Closed Bug 2010145 Opened 11 days ago Closed 4 days ago

regenerate test certificates for 2026

Categories

(Core :: Security: PSM, task)

task

Tracking

()

RESOLVED FIXED
149 Branch
Tracking Status
firefox-esr115 --- affected
firefox-esr140 --- affected
firefox147 --- fixed
firefox148 --- fixed
firefox149 --- fixed

People

(Reporter: aryx, Assigned: aryx)

References

(Regressed 1 open bug)

Details

Attachments

(8 files)

48 bytes, text/x-phabricator-request
Details | Review
48 bytes, text/x-phabricator-request
Details | Review
48 bytes, text/x-phabricator-request
Details | Review
48 bytes, text/x-phabricator-request
Details | Review
48 bytes, text/x-phabricator-request
Details | Review
48 bytes, text/x-phabricator-request
Details | Review
48 bytes, text/x-phabricator-request
Details | Review
48 bytes, text/x-phabricator-request
Details | Review

The test certificates expire on 2026-02-04 and security/manager/ssl/tests/unit/test_cert_expiration_canary.js will 3 weeks before on 2026-01-14 - tomorrow.

Test will start failing on 2026-01-14 - 3 weeks before the checked certificate
expires.

Attachment #9537343 - Attachment description: Bug 2010145 - renew test certificates. r=keeler → Bug 2010145 - renew test certificates for 2026. r=keeler
Pushed by archaeopteryx@coole-files.de: https://github.com/mozilla-firefox/firefox/commit/107d0e5deb84 https://hg.mozilla.org/integration/autoland/rev/84f3c12d1177 renew test certificates for 2026. r=keeler,necko-reviewers,extension-reviewers,kershaw,robwu
Duplicate of this bug: 2011340
Status: ASSIGNED → RESOLVED
Closed: 4 days ago
Keywords: leave-open
Resolution: --- → FIXED
Target Milestone: --- → 149 Branch

Certificates expire on 2027-02-04.

Extended with the instructions in security/manager/ssl/tests/unit/test_cert_expiration_canary.js

If this test and only this test fails, do the following:

  1. Create a bug for the issue in "Core :: Security: PSM".
  2. Write a patch to temporarily disable the test.
  3. Land the patch.
  4. Write a patch to reenable the test but don't land it.
  5. Needinfo the triage owner of Bugzilla's "Core :: Security: PSM" component
    in the bug.
  6. Patches to update certificates get created.
    6.1. Update certificates in security/manager/ssl/tests/unit with
    ./mach generate-test-certs
    6.2. Update more certificates with
    ./mach python build/pgo/genpgocert.py
    6.3. Temporarily uncomment the code in security/manager/ssl/tests/unit/test_signed_apps/moz.build,
    build Firefox with |./mach build| and copy the relevant non-build files
    from the related object directory folder into this folder.
    6.4. Update the certificate fingerprints mentioned in
    security/manager/ssl/tests/unit/test_cert_override_read.js with
    openssl x509 -noout -fingerprint -sha256 -in security/manager/ssl/tests/unit/bad_certs/certName.pem
    6.5. Update the base64 encoded serial numbers of test-int.pem and other-test-ca.pem in
    security/manager/ssl/tests/unit/test_cert_storage.js
    6.5.1. Get the serial number value
    openssl x509 -noout -in security/manager/ssl/tests/unit/bad_certs/test-int.pem -serial
    6.5.2. base64 encode the hex value without the prefix
    6.5.3. Update base64 encoded value in the test file.
  7. Commit the changes: Mention the year of the update, the date of the
    next expiration and add these instructions to the commit message.
  8. Test the patches with a Try push.
  9. Land the patches on all trees whose code will still be used when the
    certificates expire in 3 weeks.

Original Revision: https://phabricator.services.mozilla.com/D278888

Attachment #9539107 - Flags: approval-mozilla-beta?

firefox-beta Uplift Approval Request

  • User impact if declined: no user impact but automated tests in our CI will start to fail on Feb 4
  • Code covered by automated testing: yes
  • Fix verified in Nightly: yes
  • Needs manual QE test: no
  • Steps to reproduce for manual QE testing:
  • Risk associated with taking this patch: low
  • Explanation of risk level: Does not affect the build we ship
  • String changes made/needed: no
  • Is Android affected?: no
Attachment #9539108 - Flags: approval-mozilla-beta?
Attachment #9539108 - Flags: approval-mozilla-beta? → approval-mozilla-beta+
Attachment #9539107 - Flags: approval-mozilla-beta? → approval-mozilla-beta+

Certificates expire on 2027-02-04.

