Skip to content

Add support for Chrome/Chromium browsers #41

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
nilp0inter opened this issue Dec 24, 2024 · 1 comment
Open

Add support for Chrome/Chromium browsers #41

nilp0inter opened this issue Dec 24, 2024 · 1 comment
Labels
enhancement New feature or request help wanted Extra attention is needed

Comments

@nilp0inter
Copy link
Collaborator

Preliminary tests indicate that AutoFirma works well with Chrome/Chromium; although it doesn't seem officially supported.

Thoroughly test the different modes under Chrome/Chromium, and add the option chromiumIntegration to both NixOS and Home-Manager modules.

@nilp0inter nilp0inter added the enhancement New feature or request label Dec 24, 2024
@nilp0inter nilp0inter added the help wanted Extra attention is needed label Feb 5, 2025
@nilp0inter
Copy link
Collaborator Author

We are working on integrating AutoFirma with Chrome and Chromium-based browsers. This issue encompasses two key aspects:

  1. Certificate Policy Challenge
    For the browser to communicate with AutoFirma via websocket/xhr, a custom certificate has to be registered first. This can be achieved using policies.
    Chrome/Chromium policies require certificates to be embedded as Base64-encoded strings rather than referencing file paths. The .pem certificate used by AutoFirma is generated outside the Nix store during runtime, making it inaccessible at build time. This complicates declarative configuration of Chrome policies to trust the AutoFirma web server.
    For comparison, Firefox policies can reference the .pem file directly, which aligns well with our current setup. This limitation in Chrome/Chromium requires further investigation to enable seamless integration.

  2. Decoupling from Firefox's NSS Database
    By default, AutoFirma depends on the NSS database from Firefox as its truststore. However, AutoFirma can be configured to load truststores directly, including:

    • PKCS#11 modules for accessing smart cards.
    • .p12 files for loading certificates from disk.

    With these capabilities, it may be possible to configure AutoFirma for use with Chrome/Chromium without any dependency on Firefox. These changes have to be implemented as additional Home Manager configuration options.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request help wanted Extra attention is needed
Projects
None yet
Development

No branches or pull requests

1 participant