Граф коммитов

14282 Коммитов

Автор SHA1 Сообщение Дата
J.C. Jones 78fdef6013 Bug 1512719 - land NSS NSS_3_42_BETA2 UPGRADE_NSS_RELEASE, r=me
--HG--
extra : rebase_source : a7bdacf3c87aabba837467d5f1209f320f171008
2019-01-25 23:38:02 +00:00
J.C. Jones 354f799704 Bug 1522735 - Set enable_sslkeylogfile for NSS gyp build r=firefox-build-system-reviewers,erahm,ted
NSS 3.42 added a new build flag, enable_sslkeylogfile, to toggle the
availability of the SSLKEYLOGFILE variable (see Bug 1515236 and Bug 1519209).

Differential Revision: https://phabricator.services.mozilla.com/D17588

--HG--
extra : moz-landing-system : lando
2019-01-25 18:43:23 +00:00
ffxbld daf55e3ab4 No Bug, mozilla-central repo-update HSTS HPKP blocklist remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D17491

--HG--
extra : moz-landing-system : lando
2019-01-24 14:11:31 +00:00
Sylvestre Ledru b61d90492b Bug 1519636 - Reformat recent changes to the Google coding style r=Ehsan
# ignore-this-changeset

Depends on D17388

Differential Revision: https://phabricator.services.mozilla.com/D17389

--HG--
extra : moz-landing-system : lando
2019-01-24 08:11:00 +00:00
Ciure Andrei 763557eef3 Merge mozilla-central to autoland. a=merge CLOSED TREE 2019-01-24 05:47:10 +02:00
Ciure Andrei c035ee7d3a Merge inbound to mozilla-central. a=merge 2019-01-24 05:44:33 +02:00
Tim Nguyen e5124ab3fe Bug 1521294 - Remove XUL grid layout from security/manager/pki/resources/content/changepassword.xul. r=nhnt11
Differential Revision: https://phabricator.services.mozilla.com/D17059

--HG--
extra : moz-landing-system : lando
2019-01-24 01:00:43 +00:00
Tim Nguyen ea8cc54265 Bug 1521290 - Remove XUL grid layout from security/manager/pki/resources/content/device_manager.xul. r=nhnt11
Differential Revision: https://phabricator.services.mozilla.com/D17058

--HG--
extra : moz-landing-system : lando
2019-01-24 00:37:26 +00:00
Ciure Andrei a4eeeccf1d Merge mozilla-central to mozilla-inbound. a=merge CLOSED TREE 2019-01-23 20:55:29 +02:00
J.C. Jones 376e2e4fdd Bug 1512719 - land NSS NSS_3_42_BETA1 UPGRADE_NSS_RELEASE, r=me
--HG--
extra : rebase_source : b5b0f18427d33d3d88c514a5de3a0e799881a183
extra : amend_source : 56a9b6c2c58b0ef459a03c13626225c09eebbf0c
2019-01-23 17:46:08 +00:00
Sebastian Hengst 2ecf173b14 Merge mozilla-central to autoland 2019-01-23 11:31:44 +02:00
Tim Nguyen a6618d3147 Bug 1521296 - Remove XUL grid layout from security/manager/pki/resources/content/setp12password.xul. r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D17061

--HG--
extra : moz-landing-system : lando
2019-01-23 00:08:20 +00:00
Tim Nguyen 35ede052b3 Bug 1521295 - Remove XUL grid layout from security/manager/pki/resources/content/downloadcert.xul. r=jaws
Differential Revision: https://phabricator.services.mozilla.com/D17062

--HG--
extra : moz-landing-system : lando
2019-01-22 20:51:29 +00:00
Kris Maglione e930b89c34 Bug 1514594: Part 3 - Change ChromeUtils.import API.
***
Bug 1514594: Part 3a - Change ChromeUtils.import to return an exports object; not pollute global. r=mccr8

This changes the behavior of ChromeUtils.import() to return an exports object,
rather than a module global, in all cases except when `null` is passed as a
second argument, and changes the default behavior not to pollute the global
scope with the module's exports. Thus, the following code written for the old
model:

  ChromeUtils.import("resource://gre/modules/Services.jsm");

is approximately the same as the following, in the new model:

  var {Services} = ChromeUtils.import("resource://gre/modules/Services.jsm");

Since the two behaviors are mutually incompatible, this patch will land with a
scripted rewrite to update all existing callers to use the new model rather
than the old.
***
Bug 1514594: Part 3b - Mass rewrite all JS code to use the new ChromeUtils.import API. rs=Gijs

This was done using the followng script:

https://bitbucket.org/kmaglione/m-c-rewrites/src/tip/processors/cu-import-exports.jsm
***
Bug 1514594: Part 3c - Update ESLint plugin for ChromeUtils.import API changes. r=Standard8

Differential Revision: https://phabricator.services.mozilla.com/D16747
***
Bug 1514594: Part 3d - Remove/fix hundreds of duplicate imports from sync tests. r=Gijs

Differential Revision: https://phabricator.services.mozilla.com/D16748
***
Bug 1514594: Part 3e - Remove no-op ChromeUtils.import() calls. r=Gijs

Differential Revision: https://phabricator.services.mozilla.com/D16749
***
Bug 1514594: Part 3f.1 - Cleanup various test corner cases after mass rewrite. r=Gijs
***
Bug 1514594: Part 3f.2 - Cleanup various non-test corner cases after mass rewrite. r=Gijs

Differential Revision: https://phabricator.services.mozilla.com/D16750

--HG--
extra : rebase_source : 359574ee3064c90f33bf36c2ebe3159a24cc8895
extra : histedit_source : b93c8f42808b1599f9122d7842d2c0b3e656a594%2C64a3a4e3359dc889e2ab2b49461bab9e27fc10a7
2019-01-17 10:18:31 -08:00
Gurzau Raul 136dc5e8bc Merge mozilla-central to inbound. a=merge CLOSED TREE 2019-01-23 02:05:32 +02:00
Sylvestre Ledru 0b4021fcad Bug 1521460 - Also reformat objective-c files r=mstange,ehsan,spohl
# ignore-this-changeset

Differential Revision: https://phabricator.services.mozilla.com/D17139

--HG--
extra : histedit_source : 084f340503d2e1a2d9e1753c38b2c4ee9c7819f3
2019-01-21 18:18:16 +01:00
Haik Aftandilian f6ee38ea4d Bug 1521167 [Mac] Sandbox violation logging is always enabled with early startup r=Alex_Gaynor
For sandbox early startup, ensure violation logging is only enabled when the parent passes the -sbLogging flag.

Differential Revision: https://phabricator.services.mozilla.com/D17013

--HG--
extra : moz-landing-system : lando
2019-01-22 14:00:27 +00:00
Tom Ritter 9666744312 Bug 1520310 - Disable SANDBOX_EXPORTS for the mingw-clang build as well r=bobowen 2019-01-21 11:42:03 -06:00
Cosmin Sabou 951d31e64d Merge mozilla-inbound to mozilla-central. a=merge 2019-01-22 05:56:10 +02:00
Tom Ritter 77cce78dd3 Bug 1520310 - Backout the patch from Bug 1498695 and cast to void*. r=bobowen
In Bug 1462100 we started casting to void* because mingw doesn't do
automatic conversions like MSVC does.  In Bug 1498695 I backed out that
change because I (mistakenly) thought it wasn't necessary for mingw-clang
when in actuality, I simply wasn't hitting the code path due to
SANDBOX_EXPORTS being defined.

Since we want to _not_ define SANDBOX_EXPORTS I need to put the original
patch back in place.

--HG--
extra : amend_source : a26eec746e7881fa88b963c8dd3c1fa900b6a8b6
2019-01-21 14:13:17 -06:00
Noemi Erli 92a09b4912 Backed out changeset d8e4a86e306a (bug 1520310) for bustages in filesystem_dispatcher.cc 2019-01-21 21:47:43 +02:00
Tom Ritter aaa41182a0 Bug 1520310 - Disable SANDBOX_EXPORTS for the mingw-clang build as well r=bobowen
--HG--
extra : amend_source : 3fd0fda02e8d7fabef0657fb3be520e37d59e97d
2019-01-21 11:42:03 -06:00
Ehsan Akhgari 4137a92662 Bug 1514340 - Part 2: Break out the content blocking related notifications into nsIWebProgressListener.onContentBlockingEvent(); r=baku,johannh
Differential Revision: https://phabricator.services.mozilla.com/D16052
2019-01-21 09:58:50 -05:00
Valentin Gosu 75ba4e1542 Bug 1513458 - Add more specific MOZ_DIAGNOSTIC_ASSERTS to TransportSecurityInfo::Read in order to pinpoint crashes r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D16828

--HG--
extra : moz-landing-system : lando
2019-01-21 18:12:12 +00:00
Cosmin Sabou 7ccc9d8b0b Merge mozilla-inbound to mozilla-central. a=merge 2019-01-19 11:57:49 +02:00
J.C. Jones 55f31ee1a6 Bug 1512719 - land NSS da45424cb9a0 UPGRADE_NSS_RELEASE, r=me
--HG--
extra : rebase_source : 982b8538e03e4e0c87d4354629dfbf5bbce3f918
2019-01-18 17:48:59 +00:00
Jared Wein 856c566817 Bug 1520865 - Use the return value of Array.concat when building the list of nodes that are being localized before window.sizeToContent. r=Gijs
Differential Revision: https://phabricator.services.mozilla.com/D16887

--HG--
extra : moz-landing-system : lando
2019-01-17 23:16:36 +00:00
ffxbld 9de89e0706 No Bug, mozilla-central repo-update HSTS HPKP blocklist remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D16819

--HG--
extra : moz-landing-system : lando
2019-01-17 13:27:23 +00:00
Jared Wein e79eecd7af Bug 1518786 - Wait until Fluent strings have been applied before sizing the window to content. r=Gijs
Differential Revision: https://phabricator.services.mozilla.com/D16587

--HG--
extra : moz-landing-system : lando
2019-01-16 20:56:55 +00:00
ui.manish 37bbffd19c Bug 1346298 Update or Remove Telemetry Probe: SSL_OBSERVED_END_ENTITY_CERTIFICATE_LIFETIME r=jcj
Differential Revision: https://phabricator.services.mozilla.com/D16631

--HG--
extra : moz-landing-system : lando
2019-01-16 19:35:05 +00:00
Dana Keeler f1b40f3220 bug 1519492 - reorganize NSSCertDBTrustDomain::FindIssuer to facilitate future improvements r=jcj
Before this patch, NSSCertDBTrustDomain::FindIssuer would iterate over its
candidate list (a CERTCertList) twice. This would have made it difficult to add
in candidate issuers from other sources (see e.g. bug 1514118, wherein the goal
is to bypass NSS' view of what certificates exist to facilitate third
party/enterprise roots). This patch reorganizes this function to make future
improvements easier.

Differential Revision: https://phabricator.services.mozilla.com/D16341

--HG--
extra : moz-landing-system : lando
2019-01-15 23:34:44 +00:00
J.C. Jones cf499123c2 Bug 657228: Preload all known intermediate certificates for CAs in our root store r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D12115

--HG--
extra : moz-landing-system : lando
2019-01-15 21:23:31 +00:00
Dorel Luca 51fd390584 Backed out changeset cac9133e5572 (bug 657228) for xpcshell failure in security/manager/ssl/tests/unit/test_intermediate_preloads.js. CLOSED TREE 2019-01-15 22:55:14 +02:00
J.C. Jones 52a65b0c4c Bug 657228: Preload all known intermediate certificates for CAs in our root store r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D12115

--HG--
extra : moz-landing-system : lando
2019-01-15 18:32:47 +00:00
Oana Pop Rus c42c2ac75f Merge mozilla-central to autoland. a=merge CLOSED TREE 2019-01-15 11:39:31 +02:00
Franziskus Kiefer 81355de44a Bug 1508936 - Fix conversion to wide characters in OSReauthenticator r=keeler,mhowell
Fix conversion to wide characters in OSReauthenticator

Differential Revision: https://phabricator.services.mozilla.com/D12727

--HG--
extra : moz-landing-system : lando
2019-01-15 01:21:00 +00:00
ffxbld b78c9b6665 No Bug, mozilla-central repo-update HSTS HPKP blocklist remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D16453

--HG--
extra : moz-landing-system : lando
2019-01-14 13:28:46 +00:00
Dana Keeler 9b29562c1f bug 1518679 - install 32-bit libsecret so secret storage tests can use libsecret on 32-bit test systems r=jmaher
Differential Revision: https://phabricator.services.mozilla.com/D16085

--HG--
extra : moz-landing-system : lando
2019-01-09 22:43:10 +00:00
Dana Keeler a523734aa1 bug 1517337 - make secret overwriting consistent across backends r=jcj
As originally written, the keychain-backed secret storing implementation would
not overwrite a secret if prompted to generate or recover one with a label that
was already in use. Since libsecret and credential manager both do this by
default, this change makes the keychain-backed implementation behave the same
way.

