Skip to content

Commit b9838aa

Browse files
authored
Merge pull request #9711 from julek-wolfssl/nginx-1.28.0
nginx 1.28.1 fixes
2 parents f3b5767 + e9a2f27 commit b9838aa

20 files changed

Lines changed: 677 additions & 287 deletions

File tree

.github/workflows/nginx.yml

Lines changed: 52 additions & 30 deletions
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,10 @@ concurrency:
1212
cancel-in-progress: true
1313
# END OF COMMON SECTION
1414

15+
# clang has better sanitizer support
16+
env:
17+
CC: clang
18+
1519
jobs:
1620
build_wolfssl:
1721
name: Build wolfSSL
@@ -31,7 +35,8 @@ jobs:
3135
uses: wolfSSL/actions-build-autotools-project@v1
3236
with:
3337
path: wolfssl
34-
configure: --enable-nginx ${{ env.wolf_debug_flags }}
38+
configure: >-
39+
--enable-nginx --enable-curve25519 --enable-ed25519 ${{ env.wolf_debug_flags }}
3540
install: true
3641

3742
- name: tar build-dir
@@ -50,6 +55,41 @@ jobs:
5055
matrix:
5156
include:
5257
# in general we want to pass all tests that match *ssl*
58+
- ref: 1.28.1
59+
test-ref: 0fccfcef1278263416043e0bbb3e0116b84026e4
60+
# Following tests pass with sanitizer on
61+
sanitize-ok: >-
62+
h2_ssl_proxy_cache.t h2_ssl.t h2_ssl_variables.t
63+
h2_ssl_verify_client.t mail_imap_ssl.t mail_ssl_session_reuse.t
64+
mail_ssl.t proxy_ssl_certificate_cache.t
65+
proxy_ssl_certificate_empty.t proxy_ssl_certificate.t
66+
proxy_ssl_certificate_vars.t proxy_ssl_name.t ssl_cache_reload.t
67+
ssl_certificate_aux.t ssl_certificate_cache.t
68+
ssl_certificate_chain.t ssl_certificates.t ssl_certificate.t
69+
ssl_client_escaped_cert.t ssl_crl.t ssl_curve.t ssl_ocsp.t
70+
ssl_password_file.t ssl_proxy_upgrade.t ssl_reject_handshake.t
71+
ssl_session_reuse.t ssl_session_ticket_key.t ssl_sni_protocols.t
72+
ssl_sni_reneg.t ssl_sni_sessions.t ssl_sni.t ssl_stapling.t ssl.t
73+
ssl_verify_client.t ssl_verify_client_trusted.t ssl_verify_depth.t
74+
stream_proxy_ssl_certificate_cache.t stream_proxy_ssl_certificate.t
75+
stream_proxy_ssl_certificate_vars.t
76+
stream_proxy_ssl_name_complex.t stream_proxy_ssl_name.t
77+
stream_ssl_alpn.t stream_ssl_certificate_cache.t
78+
stream_ssl_certificate.t stream_ssl_ocsp.t stream_ssl_preread_alpn.t
79+
stream_ssl_preread_protocol.t stream_ssl_preread.t
80+
stream_ssl_reject_handshake.t stream_ssl_session_reuse.t
81+
stream_ssl_sni_protocols.t stream_ssl_stapling.t stream_ssl.t
82+
stream_ssl_variables.t stream_ssl_verify_client.t
83+
stream_upstream_zone_ssl.t upstream_zone_ssl.t
84+
uwsgi_ssl_certificate.t uwsgi_ssl_certificate_vars.t
85+
# Following tests do not pass with sanitizer on (with OpenSSL too)
86+
sanitize-not-ok: >-
87+
grpc_ssl.t h2_proxy_request_buffering_ssl.t h2_proxy_ssl.t
88+
proxy_request_buffering_ssl.t proxy_ssl_conf_command.t
89+
proxy_ssl_keepalive.t proxy_ssl.t proxy_ssl_verify.t ssl_cache.t
90+
stream_proxy_protocol_ssl.t stream_proxy_ssl_conf_command.t
91+
stream_proxy_ssl.t stream_proxy_ssl_verify.t
92+
5393
- ref: 1.25.0
5494
test-ref: 5b2894ea1afd01a26c589ce11f310df118e42592
5595
# Following tests pass with sanitizer on
@@ -120,30 +160,19 @@ jobs:
120160
- name: untar build-dir
121161
run: tar -xf build-dir.tgz
122162

