gitee.com/ks-custle/core-gm@v0.0.0-20230922171213-b83bdd97b62c/x509/root_unix_test.go (about)

     1  // Copyright 2017 The Go Authors. All rights reserved.
     2  // Use of this source code is governed by a BSD-style
     3  // license that can be found in the LICENSE file.
     4  
     5  //go:build dragonfly || freebsd || linux || netbsd || openbsd || solaris
     6  // +build dragonfly freebsd linux netbsd openbsd solaris
     7  
     8  package x509
     9  
    10  import (
    11  	"bytes"
    12  	"fmt"
    13  	"os"
    14  	"path/filepath"
    15  	"reflect"
    16  	"strings"
    17  	"testing"
    18  )
    19  
    20  const (
    21  	testDir     = "testdata/testdir"
    22  	testDirCN   = "test-dir"
    23  	testFile    = "test-file.crt"
    24  	testFileCN  = "test-file"
    25  	testMissing = "missing"
    26  )
    27  
    28  func TestEnvVars(t *testing.T) {
    29  	testCases := []struct {
    30  		name    string
    31  		fileEnv string
    32  		dirEnv  string
    33  		files   []string
    34  		dirs    []string
    35  		cns     []string
    36  	}{
    37  		{
    38  			// Environment variables override the default locations preventing fall through.
    39  			name:    "override-defaults",
    40  			fileEnv: testMissing,
    41  			dirEnv:  testMissing,
    42  			files:   []string{testFile},
    43  			dirs:    []string{testDir},
    44  			cns:     nil,
    45  		},
    46  		{
    47  			// File environment overrides default file locations.
    48  			name:    "file",
    49  			fileEnv: testFile,
    50  			dirEnv:  "",
    51  			files:   nil,
    52  			dirs:    nil,
    53  			cns:     []string{testFileCN},
    54  		},
    55  		{
    56  			// Directory environment overrides default directory locations.
    57  			name:    "dir",
    58  			fileEnv: "",
    59  			dirEnv:  testDir,
    60  			files:   nil,
    61  			dirs:    nil,
    62  			cns:     []string{testDirCN},
    63  		},
    64  		{
    65  			// File & directory environment overrides both default locations.
    66  			name:    "file+dir",
    67  			fileEnv: testFile,
    68  			dirEnv:  testDir,
    69  			files:   nil,
    70  			dirs:    nil,
    71  			cns:     []string{testFileCN, testDirCN},
    72  		},
    73  		{
    74  			// Environment variable empty / unset uses default locations.
    75  			name:    "empty-fall-through",
    76  			fileEnv: "",
    77  			dirEnv:  "",
    78  			files:   []string{testFile},
    79  			dirs:    []string{testDir},
    80  			cns:     []string{testFileCN, testDirCN},
    81  		},
    82  	}
    83  
    84  	// Save old settings so we can restore before the test ends.
    85  	origCertFiles, origCertDirectories := certFiles, certDirectories
    86  	origFile, origDir := os.Getenv(certFileEnv), os.Getenv(certDirEnv)
    87  	defer func() {
    88  		certFiles = origCertFiles
    89  		certDirectories = origCertDirectories
    90  		err := os.Setenv(certFileEnv, origFile)
    91  		if err != nil {
    92  			panic(err)
    93  		}
    94  		err = os.Setenv(certDirEnv, origDir)
    95  		if err != nil {
    96  			panic(err)
    97  		}
    98  	}()
    99  
   100  	for _, tc := range testCases {
   101  		t.Run(tc.name, func(t *testing.T) {
   102  			if err := os.Setenv(certFileEnv, tc.fileEnv); err != nil {
   103  				t.Fatalf("setenv %q failed: %v", certFileEnv, err)
   104  			}
   105  			if err := os.Setenv(certDirEnv, tc.dirEnv); err != nil {
   106  				t.Fatalf("setenv %q failed: %v", certDirEnv, err)
   107  			}
   108  
   109  			certFiles, certDirectories = tc.files, tc.dirs
   110  
   111  			r, err := loadSystemRoots()
   112  			if err != nil {
   113  				t.Fatal("unexpected failure:", err)
   114  			}
   115  
   116  			if r == nil {
   117  				t.Fatal("nil roots")
   118  			}
   119  
   120  			// Verify that the returned certs match, otherwise report where the mismatch is.
   121  			for i, cn := range tc.cns {
   122  				if i >= r.len() {
   123  					t.Errorf("missing cert %v @ %v", cn, i)
   124  				} else if r.mustCert(t, i).Subject.CommonName != cn {
   125  					fmt.Printf("%#v\n", r.mustCert(t, 0).Subject)
   126  					t.Errorf("unexpected cert common name %q, want %q", r.mustCert(t, i).Subject.CommonName, cn)
   127  				}
   128  			}
   129  			if r.len() > len(tc.cns) {
   130  				t.Errorf("got %v certs, which is more than %v wanted", r.len(), len(tc.cns))
   131  			}
   132  		})
   133  	}
   134  }
   135  
   136  // Ensure that "SSL_CERT_DIR" when used as the environment
   137  // variable delimited by colons, allows loadSystemRoots to
   138  // load all the roots from the respective directories.
