Граф коммитов

16906 Коммитов

Автор SHA1 Сообщение Дата
Dana Keeler eab44906ca Bug 1720118 - store certificate error override and failed certificate chain information in the TLS token cache r=kershaw,jschanck,necko-reviewers
Differential Revision: https://phabricator.services.mozilla.com/D158793
2022-10-12 17:43:29 +00:00
Dana Keeler d894513c37 Bug 1720118 - always use the TLS token cache r=kershaw,necko-reviewers,ci-and-tooling,jmaher
Differential Revision: https://phabricator.services.mozilla.com/D158792
2022-10-12 17:43:28 +00:00
Dana Keeler ad795fde70 Bug 1520297 - enable intermediate preloading on Android r=jschanck
The current collection of preloaded intermediates is under 3MB. This should not
be a prohibitive amount for mobile users to download. Once downloaded, updates
to the collection are minimal and again should not be an issue.

Differential Revision: https://phabricator.services.mozilla.com/D159092
2022-10-11 21:53:59 +00:00
ffxbld f16ca73e4c No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D158942
2022-10-10 13:14:27 +00:00
Dennis Jackson 7da0562237 Bug 1792135 - land NSS NSS_3_84_BETA1 UPGRADE_NSS_RELEASE, r=nss-reviewers,nkulatova
Differential Revision: https://phabricator.services.mozilla.com/D158772
2022-10-06 22:47:02 +00:00
Alexandre Lissy 6a92f8d147 Bug 1788596 - Use Utility process actor names for crash annotations r=gsvelto
Differential Revision: https://phabricator.services.mozilla.com/D156286
2022-10-06 15:51:56 +00:00
Alexandre Lissy bb317b2bae Bug 1788596 - Remove UTILITY_AUDIO_DECODING_GENERIC r=nika,media-playback-reviewers,alwu
Differential Revision: https://phabricator.services.mozilla.com/D156285
2022-10-06 15:51:56 +00:00
Alexandre Lissy f4906ff3eb Bug 1788596 - Merge UtilityAudioDecoderSandboxPolicy into UtilitySandboxPolicy r=jld
Differential Revision: https://phabricator.services.mozilla.com/D156284
2022-10-06 15:51:55 +00:00
Kershaw Chang 62cd9065c3 Bug 1720601 - Allow token cache to store more than one token per key, r=necko-reviewers,dragana
1. Allow to store more than one token per key.
2. Allow to use the token only once. The token will be removed after reading it.
3. Add a gtest.

Differential Revision: https://phabricator.services.mozilla.com/D153605
2022-10-06 12:56:01 +00:00
Sandor Molnar 9e30e89e90 Backed out 13 changesets (bug 1788596) for causing build bustage in toolkit/components/processtools/ProcInfo_common.cpp CLOSED TREE
Backed out changeset 620c85305800 (bug 1788596)
Backed out changeset 1f64776a859a (bug 1788596)
Backed out changeset 707e4c9c8801 (bug 1788596)
Backed out changeset 2221a97ebe97 (bug 1788596)
Backed out changeset d50fd0551159 (bug 1788596)
Backed out changeset 7e2ad8c47afb (bug 1788596)
Backed out changeset f87c5fb2c36f (bug 1788596)
Backed out changeset 61dd9a9eb714 (bug 1788596)
Backed out changeset a67c4ea1c8b3 (bug 1788596)
Backed out changeset 1be7af1214cf (bug 1788596)
Backed out changeset e99c7089bf93 (bug 1788596)
Backed out changeset 9a87f108548b (bug 1788596)
Backed out changeset 3dd59224f38b (bug 1788596)
2022-10-06 16:28:46 +03:00
ffxbld 22a6ff72e5 No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=pascalc
Differential Revision: https://phabricator.services.mozilla.com/D158756
2022-10-06 12:19:24 +00:00
Alexandre Lissy 16c9919af1 Bug 1788596 - Use Utility process actor names for crash annotations r=gsvelto
Differential Revision: https://phabricator.services.mozilla.com/D156286
2022-10-06 10:56:41 +00:00
Alexandre Lissy 1d211b0ec1 Bug 1788596 - Remove UTILITY_AUDIO_DECODING_GENERIC r=nika,media-playback-reviewers,alwu
Differential Revision: https://phabricator.services.mozilla.com/D156285
2022-10-06 10:56:41 +00:00
Alexandre Lissy 301e159051 Bug 1788596 - Merge UtilityAudioDecoderSandboxPolicy into UtilitySandboxPolicy r=jld
Differential Revision: https://phabricator.services.mozilla.com/D156284
2022-10-06 10:56:40 +00:00
Sandor Molnar 2fb4e10f0d Backed out 13 changesets (bug 1788596) for causing browser-chrome failures in security/sandbox/test/browser_sandbox_test.js CLOSED TREE
Backed out changeset 338c18d01cfd (bug 1788596)
Backed out changeset 9d4a5c557191 (bug 1788596)
Backed out changeset 1d1d15dbe44c (bug 1788596)
Backed out changeset e9d29218beba (bug 1788596)
Backed out changeset 397e6c6587f3 (bug 1788596)
Backed out changeset 077fd3a987ca (bug 1788596)
Backed out changeset 2fc674146915 (bug 1788596)
Backed out changeset 4ebb8837ee1a (bug 1788596)
Backed out changeset 9040533dabe1 (bug 1788596)
Backed out changeset 8b27ee4d4168 (bug 1788596)
Backed out changeset 93f50c2f0b9e (bug 1788596)
Backed out changeset 3e7125be66fa (bug 1788596)
Backed out changeset 63ee00ea9be6 (bug 1788596)
2022-10-06 10:28:00 +03:00
Alexandre Lissy dd8daf38e3 Bug 1788596 - Use Utility process actor names for crash annotations r=gsvelto
Differential Revision: https://phabricator.services.mozilla.com/D156286
2022-10-06 06:14:06 +00:00
Alexandre Lissy 272b0c9273 Bug 1788596 - Remove UTILITY_AUDIO_DECODING_GENERIC r=nika,media-playback-reviewers,alwu
Differential Revision: https://phabricator.services.mozilla.com/D156285
2022-10-06 06:14:06 +00:00
Alexandre Lissy 592b1be2e3 Bug 1788596 - Merge UtilityAudioDecoderSandboxPolicy into UtilitySandboxPolicy r=jld
Differential Revision: https://phabricator.services.mozilla.com/D156284
2022-10-06 06:14:05 +00:00
Dana Keeler 644aa7999c Bug 1716082 - clear all ongoing connections when removing certificate error overrides r=jschanck
Differential Revision: https://phabricator.services.mozilla.com/D158613
2022-10-05 20:15:02 +00:00
Emilio Cobos Álvarez d71d3c19ed Bug 1792809 - Make library and other windows keep stretching after bug 1665476. r=eemeli
Much like the dialog changes in bug 1792730.

Differential Revision: https://phabricator.services.mozilla.com/D158351
2022-10-04 10:21:05 +00:00
ffxbld c6a00ce965 No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=dmeehan
Differential Revision: https://phabricator.services.mozilla.com/D158497
2022-10-03 13:20:51 +00:00
ffxbld 87d48b75dd No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D158326
2022-09-29 16:44:52 +00:00
Yannis Juglaret adebd56af9 Bug 1766432 - Part 4: Enable Arbitrary Code Guard in MinGW builds. r=bobowen
Differential Revision: https://phabricator.services.mozilla.com/D157906
2022-09-29 15:29:15 +00:00
Yannis Juglaret eaa892440f Bug 1766432 - Part 3: Add Part 2 to the list of patches to apply when updating third-party. r=bobowen
Differential Revision: https://phabricator.services.mozilla.com/D157905
2022-09-29 15:29:15 +00:00
Yannis Juglaret 0b60970f1b Bug 1766432 - Part 2: Propagate custom definition for PROCESS_MITIGATION_DYNAMIC_CODE_POLICY to third-party. r=bobowen
Differential Revision: https://phabricator.services.mozilla.com/D157904
2022-09-29 15:29:14 +00:00
Mark Banner 8d1ebcb9d6 Bug 1792365 - Convert toolkit/modules consumers to use ES module imports directly. r=webdriver-reviewers,perftest-reviewers,geckoview-reviewers,extension-reviewers,preferences-reviewers,desktop-theme-reviewers,application-update-reviewers,pip-reviewers,credential-management-reviewers,robwu,Gijs,sgalich,bytesized,AlexandruIonescu,dao,m_kato
Differential Revision: https://phabricator.services.mozilla.com/D158094
2022-09-29 06:52:34 +00:00
ffxbld 4af4ff2e5b No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D158124
2022-09-27 16:27:33 +00:00
ffxbld 4e99c68740 No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=dmeehan
Differential Revision: https://phabricator.services.mozilla.com/D157923
2022-09-22 12:46:23 +00:00
Jed Davis a466bdb2c4 Bug 1780312 - Part 2: Allow fstatfs in the Linux RDD sandbox policy. r=gcp
As discussed in the last patch, allowing `fstatfs` will also make
`statfs` work on any path that the process could open for reading
(subject to sandbox policy).

