Skip to content

Commit 6208313

Browse files
committed
Preliminary native SSL support
This adds a Redis::Connection::SSLSocket class which terminates SSL natively using the Ruby OpenSSL extension. This socket type is used when the "rediss://" URI scheme is specified.
1 parent 3ae7fbd commit 6208313

File tree

13 files changed

+453
-4
lines changed

13 files changed

+453
-4
lines changed

lib/redis/client.rb

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -392,7 +392,7 @@ def _parse_options(options)
392392

393393
if uri.scheme == "unix"
394394
defaults[:path] = uri.path
395-
elsif uri.scheme == "redis"
395+
elsif uri.scheme == "redis" || uri.scheme == "rediss"
396396
defaults[:scheme] = uri.scheme
397397
defaults[:host] = uri.host if uri.host
398398
defaults[:port] = uri.port if uri.port
@@ -402,6 +402,8 @@ def _parse_options(options)
402402
else
403403
raise ArgumentError, "invalid uri scheme '#{uri.scheme}'"
404404
end
405+
406+
defaults[:ssl] = true if uri.scheme == "rediss"
405407
end
406408

407409
# Use default when option is not specified or nil

lib/redis/connection/ruby.rb

Lines changed: 29 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,13 +2,18 @@
22
require "redis/connection/command_helper"
33
require "redis/errors"
44
require "socket"
5+
require "openssl"
56

67
class Redis
78
module Connection
89
module SocketMixin
910

1011
CRLF = "\r\n".freeze
1112

13+
# Exceptions raised during non-blocking I/O ops that require retrying the op
14+
NBIO_EXCEPTIONS = [Errno::EWOULDBLOCK, Errno::EAGAIN]
15+
NBIO_EXCEPTIONS << IO::WaitReadable if RUBY_VERSION >= "1.9.3"
16+
1217
def initialize(*args)
1318
super(*args)
1419

@@ -45,10 +50,11 @@ def gets
4550
end
4651

4752
def _read_from_socket(nbytes)
53+
4854
begin
4955
read_nonblock(nbytes)
5056

51-
rescue Errno::EWOULDBLOCK, Errno::EAGAIN
57+
rescue *NBIO_EXCEPTIONS
5258
if IO.select([self], nil, nil, @timeout)
5359
retry
5460
else
@@ -195,6 +201,25 @@ def self.connect(path, timeout)
195201

196202
end
197203

204+
class SSLSocket < ::OpenSSL::SSL::SSLSocket
205+
include SocketMixin
206+
207+
def self.connect(host, port, timeout, ssl_params)
208+
# Note: this is using Redis::Connection::TCPSocket
209+
tcp_sock = TCPSocket.connect(host, port, timeout)
210+
211+
ctx = OpenSSL::SSL::SSLContext.new
212+
ctx.set_params(ssl_params) if ssl_params && !ssl_params.empty?
213+
214+
ssl_sock = new(tcp_sock, ctx)
215+
ssl_sock.hostname = host
216+
ssl_sock.connect
217+
ssl_sock.post_connection_check(host)
218+
219+
ssl_sock
220+
end
221+
end
222+
198223
class Ruby
199224
include Redis::Connection::CommandHelper
200225

@@ -206,7 +231,10 @@ class Ruby
206231

207232
def self.connect(config)
208233
if config[:scheme] == "unix"
234+
raise ArgumentError, "SSL incompatible with unix sockets" if config[:ssl]
209235
sock = UNIXSocket.connect(config[:path], config[:connect_timeout])
236+
elsif config[:scheme] == "rediss" || config[:ssl]
237+
sock = SSLSocket.connect(config[:host], config[:port], config[:connect_timeout], config[:ssl_params])
210238
else
211239
sock = TCPSocket.connect(config[:host], config[:port], config[:connect_timeout])
212240
end