Differential Revision: https://phabricator.services.mozilla.com/D15697

--HG--
extra : moz-landing-system : lando
2019-01-09 18:25:46 +00:00
Ehsan Akhgari e5e885ae31 Bug 1521000 - Part 2: Adjust our clang-format rules to include spaces after the hash for nested preprocessor directives r=sylvestre
# ignore-this-changeset

--HG--
extra : amend_source : 7221c8d15a765df71171099468e7c7faa648f37c
extra : histedit_source : a0cce6015636202bff09e35a13f72e03257a7695
2019-01-18 10:16:18 +01:00
Ehsan Akhgari 06c3d29113 Bug 1521000 - Part 1: Reformat the tree to ensure everything is formatted correctly with clang-format r=sylvestre
Summary: # ignore-this-changeset

Reviewers: sylvestre

Reviewed By: sylvestre

Subscribers: reviewbot, emilio, jandem, bbouvier, karlt, jya

Bug #: 1521000

Differential Revision: https://phabricator.services.mozilla.com/D16936

--HG--
extra : histedit_source : 4add583bfa729ccc1aef934629ed45ff095189b0
2019-01-18 10:12:56 +01:00
Ehsan Akhgari 0b5c4e6d1a Bug 1523106 - DeCOMtaminate nsISecurityEventSink; r=baku
Differential Revision: https://phabricator.services.mozilla.com/D17742
2019-01-28 14:45:49 -05:00
Kris Maglione 498ab4d1a0 Bug 1478124: Part 8f - Update NSS module to use a static component manifest. r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D15045

--HG--
extra : rebase_source : d60982dd0a6ed92915e7620b8f0d0cfe068c564c
extra : source : 8dacce59fcc0c966a3753b3ced9b1afd0043475a
2018-12-18 18:55:40 -08:00
Kris Maglione b6f3861e4c Bug 1478124: Part 8f - Update NSS module to use a static component manifest. r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D15045

--HG--
extra : rebase_source : 47c36eb7349ab88b138ae3b12f62f45c5da7cb63
extra : absorb_source : 418e5b8b3e43e21c5e0523207f4174cdfbe857ed
extra : histedit_source : 02aa49d053b8a3fdd5a47e46c0d59500d4558570
2018-12-18 18:55:40 -08:00
Ehsan Akhgari a0455cf9bc Bug 1517136 - Devirtualize and inline the calls in nsSecureBrowserUIImpl::CheckForBlockedContent(); r=baku
Differential Revision: https://phabricator.services.mozilla.com/D15574
2019-01-07 17:56:07 -05:00
Neil Deakin cb10352f4b Bug 1482389, replace TreeBoxObject with XULTreeElement inherited from XULElement, r=peterv,paolo
--HG--
rename : dom/webidl/TreeBoxObject.webidl => dom/chrome-webidl/XULTreeElement.webidl
rename : layout/xul/tree/TreeBoxObject.cpp => dom/xul/XULTreeElement.cpp
rename : layout/xul/tree/TreeBoxObject.h => dom/xul/XULTreeElement.h
2018-12-04 11:25:30 -05:00
Gian-Carlo Pascutto 2ea3add3ad Bug 1511099 - Make MAY_CREATE handling more consistent. r=jld
Differential Revision: https://phabricator.services.mozilla.com/D13523

--HG--
extra : moz-landing-system : lando
2019-01-07 15:21:32 +00:00
ffxbld 20300bbf03 No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D15837

--HG--
extra : moz-landing-system : lando
2019-01-07 14:34:21 +00:00
Ciure Andrei a8af06aea2 Merge inbound to mozilla-central. a=merge 2019-01-04 00:04:46 +02:00
Kyle Machulis 030ac758f5 Bug 1095602 - Remove STATE_SECURE flags from nsIWebProgressListener; r=Ehsan
Only STATE_SECURE_HIGH is used, and that's only in instances where
STATE_IS_SECURE is also used, so we can remove the security level
flags and just assume STATE_IS_SECURE is also STATE_SECURE_HIGH.

Differential Revision: https://phabricator.services.mozilla.com/D15600

--HG--
extra : moz-landing-system : lando
2019-01-03 17:35:48 +00:00
ffxbld 4bef5d51fd No Bug, mozilla-central repo-update HSTS HPKP blocklist remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D15643

--HG--
extra : moz-landing-system : lando
2019-01-03 13:39:23 +00:00
Dana Keeler 74e6b5cabe bug 1498909 - dynamically load libsecret at runtime if available r=franziskus,jcj
Enough linux-based systems don't have libsecret that we can't make it a
requirement on linux. For those that do, however, we can dynamically load the
library at runtime. For those that don't, we can fall back to NSS.

Differential Revision: https://phabricator.services.mozilla.com/D9969

--HG--
extra : moz-landing-system : lando
2019-01-03 00:39:45 +00:00
Haik Aftandilian 179fb3b0a4 Bug 1508277 - Crash in mozilla::gl::SurfaceFactory_IOSurface::CreateShared r=Alex_Gaynor
Allow access to device-id and vendor-id IOKit properties needed for AppleIntelHD3000GraphicsGLDriver.

Fixes a crash in the AppleIntelHD3000GraphicsGLDriver userland driver which is used in some 2011-era Macs.

Differential Revision: https://phabricator.services.mozilla.com/D15528

--HG--
extra : moz-landing-system : lando
2018-12-31 17:23:35 +00:00
ffxbld 7745a0ae89 No Bug, mozilla-central repo-update HSTS HPKP blocklist remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D15511

--HG--
extra : moz-landing-system : lando
2018-12-31 13:34:39 +00:00
Daniel Varga ff20f2519a Merge mozilla-central to mozilla-inbound. a=merge on a CLOSED TREE
--HG--
extra : rebase_source : 28249a6c172f584d05eb3a775578ebd0839aa057
2019-01-03 18:28:27 +02:00
J.C. Jones 9917c29558 Bug 1512719 - land NSS c8f7602ce9e6 UPGRADE_NSS_RELEASE, r=me
--HG--
rename : security/nss/gtests/common/chachapoly-vectors.h => security/nss/gtests/common/testvectors/chachapoly-vectors.h
rename : security/nss/gtests/common/gcm-vectors.h => security/nss/gtests/common/testvectors/gcm-vectors.h
rename : security/nss/gtests/common/wycheproof/header_bases/chachapoly-vectors.h => security/nss/gtests/common/testvectors_base/chachapoly-vectors_base.h
rename : security/nss/gtests/common/wycheproof/header_bases/gcm-vectors.h => security/nss/gtests/common/testvectors_base/gcm-vectors_base.h
rename : security/nss/gtests/common/wycheproof/testvectors/aes_gcm_test.json => security/nss/gtests/common/wycheproof/source_vectors/aes_gcm_test.json
rename : security/nss/gtests/common/wycheproof/testvectors/chacha20_poly1305_test.json => security/nss/gtests/common/wycheproof/source_vectors/chacha20_poly1305_test.json
extra : rebase_source : 6b249cda30af8f4c72947eb1f564cf55536ce691
2019-01-03 03:52:36 +00:00
ffxbld c090aae259 No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D15404

--HG--
extra : moz-landing-system : lando
2018-12-27 14:20:53 +00:00
ffxbld a0125530a9 No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D15294

--HG--
extra : moz-landing-system : lando
2018-12-25 19:16:40 +00:00
Jan de Mooij becd1e9516 Bug 1514776 - Fix browser_loadPKCS11Module_ui.js test because we now report as uncaught exception instead of reporting to the browser console. r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D15178

--HG--
extra : moz-landing-system : lando
2018-12-21 18:37:09 +00:00
Narcis Beleuzu 2b363fce3a Merge mozilla-central to inbound. a=merge CLOSED TREE 2018-12-21 00:06:08 +02:00
Gijs Kruitbosch a95d5a1314 Bug 1515109 - reduce minimum width for certificate dialog, r=mconley
Differential Revision: https://phabricator.services.mozilla.com/D15102

--HG--
extra : moz-landing-system : lando
2018-12-20 16:59:05 +00:00
ffxbld d22bb62012 No Bug, mozilla-central repo-update HSTS HPKP blocklist remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D15088

--HG--
extra : moz-landing-system : lando
2018-12-20 13:30:40 +00:00
Jeff Walden ed23151bd7 Bug 1492937 - Make the JS subscript loader load scripts exclusively as UTF-8, with no way to specify any other encoding, and adjust a bunch of existing tests to use UTF-8 directly, rather than Unicode escape sequences or similar. (This also changes the encoding of .sjs scripts and all mochitest-browser tests in the tree from Latin-1 to UTF-8.) r=yzen, r=MattN, r=jimb, r=kmag 2018-12-19 13:46:20 -08:00
Bob Owen 4cf1443d5c Bug 1515375 - Null check sLaunchErrors in SandboxBroker and always accumulate if not created. r=handyman 2018-12-20 17:42:04 +00:00
Franziskus Kiefer fcdcb9d6a7 Bug 1513839 - Make SSL_TIME_UNTIL_HANDSHAKE_FINISHED keyed by kea group r=keeler,jcj
This collects SSL_TIME_UNTIL_HANDSHAKE_FINISHED dependent on the key group used. This is nice to have in general and especially for the ecdhe-sidh thing.

Differential Revision: https://phabricator.services.mozilla.com/D13524

--HG--
extra : moz-landing-system : lando
2018-12-18 09:33:34 +00:00
ffxbld 3dd7393356 No Bug, mozilla-central repo-update HSTS HPKP blocklist remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D14727

--HG--
extra : moz-landing-system : lando
2018-12-17 13:42:11 +00:00
Cosmin Sabou 945cf611d2 Merge mozilla-central to autoland. 2018-12-15 04:57:48 +02:00
Cosmin Sabou b30ca1fd33 Merge mozilla-inbound to mozilla-central. a=merge 2018-12-15 04:47:12 +02:00
Gijs Kruitbosch 40bc8e4596 Bug 1513710 - bring back stringbundle on-demand for certificate export code, and add a test for certificate exports, r=jaws
Differential Revision: https://phabricator.services.mozilla.com/D14555

--HG--
extra : moz-landing-system : lando
2018-12-14 20:45:58 +00:00
Cosmin Sabou b8f31f45aa Backed out changeset 8ac2c5d30013 (bug 1513710) as requested by Gijs for causing leaks. 2018-12-14 22:29:28 +02:00
Gijs Kruitbosch 0b6f1d6d69 Bug 1513710 - bring back stringbundle on-demand for certificate export code, and add a test for certificate exports, r=jaws
Differential Revision: https://phabricator.services.mozilla.com/D14555

--HG--
extra : moz-landing-system : lando
2018-12-14 20:19:11 +00:00
Razvan Maries 87aca70b7f Merge mozilla-inbound to mozilla-central a=merge 2018-12-14 18:22:09 +02:00
Gabriele Svelto 8195e39010 Bug 618185 - Switch the default URL for sending crash reports to the *.mozilla.org domain r=ted
Differential Revision: https://phabricator.services.mozilla.com/D14003

--HG--
extra : moz-landing-system : lando
2018-12-13 19:17:54 +00:00
Bogdan Tara 38717f9e9e Merge mozilla-central to mozilla-inbound. a=merge CLOSED TREE 2018-12-14 00:54:42 +02:00
ffxbld a805f97925 No Bug, mozilla-central repo-update HSTS HPKP blocklist remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D14412

--HG--
extra : moz-landing-system : lando
2018-12-13 13:25:12 +00:00
Jeremy Lempereur 695604da1d Bug 1481014 - WIP - Rewrite net_IsValidIPv4Addr in rust. r=valentin,froydnj
Differential Revision: https://phabricator.services.mozilla.com/D3713

--HG--
extra : moz-landing-system : lando
2018-12-13 12:07:26 +00:00
Dana Keeler eba436101f bug 1496215 - Enable EV Treatment for UCA Extended Validation Root owned by SHECA r=jcj
Differential Revision: https://phabricator.services.mozilla.com/D14344

--HG--
extra : moz-landing-system : lando
2018-12-12 22:37:17 +00:00
Gijs Kruitbosch 3fc45446f6 Bug 1514239 - use fluent for the certificate export code in the cert manager, r=flod,keeler
Differential Revision: https://phabricator.services.mozilla.com/D14598

--HG--
extra : moz-landing-system : lando
2018-12-15 00:26:09 +00:00
Daniel Holbert c76bc5d3cc Bug 1513653: Remove B2G special cases from some SSL EV/pinning tests. r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D14294

--HG--
extra : moz-landing-system : lando
2018-12-12 19:20:58 +00:00
J.C. Jones 6ad1df2691 Bug 1512719 - land NSS 0c3304a81f07 UPGRADE_NSS_RELEASE, r=me
--HG--
extra : rebase_source : d700c695c9ed4ca1b57b0ccc9e4da484e440ce97
2018-12-13 21:01:41 +00:00
Mark Banner 0304564ac7 Bug 1415483 - Apply the new options to reject-importGlobalProperties across the codebase, remove unnecessary importGlobalProperties. r=nika
Differential Revision: https://phabricator.services.mozilla.com/D13754

--HG--
extra : moz-landing-system : lando
2018-12-11 21:39:40 +00:00
Michael Froman d385314704 Bug 1513101 - re-add L section for HANDLES_DUP_BROKER to RDD Win sanbox to fix mochitest crashes. r=bobowen
Differential Revision: https://phabricator.services.mozilla.com/D14109