Differential Revision: https://phabricator.services.mozilla.com/D157542
2022-09-21 17:57:54 +00:00
Jed Davis 3b5c74387e Bug 1780312 - Part 1: Move the statfs replacement into the common sandbox policy. r=gcp
We have code to handle `statfs` calls in content processes by
intercepting them and calling `open` and `fstatfs` instead; the former
is then recursively intercepted and brokered.  This patch moves that
feature into the common policy, but does not allow `fstatfs` in any
other sandbox types (yet; see next patch).  This doesn't affect security
because the caller could have attempted the `open` and `fstatfs`
syscalls itself.

Differential Revision: https://phabricator.services.mozilla.com/D157541
2022-09-21 17:57:54 +00:00
Joel Maher 4c4438b4f7 Bug 1536208 - removing old aarch64 manifest annotations. r=aryx,application-update-reviewers,bytesized
Differential Revision: https://phabricator.services.mozilla.com/D157677
2022-09-21 15:35:02 +00:00
Andreea Pavel 9f24806607 Backed out 2 changesets (bug 1768250, bug 1720601) for multiple failures CLOSED TREE
Backed out changeset d6caea480d4d (bug 1768250)
Backed out changeset 97eccf466bf3 (bug 1720601)
2022-09-20 16:50:29 +03:00
Kershaw Chang 137b76a861 Bug 1720601 - Allow token cache to store more than one token per key, r=necko-reviewers,dragana
1. Allow to store more than one token per key.
2. Allow to use the token only once. The token will be removed after reading it.
3. Add a gtest.

Differential Revision: https://phabricator.services.mozilla.com/D153605
2022-09-20 12:58:06 +00:00
Dana Keeler bdb75eecd3 Bug 1790451 - remove now-unnecessary QueryInterface(Ci.nsITransportSecurityInfo) calls r=jschanck,webdriver-reviewers,necko-reviewers,application-update-reviewers,nalexander,valentin
Differential Revision: https://phabricator.services.mozilla.com/D157166
2022-09-20 03:58:50 +00:00
ffxbld 26a22933ed No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D157632
2022-09-19 13:30:31 +00:00
John Schanck ef80532ec8 Bug 1787505 - land NSS NSS_3_83_RTM UPGRADE_NSS_RELEASE, r=nss-reviewers,bbeurdouche
Differential Revision: https://phabricator.services.mozilla.com/D157510
2022-09-15 19:24:37 +00:00
Nika Layzell 0316dc51b9 Bug 1790614 - Part 2: Use {ASSERT,ENSURE}_NS_{SUCCEEEDED,FAILED} in gtests, r=ahal,necko-reviewers
These macros will produce better outputs when they fail than these existing
patterns using `ENSURE_TRUE(NS_SUCCEEDED(...))` or similar, so this is a bulk
rewrite of existing tests to use them.

It should also help with discoverability when people base their tests off of
other existing tests.

Differential Revision: https://phabricator.services.mozilla.com/D157214
2022-09-15 14:51:50 +00:00
ffxbld 2bddac315a No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D157441
2022-09-15 13:07:24 +00:00
Dana Keeler 0d0b51d1e4 Bug 1790152 - use nsIX509Cert directly in IPC in AddCertException r=nika
This avoids unnecessarily serializing the certificate to a string before
sending it over IPC.

Depends on D157007

Differential Revision: https://phabricator.services.mozilla.com/D157008
2022-09-14 21:49:53 +00:00
Narcis Beleuzu 855f519b0a Backed out changeset a389830fb63f (bug 1783223) for causing bug 1790713 2022-09-14 19:38:52 +03:00
John Schanck 262ca63d8f Bug 1787505 - land NSS NSS_3_83_BETA2 UPGRADE_NSS_RELEASE, r=nss-reviewers,djackson
Differential Revision: https://phabricator.services.mozilla.com/D156982
2022-09-13 16:39:55 +00:00
Nika Layzell 3d9a6d0374 Bug 1789902 - Part 2: Use XPCOM static components instead of Services in Rust, r=xpcom-reviewers,necko-reviewers,barret,valentin
Differential Revision: https://phabricator.services.mozilla.com/D156891
2022-09-13 13:47:13 +00:00
Jeff Muizelaar 64aded89bb Bug 1783223 - Enable Arbitratry Code Guard in RDD on Nightly. r=bobowen
This was previously disabled in bug 1673194 because of start up crashes.
It seems like msmpeg2vdec.dll may use dynamic code to support encrypted
code that uses. In recent versions of Windows this only seems used
in the 32bit version. The 32bit version will opt out of ACG on the
threads where it needs to use VirtualProtect so we use the weaker
variant there.

Differential Revision: https://phabricator.services.mozilla.com/D153762
2022-09-12 16:32:08 +00:00
ffxbld d7cbba5f61 No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D157108
2022-09-12 12:48:53 +00:00
Dennis Jackson 400f4a73bf Bug 1789458 - Backout asserts from 1788290. r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D156944
2022-09-09 17:15:10 +00:00
Cosmin Sabou ecfd7cff79 Backed out changeset 7dd0bcf1eeed (bug 1787505) for causing mass mochitest failures. r=land NSS NSS_3_83_BETA1 UPGRADE_NSS_RELEASE CLOSED TREE 2022-09-09 01:53:53 +03:00
John Schanck db095eb9f2 Bug 1787505 - land NSS NSS_3_83_BETA1 UPGRADE_NSS_RELEASE, r=keeler
2022-09-08  John M. Schanck  <jschanck@mozilla.com>

	* lib/nss/nss.h, lib/softoken/softkver.h, lib/util/nssutil.h:
	Set version numbers to 3.83 beta
	[97fec8885336] [NSS_3_83_BETA1]

	* lib/softoken/pkcs11.c:
	Bug 1789886 - resource leak in NSC_OpenSession. r=bbeurdouche

	[b225a756abc2]

	* lib/pkcs12/p12d.c:
	Bug 1788875 - Remove set-but-unused variables from
	SEC_PKCS12DecoderValidateBags. r=nss-reviewers,bbeurdouche

	[132476bbefc5]

2022-09-07  Ludovic Hirlimann  <ludovic@mozilla.com>

	* cmd/lib/secpwd.c, coreconf/BeOS.mk, coreconf/config.mk,
	coreconf/nsinstall/nsinstall.c, lib/certhigh/ocsp.c,
	lib/dbm/include/mcom_db.h, lib/freebl/sysrand.c,
	lib/freebl/unix_rand.c, lib/jar/jar.h, lib/jar/jarfile.c,
	lib/nss/nssinit.c, lib/ssl/config.mk, lib/ssl/sslimpl.h,
	lib/ssl/sslmutex.c, lib/ssl/sslmutex.h, lib/ssl/sslnonce.c,
	lib/ssl/sslsnce.c, lib/ssl/sslsock.c, lib/ssl/unix_err.c,
	lib/util/secport.c, lib/util/secport.h, lib/zlib/zconf.h,
	lib/zlib/zutil.h:
	Bug 1563221 remove older oses that are unused part3/ BeOS r=nss-
	reviewers,djackson

	Depends on D36757

	[e0b144ea73b7]

	* coreconf/IRIX.mk, coreconf/IRIX5.2.mk, coreconf/IRIX5.3.mk,
	coreconf/IRIX5.mk, coreconf/IRIX6.2.mk, coreconf/IRIX6.3.mk,
	coreconf/IRIX6.5.mk, coreconf/IRIX6.mk, coreconf/arch.mk,
	lib/freebl/Makefile, lib/freebl/mpi/mpi.h, tests/set_environment:
	Bug 1563221 remove older unix support in NSS part 3 Irix r=nss-
	reviewers,djackson

	Depends on D36756

	[ee2e9b06b590]

	* lib/dbm/config/config.mk:
	Bug 1563221 remove support for older unix in NSS part 2 DGUX r=nss-
	reviewers,djackson

	Depends on D36755

	[b066df5e9148]

	* cmd/modutil/install.c, coreconf/OSF1.mk, coreconf/OSF1V2.0.mk,
	coreconf/OSF1V3.0.mk, coreconf/OSF1V3.2.mk, coreconf/OSF1V4.0.mk,
	coreconf/OSF1V4.0B.mk, coreconf/OSF1V4.0D.mk, coreconf/OSF1V5.0.mk,
	coreconf/OSF1V5.1.mk, coreconf/arch.mk, lib/dbm/config/config.mk,
	lib/freebl/Makefile, lib/freebl/arcfour.c, lib/freebl/mpi/mpi.c,
	lib/freebl/unix_rand.c, lib/ssl/sslsnce.c, tests/header,
	tests/mksymlinks, tests/nssqa, tests/platformlist.tbx,
	tests/set_environment:
	Bug 1563221 remove support for older unix in NSS part 1 OSF r=nss-
	reviewers,djackson

	[17f9365a7a1d]

2022-09-07  John M. Schanck  <jschanck@mozilla.com>

	* lib/ckfw/builtins/nssckbi.h:
	Bug 1778413 - Set nssckbi version number to 2.58. r=nss-
	reviewers,bbeurdouche

	Depends on D156583

	[2367ce7cdd32]

	* lib/ckfw/builtins/certdata.txt:
	Bug 1785297 - Add two SECOM root certificates to NSS.
	r=KathleenWilson

	Depends on D156582

	[9be22516dac9]

	* lib/ckfw/builtins/certdata.txt:
	Bug 1787075 - Add two DigitalSign root certificates to NSS.
	r=KathleenWilson

	Depends on D156581

	[04200c0488ee]

	* lib/ckfw/builtins/certdata.txt:
	Bug 1778412 - Remove Camerfirma Global Chambersign Root from NSS.
	r=KathleenWilson

	[a217a119cff1]

2022-09-06  John M. Schanck  <jschanck@mozilla.com>

	* lib/softoken/pkcs11.c, lib/softoken/pkcs11u.c:
	Bug 1767921 - check SFTKSlot head after acquiring session lock.
	r=rrelyea

	[ed04d4729b99]

2022-08-30  Kai Engert  <kaie@kuix.de>

	* coreconf/coreconf.dep:
	Dummy change, trigger a build to test latest NSPR commits.
	[bb1ae751d359]

Differential Revision: https://phabricator.services.mozilla.com/D156884
2022-09-08 20:11:56 +00:00
ffxbld 1f2d882e17 No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D156815
2022-09-08 13:47:22 +00:00
Bob Owen 3d2f6719a8 Bug 1788233: Remove PermissionsService from process Windows sandboxing code. r=handyman
Depends on D156069

Differential Revision: https://phabricator.services.mozilla.com/D156087
2022-09-07 09:42:04 +00:00
Bob Owen 692f8a5532 Bug 1689136: Apply MITIGATION_HARDEN_TOKEN_IL_POLICY to main and launcher processes. r=handyman
This also ensures that DEP without ATL thunk is enforced.

