tree: b320be3d96181252c45d3ef729c44b3078b05b54 [path history] [tgz]
  1. cacert.key
  2. cacert.pem
  3. config.json
  4. README.md
  5. w3c-import.log
  6. web-platform.test.key
  7. web-platform.test.pem
LayoutTests/imported/w3c/web-platform-tests/tools/certs/README.md

WPT Test Certificates

The web-platform-tests project maintains a set of SSL certificates to allow contributors to execute tests requiring HTTPS locally.

Trusting Root CA

To prevent browser SSL warnings when running HTTPS tests locally, the web-platform-tests Root CA file cacert.pem in the tools/certs/ directory must be added as a trusted certificate in your OS/browser.

For Firefox, go to about:preferences and search for “certificates”.

For browsers that use the Certificate Authorities of the underlying OS, such as Chrome and Safari, you need to adjust the OS. For macOS, go to Keychain Access and add the certificate under login.

NOTE: The CA should not be installed in any browser profile used outside of tests, since it may be used to generate fake certificates. For browsers that use the OS certificate store, tests should therefore not be run manually outside a dedicated OS instance (e.g. a VM). To avoid this problem when running tests in Chrome or Firefox, use wpt run, which disables certificate checks and therefore doesn't require the root CA to be trusted.

Regenerating certificates

If you wish to generate new certificates for any reason, it's possible to use OpenSSL when starting the server, or starting a test run, by providing the --ssl-type=openssl argument to the wpt serve or wpt run commands.

If you installed OpenSSL in such a way that running openssl at a command line doesn't work, you also need to adjust the path to the OpenSSL binary. This can be done by adding a section to config.json like:

"ssl": {"openssl": {"binary": "/path/to/openssl"}}

On Windows using OpenSSL typically requires installing an OpenSSL distribution. Shining Light provide a convenient installer that is known to work, but requires a little extra setup, i.e.:

Run the installer for Win32_OpenSSL_v1.1.0b (30MB). During installation, change the default location for where to Copy OpenSSL Dlls from the System directory to the /bin directory.

After installation, ensure that the path to OpenSSL (typically, this will be C:\OpenSSL-Win32\bin) is in your %Path% Environment Variable. If you forget to do this part, you will most likely see a ‘File Not Found’ error when you start wptserve.

Finally, set the path value in the server configuration file to the default OpenSSL configuration file location. To do this, create a file called config.json. Then add the OpenSSL configuration below, ensuring that the key ssl/openssl/base_conf_path has a value that is the path to the OpenSSL config file (typically this will be C:\\OpenSSL-Win32\\bin\\openssl.cfg):

{
  "ssl": {
    "type": "openssl",
    "encrypt_after_connect": false,
    "openssl": {
      "openssl_binary": "openssl",
      "base_path: "_certs",
      "force_regenerate": false,
      "base_conf_path": "C:\\OpenSSL-Win32\\bin\\openssl.cfg"
    },
  },
}

Regenerating the pregenerated certificates

From the root, run ./wpt serve --config tools/certs/config.json and terminate it after it has started up.