| Index: net/data/ssl/scripts/generate-keychain.sh
|
| diff --git a/net/data/ssl/scripts/generate-keychain.sh b/net/data/ssl/scripts/generate-keychain.sh
|
| new file mode 100755
|
| index 0000000000000000000000000000000000000000..4256cd9c81db227ea627b055cd42dbe334a03d81
|
| --- /dev/null
|
| +++ b/net/data/ssl/scripts/generate-keychain.sh
|
| @@ -0,0 +1,73 @@
|
| +#!/bin/sh
|
| +
|
| +# Copyright 2016 The Chromium Authors. All rights reserved.
|
| +# Use of this source code is governed by a BSD-style license that can be
|
| +# found in the LICENSE file.
|
| +
|
| +
|
| +set -e -x
|
| +
|
| +SECURITY=/usr/bin/security
|
| +
|
| +KEYCHAIN="$1"
|
| +shift
|
| +# security create-keychain will interpret a non-absolute path relative to the
|
| +# keychain directory rather than the current directory, and OSX doesn't have a
|
| +# realpath command. Be lazy and make the user pass in an absolute path.
|
| +if [ `echo "$KEYCHAIN" | cut -c1` != '/' ]; then
|
| + echo keychain path must be absolute
|
| + exit 1
|
| +fi
|
| +
|
| +PASSWORD=aoeu
|
| +
|
| +
|
| +# create-keychain modifes the global keychain search list, save it first.
|
| +# (or does it?)
|
| +SAVED_KEYCHAIN_LIST=`$SECURITY list -d user`
|
| +echo "Saved user keychain list:"
|
| +echo "$SAVED_KEYCHAIN_LIST"
|
| +echo
|
| +
|
| +
|
| +$SECURITY create-keychain -p "$PASSWORD" "$KEYCHAIN"
|
| +
|
| +trusted=0
|
| +
|
| +for cert in "$@"; do
|
| + if [ "$cert" = "--trusted" ]; then
|
| + trusted=1
|
| + continue
|
| + fi
|
| + if [ "$cert" = "--untrusted" ]; then
|
| + trusted=0
|
| + continue
|
| + fi
|
| +
|
| + # security tool only accepts DER. If input is a PEM, convert it.
|
| + if grep -- "-----BEGIN CERTIFICATE-----" "$cert" ; then
|
| + tmpcert="${cert}.der.tmp"
|
| + openssl x509 -inform PEM -in "$cert" -outform DER -out "$tmpcert"
|
| + cert="$tmpcert"
|
| + fi
|
| +
|
| + if [ $trusted = 1 ]; then
|
| + $SECURITY add-trusted-cert -r trustAsRoot -k "$KEYCHAIN" "$cert"
|
| + else
|
| + $SECURITY add-certificates -k "$KEYCHAIN" "$cert"
|
| + fi
|
| +done
|
| +
|
| +
|
| +
|
| +#TODO: Would be good to restore the keychain search list on failure too.
|
| +
|
| +echo "pre-restore user keychain list:"
|
| +$SECURITY list -d user
|
| +
|
| +# restore the original keychain search list
|
| +/bin/echo -n "${SAVED_KEYCHAIN_LIST}" | xargs $SECURITY list -d user -s
|
| +
|
| +echo "Restored user keychain list:"
|
| +$SECURITY list -d user
|
| +echo
|
|
|