Differential Revision: https://phabricator.services.mozilla.com/D156069
2022-09-07 09:42:04 +00:00
ffxbld dcae9a94c1 No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D156422
2022-09-06 03:01:37 +00:00
Jan Varga c8263583ce Bug 1789133 - Fix non-unified-build bustage in SandboxTestingChildTests.h; r=gerard-majax
Differential Revision: https://phabricator.services.mozilla.com/D156376
2022-09-04 15:01:06 +00:00
alwu 429ad203bb Bug 1785738 - part5 : don't set alternative desktop for the mf cdm process. r=bobowen
When setting alternative destktop for the mf cdm process, it seems
interfering the media foundation framework and make the video playback
stutter.

But if we call `SetAlternateDesktop(false)` which won't create a new
window station, then the video playback won't be affected.

My guess is that there might be some internal performance issues
inside the media foundation framework when using Dcomp API between
different window stations.

In addition, Chromium also didn't enable alternative desktop for their
mf cdm process. So it makes sense to us to disalbe that as well.

Differential Revision: https://phabricator.services.mozilla.com/D155026
2022-09-03 00:54:00 +00:00
alwu 24c4bb6bd5 Bug 1785738 - part1 : add new type of utility process. r=bobowen,gerard-majax,fluent-reviewers,flod
Create a new type of utility process which would be used for media
foundation media engine CDM usage. The media engine is a media pipeline
provided by the Windows Media Foundation, and our final goal is to use
that pipeline to play encrypted content in order to achieve Widevine L1
protection to allow users to watch high resolution videos.

Differential Revision: https://phabricator.services.mozilla.com/D154033
2022-09-03 00:53:58 +00:00
Dana Keeler 8c1204afeb Bug 1788856 - initialize NSS as needed in nsNSSCertificate r=jschanck
Previously, instantiating an nsIX509Cert (implemented by nsNSSCertificate)
would cause NSS to be initialized. However, if 'new nsNSSCertificate()' was
called directly (rather than going through XPCOM), NSS would not be
initialized. This didn't seem to be a problem until bug 1787942 changed how
nsITransportSecurityInfo was sent between processes for PHttpChannel and
HttpChannelOnStartRequestArgs (namely, by using the direct IPC support rather
than first serializing to a string, sending it over IPC, and then deserializing
it). That direct IPC implementation uses 'new nsNSSCertificate()', which is now
a problem.

nsNSSCertificate used to make extensive use of NSS, which warranted ensuring
NSS was initialized before creating one at all. Now, as of bug 1748341, the
cases where nsNSSCertificate uses NSS are limited and clearly delineated.
Accordinly, this change makes it so nsNSSCertificate only initializes NSS if
and when it needs it, rather than relying on the XPCOM boilerplate to
initialize NSS first.

Differential Revision: https://phabricator.services.mozilla.com/D156353
2022-09-02 22:26:37 +00:00
Dennis Jackson a7c2f2a620 Bug 1788290 - Add the telemetry for Web Privacy. r=keeler.
Differential Revision: https://phabricator.services.mozilla.com/D156107
2022-09-02 20:59:35 +00:00
Dennis Jackson 97f4470f70 Bug 1788290 - Record whether Private DNS was used for a TLS Connection. r=keeler,necko-reviewers,valentin.
Differential Revision: https://phabricator.services.mozilla.com/D156106
2022-09-02 20:59:35 +00:00
Dennis Jackson a0e440195f Bug 1788290 - Record whether OCSP requests were made whilst making a TLS connection. r=keeler,necko-reviewers.
Differential Revision: https://phabricator.services.mozilla.com/D156105
2022-09-02 20:59:34 +00:00
Butkovits Atila 7fed5a7ef2 Backed out 3 changesets (bug 1788290) for causing build bustages. CLOSED TREE
Backed out changeset 52d5a06be477 (bug 1788290)
Backed out changeset a3b5d214b5d4 (bug 1788290)
Backed out changeset e94a38b79965 (bug 1788290)
2022-09-02 19:13:34 +03:00
Dennis Jackson ea92d08e39 Bug 1788290 - Add the telemetry for Web Privacy. r=keeler.
Differential Revision: https://phabricator.services.mozilla.com/D156107
2022-09-02 14:16:08 +00:00
Dennis Jackson 4b3a179797 Bug 1788290 - Record whether Private DNS was used for a TLS Connection. r=keeler,necko-reviewers,valentin.
Differential Revision: https://phabricator.services.mozilla.com/D156106
2022-09-02 14:16:07 +00:00
Dennis Jackson 0e389c049e Bug 1788290 - Record whether OCSP requests were made whilst making a TLS connection. r=keeler,necko-reviewers.
Differential Revision: https://phabricator.services.mozilla.com/D156105
2022-09-02 14:16:07 +00:00
Alexandre Lissy ac1cbfd25b Bug 1788689 - Disable MITIGATION_DYNAMIC_CODE_DISABLE for more MinGW r=bobowen
Differential Revision: https://phabricator.services.mozilla.com/D156273
2022-09-02 09:17:50 +00:00
Dana Keeler 865a8ba6b7 Bug 1778997 - provide pkcs11 rust bindings in-tree r=jschanck,supply-chain-reviewers
Differential Revision: https://phabricator.services.mozilla.com/D154258
2022-09-01 20:48:25 +00:00
ffxbld e57987e3d0 No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D156168
2022-09-01 13:14:23 +00:00
Alexandre Lissy b135ca0732 Bug 1780796 - Use one process per platform decoder module sandbox requirements r=alwu,nika,fluent-reviewers,flod
Differential Revision: https://phabricator.services.mozilla.com/D152545
2022-09-01 12:59:32 +00:00
ffxbld 353baa4945 No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D155828
2022-08-29 13:18:01 +00:00
Iulian Moraru 26ac918f96 Backed out changeset 8feed89ecea4 (bug 1787268) for causing build bustages. CLOSED TREE 2022-08-27 01:31:43 +03:00
John Schanck 7871c25d95 Bug 1787268 - avoid once_cell in ipcclientcerts. r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D155611
2022-08-26 19:58:46 +00:00
Dana Keeler 56e7ae8648 Bug 1781104 - replace error type booleans with error category in nsITransportSecurityInfo r=necko-reviewers,mixedpuppy,jschanck,mccr8
Differential Revision: https://phabricator.services.mozilla.com/D154561
2022-08-26 18:48:38 +00:00
Dana Keeler b4c45d4248 Bug 1781104 - remove unnecessary bits parameter from nsICertOverrideService r=djackson,necko-reviewers,geckoview-reviewers,extension-reviewers,kershaw,calu
Differential Revision: https://phabricator.services.mozilla.com/D152826
2022-08-26 18:48:38 +00:00
Dana Keeler 40cd3d5efd Bug 1781104 - remove unused 'add override by fingerprint' API from nsICertOverrideService r=djackson
`rememberTemporaryValidityOverrideUsingFingerprint` is no longer used in
`nsICertOverrideService` and can be removed.

Differential Revision: https://phabricator.services.mozilla.com/D152825
2022-08-26 18:48:37 +00:00
Dennis Jackson 7996136fb5 Bug 1787505 - land NSS e5c1e1a0eaff UPGRADE_NSS_RELEASE, r=nss-reviewers,jschanck
Differential Revision: https://phabricator.services.mozilla.com/D155711
2022-08-26 16:40:01 +00:00
Mark Banner e3bad2d44a Bug 1786197 - Turn on ESLint rule for prefer-boolean-length-check for security. r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D155165
2022-08-26 13:39:34 +00:00
ffxbld 7de1940b30 No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D155573
2022-08-25 14:49:54 +00:00
ffxbld 4955e3dc0f No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D155332
2022-08-23 13:01:05 +00:00
Dana Keeler 9c30613d90 Bug 1784098 - make nsISocketTransport.securityInfo explicit as nsISSLSocketControl r=necko-reviewers,kershaw
Differential Revision: https://phabricator.services.mozilla.com/D154257
2022-08-23 03:37:17 +00:00
Dana Keeler e7fe86c6a0 Bug 1784098 - move nsITLSServerConnectionInfo from nsISocketTransport.securityInfo to securityCallbacks r=necko-reviewers,kershaw
In preparation for making nsISocketTransport.securityInfo a concrete type
(nsITransportSecurityInfo), nsITLSServerConnectionInfo needs to be moved off of
securityInfo. securityCallbacks seems like a reasonable place.

