truststore_darwin.go 3.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113
  1. // Copyright 2018 The Go Authors. All rights reserved.
  2. // Use of this source code is governed by a BSD-style
  3. // license that can be found in the LICENSE file.
  4. package main
  5. import (
  6. "bytes"
  7. "encoding/asn1"
  8. "io/ioutil"
  9. "log"
  10. "os"
  11. "os/exec"
  12. "path/filepath"
  13. "github.com/DHowett/go-plist"
  14. )
  15. var (
  16. FirefoxPath = "/Applications/Firefox.app"
  17. FirefoxProfile = os.Getenv("HOME") + "/Library/Application Support/Firefox/Profiles/*"
  18. CertutilInstallHelp = "brew install nss"
  19. NSSBrowsers = "Firefox"
  20. )
  21. // https://github.com/golang/go/issues/24652#issuecomment-399826583
  22. var trustSettings []interface{}
  23. var _, _ = plist.Unmarshal(trustSettingsData, &trustSettings)
  24. var trustSettingsData = []byte(`
  25. <array>
  26. <dict>
  27. <key>kSecTrustSettingsPolicy</key>
  28. <data>
  29. KoZIhvdjZAED
  30. </data>
  31. <key>kSecTrustSettingsPolicyName</key>
  32. <string>sslServer</string>
  33. <key>kSecTrustSettingsResult</key>
  34. <integer>1</integer>
  35. </dict>
  36. <dict>
  37. <key>kSecTrustSettingsPolicy</key>
  38. <data>
  39. KoZIhvdjZAEC
  40. </data>
  41. <key>kSecTrustSettingsPolicyName</key>
  42. <string>basicX509</string>
  43. <key>kSecTrustSettingsResult</key>
  44. <integer>1</integer>
  45. </dict>
  46. </array>
  47. `)
  48. func (m *mkcert) installPlatform() bool {
  49. cmd := exec.Command("sudo", "security", "add-trusted-cert", "-d", "-k", "/Library/Keychains/System.keychain", filepath.Join(m.CAROOT, rootName))
  50. out, err := cmd.CombinedOutput()
  51. fatalIfCmdErr(err, "security add-trusted-cert", out)
  52. // Make trustSettings explicit, as older Go does not know the defaults.
  53. // https://github.com/golang/go/issues/24652
  54. plistFile, err := ioutil.TempFile("", "trust-settings")
  55. fatalIfErr(err, "failed to create temp file")
  56. defer os.Remove(plistFile.Name())
  57. cmd = exec.Command("sudo", "security", "trust-settings-export", "-d", plistFile.Name())
  58. out, err = cmd.CombinedOutput()
  59. fatalIfCmdErr(err, "security trust-settings-export", out)
  60. plistData, err := ioutil.ReadFile(plistFile.Name())
  61. fatalIfErr(err, "failed to read trust settings")
  62. var plistRoot map[string]interface{}
  63. _, err = plist.Unmarshal(plistData, &plistRoot)
  64. fatalIfErr(err, "failed to parse trust settings")
  65. rootSubjectASN1, _ := asn1.Marshal(m.caCert.Subject.ToRDNSequence())
  66. if plistRoot["trustVersion"].(uint64) != 1 {
  67. log.Fatalln("ERROR: unsupported trust settings version:", plistRoot["trustVersion"])
  68. }
  69. trustList := plistRoot["trustList"].(map[string]interface{})
  70. for key := range trustList {
  71. entry := trustList[key].(map[string]interface{})
  72. if _, ok := entry["issuerName"]; !ok {
  73. continue
  74. }
  75. issuerName := entry["issuerName"].([]byte)
  76. if !bytes.Equal(rootSubjectASN1, issuerName) {
  77. continue
  78. }
  79. entry["trustSettings"] = trustSettings
  80. break
  81. }
  82. plistData, err = plist.MarshalIndent(plistRoot, plist.XMLFormat, "\t")
  83. fatalIfErr(err, "failed to serialize trust settings")
  84. err = ioutil.WriteFile(plistFile.Name(), plistData, 0600)
  85. fatalIfErr(err, "failed to write trust settings")
  86. cmd = exec.Command("sudo", "security", "trust-settings-import", "-d", plistFile.Name())
  87. out, err = cmd.CombinedOutput()
  88. fatalIfCmdErr(err, "security trust-settings-import", out)
  89. return true
  90. }
  91. func (m *mkcert) uninstallPlatform() bool {
  92. cmd := exec.Command("sudo", "security", "remove-trusted-cert", "-d", filepath.Join(m.CAROOT, rootName))
  93. out, err := cmd.CombinedOutput()
  94. fatalIfCmdErr(err, "security remove-trusted-cert", out)
  95. return true
  96. }