Граф коммитов

8183 Коммитов

Автор SHA1 Сообщение Дата
Barret Rennie 6de0f1b749 Bug 1772923 - Port osfile.jsm usage to IOUtils in security/manager/ r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D153711
2022-08-19 20:04:57 +00:00
ffxbld d61f881532 No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D154979
2022-08-18 14:05:58 +00:00
Nika Layzell 4011409c5d Bug 1783282 - Use a custom attribute instead of derive for implementing xpcom interfaces in rust, r=xpcom-reviewers,necko-reviewers,dragana,barret
Differential Revision: https://phabricator.services.mozilla.com/D153801
2022-08-18 13:57:35 +00:00
Dana Keeler 7af450dab0 Bug 1781976 - remove expiring telemetry probe CLIENT_CERTIFICATE_SCAN_TIME r=ckerschb
Differential Revision: https://phabricator.services.mozilla.com/D154436
2022-08-17 18:50:26 +00:00
ffxbld 87bde7886c No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=dmeehan
Differential Revision: https://phabricator.services.mozilla.com/D154638
2022-08-15 12:10:00 +00:00
Emilio Cobos Álvarez a7401488af Bug 1784265 - Drop support for flex attribute values other than 0 and 1. r=dholbert,mconley,preferences-reviewers
This makes it easier to get parity between legacy and regular flex
without having to either have tons of arbitrary attribute selectors in
the xul sheet, nor adding attribute lookup hacks to the html flexbox
layout.

Also, reimplement the remaining supported flex attribute-values (0 and 1)
purely in terms of CSS rules in xul.css (regardless of whether
emulate-moz-box-with-flex is enabled).

In practice these are pretty uncommon and the style attribute does the
trick in every case I've tried.

Add a debug-only assertion to ensure we preserve behavior for now.

Add a new test with another behavior difference between flexbox
emulation and old xul layout because the old reftest now passes. Use
replaced elements, which in modern flex are treated differently.

Differential Revision: https://phabricator.services.mozilla.com/D154394
2022-08-12 23:13:41 +00:00
Marian-Vasile Laza 7f5e2711c6 Backed out 3 changesets (bug 1784265) for causing reftest failures on flex-emulation-1.xhtml. CLOSED TREE
Backed out changeset 415da4b53bdd (bug 1784265)
Backed out changeset e27b21c54b1f (bug 1784265)
Backed out changeset fcb1a053fbe2 (bug 1784265)
2022-08-13 01:14:13 +03:00
Emilio Cobos Álvarez a2ec6564f3 Bug 1784265 - Drop support for flex attribute values other than 0 and 1. r=dholbert,mconley,preferences-reviewers
This makes it easier to get parity between legacy and regular flex
without having to either have tons of arbitrary attribute selectors in
the xul sheet, nor adding attribute lookup hacks to the html flexbox
layout.

Also, reimplement the remaining supported flex attribute-values (0 and 1)
purely in terms of CSS rules in xul.css (regardless of whether
emulate-moz-box-with-flex is enabled).

In practice these are pretty uncommon and the style attribute does the
trick in every case I've tried.

Add a debug-only assertion to ensure we preserve behavior for now.

Add a new test with another behavior difference between flexbox
emulation and old xul layout because the old reftest now passes. Use
replaced elements, which in modern flex are treated differently.

Differential Revision: https://phabricator.services.mozilla.com/D154394
2022-08-12 19:34:34 +00:00
ffxbld fe0b61866f No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=dmeehan
Differential Revision: https://phabricator.services.mozilla.com/D154378
2022-08-11 19:10:20 +00:00
Nika Layzell 706cf2f2fa Bug 1782765 - Fix nullability of arrays of interfaces in Rust, r=xpcom-reviewers,necko-reviewers,mccr8,valentin
When generating code for arrays of interfaces from the rust-xpidl
compiler, the type was declared incorrectly as ThinVec<RefPtr<T>>
instead of ThinVec<Option<RefPtr<T>>> meaning that null values in the
array would be handled incorrectly.

This patch fixes this code generation mistake and updates crates using
the interface to handle null values correctly.

