Граф коммитов

13060 Коммитов

Автор SHA1 Сообщение Дата
Jed Davis b7f2a67b3b Bug 1430756 - Remove check for unshare(), which we're no longer using. r=gcp
This also removes an assertion that was failing under external sandboxes
that deny unshare() even when it's a no-op.

MozReview-Commit-ID: KBEPJyDGU7M

--HG--
extra : rebase_source : 411a51d7707e506ca8cbe49553ada1de02f7c76b
2018-01-22 14:32:48 -07:00
Sebastian Hengst 78d2a3c1db Merge mozilla-central to mozilla-inbound 2018-01-24 14:24:05 +02:00
J.C. Jones f2b1675473 Bug 1432542 - Enable Web Authentication r=keeler
Per the intent-to-ship [1], Web Authentication should be turned on by default
in Firefox.

[1] https://groups.google.com/forum/#!msg/mozilla.dev.platform/tsevyqfBHLE/lccldWNNBwAJ

MozReview-Commit-ID: CUL63zTAWUP

--HG--
extra : rebase_source : 07bf094ad3d7a3ac97c4965ba4f3fe36688b97d6
2018-01-23 10:50:37 -07:00
Dorel Luca bad2421650 Merge mozilla-central to autoland r=merge 2018-01-23 19:54:54 +02:00
Alex Gaynor caeef41194 Bug 1428055 - Further lockdown the macOS content sandbox policy by restricting some allowed-by-default privileges; r=haik
MozReview-Commit-ID: DbJv5VIoKVV

--HG--
extra : rebase_source : bd27c190771a3ab036b4200c4a99af92722a7b1d
2018-01-03 14:07:41 -05:00
Tom Ritter fcb5a78540 Bug 1432313 Convert the ui64 suffix to uLL r=bobowen
MinGW doesn't recognize the ui64 prefix, but uLL is equivalent.

MozReview-Commit-ID: Do3hikKzxY7

--HG--
extra : rebase_source : 501e958ce50e95ae1171acc10fb07c28834195d2
2018-01-22 16:16:08 -06:00
Tom Ritter b009e6cd23 Bug 1432295 Cast GetProcAddress to (void*) r=bobowen
error: invalid conversion from 'FARPROC {aka int (__attribute__((__stdcall__)) *)()}' to 'void*' [-fpermissive]

According to http://stackoverflow.com/questions/13958081/, msvc does the fixup

MozReview-Commit-ID: HTghe9uL0EP

--HG--
extra : rebase_source : b083b9247aa07ba58c23b3b3a2e5b19c7393dafb
2018-01-23 09:15:44 -06:00
Tom Ritter 0446563c16 Bug 1431825 Map _Copy_s to copy for basic_string compatibility on MinGW r=bobowen
MozReview-Commit-ID: 48P2G9nBfGf

--HG--
extra : rebase_source : ffeb7ce3c41964e245097c2dc7665e2e99ae7a43
2018-01-19 14:48:13 -06:00
Tom Ritter 9b36d73842 Bug 1431807 Allow MinGW and silence warning about Windows SDK version r=bobowen
MozReview-Commit-ID: 3aVeqSzRGXB

--HG--
extra : rebase_source : c63064e6ae843c4fd0f2fc121ea325acc7771664
2017-08-30 09:48:34 -05:00
Jed Davis d1f977c16c Bug 1386019 - Also remove ALSA-related sandbox rules if ALSA is remoted. r=gcp
MozReview-Commit-ID: FKebcgPi60x
2018-01-23 22:37:45 -07:00
Jed Davis 2985b5d72f Bug 1386019 - Remove PulseAudio-specific sandbox broker rules when remoting audio. r=gcp
This also moves those parts of the policy factory out of the constructor,
because the pref service isn't initialized yet at that point.

