Граф коммитов

17118 Коммитов

Автор SHA1 Сообщение Дата
Csoregi Natalia 4e0bebb175 Backed out changeset 53c18b7903db (bug 1799630) for causing hybrid bustages on CocoaGamepad.cpp. CLOSED TREE 2022-11-10 01:27:08 +02:00
Robert Longson 143ac3fe87 Bug 1799630 - replace sprintf by snprintf or SprintfLiteral r=emilio
Differential Revision: https://phabricator.services.mozilla.com/D161573
2022-11-09 20:00:18 +00:00
Dana Keeler c6dce08962 Bug 1799040 - disable EV treatment for "Staat der Nederlanden EV Root CA" r=jschanck
Differential Revision: https://phabricator.services.mozilla.com/D161527
2022-11-07 21:48:56 +00:00
John Schanck 13eee7dea4 Bug 1799121 - build a static NSS for tests when configured with system NSS. r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D161324
2022-11-07 17:48:51 +00:00
trickypr 03923d08b4 Bug 1510561 - Part 14: Apply `plugin:mozilla/valid-jsdoc` to `security/`. r=keeler
Depends on D161388

Differential Revision: https://phabricator.services.mozilla.com/D161389
2022-11-07 17:29:14 +00:00
ffxbld 9e6527a4e7 No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=diannaS
Differential Revision: https://phabricator.services.mozilla.com/D161446
2022-11-07 14:02:33 +00:00
Ray Kraesig 54ac39289a Bug 1772908 - [1/6] Drive-by cleanup: simplify use of SyncRunnable r=xpcom-reviewers,necko-reviewers,nika,valentin
`SyncRunnable`'s helper functions take an `nsIRunnable *`; but the most
common way of building nsIRunnables, `NS_NewRunnableFunction`, returns
an `already_AddRefed<nsIRunnable>` instead. Add two new overloads of the
helper functions to eliminate the impedance mismatch.

(This does result in an uncomfortable amount of code duplication. While
we could eliminate that with appropriate use of SFINAE, it'll be simpler
if we wait for C++20 and its `requires` keyword.)

Additionally, add two explicitly-deleted overloads to catch and prevent
a previously-common antipattern that presumably resulted from this type
mismatch: accidentally wrapping the actual runnable in two layers of
`SyncRunnable`. Fix the former use-sites appropriately. (This was
probably harmless, but is also probably best avoided.)

No functional changes. This is in some sense a continuation of bug
1281626.

(This is no longer actually relevant to bug 1772908 due to a different
approach being taken. It remains in the patchset anyway, for
simplicity's sake.)

Differential Revision: https://phabricator.services.mozilla.com/D157131
2022-11-04 21:04:18 +00:00
Greg Stoll d44f201e8f Bug 1760668 - part 1: add ability to blocklist DLLs in socket process. r=gerard-majax
Differential Revision: https://phabricator.services.mozilla.com/D160586
2022-11-04 18:12:59 +00:00
Natalia Kulatova c101e3d2ac Bug 1795087 - land NSS NSS_3_85_BETA1 UPGRADE_NSS_RELEASE, r=nss-reviewers,djackson DONTBUILD
Differential Revision: https://phabricator.services.mozilla.com/D161145
2022-11-03 15:38:32 +00:00
ffxbld 5d12c91e5f No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=dmeehan
Differential Revision: https://phabricator.services.mozilla.com/D161118
2022-11-03 12:01:53 +00:00
Mike Hommey 1c76ee5379 Bug 1797439 - Add more stubs for Rust unwind. r=jschanck
Changes in rust 1.65 make it such that we need more stub symbols for
Rust unwind.

Differential Revision: https://phabricator.services.mozilla.com/D160991
2022-11-02 05:32:34 +00:00
Cristian Tuns 4d37cf70f1 Backed out 19 changesets (bug 1541508) for causing xpcshell failures on test_notHeadlessByDefault.js CLOSED TREE
Backed out changeset 08476fa2bc27 (bug 1541508)
Backed out changeset 0bf7514845db (bug 1541508)
Backed out changeset aa612a5e9ef7 (bug 1541508)
Backed out changeset 6bb9360473f7 (bug 1541508)
Backed out changeset b3d8e92f50c2 (bug 1541508)
Backed out changeset fa40dded133e (bug 1541508)
Backed out changeset 2e7db4aa8d4f (bug 1541508)
Backed out changeset 6098e2eb62ea (bug 1541508)
Backed out changeset 2c599ee639c4 (bug 1541508)
Backed out changeset 7d44f6e2644c (bug 1541508)
Backed out changeset c1279c3d674c (bug 1541508)
Backed out changeset 8bd08a62a590 (bug 1541508)
Backed out changeset 740010cb005c (bug 1541508)
Backed out changeset 0bfc7dd85c62 (bug 1541508)
Backed out changeset c4374a351356 (bug 1541508)
Backed out changeset 44ccfeca7364 (bug 1541508)
Backed out changeset e944e706a523 (bug 1541508)
Backed out changeset 2c59d66f43e4 (bug 1541508)
Backed out changeset a1896eacb6f1 (bug 1541508)
2022-11-01 22:38:52 -04:00
Barret Rennie 8623565ec9 Bug 1541508 - Use Services.env in security/ r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D160145
2022-11-02 02:08:57 +00:00
John Schanck 9a32599fad Bug 1754746 - example tlsserver that fails in handshake. r=necko-reviewers,kershaw
Differential Revision: https://phabricator.services.mozilla.com/D148845
2022-11-01 09:52:52 +00:00
John Schanck 479f9ec25e Bug 1789520 - rust implementation of nssckbi. r=keeler,supply-chain-reviewers
Differential Revision: https://phabricator.services.mozilla.com/D156612
2022-10-31 17:09:43 +00:00
John Schanck d11dd7596d Bug 1795087 - land NSS 4684102858e2 UPGRADE_NSS_RELEASE, r=nss-reviewers,nkulatova
2022-10-31  John M. Schanck  <jschanck@mozilla.com>

	* lib/util/secoid.c:
	Bug 1798150 - on-demand initialization of OID tables. r=nss-
	reviewers,nkulatova

	[4684102858e2] [tip]

2022-10-31  Anna Weine  <anna.weine@mozilla.com>

	* lib/freebl/mpi/primes.c, lib/ssl/dhe-param.c:
	Bug 1792821 - Modification of the primes.c and dhe-params.c in order
	to have better looking tables r=jschanck

	[e512213db1c6]

2022-10-25  John M. Schanck  <jschanck@mozilla.com>

	* doc/rst/releases/index.rst, doc/rst/releases/nss_3_79_2.rst:
	Documentation: Release notes for NSS 3.79.2
	[ea50dc1087db]

Differential Revision: https://phabricator.services.mozilla.com/D160812
2022-10-31 16:41:42 +00:00
ffxbld ae0758de87 No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=diannaS
Differential Revision: https://phabricator.services.mozilla.com/D160782
2022-10-31 13:34:34 +00:00
Emilio Cobos Álvarez a35e196f1c Bug 1798111 - Add good enough equalsize=always support for the cert manager. r=dao
certManager is the only thing using it (both here and in comm-central,
excluding suite/).

There are better ways to do it generally, so just remove it from elsewhere.

Differential Revision: https://phabricator.services.mozilla.com/D160720
2022-10-31 13:02:01 +00:00
Chris Martin fe1a56461e Bug 1797887 - Workaround: allow access to entire filesystem from GPU sandbox r=handyman,jrmuizel
Differential Revision: https://phabricator.services.mozilla.com/D160655
2022-10-28 16:58:01 +00:00
John Schanck ef9d700399 Bug 1787268 - avoid once_cell in ipcclientcerts. r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D155611
2022-10-28 16:53:28 +00:00
Dana Keeler c17587430e Bug 1797649 - remove securityInfo argument from nsISiteSecurityService.processHeader r=jschanck,necko-reviewers
Differential Revision: https://phabricator.services.mozilla.com/D160555
2022-10-27 23:24:21 +00:00
Dana Keeler d94ee2d9f9 Bug 1797461 - remove obsolete test_nss_shutdown.js test r=jschanck
Because nsNSSComponent doesn't shut down NSS any longer, this test isn't
testing a valid configuration of gecko and can be removed.

Differential Revision: https://phabricator.services.mozilla.com/D160579
2022-10-27 23:23:01 +00:00
Mike Hommey a7ce6aad69 Bug 1795245 - Enable warnings as errors in NSS. r=firefox-build-system-reviewers,nalexander
But leave out -Wsign-compare for now because there are too many of them.

Differential Revision: https://phabricator.services.mozilla.com/D159803
2022-10-27 22:26:48 +00:00
John Schanck 968bd89420 Bug 1795087 - land NSS bed3afeff7fd UPGRADE_NSS_RELEASE, r=nss-reviewers,bbeurdouche
Differential Revision: https://phabricator.services.mozilla.com/D160258
2022-10-27 18:15:15 +00:00
ffxbld 509666e0f7 No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=diannaS
Differential Revision: https://phabricator.services.mozilla.com/D160474
2022-10-27 12:58:29 +00:00
Yannis Juglaret 086ea0d49a Bug 1783223 - Enable best ACG variant compatible with system media libraries in RDD on Nightly. r=bobowen
Differential Revision: https://phabricator.services.mozilla.com/D159180
2022-10-27 10:52:03 +00:00
Yannis Juglaret a633bc97e8 Bug 1783223 - Use ACG-with-opt-out for 32-bit builds and Windows 10 1607 in audio decoder on Nightly. r=bobowen
Differential Revision: https://phabricator.services.mozilla.com/D159179
2022-10-27 10:52:02 +00:00
Yannis Juglaret 6bf1f506e7 Bug 1783223 - Define utility function for choosing an ACG variant compatible with system media libraries. r=bobowen
Differential Revision: https://phabricator.services.mozilla.com/D159178
2022-10-27 10:52:02 +00:00
Chris Martin 36e8371ccf Bug 1347710 - Add GPU sandbox to crash reporter annotations r=handyman,gsvelto
Differential Revision: https://phabricator.services.mozilla.com/D160278
2022-10-26 19:23:13 +00:00
Sandor Molnar 590f0de714 Backed out changeset b9a80242b74c (bug 1754746) for causing xpc failures in security/manager/ssl/tests/unit/test_ev_certs.js 2022-10-26 14:58:12 +03:00
Mark Banner 7f3cba09e8 Bug 1795322 - Update toolkit modules references in remaining places. r=mossop,zeid,geckoview-reviewers,calu
Differential Revision: https://phabricator.services.mozilla.com/D160036
2022-10-26 08:06:37 +00:00
Csoregi Natalia 5f9da7b301 Backed out 12 changesets (bug 1795322) for causing multiple failures e.g. test_deletion_request_ping.py. CLOSED TREE
Backed out changeset aba25cbcda51 (bug 1795322)
Backed out changeset a4a35005ada9 (bug 1795322)
Backed out changeset 8e8d790eb0f4 (bug 1795322)
Backed out changeset db8903454bd3 (bug 1795322)
Backed out changeset 60cc71c61cad (bug 1795322)
Backed out changeset bc6a674994ad (bug 1795322)
Backed out changeset 6ac8a611f8c7 (bug 1795322)
Backed out changeset 9fb873ecfb31 (bug 1795322)
Backed out changeset c8a7a40c2a2f (bug 1795322)
Backed out changeset f2c118b6c6ce (bug 1795322)
Backed out changeset 38df43b4a70f (bug 1795322)
Backed out changeset 89aea8373411 (bug 1795322)
2022-10-25 23:47:58 +03:00
Mark Banner fc7befc08d Bug 1795322 - Update toolkit modules references in remaining places. r=mossop,zeid,geckoview-reviewers,calu
Differential Revision: https://phabricator.services.mozilla.com/D160036
2022-10-25 19:49:28 +00:00
John Schanck c1b0fb0815 Bug 1754746 - example tlsserver that fails in handshake. r=necko-reviewers,kershaw
Differential Revision: https://phabricator.services.mozilla.com/D148845
2022-10-25 08:10:30 +00:00
Simon Friedberger 926ced5bcb Bug 1791018 - Add DAP FFI layer. r=mt,emilio
Differential Revision: https://phabricator.services.mozilla.com/D157477
2022-10-24 17:56:12 +00:00
ffxbld 35b09185e5 No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=diannaS
Differential Revision: https://phabricator.services.mozilla.com/D160040
2022-10-24 13:58:54 +00:00
Dana Keeler c48f1af8ff Bug 1779040 - don't update DataStorage if HSTS data hasn't significantly changed r=jschanck
When gecko encounters multiple responses from the same host with substantially
the same HSTS information, the implementation shouldn't update DataStorage,
because that can cause unnecessary writes. "Substantially the same" means the
information is identical except for the expiration time, which can be up to a
day different.

Differential Revision: https://phabricator.services.mozilla.com/D159875
2022-10-20 21:04:26 +00:00
John Schanck e8e708c2ad Bug 1795710 - part 2. clean cert-revocations attachment cache. r=keeler,leplatrem,robwu
Differential Revision: https://phabricator.services.mozilla.com/D159536
2022-10-20 20:52:12 +00:00
John Schanck 41fc85955e Bug 1795710 - part 1. avoid deprecated downloadToDisk function. r=keeler,leplatrem,robwu
Differential Revision: https://phabricator.services.mozilla.com/D159535
2022-10-20 20:52:11 +00:00
Alexandre Lissy c294fd8665 Bug 1796391 - Force init signed policy rules for delayed mitigations on MSIX r=bobowen
Differential Revision: https://phabricator.services.mozilla.com/D159802
2022-10-20 17:03:43 +00:00
Csoregi Natalia 87ffabf991 Backed out 2 changesets (bug 1795710) for causing failures on test_crlite_filters.js. CLOSED TREE
Backed out changeset ac705dd27e0a (bug 1795710)
Backed out changeset 747e24d0339e (bug 1795710)
2022-10-20 20:58:33 +03:00
Cristian Tuns 93ee7434b2 Backed out changeset 89d3bd40e892 (bug 1796391) as requested by gerard-majax CLOSED TREE 2022-10-20 12:37:37 -04:00
John Schanck c381df22d6 Bug 1795710 - part 2. clean cert-revocations attachment cache. r=keeler,leplatrem,robwu
Differential Revision: https://phabricator.services.mozilla.com/D159536
2022-10-20 16:28:41 +00:00
John Schanck dbebc739ff Bug 1795710 - part 1. avoid deprecated downloadToDisk function. r=keeler,leplatrem,robwu
Differential Revision: https://phabricator.services.mozilla.com/D159535
2022-10-20 16:28:40 +00:00
Alexandre Lissy 475f354462 Bug 1796391 - Always init signed policy rules r=bobowen
Differential Revision: https://phabricator.services.mozilla.com/D159802
2022-10-20 14:19:33 +00:00
ffxbld 5538c576a6 No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=diannaS
Differential Revision: https://phabricator.services.mozilla.com/D159848
2022-10-20 13:00:11 +00:00
Norisz Fay c5c002f81f Backed out 4 changesets (bug 1791018, bug 1791394) for causing xpcshell failures on test_dap.js CLOSED TREE
Backed out changeset b177970803d5 (bug 1791394)
Backed out changeset f41291f1fa37 (bug 1791018)
Backed out changeset 52ba173b1c2f (bug 1791018)
Backed out changeset e0ebc68e7d18 (bug 1791018)
2022-10-20 07:33:41 +03:00
Simon Friedberger 5bf9a60ea9 Bug 1791018 - Add DAP FFI layer. r=mt,emilio
Differential Revision: https://phabricator.services.mozilla.com/D157477
2022-10-19 21:42:43 +00:00
Dana Keeler 9c1b9475f3 Bug 1793841 - deserialize nsITransportSecurityInfo without already having an instance of it r=jschanck,necko-reviewers,dragana
This is an important step in making nsITransportSecurityInfo constant.

Depends on D157994

Differential Revision: https://phabricator.services.mozilla.com/D157995
2022-10-18 21:25:03 +00:00
Mark Banner 2ffde1e92f Bug 1792341 - Migrate more toolkit/modules consumers to use direct ES module import. r=Gijs,webdriver-reviewers,perftest-reviewers,necko-reviewers,geckoview-reviewers,preferences-reviewers,application-update-reviewers,pip-reviewers,credential-management-reviewers,sgalich,owlish,bytesized,AlexandruIonescu,whimboo,mconley,mixedpuppy
Mainly automated changes. Some manual ESLint fixes and whitespace cleanup.

Differential Revision: https://phabricator.services.mozilla.com/D158452
2022-10-18 11:21:26 +00:00
Noemi Erli 5a21645f73 Backed out 2 changesets (bug 1793841) for causing Gtest failures CLOSED TREE
Backed out changeset 4d39c423b92e (bug 1793841)
Backed out changeset 5cfb5f595add (bug 1793841)
2022-10-18 04:29:44 +03:00
Dana Keeler 0d78f1f283 Bug 1793841 - deserialize nsITransportSecurityInfo without already having an instance of it r=jschanck,necko-reviewers,dragana
This is an important step in making nsITransportSecurityInfo constant.

Depends on D157994

Differential Revision: https://phabricator.services.mozilla.com/D157995
2022-10-18 00:18:09 +00:00
Mike Hommey 969d7bb6fd Bug 1795219 - Remove -Wall setup in security/{ct,certverifier}/moz.build. r=firefox-build-system-reviewers,andi
The use of `-Xclang -Wall` somehow makes `-Wno-unknown-pragmas`
ineffective. `-Xclang -Wno-unknown-pragmas` does however work.

But we don't need to set `-Xclang -Wall` from the moz.builds in the first
place, as that's already done properly via warnings.configure (setting
-Wall on non-clang-cl and -W3 on clang-cl, which is the equivalent).

Differential Revision: https://phabricator.services.mozilla.com/D159366
2022-10-17 21:55:03 +00:00
Dana Keeler b195dc4082 Bug 1719706 - don't wait for the loadable roots task in nsNSSComponent::ShutdownNSS() r=jschanck,necko-reviewers,valentin
In bug 1546720, nsNSSComponent::ShutdownNSS() stopped unloading the builtin
roots and osclientcerts modules to avoid crashes due to NSS' pervasive thread
safety issues. Since that function no longer unloads the builtin module, it
shouldn't need to wait until the task that loads it has completed. Hopefully
this will avoid some shutdown hangs.

Note that when NSS is finally shut down, all threads other than the main thread
have been joined, so there shouldn't be any concurrency concerns at that time.

Differential Revision: https://phabricator.services.mozilla.com/D159434
2022-10-17 16:11:30 +00:00
ffxbld 062797d3d6 No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=dmeehan
Differential Revision: https://phabricator.services.mozilla.com/D159497
2022-10-17 12:10:23 +00:00
Dennis Jackson 0e750e0b2e Bug 1792135 - land NSS NSS_3_84_RTM UPGRADE_NSS_RELEASE, r=nss-reviewers,jschanck
Differential Revision: https://phabricator.services.mozilla.com/D159278
2022-10-13 15:29:32 +00:00
John Schanck 59119c81d9 Bug 1794479 - Gather telemetry on the age of OCSP responses used to override CRLite. r=keeler
Defines the OCSP_AGE_AT_CRLITE_OVERRIDE histogram which records the age of an
OCSP response, in hours, when CRLite says a certificate is revoked and OCSP
says it's OK.

Differential Revision: https://phabricator.services.mozilla.com/D158991
2022-10-13 14:08:23 +00:00
ffxbld 437a3ce886 No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=dmeehan
Differential Revision: https://phabricator.services.mozilla.com/D159263
2022-10-13 12:31:11 +00:00
Dana Keeler 0dedda0179 Bug 1720118 - store certificate error override and failed certificate chain information in the TLS token cache r=kershaw,jschanck,necko-reviewers
Differential Revision: https://phabricator.services.mozilla.com/D158793
2022-10-12 23:54:11 +00:00
Dana Keeler 07cf1e9f2c Bug 1720118 - always use the TLS token cache r=kershaw,necko-reviewers,ci-and-tooling,jmaher
Differential Revision: https://phabricator.services.mozilla.com/D158792
2022-10-12 23:54:10 +00:00
John Schanck e2bc1afa4f Bug 1794450 - Gather telemetry on use of revocation checking mechanisms. r=keeler
Adds the CERT_REVOCATION_MECHANISMS histogram with bins "CRLite", "Stapled OCSP", "Cached OCSP", "OCSP", "OneCRL", and "Short Validity" to gauge how often we use each certificate revocation checking mechanisms. The Short Validity bin counts cases where a revocation check was not performed because the certificate had a short validity period. The other bin names are self-explanatory. We may use more than one mechanism per certificate, so we may accumulate to more than one bin per certificate.

