@expo/devcert
Version:
Generate trusted local SSL/TLS certificates for local SSL development
163 lines (152 loc) • 6.51 kB
text/typescript
import path from 'path';
import createDebug from 'debug';
import assert from 'assert';
import net from 'net';
import http from 'http';
import fs from 'fs';
import { run } from '../utils';
import { isMac, isLinux , configDir, getLegacyConfigDir } from '../constants';
import UI from '../user-interface';
import { execSync as exec } from 'child_process';
const debug = createDebug('devcert:platforms:shared');
async function* iterateNSSCertDBPaths(nssDirGlob: string): AsyncGenerator<string> {
const globIdx = nssDirGlob.indexOf('*');
if (globIdx === -1) {
try {
const stat = fs.statSync(nssDirGlob);
if (stat.isDirectory()) {
yield nssDirGlob;
}
} catch (_error) {
// no matching directory found
}
} else if (globIdx === nssDirGlob.length - 1) {
const targetDir = path.dirname(nssDirGlob);
for (const entry of await fs.promises.readdir(targetDir, { withFileTypes: true })) {
if (entry.isDirectory()) {
yield path.join(targetDir, entry.name);
}
}
} else {
throw new Error('Internal: Invalid `nssDirGlob` specified');
}
}
async function* iterateNSSCertDBs(nssDirGlob: string): AsyncGenerator<{ dir: string; version: 'legacy' | 'modern' }> {
for await (const dir of iterateNSSCertDBPaths(nssDirGlob)) {
debug(`checking to see if ${dir} is a valid NSS database directory`);
if (fs.existsSync(path.join(dir, 'cert8.db'))) {
debug(`Found legacy NSS database in ${dir}, emitting...`);
yield { dir, version: 'legacy' };
}
if (fs.existsSync(path.join(dir, 'cert9.db'))) {
debug(`Found modern NSS database in ${dir}, running callback...`)
yield { dir, version: 'modern' };
}
}
}
/**
* Given a directory or glob pattern of directories, attempt to install the
* CA certificate to each directory containing an NSS database.
*/
export async function addCertificateToNSSCertDB(nssDirGlob: string, certPath: string, certutilPath: string): Promise<void> {
debug(`trying to install certificate into NSS databases in ${ nssDirGlob }`);
for await (const { dir, version } of iterateNSSCertDBs(nssDirGlob)) {
const dirArg = version === 'modern' ? `sql:${ dir }` : dir;
run(certutilPath, ['-A', '-d', dirArg, '-t', 'C,,', '-i', certPath, '-n', 'devcert']);
}
debug(`finished scanning & installing certificate in NSS databases in ${ nssDirGlob }`);
}
export async function removeCertificateFromNSSCertDB(nssDirGlob: string, certPath: string, certutilPath: string): Promise<void> {
debug(`trying to remove certificates from NSS databases in ${ nssDirGlob }`);
for await (const { dir, version } of iterateNSSCertDBs(nssDirGlob)) {
const dirArg = version === 'modern' ? `sql:${ dir }` : dir;
try {
run(certutilPath, ['-A', '-d', dirArg, '-t', 'C,,', '-i', certPath, '-n', 'devcert']);
} catch (e) {
debug(`failed to remove ${ certPath } from ${ dir }, continuing. ${ e.toString() }`)
}
}
debug(`finished scanning & installing certificate in NSS databases in ${ nssDirGlob }`);
}
/**
* Check to see if Firefox is still running, and if so, ask the user to close
* it. Poll until it's closed, then return.
*
* This is needed because Firefox appears to load the NSS database in-memory on
* startup, and overwrite on exit. So we have to ask the user to quite Firefox
* first so our changes don't get overwritten.
*/
export async function closeFirefox(): Promise<void> {
if (isFirefoxOpen()) {
await UI.closeFirefoxBeforeContinuing();
while(isFirefoxOpen()) {
await sleep(50);
}
}
}
/**
* Check if Firefox is currently open
*/
function isFirefoxOpen() {
// NOTE: We use some Windows-unfriendly methods here (ps) because Windows
// never needs to check this, because it doesn't update the NSS DB
// automaticaly.
assert(isMac || isLinux, 'checkForOpenFirefox was invoked on a platform other than Mac or Linux');
return exec('ps aux').indexOf('firefox') > -1;
}
async function sleep(ms: number) {
return new Promise((resolve) => setTimeout(resolve, ms));
}
/**
* Firefox manages it's own trust store for SSL certificates, which can be
* managed via the certutil command (supplied by NSS tooling packages). In the
* event that certutil is not already installed, and either can't be installed
* (Windows) or the user doesn't want to install it (skipCertutilInstall:
* true), it means that we can't programmatically tell Firefox to trust our
* root CA certificate.
*
* There is a recourse though. When a Firefox tab is directed to a URL that
* responds with a certificate, it will automatically prompt the user if they
* want to add it to their trusted certificates. So if we can't automatically
* install the certificate via certutil, we instead start a quick web server
* and host our certificate file. Then we open the hosted cert URL in Firefox
* to kick off the GUI flow.
*
* This method does all this, along with providing user prompts in the terminal
* to walk them through this process.
*/
export async function openCertificateInFirefox(firefoxPath: string, certPath: string): Promise<void> {
debug('Adding devert to Firefox trust stores manually. Launching a webserver to host our certificate temporarily ...');
let port: number;
const server = http.createServer(async (req, res) => {
let { pathname } = new URL(req.url);
if (pathname === '/certificate') {
res.writeHead(200, { 'Content-type': 'application/x-x509-ca-cert' });
res.write(fs.readFileSync(certPath));
res.end();
} else {
res.writeHead(200);
res.write(await UI.firefoxWizardPromptPage(`http://localhost:${port}/certificate`));
res.end();
}
});
port = await new Promise((resolve, reject) => {
server.on('error', reject);
server.listen(() => {
resolve((server.address() as net.AddressInfo).port);
});
});
try {
debug('Certificate server is up. Printing instructions for user and launching Firefox with hosted certificate URL');
await UI.startFirefoxWizard(`http://localhost:${port}`);
run(firefoxPath, [`http://localhost:${ port }`]);
await UI.waitForFirefoxWizard();
} finally {
server.close();
}
}
export function assertNotTouchingFiles(filepath: string, operation: string): void {
if (!filepath.startsWith(configDir) && !filepath.startsWith(getLegacyConfigDir())) {
throw new Error(`Devcert cannot ${ operation } ${ filepath }; it is outside known devcert config directories!`);
}
}