truststore_linux.go 3.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899
  1. // Copyright 2018 The mkcert Authors. All rights reserved.
  2. // Use of this source code is governed by a BSD-style
  3. // license that can be found in the LICENSE file.
  4. package main
  5. import (
  6. "bytes"
  7. "fmt"
  8. "io/ioutil"
  9. "log"
  10. "os"
  11. "path/filepath"
  12. "strings"
  13. )
  14. var (
  15. FirefoxProfiles = []string{os.Getenv("HOME") + "/.mozilla/firefox/*",
  16. os.Getenv("HOME") + "/snap/firefox/common/.mozilla/firefox/*"}
  17. NSSBrowsers = "Firefox and/or Chrome/Chromium"
  18. SystemTrustFilename string
  19. SystemTrustCommand []string
  20. CertutilInstallHelp string
  21. )
  22. func init() {
  23. switch {
  24. case binaryExists("apt"):
  25. CertutilInstallHelp = "apt install libnss3-tools"
  26. case binaryExists("yum"):
  27. CertutilInstallHelp = "yum install nss-tools"
  28. case binaryExists("zypper"):
  29. CertutilInstallHelp = "zypper install mozilla-nss-tools"
  30. }
  31. if pathExists("/etc/pki/ca-trust/source/anchors/") {
  32. SystemTrustFilename = "/etc/pki/ca-trust/source/anchors/%s.pem"
  33. SystemTrustCommand = []string{"update-ca-trust", "extract"}
  34. } else if pathExists("/usr/local/share/ca-certificates/") {
  35. SystemTrustFilename = "/usr/local/share/ca-certificates/%s.crt"
  36. SystemTrustCommand = []string{"update-ca-certificates"}
  37. } else if pathExists("/etc/ca-certificates/trust-source/anchors/") {
  38. SystemTrustFilename = "/etc/ca-certificates/trust-source/anchors/%s.crt"
  39. SystemTrustCommand = []string{"trust", "extract-compat"}
  40. } else if pathExists("/usr/share/pki/trust/anchors") {
  41. SystemTrustFilename = "/usr/share/pki/trust/anchors/%s.pem"
  42. SystemTrustCommand = []string{"update-ca-certificates"}
  43. }
  44. }
  45. func (m *mkcert) systemTrustFilename() string {
  46. return fmt.Sprintf(SystemTrustFilename, strings.Replace(m.caUniqueName(), " ", "_", -1))
  47. }
  48. func (m *mkcert) installPlatform() bool {
  49. if SystemTrustCommand == nil {
  50. log.Printf("Installing to the system store is not yet supported on this Linux 😣 but %s will still work.", NSSBrowsers)
  51. log.Printf("You can also manually install the root certificate at %q.", filepath.Join(m.CAROOT, rootName))
  52. return false
  53. }
  54. cert, err := ioutil.ReadFile(filepath.Join(m.CAROOT, rootName))
  55. fatalIfErr(err, "failed to read root certificate")
  56. cmd := commandWithSudo("tee", m.systemTrustFilename())
  57. cmd.Stdin = bytes.NewReader(cert)
  58. out, err := cmd.CombinedOutput()
  59. fatalIfCmdErr(err, "tee", out)
  60. cmd = commandWithSudo(SystemTrustCommand...)
  61. out, err = cmd.CombinedOutput()
  62. fatalIfCmdErr(err, strings.Join(SystemTrustCommand, " "), out)
  63. return true
  64. }
  65. func (m *mkcert) uninstallPlatform() bool {
  66. if SystemTrustCommand == nil {
  67. return false
  68. }
  69. cmd := commandWithSudo("rm", "-f", m.systemTrustFilename())
  70. out, err := cmd.CombinedOutput()
  71. fatalIfCmdErr(err, "rm", out)
  72. // We used to install under non-unique filenames.
  73. legacyFilename := fmt.Sprintf(SystemTrustFilename, "mkcert-rootCA")
  74. if pathExists(legacyFilename) {
  75. cmd := commandWithSudo("rm", "-f", legacyFilename)
  76. out, err := cmd.CombinedOutput()
  77. fatalIfCmdErr(err, "rm (legacy filename)", out)
  78. }
  79. cmd = commandWithSudo(SystemTrustCommand...)
  80. out, err = cmd.CombinedOutput()
  81. fatalIfCmdErr(err, strings.Join(SystemTrustCommand, " "), out)
  82. return true
  83. }