Differential Revision: https://phabricator.services.mozilla.com/D158975
2022-10-12 21:05:08 +00:00
Cristian Tuns f2f36b1381 Backed out 2 changesets (bug 1720118) for causing Hybrid bustages on nsHashtablesFwd.h CLOSED TREE
Backed out changeset af570580e2f7 (bug 1720118)
Backed out changeset 57b8a6400749 (bug 1720118)
2022-10-12 14:20:47 -04:00
Dana Keeler eab44906ca Bug 1720118 - store certificate error override and failed certificate chain information in the TLS token cache r=kershaw,jschanck,necko-reviewers
Differential Revision: https://phabricator.services.mozilla.com/D158793
2022-10-12 17:43:29 +00:00
Dana Keeler d894513c37 Bug 1720118 - always use the TLS token cache r=kershaw,necko-reviewers,ci-and-tooling,jmaher
Differential Revision: https://phabricator.services.mozilla.com/D158792
2022-10-12 17:43:28 +00:00
Dana Keeler ad795fde70 Bug 1520297 - enable intermediate preloading on Android r=jschanck
The current collection of preloaded intermediates is under 3MB. This should not
be a prohibitive amount for mobile users to download. Once downloaded, updates
to the collection are minimal and again should not be an issue.

Differential Revision: https://phabricator.services.mozilla.com/D159092
2022-10-11 21:53:59 +00:00
ffxbld f16ca73e4c No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D158942
2022-10-10 13:14:27 +00:00
Dennis Jackson 7da0562237 Bug 1792135 - land NSS NSS_3_84_BETA1 UPGRADE_NSS_RELEASE, r=nss-reviewers,nkulatova
Differential Revision: https://phabricator.services.mozilla.com/D158772
2022-10-06 22:47:02 +00:00
Alexandre Lissy 6a92f8d147 Bug 1788596 - Use Utility process actor names for crash annotations r=gsvelto
Differential Revision: https://phabricator.services.mozilla.com/D156286
2022-10-06 15:51:56 +00:00
Alexandre Lissy bb317b2bae Bug 1788596 - Remove UTILITY_AUDIO_DECODING_GENERIC r=nika,media-playback-reviewers,alwu
Differential Revision: https://phabricator.services.mozilla.com/D156285
2022-10-06 15:51:56 +00:00
Alexandre Lissy f4906ff3eb Bug 1788596 - Merge UtilityAudioDecoderSandboxPolicy into UtilitySandboxPolicy r=jld
Differential Revision: https://phabricator.services.mozilla.com/D156284
2022-10-06 15:51:55 +00:00
Kershaw Chang 62cd9065c3 Bug 1720601 - Allow token cache to store more than one token per key, r=necko-reviewers,dragana
1. Allow to store more than one token per key.
2. Allow to use the token only once. The token will be removed after reading it.
3. Add a gtest.

Differential Revision: https://phabricator.services.mozilla.com/D153605
2022-10-06 12:56:01 +00:00
Sandor Molnar 9e30e89e90 Backed out 13 changesets (bug 1788596) for causing build bustage in toolkit/components/processtools/ProcInfo_common.cpp CLOSED TREE
Backed out changeset 620c85305800 (bug 1788596)
Backed out changeset 1f64776a859a (bug 1788596)
Backed out changeset 707e4c9c8801 (bug 1788596)
Backed out changeset 2221a97ebe97 (bug 1788596)
Backed out changeset d50fd0551159 (bug 1788596)
Backed out changeset 7e2ad8c47afb (bug 1788596)
Backed out changeset f87c5fb2c36f (bug 1788596)
Backed out changeset 61dd9a9eb714 (bug 1788596)
Backed out changeset a67c4ea1c8b3 (bug 1788596)
Backed out changeset 1be7af1214cf (bug 1788596)
Backed out changeset e99c7089bf93 (bug 1788596)
Backed out changeset 9a87f108548b (bug 1788596)
Backed out changeset 3dd59224f38b (bug 1788596)
2022-10-06 16:28:46 +03:00
ffxbld 22a6ff72e5 No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=pascalc
Differential Revision: https://phabricator.services.mozilla.com/D158756
2022-10-06 12:19:24 +00:00
Alexandre Lissy 16c9919af1 Bug 1788596 - Use Utility process actor names for crash annotations r=gsvelto
Differential Revision: https://phabricator.services.mozilla.com/D156286
2022-10-06 10:56:41 +00:00
Alexandre Lissy 1d211b0ec1 Bug 1788596 - Remove UTILITY_AUDIO_DECODING_GENERIC r=nika,media-playback-reviewers,alwu
Differential Revision: https://phabricator.services.mozilla.com/D156285
2022-10-06 10:56:41 +00:00
Alexandre Lissy 301e159051 Bug 1788596 - Merge UtilityAudioDecoderSandboxPolicy into UtilitySandboxPolicy r=jld
Differential Revision: https://phabricator.services.mozilla.com/D156284
2022-10-06 10:56:40 +00:00
Sandor Molnar 2fb4e10f0d Backed out 13 changesets (bug 1788596) for causing browser-chrome failures in security/sandbox/test/browser_sandbox_test.js CLOSED TREE
Backed out changeset 338c18d01cfd (bug 1788596)
Backed out changeset 9d4a5c557191 (bug 1788596)
Backed out changeset 1d1d15dbe44c (bug 1788596)
Backed out changeset e9d29218beba (bug 1788596)
Backed out changeset 397e6c6587f3 (bug 1788596)
Backed out changeset 077fd3a987ca (bug 1788596)
Backed out changeset 2fc674146915 (bug 1788596)
Backed out changeset 4ebb8837ee1a (bug 1788596)
Backed out changeset 9040533dabe1 (bug 1788596)
Backed out changeset 8b27ee4d4168 (bug 1788596)
Backed out changeset 93f50c2f0b9e (bug 1788596)
Backed out changeset 3e7125be66fa (bug 1788596)
Backed out changeset 63ee00ea9be6 (bug 1788596)
2022-10-06 10:28:00 +03:00
Alexandre Lissy dd8daf38e3 Bug 1788596 - Use Utility process actor names for crash annotations r=gsvelto
Differential Revision: https://phabricator.services.mozilla.com/D156286
2022-10-06 06:14:06 +00:00
Alexandre Lissy 272b0c9273 Bug 1788596 - Remove UTILITY_AUDIO_DECODING_GENERIC r=nika,media-playback-reviewers,alwu
Differential Revision: https://phabricator.services.mozilla.com/D156285
2022-10-06 06:14:06 +00:00
Alexandre Lissy 592b1be2e3 Bug 1788596 - Merge UtilityAudioDecoderSandboxPolicy into UtilitySandboxPolicy r=jld
Differential Revision: https://phabricator.services.mozilla.com/D156284
2022-10-06 06:14:05 +00:00
Dana Keeler 644aa7999c Bug 1716082 - clear all ongoing connections when removing certificate error overrides r=jschanck
Differential Revision: https://phabricator.services.mozilla.com/D158613
2022-10-05 20:15:02 +00:00
Emilio Cobos Álvarez d71d3c19ed Bug 1792809 - Make library and other windows keep stretching after bug 1665476. r=eemeli
Much like the dialog changes in bug 1792730.

Differential Revision: https://phabricator.services.mozilla.com/D158351
2022-10-04 10:21:05 +00:00
ffxbld c6a00ce965 No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=dmeehan
Differential Revision: https://phabricator.services.mozilla.com/D158497
2022-10-03 13:20:51 +00:00
ffxbld 87d48b75dd No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D158326
2022-09-29 16:44:52 +00:00
Yannis Juglaret adebd56af9 Bug 1766432 - Part 4: Enable Arbitrary Code Guard in MinGW builds. r=bobowen
Differential Revision: https://phabricator.services.mozilla.com/D157906
2022-09-29 15:29:15 +00:00
Yannis Juglaret eaa892440f Bug 1766432 - Part 3: Add Part 2 to the list of patches to apply when updating third-party. r=bobowen
Differential Revision: https://phabricator.services.mozilla.com/D157905
2022-09-29 15:29:15 +00:00
Yannis Juglaret 0b60970f1b Bug 1766432 - Part 2: Propagate custom definition for PROCESS_MITIGATION_DYNAMIC_CODE_POLICY to third-party. r=bobowen
Differential Revision: https://phabricator.services.mozilla.com/D157904
2022-09-29 15:29:14 +00:00
Mark Banner 8d1ebcb9d6 Bug 1792365 - Convert toolkit/modules consumers to use ES module imports directly. r=webdriver-reviewers,perftest-reviewers,geckoview-reviewers,extension-reviewers,preferences-reviewers,desktop-theme-reviewers,application-update-reviewers,pip-reviewers,credential-management-reviewers,robwu,Gijs,sgalich,bytesized,AlexandruIonescu,dao,m_kato
Differential Revision: https://phabricator.services.mozilla.com/D158094
2022-09-29 06:52:34 +00:00
ffxbld 4af4ff2e5b No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D158124
2022-09-27 16:27:33 +00:00
ffxbld 4e99c68740 No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=dmeehan
Differential Revision: https://phabricator.services.mozilla.com/D157923
2022-09-22 12:46:23 +00:00
Jed Davis a466bdb2c4 Bug 1780312 - Part 2: Allow fstatfs in the Linux RDD sandbox policy. r=gcp
As discussed in the last patch, allowing `fstatfs` will also make
`statfs` work on any path that the process could open for reading
(subject to sandbox policy).

Differential Revision: https://phabricator.services.mozilla.com/D157542
2022-09-21 17:57:54 +00:00
Jed Davis 3b5c74387e Bug 1780312 - Part 1: Move the statfs replacement into the common sandbox policy. r=gcp
We have code to handle `statfs` calls in content processes by
intercepting them and calling `open` and `fstatfs` instead; the former
is then recursively intercepted and brokered.  This patch moves that
feature into the common policy, but does not allow `fstatfs` in any
other sandbox types (yet; see next patch).  This doesn't affect security
because the caller could have attempted the `open` and `fstatfs`
syscalls itself.

Differential Revision: https://phabricator.services.mozilla.com/D157541
2022-09-21 17:57:54 +00:00
Joel Maher 4c4438b4f7 Bug 1536208 - removing old aarch64 manifest annotations. r=aryx,application-update-reviewers,bytesized
Differential Revision: https://phabricator.services.mozilla.com/D157677
2022-09-21 15:35:02 +00:00
Andreea Pavel 9f24806607 Backed out 2 changesets (bug 1768250, bug 1720601) for multiple failures CLOSED TREE
Backed out changeset d6caea480d4d (bug 1768250)
Backed out changeset 97eccf466bf3 (bug 1720601)
2022-09-20 16:50:29 +03:00
Kershaw Chang 137b76a861 Bug 1720601 - Allow token cache to store more than one token per key, r=necko-reviewers,dragana
1. Allow to store more than one token per key.
2. Allow to use the token only once. The token will be removed after reading it.
3. Add a gtest.

Differential Revision: https://phabricator.services.mozilla.com/D153605
2022-09-20 12:58:06 +00:00
Dana Keeler bdb75eecd3 Bug 1790451 - remove now-unnecessary QueryInterface(Ci.nsITransportSecurityInfo) calls r=jschanck,webdriver-reviewers,necko-reviewers,application-update-reviewers,nalexander,valentin
Differential Revision: https://phabricator.services.mozilla.com/D157166
2022-09-20 03:58:50 +00:00
ffxbld 26a22933ed No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D157632
2022-09-19 13:30:31 +00:00
John Schanck ef80532ec8 Bug 1787505 - land NSS NSS_3_83_RTM UPGRADE_NSS_RELEASE, r=nss-reviewers,bbeurdouche
Differential Revision: https://phabricator.services.mozilla.com/D157510
2022-09-15 19:24:37 +00:00
Nika Layzell 0316dc51b9 Bug 1790614 - Part 2: Use {ASSERT,ENSURE}_NS_{SUCCEEEDED,FAILED} in gtests, r=ahal,necko-reviewers
These macros will produce better outputs when they fail than these existing
patterns using `ENSURE_TRUE(NS_SUCCEEDED(...))` or similar, so this is a bulk
rewrite of existing tests to use them.

It should also help with discoverability when people base their tests off of
other existing tests.

Differential Revision: https://phabricator.services.mozilla.com/D157214
2022-09-15 14:51:50 +00:00
ffxbld 2bddac315a No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D157441
2022-09-15 13:07:24 +00:00
Dana Keeler 0d0b51d1e4 Bug 1790152 - use nsIX509Cert directly in IPC in AddCertException r=nika
This avoids unnecessarily serializing the certificate to a string before
sending it over IPC.

Depends on D157007

Differential Revision: https://phabricator.services.mozilla.com/D157008
2022-09-14 21:49:53 +00:00
Narcis Beleuzu 855f519b0a Backed out changeset a389830fb63f (bug 1783223) for causing bug 1790713 2022-09-14 19:38:52 +03:00
John Schanck 262ca63d8f Bug 1787505 - land NSS NSS_3_83_BETA2 UPGRADE_NSS_RELEASE, r=nss-reviewers,djackson
Differential Revision: https://phabricator.services.mozilla.com/D156982
2022-09-13 16:39:55 +00:00
Nika Layzell 3d9a6d0374 Bug 1789902 - Part 2: Use XPCOM static components instead of Services in Rust, r=xpcom-reviewers,necko-reviewers,barret,valentin
Differential Revision: https://phabricator.services.mozilla.com/D156891
2022-09-13 13:47:13 +00:00
Jeff Muizelaar 64aded89bb Bug 1783223 - Enable Arbitratry Code Guard in RDD on Nightly. r=bobowen
This was previously disabled in bug 1673194 because of start up crashes.
It seems like msmpeg2vdec.dll may use dynamic code to support encrypted
code that uses. In recent versions of Windows this only seems used
in the 32bit version. The 32bit version will opt out of ACG on the
threads where it needs to use VirtualProtect so we use the weaker
variant there.

Differential Revision: https://phabricator.services.mozilla.com/D153762
2022-09-12 16:32:08 +00:00
ffxbld d7cbba5f61 No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D157108
2022-09-12 12:48:53 +00:00
Dennis Jackson 400f4a73bf Bug 1789458 - Backout asserts from 1788290. r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D156944
2022-09-09 17:15:10 +00:00
Cosmin Sabou ecfd7cff79 Backed out changeset 7dd0bcf1eeed (bug 1787505) for causing mass mochitest failures. r=land NSS NSS_3_83_BETA1 UPGRADE_NSS_RELEASE CLOSED TREE 2022-09-09 01:53:53 +03:00
John Schanck db095eb9f2 Bug 1787505 - land NSS NSS_3_83_BETA1 UPGRADE_NSS_RELEASE, r=keeler
2022-09-08  John M. Schanck  <jschanck@mozilla.com>

	* lib/nss/nss.h, lib/softoken/softkver.h, lib/util/nssutil.h:
	Set version numbers to 3.83 beta
	[97fec8885336] [NSS_3_83_BETA1]

	* lib/softoken/pkcs11.c:
	Bug 1789886 - resource leak in NSC_OpenSession. r=bbeurdouche

	[b225a756abc2]

	* lib/pkcs12/p12d.c:
	Bug 1788875 - Remove set-but-unused variables from
	SEC_PKCS12DecoderValidateBags. r=nss-reviewers,bbeurdouche

	[132476bbefc5]

2022-09-07  Ludovic Hirlimann  <ludovic@mozilla.com>

	* cmd/lib/secpwd.c, coreconf/BeOS.mk, coreconf/config.mk,
	coreconf/nsinstall/nsinstall.c, lib/certhigh/ocsp.c,
	lib/dbm/include/mcom_db.h, lib/freebl/sysrand.c,
	lib/freebl/unix_rand.c, lib/jar/jar.h, lib/jar/jarfile.c,
	lib/nss/nssinit.c, lib/ssl/config.mk, lib/ssl/sslimpl.h,
	lib/ssl/sslmutex.c, lib/ssl/sslmutex.h, lib/ssl/sslnonce.c,
	lib/ssl/sslsnce.c, lib/ssl/sslsock.c, lib/ssl/unix_err.c,
	lib/util/secport.c, lib/util/secport.h, lib/zlib/zconf.h,
	lib/zlib/zutil.h:
	Bug 1563221 remove older oses that are unused part3/ BeOS r=nss-
	reviewers,djackson

	Depends on D36757

	[e0b144ea73b7]

	* coreconf/IRIX.mk, coreconf/IRIX5.2.mk, coreconf/IRIX5.3.mk,
	coreconf/IRIX5.mk, coreconf/IRIX6.2.mk, coreconf/IRIX6.3.mk,
	coreconf/IRIX6.5.mk, coreconf/IRIX6.mk, coreconf/arch.mk,
	lib/freebl/Makefile, lib/freebl/mpi/mpi.h, tests/set_environment:
	Bug 1563221 remove older unix support in NSS part 3 Irix r=nss-
	reviewers,djackson

	Depends on D36756

	[ee2e9b06b590]

	* lib/dbm/config/config.mk:
	Bug 1563221 remove support for older unix in NSS part 2 DGUX r=nss-
	reviewers,djackson

	Depends on D36755

	[b066df5e9148]

	* cmd/modutil/install.c, coreconf/OSF1.mk, coreconf/OSF1V2.0.mk,
	coreconf/OSF1V3.0.mk, coreconf/OSF1V3.2.mk, coreconf/OSF1V4.0.mk,
	coreconf/OSF1V4.0B.mk, coreconf/OSF1V4.0D.mk, coreconf/OSF1V5.0.mk,
	coreconf/OSF1V5.1.mk, coreconf/arch.mk, lib/dbm/config/config.mk,
	lib/freebl/Makefile, lib/freebl/arcfour.c, lib/freebl/mpi/mpi.c,
	lib/freebl/unix_rand.c, lib/ssl/sslsnce.c, tests/header,
	tests/mksymlinks, tests/nssqa, tests/platformlist.tbx,
	tests/set_environment:
	Bug 1563221 remove support for older unix in NSS part 1 OSF r=nss-
	reviewers,djackson

	[17f9365a7a1d]

2022-09-07  John M. Schanck  <jschanck@mozilla.com>

	* lib/ckfw/builtins/nssckbi.h:
	Bug 1778413 - Set nssckbi version number to 2.58. r=nss-
	reviewers,bbeurdouche

	Depends on D156583

	[2367ce7cdd32]

	* lib/ckfw/builtins/certdata.txt:
	Bug 1785297 - Add two SECOM root certificates to NSS.
	r=KathleenWilson

	Depends on D156582

	[9be22516dac9]

	* lib/ckfw/builtins/certdata.txt:
	Bug 1787075 - Add two DigitalSign root certificates to NSS.
	r=KathleenWilson

	Depends on D156581

	[04200c0488ee]

	* lib/ckfw/builtins/certdata.txt:
	Bug 1778412 - Remove Camerfirma Global Chambersign Root from NSS.
	r=KathleenWilson

	[a217a119cff1]

2022-09-06  John M. Schanck  <jschanck@mozilla.com>

	* lib/softoken/pkcs11.c, lib/softoken/pkcs11u.c:
	Bug 1767921 - check SFTKSlot head after acquiring session lock.
	r=rrelyea

	[ed04d4729b99]

2022-08-30  Kai Engert  <kaie@kuix.de>

	* coreconf/coreconf.dep:
	Dummy change, trigger a build to test latest NSPR commits.
	[bb1ae751d359]

Differential Revision: https://phabricator.services.mozilla.com/D156884
2022-09-08 20:11:56 +00:00
ffxbld 1f2d882e17 No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D156815
2022-09-08 13:47:22 +00:00
Bob Owen 3d2f6719a8 Bug 1788233: Remove PermissionsService from process Windows sandboxing code. r=handyman
Depends on D156069

Differential Revision: https://phabricator.services.mozilla.com/D156087
2022-09-07 09:42:04 +00:00
Bob Owen 692f8a5532 Bug 1689136: Apply MITIGATION_HARDEN_TOKEN_IL_POLICY to main and launcher processes. r=handyman
This also ensures that DEP without ATL thunk is enforced.