--HG--
extra : moz-landing-system : lando
2018-12-11 18:50:21 +00:00
Csoregi Natalia 9e970681f2 Backed out 2 changesets (bug 1415483) for multiple failures e.g. on test_message_manager_ipc.html. CLOSED TREE
Backed out changeset d00748de66fc (bug 1415483)
Backed out changeset 8dea94258f54 (bug 1415483)
2018-12-11 19:30:57 +02:00
Mark Banner 1abdc8687f Bug 1415483 - Apply the new options to reject-importGlobalProperties across the codebase, remove unnecessary importGlobalProperties. r=nika
Differential Revision: https://phabricator.services.mozilla.com/D13754

--HG--
extra : moz-landing-system : lando
2018-12-11 14:09:44 +00:00
ffxbld 69693c800c No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D14057

--HG--
extra : moz-landing-system : lando
2018-12-10 13:49:17 +00:00
J.C. Jones 6acf3fd2e1 Bug 1501587 - land NSS NSS_3_41_RTM UPGRADE_NSS_RELEASE, r=me
--HG--
extra : rebase_source : 7c7b9976c26f93c2f318c66759f6b046e2fec032
extra : amend_source : 8e1020cacbc9456a2eeaab7e2af5dde3db693bfa
2018-12-07 17:01:03 +00:00
ffxbld d9acd33076 No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D13896

--HG--
extra : moz-landing-system : lando
2018-12-06 15:06:29 +00:00
Johann Hofmann 2467797afd Bug 1450784 - Add a new error page for MOZILLA_PKIX_ERROR_MITM_DETECTED. r=nhnt11,keeler
Differential Revision: https://phabricator.services.mozilla.com/D12874

--HG--
extra : amend_source : c86e6cd59e1e3e2b9220b3c0d6d48249bae8226e
2018-11-26 10:17:58 +01:00
Andreea Pavel 4edaf92f7d Backed out changeset 05e25df4db43 (bug 1450784) for failing bc at browser/base/content/test/static/browser_misused_characters_in_strings.js on a CLOSED TREE 2018-12-04 22:28:23 +02:00
Johann Hofmann cf046ffccf Bug 1450784 - Add a new error page for MOZILLA_PKIX_ERROR_MITM_DETECTED. r=nhnt11,keeler
Differential Revision: https://phabricator.services.mozilla.com/D12874

--HG--
extra : rebase_source : efa6b1470d1ef482304dd761b135dc7e6fa6ff4f
2018-11-26 10:17:58 +01:00
Bogdan Tara dcf5ea092c Merge mozilla-central to mozilla-inbound. a=merge CLOSED TREE 2018-12-03 23:53:09 +02:00
Ehsan Akhgari a9178e878d Bug 1510911 - Part 3: Backout changeset d0997972e4d4 (bug 1493563 - Part 4) for regressing performance 2018-12-03 14:27:53 -05:00
Ehsan Akhgari 0dcf936804 Bug 1510911 - Part 2: Backout changeset f8849239da42 (bug 1493563 - Part 5) for regressing performance 2018-12-03 14:27:53 -05:00
ffxbld 1f947d85e5 No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D13670

--HG--
extra : moz-landing-system : lando
2018-12-03 12:52:08 +00:00
Coroiu Cristina 3564dfde3b Merge inbound to mozila-central a=merge 2018-12-01 07:46:00 +02:00
Gian-Carlo Pascutto d8bb24d28e Bug 1507830 - When using Wayland, don't allow connections to the X server. r=jld
Differential Revision: https://phabricator.services.mozilla.com/D13560

--HG--
extra : moz-landing-system : lando
2018-11-30 22:23:31 +00:00
Sylvestre Ledru 265e672179 Bug 1511181 - Reformat everything to the Google coding style r=ehsan a=clang-format
# ignore-this-changeset

--HG--
extra : amend_source : 4d301d3b0b8711c4692392aa76088ba7fd7d1022
2018-11-30 11:46:48 +01:00
J.C. Jones 081b18adf6 Bug 1501587 - land NSS f5ef34273311 UPGRADE_NSS_RELEASE, r=me
--HG--
extra : rebase_source : 458e6d5c1bf323a89d973952ad7b7af263e9e014
2018-11-30 18:00:06 +00:00
Tooru Fujisawa 7983faeb5d Bug 1511393 - Use c-basic-offset: 2 in Emacs mode line for C/C++ code. r=nbp 2018-12-01 04:52:05 +09:00
Michael Froman b6e960b34c Bug 1498624 - pt2 - Implement Win sandbox for RDD process. r=bobowen
Differential Revision: https://phabricator.services.mozilla.com/D13101

--HG--
extra : moz-landing-system : lando
2018-11-29 17:02:16 +00:00
J.C. Jones 2bdc1e9d4f Bug 1505106 - Support TouchID/FaceID for Reauthentication r=spohl
In Bug 1499846 we added support for OSX to do Keychain-based reauthentication.
On newer versions of OSX, it's possible to instead do TouchID/FaceID for bio-
metric reauthentication, with a fallback to Keychain.

This implements that functionality. There's no C++ interface to access the
LocalAuthentication framework, so it adds an Objective-C method called by the
existing OSReauthenticator methods to perform its work.

Differential Revision: https://phabricator.services.mozilla.com/D11700

--HG--
extra : moz-landing-system : lando
2018-11-28 18:35:02 +00:00
ffxbld 4a4bcf8624 No Bug, mozilla-central repo-update HSTS HPKP blocklist remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D13388

--HG--
extra : moz-landing-system : lando
2018-11-29 13:37:25 +00:00
Ehsan Akhgari 490e611801 Bug 1508472 - Part 5: Fifth batch of comment fix-ups in preparation for the tree reformat r=sylvestre
This is a best effort attempt at ensuring that the adverse impact of
reformatting the entire tree over the comments would be minimal. I've used a
combination of strategies including disabling of formatting, some manual
formatting and some changes to formatting to work around some clang-format
limitations.

Differential Revision: https://phabricator.services.mozilla.com/D13371

--HG--
extra : moz-landing-system : lando
2018-11-29 10:30:46 +00:00
Gabriele Svelto 19e52bebd4 Bug 1510582 - Remove useless inclusions of Services.h r=erahm
Differential Revision: https://phabricator.services.mozilla.com/D13240

--HG--
extra : moz-landing-system : lando
2018-11-28 17:25:23 +00:00
Sylvestre Ledru ef05004811 Bug 1503537 - Get rid of the pdfium & mortar code r=peterv
Differential Revision: https://phabricator.services.mozilla.com/D10352

--HG--
extra : moz-landing-system : lando
2018-11-28 19:31:21 +00:00
Jan-Erik Rediger 5fd1cd8036 Bug 1498163 - Migrate external callers to the new snapshot API r=chutten
Differential Revision: https://phabricator.services.mozilla.com/D12890

--HG--
extra : moz-landing-system : lando
2018-11-28 09:36:03 +00:00
Qinghao_Jack_Song 461c6bb6e4 Bug 1498448 - Migrate Certificate Manager Dialog to use fluent for localization r=Gijs,flod,zbraniecki
Differential Revision: https://phabricator.services.mozilla.com/D8499

--HG--
extra : moz-landing-system : lando
2018-11-28 10:30:06 +00:00
Dana Keeler b8286de46c Bug 1503348 - (3/3) - add support for decoding and verifying Signed Tree Head Data V2 r=jcj
Differential Revision: https://phabricator.services.mozilla.com/D11812

--HG--
rename : security/ct/BTInclusionProof.h => security/ct/BTTypes.h
extra : moz-landing-system : lando
2018-11-27 19:51:56 +00:00
Dana Keeler 215f63820a Bug 1503348 - (2/3) - fix up DecodeInclusionProof to take an Input rather than a Reader r=jcj
DecodeInclusionProof as originally implemented used the wrong convention - its
input argument should have always been an Input rather than a Reader.

Differential Revision: https://phabricator.services.mozilla.com/D11811

--HG--
extra : moz-landing-system : lando
2018-11-27 18:58:11 +00:00
Dana Keeler dfade002b8 Bug 1503348 - (1/3) remove obsolete SignedTreeHead definitions and tests r=jcj
The original implementation of Certificate Transparency included a definition
for the first version of the Signed Tree Head data structure but it was never
actually used. Now that we're implementing Binary Transparency, we need to
implement support for Signed Tree Head V2. Because the focus and approach are
different, the first step is to remove the original implementation.

Differential Revision: https://phabricator.services.mozilla.com/D11810

--HG--
extra : moz-landing-system : lando
2018-11-27 18:58:07 +00:00
Ehsan Akhgari 486b276941 Bug 1509555 - Part 4: Remove nsIWebProgressListener::STATE_BLOCKED_SLOW_TRACKING_CONTENT r=baku
Depends on D12830

Differential Revision: https://phabricator.services.mozilla.com/D12831

--HG--
extra : moz-landing-system : lando
2018-11-27 08:56:39 +00:00
Gabriele Svelto 566f669d07 Bug 1509450 - Remove unnecessary inclusions of ContentParent.h and ContentChild.h r=froydnj
Differential Revision: https://phabricator.services.mozilla.com/D12728

--HG--
extra : moz-landing-system : lando
2018-11-26 14:49:44 +00:00
Andreea Pavel ebe85db8e7 Backed out changeset ad857edac6a5 (bug 1498163) for failing devtools/client/performance/test/browser_perf-telemetry-04.js on a CLOSED TREE 2018-11-27 11:05:28 +02:00
Jan-Erik Rediger c6e72f0819 Bug 1498163 - Migrate external callers to the new snapshot API r=chutten
Differential Revision: https://phabricator.services.mozilla.com/D12890

--HG--
extra : moz-landing-system : lando
2018-11-26 14:34:23 +00:00
ffxbld b0d0a563bf No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D12897

--HG--
extra : moz-landing-system : lando
2018-11-26 14:23:19 +00:00
Daniel Varga 5e7f34b25d Merge mozilla-inbound to mozilla-central. a=merge 2018-11-22 23:48:53 +02:00
J.C. Jones 70bb51ebaf Bug 1501587 - land NSS 4b9cf6e61a48 UPGRADE_NSS_RELEASE, r=me 2018-11-22 18:45:02 +00:00
Tim Nguyen 044d8ca731 Bug 1508142 - Remove remains of tree cell-based selection code. r=bzbarsky,bgrins
Differential Revision: https://phabricator.services.mozilla.com/D12225

--HG--
extra : moz-landing-system : lando
2018-11-22 09:59:02 +00:00
Jed Davis e9397cfcac Bug 1508898 - Prepare the Linux sandbox's socketcall/ipc-call dispatch table for reformatting. r=gcp
The tables in SandboxFilterUtil.cpp should remain vertically aligned,
but clang-format would disagree.  This patch excludes that region from
reformatting, and applies the other changes that clang-format would make
there.

Differential Revision: https://phabricator.services.mozilla.com/D12499

--HG--
extra : moz-landing-system : lando
2018-11-21 11:05:31 +00:00
Haik Aftandilian b890a6606e Bug 1506776 - 17.78% Base Content Resident Unique Memory regression r=Alex_Gaynor
Until more analysis is done, add back access to com.apple.CoreServices.coreservicesd to avoid extra allocations that are triggered when the service is blocked.

Differential Revision: https://phabricator.services.mozilla.com/D12479

--HG--
extra : moz-landing-system : lando
2018-11-20 22:06:06 +00:00
Ehsan Akhgari 5a990aab93 Bug 1504728 - Part 1: Add a content blocking notification for indicating when a top-level page is using cookies or site data r=baku,valentin,johannh
Differential Revision: https://phabricator.services.mozilla.com/D11122

--HG--
extra : moz-landing-system : lando
2018-11-20 14:34:49 +00:00
Razvan Maries 208d16134b Merge mozilla-inbound to mozilla-central a=merge 2018-11-20 07:03:17 +02:00
Boris Zbarsky 9691e7ba88 Bug 1507540 part 3. Use more notxpcom attributes in netwerk/. r=valentin 2018-11-19 20:17:53 -05:00
Andreea Pavel d6d00510a1 Backed out changeset 94efd169438e (bug 1504728) for mochitest AddressSanitizer failures on a CLOSED TREE 2018-11-20 02:12:47 +02:00
Ehsan Akhgari 2517eb0fd0 Bug 1504728 - Part 1: Add a content blocking notification for indicating when a top-level page is using cookies or site data r=baku,valentin,johannh
Differential Revision: https://phabricator.services.mozilla.com/D11122

--HG--
extra : moz-landing-system : lando
2018-11-19 20:31:16 +00:00
Junior Hsu 19ef8fc9ee Bug 1321466 - provide client cert when using proxy with SSL r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D11950

--HG--
extra : moz-landing-system : lando
2018-11-17 00:28:30 +00:00
Tim Nguyen 3a94eda144 Bug 1508143 - Remove builderView and contentView from tree binding. r=bgrins
Differential Revision: https://phabricator.services.mozilla.com/D12224

--HG--
extra : moz-landing-system : lando
2018-11-19 18:04:15 +00:00
Dorel Luca 3a97449464 Backed out changeset dfc775a144ad (bug 1504728) for Brwoser-chrome failure in browser/base/content/test/trackingUI/browser_trackingUI_trackers_subview.js. CLOSED TREE 2018-11-19 18:34:50 +02:00
Ehsan Akhgari abc8be6d57 Bug 1504728 - Part 1: Add a content blocking notification for indicating when a top-level page is using cookies or site data r=baku,valentin,johannh
Differential Revision: https://phabricator.services.mozilla.com/D11122

--HG--
extra : moz-landing-system : lando
2018-11-19 15:25:33 +00:00
ffxbld e672d8f74d No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D12260

--HG--
extra : moz-landing-system : lando
2018-11-19 12:59:38 +00:00
Andreea Pavel 72b0594cb8 Merge mozilla-inbound to mozilla-central. a=merge 2018-11-17 13:27:24 +02:00
Dana Keeler 800094cafe bug 1502841 - follow-up to ensure reentering DataStorageSharedThread::Shutdown() doesn't cause problems r=jcj
We shouldn't reenter DataStorageSharedThread::Shutdown(), but it may be
possible. To guard against potentially attempting to shut down the shared thread
more than once, we can check gDataStorageSharedThreadShutDown first.

