Граф коммитов

14282 Коммитов

Автор SHA1 Сообщение Дата
Haik Aftandilian 73b7f5c089 Bug 1543830 - Add Mac Hardened Runtime entitlement files to the tree r=spohl
Add entitlement files for Hardened Runtime configuration to be used by Release Engineering for official builds and try builds and developers for local builds. These entitlement files are input to the codesign command.

Hardened Runtime and codesigning is not yet enabled for local builds or try builds so for now these files will only be used by Release Engineering.

production.entitlements.xml is intended to be used for official channel builds that will be codesigned, notarized, and shipped to users.

developer.entitlements.xml is intended to be used for developer and try builds that will be codesigned, but not notarized or shipped to users. The developer file enables debugging which is not compatible with notarization, but is otherwise the same as the production file.

codesign.bash is a stop-gap script to allow developers who setup Apple Developer ID certificates to codesign Nightly themselves and enabled Hardened Runtime.

Differential Revision: https://phabricator.services.mozilla.com/D27396

--HG--
extra : moz-landing-system : lando
2019-04-18 15:56:00 +00:00
ffxbld 883df980b7 No Bug, mozilla-central repo-update HSTS HPKP blocklist remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D28055

--HG--
extra : moz-landing-system : lando
2019-04-18 13:07:37 +00:00
Dana Keeler e97d2e6b33 Bug 1544244 - fix cookie-checking in test_toolkit_securityreporter.js r=mgoodwin
Before this patch, test_toolkit_securityreporter.js would unconditionally try to
get the value of the "Cookie" header. If a header isn't available, httpd.js
apparently throws an exception. Interestingly, exceptions thrown in httpd.js
path handlers aren't reported to the test framework, so we weren't aware of
this. Additionally, the test didn't have any way of waiting until the security
report it was expecting had arrived, so it just continued on and "succeeded".
This patch addresses these issues by using "throws" to make sure no cookies are
available and by inserting extra add_test/run_next_test pairs when the test is
waiting for a report.

Differential Revision: https://phabricator.services.mozilla.com/D27613

--HG--
extra : moz-landing-system : lando
2019-04-18 07:29:45 +00:00
Ehsan Akhgari ccfae51c32 Bug 1500533 - Ensure that TLS session resumption tickets are only consumed if the channel isn't isolated by anti-tracking checks; r=michal,baku
Differential Revision: https://phabricator.services.mozilla.com/D26996

--HG--
extra : moz-landing-system : lando
2019-04-18 01:00:22 +00:00
Jed Davis 64717a0c9f Bug 1543790 - Fix RDD sandboxing conditions so the parent and child processes agree. r=gcp
If the system doesn't support seccomp-bpf, the parent process won't
try to set up sandboxing, but the child process has a separate check that
didn't test for this, and ends up failing a release assertion (in
SandboxReporterClient, but we also release-assert that installing the
seccomp-bpf policy succeeds).

This patch just fixes the child-side conditional to match the intended
behavior, but in the long term we should consider redesigning SandboxInfo
to avoid this.

Differential Revision: https://phabricator.services.mozilla.com/D27624

--HG--
extra : moz-landing-system : lando
2019-04-16 13:53:20 +00:00
Jed Davis 69140d1e65 Bug 1543858 - Adjust Linux sandbox policies to tolerate glibc's qsort. r=gcp
Differential Revision: https://phabricator.services.mozilla.com/D27632

--HG--
extra : moz-landing-system : lando
2019-04-16 06:50:50 +00:00
Daiki Ueno efdd8c30f3 Bug 1511989, enable TLS 1.3 post-handshake authentication r=keeler
This adds a config option to enable client authentication through the TLS 1.3 post-handshake auth mechanism.

Differential Revision: https://phabricator.services.mozilla.com/D26540

--HG--
extra : moz-landing-system : lando
2019-04-16 05:08:16 +00:00
Brian Grinstead ede8c44ef2 Bug 1544322 - Part 2.1 - Remove the [type] attribute for one-liner <script> tags loading files in /tests/SimpleTest/ in everything except for dom/ r=bzbarsky
This excludes dom/, otherwise the file size is too large for phabricator to handle.