Differential Revision: https://phabricator.services.mozilla.com/D154256
2022-08-23 03:37:17 +00:00
Narcis Beleuzu 5fb7ed6946 Backed out 4 changesets (bug 1784098) for bustages on nsCOMPtr.h . CLOSED TREE
Backed out changeset d22ac7bcb472 (bug 1784098)
Backed out changeset a97052238dba (bug 1784098)
Backed out changeset a2bb8ecd6170 (bug 1784098)
Backed out changeset 16ab6547619c (bug 1784098)
2022-08-22 20:50:21 +03:00
Dana Keeler 5a1655a87d Bug 1784098 - make nsISocketTransport.securityInfo explicit as nsISSLSocketControl r=necko-reviewers,kershaw
Differential Revision: https://phabricator.services.mozilla.com/D154257
2022-08-22 16:32:01 +00:00
Dana Keeler 0142f6d701 Bug 1784098 - move nsITLSServerConnectionInfo from nsISocketTransport.securityInfo to securityCallbacks r=necko-reviewers,kershaw
In preparation for making nsISocketTransport.securityInfo a concrete type
(nsITransportSecurityInfo), nsITLSServerConnectionInfo needs to be moved off of
securityInfo. securityCallbacks seems like a reasonable place.

Differential Revision: https://phabricator.services.mozilla.com/D154256
2022-08-22 16:32:01 +00:00
ffxbld 6cb19f9e34 No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D155203
2022-08-22 13:44:16 +00:00
Mark Banner ff257fb43c Bug 1786076 - Enable ESlint rule no-unused-vars on the global scope for security/manager/ssl/ xpcshell-tests. r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D155101
2022-08-19 20:44:02 +00:00
Barret Rennie 6de0f1b749 Bug 1772923 - Port osfile.jsm usage to IOUtils in security/manager/ r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D153711
2022-08-19 20:04:57 +00:00
Butkovits Atila e8ee25ae56 Backed out changeset ef7acc434052 (bug 1783223) for causing multiple mochitest failures. CLOSED TREE 2022-08-18 18:45:43 +03:00
ffxbld d61f881532 No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D154979
2022-08-18 14:05:58 +00:00
Nika Layzell 4011409c5d Bug 1783282 - Use a custom attribute instead of derive for implementing xpcom interfaces in rust, r=xpcom-reviewers,necko-reviewers,dragana,barret
Differential Revision: https://phabricator.services.mozilla.com/D153801
2022-08-18 13:57:35 +00:00
Jeff Muizelaar b55779b46a Bug 1783223 - Enable Arbitratry Code Guard in RDD on Nightly. r=bobowen
This was previously disabled in bug 1673194 because of start up crashes.
It seems like msmpeg2vdec.dll may use dynamic code to support encrypted
code that uses. In recent versions of Windows this only seems used
in the 32bit version. The 32bit version will opt out of ACG on the
threads where it needs to use VirtualProtect so we use the weaker
variant there.

Differential Revision: https://phabricator.services.mozilla.com/D153762
2022-08-18 13:41:24 +00:00
Anna Weine db08a45c3d Bug 1785784 - land NSS NSS_3_82_RTM UPGRADE_NSS_RELEASE, r=nss-reviewers,bbeurdouche
Differential Revision: https://phabricator.services.mozilla.com/D154974
2022-08-18 10:14:31 +00:00
Dana Keeler 7af450dab0 Bug 1781976 - remove expiring telemetry probe CLIENT_CERTIFICATE_SCAN_TIME r=ckerschb
Differential Revision: https://phabricator.services.mozilla.com/D154436
2022-08-17 18:50:26 +00:00
ffxbld 87bde7886c No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=dmeehan
Differential Revision: https://phabricator.services.mozilla.com/D154638
2022-08-15 12:10:00 +00:00
Emilio Cobos Álvarez a7401488af Bug 1784265 - Drop support for flex attribute values other than 0 and 1. r=dholbert,mconley,preferences-reviewers
This makes it easier to get parity between legacy and regular flex
without having to either have tons of arbitrary attribute selectors in
the xul sheet, nor adding attribute lookup hacks to the html flexbox
layout.

Also, reimplement the remaining supported flex attribute-values (0 and 1)
purely in terms of CSS rules in xul.css (regardless of whether
emulate-moz-box-with-flex is enabled).

In practice these are pretty uncommon and the style attribute does the
trick in every case I've tried.

Add a debug-only assertion to ensure we preserve behavior for now.

Add a new test with another behavior difference between flexbox
emulation and old xul layout because the old reftest now passes. Use
replaced elements, which in modern flex are treated differently.

Differential Revision: https://phabricator.services.mozilla.com/D154394
2022-08-12 23:13:41 +00:00
Marian-Vasile Laza 7f5e2711c6 Backed out 3 changesets (bug 1784265) for causing reftest failures on flex-emulation-1.xhtml. CLOSED TREE
Backed out changeset 415da4b53bdd (bug 1784265)
Backed out changeset e27b21c54b1f (bug 1784265)
Backed out changeset fcb1a053fbe2 (bug 1784265)
2022-08-13 01:14:13 +03:00
Emilio Cobos Álvarez a2ec6564f3 Bug 1784265 - Drop support for flex attribute values other than 0 and 1. r=dholbert,mconley,preferences-reviewers
This makes it easier to get parity between legacy and regular flex
without having to either have tons of arbitrary attribute selectors in
the xul sheet, nor adding attribute lookup hacks to the html flexbox
layout.

Also, reimplement the remaining supported flex attribute-values (0 and 1)
purely in terms of CSS rules in xul.css (regardless of whether
emulate-moz-box-with-flex is enabled).

In practice these are pretty uncommon and the style attribute does the
trick in every case I've tried.

Add a debug-only assertion to ensure we preserve behavior for now.

Add a new test with another behavior difference between flexbox
emulation and old xul layout because the old reftest now passes. Use
replaced elements, which in modern flex are treated differently.

Differential Revision: https://phabricator.services.mozilla.com/D154394
2022-08-12 19:34:34 +00:00
ffxbld fe0b61866f No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=dmeehan
Differential Revision: https://phabricator.services.mozilla.com/D154378
2022-08-11 19:10:20 +00:00
Nika Layzell 706cf2f2fa Bug 1782765 - Fix nullability of arrays of interfaces in Rust, r=xpcom-reviewers,necko-reviewers,mccr8,valentin
When generating code for arrays of interfaces from the rust-xpidl
compiler, the type was declared incorrectly as ThinVec<RefPtr<T>>
instead of ThinVec<Option<RefPtr<T>>> meaning that null values in the
array would be handled incorrectly.

This patch fixes this code generation mistake and updates crates using
the interface to handle null values correctly.

Differential Revision: https://phabricator.services.mozilla.com/D153485
2022-08-11 17:53:48 +00:00
Csoregi Natalia e2f0a85bfd Backed out changeset 5c13cd875d8b (bug 1772923) for causing failures on browser_cert_export.js. CLOSED TREE 2022-08-11 21:24:54 +03:00
Barret Rennie cda27c85fe Bug 1772923 - Port osfile.jsm usage to IOUtils in security/manager/ r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D153711
2022-08-11 17:11:36 +00:00
Nika Layzell 45397cbfdd Bug 1779792 - Part 4: Deduplicate ProcessChild subclass constructors, r=ipc-reviewers,necko-reviewers,media-playback-reviewers,alwu,mccr8
These constructors are unnecessary and can be defined with a `using` statement,
making it easier to change all constructors simultaneously.

Differential Revision: https://phabricator.services.mozilla.com/D153620
2022-08-10 14:55:23 +00:00
Nika Layzell 2ac29a461a Bug 1779792 - Part 3: Use an endpoint to bind the initial actor in parent processes, r=ipc-reviewers,necko-reviewers,media-playback-reviewers,alwu,mccr8
This improves consistency with the child process case, and will make it easier
to attach additional state without needing to thread it through every child
process callsite manually.

Differential Revision: https://phabricator.services.mozilla.com/D153619
2022-08-10 14:55:22 +00:00
Nika Layzell d45df271ec Bug 1779792 - Part 2: Use an Endpoint to bind the initial actor in child processes, r=ipc-reviewers,necko-reviewers,media-playback-reviewers,mccr8,alwu
This type is also used in other places to start non-initial actors, and will
allow us to attach additional state more easily without needing to thread it
through every child process callsite manually.

Differential Revision: https://phabricator.services.mozilla.com/D153618
2022-08-10 14:55:22 +00:00
Jed Davis 6a37a2ab93 Bug 1778052 - Don't reset ignored signals when starting a sandboxed child process on Linux. r=gcp
We uninstall signal handlers in child processes after clone(), because
they probably won't do the right thing if invoked in that context.
However, the current code also resets signals which were ignored;
if that disposition was set by an outside program like `nohup`, the
expectation is that it should be inherited.  This patch omits those
signals when resetting handlers (similar to what `exec` does).