Differential Revision: https://phabricator.services.mozilla.com/D12050

--HG--
extra : moz-landing-system : lando
2018-11-16 16:14:52 +00:00
Narcis Beleuzu c8215609ff Backed out 2 changesets (bug 1504728, bug 1505198) for xpcshell failures on test_WebExtensionContentScript.js. CLOSED TREE
Backed out changeset 26318538f077 (bug 1505198)
Backed out changeset fc39602006be (bug 1504728)
2018-11-16 02:34:15 +02:00
Ehsan Akhgari 7f3a7b13de Bug 1504728 - Part 1: Add a content blocking notification for indicating when a top-level page is using cookies or site data r=baku,valentin,johannh
Differential Revision: https://phabricator.services.mozilla.com/D11122

--HG--
extra : moz-landing-system : lando
2018-11-14 17:19:25 +00:00
ffxbld d1ecdd270e No Bug, mozilla-central repo-update HSTS HPKP blocklist remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D12006

--HG--
extra : moz-landing-system : lando
2018-11-15 13:28:12 +00:00
arthur.iakab c0b26c4076 Merge inbound to mozilla-central a=merge 2018-11-15 11:54:15 +02:00
J.C. Jones 575ca0635e Bug 1501587 - land NSS 59ef418bf925 UPGRADE_NSS_RELEASE, r=me
--HG--
extra : rebase_source : eaecdaf6823452cc8bf1a90d714f29817aea677d
2018-11-16 18:24:27 +00:00
Alex Gaynor bef9ade569 Bug 1428361 - remove some 'on by default' permissions from the macOS plugin sandbox; r=haik
Differential Revision: https://phabricator.services.mozilla.com/D11892

--HG--
extra : moz-landing-system : lando
2018-11-14 16:46:05 +00:00
Coroiu Cristina 4a2f58dbb0 Merge mozilla-central to autoland a=merge on a CLOSED TREE 2018-11-14 11:58:07 +02:00
Coroiu Cristina d850d799a0 Merge inbound to mozilla-central a=merge 2018-11-14 11:51:31 +02:00
Franziskus Kiefer 4857fd3515 Bug 1505197 - allow the user to retry reauthentication on Windows 2 times r=keeler
This adds a hard coded number of retries for Windos re-auth.
I also changed to always return NS_OK unless a real error occurred to make this behave like the macOS version.

Differential Revision: https://phabricator.services.mozilla.com/D11438

--HG--
extra : moz-landing-system : lando
2018-11-14 09:07:20 +00:00
Dana Keeler d7917233cd bug 1502841 - fix a deadlock by not holding the DataStorageSharedThread lock while shutting the thread down r=jcj
Judging by some stack traces we've received in crash reports, while shutting
down the DataStorageSharedThread, it is possible to process an event on that
thread that causes an attempt to re-initialize DataStorage. This wouldn't be a
problem because we have a shutdown sentinel boolean and we exit early if it is
true. However, checking the boolean involves acquiring the static lock for the
thread, which means we can't be holding the lock while we're shutting down the
thread.

Differential Revision: https://phabricator.services.mozilla.com/D11708

--HG--
extra : moz-landing-system : lando
2018-11-14 00:28:52 +00:00
Dana Keeler 862b60c866 bug 1499882 - remove HSTS holepunch for chart.apis.google.com because it now has a valid certificate r=franziskus
Differential Revision: https://phabricator.services.mozilla.com/D11695

--HG--
extra : moz-landing-system : lando
2018-11-13 08:14:06 +00:00
Sylvestre Ledru 2b4847d320 Bug 1506538 - Remove +x permissions on C++ source files r=Ehsan
Differential Revision: https://phabricator.services.mozilla.com/D11609

--HG--
extra : moz-landing-system : lando
2018-11-13 15:32:08 +00:00
Qinghao_Jack_Song 8d34d6b733 Bug 1498451 - Migrate Device Manager Dialog of Preferences Section to use Fluent for localization r=Gijs,flod,zbraniecki
Differential Revision: https://phabricator.services.mozilla.com/D7978

--HG--
extra : moz-landing-system : lando
2018-11-12 19:34:21 +00:00
ffxbld a8c4d8395e No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D11629

--HG--
extra : moz-landing-system : lando
2018-11-12 13:57:43 +00:00
shindli 1e51b7ee7c Merge inbound to mozilla-central. a=merge 2018-11-10 23:36:30 +02:00
Gabriele Svelto d3db709684 Bug 1506264 - Fix querying the nsIObserver interface in all classes implementing it r=erahm
Differential Revision: https://phabricator.services.mozilla.com/D11530

--HG--
extra : moz-landing-system : lando
2018-11-09 22:20:54 +00:00
Dorel Luca 2f261feba3 Backed out changeset 365e0d2414bf (bug 1504728) for browser-chrome failures. CLOSED TREE 2018-11-09 18:48:39 +02:00
Ehsan Akhgari b11a25f3c6 Bug 1504728 - Add a content blocking notification for indicating when a top-level page is using cookies or site data r=baku,valentin
Differential Revision: https://phabricator.services.mozilla.com/D11122

--HG--
extra : moz-landing-system : lando
2018-11-09 15:36:02 +00:00
Haik Aftandilian b1a4ba8dff Bug 1505445 - [Mac] With sandbox early startup, start the sandbox after the port exchange r=Alex_Gaynor
Don't start the sandbox until after the port exchange so the parent process does not have to wait longer in ContentParent::LaunchSubprocess() for the (expensive) sandbox_init_with_parameters call to complete in the child. Remove the policy rule allowing access to the parent port now that it is already open when the sandbox is initialized and therefore not needed.

Differential Revision: https://phabricator.services.mozilla.com/D11186

--HG--
extra : moz-landing-system : lando
2018-11-08 21:04:19 +00:00
Ehsan Akhgari 25e7ec25bb Bug 1504728 - Part 0: Update nsSecureBrowserUIImpl::CheckForBlockedContent() to check for mixed content blocking when the resource is already marked as broken; r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D11815
2018-11-13 17:56:22 -05:00
Razvan Maries 4d174cdd7d Merge mozilla-central to mozilla-inbound. a=merge on a CLOSED TREE 2018-11-15 00:37:56 +02:00
J.C. Jones f6c4447e33 Bug 1501587 - land NSS aa7940a0d822 UPGRADE_NSS_RELEASE, r=me
--HG--
extra : rebase_source : ba3a6b2c2f6464cc3407cc7c128825964cd4d066
2018-11-14 19:00:17 +00:00
ffxbld 3a972019e4 No Bug, mozilla-central repo-update HSTS HPKP blocklist remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D11314

--HG--
extra : moz-landing-system : lando
2018-11-08 13:54:03 +00:00
Tom Ritter 24a82c667b Bug 1504022 - Backout 1498693 to restore mingw exceptions for __try/__except r=bobowen
mingw-clang, when using SEH exceptions, compile these fine but don't unwind
them properly. When using sj/lj exceptions it can't compile them at all.

--HG--
extra : histedit_source : 4bda121d4d60ab6e7cf51a3d4287261c81904fe2
2018-11-02 13:06:24 -05:00
ffxbld de627b48fd No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D10879

--HG--
extra : moz-landing-system : lando
2018-11-05 13:27:19 +00:00
Johann Hofmann 1c2de6c900 Bug 1501680 - Don't send credentials in ssl error reports. r=Gijs
Differential Revision: https://phabricator.services.mozilla.com/D10594

--HG--
extra : moz-landing-system : lando
2018-11-01 18:49:11 +00:00
Jan-Erik Rediger 50555e7773 Bug 1468761 - Migrate external Telemetry tests to handle packed histograms r=chutten
Depends on D9236

Differential Revision: https://phabricator.services.mozilla.com/D9237

--HG--
extra : moz-landing-system : lando
2018-11-01 13:46:59 +00:00
Ehsan Akhgari 164805ba94 Bug 1502774 - Part 2: Remove XPCOM component registrations for auth module classes r=valentin
Depends on D10025

Differential Revision: https://phabricator.services.mozilla.com/D10026

--HG--
extra : moz-landing-system : lando
2018-11-01 10:39:58 +00:00
ffxbld 1a798e34d6 No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D10545

--HG--
extra : moz-landing-system : lando
2018-11-01 12:52:20 +00:00
Nathan Froyd ae396f2b88 Bug 1505938 - disable spectre mitigation warnings for aarch64 windows MSVC; r=dmajor 2018-11-09 10:49:31 -05:00
Andreea Pavel 3770da1a92 Backed out 3 changesets (bug 1502774) for causing multiple crashes - bug 1503201 a=backout
Backed out changeset 6b821f5b12ae (bug 1502774)
Backed out changeset b3bf57d996a7 (bug 1502774)
Backed out changeset 32a581482291 (bug 1502774)

--HG--
rename : extensions/auth/nsIAuthModule.cpp => extensions/auth/nsAuthFactory.cpp
2018-10-30 21:18:29 +02:00
J.C. Jones 054009f29f Bug 1501587 - land NSS 3b79af0fa294 UPGRADE_NSS_RELEASE, r=me
--HG--
extra : rebase_source : 710a4c409afc9a1b0c8a77a872b04369b3d03671
2018-10-29 14:29:54 -07:00
Ehsan Akhgari 51908697bd Bug 1502774 - Part 2: Remove XPCOM component registrations for auth module classes r=valentin
Depends on D10025

Differential Revision: https://phabricator.services.mozilla.com/D10026

--HG--
extra : moz-landing-system : lando
2018-10-29 14:59:16 +00:00
Narcis Beleuzu 3467484554 Backed out 3 changesets (bug 1502774) for mingwclang bustages on include/sspi.h. CLOSED TREE
Backed out changeset a1f9c4666855 (bug 1502774)
Backed out changeset 07648e9d8400 (bug 1502774)
Backed out changeset b403c3c786ee (bug 1502774)

--HG--
rename : extensions/auth/nsIAuthModule.cpp => extensions/auth/nsAuthFactory.cpp
2018-10-29 17:01:21 +02:00
Ehsan Akhgari acc9a12f81 Bug 1502774 - Part 2: Remove XPCOM component registrations for auth module classes r=valentin
Depends on D10025

Differential Revision: https://phabricator.services.mozilla.com/D10026

--HG--
extra : moz-landing-system : lando
2018-10-29 14:40:29 +00:00
ffxbld 36c0312102 No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D10049

--HG--
extra : moz-landing-system : lando
2018-10-29 12:26:11 +00:00
Haik Aftandilian 2ca07b2f4a Bug 1502228 - [Mac] With sandbox early startup enabled, some form elements are not rendered r=Alex_Gaynor
Add the /private/var directory to the list of file-read-metadata paths to avoid rendering issues on macOS 10.14 when sandbox early startup is enabled.

Differential Revision: https://phabricator.services.mozilla.com/D9933

--HG--
extra : moz-landing-system : lando
2018-10-26 18:51:37 +00:00
Jeff Gilbert 02e6ff5ccb Bug 1499587 - Fix win64 clang-cl -Wwritable-strings. r=ted
Differential Revision: https://phabricator.services.mozilla.com/D9031

--HG--
extra : moz-landing-system : lando
2018-10-25 14:16:27 +00:00
ffxbld 705e5f8284 No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D9775

--HG--
extra : moz-landing-system : lando
2018-10-25 14:05:03 +00:00
David Keeler 7473c7494c bug 1499846 - implement user reauthentication on MacOS r=franziskus,spohl
Differential Revision: https://phabricator.services.mozilla.com/D9025

--HG--
extra : moz-landing-system : lando
2018-10-25 00:24:04 +00:00
ffxbld b260043af7 No Bug, mozilla-central repo-update HSTS HPKP remote-settings tld-suffixes - a=repo-update r=bagder,RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D9534

--HG--
extra : moz-landing-system : lando
2018-10-23 20:24:21 +00:00
Ehsan Akhgari f6b7bc0052 Bug 1501404 - Part 6: Remove the XPCOM registrations for socket provider classes r=valentin
Depends on D9574

Differential Revision: https://phabricator.services.mozilla.com/D9575

--HG--
extra : moz-landing-system : lando
2018-10-23 20:07:27 +00:00
Margareta Eliza Balazs 1a7c7d8823 Merge mozilla-central to autoland. a=merge CLOSED TREE 2018-10-23 12:31:53 +03:00
Margareta Eliza Balazs a7f4d3ba4f Merge inbound to mozilla-central. a=merge 2018-10-23 12:27:03 +03:00
Franziskus Kiefer 4c3ce53100 Bug 1498518 - user authentication prompts for Windows, r=keeler,mhowell
Depends on D8480

Differential Revision: https://phabricator.services.mozilla.com/D8530

--HG--
extra : moz-landing-system : lando
2018-10-23 09:05:07 +00:00
Dana Keeler 5af8762bc6 bug 1499766 - rework the threading model of OSKeyStore r=jcj
The original threading model of OSKeyStore could lead to a deadlock if an
asynchronous event were dispatched and then the isNSSKeyStore attribute were
queried. This patch removes that pitfall by moving the determination of the
attribute to OSKeyStore rather than the underlying implementation.

