Chromium Code Reviews| Index: net/data/ssl/scripts/generate-keychain.sh |
| diff --git a/net/data/ssl/scripts/generate-keychain.sh b/net/data/ssl/scripts/generate-keychain.sh |
| new file mode 100755 |
| index 0000000000000000000000000000000000000000..4256cd9c81db227ea627b055cd42dbe334a03d81 |
| --- /dev/null |
| +++ b/net/data/ssl/scripts/generate-keychain.sh |
| @@ -0,0 +1,73 @@ |
| +#!/bin/sh |
| + |
| +# Copyright 2016 The Chromium Authors. All rights reserved. |
| +# Use of this source code is governed by a BSD-style license that can be |
| +# found in the LICENSE file. |
| + |
| + |
| +set -e -x |
| + |
| +SECURITY=/usr/bin/security |
| + |
| +KEYCHAIN="$1" |
| +shift |
| +# security create-keychain will interpret a non-absolute path relative to the |
| +# keychain directory rather than the current directory, and OSX doesn't have a |
| +# realpath command. Be lazy and make the user pass in an absolute path. |
| +if [ `echo "$KEYCHAIN" | cut -c1` != '/' ]; then |
| + echo keychain path must be absolute |
| + exit 1 |
| +fi |
| + |
| +PASSWORD=aoeu |
| + |
| + |
| +# create-keychain modifes the global keychain search list, save it first. |
| +# (or does it?) |
|
mattm
2016/09/14 05:52:57
On my machine it didn't seem to. But I left the se
|
| +SAVED_KEYCHAIN_LIST=`$SECURITY list -d user` |
| +echo "Saved user keychain list:" |
| +echo "$SAVED_KEYCHAIN_LIST" |
| +echo |
| + |
| + |
| +$SECURITY create-keychain -p "$PASSWORD" "$KEYCHAIN" |
| + |
| +trusted=0 |
| + |
| +for cert in "$@"; do |
| + if [ "$cert" = "--trusted" ]; then |
| + trusted=1 |
| + continue |
| + fi |
| + if [ "$cert" = "--untrusted" ]; then |
| + trusted=0 |
| + continue |
| + fi |
| + |
| + # security tool only accepts DER. If input is a PEM, convert it. |
| + if grep -- "-----BEGIN CERTIFICATE-----" "$cert" ; then |
| + tmpcert="${cert}.der.tmp" |
| + openssl x509 -inform PEM -in "$cert" -outform DER -out "$tmpcert" |
| + cert="$tmpcert" |
| + fi |
| + |
| + if [ $trusted = 1 ]; then |
| + $SECURITY add-trusted-cert -r trustAsRoot -k "$KEYCHAIN" "$cert" |
| + else |
| + $SECURITY add-certificates -k "$KEYCHAIN" "$cert" |
| + fi |
| +done |
| + |
| + |
| + |
| +#TODO: Would be good to restore the keychain search list on failure too. |
| + |
| +echo "pre-restore user keychain list:" |
| +$SECURITY list -d user |
| + |
| +# restore the original keychain search list |
| +/bin/echo -n "${SAVED_KEYCHAIN_LIST}" | xargs $SECURITY list -d user -s |
| + |
| +echo "Restored user keychain list:" |
| +$SECURITY list -d user |
| +echo |