Differential Revision: https://phabricator.services.mozilla.com/D156069
2022-09-07 09:42:04 +00:00
ffxbld dcae9a94c1 No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D156422
2022-09-06 03:01:37 +00:00
Jan Varga c8263583ce Bug 1789133 - Fix non-unified-build bustage in SandboxTestingChildTests.h; r=gerard-majax
Differential Revision: https://phabricator.services.mozilla.com/D156376
2022-09-04 15:01:06 +00:00
alwu 429ad203bb Bug 1785738 - part5 : don't set alternative desktop for the mf cdm process. r=bobowen
When setting alternative destktop for the mf cdm process, it seems
interfering the media foundation framework and make the video playback
stutter.

But if we call `SetAlternateDesktop(false)` which won't create a new
window station, then the video playback won't be affected.

My guess is that there might be some internal performance issues
inside the media foundation framework when using Dcomp API between
different window stations.

In addition, Chromium also didn't enable alternative desktop for their
mf cdm process. So it makes sense to us to disalbe that as well.

Differential Revision: https://phabricator.services.mozilla.com/D155026
2022-09-03 00:54:00 +00:00
alwu 24c4bb6bd5 Bug 1785738 - part1 : add new type of utility process. r=bobowen,gerard-majax,fluent-reviewers,flod
Create a new type of utility process which would be used for media
foundation media engine CDM usage. The media engine is a media pipeline
provided by the Windows Media Foundation, and our final goal is to use
that pipeline to play encrypted content in order to achieve Widevine L1
protection to allow users to watch high resolution videos.

Differential Revision: https://phabricator.services.mozilla.com/D154033
2022-09-03 00:53:58 +00:00
Dana Keeler 8c1204afeb Bug 1788856 - initialize NSS as needed in nsNSSCertificate r=jschanck
Previously, instantiating an nsIX509Cert (implemented by nsNSSCertificate)
would cause NSS to be initialized. However, if 'new nsNSSCertificate()' was
called directly (rather than going through XPCOM), NSS would not be
initialized. This didn't seem to be a problem until bug 1787942 changed how
nsITransportSecurityInfo was sent between processes for PHttpChannel and
HttpChannelOnStartRequestArgs (namely, by using the direct IPC support rather
than first serializing to a string, sending it over IPC, and then deserializing
it). That direct IPC implementation uses 'new nsNSSCertificate()', which is now
a problem.

nsNSSCertificate used to make extensive use of NSS, which warranted ensuring
NSS was initialized before creating one at all. Now, as of bug 1748341, the
cases where nsNSSCertificate uses NSS are limited and clearly delineated.
Accordinly, this change makes it so nsNSSCertificate only initializes NSS if
and when it needs it, rather than relying on the XPCOM boilerplate to
initialize NSS first.

Differential Revision: https://phabricator.services.mozilla.com/D156353
2022-09-02 22:26:37 +00:00
Dennis Jackson a7c2f2a620 Bug 1788290 - Add the telemetry for Web Privacy. r=keeler.
Differential Revision: https://phabricator.services.mozilla.com/D156107
2022-09-02 20:59:35 +00:00
Dennis Jackson 97f4470f70 Bug 1788290 - Record whether Private DNS was used for a TLS Connection. r=keeler,necko-reviewers,valentin.
Differential Revision: https://phabricator.services.mozilla.com/D156106
2022-09-02 20:59:35 +00:00
Dennis Jackson a0e440195f Bug 1788290 - Record whether OCSP requests were made whilst making a TLS connection. r=keeler,necko-reviewers.
Differential Revision: https://phabricator.services.mozilla.com/D156105
2022-09-02 20:59:34 +00:00
Butkovits Atila 7fed5a7ef2 Backed out 3 changesets (bug 1788290) for causing build bustages. CLOSED TREE
Backed out changeset 52d5a06be477 (bug 1788290)
Backed out changeset a3b5d214b5d4 (bug 1788290)
Backed out changeset e94a38b79965 (bug 1788290)
2022-09-02 19:13:34 +03:00
Dennis Jackson ea92d08e39 Bug 1788290 - Add the telemetry for Web Privacy. r=keeler.
Differential Revision: https://phabricator.services.mozilla.com/D156107
2022-09-02 14:16:08 +00:00
Dennis Jackson 4b3a179797 Bug 1788290 - Record whether Private DNS was used for a TLS Connection. r=keeler,necko-reviewers,valentin.
Differential Revision: https://phabricator.services.mozilla.com/D156106
2022-09-02 14:16:07 +00:00
Dennis Jackson 0e389c049e Bug 1788290 - Record whether OCSP requests were made whilst making a TLS connection. r=keeler,necko-reviewers.
Differential Revision: https://phabricator.services.mozilla.com/D156105
2022-09-02 14:16:07 +00:00
Alexandre Lissy ac1cbfd25b Bug 1788689 - Disable MITIGATION_DYNAMIC_CODE_DISABLE for more MinGW r=bobowen
Differential Revision: https://phabricator.services.mozilla.com/D156273
2022-09-02 09:17:50 +00:00
Dana Keeler 865a8ba6b7 Bug 1778997 - provide pkcs11 rust bindings in-tree r=jschanck,supply-chain-reviewers
Differential Revision: https://phabricator.services.mozilla.com/D154258
2022-09-01 20:48:25 +00:00
ffxbld e57987e3d0 No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D156168
2022-09-01 13:14:23 +00:00
Alexandre Lissy b135ca0732 Bug 1780796 - Use one process per platform decoder module sandbox requirements r=alwu,nika,fluent-reviewers,flod
Differential Revision: https://phabricator.services.mozilla.com/D152545
2022-09-01 12:59:32 +00:00
ffxbld 353baa4945 No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D155828
2022-08-29 13:18:01 +00:00
Iulian Moraru 26ac918f96 Backed out changeset 8feed89ecea4 (bug 1787268) for causing build bustages. CLOSED TREE 2022-08-27 01:31:43 +03:00
John Schanck 7871c25d95 Bug 1787268 - avoid once_cell in ipcclientcerts. r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D155611
2022-08-26 19:58:46 +00:00
Dana Keeler 56e7ae8648 Bug 1781104 - replace error type booleans with error category in nsITransportSecurityInfo r=necko-reviewers,mixedpuppy,jschanck,mccr8
Differential Revision: https://phabricator.services.mozilla.com/D154561
2022-08-26 18:48:38 +00:00
Dana Keeler b4c45d4248 Bug 1781104 - remove unnecessary bits parameter from nsICertOverrideService r=djackson,necko-reviewers,geckoview-reviewers,extension-reviewers,kershaw,calu
Differential Revision: https://phabricator.services.mozilla.com/D152826
2022-08-26 18:48:38 +00:00
Dana Keeler 40cd3d5efd Bug 1781104 - remove unused 'add override by fingerprint' API from nsICertOverrideService r=djackson
`rememberTemporaryValidityOverrideUsingFingerprint` is no longer used in
`nsICertOverrideService` and can be removed.

Differential Revision: https://phabricator.services.mozilla.com/D152825
2022-08-26 18:48:37 +00:00
Dennis Jackson 7996136fb5 Bug 1787505 - land NSS e5c1e1a0eaff UPGRADE_NSS_RELEASE, r=nss-reviewers,jschanck
Differential Revision: https://phabricator.services.mozilla.com/D155711
2022-08-26 16:40:01 +00:00
Mark Banner e3bad2d44a Bug 1786197 - Turn on ESLint rule for prefer-boolean-length-check for security. r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D155165
2022-08-26 13:39:34 +00:00
ffxbld 7de1940b30 No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D155573
2022-08-25 14:49:54 +00:00
ffxbld 4955e3dc0f No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D155332
2022-08-23 13:01:05 +00:00
Dana Keeler 9c30613d90 Bug 1784098 - make nsISocketTransport.securityInfo explicit as nsISSLSocketControl r=necko-reviewers,kershaw
Differential Revision: https://phabricator.services.mozilla.com/D154257
2022-08-23 03:37:17 +00:00
Dana Keeler e7fe86c6a0 Bug 1784098 - move nsITLSServerConnectionInfo from nsISocketTransport.securityInfo to securityCallbacks r=necko-reviewers,kershaw
In preparation for making nsISocketTransport.securityInfo a concrete type
(nsITransportSecurityInfo), nsITLSServerConnectionInfo needs to be moved off of
securityInfo. securityCallbacks seems like a reasonable place.

Differential Revision: https://phabricator.services.mozilla.com/D154256
2022-08-23 03:37:17 +00:00
Narcis Beleuzu 5fb7ed6946 Backed out 4 changesets (bug 1784098) for bustages on nsCOMPtr.h . CLOSED TREE
Backed out changeset d22ac7bcb472 (bug 1784098)
Backed out changeset a97052238dba (bug 1784098)
Backed out changeset a2bb8ecd6170 (bug 1784098)
Backed out changeset 16ab6547619c (bug 1784098)
2022-08-22 20:50:21 +03:00
Dana Keeler 5a1655a87d Bug 1784098 - make nsISocketTransport.securityInfo explicit as nsISSLSocketControl r=necko-reviewers,kershaw
Differential Revision: https://phabricator.services.mozilla.com/D154257
2022-08-22 16:32:01 +00:00
Dana Keeler 0142f6d701 Bug 1784098 - move nsITLSServerConnectionInfo from nsISocketTransport.securityInfo to securityCallbacks r=necko-reviewers,kershaw
In preparation for making nsISocketTransport.securityInfo a concrete type
(nsITransportSecurityInfo), nsITLSServerConnectionInfo needs to be moved off of
securityInfo. securityCallbacks seems like a reasonable place.

Differential Revision: https://phabricator.services.mozilla.com/D154256
2022-08-22 16:32:01 +00:00
ffxbld 6cb19f9e34 No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D155203
2022-08-22 13:44:16 +00:00
Mark Banner ff257fb43c Bug 1786076 - Enable ESlint rule no-unused-vars on the global scope for security/manager/ssl/ xpcshell-tests. r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D155101
2022-08-19 20:44:02 +00:00
Barret Rennie 6de0f1b749 Bug 1772923 - Port osfile.jsm usage to IOUtils in security/manager/ r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D153711
2022-08-19 20:04:57 +00:00
Butkovits Atila e8ee25ae56 Backed out changeset ef7acc434052 (bug 1783223) for causing multiple mochitest failures. CLOSED TREE 2022-08-18 18:45:43 +03:00
ffxbld d61f881532 No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D154979
2022-08-18 14:05:58 +00:00
Nika Layzell 4011409c5d Bug 1783282 - Use a custom attribute instead of derive for implementing xpcom interfaces in rust, r=xpcom-reviewers,necko-reviewers,dragana,barret
Differential Revision: https://phabricator.services.mozilla.com/D153801
2022-08-18 13:57:35 +00:00
Jeff Muizelaar b55779b46a Bug 1783223 - Enable Arbitratry Code Guard in RDD on Nightly. r=bobowen
This was previously disabled in bug 1673194 because of start up crashes.
It seems like msmpeg2vdec.dll may use dynamic code to support encrypted
code that uses. In recent versions of Windows this only seems used
in the 32bit version. The 32bit version will opt out of ACG on the
threads where it needs to use VirtualProtect so we use the weaker
variant there.

Differential Revision: https://phabricator.services.mozilla.com/D153762
2022-08-18 13:41:24 +00:00
Anna Weine db08a45c3d Bug 1785784 - land NSS NSS_3_82_RTM UPGRADE_NSS_RELEASE, r=nss-reviewers,bbeurdouche
Differential Revision: https://phabricator.services.mozilla.com/D154974
2022-08-18 10:14:31 +00:00
Dana Keeler 7af450dab0 Bug 1781976 - remove expiring telemetry probe CLIENT_CERTIFICATE_SCAN_TIME r=ckerschb
Differential Revision: https://phabricator.services.mozilla.com/D154436
2022-08-17 18:50:26 +00:00
ffxbld 87bde7886c No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=dmeehan
Differential Revision: https://phabricator.services.mozilla.com/D154638
2022-08-15 12:10:00 +00:00
Emilio Cobos Álvarez a7401488af Bug 1784265 - Drop support for flex attribute values other than 0 and 1. r=dholbert,mconley,preferences-reviewers
This makes it easier to get parity between legacy and regular flex
without having to either have tons of arbitrary attribute selectors in
the xul sheet, nor adding attribute lookup hacks to the html flexbox
layout.

Also, reimplement the remaining supported flex attribute-values (0 and 1)
purely in terms of CSS rules in xul.css (regardless of whether
emulate-moz-box-with-flex is enabled).

In practice these are pretty uncommon and the style attribute does the
trick in every case I've tried.

Add a debug-only assertion to ensure we preserve behavior for now.

Add a new test with another behavior difference between flexbox
emulation and old xul layout because the old reftest now passes. Use
replaced elements, which in modern flex are treated differently.

Differential Revision: https://phabricator.services.mozilla.com/D154394
2022-08-12 23:13:41 +00:00
Marian-Vasile Laza 7f5e2711c6 Backed out 3 changesets (bug 1784265) for causing reftest failures on flex-emulation-1.xhtml. CLOSED TREE
Backed out changeset 415da4b53bdd (bug 1784265)
Backed out changeset e27b21c54b1f (bug 1784265)
Backed out changeset fcb1a053fbe2 (bug 1784265)
2022-08-13 01:14:13 +03:00
Emilio Cobos Álvarez a2ec6564f3 Bug 1784265 - Drop support for flex attribute values other than 0 and 1. r=dholbert,mconley,preferences-reviewers
This makes it easier to get parity between legacy and regular flex
without having to either have tons of arbitrary attribute selectors in
the xul sheet, nor adding attribute lookup hacks to the html flexbox
layout.

Also, reimplement the remaining supported flex attribute-values (0 and 1)
purely in terms of CSS rules in xul.css (regardless of whether
emulate-moz-box-with-flex is enabled).

In practice these are pretty uncommon and the style attribute does the
trick in every case I've tried.

Add a debug-only assertion to ensure we preserve behavior for now.

Add a new test with another behavior difference between flexbox
emulation and old xul layout because the old reftest now passes. Use
replaced elements, which in modern flex are treated differently.

Differential Revision: https://phabricator.services.mozilla.com/D154394
2022-08-12 19:34:34 +00:00
ffxbld fe0b61866f No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=dmeehan
Differential Revision: https://phabricator.services.mozilla.com/D154378
2022-08-11 19:10:20 +00:00
Nika Layzell 706cf2f2fa Bug 1782765 - Fix nullability of arrays of interfaces in Rust, r=xpcom-reviewers,necko-reviewers,mccr8,valentin
When generating code for arrays of interfaces from the rust-xpidl
compiler, the type was declared incorrectly as ThinVec<RefPtr<T>>
instead of ThinVec<Option<RefPtr<T>>> meaning that null values in the
array would be handled incorrectly.

This patch fixes this code generation mistake and updates crates using
the interface to handle null values correctly.

Differential Revision: https://phabricator.services.mozilla.com/D153485
2022-08-11 17:53:48 +00:00
Csoregi Natalia e2f0a85bfd Backed out changeset 5c13cd875d8b (bug 1772923) for causing failures on browser_cert_export.js. CLOSED TREE 2022-08-11 21:24:54 +03:00
Barret Rennie cda27c85fe Bug 1772923 - Port osfile.jsm usage to IOUtils in security/manager/ r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D153711
2022-08-11 17:11:36 +00:00
Nika Layzell 45397cbfdd Bug 1779792 - Part 4: Deduplicate ProcessChild subclass constructors, r=ipc-reviewers,necko-reviewers,media-playback-reviewers,alwu,mccr8
These constructors are unnecessary and can be defined with a `using` statement,
making it easier to change all constructors simultaneously.

Differential Revision: https://phabricator.services.mozilla.com/D153620
2022-08-10 14:55:23 +00:00
Nika Layzell 2ac29a461a Bug 1779792 - Part 3: Use an endpoint to bind the initial actor in parent processes, r=ipc-reviewers,necko-reviewers,media-playback-reviewers,alwu,mccr8
This improves consistency with the child process case, and will make it easier
to attach additional state without needing to thread it through every child
process callsite manually.

Differential Revision: https://phabricator.services.mozilla.com/D153619
2022-08-10 14:55:22 +00:00
Nika Layzell d45df271ec Bug 1779792 - Part 2: Use an Endpoint to bind the initial actor in child processes, r=ipc-reviewers,necko-reviewers,media-playback-reviewers,mccr8,alwu
This type is also used in other places to start non-initial actors, and will
allow us to attach additional state more easily without needing to thread it
through every child process callsite manually.

Differential Revision: https://phabricator.services.mozilla.com/D153618
2022-08-10 14:55:22 +00:00
Jed Davis 6a37a2ab93 Bug 1778052 - Don't reset ignored signals when starting a sandboxed child process on Linux. r=gcp
We uninstall signal handlers in child processes after clone(), because
they probably won't do the right thing if invoked in that context.
However, the current code also resets signals which were ignored;
if that disposition was set by an outside program like `nohup`, the
expectation is that it should be inherited.  This patch omits those
signals when resetting handlers (similar to what `exec` does).

Differential Revision: https://phabricator.services.mozilla.com/D151336
2022-08-09 00:35:18 +00:00
ffxbld 832ff8bc53 No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D153942
2022-08-08 12:57:52 +00:00
ffxbld 9ed83283ae No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D153744
2022-08-04 13:43:03 +00:00
Fabrice Desré c50cb528fc Bug 1761040 - Prefix thread safety macros with MOZ_ r=geckoview-reviewers,media-playback-reviewers,alwu,jesup,m_kato
Differential Revision: https://phabricator.services.mozilla.com/D152575
2022-08-03 16:39:41 +00:00
Andreea Pavel 3ccd75af8d Backed out changeset b9d2965591b9 (bug 1761040) for landing with wrong author CLOSED TREE DONTBUILD 2022-08-03 18:55:00 +03:00
Andreea Pavel fdb7cb2ecd Bug 1761040 - Prefix thread safety macros with MOZ_ r=geckoview-reviewers,media-playback-reviewers,alwu,jesup,m_kato
Differential Revision: https://phabricator.services.mozilla.com/D152575
2022-08-03 15:27:43 +00:00
Mark Banner 7428be4a86 Bug 1782008 - Remove now unnecessary .eslintrc.js files. r=webcompat-reviewers,extension-reviewers,media-playback-reviewers,pip-reviewers,denschub,rpl,alwu,mossop
Differential Revision: https://phabricator.services.mozilla.com/D152736
2022-08-03 11:16:20 +00:00
Dennis Jackson 7ac4427e01 Bug 1781075 - Add test cases for ECH connections with incorrect ALPN advertisements. r=necko-reviewers,kershaw
These tests set up an ECH server which will only negotiate http/1.1 in the TLS ALPN extension.
If the client doesn't send an ALPN offering at least http/1.1 the connection will fail with
SSL_ERROR_NEXT_PROTOCOL_NO_PROTOCOL.

Differential Revision: https://phabricator.services.mozilla.com/D153368
2022-08-02 19:59:22 +00:00
Andreea Pavel 89d63c91e6 Backed out changeset a907159a482f (bug 1761040) for causing build bustages on a CLOSED TREE 2022-08-02 04:59:08 +03:00
Fabrice Desré 0f4ac7ad97 Bug 1761040 - Prefix thread safety macros with MOZ_ r=geckoview-reviewers,media-playback-reviewers,alwu,jesup,m_kato
Differential Revision: https://phabricator.services.mozilla.com/D152575
2022-08-02 00:49:41 +00:00
ffxbld 1d8c226620 No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D153373
2022-08-01 16:51:54 +00:00
Nika Layzell c15823d075 Bug 1772006 - Part 5: Simplify and move the string searching APIs from ns[T]StringObsolete, r=xpcom-reviewers,necko-reviewers,eeejay,dragana,barret
The biggest set of APIs from ns[T]StringObsolete which are still heavily used
are the string searching APIs. It appears the intention was for these to be
replaced by the `FindInReadable` APIs, however that doesn't appear to have
happened.