Additionally, the original threading model was inefficient in that it created
and destroyed a thread per asynchronous operation. This patch reworks this to
only ever create one worker thread.

Differential Revision: https://phabricator.services.mozilla.com/D9299

--HG--
extra : moz-landing-system : lando
2018-10-23 01:14:14 +00:00
Dana Keeler c6f2578c07 bug 1496736 - check if we actually have a new key DB before removing the old one r=jcj
In bug 1475775, we added code to remove the old NSS key DB if the user has set a
password on the grounds that the old DB could potentially be unencrypted and
contain secrets. However, we did so with the assumption that we were using the
new DB, which is not necessarily true when the system has been configured to
always use the old DB, as with some RedHat products. This patch checks for the
existence of the new DB before proceeding with deleting the old DB. Technically
this isn't sufficient, because the new DB could be present even if we're not
using it. However, we've already gone far into "this configuration isn't
supported" territory.

Differential Revision: https://phabricator.services.mozilla.com/D9318

--HG--
extra : moz-landing-system : lando
2018-10-22 19:52:10 +00:00
Timothy Guan-tin Chien b2023e958b Bug 1486954 - Part I, Encrypt credit card numbers with OS key store. r=MattN
This patch morphs MasterPassword.jsm to OSKeyStore.jsm while keeping the same
API, as an adaptor between the API and the native API exposed as nsIOSKeyStore.idl.

Noted that OS Key Store has the concept of "recovery phrase" that we won't
be adopting here. The recovery phrase, together with our label, allow
the user to re-create the same key in OS key store.

Test case changes are needed because we have started asking for login in
places where we'll only do previously when "master password is enabled".
This also made some "when master password is enabled" tests invalid because
it is always considered enabled.

Some more test changes are needed simply because they previously rely on the
stable order of microtask resolutions (and the stable # of promises for a
specific operation). That has certainly changed with OSKeyStore.

The credit card form autofill is only enabled on Nightly.

Differential Revision: https://phabricator.services.mozilla.com/D4498

--HG--
rename : browser/extensions/formautofill/MasterPassword.jsm => browser/extensions/formautofill/OSKeyStore.jsm
rename : browser/extensions/formautofill/test/browser/browser_creditCard_fill_master_password.js => browser/extensions/formautofill/test/browser/browser_creditCard_fill_cancel_login.js
extra : rebase_source : cabbd8cdec86e5b3965cf1c8b6e635b73b6c2095
extra : histedit_source : 65e71057104465553fefa1d0b293580efed53075
2018-10-17 02:31:04 +00:00
Haik Aftandilian 49e56fe77b Bug 1431441 - Part 5 - Parameterize access to the windowserver in the Mac content sandbox policy r=Alex_Gaynor
Only allow access to "com.apple.windowserver.active" when the pref
"security.sandbox.content.mac.disconnect-windowserver" is set to true.

Depends on D6721

Differential Revision: https://phabricator.services.mozilla.com/D7357

--HG--
extra : moz-landing-system : lando
2018-10-18 20:49:51 +00:00
Haik Aftandilian cf8dfa28d7 Bug 1431441 - Part 4 - ASSERT the sandbox is already enabled r=Alex_Gaynor
When early initialization of the sandbox is enabled, assert that the sandbox has already been enabled in ContentProcess::Init().

Depends on D6720

Differential Revision: https://phabricator.services.mozilla.com/D6721

--HG--
extra : moz-landing-system : lando
2018-10-18 20:47:43 +00:00
Haik Aftandilian 81b56d13a8 Bug 1431441 - Part 3 - Start the Mac content sandbox earlier r=Alex_Gaynor
Pass sandbox parameters to content processes on the command line allowing for early sandbox startup.

Pref'd off behind "security.sandbox.content.mac.earlyinit" until it's ready to be enabled by default.

Once early startup is enabled by default and considered stable, the original sandbox startup code can be removed.

Depends on D6719

Differential Revision: https://phabricator.services.mozilla.com/D6720

--HG--
extra : moz-landing-system : lando
2018-10-19 18:23:16 +00:00
Haik Aftandilian 851ee0f677 Bug 1431441 - Part 2 - Remove rules for APP_BINARY_PATH and APP_DIR Mac sandbox parameters r=Alex_Gaynor
Simplify the content sandbox policy by removing APP_BINARY_PATH and APP_DIR Mac sandbox parameters and their associated rules in the policy. Keep APP_PATH which is a parent directory of APP_BINARY_PATH and APP_DIR. Change APP_PATH to be the path to the parent process .app directory and make GetAppPath return this path when called from the parent or a child process.

Depends on D6717

Differential Revision: https://phabricator.services.mozilla.com/D6719

--HG--
extra : moz-landing-system : lando
2018-10-19 18:23:06 +00:00
ffxbld a57a738829 No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=mtabara
Differential Revision: https://phabricator.services.mozilla.com/D9376

--HG--
extra : moz-landing-system : lando
2018-10-22 12:13:22 +00:00
Kershaw Chang 8d4d50662c Bug 1219935 - Skip OCSP request if PAC download is in progress r=keeler,bagder
This is a straightforward patch.
Just add a new attribute in nsIProtocolProxyService to indicate whether PAC is still loading. If yes, fail the OCSP request.

Differential Revision: https://phabricator.services.mozilla.com/D9154

--HG--
extra : moz-landing-system : lando
2018-10-22 09:07:51 +00:00
Johann Hofmann d7b28163d3 Bug 1500020 - Update cert error page copy based on UX suggestions. r=nhnt11
Differential Revision: https://phabricator.services.mozilla.com/D9080

--HG--
extra : moz-landing-system : lando
2018-10-19 14:50:59 +00:00
Mark Banner ceaeb93550 Bug 1486741 - Enable ESLint rule comma-dangle for all of mozilla-central (automatic fixes). r=mossop
Differential Revision: https://phabricator.services.mozilla.com/D8389

--HG--
extra : moz-landing-system : lando
2018-10-19 12:55:39 +00:00
Cosmin Sabou d3c64e672f Merge mozilla-central to autoland. a=merge 2018-10-19 00:57:18 +03:00
Dana Keeler 1ccf5dc900 bug 1498686 - avoid acquiring TransportSecurityInfo::mMutex in hot code r=jesup,jcj
Before this patch, Necko functions polling the state of TLS sockets
(essentially, TransportSecurityInfo) would cause a considerable amount of
locking on TransportSecurityInfo::mMutex instances via GetErrorCode(). Most of
this code only cared if an error had been set via SetCanceled(), so this patch
adds an atomic boolean mCanceled (and associated accessor GetCanceled()) that
can be used to the same effect but without acquiring the lock.

Differential Revision: https://phabricator.services.mozilla.com/D8754

--HG--
extra : moz-landing-system : lando
2018-10-18 20:08:02 +00:00
Chris Martin deeb744526 Bug 1496364 - Minor refactor to stop uninitialized variable warning r=handyman
The compiler warns that jobLevel is uninitialized if none of the if-else
conditions are true. Simply replacing the leading assert with a
"else crash" tells the compiler that case will never actually happen.

Differential Revision: https://phabricator.services.mozilla.com/D8841

--HG--
extra : moz-landing-system : lando
2018-10-18 19:14:05 +00:00
David Parks 8ad763743e Bug 1426733: Use restricting SIDs in Windows NPAPI process sandbox (r=bobowen)
Allow NPAPI sandbox to use restricting SIDs.  This hardens the plugin sandbox.

Differential Revision: https://phabricator.services.mozilla.com/D8746

--HG--
extra : moz-landing-system : lando
2018-10-18 16:27:56 +00:00
Ciure Andrei bae4d8bacf Merge mozilla-central to mozilla-inbound. a=merge CLOSED TREE 2018-10-18 19:40:31 +03:00
ffxbld 74122af621 No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D9085

--HG--
extra : moz-landing-system : lando
2018-10-18 12:21:07 +00:00
Margareta Eliza Balazs f4ce95166f Merge autoland to mozilla-central. a=merge 2018-10-18 13:19:19 +03:00
Margareta Eliza Balazs 53fc8ddacd Backed out 4 changesets (bug 1486954) for hangs on Linux. a=backout
Backed out changeset c895888bdddc (bug 1486954)
Backed out changeset 27e9286503e8 (bug 1486954)
Backed out changeset 87e64652386d (bug 1486954)
Backed out changeset 96a6e1ceb697 (bug 1486954)

--HG--
rename : browser/extensions/formautofill/OSKeyStore.jsm => browser/extensions/formautofill/MasterPassword.jsm
rename : browser/extensions/formautofill/test/browser/browser_creditCard_fill_cancel_login.js => browser/extensions/formautofill/test/browser/browser_creditCard_fill_master_password.js
2018-10-18 12:40:21 +03:00
Dana Keeler d4ce8fc140 bug 1497555 - filter out same-document location changes in nsSecureBrowserUIImpl::OnLocationChange r=Ehsan
If nsSecureBrowserUIImpl::OnLocationChange receives a
LOCATION_CHANGE_SAME_DOCUMENT notification, it doesn't need to (and in fact
shouldn't) update its security state or notify downstream listeners.

Differential Revision: https://phabricator.services.mozilla.com/D8900

--HG--
extra : moz-landing-system : lando
2018-10-17 21:38:24 +00:00
Nick Alexander d56eb2a314 Bug 1489443 - Set GCC_USE_GNU_LD based on linker kind. r=froydnj
The desired outcome of this change is that we'll set
-Wl,--version-script based on linker kind and not on the output of
$LINKER -v.

This is a cheap way to address a simple problem that has a complicated
ideal solution. The underlying issue is that in some situations, when
targeting Android, a macOS system ld is interrogated to determine if
a cross-compiling linker "is GNU ld" and a particular linker feature
is set in that situation. The macOS system ld doesn't pass the "is
GNU ld" test, and the linker feature isn't set; that causes link
failures, even though the actual linker has nothing to do with the
system ld.

The ideal solution is to test for linker capabilities dynamically. We
do a lot of that in old-configure.in, and we don't do any of that in
toolchain.configure. Rather than start testing in
toolchain.configure, we hard-code: a cheap solution to the immediate
problem.

MinGW suffers somewhat from the opposite problem: the linker "is GNU
ld" (compatible), but the linker checks don't happen at all. We hard-code
for MinGW based on the C compiler instead.

Differential Revision: https://phabricator.services.mozilla.com/D8471

--HG--
extra : moz-landing-system : lando
2018-10-17 19:46:03 +00:00
Dana Keeler c4dab46f9c bug 1497258 - remove unsound OCSP assertion from NSSCertDBTrustDomain::CheckRevocation r=mayhemer
In reimplementing the OCSP fetching code in bug 1456489, we improperly
translated an assertion that relied on the nullness of a pointer to rely on the
length of a data structure that was populated by reference. It turns out that
this made the assertion invalid because we could return a successful result and
have filled the data structure with zero-length data and it still would be valid
to operate on (the decoding code returns a malformed input result in this case).
To fix this, we can simply remove the assertion. This patch also adds a test to
exercise this case.

Differential Revision: https://phabricator.services.mozilla.com/D8883

--HG--
extra : moz-landing-system : lando
2018-10-17 19:35:28 +00:00
Paolo Amadini 3a2f47fd3f Bug 1428869 - Use html:progress in front-end code. r=bgrins,Gijs
Differential Revision: https://phabricator.services.mozilla.com/D9009

--HG--
extra : rebase_source : 0e2d20dc6060a4c0ee278ef05d67668aec12e64f
2018-10-18 15:41:21 +01:00
Johann Hofmann a63c05f4b8 Bug 1484255 - Add Telemetry Events for the certificate error pages. r=nhnt11,keeler
Differential Revision: https://phabricator.services.mozilla.com/D8281

--HG--
extra : moz-landing-system : lando
2018-10-17 13:10:26 +00:00
Csoregi Natalia eef79962ba Merge inbound to mozilla-central. a=merge 2018-10-17 13:03:35 +03:00
Timothy Guan-tin Chien f47a796bf6 Bug 1486954 - Part I, (Nighty-only feature) Encrypt credit card numbers with OS key store r=MattN
This patch morphs MasterPassword.jsm to OSKeyStore.jsm while keeping the same
API, as an adaptor between the API and the native API exposed as nsIOSKeyStore.idl.

Noted that OS Key Store has the concept of "recovery phrase" that we won't
be adopting here. The recovery phrase, together with our label, allow
the user to re-create the same key in OS key store.

