Cleanup storage in CertBlocklist, add new types of pair (e.g. whitelist entries, crlite status)
Categories
(Core :: Security: PSM, enhancement, P1)
Tracking
()
Tracking | Status | |
---|---|---|
firefox68 | --- | fixed |
People
(Reporter: mgoodwin, Assigned: mgoodwin)
References
(Depends on 1 open bug)
Details
(Whiteboard: [psm-assigned])
Attachments
(3 files, 3 obsolete files)
No description provided.
Assignee | ||
Comment 1•7 years ago
|
||
(possibly also rename revocations.txt in the profile to reflect additional uses)
Updated•7 years ago
|
Assignee | ||
Comment 2•6 years ago
|
||
Assignee | ||
Comment 3•6 years ago
|
||
Test coverage: We're missing test coverage for removal of entries (this isn't covered for the existing implementation). We could do with a test or two for setting and reading whitelist / enrolment state (though it's largely hitting the same code as the OneCRL bits). Tweaks: I need to make a minor change to blocklist-clients to read additions / removals rather than enumerating the whole of the collection data. The "migrate from revocations.txt" stuff needs a) moving the a different method, b) the file removal bit and c) to not have the unwrap() calls, since we don't want panics. Rationale: I've largely mirrored the XPCom interface in the SecurityState struct to allow us the use of ? to keep the actual implementation code clean, while still handling all error cases. I spoke with Nika about this - she's happy with the approach (XPCom in Rust is fine, provided there's no non-scriptable stuff). In future, it might be nice to use a different ffi approach for the non-JS callers but that doesn't feel important right now. Nika suggested we might want to get froydnj's eyes on this.
Assignee | ||
Comment 4•6 years ago
|
||
Ah, also, I've just spotted I actually need to implement IsBlocklistFresh - pref branch reading works fine but it's in a WIP patch. I'll move it over.
Assignee | ||
Comment 5•6 years ago
|
||
Assignee | ||
Updated•6 years ago
|
Assignee | ||
Updated•6 years ago
|
Updated•6 years ago
|
Assignee | ||
Comment 8•6 years ago
|
||
Assignee | ||
Comment 9•6 years ago
|
||
We have a crash in rkv that could be a jemalloc bug. Myk and I are currently investigating.
Assignee | ||
Updated•6 years ago
|
Updated•6 years ago
|
Comment 10•6 years ago
|
||
Updated•6 years ago
|
Comment 11•6 years ago
|
||
bug 1429796 - cert_storage: create rkv environment and store only once to avoid races r?mgoodwin,jcj
This patch also base64-decodes the API inputs before storing in the DB in
anticipation of being able to pass binary data directly.
Updated•6 years ago
|
Comment 12•6 years ago
|
||
This patch also base64-decodes the API inputs before storing in the DB in
anticipation of being able to pass binary data directly.
Comment 13•6 years ago
|
||
Pushed by dkeeler@mozilla.com: https://hg.mozilla.org/integration/autoland/rev/1bd54f8dfd9e Cleanup storage in CertBlocklist to allow easy addition of new types of pair (e.g. whitelist entries) r=keeler https://hg.mozilla.org/integration/autoland/rev/b0d08863f7a5 cert_storage: create rkv environment and store only once to avoid races r=mgoodwin,jcj
Comment 14•6 years ago
|
||
Backed out for xperf failures
Failure log: https://treeherder.mozilla.org/logviewer.html#/jobs?job_id=234865916&repo=autoland&lineNumber=1443
Backout: https://hg.mozilla.org/integration/autoland/rev/91403c24fee3d5df8fa978710785807b409d7af8
Comment 15•6 years ago
|
||
Looks like we need to whitelist the DB file backing cert_storage.
https://treeherder.mozilla.org/#/jobs?repo=try&revision=de76cc9178bd2dd9140e81ea53aa3e5a1f349947
Comment 16•6 years ago
|
||
Pushed by dkeeler@mozilla.com: https://hg.mozilla.org/integration/autoland/rev/99079ab7e52e Cleanup storage in CertBlocklist to allow easy addition of new types of pair (e.g. whitelist entries) r=keeler https://hg.mozilla.org/integration/autoland/rev/5514aae0e34e cert_storage: create rkv environment and store only once to avoid races r=mgoodwin,jcj
Comment 17•6 years ago
|
||
bugherder |
https://hg.mozilla.org/mozilla-central/rev/99079ab7e52e
https://hg.mozilla.org/mozilla-central/rev/5514aae0e34e
Comment 18•6 years ago
|
||
(In reply to Dana Keeler (she/her) (use needinfo) (:keeler for reviews) from comment #15)
Looks like we need to whitelist the DB file backing cert_storage.
It looks like the <profile>/security_state/data.mdb file is being accessed from the main thread. Is this intentional? If so, what makes the I/O to this file impossible to do off main thread?
Updated•6 years ago
|
Comment 20•5 years ago
|
||
Making this depend on ship-rkv meta instead of multiple individual bugs.
Description
•