| OLD | NEW |
| 1 #!/usr/bin/env python | 1 #!/usr/bin/env python |
| 2 # Copyright 2013 The Chromium Authors. All rights reserved. | 2 # Copyright 2013 The Chromium Authors. All rights reserved. |
| 3 # Use of this source code is governed by a BSD-style license that can be | 3 # Use of this source code is governed by a BSD-style license that can be |
| 4 # found in the LICENSE file. | 4 # found in the LICENSE file. |
| 5 | 5 |
| 6 """This is a simple HTTP/FTP/TCP/UDP/BASIC_AUTH_PROXY/WEBSOCKET server used for | 6 """This is a simple HTTP/FTP/TCP/UDP/BASIC_AUTH_PROXY/WEBSOCKET server used for |
| 7 testing Chrome. | 7 testing Chrome. |
| 8 | 8 |
| 9 It supports several test URLs, as specified by the handlers in TestPageHandler. | 9 It supports several test URLs, as specified by the handlers in TestPageHandler. |
| 10 By default, it listens on an ephemeral port and sends the port number back to | 10 By default, it listens on an ephemeral port and sends the port number back to |
| (...skipping 134 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 145 | 145 |
| 146 | 146 |
| 147 class HTTPSServer(tlslite.api.TLSSocketServerMixIn, | 147 class HTTPSServer(tlslite.api.TLSSocketServerMixIn, |
| 148 testserver_base.ClientRestrictingServerMixIn, | 148 testserver_base.ClientRestrictingServerMixIn, |
| 149 testserver_base.BrokenPipeHandlerMixIn, | 149 testserver_base.BrokenPipeHandlerMixIn, |
| 150 testserver_base.StoppableHTTPServer): | 150 testserver_base.StoppableHTTPServer): |
| 151 """This is a specialization of StoppableHTTPServer that add https support and | 151 """This is a specialization of StoppableHTTPServer that add https support and |
| 152 client verification.""" | 152 client verification.""" |
| 153 | 153 |
| 154 def __init__(self, server_address, request_hander_class, pem_cert_and_key, | 154 def __init__(self, server_address, request_hander_class, pem_cert_and_key, |
| 155 ssl_client_auth, ssl_client_cas, ssl_bulk_ciphers, | 155 ssl_client_auth, ssl_client_cas, |
| 156 ssl_bulk_ciphers, ssl_key_exchanges, |
| 156 record_resume_info, tls_intolerant, signed_cert_timestamps, | 157 record_resume_info, tls_intolerant, signed_cert_timestamps, |
| 157 fallback_scsv_enabled, ocsp_response): | 158 fallback_scsv_enabled, ocsp_response): |
| 158 self.cert_chain = tlslite.api.X509CertChain() | 159 self.cert_chain = tlslite.api.X509CertChain() |
| 159 self.cert_chain.parsePemList(pem_cert_and_key) | 160 self.cert_chain.parsePemList(pem_cert_and_key) |
| 160 # Force using only python implementation - otherwise behavior is different | 161 # Force using only python implementation - otherwise behavior is different |
| 161 # depending on whether m2crypto Python module is present (error is thrown | 162 # depending on whether m2crypto Python module is present (error is thrown |
| 162 # when it is). m2crypto uses a C (based on OpenSSL) implementation under | 163 # when it is). m2crypto uses a C (based on OpenSSL) implementation under |
| 163 # the hood. | 164 # the hood. |
| 164 self.private_key = tlslite.api.parsePEMKey(pem_cert_and_key, | 165 self.private_key = tlslite.api.parsePEMKey(pem_cert_and_key, |
| 165 private=True, | 166 private=True, |
| 166 implementations=['python']) | 167 implementations=['python']) |
| 167 self.ssl_client_auth = ssl_client_auth | 168 self.ssl_client_auth = ssl_client_auth |
| 168 self.ssl_client_cas = [] | 169 self.ssl_client_cas = [] |
| 169 if tls_intolerant == 0: | 170 if tls_intolerant == 0: |
| 170 self.tls_intolerant = None | 171 self.tls_intolerant = None |
| 171 else: | 172 else: |
| 172 self.tls_intolerant = (3, tls_intolerant) | 173 self.tls_intolerant = (3, tls_intolerant) |
| 173 self.signed_cert_timestamps = signed_cert_timestamps | 174 self.signed_cert_timestamps = signed_cert_timestamps |
| 174 self.fallback_scsv_enabled = fallback_scsv_enabled | 175 self.fallback_scsv_enabled = fallback_scsv_enabled |
| 175 self.ocsp_response = ocsp_response | 176 self.ocsp_response = ocsp_response |
| 176 | 177 |
| 177 for ca_file in ssl_client_cas: | 178 for ca_file in ssl_client_cas: |
| 178 s = open(ca_file).read() | 179 s = open(ca_file).read() |
| 179 x509 = tlslite.api.X509() | 180 x509 = tlslite.api.X509() |
| 180 x509.parse(s) | 181 x509.parse(s) |
| 181 self.ssl_client_cas.append(x509.subject) | 182 self.ssl_client_cas.append(x509.subject) |
| 182 self.ssl_handshake_settings = tlslite.api.HandshakeSettings() | 183 self.ssl_handshake_settings = tlslite.api.HandshakeSettings() |
| 183 if ssl_bulk_ciphers is not None: | 184 if ssl_bulk_ciphers is not None: |
| 184 self.ssl_handshake_settings.cipherNames = ssl_bulk_ciphers | 185 self.ssl_handshake_settings.cipherNames = ssl_bulk_ciphers |
| 186 if ssl_key_exchanges is not None: |
| 187 self.ssl_handshake_settings.keyExchangeNames = ssl_key_exchanges |
| 185 | 188 |
| 186 if record_resume_info: | 189 if record_resume_info: |
| 187 # If record_resume_info is true then we'll replace the session cache with | 190 # If record_resume_info is true then we'll replace the session cache with |
| 188 # an object that records the lookups and inserts that it sees. | 191 # an object that records the lookups and inserts that it sees. |
| 189 self.session_cache = RecordingSSLSessionCache() | 192 self.session_cache = RecordingSSLSessionCache() |
| 190 else: | 193 else: |
| 191 self.session_cache = tlslite.api.SessionCache() | 194 self.session_cache = tlslite.api.SessionCache() |
| 192 testserver_base.StoppableHTTPServer.__init__(self, | 195 testserver_base.StoppableHTTPServer.__init__(self, |
| 193 server_address, | 196 server_address, |
| 194 request_hander_class) | 197 request_hander_class) |
| (...skipping 1780 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 1975 ' exiting...') | 1978 ' exiting...') |
| 1976 | 1979 |
| 1977 stapled_ocsp_response = None | 1980 stapled_ocsp_response = None |
| 1978 if self.__ocsp_server and self.options.staple_ocsp_response: | 1981 if self.__ocsp_server and self.options.staple_ocsp_response: |
| 1979 stapled_ocsp_response = self.__ocsp_server.ocsp_response | 1982 stapled_ocsp_response = self.__ocsp_server.ocsp_response |
| 1980 | 1983 |
| 1981 server = HTTPSServer((host, port), TestPageHandler, pem_cert_and_key, | 1984 server = HTTPSServer((host, port), TestPageHandler, pem_cert_and_key, |
| 1982 self.options.ssl_client_auth, | 1985 self.options.ssl_client_auth, |
| 1983 self.options.ssl_client_ca, | 1986 self.options.ssl_client_ca, |
| 1984 self.options.ssl_bulk_cipher, | 1987 self.options.ssl_bulk_cipher, |
| 1988 self.options.ssl_key_exchange, |
| 1985 self.options.record_resume, | 1989 self.options.record_resume, |
| 1986 self.options.tls_intolerant, | 1990 self.options.tls_intolerant, |
| 1987 self.options.signed_cert_timestamps_tls_ext.decode( | 1991 self.options.signed_cert_timestamps_tls_ext.decode( |
| 1988 "base64"), | 1992 "base64"), |
| 1989 self.options.fallback_scsv, | 1993 self.options.fallback_scsv, |
| 1990 stapled_ocsp_response) | 1994 stapled_ocsp_response) |
| 1991 print 'HTTPS server started on %s:%d...' % (host, server.server_port) | 1995 print 'HTTPS server started on %s:%d...' % (host, server.server_port) |
| 1992 else: | 1996 else: |
| 1993 server = HTTPServer((host, port), TestPageHandler) | 1997 server = HTTPServer((host, port), TestPageHandler) |
| 1994 print 'HTTP server started on %s:%d...' % (host, server.server_port) | 1998 print 'HTTP server started on %s:%d...' % (host, server.server_port) |
| (...skipping 168 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 2163 'times, indicating multiple CA names should ' | 2167 'times, indicating multiple CA names should ' |
| 2164 'be sent in the request.') | 2168 'be sent in the request.') |
| 2165 self.option_parser.add_option('--ssl-bulk-cipher', action='append', | 2169 self.option_parser.add_option('--ssl-bulk-cipher', action='append', |
| 2166 help='Specify the bulk encryption ' | 2170 help='Specify the bulk encryption ' |
| 2167 'algorithm(s) that will be accepted by the ' | 2171 'algorithm(s) that will be accepted by the ' |
| 2168 'SSL server. Valid values are "aes256", ' | 2172 'SSL server. Valid values are "aes256", ' |
| 2169 '"aes128", "3des", "rc4". If omitted, all ' | 2173 '"aes128", "3des", "rc4". If omitted, all ' |
| 2170 'algorithms will be used. This option may ' | 2174 'algorithms will be used. This option may ' |
| 2171 'appear multiple times, indicating ' | 2175 'appear multiple times, indicating ' |
| 2172 'multiple algorithms should be enabled.'); | 2176 'multiple algorithms should be enabled.'); |
| 2177 self.option_parser.add_option('--ssl-key-exchange', action='append', |
| 2178 help='Specify the key exchange algorithm(s)' |
| 2179 'that will be accepted by the SSL server. ' |
| 2180 'Valid values are "rsa", "dhe_rsa". If ' |
| 2181 'omitted, all algorithms will be used. This ' |
| 2182 'option may appear multiple times, ' |
| 2183 'indicating multiple algorithms should be ' |
| 2184 'enabled.'); |
| 2173 self.option_parser.add_option('--file-root-url', default='/files/', | 2185 self.option_parser.add_option('--file-root-url', default='/files/', |
| 2174 help='Specify a root URL for files served.') | 2186 help='Specify a root URL for files served.') |
| 2175 | 2187 |
| 2176 | 2188 |
| 2177 if __name__ == '__main__': | 2189 if __name__ == '__main__': |
| 2178 sys.exit(ServerRunner().main()) | 2190 sys.exit(ServerRunner().main()) |
| OLD | NEW |