris Maglione 01c298aca6 Bug 1460092: Add ESLint rule to enforce use of ChromeUtils.generateQI. r=Gijs
Also fixes existing code which fails the rule.

MozReview-Commit-ID: CkLFgsspGMU

--HG--
extra : rebase_source : 86a43837659aa2ad83a87eab53b7aa8d39ccf55b
2018-05-08 18:36:22 -07:00
David Keeler 6ea4fb08d4 bug 1456489 - prevent making OCSP requests on the main thread r=fkiefer,jcj
OCSP requests cannot be performed on the main thread. If we were to wait for a
response from the network, we would be blocking the main thread for an
unnaceptably long time. If we were to spin the event loop while waiting (which
is what we do currently), other parts of the code that assume this will never
happen (which is essentially all of them) can break.

As of bug 867473, no certificate verification happens on the main thread, so no
OCSP requests happen on the main thread. Given this, we can go ahead and
prohibit such requests.

Incidentally, this gives us an opportunity to improve the current OCSP
implementation, which has a few drawbacks (the largest of which is that it's
unclear that its ownership model is implemented correctly).

This also removes OCSP GET support. Due to recent OCSP server implementations
(namely, the ability to cache OCSP POST request responses), OCSP GET is not a
compelling technology to pursue. Furthermore, continued support presents a
maintenance burden.

MozReview-Commit-ID: 4ACDY09nCBA

--HG--
extra : rebase_source : 072564adf1836720e147b8250afca7cebe4dbf62
2018-04-23 18:09:35 +02:00
David Keeler 6da3ace3da bug 686149 - improve PKCS7 certificate export to not use legacy path building r=fkiefer
MozReview-Commit-ID: 2U4J8uUlvaN

--HG--
extra : rebase_source : c416a552e31a6ef38a5d394374e212f00210b334
2018-05-02 10:22:58 -07:00
arthur.iakab f2042a4c1f Merge inbound to mozilla-central a=merge 2018-05-08 15:42:06 +03:00
J.C. Jones 8d99d56270 Bug 1456112 - Add a pref to implement the last Symantec Distrust step r=keeler
This adds another preference (DistrustSymantecRootsRegardlessOfDate == 2) that
stops permitting certificates issued after 1 June 2016, and updates the test to
check it.

--HG--
extra : transplant_source : %F1%DE%16m%F2%DD%A8Ei%EF%B4%CAo%BF%8D%A6%A6%5E%D4%89
2018-05-04 09:34:45 -07:00
J.C. Jones 0fe289986b Bug 1445731 - land NSS NSS_3_37_RTM UPGRADE_NSS_RELEASE, r=me
--HG--
extra : rebase_source : 0c5dbfbfab874158345a4fe2237dc898655f0052
2018-05-04 10:42:48 -07:00
David Keeler 999c7366ef bug 1346297 - remove expired family safety telemetry probe r=jcj
MozReview-Commit-ID: BCc5Fa9jWJ2

--HG--
extra : rebase_source : fa965818e96fae6f2c23d33c9bcf6cb224b7935b
extra : amend_source : a1c08417b0a5f3b8de4c5b2025c559111e6597c2
2018-05-03 12:44:14 -07:00
Ciure Andrei 82f7c496dc Merge inbound to mozilla-central. a=merge 2018-05-04 00:52:04 +03:00
ffxbld ab372e51b4 No bug, Automated HSTS preload list update from task AUKIqPPXTDSaxMvWC7BXWg
Summary: No bug, Automated HPKP preload list update from task AUKIqPPXTDSaxMvWC7BXWg

Reviewers: sfraser

Reviewed By: sfraser

Differential Revision: https://phabricator.services.mozilla.com/D1117

--HG--
extra : rebase_source : d68fc2b597321f42c66b798db4f8f9cf0b209a73
2018-05-03 12:44:37 +01:00
David Keeler 066f38fa62 bug 1458074 - un-do the firefox-appdir addition in PSM's xpcshell.ini r=kmag
Bug 1372694 added a firefox-appdir line to PSM's xpcshell.ini. It turns out this
breaks running these tests locally because utilities like BadCertServer can't be
found. I looks like the change isn't necessary, so the simplest thing to do
would be to just remove the addition.

MozReview-Commit-ID: 8fg8ujPWxRe

--HG--
extra : rebase_source : ffef9b067dacb94c4bd554f97556ab95f58efd2b
2018-04-30 15:21:41 -07:00
ffxbld b9d16384c0 No bug, Automated HSTS preload list update from task QWd7FyT5RE-MJF4dSdL4TQ
Summary: No bug, Automated HPKP preload list update from task QWd7FyT5RE-MJF4dSdL4TQ

Reviewers: sfraser

Reviewed By: sfraser

Differential Revision: https://phabricator.services.mozilla.com/D1063

--HG--
extra : rebase_source : 7d37ffc7fcbca533ae8cf1b532671b78407ac8cd
2018-04-30 12:45:23 +01:00
Kris Maglione a259026c9d Bug 1456035: Part 4 - Convert callers of XPCOMUtils.generateQI to ChromeUtils.generateQI. r=mccr8
This also removes any redundant Ci.nsISupports elements in the interface
lists.

