blob: 8b8a29beeadcaf9096ebd72e89b142348d63d2da [file] [log] [blame]
// Copyright 2025 The Go Authors. All rights reserved.
// Use of this source code is governed by a BSD-style
// license that can be found in the LICENSE file.
//go:build linux
package x509
import (
"encoding/pem"
"fmt"
"internal/testenv"
"os"
"syscall"
"testing"
)
func TestSetFallbackRoots(t *testing.T) {
if testing.Short() {
t.Skip("skipping test in short mode")
}
test := func(t *testing.T, name string, f func(t *testing.T)) {
t.Run(name, func(t *testing.T) {
if os.Getenv("CRYPTO_X509_SETFALLBACKROOTS_TEST") != "1" {
// Execute test in a separate process with CRYPTO_X509_SETFALBACKROOTS_TEST env.
cmd := testenv.Command(t, testenv.Executable(t), fmt.Sprintf("-test.run=^%v$", t.Name()), "-test.v")
cmd.Env = append(os.Environ(), "CRYPTO_X509_SETFALLBACKROOTS_TEST=1")
cmd.SysProcAttr = &syscall.SysProcAttr{
Cloneflags: syscall.CLONE_NEWNS | syscall.CLONE_NEWUSER,
UidMappings: []syscall.SysProcIDMap{{ContainerID: 0, HostID: os.Getuid(), Size: 1}},
GidMappings: []syscall.SysProcIDMap{{ContainerID: 0, HostID: os.Getgid(), Size: 1}},
}
out, err := cmd.CombinedOutput()
if testenv.SyscallIsNotSupported(err) {
t.Skipf("skipping: could not start process with CLONE_NEWNS and CLONE_NEWUSER: %v", err)
}
t.Logf("running with CRYPTO_X509_SETFALLBACKROOTS_TEST=1:\n%s", out)
if err != nil {
t.Errorf("CRYPTO_X509_SETFALLBACKROOTS_TEST=1 subprocess failed: %v", err)
}
return
}
// This test is executed in a separate user and mount namespace, thus
// we can mount a separate "/etc" empty bind mount, without the need for root access.
// On linux all certs reside in /etc, so as we bind an empty dir, we
// get a full control over the system CAs, required for this test.
if err := syscall.Mount(t.TempDir(), "/etc", "", syscall.MS_BIND, ""); err != nil {
if testenv.SyscallIsNotSupported(err) {
t.Skipf("Failed to mount /etc: %v", err)
}
t.Fatalf("Failed to mount /etc: %v", err)
}
t.Cleanup(func() {
if err := syscall.Unmount("/etc", 0); err != nil {
t.Errorf("failed to unmount /etc: %v", err)
}
})
f(t)
})
}
newFallbackCertPool := func(t *testing.T) *CertPool {
t.Helper()
const fallbackCert = `-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
`
b, _ := pem.Decode([]byte(fallbackCert))
cert, err := ParseCertificate(b.Bytes)
if err != nil {
t.Fatal(err)
}
p := NewCertPool()
p.AddCert(cert)
return p
}
installSystemRootCAs := func(t *testing.T) {
t.Helper()
const systemCAs = `-----BEGIN CERTIFICATE-----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=
-----END CERTIFICATE-----
`
if err := os.MkdirAll("/etc/ssl/certs", 06660); err != nil {
t.Fatal(err)
}
if err := os.WriteFile("/etc/ssl/certs/ca-certificates.crt", []byte(systemCAs), 0666); err != nil {
t.Fatal(err)
}
}
test(t, "after_first_load_no_system_CAs", func(t *testing.T) {
SystemCertPool() // load system certs, before setting fallbacks
fallback := newFallbackCertPool(t)
SetFallbackRoots(fallback)
got, err := SystemCertPool()
if err != nil {
t.Fatal(err)
}
if !got.Equal(fallback) {
t.Fatal("SystemCertPool returned a non-fallback CertPool")
}
})
test(t, "after_first_load_system_CA_read_error", func(t *testing.T) {
// This will fail to load in SystemCertPool since this is a directory,
// rather than a file with certificates.
