diff options
author | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-19 00:47:55 +0000 |
---|---|---|
committer | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-19 00:47:55 +0000 |
commit | 26a029d407be480d791972afb5975cf62c9360a6 (patch) | |
tree | f435a8308119effd964b339f76abb83a57c29483 /security/mac/hardenedruntime/v2 | |
parent | Initial commit. (diff) | |
download | firefox-26a029d407be480d791972afb5975cf62c9360a6.tar.xz firefox-26a029d407be480d791972afb5975cf62c9360a6.zip |
Adding upstream version 124.0.1.upstream/124.0.1
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'security/mac/hardenedruntime/v2')
9 files changed, 238 insertions, 0 deletions
diff --git a/security/mac/hardenedruntime/v2/developer/browser.xml b/security/mac/hardenedruntime/v2/developer/browser.xml new file mode 100644 index 0000000000..33f520143e --- /dev/null +++ b/security/mac/hardenedruntime/v2/developer/browser.xml @@ -0,0 +1,37 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd"> +<!-- + Entitlements to apply to the main browser process executable during + codesigning of developer builds. +--> +<plist version="1.0"> + <dict> + <!-- Firefox needs to create executable pages without MAP_JIT on x64 --> + <key>com.apple.security.cs.allow-unsigned-executable-memory</key><true/> + + <!-- Firefox needs to create executable pages with MAP_JIT on aarch64 --> + <key>com.apple.security.cs.allow-jit</key><true/> + + <!-- For dev builds only, allow loading third party libraries as a + workaround enabling self-signed builds to launch. --> + <key>com.apple.security.cs.disable-library-validation</key><true/> + + <!-- Allow dyld environment variables for gtests and debugging --> + <key>com.apple.security.cs.allow-dyld-environment-variables</key><true/> + + <!-- Allow debuggers to attach to running executables --> + <key>com.apple.security.get-task-allow</key><true/> + + <!-- Firefox needs to access the microphone on sites the user allows --> + <key>com.apple.security.device.audio-input</key><true/> + + <!-- Firefox needs to access the camera on sites the user allows --> + <key>com.apple.security.device.camera</key><true/> + + <!-- Firefox needs to access the location on sites the user allows --> + <key>com.apple.security.personal-information.location</key><true/> + + <!-- For SmartCardServices(7) --> + <key>com.apple.security.smartcard</key><true/> + </dict> +</plist> diff --git a/security/mac/hardenedruntime/v2/developer/media-plugin-helper.xml b/security/mac/hardenedruntime/v2/developer/media-plugin-helper.xml new file mode 100644 index 0000000000..86d376d87c --- /dev/null +++ b/security/mac/hardenedruntime/v2/developer/media-plugin-helper.xml @@ -0,0 +1,18 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd"> +<!-- + Entitlements to apply to the media-plugin-helper.app bundle during + codesigning of developer builds. +--> +<plist version="1.0"> + <dict> + <!-- Allow loading third party CDM libraries --> + <key>com.apple.security.cs.disable-library-validation</key><true/> + + <!-- Allow dyld environment variables for debugging --> + <key>com.apple.security.cs.allow-dyld-environment-variables</key><true/> + + <!-- Allow debuggers to attach to running executables --> + <key>com.apple.security.get-task-allow</key><true/> + </dict> +</plist> diff --git a/security/mac/hardenedruntime/v2/developer/plugin-container.xml b/security/mac/hardenedruntime/v2/developer/plugin-container.xml new file mode 100644 index 0000000000..7bed5fc2b8 --- /dev/null +++ b/security/mac/hardenedruntime/v2/developer/plugin-container.xml @@ -0,0 +1,25 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd"> +<!-- + Entitlements to apply to the plugin-container.app bundle during + codesigning of developer builds. +--> +<plist version="1.0"> + <dict> + <!-- Firefox needs to create executable pages without MAP_JIT on x64 --> + <key>com.apple.security.cs.allow-unsigned-executable-memory</key><true/> + + <!-- Firefox needs to create executable pages with MAP_JIT on aarch64 --> + <key>com.apple.security.cs.allow-jit</key><true/> + + <!