In addition, the APIs have some quirks around their handling of mixed character
widths. These APIs generally supported both narrow strings and the native
string type, probably because char16_t string literals weren't available until
c++11. Finally they also used easy-to-confuse unlabeled boolean and integer
optional arguments to control behaviour.

These patches do the following major changes to the searching APIs:

1. The ASCII case-insensitive search method was split out as
   LowerCaseFindASCII, rather than using a boolean. This should be less
   error-prone and more explicit, and allows the method to continue to use
   narrow string literals for all string types (as only ASCII is supported).
2. The other [R]Find methods were restricted to only support arguments with
   matching character types. I considered adding a FindASCII method which would
   use narrow string literals for both wide and narrow strings but it would've
   been the same amount of work as changing all of the literals to unicode
   literals.
   This ends up being the bulk of the changes in the patch.
3. All find methods were re-implemented using std::basic_string_view's find
   algorithm or stl algorithms to reduce code complexity, and avoid the need to
   carry around the logic from nsStringObsolete.cpp.
4. The implementations were moved to nsTStringRepr.cpp.
5. An overload of Find was added to try to catch callers which previously
   called `Find(..., false)` or `Find(..., true)` to set case-sensitivity, due
   to booleans normally implicitly coercing to `index_type`. This should
   probably be removed at some point, but may be useful during the transition.

Differential Revision: https://phabricator.services.mozilla.com/D148300
2022-07-30 00:12:48 +00:00
Nika Layzell 997047e2a4 Bug 1772006 - Part 4: Simplify and move the string comparison APIs from ns[T]StringObsolete, r=xpcom-reviewers,necko-reviewers,dragana,barret
This patch moves EqualsIgnoreCase to ns[T]StringObsolete, and removes
the aCount argument, instead migrating callers to use `StringBeginsWith`
with a case-insensitive comparator.

In addition, nsTStringRepr::Compare was removed and replaced with either
calls to methods like `StringBeginsWith` or the global `Compare` method.

These changes required some modifications at call-sites but should make
the behaviour less surprising and more consistent.

Differential Revision: https://phabricator.services.mozilla.com/D148299
2022-07-30 00:12:48 +00:00
Dana Keeler 12ac90f435 Bug 1781466 - gather telemetry for PSM UI elements slated for removal r=djackson
Depends on D152942

Differential Revision: https://phabricator.services.mozilla.com/D152943
2022-07-28 20:04:31 +00:00
Dana Keeler 5a8efd3f8c Bug 1781466 - remove obsolete exception dialog telemetry r=djackson
Differential Revision: https://phabricator.services.mozilla.com/D152942
2022-07-28 20:04:31 +00:00
ffxbld f6e48e8f08 No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D153075
2022-07-28 12:41:48 +00:00
Jed Davis 4552fc73a3 Bug 1779312 - Replace uses of strerror in Linux sandbox code. r=glandium
`strerror` is async signal unsafe, and we're using it in contexts where
that's a problem: in particular in the child process after `clone()`ing,
where it can deadlock if it takes locks the parents' other threads had
held (or cause other undefined behavior), but also in the SIGSYS handler
if it's nested inside an async signal.  It's also thread-unsafe.

This is mostly a mechanical replacement with the new `SANDBOX_LOG_ERRNO`
or `SANDBOX_LOG_WITH_ERROR`; two messages had the error string in the
middle and have been adjusted.

Differential Revision: https://phabricator.services.mozilla.com/D152099
2022-07-27 19:41:05 +00:00
Jed Davis 05621d57dc Bug 1779312 - Add macros for Linux sandbox logging with an error code. r=glandium
This adds two new logging macros, which are intended to be async signal
safe:

* `SANDBOX_LOG_ERRNO`, which appends the error similarly to `perror` but
   uses the error identifier (e.g., `EINVAL` instead of `Invalid argument`).
   Unlike `perror`, formatting directives are available as for `SANDBOX_LOG`.

* `SANDBOX_LOG_WITH_ERROR` is the same thing but the error number is the
  first argument instead of using `errno`; this is useful for newer POSIX
  APIs which return an error number.

This will be used in the next patch to replace the existing use of
`strerror`, which is not async signal safe (or thread-safe).

Differential Revision: https://phabricator.services.mozilla.com/D152098
2022-07-27 19:41:05 +00:00
Jed Davis fd918ffb96 Bug 1779312 - Rename `SANDBOX_LOG_ERROR` to just `SANDBOX_LOG`. r=glandium
Originally this was written for B2G and used the Android logging
facility, which (like syslog) includes a severity level.  However, all
current usage is on desktop where we just write to stderr, and there was
never much demand to add support for any log levels besides "error".

More importantly for the current situation, renaming the macro to
`SANDBOX_LOG` avoids confusion between `SANDBOX_LOG_ERROR` and
`SANDBOX_LOG_ERRNO` (or `SANDBOX_LOG_ERROR_ERRNO` or whatever).

Differential Revision: https://phabricator.services.mozilla.com/D152097
2022-07-27 19:41:04 +00:00
Jed Davis 4fb97a1c3d Bug 1779312 - Preliminary fixes to some misuses of SANDBOX_LOG_ERROR. r=glandium
Two minor things I noticed while converting the existing sandbox logging:

1. One call site was using %u, but that doesn't exist in this printf
   dialect, only %d; signedness is determined by the actual argument
   type via template magic.

2. POSIX functions that return an error number just return the number;
   there was one place that was negating it before use, as if it had
   come from the Linux syscall ABI.

Differential Revision: https://phabricator.services.mozilla.com/D152096
2022-07-27 19:41:04 +00:00
Tooru Fujisawa a032f53a63 Bug 1780543 - Part 5: Add mozilla/chrome-script environment. r=Standard8
Differential Revision: https://phabricator.services.mozilla.com/D152430
2022-07-26 02:46:30 +00:00
Emilio Cobos Álvarez 42b7f1a58c Bug 1780788 - Use abstract strings as in-arguments for ipdl. r=nika,necko-reviewers,media-playback-reviewers,alwu,dragana
This prevents copies and avoids the hack we have to avoid this, which
right now is using nsDependent{C,}String.

Non-virtual actors can still use `nsString` if they need to on the
receiving end.

Differential Revision: https://phabricator.services.mozilla.com/D152519
2022-07-25 20:19:48 +00:00
ffxbld 6506fc7cf1 No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=diannaS
Differential Revision: https://phabricator.services.mozilla.com/D152635
2022-07-25 13:16:50 +00:00
Alexandre Lissy 9c3474ae19 Bug 1775263 - Block cyinjct.dll from being injected in Utility r=haik,handyman
Differential Revision: https://phabricator.services.mozilla.com/D150595
2022-07-22 13:47:58 +00:00
Dana Keeler 30b914478f Bug 1779973 - treat failure to parse certificate validity as a time error r=djackson
Differential Revision: https://phabricator.services.mozilla.com/D152333
2022-07-21 23:51:01 +00:00
Dennis Jackson 3bde9bff24 Bug 1779398 - land NSS NSS_3_81_RTM UPGRADE_NSS_RELEASE, r=nss-reviewers,nkulatova DONTBUILD
Differential Revision: https://phabricator.services.mozilla.com/D152398
2022-07-21 13:50:49 +00:00
Dennis Jackson 7a55bf9c23 Bug 1780014: Add specific telemetry for conservative and first-try handshakes. r=keeler.
This patch adds two new telemetry histograms which collect specific types
of TLS handshake seperately from existing handshakes.
 - The conservative histogram tracks handshakes used for essential connections (e.g. update checks)
 - The first-try histogram tracks all initial connection attempts. This allows us to identify issues that might otherwise be masked by our retry logic.

A single handshake may belong to more than one histogram. All handshakes belong to the root histogram.
As the histogram buckets are aligned, it is possible to derive new histograms from these stored results.
For example, as ECH GREASE is only used on first-try handshakes, the histogram from non-GREASE first-try
handshakes can be calculated by subtracting the entries in the GREASE histogram from the first-try histogram.

This patch also extends the existing handshake necko tests to verify that the telemetry is recorded correctly.
Telemetry checks don't run if networking is running on the socket process as the histograms are no longer
accessible.

Differential Revision: https://phabricator.services.mozilla.com/D150754
2022-07-21 11:02:32 +00:00
Dana Keeler 43dc5f66a3 Bug 1779848 - don't assert if mFd is null in nsNSSSocketInfo::ClientAuthCertificateSelected r=ckerschb
If nsNSSSocketInfo::mFd is nullptr, it means the connection has been closed.
This isn't an error, and ClientAuthCertificateSelected shouldn't assert if this
happens.

Differential Revision: https://phabricator.services.mozilla.com/D151962
2022-07-19 23:12:21 +00:00
Dana Keeler 270df11f4c Bug 1770269 - Enable EV Treatment for E-Tugra v3 Global root certificates r=rmf
Differential Revision: https://phabricator.services.mozilla.com/D151749
2022-07-19 22:16:34 +00:00
Dana Keeler 2985f72f3a Bug 1764397 - Enable EV Treatment for Digicert G5 root certificates r=rmf
Differential Revision: https://phabricator.services.mozilla.com/D151748
2022-07-19 22:16:33 +00:00
Anna Weine c37b09ca3b Bug 1779398 - land NSS 164849c15197 UPGRADE_NSS_RELEASE, r=nss-reviewers,djackson
2022-07-18  Kai Engert  <kaie@kuix.de>

	* lib/certhigh/certvfy.c:
	Bug 1777672 - Gracefully handle null nickname in
	CERT_GetCertNicknameWithValidity. r=rrelyea

	[164849c15197] [tip]

Differential Revision: https://phabricator.services.mozilla.com/D152169
2022-07-19 12:49:20 +00:00
ffxbld 5c3ca70147 No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=diannaS
Differential Revision: https://phabricator.services.mozilla.com/D152019
2022-07-18 13:01:12 +00:00
Haik Aftandilian a064a6ac2d Bug 1779816 - Don't specify entitlements that use the default setting of false r=mac-reviewers,bradwerth
Cleanup our entitlement files by removing entitlements that use the default setting of false.

production.entitlements.xml and developer.entitlements.xml are used today.

The browser and plugin-container entitlement lists will be used when we enable using different entitlements for parent and child processes.

Differential Revision: https://phabricator.services.mozilla.com/D151943
2022-07-15 19:30:47 +00:00
Andi-Bogdan Postelnicu bbf960e82c Bug 1617369 - Reformat recent rust changes with rustfmt r=emilio
Updated with rustfmt 1.4.38-stable (a8314ef 2022-06-27)
# ignore-this-changeset

Depends on D151908

Differential Revision: https://phabricator.services.mozilla.com/D151909
2022-07-15 09:37:22 +00:00
Kagami Sascha Rosylight bb679fa417 Bug 1769290 - Part 24: Apply mozilla-js-handle-rooted-typedef against layout,security,storage,tools r=andi
Differential Revision: https://phabricator.services.mozilla.com/D151791
2022-07-14 17:00:24 +00:00
ffxbld 643780ce3b No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=diannaS
Differential Revision: https://phabricator.services.mozilla.com/D151817
2022-07-14 11:59:52 +00:00
Dennis Jackson 7246d5248d Bug 1779398 - land NSS cafb891ea6ce UPGRADE_NSS_RELEASE, r=nss-reviewers,bbeurdouche
Differential Revision: https://phabricator.services.mozilla.com/D151714
2022-07-13 17:29:07 +00:00
Tooru Fujisawa 54623364da Bug 1777486 - Part 2: Migrate XPCOMUtils.jsm consumers with automatic migration. r=webdriver-reviewers,geckoview-reviewers,preferences-reviewers,application-update-reviewers,pip-reviewers,kmag,owlish,whimboo
Differential Revision: https://phabricator.services.mozilla.com/D151214
2022-07-12 04:21:34 +00:00
Barret Rennie 305b4cd077 Bug 1772941 - Port osfile.jsm usage to IOUtils in toolkit/content/ r=florian,preferences-reviewers
Differential Revision: https://phabricator.services.mozilla.com/D149303
2022-07-12 00:25:35 +00:00
Andreea Pavel 7738a75fdd Backed out 11 changesets (Bug 1777486) for failing bc at browser_startup.js on a CLOSED TREE
Backed out changeset b6c4c386f1a6 (Bug 1777486)
Backed out changeset 195cc2de8433 (Bug 1777486)
Backed out changeset 20c746fb1648 (Bug 1777486)
Backed out changeset d5fd8173d62d (Bug 1777486)
Backed out changeset 6d758fab5a3e (Bug 1777486)
Backed out changeset e938b601ba15 (Bug 1777486)
Backed out changeset 0c4ea0b9416b (Bug 1777486)
Backed out changeset 0559c53cc668 (Bug 1777486)
Backed out changeset eea573d3a9f9 (Bug 1777486)
Backed out changeset 9ce3a6496a49 (bug 1777486)
Backed out changeset b0867652fc48 (bug 1777486)
2022-07-11 22:24:40 +03:00
Tooru Fujisawa 8cd6ed7409 Bug 1777486 - Part 2: Migrate XPCOMUtils.jsm consumers with automatic migration. r=webdriver-reviewers,geckoview-reviewers,preferences-reviewers,application-update-reviewers,pip-reviewers,kmag,owlish,whimboo
Differential Revision: https://phabricator.services.mozilla.com/D151214
2022-07-11 15:09:13 +00:00
ffxbld a57d022de1 No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=diannaS
Differential Revision: https://phabricator.services.mozilla.com/D151486
2022-07-11 13:12:23 +00:00
Tooru Fujisawa 52c95734e7 Bug 1667455 - Part 9: Stop importing Services.jsm from chrome-priv HTML code, single-line cases. r=kmag,necko-reviewers,geckoview-reviewers,extension-reviewers,m_kato,dragana
Differential Revision: https://phabricator.services.mozilla.com/D150898
2022-07-11 12:41:52 +00:00
Tooru Fujisawa 47c8f80432 Bug 1667455 - Part 6: Stop importing Services.jsm from chrome-priv JS code, non-top-level or multi-line cases. r=kmag,perftest-reviewers,AlexandruIonescu,sparky
Differential Revision: https://phabricator.services.mozilla.com/D150895
2022-07-11 12:41:51 +00:00
Tooru Fujisawa bf93d07148 Bug 1667455 - Part 5: Stop importing Services.jsm from chrome-priv JS code, top-level single-line cases. r=kmag,webdriver-reviewers,perftest-reviewers,webcompat-reviewers,geckoview-reviewers,extension-reviewers,application-update-reviewers,pip-reviewers,twisniewski,m_kato,jdescottes,mconley,AlexandruIonescu,mossop
Differential Revision: https://phabricator.services.mozilla.com/D150894
2022-07-11 12:41:50 +00:00
Tooru Fujisawa f3a8c52c53 Bug 1667455 - Part 4: Stop importing Services.jsm from JSM. r=kmag,webdriver-reviewers,perftest-reviewers,webcompat-reviewers,geckoview-reviewers,application-update-reviewers,pip-reviewers,twisniewski,devtools-reviewers,m_kato,jdescottes,ochameau,mconley,sfoster,AlexandruIonescu
Differential Revision: https://phabricator.services.mozilla.com/D150893
2022-07-11 12:41:50 +00:00
ffxbld 7863aace6c No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=diannaS
Differential Revision: https://phabricator.services.mozilla.com/D151241
2022-07-07 14:24:35 +00:00
Dana Keeler f957a0175b Bug 1749884 - remove expired client auth cert telemetry and add new permanent telemetry r=rmf
Differential Revision: https://phabricator.services.mozilla.com/D150819
2022-07-06 18:32:43 +00:00
Dana Keeler dc4ce8d406 Bug 1777366 - remove unused `source` and `cached` parameters from nsISiteSecurityService APIs r=rmf,necko-reviewers,kershaw
These parameters are no longer used and can be removed, along with the expired
telemetry HSTS_UPGRADE_SOURCE.

Differential Revision: https://phabricator.services.mozilla.com/D150786
2022-07-05 18:33:18 +00:00
Csoregi Natalia 7e2a20405f Backed out changeset 6c542cd8d622 for causing devtools compat issues. CLOSED TREE 2022-07-04 19:39:21 +03:00
ffxbld 8592d3250f No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=diannaS
Differential Revision: https://phabricator.services.mozilla.com/D150961
2022-07-04 13:49:30 +00:00
Dana Keeler 46abba10d9 Bug 1774579 - certificate manager: update leftover loadCerts call from bug 1682412 r=rmf
In bug 1682412, loadCerts was removed from nsICertTree. At the time, the
certificate manager still had one use of it that should have been updated to
loadCertsFromCache. This patch makes that update.

Differential Revision: https://phabricator.services.mozilla.com/D150503
2022-06-30 15:41:25 +00:00
ffxbld d0985bd3cc No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=diannaS
Differential Revision: https://phabricator.services.mozilla.com/D150742
2022-06-30 14:25:21 +00:00
Mark Banner 05e3f1ea83 Bug 1646183 - Extend ESLint rule reject-importGlobalProperties to also handle defineLazyGlobalGetters. r=arai,webdriver-reviewers,webcompat-reviewers,extension-reviewers,whimboo,twisniewski,kmag
Differential Revision: https://phabricator.services.mozilla.com/D150353
2022-06-29 22:37:57 +00:00
Dana Keeler a998171379 Bug 696976 - asynchronously handle client auth certificate requests from TLS servers r=necko-reviewers,ipc-reviewers,nika,kershaw,rmf
Differential Revision: https://phabricator.services.mozilla.com/D146367
2022-06-29 16:29:28 +00:00
Dana Keeler 695084d3a9 Bug 696976 - move TLS client auth certificate selection implementation to its own file r=necko-reviewers,kershaw,jschanck
Differential Revision: https://phabricator.services.mozilla.com/D146366
2022-06-29 16:29:28 +00:00
ffxbld 3ec2694a72 No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D150368
2022-06-27 13:04:52 +00:00
Barret Rennie 6c348edd96 Bug 1776442 - Ensure NSS is initialized before instantiating nsCryptoHash r=jschanck
Differential Revision: https://phabricator.services.mozilla.com/D150256
2022-06-24 18:42:27 +00:00
John Schanck 208e054844 Bug 1773966 - land NSS NSS_3_80_RTM UPGRADE_NSS_RELEASE, r=bbeurdouche,nss-reviewers
Differential Revision: https://phabricator.services.mozilla.com/D150161
2022-06-23 18:47:59 +00:00
ffxbld 042ea8b035 No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=dmeehan
Differential Revision: https://phabricator.services.mozilla.com/D150103
2022-06-23 13:40:12 +00:00
Andi-Bogdan Postelnicu a933f9df8f Bug 1519636 - Reformat recent changes to the Google coding style. r=marco
Updated with clang-format version 14.0.5 (taskcluster-YlgDNB2QSm-6a2LDw3kj6A)
# ignore-this-changeset

Differential Revision: https://phabricator.services.mozilla.com/D150093
2022-06-23 09:27:12 +00:00
Jed Davis 6558ec1572 Bug 1771382 - Adjust the Linux RDD sandbox to handle the nvidia driver being loaded but not used. r=gcp
On multi-GPU systems, even though the GPU we're going to use for
accelerated video decoding is driven by Mesa, sometimes the nvidia
proprietary driver can be loaded and attempt to probe devices.  This
patch attempts to make the sandbox policy quietly return errors for
those syscalls, instead of treating them as unexpected (and crashing on
Nightly).