   139  // See https://golang.org/issue/35325.
   140  func TestLoadSystemCertsLoadColonSeparatedDirs(t *testing.T) {
   141  	origFile, origDir := os.Getenv(certFileEnv), os.Getenv(certDirEnv)
   142  	origCertFiles := certFiles[:]
   143  
   144  	// To prevent any other certs from being loaded in
   145  	// through "SSL_CERT_FILE" or from known "certFiles",
   146  	// clear them all, and they'll be reverting on defer.
   147  	certFiles = certFiles[:0]
   148  	err := os.Setenv(certFileEnv, "")
   149  	if err != nil {
   150  		t.Fatal(err)
   151  	}
   152  
   153  	defer func() {
   154  		certFiles = origCertFiles[:]
   155  		err := os.Setenv(certDirEnv, origDir)
   156  		if err != nil {
   157  			panic(err)
   158  		}
   159  		err = os.Setenv(certFileEnv, origFile)
   160  		if err != nil {
   161  			panic(err)
   162  		}
   163  	}()
   164  
   165  	tmpDir := t.TempDir()
   166  
   167  	rootPEMs := []string{
   168  		geoTrustRoot,
   169  		googleLeaf,
   170  		startComRoot,
   171  	}
   172  
   173  	var certDirs []string
   174  	for i, certPEM := range rootPEMs {
   175  		certDir := filepath.Join(tmpDir, fmt.Sprintf("cert-%d", i))
   176  		if err := os.MkdirAll(certDir, 0755); err != nil {
   177  			t.Fatalf("Failed to create certificate dir: %v", err)
   178  		}
   179  		certOutFile := filepath.Join(certDir, "cert.crt")
   180  		if err := os.WriteFile(certOutFile, []byte(certPEM), 0655); err != nil {
   181  			t.Fatalf("Failed to write certificate to file: %v", err)
   182  		}
   183  		certDirs = append(certDirs, certDir)
   184  	}
   185  
   186  	// Sanity check: the number of certDirs should be equal to the number of roots.
   187  	if g, w := len(certDirs), len(rootPEMs); g != w {
   188  		t.Fatalf("Failed sanity check: len(certsDir)=%d is not equal to len(rootsPEMS)=%d", g, w)
   189  	}
   190  
   191  	// Now finally concatenate them with a colon.
   192  	colonConcatCertDirs := strings.Join(certDirs, ":")
   193  	err = os.Setenv(certDirEnv, colonConcatCertDirs)
   194  	if err != nil {
   195  		t.Fatal(err)
   196  	}
   197  	gotPool, err := loadSystemRoots()
   198  	if err != nil {
   199  		t.Fatalf("Failed to load system roots: %v", err)
   200  	}
   201  	subjects := gotPool.Subjects()
   202  	// We expect exactly len(rootPEMs) subjects back.
   203  	if g, w := len(subjects), len(rootPEMs); g != w {
   204  		t.Fatalf("Invalid number of subjects: got %d want %d", g, w)
   205  	}
   206  
   207  	wantPool := NewCertPool()
   208  	for _, certPEM := range rootPEMs {
   209  		wantPool.AppendCertsFromPEM([]byte(certPEM))
   210  	}
   211  	strCertPool := func(p *CertPool) string {
   212  		return string(bytes.Join(p.Subjects(), []byte("\n")))
   213  	}
   214  
   215  	if !certPoolEqual(gotPool, wantPool) {
   216  		g, w := strCertPool(gotPool), strCertPool(wantPool)
   217  		t.Fatalf("Mismatched certPools\nGot:\n%s\n\nWant:\n%s", g, w)
   218  	}
   219  }
   220  
   221  func TestReadUniqueDirectoryEntries(t *testing.T) {
   222  	tmp := t.TempDir()
   223  	temp := func(base string) string { return filepath.Join(tmp, base) }
   224  	if f, err := os.Create(temp("file")); err != nil {
   225  		t.Fatal(err)
   226  	} else {
   227  		err := f.Close()
   228  		if err != nil {
   229  			t.Fatal(err)
   230  		}
   231  	}
   232  	if err := os.Symlink("target-in", temp("link-in")); err != nil {
   233  		t.Fatal(err)
   234  	}
   235  	if err := os.Symlink("../target-out", temp("link-out")); err != nil {
   236  		t.Fatal(err)
   237  	}
   238  	got, err := readUniqueDirectoryEntries(tmp)
   239  	if err != nil {
   240  		t.Fatal(err)
   241  	}
   242  	var gotNames []string
   243  	for _, fi := range got {
   244  		gotNames = append(gotNames, fi.Name())
   245  	}
   246  	wantNames := []string{"file", "link-out"}
   247  	if !reflect.DeepEqual(gotNames, wantNames) {
   248  		t.Errorf("got %q; want %q", gotNames, wantNames)
   249  	}
   250  }