if err := os.MkdirAll("/etc/ssl/certs/ca-certificates.crt", 0666); err != nil {
t.Fatal(err)
}
_, err := SystemCertPool() // load system certs, before setting fallbacks
if err == nil {
t.Fatal("unexpected success")
}
fallback := newFallbackCertPool(t)
SetFallbackRoots(fallback)
got, err := SystemCertPool()
if err != nil {
t.Fatal(err)
}
if !got.Equal(fallback) {
t.Fatal("SystemCertPool returned a non-fallback CertPool")
}
})
test(t, "after_first_load_with_system_CAs", func(t *testing.T) {
installSystemRootCAs(t)
SystemCertPool() // load system certs, before setting fallbacks
fallback := newFallbackCertPool(t)
SetFallbackRoots(fallback)
got, err := SystemCertPool()
if err != nil {
t.Fatal(err)
}
if got.Equal(fallback) {
t.Fatal("SystemCertPool returned the fallback CertPool")
}
})
test(t, "before_first_load_no_system_CAs", func(t *testing.T) {
fallback := newFallbackCertPool(t)
SetFallbackRoots(fallback)
got, err := SystemCertPool()
if err != nil {
t.Fatal(err)
}
if !got.Equal(fallback) {
t.Fatal("SystemCertPool returned a non-fallback CertPool")
}
})
test(t, "before_first_load_system_CA_read_error", func(t *testing.T) {
// This will fail to load in SystemCertPool since this is a directory,
// rather than a file with certificates.
if err := os.MkdirAll("/etc/ssl/certs/ca-certificates.crt", 0666); err != nil {
t.Fatal(err)
}
fallback := newFallbackCertPool(t)
SetFallbackRoots(fallback)
got, err := SystemCertPool()
if err != nil {
t.Fatal(err)
}
if !got.Equal(fallback) {
t.Fatal("SystemCertPool returned a non-fallback CertPool")
}
})
test(t, "before_first_load_with_system_CAs", func(t *testing.T) {
installSystemRootCAs(t)
fallback := newFallbackCertPool(t)
SetFallbackRoots(fallback)
got, err := SystemCertPool()
if err != nil {
t.Fatal(err)
}
if got.Equal(fallback) {
t.Fatal("SystemCertPool returned the fallback CertPool")
}
})
test(t, "before_first_load_force_godebug", func(t *testing.T) {
if err := os.Setenv("GODEBUG", "x509usefallbackroots=1"); err != nil {
t.Fatal(err)
}
installSystemRootCAs(t)
fallback := newFallbackCertPool(t)
SetFallbackRoots(fallback)
got, err := SystemCertPool()
if err != nil {
t.Fatal(err)
}
if !got.Equal(fallback) {
t.Fatal("SystemCertPool returned a non-fallback CertPool")
}
})
test(t, "after_first_load_force_godebug", func(t *testing.T) {
if err := os.Setenv("GODEBUG", "x509usefallbackroots=1"); err != nil {
t.Fatal(err)
}
installSystemRootCAs(t)
SystemCertPool() // load system certs, before setting fallbacks
fallback := newFallbackCertPool(t)
SetFallbackRoots(fallback)
got, err := SystemCertPool()
if err != nil {
t.Fatal(err)
}
if !got.Equal(fallback) {
t.Fatal("SystemCertPool returned a non-fallback CertPool")
}
})
test(t, "after_first_load_force_godebug_no_system_certs", func(t *testing.T) {
if err := os.Setenv("GODEBUG", "x509usefallbackroots=1"); err != nil {
t.Fatal(err)
}
SystemCertPool() // load system certs, before setting fallbacks
fallback := newFallbackCertPool(t)
SetFallbackRoots(fallback)
got, err := SystemCertPool()
if err != nil {
t.Fatal(err)
}
if !got.Equal(fallback) {
t.Fatal("SystemCertPool returned a non-fallback CertPool")
}
})
}