MozReview-Commit-ID: 6wbq4MHu1GJ
2018-01-23 22:37:44 -07:00
Jed Davis c498f410a3 Bug 1386019 - At sandbox level 4, remove syscalls used only by PulseAudio. r=gcp
MozReview-Commit-ID: 7YbJ8uYub7f
2018-01-23 22:37:44 -07:00
Jed Davis a739b10fb9 Bug 1126437 - Add Linux content sandbox level 4 for blocking socket APIs. r=gcp
Level 4 is now the default unless audio remoting (media.cubeb.sandbox pref) is disabled.

MozReview-Commit-ID: 4jUgiZnJImt
2018-01-23 22:35:44 -07:00
Jed Davis ec6696c724 Bug 1126437 - Reorganize content sandbox params extracted from libxul APIs. r=gcp
The end goal is to allow the seccomp-bpf policy to vary based on the
content sandbox level.

Rather than add yet another parameter to SetContentProcessSandbox to
pass down the sandbox level, this collects the values that have to be
computed in libxul into a struct, and moves the code that computes it so
it's not cluttering up ContentChild.

MozReview-Commit-ID: L0dyQwHQKhc
2018-01-23 22:35:44 -07:00
Tom Ritter 7ae3c27af4 Bug 1432239 Declare operator new [](size_t, sandbox::AllocationType, void*) r=bobowen
MozReview-Commit-ID: GCKj5Ao2Y2n

--HG--
extra : rebase_source : d3f9b5cf14f60ba4c51375931b3de5b71b8312cc
2017-03-08 19:16:46 +00:00
Tom Ritter 854473e64c Bug 1431801 Don't declare duplicate instantiations. r=bobowen
On MinGW, these typedefs are the same, and mingw complains about duplicate instantiations.
Rather than use -fpermissive, just comment out the second instantiation.

MozReview-Commit-ID: 5prsrStgwKY

--HG--
extra : rebase_source : 843340df6e2ce835794b4f370f846b249babf93c
2017-03-07 18:23:57 +00:00
Tom Ritter 71c4b94aa4 Bug 1431621 Remove the gcc variant of BASE_WIN_GET_CALLER, because MinGW defines _ReturnAddress() r=bobowen
Note that MinGW defines it without __builtin_extract_return_addr which
means we're dropping that, but the gcc documentation indicates that
shouldn't be an issue. It is needed when a fixup is necessary:

> For example, on the 31-bit S/390 platform the highest bit has to
> be masked out, or on SPARC platforms an offset has to be added for
> the true next instruction to be executed.



MozReview-Commit-ID: 4D5bIT9Fei4

--HG--
extra : rebase_source : 3f959d72ab3a756e0d636b5eaaf3e883042e9865
2017-03-07 19:51:36 +00:00
Gurzau Raul 6675c62a6e Merge mozilla-central to autoland. a=merge CLOSED TREE 2018-01-23 02:24:22 +02:00
Gurzau Raul 9801931bda Merge inbound to mozilla-central. a=merge 2018-01-23 02:21:47 +02:00
Gurzau Raul 4717577633 Merge autoland to mozilla-central. a=merge 2018-01-23 02:20:15 +02:00
ffxbld f47d7925ea No bug, Automated HPKP preload list update from host bld-linux64-spot-325 - a=hpkp-update 2018-01-22 11:26:08 -08:00
ffxbld d7b5b60edf No bug, Automated HSTS preload list update from host bld-linux64-spot-325 - a=hsts-update 2018-01-22 11:26:04 -08:00
ffxbld 8b690f886d No bug, Automated HPKP preload list update from host bld-linux64-spot-302 - a=hpkp-update 2018-01-21 11:48:12 -08:00
ffxbld 03ec50d88d No bug, Automated HSTS preload list update from host bld-linux64-spot-302 - a=hsts-update 2018-01-21 11:48:08 -08:00
ffxbld 86fb67e64c No bug, Automated HPKP preload list update from host bld-linux64-spot-324 - a=hpkp-update 2018-01-20 11:10:51 -08:00
ffxbld 08fe73a4cf No bug, Automated HSTS preload list update from host bld-linux64-spot-324 - a=hsts-update 2018-01-20 11:10:48 -08:00
Jed Davis bba4ea8274 Bug 1401062 - Avoid doing sandbox-related things to unsandboxed child processes. r=gcp
This is a small piece of cleanup that turned out to not be strictly
necessary for the rest of this, so I've made it a separate commit.