Test case changes are needed because we have started asking for login in
places where we'll only do previously when "master password is enabled".
This also made some "when master password is enabled" tests invalid because
it is always considered enabled.

Some more test changes are needed simply because they previously rely on the
stable order of microtask resolutions (and the stable # of promises for a
specific operation). That has certainly changed with OSKeyStore.

The credit card form autofill is only enabled on Nightly.

Differential Revision: https://phabricator.services.mozilla.com/D4498

--HG--
rename : browser/extensions/formautofill/MasterPassword.jsm => browser/extensions/formautofill/OSKeyStore.jsm
rename : browser/extensions/formautofill/test/browser/browser_creditCard_fill_master_password.js => browser/extensions/formautofill/test/browser/browser_creditCard_fill_cancel_login.js
extra : moz-landing-system : lando
2018-10-17 02:31:04 +00:00
Cosmin Sabou 5f9d087c63 Merge mozilla-central to autoland. a=merge 2018-10-16 19:27:54 +03:00
Dana Keeler e7838236e8 bug 1498351 - add interface to allow OS-specific user re-authentication r=franziskus
This patch introduces the interface with a stub implementation that does
nothing. Follow-up bugs will add platform-specific implementations.

Differential Revision: https://phabricator.services.mozilla.com/D8480

--HG--
extra : moz-landing-system : lando
2018-10-16 16:06:30 +00:00
Noemi Erli 43a767902f Merge inbound to mozilla-central. a=merge 2018-10-16 07:27:42 +03:00
Ciure Andrei 673efa0461 Backed out changeset 1119f9458b5d (bug 1484255) for browser_aboutCertError_telemetry.js failures CLOSED TREE 2018-10-16 03:33:42 +03:00
Johann Hofmann 9f4cd70201 Bug 1484255 - Add Telemetry Events for the certificate error pages. r=nhnt11,keeler
Differential Revision: https://phabricator.services.mozilla.com/D8281

--HG--
extra : moz-landing-system : lando
2018-10-15 23:00:08 +00:00
Noemi Erli f63cc2b795 Merge mozilla-central to autoland. a=merge CLOSED TREE 2018-10-16 01:21:28 +03:00
Noemi Erli 014b37a409 Merge inbound to mozilla-central. a=merge 2018-10-16 01:20:08 +03:00
Dana Keeler b2486273b8 bug 1391207 - error pages are always not secure r=Gijs
Before this patch, if a TLS handshake completed but the server then closed the
connection without reading or writing, Firefox would display a connection reset
error page with a secure lock icon. This is misleading and confusing, so in this
patch, nsSecureBrowserUIImpl::OnLocationChange checks if an error page is being
loaded and sets the state to not secure.

Differential Revision: https://phabricator.services.mozilla.com/D8472

--HG--
extra : moz-landing-system : lando
2018-10-15 19:34:14 +00:00
Tom Ritter cc01d26509 Bug 1498694 Revert the patch that relaxes the MSVC requirement (1431807) since mingw-clang passes it now r=bobowen 2018-10-12 13:45:49 -05:00
ffxbld 7266b6209a No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D8712

--HG--
extra : moz-landing-system : lando
2018-10-15 12:23:43 +00:00
Tom Ritter 8ae788d2db Bug 1498693 - Revert the other part of 1431803, since mingw-clang can handle it now r=bobowen 2018-10-12 13:44:37 -05:00
Tom Ritter 8626230808 Bug 1498672 Include string.h explicitly instead of relying on algorithm to bring it in r=bobowen
The mingw-clang build was broken because the dependency wasn't specified explicitly.
2018-10-12 12:55:16 -05:00
Narcis Beleuzu a2990eb898 Backed out 7 changesets (bug 1431441) as per haik`s request.
Backed out changeset 1dfdc7ba998d (bug 1431441)
Backed out changeset fb1a4ddbf9bf (bug 1431441)
Backed out changeset b59b1651fc15 (bug 1431441)
Backed out changeset 1e2bb579b824 (bug 1431441)
Backed out changeset 2a635530dfa3 (bug 1431441)
Backed out changeset 262da0be2fed (bug 1431441)
Backed out changeset b9cfda58fed3 (bug 1431441)

--HG--
extra : rebase_source : 7baf60c49683b419c0603979b0dff3befb2fbaf0
2018-10-14 18:20:01 +03:00
Cosmin Sabou 9b6a537ec7 Backed out changeset 91300d29898b (bug 1489443) for MinGW build bustages. CLOSED TREE 2018-10-13 02:17:15 +03:00
Nick Alexander 3c83541616 Bug 1489443 - Set GCC_USE_GNU_LD based on linker kind. r=froydnj
The desired outcome of this change is that we'll set
`-Wl,--version-script` based on linker kind and not on the output of
`$LINKER -v`.

This is a cheap way to address a simple problem that has a complicated
ideal solution.  The underlying issue is that in some situations, when
targeting Android, a macOS system `ld` is interrogated to determine if
a cross-compiling linker "is GNU ld" and a particular linker feature
is set in that situation.  The macOS system `ld` doesn't pass the "is
GNU ld" test, and the linker feature isn't set; that causes link
failures, even though the actual linker has nothing to do with the
system `ld`.

The ideal solution is to test for linker capabilities dynamically.  We
do a lot of that in old-configure.in, and we don't do any of that in
toolchain.configure.  Rather than start testing in
toolchain.configure, we hard-code: a cheap solution to the immediate
problem.

Differential Revision: https://phabricator.services.mozilla.com/D8471

--HG--
extra : moz-landing-system : lando
2018-10-12 22:38:44 +00:00
David Parks 99e17d748f Bug 1488439: Part 1 - Replace Windows temp folder in sandboxed plugin process (r=bobowen,erahm)
The sandbox blocks GetTempFileName's prior response, causing the system to end up searching a number of (inaccessible) folders to use as a replacement for the temp folder.  This patch provides a path to a new folder on the command line for the plugin process.  This new temp folder, specific to this plugin process instance, is then communicated to the system via the TEMP/TMP environment variables.  This is similar to what is done for the content process but avoids nsDirectoryService, which doesn't exist in plugin processes.

Differential Revision: https://phabricator.services.mozilla.com/D7532

--HG--
extra : moz-landing-system : lando
2018-10-12 22:36:22 +00:00
shindli 6b3bca7b14 Merge mozilla-central to inbound. a=merge CLOSED TREE 2018-10-17 03:59:39 +03:00
Martin Thomson 5862d1a3b4 Bug 1488622 - Update NSS to 704d253fa016, UPGRADE_NSS_RELEASE, r=me
MozReview-Commit-ID: JVXe36Pq0We
2018-10-17 10:00:48 +11:00
Razvan Maries a8f2202396 Merge mozilla-central to mozilla-inbound. a=merge on a CLOSED TREE 2018-12-14 18:35:20 +02:00
Bob Owen 6c01f6d0bd Bug 1481518 part 2: Enable aarch64 Windows chromium sandbox code. r=froydnj 2018-12-14 13:07:35 +00:00
Bob Owen f71af67dbf Bug 1481518 part 1: Add aarch64 Windows support to the chromium sandbox code. r=handyman
This patch includes the changes that Microsoft landed for the sandbox along
with other changes to the supporting base files that they depend upon.
2018-12-14 13:07:35 +00:00
Tom Ritter 4c8004df52 Bug 1498695 Revert casting to void* (1462100) because mingwclang doesn't need to do that. r=bobowen 2018-10-16 11:33:32 +03:00
Coroiu Cristina 4224edc453 Backed out 2 changesets (bug 1488439) for build bustage at /build/src/dom/plugins/ipc/PluginProcessParent.cpp on a CLOSED TREE
Backed out changeset 74b2087ee696 (bug 1488439)
Backed out changeset 85575fc37555 (bug 1488439)
2018-10-12 21:00:41 +03:00
David Parks 1ad569c6b1 Bug 1488439: Part 1 - Replace Windows temp folder in sandboxed plugin process (r=bobowen,erahm)
The sandbox blocks GetTempFileName's prior response, causing the system to end up searching a number of (inaccessible) folders to use as a replacement for the temp folder.  This patch provides a path to a new folder on the command line for the plugin process.  This new temp folder, specific to this plugin process instance, is then communicated to the system via the TEMP/TMP environment variables.  This is similar to what is done for the content process but avoids nsDirectoryService, which doesn't exist in plugin processes.

Differential Revision: https://phabricator.services.mozilla.com/D7532

--HG--
extra : moz-landing-system : lando
2018-10-12 17:40:10 +00:00
Csoregi Natalia 0405a5a7d2 Merge mozilla-central to autoland. CLOSED TREE 2018-10-12 19:58:03 +03:00
Haik Aftandilian fd43db7f44 Bug 1431441 - Part 5 - Parameterize access to the windowserver in the Mac content sandbox policy r=Alex_Gaynor
Only allow access to "com.apple.windowserver.active" when the pref
"security.sandbox.content.mac.disconnect-windowserver" is set to true.

Depends on D6721

Differential Revision: https://phabricator.services.mozilla.com/D7357

--HG--
extra : moz-landing-system : lando
2018-10-11 22:49:44 +00:00
Haik Aftandilian e5a942f82a Bug 1431441 - Part 4 - ASSERT the sandbox is already enabled r=Alex_Gaynor
When early initialization of the sandbox is enabled, assert that the sandbox has already been enabled in ContentProcess::Init().

Depends on D6720

Differential Revision: https://phabricator.services.mozilla.com/D6721

--HG--
extra : moz-landing-system : lando
2018-10-11 22:46:29 +00:00
Haik Aftandilian b9bdcdedb1 Bug 1431441 - Part 3 - Start the Mac content sandbox earlier r=Alex_Gaynor
Pass sandbox parameters to content processes on the command
line allowing for early sandbox startup. Limited to Nightly
until confirmed to be stable and ready to ride the trains.

Enable early sandbox startup by default on Nightly and use
pref "security.sandbox.content.mac.earlyinit" to disable
early startup for debugging purposes.

Once early startup is stable, the original sandbox startup
code can be removed.

Depends on D6719

Differential Revision: https://phabricator.services.mozilla.com/D6720

--HG--
extra : moz-landing-system : lando
2018-10-11 22:44:25 +00:00
Haik Aftandilian a710b03285 Bug 1431441 - Part 2 - Remove rules for APP_BINARY_PATH and APP_DIR Mac sandbox parameters r=Alex_Gaynor
Simplify the content sandbox policy by removing APP_BINARY_PATH and APP_DIR Mac sandbox parameters and their associated rules in the policy. Keep APP_PATH which is a parent directory of APP_BINARY_PATH and APP_DIR.

Depends on D6717

Differential Revision: https://phabricator.services.mozilla.com/D6719

--HG--
extra : moz-landing-system : lando
2018-10-11 22:42:24 +00:00
Paolo Amadini 5cbdb109d0 Bug 1498258 - Remove grouping from the PSM dialogs. r=mayhemer
Differential Revision: https://phabricator.services.mozilla.com/D8394

--HG--
extra : source : e70c545bc0333a7b28bc2aac9f86f38b88a67c97
2018-10-11 16:09:16 +01:00
Narcis Beleuzu e09f2e2622 Merge mozilla-central to inbound. a=merge CLOSED TREE 2018-10-12 06:53:11 +03:00
Narcis Beleuzu c31a01ef52 Merge mozilla-central to autoland. a=merge CLOSED TREE 2018-10-12 00:57:21 +03:00
Narcis Beleuzu d30168f45c Merge inbound to mozilla-central. a=merge 2018-10-12 00:48:03 +03:00
Dana Keeler 5af51d1085 bug 1495321 - only allow https URIs to be considered secure in nsSecureBrowserUIImpl r=Gijs
Summary:
Resources that aren't secure (e.g. http) can be routed over secure transports
(e.g. http/2 alt-svc, https proxies). For display purposes (the site identity
widget) we don't want to treat these as secure. Bug 1040323 addressed this exact
issue but didn't include tests. Thus, when nsSecureBrowserUIImpl was
reimplemented in bug 832834, this aspect was neglected. This time, there is a
test.

Reviewers: Gijs

Tags: #secure-revision

Bug #: 1495321

Differential Revision: https://phabricator.services.mozilla.com/D7746

--HG--
extra : rebase_source : e17ec47938f41a692b41a7cf65f1d5e4b880e8a7
extra : amend_source : c445c2f5c7eff94be027e238c2f2befc91b3905a
2018-10-11 10:07:49 -07:00
Dana Keeler 361deac7ee bug 1478480 - enable GlobalSign Root CA - R6 for EV in PSM r=franziskus
This patch also switches all GlobalSign EV roots to using the CA/Browser Forum
EV policy OID.

Differential Revision: https://phabricator.services.mozilla.com/D8258

--HG--
extra : moz-landing-system : lando
2018-10-11 07:12:48 +00:00
ffxbld ba5c8367b3 No Bug, mozilla-central repo-update HSTS HPKP blocklist remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D8370

--HG--
extra : moz-landing-system : lando
2018-10-11 12:54:54 +00:00
Ciure Andrei 9dc058058c Backed out changeset 6af35f6a050f (bug 1488439) for PluginProcessParent.cpp build bustages CLOSED TREE 2018-10-10 23:47:57 +03:00
David Parks cdf3ac5659 Bug 1488439: Part 1 - Replace Windows temp folder in sandboxed plugin process (r=bobowen,erahm)
The sandbox blocks GetTempFileName's prior response, causing the system to end up searching a number of (inaccessible) folders to use as a replacement for the temp folder.  This patch provides a path to a new folder on the command line for the plugin process.  This new temp folder, specific to this plugin process instance, is then communicated to the system via the TEMP/TMP environment variables.  This is similar to what is done for the content process but avoids nsDirectoryService, which doesn't exist in plugin processes.

