Граф коммитов

13030 Коммитов

Автор SHA1 Сообщение Дата
arthur.iakab 94ab855658 Merge inbound to mozilla-central. a=merge 2018-01-26 02:21:47 +02:00
ffxbld 723b975106 No bug, Automated HPKP preload list update from host bld-linux64-spot-302 - a=hpkp-update 2018-01-25 11:08:54 -08:00
ffxbld 0863879ac8 No bug, Automated HSTS preload list update from host bld-linux64-spot-302 - a=hsts-update 2018-01-25 11:08:50 -08:00
Bob Owen af97855568 Bug 1433065: Make the Chromium sandbox DLL blocking Nightly only. r=jimm 2018-01-25 15:33:55 +00:00
Bob Owen 29a3f48beb Backed out changeset 541ea4baacba (bug 1433065) - due to missing variable in non-Nightly 2018-01-25 15:33:55 +00:00
Bob Owen 9281954b93 Bug 1433065: Make the Chromium sandbox DLL blocking Nightly only. r=jimm 2018-01-25 13:31:40 +00:00
Tom Ritter 5a600ec834 Bug 1431797 Fix capitalization in mozilla files so the sandbox can compile on MinGW r=bobowen
This patch also adds the capitalization patch file to the chromium patches

MozReview-Commit-ID: BzAkEtCKAi4

--HG--
extra : rebase_source : 8f24d2b855e721f354f12b0d3fca5783cc66702e
2018-01-24 14:27:21 -06:00
Tom Ritter 2f2511d2e9 Bug 1431797 Correct the capitalization of headers inside the chromium code so MinGW can compile r=bobowen
MozReview-Commit-ID: DFlruq4iIUe

--HG--
extra : rebase_source : a883cb8264292143a90846f02a548c7da68fb168
2018-01-24 14:25:59 -06:00
Haik Aftandilian 1956e23936 Bug 1393259 - Enable sandbox read access extensions for font access. r=Alex_Gaynor
Enable sandbox read access extensions to allow content processes
to access fonts stored in non-standard locations without whitelisting
hardcoded directories. This is needed for configurations with third
party font managers that store fonts in their own directories or
user-specified directories.

Now that font access is not dependent on the filename extension
such as .otf and .ttf, remove the relevent tests.

MozReview-Commit-ID: 8hSMrocGwIm

--HG--
extra : rebase_source : b757480398e3f0d9720ab845e9f10fb70a794d77
2018-01-11 10:53:11 -08:00
Cosmin Sabou 7e6e71746a Merge mozilla-central to autoland. a=merge on a CLOSED TREE 2018-01-25 00:04:12 +02:00
Narcis Beleuzu 9279994eae Merge inbound to mozilla-central. a=merge 2018-01-24 23:56:14 +02:00
Narcis Beleuzu f8bb2d707a Merge autoland to mozilla-central. a=merge 2018-01-24 23:54:03 +02:00
ffxbld 796f358182 No bug, Automated HPKP preload list update from host bld-linux64-spot-301 - a=hpkp-update 2018-01-24 11:16:16 -08:00
ffxbld 67f0726740 No bug, Automated HSTS preload list update from host bld-linux64-spot-301 - a=hsts-update 2018-01-24 11:16:12 -08:00
Margareta Eliza Balazs 4611b95418 Merge autoland to mozilla-central. a=merge 2018-01-24 12:07:37 +02:00
Tom Ritter 2f8e7d0c85 Bug 1432790 Fix MinGW Sandbox linking error about not being able to find _ReturnAddress() r=bobowen
This reverts 6e41201152dd (Bug 1431621) which compiled but did not link.
It also fixes the original issue by removing the stray \ at the end of the
line that was causing the error.

MozReview-Commit-ID: LgaxYK3EOwR

--HG--
extra : rebase_source : 7de3b5126417ea99ff7fee3a809e556b5a2de4a6
2018-01-23 22:08:21 -06:00
Ciure Andrei 4cf1735400 Merge autoland to mozilla-central. a=merge 2018-01-24 03:55:36 +02:00
ffxbld 4fbf357e0d No bug, Automated HPKP preload list update from host bld-linux64-spot-343 - a=hpkp-update 2018-01-23 11:14:24 -08:00
ffxbld 8df312ae60 No bug, Automated HSTS preload list update from host bld-linux64-spot-343 - a=hsts-update 2018-01-23 11:14:21 -08:00
Franziskus Kiefer cdd881cf58 Bug 1432177 - land NSS 10f7e0179b18 UPGRADE_NSS_RELEASE, r=me
--HG--
extra : rebase_source : 73060b7dd79b86f22b4f53d2d3491266b1968904
2018-01-23 11:48:27 +01:00
Jed Davis b7f2a67b3b Bug 1430756 - Remove check for unshare(), which we're no longer using. r=gcp
This also removes an assertion that was failing under external sandboxes
that deny unshare() even when it's a no-op.