-- Allow dyld environment variables for debugging --> + <key>com.apple.security.cs.allow-dyld-environment-variables</key><true/> + + <!-- Allow debuggers to attach to running executables --> + <key>com.apple.security.get-task-allow</key><true/> + + <!-- For dev builds only, allow loading third party libraries as a + workaround enabling self-signed builds to launch. --> + <key>com.apple.security.cs.disable-library-validation</key><true/> + </dict> +</plist> diff --git a/security/mac/hardenedruntime/v2/developer/utility.xml b/security/mac/hardenedruntime/v2/developer/utility.xml new file mode 100644 index 0000000000..3c4f73e80b --- /dev/null +++ b/security/mac/hardenedruntime/v2/developer/utility.xml @@ -0,0 +1,20 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd"> +<!-- + Entitlements to apply to non-browser executables such as updater, + pingsender, minidump-analyzer, and crashreporter during codesigning of + developer builds. +--> +<plist version="1.0"> + <dict> + <!-- Allow dyld environment variables for debugging --> + <key>com.apple.security.cs.allow-dyld-environment-variables</key><true/> + + <!-- Allow debuggers to attach to running executables --> + <key>com.apple.security.get-task-allow</key><true/> + + <!-- For dev builds only, allow loading third party libraries as a + workaround enabling self-signed builds to launch. --> + <key>com.apple.security.cs.disable-library-validation</key><true/> + </dict> +</plist> diff --git a/security/mac/hardenedruntime/v2/production/firefox.browser.xml b/security/mac/hardenedruntime/v2/production/firefox.browser.xml new file mode 100644 index 0000000000..3a14e8ad37 --- /dev/null +++ b/security/mac/hardenedruntime/v2/production/firefox.browser.xml @@ -0,0 +1,37 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd"> +<!-- + Entitlements to apply to the main browser process executable during + codesigning of production channel builds. +--> +<plist version="1.0"> + <dict> + <!-- Firefox needs to create executable pages (without MAP_JIT) --> + <key>com.apple.security.cs.allow-unsigned-executable-memory</key><true/> + + <!-- Allow loading third party libraries to support pkcs11 modules --> + <key>com.apple.security.cs.disable-library-validation</key><true/> + + <!-- Firefox needs to create executable pages with MAP_JIT on aarch64 --> + <key>com.apple.security.cs.allow-jit</key><true/> + + <!-- Firefox needs to access the microphone on sites the user allows --> + <key>com.apple.security.device.audio-input</key><true/> + + <!-- Firefox needs to access the camera on sites the user allows --> + <key>com.apple.security.device.camera</key><true/> + + <!-- Firefox needs to access the location on sites the user allows --> + <key>com.apple.security.personal-information.location</key><true/> + + <!-- For SmartCardServices(7) --> + <key>com.apple.security.smartcard</key><true/> + + <!-- Required for com.apple.developer.web-browser.public-key-credential --> + <key>com.apple.application-identifier</key> + <string>43AQ936H96.org.mozilla.firefox</string> + + <!-- For platform passkey (webauthn) support --> + <key>com.apple.developer.web-browser.public-key-credential</key><true/> + </dict> +</plist> diff --git a/security/mac/hardenedruntime/v2/production/firefoxdeveloperedition.browser.xml b/security/mac/hardenedruntime/v2/production/firefoxdeveloperedition.browser.xml new file mode 100644 index 0000000000..ef8480b081 --- /dev/null +++ b/security/mac/hardenedruntime/v2/production/firefoxdeveloperedition.browser.xml @@ -0,0 +1,37 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd"> +<!-- + Entitlements to apply to the main browser process executable during + codesigning of production channel builds. +--> +<plist version="1.0"> + <dict> + <!-- Firefox needs to create executable pages (without MAP_JIT) --> + <key>com.apple.security.cs.allow-unsigned-executable-memory</key><true/> + + <!-- Allow loading third party libraries to support pkcs11 modules --> + <key>com.apple.security.cs.disable-library-validation</key><true/> + + <!-- Firefox needs to create executable pages with MAP_JIT on aarch64 --> + <key>com.apple.security.cs.allow-jit</key><true/> + + <!