2004-07-08 11:17:47 -04:00
|
|
|
|
|
|
|
#include <ngx_config.h>
|
|
|
|
#include <ngx_core.h>
|
|
|
|
#include <ngx_http.h>
|
|
|
|
|
|
|
|
|
|
|
|
#define NGX_DEFLAUT_CERTIFICATE "cert.pem"
|
|
|
|
#define NGX_DEFLAUT_CERTIFICATE_KEY "cert.pem"
|
|
|
|
|
|
|
|
|
|
|
|
typedef struct {
|
|
|
|
ngx_flag_t enable;
|
|
|
|
ngx_str_t certificate;
|
|
|
|
ngx_str_t certificate_key;
|
2004-07-11 17:03:47 -04:00
|
|
|
|
|
|
|
SSL_CTX *ssl_ctx;
|
2004-07-08 11:17:47 -04:00
|
|
|
} ngx_http_ssl_srv_conf_t;
|
|
|
|
|
|
|
|
|
|
|
|
typedef struct {
|
|
|
|
SSL *ssl;
|
|
|
|
} ngx_http_ssl_ctx_t;
|
|
|
|
|
|
|
|
|
2004-07-14 16:07:58 -04:00
|
|
|
static ngx_int_t ngx_http_ssl_create_ssl(ngx_http_request_t *r);
|
2004-07-08 11:17:47 -04:00
|
|
|
static void ngx_http_ssl_error(ngx_uint_t level, ngx_log_t *log, int err,
|
|
|
|
char *fmt, ...);
|
|
|
|
static void *ngx_http_ssl_create_srv_conf(ngx_conf_t *cf);
|
|
|
|
static char *ngx_http_ssl_merge_srv_conf(ngx_conf_t *cf,
|
|
|
|
void *parent, void *child);
|
|
|
|
static ngx_int_t ngx_http_ssl_filter_init(ngx_cycle_t *cycle);
|
|
|
|
|
|
|
|
|
|
|
|
static ngx_command_t ngx_http_charset_filter_commands[] = {
|
|
|
|
|
|
|
|
{ ngx_string("ssl_"),
|
|
|
|
NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_CONF_FLAG,
|
|
|
|
ngx_conf_set_flag_slot,
|
|
|
|
NGX_HTTP_SRV_CONF_OFFSET,
|
|
|
|
offsetof(ngx_http_ssl_srv_conf_t, enable),
|
|
|
|
NULL },
|
|
|
|
|
|
|
|
{ ngx_string("ssl_certificate"),
|
|
|
|
NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_CONF_TAKE1,
|
|
|
|
ngx_conf_set_str_slot,
|
|
|
|
NGX_HTTP_SRV_CONF_OFFSET,
|
|
|
|
offsetof(ngx_http_ssl_srv_conf_t, certificate),
|
|
|
|
NULL },
|
|
|
|
|
|
|
|
{ ngx_string("ssl_certificate_key"),
|
|
|
|
NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_CONF_TAKE1,
|
|
|
|
ngx_conf_set_str_slot,
|
|
|
|
NGX_HTTP_SRV_CONF_OFFSET,
|
|
|
|
offsetof(ngx_http_ssl_srv_conf_t, certificate_key),
|
|
|
|
NULL },
|
|
|
|
|
|
|
|
ngx_null_command
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
static ngx_http_module_t ngx_http_ssl_filter_module_ctx = {
|
|
|
|
NULL, /* pre conf */
|
|
|
|
|
|
|
|
NULL, /* create main configuration */
|
|
|
|
NULL, /* init main configuration */
|
|
|
|
|
|
|
|
ngx_http_ssl_create_srv_conf, /* create server configuration */
|
|
|
|
ngx_http_ssl_merge_srv_conf, /* merge server configuration */
|
|
|
|
|
|
|
|
NULL, /* create location configuration */
|
|
|
|
NULL, /* merge location configuration */
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
ngx_module_t ngx_http_ssl_filter_module = {
|
|
|
|
NGX_MODULE,
|
|
|
|
&ngx_http_ssl_filter_module_ctx, /* module context */
|
|
|
|
NULL, /* module directives */
|
|
|
|
NGX_HTTP_MODULE, /* module type */
|
|
|
|
ngx_http_ssl_filter_init, /* init module */
|
|
|
|
NULL /* init process */
|
|
|
|
};
|
|
|
|
|
|
|
|
|
2004-07-14 16:07:58 -04:00
|
|
|
ngx_int_t ngx_http_ssl_read(ngx_http_request_t *r, u_char *buf, size_t size)
|
2004-07-08 11:17:47 -04:00
|
|
|
{
|
2004-07-14 16:07:58 -04:00
|
|
|
int n;
|
|
|
|
SSL *ssl;
|
2004-07-08 11:17:47 -04:00
|
|
|
ngx_http_ssl_ctx_t *ctx;
|
2004-07-11 17:03:47 -04:00
|
|
|
ngx_http_log_ctx_t *log_ctx;
|
2004-07-08 11:17:47 -04:00
|
|
|
|
2004-07-14 16:07:58 -04:00
|
|
|
if (r->connection->ssl == NULL) {
|
|
|
|
if (ngx_http_ssl_create_ssl(r) == NGX_ERROR) {
|
2004-07-08 11:17:47 -04:00
|
|
|
return NGX_HTTP_INTERNAL_SERVER_ERROR;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2004-07-14 16:07:58 -04:00
|
|
|
ssl = r->connection->ssl;
|
|
|
|
|
|
|
|
n = SSL_read(ssl, buf, size);
|
2004-07-11 17:03:47 -04:00
|
|
|
|
|
|
|
ngx_log_debug1(NGX_LOG_DEBUG_HTTP, r->connection->log, 0,
|
2004-07-14 16:07:58 -04:00
|
|
|
"SSL_read: %d", n);
|
2004-07-11 17:03:47 -04:00
|
|
|
|
2004-07-14 16:07:58 -04:00
|
|
|
if (n > 0) {
|
|
|
|
return n;
|
2004-07-11 17:03:47 -04:00
|
|
|
}
|
|
|
|
|
2004-07-14 16:07:58 -04:00
|
|
|
n = SSL_get_error(ssl, n);
|
2004-07-11 17:03:47 -04:00
|
|
|
|
|
|
|
ngx_log_debug1(NGX_LOG_DEBUG_HTTP, r->connection->log, 0,
|
2004-07-14 16:07:58 -04:00
|
|
|
"SSL_get_error: %d", n);
|
2004-07-11 17:03:47 -04:00
|
|
|
|
2004-07-14 16:07:58 -04:00
|
|
|
if (n == SSL_ERROR_WANT_READ) {
|
2004-07-11 17:03:47 -04:00
|
|
|
return NGX_AGAIN;
|
|
|
|
}
|
|
|
|
|
|
|
|
#if 0
|
2004-07-14 16:07:58 -04:00
|
|
|
if (n == SSL_ERROR_WANT_WRITE) {
|
2004-07-11 17:03:47 -04:00
|
|
|
return NGX_AGAIN;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2004-07-14 16:07:58 -04:00
|
|
|
if (!SSL_is_init_finished(ssl)) {
|
2004-07-11 17:03:47 -04:00
|
|
|
log_ctx = (ngx_http_log_ctx_t *) r->connection->log->data;
|
|
|
|
log_ctx->action = "SSL handshake";
|
|
|
|
}
|
|
|
|
|
2004-07-14 16:07:58 -04:00
|
|
|
if (n == SSL_ERROR_ZERO_RETURN) {
|
2004-07-11 17:03:47 -04:00
|
|
|
ngx_log_error(NGX_LOG_INFO, r->connection->log, 0,
|
|
|
|
"client closed connection");
|
|
|
|
|
2004-07-14 16:07:58 -04:00
|
|
|
SSL_set_shutdown(ssl, SSL_RECEIVED_SHUTDOWN);
|
2004-07-11 17:03:47 -04:00
|
|
|
|
|
|
|
return NGX_SSL_ERROR;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (ERR_GET_REASON(ERR_peek_error()) == SSL_R_HTTP_REQUEST) {
|
|
|
|
ngx_log_error(NGX_LOG_ERR, r->connection->log, 0,
|
|
|
|
"client sent plain HTTP request to HTTPS port");
|
|
|
|
|
2004-07-14 16:07:58 -04:00
|
|
|
SSL_set_shutdown(ssl, SSL_RECEIVED_SHUTDOWN|SSL_SENT_SHUTDOWN);
|
2004-07-11 17:03:47 -04:00
|
|
|
|
|
|
|
return NGX_SSL_HTTP_ERROR;
|
|
|
|
}
|
|
|
|
|
2004-07-14 16:07:58 -04:00
|
|
|
ngx_http_ssl_error(NGX_LOG_ALERT, r->connection->log, n,
|
2004-07-14 12:01:42 -04:00
|
|
|
"SSL_read() failed");
|
2004-07-11 17:03:47 -04:00
|
|
|
|
2004-07-14 16:07:58 -04:00
|
|
|
SSL_set_shutdown(ssl, SSL_RECEIVED_SHUTDOWN);
|
2004-07-11 17:03:47 -04:00
|
|
|
|
|
|
|
return NGX_SSL_ERROR;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-07-14 16:07:58 -04:00
|
|
|
ngx_chain_t *ngx_http_ssl_write(ngx_connection_t *c, ngx_chain_t *in,
|
|
|
|
off_t limit)
|
2004-07-11 17:03:47 -04:00
|
|
|
{
|
2004-07-14 16:07:58 -04:00
|
|
|
int n;
|
|
|
|
ssize_t send, size;
|
2004-07-11 17:03:47 -04:00
|
|
|
|
2004-07-14 16:07:58 -04:00
|
|
|
send = 0;
|
2004-07-08 11:17:47 -04:00
|
|
|
|
2004-07-14 16:07:58 -04:00
|
|
|
for (/* void */; in; in = in->next) {
|
|
|
|
if (ngx_buf_special(in->buf)) {
|
|
|
|
continue;
|
|
|
|
}
|
2004-07-08 11:17:47 -04:00
|
|
|
|
2004-07-14 16:07:58 -04:00
|
|
|
size = in->buf->last - in->buf->pos;
|
2004-07-08 11:17:47 -04:00
|
|
|
|
2004-07-14 16:07:58 -04:00
|
|
|
if (send + size > limit) {
|
|
|
|
size = limit - send;
|
2004-07-14 12:01:42 -04:00
|
|
|
}
|
|
|
|
|
2004-07-14 16:07:58 -04:00
|
|
|
ngx_log_debug1(NGX_LOG_DEBUG_HTTP, c->log, 0, "SSL to write: %d", size);
|
|
|
|
|
|
|
|
n = SSL_write(c->ssl, in->buf->pos, size);
|
|
|
|
|
|
|
|
ngx_log_debug1(NGX_LOG_DEBUG_HTTP, c->log, 0, "SSL_write: %d", n);
|
|
|
|
|
|
|
|
if (n > 0) {
|
|
|
|
in->buf->pos += n;
|
|
|
|
send += n;
|
|
|
|
|
|
|
|
if (n == size) {
|
|
|
|
if (send < limit) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
return in;
|
|
|
|
}
|
|
|
|
|
|
|
|
c->write->ready = 0;
|
|
|
|
return in;
|
2004-07-11 17:03:47 -04:00
|
|
|
}
|
2004-07-09 03:12:14 -04:00
|
|
|
|
2004-07-14 16:07:58 -04:00
|
|
|
n = SSL_get_error(c->ssl, n);
|
2004-07-09 03:12:14 -04:00
|
|
|
|
2004-07-14 16:07:58 -04:00
|
|
|
ngx_log_debug1(NGX_LOG_DEBUG_HTTP, c->log, 0, "SSL_get_error: %d", n);
|
2004-07-09 03:12:14 -04:00
|
|
|
|
2004-07-14 16:07:58 -04:00
|
|
|
if (n == SSL_ERROR_WANT_WRITE) {
|
|
|
|
c->write->ready = 0;
|
|
|
|
return in;
|
2004-07-11 17:03:47 -04:00
|
|
|
}
|
2004-07-09 03:12:14 -04:00
|
|
|
|
2004-07-14 16:07:58 -04:00
|
|
|
ngx_http_ssl_error(NGX_LOG_ALERT, c->log, n, "SSL_write() failed");
|
2004-07-14 12:01:42 -04:00
|
|
|
|
2004-07-14 16:07:58 -04:00
|
|
|
return NGX_CHAIN_ERROR;
|
2004-07-11 17:03:47 -04:00
|
|
|
}
|
2004-07-09 03:12:14 -04:00
|
|
|
|
2004-07-14 16:07:58 -04:00
|
|
|
return in;
|
2004-07-14 12:01:42 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-07-14 16:07:58 -04:00
|
|
|
ngx_int_t ngx_http_ssl_shutdown(ngx_http_request_t *r)
|
2004-07-14 12:01:42 -04:00
|
|
|
{
|
2004-07-14 16:07:58 -04:00
|
|
|
int n;
|
|
|
|
SSL *ssl;
|
2004-07-14 12:01:42 -04:00
|
|
|
|
2004-07-14 16:07:58 -04:00
|
|
|
ssl = r->connection->ssl;
|
2004-07-14 12:01:42 -04:00
|
|
|
|
2004-07-14 16:07:58 -04:00
|
|
|
n = SSL_shutdown(ssl);
|
2004-07-09 03:12:14 -04:00
|
|
|
|
2004-07-14 16:07:58 -04:00
|
|
|
ngx_log_debug1(NGX_LOG_DEBUG_HTTP, r->connection->log, 0,
|
|
|
|
"SSL_shutdown: %d", n);
|
2004-07-09 03:12:14 -04:00
|
|
|
|
2004-07-14 16:07:58 -04:00
|
|
|
if (n == 0) {
|
|
|
|
return NGX_AGAIN;
|
|
|
|
}
|
2004-07-08 11:17:47 -04:00
|
|
|
|
2004-07-14 16:07:58 -04:00
|
|
|
if (n == 1) {
|
|
|
|
SSL_free(ssl);
|
|
|
|
r->connection->ssl = NULL;
|
|
|
|
return NGX_OK;
|
|
|
|
}
|
2004-07-14 12:01:42 -04:00
|
|
|
|
2004-07-14 16:07:58 -04:00
|
|
|
n = SSL_get_error(ssl, n);
|
2004-07-14 12:01:42 -04:00
|
|
|
|
2004-07-14 16:07:58 -04:00
|
|
|
ngx_log_debug1(NGX_LOG_DEBUG_HTTP, r->connection->log, 0,
|
|
|
|
"SSL_get_error: %d", n);
|
2004-07-14 12:01:42 -04:00
|
|
|
|
2004-07-14 16:07:58 -04:00
|
|
|
if (n == SSL_ERROR_WANT_WRITE) {
|
|
|
|
return NGX_AGAIN;
|
2004-07-08 11:17:47 -04:00
|
|
|
}
|
|
|
|
|
2004-07-14 16:07:58 -04:00
|
|
|
ngx_http_ssl_error(NGX_LOG_ALERT, r->connection->log, n,
|
|
|
|
"SSL_shutdown() failed");
|
|
|
|
|
|
|
|
return NGX_ERROR;
|
2004-07-08 11:17:47 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-07-14 16:07:58 -04:00
|
|
|
static ngx_int_t ngx_http_ssl_create_ssl(ngx_http_request_t *r)
|
2004-07-08 11:17:47 -04:00
|
|
|
{
|
2004-07-14 16:07:58 -04:00
|
|
|
SSL *ssl;
|
2004-07-08 11:17:47 -04:00
|
|
|
ngx_http_ssl_srv_conf_t *scf;
|
|
|
|
|
|
|
|
scf = ngx_http_get_module_srv_conf(r, ngx_http_ssl_filter_module);
|
|
|
|
|
2004-07-14 16:07:58 -04:00
|
|
|
ssl = SSL_new(scf->ssl_ctx);
|
2004-07-08 11:17:47 -04:00
|
|
|
|
2004-07-14 16:07:58 -04:00
|
|
|
if (ssl == NULL) {
|
2004-07-08 11:17:47 -04:00
|
|
|
ngx_http_ssl_error(NGX_LOG_ALERT, r->connection->log, 0,
|
|
|
|
"SSL_new() failed");
|
2004-07-14 16:07:58 -04:00
|
|
|
return NGX_ERROR;
|
2004-07-08 11:17:47 -04:00
|
|
|
}
|
|
|
|
|
2004-07-14 16:07:58 -04:00
|
|
|
if (SSL_set_fd(ssl, r->connection->fd) == 0) {
|
2004-07-08 11:17:47 -04:00
|
|
|
ngx_http_ssl_error(NGX_LOG_ALERT, r->connection->log, 0,
|
|
|
|
"SSL_set_fd() failed");
|
2004-07-14 16:07:58 -04:00
|
|
|
return NGX_ERROR;
|
2004-07-08 11:17:47 -04:00
|
|
|
}
|
|
|
|
|
2004-07-14 16:07:58 -04:00
|
|
|
SSL_set_accept_state(ssl);
|
|
|
|
|
|
|
|
r->connection->ssl = ssl;
|
2004-07-11 17:03:47 -04:00
|
|
|
|
2004-07-14 16:07:58 -04:00
|
|
|
return NGX_OK;
|
2004-07-08 11:17:47 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-07-11 17:03:47 -04:00
|
|
|
void ngx_http_ssl_close_connection(SSL *ssl, ngx_log_t *log)
|
2004-07-09 03:12:14 -04:00
|
|
|
{
|
2004-07-11 17:03:47 -04:00
|
|
|
int rc;
|
|
|
|
|
2004-07-09 03:12:14 -04:00
|
|
|
SSL_free(ssl);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-07-08 11:17:47 -04:00
|
|
|
static void ngx_http_ssl_error(ngx_uint_t level, ngx_log_t *log, int err,
|
|
|
|
char *fmt, ...)
|
|
|
|
{
|
|
|
|
int len;
|
|
|
|
char errstr[NGX_MAX_CONF_ERRSTR];
|
|
|
|
va_list args;
|
|
|
|
|
|
|
|
va_start(args, fmt);
|
|
|
|
len = ngx_vsnprintf(errstr, sizeof(errstr) - 1, fmt, args);
|
|
|
|
va_end(args);
|
|
|
|
|
|
|
|
errstr[len++] = ' ';
|
|
|
|
errstr[len++] = '(';
|
|
|
|
errstr[len++] = 'S';
|
|
|
|
errstr[len++] = 'S';
|
|
|
|
errstr[len++] = 'L';
|
|
|
|
errstr[len++] = ':';
|
|
|
|
errstr[len++] = ' ';
|
|
|
|
|
|
|
|
ERR_error_string_n(ERR_get_error(), errstr + len, sizeof(errstr) - len - 1);
|
|
|
|
|
|
|
|
ngx_log_error(level, log, 0, "%s)", errstr);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void *ngx_http_ssl_create_srv_conf(ngx_conf_t *cf)
|
|
|
|
{
|
|
|
|
ngx_http_ssl_srv_conf_t *scf;
|
|
|
|
|
|
|
|
if (!(scf = ngx_pcalloc(cf->pool, sizeof(ngx_http_ssl_srv_conf_t)))) {
|
|
|
|
return NGX_CONF_ERROR;
|
|
|
|
}
|
|
|
|
|
|
|
|
scf->enable = NGX_CONF_UNSET;
|
|
|
|
|
|
|
|
return scf;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static char *ngx_http_ssl_merge_srv_conf(ngx_conf_t *cf,
|
|
|
|
void *parent, void *child)
|
|
|
|
{
|
|
|
|
ngx_http_ssl_srv_conf_t *prev = parent;
|
|
|
|
ngx_http_ssl_srv_conf_t *conf = child;
|
|
|
|
|
|
|
|
ngx_conf_merge_value(conf->enable, prev->enable, 0);
|
|
|
|
|
|
|
|
ngx_conf_merge_str_value(conf->certificate, prev->certificate,
|
|
|
|
NGX_DEFLAUT_CERTIFICATE);
|
|
|
|
|
|
|
|
ngx_conf_merge_str_value(conf->certificate_key, prev->certificate_key,
|
|
|
|
NGX_DEFLAUT_CERTIFICATE_KEY);
|
|
|
|
|
2004-07-11 17:03:47 -04:00
|
|
|
/* STUB: where to move ??? */
|
|
|
|
SSL_library_init();
|
|
|
|
SSL_load_error_strings();
|
|
|
|
|
|
|
|
/* TODO: inherit ssl_ctx */
|
|
|
|
|
|
|
|
/* TODO: configure methods */
|
|
|
|
|
|
|
|
conf->ssl_ctx = SSL_CTX_new(SSLv23_server_method());
|
|
|
|
|
|
|
|
if (conf->ssl_ctx == NULL) {
|
|
|
|
ngx_http_ssl_error(NGX_LOG_EMERG, cf->log, 0, "SSL_CTX_new() failed");
|
|
|
|
return NGX_CONF_ERROR;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (SSL_CTX_use_certificate_file(conf->ssl_ctx, conf->certificate.data,
|
|
|
|
SSL_FILETYPE_PEM) == 0) {
|
|
|
|
ngx_http_ssl_error(NGX_LOG_EMERG, cf->log, 0,
|
|
|
|
"SSL_CTX_use_certificate_file() failed");
|
|
|
|
return NGX_CONF_ERROR;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (SSL_CTX_use_PrivateKey_file(conf->ssl_ctx, conf->certificate_key.data,
|
|
|
|
SSL_FILETYPE_PEM) == 0) {
|
|
|
|
ngx_http_ssl_error(NGX_LOG_EMERG, cf->log, 0,
|
|
|
|
"SSL_CTX_use_PrivateKey_file() failed");
|
|
|
|
return NGX_CONF_ERROR;
|
|
|
|
}
|
|
|
|
|
2004-07-08 11:17:47 -04:00
|
|
|
return NGX_CONF_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static ngx_int_t ngx_http_ssl_filter_init(ngx_cycle_t *cycle)
|
|
|
|
{
|
|
|
|
#if 0
|
|
|
|
ngx_http_next_header_filter = ngx_http_top_header_filter;
|
|
|
|
ngx_http_top_header_filter = ngx_http_ssl_header_filter;
|
|
|
|
|
|
|
|
ngx_http_next_body_filter = ngx_http_top_body_filter;
|
|
|
|
ngx_http_top_body_filter = ngx_http_ssl_body_filter;
|
|
|
|
#endif
|
|
|
|
|
|
|
|
return NGX_OK;
|
|
|
|
}
|