461 lines
14 KiB
C++
461 lines
14 KiB
C++
/*
|
|
* nghttp2 - HTTP/2 C Library
|
|
*
|
|
* Copyright (c) 2015 Tatsuhiro Tsujikawa
|
|
*
|
|
* Permission is hereby granted, free of charge, to any person obtaining
|
|
* a copy of this software and associated documentation files (the
|
|
* "Software"), to deal in the Software without restriction, including
|
|
* without limitation the rights to use, copy, modify, merge, publish,
|
|
* distribute, sublicense, and/or sell copies of the Software, and to
|
|
* permit persons to whom the Software is furnished to do so, subject to
|
|
* the following conditions:
|
|
*
|
|
* The above copyright notice and this permission notice shall be
|
|
* included in all copies or substantial portions of the Software.
|
|
*
|
|
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
|
|
* EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
|
|
* MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
|
|
* NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE
|
|
* LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION
|
|
* OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION
|
|
* WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
|
|
*/
|
|
#include "shrpx_mruby_module_env.h"
|
|
|
|
#include <mruby/variable.h>
|
|
#include <mruby/string.h>
|
|
#include <mruby/hash.h>
|
|
|
|
#include "shrpx_downstream.h"
|
|
#include "shrpx_upstream.h"
|
|
#include "shrpx_client_handler.h"
|
|
#include "shrpx_mruby.h"
|
|
#include "shrpx_mruby_module.h"
|
|
#include "shrpx_log.h"
|
|
#include "shrpx_tls.h"
|
|
|
|
namespace shrpx {
|
|
|
|
namespace mruby {
|
|
|
|
namespace {
|
|
mrb_value env_init(mrb_state *mrb, mrb_value self) { return self; }
|
|
} // namespace
|
|
|
|
namespace {
|
|
mrb_value env_get_req(mrb_state *mrb, mrb_value self) {
|
|
return mrb_iv_get(mrb, self, mrb_intern_lit(mrb, "req"));
|
|
}
|
|
} // namespace
|
|
|
|
namespace {
|
|
mrb_value env_get_resp(mrb_state *mrb, mrb_value self) {
|
|
return mrb_iv_get(mrb, self, mrb_intern_lit(mrb, "resp"));
|
|
}
|
|
} // namespace
|
|
|
|
namespace {
|
|
mrb_value env_get_ctx(mrb_state *mrb, mrb_value self) {
|
|
auto data = reinterpret_cast<MRubyAssocData *>(mrb->ud);
|
|
auto downstream = data->downstream;
|
|
|
|
auto dsym = intern_ptr(mrb, downstream);
|
|
|
|
auto ctx = mrb_iv_get(mrb, self, dsym);
|
|
if (mrb_nil_p(ctx)) {
|
|
ctx = mrb_hash_new(mrb);
|
|
mrb_iv_set(mrb, self, dsym, ctx);
|
|
}
|
|
|
|
return ctx;
|
|
}
|
|
} // namespace
|
|
|
|
namespace {
|
|
mrb_value env_get_phase(mrb_state *mrb, mrb_value self) {
|
|
auto data = static_cast<MRubyAssocData *>(mrb->ud);
|
|
|
|
return mrb_fixnum_value(data->phase);
|
|
}
|
|
} // namespace
|
|
|
|
namespace {
|
|
mrb_value env_get_remote_addr(mrb_state *mrb, mrb_value self) {
|
|
auto data = static_cast<MRubyAssocData *>(mrb->ud);
|
|
auto downstream = data->downstream;
|
|
auto upstream = downstream->get_upstream();
|
|
auto handler = upstream->get_client_handler();
|
|
|
|
auto &ipaddr = handler->get_ipaddr();
|
|
|
|
return mrb_str_new(mrb, ipaddr.c_str(), ipaddr.size());
|
|
}
|
|
} // namespace
|
|
|
|
namespace {
|
|
mrb_value env_get_server_port(mrb_state *mrb, mrb_value self) {
|
|
auto data = static_cast<MRubyAssocData *>(mrb->ud);
|
|
auto downstream = data->downstream;
|
|
auto upstream = downstream->get_upstream();
|
|
auto handler = upstream->get_client_handler();
|
|
auto faddr = handler->get_upstream_addr();
|
|
|
|
return mrb_fixnum_value(faddr->port);
|
|
}
|
|
} // namespace
|
|
|
|
namespace {
|
|
mrb_value env_get_server_addr(mrb_state *mrb, mrb_value self) {
|
|
auto data = static_cast<MRubyAssocData *>(mrb->ud);
|
|
auto downstream = data->downstream;
|
|
auto upstream = downstream->get_upstream();
|
|
auto handler = upstream->get_client_handler();
|
|
auto faddr = handler->get_upstream_addr();
|
|
|
|
return mrb_str_new(mrb, faddr->host.c_str(), faddr->host.size());
|
|
}
|
|
} // namespace
|
|
|
|
namespace {
|
|
mrb_value env_get_tls_used(mrb_state *mrb, mrb_value self) {
|
|
auto data = static_cast<MRubyAssocData *>(mrb->ud);
|
|
auto downstream = data->downstream;
|
|
auto upstream = downstream->get_upstream();
|
|
auto handler = upstream->get_client_handler();
|
|
|
|
return handler->get_ssl() ? mrb_true_value() : mrb_false_value();
|
|
}
|
|
} // namespace
|
|
|
|
namespace {
|
|
mrb_value env_get_tls_sni(mrb_state *mrb, mrb_value self) {
|
|
auto data = static_cast<MRubyAssocData *>(mrb->ud);
|
|
auto downstream = data->downstream;
|
|
auto upstream = downstream->get_upstream();
|
|
auto handler = upstream->get_client_handler();
|
|
auto sni = handler->get_tls_sni();
|
|
|
|
return mrb_str_new(mrb, sni.c_str(), sni.size());
|
|
}
|
|
} // namespace
|
|
|
|
namespace {
|
|
mrb_value env_get_tls_client_fingerprint_md(mrb_state *mrb, const EVP_MD *md) {
|
|
auto data = static_cast<MRubyAssocData *>(mrb->ud);
|
|
auto downstream = data->downstream;
|
|
auto upstream = downstream->get_upstream();
|
|
auto handler = upstream->get_client_handler();
|
|
auto ssl = handler->get_ssl();
|
|
|
|
if (!ssl) {
|
|
return mrb_str_new_static(mrb, "", 0);
|
|
}
|
|
|
|
auto x = SSL_get_peer_certificate(ssl);
|
|
if (!x) {
|
|
return mrb_str_new_static(mrb, "", 0);
|
|
}
|
|
|
|
// Currently the largest hash value is SHA-256, which is 32 bytes.
|
|
std::array<uint8_t, 32> buf;
|
|
auto slen = tls::get_x509_fingerprint(buf.data(), buf.size(), x, md);
|
|
X509_free(x);
|
|
if (slen == -1) {
|
|
mrb_raise(mrb, E_RUNTIME_ERROR, "could not compute client fingerprint");
|
|
}
|
|
|
|
// TODO Use template version of format_hex
|
|
auto &balloc = downstream->get_block_allocator();
|
|
auto f = util::format_hex(balloc,
|
|
StringRef{std::begin(buf), std::begin(buf) + slen});
|
|
return mrb_str_new(mrb, f.c_str(), f.size());
|
|
}
|
|
} // namespace
|
|
|
|
namespace {
|
|
mrb_value env_get_tls_client_fingerprint_sha256(mrb_state *mrb,
|
|
mrb_value self) {
|
|
return env_get_tls_client_fingerprint_md(mrb, EVP_sha256());
|
|
}
|
|
} // namespace
|
|
|
|
namespace {
|
|
mrb_value env_get_tls_client_fingerprint_sha1(mrb_state *mrb, mrb_value self) {
|
|
return env_get_tls_client_fingerprint_md(mrb, EVP_sha1());
|
|
}
|
|
} // namespace
|
|
|
|
namespace {
|
|
mrb_value env_get_tls_client_subject_name(mrb_state *mrb, mrb_value self) {
|
|
auto data = static_cast<MRubyAssocData *>(mrb->ud);
|
|
auto downstream = data->downstream;
|
|
auto upstream = downstream->get_upstream();
|
|
auto handler = upstream->get_client_handler();
|
|
auto ssl = handler->get_ssl();
|
|
|
|
if (!ssl) {
|
|
return mrb_str_new_static(mrb, "", 0);
|
|
}
|
|
|
|
auto x = SSL_get_peer_certificate(ssl);
|
|
if (!x) {
|
|
return mrb_str_new_static(mrb, "", 0);
|
|
}
|
|
|
|
auto &balloc = downstream->get_block_allocator();
|
|
auto name = tls::get_x509_subject_name(balloc, x);
|
|
X509_free(x);
|
|
return mrb_str_new(mrb, name.c_str(), name.size());
|
|
}
|
|
} // namespace
|
|
|
|
namespace {
|
|
mrb_value env_get_tls_client_issuer_name(mrb_state *mrb, mrb_value self) {
|
|
auto data = static_cast<MRubyAssocData *>(mrb->ud);
|
|
auto downstream = data->downstream;
|
|
auto upstream = downstream->get_upstream();
|
|
auto handler = upstream->get_client_handler();
|
|
auto ssl = handler->get_ssl();
|
|
|
|
if (!ssl) {
|
|
return mrb_str_new_static(mrb, "", 0);
|
|
}
|
|
|
|
auto x = SSL_get_peer_certificate(ssl);
|
|
if (!x) {
|
|
return mrb_str_new_static(mrb, "", 0);
|
|
}
|
|
|
|
auto &balloc = downstream->get_block_allocator();
|
|
auto name = tls::get_x509_issuer_name(balloc, x);
|
|
X509_free(x);
|
|
return mrb_str_new(mrb, name.c_str(), name.size());
|
|
}
|
|
} // namespace
|
|
|
|
namespace {
|
|
mrb_value env_get_tls_client_serial(mrb_state *mrb, mrb_value self) {
|
|
auto data = static_cast<MRubyAssocData *>(mrb->ud);
|
|
auto downstream = data->downstream;
|
|
auto upstream = downstream->get_upstream();
|
|
auto handler = upstream->get_client_handler();
|
|
auto ssl = handler->get_ssl();
|
|
|
|
if (!ssl) {
|
|
return mrb_str_new_static(mrb, "", 0);
|
|
}
|
|
|
|
auto x = SSL_get_peer_certificate(ssl);
|
|
if (!x) {
|
|
return mrb_str_new_static(mrb, "", 0);
|
|
}
|
|
|
|
auto &balloc = downstream->get_block_allocator();
|
|
auto sn = tls::get_x509_serial(balloc, x);
|
|
X509_free(x);
|
|
return mrb_str_new(mrb, sn.c_str(), sn.size());
|
|
}
|
|
} // namespace
|
|
|
|
namespace {
|
|
mrb_value env_get_tls_client_not_before(mrb_state *mrb, mrb_value self) {
|
|
auto data = static_cast<MRubyAssocData *>(mrb->ud);
|
|
auto downstream = data->downstream;
|
|
auto upstream = downstream->get_upstream();
|
|
auto handler = upstream->get_client_handler();
|
|
auto ssl = handler->get_ssl();
|
|
|
|
if (!ssl) {
|
|
return mrb_fixnum_value(0);
|
|
}
|
|
|
|
auto x = SSL_get_peer_certificate(ssl);
|
|
if (!x) {
|
|
return mrb_fixnum_value(0);
|
|
}
|
|
|
|
time_t t;
|
|
if (tls::get_x509_not_before(t, x) != 0) {
|
|
return mrb_fixnum_value(0);
|
|
}
|
|
|
|
return mrb_fixnum_value(t);
|
|
}
|
|
} // namespace
|
|
|
|
namespace {
|
|
mrb_value env_get_tls_client_not_after(mrb_state *mrb, mrb_value self) {
|
|
auto data = static_cast<MRubyAssocData *>(mrb->ud);
|
|
auto downstream = data->downstream;
|
|
auto upstream = downstream->get_upstream();
|
|
auto handler = upstream->get_client_handler();
|
|
auto ssl = handler->get_ssl();
|
|
|
|
if (!ssl) {
|
|
return mrb_fixnum_value(0);
|
|
}
|
|
|
|
auto x = SSL_get_peer_certificate(ssl);
|
|
if (!x) {
|
|
return mrb_fixnum_value(0);
|
|
}
|
|
|
|
time_t t;
|
|
if (tls::get_x509_not_after(t, x) != 0) {
|
|
return mrb_fixnum_value(0);
|
|
}
|
|
|
|
return mrb_fixnum_value(t);
|
|
}
|
|
} // namespace
|
|
|
|
namespace {
|
|
mrb_value env_get_tls_cipher(mrb_state *mrb, mrb_value self) {
|
|
auto data = static_cast<MRubyAssocData *>(mrb->ud);
|
|
auto downstream = data->downstream;
|
|
auto upstream = downstream->get_upstream();
|
|
auto handler = upstream->get_client_handler();
|
|
auto ssl = handler->get_ssl();
|
|
|
|
if (!ssl) {
|
|
return mrb_str_new_static(mrb, "", 0);
|
|
}
|
|
|
|
return mrb_str_new_cstr(mrb, SSL_get_cipher_name(ssl));
|
|
}
|
|
} // namespace
|
|
|
|
namespace {
|
|
mrb_value env_get_tls_protocol(mrb_state *mrb, mrb_value self) {
|
|
auto data = static_cast<MRubyAssocData *>(mrb->ud);
|
|
auto downstream = data->downstream;
|
|
auto upstream = downstream->get_upstream();
|
|
auto handler = upstream->get_client_handler();
|
|
auto ssl = handler->get_ssl();
|
|
|
|
if (!ssl) {
|
|
return mrb_str_new_static(mrb, "", 0);
|
|
}
|
|
|
|
return mrb_str_new_cstr(mrb, nghttp2::tls::get_tls_protocol(ssl));
|
|
}
|
|
} // namespace
|
|
|
|
namespace {
|
|
mrb_value env_get_tls_session_id(mrb_state *mrb, mrb_value self) {
|
|
auto data = static_cast<MRubyAssocData *>(mrb->ud);
|
|
auto downstream = data->downstream;
|
|
auto upstream = downstream->get_upstream();
|
|
auto handler = upstream->get_client_handler();
|
|
auto ssl = handler->get_ssl();
|
|
|
|
if (!ssl) {
|
|
return mrb_str_new_static(mrb, "", 0);
|
|
}
|
|
|
|
auto session = SSL_get_session(ssl);
|
|
if (!session) {
|
|
return mrb_str_new_static(mrb, "", 0);
|
|
}
|
|
|
|
unsigned int session_id_length = 0;
|
|
auto session_id = SSL_SESSION_get_id(session, &session_id_length);
|
|
|
|
// TODO Use template version of util::format_hex.
|
|
auto &balloc = downstream->get_block_allocator();
|
|
auto id = util::format_hex(balloc, StringRef{session_id, session_id_length});
|
|
return mrb_str_new(mrb, id.c_str(), id.size());
|
|
}
|
|
} // namespace
|
|
|
|
namespace {
|
|
mrb_value env_get_tls_session_reused(mrb_state *mrb, mrb_value self) {
|
|
auto data = static_cast<MRubyAssocData *>(mrb->ud);
|
|
auto downstream = data->downstream;
|
|
auto upstream = downstream->get_upstream();
|
|
auto handler = upstream->get_client_handler();
|
|
auto ssl = handler->get_ssl();
|
|
|
|
if (!ssl) {
|
|
return mrb_false_value();
|
|
}
|
|
|
|
return SSL_session_reused(ssl) ? mrb_true_value() : mrb_false_value();
|
|
}
|
|
} // namespace
|
|
|
|
namespace {
|
|
mrb_value env_get_alpn(mrb_state *mrb, mrb_value self) {
|
|
auto data = static_cast<MRubyAssocData *>(mrb->ud);
|
|
auto downstream = data->downstream;
|
|
auto upstream = downstream->get_upstream();
|
|
auto handler = upstream->get_client_handler();
|
|
auto alpn = handler->get_alpn();
|
|
return mrb_str_new(mrb, alpn.c_str(), alpn.size());
|
|
}
|
|
} // namespace
|
|
|
|
namespace {
|
|
mrb_value env_get_tls_handshake_finished(mrb_state *mrb, mrb_value self) {
|
|
auto data = static_cast<MRubyAssocData *>(mrb->ud);
|
|
auto downstream = data->downstream;
|
|
auto upstream = downstream->get_upstream();
|
|
auto handler = upstream->get_client_handler();
|
|
auto conn = handler->get_connection();
|
|
return SSL_is_init_finished(conn->tls.ssl) ? mrb_true_value()
|
|
: mrb_false_value();
|
|
}
|
|
} // namespace
|
|
|
|
void init_env_class(mrb_state *mrb, RClass *module) {
|
|
auto env_class =
|
|
mrb_define_class_under(mrb, module, "Env", mrb->object_class);
|
|
|
|
mrb_define_method(mrb, env_class, "initialize", env_init, MRB_ARGS_NONE());
|
|
mrb_define_method(mrb, env_class, "req", env_get_req, MRB_ARGS_NONE());
|
|
mrb_define_method(mrb, env_class, "resp", env_get_resp, MRB_ARGS_NONE());
|
|
mrb_define_method(mrb, env_class, "ctx", env_get_ctx, MRB_ARGS_NONE());
|
|
mrb_define_method(mrb, env_class, "phase", env_get_phase, MRB_ARGS_NONE());
|
|
mrb_define_method(mrb, env_class, "remote_addr", env_get_remote_addr,
|
|
MRB_ARGS_NONE());
|
|
mrb_define_method(mrb, env_class, "server_addr", env_get_server_addr,
|
|
MRB_ARGS_NONE());
|
|
mrb_define_method(mrb, env_class, "server_port", env_get_server_port,
|
|
MRB_ARGS_NONE());
|
|
mrb_define_method(mrb, env_class, "tls_used", env_get_tls_used,
|
|
MRB_ARGS_NONE());
|
|
mrb_define_method(mrb, env_class, "tls_sni", env_get_tls_sni,
|
|
MRB_ARGS_NONE());
|
|
mrb_define_method(mrb, env_class, "tls_client_fingerprint_sha256",
|
|
env_get_tls_client_fingerprint_sha256, MRB_ARGS_NONE());
|
|
mrb_define_method(mrb, env_class, "tls_client_fingerprint_sha1",
|
|
env_get_tls_client_fingerprint_sha1, MRB_ARGS_NONE());
|
|
mrb_define_method(mrb, env_class, "tls_client_issuer_name",
|
|
env_get_tls_client_issuer_name, MRB_ARGS_NONE());
|
|
mrb_define_method(mrb, env_class, "tls_client_subject_name",
|
|
env_get_tls_client_subject_name, MRB_ARGS_NONE());
|
|
mrb_define_method(mrb, env_class, "tls_client_serial",
|
|
env_get_tls_client_serial, MRB_ARGS_NONE());
|
|
mrb_define_method(mrb, env_class, "tls_client_not_before",
|
|
env_get_tls_client_not_before, MRB_ARGS_NONE());
|
|
mrb_define_method(mrb, env_class, "tls_client_not_after",
|
|
env_get_tls_client_not_after, MRB_ARGS_NONE());
|
|
mrb_define_method(mrb, env_class, "tls_cipher", env_get_tls_cipher,
|
|
MRB_ARGS_NONE());
|
|
mrb_define_method(mrb, env_class, "tls_protocol", env_get_tls_protocol,
|
|
MRB_ARGS_NONE());
|
|
mrb_define_method(mrb, env_class, "tls_session_id", env_get_tls_session_id,
|
|
MRB_ARGS_NONE());
|
|
mrb_define_method(mrb, env_class, "tls_session_reused",
|
|
env_get_tls_session_reused, MRB_ARGS_NONE());
|
|
mrb_define_method(mrb, env_class, "alpn", env_get_alpn, MRB_ARGS_NONE());
|
|
mrb_define_method(mrb, env_class, "tls_handshake_finished",
|
|
env_get_tls_handshake_finished, MRB_ARGS_NONE());
|
|
}
|
|
|
|
} // namespace mruby
|
|
|
|
} // namespace shrpx
|