зеркало из https://github.com/mozilla/gecko-dev.git
bug 557113 - sort out crash report certificate issues on Maemo. r=mfinkle,johnath
--HG-- extra : rebase_source : 5bd378a2721eeef2cb3abc3b54e15429be7c2416
This commit is contained in:
Родитель
b398d9af92
Коммит
7c18a2e67b
|
@ -44,6 +44,8 @@ VPATH = @srcdir@
|
|||
|
||||
include $(DEPTH)/config/autoconf.mk
|
||||
|
||||
MODULE = crashreporter
|
||||
|
||||
# Don't use the STL wrappers in the crashreporter clients; they don't
|
||||
# link with -lmozalloc, and it really doesn't matter here anyway.
|
||||
STL_FLAGS =
|
||||
|
@ -82,8 +84,21 @@ endif
|
|||
|
||||
ifeq ($(OS_ARCH),Linux)
|
||||
CPPSRCS += crashreporter_gtk_common.cpp crashreporter_unix_common.cpp
|
||||
|
||||
ifdef MOZ_PLATFORM_MAEMO
|
||||
CPPSRCS += crashreporter_maemo_gtk.cpp
|
||||
|
||||
# Maemo's libcurl doesn't ship with a set of CA certificates,
|
||||
# so we have to ship our own.
|
||||
libs:: $(DIST)/bin/crashreporter.crt
|
||||
|
||||
$(DIST)/bin/crashreporter.crt: $(topsrcdir)/security/nss/lib/ckfw/builtins/certdata.txt certdata2pem.py
|
||||
$(PYTHON) $(srcdir)/certdata2pem.py < $< > $@
|
||||
|
||||
# The xpcshell test case here verifies that the CA certificate list
|
||||
# works with OpenSSL.
|
||||
XPCSHELL_TESTS = maemo-unit
|
||||
|
||||
else
|
||||
CPPSRCS += crashreporter_linux.cpp
|
||||
endif
|
||||
|
@ -125,3 +140,8 @@ ifeq (,$(filter-out Linux SunOS,$(OS_ARCH)))
|
|||
libs:: $(topsrcdir)/toolkit/themes/winstripe/global/throbber/Throbber-small.gif
|
||||
$(INSTALL) $^ $(DIST)/bin
|
||||
endif
|
||||
|
||||
ifdef MOZ_PLATFORM_MAEMO
|
||||
libs::
|
||||
$(INSTALL) $(DIST)/bin/crashreporter.crt $(DEPTH)/_tests/xpcshell/$(MODULE)/maemo-unit/
|
||||
endif
|
||||
|
|
|
@ -0,0 +1,111 @@
|
|||
#!/usr/bin/python
|
||||
# vim:set et sw=4:
|
||||
#
|
||||
# Originally from:
|
||||
# http://cvs.fedoraproject.org/viewvc/F-13/ca-certificates/certdata2pem.py?revision=1.1&content-type=text%2Fplain&view=co
|
||||
#
|
||||
# certdata2pem.py - converts certdata.txt into PEM format.
|
||||
#
|
||||
# Copyright (C) 2009 Philipp Kern <pkern@debian.org>
|
||||
#
|
||||
# This program is free software; you can redistribute it and/or modify
|
||||
# it under the terms of the GNU General Public License as published by
|
||||
# the Free Software Foundation; either version 2 of the License, or
|
||||
# (at your option) any later version.
|
||||
#
|
||||
# This program is distributed in the hope that it will be useful,
|
||||
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
# GNU General Public License for more details.
|
||||
#
|
||||
# You should have received a copy of the GNU General Public License
|
||||
# along with this program; if not, write to the Free Software
|
||||
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301,
|
||||
# USA.
|
||||
|
||||
import base64
|
||||
import os.path
|
||||
import re
|
||||
import sys
|
||||
import textwrap
|
||||
|
||||
objects = []
|
||||
|
||||
# Dirty file parser.
|
||||
in_data, in_multiline, in_obj = False, False, False
|
||||
field, type, value, obj = None, None, None, dict()
|
||||
for line in sys.stdin:
|
||||
# Ignore the file header.
|
||||
if not in_data:
|
||||
if line.startswith('BEGINDATA'):
|
||||
in_data = True
|
||||
continue
|
||||
# Ignore comment lines.
|
||||
if line.startswith('#'):
|
||||
continue
|
||||
# Empty lines are significant if we are inside an object.
|
||||
if in_obj and len(line.strip()) == 0:
|
||||
objects.append(obj)
|
||||
obj = dict()
|
||||
in_obj = False
|
||||
continue
|
||||
if len(line.strip()) == 0:
|
||||
continue
|
||||
if in_multiline:
|
||||
if not line.startswith('END'):
|
||||
if type == 'MULTILINE_OCTAL':
|
||||
line = line.strip()
|
||||
for i in re.finditer(r'\\([0-3][0-7][0-7])', line):
|
||||
value += chr(int(i.group(1), 8))
|
||||
else:
|
||||
value += line
|
||||
continue
|
||||
obj[field] = value
|
||||
in_multiline = False
|
||||
continue
|
||||
if line.startswith('CKA_CLASS'):
|
||||
in_obj = True
|
||||
line_parts = line.strip().split(' ', 2)
|
||||
if len(line_parts) > 2:
|
||||
field, type = line_parts[0:2]
|
||||
value = ' '.join(line_parts[2:])
|
||||
elif len(line_parts) == 2:
|
||||
field, type = line_parts
|
||||
value = None
|
||||
else:
|
||||
raise NotImplementedError, 'line_parts < 2 not supported.'
|
||||
if type == 'MULTILINE_OCTAL':
|
||||
in_multiline = True
|
||||
value = ""
|
||||
continue
|
||||
obj[field] = value
|
||||
if len(obj.items()) > 0:
|
||||
objects.append(obj)
|
||||
|
||||
# Build up trust database.
|
||||
trust = dict()
|
||||
for obj in objects:
|
||||
if obj['CKA_CLASS'] != 'CKO_NETSCAPE_TRUST':
|
||||
continue
|
||||
# For some reason, OpenSSL on Maemo has a bug where if we include
|
||||
# this certificate, and it winds up as the last certificate in the file,
|
||||
# then OpenSSL is unable to verify the server certificate. For now,
|
||||
# we'll just omit this particular CA cert, since it's not one we need
|
||||
# for crash reporting.
|
||||
# This is likely to be fragile if the NSS certdata.txt changes.
|
||||
# The bug is filed upstream:
|
||||
# https://bugs.maemo.org/show_bug.cgi?id=10069
|
||||
if obj['CKA_LABEL'] == '"ACEDICOM Root"':
|
||||
continue
|
||||
# We only want certs that are trusted for SSL server auth
|
||||
if obj['CKA_TRUST_SERVER_AUTH'] == 'CKT_NETSCAPE_TRUSTED_DELEGATOR':
|
||||
trust[obj['CKA_LABEL']] = True
|
||||
|
||||
for obj in objects:
|
||||
if obj['CKA_CLASS'] == 'CKO_CERTIFICATE':
|
||||
if not obj['CKA_LABEL'] in trust or not trust[obj['CKA_LABEL']]:
|
||||
continue
|
||||
sys.stdout.write("-----BEGIN CERTIFICATE-----\n")
|
||||
sys.stdout.write("\n".join(textwrap.wrap(base64.b64encode(obj['CKA_VALUE']), 64)))
|
||||
sys.stdout.write("\n-----END CERTIFICATE-----\n\n")
|
||||
|
|
@ -77,6 +77,7 @@ string gDumpFile;
|
|||
StringTable gQueryParameters;
|
||||
string gHttpProxy;
|
||||
string gAuth;
|
||||
string gCACertificateFile;
|
||||
string gSendURL;
|
||||
string gURLParameter;
|
||||
vector<string> gRestartArgs;
|
||||
|
@ -222,6 +223,7 @@ gpointer SendThread(gpointer args)
|
|||
gDumpFile,
|
||||
"upload_file_minidump",
|
||||
gHttpProxy, gAuth,
|
||||
gCACertificateFile,
|
||||
&response,
|
||||
&error);
|
||||
if (success) {
|
||||
|
|
|
@ -26,6 +26,7 @@ extern std::string gDumpFile;
|
|||
extern StringTable gQueryParameters;
|
||||
extern std::string gHttpProxy;
|
||||
extern std::string gAuth;
|
||||
extern std::string gCACertificateFile;
|
||||
extern std::string gSendURL;
|
||||
extern std::string gURLParameter;
|
||||
|
||||
|
|
|
@ -100,6 +100,21 @@ void SaveSettings()
|
|||
"Crash Reporter", settings, true);
|
||||
}
|
||||
|
||||
/*
|
||||
* Check if a crashreporter.crt file exists next
|
||||
* to the crashreporter binary, and if so set gCACertificateFile
|
||||
* to its path. The CA cert will then be used by libcurl to authenticate
|
||||
* the server's SSL certificate.
|
||||
*/
|
||||
static void FindCACertificateFile()
|
||||
{
|
||||
string path = gArgv[0];
|
||||
path += ".crt";
|
||||
if (UIFileExists(path)) {
|
||||
gCACertificateFile = path;
|
||||
}
|
||||
}
|
||||
|
||||
void SendReport()
|
||||
{
|
||||
// disable all our gui controls, show the throbber + change the progress text
|
||||
|
@ -117,6 +132,8 @@ void SendReport()
|
|||
LoadProxyinfo();
|
||||
#endif
|
||||
|
||||
FindCACertificateFile();
|
||||
|
||||
// and spawn a thread to do the sending
|
||||
GError* err;
|
||||
gSendThreadID = g_thread_create(SendThread, NULL, TRUE, &err);
|
||||
|
|
|
@ -0,0 +1,20 @@
|
|||
-----BEGIN CERTIFICATE-----
|
||||
MIIDPTCCAqagAwIBAgIDDjAwMA0GCSqGSIb3DQEBBQUAME4xCzAJBgNVBAYTAlVT
|
||||
MRAwDgYDVQQKEwdFcXVpZmF4MS0wKwYDVQQLEyRFcXVpZmF4IFNlY3VyZSBDZXJ0
|
||||
aWZpY2F0ZSBBdXRob3JpdHkwHhcNMDkxMjAyMDY0MzE1WhcNMTIwMjAyMTIwMDI1
|
||||
WjCBxzEpMCcGA1UEBRMgbG5qYnUvcVJXL2p3UC9EUXFHNEFOTDNDUWdlZHg2d24x
|
||||
CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1Nb3Vu
|
||||
dGFpbiBWaWV3MRwwGgYDVQQKExNNb3ppbGxhIENvcnBvcmF0aW9uMR4wHAYDVQQL
|
||||
ExVNb3ppbGxhIENyYXNoIFJlcG9ydHMxIjAgBgNVBAMTGWNyYXNoLXJlcG9ydHMu
|
||||
bW96aWxsYS5jb20wgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBAMrrjxQWtgh6
|
||||
xJkFb6DebjldmLr0IU3SUymHaMcos6ISJ4w8IkkGGJS+59sMpLGR6bMZmioH4dpS
|
||||
ZqwQqCYPpMQxi8XjdkeIzxP8Q2+01lYYK/fTVqp2jh3TWwOk1gbiNBzYYYxxkhXO
|
||||
R5yjj6pfSHdWBJZZJRajYo/xddzmq5p9AgMBAAGjga4wgaswDgYDVR0PAQH/BAQD
|
||||
AgTwMB0GA1UdDgQWBBTd2p7ARtLT3nVeh8a/M5NdAUWyTzA6BgNVHR8EMzAxMC+g
|
||||
LaArhilodHRwOi8vY3JsLmdlb3RydXN0LmNvbS9jcmxzL3NlY3VyZWNhLmNybDAf
|
||||
BgNVHSMEGDAWgBRI5mj5K9KylddH2CMgEE8zmJCf1DAdBgNVHSUEFjAUBggrBgEF
|
||||
BQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQEFBQADgYEAoV0j092DMZXaVlNXT9vr
