puma 3.11.1 → 6.6.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +5 -5
- data/History.md +2092 -422
- data/LICENSE +23 -20
- data/README.md +301 -69
- data/bin/puma-wild +3 -9
- data/docs/architecture.md +59 -21
- data/docs/compile_options.md +55 -0
- data/docs/deployment.md +69 -58
- data/docs/fork_worker.md +41 -0
- data/docs/java_options.md +54 -0
- data/docs/jungle/README.md +9 -0
- data/docs/jungle/rc.d/README.md +74 -0
- data/docs/jungle/rc.d/puma +61 -0
- data/docs/jungle/rc.d/puma.conf +10 -0
- data/docs/kubernetes.md +78 -0
- data/docs/nginx.md +2 -2
- data/docs/plugins.md +26 -12
- data/docs/rails_dev_mode.md +28 -0
- data/docs/restart.md +48 -22
- data/docs/signals.md +13 -11
- data/docs/stats.md +147 -0
- data/docs/systemd.md +108 -117
- data/docs/testing_benchmarks_local_files.md +150 -0
- data/docs/testing_test_rackup_ci_files.md +36 -0
- data/ext/puma_http11/PumaHttp11Service.java +2 -2
- data/ext/puma_http11/ext_help.h +1 -1
- data/ext/puma_http11/extconf.rb +68 -3
- data/ext/puma_http11/http11_parser.c +106 -118
- data/ext/puma_http11/http11_parser.h +2 -2
- data/ext/puma_http11/http11_parser.java.rl +22 -38
- data/ext/puma_http11/http11_parser.rl +6 -4
- data/ext/puma_http11/http11_parser_common.rl +6 -6
- data/ext/puma_http11/mini_ssl.c +474 -94
- data/ext/puma_http11/no_ssl/PumaHttp11Service.java +15 -0
- data/ext/puma_http11/org/jruby/puma/Http11.java +136 -121
- data/ext/puma_http11/org/jruby/puma/Http11Parser.java +84 -99
- data/ext/puma_http11/org/jruby/puma/MiniSSL.java +251 -88
- data/ext/puma_http11/puma_http11.c +53 -58
- data/lib/puma/app/status.rb +71 -49
- data/lib/puma/binder.rb +257 -151
- data/lib/puma/cli.rb +61 -38
- data/lib/puma/client.rb +464 -224
- data/lib/puma/cluster/worker.rb +183 -0
- data/lib/puma/cluster/worker_handle.rb +96 -0
- data/lib/puma/cluster.rb +343 -239
- data/lib/puma/commonlogger.rb +23 -14
- data/lib/puma/configuration.rb +144 -96
- data/lib/puma/const.rb +194 -115
- data/lib/puma/control_cli.rb +135 -81
- data/lib/puma/detect.rb +34 -2
- data/lib/puma/dsl.rb +1092 -153
- data/lib/puma/error_logger.rb +113 -0
- data/lib/puma/events.rb +17 -111
- data/lib/puma/io_buffer.rb +44 -5
- data/lib/puma/jruby_restart.rb +2 -73
- data/lib/puma/json_serialization.rb +96 -0
- data/lib/puma/launcher/bundle_pruner.rb +104 -0
- data/lib/puma/launcher.rb +205 -138
- data/lib/puma/log_writer.rb +147 -0
- data/lib/puma/minissl/context_builder.rb +96 -0
- data/lib/puma/minissl.rb +279 -70
- data/lib/puma/null_io.rb +61 -2
- data/lib/puma/plugin/systemd.rb +90 -0
- data/lib/puma/plugin/tmp_restart.rb +3 -1
- data/lib/puma/plugin.rb +9 -13
- data/lib/puma/rack/builder.rb +10 -11
- data/lib/puma/rack/urlmap.rb +3 -1
- data/lib/puma/rack_default.rb +21 -4
- data/lib/puma/reactor.rb +97 -185
- data/lib/puma/request.rb +688 -0
- data/lib/puma/runner.rb +114 -69
- data/lib/puma/sd_notify.rb +146 -0
- data/lib/puma/server.rb +409 -704
- data/lib/puma/single.rb +29 -72
- data/lib/puma/state_file.rb +48 -9
- data/lib/puma/thread_pool.rb +234 -93
- data/lib/puma/util.rb +23 -10
- data/lib/puma.rb +68 -5
- data/lib/rack/handler/puma.rb +119 -86
- data/tools/Dockerfile +16 -0
- data/tools/trickletest.rb +0 -1
- metadata +55 -33
- data/ext/puma_http11/io_buffer.c +0 -155
- data/lib/puma/accept_nonblock.rb +0 -23
- data/lib/puma/compat.rb +0 -14
- data/lib/puma/convenient.rb +0 -23
- data/lib/puma/daemon_ext.rb +0 -31
- data/lib/puma/delegation.rb +0 -11
- data/lib/puma/java_io_buffer.rb +0 -45
- data/lib/puma/rack/backports/uri/common_193.rb +0 -33