Sandbox-related launch adjustments (currently, interposing libc
functions and providing a file descriptor for the syscall reporter)
are no longer applied to processes that won't be sandboxed.  The
MOZ_SANDBOXED environment variable communicates this to the child
process, which allows SandboxEarlyInit to be skipped in that case as
well.  The idea is that disabling sandboxing for a process type, as part
of troubleshooting, should disable everything sandbox-related.

As a side-effect, this also skips some very minor but unnecessary
overhead for NPAPI process startup.

MozReview-Commit-ID: D0KxsRIIRN

--HG--
extra : rebase_source : 89836bea80d0a171324a8e3ff15c6b8e2a163ea9
2018-01-09 19:54:56 -07:00
David Keeler 5bfa1a1ac8 bug 1430906 - don't hold around a test key forever in mozilla::pkix gtests r=franziskus
Before this patch, mozilla::pkix gtests would generate a public/private key pair
and stash it in a global variable. Since this wasn't part of XPCOM nor tracked
by the PSM/NSS shutdown machinery, it wouldn't get released at the appropriate
time. The solution to this is to generate the key and then essentially export it
as data, so no NSS objects are held alive. Since NSS considers private keys
stored in the persistent database sensitive and won't export them in the clear,
we "encrypt" the key material with an empty password so we can import it when
necessary. (While the gtests don't use persistent keys, the test utilties in the
gtests are also used by some xpcshell tests that do use persistent keys, hence
the need to encrypt the key material.)

--HG--
extra : rebase_source : df10c25a462a3ba0396f5ba4a43a52fb924548ff
extra : amend_source : d95722891e49a99c471046cd9c758e914a02838e
2018-01-12 13:57:51 -08:00
Harald van Dijk 2877a35271 Bug 1430274 - Define MOZ_ALSA for more source files. r=jld 2018-01-18 15:18:37 -07:00
Ciure Andrei dc1715ad21 Merge inbound to mozilla-central. a=merge 2018-01-18 23:53:03 +02:00
Ciure Andrei 0d6a403dd2 Merge autoland to mozilla-central. a=merge 2018-01-18 23:46:09 +02:00
ffxbld 12872ceb18 No bug, Automated HPKP preload list update from host bld-linux64-spot-302 - a=hpkp-update 2018-01-18 11:22:36 -08:00
ffxbld 3735019997 No bug, Automated HSTS preload list update from host bld-linux64-spot-302 - a=hsts-update 2018-01-18 11:22:32 -08:00
Tiberius Oros 92e228aa49 Merge inbound to mozilla-central. a=merge 2018-01-17 23:48:10 +02:00
ffxbld 37e9f519f9 No bug, Automated HPKP preload list update from host bld-linux64-spot-324 - a=hpkp-update 2018-01-17 11:37:03 -08:00
ffxbld 866b399106 No bug, Automated HSTS preload list update from host bld-linux64-spot-324 - a=hsts-update 2018-01-17 11:37:00 -08:00
Gian-Carlo Pascutto e5687f9731 Bug 1430118 - Look for log file names in the passed environment. r=bobowen
MozReview-Commit-ID: HVUDYoEwjCd

--HG--
extra : rebase_source : 4121114558901489cd3954f433fe70bdea32a683
2018-01-17 09:54:48 +01:00
Tim Nguyen 6071f20f6c Bug 1430374 - Remove support for progressmeter tree cells. r=bz,dao
MozReview-Commit-ID: 3hydkeoneC0