Differential Revision: https://phabricator.services.mozilla.com/D151336
2022-08-09 00:35:18 +00:00
ffxbld 832ff8bc53 No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D153942
2022-08-08 12:57:52 +00:00
ffxbld 9ed83283ae No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D153744
2022-08-04 13:43:03 +00:00
Fabrice Desré c50cb528fc Bug 1761040 - Prefix thread safety macros with MOZ_ r=geckoview-reviewers,media-playback-reviewers,alwu,jesup,m_kato
Differential Revision: https://phabricator.services.mozilla.com/D152575
2022-08-03 16:39:41 +00:00
Andreea Pavel 3ccd75af8d Backed out changeset b9d2965591b9 (bug 1761040) for landing with wrong author CLOSED TREE DONTBUILD 2022-08-03 18:55:00 +03:00
Andreea Pavel fdb7cb2ecd Bug 1761040 - Prefix thread safety macros with MOZ_ r=geckoview-reviewers,media-playback-reviewers,alwu,jesup,m_kato
Differential Revision: https://phabricator.services.mozilla.com/D152575
2022-08-03 15:27:43 +00:00
Mark Banner 7428be4a86 Bug 1782008 - Remove now unnecessary .eslintrc.js files. r=webcompat-reviewers,extension-reviewers,media-playback-reviewers,pip-reviewers,denschub,rpl,alwu,mossop
Differential Revision: https://phabricator.services.mozilla.com/D152736
2022-08-03 11:16:20 +00:00
Dennis Jackson 7ac4427e01 Bug 1781075 - Add test cases for ECH connections with incorrect ALPN advertisements. r=necko-reviewers,kershaw
These tests set up an ECH server which will only negotiate http/1.1 in the TLS ALPN extension.
If the client doesn't send an ALPN offering at least http/1.1 the connection will fail with
SSL_ERROR_NEXT_PROTOCOL_NO_PROTOCOL.

Differential Revision: https://phabricator.services.mozilla.com/D153368
2022-08-02 19:59:22 +00:00
Andreea Pavel 89d63c91e6 Backed out changeset a907159a482f (bug 1761040) for causing build bustages on a CLOSED TREE 2022-08-02 04:59:08 +03:00
Fabrice Desré 0f4ac7ad97 Bug 1761040 - Prefix thread safety macros with MOZ_ r=geckoview-reviewers,media-playback-reviewers,alwu,jesup,m_kato
Differential Revision: https://phabricator.services.mozilla.com/D152575
2022-08-02 00:49:41 +00:00
ffxbld 1d8c226620 No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D153373
2022-08-01 16:51:54 +00:00
Nika Layzell c15823d075 Bug 1772006 - Part 5: Simplify and move the string searching APIs from ns[T]StringObsolete, r=xpcom-reviewers,necko-reviewers,eeejay,dragana,barret
The biggest set of APIs from ns[T]StringObsolete which are still heavily used
are the string searching APIs. It appears the intention was for these to be
replaced by the `FindInReadable` APIs, however that doesn't appear to have
happened.

In addition, the APIs have some quirks around their handling of mixed character
widths. These APIs generally supported both narrow strings and the native
string type, probably because char16_t string literals weren't available until
c++11. Finally they also used easy-to-confuse unlabeled boolean and integer
optional arguments to control behaviour.

These patches do the following major changes to the searching APIs:

1. The ASCII case-insensitive search method was split out as
   LowerCaseFindASCII, rather than using a boolean. This should be less
   error-prone and more explicit, and allows the method to continue to use
   narrow string literals for all string types (as only ASCII is supported).
2. The other [R]Find methods were restricted to only support arguments with
   matching character types. I considered adding a FindASCII method which would
   use narrow string literals for both wide and narrow strings but it would've
   been the same amount of work as changing all of the literals to unicode
   literals.
   This ends up being the bulk of the changes in the patch.
3. All find methods were re-implemented using std::basic_string_view's find
   algorithm or stl algorithms to reduce code complexity, and avoid the need to
   carry around the logic from nsStringObsolete.cpp.
4. The implementations were moved to nsTStringRepr.cpp.
5. An overload of Find was added to try to catch callers which previously
   called `Find(..., false)` or `Find(..., true)` to set case-sensitivity, due
   to booleans normally implicitly coercing to `index_type`. This should
   probably be removed at some point, but may be useful during the transition.

Differential Revision: https://phabricator.services.mozilla.com/D148300
2022-07-30 00:12:48 +00:00
Nika Layzell 997047e2a4 Bug 1772006 - Part 4: Simplify and move the string comparison APIs from ns[T]StringObsolete, r=xpcom-reviewers,necko-reviewers,dragana,barret
This patch moves EqualsIgnoreCase to ns[T]StringObsolete, and removes
the aCount argument, instead migrating callers to use `StringBeginsWith`
with a case-insensitive comparator.

In addition, nsTStringRepr::Compare was removed and replaced with either
calls to methods like `StringBeginsWith` or the global `Compare` method.

These changes required some modifications at call-sites but should make
the behaviour less surprising and more consistent.

Differential Revision: https://phabricator.services.mozilla.com/D148299
2022-07-30 00:12:48 +00:00
Dana Keeler 12ac90f435 Bug 1781466 - gather telemetry for PSM UI elements slated for removal r=djackson
Depends on D152942

Differential Revision: https://phabricator.services.mozilla.com/D152943
2022-07-28 20:04:31 +00:00
Dana Keeler 5a8efd3f8c Bug 1781466 - remove obsolete exception dialog telemetry r=djackson
Differential Revision: https://phabricator.services.mozilla.com/D152942
2022-07-28 20:04:31 +00:00
ffxbld f6e48e8f08 No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D153075
2022-07-28 12:41:48 +00:00
Jed Davis 4552fc73a3 Bug 1779312 - Replace uses of strerror in Linux sandbox code. r=glandium
`strerror` is async signal unsafe, and we're using it in contexts where
that's a problem: in particular in the child process after `clone()`ing,
where it can deadlock if it takes locks the parents' other threads had
held (or cause other undefined behavior), but also in the SIGSYS handler
if it's nested inside an async signal.  It's also thread-unsafe.

This is mostly a mechanical replacement with the new `SANDBOX_LOG_ERRNO`
or `SANDBOX_LOG_WITH_ERROR`; two messages had the error string in the
middle and have been adjusted.

Differential Revision: https://phabricator.services.mozilla.com/D152099
2022-07-27 19:41:05 +00:00
Jed Davis 05621d57dc Bug 1779312 - Add macros for Linux sandbox logging with an error code. r=glandium
This adds two new logging macros, which are intended to be async signal
safe:

* `SANDBOX_LOG_ERRNO`, which appends the error similarly to `perror` but
   uses the error identifier (e.g., `EINVAL` instead of `Invalid argument`).
   Unlike `perror`, formatting directives are available as for `SANDBOX_LOG`.

* `SANDBOX_LOG_WITH_ERROR` is the same thing but the error number is the
  first argument instead of using `errno`; this is useful for newer POSIX
  APIs which return an error number.

This will be used in the next patch to replace the existing use of
`strerror`, which is not async signal safe (or thread-safe).

Differential Revision: https://phabricator.services.mozilla.com/D152098
2022-07-27 19:41:05 +00:00
Jed Davis fd918ffb96 Bug 1779312 - Rename `SANDBOX_LOG_ERROR` to just `SANDBOX_LOG`. r=glandium
Originally this was written for B2G and used the Android logging
facility, which (like syslog) includes a severity level.  However, all
current usage is on desktop where we just write to stderr, and there was
never much demand to add support for any log levels besides "error".

More importantly for the current situation, renaming the macro to
`SANDBOX_LOG` avoids confusion between `SANDBOX_LOG_ERROR` and
`SANDBOX_LOG_ERRNO` (or `SANDBOX_LOG_ERROR_ERRNO` or whatever).

Differential Revision: https://phabricator.services.mozilla.com/D152097
2022-07-27 19:41:04 +00:00
Jed Davis 4fb97a1c3d Bug 1779312 - Preliminary fixes to some misuses of SANDBOX_LOG_ERROR. r=glandium
Two minor things I noticed while converting the existing sandbox logging:

1. One call site was using %u, but that doesn't exist in this printf
   dialect, only %d; signedness is determined by the actual argument
   type via template magic.

2. POSIX functions that return an error number just return the number;
   there was one place that was negating it before use, as if it had
   come from the Linux syscall ABI.

Differential Revision: https://phabricator.services.mozilla.com/D152096
2022-07-27 19:41:04 +00:00
Tooru Fujisawa a032f53a63 Bug 1780543 - Part 5: Add mozilla/chrome-script environment. r=Standard8
Differential Revision: https://phabricator.services.mozilla.com/D152430
2022-07-26 02:46:30 +00:00
Emilio Cobos Álvarez 42b7f1a58c Bug 1780788 - Use abstract strings as in-arguments for ipdl. r=nika,necko-reviewers,media-playback-reviewers,alwu,dragana
This prevents copies and avoids the hack we have to avoid this, which
right now is using nsDependent{C,}String.

Non-virtual actors can still use `nsString` if they need to on the
receiving end.

