Security/Sandbox/2014-07-10
From MozillaWiki
« previous week | index | next week »
10 July 2014
- Windows sandboxing
- Tim was out Fri-Wed (today is first day back)
- OpenH264
- No review comments received yet on the new patch in bug 985252 (will ping :bent today)
- Logging
- Bug 1018966 Warn Only Sandbox: r- due to changes to Chromium code. I have worked around some of these and have an r+ on the first patch. There are still some changes to Chromium code to add the logging statements, but I have isolated those into their own patch and uploaded a backout patch as well.
- Content process
- Bug 1018988 Low integrity temp directory: I have a very rough patch that gets the AppData\LocalLow directory appends MozTemp to it and replaces the cached directory in the Directory Service. Tests passing locally that create temporary files in this location. Try push running.
- Bug 1035275 -Imported Chromium code under security/sandbox that is not being compiled.
- Mac sandboxing
- Linux/B2G sandboxing
- Supervisor (https://bugzilla.mozilla.org/show_bug.cgi?id=845191)
- Supervisor (https://bugzilla.mozilla.org/show_bug.cgi?id=845191)
Round table
- Where are we with sandboxing for OpenH264 on each platform?
- Windows: 70% confidence
- OSX: "depends"
- Linux: Need https://bugzilla.mozilla.org/show_bug.cgi?id=1020090 landed. After that, we're on track. "should be doable"
- Who's going to get the patch from https://bugzilla.mozilla.org/show_bug.cgi?id=1035786 landed?
Testing OpenH264:
Content process sandboxing starts here:
- Can we move this to be a sub-heading of the OS headings up above?
Actions