Chromium Code Reviews| OLD | NEW |
|---|---|
| 1 #!/bin/bash | 1 #!/bin/bash |
| 2 | 2 |
| 3 # Copyright (c) 2010 The Chromium OS Authors. All rights reserved. | 3 # Copyright (c) 2010 The Chromium OS Authors. All rights reserved. |
| 4 # Use of this source code is governed by a BSD-style license that can be | 4 # Use of this source code is governed by a BSD-style license that can be |
| 5 # found in the LICENSE file. | 5 # found in the LICENSE file. |
| 6 | 6 |
| 7 echo "Adding mock Google Accounts server certs." | 7 echo "Adding mock Google Accounts server certs." |
| 8 | 8 |
| 9 case "${ARCH}" in | |
| 10 arm*) | |
| 11 QEMU="qemu-arm" | |
| 12 ;; | |
| 13 *86) | |
| 14 QEMU="qemu-i386" | |
| 15 ;; | |
| 16 *) | |
| 17 error "Invalid ARCH: ${ARCH}" | |
| 18 exit 1 | |
| 19 esac | |
| 20 cp "/usr/bin/${QEMU}" "${ROOT_FS_DIR}/tmp" | |
| 21 | |
| 9 CERT_NAME="mock_server" | 22 CERT_NAME="mock_server" |
| 10 FAKE_CA_DIR="${ROOT_FS_DIR}/etc/fake_root_ca" | 23 FAKE_CA_DIR="/etc/fake_root_ca" |
| 11 FAKE_NSSDB="${FAKE_CA_DIR}/nssdb" | 24 FAKE_NSSDB="${FAKE_CA_DIR}/nssdb" |
| 12 TMP_KEY=$(mktemp -p /tmp "${CERT_NAME}.key.XXXXX") | 25 TMP_KEY=$(mktemp -p /tmp "${CERT_NAME}.key.XXXXX") |
| 13 TMP_CERT=$(mktemp -p /tmp "${CERT_NAME}.pem.XXXXX") | 26 TMP_CERT=$(mktemp -p /tmp "${CERT_NAME}.pem.XXXXX") |
| 14 | 27 |
| 28 mv -f "${TMP_KEY}" "${ROOT_FS_DIR}/${TMP_KEY}" | |
| 29 mv -f "${TMP_CERT}" "${ROOT_FS_DIR}/${TMP_CERT}" | |
|
Chris Masone
2010/07/20 16:21:26
mktemp just generates filenames, so this mv is odd
| |
| 30 | |
| 15 # Generate testing root cert on the fly. | 31 # Generate testing root cert on the fly. |
| 16 openssl req -x509 -days 2 -subj "/CN=www.google.com" \ | 32 sudo chroot "${ROOT_FS_DIR}" "/tmp/${QEMU}" /usr/bin/openssl req -x509 -days 2 \ |
| 33 -subj "/CN=www.google.com" \ | |
| 17 -newkey rsa:1024 -nodes -keyout "${TMP_KEY}" -out "${TMP_CERT}" | 34 -newkey rsa:1024 -nodes -keyout "${TMP_KEY}" -out "${TMP_CERT}" |
| 18 | 35 |
| 19 mkdir -m 0755 -p "${FAKE_NSSDB}" | 36 mkdir -m 0755 -p "${ROOT_FS_DIR}/${FAKE_NSSDB}" |
| 20 nsscertutil -d sql:"${FAKE_NSSDB}" -N -f <(echo "") | 37 sudo chroot "${ROOT_FS_DIR}" "/tmp/${QEMU}" \ |
| 21 cp "${TMP_KEY}" "${FAKE_CA_DIR}/${CERT_NAME}.key" | 38 /usr/local/bin/nsscertutil -d sql:"${FAKE_NSSDB}" -N -f <(echo "") |
| 22 cp "${TMP_CERT}" "${FAKE_CA_DIR}/${CERT_NAME}.pem" | 39 cp "${ROOT_FS_DIR}/${TMP_KEY}" "${ROOT_FS_DIR}/${FAKE_CA_DIR}/${CERT_NAME}.key" |
| 23 echo "DO NOT MOVE THIS DATA OFF OF THE ROOTFS!" > "${FAKE_CA_DIR}/README" | 40 cp "${ROOT_FS_DIR}/${TMP_CERT}" "${ROOT_FS_DIR}/${FAKE_CA_DIR}/${CERT_NAME}.pem" |
| 24 nsscertutil -d sql:"${FAKE_NSSDB}" -A -n FakeCert -t "C,," -a -i "${TMP_CERT}" | 41 echo "DO NOT MOVE THIS DATA OFF OF THE ROOTFS!" > "${ROOT_FS_DIR}/${FAKE_CA_DIR} /README" |
| 25 chmod 0644 "${FAKE_NSSDB}"/* | 42 sudo chroot "${ROOT_FS_DIR}" "/tmp/${QEMU}" \ |
| 43 /usr/local/bin/nsscertutil -d sql:"${FAKE_NSSDB}" -A \ | |
| 44 -n FakeCert -t "C,," -a -i "${FAKE_CA_DIR}/${CERT_NAME}.pem" | |
| 45 chmod 0644 "${ROOT_FS_DIR}/${FAKE_NSSDB}"/* | |
| 26 | 46 |
| 27 # TODO(cmasone): get rid of this once we're off pam_google for good. | 47 # TODO(cmasone): get rid of this once we're off pam_google for good. |
| 28 # Sadly, our fake cert HAS to be first in this file. | 48 # Sadly, our fake cert HAS to be first in this file. |
| 29 TMPFILE=$(mktemp) | 49 TMPFILE=$(mktemp) |
| 30 CERT_FILE="${ROOT_FS_DIR}/etc/login_trust_root.pem" | 50 CERT_FILE="${ROOT_FS_DIR}/etc/login_trust_root.pem" |
| 31 PERMS=$(stat --printf="%a" "${CERT_FILE}") | 51 PERMS=$(stat --printf="%a" "${CERT_FILE}") |
| 32 cat "${TMP_CERT}" "${CERT_FILE}" > "${TMPFILE}" | 52 cat "${ROOT_FS_DIR}/${TMP_CERT}" "${CERT_FILE}" > "${TMPFILE}" |
| 33 mv -f "${TMPFILE}" "${CERT_FILE}" | 53 mv -f "${TMPFILE}" "${CERT_FILE}" |
| 34 chmod "${PERMS}" "${CERT_FILE}" | 54 chmod "${PERMS}" "${CERT_FILE}" |
| 35 | 55 |
| 36 | 56 rm "${ROOT_FS_DIR}/tmp/${QEMU}" |
| 37 | 57 rm "${ROOT_FS_DIR}/${TMP_KEY}" |
| 58 rm "${ROOT_FS_DIR}/${TMP_CERT}" | |
| OLD | NEW |