test/ssl_test.rb

Lines changed: 53 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,53 @@
1+
# encoding: UTF-8
2+
3+
if RUBY_VERSION >= "1.9.3"
4+
require File.expand_path("helper", File.dirname(__FILE__))
5+
6+
class SslTest < Test::Unit::TestCase
7+
8+
include Helper::Client
9+
10+
driver(:ruby) do
11+
12+
def test_verified_ssl_connection
13+
RedisMock.start({ :ping => proc { "+PONG" } }, ssl_server_opts("trusted")) do |port|
14+
redis = Redis.new(:port => port, :ssl => true, :ssl_params => { :ca_file => ssl_ca_file })
15+
assert_equal redis.ping, "PONG"
16+
end
17+
end
18+
19+
def test_unverified_ssl_connection
20+
assert_raise(OpenSSL::SSL::SSLError) do
21+
RedisMock.start({ :ping => proc { "+PONG" } }, ssl_server_opts("untrusted")) do |port|
22+
redis = Redis.new(:port => port, :ssl => true, :ssl_params => { :ca_file => ssl_ca_file })
23+
redis.ping
24+
end
25+
end
26+
end
27+
28+
end
29+
30+
private
31+
32+
def ssl_server_opts(prefix)
33+
ssl_cert = File.join(cert_path, "#{prefix}-cert.crt")
34+
ssl_key = File.join(cert_path, "#{prefix}-cert.key")
35+
36+
{
37+
:ssl => true,
38+
:ssl_params => {
39+
:cert => OpenSSL::X509::Certificate.new(File.read(ssl_cert)),
40+
:key => OpenSSL::PKey::RSA.new(File.read(ssl_key))
41+
}
42+
}
43+
end
44+
45+
def ssl_ca_file
46+
File.join(cert_path, "trusted-ca.crt")
47+
end
48+
49+
def cert_path
50+
File.expand_path("../support/ssl/", __FILE__)
51+
end
52+
end
53+
end

test/support/redis_mock.rb

Lines changed: 13 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,19 @@
33
module RedisMock
44
class Server
55
def initialize(options = {}, &block)
6-
@server = TCPServer.new(options[:host] || "127.0.0.1", 0)
7-
@server.setsockopt(Socket::SOL_SOCKET, Socket::SO_REUSEADDR, true)
6+
tcp_server = TCPServer.new(options[:host] || "127.0.0.1", 0)
7+
tcp_server.setsockopt(Socket::SOL_SOCKET, Socket::SO_REUSEADDR, true)
8+
9+
if options[:ssl]
10+
ctx = OpenSSL::SSL::SSLContext.new
11+
12+
ssl_params = options.fetch(:ssl_params, {})
13+
ctx.set_params(ssl_params) unless ssl_params.empty?
14+
15+
@server = OpenSSL::SSL::SSLServer.new(tcp_server, ctx)
16+
else
17+
@server = tcp_server
18+
end
819
end
920

1021
def port

test/support/ssl/gen_certs.sh

Lines changed: 31 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,31 @@
1+
#!/bin/sh
2+
3+
get_subject() {
4+
if [ "$1" = "trusted" ]
5+
then
6+
echo "/C=IT/ST=Sicily/L=Catania/O=Redis/OU=Security/CN=127.0.0.1"
7+
else
8+
echo "/C=XX/ST=Untrusted/L=Evilville/O=Evil Hacker/OU=Attack Department/CN=127.0.0.1"
9+
fi
10+
}
11+
12+
# Generate two CAs: one to be considered trusted, and one that's untrusted
13+
for type in trusted untrusted; do
14+
rm -rf ./demoCA
15+
mkdir -p ./demoCA
16+
mkdir -p ./demoCA/certs
17+
mkdir -p ./demoCA/crl
18+
mkdir -p ./demoCA/newcerts
19+
mkdir -p ./demoCA/private
20+
touch ./demoCA/index.txt
21+
22+
openssl genrsa -out ${type}-ca.key 2048
23+
openssl req -new -x509 -days 12500 -key ${type}-ca.key -out ${type}-ca.crt -subj "$(get_subject $type)"
24+
openssl x509 -in ${type}-ca.crt -noout -next_serial -out ./demoCA/serial
25+
26+
openssl req -newkey rsa:2048 -keyout ${type}-cert.key -nodes -out ${type}-cert.req -subj "$(get_subject $type)"
27+
openssl ca -days 12500 -cert ${type}-ca.crt -keyfile ${type}-ca.key -out ${type}-cert.crt -infiles ${type}-cert.req
28+
rm ${type}-cert.req
29+
done
30+
31+
rm -rf ./demoCA

test/support/ssl/trusted-ca.crt

Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,25 @@
1+
-----BEGIN CERTIFICATE-----
2+
MIIEIDCCAwigAwIBAgIJAM7kyjC89Qj/MA0GCSqGSIb3DQEBCwUAMGcxCzAJBgNV
3+
BAYTAklUMQ8wDQYDVQQIEwZTaWNpbHkxEDAOBgNVBAcTB0NhdGFuaWExDjAMBgNV
4+
BAoTBVJlZGlzMREwDwYDVQQLEwhTZWN1cml0eTESMBAGA1UEAxMJMTI3LjAuMC4x
5+
MCAXDTE2MDQwMjAzMzQ0MVoYDzIwNTAwNjIzMDMzNDQxWjBnMQswCQYDVQQGEwJJ
6+
VDEPMA0GA1UECBMGU2ljaWx5MRAwDgYDVQQHEwdDYXRhbmlhMQ4wDAYDVQQKEwVS
7+
ZWRpczERMA8GA1UECxMIU2VjdXJpdHkxEjAQBgNVBAMTCTEyNy4wLjAuMTCCASIw
8+
DQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMeibFqEG38mtN9DSXy6NZdd7AjH
9+
4/D+VdDzlbJlI5IBACCV9p6P2j5PFlFvkHFE6vr6biMaLXNAmUHYfDzeT95LODHH
10+
t+8HlR51cNYrnt9B3eiVwEnJ7+axuDHg6nUgLXeKeog+vEqreZwLnFibxt2qpFze
11+
xzyKJ37Pm+iAey5glCc/v7ECYQ4sWVVV+ciC+sAwmZDfZXCBQtRRokJ6ikqQDwWV
12+
DugGcV46feTpu79OmkLLM8PI3E7ow2F/3iv67gmdlO5m9wX1ahWzJKUapBTxgf4X
13+
QG0s60WbC9iJIvgXRGW7wWSsqSVJkfLYllDTPgfpLyl1+FR3A4awrsPiMVUCAwEA
14+
AaOBzDCByTAdBgNVHQ4EFgQU+YG9kJR3Vy31d7QVyxRAYyKTK18wgZkGA1UdIwSB
15+
kTCBjoAU+YG9kJR3Vy31d7QVyxRAYyKTK1+ha6RpMGcxCzAJBgNVBAYTAklUMQ8w
16+
DQYDVQQIEwZTaWNpbHkxEDAOBgNVBAcTB0NhdGFuaWExDjAMBgNVBAoTBVJlZGlz
17+
MREwDwYDVQQLEwhTZWN1cml0eTESMBAGA1UEAxMJMTI3LjAuMC4xggkAzuTKMLz1
18+
CP8wDAYDVR0TBAUwAwEB/zANBgkqhkiG9w0BAQsFAAOCAQEAeFKB7DUixmxbdvNw
19+
n/mNoHK+OOZXmfxZDCo0v2gcQ4WXUiCqL6MagrImCvkEz5RL6Fk2ZflEV2iGQ5Ds
20+
CmF2n47ISpqG29bfI5R1rcbfqK/5tazUIhQu12ThNmkEh7hCuW/0LqJrnmxpuRLy
21+
le9e3svCC96lwjFczzU/utWurKt7S7Di3C4P+AXAJJuszDMLMCBLaB/3j24cNpOx
22+
zzeZo02x4rpsD2+MMfRDWMWezVEyk63KnI0kt3JGnepsKCFc48ZOk09LwFk3Rfaq
23+
zuKSgEJJw1mfsdBfysM0HQw20yyjSdoTEfQq3bXctTNi+pEOgW6x7TMsnngYYLXV
24+
9XTrpg==
25+
-----END CERTIFICATE-----