Differential Revision: https://phabricator.services.mozilla.com/D153485
2022-08-11 17:53:48 +00:00
Csoregi Natalia e2f0a85bfd Backed out changeset 5c13cd875d8b (bug 1772923) for causing failures on browser_cert_export.js. CLOSED TREE 2022-08-11 21:24:54 +03:00
Barret Rennie cda27c85fe Bug 1772923 - Port osfile.jsm usage to IOUtils in security/manager/ r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D153711
2022-08-11 17:11:36 +00:00
ffxbld 832ff8bc53 No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D153942
2022-08-08 12:57:52 +00:00
ffxbld 9ed83283ae No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D153744
2022-08-04 13:43:03 +00:00
Fabrice Desré c50cb528fc Bug 1761040 - Prefix thread safety macros with MOZ_ r=geckoview-reviewers,media-playback-reviewers,alwu,jesup,m_kato
Differential Revision: https://phabricator.services.mozilla.com/D152575
2022-08-03 16:39:41 +00:00
Andreea Pavel 3ccd75af8d Backed out changeset b9d2965591b9 (bug 1761040) for landing with wrong author CLOSED TREE DONTBUILD 2022-08-03 18:55:00 +03:00
Andreea Pavel fdb7cb2ecd Bug 1761040 - Prefix thread safety macros with MOZ_ r=geckoview-reviewers,media-playback-reviewers,alwu,jesup,m_kato
Differential Revision: https://phabricator.services.mozilla.com/D152575
2022-08-03 15:27:43 +00:00
Dennis Jackson 7ac4427e01 Bug 1781075 - Add test cases for ECH connections with incorrect ALPN advertisements. r=necko-reviewers,kershaw
These tests set up an ECH server which will only negotiate http/1.1 in the TLS ALPN extension.
If the client doesn't send an ALPN offering at least http/1.1 the connection will fail with
SSL_ERROR_NEXT_PROTOCOL_NO_PROTOCOL.

Differential Revision: https://phabricator.services.mozilla.com/D153368
2022-08-02 19:59:22 +00:00
Andreea Pavel 89d63c91e6 Backed out changeset a907159a482f (bug 1761040) for causing build bustages on a CLOSED TREE 2022-08-02 04:59:08 +03:00
Fabrice Desré 0f4ac7ad97 Bug 1761040 - Prefix thread safety macros with MOZ_ r=geckoview-reviewers,media-playback-reviewers,alwu,jesup,m_kato
Differential Revision: https://phabricator.services.mozilla.com/D152575
2022-08-02 00:49:41 +00:00
ffxbld 1d8c226620 No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D153373
2022-08-01 16:51:54 +00:00
Nika Layzell c15823d075 Bug 1772006 - Part 5: Simplify and move the string searching APIs from ns[T]StringObsolete, r=xpcom-reviewers,necko-reviewers,eeejay,dragana,barret
The biggest set of APIs from ns[T]StringObsolete which are still heavily used
are the string searching APIs. It appears the intention was for these to be
replaced by the `FindInReadable` APIs, however that doesn't appear to have
happened.

In addition, the APIs have some quirks around their handling of mixed character
widths. These APIs generally supported both narrow strings and the native
string type, probably because char16_t string literals weren't available until
c++11. Finally they also used easy-to-confuse unlabeled boolean and integer
optional arguments to control behaviour.

These patches do the following major changes to the searching APIs:

1. The ASCII case-insensitive search method was split out as
   LowerCaseFindASCII, rather than using a boolean. This should be less
   error-prone and more explicit, and allows the method to continue to use
   narrow string literals for all string types (as only ASCII is supported).
2. The other [R]Find methods were restricted to only support arguments with
   matching character types. I considered adding a FindASCII method which would
   use narrow string literals for both wide and narrow strings but it would've
   been the same amount of work as changing all of the literals to unicode
   literals.
   This ends up being the bulk of the changes in the patch.
3. All find methods were re-implemented using std::basic_string_view's find
   algorithm or stl algorithms to reduce code complexity, and avoid the need to
   carry around the logic from nsStringObsolete.cpp.
4. The implementations were moved to nsTStringRepr.cpp.
5. An overload of Find was added to try to catch callers which previously
   called `Find(..., false)` or `Find(..., true)` to set case-sensitivity, due
   to booleans normally implicitly coercing to `index_type`. This should
   probably be removed at some point, but may be useful during the transition.

Differential Revision: https://phabricator.services.mozilla.com/D148300
2022-07-30 00:12:48 +00:00
Nika Layzell 997047e2a4 Bug 1772006 - Part 4: Simplify and move the string comparison APIs from ns[T]StringObsolete, r=xpcom-reviewers,necko-reviewers,dragana,barret
This patch moves EqualsIgnoreCase to ns[T]StringObsolete, and removes
the aCount argument, instead migrating callers to use `StringBeginsWith`
with a case-insensitive comparator.

In addition, nsTStringRepr::Compare was removed and replaced with either
calls to methods like `StringBeginsWith` or the global `Compare` method.

These changes required some modifications at call-sites but should make
the behaviour less surprising and more consistent.

Differential Revision: https://phabricator.services.mozilla.com/D148299
2022-07-30 00:12:48 +00:00
Dana Keeler 12ac90f435 Bug 1781466 - gather telemetry for PSM UI elements slated for removal r=djackson
Depends on D152942

Differential Revision: https://phabricator.services.mozilla.com/D152943
2022-07-28 20:04:31 +00:00
Dana Keeler 5a8efd3f8c Bug 1781466 - remove obsolete exception dialog telemetry r=djackson
Differential Revision: https://phabricator.services.mozilla.com/D152942
2022-07-28 20:04:31 +00:00
ffxbld f6e48e8f08 No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D153075
2022-07-28 12:41:48 +00:00
Tooru Fujisawa a032f53a63 Bug 1780543 - Part 5: Add mozilla/chrome-script environment. r=Standard8
Differential Revision: https://phabricator.services.mozilla.com/D152430
2022-07-26 02:46:30 +00:00
Emilio Cobos Álvarez 42b7f1a58c Bug 1780788 - Use abstract strings as in-arguments for ipdl. r=nika,necko-reviewers,media-playback-reviewers,alwu,dragana
This prevents copies and avoids the hack we have to avoid this, which
right now is using nsDependent{C,}String.

Non-virtual actors can still use `nsString` if they need to on the
receiving end.

Differential Revision: https://phabricator.services.mozilla.com/D152519
2022-07-25 20:19:48 +00:00
ffxbld 6506fc7cf1 No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=diannaS
Differential Revision: https://phabricator.services.mozilla.com/D152635
2022-07-25 13:16:50 +00:00
Dana Keeler 30b914478f Bug 1779973 - treat failure to parse certificate validity as a time error r=djackson
Differential Revision: https://phabricator.services.mozilla.com/D152333
2022-07-21 23:51:01 +00:00
Dennis Jackson 7a55bf9c23 Bug 1780014: Add specific telemetry for conservative and first-try handshakes. r=keeler.
This patch adds two new telemetry histograms which collect specific types
of TLS handshake seperately from existing handshakes.
 - The conservative histogram tracks handshakes used for essential connections (e.g. update checks)
 - The first-try histogram tracks all initial connection attempts. This allows us to identify issues that might otherwise be masked by our retry logic.

A single handshake may belong to more than one histogram. All handshakes belong to the root histogram.
As the histogram buckets are aligned, it is possible to derive new histograms from these stored results.
For example, as ECH GREASE is only used on first-try handshakes, the histogram from non-GREASE first-try
handshakes can be calculated by subtracting the entries in the GREASE histogram from the first-try histogram.

This patch also extends the existing handshake necko tests to verify that the telemetry is recorded correctly.
Telemetry checks don't run if networking is running on the socket process as the histograms are no longer
accessible.

Differential Revision: https://phabricator.services.mozilla.com/D150754
2022-07-21 11:02:32 +00:00
Dana Keeler 43dc5f66a3 Bug 1779848 - don't assert if mFd is null in nsNSSSocketInfo::ClientAuthCertificateSelected r=ckerschb
If nsNSSSocketInfo::mFd is nullptr, it means the connection has been closed.
This isn't an error, and ClientAuthCertificateSelected shouldn't assert if this
happens.

Differential Revision: https://phabricator.services.mozilla.com/D151962
2022-07-19 23:12:21 +00:00
ffxbld 5c3ca70147 No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=diannaS
Differential Revision: https://phabricator.services.mozilla.com/D152019
2022-07-18 13:01:12 +00:00
Andi-Bogdan Postelnicu bbf960e82c Bug 1617369 - Reformat recent rust changes with rustfmt r=emilio
Updated with rustfmt 1.4.38-stable (a8314ef 2022-06-27)
# ignore-this-changeset

Depends on D151908

Differential Revision: https://phabricator.services.mozilla.com/D151909
2022-07-15 09:37:22 +00:00
Kagami Sascha Rosylight bb679fa417 Bug 1769290 - Part 24: Apply mozilla-js-handle-rooted-typedef against layout,security,storage,tools r=andi
Differential Revision: https://phabricator.services.mozilla.com/D151791
2022-07-14 17:00:24 +00:00
ffxbld 643780ce3b No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=diannaS
Differential Revision: https://phabricator.services.mozilla.com/D151817
2022-07-14 11:59:52 +00:00
Tooru Fujisawa 54623364da Bug 1777486 - Part 2: Migrate XPCOMUtils.jsm consumers with automatic migration. r=webdriver-reviewers,geckoview-reviewers,preferences-reviewers,application-update-reviewers,pip-reviewers,kmag,owlish,whimboo
Differential Revision: https://phabricator.services.mozilla.com/D151214
2022-07-12 04:21:34 +00:00
Barret Rennie 305b4cd077 Bug 1772941 - Port osfile.jsm usage to IOUtils in toolkit/content/ r=florian,preferences-reviewers
Differential Revision: https://phabricator.services.mozilla.com/D149303
2022-07-12 00:25:35 +00:00
Andreea Pavel 7738a75fdd Backed out 11 changesets (Bug 1777486) for failing bc at browser_startup.js on a CLOSED TREE
Backed out changeset b6c4c386f1a6 (Bug 1777486)
Backed out changeset 195cc2de8433 (Bug 1777486)
Backed out changeset 20c746fb1648 (Bug 1777486)
Backed out changeset d5fd8173d62d (Bug 1777486)
Backed out changeset 6d758fab5a3e (Bug 1777486)
Backed out changeset e938b601ba15 (Bug 1777486)
Backed out changeset 0c4ea0b9416b (Bug 1777486)
Backed out changeset 0559c53cc668 (Bug 1777486)
Backed out changeset eea573d3a9f9 (Bug 1777486)
Backed out changeset 9ce3a6496a49 (bug 1777486)
Backed out changeset b0867652fc48 (bug 1777486)
2022-07-11 22:24:40 +03:00
Tooru Fujisawa 8cd6ed7409 Bug 1777486 - Part 2: Migrate XPCOMUtils.jsm consumers with automatic migration. r=webdriver-reviewers,geckoview-reviewers,preferences-reviewers,application-update-reviewers,pip-reviewers,kmag,owlish,whimboo
Differential Revision: https://phabricator.services.mozilla.com/D151214
2022-07-11 15:09:13 +00:00
ffxbld a57d022de1 No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=diannaS
Differential Revision: https://phabricator.services.mozilla.com/D151486
2022-07-11 13:12:23 +00:00
Tooru Fujisawa 52c95734e7 Bug 1667455 - Part 9: Stop importing Services.jsm from chrome-priv HTML code, single-line cases. r=kmag,necko-reviewers,geckoview-reviewers,extension-reviewers,m_kato,dragana
Differential Revision: https://phabricator.services.mozilla.com/D150898
2022-07-11 12:41:52 +00:00
Tooru Fujisawa bf93d07148 Bug 1667455 - Part 5: Stop importing Services.jsm from chrome-priv JS code, top-level single-line cases. r=kmag,webdriver-reviewers,perftest-reviewers,webcompat-reviewers,geckoview-reviewers,extension-reviewers,application-update-reviewers,pip-reviewers,twisniewski,m_kato,jdescottes,mconley,AlexandruIonescu,mossop
Differential Revision: https://phabricator.services.mozilla.com/D150894
2022-07-11 12:41:50 +00:00
Tooru Fujisawa f3a8c52c53 Bug 1667455 - Part 4: Stop importing Services.jsm from JSM. r=kmag,webdriver-reviewers,perftest-reviewers,webcompat-reviewers,geckoview-reviewers,application-update-reviewers,pip-reviewers,twisniewski,devtools-reviewers,m_kato,jdescottes,ochameau,mconley,sfoster,AlexandruIonescu
Differential Revision: https://phabricator.services.mozilla.com/D150893
2022-07-11 12:41:50 +00:00
ffxbld 7863aace6c No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=diannaS
Differential Revision: https://phabricator.services.mozilla.com/D151241
2022-07-07 14:24:35 +00:00
Dana Keeler f957a0175b Bug 1749884 - remove expired client auth cert telemetry and add new permanent telemetry r=rmf
Differential Revision: https://phabricator.services.mozilla.com/D150819
2022-07-06 18:32:43 +00:00
Dana Keeler dc4ce8d406 Bug 1777366 - remove unused `source` and `cached` parameters from nsISiteSecurityService APIs r=rmf,necko-reviewers,kershaw
These parameters are no longer used and can be removed, along with the expired
telemetry HSTS_UPGRADE_SOURCE.