This is an autogenerated commit to handle scripts loading mochitest harness files, in
the simple case where the script src is on the same line as the tag.

This was generated with https://bug1544322.bmoattachments.org/attachment.cgi?id=9058170
using the `--part 2` argument.

Differential Revision: https://phabricator.services.mozilla.com/D27456

--HG--
extra : moz-landing-system : lando
2019-04-16 03:50:44 +00:00
Brian Grinstead 6515f97bcb Bug 1544322 - Part 1 - Remove the [type] attribute for one-liner <script> tags loading files in chrome://mochikit/content/ r=bzbarsky
This is an autogenerated commit to handle scripts loading mochitest harness files, in
the simple case where the script src is on the same line as the tag.

This was generated with https://bug1544322.bmoattachments.org/attachment.cgi?id=9058170
using the `--part 1` argument.

Differential Revision: https://phabricator.services.mozilla.com/D26812

--HG--
extra : moz-landing-system : lando
2019-04-15 20:56:58 +00:00
ffxbld d640f895d3 No Bug, mozilla-central repo-update HSTS HPKP blocklist remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D27496

--HG--
extra : moz-landing-system : lando
2019-04-15 12:31:27 +00:00
Aaron Klotz 2484ee1608 Bug 1503538: Part 5 - Add static DLL dependency blocking to SandboxBroker; r=bobowen
Depends on D27146

Differential Revision: https://phabricator.services.mozilla.com/D27147

--HG--
extra : moz-landing-system : lando
2019-04-12 09:47:13 +00:00
Michal Novotny 8b637bcb3f Bug 1542835 - Expose SSLChannelInfo.resumed on nsISSLSocketControl, r=keeler,mayhemer
This patch adds resumed attribute to nsISSLSocketControl, which is needed in tests that check SSL resumption (e.g. bug 1500533).

Differential Revision: https://phabricator.services.mozilla.com/D26597

--HG--
extra : moz-landing-system : lando
2019-04-13 09:58:00 +00:00
Dana Keeler f82a30519e bug 1543685 - handle preference values more safely in cert_storage r=mgoodwin
Previously cert_storage could use negative values as unsigned values when
determining if its data was sufficiently fresh, which could cause assertion
failures when doing time math.
This patch changes the behavior to just use 0 if values are either unavailable
or negative, which means we fail closed and say everything is out of date if we
otherwise don't have the information to make the correct decision.

Differential Revision: https://phabricator.services.mozilla.com/D27196

--HG--
extra : moz-landing-system : lando
2019-04-12 22:34:23 +00:00
Sylvestre Ledru 7f60810d86 Bug 1519636 - Reformat recent changes to the Google coding style r=Ehsan
# ignore-this-changeset

Differential Revision: https://phabricator.services.mozilla.com/D27245

--HG--
extra : moz-landing-system : lando
2019-04-12 13:14:25 +00:00
Oana Pop Rus 76651301a1 Backed out changeset acb04833e713 (bug 1500533) for assertion failure in nsHttpChannel.cpp on a CLOSED TREE 2019-04-11 23:15:08 +03:00
Ehsan Akhgari bf2a5e6e54 Bug 1500533 - Ensure that TLS session resumption tickets are only consumed if the channel isn't isolated by anti-tracking checks; r=michal,baku
Differential Revision: https://phabricator.services.mozilla.com/D26996

--HG--
extra : moz-landing-system : lando
2019-04-11 18:36:16 +00:00
ffxbld 9377e7ab3a No Bug, mozilla-central repo-update HSTS HPKP blocklist remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D27059

--HG--
extra : moz-landing-system : lando
2019-04-11 12:41:38 +00:00
Dana Keeler c2bdc62aa5 bug 1529044 - use a low-priority queue on a certificate verification thread to import intermediate certificates r=mgoodwin
Previously this functionality created a CryptoTask to do this work, but that
would cause a new thread to be created for each list of intermediates. This was
slow both because of all of the threads and because they could be scheduled
while other work was happening. Moving these tasks to the low-priority event
queue for threads in the certificate verification thread pool means no new
threads are created and the work only happens when these threads are idle
anyway.