--HG--
extra : rebase_source : eca404511d1fc2d9d7e9711fbd1accefd3781b16
2018-01-18 10:36:05 +00:00
Jorg K 00db3443a3 Bug 1355977 - don't show GMT twice in certificate details. r=zibi 2018-01-16 16:17:00 +02:00
Kai Engert 4040649e6d Bug 1420060, uplift NSS_3_35_RTM, no code change, only version number. Require version 3.35 for building. r=me
UPGRADE_NSS_RELEASE
2018-01-18 15:33:36 +01:00
David Keeler 1eadd3d4ac bug 1417680 - explore the feasibility of making XPCOM responsible for shutting down NSS r=jcj r=franziskus r=erahm
Historically, PSM has handled tracking NSS resources, releasing them, and
shutting down NSS in a coordinated manner (i.e. preventing races,
use-after-frees, etc.). This approach has proved intractable. This patch
introduces a new approach: have XPCOM shut down NSS after all threads have been
joined and the component manager has been shut down (and so there shouldn't be
any XPCOM objects holding NSS resources).

Note that this patch only attempts to determine if this approach will work. If
it does, we will have to go through alter and remove the remnants of the old
approach (i.e. nsNSSShutDownPreventionLock and related machinery). This will be
done in bug 1421084.

MozReview-Commit-ID: LjgEl1UZqkC

--HG--
extra : rebase_source : 2182e60d04e89a91278d5ee91610f8f37d99a9c9
2017-11-10 15:03:23 -08:00
J.C. Jones 970bcebf39 Bug 1418112 - Cleanup getHSTSPreloadList.js vars to lets r=keeler DONTBUILD NPOTB
This is a JS style cleanup; it changes all relevant `var` decls to `let`, and
also moves the `gSSService` up to the top where globals should go.

MozReview-Commit-ID: 2yycCum6mRC

--HG--
extra : rebase_source : 63563665d4d9991e181562acbd7e53f66e4c13b9
2018-01-17 17:04:31 -07:00
J.C. Jones 670b6e7a32 Bug 1418112 - Force HSTS Preloading for opt-in public suffixes r=keeler DONTBUILD NPOTB
The Chromium HSTS Preload list now includes a "policy" field that we can use
to filter and force some HSTS entries. This patch unconditionally accepts list
entries with the "google" or "public-suffix-requested" policies, and tests all
others via the existing connect-and-check (with failback tolerance) strategy.

In comment #0 of this bug [2], Lucas recommends we also filter the "all others"
to be the "bulk" entries. This patch does not do that to be conservative and
avoid de-listing sites at this time. We'll probably want a follow-on to
evaluate and potentially do that.

The patch also:

* renames `getHSTSStatuses` to `probeHSTSStatuses` to indicate more clearly that
  it's an active network load.

* Sets an X-Automated-Tool: https://hg.mozilla.org/mozilla-central/file/tip/security/manager/tools/getHSTSPreloadList.js

[1] https://github.com/chromium/hstspreload.org/wiki/Preload-List-Processes#manual-hsts-entries
[2] https://bugzilla.mozilla.org/show_bug.cgi?id=1418112#c0

MozReview-Commit-ID: 2r1QYXtDfjw

--HG--
extra : rebase_source : 3110915d15ffe9ea1916a6bd4957911bac0493fb
2017-12-06 11:10:04 -07:00
Jed Davis 6cc01043ce Bug 1401062 - Create Linux child processes with clone() for namespace/chroot sandboxing. r=gcp
Namespace isolation is now handled by using clone() at process creation
time, rather than calling unshare.

pthread_atfork will no longer apply to sandboxed child processes.
The two significant uses of it in Firefox currently are to (1) make
malloc work post-fork, which we already avoid depending on in IPC and
sandboxing, and (2) block SIGPROF while forking, which is taken care of;
see SandboxFork::Fork for details.  Note that if we need pthread_atfork
in the future it could be emulated by symbol interposition.

clone() is called via glibc's wrapper, for increased compatibility vs.
invoking the syscall directly, using longjmp to recover the syscall's
fork-like semantics the same way Chromium does; see comments for details.

