puma 3.11.1 → 6.6.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (98) hide show
  1. checksums.yaml +5 -5
  2. data/History.md +2092 -422
  3. data/LICENSE +23 -20
  4. data/README.md +301 -69
  5. data/bin/puma-wild +3 -9
  6. data/docs/architecture.md +59 -21
  7. data/docs/compile_options.md +55 -0
  8. data/docs/deployment.md +69 -58
  9. data/docs/fork_worker.md +41 -0
  10. data/docs/java_options.md +54 -0
  11. data/docs/jungle/README.md +9 -0
  12. data/docs/jungle/rc.d/README.md +74 -0
  13. data/docs/jungle/rc.d/puma +61 -0
  14. data/docs/jungle/rc.d/puma.conf +10 -0
  15. data/docs/kubernetes.md +78 -0
  16. data/docs/nginx.md +2 -2
  17. data/docs/plugins.md +26 -12
  18. data/docs/rails_dev_mode.md +28 -0
  19. data/docs/restart.md +48 -22
  20. data/docs/signals.md +13 -11
  21. data/docs/stats.md +147 -0
  22. data/docs/systemd.md +108 -117
  23. data/docs/testing_benchmarks_local_files.md +150 -0
  24. data/docs/testing_test_rackup_ci_files.md +36 -0
  25. data/ext/puma_http11/PumaHttp11Service.java +2 -2
  26. data/ext/puma_http11/ext_help.h +1 -1
  27. data/ext/puma_http11/extconf.rb +68 -3
  28. data/ext/puma_http11/http11_parser.c +106 -118
  29. data/ext/puma_http11/http11_parser.h +2 -2
  30. data/ext/puma_http11/http11_parser.java.rl +22 -38
  31. data/ext/puma_http11/http11_parser.rl +6 -4
  32. data/ext/puma_http11/http11_parser_common.rl +6 -6
  33. data/ext/puma_http11/mini_ssl.c +474 -94
  34. data/ext/puma_http11/no_ssl/PumaHttp11Service.java +15 -0
  35. data/ext/puma_http11/org/jruby/puma/Http11.java +136 -121
  36. data/ext/puma_http11/org/jruby/puma/Http11Parser.java +84 -99
  37. data/ext/puma_http11/org/jruby/puma/MiniSSL.java +251 -88
  38. data/ext/puma_http11/puma_http11.c +53 -58
  39. data/lib/puma/app/status.rb +71 -49
  40. data/lib/puma/binder.rb +257 -151
  41. data/lib/puma/cli.rb +61 -38
  42. data/lib/puma/client.rb +464 -224
  43. data/lib/puma/cluster/worker.rb +183 -0
  44. data/lib/puma/cluster/worker_handle.rb +96 -0
  45. data/lib/puma/cluster.rb +343 -239
  46. data/lib/puma/commonlogger.rb +23 -14
  47. data/lib/puma/configuration.rb +144 -96
  48. data/lib/puma/const.rb +194 -115
  49. data/lib/puma/control_cli.rb +135 -81
  50. data/lib/puma/detect.rb +34 -2
  51. data/lib/puma/dsl.rb +1092 -153
  52. data/lib/puma/error_logger.rb +113 -0
  53. data/lib/puma/events.rb +17 -111
  54. data/lib/puma/io_buffer.rb +44 -5
  55. data/lib/puma/jruby_restart.rb +2 -73
  56. data/lib/puma/json_serialization.rb +96 -0
  57. data/lib/puma/launcher/bundle_pruner.rb +104 -0
  58. data/lib/puma/launcher.rb +205 -138
  59. data/lib/puma/log_writer.rb +147 -0
  60. data/lib/puma/minissl/context_builder.rb +96 -0
  61. data/lib/puma/minissl.rb +279 -70
  62. data/lib/puma/null_io.rb +61 -2
  63. data/lib/puma/plugin/systemd.rb +90 -0
  64. data/lib/puma/plugin/tmp_restart.rb +3 -1
  65. data/lib/puma/plugin.rb +9 -13
  66. data/lib/puma/rack/builder.rb +10 -11
  67. data/lib/puma/rack/urlmap.rb +3 -1
  68. data/lib/puma/rack_default.rb +21 -4
  69. data/lib/puma/reactor.rb +97 -185
  70. data/lib/puma/request.rb +688 -0
  71. data/lib/puma/runner.rb +114 -69
  72. data/lib/puma/sd_notify.rb +146 -0
  73. data/lib/puma/server.rb +409 -704
  74. data/lib/puma/single.rb +29 -72
  75. data/lib/puma/state_file.rb +48 -9
  76. data/lib/puma/thread_pool.rb +234 -93
  77. data/lib/puma/util.rb +23 -10
  78. data/lib/puma.rb +68 -5
  79. data/lib/rack/handler/puma.rb +119 -86
  80. data/tools/Dockerfile +16 -0
  81. data/tools/trickletest.rb +0 -1
  82. metadata +55 -33
  83. data/ext/puma_http11/io_buffer.c +0 -155
  84. data/lib/puma/accept_nonblock.rb +0 -23
  85. data/lib/puma/compat.rb +0 -14
  86. data/lib/puma/convenient.rb +0 -23
  87. data/lib/puma/daemon_ext.rb +0 -31
  88. data/lib/puma/delegation.rb +0 -11
  89. data/lib/puma/java_io_buffer.rb +0 -45
  90. data/lib/puma/rack/backports/uri/common_193.rb +0 -33
  91. data/lib/puma/tcp_logger.rb +0 -39
  92. data/tools/jungle/README.md +0 -13
  93. data/tools/jungle/init.d/README.md +0 -59
  94. data/tools/jungle/init.d/puma +0 -421
  95. data/tools/jungle/init.d/run-puma +0 -18
  96. data/tools/jungle/upstart/README.md +0 -61
  97. data/tools/jungle/upstart/puma-manager.conf +0 -31
  98. data/tools/jungle/upstart/puma.conf +0 -69
@@ -0,0 +1,96 @@
1
+ module Puma
2
+ module MiniSSL
3
+ class ContextBuilder
4
+ def initialize(params, log_writer)
5
+ @params = params
6
+ @log_writer = log_writer
7
+ end
8
+
9
+ def context
10
+ ctx = MiniSSL::Context.new
11
+
12
+ if defined?(JRUBY_VERSION)
13
+ unless params['keystore']
14
+ log_writer.error "Please specify the Java keystore via 'keystore='"
15
+ end
16
+
17
+ ctx.keystore = params['keystore']
18
+
19
+ unless params['keystore-pass']
20
+ log_writer.error "Please specify the Java keystore password via 'keystore-pass='"
21
+ end
22
+
23
+ ctx.keystore_pass = params['keystore-pass']
24
+ ctx.keystore_type = params['keystore-type']
25
+
26
+ if truststore = params['truststore']
27
+ ctx.truststore = truststore.eql?('default') ? :default : truststore
28
+ ctx.truststore_pass = params['truststore-pass']
29
+ ctx.truststore_type = params['truststore-type']
30
+ end
31
+
32
+ ctx.cipher_suites = params['cipher_suites'] || params['ssl_cipher_list']
33
+ ctx.protocols = params['protocols'] if params['protocols']
34
+ else
35
+ if params['key'].nil? && params['key_pem'].nil?
36
+ log_writer.error "Please specify the SSL key via 'key=' or 'key_pem='"
37
+ end
38
+
39
+ ctx.key = params['key'] if params['key']
40
+ ctx.key_pem = params['key_pem'] if params['key_pem']
41
+ ctx.key_password_command = params['key_password_command'] if params['key_password_command']
42
+
43
+ if params['cert'].nil? && params['cert_pem'].nil?
44
+ log_writer.error "Please specify the SSL cert via 'cert=' or 'cert_pem='"
45
+ end
46
+
47
+ ctx.cert = params['cert'] if params['cert']
48
+ ctx.cert_pem = params['cert_pem'] if params['cert_pem']
49
+
50
+ if ['peer', 'force_peer'].include?(params['verify_mode'])
51
+ unless params['ca']
52
+ log_writer.error "Please specify the SSL ca via 'ca='"
53
+ end
54
+ # needed for Puma::MiniSSL::Socket#peercert, env['puma.peercert']
55
+ require 'openssl'
56
+ end
57
+
58
+ ctx.ca = params['ca'] if params['ca']
59
+ ctx.ssl_cipher_filter = params['ssl_cipher_filter'] if params['ssl_cipher_filter']
60
+ ctx.ssl_ciphersuites = params['ssl_ciphersuites'] if params['ssl_ciphersuites'] && HAS_TLS1_3
61
+
62
+ ctx.reuse = params['reuse'] if params['reuse']
63
+ end
64
+
65
+ ctx.no_tlsv1 = params['no_tlsv1'] == 'true'
66
+ ctx.no_tlsv1_1 = params['no_tlsv1_1'] == 'true'
67
+
68
+ if params['verify_mode']
69
+ ctx.verify_mode = case params['verify_mode']
70
+ when "peer"
71
+ MiniSSL::VERIFY_PEER
72
+ when "force_peer"
73
+ MiniSSL::VERIFY_PEER | MiniSSL::VERIFY_FAIL_IF_NO_PEER_CERT
74
+ when "none"
75
+ MiniSSL::VERIFY_NONE
76
+ else
77
+ log_writer.error "Please specify a valid verify_mode="
78
+ MiniSSL::VERIFY_NONE
79
+ end
80
+ end
81
+
82
+ if params['verification_flags']
83
+ ctx.verification_flags = params['verification_flags'].split(',').
84
+ map { |flag| MiniSSL::VERIFICATION_FLAGS.fetch(flag) }.
85
+ inject { |sum, flag| sum ? sum | flag : flag }
86
+ end
87
+
88
+ ctx
89
+ end
90
+
91
+ private
92
+
93
+ attr_reader :params, :log_writer
94
+ end
95
+ end
96
+ end
data/lib/puma/minissl.rb CHANGED
@@ -1,21 +1,62 @@
1
+ # frozen_string_literal: true
2
+
1
3
  begin
2
- require 'io/wait'
3
- rescue LoadError
4
+ require 'io/wait' unless Puma::HAS_NATIVE_IO_WAIT
5
+ rescue LoadError
4
6
  end
5
7
 
8
+ require 'open3'
9
+ # need for Puma::MiniSSL::OPENSSL constants used in `HAS_TLS1_3`
10
+ # use require, see https://github.com/puma/puma/pull/2381
11
+ require 'puma/puma_http11'
12
+
6
13
  module Puma
7
14
  module MiniSSL
15
+ # Define constant at runtime, as it's easy to determine at built time,
16
+ # but Puma could (it shouldn't) be loaded with an older OpenSSL version
17
+ # @version 5.0.0
18
+ HAS_TLS1_3 = IS_JRUBY ||
19
+ ((OPENSSL_VERSION[/ \d+\.\d+\.\d+/].split('.').map(&:to_i) <=> [1,1,1]) != -1 &&
20
+ (OPENSSL_LIBRARY_VERSION[/ \d+\.\d+\.\d+/].split('.').map(&:to_i) <=> [1,1,1]) !=-1)
21
+
8
22
  class Socket
9
23
  def initialize(socket, engine)
10
24
  @socket = socket
11
25
  @engine = engine
12
26
  @peercert = nil
27
+ @reuse = nil
13
28
  end
14
29
 
30
+ # @!attribute [r] to_io
15
31
  def to_io
16
32
  @socket
17
33
  end
18
34
 
35
+ def closed?
36
+ @socket.closed?
37
+ end
38
+
39
+ # Returns a two element array,
40
+ # first is protocol version (SSL_get_version),
41
+ # second is 'handshake' state (SSL_state_string)
42
+ #
43
+ # Used for dropping tcp connections to ssl.
44
+ # See OpenSSL ssl/ssl_stat.c SSL_state_string for info
45
+ # @!attribute [r] ssl_version_state
46
+ # @version 5.0.0
47
+ #
48
+ def ssl_version_state
49
+ IS_JRUBY ? [nil, nil] : @engine.ssl_vers_st
50
+ end
51
+
52
+ # Used to check the handshake status, in particular when a TCP connection
53
+ # is made with TLSv1.3 as an available protocol
54
+ # @version 5.0.0
55
+ def bad_tlsv1_3?
56
+ HAS_TLS1_3 && ssl_version_state == ['TLSv1.3', 'SSLERR']
57
+ end
58
+ private :bad_tlsv1_3?
59
+
19
60
  def readpartial(size)
20
61
  while true
21
62
  output = @engine.read
@@ -48,22 +89,22 @@ module Puma
48
89
  output = engine_read_all
49
90
  return output if output
50
91
 
51
- begin
52
- data = @socket.read_nonblock(size, exception: false)
53
- if data == :wait_readable || data == :wait_writable
54
- if @socket.to_io.respond_to?(data)
55
- @socket.to_io.__send__(data)
56
- elsif data == :wait_readable
57
- IO.select([@socket.to_io])
58
- else
59
- IO.select(nil, [@socket.to_io])
60
- end
61
- elsif !data
62
- return nil
63
- else
64
- break
65
- end
66
- end while true
92
+ data = @socket.read_nonblock(size, exception: false)
93
+ if data == :wait_readable || data == :wait_writable
94
+ # It would make more sense to let @socket.read_nonblock raise
95
+ # EAGAIN if necessary but it seems like it'll misbehave on Windows.
96
+ # I don't have a Windows machine to debug this so I can't explain
97
+ # exactly whats happening in that OS. Please let me know if you
98
+ # find out!
99
+ #
100
+ # In the meantime, we can emulate the correct behavior by
101
+ # capturing :wait_readable & :wait_writable and raising EAGAIN
102
+ # ourselves.
103
+ raise IO::EAGAINWaitReadable
104
+ elsif data.nil?
105
+ raise SSLError.exception "HTTP connection?" if bad_tlsv1_3?
106
+ return nil
107
+ end
67
108
 
68
109
  @engine.inject(data)
69
110
  output = engine_read_all
@@ -77,22 +118,25 @@ module Puma
77
118
  end
78
119
 
79
120
  def write(data)
80
- need = data.bytesize
121
+ return 0 if data.empty?
122
+
123
+ data_size = data.bytesize
124
+ need = data_size
81
125
 
82
126
  while true
83
127
  wrote = @engine.write data
84
- enc = @engine.extract
85
128
 
86
- while enc
87
- @socket.write enc
88
- enc = @engine.extract
129
+ enc_wr = +''
130
+ while (enc = @engine.extract)
131
+ enc_wr << enc
89
132
  end
133
+ @socket.write enc_wr unless enc_wr.empty?
90
134
 
91
135
  need -= wrote
92
136
 
93
- return data.bytesize if need == 0
137
+ return data_size if need == 0
94
138
 
95
- data = data[wrote..-1]
139
+ data = data.byteslice(wrote..-1)
96
140
  end
97
141
  end
98
142
 
@@ -100,14 +144,18 @@ module Puma
100
144
  alias_method :<<, :write
101
145
 
102
146
  # This is a temporary fix to deal with websockets code using
103
- # write_nonblock. The problem with implementing it properly
147
+ # write_nonblock.
148
+
149
+ # The problem with implementing it properly
104
150
  # is that it means we'd have to have the ability to rewind
105
151
  # an engine because after we write+extract, the socket
106
152
  # write_nonblock call might raise an exception and later
107
153
  # code would pass the same data in, but the engine would think
108
- # it had already written the data in. So for the time being
109
- # (and since write blocking is quite rare), go ahead and actually
110
- # block in write_nonblock.
154
+ # it had already written the data in.
155
+ #
156
+ # So for the time being (and since write blocking is quite rare),
157
+ # go ahead and actually block in write_nonblock.
158
+ #
111
159
  def write_nonblock(data, *_)
112
160
  write data
113
161
  end
@@ -116,39 +164,32 @@ module Puma
116
164
  @socket.flush
117
165
  end
118
166
 
119
- def read_and_drop(timeout = 1)
120
- return :timeout unless IO.select([@socket], nil, nil, timeout)
121
- read_nonblock(1024)
122
- :drop
123
- rescue Errno::EAGAIN
124
- # do nothing
125
- :eagain
126
- end
127
-
128
- def should_drop_bytes?
129
- @engine.init? || !@engine.shutdown
130
- end
131
-
132
167
  def close
133
168
  begin
134
- # Read any drop any partially initialized sockets and any received bytes during shutdown.
135
- # Don't let this socket hold this loop forever.
136
- # If it can't send more packets within 1s, then give up.
137
- while should_drop_bytes?
138
- return if read_and_drop(1) == :timeout
169
+ unless @engine.shutdown
170
+ while alert_data = @engine.extract
171
+ @socket.write alert_data
172
+ end
139
173
  end
140
174
  rescue IOError, SystemCallError
141
- Thread.current.purge_interrupt_queue if Thread.current.respond_to? :purge_interrupt_queue
175
+ Puma::Util.purge_interrupt_queue
142
176
  # nothing
143
177
  ensure
144
178
  @socket.close
145
179
  end
146
180
  end
147
181
 
182
+ # @!attribute [r] peeraddr
148
183
  def peeraddr
149
184
  @socket.peeraddr
150
185
  end
151
186
 
187
+ # OpenSSL is loaded in `MiniSSL::ContextBuilder` when
188
+ # `MiniSSL::Context#verify_mode` is not `VERIFY_NONE`.
189
+ # When `VERIFY_NONE`, `MiniSSL::Engine#peercert` is nil, regardless of
190
+ # whether the client sends a cert.
191
+ # @return [OpenSSL::X509::Certificate, nil]
192
+ # @!attribute [r] peercert
152
193
  def peercert
153
194
  return @peercert if @peercert
154
195
 
@@ -159,91 +200,259 @@ module Puma
159
200
  end
160
201
  end
161
202
 
162
- if defined?(JRUBY_VERSION)
163
- class SSLError < StandardError
164
- # Define this for jruby even though it isn't used.
165
- end
166
-
167
- def self.check; end
203
+ if IS_JRUBY
204
+ OPENSSL_NO_SSL3 = false
205
+ OPENSSL_NO_TLS1 = false
168
206
  end
169
207
 
170
208
  class Context
171
209
  attr_accessor :verify_mode
210
+ attr_reader :no_tlsv1, :no_tlsv1_1
211
+
212
+ def initialize
213
+ @no_tlsv1 = false
214
+ @no_tlsv1_1 = false
215
+ @key = nil
216
+ @cert = nil
217
+ @key_pem = nil
218
+ @cert_pem = nil
219
+ @reuse = nil
220
+ @reuse_cache_size = nil
221
+ @reuse_timeout = nil
222
+ end
223
+
224
+ def check_file(file, desc)
225
+ raise ArgumentError, "#{desc} file '#{file}' does not exist" unless File.exist? file
226
+ raise ArgumentError, "#{desc} file '#{file}' is not readable" unless File.readable? file
227
+ end
172
228
 
173
- if defined?(JRUBY_VERSION)
229
+ if IS_JRUBY
174
230
  # jruby-specific Context properties: java uses a keystore and password pair rather than a cert/key pair
175
231
  attr_reader :keystore
232
+ attr_reader :keystore_type
176
233
  attr_accessor :keystore_pass
234
+ attr_reader :truststore
235
+ attr_reader :truststore_type
236
+ attr_accessor :truststore_pass
237
+ attr_reader :cipher_suites
238
+ attr_reader :protocols
177
239
 
178
240
  def keystore=(keystore)
179
- raise ArgumentError, "No such keystore file '#{keystore}'" unless File.exist? keystore
241
+ check_file keystore, 'Keystore'
180
242
  @keystore = keystore
181
243
  end
182
244
 
245
+ def truststore=(truststore)
246
+ # NOTE: historically truststore was assumed the same as keystore, this is kept for backwards
247
+ # compatibility, to rely on JVM's trust defaults we allow setting `truststore = :default`
248
+ unless truststore.eql?(:default)
249
+ raise ArgumentError, "No such truststore file '#{truststore}'" unless File.exist?(truststore)
250
+ end
251
+ @truststore = truststore
252
+ end
253
+
254
+ def keystore_type=(type)
255
+ raise ArgumentError, "Invalid keystore type: #{type.inspect}" unless ['pkcs12', 'jks', nil].include?(type)
256
+ @keystore_type = type
257
+ end
258
+
259
+ def truststore_type=(type)
260
+ raise ArgumentError, "Invalid truststore type: #{type.inspect}" unless ['pkcs12', 'jks', nil].include?(type)
261
+ @truststore_type = type
262
+ end
263
+
264
+ def cipher_suites=(list)
265
+ list = list.split(',').map(&:strip) if list.is_a?(String)
266
+ @cipher_suites = list
267
+ end
268
+
269
+ # aliases for backwards compatibility
270
+ alias_method :ssl_cipher_list, :cipher_suites
271
+ alias_method :ssl_cipher_list=, :cipher_suites=
272
+
273
+ def protocols=(list)
274
+ list = list.split(',').map(&:strip) if list.is_a?(String)
275
+ @protocols = list
276
+ end
277
+
183
278
  def check
184
279
  raise "Keystore not configured" unless @keystore
280
+ # @truststore defaults to @keystore due backwards compatibility
185
281
  end
186
282
 
187
283
  else
188
284
  # non-jruby Context properties
189
285
  attr_reader :key
286
+ attr_reader :key_password_command
190
287
  attr_reader :cert
191
288
  attr_reader :ca
289
+ attr_reader :cert_pem
290
+ attr_reader :key_pem
291
+ attr_accessor :ssl_cipher_filter
292
+ attr_accessor :ssl_ciphersuites
293
+ attr_accessor :verification_flags
294
+
295
+ attr_reader :reuse, :reuse_cache_size, :reuse_timeout
192
296
 
193
297
  def key=(key)
194
- raise ArgumentError, "No such key file '#{key}'" unless File.exist? key
298
+ check_file key, 'Key'
195
299
  @key = key
196
300
  end
197
301
 
302
+ def key_password_command=(key_password_command)
303
+ @key_password_command = key_password_command
304
+ end
305
+
198
306
  def cert=(cert)
199
- raise ArgumentError, "No such cert file '#{cert}'" unless File.exist? cert
307
+ check_file cert, 'Cert'
200
308
  @cert = cert
201
309
  end
202
310
 
203
311
  def ca=(ca)
204
- raise ArgumentError, "No such ca file '#{ca}'" unless File.exist? ca
312
+ check_file ca, 'ca'
205
313
  @ca = ca
206
314
  end
207
315
 
316
+ def cert_pem=(cert_pem)
317
+ raise ArgumentError, "'cert_pem' is not a String" unless cert_pem.is_a? String
318
+ @cert_pem = cert_pem
319
+ end
320
+
321
+ def key_pem=(key_pem)
322
+ raise ArgumentError, "'key_pem' is not a String" unless key_pem.is_a? String
323
+ @key_pem = key_pem
324
+ end
325
+
208
326
  def check
209
- raise "Key not configured" unless @key
210
- raise "Cert not configured" unless @cert
327
+ raise "Key not configured" if @key.nil? && @key_pem.nil?
328
+ raise "Cert not configured" if @cert.nil? && @cert_pem.nil?
329
+ end
330
+
331
+ # Executes the command to return the password needed to decrypt the key.
332
+ def key_password
333
+ raise "Key password command not configured" if @key_password_command.nil?
334
+
335
+ stdout_str, stderr_str, status = Open3.capture3(@key_password_command)
336
+
337
+ return stdout_str.chomp if status.success?
338
+
339
+ raise "Key password failed with code #{status.exitstatus}: #{stderr_str}"
211
340
  end
341
+
342
+ # Controls session reuse. Allowed values are as follows:
343
+ # * 'off' - matches the behavior of Puma 5.6 and earlier. This is included
344
+ # in case reuse 'on' is made the default in future Puma versions.
345
+ # * 'dflt' - sets session reuse on, with OpenSSL default cache size of
346
+ # 20k and default timeout of 300 seconds.
347
+ # * 's,t' - where s and t are integer strings, for size and timeout.
348
+ # * 's' - where s is an integer strings for size.
349
+ # * ',t' - where t is an integer strings for timeout.
350
+ #
351
+ def reuse=(reuse_str)
352
+ case reuse_str
353
+ when 'off'
354
+ @reuse = nil
355
+ when 'dflt'
356
+ @reuse = true
357
+ when /\A\d+\z/
358
+ @reuse = true
359
+ @reuse_cache_size = reuse_str.to_i
360
+ when /\A\d+,\d+\z/
361
+ @reuse = true
362
+ size, time = reuse_str.split ','
363
+ @reuse_cache_size = size.to_i
364
+ @reuse_timeout = time.to_i
365
+ when /\A,\d+\z/
366
+ @reuse = true
367
+ @reuse_timeout = reuse_str.delete(',').to_i
368
+ end
369
+ end
370
+ end
371
+
372
+ # disables TLSv1
373
+ # @!attribute [w] no_tlsv1=
374
+ def no_tlsv1=(tlsv1)
375
+ raise ArgumentError, "Invalid value of no_tlsv1=" unless ['true', 'false', true, false].include?(tlsv1)
376
+ @no_tlsv1 = tlsv1
212
377
  end
378
+
379
+ # disables TLSv1 and TLSv1.1. Overrides `#no_tlsv1=`
380
+ # @!attribute [w] no_tlsv1_1=
381
+ def no_tlsv1_1=(tlsv1_1)
382
+ raise ArgumentError, "Invalid value of no_tlsv1_1=" unless ['true', 'false', true, false].include?(tlsv1_1)
383
+ @no_tlsv1_1 = tlsv1_1
384
+ end
385
+
213
386
  end
214
387
 
215
388
  VERIFY_NONE = 0
216
389
  VERIFY_PEER = 1
217
390
  VERIFY_FAIL_IF_NO_PEER_CERT = 2
218
391
 
392
+ # https://github.com/openssl/openssl/blob/master/include/openssl/x509_vfy.h.in
393
+ # /* Certificate verify flags */
394
+ VERIFICATION_FLAGS = {
395
+ "USE_CHECK_TIME" => 0x2,
396
+ "CRL_CHECK" => 0x4,
397
+ "CRL_CHECK_ALL" => 0x8,
398
+ "IGNORE_CRITICAL" => 0x10,
399
+ "X509_STRICT" => 0x20,
400
+ "ALLOW_PROXY_CERTS" => 0x40,
401
+ "POLICY_CHECK" => 0x80,
402
+ "EXPLICIT_POLICY" => 0x100,
403
+ "INHIBIT_ANY" => 0x200,
404
+ "INHIBIT_MAP" => 0x400,
405
+ "NOTIFY_POLICY" => 0x800,
406
+ "EXTENDED_CRL_SUPPORT" => 0x1000,
407
+ "USE_DELTAS" => 0x2000,
408
+ "CHECK_SS_SIGNATURE" => 0x4000,
409
+ "TRUSTED_FIRST" => 0x8000,
410
+ "SUITEB_128_LOS_ONLY" => 0x10000,
411
+ "SUITEB_192_LOS" => 0x20000,
412
+ "SUITEB_128_LOS" => 0x30000,
413
+ "PARTIAL_CHAIN" => 0x80000,
414
+ "NO_ALT_CHAINS" => 0x100000,
415
+ "NO_CHECK_TIME" => 0x200000
416
+ }.freeze
417
+
219
418
  class Server
220
419
  def initialize(socket, ctx)
221
420
  @socket = socket
222
421
  @ctx = ctx
223
- end
224
-
225
- def to_io
226
- @socket
422
+ @eng_ctx = IS_JRUBY ? @ctx : SSLContext.new(ctx)
227
423
  end
228
424
 
229
425
  def accept
230
426
  @ctx.check
231
427
  io = @socket.accept
232
- engine = Engine.server @ctx
233
-
428
+ engine = Engine.server @eng_ctx
234
429
  Socket.new io, engine
235
430
  end
236
431
 
237
432
  def accept_nonblock
238
433
  @ctx.check
239
434
  io = @socket.accept_nonblock
240
- engine = Engine.server @ctx
241
-
435
+ engine = Engine.server @eng_ctx
242
436
  Socket.new io, engine
243
437
  end
244
438
 
439
+ # @!attribute [r] to_io
440
+ def to_io
441
+ @socket
442
+ end
443
+
444
+ # @!attribute [r] addr
445
+ # @version 5.0.0
446
+ def addr
447
+ @socket.addr
448
+ end
449
+
245
450
  def close
246
- @socket.close
451
+ @socket.close unless @socket.closed? # closed? call is for Windows
452
+ end
453
+
454
+ def closed?
455
+ @socket.closed?
247
456
  end
248
457
  end
249
458
  end
data/lib/puma/null_io.rb CHANGED
@@ -1,3 +1,5 @@
1
+ # frozen_string_literal: true
2
+
1
3
  module Puma
2
4
  # Provides an IO-like object that always appears to contain no data.
3
5
  # Used as the value for rack.input when the request has no body.
@@ -7,18 +9,45 @@ module Puma
7
9
  nil
8
10
  end
9
11
 
12
+ def string
13
+ ""
14
+ end
15
+
10
16
  def each
11
17
  end
12
18
 
19
+ def pos
20
+ 0
21
+ end
22
+
13
23
  # Mimics IO#read with no data.
14
24
  #
15
- def read(count = nil, _buffer = nil)
16
- (count && count > 0) ? nil : ""
25
+ def read(length = nil, buffer = nil)
26
+ if length.to_i < 0
27
+ raise ArgumentError, "(negative length #{length} given)"
28
+ end
29
+
30
+ buffer = if buffer.nil?
31
+ "".b
32
+ else
33
+ String.try_convert(buffer) or raise TypeError, "no implicit conversion of #{buffer.class} into String"
34
+ end
35
+ buffer.clear
36
+ if length.to_i > 0
37
+ nil
38
+ else
39
+ buffer
40
+ end
17
41
  end
18
42
 
19
43
  def rewind
20
44
  end
21
45
 
46
+ def seek(pos, whence = 0)
47
+ raise ArgumentError, "negative length #{pos} given" if pos.negative?
48
+ 0
49
+ end
50
+
22
51
  def close
23
52
  end
24
53
 
@@ -30,6 +59,10 @@ module Puma
30
59
  true
31
60
  end
32
61
 
62
+ def sync
63
+ true
64
+ end
65
+
33
66
  def sync=(v)
34
67
  end
35
68
 
@@ -38,5 +71,31 @@ module Puma
38
71
 
39
72
  def write(*ary)
40
73
  end
74
+
75
+ def flush
76
+ self
77
+ end
78
+
79
+ # This is used as singleton class, so can't have state.
80
+ def closed?
81
+ false
82
+ end
83
+
84
+ def set_encoding(enc)
85
+ self
86
+ end
87
+
88
+ # per rack spec
89
+ def external_encoding
90
+ Encoding::ASCII_8BIT
91
+ end
92
+
93
+ def binmode
94
+ self
95
+ end
96
+
97
+ def binmode?
98
+ true
99
+ end
41
100
  end
42
101
  end