Differential Revision: https://phabricator.services.mozilla.com/D149652
2022-06-23 00:00:54 +00:00
Joel Maher 5b2dd6dd56 Bug 1769154 - Run some xpcshell tests with a conditioned profile. r=aryx,extension-reviewers,kmag
Differential Revision: https://phabricator.services.mozilla.com/D149937
2022-06-22 16:47:06 +00:00
Bogdan Szekely e43c058bda Backed out changeset 7b707ff8a7d1 (bug 1769154) for causing xpcshell failures on test_system_upgrades.js 2022-06-22 17:17:10 +03:00
Joel Maher 0f3990e1cb Bug 1769154 - Run some xpcshell tests with a conditioned profile. r=aryx,extension-reviewers,kmag
Differential Revision: https://phabricator.services.mozilla.com/D149937
2022-06-22 13:03:46 +00:00
serge-sans-paille b122b6d13d Bug 1774865 - extra cleanup mozglue, security, intl and netwerk includes r=sylvestre
Differential Revision: https://phabricator.services.mozilla.com/D149670
2022-06-22 09:51:52 +00:00
Barret Rennie 1a02416780 Bug 1773182 - Add NS_NewCryptoHash helper r=xpcom-reviewers,kmag,nika
Differential Revision: https://phabricator.services.mozilla.com/D148965
2022-06-20 13:57:29 +00:00
ffxbld 9d2837b25e No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=dmeehan
Differential Revision: https://phabricator.services.mozilla.com/D149736
2022-06-20 12:16:01 +00:00
Mike Hommey df77ed0752 Bug 1774501 - Update to env_logger 0.9 in various in-tree crates. r=nbp,keeler,xpcom-reviewers,rhunt,nika
Differential Revision: https://phabricator.services.mozilla.com/D149453
2022-06-16 20:44:03 +00:00
Chris Martin 190ac22f48 Bug 1770098 - Disable Win32k Lockdown with incompatible mitigations r=handyman,Gankra
Differential Revision: https://phabricator.services.mozilla.com/D148962
2022-06-16 14:05:00 +00:00
ffxbld 5d65102622 No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=dmeehan
Differential Revision: https://phabricator.services.mozilla.com/D149507
2022-06-16 12:12:32 +00:00
Tooru Fujisawa 5e0731b2a4 Bug 1608282 - Part 4: Remove Cu.defineLazyGlobalGetters from JSM. r=webdriver-reviewers,extension-reviewers,jdescottes,kmag
Depends on D149196

Differential Revision: https://phabricator.services.mozilla.com/D149197
2022-06-16 00:19:54 +00:00
Butkovits Atila 8218713aac Backed out 4 changesets (bug 1608282) for causing hazard failures. CLOSED TREE
Backed out changeset 32aebc8be201 (bug 1608282)
Backed out changeset 37c970364269 (bug 1608282)
Backed out changeset ced8d82cc2d2 (bug 1608282)
Backed out changeset e26e480c7dd6 (bug 1608282)
2022-06-16 03:10:02 +03:00
Jed Davis c807158580 Bug 1770905 - Allow GeckoMediaPlugin processes on Linux to be profiled if memfd_create is available. r=gcp,mstange,media-playback-reviewers,padenot
There are two parts to this patch; both affect only Linux:

1. The GMP sandbox policy is adjusted to allow certain syscalls used in
   shared memory creation (ftruncate and fallocate).  However, the file
   broker is not used; the process still has no access to files in /dev/shm.

2. The profiler is not initialized for GMP processes unless memfd_create
   is available (so the process can create shared memory to send
   profiling data back, without filesystem access), or the GMP sandbox
   is disabled (either at runtime or build time).

As of this patch, profiling GMP processes on Linux should succeed on
distros with kernel >=3.17 (Oct. 2014), but native stack frames won't
have symbols (and may be incorrectly unwound, not that it matters much
without symbols); see the bug for more info.  Pseudo-stack frames and
markers should work, however.

Differential Revision: https://phabricator.services.mozilla.com/D148470
2022-06-15 20:55:24 +00:00
Jed Davis c4d1df3cf7 Bug 1770905 - Quietly reject `readlink` in the Linux GeckoMediaPlugin sandbox. r=gcp
The profiler may try to readlink `/proc/self/exe` to determine the
executable name; currently, its attempt to get information about loaded
objects is broken for other reasons, so this isn't helpful.  Thus, this
patch has it fail with `EINVAL` (meaning "not a symbolic link) instead of
being treated as unexpected.

(In the future, if we need to, we could simulate that syscall by
recording the target of `/proc/self/exe` before sandboxing, and
recognizing that specific case in a trap function.)

Differential Revision: https://phabricator.services.mozilla.com/D148469
2022-06-15 20:55:23 +00:00
Tooru Fujisawa 8b8d6b141a Bug 1608282 - Part 4: Remove Cu.defineLazyGlobalGetters from JSM. r=webdriver-reviewers,extension-reviewers,jdescottes,kmag
Depends on D149196

Differential Revision: https://phabricator.services.mozilla.com/D149197
2022-06-15 20:34:35 +00:00
Dana Keeler aa7979464f Bug 1769150 - try all known EV policy OIDs found in a certificate when verifying for EV r=jschanck
Before this patch, the certificate verifier would only attempt to build a
trusted path to a root with the first recognized EV OID in the end-entity
certificate. Thus, if an end-entity certificate had more than one EV OID, it
could fail to verify as EV if an intermediate or root had the "wrong" EV OID.
This patch addresses this shortcoming by trying to build a path with each
recognized EV OID in the end-entity certificate until it finds one that works.

Differential Revision: https://phabricator.services.mozilla.com/D149319
2022-06-15 18:20:13 +00:00
Dana Keeler f0803728d4 Bug 1772976 - make non-private certificate error overrides available in private contexts r=jschanck
Certificate error overrides made in non-private contexts should be availble in
private contexts as well (but not vice-versa).

Differential Revision: https://phabricator.services.mozilla.com/D149296
2022-06-15 18:02:36 +00:00
Barret Rennie 3f5dc34b19 Bug 1774204 - Add SHA-384 and SHA-512 support to Digest r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D149281
2022-06-14 20:08:45 +00:00
Dennis Jackson 549b3f9615 Bug 1773966 - land NSS tip UPGRADE_NSS_RELEASE, r=nss-reviewers,nkulatova
Differential Revision: https://phabricator.services.mozilla.com/D149276
2022-06-14 15:47:17 +00:00
Dennis Jackson a22ec26448 Bug 1771479 - Fix ECH GREASE Telemetry. r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D149212
2022-06-14 09:59:37 +00:00
Dana Keeler c9fe82eb09 Bug 1773370 - PSM changes for macOS SDK update r=jschanck
Differential Revision: https://phabricator.services.mozilla.com/D148850
2022-06-13 20:29:48 +00:00
ffxbld d7e147a70e No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=dmeehan
Differential Revision: https://phabricator.services.mozilla.com/D149134
2022-06-13 14:06:30 +00:00
Dennis Jackson 9f93e47cfa Bug 1771479 - Add histograms for SSL_HANDSHAKE_RESULT and SSL_TIME_UNTIL_READY for connections using ECH. r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D147498
2022-06-13 11:29:41 +00:00
Dennis Jackson 1c8c0c17ed oBug 1770907 - Disable ECH GREASE when retrying connections. r=dragana,keeler,necko-reviewers
Add a preference for whether to remove ECH GREASE extensions when retrying a connection. This repurposes the  flag which was previously present but not actually functional.

Differential Revision: https://phabricator.services.mozilla.com/D147191
2022-06-13 11:29:41 +00:00
Dennis Jackson 8948a1a9a2 Bug 1767974 - Add preferences for ECH GREASE Mode. r=keeler,dragana
Differential Revision: https://phabricator.services.mozilla.com/D145608
2022-06-13 11:29:41 +00:00
criss c6b2c5db61 Backed out 9 changesets (bug 1772006) causing build bustages on nsTString.cpp. CLOSED TREE
Backed out changeset f17c7565707b (bug 1772006)
Backed out changeset c725fe1f5882 (bug 1772006)
Backed out changeset d19663161261 (bug 1772006)
Backed out changeset b6611ab002d9 (bug 1772006)
Backed out changeset 790f42b64af9 (bug 1772006)
Backed out changeset 79a734b4e4d9 (bug 1772006)
Backed out changeset 42730aae16ea (bug 1772006)
Backed out changeset b2542aef3054 (bug 1772006)
Backed out changeset 962bfea4a309 (bug 1772006)
2022-06-11 01:13:42 +03:00
Nika Layzell b3c13bf114 Bug 1772006 - Part 6: Simplify and move the string searching APIs from ns[T]StringObsolete, r=xpcom-reviewers,necko-reviewers,eeejay,dragana,barret
The biggest set of APIs from ns[T]StringObsolete which are still heavily used
are the string searching APIs. It appears the intention was for these to be
replaced by the `FindInReadable` APIs, however that doesn't appear to have
happened.

In addition, the APIs have some quirks around their handling of mixed character
widths. These APIs generally supported both narrow strings and the native
string type, probably because char16_t string literals weren't available until
c++11. Finally they also used easy-to-confuse unlabeled boolean and integer
optional arguments to control behaviour.

These patches do the following major changes to the searching APIs:

1. The ASCII case-insensitive search method was split out as
   LowerCaseFindASCII, rather than using a boolean. This should be less
   error-prone and more explicit, and allows the method to continue to use
   narrow string literals for all string types (as only ASCII is supported).
2. The other [R]Find methods were restricted to only support arguments with
   matching character types. I considered adding a FindASCII method which would
   use narrow string literals for both wide and narrow strings but it would've
   been the same amount of work as changing all of the literals to unicode
   literals.
   This ends up being the bulk of the changes in the patch.
3. All find methods were re-implemented using std::basic_string_view's find
   algorithm or stl algorithms to reduce code complexity, and avoid the need to
   carry around the logic from nsStringObsolete.cpp.
4. The implementations were moved to nsTStringRepr.cpp.
5. An overload of Find was added to try to catch callers which previously
   called `Find(..., false)` or `Find(..., true)` to set case-sensitivity, due
   to booleans normally implicitly coercing to `index_type`. This should
   probably be removed at some point, but may be useful during the transition.

Differential Revision: https://phabricator.services.mozilla.com/D148300
2022-06-10 21:12:08 +00:00
Tooru Fujisawa ca262b23ce Bug 1773174 - Part 1: Use .jsm extension for JSMs in toolkit/components/certviewer/. r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D148596
2022-06-10 19:21:05 +00:00
Jed Davis 09be260cd3 Bug 1772142 - Fix the RDD sandbox to deal with Snap moving some config files. r=gcp
In the Snap environment, some system config files aren't in their usual
places, but rather in a subtree rooted at `$SNAP/gnome-platform`,
which seems to also be `$SNAP_DESKTOP_RUNTIME`.  This includes some
subdirectories of `/usr/share` that we need for EGL to work.

This could probably also have been fixed in the Snap packaging, given
that [Mozilla's][] and [Ubuntu's][] specs both put `/usr/share/libdrm`
back into its normal location, but for now it's easiest to adjust
the sandbox, given that (I think?) anything under `$SNAP` is public
information so we lose nothing by allowing read access.  (See also bug
1732580.)

[Mozilla's]: https://searchfox.org/mozilla-central/rev/973000acec0cbf7211e0fad89ca00c352aeb8384/taskcluster/docker/firefox-snap/firefox.snapcraft.yaml.in#50-52
[Ubuntu's]: https://git.launchpad.net/~mozilla-snaps/firefox-snap/+git/firefox-snap/tree/snapcraft.yaml?id=a24fb4a3f92d190299e4126ecc4132087c2aed3d#n85

Differential Revision: https://phabricator.services.mozilla.com/D148925
2022-06-10 19:03:55 +00:00
John Schanck 0c18bdf797 Bug 1773371 - Enforce CRLite revoked status when OCSP confirmation fails. r=keeler
This changes the behavior of CRLite when configured in `ConfirmRevocations`
mode (the default mode on nightly and early beta). Under the new definition,
ConfirmRevocations mode fails closed when OCSP fails open. In particular, a
certificate will be marked as "Revoked" in the following scenarios:
  - CRLite returns "Revoked" and the certificate does not list an OCSP URL,
  - CRLite returns "Revoked" and the OCSP responder is unreachable,
  - CRLite returns "Revoked" and the OCSP responder returns an error.

Differential Revision: https://phabricator.services.mozilla.com/D148686
2022-06-10 16:31:39 +00:00
Iulian Moraru 4cd2cbcfa4 Backed out 3 changesets (bug 1767974, bug 1771479) for causing xpcshell failures on test_httpssvc_retry_with_ech.js. CLOSED TREE
Backed out changeset 9bcda147affa (bug 1771479)
Backed out changeset 4455b5bf1282
Backed out changeset f973baf1403a (bug 1767974)
2022-06-10 16:58:28 +03:00
Dennis Jackson 65e3bc3f2a Bug 1771479 - Add histograms for SSL_HANDSHAKE_RESULT and SSL_TIME_UNTIL_READY for connections using ECH. r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D147498
2022-06-10 11:10:28 +00:00
Dennis Jackson 55801f5de7 oBug 1770907 - Disable ECH GREASE when retrying connections. r=dragana,keeler,necko-reviewers
Add a preference for whether to remove ECH GREASE extensions when retrying a connection. This repurposes the  flag which was previously present but not actually functional.

Differential Revision: https://phabricator.services.mozilla.com/D147191
2022-06-10 11:10:27 +00:00
Dennis Jackson bb920d016d Bug 1767974 - Add preferences for ECH GREASE Mode. r=keeler,dragana
Differential Revision: https://phabricator.services.mozilla.com/D145608
2022-06-10 11:10:27 +00:00
Sylvestre Ledru b848a697dc Bug 1617369 - Reformat recent rust changes with rustfmt r=emilio,extension-reviewers,willdurand
# ignore-this-changeset

Differential Revision: https://phabricator.services.mozilla.com/D148376
2022-06-10 09:21:45 +00:00
ffxbld b7aed3fa69 No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=dmeehan
Differential Revision: https://phabricator.services.mozilla.com/D148769
2022-06-09 12:00:37 +00:00
Alexandre Lissy b1026facbf Bug 1772053 - Enable dynamic code disable mitigations only on Windows 10 1703+ r=bobowen
Differential Revision: https://phabricator.services.mozilla.com/D148502
2022-06-07 16:26:44 +00:00
Sylvestre Ledru 42f6811d95 Bug 1519636 - Reformat recent changes to the Google coding style r=andi,media-playback-reviewers,necko-reviewers,padenot,dragana
# ignore-this-changeset

Differential Revision: https://phabricator.services.mozilla.com/D148375
2022-06-07 12:32:55 +00:00
Haik Aftandilian 94ba599969 Bug 1562756 - Code Injection in Firefox macOS desktop r=spohl
Drop the com.apple.security.cs.allow-dyld-environment-variables entitlement to disallow use of dyld environment variables in signed production builds.

Leave the entitlement in for signed developer builds.

Firefox gtests depend on the use of DYLD_LIBRARY_PATH. However, testing infrastructure does not run gtests on signed builds and therefore gtests are not impacted by this change. gtests could be run on signed developer builds in the future which will still allow dyld environment variables after this change.

browser.production.entitlements.xml and plugin-container.production.entitlements.xml are not used, but being kept up to date.

Differential Revision: https://phabricator.services.mozilla.com/D148324
2022-06-06 16:42:02 +00:00
Dennis Jackson e43e8f1bee Bug 1771523 - Add telemetry probe for app signature verification outcomes. r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D147530
2022-06-06 13:08:01 +00:00
ffxbld 6e462c9969 No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=dmeehan
Differential Revision: https://phabricator.services.mozilla.com/D148384
2022-06-06 13:05:41 +00:00
Dana Keeler 658b880816 Bug 1769669 - require specifying the trusted root in content signature verifier r=jschanck,leplatrem,robwu,barret
Before this patch, the content signature verifier
(nsIContentSignatureVerifier/ContentSignatureVerifier) would identify the root
it trusted based on the value of a preference. This patch changes the
implementation to require a specified hard-coded root to trust as with add-on
signature verification.

Depends on D146644

Differential Revision: https://phabricator.services.mozilla.com/D146645
2022-06-03 23:26:28 +00:00
Dana Keeler 872a9fafe8 Bug 1769669 - move app signature verification to security/manager/ssl/ r=jschanck
Before this patch, the app signature verification code lived in security/apps/.
The majority of the rest of PSM is in security/manager/ssl/ and there's little
reason to have that extra directory for the app signature verification
implementation alone.

Differential Revision: https://phabricator.services.mozilla.com/D146644
2022-06-03 23:26:28 +00:00
ffxbld 0dddb4f86b No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=dmeehan
Differential Revision: https://phabricator.services.mozilla.com/D148111
2022-06-02 12:07:31 +00:00
Dana Keeler 9e12ff8e96 Bug 1770869 - remove nsISSLSocketControl.clientCert r=jschanck,necko-reviewers,kershaw
This field isn't used any longer and removing it will make future changes
eaiser.

Differential Revision: https://phabricator.services.mozilla.com/D147227
2022-06-01 23:20:58 +00:00
Dana Keeler 82c73ec75d Bug 1770869 - remove nsILocalCertService and implementation r=necko-reviewers,jschanck,pbz,kershaw
nsILocalCertService was used in FlyWeb, which was removed in Firefox 59 in bug
1374574.

Depends on D147121

Differential Revision: https://phabricator.services.mozilla.com/D147122
2022-06-01 23:20:58 +00:00
Butkovits Atila 2b78c018fd Backed out 3 changesets (bug 1770869) for causing xpcshell failures at test_tls_server.js. CLOSED TREE
Backed out changeset 5c95392b800d (bug 1770869)
Backed out changeset 149d04a209b6 (bug 1770869)
Backed out changeset 5a138d047be1 (bug 1770869)
2022-06-02 00:18:26 +03:00
Dana Keeler 39015f9d16 Bug 1770869 - remove nsISSLSocketControl.clientCert r=jschanck,necko-reviewers,kershaw
This field isn't used any longer and removing it will make future changes
eaiser.

Differential Revision: https://phabricator.services.mozilla.com/D147227
2022-06-01 20:00:57 +00:00
Dana Keeler 0f6879c125 Bug 1770869 - remove nsILocalCertService and implementation r=necko-reviewers,jschanck,pbz,kershaw
nsILocalCertService was used in FlyWeb, which was removed in Firefox 59 in bug
1374574.

Depends on D147121

Differential Revision: https://phabricator.services.mozilla.com/D147122
2022-06-01 20:00:57 +00:00
Tooru Fujisawa 425605e054 Bug 1772106 - Use plain object for lazy getter in security/manager/ssl/. r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D147889
2022-06-01 17:27:12 +00:00
Dana Keeler 3945602079 Bug 1766687 - remove support for SHA1 signatures in all certificates (including imported roots) r=jschanck
Previously [0], support for SHA1 signatures in certificates was disabled by
default, except for certificates issued by imported roots. Chrome had a similar
policy, but this was removed in 71 [1]. Telemetry [2] indicates that some users
do still encounter SHA1 signatures at a fraction of the rate of overall
certificate errors, so forbidding all SHA1 signatures should have minimal
compatibility impact.

[0] https://bugzilla.mozilla.org/show_bug.cgi?id=1302140
[1] https://chromeenterprise.google/policies/#EnableSha1ForLocalAnchors
[2] https://mzl.la/3kg5J4j

Differential Revision: https://phabricator.services.mozilla.com/D144870
2022-06-01 17:01:56 +00:00
Jed Davis b1826e7b68 Bug 1770523 - Return to not allowing X11 access in the RDD process. r=gcp
The patch for bug 1769499 lets the RDD process create a headless EGL
context using GBM, which needs access only to the GPU device files, not
the display server.  This means that the X11 access recently added in
bug 1769182 can be turned back off.

