mkcert/main.go

348 lines
9.5 KiB
Go
Raw Normal View History

2019-06-01 13:58:20 +00:00
// Copyright 2018 The mkcert Authors. All rights reserved.
2018-06-25 05:32:41 +00:00
// Use of this source code is governed by a BSD-style
// license that can be found in the LICENSE file.
// Command mkcert is a simple zero-config tool to make development certificates.
package main
import (
"crypto"
"crypto/x509"
"flag"
"fmt"
2018-06-25 05:32:41 +00:00
"log"
"net"
"net/mail"
2019-07-05 04:16:19 +00:00
"net/url"
2018-06-25 05:32:41 +00:00
"os"
"os/exec"
2018-06-25 05:32:41 +00:00
"path/filepath"
"regexp"
2018-06-25 05:32:41 +00:00
"runtime"
"strings"
2018-06-28 05:44:13 +00:00
"golang.org/x/net/idna"
2018-06-25 05:32:41 +00:00
)
2019-02-02 19:55:55 +00:00
const shortUsage = `Usage of mkcert:
2018-07-07 04:07:41 +00:00
$ mkcert -install
Install the local CA in the system trust store.
$ mkcert example.org
Generate "example.org.pem" and "example.org-key.pem".
$ mkcert example.com myapp.dev localhost 127.0.0.1 ::1
Generate "example.com+4.pem" and "example.com+4-key.pem".
2019-02-02 19:55:55 +00:00
$ mkcert "*.example.it"
Generate "_wildcard.example.it.pem" and "_wildcard.example.it-key.pem".
2018-07-07 04:07:41 +00:00
$ mkcert -uninstall
Uninstall the local CA (but do not delete it).
2019-02-02 19:55:55 +00:00
`
const advancedUsage = `Advanced options:
-cert-file FILE, -key-file FILE, -p12-file FILE
Customize the output paths.
-client
Generate a certificate for client authentication.
-ecdsa
Generate a certificate with an ECDSA key.
2019-02-02 19:55:55 +00:00
-pkcs12
Generate a ".p12" PKCS #12 file, also know as a ".pfx" file,
containing certificate and key for legacy applications.
-csr CSR
Generate a certificate based on the supplied CSR. Conflicts with
all other flags and arguments except -install and -cert-file.
2019-02-02 19:55:55 +00:00
-CAROOT
Print the CA certificate and key storage location.
$CAROOT (environment variable)
Set the CA certificate and key storage location. (This allows
maintaining multiple local CAs in parallel.)
2019-01-06 23:55:49 +00:00
$TRUST_STORES (environment variable)
A comma-separated list of trust stores to install the local
root CA into. Options are: "system", "java" and "nss" (includes
Firefox). Autodetected by default.
2018-07-07 04:07:41 +00:00
`
2018-06-25 05:32:41 +00:00
func main() {
log.SetFlags(0)
2019-02-02 19:55:55 +00:00
var (
installFlag = flag.Bool("install", false, "")
uninstallFlag = flag.Bool("uninstall", false, "")
pkcs12Flag = flag.Bool("pkcs12", false, "")
ecdsaFlag = flag.Bool("ecdsa", false, "")
clientFlag = flag.Bool("client", false, "")
2019-02-02 19:55:55 +00:00
helpFlag = flag.Bool("help", false, "")
carootFlag = flag.Bool("CAROOT", false, "")
csrFlag = flag.String("csr", "", "")
2019-02-02 19:55:55 +00:00
certFileFlag = flag.String("cert-file", "", "")
keyFileFlag = flag.String("key-file", "", "")
p12FileFlag = flag.String("p12-file", "", "")
)
flag.Usage = func() {
fmt.Fprintf(flag.CommandLine.Output(), shortUsage)
fmt.Fprintln(flag.CommandLine.Output(), `For more options, run "mkcert -help".`)
}
2018-06-25 05:32:41 +00:00
flag.Parse()
2019-02-02 19:55:55 +00:00
if *helpFlag {
fmt.Fprintf(flag.CommandLine.Output(), shortUsage)
fmt.Fprintf(flag.CommandLine.Output(), advancedUsage)
return
}
if *carootFlag {
if *installFlag || *uninstallFlag {
log.Fatalln("ERROR: you can't set -[un]install and -CAROOT at the same time")
}
fmt.Println(getCAROOT())
return
}
if *installFlag && *uninstallFlag {
log.Fatalln("ERROR: you can't set -install and -uninstall at the same time")
}
if *csrFlag != "" && (*pkcs12Flag || *ecdsaFlag || *clientFlag) {
log.Fatalln("ERROR: can only combine -csr with -install and -cert-file")
}
if *csrFlag != "" && flag.NArg() != 0 {
log.Fatalln("ERROR: can't specify extra arguments when using -csr")
}
(&mkcert{
installMode: *installFlag, uninstallMode: *uninstallFlag, csrPath: *csrFlag,
pkcs12: *pkcs12Flag, ecdsa: *ecdsaFlag, client: *clientFlag,
2019-01-06 23:55:49 +00:00
certFile: *certFileFlag, keyFile: *keyFileFlag, p12File: *p12FileFlag,
}).Run(flag.Args())
2018-06-25 05:32:41 +00:00
}
const rootName = "rootCA.pem"
2019-01-06 23:55:49 +00:00
const rootKeyName = "rootCA-key.pem"
2018-06-25 05:32:41 +00:00
type mkcert struct {
2019-01-06 23:55:49 +00:00
installMode, uninstallMode bool
pkcs12, ecdsa, client bool
2019-01-06 23:55:49 +00:00
keyFile, certFile, p12File string
csrPath string
2018-06-25 05:32:41 +00:00
CAROOT string
caCert *x509.Certificate
caKey crypto.PrivateKey
// The system cert pool is only loaded once. After installing the root, checks
// will keep failing until the next execution. TODO: maybe execve?
