Join GitHub today
GitHub is home to over 50 million developers working together to host and review code, manage projects, and build software together.
Sign upMake it possible to accept self-signed certs #26683
Closed
Labels
Projects
Comments
bors-servo
added a commit
that referenced
this issue
Jun 9, 2020
Add UI for bypassing SSL handshake failures There are several parts to these changes: 1. resurrecting the network error classification code to distinguish between SSL failures and other network errors 1. adding an SSL verification callback to support verifying certs against a list that can change at runtime, rather than just at program initialization 1. exposing a privileged chrome://allowcert URI which accepts the PEM cert contents along with a secret token 1. extracting the PEM cert contents out of the network layer when a handshake failure occurs, and getting them into the HTML that is parsed when an SSL failure occurs 1. adding a button in the handshake failure page that performs an XHR to chrome://allowcert with knowledge of the secret token and the PEM cert contents, before reloading the original URL that failed The presence of the secret token means that while the chrome://allowcert URL is currently visible to web content, they cannot make use of it to inject arbitrary certs into the verification process. --- - [x] `./mach build -d` does not report any errors - [x] `./mach test-tidy` does not report any errors - [x] These changes fix #26683 - [x] These changes do not require tests because the UI requires user activation and can't clearly be automated
bors-servo
added a commit
that referenced
this issue
Jun 9, 2020
Add UI for bypassing SSL handshake failures There are several parts to these changes: 1. resurrecting the network error classification code to distinguish between SSL failures and other network errors 1. adding an SSL verification callback to support verifying certs against a list that can change at runtime, rather than just at program initialization 1. exposing a privileged chrome://allowcert URI which accepts the PEM cert contents along with a secret token 1. extracting the PEM cert contents out of the network layer when a handshake failure occurs, and getting them into the HTML that is parsed when an SSL failure occurs 1. adding a button in the handshake failure page that performs an XHR to chrome://allowcert with knowledge of the secret token and the PEM cert contents, before reloading the original URL that failed The presence of the secret token means that while the chrome://allowcert URL is currently visible to web content, they cannot make use of it to inject arbitrary certs into the verification process. --- - [x] `./mach build -d` does not report any errors - [x] `./mach test-tidy` does not report any errors - [x] These changes fix #26683 - [x] These changes do not require tests because the UI requires user activation and can't clearly be automated
bors-servo
added a commit
that referenced
this issue
Jun 9, 2020
Add UI for bypassing SSL handshake failures There are several parts to these changes: 1. resurrecting the network error classification code to distinguish between SSL failures and other network errors 1. adding an SSL verification callback to support verifying certs against a list that can change at runtime, rather than just at program initialization 1. exposing a privileged chrome://allowcert URI which accepts the PEM cert contents along with a secret token 1. extracting the PEM cert contents out of the network layer when a handshake failure occurs, and getting them into the HTML that is parsed when an SSL failure occurs 1. adding a button in the handshake failure page that performs an XHR to chrome://allowcert with knowledge of the secret token and the PEM cert contents, before reloading the original URL that failed The presence of the secret token means that while the chrome://allowcert URL is currently visible to web content, they cannot make use of it to inject arbitrary certs into the verification process. --- - [x] `./mach build -d` does not report any errors - [x] `./mach test-tidy` does not report any errors - [x] These changes fix #26683 - [x] These changes do not require tests because the UI requires user activation and can't clearly be automated
bors-servo
added a commit
that referenced
this issue
Jun 9, 2020
Add UI for bypassing SSL handshake failures There are several parts to these changes: 1. resurrecting the network error classification code to distinguish between SSL failures and other network errors 1. adding an SSL verification callback to support verifying certs against a list that can change at runtime, rather than just at program initialization 1. exposing a privileged chrome://allowcert URI which accepts the PEM cert contents along with a secret token 1. extracting the PEM cert contents out of the network layer when a handshake failure occurs, and getting them into the HTML that is parsed when an SSL failure occurs 1. adding a button in the handshake failure page that performs an XHR to chrome://allowcert with knowledge of the secret token and the PEM cert contents, before reloading the original URL that failed The presence of the secret token means that while the chrome://allowcert URL is currently visible to web content, they cannot make use of it to inject arbitrary certs into the verification process. --- - [x] `./mach build -d` does not report any errors - [x] `./mach test-tidy` does not report any errors - [x] These changes fix #26683 - [x] These changes do not require tests because the UI requires user activation and can't clearly be automated
bors-servo
added a commit
that referenced
this issue
Jun 9, 2020
Add UI for bypassing SSL handshake failures There are several parts to these changes: 1. resurrecting the network error classification code to distinguish between SSL failures and other network errors 1. adding an SSL verification callback to support verifying certs against a list that can change at runtime, rather than just at program initialization 1. exposing a privileged chrome://allowcert URI which accepts the PEM cert contents along with a secret token 1. extracting the PEM cert contents out of the network layer when a handshake failure occurs, and getting them into the HTML that is parsed when an SSL failure occurs 1. adding a button in the handshake failure page that performs an XHR to chrome://allowcert with knowledge of the secret token and the PEM cert contents, before reloading the original URL that failed The presence of the secret token means that while the chrome://allowcert URL is currently visible to web content, they cannot make use of it to inject arbitrary certs into the verification process. --- - [x] `./mach build -d` does not report any errors - [x] `./mach test-tidy` does not report any errors - [x] These changes fix #26683 - [x] These changes do not require tests because the UI requires user activation and can't clearly be automated
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
There are two main issues at the moment:
servo/ports/libsimpleservo/api/src/lib.rs
Line 926 in 748b424