-- Firefox needs to access the microphone on sites the user allows --> + <key>com.apple.security.device.audio-input</key><true/> + + <!-- Firefox needs to access the camera on sites the user allows --> + <key>com.apple.security.device.camera</key><true/> + + <!-- Firefox needs to access the location on sites the user allows --> + <key>com.apple.security.personal-information.location</key><true/> + + <!-- For SmartCardServices(7) --> + <key>com.apple.security.smartcard</key><true/> + + <!-- Required for com.apple.developer.web-browser.public-key-credential --> + <key>com.apple.application-identifier</key> + <string>43AQ936H96.org.mozilla.firefoxdeveloperedition</string> + + <!-- For platform passkey (webauthn) support --> + <key>com.apple.developer.web-browser.public-key-credential</key><true/> + </dict> +</plist> diff --git a/security/mac/hardenedruntime/v2/production/media-plugin-helper.xml b/security/mac/hardenedruntime/v2/production/media-plugin-helper.xml new file mode 100644 index 0000000000..8ea97fc742 --- /dev/null +++ b/security/mac/hardenedruntime/v2/production/media-plugin-helper.xml @@ -0,0 +1,12 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd"> +<!-- + Entitlements to apply to the media-plugin-helper.app bundle during + codesigning of production channel builds. +--> +<plist version="1.0"> + <dict> + <!-- Allow loading third party CDM libraries --> + <key>com.apple.security.cs.disable-library-validation</key><true/> + </dict> +</plist> diff --git a/security/mac/hardenedruntime/v2/production/nightly.browser.xml b/security/mac/hardenedruntime/v2/production/nightly.browser.xml new file mode 100644 index 0000000000..03ff689334 --- /dev/null +++ b/security/mac/hardenedruntime/v2/production/nightly.browser.xml @@ -0,0 +1,37 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd"> +<!-- + Entitlements to apply to the main browser process executable during + codesigning of production channel builds. +--> +<plist version="1.0"> + <dict> + <!-- Firefox needs to create executable pages (without MAP_JIT) --> + <key>com.apple.security.cs.allow-unsigned-executable-memory</key><true/> + + <!-- Allow loading third party libraries to support pkcs11 modules --> + <key>com.apple.security.cs.disable-library-validation</key><true/> + + <!-- Firefox needs to create executable pages with MAP_JIT on aarch64 --> + <key>com.apple.security.cs.allow-jit</key><true/> + + <!-- Firefox needs to access the microphone on sites the user allows --> + <key>com.apple.security.device.audio-input</key><true/> + + <!-- Firefox needs to access the camera on sites the user allows --> + <key>com.apple.security.device.camera</key><true/> + + <!-- Firefox needs to access the location on sites the user allows --> + <key>com.apple.security.personal-information.location</key><true/> + + <!-- For SmartCardServices(7) --> + <key>com.apple.security.smartcard</key><true/> + + <!-- Required for com.apple.developer.web-browser.public-key-credential --> + <key>com.apple.application-identifier</key> + <string>43AQ936H96.org.mozilla.nightly</string> + + <!-- For platform passkey (webauthn) support --> + <key>com.apple.developer.web-browser.public-key-credential</key><true/> + </dict> +</plist> diff --git a/security/mac/hardenedruntime/v2/production/plugin-container.xml b/security/mac/hardenedruntime/v2/production/plugin-container.xml new file mode 100644 index 0000000000..cfc79f1d21 --- /dev/null +++ b/security/mac/hardenedruntime/v2/production/plugin-container.xml @@ -0,0 +1,15 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd"> +<!-- + Entitlements to apply to the plugin-container.app bundle during + codesigning of production channel builds. +--> +<plist version="1.0"> + <dict> + <!-- Firefox needs to create executable pages without MAP_JIT on x64 --> + <key>com.apple.security.cs.allow-unsigned-executable-memory</key><true/> + + <!-- Firefox needs to create executable pages with MAP_JIT on aarch64 --> + <key>com.apple.security.cs.allow-jit</key><true/> + </dict> +</plist> |