truststore_darwin.go 3.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112
  1. // Copyright 2018 The mkcert Authors. All rights reserved.
  2. // Use of this source code is governed by a BSD-style
  3. // license that can be found in the LICENSE file.
  4. package main
  5. import (
  6. "bytes"
  7. "encoding/asn1"
  8. "io/ioutil"
  9. "log"
  10. "os"
  11. "os/exec"
  12. "path/filepath"
  13. "howett.net/plist"
  14. )
  15. var (
  16. FirefoxProfile = os.Getenv("HOME") + "/Library/Application Support/Firefox/Profiles/*"
  17. CertutilInstallHelp = "brew install nss"
  18. NSSBrowsers = "Firefox"
  19. )
  20. // https://github.com/golang/go/issues/24652#issuecomment-399826583
  21. var trustSettings []interface{}
  22. var _, _ = plist.Unmarshal(trustSettingsData, &trustSettings)
  23. var trustSettingsData = []byte(`
  24. <array>
  25. <dict>
  26. <key>kSecTrustSettingsPolicy</key>
  27. <data>
  28. KoZIhvdjZAED
  29. </data>
  30. <key>kSecTrustSettingsPolicyName</key>
  31. <string>sslServer</string>
  32. <key>kSecTrustSettingsResult</key>
  33. <integer>1</integer>
  34. </dict>
  35. <dict>
  36. <key>kSecTrustSettingsPolicy</key>
  37. <data>
  38. KoZIhvdjZAEC
  39. </data>
  40. <key>kSecTrustSettingsPolicyName</key>
  41. <string>basicX509</string>
  42. <key>kSecTrustSettingsResult</key>
  43. <integer>1</integer>
  44. </dict>
  45. </array>
  46. `)
  47. func (m *mkcert) installPlatform() bool {
  48. cmd := exec.Command("sudo", "security", "add-trusted-cert", "-d", "-k", "/Library/Keychains/System.keychain", filepath.Join(m.CAROOT, rootName))
  49. out, err := cmd.CombinedOutput()
  50. fatalIfCmdErr(err, "security add-trusted-cert", out)
  51. // Make trustSettings explicit, as older Go does not know the defaults.
  52. // https://github.com/golang/go/issues/24652
  53. plistFile, err := ioutil.TempFile("", "trust-settings")
  54. fatalIfErr(err, "failed to create temp file")
  55. defer os.Remove(plistFile.Name())
  56. cmd = exec.Command("sudo", "security", "trust-settings-export", "-d", plistFile.Name())
  57. out, err = cmd.CombinedOutput()
  58. fatalIfCmdErr(err, "security trust-settings-export", out)
  59. plistData, err := ioutil.ReadFile(plistFile.Name())
  60. fatalIfErr(err, "failed to read trust settings")
  61. var plistRoot map[string]interface{}
  62. _, err = plist.Unmarshal(plistData, &plistRoot)
  63. fatalIfErr(err, "failed to parse trust settings")
  64. rootSubjectASN1, _ := asn1.Marshal(m.caCert.Subject.ToRDNSequence())
  65. if plistRoot["trustVersion"].(uint64) != 1 {
  66. log.Fatalln("ERROR: unsupported trust settings version:", plistRoot["trustVersion"])
  67. }
  68. trustList := plistRoot["trustList"].(map[string]interface{})
  69. for key := range trustList {
  70. entry := trustList[key].(map[string]interface{})
  71. if _, ok := entry["issuerName"]; !ok {
  72. continue
  73. }
  74. issuerName := entry["issuerName"].([]byte)
  75. if !bytes.Equal(rootSubjectASN1, issuerName) {
  76. continue
  77. }
  78. entry["trustSettings"] = trustSettings
  79. break
  80. }
  81. plistData, err = plist.MarshalIndent(plistRoot, plist.XMLFormat, "\t")
  82. fatalIfErr(err, "failed to serialize trust settings")
  83. err = ioutil.WriteFile(plistFile.Name(), plistData, 0600)
  84. fatalIfErr(err, "failed to write trust settings")
  85. cmd = exec.Command("sudo", "security", "trust-settings-import", "-d", plistFile.Name())
  86. out, err = cmd.CombinedOutput()
  87. fatalIfCmdErr(err, "security trust-settings-import", out)
  88. return true
  89. }
  90. func (m *mkcert) uninstallPlatform() bool {
  91. cmd := exec.Command("sudo", "security", "remove-trusted-cert", "-d", filepath.Join(m.CAROOT, rootName))
  92. out, err := cmd.CombinedOutput()
  93. fatalIfCmdErr(err, "security remove-trusted-cert", out)
  94. return true
  95. }