Differential Revision: https://phabricator.services.mozilla.com/D147792
2022-06-01 16:42:53 +00:00
Noemi Erli aca984c8a8 Backed out changeset 8ef044a6a1fe (bug 1766687) for causing bustage in NSSCertDBTrustDomain.cpp 2022-06-01 02:35:17 +03:00
Dana Keeler 527bfba679 Bug 1766687 - remove support for SHA1 signatures in all certificates (including imported roots) r=jschanck
Previously [0], support for SHA1 signatures in certificates was disabled by
default, except for certificates issued by imported roots. Chrome had a similar
policy, but this was removed in 71 [1]. Telemetry [2] indicates that some users
do still encounter SHA1 signatures at a fraction of the rate of overall
certificate errors, so forbidding all SHA1 signatures should have minimal
compatibility impact.

[0] https://bugzilla.mozilla.org/show_bug.cgi?id=1302140
[1] https://chromeenterprise.google/policies/#EnableSha1ForLocalAnchors
[2] https://mzl.la/3kg5J4j

Differential Revision: https://phabricator.services.mozilla.com/D144870
2022-05-31 20:24:33 +00:00
Mike Hommey 4d1c26ec5d Bug 1770894 - Update cert_storage to base64 0.13. r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D147254
2022-05-30 21:37:35 +00:00
ffxbld cc2bc83283 No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=dmeehan
Differential Revision: https://phabricator.services.mozilla.com/D147641
2022-05-30 12:51:23 +00:00
Dennis Jackson a6eafd8ee6 Bug 1767934 - land NSS NSS_3_79_RTM UPGRADE_NSS_RELEASE, r=nss-reviewers,jschanck DONTBUILD
2022-05-26  Dennis Jackson  <djackson@mozilla.com>

	* lib/nss/nss.h, lib/softoken/softkver.h, lib/util/nssutil.h:
	Set version numbers to 3.79 final
	[3463596523be] [NSS_3_79_RTM] <NSS_3_79_BRANCH>

2022-05-20  Dennis Jackson  <djackson@mozilla.com>

	* .hgtags:
	Added tag NSS_3_79_BETA2 for changeset 82f9862369bd
	[5498a0531d73] <NSS_3_79_BRANCH>

Differential Revision: https://phabricator.services.mozilla.com/D147412
2022-05-27 20:28:25 +00:00
ffxbld 2d77e262c4 No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=dmeehan
Differential Revision: https://phabricator.services.mozilla.com/D147417
2022-05-26 12:05:17 +00:00
John Schanck 9fee1bf9c5 Bug 1769627 - switch to SECMOD_LockedModuleHasRemovableSlots. r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D147095
2022-05-23 20:49:51 +00:00
Iulian Moraru ecc26bffac Backed out changeset 93af3b1d56ef (bug 1769627) for causing build bustages on xul.dll. CLOSED TREE 2022-05-23 21:09:40 +03:00
John Schanck 7a3c36ef2f Bug 1769627 - switch to SECMOD_LockedModuleHasRemovableSlots. r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D147095
2022-05-23 17:50:39 +00:00
Mathieu Leplatre caf000e948 Bug 1702759 - Remove bucket name preference r=robwu
This introduces a breaking change: the buckets cannot be changed via preferences anymore.

Before landing this patch, we should have a released a new version of the Remote Settings DevTools that is compatible with this new API.

Differential Revision: https://phabricator.services.mozilla.com/D145455
2022-05-23 16:24:57 +00:00
Mathieu Leplatre c66b8b3bfc Bug 1702759 - Remove custom last check preference r=gbeckley
The ability to customize this preference name has very little value. We introduced this feature when we refactored our ad-hoc Kinto clients into a single RemoteSetting client.

Renaming this preference means that the DevTools will display an empty field until settings are resynced.

Differential Revision: https://phabricator.services.mozilla.com/D145454
2022-05-23 16:24:57 +00:00
Mathieu Leplatre f07763259c Bug 1702759 - Remove collection and signer preferences r=gbeckley
These preferences were cargo culted from our initial prototypes, and users should not be able to change them

Differential Revision: https://phabricator.services.mozilla.com/D145453
2022-05-23 16:24:56 +00:00
ffxbld 478176c97b No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D147079
2022-05-23 11:43:45 +00:00
Alexandre Lissy 0d2e553991 Bug 1770703 - Duplicated ioctl() case when building with MOZ_ASAN r=gcp
Differential Revision: https://phabricator.services.mozilla.com/D147057
2022-05-23 09:51:28 +00:00
Bob Owen 45b8231a42 Bug 1769845 p2: Back out changeset 6afde8456771. r=handyman
This transferred sandbox mitigations directly into child process memory, which
may have caused issues with some security software.

Depends on D146930

Differential Revision: https://phabricator.services.mozilla.com/D146931
2022-05-23 07:53:41 +00:00
Bob Owen b48aea26d9 Bug 1769845 p1: Use command line to pass whether win32k is locked down in policy. r=handyman
Differential Revision: https://phabricator.services.mozilla.com/D146930
2022-05-23 07:53:41 +00:00
Alexandre Lissy 74b64ad41e Bug 1769616 - Error(ENOSYS) for set_mempolicy() on Content and Utility AudioDecoder r=jld
Differential Revision: https://phabricator.services.mozilla.com/D146833
2022-05-21 00:01:28 +00:00
Dennis Jackson 25a557ba16 Bug 1767934 - land NSS NSS_3_79_BETA2 UPGRADE_NSS_RELEASE, r=nss-reviewers,jschanck
Differential Revision: https://phabricator.services.mozilla.com/D146927
2022-05-20 23:12:52 +00:00
Anna Weine f5864cbd70 Bug 1767934 - land NSS 2efccbd85918 UPGRADE_NSS_RELEASE, r=nss-reviewers,djackson
2022-05-19  John M. Schanck  <jschanck@mozilla.com>

	* lib/ckfw/wrap.c:
	Bug 1766978 - improve error handling after
	nssCKFWInstance_CreateObjectHandle. r=djackson

	[2efccbd85918] [tip]

2022-03-18  Robert Relyea  <rrelyea@redhat.com>

	* cmd/pk12util/pk12util.c, lib/pkcs12/p12local.c,
	tests/common/init.sh, tests/tools/tools.sh:
	Bug 1757075 NSS does not properly import or export pkcs12 files with
	large passwords and pkcs5v2 encoding.

	Don't use NULL when encoding UTF8 with pkcs5v2. Fix a bug here when
	converting from UCS2 to UTF8 we would add a double NULL when adding
	a NULL.

	[0f4664512bd0]

2022-05-17  Dennis Jackson  <djackson@mozilla.com>

	* nspr.patch:
	Remove nspr.patch mistakenly committed in e3ac914bc684
	[99e32fcca1c7]

2022-05-17  Leander Schwarz  <lschwarz@mozilla.com>

	* gtests/ssl_gtest/ssl_record_unittest.cc,
	gtests/ssl_gtest/ssl_v2_client_hello_unittest.cc, lib/ssl/ssl3con.c,
	lib/ssl/ssl3gthr.c, lib/ssl/tls13con.c:
	Bug 1764788 - Correct invalid record inner and outter content type
	alerts. r=djackson

	Added test cases for alerts during and pre handshake as well as TLS
	1.3 only after handshake (application data) cases due to unsupported
	de- and encryption of lower TLS version records in gtest.

	Adjusted some test cases that expect failed connections to the
	updated alerts.

	[7f4b0af3a526]

	* gtests/ssl_gtest/ssl_version_unittest.cc, lib/ssl/ssl3con.c:
	Bug 1765753 - TLS 1.3 Server: Send protocol_version alert on
	unsupported ClientHello.legacy_version. r=djackson

	[bc7bfba47e0a]

	* gtests/ssl_gtest/ssl_extension_unittest.cc, lib/ssl/ssl3exthandle.c:
	Bug 1765753 - Added RFC8422 compliant TLS <= 1.2
	undefined/compressed ECPointFormat extension alerts. r=djackson

	[d06a8831ec84]

2022-05-16  John M. Schanck  <jschanck@mozilla.com>

	* gtests/util_gtest/manifest.mn, gtests/util_gtest/util_gtest.gyp,
	gtests/util_gtest/util_secasn1d_unittest.cc, lib/util/secasn1d.c:
	Bug 1387919 - Fix secasn1d parsing of indefinite SEQUENCE inside
	indefinite GROUP. r=keeler,nss-reviewers,djackson

	In an iteration over elements of an indefinite-length encoded GROUP
	(sec_asn1d_next_in_group), the child of the current state is
	responsible for parsing the GROUP's end-of-contents octets---a call
	to sec_asn1d_parse_end_of_contents(state->child) sets the
	endofcontents flag for state->child and a later call to
	sec_asn1d_next_in_group checks state->child->endofcontents and
	terminates the iteration.

	In an iteration over elements of an indefinite-length encoded
	SEQUENCE (sec_asn1d_next_in_sequence), on the other hand, the
	current state, not its child, handles the end-of-contents octets.

	Prior to this commit, an error would occur when state pointed to an
	indefinite-length encoded GROUP and state->child pointed to an
	indefinite-length encoded SEQUENCE. In this case, state->child would
	be passed to sec_asn1d_parse_end_of_contents to parse the SEQUENCE's
	end-of-contents octets. This would set the endofcontents flag for
	state->child, and this would be misinterpreted as an end-of-
	iteration signal for the surrounding GROUP.

	[1811eec24997]

	* automation/abi-check/expected-report-libnss3.so.txt,
	lib/nss/nss.def, lib/pk11wrap/pk11list.c, lib/pk11wrap/pk11util.c,
	lib/pk11wrap/secmod.h, lib/util/nssrwlk.h:
	Bug 1753315 - Add SECMOD_LockedModuleHasRemovableSlots. r=rrelyea

	[499ae15c18ad]

2022-05-13  Kai Engert  <kaie@kuix.de>

	* automation/abi-check/expected-report-libnspr4.so.txt,
	cmd/selfserv/selfserv.c, cmd/tstclnt/tstclnt.c, nspr.patch:
	Bug 1769295 - selfserv and tstclnt should use
	PR_GetPrefLoopbackAddrInfo. r=rrelyea

	[e3ac914bc684]

2022-05-11  John M. Schanck  <jschanck@mozilla.com>

	* lib/softoken/legacydb/lginit.c:
	Bug 1454072 - Use of uninitialized pointer in lg_init after alloc
	fail. r=nss-reviewers,nkulatova

	[927d47dcc509]

2022-05-06  John M. Schanck  <jschanck@mozilla.com>

	* automation/clang-format/Dockerfile:
	Bug 1766907 - Update mercurial in clang-format docker image. r=mt

	[83a89ed9f527]

Differential Revision: https://phabricator.services.mozilla.com/D146888
2022-05-20 09:24:42 +00:00
Alexandre Lissy cd689b44aa Bug 1769033 - Add OpenBSD sandboxing support r=gaston
Differential Revision: https://phabricator.services.mozilla.com/D146568
2022-05-20 08:25:04 +00:00
Jed Davis 73a294a2b8 Bug 1769182 - Allow the RDD process to use EGL under X11 on Linux. r=gcp
This patch mostly turns on the features set up by the earlier patches:
allow connecting to the X server and reading various related things
(.Xauthority, GPU device info in sysfs, etc.).  It also turns off Mesa's
shader cache in the RDD process; that shouldn't be needed here, and
disabling it lets us avoid dealing with a few things in the sandbox
policy that we'd rather not (e.g., `getpwuid`).

Differential Revision: https://phabricator.services.mozilla.com/D146275
2022-05-19 17:02:33 +00:00
Jed Davis 6798385a35 Bug 1769182 - Factor out the X11/Mesa-related parts of Linux sandbox file policies. r=gcp
This patch moves a lot of text but the idea is relatively simple and
no functional change is intended: factor out the parts of the content
sandbox policy needed to create and use an EGL context under X11.
(The `AddDriPaths` function already has some of the dependencies in a
conveniently separated form, but there are others.)

Differential Revision: https://phabricator.services.mozilla.com/D146274
2022-05-19 17:02:32 +00:00
Jed Davis c4f9ff3229 Bug 1769182 - Allow send/recv and sendto/recvfrom in the common Linux sandbox policy. r=gcp
These syscalls (at least send/recv) are used by X11 client libraries, and
allowing them doesn't really change anything about security or attack
surface, because they're strict subsets of sendmsg/recvmsg which we
already allow everywhere for use by IPC.  So, this patch allows them in
all process types instead of only content.

Differential Revision: https://phabricator.services.mozilla.com/D146273
2022-05-19 17:02:32 +00:00
Jed Davis cf0f678eb8 Bug 1769182 - Factor out connect() brokering in the Linux sandbox policies. r=gcp
We're going to want to let the RDD process make a (brokered) connection
to a local X server, but the seccomp-bpf plumbing for that mostly lives
in the content process sandbox policy.  This moves it into the common
policy, and subclasses can opt in.

Differential Revision: https://phabricator.services.mozilla.com/D146272
2022-05-19 17:02:31 +00:00
Jed Davis 034ed27337 Bug 1769182 - Refactor seccomp-bpf sandbox policy constructors. r=gcp
The arguments to the SandboxPolicyCommon contructor will get more
complicated as more optional features are added (e.g., the one added in
the next patch), and they're basically just mapped to boolean member
variables, so this patch lets the subclasses set them directly, to keep
things simpler and more readable.

Differential Revision: https://phabricator.services.mozilla.com/D146271
2022-05-19 17:02:31 +00:00
ffxbld 1677fb63f8 No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D146796
2022-05-19 11:57:24 +00:00
Alexandre Lissy 4684b3ea07 Bug 1769992 - Enable Win32K Lockdown for Windows10 Fall Creators+ r=bobowen
Differential Revision: https://phabricator.services.mozilla.com/D146716
2022-05-18 15:57:10 +00:00
Alexandre Lissy f74882d83e Bug 1769748 - Disable dynamic code mitigation on MinGW64 builds r=bobowen
Depends on D146639

Differential Revision: https://phabricator.services.mozilla.com/D146640
2022-05-18 14:16:57 +00:00
Andrew McCreight fa8bfd1245 Bug 1514936, part 2 - Drop the outer arguments from static components. r=xpcom-reviewers,nika
Differential Revision: https://phabricator.services.mozilla.com/D146457
2022-05-17 20:24:19 +00:00
Andrew McCreight c8c5c819df Bug 1514936, part 1 - Remove the outer argument to nsIFactory::createInstance. r=xpcom-reviewers,preferences-reviewers,nika,Gijs
This patch won't actually build, because a few bits of code are used
for both nsIFactory::createInstance and static components, and static
components are not fixed until the next patch.

The first place is nsLoadGroupConstructor, which uses an nsIFactory
macro to create a static component constructor. (This could be worked
around by expanding the macro to the state before this patch.)

The other issue is that nsAppShellConstructor is used in an nsIFactory
on OSX, but as a static component on all other platforms. This could
be worked around by wrapping nsAppShellConstructor in an adaptor that
passes in the extra null argument to nsAppShellConstructor.

Differential Revision: https://phabricator.services.mozilla.com/D146456
2022-05-17 20:24:19 +00:00
ffxbld 9a53228116 No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D146422
2022-05-16 13:40:00 +00:00
Iulian Moraru cf3fad08ff Backed out 5 changesets (bug 1769182) for causing mochitest failures on browser_sandbox_test.js. CLOSED TREE
Backed out changeset f5b71a28f28b (bug 1769182)
Backed out changeset 7a64faec004f (bug 1769182)
Backed out changeset c7833370362a (bug 1769182)
Backed out changeset b91adae9bb59 (bug 1769182)
Backed out changeset cf7bb9b7414d (bug 1769182)
2022-05-14 05:20:37 +03:00
Jed Davis accee09e1b Bug 1769182 - Allow the RDD process to use EGL under X11 on Linux. r=gcp
This patch mostly turns on the features set up by the earlier patches:
allow connecting to the X server and reading various related things
(.Xauthority, GPU device info in sysfs, etc.).  It also turns off Mesa's
shader cache in the RDD process; that shouldn't be needed here, and
disabling it lets us avoid dealing with a few things in the sandbox
policy that we'd rather not (e.g., `getpwuid`).

Differential Revision: https://phabricator.services.mozilla.com/D146275
2022-05-14 00:42:56 +00:00
Jed Davis 79e1be12f4 Bug 1769182 - Factor out the X11/Mesa-related parts of Linux sandbox file policies. r=gcp
This patch moves a lot of text but the idea is relatively simple and
no functional change is intended: factor out the parts of the content
sandbox policy needed to create and use an EGL context under X11.
(The `AddDriPaths` function already has some of the dependencies in a
conveniently separated form, but there are others.)

Differential Revision: https://phabricator.services.mozilla.com/D146274
2022-05-14 00:42:56 +00:00
Jed Davis c92c41aa71 Bug 1769182 - Allow send/recv and sendto/recvfrom in the common Linux sandbox policy. r=gcp
These syscalls (at least send/recv) are used by X11 client libraries, and
allowing them doesn't really change anything about security or attack
surface, because they're strict subsets of sendmsg/recvmsg which we
already allow everywhere for use by IPC.  So, this patch allows them in
all process types instead of only content.

Differential Revision: https://phabricator.services.mozilla.com/D146273
2022-05-14 00:42:56 +00:00
Jed Davis 9e9f783fb4 Bug 1769182 - Factor out connect() brokering in the Linux sandbox policies. r=gcp
We're going to want to let the RDD process make a (brokered) connection
to a local X server, but the seccomp-bpf plumbing for that mostly lives
in the content process sandbox policy.  This moves it into the common
policy, and subclasses can opt in.

Differential Revision: https://phabricator.services.mozilla.com/D146272
2022-05-14 00:42:55 +00:00
Jed Davis 5b1c92943d Bug 1769182 - Refactor seccomp-bpf sandbox policy constructors. r=gcp
The arguments to the SandboxPolicyCommon contructor will get more
complicated as more optional features are added (e.g., the one added in
the next patch), and they're basically just mapped to boolean member
variables, so this patch lets the subclasses set them directly, to keep
things simpler and more readable.

Differential Revision: https://phabricator.services.mozilla.com/D146271
2022-05-14 00:42:55 +00:00
John Schanck ff77229600 Bug 1768710 - Replace CRLite test filter. r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D146117
2022-05-13 13:39:32 +00:00
John Schanck e76a11f1cf Bug 1768710 - Upgrade rust-cascade to 1.4.0 and sha2 to 0.10.2. r=keeler,webdriver-reviewers,whimboo,glandium
This also upgrades the headers crate to 0.3.7. Webdriver depends on warp 0.2,
which depends on headers 0.3. But headers < 0.3.7 depends on sha-1 < 0.10. We
need sha-1 and sha2 at the same minor version to avoid duplicate block-buffer,
generic-array, and digest crates.

Differential Revision: https://phabricator.services.mozilla.com/D146010
2022-05-13 13:39:31 +00:00
Alexandre Lissy 86b699e35f Bug 1768665 - Extend linux sandbox Utility for PGO on try with PR_GET_PDEATHSIG r=jld
Differential Revision: https://phabricator.services.mozilla.com/D146200
2022-05-13 08:10:38 +00:00
Nika Layzell b8bbcfbc33 Bug 1769124 - Require Recv methods to return IPCResult, r=ipc-reviewers,mccr8
Differential Revision: https://phabricator.services.mozilla.com/D146243
2022-05-13 02:20:23 +00:00
Dana Keeler fb67326470 Bug 1768047 - introduce HMAC C++ helper and remove nsICryptoHMAC r=jschanck,necko-reviewers,kershaw,padenot
This patch removes the redundant nsICryptoHMAC interface and implementation,
updates front-end code to use WebCrypto, and changes back-end code to use the
helper class HMAC introduced by this patch.

This also removes the last uses of nsIKeyObject and nsIKeyObjectFactory, and
thus those interfaces and implementations as well.

Differential Revision: https://phabricator.services.mozilla.com/D145656
2022-05-12 22:24:29 +00:00
Randell Jesup 46292cae55 Bug 1207753 - security/manager thread-safety annotations r=keeler,necko-reviewers,dragana
Differential Revision: https://phabricator.services.mozilla.com/D131879
2022-05-12 21:16:11 +00:00
Dana Keeler 036e660199 Bug 1769058 - handle PinsListTimestamp entry in Chrome's static pinning list r=jschanck DONTBUILD
Chrome's transport_security_state_static.pins (used by Gecko to glean static
pinning information) recently added a timestamp to note its creation time.
This patch updates genHPKPStaticPins.js to handle the timestamp's presence by
ignoring it.
This also removes the obsolete security/manager/tools/genHPKPStaticPins.js.
The canonical version of that file is
taskcluster/docker/periodic-updates/scripts/genHPKPStaticPins.js.