|
||||
Fmt6lrVQcTgvYJlutFa9vnnXFqYt4i5VVrRPo+BigZN8p1KGdD/dIgYQM+JubrnA
|
||||
qEWAyoBHropuEpiR8Fa0qcZHPVQOCWBfK1PB5W6CvUiDNOYl89mBqzuwSMKzojsT
|
||||
yiI0JD1SVgnoTumvkZd5w+I=
|
||||
-----END CERTIFICATE-----
|
|
@ -0,0 +1,13 @@
|
|||
#!/bin/sh
|
||||
# Run as:
|
||||
# opensslverify.sh <ca certificate file> <server certificate file>
|
||||
#
|
||||
# `openssl verify` doesn't return an error code if the cert fails
|
||||
# to verify, so we have to grep the output, and we can't do that via
|
||||
# nsIProcess, so we use a shell script.
|
||||
|
||||
if openssl verify -CAfile $1 -purpose sslserver $2 2>&1 | grep -q "^error"; then
|
||||
exit 1;
|
||||
else
|
||||
exit 0;
|
||||
fi
|
|
@ -0,0 +1,31 @@
|
|||
/*
|
||||
* Any copyright is dedicated to the Public Domain.
|
||||
* http://creativecommons.org/publicdomain/zero/1.0/
|
||||
*/
|
||||
/*
|
||||
* This test validates that OpenSSL running on this system can
|
||||
* validate the server certificate in crashreports.crt against the
|
||||
* list of CA certificates in crashreporter.crt. On Maemo systems,
|
||||
* OpenSSL has a bug where the ordering of certain certificates
|
||||
* in the CA certificate file can cause validation to fail.
|
||||
* This test is intended to catch that condition in case the NSS
|
||||
* certificate list changes in a way that would trigger the bug.
|
||||
*/
|
||||
function run_test() {
|
||||
let file = Components.classes["@mozilla.org/file/local;1"]
|
||||
.createInstance(Components.interfaces.nsILocalFile);
|
||||
file.initWithPath("/bin/sh");
|
||||
|
||||
let process = Components.classes["@mozilla.org/process/util;1"]
|
||||
.createInstance(Components.interfaces.nsIProcess);
|
||||
process.init(file);
|
||||
|
||||
let shscript = do_get_file("opensslverify.sh");
|
||||
let cacerts = do_get_file("crashreporter.crt");
|
||||
let servercert = do_get_file("crashreports.crt");
|
||||
let args = [shscript.path, cacerts.path, servercert.path];
|
||||
process.run(true, args, args.length);
|
||||
|
||||
dump('If the following test fails, the logic in toolkit/crashreporter/client/certdata2pem.py needs to be fixed, otherwise crash report submission on Maemo will fail.\n');
|
||||
do_check_eq(process.exitValue, 0);
|
||||
}
|
|
@ -62,6 +62,7 @@ bool HTTPUpload::SendRequest(const string &url,
|
|||
const string &file_part_name,
|
||||
const string &proxy,
|
||||
const string &proxy_user_pwd,
|
||||
const string &ca_certificate_file,
|
||||
string *response_body,
|
||||
string *error_description) {
|
||||
if (!CheckParameters(parameters))
|
||||
|
@ -107,6 +108,9 @@ bool HTTPUpload::SendRequest(const string &url,
|
|||
if (!proxy_user_pwd.empty())
|
||||
(*curl_easy_setopt)(curl, CURLOPT_PROXYUSERPWD, proxy_user_pwd.c_str());
|
||||
|
||||
if (!ca_certificate_file.empty())
|
||||
(*curl_easy_setopt)(curl, CURLOPT_CAINFO, ca_certificate_file.c_str());
|
||||
|
||||
struct curl_httppost *formpost = NULL;
|
||||
struct curl_httppost *lastptr = NULL;
|
||||
// Add form data.
|
||||
|
|
|
@ -61,6 +61,7 @@ class HTTPUpload {
|
|||
const string &file_part_name,
|
||||
const string &proxy,
|
||||
const string &proxy_user_pwd,
|
||||
const string &ca_certificate_file,
|
||||
string *response_body,
|
||||
string *error_description);
|
||||
|
||||
|
|
Загрузка…
Ссылка в новой задаче