- data/lib/puma/tcp_logger.rb +0 -39
- data/tools/jungle/README.md +0 -13
- data/tools/jungle/init.d/README.md +0 -59
- data/tools/jungle/init.d/puma +0 -421
- data/tools/jungle/init.d/run-puma +0 -18
- data/tools/jungle/upstart/README.md +0 -61
- data/tools/jungle/upstart/puma-manager.conf +0 -31
- data/tools/jungle/upstart/puma.conf +0 -69
@@ -0,0 +1,96 @@
|
|
1
|
+
module Puma
|
2
|
+
module MiniSSL
|
3
|
+
class ContextBuilder
|
4
|
+
def initialize(params, log_writer)
|
5
|
+
@params = params
|
6
|
+
@log_writer = log_writer
|
7
|
+
end
|
8
|
+
|
9
|
+
def context
|
10
|
+
ctx = MiniSSL::Context.new
|
11
|
+
|
12
|
+
if defined?(JRUBY_VERSION)
|
13
|
+
unless params['keystore']
|
14
|
+
log_writer.error "Please specify the Java keystore via 'keystore='"
|
15
|
+
end
|
16
|
+
|
17
|
+
ctx.keystore = params['keystore']
|
18
|
+
|
19
|
+
unless params['keystore-pass']
|
20
|
+
log_writer.error "Please specify the Java keystore password via 'keystore-pass='"
|
21
|
+
end
|
22
|
+
|
23
|
+
ctx.keystore_pass = params['keystore-pass']
|
24
|
+
ctx.keystore_type = params['keystore-type']
|
25
|
+
|
26
|
+
if truststore = params['truststore']
|
27
|
+
ctx.truststore = truststore.eql?('default') ? :default : truststore
|
28
|
+
ctx.truststore_pass = params['truststore-pass']
|
29
|
+
ctx.truststore_type = params['truststore-type']
|
30
|
+
end
|
31
|
+
|
32
|
+
ctx.cipher_suites = params['cipher_suites'] || params['ssl_cipher_list']
|
33
|
+
ctx.protocols = params['protocols'] if params['protocols']
|
34
|
+
else
|
35
|
+
if params['key'].nil? && params['key_pem'].nil?
|
36
|
+
log_writer.error "Please specify the SSL key via 'key=' or 'key_pem='"
|
37
|
+
end
|
38
|
+
|
39
|
+
ctx.key = params['key'] if params['key']
|
40
|
+
ctx.key_pem = params['key_pem'] if params['key_pem']
|
41
|
+
ctx.key_password_command = params['key_password_command'] if params['key_password_command']
|
42
|
+
|
43
|
+
if params['cert'].nil? && params['cert_pem'].nil?
|
44
|
+
log_writer.error "Please specify the SSL cert via 'cert=' or 'cert_pem='"
|
45
|
+
end
|
46
|
+
|
47
|
+
ctx.cert = params['cert'] if params['cert']
|
48
|
+
ctx.cert_pem = params['cert_pem'] if params['cert_pem']
|
49
|
+
|
50
|
+
if ['peer', 'force_peer'].include?(params['verify_mode'])
|
51
|
+
unless params['ca']
|
52
|
+
log_writer.error "Please specify the SSL ca via 'ca='"
|
53
|
+
end
|
54
|
+
# needed for Puma::MiniSSL::Socket#peercert, env['puma.peercert']
|
55
|
+
require 'openssl'
|
56
|
+
end
|
57
|
+
|
58
|
+
ctx.ca = params['ca'] if params['ca']
|
59
|
+
ctx.ssl_cipher_filter = params['ssl_cipher_filter'] if params['ssl_cipher_filter']
|
60
|
+
ctx.ssl_ciphersuites = params['ssl_ciphersuites'] if params['ssl_ciphersuites'] && HAS_TLS1_3
|
61
|
+
|
62
|
+
ctx.reuse = params['reuse'] if params['reuse']
|
63
|
+
end
|
64
|
+
|
65
|
+
ctx.no_tlsv1 = params['no_tlsv1'] == 'true'
|
66
|
+
ctx.no_tlsv1_1 = params['no_tlsv1_1'] == 'true'
|
67
|
+
|
68
|
+
if params['verify_mode']
|
69
|
+
ctx.verify_mode = case params['verify_mode']
|
70
|
+
when "peer"
|
71
|
+
MiniSSL::VERIFY_PEER
|
72
|
+
when "force_peer"
|
73
|
+
MiniSSL::VERIFY_PEER | MiniSSL::VERIFY_FAIL_IF_NO_PEER_CERT
|
74
|
+
when "none"
|
75
|
+
MiniSSL::VERIFY_NONE
|
76
|
+
else
|
77
|
+
log_writer.error "Please specify a valid verify_mode="
|
78
|
+
MiniSSL::VERIFY_NONE
|
79
|
+
end
|
80
|
+
end
|
81
|
+
|
82
|
+
if params['verification_flags']
|
83
|
+
ctx.verification_flags = params['verification_flags'].split(',').