Differential Revision: https://phabricator.services.mozilla.com/D150786
2022-07-05 18:33:18 +00:00
Csoregi Natalia 7e2a20405f Backed out changeset 6c542cd8d622 for causing devtools compat issues. CLOSED TREE 2022-07-04 19:39:21 +03:00
ffxbld 8592d3250f No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=diannaS
Differential Revision: https://phabricator.services.mozilla.com/D150961
2022-07-04 13:49:30 +00:00
Dana Keeler 46abba10d9 Bug 1774579 - certificate manager: update leftover loadCerts call from bug 1682412 r=rmf
In bug 1682412, loadCerts was removed from nsICertTree. At the time, the
certificate manager still had one use of it that should have been updated to
loadCertsFromCache. This patch makes that update.

Differential Revision: https://phabricator.services.mozilla.com/D150503
2022-06-30 15:41:25 +00:00
ffxbld d0985bd3cc No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=diannaS
Differential Revision: https://phabricator.services.mozilla.com/D150742
2022-06-30 14:25:21 +00:00
Mark Banner 05e3f1ea83 Bug 1646183 - Extend ESLint rule reject-importGlobalProperties to also handle defineLazyGlobalGetters. r=arai,webdriver-reviewers,webcompat-reviewers,extension-reviewers,whimboo,twisniewski,kmag
Differential Revision: https://phabricator.services.mozilla.com/D150353
2022-06-29 22:37:57 +00:00
Dana Keeler a998171379 Bug 696976 - asynchronously handle client auth certificate requests from TLS servers r=necko-reviewers,ipc-reviewers,nika,kershaw,rmf
Differential Revision: https://phabricator.services.mozilla.com/D146367
2022-06-29 16:29:28 +00:00
Dana Keeler 695084d3a9 Bug 696976 - move TLS client auth certificate selection implementation to its own file r=necko-reviewers,kershaw,jschanck
Differential Revision: https://phabricator.services.mozilla.com/D146366
2022-06-29 16:29:28 +00:00
ffxbld 3ec2694a72 No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D150368
2022-06-27 13:04:52 +00:00
Barret Rennie 6c348edd96 Bug 1776442 - Ensure NSS is initialized before instantiating nsCryptoHash r=jschanck
Differential Revision: https://phabricator.services.mozilla.com/D150256
2022-06-24 18:42:27 +00:00
ffxbld 042ea8b035 No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=dmeehan
Differential Revision: https://phabricator.services.mozilla.com/D150103
2022-06-23 13:40:12 +00:00
Joel Maher 5b2dd6dd56 Bug 1769154 - Run some xpcshell tests with a conditioned profile. r=aryx,extension-reviewers,kmag
Differential Revision: https://phabricator.services.mozilla.com/D149937
2022-06-22 16:47:06 +00:00
Bogdan Szekely e43c058bda Backed out changeset 7b707ff8a7d1 (bug 1769154) for causing xpcshell failures on test_system_upgrades.js 2022-06-22 17:17:10 +03:00
Joel Maher 0f3990e1cb Bug 1769154 - Run some xpcshell tests with a conditioned profile. r=aryx,extension-reviewers,kmag
Differential Revision: https://phabricator.services.mozilla.com/D149937
2022-06-22 13:03:46 +00:00
Barret Rennie 1a02416780 Bug 1773182 - Add NS_NewCryptoHash helper r=xpcom-reviewers,kmag,nika
Differential Revision: https://phabricator.services.mozilla.com/D148965
2022-06-20 13:57:29 +00:00
ffxbld 9d2837b25e No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=dmeehan
Differential Revision: https://phabricator.services.mozilla.com/D149736
2022-06-20 12:16:01 +00:00
Mike Hommey df77ed0752 Bug 1774501 - Update to env_logger 0.9 in various in-tree crates. r=nbp,keeler,xpcom-reviewers,rhunt,nika
Differential Revision: https://phabricator.services.mozilla.com/D149453
2022-06-16 20:44:03 +00:00
ffxbld 5d65102622 No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=dmeehan
Differential Revision: https://phabricator.services.mozilla.com/D149507
2022-06-16 12:12:32 +00:00
Tooru Fujisawa 5e0731b2a4 Bug 1608282 - Part 4: Remove Cu.defineLazyGlobalGetters from JSM. r=webdriver-reviewers,extension-reviewers,jdescottes,kmag
Depends on D149196

Differential Revision: https://phabricator.services.mozilla.com/D149197
2022-06-16 00:19:54 +00:00
Butkovits Atila 8218713aac Backed out 4 changesets (bug 1608282) for causing hazard failures. CLOSED TREE
Backed out changeset 32aebc8be201 (bug 1608282)
Backed out changeset 37c970364269 (bug 1608282)
Backed out changeset ced8d82cc2d2 (bug 1608282)
Backed out changeset e26e480c7dd6 (bug 1608282)
2022-06-16 03:10:02 +03:00
Tooru Fujisawa 8b8d6b141a Bug 1608282 - Part 4: Remove Cu.defineLazyGlobalGetters from JSM. r=webdriver-reviewers,extension-reviewers,jdescottes,kmag
Depends on D149196

Differential Revision: https://phabricator.services.mozilla.com/D149197
2022-06-15 20:34:35 +00:00
Dana Keeler aa7979464f Bug 1769150 - try all known EV policy OIDs found in a certificate when verifying for EV r=jschanck
Before this patch, the certificate verifier would only attempt to build a
trusted path to a root with the first recognized EV OID in the end-entity
certificate. Thus, if an end-entity certificate had more than one EV OID, it
could fail to verify as EV if an intermediate or root had the "wrong" EV OID.
This patch addresses this shortcoming by trying to build a path with each
recognized EV OID in the end-entity certificate until it finds one that works.

Differential Revision: https://phabricator.services.mozilla.com/D149319
2022-06-15 18:20:13 +00:00
Dana Keeler f0803728d4 Bug 1772976 - make non-private certificate error overrides available in private contexts r=jschanck
Certificate error overrides made in non-private contexts should be availble in
private contexts as well (but not vice-versa).

Differential Revision: https://phabricator.services.mozilla.com/D149296
2022-06-15 18:02:36 +00:00
Barret Rennie 3f5dc34b19 Bug 1774204 - Add SHA-384 and SHA-512 support to Digest r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D149281
2022-06-14 20:08:45 +00:00
Dennis Jackson 549b3f9615 Bug 1773966 - land NSS tip UPGRADE_NSS_RELEASE, r=nss-reviewers,nkulatova
Differential Revision: https://phabricator.services.mozilla.com/D149276
2022-06-14 15:47:17 +00:00
Dennis Jackson a22ec26448 Bug 1771479 - Fix ECH GREASE Telemetry. r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D149212
2022-06-14 09:59:37 +00:00
Dana Keeler c9fe82eb09 Bug 1773370 - PSM changes for macOS SDK update r=jschanck
Differential Revision: https://phabricator.services.mozilla.com/D148850
2022-06-13 20:29:48 +00:00
ffxbld d7e147a70e No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=dmeehan
Differential Revision: https://phabricator.services.mozilla.com/D149134
2022-06-13 14:06:30 +00:00
Dennis Jackson 9f93e47cfa Bug 1771479 - Add histograms for SSL_HANDSHAKE_RESULT and SSL_TIME_UNTIL_READY for connections using ECH. r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D147498
2022-06-13 11:29:41 +00:00
Dennis Jackson 1c8c0c17ed oBug 1770907 - Disable ECH GREASE when retrying connections. r=dragana,keeler,necko-reviewers
Add a preference for whether to remove ECH GREASE extensions when retrying a connection. This repurposes the  flag which was previously present but not actually functional.

Differential Revision: https://phabricator.services.mozilla.com/D147191
2022-06-13 11:29:41 +00:00
Dennis Jackson 8948a1a9a2 Bug 1767974 - Add preferences for ECH GREASE Mode. r=keeler,dragana
Differential Revision: https://phabricator.services.mozilla.com/D145608
2022-06-13 11:29:41 +00:00
criss c6b2c5db61 Backed out 9 changesets (bug 1772006) causing build bustages on nsTString.cpp. CLOSED TREE
Backed out changeset f17c7565707b (bug 1772006)
Backed out changeset c725fe1f5882 (bug 1772006)
Backed out changeset d19663161261 (bug 1772006)
Backed out changeset b6611ab002d9 (bug 1772006)
Backed out changeset 790f42b64af9 (bug 1772006)
Backed out changeset 79a734b4e4d9 (bug 1772006)
Backed out changeset 42730aae16ea (bug 1772006)
Backed out changeset b2542aef3054 (bug 1772006)
Backed out changeset 962bfea4a309 (bug 1772006)
2022-06-11 01:13:42 +03:00
Nika Layzell b3c13bf114 Bug 1772006 - Part 6: Simplify and move the string searching APIs from ns[T]StringObsolete, r=xpcom-reviewers,necko-reviewers,eeejay,dragana,barret
The biggest set of APIs from ns[T]StringObsolete which are still heavily used
are the string searching APIs. It appears the intention was for these to be
replaced by the `FindInReadable` APIs, however that doesn't appear to have
happened.