Differential Revision: https://phabricator.services.mozilla.com/D146226
2022-05-12 18:48:17 +00:00
Dana Keeler 58a4c6bd73 Bug 1767099 - convert some security PKI preferences to static prefs r=jschanck
Using static preferences in PSM will eventually allow NSS to be initialized on
a background thread instead of blocking the main thread.

Depends on D145152

Differential Revision: https://phabricator.services.mozilla.com/D145390
2022-05-11 22:36:16 +00:00
Dana Keeler 4b1cb737b4 Bug 1767099 - convert some TLS security prefs to static prefs r=jschanck
Using static preferences in PSM will eventually allow NSS to be initialized on
a background thread instead of blocking the main thread.

Depends on D145151

Differential Revision: https://phabricator.services.mozilla.com/D145152
2022-05-11 22:36:15 +00:00
Dana Keeler 78783f1ae0 Bug 1767099 - convert some certificate-related security prefs to static prefs r=jschanck
Using static preferences in PSM will eventually allow NSS to be initialized on
a background thread instead of blocking the main thread.

Depends on D145150

Differential Revision: https://phabricator.services.mozilla.com/D145151
2022-05-11 22:36:15 +00:00
Dana Keeler 16aec8aa2f Bug 1767099 - convert security OCSP prefs to static prefs r=jschanck
Using static preferences in PSM will eventually allow NSS to be initialized on
a background thread instead of blocking the main thread.

Differential Revision: https://phabricator.services.mozilla.com/D145150
2022-05-11 22:36:14 +00:00
Bob Owen f2a9df286a Bug 1768014 p2: Default to policy win32k lockdown status if in process check fails. r=gcp,cmartin
Depends on D145872

Differential Revision: https://phabricator.services.mozilla.com/D145873
2022-05-10 06:07:17 +00:00
Bob Owen f606488912 Bug 1768014 p1: Transfer mitigations to sandboxed child process. r=gcp
Differential Revision: https://phabricator.services.mozilla.com/D145872
2022-05-10 06:07:16 +00:00
ffxbld 8717524b50 No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D145877
2022-05-09 13:47:59 +00:00
Dana Keeler 6df4b335aa Bug 1767489 - disable sha-1 signatures in certificates by default r=jschanck
Bug 1766687 will remove support for sha-1 signatures in certificates entirely.
This patch will disable sha-1 via the preference and ride the trains first, to
allow time for any organizations that somehow still use certificates with sha-1
signatures to re-sign them.

Differential Revision: https://phabricator.services.mozilla.com/D145359
2022-05-06 21:07:44 +00:00
Chris Peterson 8c5719edb5 Bug 1767947 - Fix macOS build error on aarch64. r=mac-reviewers,tnikkel
To fix this build error:

ERROR -  /builds/worker/fetches/clang/lib/clang/14.0.1/include/xmmintrin.h:14:2: error: "This header is only meant to be used on x86 and x64 architecture"

Wrap #include "emmintrin.h" with (the relevant subset of) the same #ifdefs nsRect.h uses here:

https://searchfox.org/mozilla-central/rev/bf243bc817f97b0bb74af710bd9d874370468e8b/gfx/src/nsRect.h#19-26

Differential Revision: https://phabricator.services.mozilla.com/D145685
2022-05-06 03:29:52 +00:00
ffxbld a5485957a7 No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D145585
2022-05-05 12:58:54 +00:00
Anna Weine 42196a472a Bug 1767934 - land NSS 85bf9240f3e1 UPGRADE_NSS_RELEASE, r=nss-reviewers,djackson
Differential Revision: https://phabricator.services.mozilla.com/D145546
2022-05-05 10:56:32 +00:00
Chris Peterson 51164d0dcf Bug 1767881 - Fix non-unified build error in security/sandbox/common. r=haik
#including ApplicationServices.h within `namespace ApplicationServices` indirectly causes emmintrin.h to also be #included in namespace ApplicationServices in non-unified builds.

In file included from security/sandbox/common/test/SandboxTestingChild.cpp:12:
In file included from objdir-x86_64-apple-darwin21.4.0-clang-mozbuild/dist/include/mozilla/ipc/UtilityProcessChild.h:10:
In file included from objdir-x86_64-apple-darwin21.4.0-clang-mozbuild/dist/include/mozilla/ipc/UtilityAudioDecoderParent.h:9:
In file included from objdir-x86_64-apple-darwin21.4.0-clang-mozbuild/ipc/ipdl/_ipdlheaders/mozilla/PRemoteDecoderManagerParent.h:23:
In file included from objdir-x86_64-apple-darwin21.4.0-clang-mozbuild/dist/include/PlatformDecoderModule.h:23:
In file included from objdir-x86_64-apple-darwin21.4.0-clang-mozbuild/dist/include/mozilla/layers/KnowsCompositor.h:10:
In file included from objdir-x86_64-apple-darwin21.4.0-clang-mozbuild/dist/include/mozilla/layers/LayersTypes.h:14:
In file included from objdir-x86_64-apple-darwin21.4.0-clang-mozbuild/dist/include/Units.h:19:
objdir-x86_64-apple-darwin21.4.0-clang-mozbuild/dist/include/nsRect.h:294:26: error: unknown type name '__m128i'; did you mean 'ApplicationServices::__m128i'?
static MOZ_ALWAYS_INLINE __m128i floor_ps2epi32(__m128 x) {
                         ^~~~~~~
                         ApplicationServices::__m128i
/Users/chris/.mozbuild/clang/lib/clang/14.0.1/include/emmintrin.h:20:19: note: 'ApplicationServices::__m128i' declared here
typedef long long __m128i __attribute__((__vector_size__(16), __aligned__(16)));

Differential Revision: https://phabricator.services.mozilla.com/D145516
2022-05-05 04:00:58 +00:00
Mike Hommey 2d6c8fdbc6 Bug 1766561 - Adjust UTF-16 string formatting. r=nika
With MOZ_FORMAT_PRINTF annotations, the compiler expects a wchar_t*, and
it won't automatically consider char16ptr_t to be compatible with that.

While handling strings, there's one case of formatting that doesn't need
to use %S at all.

Differential Revision: https://phabricator.services.mozilla.com/D144919
2022-05-03 20:49:09 +00:00
Mike Hommey 90c1d1fba0 Bug 1766561 - Add missing z modifier for size_t formatting. r=gfx-reviewers,necko-reviewers,keeler,rkraesig,kershaw
Differential Revision: https://phabricator.services.mozilla.com/D144918
2022-05-03 20:49:09 +00:00
Mike Hommey 12df1ed1b6 Bug 1766561 - Use %lu for Windows Error types (DWORD). r=rkraesig,xpcom-reviewers,application-update-reviewers,mhowell,bobowen,necko-reviewers,keeler,media-playback-reviewers,bytesized,barret,alwu,kershaw
Differential Revision: https://phabricator.services.mozilla.com/D144914
2022-05-03 20:49:07 +00:00
Nika Layzell 052cba0853 Bug 1738106 - Part 3: Switch to TaskQueue::Create, r=xpcom-reviewers,necko-reviewers,media-playback-reviewers,dragana,alwu,barret
In future parts, TaskQueue will require extra initialization to be performed
which cannot happen in a constructor, as it takes references to the TaskQueue
object itself, which will require the introduction of a helper method. This
patch switches all callers of the TaskQueue constructor to use the new method.

Differential Revision: https://phabricator.services.mozilla.com/D142604
2022-05-02 20:37:34 +00:00
ffxbld dc7cdcb8e8 No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D145224
2022-05-02 12:27:06 +00:00
Henrik Skupin 78f7bbce86 Bug 1719505 - [remote] Unify Remote Agent's running state with Marionette. r=webdriver-reviewers,mossop,smaug,keeler,jdescottes
Both components are related to WebDriver and should expose the
same flag for their running state.

Differential Revision: https://phabricator.services.mozilla.com/D144982
2022-04-29 17:38:14 +00:00
Butkovits Atila fc54f60211 Backed out 6 changesets (bug 1719505) for causing failures at browser_Troubleshoot.js. CLOSED TREE
Backed out changeset 915b5331f6b2 (bug 1719505)
Backed out changeset 8df69b3445e5 (bug 1719505)
Backed out changeset 674fe8523cf6 (bug 1719505)
Backed out changeset f40c2fe6872d (bug 1719505)
Backed out changeset 3e3df2a6b1e3 (bug 1719505)
Backed out changeset 621024810236 (bug 1719505)
2022-04-29 17:32:32 +03:00
Henrik Skupin 8a69201f2e Bug 1719505 - [remote] Unify Remote Agent's running state with Marionette. r=webdriver-reviewers,mossop,smaug,keeler,jdescottes
Both components are related to WebDriver and should expose the
same flag for their running state.

Differential Revision: https://phabricator.services.mozilla.com/D144982
2022-04-29 11:55:43 +00:00
Mike Hommey 028ad1b883 Bug 1766377 - Fix remaining sign-compare warnings in Windows builds. r=rkraesig,gsvelto,media-playback-reviewers,gfx-reviewers,bryce,sotaro
browser/components/shell/WindowsUserChoice.cpp(233,23): error: comparison of integers of different signs: 'int' and 'const size_t' (aka 'const unsigned long long') [-Werror,-Wsign-compare]
    for (int j = 0; j < DWORDS_PER_BLOCK; ++j) {
                    ~ ^ ~~~~~~~~~~~~~~~~
browser/components/shell/WindowsUserChoice.cpp(388,21): error: comparison of integers of different signs: 'int' and 'size_t' (aka 'unsigned long long') [-Werror,-Wsign-compare]
  for (int i = 0; i < ArrayLength(exts); ++i) {
                  ~ ^ ~~~~~~~~~~~~~~~~~
browser/components/shell/nsWindowsShellService.cpp(1225,21): error: comparison of integers of different signs: 'int' and 'size_t' (aka 'unsigned long long') [-Werror,-Wsign-compare]
  for (int i = 0; i < ArrayLength(shortcutCSIDLs); ++i) {
                  ~ ^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~
browser/components/shell/nsWindowsShellService.cpp(1492,21): error: comparison of integers of different signs: 'int' and 'size_t' (aka 'unsigned long long') [-Werror,-Wsign-compare]
  for (int i = 0; i < ArrayLength(folders); ++i) {
                  ~ ^ ~~~~~~~~~~~~~~~~~~~~
dom/media/platforms/wmf/MFTDecoder.cpp(85,23): error: comparison of integers of different signs: 'int' and 'UINT32' (aka 'unsigned int') [-Werror,-Wsign-compare]
    for (int i = 1; i < actsNum; i++) {
                    ~ ^ ~~~~~~~
gfx/2d/Factory.cpp(1276,21): error: comparison of integers of different signs: 'int' and 'uint32_t' (aka 'unsigned int') [-Werror,-Wsign-compare]
  for (int y = 0; y < height; y++) {
                  ~ ^ ~~~~~~
gfx/layers/d3d11/CompositorD3D11.cpp(1096,36): error: comparison of integers of different signs: 'UINT' (aka 'unsigned int') and 'int' [-Werror,-Wsign-compare]
        swapDesc.BufferDesc.Height == mSize.height) ||
        ~~~~~~~~~~~~~~~~~~~~~~~~~~ ^  ~~~~~~~~~~~~
gfx/layers/d3d11/CompositorD3D11.cpp(1095,35): error: comparison of integers of different signs: 'UINT' (aka 'unsigned int') and 'int' [-Werror,-Wsign-compare]
  if (((swapDesc.BufferDesc.Width == mSize.width &&
        ~~~~~~~~~~~~~~~~~~~~~~~~~ ^  ~~~~~~~~~~~
gfx/layers/d3d11/TextureD3D11.cpp(1278,30): error: comparison of integers of different signs: 'UINT' (aka 'unsigned int') and 'int' [-Werror,-Wsign-compare]
          currentDesc.Height != mSize.height ||
          ~~~~~~~~~~~~~~~~~~ ^  ~~~~~~~~~~~~
gfx/layers/d3d11/TextureD3D11.cpp(1277,29): error: comparison of integers of different signs: 'UINT' (aka 'unsigned int') and 'int' [-Werror,-Wsign-compare]
      if (currentDesc.Width != mSize.width ||
          ~~~~~~~~~~~~~~~~~ ^  ~~~~~~~~~~~
gfx/layers/ipc/ContentCompositorBridgeParent.cpp(248,19): error: comparison of integers of different signs: 'const uint32_t' (aka 'const unsigned int') and 'int32_t' (aka 'int') [-Werror,-Wsign-compare]
  if (sequenceNum == status.sequenceNumber() && !dm->HasDeviceReset()) {
      ~~~~~~~~~~~ ^  ~~~~~~~~~~~~~~~~~~~~~~~
gfx/thebes/D3D11Checks.cpp(129,21): error: comparison of integers of different signs: 'int' and 'unsigned int' [-Werror,-Wsign-compare]
    if (resultColor != 0xffffff00) {
        ~~~~~~~~~~~ ^  ~~~~~~~~~~
gfx/thebes/D3D11Checks.cpp(154,23): error: comparison of integers of different signs: 'int' and 'unsigned long long' [-Werror,-Wsign-compare]
    for (int i = 0; i < PR_ARRAY_SIZE(checkModules); i += 1) {
                    ~ ^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~
gfx/thebes/D3D11Checks.cpp(409,14): error: comparison of integers of different signs: 'int32_t' (aka 'int') and 'UINT' (aka 'unsigned int') [-Werror,-Wsign-compare]
  if (vendor != desc.VendorId) {
      ~~~~~~ ^  ~~~~~~~~~~~~~
gfx/thebes/gfxDWriteFontList.cpp(1248,39): error: comparison of integers of different signs: 'unsigned int' and 'int' [-Werror,-Wsign-compare]
        addFamily(names[index], index != sysLocIndex);
                                ~~~~~ ^  ~~~~~~~~~~~
intl/lwbrk/nsUniscribeBreaker.cpp(121,21): error: comparison of integers of different signs: 'int' and 'uint32_t' (aka 'unsigned int') [-Werror,-Wsign-compare]
  for (int i = 0; i < aLength; ++i) {
                  ~ ^ ~~~~~~~
intl/lwbrk/nsUniscribeBreaker.cpp(132,23): error: comparison of integers of different signs: 'int' and 'uint32_t' (aka 'unsigned int') [-Werror,-Wsign-compare]
    for (int i = 0; i < aLength; ++i) {
                    ~ ^ ~~~~~~~
intl/lwbrk/nsUniscribeBreaker.cpp(138,23): error: comparison of integers of different signs: 'int' and 'uint32_t' (aka 'unsigned int') [-Werror,-Wsign-compare]
    for (int i = 0; i < aLength; ++i) {
                    ~ ^ ~~~~~~~
mozglue/misc/PreXULSkeletonUI.cpp(319,26): error: comparison of integers of different signs: 'std::basic_string<char>::size_type' (aka 'unsigned long long') and 'int' [-Werror,-Wsign-compare]
    while (line.length() > whitespace &&
           ~~~~~~~~~~~~~ ^ ~~~~~~~~~~
mozglue/misc/PreXULSkeletonUI.cpp(1003,21): error: comparison of integers of different signs: 'int' and 'size_t' (aka 'unsigned long long') [-Werror,-Wsign-compare]
  for (int i = 1; i < noPlaceholderSpans.length(); i++) {
                  ~ ^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~
mozglue/misc/PreXULSkeletonUI.cpp(1708,21): error: comparison of integers of different signs: 'int' and 'unsigned long long' [-Werror,-Wsign-compare]
  for (int i = 0; i < dataLen / (2 * sizeof(double)); i++) {
                  ~ ^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
security/sandbox/chromium-shim/sandbox/win/permissionsService.cpp(40,16): error: comparison of integers of different signs: 'int' and 'const std::basic_string<wchar_t>::size_type' (aka 'const unsigned long long') [-Werror,-Wsign-compare]
  if (slashIdx != std::wstring::npos) {
      ~~~~~~~~ ^  ~~~~~~~~~~~~~~~~~~
toolkit/components/aboutthirdparty/tests/gtest/TestAboutThirdParty.cpp(107,21): error: comparison of integers of different signs: 'int' and 'size_t' (aka 'unsigned long long') [-Werror,-Wsign-compare]
  for (int i = 0; i < ArrayLength(kDirectoriesUnsorted); ++i) {
                  ~ ^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
toolkit/crashreporter/breakpad-client/windows/crash_generation/crash_generation_server.cc(957,23): error: comparison of integers of different signs: 'int' and 'const size_t' (aka 'const unsigned long long') [-Werror,-Wsign-compare]
    for (int i = 0; i < kExceptionAppMemoryRegions; i++) {
                    ~ ^ ~~~~~~~~~~~~~~~~~~~~~~~~~~
toolkit/crashreporter/client/crashreporter_win.cpp(373,21): error: comparison of integers of different signs: 'int' and 'unsigned long long' [-Werror,-Wsign-compare]
  for (int i = 0; i < sizeof(kDefaultAttachedBottom) / sizeof(UINT); i++) {
                  ~ ^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
toolkit/crashreporter/client/crashreporter_win.cpp(671,21): error: comparison of integers of different signs: 'int' and 'unsigned long long' [-Werror,-Wsign-compare]
  for (int i = 0; i < sizeof(controls) / sizeof(controls[0]); i++) {
                  ~ ^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
toolkit/crashreporter/client/crashreporter_win.cpp(1048,21): error: comparison of integers of different signs: 'int' and 'unsigned long long' [-Werror,-Wsign-compare]
  for (int i = 0; i < sizeof(kDefaultAttachedBottom) / sizeof(UINT); i++) {
                  ~ ^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
toolkit/mozapps/defaultagent/SetDefaultBrowser.cpp(248,21): error: comparison of integers of different signs: 'int' and 'size_t' (aka 'unsigned long long') [-Werror,-Wsign-compare]
  for (int i = 0; i < mozilla::ArrayLength(associations); ++i) {
                  ~ ^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
toolkit/system/windowsproxy/ProxyUtils.cpp(27,36): error: comparison of integers of different signs: 'const int' and 'nsTArray_base::size_type' (aka 'unsigned long long') [-Werror,-Wsign-compare]
                             if (i < addr.Length()) {
                                 ~ ^ ~~~~~~~~~~~~~
toolkit/xre/dllservices/mozglue/interceptor/Arm64.h(178,28): error: comparison of integers of different signs: 'int32_t' (aka 'int') and 'unsigned int' [-Werror,-Wsign-compare]
  if (signbits && signbits != 0xFE000000) {
                  ~~~~~~~~ ^  ~~~~~~~~~~
obj-build/dist/include/gtest/gtest.h(1842,54): note: expanded from macro 'EXPECT_EQ'
  EXPECT_PRED_FORMAT2(::testing::internal::EqHelper::Compare, val1, val2)
                                                     ^
obj-build/dist/include/gtest/gtest.h(1354,11): error: comparison of integers of different signs: 'const unsigned int' and 'const int' [-Werror,-Wsign-compare]
  if (lhs == rhs) {
      ~~~ ^  ~~~
obj-build/dist/include/gtest/gtest.h(1373,12): note: in instantiation of function template specialization 'testing::internal::CmpHelperEQ<unsigned int, int>' requested here
    return CmpHelperEQ(lhs_expression, rhs_expression, lhs, rhs);
           ^
toolkit/xre/dllservices/tests/gtest/TestUntrustedModules.cpp(35,5): note: in instantiation of function template specialization 'testing::internal::EqHelper::Compare<unsigned int, int, nullptr>' requested here
    EXPECT_EQ(mCounters.Count(), N);
    ^
obj-build/dist/include/gtest/gtest.h(1842,54): note: expanded from macro 'EXPECT_EQ'
  EXPECT_PRED_FORMAT2(::testing::internal::EqHelper::Compare, val1, val2)
                                                     ^
toolkit/xre/dllservices/tests/gtest/TestUntrustedModules.cpp(210,28): note: in instantiation of function template specialization 'ModuleLoadCounter::Remains<1>' requested here
    EXPECT_TRUE(waitForOne.Remains({kTestModules[0]}, {0}));
                           ^
toolkit/xre/test/gtest/TestAssembleCommandLineWin.cpp(139,21): error: comparison of integers of different signs: 'int' and 'size_t' (aka 'unsigned long long') [-Werror,-Wsign-compare]
  for (int i = 0; i < ArrayLength(kExpectedArgsW); ++i) {
                  ~ ^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~
toolkit/xre/test/gtest/TestAssembleCommandLineWin.cpp(151,21): error: comparison of integers of different signs: 'int' and 'size_t' (aka 'unsigned long long') [-Werror,-Wsign-compare]
  for (int i = 0; i < ArrayLength(kExpectedArgsW); ++i) {
                  ~ ^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~
toolkit/xre/test/gtest/TestAssembleCommandLineWin.cpp(164,21): error: comparison of integers of different signs: 'int' and 'size_t' (aka 'unsigned long long') [-Werror,-Wsign-compare]
  for (int i = 0; i < ArrayLength(kExpectedArgsW); ++i) {
                  ~ ^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~
obj-build/dist/include/gtest/gtest.h(1354,11): error: comparison of integers of different signs: 'const int' and 'const unsigned long long' [-Werror,-Wsign-compare]
  if (lhs == rhs) {
      ~~~ ^  ~~~
obj-build/dist/include/gtest/gtest.h(1373,12): note: in instantiation of function template specialization 'testing::internal::CmpHelperEQ<int, unsigned long long>' requested here
    return CmpHelperEQ(lhs_expression, rhs_expression, lhs, rhs);
           ^
toolkit/xre/test/gtest/TestAssembleCommandLineWin.cpp(138,3): note: in instantiation of function template specialization 'testing::internal::EqHelper::Compare<int, unsigned long long, nullptr>' requested here
  EXPECT_EQ(len, ArrayLength(kExpectedArgsW));
  ^
widget/windows/TSFTextStore.cpp(3455,28): error: comparison of integers of different signs: 'uint32_t' (aka 'unsigned int') and 'long' [-Werror,-Wsign-compare]
          range.mEndOffset == end - mComposition->StartOffset() &&
          ~~~~~~~~~~~~~~~~ ^  ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
widget/windows/TSFTextStore.cpp(3454,30): error: comparison of integers of different signs: 'uint32_t' (aka 'unsigned int') and 'long' [-Werror,-Wsign-compare]
      if (range.mStartOffset == start - mComposition->StartOffset() &&
          ~~~~~~~~~~~~~~~~~~ ^  ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
xpfe/appshell/AppWindow.cpp(1900,21): error: comparison of integers of different signs: 'int' and 'uint32_t' (aka 'unsigned int') [-Werror,-Wsign-compare]
  for (int i = 0; i < toolbarSprings->Length(); i++) {
                  ~ ^ ~~~~~~~~~~~~~~~~~~~~~~~~