MozReview-Commit-ID: KBEPJyDGU7M

--HG--
extra : rebase_source : 411a51d7707e506ca8cbe49553ada1de02f7c76b
2018-01-22 14:32:48 -07:00
Sebastian Hengst 78d2a3c1db Merge mozilla-central to mozilla-inbound 2018-01-24 14:24:05 +02:00
J.C. Jones f2b1675473 Bug 1432542 - Enable Web Authentication r=keeler
Per the intent-to-ship [1], Web Authentication should be turned on by default
in Firefox.

[1] https://groups.google.com/forum/#!msg/mozilla.dev.platform/tsevyqfBHLE/lccldWNNBwAJ

MozReview-Commit-ID: CUL63zTAWUP

--HG--
extra : rebase_source : 07bf094ad3d7a3ac97c4965ba4f3fe36688b97d6
2018-01-23 10:50:37 -07:00
Dorel Luca bad2421650 Merge mozilla-central to autoland r=merge 2018-01-23 19:54:54 +02:00
Alex Gaynor caeef41194 Bug 1428055 - Further lockdown the macOS content sandbox policy by restricting some allowed-by-default privileges; r=haik
MozReview-Commit-ID: DbJv5VIoKVV

--HG--
extra : rebase_source : bd27c190771a3ab036b4200c4a99af92722a7b1d
2018-01-03 14:07:41 -05:00
Tom Ritter fcb5a78540 Bug 1432313 Convert the ui64 suffix to uLL r=bobowen
MinGW doesn't recognize the ui64 prefix, but uLL is equivalent.

MozReview-Commit-ID: Do3hikKzxY7

--HG--
extra : rebase_source : 501e958ce50e95ae1171acc10fb07c28834195d2
2018-01-22 16:16:08 -06:00
Tom Ritter b009e6cd23 Bug 1432295 Cast GetProcAddress to (void*) r=bobowen
error: invalid conversion from 'FARPROC {aka int (__attribute__((__stdcall__)) *)()}' to 'void*' [-fpermissive]

According to http://stackoverflow.com/questions/13958081/, msvc does the fixup

MozReview-Commit-ID: HTghe9uL0EP

--HG--
extra : rebase_source : b083b9247aa07ba58c23b3b3a2e5b19c7393dafb
2018-01-23 09:15:44 -06:00
Tom Ritter 0446563c16 Bug 1431825 Map _Copy_s to copy for basic_string compatibility on MinGW r=bobowen
MozReview-Commit-ID: 48P2G9nBfGf

--HG--
extra : rebase_source : ffeb7ce3c41964e245097c2dc7665e2e99ae7a43
2018-01-19 14:48:13 -06:00
Tom Ritter 9b36d73842 Bug 1431807 Allow MinGW and silence warning about Windows SDK version r=bobowen
MozReview-Commit-ID: 3aVeqSzRGXB

--HG--
extra : rebase_source : c63064e6ae843c4fd0f2fc121ea325acc7771664
2017-08-30 09:48:34 -05:00
Jed Davis d1f977c16c Bug 1386019 - Also remove ALSA-related sandbox rules if ALSA is remoted. r=gcp
MozReview-Commit-ID: FKebcgPi60x
2018-01-23 22:37:45 -07:00
Jed Davis 2985b5d72f Bug 1386019 - Remove PulseAudio-specific sandbox broker rules when remoting audio. r=gcp
This also moves those parts of the policy factory out of the constructor,
because the pref service isn't initialized yet at that point.

MozReview-Commit-ID: 6wbq4MHu1GJ
2018-01-23 22:37:44 -07:00
Jed Davis c498f410a3 Bug 1386019 - At sandbox level 4, remove syscalls used only by PulseAudio. r=gcp
MozReview-Commit-ID: 7YbJ8uYub7f
2018-01-23 22:37:44 -07:00
Jed Davis a739b10fb9 Bug 1126437 - Add Linux content sandbox level 4 for blocking socket APIs. r=gcp
Level 4 is now the default unless audio remoting (media.cubeb.sandbox pref) is disabled.

MozReview-Commit-ID: 4jUgiZnJImt
2018-01-23 22:35:44 -07:00
Jed Davis ec6696c724 Bug 1126437 - Reorganize content sandbox params extracted from libxul APIs. r=gcp
The end goal is to allow the seccomp-bpf policy to vary based on the
content sandbox level.

Rather than add yet another parameter to SetContentProcessSandbox to
pass down the sandbox level, this collects the values that have to be
computed in libxul into a struct, and moves the code that computes it so
it's not cluttering up ContentChild.

MozReview-Commit-ID: L0dyQwHQKhc
2018-01-23 22:35:44 -07:00
Tom Ritter 7ae3c27af4 Bug 1432239 Declare operator new [](size_t, sandbox::AllocationType, void*) r=bobowen
MozReview-Commit-ID: GCKj5Ao2Y2n

--HG--
extra : rebase_source : d3f9b5cf14f60ba4c51375931b3de5b71b8312cc
2017-03-08 19:16:46 +00:00
Tom Ritter 854473e64c Bug 1431801 Don't declare duplicate instantiations. r=bobowen
On MinGW, these typedefs are the same, and mingw complains about duplicate instantiations.
Rather than use -fpermissive, just comment out the second instantiation.