test/support/ssl/trusted-ca.key

Lines changed: 27 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,27 @@
1+
-----BEGIN RSA PRIVATE KEY-----
2+
MIIEpQIBAAKCAQEAx6JsWoQbfya030NJfLo1l13sCMfj8P5V0POVsmUjkgEAIJX2
3+
no/aPk8WUW+QcUTq+vpuIxotc0CZQdh8PN5P3ks4Mce37weVHnVw1iue30Hd6JXA
4+
Scnv5rG4MeDqdSAtd4p6iD68Sqt5nAucWJvG3aqkXN7HPIonfs+b6IB7LmCUJz+/
5+
sQJhDixZVVX5yIL6wDCZkN9lcIFC1FGiQnqKSpAPBZUO6AZxXjp95Om7v06aQssz
6+
w8jcTujDYX/eK/ruCZ2U7mb3BfVqFbMkpRqkFPGB/hdAbSzrRZsL2Iki+BdEZbvB
7+
ZKypJUmR8tiWUNM+B+kvKXX4VHcDhrCuw+IxVQIDAQABAoIBAQCzbGHiQJXOA+XQ
8+
O9OSjHGaJ8n6Yl2VvaE3eZXzjj8X/Fo271GGVVgbZE10x8aUZxKim+3dEqwCx+52
9+
ZbHTqyMxcX2CEDRaWwBFLdxKQU467iIZ5m26ZAp/1v7rpXBT8KWsqQNT7L6ihdd4
10+
zl6orOlhVPsAlSGQYcL5kHJZ1w/fL0phEbwdISd3PYhGHXMNmqfXorzJYHDQA4R+
11+
yR7WpP1dmnUeEKrHc9FFcBZ75BGlWjdCPZMFKc7IndZumarhBpWH9yZMUxrUIo4V
12+
SCweRUFdD5H1lMZ0YiIAE25wKNEQ2iGd3Jfr8Vj1KFSHC9I2FJA3aFRRUgTwxx/W
13+
h0mJy1ZJAoGBAPYsSSlwQdxZjnyZiVkNSD4MoLdof//nRxeKGejq6AiXDvcsLyJy
14+
0MKk4YBFw2249TWm/KBbMAFiBE7d8uPtP5pPfjNVPX6VltH3AhSZ7Ugbpo6C3NFA
15+
GpzFVtNaWgCVDloDVdmsY7ssDFuAIih0paklPAqnLY+Ua9m1BiEPrB+bAoGBAM+a
16+
i+0NMR4AyKpuo1exdd+7BIHw5HNPwGmR1ggdGWduH0zsOhEawQKKFv1X9xKAcXxW
17+
PyeD56/Tmn7fkWvuE8dOu9E6em0vgmxhYyn4nyLAFYF5uKXYo78MpIEThdpl1ldT
18+
iHwG/25vunaBUHhwbHPUD+F989tmRuCjoFkuA5nPAoGAaqPIlcDhZvkMtoE0dHVC
19+
hE6oGIuWV17y9wmGK9YG6iG2A/EKAhxGvur6HL0b6Z4j6zgJW9Xkt9SkFR4kqAQQ
20+
d2JUQxx75SgcC5y7M/1yQrhnsHiT+7mPTbZW5HvRXUs0yl2DhSYeleiA+epJ4ciW
21+
Mu3EUsEVBYvAJLE8lHnbkF0CgYEAhyxpz3+3a4G3JsHDOWYjCfoLhVAEb9CNyC9c
22+
3QuVbvMVDlEBvgFdivm+3lZYWYOoYP0HQgNw59svzUxks5Hg7vUk9abN8CnvEgKX
23+
PszTUR0g450NzW6xr8PbmO/NR9bnKRUK2Tb1OkMldePdMY6CDykU7g3EqiZ+H+Zq
24+
kaaUUaECgYEAmk5W+S94q5jLemnfAChC5lva/0/aHdhtaoH4Lo+j0haMsdiy8/ZE
25+
sh+3gQ8pqwaCAwnKxAcppt/FNZ7tHRsH3oyY6biypn3WppQj+BA41nuzbspOKJhR
26+
ZDXKFCItbzUjyi23Dx4P4DgMivkpV+e88RMIuBnv4yjl5iOLq+vf4Rg=
27+
-----END RSA PRIVATE KEY-----

test/support/ssl/trusted-cert.crt

Lines changed: 81 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,81 @@
1+
Certificate:
2+
Data:
3+
Version: 3 (0x2)
4+
Serial Number: 14908262977180600576 (0xcee4ca30bcf50900)
5+
Signature Algorithm: sha1WithRSAEncryption
6+
Issuer: C=IT, ST=Sicily, L=Catania, O=Redis, OU=Security, CN=127.0.0.1
7+
Validity
8+
Not Before: Apr 2 03:34:42 2016 GMT
9+
Not After : Jun 23 03:34:42 2050 GMT
10+
Subject: C=IT, ST=Sicily, O=Redis, OU=Security, CN=127.0.0.1
11+
Subject Public Key Info:
12+
Public Key Algorithm: rsaEncryption
13+
Public-Key: (2048 bit)
14+
Modulus:
15+
00:ab:bf:ac:ef:dc:99:35:fa:07:3f:d5:33:86:f1:
16+
7d:9e:57:8b:d5:c1:10:04:0c:35:95:7c:61:ff:05:
17+
a6:f9:ef:71:5c:c5:83:68:a2:ad:5d:0f:a5:2b:b4:
18+
76:9f:36:8f:df:75:fb:d6:48:00:c0:f0:68:56:f6:
19+
49:84:4d:4e:e1:ca:dd:24:9f:2f:5e:7c:35:26:57:
20+
d6:d5:95:d1:3f:40:32:22:43:2c:8c:b7:8c:89:56:
21+
7c:d0:94:e5:f7:cf:4a:51:3f:60:b2:fe:1f:3b:38:
22+
d6:47:5d:2e:4f:38:75:d9:9b:c8:0f:d1:fd:91:5a:
23+
07:c3:94:95:1f:7b:f1:ae:dc:a1:83:e2:6b:78:05:
24+
34:b3:8b:87:86:31:9f:cc:8b:15:cd:18:2e:06:36:
25+
ca:f8:29:f8:6e:93:60:78:ec:8a:e8:a6:94:ad:24:
26+
a8:e3:d4:ac:42:da:52:0f:34:e8:d0:10:e5:53:db:
27+
f8:3a:56:48:10:33:df:80:70:1c:72:5e:1f:c3:11:
28+
bb:3b:b9:6b:0a:e0:82:eb:67:d4:8f:5c:30:d3:cf:
29+
17:6d:86:01:0e:ae:43:c1:d8:c0:5e:99:ef:fa:60:
30+
0a:f2:62:68:62:8b:05:f3:8b:b1:34:d8:70:78:35:
31+
74:76:c2:46:13:a3:1f:5d:7b:3b:49:20:1e:98:54:
32+
63:77
33+
Exponent: 65537 (0x10001)
34+
X509v3 extensions:
35+
X509v3 Basic Constraints:
36+
CA:FALSE
37+
Netscape Comment:
38+
OpenSSL Generated Certificate
39+
X509v3 Subject Key Identifier:
40+
81:DE:C0:39:F9:8A:57:50:DB:B1:6A:B3:D0:5F:E9:2C:87:5A:1E:3D
41+
X509v3 Authority Key Identifier:
42+
keyid:F9:81:BD:90:94:77:57:2D:F5:77:B4:15:CB:14:40:63:22:93:2B:5F
43+
44+
Signature Algorithm: sha1WithRSAEncryption
45+
a3:0a:d7:22:5a:bc:cc:f6:ed:2f:f2:9f:dd:e0:46:02:73:14:
46+
dd:a7:f5:39:b9:16:19:16:36:b6:22:5c:66:14:c0:d3:ac:55:
47+
fc:52:2d:c3:b2:70:5f:cf:3d:23:71:78:e9:31:88:65:2c:2e:
48+
4a:09:6e:4b:97:bb:4d:38:87:d8:25:ed:bb:ed:62:19:08:50:
49+
f2:40:cc:39:ee:f9:a8:3a:5d:2b:e7:34:eb:8a:74:c7:c9:bc:
50+
88:9b:9b:ca:5b:11:20:ca:53:b2:0b:20:49:fc:b9:f7:ec:03:
51+
c9:5d:c1:24:75:27:f8:7c:70:dc:6a:2c:98:48:93:5f:7f:7e:
52+
94:a1:cf:79:b3:24:e3:de:9e:f0:0f:d8:d6:3e:c9:52:30:31:
53+
87:90:c2:d2:23:be:d8:7a:e9:e6:bb:4b:00:75:30:49:4b:98:
54+
d5:f6:7d:b5:83:b5:57:85:20:98:00:51:55:c3:a2:81:ec:6c:
55+
11:91:33:60:14:7b:d2:01:ee:5b:bf:5b:68:f5:e0:4e:45:0a:
56+
68:cd:33:4f:29:72:fa:fe:6a:19:b6:84:70:90:a4:d5:7a:04:
57+
2e:da:5b:98:4f:e4:aa:a6:c4:68:aa:5c:8c:a5:5e:df:20:94:
58+
22:f7:37:45:71:a4:bc:72:34:ee:42:cf:9d:0f:fb:4a:39:d1:
59+
8e:41:f3:3f
60+
-----BEGIN CERTIFICATE-----
61+
MIIDvDCCAqSgAwIBAgIJAM7kyjC89QkAMA0GCSqGSIb3DQEBBQUAMGcxCzAJBgNV
62+
BAYTAklUMQ8wDQYDVQQIEwZTaWNpbHkxEDAOBgNVBAcTB0NhdGFuaWExDjAMBgNV
63+
BAoTBVJlZGlzMREwDwYDVQQLEwhTZWN1cml0eTESMBAGA1UEAxMJMTI3LjAuMC4x
64+
MCAXDTE2MDQwMjAzMzQ0MloYDzIwNTAwNjIzMDMzNDQyWjBVMQswCQYDVQQGEwJJ
65+
VDEPMA0GA1UECBMGU2ljaWx5MQ4wDAYDVQQKEwVSZWRpczERMA8GA1UECxMIU2Vj
66+
dXJpdHkxEjAQBgNVBAMTCTEyNy4wLjAuMTCCASIwDQYJKoZIhvcNAQEBBQADggEP
67+
ADCCAQoCggEBAKu/rO/cmTX6Bz/VM4bxfZ5Xi9XBEAQMNZV8Yf8FpvnvcVzFg2ii
68+
rV0PpSu0dp82j991+9ZIAMDwaFb2SYRNTuHK3SSfL158NSZX1tWV0T9AMiJDLIy3
69+
jIlWfNCU5ffPSlE/YLL+Hzs41kddLk84ddmbyA/R/ZFaB8OUlR978a7coYPia3gF
70+
NLOLh4Yxn8yLFc0YLgY2yvgp+G6TYHjsiuimlK0kqOPUrELaUg806NAQ5VPb+DpW
71+
SBAz34BwHHJeH8MRuzu5awrggutn1I9cMNPPF22GAQ6uQ8HYwF6Z7/pgCvJiaGKL
72+
BfOLsTTYcHg1dHbCRhOjH117O0kgHphUY3cCAwEAAaN7MHkwCQYDVR0TBAIwADAs
73+
BglghkgBhvhCAQ0EHxYdT3BlblNTTCBHZW5lcmF0ZWQgQ2VydGlmaWNhdGUwHQYD
74+
VR0OBBYEFIHewDn5ildQ27Fqs9Bf6SyHWh49MB8GA1UdIwQYMBaAFPmBvZCUd1ct
75+
9Xe0FcsUQGMikytfMA0GCSqGSIb3DQEBBQUAA4IBAQCjCtciWrzM9u0v8p/d4EYC
76+
cxTdp/U5uRYZFja2IlxmFMDTrFX8Ui3DsnBfzz0jcXjpMYhlLC5KCW5Ll7tNOIfY
77+
Je277WIZCFDyQMw57vmoOl0r5zTrinTHybyIm5vKWxEgylOyCyBJ/Ln37APJXcEk
78+
dSf4fHDcaiyYSJNff36Uoc95syTj3p7wD9jWPslSMDGHkMLSI77Yeunmu0sAdTBJ
79+
S5jV9n21g7VXhSCYAFFVw6KB7GwRkTNgFHvSAe5bv1to9eBORQpozTNPKXL6/moZ
80+
toRwkKTVegQu2luYT+SqpsRoqlyMpV7fIJQi9zdFcaS8cjTuQs+dD/tKOdGOQfM/
81+
-----END CERTIFICATE-----

test/support/ssl/trusted-cert.key

Lines changed: 28 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,28 @@
1+
-----BEGIN PRIVATE KEY-----
2+
MIIEvQIBADANBgkqhkiG9w0BAQEFAASCBKcwggSjAgEAAoIBAQCrv6zv3Jk1+gc/
3+
1TOG8X2eV4vVwRAEDDWVfGH/Bab573FcxYNooq1dD6UrtHafNo/fdfvWSADA8GhW
4+
9kmETU7hyt0kny9efDUmV9bVldE/QDIiQyyMt4yJVnzQlOX3z0pRP2Cy/h87ONZH
5+
XS5POHXZm8gP0f2RWgfDlJUfe/Gu3KGD4mt4BTSzi4eGMZ/MixXNGC4GNsr4Kfhu
6+
k2B47IroppStJKjj1KxC2lIPNOjQEOVT2/g6VkgQM9+AcBxyXh/DEbs7uWsK4ILr
7+
Z9SPXDDTzxdthgEOrkPB2MBeme/6YAryYmhiiwXzi7E02HB4NXR2wkYTox9deztJ
8+
IB6YVGN3AgMBAAECggEASmOxIgtoiQqMzUcpFE/Q2x6MQL9okng/VUoUoALwudzO
9+
OyKJsm6TrHU0U2PM5VUap+1QcRWqzebTKqduXFGn0wCtHEmemMwvsTXmpYhIo57I
10+
mDKEP0bZJjtBwI5dtSIhzGMpHR4YpOwPU8W2YzXPRbvFwaRwsd5O8pWOqZ5jphrQ
11+
DtkLNz4hIFsMihPeYFpuAjsZ2cMIGPtlY2qbfjyno7hd7LxNzL/2vMlDw5MHHtw4
12+
snxLN92KomC6rSUUydNDyemyMpg8iRwm7gmYzVoZf6aTbI2RdFcv2KZfpUWYdB+I
13+
yU8ZV1Sch7VQ+xLVy74SuY8AZ2Rq4S3M+EmEa5ghoQKBgQDfgOIyStulfYn6UC1A
14+
OYwcGoSOaVNfPE/m9BZN58xK0+XnEqQECMsyg/GYS65Zri4+KJYPxqv6f9ljLTGE
15+
0PxiA7wq+QWnv4EM+3aGShxwyVlmgJZyyBfJtAMr1iDm4JsidTT5GMdfxRICPGZY
16+
WVggcz/cVu39OxRrumREuTWAzwKBgQDEuGheZv68cYt5EkzOWxeFQyt1bzXn1CJg
17+
IXnIFZIekJhVGpBG+zMAYri9+hSheiDrwfIcSfTq9LxF6JNUvaU4qMrkwvW21jKs
18+
n7ofcA+VYq2mggoIuuvKVqXemLHorC0U/zCMnM6rycaa9sB5tsF+Js93uvf1TEJt
19+
veV0yCeM2QKBgF1M0iAoe7SDyXuCyMEMxN5ee4NvmGwjIz/IGR+Aahm6hziE4Y8F
20+
lL2LsujefvPU8FzmWG5Rgy1Y/YiXLxrAmvrXkE9oEOJL4TVoK7w3Z9P1Waqedy+H
21+
M9bxnHlKNAXtMRWbU/fATko+XBwu1pJ/CXjSY5A5gbO6W/X0ozLFFf6lAoGABRZ7
22+
5I0nY3pQUCZQBDpI5nJxSk1BCKjs5q2W97zPFalJt1HDj4JptEXZX1h7dh2xgkd2
23+
2pJzGiyQPgKg5N0uy8NZ1AbS0hLCJsLOzodYb9Wohhjw537mIEqTaalrWIgzdkqP
24+
V+OqWLkUQOfG3J8EbB3W2dLlHNwHD82MhLO0iikCgYEAvdK5LmpUdZXMVtiOMZO5
25+
t3M0vwi6vPhW7DV1QET51x/U+SyH4rvZGeqRl+gcKrZ8SreOlyICvsPgVmvLCrHE
26+
gJLPWJIzI8Mg6u91/KpiVmRahnJjOn3oHNuLSqFjn9lIhmA5dN7zQDXzPdYrWPNR
27+
u1QX+JLhlP33ejgdkdLsNiM=
28+
-----END PRIVATE KEY-----

