mirror of
https://github.com/klzgrad/naiveproxy.git
synced 2024-11-24 06:16:30 +03:00
net/cert: Add SystemTrustStoreStaticUnix
It reads CA certificates from: * The file in environment variable SSL_CERT_FILE * The first available file of /etc/ssl/certs/ca-certificates.crt (Debian/Ubuntu/Gentoo etc.) /etc/pki/tls/certs/ca-bundle.crt (Fedora/RHEL 6) /etc/ssl/ca-bundle.pem (OpenSUSE) /etc/pki/tls/cacert.pem (OpenELEC) /etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem (CentOS/RHEL 7) /etc/ssl/cert.pem (Alpine Linux) * Files in the directory of environment variable SSL_CERT_DIR * Files in the first available directory of /etc/ssl/certs (SLES10/SLES11, https://golang.org/issue/12139) /etc/pki/tls/certs (Fedora/RHEL) /system/etc/security/cacerts (Android)
This commit is contained in:
parent
d861a48821
commit
002956a8f4
@ -4,15 +4,19 @@
|
|||||||
|
|
||||||
#include "net/cert/internal/system_trust_store.h"
|
#include "net/cert/internal/system_trust_store.h"
|
||||||
|
|
||||||
|
#include <array>
|
||||||
#include <memory>
|
#include <memory>
|
||||||
#include <optional>
|
#include <optional>
|
||||||
#include <vector>
|
#include <vector>
|
||||||
|
|
||||||
|
#include "base/environment.h"
|
||||||
|
#include "base/files/file_enumerator.h"
|
||||||
#include "base/files/file_path.h"
|
#include "base/files/file_path.h"
|
||||||
#include "base/files/file_util.h"
|
#include "base/files/file_util.h"
|
||||||
#include "base/logging.h"
|
#include "base/logging.h"
|
||||||
#include "base/memory/ptr_util.h"
|
#include "base/memory/ptr_util.h"
|
||||||
#include "base/no_destructor.h"
|
#include "base/no_destructor.h"
|
||||||
|
#include "base/strings/string_split.h"
|
||||||
#include "base/task/task_traits.h"
|
#include "base/task/task_traits.h"
|
||||||
#include "base/task/thread_pool.h"
|
#include "base/task/thread_pool.h"
|
||||||
#include "base/threading/thread_restrictions.h"
|
#include "base/threading/thread_restrictions.h"
|
||||||
@ -39,8 +43,8 @@
|
|||||||
#include "third_party/boringssl/src/include/openssl/pool.h"
|
#include "third_party/boringssl/src/include/openssl/pool.h"
|
||||||
#elif BUILDFLAG(IS_WIN)
|
#elif BUILDFLAG(IS_WIN)
|
||||||
#include "net/cert/internal/trust_store_win.h"
|
#include "net/cert/internal/trust_store_win.h"
|
||||||
#elif BUILDFLAG(IS_ANDROID)
|
#elif BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_ANDROID)
|
||||||
#include "net/cert/internal/trust_store_android.h"
|
#include "base/lazy_instance.h"
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#if BUILDFLAG(CHROME_ROOT_STORE_SUPPORTED)
|
#if BUILDFLAG(CHROME_ROOT_STORE_SUPPORTED)
|
||||||
@ -317,6 +321,147 @@ std::unique_ptr<SystemTrustStore> CreateSslSystemTrustStore() {
|
|||||||
return std::make_unique<SystemTrustStoreFuchsia>();
|
return std::make_unique<SystemTrustStoreFuchsia>();
|
||||||
}
|
}
|
||||||
|
|
||||||
|
#elif BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_ANDROID)
|
||||||
|
|
||||||
|
namespace {
|
||||||
|
|
||||||
|
// Copied from https://golang.org/src/crypto/x509/root_linux.go
|
||||||
|
// Possible certificate files; stop after finding one.
|
||||||
|
constexpr std::array<const char*, 6> kStaticRootCertFiles = {
|
||||||
|
"/etc/ssl/certs/ca-certificates.crt", // Debian/Ubuntu/Gentoo etc.
|
||||||
|
"/etc/pki/tls/certs/ca-bundle.crt", // Fedora/RHEL 6
|
||||||
|
"/etc/ssl/ca-bundle.pem", // OpenSUSE
|
||||||
|
"/etc/pki/tls/cacert.pem", // OpenELEC
|
||||||
|
"/etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem", // CentOS/RHEL 7
|
||||||
|
"/etc/ssl/cert.pem", // Alpine Linux
|
||||||
|
};
|
||||||
|
|
||||||
|
// Possible directories with certificate files; stop after successfully
|
||||||
|
// reading at least one file from a directory.
|
||||||
|
constexpr std::array<const char*, 3> kStaticRootCertDirs = {
|
||||||
|
"/etc/ssl/certs", // SLES10/SLES11, https://golang.org/issue/12139
|
||||||
|
"/etc/pki/tls/certs", // Fedora/RHEL
|
||||||
|
"/system/etc/security/cacerts", // Android
|
||||||
|
};
|
||||||
|
|
||||||
|
// The environment variable which identifies where to locate the SSL
|
||||||
|
// certificate file. If set this overrides the system default.
|
||||||
|
constexpr char kStaticCertFileEnv[] = "SSL_CERT_FILE";
|
||||||
|
|
||||||
|
// The environment variable which identifies which directory to check for SSL
|
||||||
|
// certificate files. If set this overrides the system default. It is a colon
|
||||||
|
// separated list of directories.
|
||||||
|
// See https://www.openssl.org/docs/man1.0.2/man1/c_rehash.html.
|
||||||
|
constexpr char kStaticCertDirsEnv[] = "SSL_CERT_DIR";
|
||||||
|
|
||||||
|
class TrustStoreUnix : public PlatformTrustStore {
|
||||||
|
public:
|
||||||
|
TrustStoreUnix() {
|
||||||
|
auto env = base::Environment::Create();
|
||||||
|
std::string env_value;
|
||||||
|
|
||||||
|
std::vector<std::string> cert_filenames(kStaticRootCertFiles.begin(),
|
||||||
|
kStaticRootCertFiles.end());
|
||||||
|
if (env->GetVar(kStaticCertFileEnv, &env_value) && !env_value.empty()) {
|
||||||
|
cert_filenames = {env_value};
|
||||||
|
}
|
||||||
|
|
||||||
|
bool cert_file_ok = false;
|
||||||
|
for (const auto& filename : cert_filenames) {
|
||||||
|
std::string file;
|
||||||
|
if (!base::ReadFileToString(base::FilePath(filename), &file))
|
||||||
|
continue;
|
||||||
|
if (AddCertificatesFromBytes(file, trust_store_)) {
|
||||||
|
cert_file_ok = true;
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
std::vector<std::string> cert_dirnames(kStaticRootCertDirs.begin(),
|
||||||
|
kStaticRootCertDirs.end());
|
||||||
|
if (env->GetVar(kStaticCertDirsEnv, &env_value) && !env_value.empty()) {
|
||||||
|
cert_dirnames = base::SplitString(env_value, ":", base::TRIM_WHITESPACE,
|
||||||
|
base::SPLIT_WANT_NONEMPTY);
|
||||||
|
}
|
||||||
|
|
||||||
|
bool cert_dir_ok = false;
|
||||||
|
for (const auto& dir : cert_dirnames) {
|
||||||
|
base::FileEnumerator e(base::FilePath(dir),
|
||||||
|
/*recursive=*/true, base::FileEnumerator::FILES);
|
||||||
|
for (auto filename = e.Next(); !filename.empty(); filename = e.Next()) {
|
||||||
|
std::string file;
|
||||||
|
if (!base::ReadFileToString(filename, &file)) {
|
||||||
|
continue;
|
||||||
|
}
|
||||||
|
if (AddCertificatesFromBytes(file, trust_store_)) {
|
||||||
|
cert_dir_ok = true;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if (cert_dir_ok)
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (!cert_file_ok && !cert_dir_ok) {
|
||||||
|
LOG(ERROR) << "No CA certificates were found. Try using environment "
|
||||||
|
"variable SSL_CERT_FILE or SSL_CERT_DIR";
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
TrustStoreUnix(const TrustStoreUnix&) = delete;
|
||||||
|
TrustStoreUnix& operator=(const TrustStoreUnix&) = delete;
|
||||||
|
|
||||||
|
// bssl::CertIssuerSource implementation:
|
||||||
|
void SyncGetIssuersOf(const bssl::ParsedCertificate* cert,
|
||||||
|
bssl::ParsedCertificateList* issuers) override {
|
||||||
|
trust_store_.SyncGetIssuersOf(cert, issuers);
|
||||||
|
}
|
||||||
|
|
||||||
|
// bssl::TrustStore implementation:
|
||||||
|
bssl::CertificateTrust GetTrust(
|
||||||
|
const bssl::ParsedCertificate* cert) override {
|
||||||
|
return trust_store_.GetTrust(cert);
|
||||||
|
}
|
||||||
|
|
||||||
|
// net::PlatformTrustStore implementation:
|
||||||
|
std::vector<net::PlatformTrustStore::CertWithTrust> GetAllUserAddedCerts()
|
||||||
|
override {
|
||||||
|
return {};
|
||||||
|
}
|
||||||
|
|
||||||
|
private:
|
||||||
|
static bool AddCertificatesFromBytes(std::string_view data,
|
||||||
|
bssl::TrustStoreInMemory& store) {
|
||||||
|
auto certs = X509Certificate::CreateCertificateListFromBytes(
|
||||||
|
base::as_bytes(base::make_span(data)), X509Certificate::FORMAT_AUTO);
|
||||||
|
bool certs_ok = false;
|
||||||
|
for (const auto& cert : certs) {
|
||||||
|
bssl::CertErrors errors;
|
||||||
|
auto parsed = bssl::ParsedCertificate::Create(
|
||||||
|
bssl::UpRef(cert->cert_buffer()),
|
||||||
|
x509_util::DefaultParseCertificateOptions(), &errors);
|
||||||
|
if (parsed) {
|
||||||
|
if (!store.Contains(parsed.get())) {
|
||||||
|
store.AddTrustAnchor(parsed);
|
||||||
|
}
|
||||||
|
certs_ok = true;
|
||||||
|
} else {
|
||||||
|
LOG(ERROR) << errors.ToDebugString();
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return certs_ok;
|
||||||
|
}
|
||||||
|
|
||||||
|
bssl::TrustStoreInMemory trust_store_;
|
||||||
|
};
|
||||||
|
|
||||||
|
} // namespace
|
||||||
|
|
||||||
|
std::unique_ptr<SystemTrustStore> CreateSslSystemTrustStoreChromeRoot(
|
||||||
|
std::unique_ptr<TrustStoreChrome> chrome_root) {
|
||||||
|
return std::make_unique<SystemTrustStoreChrome>(
|
||||||
|
std::move(chrome_root), std::make_unique<TrustStoreUnix>());
|
||||||
|
}
|
||||||
|
|
||||||
#elif BUILDFLAG(IS_WIN)
|
#elif BUILDFLAG(IS_WIN)
|
||||||
|
|
||||||
namespace {
|
namespace {
|
||||||
|
Loading…
Reference in New Issue
Block a user