blob: fcec559086fb5fd09186be778ec1df5d13ff4888 [file] [log] [blame]
/** @file
SSLNextProtocolAccept
@section license License
Licensed to the Apache Software Foundation (ASF) under one
or more contributor license agreements. See the NOTICE file
distributed with this work for additional information
regarding copyright ownership. The ASF licenses this file
to you under the Apache License, Version 2.0 (the
"License"); you may not use this file except in compliance
with the License. You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/
#include "P_SSLNextProtocolAccept.h"
#include "P_SSLNetVConnection.h"
static void
send_plugin_event(Continuation *plugin, int event, void *edata)
{
if (plugin->mutex) {
SCOPED_MUTEX_LOCK(lock, plugin->mutex, this_ethread());
plugin->handleEvent(event, edata);
} else {
plugin->handleEvent(event, edata);
}
}
static SSLNetVConnection *
ssl_netvc_cast(int event, void *edata)
{
union {
VIO *vio;
NetVConnection *vc;
} ptr;
switch (event) {
case NET_EVENT_ACCEPT:
ptr.vc = static_cast<NetVConnection *>(edata);
return dynamic_cast<SSLNetVConnection *>(ptr.vc);
case VC_EVENT_INACTIVITY_TIMEOUT:
case VC_EVENT_READ_COMPLETE:
case VC_EVENT_ERROR:
ptr.vio = static_cast<VIO *>(edata);
return dynamic_cast<SSLNetVConnection *>(ptr.vio->vc_server);
default:
return nullptr;
}
}
// SSLNextProtocolTrampoline is the receiver of the I/O event generated when we perform a 0-length read on the new SSL
// connection. The 0-length read forces the SSL handshake, which allows us to bind an endpoint that is selected by the
// NPN extension. The Continuation that receives the read event *must* have a mutex, but we don't want to take a global
// lock across the handshake, so we make a trampoline to bounce the event from the SSL acceptor to the ultimate session
// acceptor.
struct SSLNextProtocolTrampoline : public Continuation {
SSLNextProtocolTrampoline(const SSLNextProtocolAccept *npn, Ptr<ProxyMutex> &mutex) : Continuation(mutex), npnParent(npn)
{
SET_HANDLER(&SSLNextProtocolTrampoline::ioCompletionEvent);
}
int
ioCompletionEvent(int event, void *edata)
{
VIO *vio;
SSLNetVConnection *netvc;
vio = static_cast<VIO *>(edata);
netvc = dynamic_cast<SSLNetVConnection *>(vio->vc_server);
ink_assert(netvc != nullptr);
switch (event) {
case VC_EVENT_EOS:
case VC_EVENT_ERROR:
case VC_EVENT_ACTIVE_TIMEOUT:
case VC_EVENT_INACTIVITY_TIMEOUT:
netvc->do_io_close();
delete this;
return EVENT_ERROR;
case VC_EVENT_READ_COMPLETE:
break;
default:
return EVENT_ERROR;
}
// Cancel the action, so later timeouts and errors don't try to
// send the event to the Accept object. After this point, the accept
// object does not care.
netvc->set_action(nullptr);
Continuation *endpoint_cont = netvc->endpoint();
if (!endpoint_cont) {
// Route to the default endpoint
endpoint_cont = npnParent->endpoint;
}
if (endpoint_cont) {
// disable read io, send events to endpoint
netvc->do_io_read(endpoint_cont, 0, nullptr);
send_plugin_event(endpoint_cont, NET_EVENT_ACCEPT, netvc);
} else {
// No handler, what should we do? Best to just kill the VC while we can.
netvc->do_io_close();
}
delete this;
return EVENT_CONT;
}
const SSLNextProtocolAccept *npnParent;
};
int
SSLNextProtocolAccept::mainEvent(int event, void *edata)
{
SSLNetVConnection *netvc = ssl_netvc_cast(event, edata);
Debug("ssl", "[SSLNextProtocolAccept:mainEvent] event %d netvc %p", event, netvc);
switch (event) {
case NET_EVENT_ACCEPT:
ink_release_assert(netvc != nullptr);
netvc->setTransparentPassThrough(transparent_passthrough);
// Register our protocol set with the VC and kick off a zero-length read to
// force the SSLNetVConnection to complete the SSL handshake. Don't tell
// the endpoint that there is an accept to handle until the read completes
// and we know which protocol was negotiated.
netvc->registerNextProtocolSet(&this->protoset, this->protoenabled);
netvc->do_io_read(new SSLNextProtocolTrampoline(this, netvc->mutex), 0, this->buffer);
return EVENT_CONT;
default:
if (netvc) {
netvc->do_io_close();
}
return EVENT_DONE;
}
}
bool
SSLNextProtocolAccept::accept(NetVConnection *, MIOBuffer *, IOBufferReader *)
{
ink_release_assert(0);
return false;
}
bool
SSLNextProtocolAccept::registerEndpoint(const char *protocol, Continuation *handler)
{
return this->protoset.registerEndpoint(protocol, handler);
}
void
SSLNextProtocolAccept::enableProtocols(const SessionProtocolSet &protos)
{
this->protoenabled = protos;
}
SSLNextProtocolAccept::SSLNextProtocolAccept(Continuation *ep, bool transparent_passthrough)
: SessionAccept(nullptr),
buffer(new_empty_MIOBuffer(SSLConfigParams::ssl_misc_max_iobuffer_size_index)),
endpoint(ep),
transparent_passthrough(transparent_passthrough)
{
SET_HANDLER(&SSLNextProtocolAccept::mainEvent);
}
SSLNextProtocolSet *
SSLNextProtocolAccept::getProtoSet()
{
return &this->protoset;
}
SSLNextProtocolAccept::~SSLNextProtocolAccept()
{
free_MIOBuffer(this->buffer);
}