The chroot helper is reimplemented; the general approach is similar,
but instead of a thread it's a process cloned with CLONE_FS (so the
filesystem root is shared) from the child process before it calls
exec, so that it still holds CAP_SYS_CHROOT in the newly created user
namespace.  This does mean that it will retain a CoW copy of the
parent's address space until the child starts sandboxing, but that is a
relatively short period of time, so the memory overhead should be small
and short-lived.

The chrooting now happens *after* the seccomp-bpf policy is applied;
previously this wasn't possible because the chroot thread would have
become seccomp-restricted and unable to chroot.  This fixes a potential
race condition where a thread could try to access the filesystem after
chrooting but before having its syscalls intercepted for brokering,
causing spurious failure.  (This failure mode hasn't been observed in
practice, but we may not be looking for it.)

This adds a hidden bool pref, security.sandbox.content.force-namespace,
which unshares the user namespace (if possible) even if no sandboxing
requires it.  It defaults to true on Nightly and false otherwise, to
get test coverage; the default will change to false once we're using
namespaces by default with content.

MozReview-Commit-ID: JhCXF9EgOt6

--HG--
rename : security/sandbox/linux/LinuxCapabilities.cpp => security/sandbox/linux/launch/LinuxCapabilities.cpp
rename : security/sandbox/linux/LinuxCapabilities.h => security/sandbox/linux/launch/LinuxCapabilities.h
extra : rebase_source : f37acacd4f79b0d6df0bcb9d1d5ceb4b9c5e6371
2017-10-06 17:16:41 -06:00
Margareta Eliza Balazs 757c55dc4f Merge mozilla-central to autoland. a=merge CLOSED TREE 2018-01-16 23:49:24 +02:00
ffxbld 312b6a44e5 No bug, Automated HPKP preload list update from host bld-linux64-spot-309 - a=hpkp-update 2018-01-16 12:59:54 -08:00
ffxbld e4a2ac5bbe No bug, Automated HSTS preload list update from host bld-linux64-spot-309 - a=hsts-update 2018-01-16 12:59:50 -08:00
David Keeler 89f94440e6 bug 1263765 - remove nsIBadCertListener2 implementation from the add certificate exception dialog r=jcj
This reworks the certificate-fetching portion of the add certificate exception
dialog so as to not require a nsIBadCertListener2 implementation, which is
deprecated. The solution is simple: use the onerror/onload callbacks on the
XMLHttpRequest object to grab the appropriate information.

MozReview-Commit-ID: IjNrNfYA28P

--HG--
extra : rebase_source : 4a09b2eaf81d675444553156a0e098be54703115
2018-01-11 15:25:05 -08:00
ffxbld 54161e9fb9 No bug, Automated HPKP preload list update from host bld-linux64-spot-306 - a=hpkp-update 2018-01-15 10:59:32 -08:00
ffxbld 52c9e21d6b No bug, Automated HSTS preload list update from host bld-linux64-spot-306 - a=hsts-update 2018-01-15 10:59:29 -08:00
ffxbld 4579f798bf No bug, Automated HPKP preload list update from host bld-linux64-spot-302 - a=hpkp-update 2018-01-14 11:03:43 -08:00
ffxbld 6f34584a20 No bug, Automated HSTS preload list update from host bld-linux64-spot-302 - a=hsts-update 2018-01-14 11:03:40 -08:00
Chris Peterson 37efe4d0e6 Bug 1428535 - Add missing override specifiers to overridden virtual functions. r=froydnj
MozReview-Commit-ID: DCPTnyBooIe

--HG--
extra : rebase_source : cfec2d96faeb11656d86d760a34e0a04cacddb13
extra : intermediate-source : 6176724d63788b0fe8caa3f91607c2d93dbaa7ec
extra : source : eebbb0600447f9b64aae3bcd47b4be66c02a51ea
2017-11-05 19:37:28 -08:00
Andreea Pavel e32752514d Merge mozilla-inbound to mozilla-central. a=merge 2018-01-13 23:49:24 +02:00
ffxbld 9781fa968b No bug, Automated HPKP preload list update from host bld-linux64-spot-302 - a=hpkp-update 2018-01-13 11:04:33 -08:00
ffxbld e2ae589f60 No bug, Automated HSTS preload list update from host bld-linux64-spot-302 - a=hsts-update 2018-01-13 11:04:29 -08:00
EKR ede3b33617 Bug 1430268 - Unconditionally enable compat mode. r=keeler
Summary: Needed for real TLS 1.3 deployment

Reviewers: mt

Differential Revision: https://phabricator.services.mozilla.com/D342
2018-01-13 10:18:53 -08:00
Csoregi Natalia 7476b71e00 Merge inbound to mozilla-central r=merge a=merge 2018-01-12 23:59:06 +02:00
ffxbld bcf400ed70 No bug, Automated HPKP preload list update from host bld-linux64-spot-324 - a=hpkp-update 2018-01-12 10:58:23 -08:00
ffxbld 600c92d089 No bug, Automated HSTS preload list update from host bld-linux64-spot-324 - a=hsts-update 2018-01-12 10:58:19 -08:00
ffxbld 508c6b8852 No bug, Automated HPKP preload list update from host bld-linux64-spot-326 - a=hpkp-update 2018-01-11 11:24:52 -08:00
ffxbld 74d31a9bf9 No bug, Automated HSTS preload list update from host bld-linux64-spot-326 - a=hsts-update 2018-01-11 11:24:48 -08:00
Ciure Andrei f7400ad72e Merge inbound to mozilla-central r=merge a=merge 2018-01-11 11:54:56 +02:00
Kate McKinley e97980a95e Bug 1424917 - Remove support for HSTS Priming. r=mayhemer, r=ckerschb
This patch removes support and tests for HSTS priming from the tree.
2018-01-10 11:07:00 -05:00
arthur.iakab 5e902ff6cd Backed out changeset 28f876e75d47 (bug 1417680)for failing GTest
--HG--
extra : rebase_source : 2890c797a7cf05d6e82d84e64fd4cd5ed6ec5eb9
2018-01-11 02:56:49 +02:00
Masatoshi Kimura 8c8754b21f Bug 1428538 - Use UTF-8 file paths for NSS database. r=keeler 2017-12-28 20:56:33 +09:00
Kai Engert e1c5635b55 Bug 1420060, restrict export of symbols to Windows, suggested by Masatoshi Kimura, r=kaie 2018-01-11 15:04:17 +01:00
Kai Engert 46f290697e Bug 1420060, export new NSS APIs in Firefox' specific API export list, r=franziskus 2018-01-11 14:42:09 +01:00
Kai Engert 14be89415f Bug 1420060, NSS_3_35_BETA1, r=franziskus
UPGRADE_NSS_RELEASE
2018-01-11 14:09:34 +01:00
Dorel Luca ccebfc1873 Merge mozilla-central to autoland r=merge 2018-01-11 00:03:38 +02:00
ffxbld 59fa32fd74 No bug, Automated HPKP preload list update from host bld-linux64-spot-302 - a=hpkp-update 2018-01-10 11:13:16 -08:00
ffxbld 69f2798cbe No bug, Automated HSTS preload list update from host bld-linux64-spot-302 - a=hsts-update 2018-01-10 11:13:12 -08:00
Haik Aftandilian 68c0e33233 Bug 1429133 - Some FontExplorer managed fonts are not rendered. r=Alex_Gaynor
MozReview-Commit-ID: L5x3GNb3HGU

--HG--
extra : rebase_source : fd123e19142e98f4712db19d240b5c636aeb3ecf
2018-01-10 11:33:47 -08:00
Narcis Beleuzu fb578c1b74 Merge mozilla-central to inbound. r=merge a=merge on a CLOSED TREE 2018-01-10 02:02:13 +02:00
ffxbld 3c8c1653f7 No bug, Automated HPKP preload list update from host bld-linux64-spot-302 - a=hpkp-update 2018-01-09 11:06:09 -08:00
ffxbld 782a0a23af No bug, Automated HSTS preload list update from host bld-linux64-spot-302 - a=hsts-update 2018-01-09 11:06:06 -08:00
Franziskus Kiefer a881c4a167 Bug 1403844 - Verify COSE signature on add-ons, r=keeler
Summary:
MozReview-Commit-ID: 6YorBs4mY8B

Check for COSE signatures in add-ons.

Reviewers: keeler

Bug #: 1403844

Differential Revision: https://phabricator.services.mozilla.com/D298

--HG--
rename : security/manager/ssl/tests/unit/test_signed_apps/cose_multiple_signed.zip => security/manager/ssl/tests/unit/test_signed_apps/cose_multiple_signed_with_pkcs7.zip
rename : security/manager/ssl/tests/unit/test_signed_apps/cose_signed.zip => security/manager/ssl/tests/unit/test_signed_apps/cose_signed_with_pkcs7.zip
rename : third_party/rust/cose/src/cbor/mod.rs => third_party/rust/moz_cbor/src/lib.rs
extra : rebase_source : 0494590eb222e2c936e353e4dd6cf9fac8d822f3
2018-01-08 11:46:51 +01:00
J.C. Jones 3ba27ce458 Bug 1428918 - Enable Web Authentication in Nightly r=keeler,smaug
In advance of enabling Web Authentication in Firefox 60 [1], let's turn it on
for Nightly users.

[1] https://groups.google.com/forum/#!msg/mozilla.dev.platform/tsevyqfBHLE/lccldWNNBwAJ

MozReview-Commit-ID: ALyjBwojKtA

--HG--
extra : rebase_source : c51aef6bf12e1e26faa3d86269132eef7057c889
2018-01-08 18:37:35 -07:00
Csoregi Natalia d07dee65a2 Backed out 6 changesets (bug 1386404) for failing /webdriver/test/ tests on Linux. r=backout on a CLOSED TREE
Backed out changeset be1441859e8b (bug 1386404)
Backed out changeset 8dca7ef74c4a (bug 1386404)
Backed out changeset b7ca6ae185f2 (bug 1386404)
Backed out changeset 2c007d385ce4 (bug 1386404)
Backed out changeset fbe717b9a664 (bug 1386404)
Backed out changeset 14f1fbe5263a (bug 1386404)
2018-01-10 14:08:51 +02:00
Csoregi Natalia bbfcdcd760 Merge mozilla-central to autoland. r=merge a=merge CLOSED TREE
--HG--
rename : security/manager/ssl/tests/unit/test_signed_apps/cose_multiple_signed.zip => security/manager/ssl/tests/unit/test_signed_apps/cose_multiple_signed_with_pkcs7.zip
rename : security/manager/ssl/tests/unit/test_signed_apps/cose_signed.zip => security/manager/ssl/tests/unit/test_signed_apps/cose_signed_with_pkcs7.zip
rename : third_party/rust/cose/src/cbor/mod.rs => third_party/rust/moz_cbor/src/lib.rs
extra : rebase_source : 5f16e3d25e86d41e201b8c28ead361fd6ac25c42
2018-01-10 12:07:47 +02:00
David Keeler 0c092c0ffe bug 1428498 - don't require importing the server certificate for overrides to succeed r=jcj
Previously, adding a permanent certificate error override would depend on
successfully importing the server's certificate into the user's certificate
database. Consequently, if the user's database were in read-only mode (or if the
database couldn't be created due to code page issues on Windows), this would
prevent adding new certificate error overrides. It turns out this isn't even
necessary, because the implementation relies on the stored hash of the
certificate rather than the certificate itself. The stored certificate is only
for display purposes (and there's a fallback if the certificate can't be
stored).

There are remaining issues with non-ASCII characters in 8.3 paths on Windows
when the code page isn't western, but this is a larger issue that must be
addressed in other layers (i.e. NSS/NSPR).

MozReview-Commit-ID: KEzjxtAoeb4

--HG--
rename : security/manager/ssl/tests/unit/test_cert_overrides.js => security/manager/ssl/tests/unit/test_cert_overrides_read_only.js
extra : rebase_source : b41e863d8c85d80335dd56c8f5765b19b1de4e0c
2018-01-04 11:31:22 -08:00
Gian-Carlo Pascutto 61cf15cc85 Bug 1297740. r=jld 2018-01-08 10:07:16 +01:00
ffxbld 4f97a97069 No bug, Automated HPKP preload list update from host bld-linux64-spot-302 - a=hpkp-update 2018-01-07 11:04:07 -08:00
ffxbld 80e05c0b9a No bug, Automated HSTS preload list update from host bld-linux64-spot-302 - a=hsts-update 2018-01-07 11:04:03 -08:00
ffxbld 9a6945c623 No bug, Automated HPKP preload list update from host bld-linux64-spot-302 - a=hpkp-update 2018-01-06 11:09:40 -08:00
ffxbld 892f4bd3a1 No bug, Automated HSTS preload list update from host bld-linux64-spot-302 - a=hsts-update 2018-01-06 11:09:36 -08:00
ffxbld 0f63741b8e No bug, Automated HPKP preload list update from host bld-linux64-spot-037 - a=hpkp-update 2018-01-05 12:22:25 -08:00
ffxbld 0046f0f438 No bug, Automated HSTS preload list update from host bld-linux64-spot-037 - a=hsts-update 2018-01-05 12:22:21 -08:00
ffxbld a2f5eacf1f No bug, Automated HPKP preload list update from host bld-linux64-spot-034 - a=hpkp-update 2018-01-04 14:13:48 -08:00
ffxbld df3bec329c No bug, Automated HSTS preload list update from host bld-linux64-spot-034 - a=hsts-update 2018-01-04 14:13:44 -08:00
ffxbld ac67a1c73c No bug, Automated HPKP preload list update from host bld-linux64-spot-036 - a=hpkp-update 2018-01-03 14:38:40 -08:00
ffxbld f4ac363948 No bug, Automated HSTS preload list update from host bld-linux64-spot-036 - a=hsts-update 2018-01-03 14:38:36 -08:00
Haik Aftandilian f6cdb35b8f Bug 1421262 - [Mac] Add access to hw.cachelinesize sysctl, /Library/GPUBundles to content sandbox rules. r=Alex_Gaynor
MozReview-Commit-ID: LBWA8XD64h

--HG--
extra : rebase_source : dac2ea615fdcbbd4d029bbbb28e3d935a4416deb
2017-12-21 14:15:29 -08:00
Mark Banner 770685e15e Bug 1425688 - Enable ESLint rule mozilla/use-services for security/. r=gcp,keeler
MozReview-Commit-ID: 4Kd9L8ExNGl

--HG--
extra : rebase_source : 02a5242629c7b597d7fd4e5e1373781fcbb82905
2017-12-16 13:10:40 -06:00
Mark Banner a825aadc8a Bug 1425688 - Rework definitions of Cu/Cc/etc and inclusion of Services.jsm in pippki.js related files to reduce duplication. r=keeler
MozReview-Commit-ID: 1BN0Z5lOKYh

--HG--
extra : rebase_source : bc873871f02a2616aa5d54922e29b16750b3424e
2017-12-16 12:52:53 -06:00
ffxbld d8534b8f72 No bug, Automated HPKP preload list update from host bld-linux64-spot-031 - a=hpkp-update 2018-01-01 12:43:20 -08:00
ffxbld 0a2ba4b6b2 No bug, Automated HSTS preload list update from host bld-linux64-spot-031 - a=hsts-update 2018-01-01 12:43:16 -08:00
ffxbld 223ae3afdc No bug, Automated HPKP preload list update from host bld-linux64-spot-033 - a=hpkp-update 2017-12-31 22:11:20 -08:00
ffxbld 9cb7fb2148 No bug, Automated HSTS preload list update from host bld-linux64-spot-033 - a=hsts-update 2017-12-31 22:11:16 -08:00
ffxbld dd07d453a1 No bug, Automated HPKP preload list update from host bld-linux64-spot-031 - a=hpkp-update 2017-12-30 13:43:47 -08:00