/* * JBoss, Home of Professional Open Source. * Copyright 2017, Red Hat, Inc., and individual contributors * as indicated by the @author tags. See the copyright.txt file in the * distribution for a full listing of individual contributors. * * This is free software; you can redistribute it and/or modify it * under the terms of the GNU Lesser General Public License as * published by the Free Software Foundation; either version 2.1 of * the License, or (at your option) any later version. * * This software is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU * Lesser General Public License for more details. * * You should have received a copy of the GNU Lesser General Public * License along with this software; if not, write to the Free * Software Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA * 02110-1301 USA, or see the FSF site: http://www.fsf.org. */ package org.wildfly.extension.undertow; import java.io.IOException; import java.net.InetSocketAddress; import java.nio.ByteBuffer; import java.util.function.Supplier; import javax.net.ssl.SSLContext; import io.undertow.UndertowOptions; import io.undertow.protocols.ssl.UndertowXnioSsl; import io.undertow.server.OpenListener; import io.undertow.server.protocol.http.AlpnOpenListener; import io.undertow.server.protocol.http.HttpOpenListener; import io.undertow.server.protocol.http2.Http2OpenListener; import org.jboss.as.network.NetworkUtils; import org.wildfly.extension.undertow.logging.UndertowLogger; import org.wildfly.security.ssl.CipherSuiteSelector; import org.xnio.ChannelListener; import org.xnio.IoUtils; import org.xnio.Option; import org.xnio.OptionMap; import org.xnio.OptionMap.Builder; import org.xnio.Options; import org.xnio.Pool; import org.xnio.Sequence; import org.xnio.StreamConnection; import org.xnio.XnioWorker; import org.xnio.channels.AcceptingChannel; import org.xnio.ssl.SslConnection; import org.xnio.ssl.XnioSsl; /** * An extension of {@see HttpListenerService} to add SSL. * * @author <a href="mailto:darran.lofthouse@jboss.com">Darran Lofthouse</a> * @author Tomaz Cerar */ public class HttpsListenerService extends HttpListenerService { private Supplier<SSLContext> sslContextSupplier; private volatile AcceptingChannel<SslConnection> sslServer; static final String PROTOCOL = "https"; private final String cipherSuites; public HttpsListenerService(final String name, String serverName, OptionMap listenerOptions, String cipherSuites, OptionMap socketOptions) { this(name, serverName, listenerOptions, cipherSuites, socketOptions, false, false); } HttpsListenerService(final String name, String serverName, OptionMap listenerOptions, String cipherSuites, OptionMap socketOptions, boolean certificateForwarding, boolean proxyAddressForwarding) { super(name, serverName, listenerOptions, socketOptions, certificateForwarding, proxyAddressForwarding); this.cipherSuites = cipherSuites; } void setSSLContextSupplier(Supplier<SSLContext> sslContextSupplier) { this.sslContextSupplier = sslContextSupplier; } @Override protected OpenListener createOpenListener() { if(listenerOptions.get(UndertowOptions.ENABLE_HTTP2, false)) { try { return createAlpnOpenListener(); } catch (Throwable e) { UndertowLogger.ROOT_LOGGER.alpnNotFound(getName()); UndertowLogger.ROOT_LOGGER.debug("Exception creating ALPN listener", e); return super.createOpenListener(); } } else { return super.createOpenListener(); } } private OpenListener createAlpnOpenListener() { OptionMap undertowOptions = OptionMap.builder().addAll(commonOptions).addAll(listenerOptions).set(UndertowOptions.ENABLE_CONNECTOR_STATISTICS, getUndertowService().isStatisticsEnabled()).getMap(); Pool<ByteBuffer> bufferPool = getBufferPool().getValue(); HttpOpenListener http = new HttpOpenListener(bufferPool, undertowOptions); AlpnOpenListener alpn = new AlpnOpenListener(bufferPool, undertowOptions, http); if(listenerOptions.get(UndertowOptions.ENABLE_HTTP2, false)) { Http2OpenListener http2 = new Http2OpenListener(bufferPool, undertowOptions, "h2"); alpn.addProtocol(Http2OpenListener.HTTP2, http2, 10); Http2OpenListener http2_14 = new Http2OpenListener(bufferPool, undertowOptions, "h2-14"); alpn.addProtocol(Http2OpenListener.HTTP2_14, http2_14, 9); } return alpn; } @Override protected void startListening(XnioWorker worker, InetSocketAddress socketAddress, ChannelListener<AcceptingChannel<StreamConnection>> acceptListener) throws IOException { SSLContext sslContext = sslContextSupplier.get(); Builder builder = OptionMap.builder().addAll(commonOptions); builder.addAll(socketOptions); builder.set(Options.USE_DIRECT_BUFFERS, true); if (cipherSuites != null) { String[] cipherList = CipherSuiteSelector.fromString(cipherSuites).evaluate(sslContext.getSupportedSSLParameters().getCipherSuites()); builder.setSequence((Option<Sequence<String>>) HttpsListenerResourceDefinition.ENABLED_CIPHER_SUITES.getOption(), cipherList); } OptionMap combined = builder.getMap(); XnioSsl xnioSsl = new UndertowXnioSsl(worker.getXnio(), combined, sslContext); sslServer = xnioSsl.createSslConnectionServer(worker, socketAddress, (ChannelListener) acceptListener, combined); sslServer.resumeAccepts(); final InetSocketAddress boundAddress = sslServer.getLocalAddress(InetSocketAddress.class); UndertowLogger.ROOT_LOGGER.listenerStarted("HTTPS", getName(), NetworkUtils.formatIPAddressForURI(boundAddress.getAddress()), boundAddress.getPort()); } @Override public boolean isSecure() { return true; } @Override protected void stopListening() { final InetSocketAddress boundAddress = sslServer.getLocalAddress(InetSocketAddress.class); sslServer.suspendAccepts(); UndertowLogger.ROOT_LOGGER.listenerSuspend("HTTPS", getName()); IoUtils.safeClose(sslServer); sslServer = null; UndertowLogger.ROOT_LOGGER.listenerStopped("HTTPS", getName(), NetworkUtils.formatIPAddressForURI(boundAddress.getAddress()), boundAddress.getPort()); httpListenerRegistry.getValue().removeListener(getName()); } @Override public String getProtocol() { return PROTOCOL; } }