This was done using the following script:

acecb401b7/processors/chromeutils-generateQI.jsm

MozReview-Commit-ID: AIx10P8GpZY

--HG--
extra : rebase_source : a29c07530586dc18ba040f19215475ac20fcfb3b
2018-04-22 20:55:06 -07:00
Haik Aftandilian 7fb2183e0a Bug 1458553 - Return of Google Maps all black map with updated Nvidia web driver on Mac r=Alex_Gaynor
Update Mac sandbox rules to allow executable mappings from /Library/GPUBundles which is
used by the Nvidia downloadable "Web" driver.

MozReview-Commit-ID: L2nTP4YWdJJ

--HG--
extra : rebase_source : d8eefdd5a180db5d3ea8207d923e021420f2318e
2018-05-02 09:26:55 -07:00
ffxbld 1a695c2e33 No bug, Automated HSTS preload list update from task GjhOFReSQGqVESpdTdZ3FA
Summary: No bug, Automated HPKP preload list update from task GjhOFReSQGqVESpdTdZ3FA

Reviewers: sfraser

Reviewed By: sfraser

Tags: #secure-revision

Differential Revision: https://phabricator.services.mozilla.com/D1045

--HG--
extra : rebase_source : 53c75df4ac650d24bb7f4da8e7d3eab675dcac3b
2018-04-26 16:19:47 +01:00
J.C. Jones 61f85fbe96 Bug 1445731 - land NSS NSS_3_37_BETA2 UPGRADE_NSS_RELEASE, r=me
--HG--
extra : rebase_source : b68bb60ebd5ac7037d71c8db6acec29802220a5c
2018-04-26 15:32:24 +02:00
Brindusan Cristian 59f801793b Merge inbound to mozilla-central. a=merge 2018-04-25 00:50:59 +03:00
Bob Owen f299b6bfc7 Bug 1444699: Remove dynamic load and call for GetUserDefaultLocaleName. r=handyman
This was only required because it is not available on Windows XP, which is no
longer supported. Patch already landed upstream in chromium.
2018-04-24 09:21:51 +01:00
Tim Nguyen 92c9a958e1 Bug 1372694 - Stop making the default theme a heavyweight theme. r=kmag,aswan
MozReview-Commit-ID: 30wMauuc9oo

--HG--
rename : browser/base/content/default-theme-icon.svg => toolkit/mozapps/extensions/content/default-theme-icon.svg
extra : rebase_source : 5e4cf784135f4a8e40a2ed8357ba651e7fce9728
2018-04-01 13:53:31 +02:00
jld@mozilla.com c7c75836c0 Backed out 2 changesets (bug 1439057, bug 1447867)
Backed out changeset baeab3bff807 (bug 1439057)
Backed out changeset 1a024d5ca77b (bug 1447867)

--HG--
extra : rebase_source : d39e4657b4117706a53bc42b7817424cf43f9148
2018-04-23 07:59:02 -06:00
Margareta Eliza Balazs fa0ffa186e Merge mozilla-central to autoland. a=merge CLOSED TREE
--HG--
rename : toolkit/mozapps/extensions/internal/XPIProviderUtils.js => toolkit/mozapps/extensions/internal/XPIDatabase.jsm
2018-04-24 14:51:28 +03:00
Sylvestre Ledru aefcd1c84b Bug 1448934 - Fix some spelling mistakes in locales/en-US r=flod
MozReview-Commit-ID: vGVudVgB31

--HG--
extra : rebase_source : cdc39375a3485a3133878c4dbbffe60c0b26e917
2018-04-24 10:26:35 +02:00
ffxbld 23863f75f8 No bug, Automated HSTS preload list update from task NB7sJcsHTtqWs431n9VnuQ
Summary:
No bug, Automated HPKP preload list update from task NB7sJcsHTtqWs431n9VnuQ

No bug, Automated blocklist update from task NB7sJcsHTtqWs431n9VnuQ

Reviewers: sfraser

Reviewed By: sfraser

Differential Revision: https://phabricator.services.mozilla.com/D1012

--HG--
extra : rebase_source : d69fb8de90258fb3030bfcd323e1564247558972
2018-04-23 11:54:49 +01:00
J.C. Jones 6fad8e3ff1 Bug 1441338 - Change pgo certificates to use certspec/keyspec files r=keeler r=franziskus
(This also fixes Bug 879740 and Bug 1204543.)

build/pgo/certs contains an NSS database set that has a bunch of hand-generated
certificates, and many of these hand-generated certificates are specifically
depended upon for a variety of unit tests. This patch changes all of these to
use the "pycert.py" and "pykey.py" utilities that produce deterministic keys
and certificates.

The naming convention here is new, and defined in the README. It is based on
the mochitest runtest.py naming convention that imports .ca and .client
PEM-encoded certificates.

Unfortunately, the updates to build/pgo/genpgocert.py to generate these files
depends on OpenSSL in order to produce PKCS12 archives for pk11tool to import
into NSS. This could be done with pure-NSS tooling, but it'd require some new
command line functionality, which is out-of-scope for this change.