|
84
|
+
map { |flag| MiniSSL::VERIFICATION_FLAGS.fetch(flag) }.
|
85
|
+
inject { |sum, flag| sum ? sum | flag : flag }
|
86
|
+
end
|
87
|
+
|
88
|
+
ctx
|
89
|
+
end
|
90
|
+
|
91
|
+
private
|
92
|
+
|
93
|
+
attr_reader :params, :log_writer
|
94
|
+
end
|
95
|
+
end
|
96
|
+
end
|
data/lib/puma/minissl.rb
CHANGED
@@ -1,21 +1,62 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
1
3
|
begin
|
2
|
-
require 'io/wait'
|
3
|
-
|
4
|
+
require 'io/wait' unless Puma::HAS_NATIVE_IO_WAIT
|
5
|
+
rescue LoadError
|
4
6
|
end
|
5
7
|
|
8
|
+
require 'open3'
|
9
|
+
# need for Puma::MiniSSL::OPENSSL constants used in `HAS_TLS1_3`
|
10
|
+
# use require, see https://github.com/puma/puma/pull/2381
|
11
|
+
require 'puma/puma_http11'
|
12
|
+
|
6
13
|
module Puma
|
7
14
|
module MiniSSL
|
15
|
+
# Define constant at runtime, as it's easy to determine at built time,
|
16
|
+
# but Puma could (it shouldn't) be loaded with an older OpenSSL version
|
17
|
+
# @version 5.0.0
|
18
|
+
HAS_TLS1_3 = IS_JRUBY ||
|
19
|
+
((OPENSSL_VERSION[/ \d+\.\d+\.\d+/].split('.').map(&:to_i) <=> [1,1,1]) != -1 &&
|
20
|
+
(OPENSSL_LIBRARY_VERSION[/ \d+\.\d+\.\d+/].split('.').map(&:to_i) <=> [1,1,1]) !=-1)
|
21
|
+
|
8
22
|
class Socket
|
9
23
|
def initialize(socket, engine)
|
10
24
|
@socket = socket
|
11
25
|
@engine = engine
|
12
26
|
@peercert = nil
|
27
|
+
@reuse = nil
|
13
28
|
end
|
14
29
|
|
30
|
+
# @!attribute [r] to_io
|
15
31
|
def to_io
|
16
32
|
@socket
|
17
33
|
end
|
18
34
|
|
35
|
+
def closed?
|
36
|
+
@socket.closed?
|
37
|
+
end
|
38
|
+
|
39
|
+
# Returns a two element array,
|
40
|
+
# first is protocol version (SSL_get_version),
|
41
|
+
# second is 'handshake' state (SSL_state_string)
|
42
|
+
#
|
43
|
+
# Used for dropping tcp connections to ssl.
|
44
|
+
# See OpenSSL ssl/ssl_stat.c SSL_state_string for info
|
45
|
+
# @!attribute [r] ssl_version_state
|
46
|
+
# @version 5.0.0
|
47
|
+
#
|
48
|
+
def ssl_version_state
|
49
|
+
IS_JRUBY ? [nil, nil] : @engine.ssl_vers_st
|
50
|
+
end
|
51
|
+
|
52
|
+
# Used to check the handshake status, in particular when a TCP connection
|
53
|
+
# is made with TLSv1.3 as an available protocol
|
54
|
+
# @version 5.0.0
|
55
|
+
def bad_tlsv1_3?
|
56
|
+
HAS_TLS1_3 && ssl_version_state == ['TLSv1.3', 'SSLERR']
|
57
|
+
end
|
58
|
+
private :bad_tlsv1_3?
|
59
|
+
|
19
60
|
def readpartial(size)
|
20
61
|
while true
|
21
62
|
output = @engine.read
|
@@ -48,22 +89,22 @@ module Puma
|
|
48
89
|
output = engine_read_all
|
49
90
|
return output if output
|
50
91
|
|
51
|
-
|
52
|
-
|
53
|
-
|
54
|
-
|
55
|
-
|
56
|
-
|
57
|
-
|
58
|
-
|
59
|
-
|
60
|
-
|
61
|
-
|
62
|
-
|
63
|
-
|
64
|
-
|
65
|
-
|
66
|
-
end
|
92
|
+
data = @socket.read_nonblock(size, exception: false)
|
93
|
+
if data == :wait_readable || data == :wait_writable
|
94
|
+
# It would make more sense to let @socket.read_nonblock raise
|
95
|
+
# EAGAIN if necessary but it seems like it'll misbehave on Windows.
|
96
|
+
# I don't have a Windows machine to debug this so I can't explain
|
97
|
+
# exactly whats happening in that OS. Please let me know if you
|
98
|
+
# find out!
|
99
|
+
#
|
100
|
+
# In the meantime, we can emulate the correct behavior by
|
101
|
+
# capturing :wait_readable & :wait_writable and raising EAGAIN
|
102
|
+
# ourselves.
|
103
|
+
raise IO::EAGAINWaitReadable
|
104
|
+
elsif data.nil?
|
105
|
+
raise SSLError.exception "HTTP connection?" if bad_tlsv1_3?
|
106
|
+
return nil
|
107
|
+
end
|
67
108
|
|
68
109
|
@engine.inject(data)
|
69
110
|
output = engine_read_all
|
@@ -77,22 +118,25 @@ module Puma
|
|
77
118
|
end
|
78
119
|
|
79
120
|
def write(data)
|
80
|
-
|
121
|
+
return 0 if data.empty?
|
122
|
+
|
123
|
+
data_size = data.bytesize
|
124
|
+
need = data_size
|
81
125
|
|
82
126
|
while true
|
83
127
|
wrote = @engine.write data
|
84
|
-
enc = @engine.extract
|
85
128
|
|
86
|
-
|
87
|
-
|
88
|
-
|
129
|
+
enc_wr = +''
|
130
|
+
while (enc = @engine.extract)
|
131
|
+
enc_wr << enc
|
89
132
|
end
|
133
|
+
@socket.write enc_wr unless enc_wr.empty?
|
90
134
|
|
91
135
|
need -= wrote
|
92
136
|
|
93
|
-
return
|
137
|
+
return data_size if need == 0
|
94
138
|
|
95
|
-
data = data
|
139
|
+
data = data.byteslice(wrote..-1)
|
96
140
|
end
|
97
141
|
end
|
98
142
|
|
@@ -100,14 +144,18 @@ module Puma
|
|
100
144
|
alias_method :<<, :write
|
101
145
|
|
102
146
|
# This is a temporary fix to deal with websockets code using
|
103
|
-
# write_nonblock.
|
147
|
+
# write_nonblock.
|
148
|
+
|
149
|
+
# The problem with implementing it properly
|
104
150
|
# is that it means we'd have to have the ability to rewind
|
105
151
|
# an engine because after we write+extract, the socket
|
106
152
|
# write_nonblock call might raise an exception and later
|
107
153
|
# code would pass the same data in, but the engine would think
|
108
|
-
# it had already written the data in.
|
109
|
-
#
|
110
|
-
#
|
154
|
+
# it had already written the data in.
|
155
|
+
#
|
156
|
+
# So for the time being (and since write blocking is quite rare),
|
157
|
+
# go ahead and actually block in write_nonblock.
|
158
|
+
#
|
111
159
|
def write_nonblock(data, *_)
|
112
160
|
write data
|
113
161
|
end
|
@@ -116,39 +164,32 @@ module Puma
|
|
116
164
|
@socket.flush
|
117
165
|
end
|
118
166
|
|
119
|
-
def read_and_drop(timeout = 1)
|
120
|
-
return :timeout unless IO.select([@socket], nil, nil, timeout)
|
121
|
-
read_nonblock(1024)
|
122
|
-
:drop
|
123
|
-
rescue Errno::EAGAIN
|
124
|
-
# do nothing
|
125
|
-
:eagain
|
126
|
-
end
|
127
|
-
|
128
|
-
def should_drop_bytes?
|
129
|
-
@engine.init? || !@engine.shutdown
|
130
|
-
end
|
131
|
-
|
132
167
|
def close
|
133
168
|
begin
|
134
|
-
|
135
|
-
|
136
|
-
|
137
|
-
|
138
|
-
return if read_and_drop(1) == :timeout
|
169
|
+
unless @engine.shutdown
|
170
|
+
while alert_data = @engine.extract
|
171
|
+
@socket.write alert_data
|
172
|
+
end
|
139
173
|
end
|
140
174
|
rescue IOError, SystemCallError
|
141
|
-
|
175
|
+
Puma::Util.purge_interrupt_queue
|
142
176
|
# nothing
|
143
177
|
ensure
|
144
178
|
@socket.close
|
145
179
|
end
|
146
180
|
end
|
147
181
|
|
182
|
+
# @!attribute [r] peeraddr
|
148
183
|
def peeraddr
|
149
184
|
@socket.peeraddr
|
150
185
|
end
|
151
186
|
|
187
|
+
# OpenSSL is loaded in `MiniSSL::ContextBuilder` when
|
188
|
+
# `MiniSSL::Context#verify_mode` is not `VERIFY_NONE`.
|
189
|
+
# When `VERIFY_NONE`, `MiniSSL::Engine#peercert` is nil, regardless of
|
190
|
+
# whether the client sends a cert.
|
191
|
+
# @return [OpenSSL::X509::Certificate, nil]
|
192
|
+
# @!attribute [r] peercert
|
152
193
|
def peercert
|
153
194
|
return @peercert if @peercert
|
154
195
|
|
@@ -159,91 +200,259 @@ module Puma
|
|
159
200
|
end
|
160
201
|
end
|
161
202
|
|
162
|
-
if
|
163
|
-
|
164
|
-
|
165
|
-
end
|
166
|
-
|
167
|
-
def self.check; end
|
203
|
+
if IS_JRUBY
|
204
|
+
OPENSSL_NO_SSL3 = false
|
205
|
+
OPENSSL_NO_TLS1 = false
|
168
206
|
end
|
169
207
|
|
170
208
|
class Context
|
171
209
|
attr_accessor :verify_mode
|
210
|
+
attr_reader :no_tlsv1, :no_tlsv1_1
|
211
|
+
|
212
|
+
def initialize
|
213
|
+
@no_tlsv1 = false
|
214
|
+
@no_tlsv1_1 = false
|
215
|
+
@key = nil
|
216
|
+
@cert = nil
|
217
|
+
@key_pem = nil
|
218
|
+
@cert_pem = nil
|
219
|
+
@reuse = nil
|
220
|
+
@reuse_cache_size = nil
|
221
|
+
@reuse_timeout = nil
|
222
|
+
end
|
223
|
+
|
224
|
+
def check_file(file, desc)
|
225
|
+
raise ArgumentError, "#{desc} file '#{file}' does not exist" unless File.exist? file
|
226
|
+
raise ArgumentError, "#{desc} file '#{file}' is not readable" unless File.readable? file
|
227
|
+
end
|
172
228
|
|
173
|
-
if
|
229
|
+
if IS_JRUBY
|
174
230
|
# jruby-specific Context properties: java uses a keystore and password pair rather than a cert/key pair
|
175
231
|
attr_reader :keystore
|
232
|
+
attr_reader :keystore_type
|
176
233
|
attr_accessor :keystore_pass
|
234
|
+
attr_reader :truststore
|
235
|
+
attr_reader :truststore_type
|
236
|
+
attr_accessor :truststore_pass
|
237
|
+
attr_reader :cipher_suites
|
238
|
+
attr_reader :protocols
|
177
239
|
|
178
240
|
def keystore=(keystore)
|
179
|
-
|
241
|
+
check_file keystore, 'Keystore'
|
180
242
|
@keystore = keystore
|
181
243
|
end
|
182
244
|
|
245
|
+
def truststore=(truststore)
|
246
|
+
# NOTE: historically truststore was assumed the same as keystore, this is kept for backwards
|
247
|
+
# compatibility, to rely on JVM's trust defaults we allow setting `truststore = :default`
|
248
|
+
unless truststore.eql?(:default)
|
249
|
+
raise ArgumentError, "No such truststore file '#{truststore}'" unless File.exist?(truststore)
|
250
|
+
end
|
251
|
+
@truststore = truststore
|
252
|
+
end
|
253
|
+
|
254
|
+
def keystore_type=(type)
|
255
|
+
raise ArgumentError, "Invalid keystore type: #{type.inspect}" unless ['pkcs12', 'jks', nil].include?(type)
|
256
|
+
@keystore_type = type
|
257
|
+
end
|
258
|
+
|
259
|
+
def truststore_type=(type)
|
260
|
+
raise ArgumentError, "Invalid truststore type: #{type.inspect}" unless ['pkcs12', 'jks', nil].include?(type)
|
261
|
+
@truststore_type = type
|
262
|
+
end
|
263
|
+
|
264
|
+
def cipher_suites=(list)
|
265
|
+
list = list.split(',').map(&:strip) if list.is_a?(String)
|
266
|
+
@cipher_suites = list
|
267
|
+
end
|
268
|
+
|
269
|
+
# aliases for backwards compatibility
|
270
|
+
alias_method :ssl_cipher_list, :cipher_suites
|
271
|
+
alias_method :ssl_cipher_list=, :cipher_suites=
|
272
|
+
|
273
|
+
def protocols=(list)
|
274
|
+
list = list.split(',').map(&:strip) if list.is_a?(String)
|
275
|
+
@protocols = list
|
276
|
+
end
|
277
|
+
|
183
278
|
def check
|
184
279
|
raise "Keystore not configured" unless @keystore
|
280
|
+
# @truststore defaults to @keystore due backwards compatibility
|
185
281
|
end
|
186
282
|
|
187
283
|
else
|
188
284
|
# non-jruby Context properties
|
189
285
|
attr_reader :key
|
286
|
+
attr_reader :key_password_command
|
190
287
|
attr_reader :cert
|
191
288
|
attr_reader :ca
|
289
|
+
attr_reader :cert_pem
|
290
|
+
attr_reader :key_pem
|
291
|
+
attr_accessor :ssl_cipher_filter
|
292
|
+
attr_accessor :ssl_ciphersuites
|
293
|
+
attr_accessor :verification_flags
|
294
|
+
|
295
|
+
attr_reader :reuse, :reuse_cache_size, :reuse_timeout
|
192
296
|
|
193
297
|
def key=(key)
|
194
|
-
|
298
|
+
check_file key, 'Key'
|
195
299
|
@key = key
|
196
300
|
end
|
197
301
|
|
302
|
+
def key_password_command=(key_password_command)
|
303
|
+
@key_password_command = key_password_command
|
304
|
+
end
|
305
|
+
|
198
306
|
def cert=(cert)
|
199
|
-
|
307
|
+
check_file cert, 'Cert'
|
200
308
|
@cert = cert
|
201
309
|
end
|
202
310
|
|
203
311
|
def ca=(ca)
|
204
|
-
|
312
|
+
check_file ca, 'ca'
|
205
313
|
@ca = ca
|
206
314
|
end
|
207
315
|
|
316
|
+
def cert_pem=(cert_pem)
|
317
|
+
raise ArgumentError, "'cert_pem' is not a String" unless cert_pem.is_a? String
|
318
|
+
@cert_pem = cert_pem
|
319
|
+
end
|
320
|
+
|
321
|
+
def key_pem=(key_pem)
|
322
|
+
raise ArgumentError, "'key_pem' is not a String" unless key_pem.is_a? String
|
323
|
+
@key_pem = key_pem
|
324
|
+
end
|
325
|
+
|
208
326
|
def check
|
209
|
-
raise "Key not configured"
|
210
|
-
raise "Cert not configured"
|
327
|
+
raise "Key not configured" if @key.nil? && @key_pem.nil?
|
328
|
+
raise "Cert not configured" if @cert.nil? && @cert_pem.nil?
|
329
|
+
end
|
330
|
+
|
331
|
+
# Executes the command to return the password needed to decrypt the key.
|
332
|
+
def key_password
|
333
|
+
raise "Key password command not configured" if @key_password_command.nil?
|
334
|
+
|
335
|
+
stdout_str, stderr_str, status = Open3.capture3(@key_password_command)
|
336
|
+
|
337
|
+
return stdout_str.chomp if status.success?
|
338
|
+
|
339
|
+
raise "Key password failed with code #{status.exitstatus}: #{stderr_str}"
|
211
340
|
end
|
341
|
+
|
342
|
+
# Controls session reuse. Allowed values are as follows:
|
343
|
+
# * 'off' - matches the behavior of Puma 5.6 and earlier. This is included
|
344
|
+
# in case reuse 'on' is made the default in future Puma versions.
|
345
|
+
# * 'dflt' - sets session reuse on, with OpenSSL default cache size of
|
346
|
+
# 20k and default timeout of 300 seconds.
|
347
|
+
# * 's,t' - where s and t are integer strings, for size and timeout.
|
348
|
+
# * 's' - where s is an integer strings for size.
|
349
|
+
# * ',t' - where t is an integer strings for timeout.
|
350
|
+
#
|
351
|
+
def reuse=(reuse_str)
|
352
|
+
case reuse_str
|
353
|
+
when 'off'
|
354
|
+
@reuse = nil
|
355
|
+
when 'dflt'
|
356
|
+
@reuse = true
|
357
|
+
when /\A\d+\z/
|
358
|
+
@reuse = true
|
359
|
+
@reuse_cache_size = reuse_str.to_i
|
360
|
+
when /\A\d+,\d+\z/
|
361
|
+
@reuse = true
|
362
|
+
size, time = reuse_str.split ','
|
363
|
+
@reuse_cache_size = size.to_i
|
364
|
+
@reuse_timeout = time.to_i
|
365
|
+
when /\A,\d+\z/
|
366
|
+
@reuse = true
|
367
|
+
@reuse_timeout = reuse_str.delete(',').to_i
|
368
|
+
end
|
369
|
+
end
|
370
|
+
end
|
371
|
+
|
372
|
+
# disables TLSv1
|
373
|
+
# @!attribute [w] no_tlsv1=
|
374
|
+
def no_tlsv1=(tlsv1)
|
375
|
+
raise ArgumentError, "Invalid value of no_tlsv1=" unless ['true', 'false', true, false].include?(tlsv1)
|
376
|
+
@no_tlsv1 = tlsv1
|
212
377
|
end
|
378
|
+
|
379
|
+
# disables TLSv1 and TLSv1.1. Overrides `#no_tlsv1=`
|
380
|
+
# @!attribute [w] no_tlsv1_1=
|
381
|
+
def no_tlsv1_1=(tlsv1_1)
|
382
|
+
raise ArgumentError, "Invalid value of no_tlsv1_1=" unless ['true', 'false', true, false].include?(tlsv1_1)
|
383
|
+
@no_tlsv1_1 = tlsv1_1
|
384
|
+
end
|
385
|
+
|
213
386
|
end
|
214
387
|
|
215
388
|
VERIFY_NONE = 0
|
216
389
|
VERIFY_PEER = 1
|
217
390
|
VERIFY_FAIL_IF_NO_PEER_CERT = 2
|
218
391
|
|
392
|
+
# https://github.com/openssl/openssl/blob/master/include/openssl/x509_vfy.h.in
|
393
|
+
# /* Certificate verify flags */
|
394
|
+
VERIFICATION_FLAGS = {
|
395
|
+
"USE_CHECK_TIME" => 0x2,
|
396
|
+
"CRL_CHECK" => 0x4,
|
397
|
+
"CRL_CHECK_ALL" => 0x8,
|
398
|
+
"IGNORE_CRITICAL" => 0x10,
|
399
|
+
"X509_STRICT" => 0x20,
|
400
|
+
"ALLOW_PROXY_CERTS" => 0x40,
|
401
|
+
"POLICY_CHECK" => 0x80,
|
402
|
+
"EXPLICIT_POLICY" => 0x100,
|
403
|
+
"INHIBIT_ANY" => 0x200,
|
404
|
+
"INHIBIT_MAP" => 0x400,
|
405
|
+
"NOTIFY_POLICY" => 0x800,
|
406
|
+
"EXTENDED_CRL_SUPPORT" => 0x1000,
|
407
|
+
"USE_DELTAS" => 0x2000,
|
408
|
+
"CHECK_SS_SIGNATURE" => 0x4000,
|
409
|
+
"TRUSTED_FIRST" => 0x8000,
|
410
|
+
"SUITEB_128_LOS_ONLY" => 0x10000,
|
411
|
+
"SUITEB_192_LOS" => 0x20000,
|
412
|
+
"SUITEB_128_LOS" => 0x30000,
|
413
|
+
"PARTIAL_CHAIN" => 0x80000,
|
414
|
+
"NO_ALT_CHAINS" => 0x100000,
|
415
|
+
"NO_CHECK_TIME" => 0x200000
|
416
|
+
}.freeze
|
417
|
+
|
219
418
|
class Server
|
220
419
|
def initialize(socket, ctx)
|
221
420
|
@socket = socket
|
222
421
|
@ctx = ctx
|
223
|
-
|
224
|
-
|
225
|
-
def to_io
|
226
|
-
@socket
|
422
|
+
@eng_ctx = IS_JRUBY ? @ctx : SSLContext.new(ctx)
|
227
423
|
end
|
228
424
|
|
229
425
|
def accept
|
230
426
|
@ctx.check
|
231
427
|
io = @socket.accept
|
232
|
-
engine = Engine.server @
|
233
|
-
|
428
|
+
engine = Engine.server @eng_ctx
|
234
429
|
Socket.new io, engine
|
235
430
|
end
|
236
431
|
|
237
432
|
def accept_nonblock
|
238
433
|
@ctx.check
|
239
434
|
io = @socket.accept_nonblock
|
240
|
-
engine = Engine.server @
|
241
|
-
|
435
|
+
engine = Engine.server @eng_ctx
|
242
436
|
Socket.new io, engine
|
243
437
|
end
|
244
438
|
|
439
|
+
# @!attribute [r] to_io
|
440
|
+
def to_io
|
441
|
+
@socket
|
442
|
+
end
|
443
|
+
|
444
|
+
# @!attribute [r] addr
|
445
|
+
# @version 5.0.0
|
446
|
+
def addr
|
447
|
+
@socket.addr
|
448
|
+
end
|
449
|
+
|
245
450
|
def close
|
246
|
-
@socket.close
|
451
|
+
@socket.close unless @socket.closed? # closed? call is for Windows
|
452
|
+
end
|
453
|
+
|
454
|
+
def closed?
|
455
|
+
@socket.closed?
|
247
456
|
end
|
248
457
|
end
|
249
458
|
end
|
data/lib/puma/null_io.rb
CHANGED
@@ -1,3 +1,5 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
1
3
|
module Puma
|
2
4
|
# Provides an IO-like object that always appears to contain no data.
|
3
5
|
# Used as the value for rack.input when the request has no body.
|
@@ -7,18 +9,45 @@ module Puma
|
|
7
9
|
nil
|
8
10
|
end
|
9
11
|
|
12
|
+
def string
|
13
|
+
""
|
14
|
+
end
|
15
|
+
|
10
16
|
def each
|
11
17
|
end
|
12
18
|
|
19
|
+
def pos
|
20
|
+
0
|
21
|
+
end
|
22
|
+
|
13
23
|
# Mimics IO#read with no data.
|
14
24
|
#
|
15
|
-
def read(
|
16
|
-
|
25
|
+
def read(length = nil, buffer = nil)
|
26
|
+
if length.to_i < 0
|
27
|
+
raise ArgumentError, "(negative length #{length} given)"
|
28
|
+
end
|
29
|
+
|
30
|
+
buffer = if buffer.nil?
|
31
|
+
"".b
|
32
|
+
else
|
33
|
+
String.try_convert(buffer) or raise TypeError, "no implicit conversion of #{buffer.class} into String"
|
34
|
+
end
|
35
|
+
buffer.clear
|
36
|
+
if length.to_i > 0
|
37
|
+
nil
|
38
|
+
else
|
39
|
+
buffer
|
40
|
+
end
|
17
41
|
end
|
18
42
|
|
19
43
|
def rewind
|
20
44
|
end
|
21
45
|
|
46
|
+
def seek(pos, whence = 0)
|
47
|
+
raise ArgumentError, "negative length #{pos} given" if pos.negative?
|
48
|
+
0
|
49
|
+
end
|
50
|
+
|
22
51
|
def close
|
23
52
|
end
|
24
53
|
|
@@ -30,6 +59,10 @@ module Puma
|
|
30
59
|
true
|
31
60
|
end
|
32
61
|
|
62
|
+
def sync
|
63
|
+
true
|
64
|
+
end
|
65
|
+
|
33
66
|
def sync=(v)
|
34
67
|
end
|
35
68
|
|
@@ -38,5 +71,31 @@ module Puma
|
|
38
71
|
|
39
72
|
def write(*ary)
|
40
73
|
end
|
74
|
+
|
75
|
+
def flush
|
76
|
+
self
|
77
|
+
end
|
78
|
+
|
79
|
+
# This is used as singleton class, so can't have state.
|
80
|
+
def closed?
|
81
|
+
false
|
82
|
+
end
|
83
|
+
|
84
|
+
def set_encoding(enc)
|
85
|
+
self
|
86
|
+
end
|
87
|
+
|
88
|
+
# per rack spec
|
89
|
+
def external_encoding
|
90
|
+
Encoding::ASCII_8BIT
|
91
|
+
end
|
92
|
+
|
93
|
+
def binmode
|
94
|
+
self
|
95
|
+
end
|
96
|
+
|
97
|
+
def binmode?
|
98
|
+
true
|
99
|
+
end
|
41
100
|
end
|
42
101
|
end
|