ranch_ssl.erl 8.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246
  1. %% Copyright (c) 2011-2018, Loïc Hoguin <essen@ninenines.eu>
  2. %%
  3. %% Permission to use, copy, modify, and/or distribute this software for any
  4. %% purpose with or without fee is hereby granted, provided that the above
  5. %% copyright notice and this permission notice appear in all copies.
  6. %%
  7. %% THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
  8. %% WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
  9. %% MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
  10. %% ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
  11. %% WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
  12. %% ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
  13. %% OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
  14. -module(ranch_ssl).
  15. -behaviour(ranch_transport).
  16. -export([name/0]).
  17. -export([secure/0]).
  18. -export([messages/0]).
  19. -export([listen/1]).
  20. -export([disallowed_listen_options/0]).
  21. -export([accept/2]).
  22. -export([handshake/3]).
  23. -export([connect/3]).
  24. -export([connect/4]).
  25. -export([recv/3]).
  26. -export([recv_proxy_header/2]).
  27. -export([send/2]).
  28. -export([sendfile/2]).
  29. -export([sendfile/4]).
  30. -export([sendfile/5]).
  31. -export([setopts/2]).
  32. -export([getopts/2]).
  33. -export([getstat/1]).
  34. -export([getstat/2]).
  35. -export([controlling_process/2]).
  36. -export([peername/1]).
  37. -export([sockname/1]).
  38. -export([shutdown/2]).
  39. -export([close/1]).
  40. -type ssl_opt() :: {alpn_preferred_protocols, [binary()]}
  41. | {beast_mitigation, one_n_minus_one | zero_n | disabled}
  42. | {cacertfile, file:filename()}
  43. | {cacerts, [public_key:der_encoded()]}
  44. | {cert, public_key:der_encoded()}
  45. | {certfile, file:filename()}
  46. | {ciphers, ssl:ciphers()}
  47. | {client_renegotiation, boolean()}
  48. | {crl_cache, [any()]}
  49. | {crl_check, boolean() | peer | best_effort}
  50. | {depth, integer()}
  51. | {dh, binary()}
  52. | {dhfile, file:filename()}
  53. %% @todo Update when ssl exports named_curve().
  54. | {eccs, [atom()]}
  55. | {fail_if_no_peer_cert, boolean()}
  56. | {hibernate_after, timeout()}
  57. | {honor_cipher_order, boolean()}
  58. | {honor_ecc_order, boolean()}
  59. | {key, ssl:key()}
  60. | {keyfile, file:filename()}
  61. | {log_alert, boolean()}
  62. | {log_level, logger:level()}
  63. | {max_handshake_size, integer()}
  64. | {next_protocols_advertised, [binary()]}
  65. | {padding_check, boolean()}
  66. | {partial_chain, fun()}
  67. | {password, string()}
  68. | {protocol, tls | dtls}
  69. | {psk_identity, string()}
  70. | {reuse_session, fun()}
  71. | {reuse_sessions, boolean()}
  72. | {secure_renegotiate, boolean()}
  73. | {signature_algs, [{ssl:hash(), ssl:sign_algo()}]}
  74. %% @todo Update when ssl exports sign_scheme().
  75. | {signature_algs_cert, [atom()]}
  76. | {sni_fun, fun()}
  77. | {sni_hosts, [{string(), ssl_opt()}]}
  78. | {user_lookup_fun, {fun(), any()}}
  79. | {verify, verify_none | verify_peer}
  80. | {verify_fun, {fun(), any()}}
  81. | {versions, [ssl:protocol_version()]}.
  82. -export_type([ssl_opt/0]).
  83. -type opt() :: ranch_tcp:opt() | ssl_opt().
  84. -export_type([opt/0]).
  85. -type opts() :: [opt()].
  86. -export_type([opts/0]).
  87. name() -> ssl.
  88. -spec secure() -> boolean().
  89. secure() ->
  90. true.
  91. messages() -> {ssl, ssl_closed, ssl_error, ssl_passive}.
  92. -spec listen(ranch:transport_opts(opts())) -> {ok, ssl:sslsocket()} | {error, atom()}.
  93. listen(TransOpts) ->
  94. SocketOpts = maps:get(socket_opts, TransOpts, []),
  95. case lists:keymember(cert, 1, SocketOpts)
  96. orelse lists:keymember(certfile, 1, SocketOpts)
  97. orelse lists:keymember(sni_fun, 1, SocketOpts)
  98. orelse lists:keymember(sni_hosts, 1, SocketOpts) of
  99. true ->
  100. Logger = maps:get(logger, TransOpts, logger),
  101. do_listen(SocketOpts, Logger);
  102. false ->
  103. {error, no_cert}
  104. end.
  105. do_listen(SocketOpts0, Logger) ->
  106. SocketOpts1 = ranch:set_option_default(SocketOpts0, backlog, 1024),
  107. SocketOpts2 = ranch:set_option_default(SocketOpts1, nodelay, true),
  108. SocketOpts3 = ranch:set_option_default(SocketOpts2, send_timeout, 30000),
  109. SocketOpts = ranch:set_option_default(SocketOpts3, send_timeout_close, true),
  110. %% We set the port to 0 because it is given in the Opts directly.
  111. %% The port in the options takes precedence over the one in the
  112. %% first argument.
  113. ssl:listen(0, ranch:filter_options(SocketOpts, disallowed_listen_options(),
  114. [binary, {active, false}, {packet, raw}, {reuseaddr, true}], Logger)).
  115. %% 'binary' and 'list' are disallowed but they are handled
  116. %% specifically as they do not have 2-tuple equivalents.
  117. disallowed_listen_options() ->
  118. [alpn_advertised_protocols, client_preferred_next_protocols,
  119. fallback, server_name_indication, srp_identity
  120. |ranch_tcp:disallowed_listen_options()].
  121. -spec accept(ssl:sslsocket(), timeout())
  122. -> {ok, ssl:sslsocket()} | {error, closed | timeout | atom()}.
  123. accept(LSocket, Timeout) ->
  124. ssl:transport_accept(LSocket, Timeout).
  125. -spec handshake(inet:socket() | ssl:sslsocket(), opts(), timeout())
  126. -> {ok, ssl:sslsocket()} | {error, any()}.
  127. handshake(CSocket, Opts, Timeout) ->
  128. case ssl:handshake(CSocket, Opts, Timeout) of
  129. {ok, NewSocket} ->
  130. {ok, NewSocket};
  131. Error = {error, _} ->
  132. Error
  133. end.
  134. %% @todo Probably filter Opts?
  135. -spec connect(inet:ip_address() | inet:hostname(),
  136. inet:port_number(), any())
  137. -> {ok, inet:socket()} | {error, atom()}.
  138. connect(Host, Port, Opts) when is_integer(Port) ->
  139. ssl:connect(Host, Port,
  140. Opts ++ [binary, {active, false}, {packet, raw}]).
  141. %% @todo Probably filter Opts?
  142. -spec connect(inet:ip_address() | inet:hostname(),
  143. inet:port_number(), any(), timeout())
  144. -> {ok, inet:socket()} | {error, atom()}.
  145. connect(Host, Port, Opts, Timeout) when is_integer(Port) ->
  146. ssl:connect(Host, Port,
  147. Opts ++ [binary, {active, false}, {packet, raw}],
  148. Timeout).
  149. -spec recv(ssl:sslsocket(), non_neg_integer(), timeout())
  150. -> {ok, any()} | {error, closed | atom()}.
  151. recv(Socket, Length, Timeout) ->
  152. ssl:recv(Socket, Length, Timeout).
  153. -spec recv_proxy_header(ssl:sslsocket(), timeout())
  154. -> {ok, ranch_proxy_header:proxy_info()}
  155. | {error, closed | atom()}
  156. | {error, protocol_error, atom()}.
  157. recv_proxy_header(SSLSocket, Timeout) ->
  158. %% There's currently no documented way to perform a TCP recv
  159. %% on an sslsocket(), even before the TLS handshake. However
  160. %% nothing prevents us from retrieving the TCP socket and using
  161. %% it. Since it's an undocumented interface this may however
  162. %% make forward-compatibility more difficult.
  163. {sslsocket, {gen_tcp, TCPSocket, _, _}, _} = SSLSocket,
  164. ranch_tcp:recv_proxy_header(TCPSocket, Timeout).
  165. -spec send(ssl:sslsocket(), iodata()) -> ok | {error, atom()}.
  166. send(Socket, Packet) ->
  167. ssl:send(Socket, Packet).
  168. -spec sendfile(ssl:sslsocket(), file:name_all() | file:fd())
  169. -> {ok, non_neg_integer()} | {error, atom()}.
  170. sendfile(Socket, Filename) ->
  171. sendfile(Socket, Filename, 0, 0, []).
  172. -spec sendfile(ssl:sslsocket(), file:name_all() | file:fd(),
  173. non_neg_integer(), non_neg_integer())
  174. -> {ok, non_neg_integer()} | {error, atom()}.
  175. sendfile(Socket, File, Offset, Bytes) ->
  176. sendfile(Socket, File, Offset, Bytes, []).
  177. %% Unlike with TCP, no syscall can be used here, so sending files
  178. %% through SSL will be much slower in comparison. Note that unlike
  179. %% file:sendfile/5 this function accepts either a file or a file name.
  180. -spec sendfile(ssl:sslsocket(), file:name_all() | file:fd(),
  181. non_neg_integer(), non_neg_integer(), ranch_transport:sendfile_opts())
  182. -> {ok, non_neg_integer()} | {error, atom()}.
  183. sendfile(Socket, File, Offset, Bytes, Opts) ->
  184. ranch_transport:sendfile(?MODULE, Socket, File, Offset, Bytes, Opts).
  185. %% @todo Probably filter Opts?
  186. -spec setopts(ssl:sslsocket(), list()) -> ok | {error, atom()}.
  187. setopts(Socket, Opts) ->
  188. ssl:setopts(Socket, Opts).
  189. -spec getopts(ssl:sslsocket(), [atom()]) -> {ok, list()} | {error, atom()}.
  190. getopts(Socket, Opts) ->
  191. ssl:getopts(Socket, Opts).
  192. -spec getstat(ssl:sslsocket()) -> {ok, list()} | {error, atom()}.
  193. getstat(Socket) ->
  194. ssl:getstat(Socket).
  195. -spec getstat(ssl:sslsocket(), [atom()]) -> {ok, list()} | {error, atom()}.
  196. getstat(Socket, OptionNames) ->
  197. ssl:getstat(Socket, OptionNames).
  198. -spec controlling_process(ssl:sslsocket(), pid())
  199. -> ok | {error, closed | not_owner | atom()}.
  200. controlling_process(Socket, Pid) ->
  201. ssl:controlling_process(Socket, Pid).
  202. -spec peername(ssl:sslsocket())
  203. -> {ok, {inet:ip_address(), inet:port_number()} | {local, binary()}} | {error, atom()}.
  204. peername(Socket) ->
  205. ssl:peername(Socket).
  206. -spec sockname(ssl:sslsocket())
  207. -> {ok, {inet:ip_address(), inet:port_number()} | {local, binary()}} | {error, atom()}.
  208. sockname(Socket) ->
  209. ssl:sockname(Socket).
  210. -spec shutdown(ssl:sslsocket(), read | write | read_write)
  211. -> ok | {error, atom()}.
  212. shutdown(Socket, How) ->
  213. ssl:shutdown(Socket, How).
  214. -spec close(ssl:sslsocket()) -> ok.
  215. close(Socket) ->
  216. ssl:close(Socket).