forked from mirrors/gecko-dev
2019-12-06 Daiki Ueno <dueno@redhat.com> * lib/pki/pki3hack.c: Bug 1593167, certdb: propagate trust information if trust module is loaded afterwards, r=rrelyea,keeler Summary: When the builtin trust module is loaded after some temp certs being created, these temp certs are usually not accompanied by trust information. This causes a problem in Firefox as it loads the module from a separate thread while accessing the network cache which populates temp certs. This change makes it properly roll up the trust information, if a temp cert doesn't have trust information. Reviewers: rrelyea, keeler Reviewed By: rrelyea, keeler Subscribers: reviewbot, heftig Bug #: 1593167 [c46bc59ce7d4] [tip] 2019-11-08 Martin Thomson <mt@lowentropy.net> * lib/ssl/tls13subcerts.c: Bug 1594965 - Include saltLength in DC SPKI, r=kjacobs Summary: I discovered this when validating new additions to our root store policy. The encodings there didn't line up with what we were producing with DC. [661058254ade] 2019-12-04 J.C. Jones <jjones@mozilla.com> * automation/release/nss-release-helper.py: Bug 1535787 - Further improvements to the release-helper API r=mt [7baba392bf8b] * automation/release/nss-release-helper.py: Bug 1535787 - flake8 style updates to nss-release-helper.py r=kjacobs Depends on D23757 [b31e68a789fa] * automation/release/nss-release-helper.py: Bug 1535787 - Use Python for the regexes in nss-release-helper r=keeler,kjacobs automation/release/nss-release-helper.py doesn't actually edit the files correctly on MacOS due to differences between GNU and BSD sed. It's python, so let's just use python regexes. [92271739e848] 2019-12-04 Franziskus Kiefer <franziskuskiefer@gmail.com> * automation/taskcluster/graph/src/extend.js, automation/taskcluster/graph/src/queue.js, automation/taskcluster/scripts/check_abi.sh, build.sh, coreconf/config.gypi, help.txt, lib/freebl/freebl_base.gypi, mach, tests/all.sh, tests/common/init.sh, tests/remote/Makefile: Bug 1594933 - disable libnssdbm by default; keep build on CI, r=jcj Disale libnssdbm by default and add flag to enable it in builds. On CI a build and certs test with enabled legacy DB are added. Note that for some reason the coverage build fails. I have no idea why. I'm open for ideas. [c1fad130dce2] 2019-12-03 Makoto Kato <m_kato@ga2.so-net.ne.jp> * lib/freebl/Makefile, lib/freebl/freebl.gyp, lib/freebl/gcm- arm32-neon.c, lib/freebl/gcm.c: Bug 1562548 - Improve GCM perfomance on aarch32 using NEON. r=kjacobs Optimize GCM perfomance using https://conradoplg.cryptoland.net/files/2010/12/gcm14.pdf via ARM's NEON. [a9ba652046e6] 2019-12-03 J.C. Jones <jjones@mozilla.com> * automation/abi-check/expected-report-libssl3.so.txt, automation/abi- check/previous-nss-release, lib/nss/nss.h, lib/softoken/softkver.h, lib/util/nssutil.h: Set version numbers to 3.49 beta [3051793c68fc] 2019-12-02 J.C. Jones <jjones@mozilla.com> * .hgtags: Added tag NSS_3_48_BETA1 for changeset 77976f3fefca [06d5b4f91a9c] Differential Revision: https://phabricator.services.mozilla.com/D56378 --HG-- extra : moz-landing-system : lando
180 lines
6.3 KiB
Bash
Executable file
180 lines
6.3 KiB
Bash
Executable file
#! /bin/bash
|
|
|
|
set_env()
|
|
{
|
|
cd /home/worker
|
|
HGDIR=/home/worker
|
|
OUTPUTDIR=$(pwd)$(echo "/output")
|
|
DATE=$(date "+TB [%Y-%m-%d %H:%M:%S]")
|
|
|
|
if [ ! -d "${OUTPUTDIR}" ]; then
|
|
echo "Creating output dir"
|
|
mkdir "${OUTPUTDIR}"
|
|
fi
|
|
|
|
if [ ! -d "nspr" ]; then
|
|
for i in 0 2 5; do
|
|
sleep $i
|
|
hg clone -r "default" "https://hg.mozilla.org/projects/nspr" "${HGDIR}/nspr" && break
|
|
rm -rf nspr
|
|
done
|
|
fi
|
|
|
|
if [[ -f nss/nspr.patch && "$ALLOW_NSPR_PATCH" == "1" ]]; then
|
|
pushd nspr
|
|
cat ../nss/nspr.patch | patch -p1
|
|
popd
|
|
fi
|
|
|
|
cd nss
|
|
./build.sh -v -c
|
|
cd ..