Extended with the instructions in security/manager/ssl/tests/unit/test_cert_expiration_canary.js

If this test and only this test fails, do the following:

  1. Create a bug for the issue in "Core :: Security: PSM".
  2. Write a patch to temporarily disable the test.
  3. Land the patch.
  4. Write a patch to reenable the test but don't land it.
  5. Needinfo the triage owner of Bugzilla's "Core :: Security: PSM" component
    in the bug.
  6. Patches to update certificates get created.
    6.1. Update certificates in security/manager/ssl/tests/unit with
    ./mach generate-test-certs
    6.2. Update more certificates with
    ./mach python build/pgo/genpgocert.py
    6.3. Temporarily uncomment the code in security/manager/ssl/tests/unit/test_signed_apps/moz.build,
    build Firefox with |./mach build| and copy the relevant non-build files
    from the related object directory folder into this folder.
    6.4. Update the certificate fingerprints mentioned in
    security/manager/ssl/tests/unit/test_cert_override_read.js with
    openssl x509 -noout -fingerprint -sha256 -in security/manager/ssl/tests/unit/bad_certs/certName.pem
    6.5. Update the base64 encoded serial numbers of test-int.pem and other-test-ca.pem in
    security/manager/ssl/tests/unit/test_cert_storage.js
    6.5.1. Get the serial number value
    openssl x509 -noout -in security/manager/ssl/tests/unit/bad_certs/test-int.pem -serial
    6.5.2. base64 encode the hex value without the prefix
    6.5.3. Update base64 encoded value in the test file.
  7. Commit the changes: Mention the year of the update, the date of the
    next expiration and add these instructions to the commit message.
  8. Test the patches with a Try push.
  9. Land the patches on all trees whose code will still be used when the
    certificates expire in 3 weeks.
Attachment #9539857 - Flags: approval-mozilla-release?
Attachment #9539858 - Flags: approval-mozilla-release?

firefox-release Uplift Approval Request

  • User impact if declined: no user impact but automated tests in our CI will start to fail on Feb 4
  • Code covered by automated testing: yes
  • Fix verified in Nightly: yes
  • Needs manual QE test: no
  • Steps to reproduce for manual QE testing:
  • Risk associated with taking this patch: low
  • Explanation of risk level: Does not affect the build we ship
  • String changes made/needed: no
  • Is Android affected?: no
See Also: → 1940172
Summary: renew test certificates → regenerate test certificates for 2026

Certificates expire on 2027-02-04.

Extended with the instructions in security/manager/ssl/tests/unit/test_cert_expiration_canary.js

If this test and only this test fails, do the following:

  1. Create a bug for the issue in "Core :: Security: PSM".
  2. Write a patch to temporarily disable the test.
  3. Land the patch.
  4. Write a patch to reenable the test but don't land it.
  5. Needinfo the triage owner of Bugzilla's "Core :: Security: PSM" component
    in the bug.
  6. Patches to update certificates get created.
    6.1. Update certificates in security/manager/ssl/tests/unit with
    ./mach generate-test-certs
    6.2. Update more certificates with
    ./mach python build/pgo/genpgocert.py
    6.3. Temporarily uncomment the code in security/manager/ssl/tests/unit/test_signed_apps/moz.build,
    build Firefox with |./mach build| and copy the relevant non-build files
    from the related object directory folder into this folder.
    6.4. Update the certificate fingerprints mentioned in
    security/manager/ssl/tests/unit/test_cert_override_read.js with
    openssl x509 -noout -fingerprint -sha256 -in security/manager/ssl/tests/unit/bad_certs/certName.pem
    6.5. Update the base64 encoded serial numbers of test-int.pem and other-test-ca.pem in
    security/manager/ssl/tests/unit/test_cert_storage.js
    6.5.1. Get the serial number value
    openssl x509 -noout -in security/manager/ssl/tests/unit/bad_certs/test-int.pem -serial
    6.5.2. base64 encode the hex value without the prefix
    6.5.3. Update base64 encoded value in the test file.
  7. Commit the changes: Mention the year of the update, the date of the
    next expiration and add these instructions to the commit message.
  8. Test the patches with a Try push.
  9. Land the patches on all trees whose code will still be used when the
    certificates expire in 3 weeks.
Attachment #9539886 - Flags: approval-mozilla-release?
Attachment #9539858 - Attachment description: Bug 2010145 - extend documentation how to update in-tree test certificates. → Bug 2010145 - extend documentation how to update in-tree test certificates. r=keeler
Attachment #9539857 - Flags: approval-mozilla-release? → approval-mozilla-release+
Attachment #9539858 - Flags: approval-mozilla-release? → approval-mozilla-release+
Regressions: 2012309
You need to log in before you can comment on or make changes to this bug.

Attachment

General

Created:
Updated:
Size: