Generate fake root certs for autotest via qemu

mod_image_for_test.sh now passes the target architecture to the subscripts
mod_for_test_scripts/710enableAuthTesting generates the /etc/fake_root_cert
databases by running nsscertutil under QEMU.

BUG=3310
TEST=Built autotest enabled images for x86 and arm.  On arm, the browser no
longer crashes trying to read the fake root certs.

Review URL: http://codereview.chromium.org/2878033
This commit is contained in:
Justin Neddo 2010-07-22 10:17:03 -05:00 committed by Olof Johansson
parent 2a58d0e610
commit 6b5b16b8fe
2 changed files with 51 additions and 13 deletions

View File

@ -6,32 +6,53 @@
echo "Adding mock Google Accounts server certs." echo "Adding mock Google Accounts server certs."
case "${ARCH}" in
arm*)
QEMU="qemu-arm"
;;
*86)
QEMU="qemu-i386"
;;
*)
error "Invalid ARCH: ${ARCH}"
exit 1
esac
cp "/usr/bin/${QEMU}" "${ROOT_FS_DIR}/tmp"
CERT_NAME="mock_server" CERT_NAME="mock_server"
FAKE_CA_DIR="${ROOT_FS_DIR}/etc/fake_root_ca" FAKE_CA_DIR="/etc/fake_root_ca"
FAKE_NSSDB="${FAKE_CA_DIR}/nssdb" FAKE_NSSDB="${FAKE_CA_DIR}/nssdb"
TMP_KEY=$(mktemp -p /tmp "${CERT_NAME}.key.XXXXX") TMP_KEY=$(mktemp -p /tmp "${CERT_NAME}.key.XXXXX")
TMP_CERT=$(mktemp -p /tmp "${CERT_NAME}.pem.XXXXX") TMP_CERT=$(mktemp -p /tmp "${CERT_NAME}.pem.XXXXX")
mv -f "${TMP_KEY}" "${ROOT_FS_DIR}/${TMP_KEY}"
mv -f "${TMP_CERT}" "${ROOT_FS_DIR}/${TMP_CERT}"
# Generate testing root cert on the fly. # Generate testing root cert on the fly.
openssl req -x509 -days 2 -subj "/CN=www.google.com" \ sudo chroot "${ROOT_FS_DIR}" "/tmp/${QEMU}" /usr/bin/openssl req -x509 -days 2 \
-subj "/CN=www.google.com" \
-newkey rsa:1024 -nodes -keyout "${TMP_KEY}" -out "${TMP_CERT}" -newkey rsa:1024 -nodes -keyout "${TMP_KEY}" -out "${TMP_CERT}"
mkdir -m 0755 -p "${FAKE_NSSDB}" mkdir -m 0755 -p "${ROOT_FS_DIR}/${FAKE_NSSDB}"
nsscertutil -d sql:"${FAKE_NSSDB}" -N -f <(echo "") sudo chroot "${ROOT_FS_DIR}" "/tmp/${QEMU}" \
cp "${TMP_KEY}" "${FAKE_CA_DIR}/${CERT_NAME}.key" /usr/local/bin/nsscertutil -d sql:"${FAKE_NSSDB}" -N -f <(echo "")
cp "${TMP_CERT}" "${FAKE_CA_DIR}/${CERT_NAME}.pem" cp "${ROOT_FS_DIR}/${TMP_KEY}" "${ROOT_FS_DIR}/${FAKE_CA_DIR}/${CERT_NAME}.key"
echo "DO NOT MOVE THIS DATA OFF OF THE ROOTFS!" > "${FAKE_CA_DIR}/README" cp "${ROOT_FS_DIR}/${TMP_CERT}" "${ROOT_FS_DIR}/${FAKE_CA_DIR}/${CERT_NAME}.pem"
nsscertutil -d sql:"${FAKE_NSSDB}" -A -n FakeCert -t "C,," -a -i "${TMP_CERT}" echo "DO NOT MOVE THIS DATA OFF OF THE ROOTFS!" > "${ROOT_FS_DIR}/${FAKE_CA_DIR}/README"
chmod 0644 "${FAKE_NSSDB}"/* sudo chroot "${ROOT_FS_DIR}" "/tmp/${QEMU}" \
/usr/local/bin/nsscertutil -d sql:"${FAKE_NSSDB}" -A \
-n FakeCert -t "C,," -a -i "${FAKE_CA_DIR}/${CERT_NAME}.pem"
chmod 0644 "${ROOT_FS_DIR}/${FAKE_NSSDB}"/*
# TODO(cmasone): get rid of this once we're off pam_google for good. # TODO(cmasone): get rid of this once we're off pam_google for good.
# Sadly, our fake cert HAS to be first in this file. # Sadly, our fake cert HAS to be first in this file.
TMPFILE=$(mktemp) TMPFILE=$(mktemp)
CERT_FILE="${ROOT_FS_DIR}/etc/login_trust_root.pem" CERT_FILE="${ROOT_FS_DIR}/etc/login_trust_root.pem"
PERMS=$(stat --printf="%a" "${CERT_FILE}") PERMS=$(stat --printf="%a" "${CERT_FILE}")
cat "${TMP_CERT}" "${CERT_FILE}" > "${TMPFILE}" cat "${ROOT_FS_DIR}/${TMP_CERT}" "${CERT_FILE}" > "${TMPFILE}"
mv -f "${TMPFILE}" "${CERT_FILE}" mv -f "${TMPFILE}" "${CERT_FILE}"
chmod "${PERMS}" "${CERT_FILE}" chmod "${PERMS}" "${CERT_FILE}"
rm "${ROOT_FS_DIR}/tmp/${QEMU}"
rm "${ROOT_FS_DIR}/${TMP_KEY}"
rm "${ROOT_FS_DIR}/${TMP_CERT}"

View File

@ -69,6 +69,23 @@ if [ ! -f $FLAGS_image ] ; then
exit 1 exit 1
fi fi
# What cross-build are we targeting?
. "${FLAGS_build_root}/${FLAGS_board}/etc/make.conf.board_setup"
# Figure out ARCH from the given toolchain.
# TODO: Move to common.sh as a function after scripts are switched over.
TC_ARCH=$(echo "${CHOST}" | awk -F'-' '{ print $1 }')
case "${TC_ARCH}" in
arm*)
ARCH="arm"
;;
*86)
ARCH="x86"
;;
*)
error "Unable to determine ARCH from toolchain: ${CHOST}"
exit 1
esac
# Make sure anything mounted in the rootfs/stateful is cleaned up ok on exit. # Make sure anything mounted in the rootfs/stateful is cleaned up ok on exit.
cleanup_mounts() { cleanup_mounts() {
# Occasionally there are some daemons left hanging around that have our # Occasionally there are some daemons left hanging around that have our
@ -186,7 +203,7 @@ else
MOD_TEST_ROOT="${GCLIENT_ROOT}/src/scripts/mod_for_test_scripts" MOD_TEST_ROOT="${GCLIENT_ROOT}/src/scripts/mod_for_test_scripts"
# Run test setup script to modify the image # Run test setup script to modify the image
sudo GCLIENT_ROOT="${GCLIENT_ROOT}" ROOT_FS_DIR="${ROOT_FS_DIR}" \ sudo GCLIENT_ROOT="${GCLIENT_ROOT}" ROOT_FS_DIR="${ROOT_FS_DIR}" \
STATEFUL_DIR="${STATEFUL_DIR}" "${MOD_TEST_ROOT}/test_setup.sh" STATEFUL_DIR="${STATEFUL_DIR}" ARCH="${ARCH}" "${MOD_TEST_ROOT}/test_setup.sh"
if [ ${FLAGS_factory} -eq ${FLAGS_TRUE} ]; then if [ ${FLAGS_factory} -eq ${FLAGS_TRUE} ]; then
install_autotest install_autotest