|
|
}
|
|
|
|
check_abi()
|
|
{
|
|
set_env
|
|
set +e #reverses set -e from build.sh to allow possible hg clone failures
|
|
if [[ "$1" != --nobuild ]]; then # Start nobuild block
|
|
|
|
echo "######## NSS ABI CHECK ########"
|
|
echo "######## creating temporary HG clones ########"
|
|
|
|
rm -rf ${HGDIR}/baseline
|
|
mkdir ${HGDIR}/baseline
|
|
BASE_NSS=`cat ${HGDIR}/nss/automation/abi-check/previous-nss-release` #Reads the version number of the last release from the respective file
|
|
NSS_CLONE_RESULT=0
|
|
for i in 0 2 5; do
|
|
sleep $i
|
|
hg clone -u "${BASE_NSS}" "https://hg.mozilla.org/projects/nss" "${HGDIR}/baseline/nss"
|
|
if [ $? -eq 0 ]; then
|
|
NSS_CLONE_RESULT=0
|
|
break
|
|
fi
|
|
rm -rf "${HGDIR}/baseline/nss"
|
|
NSS_CLONE_RESULT=1
|
|
done
|
|
if [ ${NSS_CLONE_RESULT} -ne 0 ]; then
|
|
echo "invalid tag in automation/abi-check/previous-nss-release"
|
|
return 1
|
|
fi
|
|
|
|
BASE_NSPR=NSPR_$(head -1 ${HGDIR}/baseline/nss/automation/release/nspr-version.txt | cut -d . -f 1-2 | tr . _)_BRANCH
|
|
hg clone -u "${BASE_NSPR}" "https://hg.mozilla.org/projects/nspr" "${HGDIR}/baseline/nspr"
|
|
NSPR_CLONE_RESULT=$?
|
|
|
|
if [ ${NSPR_CLONE_RESULT} -ne 0 ]; then
|
|
rm -rf "${HGDIR}/baseline/nspr"
|
|
for i in 0 2 5; do
|
|
sleep $i
|
|
hg clone -u "default" "https://hg.mozilla.org/projects/nspr" "${HGDIR}/baseline/nspr" && break
|
|
rm -rf "${HGDIR}/baseline/nspr"
|
|
done
|
|
echo "Nonexisting tag ${BASE_NSPR} derived from ${BASE_NSS} automation/release/nspr-version.txt"
|
|
echo "Using default branch instead."
|
|
fi
|
|
|
|
echo "######## building baseline NSPR/NSS ########"
|
|
echo "${HGDIR}/baseline/nss/build.sh"
|
|
cd ${HGDIR}/baseline/nss
|
|
./build.sh -v -c
|
|
cd ${HGDIR}
|
|
else # Else nobuild block
|
|
echo "######## using existing baseline NSPR/NSS build ########"
|
|
fi # End nobuild block
|
|
|
|
set +e #reverses set -e from build.sh to allow abidiff failures
|
|
|
|
echo "######## Starting abidiff procedure ########"
|
|
abi_diff
|
|
}
|
|
|
|
#Slightly modified from builbot-slave/build.sh
|
|
abi_diff()
|
|
{
|
|
ABI_PROBLEM_FOUND=0
|
|
ABI_REPORT=${OUTPUTDIR}/abi-diff.txt
|
|
rm -f ${ABI_REPORT}
|
|
PREVDIST=${HGDIR}/baseline/dist
|
|
NEWDIST=${HGDIR}/dist
|
|
# libnssdbm3.so isn't built by default anymore, skip it.
|
|
ALL_SOs="libfreebl3.so libfreeblpriv3.so libnspr4.so libnss3.so libnssckbi.so libnsssysinit.so libnssutil3.so libplc4.so libplds4.so libsmime3.so libsoftokn3.so libssl3.so"
|
|
for SO in ${ALL_SOs}; do
|
|
if [ ! -f ${HGDIR}/nss/automation/abi-check/expected-report-$SO.txt ]; then
|
|
touch ${HGDIR}/nss/automation/abi-check/expected-report-$SO.txt
|
|
fi
|
|
abidiff --hd1 $PREVDIST/public/ --hd2 $NEWDIST/public \
|
|
$PREVDIST/*/lib/$SO $NEWDIST/*/lib/$SO \
|
|
> ${HGDIR}/nss/automation/abi-check/new-report-temp$SO.txt
|
|
RET=$?
|
|
cat ${HGDIR}/nss/automation/abi-check/new-report-temp$SO.txt \
|
|
| grep -v "^Functions changes summary:" \
|
|
| grep -v "^Variables changes summary:" \
|
|
| sed -e 's/__anonymous_enum__[0-9]*/__anonymous_enum__/g' \
|
|
> ${HGDIR}/nss/automation/abi-check/new-report-$SO.txt
|
|
rm -f ${HGDIR}/nss/automation/abi-check/new-report-temp$SO.txt
|
|
|
|
ABIDIFF_ERROR=$((($RET & 0x01) != 0))
|
|
ABIDIFF_USAGE_ERROR=$((($RET & 0x02) != 0))
|
|
ABIDIFF_ABI_CHANGE=$((($RET & 0x04) != 0))
|
|
ABIDIFF_ABI_INCOMPATIBLE_CHANGE=$((($RET & 0x08) != 0))
|
|
ABIDIFF_UNKNOWN_BIT_SET=$((($RET & 0xf0) != 0))
|
|
|
|
# If abidiff reports an error, or a usage error, or if it sets a result
|
|
# bit value this script doesn't know yet about, we'll report failure.
|
|
# For ABI changes, we don't yet report an error. We'll compare the
|
|
# result report with our whitelist. This allows us to silence changes
|
|
# that we're already aware of and have been declared acceptable.
|
|
|
|
REPORT_RET_AS_FAILURE=0
|
|
if [ $ABIDIFF_ERROR -ne 0 ]; then
|
|
echo "abidiff reported ABIDIFF_ERROR."
|
|
REPORT_RET_AS_FAILURE=1
|
|
fi
|
|
if [ $ABIDIFF_USAGE_ERROR -ne 0 ]; then
|
|
echo "abidiff reported ABIDIFF_USAGE_ERROR."
|
|
REPORT_RET_AS_FAILURE=1
|
|
fi
|
|
if [ $ABIDIFF_UNKNOWN_BIT_SET -ne 0 ]; then
|
|
echo "abidiff reported ABIDIFF_UNKNOWN_BIT_SET."
|
|
REPORT_RET_AS_FAILURE=1
|
|
fi
|
|
|
|
if [ $ABIDIFF_ABI_CHANGE -ne 0 ]; then
|
|
echo "Ignoring abidiff result ABI_CHANGE, instead we'll check for non-whitelisted differences."
|
|
fi
|
|
if [ $ABIDIFF_ABI_INCOMPATIBLE_CHANGE -ne 0 ]; then
|
|
echo "Ignoring abidiff result ABIDIFF_ABI_INCOMPATIBLE_CHANGE, instead we'll check for non-whitelisted differences."
|
|
fi
|
|
|
|
if [ $REPORT_RET_AS_FAILURE -ne 0 ]; then
|
|
ABI_PROBLEM_FOUND=1
|
|
echo "abidiff {$PREVDIST , $NEWDIST} for $SO FAILED with result $RET, or failed writing to ${HGDIR}/nss/automation/abi-check/new-report-$SO.txt"
|
|
fi
|
|
if [ ! -f ${HGDIR}/nss/automation/abi-check/expected-report-$SO.txt ]; then
|
|
ABI_PROBLEM_FOUND=1
|
|
echo "FAILED to access report file: ${HGDIR}/nss/automation/abi-check/expected-report-$SO.txt"
|
|
fi
|
|
|
|
diff -wB -u ${HGDIR}/nss/automation/abi-check/expected-report-$SO.txt \
|
|
${HGDIR}/nss/automation/abi-check/new-report-$SO.txt >> ${ABI_REPORT}
|
|
if [ ! -f ${ABI_REPORT} ]; then
|
|
ABI_PROBLEM_FOUND=1
|
|
echo "FAILED to compare exepcted and new report: ${HGDIR}/nss/automation/abi-check/new-report-$SO.txt"
|
|
fi
|
|
done
|
|
|
|
if [ -s ${ABI_REPORT} ]; then
|
|
echo "FAILED: there are new unexpected ABI changes"
|
|
cat ${ABI_REPORT}
|
|
return 1
|
|
elif [ $ABI_PROBLEM_FOUND -ne 0 ]; then
|
|
echo "FAILED: failure executing the ABI checks"
|
|
cat ${ABI_REPORT}
|
|
return 1
|
|
fi
|
|
|
|
return 0
|
|
}
|
|
|
|
check_abi $1
|