MozReview-Commit-ID: 5prsrStgwKY

--HG--
extra : rebase_source : 843340df6e2ce835794b4f370f846b249babf93c
2017-03-07 18:23:57 +00:00
Tom Ritter 71c4b94aa4 Bug 1431621 Remove the gcc variant of BASE_WIN_GET_CALLER, because MinGW defines _ReturnAddress() r=bobowen
Note that MinGW defines it without __builtin_extract_return_addr which
means we're dropping that, but the gcc documentation indicates that
shouldn't be an issue. It is needed when a fixup is necessary:

> For example, on the 31-bit S/390 platform the highest bit has to
> be masked out, or on SPARC platforms an offset has to be added for
> the true next instruction to be executed.



MozReview-Commit-ID: 4D5bIT9Fei4

--HG--
extra : rebase_source : 3f959d72ab3a756e0d636b5eaaf3e883042e9865
2017-03-07 19:51:36 +00:00
Gurzau Raul 6675c62a6e Merge mozilla-central to autoland. a=merge CLOSED TREE 2018-01-23 02:24:22 +02:00
Gurzau Raul 9801931bda Merge inbound to mozilla-central. a=merge 2018-01-23 02:21:47 +02:00
Gurzau Raul 4717577633 Merge autoland to mozilla-central. a=merge 2018-01-23 02:20:15 +02:00
ffxbld f47d7925ea No bug, Automated HPKP preload list update from host bld-linux64-spot-325 - a=hpkp-update 2018-01-22 11:26:08 -08:00
ffxbld d7b5b60edf No bug, Automated HSTS preload list update from host bld-linux64-spot-325 - a=hsts-update 2018-01-22 11:26:04 -08:00
ffxbld 8b690f886d No bug, Automated HPKP preload list update from host bld-linux64-spot-302 - a=hpkp-update 2018-01-21 11:48:12 -08:00
ffxbld 03ec50d88d No bug, Automated HSTS preload list update from host bld-linux64-spot-302 - a=hsts-update 2018-01-21 11:48:08 -08:00
ffxbld 86fb67e64c No bug, Automated HPKP preload list update from host bld-linux64-spot-324 - a=hpkp-update 2018-01-20 11:10:51 -08:00
ffxbld 08fe73a4cf No bug, Automated HSTS preload list update from host bld-linux64-spot-324 - a=hsts-update 2018-01-20 11:10:48 -08:00
Jed Davis bba4ea8274 Bug 1401062 - Avoid doing sandbox-related things to unsandboxed child processes. r=gcp
This is a small piece of cleanup that turned out to not be strictly
necessary for the rest of this, so I've made it a separate commit.

Sandbox-related launch adjustments (currently, interposing libc
functions and providing a file descriptor for the syscall reporter)
are no longer applied to processes that won't be sandboxed.  The
MOZ_SANDBOXED environment variable communicates this to the child
process, which allows SandboxEarlyInit to be skipped in that case as
well.  The idea is that disabling sandboxing for a process type, as part
of troubleshooting, should disable everything sandbox-related.

As a side-effect, this also skips some very minor but unnecessary
overhead for NPAPI process startup.

MozReview-Commit-ID: D0KxsRIIRN

--HG--
extra : rebase_source : 89836bea80d0a171324a8e3ff15c6b8e2a163ea9
2018-01-09 19:54:56 -07:00
David Keeler 5bfa1a1ac8 bug 1430906 - don't hold around a test key forever in mozilla::pkix gtests r=franziskus
Before this patch, mozilla::pkix gtests would generate a public/private key pair
and stash it in a global variable. Since this wasn't part of XPCOM nor tracked
by the PSM/NSS shutdown machinery, it wouldn't get released at the appropriate
time. The solution to this is to generate the key and then essentially export it
as data, so no NSS objects are held alive. Since NSS considers private keys
stored in the persistent database sensitive and won't export them in the clear,
we "encrypt" the key material with an empty password so we can import it when
necessary. (While the gtests don't use persistent keys, the test utilties in the
gtests are also used by some xpcshell tests that do use persistent keys, hence
the need to encrypt the key material.)

--HG--
extra : rebase_source : df10c25a462a3ba0396f5ba4a43a52fb924548ff
extra : amend_source : d95722891e49a99c471046cd9c758e914a02838e
2018-01-12 13:57:51 -08:00
Harald van Dijk 2877a35271 Bug 1430274 - Define MOZ_ALSA for more source files. r=jld 2018-01-18 15:18:37 -07:00
Ciure Andrei dc1715ad21 Merge inbound to mozilla-central. a=merge 2018-01-18 23:53:03 +02:00