Differential Revision: https://phabricator.services.mozilla.com/D152519
2022-07-25 20:19:48 +00:00
ffxbld 6506fc7cf1 No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=diannaS
Differential Revision: https://phabricator.services.mozilla.com/D152635
2022-07-25 13:16:50 +00:00
Alexandre Lissy 9c3474ae19 Bug 1775263 - Block cyinjct.dll from being injected in Utility r=haik,handyman
Differential Revision: https://phabricator.services.mozilla.com/D150595
2022-07-22 13:47:58 +00:00
Dana Keeler 30b914478f Bug 1779973 - treat failure to parse certificate validity as a time error r=djackson
Differential Revision: https://phabricator.services.mozilla.com/D152333
2022-07-21 23:51:01 +00:00
Dennis Jackson 3bde9bff24 Bug 1779398 - land NSS NSS_3_81_RTM UPGRADE_NSS_RELEASE, r=nss-reviewers,nkulatova DONTBUILD
Differential Revision: https://phabricator.services.mozilla.com/D152398
2022-07-21 13:50:49 +00:00
Dennis Jackson 7a55bf9c23 Bug 1780014: Add specific telemetry for conservative and first-try handshakes. r=keeler.
This patch adds two new telemetry histograms which collect specific types
of TLS handshake seperately from existing handshakes.
 - The conservative histogram tracks handshakes used for essential connections (e.g. update checks)
 - The first-try histogram tracks all initial connection attempts. This allows us to identify issues that might otherwise be masked by our retry logic.

A single handshake may belong to more than one histogram. All handshakes belong to the root histogram.
As the histogram buckets are aligned, it is possible to derive new histograms from these stored results.
For example, as ECH GREASE is only used on first-try handshakes, the histogram from non-GREASE first-try
handshakes can be calculated by subtracting the entries in the GREASE histogram from the first-try histogram.

This patch also extends the existing handshake necko tests to verify that the telemetry is recorded correctly.
Telemetry checks don't run if networking is running on the socket process as the histograms are no longer
accessible.

Differential Revision: https://phabricator.services.mozilla.com/D150754
2022-07-21 11:02:32 +00:00
Dana Keeler 43dc5f66a3 Bug 1779848 - don't assert if mFd is null in nsNSSSocketInfo::ClientAuthCertificateSelected r=ckerschb
If nsNSSSocketInfo::mFd is nullptr, it means the connection has been closed.
This isn't an error, and ClientAuthCertificateSelected shouldn't assert if this
happens.

Differential Revision: https://phabricator.services.mozilla.com/D151962
2022-07-19 23:12:21 +00:00
Dana Keeler 270df11f4c Bug 1770269 - Enable EV Treatment for E-Tugra v3 Global root certificates r=rmf
Differential Revision: https://phabricator.services.mozilla.com/D151749
2022-07-19 22:16:34 +00:00
Dana Keeler 2985f72f3a Bug 1764397 - Enable EV Treatment for Digicert G5 root certificates r=rmf
Differential Revision: https://phabricator.services.mozilla.com/D151748
2022-07-19 22:16:33 +00:00
Anna Weine c37b09ca3b Bug 1779398 - land NSS 164849c15197 UPGRADE_NSS_RELEASE, r=nss-reviewers,djackson
2022-07-18  Kai Engert  <kaie@kuix.de>

	* lib/certhigh/certvfy.c:
	Bug 1777672 - Gracefully handle null nickname in
	CERT_GetCertNicknameWithValidity. r=rrelyea

	[164849c15197] [tip]

Differential Revision: https://phabricator.services.mozilla.com/D152169
2022-07-19 12:49:20 +00:00
ffxbld 5c3ca70147 No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=diannaS
Differential Revision: https://phabricator.services.mozilla.com/D152019
2022-07-18 13:01:12 +00:00
Haik Aftandilian a064a6ac2d Bug 1779816 - Don't specify entitlements that use the default setting of false r=mac-reviewers,bradwerth
Cleanup our entitlement files by removing entitlements that use the default setting of false.

production.entitlements.xml and developer.entitlements.xml are used today.

The browser and plugin-container entitlement lists will be used when we enable using different entitlements for parent and child processes.

Differential Revision: https://phabricator.services.mozilla.com/D151943
2022-07-15 19:30:47 +00:00
Andi-Bogdan Postelnicu bbf960e82c Bug 1617369 - Reformat recent rust changes with rustfmt r=emilio
Updated with rustfmt 1.4.38-stable (a8314ef 2022-06-27)
# ignore-this-changeset

Depends on D151908

Differential Revision: https://phabricator.services.mozilla.com/D151909
2022-07-15 09:37:22 +00:00
Kagami Sascha Rosylight bb679fa417 Bug 1769290 - Part 24: Apply mozilla-js-handle-rooted-typedef against layout,security,storage,tools r=andi
Differential Revision: https://phabricator.services.mozilla.com/D151791
2022-07-14 17:00:24 +00:00
ffxbld 643780ce3b No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=diannaS
Differential Revision: https://phabricator.services.mozilla.com/D151817
2022-07-14 11:59:52 +00:00
Dennis Jackson 7246d5248d Bug 1779398 - land NSS cafb891ea6ce UPGRADE_NSS_RELEASE, r=nss-reviewers,bbeurdouche
Differential Revision: https://phabricator.services.mozilla.com/D151714
2022-07-13 17:29:07 +00:00
Tooru Fujisawa 54623364da Bug 1777486 - Part 2: Migrate XPCOMUtils.jsm consumers with automatic migration. r=webdriver-reviewers,geckoview-reviewers,preferences-reviewers,application-update-reviewers,pip-reviewers,kmag,owlish,whimboo
Differential Revision: https://phabricator.services.mozilla.com/D151214
2022-07-12 04:21:34 +00:00
Barret Rennie 305b4cd077 Bug 1772941 - Port osfile.jsm usage to IOUtils in toolkit/content/ r=florian,preferences-reviewers
Differential Revision: https://phabricator.services.mozilla.com/D149303
2022-07-12 00:25:35 +00:00
Andreea Pavel 7738a75fdd Backed out 11 changesets (Bug 1777486) for failing bc at browser_startup.js on a CLOSED TREE
Backed out changeset b6c4c386f1a6 (Bug 1777486)
Backed out changeset 195cc2de8433 (Bug 1777486)
Backed out changeset 20c746fb1648 (Bug 1777486)
Backed out changeset d5fd8173d62d (Bug 1777486)
Backed out changeset 6d758fab5a3e (Bug 1777486)
Backed out changeset e938b601ba15 (Bug 1777486)
Backed out changeset 0c4ea0b9416b (Bug 1777486)
Backed out changeset 0559c53cc668 (Bug 1777486)
Backed out changeset eea573d3a9f9 (Bug 1777486)
Backed out changeset 9ce3a6496a49 (bug 1777486)
Backed out changeset b0867652fc48 (bug 1777486)
2022-07-11 22:24:40 +03:00
Tooru Fujisawa 8cd6ed7409 Bug 1777486 - Part 2: Migrate XPCOMUtils.jsm consumers with automatic migration. r=webdriver-reviewers,geckoview-reviewers,preferences-reviewers,application-update-reviewers,pip-reviewers,kmag,owlish,whimboo
Differential Revision: https://phabricator.services.mozilla.com/D151214
2022-07-11 15:09:13 +00:00
ffxbld a57d022de1 No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=diannaS
Differential Revision: https://phabricator.services.mozilla.com/D151486
2022-07-11 13:12:23 +00:00
Tooru Fujisawa 52c95734e7 Bug 1667455 - Part 9: Stop importing Services.jsm from chrome-priv HTML code, single-line cases. r=kmag,necko-reviewers,geckoview-reviewers,extension-reviewers,m_kato,dragana
Differential Revision: https://phabricator.services.mozilla.com/D150898
2022-07-11 12:41:52 +00:00
Tooru Fujisawa 47c8f80432 Bug 1667455 - Part 6: Stop importing Services.jsm from chrome-priv JS code, non-top-level or multi-line cases. r=kmag,perftest-reviewers,AlexandruIonescu,sparky
Differential Revision: https://phabricator.services.mozilla.com/D150895
2022-07-11 12:41:51 +00:00
Tooru Fujisawa bf93d07148 Bug 1667455 - Part 5: Stop importing Services.jsm from chrome-priv JS code, top-level single-line cases. r=kmag,webdriver-reviewers,perftest-reviewers,webcompat-reviewers,geckoview-reviewers,extension-reviewers,application-update-reviewers,pip-reviewers,twisniewski,m_kato,jdescottes,mconley,AlexandruIonescu,mossop
Differential Revision: https://phabricator.services.mozilla.com/D150894
2022-07-11 12:41:50 +00:00
Tooru Fujisawa f3a8c52c53 Bug 1667455 - Part 4: Stop importing Services.jsm from JSM. r=kmag,webdriver-reviewers,perftest-reviewers,webcompat-reviewers,geckoview-reviewers,application-update-reviewers,pip-reviewers,twisniewski,devtools-reviewers,m_kato,jdescottes,ochameau,mconley,sfoster,AlexandruIonescu
Differential Revision: https://phabricator.services.mozilla.com/D150893
2022-07-11 12:41:50 +00:00
ffxbld 7863aace6c No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=diannaS
Differential Revision: https://phabricator.services.mozilla.com/D151241
2022-07-07 14:24:35 +00:00
Dana Keeler f957a0175b Bug 1749884 - remove expired client auth cert telemetry and add new permanent telemetry r=rmf
Differential Revision: https://phabricator.services.mozilla.com/D150819
2022-07-06 18:32:43 +00:00
Dana Keeler dc4ce8d406 Bug 1777366 - remove unused `source` and `cached` parameters from nsISiteSecurityService APIs r=rmf,necko-reviewers,kershaw
These parameters are no longer used and can be removed, along with the expired
telemetry HSTS_UPGRADE_SOURCE.