// https://github.com/golang/go/issues/24540 (thanks, myself)
ignoreCheckFailure bool
}
func (m *mkcert) Run(args []string) {
2018-06-25 05:32:41 +00:00
m.CAROOT = getCAROOT()
if m.CAROOT == "" {
log.Fatalln("ERROR: failed to find the default CA location, set one as the CAROOT env var")
}
fatalIfErr(os.MkdirAll(m.CAROOT, 0755), "failed to create the CAROOT")
m.loadCA()
if m.installMode {
2018-06-25 05:32:41 +00:00
m.install()
if len(args) == 0 {
return
}
} else if m.uninstallMode {
m.uninstall()
return
2018-06-28 05:29:20 +00:00
} else {
var warning bool
if storeEnabled("system") && !m.checkPlatform() {
2018-06-28 05:29:20 +00:00
warning = true
log.Println("Warning: the local CA is not installed in the system trust store! ⚠️")
}
if storeEnabled("nss") && hasNSS && CertutilInstallHelp != "" && !m.checkNSS() {
2018-06-28 05:29:20 +00:00
warning = true
log.Printf("Warning: the local CA is not installed in the %s trust store! ⚠️", NSSBrowsers)
2018-06-28 05:29:20 +00:00
}
if storeEnabled("java") && hasJava && !m.checkJava() {
warning = true
log.Println("Warning: the local CA is not installed in the Java trust store! ⚠️")
}
2018-06-28 05:29:20 +00:00
if warning {
log.Println("Run \"mkcert -install\" to avoid verification errors ‼️")
}
2018-06-25 05:32:41 +00:00
}
if m.csrPath != "" {
m.makeCertFromCSR()
return
}
if len(args) == 0 {
2019-02-02 19:55:55 +00:00
flag.Usage()
return
}
hostnameRegexp := regexp.MustCompile(`(?i)^(\*\.)?[0-9a-z_-]([0-9a-z._-]*[0-9a-z_-])?$`)
2018-06-28 05:44:13 +00:00
for i, name := range args {
if ip := net.ParseIP(name); ip != nil {
continue
}
if email, err := mail.ParseAddress(name); err == nil && email.Address == name {
continue
}
2019-07-05 04:16:19 +00:00
if uriName, err := url.Parse(name); err == nil && uriName.Scheme != "" && uriName.Host != "" {
continue
}
2018-06-28 05:44:13 +00:00
punycode, err := idna.ToASCII(name)
if err != nil {
2019-07-05 04:16:19 +00:00
log.Fatalf("ERROR: %q is not a valid hostname, IP, URL or email: %s", name, err)
2018-06-28 05:44:13 +00:00
}
args[i] = punycode
if !hostnameRegexp.MatchString(punycode) {
2019-07-05 04:16:19 +00:00
log.Fatalf("ERROR: %q is not a valid hostname, IP, URL or email", name)
}
}
m.makeCert(args)
}
2018-06-25 05:32:41 +00:00
func getCAROOT() string {
if env := os.Getenv("CAROOT"); env != "" {
return env
}
var dir string
2018-07-07 00:09:58 +00:00
switch {
case runtime.GOOS == "windows":
2018-06-25 05:32:41 +00:00
dir = os.Getenv("LocalAppData")
2018-07-07 00:09:58 +00:00
case os.Getenv("XDG_DATA_HOME") != "":
dir = os.Getenv("XDG_DATA_HOME")
case runtime.GOOS == "darwin":
2018-06-25 05:32:41 +00:00
dir = os.Getenv("HOME")
if dir == "" {
return ""
}
dir = filepath.Join(dir, "Library", "Application Support")
default: // Unix
dir = os.Getenv("HOME")
2018-06-25 05:32:41 +00:00
if dir == "" {
return ""
2018-06-25 05:32:41 +00:00
}
dir = filepath.Join(dir, ".local", "share")
2018-06-25 05:32:41 +00:00
}
return filepath.Join(dir, "mkcert")
}
func (m *mkcert) install() {
2018-06-28 05:29:20 +00:00
var printed bool
if storeEnabled("system") && !m.checkPlatform() {
2018-07-04 04:06:50 +00:00
if m.installPlatform() {
log.Print("The local CA is now installed in the system trust store! ⚡️")
