# Copyright, 2018, by Samuel G. D. Williams. <http://www.codeotaku.com># # Permission is hereby granted, free of charge, to any person obtaining a copy# of this software and associated documentation files (the "Software"), to deal# in the Software without restriction, including without limitation the rights# to use, copy, modify, merge, publish, distribute, sublicense, and/or sell# copies of the Software, and to permit persons to whom the Software is# furnished to do so, subject to the following conditions:# # The above copyright notice and this permission notice shall be included in# all copies or substantial portions of the Software.# # THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR# IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,# FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE# AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER# LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,# OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN# THE SOFTWARE.require'yaml'require'openssl'moduleLocalhostclassAuthoritydefself.pathFile.expand_path("~/.localhost")enddefself.fetch(*args)authority=self.new(*args)path=self.pathunlessauthority.load(path)Dir.mkdir(path,0700)unlessFile.directory?(path)authority.save(path)endreturnauthorityenddefinitialize(hostname="localhost")@hostname=hostname@key=nil@name=nil@certificate=nil@store=nilendBITS=1024*2defecdh_key@ecdh_key||=OpenSSL::PKey::EC.new"prime256v1"enddefdh_key@dh_key||=OpenSSL::PKey::DH.new(BITS)enddefkey@key||=OpenSSL::PKey::RSA.new(BITS)enddefkey=key@key=keyenddefname@name||=OpenSSL::X509::Name.parse("/O=Development/CN=#{@hostname}")enddefname=name@name=nameenddefcertificate@certificate||=OpenSSL::X509::Certificate.new.tapdo|certificate|certificate.subject=self.name# We use the same issuer as the subject, which makes this certificate self-signed:certificate.issuer=self.namecertificate.public_key=self.key.public_keycertificate.serial=1certificate.version=2certificate.not_before=Time.nowcertificate.not_after=Time.now+(3600*24*365*10)extension_factory=OpenSSL::X509::ExtensionFactory.newextension_factory.subject_certificate=certificateextension_factory.issuer_certificate=certificatecertificate.extensions=[extension_factory.create_extension("basicConstraints","CA:FALSE",true),extension_factory.create_extension("subjectKeyIdentifier","hash"),]certificate.add_extensionextension_factory.create_extension("authorityKeyIdentifier","keyid:always,issuer:always")certificate.add_extensionextension_factory.create_extension("subjectAltName","DNS: #{@hostname}")certificate.signself.key,OpenSSL::Digest::SHA256.newendend# The certificate store which is used for validating the server certificate:defstore@store||=OpenSSL::X509::Store.new.tapdo|store|store.add_cert(self.certificate)endendSERVER_CIPHERS="EECDH+CHACHA20:EECDH+AES128:RSA+AES128:EECDH+AES256:RSA+AES256:EECDH+3DES:RSA+3DES:!MD5".freezedefserver_context(*args)OpenSSL::SSL::SSLContext.new(*args).tapdo|context|context.key=self.keycontext.cert=self.certificatecontext.session_id_context="localhost"ifcontext.respond_to?:tmp_dh_callback=context.tmp_dh_callback=proc{self.dh_key}endifcontext.respond_to?:ecdh_curves=context.ecdh_curves='P-256:P-384:P-521'elsifcontext.respond_to?:tmp_ecdh_callback=context.tmp_ecdh_callback=proc{self.ecdh_key}endcontext.set_params(ciphers: SERVER_CIPHERS,verify_mode: OpenSSL::SSL::VERIFY_NONE,)endenddefclient_context(*args)OpenSSL::SSL::SSLContext.new(*args).tapdo|context|context.cert_store=self.storecontext.set_params(verify_mode: OpenSSL::SSL::VERIFY_PEER,)endenddefload(path)ifFile.directory?pathcertificate_path=File.join(path,"#{@hostname}.crt")key_path=File.join(path,"#{@hostname}.key")returnfalseunlessFile.exist?(certificate_path)andFile.exist?(key_path)certificate=OpenSSL::X509::Certificate.new(File.read(certificate_path))key=OpenSSL::PKey::RSA.new(File.read(key_path))# Certificates with old version need to be regenerated.returnfalseifcertificate.version<2@certificate=certificate@key=keyreturntrueendenddefsave(path)lockfile_path=File.join(path,"#{@hostname}.lock")File.open(lockfile_path,File::RDWR|File::CREAT,0644)do|lockfile|lockfile.flock(File::LOCK_EX)File.write(File.join(path,"#{@hostname}.crt"),self.certificate.to_pem)File.write(File.join(path,"#{@hostname}.key"),self.key.to_pem)endendendend