Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(115)

Side by Side Diff: mod_for_test_scripts/710enableAuthTesting

Issue 3075025: Fake authserver SSL certs now valid for 21 days, instead of 2 (Closed) Base URL: http://src.chromium.org/git/crosutils.git
Patch Set: Created 10 years, 4 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « no previous file | no next file » | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 #!/bin/bash 1 #!/bin/bash
2 2
3 # Copyright (c) 2010 The Chromium OS Authors. All rights reserved. 3 # Copyright (c) 2010 The Chromium OS Authors. All rights reserved.
4 # Use of this source code is governed by a BSD-style license that can be 4 # Use of this source code is governed by a BSD-style license that can be
5 # found in the LICENSE file. 5 # found in the LICENSE file.
6 6
7 echo "Adding mock Google Accounts server certs." 7 echo "Adding mock Google Accounts server certs."
8 8
9 case "${ARCH}" in 9 case "${ARCH}" in
10 arm*) 10 arm*)
(...skipping 11 matching lines...) Expand all
22 CERT_NAME="mock_server" 22 CERT_NAME="mock_server"
23 FAKE_CA_DIR="/etc/fake_root_ca" 23 FAKE_CA_DIR="/etc/fake_root_ca"
24 FAKE_NSSDB="${FAKE_CA_DIR}/nssdb" 24 FAKE_NSSDB="${FAKE_CA_DIR}/nssdb"
25 TMP_KEY=$(mktemp -p /tmp "${CERT_NAME}.key.XXXXX") 25 TMP_KEY=$(mktemp -p /tmp "${CERT_NAME}.key.XXXXX")
26 TMP_CERT=$(mktemp -p /tmp "${CERT_NAME}.pem.XXXXX") 26 TMP_CERT=$(mktemp -p /tmp "${CERT_NAME}.pem.XXXXX")
27 27
28 mv -f "${TMP_KEY}" "${ROOT_FS_DIR}/${TMP_KEY}" 28 mv -f "${TMP_KEY}" "${ROOT_FS_DIR}/${TMP_KEY}"
29 mv -f "${TMP_CERT}" "${ROOT_FS_DIR}/${TMP_CERT}" 29 mv -f "${TMP_CERT}" "${ROOT_FS_DIR}/${TMP_CERT}"
30 30
31 # Generate testing root cert on the fly. 31 # Generate testing root cert on the fly.
32 sudo chroot "${ROOT_FS_DIR}" ${QEMU} /usr/bin/openssl req -x509 -days 2 \ 32 sudo chroot "${ROOT_FS_DIR}" ${QEMU} /usr/bin/openssl req -x509 -days 21 \
33 -subj "/CN=www.google.com" \ 33 -subj "/CN=www.google.com" \
34 -newkey rsa:1024 -nodes -keyout "${TMP_KEY}" -out "${TMP_CERT}" 34 -newkey rsa:1024 -nodes -keyout "${TMP_KEY}" -out "${TMP_CERT}"
35 35
36 mkdir -m 0755 -p "${ROOT_FS_DIR}/${FAKE_NSSDB}" 36 mkdir -m 0755 -p "${ROOT_FS_DIR}/${FAKE_NSSDB}"
37 sudo chroot "${ROOT_FS_DIR}" ${QEMU} \ 37 sudo chroot "${ROOT_FS_DIR}" ${QEMU} \
38 /usr/local/bin/nsscertutil -d sql:"${FAKE_NSSDB}" -N -f <(echo "") 38 /usr/local/bin/nsscertutil -d sql:"${FAKE_NSSDB}" -N -f <(echo "")
39 cp "${ROOT_FS_DIR}/${TMP_KEY}" "${ROOT_FS_DIR}/${FAKE_CA_DIR}/${CERT_NAME}.key" 39 cp "${ROOT_FS_DIR}/${TMP_KEY}" "${ROOT_FS_DIR}/${FAKE_CA_DIR}/${CERT_NAME}.key"
40 cp "${ROOT_FS_DIR}/${TMP_CERT}" "${ROOT_FS_DIR}/${FAKE_CA_DIR}/${CERT_NAME}.pem" 40 cp "${ROOT_FS_DIR}/${TMP_CERT}" "${ROOT_FS_DIR}/${FAKE_CA_DIR}/${CERT_NAME}.pem"
41 echo "DO NOT MOVE THIS DATA OFF OF THE ROOTFS!" > "${ROOT_FS_DIR}/${FAKE_CA_DIR} /README" 41 echo "DO NOT MOVE THIS DATA OFF OF THE ROOTFS!" > "${ROOT_FS_DIR}/${FAKE_CA_DIR} /README"
42 sudo chroot "${ROOT_FS_DIR}" ${QEMU} \ 42 sudo chroot "${ROOT_FS_DIR}" ${QEMU} \
43 /usr/local/bin/nsscertutil -d sql:"${FAKE_NSSDB}" -A \ 43 /usr/local/bin/nsscertutil -d sql:"${FAKE_NSSDB}" -A \
44 -n FakeCert -t "C,," -a -i "${FAKE_CA_DIR}/${CERT_NAME}.pem" 44 -n FakeCert -t "C,," -a -i "${FAKE_CA_DIR}/${CERT_NAME}.pem"
45 chmod 0644 "${ROOT_FS_DIR}/${FAKE_NSSDB}"/* 45 chmod 0644 "${ROOT_FS_DIR}/${FAKE_NSSDB}"/*
46 46
47 # TODO(cmasone): get rid of this once we're off pam_google for good. 47 # TODO(cmasone): get rid of this once we're off pam_google for good.
48 # Sadly, our fake cert HAS to be first in this file. 48 # Sadly, our fake cert HAS to be first in this file.
49 TMPFILE=$(mktemp) 49 TMPFILE=$(mktemp)
50 CERT_FILE="${ROOT_FS_DIR}/etc/login_trust_root.pem" 50 CERT_FILE="${ROOT_FS_DIR}/etc/login_trust_root.pem"
51 PERMS=$(stat --printf="%a" "${CERT_FILE}") 51 PERMS=$(stat --printf="%a" "${CERT_FILE}")
52 cat "${ROOT_FS_DIR}/${TMP_CERT}" "${CERT_FILE}" > "${TMPFILE}" 52 cat "${ROOT_FS_DIR}/${TMP_CERT}" "${CERT_FILE}" > "${TMPFILE}"
53 mv -f "${TMPFILE}" "${CERT_FILE}" 53 mv -f "${TMPFILE}" "${CERT_FILE}"
54 chmod "${PERMS}" "${CERT_FILE}" 54 chmod "${PERMS}" "${CERT_FILE}"
55 55
56 if [ -n "${QEMU}" ] ; then 56 if [ -n "${QEMU}" ] ; then
57 rm "${ROOT_FS_DIR}/${QEMU}" 57 rm "${ROOT_FS_DIR}/${QEMU}"
58 fi 58 fi
59 rm "${ROOT_FS_DIR}/${TMP_KEY}" 59 rm "${ROOT_FS_DIR}/${TMP_KEY}"
60 rm "${ROOT_FS_DIR}/${TMP_CERT}" 60 rm "${ROOT_FS_DIR}/${TMP_CERT}"
OLDNEW
« no previous file with comments | « no previous file | no next file » | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698