}
2018-07-04 04:06:50 +00:00
m.ignoreCheckFailure = true // TODO: replace with a check for a successful install
2018-06-28 05:29:20 +00:00
printed = true
2018-06-25 05:32:41 +00:00
}
if storeEnabled("nss") && hasNSS && !m.checkNSS() {
if hasCertutil && m.installNSS() {
log.Printf("The local CA is now installed in the %s trust store (requires browser restart)! 🦊", NSSBrowsers)
} else if CertutilInstallHelp == "" {
log.Printf(`Note: %s support is not available on your platform. `, NSSBrowsers)
} else if !hasCertutil {
log.Printf(`Warning: "certutil" is not available, so the CA can't be automatically installed in %s! ⚠️`, NSSBrowsers)
2018-06-28 05:29:20 +00:00
log.Printf(`Install "certutil" with "%s" and re-run "mkcert -install" 👈`, CertutilInstallHelp)
}
printed = true
}
if storeEnabled("java") && hasJava && !m.checkJava() {
if hasKeytool {
m.installJava()
log.Println("The local CA is now installed in Java's trust store! ☕️")
} else {
log.Println(`Warning: "keytool" is not available, so the CA can't be automatically installed in Java's trust store! ⚠️`)
}
printed = true
}
2018-06-28 05:29:20 +00:00
if printed {
log.Print("")
2018-06-25 05:32:41 +00:00
}
}
func (m *mkcert) uninstall() {
if storeEnabled("nss") && hasNSS {
2018-06-28 05:29:20 +00:00
if hasCertutil {
m.uninstallNSS()
} else if CertutilInstallHelp != "" {
2018-06-28 05:29:20 +00:00
log.Print("")
log.Printf(`Warning: "certutil" is not available, so the CA can't be automatically uninstalled from %s (if it was ever installed)! ⚠️`, NSSBrowsers)
2018-06-28 05:29:20 +00:00
log.Printf(`You can install "certutil" with "%s" and re-run "mkcert -uninstall" 👈`, CertutilInstallHelp)
log.Print("")
}
}
if storeEnabled("java") && hasJava {
if hasKeytool {
m.uninstallJava()
} else {
log.Print("")
log.Println(`Warning: "keytool" is not available, so the CA can't be automatically uninstalled from Java's trust store (if it was ever installed)! ⚠️`)
log.Print("")
}
}
if storeEnabled("system") && m.uninstallPlatform() {
2018-07-04 04:06:50 +00:00
log.Print("The local CA is now uninstalled from the system trust store(s)! 👋")
log.Print("")
} else if storeEnabled("nss") && hasCertutil {
2018-07-04 04:06:50 +00:00
log.Printf("The local CA is now uninstalled from the %s trust store(s)! 👋", NSSBrowsers)
log.Print("")
}
2018-06-25 05:32:41 +00:00
}
2018-06-28 05:29:20 +00:00
func (m *mkcert) checkPlatform() bool {
2018-06-25 05:32:41 +00:00
if m.ignoreCheckFailure {
return true
}
_, err := m.caCert.Verify(x509.VerifyOptions{})
return err == nil
}
func storeEnabled(name string) bool {
stores := os.Getenv("TRUST_STORES")
if stores == "" {
return true
}
for _, store := range strings.Split(stores, ",") {
if store == name {
return true
}
}
return false
}
2018-06-25 05:32:41 +00:00
func fatalIfErr(err error, msg string) {
if err != nil {
log.Fatalf("ERROR: %s: %s", msg, err)
}
}
2018-06-28 05:29:20 +00:00
func fatalIfCmdErr(err error, cmd string, out []byte) {
if err != nil {
log.Fatalf("ERROR: failed to execute \"%s\": %s\n\n%s\n", cmd, err, out)
}
}
func pathExists(path string) bool {
_, err := os.Stat(path)
return err == nil
}
func binaryExists(name string) bool {
_, err := exec.LookPath(name)
return err == nil
}