Differential Revision: https://phabricator.services.mozilla.com/D150786
2022-07-05 18:33:18 +00:00
Csoregi Natalia 7e2a20405f Backed out changeset 6c542cd8d622 for causing devtools compat issues. CLOSED TREE 2022-07-04 19:39:21 +03:00
ffxbld 8592d3250f No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=diannaS
Differential Revision: https://phabricator.services.mozilla.com/D150961
2022-07-04 13:49:30 +00:00
Dana Keeler 46abba10d9 Bug 1774579 - certificate manager: update leftover loadCerts call from bug 1682412 r=rmf
In bug 1682412, loadCerts was removed from nsICertTree. At the time, the
certificate manager still had one use of it that should have been updated to
loadCertsFromCache. This patch makes that update.

Differential Revision: https://phabricator.services.mozilla.com/D150503
2022-06-30 15:41:25 +00:00
ffxbld d0985bd3cc No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=diannaS
Differential Revision: https://phabricator.services.mozilla.com/D150742
2022-06-30 14:25:21 +00:00
Mark Banner 05e3f1ea83 Bug 1646183 - Extend ESLint rule reject-importGlobalProperties to also handle defineLazyGlobalGetters. r=arai,webdriver-reviewers,webcompat-reviewers,extension-reviewers,whimboo,twisniewski,kmag
Differential Revision: https://phabricator.services.mozilla.com/D150353
2022-06-29 22:37:57 +00:00
Dana Keeler a998171379 Bug 696976 - asynchronously handle client auth certificate requests from TLS servers r=necko-reviewers,ipc-reviewers,nika,kershaw,rmf
Differential Revision: https://phabricator.services.mozilla.com/D146367
2022-06-29 16:29:28 +00:00
Dana Keeler 695084d3a9 Bug 696976 - move TLS client auth certificate selection implementation to its own file r=necko-reviewers,kershaw,jschanck
Differential Revision: https://phabricator.services.mozilla.com/D146366
2022-06-29 16:29:28 +00:00
ffxbld 3ec2694a72 No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D150368
2022-06-27 13:04:52 +00:00
Barret Rennie 6c348edd96 Bug 1776442 - Ensure NSS is initialized before instantiating nsCryptoHash r=jschanck
Differential Revision: https://phabricator.services.mozilla.com/D150256
2022-06-24 18:42:27 +00:00
John Schanck 208e054844 Bug 1773966 - land NSS NSS_3_80_RTM UPGRADE_NSS_RELEASE, r=bbeurdouche,nss-reviewers
Differential Revision: https://phabricator.services.mozilla.com/D150161
2022-06-23 18:47:59 +00:00
ffxbld 042ea8b035 No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=dmeehan
Differential Revision: https://phabricator.services.mozilla.com/D150103
2022-06-23 13:40:12 +00:00
Andi-Bogdan Postelnicu a933f9df8f Bug 1519636 - Reformat recent changes to the Google coding style. r=marco
Updated with clang-format version 14.0.5 (taskcluster-YlgDNB2QSm-6a2LDw3kj6A)
# ignore-this-changeset

Differential Revision: https://phabricator.services.mozilla.com/D150093
2022-06-23 09:27:12 +00:00
Jed Davis 6558ec1572 Bug 1771382 - Adjust the Linux RDD sandbox to handle the nvidia driver being loaded but not used. r=gcp
On multi-GPU systems, even though the GPU we're going to use for
accelerated video decoding is driven by Mesa, sometimes the nvidia
proprietary driver can be loaded and attempt to probe devices.  This
patch attempts to make the sandbox policy quietly return errors for
those syscalls, instead of treating them as unexpected (and crashing on
Nightly).

Differential Revision: https://phabricator.services.mozilla.com/D149652
2022-06-23 00:00:54 +00:00
Joel Maher 5b2dd6dd56 Bug 1769154 - Run some xpcshell tests with a conditioned profile. r=aryx,extension-reviewers,kmag
Differential Revision: https://phabricator.services.mozilla.com/D149937
2022-06-22 16:47:06 +00:00
Bogdan Szekely e43c058bda Backed out changeset 7b707ff8a7d1 (bug 1769154) for causing xpcshell failures on test_system_upgrades.js 2022-06-22 17:17:10 +03:00
Joel Maher 0f3990e1cb Bug 1769154 - Run some xpcshell tests with a conditioned profile. r=aryx,extension-reviewers,kmag
Differential Revision: https://phabricator.services.mozilla.com/D149937
2022-06-22 13:03:46 +00:00
serge-sans-paille b122b6d13d Bug 1774865 - extra cleanup mozglue, security, intl and netwerk includes r=sylvestre
Differential Revision: https://phabricator.services.mozilla.com/D149670
2022-06-22 09:51:52 +00:00
Barret Rennie 1a02416780 Bug 1773182 - Add NS_NewCryptoHash helper r=xpcom-reviewers,kmag,nika
Differential Revision: https://phabricator.services.mozilla.com/D148965
2022-06-20 13:57:29 +00:00
ffxbld 9d2837b25e No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=dmeehan
Differential Revision: https://phabricator.services.mozilla.com/D149736
2022-06-20 12:16:01 +00:00
Mike Hommey df77ed0752 Bug 1774501 - Update to env_logger 0.9 in various in-tree crates. r=nbp,keeler,xpcom-reviewers,rhunt,nika
Differential Revision: https://phabricator.services.mozilla.com/D149453
2022-06-16 20:44:03 +00:00
Chris Martin 190ac22f48 Bug 1770098 - Disable Win32k Lockdown with incompatible mitigations r=handyman,Gankra
Differential Revision: https://phabricator.services.mozilla.com/D148962
2022-06-16 14:05:00 +00:00
ffxbld 5d65102622 No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=dmeehan
Differential Revision: https://phabricator.services.mozilla.com/D149507
2022-06-16 12:12:32 +00:00
Tooru Fujisawa 5e0731b2a4 Bug 1608282 - Part 4: Remove Cu.defineLazyGlobalGetters from JSM. r=webdriver-reviewers,extension-reviewers,jdescottes,kmag
Depends on D149196

Differential Revision: https://phabricator.services.mozilla.com/D149197
2022-06-16 00:19:54 +00:00
Butkovits Atila 8218713aac Backed out 4 changesets (bug 1608282) for causing hazard failures. CLOSED TREE
Backed out changeset 32aebc8be201 (bug 1608282)
Backed out changeset 37c970364269 (bug 1608282)
Backed out changeset ced8d82cc2d2 (bug 1608282)
Backed out changeset e26e480c7dd6 (bug 1608282)
2022-06-16 03:10:02 +03:00
Jed Davis c807158580 Bug 1770905 - Allow GeckoMediaPlugin processes on Linux to be profiled if memfd_create is available. r=gcp,mstange,media-playback-reviewers,padenot
There are two parts to this patch; both affect only Linux:

1. The GMP sandbox policy is adjusted to allow certain syscalls used in
   shared memory creation (ftruncate and fallocate).  However, the file
   broker is not used; the process still has no access to files in /dev/shm.

2. The profiler is not initialized for GMP processes unless memfd_create
   is available (so the process can create shared memory to send
   profiling data back, without filesystem access), or the GMP sandbox
   is disabled (either at runtime or build time).

As of this patch, profiling GMP processes on Linux should succeed on
distros with kernel >=3.17 (Oct. 2014), but native stack frames won't
have symbols (and may be incorrectly unwound, not that it matters much
without symbols); see the bug for more info.  Pseudo-stack frames and
markers should work, however.

Differential Revision: https://phabricator.services.mozilla.com/D148470
2022-06-15 20:55:24 +00:00
Jed Davis c4d1df3cf7 Bug 1770905 - Quietly reject `readlink` in the Linux GeckoMediaPlugin sandbox. r=gcp
The profiler may try to readlink `/proc/self/exe` to determine the
executable name; currently, its attempt to get information about loaded
objects is broken for other reasons, so this isn't helpful.  Thus, this
patch has it fail with `EINVAL` (meaning "not a symbolic link) instead of
being treated as unexpected.

(In the future, if we need to, we could simulate that syscall by
recording the target of `/proc/self/exe` before sandboxing, and
recognizing that specific case in a trap function.)

Differential Revision: https://phabricator.services.mozilla.com/D148469
2022-06-15 20:55:23 +00:00
Tooru Fujisawa 8b8d6b141a Bug 1608282 - Part 4: Remove Cu.defineLazyGlobalGetters from JSM. r=webdriver-reviewers,extension-reviewers,jdescottes,kmag
Depends on D149196

Differential Revision: https://phabricator.services.mozilla.com/D149197
2022-06-15 20:34:35 +00:00
Dana Keeler aa7979464f Bug 1769150 - try all known EV policy OIDs found in a certificate when verifying for EV r=jschanck
Before this patch, the certificate verifier would only attempt to build a
trusted path to a root with the first recognized EV OID in the end-entity
certificate. Thus, if an end-entity certificate had more than one EV OID, it
could fail to verify as EV if an intermediate or root had the "wrong" EV OID.
This patch addresses this shortcoming by trying to build a path with each
recognized EV OID in the end-entity certificate until it finds one that works.