Differential Revision: https://phabricator.services.mozilla.com/D144695
2022-04-29 09:14:12 +00:00
Norisz Fay 6e06e2da92 Backed out 4 changesets (bug 1766377) for causing mochitest failures on HyperTextAccessible.cpp CLOSED TREE
Backed out changeset 6335511477a4 (bug 1766377)
Backed out changeset e8108d6fab9f (bug 1766377)
Backed out changeset 80d16d55c490 (bug 1766377)
Backed out changeset 1a6583d6e52e (bug 1766377)
2022-04-29 07:35:11 +03:00
Mike Hommey 9cd056be1e Bug 1766377 - Fix remaining sign-compare warnings in Windows builds. r=rkraesig,gsvelto,media-playback-reviewers,gfx-reviewers,bryce,sotaro
browser/components/shell/WindowsUserChoice.cpp(233,23): error: comparison of integers of different signs: 'int' and 'const size_t' (aka 'const unsigned long long') [-Werror,-Wsign-compare]
    for (int j = 0; j < DWORDS_PER_BLOCK; ++j) {
                    ~ ^ ~~~~~~~~~~~~~~~~
browser/components/shell/WindowsUserChoice.cpp(388,21): error: comparison of integers of different signs: 'int' and 'size_t' (aka 'unsigned long long') [-Werror,-Wsign-compare]
  for (int i = 0; i < ArrayLength(exts); ++i) {
                  ~ ^ ~~~~~~~~~~~~~~~~~
browser/components/shell/nsWindowsShellService.cpp(1225,21): error: comparison of integers of different signs: 'int' and 'size_t' (aka 'unsigned long long') [-Werror,-Wsign-compare]
  for (int i = 0; i < ArrayLength(shortcutCSIDLs); ++i) {
                  ~ ^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~
browser/components/shell/nsWindowsShellService.cpp(1492,21): error: comparison of integers of different signs: 'int' and 'size_t' (aka 'unsigned long long') [-Werror,-Wsign-compare]
  for (int i = 0; i < ArrayLength(folders); ++i) {
                  ~ ^ ~~~~~~~~~~~~~~~~~~~~
dom/media/platforms/wmf/MFTDecoder.cpp(85,23): error: comparison of integers of different signs: 'int' and 'UINT32' (aka 'unsigned int') [-Werror,-Wsign-compare]
    for (int i = 1; i < actsNum; i++) {
                    ~ ^ ~~~~~~~
gfx/2d/Factory.cpp(1276,21): error: comparison of integers of different signs: 'int' and 'uint32_t' (aka 'unsigned int') [-Werror,-Wsign-compare]
  for (int y = 0; y < height; y++) {
                  ~ ^ ~~~~~~
gfx/layers/d3d11/CompositorD3D11.cpp(1096,36): error: comparison of integers of different signs: 'UINT' (aka 'unsigned int') and 'int' [-Werror,-Wsign-compare]
        swapDesc.BufferDesc.Height == mSize.height) ||
        ~~~~~~~~~~~~~~~~~~~~~~~~~~ ^  ~~~~~~~~~~~~
gfx/layers/d3d11/CompositorD3D11.cpp(1095,35): error: comparison of integers of different signs: 'UINT' (aka 'unsigned int') and 'int' [-Werror,-Wsign-compare]
  if (((swapDesc.BufferDesc.Width == mSize.width &&
        ~~~~~~~~~~~~~~~~~~~~~~~~~ ^  ~~~~~~~~~~~
gfx/layers/d3d11/TextureD3D11.cpp(1278,30): error: comparison of integers of different signs: 'UINT' (aka 'unsigned int') and 'int' [-Werror,-Wsign-compare]
          currentDesc.Height != mSize.height ||
          ~~~~~~~~~~~~~~~~~~ ^  ~~~~~~~~~~~~
gfx/layers/d3d11/TextureD3D11.cpp(1277,29): error: comparison of integers of different signs: 'UINT' (aka 'unsigned int') and 'int' [-Werror,-Wsign-compare]
      if (currentDesc.Width != mSize.width ||
          ~~~~~~~~~~~~~~~~~ ^  ~~~~~~~~~~~
gfx/layers/ipc/ContentCompositorBridgeParent.cpp(248,19): error: comparison of integers of different signs: 'const uint32_t' (aka 'const unsigned int') and 'int32_t' (aka 'int') [-Werror,-Wsign-compare]
  if (sequenceNum == status.sequenceNumber() && !dm->HasDeviceReset()) {
      ~~~~~~~~~~~ ^  ~~~~~~~~~~~~~~~~~~~~~~~
gfx/thebes/D3D11Checks.cpp(129,21): error: comparison of integers of different signs: 'int' and 'unsigned int' [-Werror,-Wsign-compare]
    if (resultColor != 0xffffff00) {
        ~~~~~~~~~~~ ^  ~~~~~~~~~~
gfx/thebes/D3D11Checks.cpp(154,23): error: comparison of integers of different signs: 'int' and 'unsigned long long' [-Werror,-Wsign-compare]
    for (int i = 0; i < PR_ARRAY_SIZE(checkModules); i += 1) {
                    ~ ^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~
gfx/thebes/D3D11Checks.cpp(409,14): error: comparison of integers of different signs: 'int32_t' (aka 'int') and 'UINT' (aka 'unsigned int') [-Werror,-Wsign-compare]
  if (vendor != desc.VendorId) {
      ~~~~~~ ^  ~~~~~~~~~~~~~
gfx/thebes/gfxDWriteFontList.cpp(1248,39): error: comparison of integers of different signs: 'unsigned int' and 'int' [-Werror,-Wsign-compare]
        addFamily(names[index], index != sysLocIndex);
                                ~~~~~ ^  ~~~~~~~~~~~
intl/lwbrk/nsUniscribeBreaker.cpp(121,21): error: comparison of integers of different signs: 'int' and 'uint32_t' (aka 'unsigned int') [-Werror,-Wsign-compare]
  for (int i = 0; i < aLength; ++i) {
                  ~ ^ ~~~~~~~
intl/lwbrk/nsUniscribeBreaker.cpp(132,23): error: comparison of integers of different signs: 'int' and 'uint32_t' (aka 'unsigned int') [-Werror,-Wsign-compare]
    for (int i = 0; i < aLength; ++i) {
                    ~ ^ ~~~~~~~
intl/lwbrk/nsUniscribeBreaker.cpp(138,23): error: comparison of integers of different signs: 'int' and 'uint32_t' (aka 'unsigned int') [-Werror,-Wsign-compare]
    for (int i = 0; i < aLength; ++i) {
                    ~ ^ ~~~~~~~
mozglue/misc/PreXULSkeletonUI.cpp(319,26): error: comparison of integers of different signs: 'std::basic_string<char>::size_type' (aka 'unsigned long long') and 'int' [-Werror,-Wsign-compare]
    while (line.length() > whitespace &&
           ~~~~~~~~~~~~~ ^ ~~~~~~~~~~
mozglue/misc/PreXULSkeletonUI.cpp(1003,21): error: comparison of integers of different signs: 'int' and 'size_t' (aka 'unsigned long long') [-Werror,-Wsign-compare]
  for (int i = 1; i < noPlaceholderSpans.length(); i++) {
                  ~ ^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~
mozglue/misc/PreXULSkeletonUI.cpp(1708,21): error: comparison of integers of different signs: 'int' and 'unsigned long long' [-Werror,-Wsign-compare]
  for (int i = 0; i < dataLen / (2 * sizeof(double)); i++) {
                  ~ ^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
security/sandbox/chromium-shim/sandbox/win/permissionsService.cpp(40,16): error: comparison of integers of different signs: 'int' and 'const std::basic_string<wchar_t>::size_type' (aka 'const unsigned long long') [-Werror,-Wsign-compare]
  if (slashIdx != std::wstring::npos) {
      ~~~~~~~~ ^  ~~~~~~~~~~~~~~~~~~
toolkit/components/aboutthirdparty/tests/gtest/TestAboutThirdParty.cpp(107,21): error: comparison of integers of different signs: 'int' and 'size_t' (aka 'unsigned long long') [-Werror,-Wsign-compare]
  for (int i = 0; i < ArrayLength(kDirectoriesUnsorted); ++i) {
                  ~ ^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
toolkit/crashreporter/breakpad-client/windows/crash_generation/crash_generation_server.cc(957,23): error: comparison of integers of different signs: 'int' and 'const size_t' (aka 'const unsigned long long') [-Werror,-Wsign-compare]
    for (int i = 0; i < kExceptionAppMemoryRegions; i++) {
                    ~ ^ ~~~~~~~~~~~~~~~~~~~~~~~~~~
toolkit/crashreporter/client/crashreporter_win.cpp(373,21): error: comparison of integers of different signs: 'int' and 'unsigned long long' [-Werror,-Wsign-compare]
  for (int i = 0; i < sizeof(kDefaultAttachedBottom) / sizeof(UINT); i++) {
                  ~ ^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
toolkit/crashreporter/client/crashreporter_win.cpp(671,21): error: comparison of integers of different signs: 'int' and 'unsigned long long' [-Werror,-Wsign-compare]
  for (int i = 0; i < sizeof(controls) / sizeof(controls[0]); i++) {
                  ~ ^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
toolkit/crashreporter/client/crashreporter_win.cpp(1048,21): error: comparison of integers of different signs: 'int' and 'unsigned long long' [-Werror,-Wsign-compare]
  for (int i = 0; i < sizeof(kDefaultAttachedBottom) / sizeof(UINT); i++) {
                  ~ ^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
toolkit/mozapps/defaultagent/SetDefaultBrowser.cpp(248,21): error: comparison of integers of different signs: 'int' and 'size_t' (aka 'unsigned long long') [-Werror,-Wsign-compare]
  for (int i = 0; i < mozilla::ArrayLength(associations); ++i) {
                  ~ ^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
toolkit/system/windowsproxy/ProxyUtils.cpp(27,36): error: comparison of integers of different signs: 'const int' and 'nsTArray_base::size_type' (aka 'unsigned long long') [-Werror,-Wsign-compare]
                             if (i < addr.Length()) {
                                 ~ ^ ~~~~~~~~~~~~~
toolkit/xre/dllservices/mozglue/interceptor/Arm64.h(178,28): error: comparison of integers of different signs: 'int32_t' (aka 'int') and 'unsigned int' [-Werror,-Wsign-compare]
  if (signbits && signbits != 0xFE000000) {
                  ~~~~~~~~ ^  ~~~~~~~~~~
obj-build/dist/include/gtest/gtest.h(1842,54): note: expanded from macro 'EXPECT_EQ'
  EXPECT_PRED_FORMAT2(::testing::internal::EqHelper::Compare, val1, val2)
                                                     ^
obj-build/dist/include/gtest/gtest.h(1354,11): error: comparison of integers of different signs: 'const unsigned int' and 'const int' [-Werror,-Wsign-compare]
  if (lhs == rhs) {
      ~~~ ^  ~~~
obj-build/dist/include/gtest/gtest.h(1373,12): note: in instantiation of function template specialization 'testing::internal::CmpHelperEQ<unsigned int, int>' requested here
    return CmpHelperEQ(lhs_expression, rhs_expression, lhs, rhs);
           ^
toolkit/xre/dllservices/tests/gtest/TestUntrustedModules.cpp(35,5): note: in instantiation of function template specialization 'testing::internal::EqHelper::Compare<unsigned int, int, nullptr>' requested here
    EXPECT_EQ(mCounters.Count(), N);
    ^
obj-build/dist/include/gtest/gtest.h(1842,54): note: expanded from macro 'EXPECT_EQ'
  EXPECT_PRED_FORMAT2(::testing::internal::EqHelper::Compare, val1, val2)
                                                     ^
toolkit/xre/dllservices/tests/gtest/TestUntrustedModules.cpp(210,28): note: in instantiation of function template specialization 'ModuleLoadCounter::Remains<1>' requested here
    EXPECT_TRUE(waitForOne.Remains({kTestModules[0]}, {0}));
                           ^
toolkit/xre/test/gtest/TestAssembleCommandLineWin.cpp(139,21): error: comparison of integers of different signs: 'int' and 'size_t' (aka 'unsigned long long') [-Werror,-Wsign-compare]
  for (int i = 0; i < ArrayLength(kExpectedArgsW); ++i) {
                  ~ ^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~
toolkit/xre/test/gtest/TestAssembleCommandLineWin.cpp(151,21): error: comparison of integers of different signs: 'int' and 'size_t' (aka 'unsigned long long') [-Werror,-Wsign-compare]
  for (int i = 0; i < ArrayLength(kExpectedArgsW); ++i) {
                  ~ ^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~
toolkit/xre/test/gtest/TestAssembleCommandLineWin.cpp(164,21): error: comparison of integers of different signs: 'int' and 'size_t' (aka 'unsigned long long') [-Werror,-Wsign-compare]
  for (int i = 0; i < ArrayLength(kExpectedArgsW); ++i) {
                  ~ ^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~
obj-build/dist/include/gtest/gtest.h(1354,11): error: comparison of integers of different signs: 'const int' and 'const unsigned long long' [-Werror,-Wsign-compare]
  if (lhs == rhs) {
      ~~~ ^  ~~~
obj-build/dist/include/gtest/gtest.h(1373,12): note: in instantiation of function template specialization 'testing::internal::CmpHelperEQ<int, unsigned long long>' requested here
    return CmpHelperEQ(lhs_expression, rhs_expression, lhs, rhs);
           ^
toolkit/xre/test/gtest/TestAssembleCommandLineWin.cpp(138,3): note: in instantiation of function template specialization 'testing::internal::EqHelper::Compare<int, unsigned long long, nullptr>' requested here
  EXPECT_EQ(len, ArrayLength(kExpectedArgsW));
  ^
widget/windows/TSFTextStore.cpp(3455,28): error: comparison of integers of different signs: 'uint32_t' (aka 'unsigned int') and 'long' [-Werror,-Wsign-compare]
          range.mEndOffset == end - mComposition->StartOffset() &&
          ~~~~~~~~~~~~~~~~ ^  ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
widget/windows/TSFTextStore.cpp(3454,30): error: comparison of integers of different signs: 'uint32_t' (aka 'unsigned int') and 'long' [-Werror,-Wsign-compare]
      if (range.mStartOffset == start - mComposition->StartOffset() &&
          ~~~~~~~~~~~~~~~~~~ ^  ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
xpfe/appshell/AppWindow.cpp(1900,21): error: comparison of integers of different signs: 'int' and 'uint32_t' (aka 'unsigned int') [-Werror,-Wsign-compare]
  for (int i = 0; i < toolbarSprings->Length(); i++) {
                  ~ ^ ~~~~~~~~~~~~~~~~~~~~~~~~

Differential Revision: https://phabricator.services.mozilla.com/D144695
2022-04-29 00:43:32 +00:00
John Schanck 6028a138e9 Bug 1691122 - Remove subject common name fallback support in CertVerifier. r=keeler,necko-reviewers,kershaw
Differential Revision: https://phabricator.services.mozilla.com/D143808
2022-04-28 19:48:06 +00:00
ffxbld 984056514e No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D144938
2022-04-28 14:40:34 +00:00
Dennis Jackson 03ad368b81 Bug 1764153 - land NSS NSS_3_78_RTM UPGRADE_NSS_RELEASE, r=nss-reviewers,bbeurdouche DONTBUILD
2022-04-28  Dennis Jackson  <djackson@mozilla.com>

	* lib/nss/nss.h, lib/softoken/softkver.h, lib/util/nssutil.h:
	Set version numbers to 3.78 final
	[30fe50c80e23] [NSS_3_78_RTM] <NSS_3_78_BRANCH>

	* doc/rst/releases/index.rst, doc/rst/releases/nss_3_78.rst:
	Release notes for NSS 3.78
	[6a5a0d7b1dba] <NSS_3_78_BRANCH>

2022-04-21  Dennis Jackson  <djackson@mozilla.com>

	* .hgtags:
	Added tag NSS_3_78_BETA1 for changeset 144c87accae8
	[c7950a356651] <NSS_3_78_BRANCH>

Differential Revision: https://phabricator.services.mozilla.com/D144934
2022-04-28 12:08:46 +00:00
Butkovits Atila 94e2a597f6 Backed out changeset 0599b2a0913a (bug 1691122) for causing failures at test_peerConnection_basicAudioNATRelayTLS.html. CLOSED TREE 2022-04-28 03:58:05 +03:00
John Schanck ea5479a8d7 Bug 1691122 - Remove subject common name fallback support in CertVerifier. r=keeler,necko-reviewers,kershaw
Differential Revision: https://phabricator.services.mozilla.com/D143808
2022-04-27 20:57:31 +00:00
Bob Owen 09a4cd7a93 Bug 1760340: Re-allow forward slashes in windows sandbox file system policy rules. r=handyman
Differential Revision: https://phabricator.services.mozilla.com/D144849
2022-04-27 19:27:28 +00:00
John Schanck 86bd5cb77a Bug 1765012 - expire CRLite filters after 10 days. r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D144619
2022-04-27 17:15:06 +00:00