Note that build/pgo/genpgocert.py no longer takes arguments when run. It's not
run automatically anywhere that I can see, but could (reasonably) be, now.

Differential Revision: https://phabricator.services.mozilla.com/D971

--HG--
extra : amend_source : bc389b9b0a807a4889feb14db439daa28635dfe9
2018-04-23 11:14:17 +02:00
Jed Davis c5a7acdf32 Bug 1439057 - Tighten /dev/shm access in Linux content sandbox policy. r=froydnj,gcp
This patch uses the shared memory name prefixes introduced in bug 1447867
to prevent access to /dev/shm files of other applications or other
processes within the same browser instance.

When a shared memory implementation that doesn't use shm_open is available
(specifically, the memfd_create support to be added in bug 1440203),
/dev/shm access is completely denied.

MozReview-Commit-ID: L2ylG5KrXTU

--HG--
extra : rebase_source : ca1deece6117e843d691a13fff05bd0f97ec0408
2018-04-12 23:48:16 -06:00
Cosmin Sabou 4595d43d3a Merge inbound to mozilla-central. a=merge
--HG--
rename : browser/modules/offlineAppCache.jsm => toolkit/modules/offlineAppCache.jsm
2018-04-20 01:29:10 +03:00
David Keeler 2c25bac533 bug 867473 - (4/4) remove nsIX509Cert.issuer and getChain r=jcj
These functions cause main-thread certificate verifications, which is bad for
performance. In general, nsIX509CertDB.asyncVerifyCertAtTime should be used
instead.

MozReview-Commit-ID: 9nkUDmyFY0k

--HG--
extra : rebase_source : d3e8a02e2d21e5507e71681b88f0360edf64b790
2018-04-17 13:07:52 -07:00
David Keeler df11944f15 bug 867473 - (3/4) replace use of nsIX509Cert.getChain() with an asynchronous API r=fkiefer,jcj
MozReview-Commit-ID: 8Ag6BrlyASU

--HG--
extra : rebase_source : 0c50d55c90301b19139d6f4a50694f1458d752f4
2018-04-17 12:41:23 -07:00
David Keeler 4ad6f791bc bug 867473 - (2/4) move certificate chain utility functions to a shared location r=fkiefer,jcj
MozReview-Commit-ID: JxlN95YLwRq

--HG--
extra : rebase_source : b4a5cacdc336cb8cfa0bad5a2a705667928e5167
2018-04-17 12:37:15 -07:00
David Keeler 98a4d728f8 bug 867473 - (1/4) refactor certificate chain utility functions in certViewer.js r=fkiefer,jcj
MozReview-Commit-ID: EvDtrr4t1ZO

--HG--
extra : rebase_source : a0787be343b55466135c02d944f3c199310b8d51
2018-04-17 12:33:04 -07:00
Nika Layzell 5e2e5fc993 Bug 1444991 - Part 5: Make some XPCOM methods more strongly typed, r=bz
This patch goes through and changes a bunch of places in our tree which mention
this bug to use the new feature, making the methods more strongly typed.

There are probably more places in tree which could be changed, but I didn't try
to find them.
2018-04-17 19:21:05 -04:00
ffxbld 34c1dbb780 No bug, Automated HSTS preload list update from task H62DxEEORdK66XAfNOW16w
Summary:
No bug, Automated HPKP preload list update from task H62DxEEORdK66XAfNOW16w

No bug, Automated blocklist update from task H62DxEEORdK66XAfNOW16w

Reviewers: sfraser

Reviewed By: sfraser

Differential Revision: https://phabricator.services.mozilla.com/D990

--HG--
extra : rebase_source : 37159492c64768f9d70c08d38756c5c749b949a8
2018-04-19 14:28:52 +01:00
Tim Taubert 090ee0f18b Bug 1445731 - land NSS 3e452651e282 UPGRADE_NSS_RELEASE, r=me 2018-04-19 10:27:14 +02:00
shindli 805cb19c1d Merge mozilla-central to autoland. a=merge CLOSED TREE 2018-04-17 01:45:58 +03:00
ffxbld dfc349cf61 No bug, Automated HSTS preload list update from task bXFc8JIdQA-9jXbS0HWQ5Q
Summary: No bug, Automated HPKP preload list update from task bXFc8JIdQA-9jXbS0HWQ5Q

Reviewers: sfraser

Reviewed By: sfraser

Differential Revision: https://phabricator.services.mozilla.com/D949

--HG--
extra : rebase_source : d7e310d16a0e74b84b3317c379b16ab1d14224bc
2018-04-16 11:54:18 +01:00
Tim Taubert 4dba84fc9a Bug 1445731 - land NSS c1a4035420c3 UPGRADE_NSS_RELEASE, r=me 2018-04-16 10:09:12 +02:00
Bob Owen df78972f84 Bug 1453929: Enable handle verifier on 32-bit EARLY_BETA_OR_EARLIER. r=jimm 2018-04-14 20:24:07 +01:00