Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(106)

Issue 330213002: *wip* NSS: handle chromeos system slot. (Closed)

Created:
6 years, 6 months ago by mattm
Modified:
6 years, 4 months ago
CC:
chromium-reviews, cbentzel+watch_chromium.org, stevenjb+watch_chromium.org, davemoore+watch_chromium.org, oshima+watch_chromium.org, nkostylev+watch_chromium.org
Project:
chromium
Visibility:
Public.

Description

*wip* NSS: handle chromeos system slot. BUG=210525

Patch Set 1 #

Total comments: 22

Patch Set 2 : review #1 changes, remove chromeos/ changes #

Total comments: 2

Patch Set 3 : child of https://codereview.chromium.org/383593002/ now #

Unified diffs Side-by-side diffs Delta from patch set Stats (+86 lines, -18 lines) Patch
M chrome/browser/chromeos/net/cert_verify_proc_chromeos.cc View 1 1 chunk +4 lines, -1 line 0 comments Download
M chrome/browser/net/nss_context_chromeos.cc View 1 1 chunk +2 lines, -1 line 0 comments Download
M net/cert/nss_cert_database_chromeos.h View 1 1 chunk +5 lines, -1 line 0 comments Download
M net/cert/nss_cert_database_chromeos.cc View 1 chunk +3 lines, -2 lines 0 comments Download
M net/cert/nss_cert_database_chromeos_unittest.cc View 1 chunk +4 lines, -2 lines 0 comments Download
M net/cert/nss_profile_filter_chromeos.h View 2 chunks +3 lines, -1 line 0 comments Download
M net/cert/nss_profile_filter_chromeos.cc View 1 4 chunks +23 lines, -5 lines 0 comments Download
M net/cert/nss_profile_filter_chromeos_unittest.cc View 1 7 chunks +36 lines, -3 lines 0 comments Download
M net/ssl/client_cert_store_chromeos.cc View 1 1 chunk +6 lines, -2 lines 0 comments Download

Messages

Total messages: 5 (0 generated)
pneubeck (no reviews)
Sorry if I'm ranting so much about the low amount of documentation around certificate handling; ...
6 years, 6 months ago (2014-06-13 12:40:43 UTC) #1
mattm
I've removed the chromeos/shill related changes, since I think that will require some more in-depth ...
6 years, 6 months ago (2014-06-24 03:16:46 UTC) #2
pneubeck (no reviews)
https://codereview.chromium.org/330213002/diff/30012/chrome/browser/net/nss_context_chromeos.cc File chrome/browser/net/nss_context_chromeos.cc (right): https://codereview.chromium.org/330213002/diff/30012/chrome/browser/net/nss_context_chromeos.cc#newcode93 chrome/browser/net/nss_context_chromeos.cc:93: net::NSSCertDatabase* GetNSSCertDatabaseForResourceContext( could we change this from lazy initialization ...
6 years, 5 months ago (2014-06-27 17:07:39 UTC) #3
mattm
https://codereview.chromium.org/330213002/diff/30012/chrome/browser/net/nss_context_chromeos.cc File chrome/browser/net/nss_context_chromeos.cc (right): https://codereview.chromium.org/330213002/diff/30012/chrome/browser/net/nss_context_chromeos.cc#newcode93 chrome/browser/net/nss_context_chromeos.cc:93: net::NSSCertDatabase* GetNSSCertDatabaseForResourceContext( On 2014/06/27 17:07:39, pneubeck wrote: > could ...
6 years, 5 months ago (2014-06-27 22:14:43 UTC) #4
pneubeck (no reviews)
6 years, 5 months ago (2014-06-30 08:56:16 UTC) #5
On 2014/06/27 22:14:43, mattm wrote:
>
https://codereview.chromium.org/330213002/diff/30012/chrome/browser/net/nss_c...
> File chrome/browser/net/nss_context_chromeos.cc (right):
> 
>
https://codereview.chromium.org/330213002/diff/30012/chrome/browser/net/nss_c...
> chrome/browser/net/nss_context_chromeos.cc:93: net::NSSCertDatabase*
> GetNSSCertDatabaseForResourceContext(
> On 2014/06/27 17:07:39, pneubeck wrote:
> > could we change this from lazy initialization to explicit initialization
> > (triggered by the login) and
> > pass a parameter about the user's affiliation (i.e. managed by the domain
that
> > the device is enrolled to , or not)
> > and only in the managed case load/pass the system token?
> > 
> > I'm currently trying to setup a CL for that.
> 
> Hm, I thought we wanted the system token available for all users?

As further discussed with Darren the main use cases are covered by "By default,
only managed users have access to the certificates." (see the design doc).
A policy could change this default behavior. But as long as we don't have an
immediate need for that, we should go with the most secure and simple solution.
Not providing the slot to non-managed users should be the safest and doesn't
need modifications of the different users (like the cert autoselection).

Powered by Google App Engine
This is Rietveld 408576698