Differential Revision: https://phabricator.services.mozilla.com/D149319
2022-06-15 18:20:13 +00:00
Dana Keeler f0803728d4 Bug 1772976 - make non-private certificate error overrides available in private contexts r=jschanck
Certificate error overrides made in non-private contexts should be availble in
private contexts as well (but not vice-versa).

Differential Revision: https://phabricator.services.mozilla.com/D149296
2022-06-15 18:02:36 +00:00
Barret Rennie 3f5dc34b19 Bug 1774204 - Add SHA-384 and SHA-512 support to Digest r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D149281
2022-06-14 20:08:45 +00:00
Dennis Jackson 549b3f9615 Bug 1773966 - land NSS tip UPGRADE_NSS_RELEASE, r=nss-reviewers,nkulatova
Differential Revision: https://phabricator.services.mozilla.com/D149276
2022-06-14 15:47:17 +00:00
Dennis Jackson a22ec26448 Bug 1771479 - Fix ECH GREASE Telemetry. r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D149212
2022-06-14 09:59:37 +00:00
Dana Keeler c9fe82eb09 Bug 1773370 - PSM changes for macOS SDK update r=jschanck
Differential Revision: https://phabricator.services.mozilla.com/D148850
2022-06-13 20:29:48 +00:00
ffxbld d7e147a70e No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=dmeehan
Differential Revision: https://phabricator.services.mozilla.com/D149134
2022-06-13 14:06:30 +00:00
Dennis Jackson 9f93e47cfa Bug 1771479 - Add histograms for SSL_HANDSHAKE_RESULT and SSL_TIME_UNTIL_READY for connections using ECH. r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D147498
2022-06-13 11:29:41 +00:00
Dennis Jackson 1c8c0c17ed oBug 1770907 - Disable ECH GREASE when retrying connections. r=dragana,keeler,necko-reviewers
Add a preference for whether to remove ECH GREASE extensions when retrying a connection. This repurposes the  flag which was previously present but not actually functional.

Differential Revision: https://phabricator.services.mozilla.com/D147191
2022-06-13 11:29:41 +00:00
Dennis Jackson 8948a1a9a2 Bug 1767974 - Add preferences for ECH GREASE Mode. r=keeler,dragana
Differential Revision: https://phabricator.services.mozilla.com/D145608
2022-06-13 11:29:41 +00:00
criss c6b2c5db61 Backed out 9 changesets (bug 1772006) causing build bustages on nsTString.cpp. CLOSED TREE
Backed out changeset f17c7565707b (bug 1772006)
Backed out changeset c725fe1f5882 (bug 1772006)
Backed out changeset d19663161261 (bug 1772006)
Backed out changeset b6611ab002d9 (bug 1772006)
Backed out changeset 790f42b64af9 (bug 1772006)
Backed out changeset 79a734b4e4d9 (bug 1772006)
Backed out changeset 42730aae16ea (bug 1772006)
Backed out changeset b2542aef3054 (bug 1772006)
Backed out changeset 962bfea4a309 (bug 1772006)
2022-06-11 01:13:42 +03:00
Nika Layzell b3c13bf114 Bug 1772006 - Part 6: Simplify and move the string searching APIs from ns[T]StringObsolete, r=xpcom-reviewers,necko-reviewers,eeejay,dragana,barret
The biggest set of APIs from ns[T]StringObsolete which are still heavily used
are the string searching APIs. It appears the intention was for these to be
replaced by the `FindInReadable` APIs, however that doesn't appear to have
happened.

In addition, the APIs have some quirks around their handling of mixed character
widths. These APIs generally supported both narrow strings and the native
string type, probably because char16_t string literals weren't available until
c++11. Finally they also used easy-to-confuse unlabeled boolean and integer
optional arguments to control behaviour.

These patches do the following major changes to the searching APIs:

1. The ASCII case-insensitive search method was split out as
   LowerCaseFindASCII, rather than using a boolean. This should be less
   error-prone and more explicit, and allows the method to continue to use
   narrow string literals for all string types (as only ASCII is supported).
2. The other [R]Find methods were restricted to only support arguments with
   matching character types. I considered adding a FindASCII method which would
   use narrow string literals for both wide and narrow strings but it would've
   been the same amount of work as changing all of the literals to unicode
   literals.
   This ends up being the bulk of the changes in the patch.
3. All find methods were re-implemented using std::basic_string_view's find
   algorithm or stl algorithms to reduce code complexity, and avoid the need to
   carry around the logic from nsStringObsolete.cpp.
4. The implementations were moved to nsTStringRepr.cpp.
5. An overload of Find was added to try to catch callers which previously
   called `Find(..., false)` or `Find(..., true)` to set case-sensitivity, due
   to booleans normally implicitly coercing to `index_type`. This should
   probably be removed at some point, but may be useful during the transition.

Differential Revision: https://phabricator.services.mozilla.com/D148300
2022-06-10 21:12:08 +00:00
Tooru Fujisawa ca262b23ce Bug 1773174 - Part 1: Use .jsm extension for JSMs in toolkit/components/certviewer/. r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D148596
2022-06-10 19:21:05 +00:00
Jed Davis 09be260cd3 Bug 1772142 - Fix the RDD sandbox to deal with Snap moving some config files. r=gcp
In the Snap environment, some system config files aren't in their usual
places, but rather in a subtree rooted at `$SNAP/gnome-platform`,
which seems to also be `$SNAP_DESKTOP_RUNTIME`.  This includes some
subdirectories of `/usr/share` that we need for EGL to work.

This could probably also have been fixed in the Snap packaging, given
that [Mozilla's][] and [Ubuntu's][] specs both put `/usr/share/libdrm`
back into its normal location, but for now it's easiest to adjust
the sandbox, given that (I think?) anything under `$SNAP` is public
information so we lose nothing by allowing read access.  (See also bug
1732580.)

[Mozilla's]: https://searchfox.org/mozilla-central/rev/973000acec0cbf7211e0fad89ca00c352aeb8384/taskcluster/docker/firefox-snap/firefox.snapcraft.yaml.in#50-52
[Ubuntu's]: https://git.launchpad.net/~mozilla-snaps/firefox-snap/+git/firefox-snap/tree/snapcraft.yaml?id=a24fb4a3f92d190299e4126ecc4132087c2aed3d#n85

Differential Revision: https://phabricator.services.mozilla.com/D148925
2022-06-10 19:03:55 +00:00
John Schanck 0c18bdf797 Bug 1773371 - Enforce CRLite revoked status when OCSP confirmation fails. r=keeler
This changes the behavior of CRLite when configured in `ConfirmRevocations`
mode (the default mode on nightly and early beta). Under the new definition,
ConfirmRevocations mode fails closed when OCSP fails open. In particular, a
certificate will be marked as "Revoked" in the following scenarios:
  - CRLite returns "Revoked" and the certificate does not list an OCSP URL,
  - CRLite returns "Revoked" and the OCSP responder is unreachable,
  - CRLite returns "Revoked" and the OCSP responder returns an error.

Differential Revision: https://phabricator.services.mozilla.com/D148686
2022-06-10 16:31:39 +00:00
Iulian Moraru 4cd2cbcfa4 Backed out 3 changesets (bug 1767974, bug 1771479) for causing xpcshell failures on test_httpssvc_retry_with_ech.js. CLOSED TREE
Backed out changeset 9bcda147affa (bug 1771479)
Backed out changeset 4455b5bf1282
Backed out changeset f973baf1403a (bug 1767974)
2022-06-10 16:58:28 +03:00
Dennis Jackson 65e3bc3f2a Bug 1771479 - Add histograms for SSL_HANDSHAKE_RESULT and SSL_TIME_UNTIL_READY for connections using ECH. r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D147498
2022-06-10 11:10:28 +00:00
Dennis Jackson 55801f5de7 oBug 1770907 - Disable ECH GREASE when retrying connections. r=dragana,keeler,necko-reviewers
Add a preference for whether to remove ECH GREASE extensions when retrying a connection. This repurposes the  flag which was previously present but not actually functional.

Differential Revision: https://phabricator.services.mozilla.com/D147191
2022-06-10 11:10:27 +00:00
Dennis Jackson bb920d016d Bug 1767974 - Add preferences for ECH GREASE Mode. r=keeler,dragana
Differential Revision: https://phabricator.services.mozilla.com/D145608
2022-06-10 11:10:27 +00:00
Sylvestre Ledru b848a697dc Bug 1617369 - Reformat recent rust changes with rustfmt r=emilio,extension-reviewers,willdurand
# ignore-this-changeset

Differential Revision: https://phabricator.services.mozilla.com/D148376
2022-06-10 09:21:45 +00:00
ffxbld b7aed3fa69 No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=dmeehan
Differential Revision: https://phabricator.services.mozilla.com/D148769
2022-06-09 12:00:37 +00:00
Alexandre Lissy b1026facbf Bug 1772053 - Enable dynamic code disable mitigations only on Windows 10 1703+ r=bobowen
Differential Revision: https://phabricator.services.mozilla.com/D148502
2022-06-07 16:26:44 +00:00
Sylvestre Ledru 42f6811d95 Bug 1519636 - Reformat recent changes to the Google coding style r=andi,media-playback-reviewers,necko-reviewers,padenot,dragana
# ignore-this-changeset

Differential Revision: https://phabricator.services.mozilla.com/D148375
2022-06-07 12:32:55 +00:00