Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(16)

Issue 2494843002: Don't pass domain and verification key to validation when not required (Closed)

Created:
4 years, 1 month ago by emaxx
Modified:
4 years, 1 month ago
CC:
chromium-reviews, oshima+watch_chromium.org, davemoore+watch_chromium.org
Target Ref:
refs/pending/heads/master
Project:
chromium
Visibility:
Public.

Description

Don't pass domain and verification key to validation when not required This CL decouples the CloudPolicyValidator::ValidateSignature method into two different methods. One is purely for signature checking, and the other is for signature checking _and_ for the key rotation validation. The previous solution was to have a single method that accepts all credentials and a boolean flag. This is a bit confusing, as it's not obvious which parameters will be actually used. Seems that there's a number of places in the code currently where this confusion resulted in passing (and obtaining from somewhere) the credentials that will be actually ignored. BUG=644632 Committed: https://crrev.com/40777b773f442cd06df172d812a5ad2751e3552b Cr-Commit-Position: refs/heads/master@{#432360}

Patch Set 1 #

Total comments: 4

Patch Set 2 : Address feedback #

Total comments: 6

Patch Set 3 : Fix nit #

Patch Set 4 : Rebase #

Messages

Total messages: 48 (31 generated)
emaxx
PTAL. If I'm reading the validator code correctly, the domain and the verification key were ...
4 years, 1 month ago (2016-11-10 23:17:44 UTC) #7
Thiemo Nagel
LGTM https://codereview.chromium.org/2494843002/diff/1/components/policy/core/common/cloud/cloud_policy_validator.h File components/policy/core/common/cloud/cloud_policy_validator.h (right): https://codereview.chromium.org/2494843002/diff/1/components/policy/core/common/cloud/cloud_policy_validator.h#newcode190 components/policy/core/common/cloud/cloud_policy_validator.h:190: // verifies against |key|. Nit: I'd suggest to ...
4 years, 1 month ago (2016-11-11 15:07:54 UTC) #8
emaxx
https://codereview.chromium.org/2494843002/diff/1/components/policy/core/common/cloud/cloud_policy_validator.h File components/policy/core/common/cloud/cloud_policy_validator.h (right): https://codereview.chromium.org/2494843002/diff/1/components/policy/core/common/cloud/cloud_policy_validator.h#newcode190 components/policy/core/common/cloud/cloud_policy_validator.h:190: // verifies against |key|. On 2016/11/11 15:07:54, Thiemo Nagel ...
4 years, 1 month ago (2016-11-11 17:50:29 UTC) #17
Mattias Nissler (ping if slow)
LGTM https://codereview.chromium.org/2494843002/diff/20001/components/policy/core/common/cloud/cloud_policy_validator_unittest.cc File components/policy/core/common/cloud/cloud_policy_validator_unittest.cc (right): https://codereview.chromium.org/2494843002/diff/20001/components/policy/core/common/cloud/cloud_policy_validator_unittest.cc#newcode117 components/policy/core/common/cloud/cloud_policy_validator_unittest.cc:117: validator->ValidateInitialKey(GetPolicyVerificationKey(), owning_domain_); nit: it seems worthwhile to fold ...
4 years, 1 month ago (2016-11-14 08:46:46 UTC) #18
Andrew T Wilson (Slow)
LGTM, I just want to make sure the provenance of the key returned by DeviceSettingsService ...
4 years, 1 month ago (2016-11-14 09:29:37 UTC) #19
emaxx
On 2016/11/14 09:29:37, Andrew T Wilson (Slow) wrote: > LGTM, I just want to make ...
4 years, 1 month ago (2016-11-14 16:27:07 UTC) #22
Andrew T Wilson (Slow)
On 2016/11/14 16:27:07, emaxx wrote: > On 2016/11/14 09:29:37, Andrew T Wilson (Slow) wrote: > ...
4 years, 1 month ago (2016-11-15 16:13:11 UTC) #25
Andrew T Wilson (Slow)
LGTM. It's fine to allow both ValidateSignatureXXX() calls to be made, I guess. Shouldn't break ...
4 years, 1 month ago (2016-11-15 16:15:58 UTC) #26
Mattias Nissler (ping if slow)
On 2016/11/15 16:13:11, Andrew T Wilson (Slow) wrote: > Mattias, do you know why we ...
4 years, 1 month ago (2016-11-15 18:37:41 UTC) #27
emaxx
OK, so looks like it's all good, and no faults were found. I'll land this ...
4 years, 1 month ago (2016-11-15 19:54:40 UTC) #28
commit-bot: I haz the power
CQ is trying da patch. Follow status at https://chromium-cq-status.appspot.com/v2/patch-status/codereview.chromium.org/2494843002/40001
4 years, 1 month ago (2016-11-15 19:55:36 UTC) #31
commit-bot: I haz the power
Try jobs failed on following builders: cast_shell_linux on master.tryserver.chromium.linux (JOB_FAILED, http://build.chromium.org/p/tryserver.chromium.linux/builders/cast_shell_linux/builds/260899)
4 years, 1 month ago (2016-11-15 20:06:49 UTC) #33
commit-bot: I haz the power
CQ is trying da patch. Follow status at https://chromium-cq-status.appspot.com/v2/patch-status/codereview.chromium.org/2494843002/60001
4 years, 1 month ago (2016-11-15 22:06:08 UTC) #40
commit-bot: I haz the power
Try jobs failed on following builders: cast_shell_linux on master.tryserver.chromium.linux (JOB_FAILED, http://build.chromium.org/p/tryserver.chromium.linux/builders/cast_shell_linux/builds/261173)
4 years, 1 month ago (2016-11-15 22:30:43 UTC) #42
commit-bot: I haz the power
CQ is trying da patch. Follow status at https://chromium-cq-status.appspot.com/v2/patch-status/codereview.chromium.org/2494843002/60001
4 years, 1 month ago (2016-11-16 02:24:44 UTC) #44
commit-bot: I haz the power
Committed patchset #4 (id:60001)
4 years, 1 month ago (2016-11-16 02:36:09 UTC) #46
commit-bot: I haz the power
4 years, 1 month ago (2016-11-16 02:39:34 UTC) #48
Message was sent while issue was closed.
Patchset 4 (id:??) landed as
https://crrev.com/40777b773f442cd06df172d812a5ad2751e3552b
Cr-Commit-Position: refs/heads/master@{#432360}

Powered by Google App Engine
This is Rietveld 408576698