Differential Revision: https://phabricator.services.mozilla.com/D26630

--HG--
extra : moz-landing-system : lando
2019-04-10 21:44:16 +00:00
Mike Hommey d452755d02 Bug 1542996 - Remove duplicate component registration. r=kmag
Bug 1478124 and bug 1524687 converted many things to static xpcom
component registration, but somehow left the corresponding C++
initialization.

Differential Revision: https://phabricator.services.mozilla.com/D26697

--HG--
extra : moz-landing-system : lando
2019-04-09 18:58:49 +00:00
Jonathan Kew c48e7d41b9 Bug 1542773 - Make the mac font activation/sandbox test (browser_bug1393259.js) more robust. r=haik
When the test font is activated, the notification of the font configuration change
may be handled asynchronously by content processes, so that it's possible the content
process has not yet handled the update at the point when registerFont() detects the
change and returns to the test script.

(This issue becomes more acute with the upcoming shared-font-list system, where the
OS notification is not handled by the content process at all; it's only handled by
the parent process, which then notifies content processes *after* it has updated the
font list. So there's an inherent latency between the update being recognized by the
chrome process - and therefore "ready" as far as the test script is concerned - and
content processes receiving and handling the change.)

To handle this, we can explicitly wait for the width of the rendered content to change,
which will indicate that the font configuration change has been handled by the content
process.

Differential Revision: https://phabricator.services.mozilla.com/D26570

--HG--
extra : moz-landing-system : lando
2019-04-09 16:56:06 +00:00
Haik Aftandilian 2abd1f81a6 Bug 1541230 - Part 2 - Add /System/Library read access to the utility sandbox r=Alex_Gaynor
Allow read access to /System/Library for accessing system libraries.

Depends on D26397

Differential Revision: https://phabricator.services.mozilla.com/D26626

--HG--
extra : moz-landing-system : lando
2019-04-09 12:51:18 +00:00
Noemi Erli dd7e27f4a8 Merge inbound to mozilla-central. a=merge 2019-04-09 12:55:19 +03:00
Razvan Maries 51bf310eab Merge mozilla-central to mozilla-inbound. a=merge on a CLOSED TREE 2019-04-09 00:02:13 +03:00
Bastien Orivel 8b5dc7e481 Bug 1516337 - Part 1: Dedupe sha2 and related dependencies r=froydnj
This also removes the lalrpop files from the .git/hgignore as that
breaks the build since lalrpop now includes lrgrammar in the published
crate and that file needs to be vendored

--HG--
extra : histedit_source : e31c07645a87a11b19a0b7e44f2a48d791b5f396
2019-04-08 23:17:50 +03:00
ffxbld 10490759cf No Bug, mozilla-central repo-update HSTS HPKP blocklist remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D26496

--HG--
extra : moz-landing-system : lando
2019-04-08 12:41:00 +00:00
Nathan Froyd 4e774a774b Bug 1542347 - eliminate needless string flattening in OSReauthenticator; r=keeler
We already have a null-terminated `nsString` in this code; we don't need
to turn it into another null-terminated `nsString`.

Depends on D26355

Differential Revision: https://phabricator.services.mozilla.com/D26356

--HG--
extra : moz-landing-system : lando
2019-04-08 16:26:10 +00:00
Nathan Froyd 5da67ad8db Bug 1542347 - eliminate needless string flattening in nsKeygenFormProcessor; r=keeler
We flatten an nsAString before calling GetPublicKey, but GetPublicKey
doesn't actually care about whether the string is null-terminated or
not.  Let's save a tiny amount of work by not doing the flattening.

Differential Revision: https://phabricator.services.mozilla.com/D26355

--HG--
extra : moz-landing-system : lando
2019-04-05 20:19:13 +00:00
Mike Hommey 071a2fe984 Bug 1541792 - Replace linker magic with manual component registration. r=froydnj
Before bug 938437, we had a rather large and error-prone
nsStaticXULComponents.cpp used to register all modules. That was
replaced with clever use of the linker, which allowed to avoid the mess
that maintaining that file was.

