diff options
Diffstat (limited to 'vendor/openssl-probe/src/lib.rs')
-rw-r--r-- | vendor/openssl-probe/src/lib.rs | 136 |
1 files changed, 136 insertions, 0 deletions
diff --git a/vendor/openssl-probe/src/lib.rs b/vendor/openssl-probe/src/lib.rs new file mode 100644 index 000000000..0db12a73f --- /dev/null +++ b/vendor/openssl-probe/src/lib.rs @@ -0,0 +1,136 @@ +use std::env; +use std::path::{Path, PathBuf}; + +/// The OpenSSL environment variable to configure what certificate file to use. +pub const ENV_CERT_FILE: &'static str = "SSL_CERT_FILE"; + +/// The OpenSSL environment variable to configure what certificates directory to use. +pub const ENV_CERT_DIR: &'static str = "SSL_CERT_DIR"; + +pub struct ProbeResult { + pub cert_file: Option<PathBuf>, + pub cert_dir: Option<PathBuf>, +} + +/// Probe the system for the directory in which CA certificates should likely be +/// found. +/// +/// This will only search known system locations. +pub fn find_certs_dirs() -> Vec<PathBuf> { + cert_dirs_iter().map(Path::to_path_buf).collect() +} + +// TODO: when we bump to 0.2, make this the `find_certs_dirs` function +fn cert_dirs_iter() -> impl Iterator<Item = &'static Path> { + // see http://gagravarr.org/writing/openssl-certs/others.shtml + [ + "/var/ssl", + "/usr/share/ssl", + "/usr/local/ssl", + "/usr/local/openssl", + "/usr/local/etc/openssl", + "/usr/local/share", + "/usr/lib/ssl", + "/usr/ssl", + "/etc/openssl", + "/etc/pki/ca-trust/extracted/pem", + "/etc/pki/tls", + "/etc/ssl", + "/etc/certs", + "/opt/etc/ssl", // Entware + "/data/data/com.termux/files/usr/etc/tls", + "/boot/system/data/ssl", + ] + .iter().map(Path::new).filter(|p| p.exists()) +} + +/// Probe for SSL certificates on the system, then configure the SSL certificate `SSL_CERT_FILE` +/// and `SSL_CERT_DIR` environment variables in this process for OpenSSL to use. +/// +/// Preconfigured values in the environment variables will not be overwritten if the paths they +/// point to exist and are accessible. +pub fn init_ssl_cert_env_vars() { + try_init_ssl_cert_env_vars(); +} + +/// Probe for SSL certificates on the system, then configure the SSL certificate `SSL_CERT_FILE` +/// and `SSL_CERT_DIR` environment variables in this process for OpenSSL to use. +/// +/// Preconfigured values in the environment variables will not be overwritten if the paths they +/// point to exist and are accessible. +/// +/// Returns `true` if any certificate file or directory was found while probing. +/// Combine this with `has_ssl_cert_env_vars()` to check whether previously configured environment +/// variables are valid. +pub fn try_init_ssl_cert_env_vars() -> bool { + let ProbeResult { cert_file, cert_dir } = probe(); + // we won't be overwriting existing env variables because if they're valid probe() will have + // returned them unchanged + if let Some(path) = &cert_file { + env::set_var(ENV_CERT_FILE, path); + } + if let Some(path) = &cert_dir { + env::set_var(ENV_CERT_DIR, path); + } + + cert_file.is_some() || cert_dir.is_some() +} + +/// Check whether the OpenSSL `SSL_CERT_FILE` and/or `SSL_CERT_DIR` environment variable is +/// configured in this process with an existing file or directory. +/// +/// That being the case would indicate that certificates will be found successfully by OpenSSL. +/// +/// Returns `true` if either variable is set to an existing file or directory. +pub fn has_ssl_cert_env_vars() -> bool { + let probe = probe_from_env(); + probe.cert_file.is_some() || probe.cert_dir.is_some() +} + +fn probe_from_env() -> ProbeResult { + let var = |name| { + env::var_os(name) + .map(PathBuf::from) + .filter(|p| p.exists()) + }; + ProbeResult { + cert_file: var(ENV_CERT_FILE), + cert_dir: var(ENV_CERT_DIR), + } +} + +pub fn probe() -> ProbeResult { + let mut result = probe_from_env(); + for certs_dir in cert_dirs_iter() { + // cert.pem looks to be an openssl 1.0.1 thing, while + // certs/ca-certificates.crt appears to be a 0.9.8 thing + let cert_filenames = [ + "cert.pem", + "certs.pem", + "ca-bundle.pem", + "cacert.pem", + "ca-certificates.crt", + "certs/ca-certificates.crt", + "certs/ca-root-nss.crt", + "certs/ca-bundle.crt", + "CARootCertificates.pem", + "tls-ca-bundle.pem", + ]; + if result.cert_file.is_none() { + result.cert_file = cert_filenames + .iter() + .map(|fname| certs_dir.join(fname)) + .find(|p| p.exists()); + } + if result.cert_dir.is_none() { + let cert_dir = certs_dir.join("certs"); + if cert_dir.exists() { + result.cert_dir = Some(cert_dir); + } + } + if result.cert_file.is_some() && result.cert_dir.is_some() { + break; + } + } + result +} |