mirror of
https://github.com/bjc/prosody.git
synced 2025-04-03 21:27:38 +03:00
net: refactor sslconfig to not depend on LuaSec
This now requires that the network backend exposes a tls_builder function, which essentially wraps the former util.sslconfig.new() function, passing a factory to create the eventual SSL context. That allows a net.server backend to pick whatever it likes as SSL context factory, as long as it understands the config table passed by the SSL config builder. Heck, a backend could even mock and replace the entire SSL config builder API.
This commit is contained in:
parent
38346dd6f1
commit
9f7c3b9ba6
6 changed files with 51 additions and 17 deletions
|
@ -10,7 +10,7 @@ local ssl = require "ssl";
|
|||
local configmanager = require "core.configmanager";
|
||||
local log = require "util.logger".init("certmanager");
|
||||
local ssl_newcontext = ssl.newcontext;
|
||||
local new_config = require"util.sslconfig".new;
|
||||
local new_config = require"net.server".tls_builder;
|
||||
local stat = require "lfs".attributes;
|
||||
|
||||
local x509 = require "util.x509";
|
||||
|
|
|
@ -118,6 +118,13 @@ if prosody and set_config then
|
|||
prosody.events.add_handler("config-reloaded", load_config);
|
||||
end
|
||||
|
||||
local tls_builder = server.tls_builder;
|
||||
-- resolving the basedir here avoids util.sslconfig depending on
|
||||
-- prosody.paths.config
|
||||
function server.tls_builder()
|
||||
return tls_builder(prosody.paths.config or "")
|
||||
end
|
||||
|
||||
-- require "net.server" shall now forever return this,
|
||||
-- ie. server_select or server_event as chosen above.
|
||||
return server;
|
||||
|
|
|
@ -27,6 +27,8 @@ local inet_pton = inet.pton;
|
|||
local _SOCKETINVALID = socket._SOCKETINVALID or -1;
|
||||
local new_id = require "util.id".short;
|
||||
local xpcall = require "util.xpcall".xpcall;
|
||||
local sslconfig = require "util.sslconfig";
|
||||
local tls_impl = require "net.tls_luasec";
|
||||
|
||||
local poller = require "util.poll"
|
||||
local EEXIST = poller.EEXIST;
|
||||
|
@ -1104,6 +1106,10 @@ return {
|
|||
cfg = setmetatable(newconfig, default_config);
|
||||
end;
|
||||
|
||||
tls_builder = function(basedir)
|
||||
return sslconfig._new(tls_impl.new_context, basedir)
|
||||
end,
|
||||
|
||||
-- libevent emulation
|
||||
event = { EV_READ = "r", EV_WRITE = "w", EV_READWRITE = "rw", EV_LEAVE = -1 };
|
||||
addevent = function (fd, mode, callback)
|
||||
|
|
|
@ -52,6 +52,8 @@ local socket = require "socket"
|
|||
local levent = require "luaevent.core"
|
||||
local inet = require "util.net";
|
||||
local inet_pton = inet.pton;
|
||||
local sslconfig = require "util.sslconfig";
|
||||
local tls_impl = require "net.tls_luasec";
|
||||
|
||||
local socket_gettime = socket.gettime
|
||||
|
||||
|
@ -944,6 +946,10 @@ return {
|
|||
add_task = add_task,
|
||||
watchfd = watchfd,
|
||||
|
||||
tls_builder = function(basedir)
|
||||
return sslconfig._new(tls_impl.new_context, basedir)
|
||||
end,
|
||||
|
||||
__NAME = SCRIPT_NAME,
|
||||
__DATE = LAST_MODIFIED,
|
||||
__AUTHOR = SCRIPT_AUTHOR,
|
||||
|
|
|
@ -52,6 +52,8 @@ local luasocket = use "socket" or require "socket"
|
|||
local luasocket_gettime = luasocket.gettime
|
||||
local inet = require "util.net";
|
||||
local inet_pton = inet.pton;
|
||||
local sslconfig = require "util.sslconfig";
|
||||
local tls_impl = require "net.tls_luasec";
|
||||
|
||||
--// extern lib methods //--
|
||||
|
||||
|
@ -1181,4 +1183,8 @@ return {
|
|||
removeserver = removeserver,
|
||||
get_backend = get_backend,
|
||||
changesettings = changesettings,
|
||||
|
||||
tls_builder = function(basedir)
|
||||
return sslconfig._new(tls_impl.new_context, basedir)
|
||||
end,
|
||||
}
|
||||
|
|
|
@ -8,12 +8,8 @@ local error = error;
|
|||
local t_concat = table.concat;
|
||||
local t_insert = table.insert;
|
||||
local setmetatable = setmetatable;
|
||||
local config_path = prosody.paths.config or ".";
|
||||
local resolve_path = require"util.paths".resolve_relative_path;
|
||||
|
||||
-- TODO: use net.server directly here
|
||||
local tls_impl = require"net.tls_luasec";
|
||||
|
||||
local _ENV = nil;
|
||||
-- luacheck: std none
|
||||
|
||||
|
@ -78,9 +74,9 @@ finalisers.curveslist = finalisers.ciphers;
|
|||
finalisers.ciphersuites = finalisers.ciphers;
|
||||
|
||||
-- Path expansion
|
||||
function finalisers.key(path)
|
||||
function finalisers.key(path, config)
|
||||
if type(path) == "string" then
|
||||
return resolve_path(config_path, path);
|
||||
return resolve_path(config._basedir, path);
|
||||
else
|
||||
return nil
|
||||
end
|
||||
|
@ -110,11 +106,13 @@ end
|
|||
|
||||
-- Merge options from 'new' config into 'config'
|
||||
local function apply(config, new)
|
||||
-- 0 == cache
|
||||
rawset(config, 0, nil);
|
||||
rawset(config, "_cache", nil);
|
||||
if type(new) == "table" then
|
||||
for field, value in pairs(new) do
|
||||
(handlers[field] or rawset)(config, field, value);
|
||||
-- exclude keys which are internal to the config builder
|
||||
if field:sub(1, 1) ~= "_" then
|
||||
(handlers[field] or rawset)(config, field, value);
|
||||
end
|
||||
end
|
||||
end
|
||||
return config
|
||||
|
@ -124,7 +122,10 @@ end
|
|||
local function final(config)
|
||||
local output = { };
|
||||
for field, value in pairs(config) do
|
||||
output[field] = (finalisers[field] or id)(value);
|
||||
-- exclude keys which are internal to the config builder
|
||||
if field:sub(1, 1) ~= "_" then
|
||||
output[field] = (finalisers[field] or id)(value, config);
|
||||
end
|
||||
end
|
||||
-- Need to handle protocols last because it adds to the options list
|
||||
protocol(output);
|
||||
|
@ -132,14 +133,14 @@ local function final(config)
|
|||
end
|
||||
|
||||
local function build(config)
|
||||
local cached = rawget(config, 0);
|
||||
local cached = rawget(config, "_cache");
|
||||
if cached then
|
||||
return cached, nil
|
||||
end
|
||||
|
||||
local ctx, err = tls_impl.new_context(config:final(), config);
|
||||
local ctx, err = rawget(config, "_context_factory")(config:final(), config);
|
||||
if ctx then
|
||||
rawset(config, 0, ctx);
|
||||
rawset(config, "_cache", ctx);
|
||||
end
|
||||
return ctx, err
|
||||
end
|
||||
|
@ -156,13 +157,21 @@ local sslopts_mt = {
|
|||
};
|
||||
|
||||
|
||||
local function new()
|
||||
return setmetatable({options={}}, sslopts_mt);
|
||||
-- passing basedir through everything is required to avoid sslconfig depending
|
||||
-- on prosody.paths.config
|
||||
local function new(context_factory, basedir)
|
||||
return setmetatable({
|
||||
_context_factory = context_factory,
|
||||
_basedir = basedir,
|
||||
options={},
|
||||
}, sslopts_mt);
|
||||
end
|
||||
|
||||
local function clone(config)
|
||||
local result = new();
|
||||
for k, v in pairs(config) do
|
||||
-- note that we *do* copy the internal keys on clone -- we have to carry
|
||||
-- both the factory and the cache with us
|
||||
rawset(result, k, v);
|
||||
end
|
||||
return result
|
||||
|
@ -173,5 +182,5 @@ sslopts_mt.__index.clone = clone;
|
|||
return {
|
||||
apply = apply;
|
||||
final = final;
|
||||
new = new;
|
||||
_new = new;
|
||||
};
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue