97 lines
3.4 KiB
Ruby
97 lines
3.4 KiB
Ruby
class Stunnel < Formula
|
|
homepage "https://www.stunnel.org/"
|
|
url "https://www.stunnel.org/downloads/stunnel-5.13.tar.gz"
|
|
mirror "http://www.usenix.org.uk/mirrors/stunnel/stunnel-5.13.tar.gz"
|
|
sha256 "71b4efb3814ec298124ec78386d756ee2cba9c999e7f9571bb8abcef317f04b5"
|
|
|
|
bottle do
|
|
sha256 "1c3b4e658129b79b9b08ed74a4d253ab15523bf8ce213da4b96d51a943248a17" => :yosemite
|
|
sha256 "648f0df1501ae6a8f84d121072f517d3d12ef9f014c4444d900aa1a74bedc1b4" => :mavericks
|
|
sha256 "9a0af9860faebf9e121f03ee1b377dac119659906a6b8275fe767a4a2f4f58c6" => :mountain_lion
|
|
end
|
|
|
|
# Please revision me whenever OpenSSL is updated
|
|
# "Update OpenSSL shared libraries or rebuild stunnel"
|
|
depends_on "openssl"
|
|
|
|
def install
|
|
# This causes a bogus .pem to be created in lieu of interactive cert generation.
|
|
stunnel_cnf = Pathname.new("tools/stunnel.cnf")
|
|
stunnel_cnf.unlink
|
|
stunnel_cnf.write <<-EOS.undent
|
|
# OpenSSL configuration file to create a server certificate
|
|
# by Michal Trojnara 1998-2015
|
|
|
|
[ req ]
|
|
# the default key length is secure and quite fast - do not change it
|
|
default_bits = 2048
|
|
# comment out the next line to protect the private key with a passphrase
|
|
encrypt_key = no
|
|
distinguished_name = req_dn
|
|
x509_extensions = cert_type
|
|
prompt = no
|
|
|
|
[ req_dn ]
|
|
countryName = PL
|
|
stateOrProvinceName = Mazovia Province
|
|
localityName = Warsaw
|
|
organizationName = Stunnel Developers
|
|
organizationalUnitName = Provisional CA
|
|
0.commonName = localhost
|
|
|
|
# To create a certificate for more than one name uncomment:
|
|
# 1.commonName = DNS alias of your server
|
|
# 2.commonName = DNS alias of your server
|
|
# ...
|
|
# See http://home.netscape.com/eng/security/ssl_2.0_certificate.html
|
|
# to see how Netscape understands commonName.
|
|
|
|
[ cert_type ]
|
|
nsCertType = server
|
|
EOS
|
|
|
|
system "./configure", "--disable-dependency-tracking",
|
|
"--disable-silent-rules",
|
|
"--prefix=#{prefix}",
|
|
"--sysconfdir=#{etc}",
|
|
"--localstatedir=#{var}",
|
|
"--mandir=#{man}",
|
|
"--disable-libwrap",
|
|
"--disable-systemd",
|
|
"--with-ssl=#{Formula["openssl"].opt_prefix}"
|
|
system "make", "install", "cert"
|
|
end
|
|
|
|
def caveats
|
|
<<-EOS.undent
|
|
A bogus SSL server certificate has been installed to:
|
|
#{etc}/stunnel/stunnel.pem
|
|
|
|
This certificate will be used by default unless a config file says otherwise!
|
|
Stunnel will refuse to load the sample configuration file if left unedited.
|
|
|
|
In your stunnel configuration, specify a SSL certificate with
|
|
the "cert =" option for each service.
|
|
EOS
|
|
end
|
|
|
|
test do
|
|
(testpath/"tstunnel.conf").write <<-EOS.undent
|
|
cert = #{etc}/stunnel/stunnel.pem
|
|
|
|
setuid = nobody
|
|
setgid = nobody
|
|
|
|
[pop3s]
|
|
accept = 995
|
|
connect = 110
|
|
|
|
[imaps]
|
|
accept = 993
|
|
connect = 143
|
|
EOS
|
|
|
|
assert_match /successful/, pipe_output("#{bin}/stunnel #{testpath}/tstunnel.conf 2>&1")
|
|
end
|
|
end
|