123-
- name: Install dependencies
124-
run: |
125-
sudo cpan -iT Proc::Find
163+
- name: Openssl version
164+
run: openssl version -a
126165

127-
# Locking in the version of SSLeay used with testing
128-
- name: Download and install Net::SSLeay 1.94 manually
129-
run: |
130-
curl -LO https://www.cpan.org/modules/by-module/Net/CHRISN/Net-SSLeay-1.94.tar.gz
131-
tar -xzf Net-SSLeay-1.94.tar.gz
132-
cd Net-SSLeay-1.94
133-
perl Makefile.PL
134-
make
135-
sudo make install
166+
- name: Setup Perl environment
167+
uses: shogo82148/actions-setup-perl@v1
168+
with:
169+
perl-version: '5.38.2'
136170

137171
# SSL version 2.091 changes '' return to undef causing test case to fail.
138172
# Locking in the test version to use as 2.090
139-
- name: Download and install IO::Socket::SSL 2.090 manually
173+
- name: Install dependencies
140174
run: |
141-
curl -LO https://www.cpan.org/modules/by-module/IO/IO-Socket-SSL-2.090.tar.gz
142-
tar -xzf IO-Socket-SSL-2.090.tar.gz
143-
cd IO-Socket-SSL-2.090
144-
perl Makefile.PL
145-
make
146-
sudo make install
175+
cpanm --notest Proc::Find Net::SSLeay@1.94 IO::Socket::SSL@2.090
147176
148177
- name: Checkout wolfssl-nginx
149178
uses: actions/checkout@v4
@@ -211,10 +240,6 @@ jobs:
211240
run: |
212241
echo "nginx_c_flags=-O0" >> $GITHUB_ENV
213242
214-
- name: workaround high-entropy ASLR
215-
# not needed after either an update to llvm or runner is done
216-
run: sudo sysctl vm.mmap_rnd_bits=28
217-
218243
- name: Build nginx with sanitizer
219244
working-directory: nginx
220245
run: |
@@ -229,19 +254,16 @@ jobs:
229254
working-directory: nginx
230255
run: ldd objs/nginx | grep wolfssl
231256

232-
- if: ${{ runner.debug }}
233-
name: Run nginx-tests with sanitizer (debug)
257+
- name: Create LSAN suppression file
234258
working-directory: nginx-tests
235259
run: |
236-
LD_LIBRARY_PATH=$LD_LIBRARY_PATH:$GITHUB_WORKSPACE/build-dir/lib \
237-
TMPDIR=$GITHUB_WORKSPACE TEST_NGINX_VERBOSE=y TEST_NGINX_CATLOG=y \
238-
TEST_NGINX_BINARY=../nginx/objs/nginx prove -v ${{ matrix.sanitize-ok }}
260+
echo "leak:ngx_worker_process_init" > lsan.supp
239261
240262
- if: ${{ !runner.debug }}
241263
name: Run nginx-tests with sanitizer
242264
working-directory: nginx-tests
243265
run: |
244266
LD_LIBRARY_PATH=$LD_LIBRARY_PATH:$GITHUB_WORKSPACE/build-dir/lib \
267+
LSAN_OPTIONS=suppressions=$GITHUB_WORKSPACE/nginx-tests/lsan.supp \
245268
TMPDIR=$GITHUB_WORKSPACE TEST_NGINX_BINARY=../nginx/objs/nginx \
246269
prove ${{ matrix.sanitize-ok }}
247-

.wolfssl_known_macro_extras

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -220,6 +220,7 @@ ENABLED_BSDKM_REGISTER
220220
ENABLE_SECURE_SOCKETS_LOGS
221221
ESP32
222222
ESP8266
223+
ESPIPE
223224
ESP_ENABLE_WOLFSSH
224225
ESP_IDF_VERSION
225226
ESP_IDF_VERSION_MAJOR
@@ -367,6 +368,7 @@ NO_ASM
367368
NO_ASN_OLD_TYPE_NAMES
368369
NO_CAMELLIA_CBC
369370
NO_CERT
371+
NO_CERT_IN_TICKET
370372
NO_CIPHER_SUITE_ALIASES
371373
NO_CLIENT_CACHE
372374
NO_CLOCK_SPEEDUP

configure.ac

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2743,7 +2743,8 @@ if test "$ENABLED_LIBWEBSOCKETS" = "yes" || test "$ENABLED_OPENVPN" = "yes" || \
27432743
test "$ENABLED_OPENRESTY" = "yes" || test "$ENABLED_RSYSLOG" = "yes" || \
27442744
test "$ENABLED_KRB" = "yes" || test "$ENABLED_CHRONY" = "yes" || \
27452745
test "$ENABLED_FFMPEG" = "yes" || test "$ENABLED_STRONGSWAN" = "yes" || \
2746-
test "$ENABLED_OPENLDAP" = "yes" || test "x$ENABLED_MOSQUITTO" = "xyes" || test "$ENABLED_HITCH" = "yes"
2746+
test "$ENABLED_OPENLDAP" = "yes" || test "x$ENABLED_MOSQUITTO" = "xyes" || \
2747+
test "$ENABLED_HITCH" = "yes" || test "$ENABLED_NGINX" = "yes"
27472748
then
27482749
ENABLED_OPENSSLALL="yes"
27492750
fi

src/bio.c

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1938,6 +1938,8 @@ int wolfSSL_BIO_get_len(WOLFSSL_BIO *bio)
19381938
len = BAD_FUNC_ARG;
19391939
if (len == 0) {
19401940
len = wolfssl_file_len(file, &memSz);
1941+
if (len == WC_NO_ERR_TRACE(WOLFSSL_BAD_FILETYPE))
1942+
len = 0;
19411943
}
19421944
if (len == 0) {
19431945
len = (int)memSz;

src/crl.c

Lines changed: 22 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1428,6 +1428,28 @@ WOLFSSL_X509_CRL* wolfSSL_X509_CRL_dup(const WOLFSSL_X509_CRL* crl)
14281428
return ret;
14291429
}
14301430

1431+
#ifdef OPENSSL_ALL
1432+
int wolfSSL_X509_CRL_up_ref(WOLFSSL_X509_CRL* crl)
1433+
{
1434+
int ret;
1435+
1436+
if (crl == NULL)
1437+
return WOLFSSL_FAILURE;
1438+
1439+
wolfSSL_RefInc(&crl->ref, &ret);
1440+
#ifdef WOLFSSL_REFCNT_ERROR_RETURN
1441+
if (ret != 0) {
1442+
WOLFSSL_MSG("Failed to lock x509 mutex");
1443+
return WOLFSSL_FAILURE;
1444+
}
1445+
#else
1446+
(void)ret;
1447+
#endif
1448+
1449+
return WOLFSSL_SUCCESS;
1450+
}
1451+
#endif
1452+
14311453
/* returns WOLFSSL_SUCCESS on success. Does not take ownership of newcrl */
14321454
int wolfSSL_X509_STORE_add_crl(WOLFSSL_X509_STORE *store, WOLFSSL_X509_CRL *newcrl)
14331455
{

src/dtls.c

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -403,8 +403,9 @@ static int TlsTicketIsValid(const WOLFSSL* ssl, WolfSSL_ConstVector exts,
403403
if (!IsAtLeastTLSv1_3(it->pv))
404404
*resume = TRUE;
405405
}
406-
if (it != NULL)
407-
ForceZero(it, sizeof(InternalTicket));
406+
/* `it` points into tempTicket on successful decryption so clearing it will
407+
* also satisfy the WOLFSSL_CHECK_MEM_ZERO check. */
408+
ForceZero(tempTicket, SESSION_TICKET_LEN);
408409
return 0;
409410
}
410411
#endif /* HAVE_SESSION_TICKET */

0 commit comments

Comments
 (0)