Skip to content

Conversation

@Not-Nik
Copy link
Collaborator

@Not-Nik Not-Nik commented Nov 20, 2025

Encrypt SQLite database whose connections are created in mozStorageService. Cloned and ATTACHed connections are also affected. The mechanism is behind a new security.storage.keystore.enabled. The keys for the connections are stored, encrypted by the SDR, in a new bikeshed/keystore.enc.

}

nsresult GetKeyForFile(nsIFile* aFile, nsCString& keyString) {
nsAutoCString telemetryFilename;
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Weird naming here.

}

try {
pk11token.login(true);
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I guess we don't actually want this (force pp login dialog?), so this couldn't land without @beurdouche 's follow up patches.

Copy link
Collaborator Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Not on enterprise, no, but this wouldn't do anything here, because the token is already unlocked. I can remove it for this PR, but release needs some way to unlock the token once, for fetching the keys, and then possibly re-locking it once they are loaded.

@gcp
Copy link
Contributor

gcp commented Nov 21, 2025

I think this wants tests as well. For Foxfooding we can deal with some flakyness but causing all SQLite databases to get corrupted will probably get old soon for the poor testers 😄

@Not-Nik Not-Nik marked this pull request as draft December 4, 2025 16:39
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants