aboutsummaryrefslogtreecommitdiffstats
path: root/test/open-uri/utils.rb
blob: c0d79ebdbad03e7bc8e37317373e2f819d57d390 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
require 'socket'
require 'net/http'
begin
  require 'openssl'
rescue LoadError
end

class SimpleHTTPServer
  def initialize(bind_addr, port, log)
    @server = TCPServer.new(bind_addr, port)
    @log = log
    @procs = {}
  end

  def mount_proc(path, proc)
    @procs[path] = proc
  end

  def start
    @thread = Thread.new do
      loop do
        client = @server.accept
        handle_request(client)
        client.close
      end
    end
  end

  def shutdown
    @thread.kill
    @server.close
  end

  private

  def handle_request(client)
    request_line = client.gets
    return if request_line.nil?

    method, path, _ = request_line.split
    headers = {}
    while (line = client.gets) && line != "\r\n"
      key, value = line.split(": ", 2)
      headers[key.downcase] = value.strip
    end

    if @procs.key?(path) || @procs.key?("#{path}/")
      proc = @procs[path] || @procs["#{path}/"]
      req = Request.new(method, path, headers)
      res = Response.new(client)
      proc.call(req, res)
      res.finish
    else
      @log << "ERROR `#{path}' not found"
      client.print "HTTP/1.1 404 Not Found\r\nContent-Length: 0\r\n\r\n"
    end
  rescue ::TestOpenURI::Unauthorized
    @log << "ERROR Unauthorized"
    client.print "HTTP/1.1 401 Unauthorized\r\nContent-Length: 0\r\n\r\n"
  end

  class Request
    attr_reader :method, :path, :headers
    def initialize(method, path, headers)
      @method = method
      @path = path
      @headers = headers
      parse_basic_auth
    end

    def [](key)
      @headers[key.downcase]
    end

    def []=(key, value)
      @headers[key.downcase] = value
    end

    private

    def parse_basic_auth
      auth = @headers['Authorization']
      return unless auth && auth.start_with?('Basic ')

      encoded_credentials = auth.split(' ', 2).last
      decoded_credentials = [encoded_credentials].pack("m")
      @username, @password = decoded_credentials.split(':', 2)
    end
  end

  class Response
    attr_accessor :body, :headers, :status, :chunked, :cookies
    def initialize(client)
      @client = client
      @body = ""
      @headers = {}
      @status = 200
      @chunked = false
      @cookies = []
    end

    def [](key)
      @headers[key.downcase]
    end

    def []=(key, value)
      @headers[key.downcase] = value
    end

    def write_chunk(chunk)
      return unless @chunked
      @client.write("#{chunk.bytesize.to_s(16)}\r\n")
      @client.write("#{chunk}\r\n")
    end

    def finish
      @client.write build_response_headers
      if @chunked
        write_chunk(@body)
        @client.write "0\r\n\r\n"
      else
        @client.write @body
      end
    end

    private

    def build_response_headers
      response = "HTTP/1.1 #{@status} #{status_message(@status)}\r\n"
      if @chunked
        @headers['Transfer-Encoding'] = 'chunked'
      else
        @headers['Content-Length'] = @body.bytesize.to_s
      end
      @headers.each do |key, value|
        response << "#{key}: #{value}\r\n"
      end
      @cookies.each do |cookie|
        response << "Set-Cookie: #{cookie}\r\n"
      end
      response << "\r\n"
      response
    end

    def status_message(code)
      case code
      when 200 then 'OK'
      when 301 then 'Moved Permanently'
      else 'Unknown'
      end
    end
  end
end

class SimpleHTTPProxyServer
  def initialize(host, port, auth_proc = nil, log, access_log)
    @server = TCPServer.new(host, port)
    @auth_proc = auth_proc
    @log = log
    @access_log = access_log
  end

  def start
    @thread = Thread.new do
      loop do
        client = @server.accept
        request_line = client.gets
        headers = {}
        while (line = client.gets) && (line != "\r\n")
          key, value = line.chomp.split(/:\s*/, 2)
          headers[key] = value
        end
        next unless request_line

        method, path, _ = request_line.split(' ')
        handle_request(client, method, path, request_line, headers)
      rescue IOError
      end
    end
  end

  def shutdown
    @thread.kill
    @server.close
  end

  private

  def handle_request(client, method, path, request_line, headers)
    if @auth_proc
      req = Request.new(method, path, request_line, headers)
      res = Struct.new(:body, :status).new("", 200)
      @auth_proc.call(req, res)
      if res.status != 200
        client.print "HTTP/1.1 #{res.status}\r\nContent-Type: text/plain\r\n\r\n#{res.body}"
        return
      end
    end

    if method == 'CONNECT'
      proxy_connect(path, client)
    else
      proxy_request(path, client)
    end
  rescue TestOpenURIProxy::ProxyAuthenticationRequired
    @log << "ERROR ProxyAuthenticationRequired"
    client.print "HTTP/1.1 407 Proxy Authentication Required\r\nContent-Length: 0\r\n\r\n"
  ensure
    client.close
  end

  def proxy_connect(path, client)
    host, port = path.split(':')
    backend = TCPSocket.new(host, port.to_i)
    client.puts "HTTP/1.1 200 Connection Established\r\n\r\n"
    @access_log << "CONNECT #{path} \n"
    begin
      while fds = IO.select([client, backend])
        if fds[0].include?(client)
          data = client.readpartial(1024)
          backend.write(data)
        elsif fds[0].include?(backend)
          data = backend.readpartial(1024)
          client.write(data)
        end
      end
    rescue
      backend.close
    end
  end

  def proxy_request(path, client)
    path.gsub!(/\Ahttps?:\/\//, '')
    host, path = path.split('/')
    host, port = host.split(':')
    Net::HTTP.start(host, port) do |http|
      response = http.get("/#{path}")
      client.print "HTTP/1.1 #{response.code}\r\nContent-Type: #{response.content_type}\r\n\r\n#{response.body}"
    end
  end

  class Request
    attr_reader :method, :path, :request_line, :headers
    def initialize(method, path, request_line, headers)
      @method = method
      @path = path
      @request_line = request_line
      @headers = headers
    end

    def [](key)
      @headers[key]
    end
  end
end

class SimpleHTTPSServer
  def initialize(cert, key, dh, bind_addr, port, log)
    @cert = cert
    @key = key
    @dh = dh
    @bind_addr = bind_addr
    @port = port
    @log = log
    @server = TCPServer.new(@bind_addr, @port)
    context = OpenSSL::SSL::SSLContext.new
    context.cert = @cert
    context.key = @key
    context.tmp_dh_callback = proc { @dh }
    @ssl_server = OpenSSL::SSL::SSLServer.new(@server, context)
  end

  def start
    @thread = Thread.new do
      loop do
        ssl_socket = @ssl_server.accept
        handle_request(ssl_socket)
        ssl_socket.close
      end
    rescue OpenSSL::SSL::SSLError
    end
  end

  def shutdown
    @thread.kill
    @server.close
  end

  def handle_request(socket)
    request_line = socket.gets
    return if request_line.nil? || request_line.strip.empty?

    _, path, _ = request_line.split
    headers = {}
    while (line = socket.gets)
      break if line.strip.empty?
      key, value = line.split(': ', 2)
      headers[key] = value.strip
    end

    response = case path
               when '/data'
                 "HTTP/1.1 200 OK\r\nContent-Type: text/plain\r\nContent-Length: 3\r\n\r\nddd"
               when "/proxy"
                 "HTTP/1.1 200 OK\r\nContent-Type: text/plain\r\nContent-Length: 5\r\n\r\nproxy"
               else
                 "HTTP/1.1 404 Not Found\r\nContent-Length: 0\r\n\r\n"
               end

    socket.print(response)
  end
end

module TestOpenURIUtils
  class Unauthorized < StandardError; end
  class ProxyAuthenticationRequired < StandardError; end

  def with_http(log_tester=lambda {|log| assert_equal([], log) })
    log = []
    host = "127.0.0.1"
    srv = SimpleHTTPServer.new(host, 0, log)

    server_thread = srv.start
    server_thread2 = Thread.new {
      server_thread.join
      if log_tester
        log_tester.call(log)
      end
    }

    port = srv.instance_variable_get(:@server).addr[1]

    client_thread = Thread.new {
      begin
        yield srv, "http://#{host}:#{port}", server_thread, log
      ensure
        srv.shutdown
      end
    }
    assert_join_threads([client_thread, server_thread2])
  end

  def with_https_proxy(proxy_log_tester=lambda {|proxy_log, proxy_access_log| assert_equal([], proxy_log) })
    proxy_log = []
    proxy_access_log = []
    with_https {|srv, dr, url, server_thread, server_log, threads|
      srv.instance_variable_get(:@server).setsockopt(Socket::SOL_SOCKET, Socket::SO_REUSEADDR, true)
      cacert_filename = "#{dr}/cacert.pem"
      open(cacert_filename, "w") {|f| f << CA_CERT }
      cacert_directory = "#{dr}/certs"
      Dir.mkdir cacert_directory
      hashed_name = "%08x.0" % OpenSSL::X509::Certificate.new(CA_CERT).subject.hash
      open("#{cacert_directory}/#{hashed_name}", "w") {|f| f << CA_CERT }
      proxy_host = '127.0.0.1'
      proxy = SimpleHTTPProxyServer.new(proxy_host, 0, proxy_log, proxy_access_log)
      proxy.start
      proxy_port = proxy.instance_variable_get(:@server).addr[1]
      proxy_thread = proxy.start
      threads << Thread.new {
        proxy_thread.join
        if proxy_log_tester
          proxy_log_tester.call(proxy_log, proxy_access_log)
        end
      }
      begin
        yield srv, dr, url, cacert_filename, cacert_directory, proxy_host, proxy_port
      ensure
        proxy.shutdown
      end
    }
  end

  if defined?(OpenSSL::SSL)
  def with_https(log_tester=lambda {|log| assert_equal([], log) })
    log = []
    Dir.mktmpdir {|dr|
      cert = OpenSSL::X509::Certificate.new(SERVER_CERT)
      key = OpenSSL::PKey::RSA.new(SERVER_KEY)
      dh = OpenSSL::PKey::DH.new(DHPARAMS)
      host = '127.0.0.1'
      srv = SimpleHTTPSServer.new(cert, key, dh, host, 0, log)
      port = srv.instance_variable_get(:@server).addr[1]
      threads = []
      server_thread = srv.start
      threads << Thread.new {
        server_thread.join
        if log_tester
          log_tester.call(log)
        end
      }
      threads << Thread.new {
        begin
          yield srv, dr, "https://#{host}:#{port}", server_thread, log, threads
        ensure
          srv.shutdown
        end
      }
      assert_join_threads(threads)
    }
  end

  # cp /etc/ssl/openssl.cnf . # I copied from OpenSSL 1.1.1b source

  # mkdir demoCA demoCA/private demoCA/newcerts
  # touch demoCA/index.txt
  # echo 00 > demoCA/serial
  # openssl genrsa -des3 -out demoCA/private/cakey.pem 2048
  # openssl req -new -key demoCA/private/cakey.pem -out demoCA/careq.pem -subj "/C=JP/ST=Tokyo/O=RubyTest/CN=Ruby Test CA"
  # # basicConstraints=CA:TRUE is required; the default openssl.cnf has it in [v3_ca]
  # openssl ca -config openssl.cnf -extensions v3_ca -out demoCA/cacert.pem -startdate 090101000000Z -enddate 491231235959Z -batch -keyfile demoCA/private/cakey.pem -selfsign -infiles demoCA/careq.pem

  # mkdir server
  # openssl genrsa -des3 -out server/server.key 2048
  # openssl req -new -key server/server.key -out server/csr.pem -subj "/C=JP/ST=Tokyo/O=RubyTest/CN=127.0.0.1"
  # openssl ca -config openssl.cnf -startdate 090101000000Z -enddate 491231235959Z -in server/csr.pem -keyfile demoCA/private/cakey.pem -cert demoCA/cacert.pem -out server/cert.pem

  # demoCA/cacert.pem => TestOpenURISSL::CA_CERT
  # server/cert.pem => TestOpenURISSL::SERVER_CERT
  # `openssl rsa -in server/server.key -text` => TestOpenURISSL::SERVER_KEY

  CA_CERT = <<'End'
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 0 (0x0)
        Signature Algorithm: sha256WithRSAEncryption
        Issuer: C=JP, ST=Tokyo, O=RubyTest, CN=Ruby Test CA
        Validity
            Not Before: Jan  1 00:00:00 2009 GMT
            Not After : Dec 31 23:59:59 2049 GMT
        Subject: C=JP, ST=Tokyo, O=RubyTest, CN=Ruby Test CA
        Subject Public Key Info:
            Public Key Algorithm: rsaEncryption
                RSA Public-Key: (2048 bit)
                Modulus:
                    00:ad:f3:4d:5b:0b:01:54:cc:86:36:d1:93:6b:33:
                    56:25:90:61:d6:9a:a0:f4:24:20:ee:c8:14:ab:0f:
                    4b:89:d8:7c:bb:c0:f8:7f:fb:e9:a2:d5:1c:6b:6f:
                    dc:5c:23:b1:49:aa:2c:e8:ca:43:48:64:69:4b:8a:
                    bd:44:57:9b:14:d9:7a:b2:49:00:d6:c2:74:67:62:
                    52:1d:a9:32:df:fe:7a:22:20:49:83:e1:cb:3d:dc:
                    1a:2a:f0:36:20:c1:e8:c8:89:d4:51:1a:68:91:20:
                    e0:ba:67:0a:b2:6b:f8:e3:8c:f5:ee:a1:36:b1:89:
                    ec:23:b6:f2:39:a9:b9:2e:ea:de:d9:86:e5:42:11:
                    46:ed:10:9a:90:76:44:4e:4d:49:2d:49:e8:e3:cb:
                    ff:7a:7d:80:cb:bf:c4:c3:69:ba:9c:60:4a:de:af:
                    bf:26:78:b8:fb:46:d1:37:d0:89:ba:78:93:6a:37:
                    a5:e9:58:e7:e2:e3:7d:7c:95:20:79:41:56:15:cd:
                    b2:c6:3b:e1:b7:e7:ba:47:60:9a:05:b1:07:f3:26:
                    72:9d:3b:1b:02:18:3d:d5:de:e6:e9:30:a9:b5:8f:
                    15:1b:40:f9:64:61:54:d3:53:e8:c4:29:4a:89:f3:
                    e5:0d:fd:16:61:ee:f2:6d:8a:45:a8:34:7e:53:46:
                    8e:87
                Exponent: 65537 (0x10001)
        X509v3 extensions:
            X509v3 Subject Key Identifier:
                A0:7E:0B:AD:A3:AD:37:D7:21:0B:75:6F:8A:90:5F:8C:C9:69:DF:98
            X509v3 Authority Key Identifier:
                keyid:A0:7E:0B:AD:A3:AD:37:D7:21:0B:75:6F:8A:90:5F:8C:C9:69:DF:98

            X509v3 Basic Constraints: critical
                CA:TRUE
    Signature Algorithm: sha256WithRSAEncryption
         06:ea:06:02:19:9a:cb:94:a2:7e:c0:86:71:66:e7:a5:71:46:
         a2:25:55:f5:e5:58:df:d1:91:58:e6:8a:0e:91:b3:22:4c:88:
         4d:5f:02:af:0f:73:65:0d:af:9a:f2:e4:36:f3:1f:e8:28:1d:
         9c:74:72:5b:f7:12:e8:fa:45:d6:df:e5:f1:d3:91:f4:0e:db:
         e2:56:63:ee:82:57:6f:12:ad:d7:0d:de:5a:8c:3d:76:d2:87:
         c9:48:1c:c4:f3:89:63:3c:c2:25:e0:dd:63:a6:4c:6c:5a:07:
         7b:86:78:62:86:02:a1:ef:0e:41:75:c5:d4:61:ab:c3:3b:9b:
         51:0b:e6:34:6d:0b:14:5a:2d:aa:d3:58:26:43:8f:4c:d7:45:
         73:1e:67:66:5e:f3:0c:69:70:27:a1:d5:70:f3:5a:10:98:c8:
         4f:8a:3b:9f:ad:8e:8d:49:8f:fb:f6:36:5d:4f:70:f9:4f:54:
         33:cf:a2:a6:1d:8c:61:b9:30:42:f2:49:d1:3d:a1:f1:eb:1e:
         78:a6:30:f8:8a:48:89:c7:3e:bd:0d:d8:72:04:a6:00:e5:62:
         a4:13:3f:9e:b6:86:25:dc:d1:ff:3a:fc:f5:0e:e4:0e:f7:b8:
         66:90:fe:4f:c2:54:2a:7f:61:6e:e7:4b:bf:40:7e:75:30:02:
         5b:bb:91:1b
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
End

  SERVER_CERT = <<'End'
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: sha256WithRSAEncryption
        Issuer: C=JP, ST=Tokyo, O=RubyTest, CN=Ruby Test CA
        Validity
            Not Before: Jan  1 00:00:00 2009 GMT
            Not After : Dec 31 23:59:59 2049 GMT
        Subject: C=JP, ST=Tokyo, O=RubyTest, CN=127.0.0.1
        Subject Public Key Info:
            Public Key Algorithm: rsaEncryption
                RSA Public-Key: (2048 bit)
                Modulus:
                    00:cb:b3:71:95:12:70:fc:db:d4:a9:a7:66:d6:d3:
                    09:dd:06:80:19:e1:f2:d6:1e:31:b6:6b:20:75:51:
                    dc:a7:37:a9:ac:5b:57:5d:69:36:b6:de:1d:2c:f6:
                    44:64:f8:e8:d6:f0:da:38:6a:ba:c2:b1:9e:dc:bb:
                    79:94:e0:25:0c:ce:76:87:17:5d:79:9e:14:9e:bd:
                    4c:0d:aa:74:10:3a:96:ef:76:82:d5:72:16:b5:c1:
                    ac:17:2d:90:83:73:5c:d7:a6:f5:36:0f:4c:55:f3:
                    30:5d:19:dc:01:0e:f8:e6:fe:a5:ad:52:88:59:dc:
                    4a:07:ed:a2:eb:a1:01:63:c4:8a:92:ba:06:80:9b:
                    0d:85:f2:9f:f9:70:ac:d7:ad:f0:7a:3f:b8:92:2a:
                    33:ca:69:d0:01:65:5d:31:38:1d:f6:1f:b2:17:07:
                    7e:ac:88:67:a6:c4:5f:3e:93:94:61:e6:e4:49:9d:
                    ba:d4:d2:e8:e3:93:d1:66:79:c5:e3:1d:f8:5a:50:
                    54:58:3d:04:b0:fd:65:d1:b3:8a:b5:8a:30:5f:b2:
                    dc:34:1a:14:f7:74:4c:03:29:97:63:5a:d7:de:bb:
                    eb:7f:4a:2a:90:59:c0:2b:47:09:82:8f:75:de:14:
                    3f:bc:78:9a:69:25:80:5b:6c:a0:65:12:0d:29:61:
                    ac:f9
                Exponent: 65537 (0x10001)
        X509v3 extensions:
            X509v3 Basic Constraints:
                CA:FALSE
            Netscape Comment:
                OpenSSL Generated Certificate
            X509v3 Subject Key Identifier:
                EC:6B:7C:79:B8:3B:11:1D:42:F3:9A:2A:CF:9A:15:59:D7:F9:D8:C6
            X509v3 Authority Key Identifier:
                keyid:A0:7E:0B:AD:A3:AD:37:D7:21:0B:75:6F:8A:90:5F:8C:C9:69:DF:98

    Signature Algorithm: sha256WithRSAEncryption
         29:14:db:71:e9:a0:86:f8:cc:4d:e4:8a:76:78:a7:ff:4e:94:
         b4:4d:92:dc:57:9a:52:64:46:27:15:8b:4f:2a:18:a7:0d:fc:
         d2:75:ce:4e:49:97:0b:46:71:57:23:e3:a5:c0:c5:71:94:fc:
         f2:1d:3b:06:93:82:03:59:56:d4:fb:09:06:08:b4:97:50:33:
         cf:58:89:dd:91:31:07:26:9a:7e:7f:8d:71:de:09:dc:4f:e5:
         6b:a3:10:71:d4:50:24:43:a0:1c:f5:2a:d9:1a:fb:e3:d6:f1:
         bc:6b:42:67:16:b4:3b:31:f4:ec:03:7d:78:e2:64:16:57:6d:
         ba:7c:0c:e1:14:b2:7c:75:4e:2b:09:3e:86:e4:aa:cc:7e:5c:
         2b:bd:8d:26:4d:49:36:74:86:fe:c5:a6:15:4a:af:e8:b4:4e:
         d5:f2:e1:59:c2:fb:7e:c3:c4:f1:63:d8:c2:b0:9a:ae:31:96:
         90:c3:09:d0:ce:2e:31:90:d7:83:dd:ac:31:cc:f7:87:41:08:
         92:33:28:52:fa:2d:9e:ad:ae:6a:9f:c3:be:ce:c1:a6:e4:16:
         2f:69:34:40:86:b6:10:21:0e:31:69:81:9e:fc:fd:c3:06:25:
         65:37:d3:d9:4a:20:84:aa:e7:0e:60:7c:bf:3f:88:67:ac:e5:
         8c:e0:61:d6
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
End

  SERVER_KEY = <<'End'
RSA Private-Key: (2048 bit, 2 primes)
modulus:
    00:cb:b3:71:95:12:70:fc:db:d4:a9:a7:66:d6:d3:
    09:dd:06:80:19:e1:f2:d6:1e:31:b6:6b:20:75:51:
    dc:a7:37:a9:ac:5b:57:5d:69:36:b6:de:1d:2c:f6:
    44:64:f8:e8:d6:f0:da:38:6a:ba:c2:b1:9e:dc:bb:
    79:94:e0:25:0c:ce:76:87:17:5d:79:9e:14:9e:bd:
    4c:0d:aa:74:10:3a:96:ef:76:82:d5:72:16:b5:c1:
    ac:17:2d:90:83:73:5c:d7:a6:f5:36:0f:4c:55:f3:
    30:5d:19:dc:01:0e:f8:e6:fe:a5:ad:52:88:59:dc:
    4a:07:ed:a2:eb:a1:01:63:c4:8a:92:ba:06:80:9b:
    0d:85:f2:9f:f9:70:ac:d7:ad:f0:7a:3f:b8:92:2a:
    33:ca:69:d0:01:65:5d:31:38:1d:f6:1f:b2:17:07:
    7e:ac:88:67:a6:c4:5f:3e:93:94:61:e6:e4:49:9d:
    ba:d4:d2:e8:e3:93:d1:66:79:c5:e3:1d:f8:5a:50:
    54:58:3d:04:b0:fd:65:d1:b3:8a:b5:8a:30:5f:b2:
    dc:34:1a:14:f7:74:4c:03:29:97:63:5a:d7:de:bb:
    eb:7f:4a:2a:90:59:c0:2b:47:09:82:8f:75:de:14:
    3f:bc:78:9a:69:25:80:5b:6c:a0:65:12:0d:29:61:
    ac:f9
publicExponent: 65537 (0x10001)
privateExponent:
    12:be:d5:b2:01:3b:72:99:8c:4d:7c:81:43:3d:b2:
    87:ab:84:78:5d:49:aa:98:a6:bc:81:c9:3f:e2:a3:
    aa:a3:bd:b2:85:c9:59:68:48:47:b5:d2:fb:83:42:
    32:04:91:f0:cd:c3:57:33:c3:32:0d:84:70:0d:b4:
    97:95:b4:f3:23:c0:d6:97:b8:db:6b:47:bc:7f:f1:
    12:c4:df:df:6a:74:df:5e:89:95:b8:e5:0c:1e:e1:
    86:54:84:1b:04:af:c3:8c:b2:be:21:d4:45:88:96:
    a7:ca:ac:6b:50:84:69:45:7f:db:9e:5f:bb:dd:40:
    d6:cf:f0:91:3c:84:d3:38:65:c9:15:f7:9e:37:aa:
    1a:2e:bc:16:b6:95:be:bc:af:45:76:ba:ad:99:f6:
    ef:6a:e8:fd:f0:31:89:19:c4:04:67:a1:ec:c4:79:
    59:08:77:ab:0b:65:88:88:02:b1:38:5c:80:4e:27:
    78:b2:a5:bd:b5:ad:d5:9c:4c:ea:ad:db:05:56:25:
    70:28:da:22:fb:d8:de:8c:3b:78:fe:3e:cf:ed:1b:
    f9:97:c6:b6:4a:bf:60:08:8f:dc:85:5e:b1:49:ab:
    87:8b:68:72:f4:6a:3f:bc:db:a3:6c:f7:e8:b0:15:
    bb:4b:ba:37:49:a2:d1:7c:f8:4f:1b:05:11:22:d9:
    81
prime1:
    00:fb:d2:cb:14:61:00:c1:7a:83:ba:fe:79:97:a2:
    4d:5a:ea:40:78:96:6e:d2:be:71:5b:c6:2c:1f:c9:
    18:48:6b:ae:20:86:87:b5:08:0b:17:69:ca:93:cd:
    00:36:22:51:7b:d5:2d:8c:0c:0e:de:bc:86:a8:07:
    0e:c5:57:e4:df:be:ed:7d:cc:b1:a4:d6:a8:2b:00:
    65:2a:69:30:5e:dc:6d:6d:c4:c8:7e:20:34:eb:6f:
    5e:cf:b3:b8:2e:8d:56:31:44:a8:17:ea:be:65:19:
    ff:da:14:e0:0c:73:56:14:08:47:4c:5b:79:51:74:
    5d:bc:e7:fe:01:2f:55:27:69
prime2:
    00:cf:14:54:47:bb:5f:5d:d6:2b:2d:ed:a6:8a:6f:
    36:fc:47:5e:9f:84:ae:aa:1f:f8:44:50:91:15:f5:
    ed:9d:29:d9:2b:2a:19:66:56:2e:96:15:b5:8e:a9:
    7f:89:27:21:b5:57:55:7e:2a:c5:8c:93:fe:f6:0a:
    a5:17:15:91:91:b3:7d:35:1a:d5:9a:2e:b8:0d:ad:
    e6:97:6d:83:a3:27:29:ee:00:74:ef:57:34:f3:07:
    ad:12:43:37:0c:5c:b7:26:34:bc:4e:3a:43:65:6b:
    0c:b8:23:ac:77:fd:b2:23:eb:7b:65:70:f6:96:c4:
    17:2c:aa:24:b8:a5:5e:b7:11
exponent1:
    00:92:32:ae:f4:05:dd:0a:76:b6:43:b9:b9:9d:ee:
    fc:39:ec:05:c1:fc:94:1a:85:b6:0a:31:e3:2c:10:
    f3:a8:17:db:df:c6:3a:c3:3f:08:31:6f:99:cc:75:
    17:ca:55:e2:38:a2:6a:ef:03:91:1e:7f:15:2e:37:
    ea:bb:67:6b:d8:fa:5f:a6:c9:4f:d9:03:46:5e:b0:
    bc:0b:03:46:b1:cc:07:3b:d3:23:13:16:5f:a2:cf:
    e5:9b:70:1b:5d:eb:70:3e:ea:3d:2c:a5:7c:23:f6:
    14:33:e8:2a:ab:0f:ca:c9:96:84:ce:2f:cd:1f:1d:
    0f:ce:bc:61:1b:0e:ff:c1:01
exponent2:
    00:9e:0b:f3:03:48:73:d1:e7:9a:cf:13:f9:ae:e0:
    91:03:dc:e8:d0:30:f1:2a:30:fa:48:11:81:9a:54:
    37:c5:62:e2:37:fa:8a:a6:3b:92:94:c3:fe:ec:e2:
    5a:cf:70:09:5f:21:47:c3:e2:9b:21:de:f6:92:0c:
    af:d1:bd:89:7b:bd:95:0b:49:ee:cb:1d:6b:26:2d:
    9a:b7:ea:42:b4:ec:38:29:49:39:f6:4e:05:c0:93:
    14:39:c3:09:29:ab:3d:b1:b0:40:24:28:7d:b5:d3:
    0d:43:21:1f:09:f9:9b:d3:a4:6f:6a:8d:db:f6:57:
    b5:24:46:bb:7e:1d:e0:fb:31
coefficient:
    10:93:1d:c8:33:a5:c1:d3:84:6a:22:68:e5:60:cc:
    9c:27:0a:52:0b:58:a3:0c:83:f4:f4:46:09:0c:a1:
    41:a6:ea:bf:80:9d:0e:5d:d8:3d:25:00:c5:a1:35:
    7a:8c:ea:95:16:94:c3:7c:8f:2b:e0:53:ea:66:ae:
    19:be:55:04:3d:ee:e2:4b:a8:69:1b:7e:d8:09:7f:
    ed:7c:ee:95:88:10:dc:4b:5b:bf:81:a4:e8:dc:7e:
    4f:e5:c3:90:c4:e5:5a:90:10:32:d6:08:b5:1f:5d:
    09:18:d8:44:28:e4:c4:c7:07:75:9b:9b:b3:80:86:
    68:9d:fe:68:f3:4d:db:66
writing RSA key
-----BEGIN RSA PRIVATE KEY-----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-----END RSA PRIVATE KEY-----
End