In addition, the APIs have some quirks around their handling of mixed character
widths. These APIs generally supported both narrow strings and the native
string type, probably because char16_t string literals weren't available until
c++11. Finally they also used easy-to-confuse unlabeled boolean and integer
optional arguments to control behaviour.

These patches do the following major changes to the searching APIs:

1. The ASCII case-insensitive search method was split out as
   LowerCaseFindASCII, rather than using a boolean. This should be less
   error-prone and more explicit, and allows the method to continue to use
   narrow string literals for all string types (as only ASCII is supported).
2. The other [R]Find methods were restricted to only support arguments with
   matching character types. I considered adding a FindASCII method which would
   use narrow string literals for both wide and narrow strings but it would've
   been the same amount of work as changing all of the literals to unicode
   literals.
   This ends up being the bulk of the changes in the patch.
3. All find methods were re-implemented using std::basic_string_view's find
   algorithm or stl algorithms to reduce code complexity, and avoid the need to
   carry around the logic from nsStringObsolete.cpp.
4. The implementations were moved to nsTStringRepr.cpp.
5. An overload of Find was added to try to catch callers which previously
   called `Find(..., false)` or `Find(..., true)` to set case-sensitivity, due
   to booleans normally implicitly coercing to `index_type`. This should
   probably be removed at some point, but may be useful during the transition.

Differential Revision: https://phabricator.services.mozilla.com/D148300
2022-06-10 21:12:08 +00:00
Tooru Fujisawa ca262b23ce Bug 1773174 - Part 1: Use .jsm extension for JSMs in toolkit/components/certviewer/. r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D148596
2022-06-10 19:21:05 +00:00
John Schanck 0c18bdf797 Bug 1773371 - Enforce CRLite revoked status when OCSP confirmation fails. r=keeler
This changes the behavior of CRLite when configured in `ConfirmRevocations`
mode (the default mode on nightly and early beta). Under the new definition,
ConfirmRevocations mode fails closed when OCSP fails open. In particular, a
certificate will be marked as "Revoked" in the following scenarios:
  - CRLite returns "Revoked" and the certificate does not list an OCSP URL,
  - CRLite returns "Revoked" and the OCSP responder is unreachable,
  - CRLite returns "Revoked" and the OCSP responder returns an error.

Differential Revision: https://phabricator.services.mozilla.com/D148686
2022-06-10 16:31:39 +00:00
Iulian Moraru 4cd2cbcfa4 Backed out 3 changesets (bug 1767974, bug 1771479) for causing xpcshell failures on test_httpssvc_retry_with_ech.js. CLOSED TREE
Backed out changeset 9bcda147affa (bug 1771479)
Backed out changeset 4455b5bf1282
Backed out changeset f973baf1403a (bug 1767974)
2022-06-10 16:58:28 +03:00
Dennis Jackson 65e3bc3f2a Bug 1771479 - Add histograms for SSL_HANDSHAKE_RESULT and SSL_TIME_UNTIL_READY for connections using ECH. r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D147498
2022-06-10 11:10:28 +00:00
Dennis Jackson 55801f5de7 oBug 1770907 - Disable ECH GREASE when retrying connections. r=dragana,keeler,necko-reviewers
Add a preference for whether to remove ECH GREASE extensions when retrying a connection. This repurposes the  flag which was previously present but not actually functional.

Differential Revision: https://phabricator.services.mozilla.com/D147191
2022-06-10 11:10:27 +00:00
Dennis Jackson bb920d016d Bug 1767974 - Add preferences for ECH GREASE Mode. r=keeler,dragana
Differential Revision: https://phabricator.services.mozilla.com/D145608
2022-06-10 11:10:27 +00:00
Sylvestre Ledru b848a697dc Bug 1617369 - Reformat recent rust changes with rustfmt r=emilio,extension-reviewers,willdurand
# ignore-this-changeset

Differential Revision: https://phabricator.services.mozilla.com/D148376
2022-06-10 09:21:45 +00:00
ffxbld b7aed3fa69 No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=dmeehan
Differential Revision: https://phabricator.services.mozilla.com/D148769
2022-06-09 12:00:37 +00:00
Dennis Jackson e43e8f1bee Bug 1771523 - Add telemetry probe for app signature verification outcomes. r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D147530
2022-06-06 13:08:01 +00:00
ffxbld 6e462c9969 No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=dmeehan
Differential Revision: https://phabricator.services.mozilla.com/D148384
2022-06-06 13:05:41 +00:00
Dana Keeler 658b880816 Bug 1769669 - require specifying the trusted root in content signature verifier r=jschanck,leplatrem,robwu,barret
Before this patch, the content signature verifier
(nsIContentSignatureVerifier/ContentSignatureVerifier) would identify the root
it trusted based on the value of a preference. This patch changes the
implementation to require a specified hard-coded root to trust as with add-on
signature verification.

Depends on D146644

Differential Revision: https://phabricator.services.mozilla.com/D146645
2022-06-03 23:26:28 +00:00
Dana Keeler 872a9fafe8 Bug 1769669 - move app signature verification to security/manager/ssl/ r=jschanck
Before this patch, the app signature verification code lived in security/apps/.
The majority of the rest of PSM is in security/manager/ssl/ and there's little
reason to have that extra directory for the app signature verification
implementation alone.

Differential Revision: https://phabricator.services.mozilla.com/D146644
2022-06-03 23:26:28 +00:00
ffxbld 0dddb4f86b No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=dmeehan
Differential Revision: https://phabricator.services.mozilla.com/D148111
2022-06-02 12:07:31 +00:00
Dana Keeler 9e12ff8e96 Bug 1770869 - remove nsISSLSocketControl.clientCert r=jschanck,necko-reviewers,kershaw
This field isn't used any longer and removing it will make future changes
eaiser.

Differential Revision: https://phabricator.services.mozilla.com/D147227
2022-06-01 23:20:58 +00:00
Dana Keeler 82c73ec75d Bug 1770869 - remove nsILocalCertService and implementation r=necko-reviewers,jschanck,pbz,kershaw
nsILocalCertService was used in FlyWeb, which was removed in Firefox 59 in bug
1374574.

Depends on D147121

Differential Revision: https://phabricator.services.mozilla.com/D147122
2022-06-01 23:20:58 +00:00
Butkovits Atila 2b78c018fd Backed out 3 changesets (bug 1770869) for causing xpcshell failures at test_tls_server.js. CLOSED TREE
Backed out changeset 5c95392b800d (bug 1770869)
Backed out changeset 149d04a209b6 (bug 1770869)
Backed out changeset 5a138d047be1 (bug 1770869)
2022-06-02 00:18:26 +03:00
Dana Keeler 39015f9d16 Bug 1770869 - remove nsISSLSocketControl.clientCert r=jschanck,necko-reviewers,kershaw
This field isn't used any longer and removing it will make future changes
eaiser.

Differential Revision: https://phabricator.services.mozilla.com/D147227
2022-06-01 20:00:57 +00:00
Dana Keeler 0f6879c125 Bug 1770869 - remove nsILocalCertService and implementation r=necko-reviewers,jschanck,pbz,kershaw
nsILocalCertService was used in FlyWeb, which was removed in Firefox 59 in bug
1374574.

Depends on D147121

Differential Revision: https://phabricator.services.mozilla.com/D147122
2022-06-01 20:00:57 +00:00
Tooru Fujisawa 425605e054 Bug 1772106 - Use plain object for lazy getter in security/manager/ssl/. r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D147889
2022-06-01 17:27:12 +00:00
Dana Keeler 3945602079 Bug 1766687 - remove support for SHA1 signatures in all certificates (including imported roots) r=jschanck
Previously [0], support for SHA1 signatures in certificates was disabled by
default, except for certificates issued by imported roots. Chrome had a similar
policy, but this was removed in 71 [1]. Telemetry [2] indicates that some users
do still encounter SHA1 signatures at a fraction of the rate of overall
certificate errors, so forbidding all SHA1 signatures should have minimal
compatibility impact.

[0] https://bugzilla.mozilla.org/show_bug.cgi?id=1302140
[1] https://chromeenterprise.google/policies/#EnableSha1ForLocalAnchors
[2] https://mzl.la/3kg5J4j

Differential Revision: https://phabricator.services.mozilla.com/D144870
2022-06-01 17:01:56 +00:00
Noemi Erli aca984c8a8 Backed out changeset 8ef044a6a1fe (bug 1766687) for causing bustage in NSSCertDBTrustDomain.cpp 2022-06-01 02:35:17 +03:00