mirror of
https://github.com/ruby/ruby.git
synced 2022-11-09 12:17:21 -05:00
65 lines
1.8 KiB
Ruby
65 lines
1.8 KiB
Ruby
#!/usr/bin/env ruby
|
|
|
|
require 'socket'
|
|
require 'openssl'
|
|
require 'optparse'
|
|
|
|
options = ARGV.getopts("p:c:k:C:")
|
|
|
|
port = options["p"] || "2000"
|
|
cert_file = options["c"]
|
|
key_file = options["k"]
|
|
ca_path = options["C"]
|
|
|
|
if cert_file && key_file
|
|
cert = OpenSSL::X509::Certificate.new(File::read(cert_file))
|
|
key = OpenSSL::PKey.read(File::read(key_file))
|
|
else
|
|
key = OpenSSL::PKey::RSA.new(2048){ print "." }
|
|
puts
|
|
cert = OpenSSL::X509::Certificate.new
|
|
cert.version = 2
|
|
cert.serial = 0
|
|
name = OpenSSL::X509::Name.new([["C","JP"],["O","TEST"],["CN","localhost"]])
|
|
cert.subject = name
|
|
cert.issuer = name
|
|
cert.not_before = Time.now
|
|
cert.not_after = Time.now + 3600
|
|
cert.public_key = key
|
|
ef = OpenSSL::X509::ExtensionFactory.new(nil,cert)
|
|
cert.extensions = [
|
|
ef.create_extension("basicConstraints","CA:FALSE"),
|
|
ef.create_extension("subjectKeyIdentifier","hash"),
|
|
ef.create_extension("extendedKeyUsage","serverAuth"),
|
|
ef.create_extension("keyUsage",
|
|
"keyEncipherment,dataEncipherment,digitalSignature")
|
|
]
|
|
ef.issuer_certificate = cert
|
|
cert.add_extension ef.create_extension("authorityKeyIdentifier",
|
|
"keyid:always,issuer:always")
|
|
cert.sign(key, "SHA1")
|
|
end
|
|
|
|
ctx = OpenSSL::SSL::SSLContext.new()
|
|
ctx.key = key
|
|
ctx.cert = cert
|
|
if ca_path
|
|
ctx.verify_mode =
|
|
OpenSSL::SSL::VERIFY_PEER|OpenSSL::SSL::VERIFY_FAIL_IF_NO_PEER_CERT
|
|
ctx.ca_path = ca_path
|
|
else
|
|
$stderr.puts "!!! WARNING: PEER CERTIFICATE WON'T BE VERIFIED !!!"
|
|
end
|
|
|
|
tcps = TCPServer.new(port)
|
|
ssls = OpenSSL::SSL::SSLServer.new(tcps, ctx)
|
|
loop do
|
|
ns = ssls.accept
|
|
puts "connected from #{ns.peeraddr}"
|
|
while line = ns.gets
|
|
puts line.inspect
|
|
ns.write line
|
|
end
|
|
puts "connection closed"
|
|
ns.close
|
|
end
|