# frozen_string_literal: true# Released under the MIT License.# Copyright, 2018-2023, by Samuel Williams.# Copyright, 2019, by Richard S. Leung.# Copyright, 2021, by Akshay Birajdar.# Copyright, 2021, by Ye Lin Aung.# Copyright, 2023, by Antonio Terceiro.# Copyright, 2023, by Yuuji Yaginuma.require'openssl'moduleLocalhost# Represents a single public/private key pair for a given hostname.classAuthoritydefself.pathFile.expand_path("~/.localhost")end# List all certificate authorities in the given directory:defself.list(root=self.path)returnto_enum(:list)unlessblock_given?Dir.glob("*.crt",base: root)do|path|name=File.basename(path,".crt")authority=self.new(name,root: root)ifauthority.loadyieldauthorityendendend# Fetch (load or create) a certificate with the given hostname.# See {#initialize} for the format of the arguments.defself.fetch(*arguments,**options)authority=self.new(*arguments,**options)unlessauthority.loadauthority.saveendreturnauthorityend# Create an authority forn the given hostname.# @parameter hostname [String] The common name to use for the certificate.# @parameter root [String] The root path for loading and saving the certificate.definitialize(hostname="localhost",root: self.class.path)@root=root@hostname=hostname@key=nil@name=nil@certificate=nil@store=nilend# The hostname of the certificate authority.attr:hostnameBITS=1024*2defecdh_key@ecdh_key||=OpenSSL::PKey::EC.new"prime256v1"enddefdh_key@dh_key||=OpenSSL::PKey::DH.new(BITS)end# The private key path.defkey_pathFile.join(@root,"#{@hostname}.key")end# The public certificate path.defcertificate_pathFile.join(@root,"#{@hostname}.crt")end# The private key.defkey@key||=OpenSSL::PKey::RSA.new(BITS)enddefkey=key@key=keyend# The certificate name.defname@name||=OpenSSL::X509::Name.parse("/O=Development/CN=#{@hostname}")enddefname=name@name=nameend# The public certificate.# @returns [OpenSSL::X509::Certificate] A self-signed certificate.defcertificate@certificate||=OpenSSL::X509::Certificate.new.tapdo|certificate|certificate.subject=self.name# We use the same issuer as the subject, which makes this certificate self-signed:certificate.issuer=self.namecertificate.public_key=self.key.public_keycertificate.serial=Time.now.to_icertificate.version=2certificate.not_before=Time.nowcertificate.not_after=Time.now+(3600*24*365)extension_factory=OpenSSL::X509::ExtensionFactory.newextension_factory.subject_certificate=certificateextension_factory.issuer_certificate=certificatecertificate.extensions=[extension_factory.create_extension("basicConstraints","CA:FALSE",true),extension_factory.create_extension("subjectKeyIdentifier","hash"),]certificate.add_extensionextension_factory.create_extension("authorityKeyIdentifier","keyid:always,issuer:always")certificate.add_extensionextension_factory.create_extension("subjectAltName","DNS: #{@hostname}")certificate.signself.key,OpenSSL::Digest::SHA256.newendend# The certificate store which is used for validating the server certificate.defstore@store||=OpenSSL::X509::Store.new.tapdo|store|store.add_cert(self.certificate)endendSERVER_CIPHERS="EECDH+CHACHA20:EECDH+AES128:RSA+AES128:EECDH+AES256:RSA+AES256:EECDH+3DES:RSA+3DES:!MD5".freeze# @returns [OpenSSL::SSL::SSLContext] An context suitable for implementing a secure server.defserver_context(*arguments)OpenSSL::SSL::SSLContext.new(*arguments).tapdo|context|context.key=self.keycontext.cert=self.certificatecontext.session_id_context="localhost"ifcontext.respond_to?:tmp_dh_callback=context.tmp_dh_callback=proc{self.dh_key}endifcontext.respond_to?:ecdh_curves=context.ecdh_curves='P-256:P-384:P-521'elsifcontext.respond_to?:tmp_ecdh_callback=context.tmp_ecdh_callback=proc{self.ecdh_key}endcontext.set_params(ciphers: SERVER_CIPHERS,verify_mode: OpenSSL::SSL::VERIFY_NONE,)endend# @returns [OpenSSL::SSL::SSLContext] An context suitable for connecting to a secure server using this authority.defclient_context(*args)OpenSSL::SSL::SSLContext.new(*args).tapdo|context|context.cert_store=self.storecontext.set_params(verify_mode: OpenSSL::SSL::VERIFY_PEER,)endenddefload(path=@root)ifFile.directory?(path)certificate_path=File.join(path,"#{@hostname}.crt")key_path=File.join(path,"#{@hostname}.key")returnfalseunlessFile.exist?(certificate_path)andFile.exist?(key_path)certificate=OpenSSL::X509::Certificate.new(File.read(certificate_path))key=OpenSSL::PKey::RSA.new(File.read(key_path))# Certificates with old version need to be regenerated.returnfalseifcertificate.version<2@certificate=certificate@key=keyreturntrueendenddefsave(path=@root)Dir.mkdir(path,0700)unlessFile.directory?(path)lockfile_path=File.join(path,"#{@hostname}.lock")File.open(lockfile_path,File::RDWR|File::CREAT,0644)do|lockfile|lockfile.flock(File::LOCK_EX)File.write(File.join(path,"#{@hostname}.crt"),self.certificate.to_pem)File.write(File.join(path,"#{@hostname}.key"),self.key.to_pem)endendendend