  DHPARAMS = <<'End'
    DH Parameters: (2048 bit)
        prime:
            00:ec:4e:a4:06:b6:22:ca:f9:8a:00:cc:d0:ee:2f:
            16:bf:05:64:f5:8f:fe:7f:c4:bb:b0:24:cd:ef:5d:
            8a:90:ad:dc:a9:dd:63:84:90:d8:25:ba:d8:78:d5:
            77:91:42:0a:84:fc:56:1e:13:9b:1c:aa:43:d5:1f:
            38:52:92:fe:b3:66:f9:e7:e8:8c:77:a1:a6:2f:b3:
            98:98:d2:13:fc:57:1c:2a:14:dc:bd:e6:9b:54:19:
            99:4f:ce:81:64:a6:32:7f:8e:61:50:5f:45:3a:e5:
            0c:f7:13:f3:b8:ad:d5:77:ca:09:42:f7:d8:30:27:
            7b:2c:f0:b4:b5:a0:04:96:34:0b:47:81:1d:7f:c1:
            3a:62:86:8e:7d:f8:13:7f:9a:b1:8b:09:23:9e:55:
            59:41:cd:f0:86:09:c4:b7:d1:69:54:cb:d0:f5:e9:
            27:c9:e1:81:e4:a1:df:6b:20:1c:df:e8:54:02:f2:
            37:fc:2a:f7:d5:b3:6f:79:7e:70:22:78:79:18:3c:
            75:14:68:4a:05:9f:ac:d4:7f:9a:79:db:9d:0a:6e:
            ec:0a:04:70:bf:c9:4a:59:81:a2:1f:33:9b:4a:66:
            bc:03:ce:8a:1b:e3:03:ec:ba:39:26:ab:90:dc:39:
            41:a1:d8:f7:20:3c:8f:af:12:2f:f7:a9:6f:44:f1:
            6d:03
        generator: 2 (0x2)
-----BEGIN DH PARAMETERS-----
MIIBCAKCAQEA7E6kBrYiyvmKAMzQ7i8WvwVk9Y/+f8S7sCTN712KkK3cqd1jhJDY
JbrYeNV3kUIKhPxWHhObHKpD1R84UpL+s2b55+iMd6GmL7OYmNIT/FccKhTcveab
VBmZT86BZKYyf45hUF9FOuUM9xPzuK3Vd8oJQvfYMCd7LPC0taAEljQLR4Edf8E6
YoaOffgTf5qxiwkjnlVZQc3whgnEt9FpVMvQ9eknyeGB5KHfayAc3+hUAvI3/Cr3
1bNveX5wInh5GDx1FGhKBZ+s1H+aedudCm7sCgRwv8lKWYGiHzObSma8A86KG+MD
7Lo5JquQ3DlBodj3IDyPrxIv96lvRPFtAwIBAg==
-----END DH PARAMETERS-----
End
  end
end