Differential Revision: https://phabricator.services.mozilla.com/D7532

--HG--
extra : moz-landing-system : lando
2018-10-10 20:16:22 +00:00
Noemi Erli a9748223c6 Merge inbound to mozilla-central. a=merge 2018-10-09 07:03:30 +03:00
ffxbld aad29c0aa1 No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D7993

--HG--
extra : moz-landing-system : lando
2018-10-08 21:16:08 +00:00
Dana Keeler a11a0d5952 bug 1343927 - add utility function to verify binary transparency inclusion proofs r=franziskus,jcj
Differential Revision: https://phabricator.services.mozilla.com/D7669

--HG--
extra : moz-landing-system : lando
2018-10-08 20:37:20 +00:00
Noemi Erli 4b6737ba40 Merge inbound to mozilla-central. a=merge 2018-10-06 12:27:35 +03:00
Gregory Mierzwinski 19ecc0e49a Bug 1496791 - Disable linux64-jsdcov completely. r=jmaher
This patch removes linux64-jsdcov from the available builds on taskcluster along with any hacks used to run it. It also removes any 'coverage' entries that were added to skip tests.

Differential Revision: https://phabricator.services.mozilla.com/D7919

--HG--
extra : moz-landing-system : lando
2018-10-05 21:06:25 +00:00
Dana Keeler 879dd8b15e bug 1496340 - make sure each nsISupports is an nsIX509Cert in nsNSSCertList::Read r=jcj
Reviewers: jcj

Tags: #secure-revision

Bug #: 1496340

Differential Revision: https://phabricator.services.mozilla.com/D7803

--HG--
extra : rebase_source : 928faeb3d071ea12dd8b3e7bc2261bb4260d793b
extra : amend_source : 458e1a7794ea73c3f709a60594e21f8cca4ac907
2018-10-04 16:30:50 -07:00
Csoregi Natalia 9d55d83f31 Merge inbound to mozilla-central. a=merge 2018-10-05 01:29:38 +03:00
J.C. Jones dad8ff2db4 Bug 1496467 - Enable Symantec Distrust in Firefox 64 r=keeler
The symantec distrust should now ride-the-trains in Firefox 64 Beta and Release.
Set security.pki.distrust_ca_policy to 2.

Differential Revision: https://phabricator.services.mozilla.com/D7745

--HG--
extra : moz-landing-system : lando
2018-10-04 17:48:53 +00:00
J.C. Jones 0e1d7b0f31 Bug 1488622 - land NSS dc4500650617 UPGRADE_NSS_RELEASE, r=me
--HG--
extra : rebase_source : 9872909728a147458f9abc4da053eb934e6b9fc2
2018-10-04 08:39:38 -07:00
ffxbld 073a4836d6 No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D7716

--HG--
extra : moz-landing-system : lando
2018-10-04 12:48:56 +00:00
Tiberius Oros 3edd9afbe3 Backed out 5 changesets (bug 1431441) for failing devtools at client/debugger/new/test/mochitest/browser_dbg_rr_breakpoints-01.js on OSX opt a=backout
Backed out changeset 94a1d1d67191 (bug 1431441)
Backed out changeset be7ec7438701 (bug 1431441)
Backed out changeset db6b7ee04187 (bug 1431441)
Backed out changeset f61ec0f140c2 (bug 1431441)
Backed out changeset ac51f86f5cac (bug 1431441)
2018-10-03 09:39:01 +03:00
Haik Aftandilian 70da961450 Bug 1431441 - Part 5 - Parameterize access to the windowserver in the Mac content sandbox policy r=Alex_Gaynor
Only allow access to "com.apple.windowserver.active" when the pref
"security.sandbox.content.mac.disconnect-windowserver" is set to true.

Depends on D6721

Differential Revision: https://phabricator.services.mozilla.com/D7357

--HG--
extra : moz-landing-system : lando
2018-10-02 19:43:06 +00:00
Haik Aftandilian 7977abcd65 Bug 1431441 - Part 4 - ASSERT the sandbox is already enabled r=Alex_Gaynor
When early initialization of the sandbox is enabled, assert that the sandbox has already been enabled in ContentProcess::Init().

Depends on D6720

Differential Revision: https://phabricator.services.mozilla.com/D6721

--HG--
extra : moz-landing-system : lando
2018-10-02 19:41:30 +00:00
Haik Aftandilian ef9150c083 Bug 1431441 - Part 3 - Start the Mac content sandbox earlier r=Alex_Gaynor
Pass sandbox parameters to content processes on the command
line allowing for early sandbox startup. Limited to Nightly
until confirmed to be stable and ready to ride the trains.

Enable early sandbox startup by default on Nightly and use
pref "security.sandbox.content.mac.earlyinit" to disable
early startup for debugging purposes.

Once early startup is stable, the original sandbox startup
code can be removed.

Depends on D6719

Differential Revision: https://phabricator.services.mozilla.com/D6720

--HG--
extra : moz-landing-system : lando
2018-10-02 20:29:46 +00:00
Haik Aftandilian a99a3fe58d Bug 1431441 - Part 2 - Remove rules for APP_BINARY_PATH and APP_DIR Mac sandbox parameters r=Alex_Gaynor
Simplify the content sandbox policy by removing APP_BINARY_PATH and APP_DIR Mac sandbox parameters and their associated rules in the policy. Keep APP_PATH which is a parent directory of APP_BINARY_PATH and APP_DIR.

Depends on D6717

Differential Revision: https://phabricator.services.mozilla.com/D6719

--HG--
extra : moz-landing-system : lando
2018-10-02 19:40:46 +00:00
Daniel Varga 2e77181988 Merge mozilla-central to autoland. a=merge on a CLOSED TREE
--HG--
extra : rebase_source : 62429b85fcd6af71ca898dc36c3f0f4a2c4ee5ae
2018-10-03 00:49:53 +03:00
Dana Keeler 9c05614e43 bug 1493427 - use the docShell to call OnSecurityChange in nsSecureBrowserUIImpl::OnLocationChange r=Gijs
When navigating to an about: page that doesn't exist (e.g.
"about:somethingthatdoesnotexist"), the docShell will call
nsSecureBrowserUIImpl::OnLocationChange with a request that is null.
Consequently, we can't use that to QueryInterface to a nsISecurityEventSink to
call OnSecurityChange. The previous implementation would use the prior
request's nsISecurityEventSink, which was a bug but luckily this produced the
correct behavior. Since the original docShell the nsSecureBrowserUIImpl was
initialized with is what needs to be notified, we can just QueryInterface that
to an nsISecurityEventSink and call OnSecurityChange directly instead.

Differential Revision: https://phabricator.services.mozilla.com/D6951

--HG--
rename : browser/base/content/test/siteIdentity/browser_tls_handshake_failure.js => browser/base/content/test/siteIdentity/browser_navigation_failures.js
extra : moz-landing-system : lando
2018-10-02 20:26:40 +00:00
Gurzau Raul ede1418858 Merge mozilla-central to inbound. a=merge CLOSED TREE 2018-10-02 19:08:39 +03:00
Andrew McCreight 837f0af066 Bug 1493737 - Fix many trivial calls to do_QueryInterface r=smaug
If class A is derived from class B, then an instance of class A can be
converted to B via a static cast, so a slower QI is not needed.

Differential Revision: https://phabricator.services.mozilla.com/D6861

--HG--
extra : moz-landing-system : lando
2018-10-01 21:38:01 +00:00
Brindusan Cristian 9b5034705f Merge mozilla-central to autoland. a=merge CLOSED TREE 2018-10-02 01:04:29 +03:00
Brindusan Cristian f8087305eb Merge inbound to mozilla-central. a=merge 2018-10-02 00:55:00 +03:00
Dana Keeler 0c4b612622 Bug 1493788 - remove other mozilla-specific dependencies from certificate transparency implementation r=jcj
This patch removes the remaining mozilla-specific dependencies from the
certificate transparency implementation.

Depends on D6845

Differential Revision: https://phabricator.services.mozilla.com/D6846

--HG--
extra : moz-landing-system : lando
2018-10-01 16:20:57 +00:00
Dana Keeler 1661adeb86 Bug 1493788 - convert mozilla::Vector to std::vector in certificate transparency implementation r=jcj
In order to make our certificate transparency implementation standalone, we
have to remove mozilla-specific dependencies such as mozilla::Vector.

Depends on D6844

Differential Revision: https://phabricator.services.mozilla.com/D6845

--HG--
extra : moz-landing-system : lando
2018-10-01 20:27:13 +00:00
Dana Keeler 24a8ad1851 Bug 1493788 - move certificate/binary transparency implementation to its own directory r=jcj
Our current certificate transparency implementation (and the start of the binary
transparency implementation) can almost be used by itself as a standalone
library (for comparison, mozilla::pkix already has this property, as evidenced
by the "Library('mozillapkix')" line in security/pkix/moz.build and the
"'mozillapkix'" line in the USE_LIBS section of
security/manager/ssl/tests/unit/tlsserver/cmd/moz.build).

These changes make this code re-usable as a library so that we'll be able to use
it in the updater to verify binary/certificate transparency information.

This first patch simply moves the code to its own directory.

Differential Revision: https://phabricator.services.mozilla.com/D6844

--HG--
rename : security/certverifier/BTInclusionProof.h => security/ct/BTInclusionProof.h
rename : security/certverifier/BTVerifier.cpp => security/ct/BTVerifier.cpp
rename : security/certverifier/BTVerifier.h => security/ct/BTVerifier.h
rename : security/certverifier/Buffer.cpp => security/ct/Buffer.cpp
rename : security/certverifier/Buffer.h => security/ct/Buffer.h
rename : security/certverifier/CTDiversityPolicy.cpp => security/ct/CTDiversityPolicy.cpp
rename : security/certverifier/CTDiversityPolicy.h => security/ct/CTDiversityPolicy.h
rename : security/certverifier/CTKnownLogs.h => security/ct/CTKnownLogs.h
rename : security/certverifier/CTLog.h => security/ct/CTLog.h
rename : security/certverifier/CTLogVerifier.cpp => security/ct/CTLogVerifier.cpp
rename : security/certverifier/CTLogVerifier.h => security/ct/CTLogVerifier.h
rename : security/certverifier/CTObjectsExtractor.cpp => security/ct/CTObjectsExtractor.cpp
rename : security/certverifier/CTObjectsExtractor.h => security/ct/CTObjectsExtractor.h
rename : security/certverifier/CTPolicyEnforcer.cpp => security/ct/CTPolicyEnforcer.cpp
rename : security/certverifier/CTPolicyEnforcer.h => security/ct/CTPolicyEnforcer.h
rename : security/certverifier/CTSerialization.cpp => security/ct/CTSerialization.cpp
rename : security/certverifier/CTSerialization.h => security/ct/CTSerialization.h
rename : security/certverifier/CTUtils.h => security/ct/CTUtils.h
rename : security/certverifier/CTVerifyResult.cpp => security/ct/CTVerifyResult.cpp
rename : security/certverifier/CTVerifyResult.h => security/ct/CTVerifyResult.h
rename : security/certverifier/MultiLogCTVerifier.cpp => security/ct/MultiLogCTVerifier.cpp
rename : security/certverifier/MultiLogCTVerifier.h => security/ct/MultiLogCTVerifier.h
rename : security/certverifier/SignedCertificateTimestamp.cpp => security/ct/SignedCertificateTimestamp.cpp
rename : security/certverifier/SignedCertificateTimestamp.h => security/ct/SignedCertificateTimestamp.h
rename : security/certverifier/SignedTreeHead.h => security/ct/SignedTreeHead.h
rename : security/certverifier/moz.build => security/ct/moz.build
rename : security/certverifier/tests/gtest/BTSerializationTest.cpp => security/ct/tests/gtest/BTSerializationTest.cpp
rename : security/certverifier/tests/gtest/CTDiversityPolicyTest.cpp => security/ct/tests/gtest/CTDiversityPolicyTest.cpp
rename : security/certverifier/tests/gtest/CTLogVerifierTest.cpp => security/ct/tests/gtest/CTLogVerifierTest.cpp
rename : security/certverifier/tests/gtest/CTObjectsExtractorTest.cpp => security/ct/tests/gtest/CTObjectsExtractorTest.cpp
rename : security/certverifier/tests/gtest/CTPolicyEnforcerTest.cpp => security/ct/tests/gtest/CTPolicyEnforcerTest.cpp
rename : security/certverifier/tests/gtest/CTSerializationTest.cpp => security/ct/tests/gtest/CTSerializationTest.cpp
rename : security/certverifier/tests/gtest/CTTestUtils.cpp => security/ct/tests/gtest/CTTestUtils.cpp
rename : security/certverifier/tests/gtest/CTTestUtils.h => security/ct/tests/gtest/CTTestUtils.h
rename : security/certverifier/tests/gtest/MultiLogCTVerifierTest.cpp => security/ct/tests/gtest/MultiLogCTVerifierTest.cpp
rename : security/certverifier/tests/gtest/moz.build => security/ct/tests/gtest/moz.build
extra : moz-landing-system : lando
2018-10-01 16:20:41 +00:00
Julien Vehent 92ca2d1e89 Bug 1494431 - Pin *.firefox.com to mozilla services whitelisted roots r=keeler,jcj
Put the entire *.firefox.com domain in the list of sites covered by the mozilla services whitelisted roots, which currently include Digicert and Let's Encrypt.