Fast forward to now, where after bug 1524687 and other work that
preceded it, we have a much smaller number of remaining static xpcom
components, registered via this linker hack, and don't expect to add
any new ones. The list should eventually go down to zero.

Within that context, it seems to be the right time to get rid of the
magic, and with it the problems it causes on its own.

Some of those components could probably be trivially be converted to
static registration via .conf files, but I didn't want to deal with the
possible need to increase the number of dummy modules in XPCOMInit.cpp.
They can still be converted as a followup.

Differential Revision: https://phabricator.services.mozilla.com/D26076

--HG--
extra : moz-landing-system : lando
2019-04-05 02:30:56 +00:00
Dorel Luca 1be446680f Merge mozilla-inbound to mozilla-central. a=merge 2019-04-08 13:45:29 +03:00
Bob Owen 3761608ad2 Bug 1534196: Correct return values from failed brokering. r=jmathies 2019-04-08 08:54:27 +01:00
Jeremy Lempereur 39b20b1675 Bug 1517797 - Rewrite net_IsValidIPv6Addr in Rust r=valentin,froydnj
Differential Revision: https://phabricator.services.mozilla.com/D15737

--HG--
extra : moz-landing-system : lando
2019-04-08 06:33:04 +00:00
Sylvestre Ledru 03fc65347c Bug 1542146 - Apply the change with the option StatementMacros from clang-format-8 r=andi
# ignore-this-changeset

Differential Revision: https://phabricator.services.mozilla.com/D26280

--HG--
extra : moz-landing-system : lando
2019-04-05 21:42:17 +00:00
Sylvestre Ledru 03c8e8c2dd Bug 1519636 - clang-format-8: Reformat recent changes to the Google coding style r=Ehsan
clang-format-8 upstream had some improvements wrt macros
See: https://reviews.llvm.org/D33440
This is why the diff is bigger than usual

# ignore-this-changeset

Differential Revision: https://phabricator.services.mozilla.com/D26098

--HG--
extra : moz-landing-system : lando
2019-04-05 21:41:42 +00:00
Dana Keeler 61bd4db566 Bug 1535752 - avoid unnecessarily base64-encoding inputs to nsICertStorage when we already have DER r=mgoodwin
Differential Revision: https://phabricator.services.mozilla.com/D26034

--HG--
extra : moz-landing-system : lando
2019-04-05 21:19:21 +00:00
Carolina Jimenez Gomez 930c75ee4b Bug 1480925 - Removes anti-patterns related with Ci.nsIWhatever. r=keeler,yzen
Differential Revision: https://phabricator.services.mozilla.com/D25686

--HG--
extra : moz-landing-system : lando
2019-04-05 16:51:16 +00:00
Csoregi Natalia ba58e936bd Backed out changeset 4ad80127f89f (bug 1519636) for bustage on MarkupMap.h and nsAccessibilityService.cpp. CLOSED TREE 2019-04-05 09:48:19 +03:00
Sylvestre Ledru d1c1878603 Bug 1519636 - clang-format-8: Reformat recent changes to the Google coding style r=Ehsan
clang-format-8 upstream had some improvements wrt macros
See: https://reviews.llvm.org/D33440
This is why the diff is bigger than usual

# ignore-this-changeset

Differential Revision: https://phabricator.services.mozilla.com/D26098

--HG--
extra : moz-landing-system : lando
2019-04-04 21:36:16 +00:00
Narcis Beleuzu 24dbe577a5 Backed out changeset 389b6bbd76db (bug 1519636) for bustages on MarkupMap.h . CLOSED TREE 2019-04-05 00:27:56 +03:00
Sylvestre Ledru 399dbd28fe Bug 1519636 - clang-format-8: Reformat recent changes to the Google coding style r=Ehsan
clang-format-8 upstream had some improvements wrt macros
See: https://reviews.llvm.org/D33440
This is why the diff is bigger than usual

# ignore-this-changeset

Differential Revision: https://phabricator.services.mozilla.com/D26098

--HG--
extra : moz-landing-system : lando
2019-04-04 20:12:23 +00:00
Haik Aftandilian f357396a1e Bug 1541272 - Mac Utility sandbox profile missing crash reporter port allow rule r=Alex_Gaynor
Add the crash reporter port to the utility process sandbox so that crash reports can be saved for processes using the utility sandbox with early sandbox init.

At this time, the RDD process is the only process using the utility sandbox.

Differential Revision: https://phabricator.services.mozilla.com/D26228

--HG--
extra : moz-landing-system : lando
2019-04-04 19:59:25 +00:00
ffxbld d581d786f4 No Bug, mozilla-central repo-update HSTS HPKP blocklist remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D26115

--HG--
extra : moz-landing-system : lando
2019-04-04 13:00:37 +00:00
Ciure Andrei 4116e08315 Merge inbound to mozilla-central. a=merge 2019-04-04 07:34:14 +03:00
Dana Keeler a483dcca02 Bug 1539415 - make nsICertStorage (cert_storage) asynchronous for functions called from the main thread r=jcj,mgoodwin
The Set* functions of nsICertStorage (SetRevocationByIssuerAndSerial,
SetRevocationBySubjectAndPubKey, SetEnrollment, and SetWhitelist) are called on
the main thread by the implementations that manage consuming remote security
information. We don't want to block the main thread, so this patch modifies
these functions to take a callback that will be called (on the original thread)
when the operation in question has been completed on a background thread.

The Get* functions of nsICertStorage (GetRevocationState, GetEnrollmentState,
and GetWhitelistState) should only be called off the main thread. For the most
part they are, but there are at least two main-thread certificate verifications
that can cause these functions to be called on the main thread. These instances
are in nsSiteSecurityService::ProcessPKPHeader and
ContentSignatureVerifier::CreateContextInternal and will be dealt with in
bug 1406854 bug 1534600, respectively.

Differential Revision: https://phabricator.services.mozilla.com/D25174

--HG--
extra : moz-landing-system : lando
2019-04-03 23:24:19 +00:00
Brian Grinstead 54848835d5 Bug 1540123 - Use is/isnot/ok instead of Assert.equal/Assert.notEqual/Assert.ok in browser_clientAuth_ui.js r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D25828

--HG--
extra : moz-landing-system : lando
2019-04-02 21:09:05 +00:00
Brian Grinstead 928bc8adb2 Bug 1540123 - Append menuitems into the menupopup for the certificate nickname menulist in certificate selection dialog UI r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D25825

--HG--
extra : moz-landing-system : lando
2019-04-02 21:09:03 +00:00
Haik Aftandilian f7082591a7 Bug 1540892 - [Mac] Don't #include policy definition headers in mac/Sandbox.h r=Alex_Gaynor
Move sandbox policy includes to Sandbox.mm.

Differential Revision: https://phabricator.services.mozilla.com/D25691

--HG--
extra : moz-landing-system : lando
2019-04-02 12:59:46 +00:00
Gian-Carlo Pascutto d0f1336b84 Bug 1535794 - Allow getrandom() in all sandbox policies. r=jld
Differential Revision: https://phabricator.services.mozilla.com/D25610

--HG--
extra : moz-landing-system : lando
2019-04-02 12:37:58 +00:00
Eden Chuang 72b79c6fbd Bug 1442778 - Add "chromeContext" parameter to console API and console service messages. r=smaug
1. Adding a new attribute chromeContext in ConsoleEvent
2. Adding a new boolean attribute isFromChromeContext in nsIConsoleMessage
3. Sending IsFromChromeContext to the parent process

Differential Revision: https://phabricator.services.mozilla.com/D23330

--HG--
extra : moz-landing-system : lando
2019-04-01 22:42:34 +00:00
Dana Keeler f8da648dbc bug 1439002 - remove useless debug spew from nsSiteSecurityService r=erahm
Differential Revision: https://phabricator.services.mozilla.com/D25489

--HG--
extra : moz-landing-system : lando
2019-04-01 17:07:20 +00:00
Gian-Carlo Pascutto 4f54fd166f Bug 1536137 - Add getrusage to RDD policy. r=jld
Depends on D24190

Differential Revision: https://phabricator.services.mozilla.com/D25621

--HG--
extra : moz-landing-system : lando
2019-04-01 16:10:05 +00:00