test/support/ssl/untrusted-ca.crt

Lines changed: 26 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,26 @@
1+
-----BEGIN CERTIFICATE-----
2+
MIIEXDCCA0SgAwIBAgIJAIgFm03l5AJkMA0GCSqGSIb3DQEBCwUAMHsxCzAJBgNV
3+
BAYTAlhYMRIwEAYDVQQIEwlVbnRydXN0ZWQxEjAQBgNVBAcTCUV2aWx2aWxsZTEU
4+
MBIGA1UEChMLRXZpbCBIYWNrZXIxGjAYBgNVBAsTEUF0dGFjayBEZXBhcnRtZW50
5+
MRIwEAYDVQQDEwkxMjcuMC4wLjEwIBcNMTYwNDAyMDMzNDUxWhgPMjA1MDA2MjMw
6+
MzM0NTFaMHsxCzAJBgNVBAYTAlhYMRIwEAYDVQQIEwlVbnRydXN0ZWQxEjAQBgNV
7+
BAcTCUV2aWx2aWxsZTEUMBIGA1UEChMLRXZpbCBIYWNrZXIxGjAYBgNVBAsTEUF0
8+
dGFjayBEZXBhcnRtZW50MRIwEAYDVQQDEwkxMjcuMC4wLjEwggEiMA0GCSqGSIb3
9+
DQEBAQUAA4IBDwAwggEKAoIBAQCtXxcEGUrGqAqlBK94B8IwSkB8OnLYC/c/6Tde
10+
WG46pzmZWZvffi0akcKKubRNcfoavOuqLuNnpQDkIlnJ37K/LZk8Q5+aMoUGBiQ2
11+
jSN1707sFqH3eTFvXOUzlDEcsBa7Y7RuaI8SXg1UGsnnCcj6H3BW2xKcXPN6/s30
12+
vhNw2CPqtXm4NOD3Zb5FkB9epAEejRg0OPn5DJ3mESVp/H2EqkptMZ+6cOk2/CMc
13+
e8AAfcxBGwKuOMXNODszTNxN+OuGCHOxx8+vR/eV35tonISwbkmO9WI6DC+pWT2s
14+
PvDhuQtqsrVofCP/pireb5Ce/7bP/FsZcNSMMfV5dponcYrrAgMBAAGjgeAwgd0w
15+
HQYDVR0OBBYEFLeDNvKpJKmuyPsamax2AZTijdkwMIGtBgNVHSMEgaUwgaKAFLeD
16+
NvKpJKmuyPsamax2AZTijdkwoX+kfTB7MQswCQYDVQQGEwJYWDESMBAGA1UECBMJ
17+
VW50cnVzdGVkMRIwEAYDVQQHEwlFdmlsdmlsbGUxFDASBgNVBAoTC0V2aWwgSGFj
18+
a2VyMRowGAYDVQQLExFBdHRhY2sgRGVwYXJ0bWVudDESMBAGA1UEAxMJMTI3LjAu
19+
MC4xggkAiAWbTeXkAmQwDAYDVR0TBAUwAwEB/zANBgkqhkiG9w0BAQsFAAOCAQEA
20+
FWYTrxi/h7PYIpp09QsbDiGdC7gmp04HTx82NvBaUFaLk8ygz4DUz5u7QyTDdAga
21+
yWviHghuyZ6vv5Ubaj7XLOzLM6rYsQjkVq5ltwP+9V/U/b5jOHvZdYqdatVXUXxR
22+
SO+e3QYiMpM4Vs/NNXhpUp6apD7VcoB2LgK3vGDJ526PBJjgw24311t8O7kDTwkt
23+
AwX56/KTolMI+k9rT8Ee6aucT6gBNf0judhNkPVo+6CYgjmEVRrN/xaFCUNSpv5E
24+
O6uIcxSSX6a5iOZ/EH+GyHb6kDmztn/Hes+UN9+gMuAK7+LgsD2mYbxn9Pnaerrs
25+
2nER8XurylLxi0GLvNWNdQ==
26+
-----END CERTIFICATE-----

0 commit comments

Comments
 (0)