Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(134)

Unified Diff: net/data/ssl/scripts/generate-keychain.sh

Issue 2101303005: CertVerifyProcMac: Add Keychain re-ordering hack, check CRLsets in path pruning loop. (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: rebase Created 4 years, 3 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: net/data/ssl/scripts/generate-keychain.sh
diff --git a/net/data/ssl/scripts/generate-keychain.sh b/net/data/ssl/scripts/generate-keychain.sh
new file mode 100755
index 0000000000000000000000000000000000000000..4256cd9c81db227ea627b055cd42dbe334a03d81
--- /dev/null
+++ b/net/data/ssl/scripts/generate-keychain.sh
@@ -0,0 +1,73 @@
+#!/bin/sh
+
+# Copyright 2016 The Chromium Authors. All rights reserved.
+# Use of this source code is governed by a BSD-style license that can be
+# found in the LICENSE file.
+
+
+set -e -x
+
+SECURITY=/usr/bin/security
+
+KEYCHAIN="$1"
+shift
+# security create-keychain will interpret a non-absolute path relative to the
+# keychain directory rather than the current directory, and OSX doesn't have a
+# realpath command. Be lazy and make the user pass in an absolute path.
+if [ `echo "$KEYCHAIN" | cut -c1` != '/' ]; then
+ echo keychain path must be absolute
+ exit 1
+fi
+
+PASSWORD=aoeu
+
+
+# create-keychain modifes the global keychain search list, save it first.
+# (or does it?)
+SAVED_KEYCHAIN_LIST=`$SECURITY list -d user`
+echo "Saved user keychain list:"
+echo "$SAVED_KEYCHAIN_LIST"
+echo
+
+
+$SECURITY create-keychain -p "$PASSWORD" "$KEYCHAIN"
+
+trusted=0
+
+for cert in "$@"; do
+ if [ "$cert" = "--trusted" ]; then
+ trusted=1
+ continue
+ fi
+ if [ "$cert" = "--untrusted" ]; then
+ trusted=0
+ continue
+ fi
+
+ # security tool only accepts DER. If input is a PEM, convert it.
+ if grep -- "-----BEGIN CERTIFICATE-----" "$cert" ; then
+ tmpcert="${cert}.der.tmp"
+ openssl x509 -inform PEM -in "$cert" -outform DER -out "$tmpcert"
+ cert="$tmpcert"
+ fi
+
+ if [ $trusted = 1 ]; then
+ $SECURITY add-trusted-cert -r trustAsRoot -k "$KEYCHAIN" "$cert"
+ else
+ $SECURITY add-certificates -k "$KEYCHAIN" "$cert"
+ fi
+done
+
+
+
+#TODO: Would be good to restore the keychain search list on failure too.
+
+echo "pre-restore user keychain list:"
+$SECURITY list -d user
+
+# restore the original keychain search list
+/bin/echo -n "${SAVED_KEYCHAIN_LIST}" | xargs $SECURITY list -d user -s
+
+echo "Restored user keychain list:"
+$SECURITY list -d user
+echo

Powered by Google App Engine
This is Rietveld 408576698