Differential Revision: https://phabricator.services.mozilla.com/D7219

--HG--
extra : moz-landing-system : lando
2018-09-28 23:37:51 +00:00
ffxbld 428aa0f16f No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D7276

--HG--
extra : moz-landing-system : lando
2018-10-01 12:34:47 +00:00
trisha 565dcd8412 Bug 1484761 - Change "security certificates" to "certificates" on the new cert error pages r=johannh
--HG--
extra : rebase_source : a48cbe38cbbaa7d5c0190af83dcc54fd37876526
2018-09-27 17:04:41 +08:00
EKR 030f8b7c79 Bug 1495120 - Wire up ESNI r=dragana
Differential Revision: https://phabricator.services.mozilla.com/D7221

--HG--
extra : source : d2edbb87f3d283ab2c2fb6f8ad3408f792a6bd27
2018-09-28 22:37:20 +00:00
J.C. Jones b5cc135a82 Bug 1488622 - land NSS 94bcc2706b98 UPGRADE_NSS_RELEASE, r=me
--HG--
extra : rebase_source : 761520ca901dabbf0a908a886732155d0d40d468
2018-10-01 07:44:32 -07:00
arthur.iakab f0410f8d4b Merge mozilla-central to mozilla-inbound 2018-09-29 01:00:35 +03:00
Ehsan Akhgari 5f0be07390 Bug 1493563 - Part 5: Present the old state and the content blocking log to the web progress listeners; r=baku
Differential Revision: https://phabricator.services.mozilla.com/D6595
2018-09-28 14:46:02 -04:00
Ehsan Akhgari 355485be9f Bug 1493563 - Part 4: Present the old state and the content blocking log to the security event sink; r=baku
Differential Revision: https://phabricator.services.mozilla.com/D6594
2018-09-28 14:46:02 -04:00
Noemi Erli 4419e20e14 Backed out 12 changesets (bug 1493563) for failures in test_css-logic-getCssPath.html CLOSED TREE
Backed out changeset d2e83655082f (bug 1493563)
Backed out changeset 1ce58f004593 (bug 1493563)
Backed out changeset 344298c73ee7 (bug 1493563)
Backed out changeset 02b8b073f7d7 (bug 1493563)
Backed out changeset 3ef707008502 (bug 1493563)
Backed out changeset bb2720a401fe (bug 1493563)
Backed out changeset ce0211be57a1 (bug 1493563)
Backed out changeset 83d6c2bf8dc6 (bug 1493563)
Backed out changeset 1844af4cc25b (bug 1493563)
Backed out changeset c8ab17addb7a (bug 1493563)
Backed out changeset a1ff0cd62563 (bug 1493563)
Backed out changeset 932b41e211e0 (bug 1493563)
2018-09-28 21:31:18 +03:00
J.C. Jones 0708336637 Bug 1488622 - land NSS a706ba3c4fa9 UPGRADE_NSS_RELEASE, r=me
--HG--
rename : security/nss/automation/taskcluster/docker-clang-3.9/bin/checkout.sh => security/nss/automation/taskcluster/docker-builds/bin/checkout.sh
rename : security/nss/automation/taskcluster/docker-clang-3.9/bin/checkout.sh => security/nss/automation/taskcluster/docker-clang-format/bin/checkout.sh
rename : security/nss/automation/taskcluster/docker-clang-3.9/bin/checkout.sh => security/nss/automation/taskcluster/docker-fuzz32/bin/checkout.sh
rename : security/nss/automation/taskcluster/docker-clang-3.9/bin/checkout.sh => security/nss/automation/taskcluster/docker-interop/bin/checkout.sh
extra : rebase_source : 2ba3e1b2bfe96388e73e8bbf4ce0b37c530270a1
2018-09-28 09:17:37 -07:00
Ehsan Akhgari f0108e78c2 Bug 1493563 - Part 5: Present the old state and the content blocking log to the web progress listeners; r=baku
Differential Revision: https://phabricator.services.mozilla.com/D6595
2018-09-28 13:24:41 -04:00
Ehsan Akhgari 4895fd4963 Bug 1493563 - Part 4: Present the old state and the content blocking log to the security event sink; r=baku
Differential Revision: https://phabricator.services.mozilla.com/D6594
2018-09-28 13:24:40 -04:00
Dana Keeler 6004dbc02b bug 1492188 - avoid using the directory service off the main thread when loading loadable roots r=jcj
Differential Revision: https://phabricator.services.mozilla.com/D6692

--HG--
extra : moz-landing-system : lando
2018-09-27 22:45:56 +00:00
Coroiu Cristina 62682de0ba Backed out changeset 39762ef5d56e (bug 1493427) for frequent talos chrome failures a=backout
--HG--
rename : browser/base/content/test/siteIdentity/browser_navigation_failures.js => browser/base/content/test/siteIdentity/browser_tls_handshake_failure.js
2018-09-28 07:29:39 +03:00
Coroiu Cristina 71988c7b7e Merge inbound to mozilla-central a=merge 2018-09-28 00:36:46 +03:00
Dana Keeler b3b9e414bc bug 1493427 - use the docShell to call OnSecurityChange in nsSecureBrowserUIImpl::OnLocationChange r=Gijs
When navigating to an about: page that doesn't exist (e.g.
"about:somethingthatdoesnotexist"), the docShell will call
nsSecureBrowserUIImpl::OnLocationChange with a request that is null.
Consequently, we can't use that to QueryInterface to a nsISecurityEventSink to
call OnSecurityChange. The previous implementation would use the prior
request's nsISecurityEventSink, which was a bug but luckily this produced the
correct behavior. Since the original docShell the nsSecureBrowserUIImpl was
initialized with is what needs to be notified, we can just QueryInterface that
to an nsISecurityEventSink and call OnSecurityChange directly instead.

Differential Revision: https://phabricator.services.mozilla.com/D6951

--HG--
rename : browser/base/content/test/siteIdentity/browser_tls_handshake_failure.js => browser/base/content/test/siteIdentity/browser_navigation_failures.js
extra : moz-landing-system : lando
2018-09-27 17:26:00 +00:00
ffxbld dbf253a4b5 No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D7081

--HG--
extra : moz-landing-system : lando
2018-09-27 12:07:07 +00:00
Boris Zbarsky 891631d98c Bug 1494524. Stop using the same function for both webidl and xpidl selectionChanged on treeviews. r=mccr8 2018-09-27 13:46:25 -04:00
shindli 14c2437eec Merge mozilla-central to inbound. a=merge CLOSED TREE 2018-09-27 00:57:23 +03:00
Gijs Kruitbosch 76afb51661 Bug 1493655 - make nsISecureBrowserUI initialize from a docshell instead of a window, r=keeler,nika
This also removes the (afaict, unused) stub implementation from TabParent. The netwerk header
inclusions were necessary because those files included TabParent.h and through it,
nsISecureBrowserUI, but now TabParent.h no longer does that.

Differential Revision: https://phabricator.services.mozilla.com/D6829

--HG--
extra : moz-landing-system : lando
2018-09-26 17:48:38 +00:00
Mark Goodwin 41b314b255 Bug 1492414 - Modify CertBlocklist interface to a form that should work with Rust XPCom bindings r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D6260

--HG--
extra : moz-landing-system : lando
2018-09-21 13:10:40 +00:00
Andrew McCreight de17b449c6 Bug 1494079 - Clean up some code in ShowProtectedAuthPrompt r=keeler
Differential Revision: https://phabricator.services.mozilla.com/D6852

--HG--
extra : moz-landing-system : lando
2018-09-25 22:54:37 +00:00
Haik Aftandilian f2fa2012f9 Bug 1491940 - [Mac] Allow Adobe DRM content to play with the Mac Flash sandbox r=Alex_Gaynor
Add an whitelisted write-access path regex to the Flash plugin sandbox.

Differential Revision: https://phabricator.services.mozilla.com/D6679

--HG--
extra : moz-landing-system : lando
2018-09-24 17:22:49 +00:00
ffxbld 78dd007268 No Bug, mozilla-central repo-update HSTS HPKP remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D6652

--HG--
extra : moz-landing-system : lando
2018-09-24 12:05:01 +00:00
J.C. Jones 5110974f9e Bug 1488622 - land NSS 2c85f81f9b5e UPGRADE_NSS_RELEASE, r=me
--HG--
extra : rebase_source : ac309461f5909fcf7b617bc768d73c0cd7911385
2018-09-22 17:04:35 -07:00
Dragana Damjanovic 9cadc84486 Bug 1473736 - Implement necko part of ESNI r=mak,kmag,mcmanus
--HG--
extra : rebase_source : be79870960953ef9535ccb6a440515ec4a8232d5
extra : histedit_source : 8096ab2eaf246cbbeb97bace0531b86b8c69ff66
2018-09-22 23:54:11 +03:00
Gurzau Raul 07d30b811f Backed out changeset dc225279994a (bug 1473736) for web platform leaks 2018-09-21 04:30:10 +03:00
Dana Keeler 984d5aecee bug 1492424 - check if the TLS handshake failed in nsSecureBrowserUIImpl r=Gijs
The site identity security indicator machinery treats connections where the TLS
handshake failed as insecure (also referred to as "unknown identity"). Before
bug 1468222, such cases were easily detectable as the SSLStatus field of the
relevant nsITransportSecurityInfo would be null. When we merged nsISSLStatus
into nsITransportSecurityInfo, we didn't take this differentiation into account.
This patch brings back the prior behavior by checking if the securityInfo's
securityState indicates that the handshake failed (i.e. it is
STATE_IS_INSECURE).

Differential Revision: https://phabricator.services.mozilla.com/D6316

--HG--
extra : moz-landing-system : lando
2018-09-21 00:17:47 +00:00
Dragana Damjanovic 70e0646d75 Bug 1473736 - Implement necko part of ESNI r=mak,kmag,mcmanus
Implement necko part of ESNI

Differential Revision: https://phabricator.services.mozilla.com/D2716

--HG--
extra : moz-landing-system : lando
2018-09-20 20:53:28 +00:00
Andreea Pavel f5f6c0b588 Merge mozilla-inbound to mozilla-central. a=merge 2018-09-21 00:54:47 +03:00
Nathan Froyd e7b3b3140d Bug 1415980 - make hash keys movable and not copyable; r=erahm
Everything that goes in a PLDHashtable (and its derivatives, like
nsTHashtable) needs to inherit from PLDHashEntryHdr. But through a lack
of enforcement, copy constructors for these derived classes didn't
explicitly invoke the copy constructor for PLDHashEntryHdr (and the
compiler didn't invoke the copy constructor for us). Instead,
PLDHashTable explicitly copied around the bits that the copy constructor
would have.

The current setup has two problems:

1) Derived classes should be using move construction, not copy
   construction, since anything that's shuffling hash table keys/entries
   around will be using move construction.

2) Derived classes should take responsibility for transferring bits of
   superclass state around, and not rely on something else to handle that.

The second point is not a huge problem for PLDHashTable (PLDHashTable
only has to copy PLDHashEntryHdr's bits in a single place), but future
hash table implementations that might move entries around more
aggressively would have to insert compensation code all over the
place. Additionally, if moving entries is implemented via memcpy (which
is quite common), PLDHashTable copying around bits *again* is
inefficient.

Let's fix all these problems in one go, by:

1) Explicitly declaring the set of constructors that PLDHashEntryHdr
   implements (and does not implement). In particular, the copy
   constructor is deleted, so any derived classes that attempt to make
   themselves copyable will be detected at compile time: the compiler
   will complain that the superclass type is not copyable.

This change on its own will result in many compiler errors, so...

2) Change any derived classes to implement move constructors instead of
   copy constructors. Note that some of these move constructors are,
   strictly speaking, unnecessary, since the relevant classes are moved
   via memcpy in nsTHashtable and its derivatives.
2018-09-20 11:20:36 -04:00
ffxbld 1263cc5298 No Bug, mozilla-central repo-update HSTS HPKP blocklist remote-settings - a=repo-update r=RyanVM
Differential Revision: https://phabricator.services.mozilla.com/D6386

--HG--
extra : moz-landing-system : lando
2018-09-20 12:47:19 +00:00
Bogdan Tara 86023d88c4 Merge inbound to mozilla-central. a=merge 2018-09-20 07:13:05 +03:00
J.C. Jones a456c6d9a9 Bug 1488622 - land NSS fe738aae0bcc UPGRADE_NSS_RELEASE, r=me
--HG--
extra : rebase_source : c5e74447ceed1014ab1a3bb6abbdc28ac12fa11a
2018-09-19 09:43:03 -07:00
Bogdan Tara 9f17cab93a Merge mozilla-central to autoland. a=merge CLOSED TREE 2018-09-20 01:03:35 +03:00