Skip to content

Commit 622feb1

Browse files
committed
nginx 1.28.1
1 parent 25db90a commit 622feb1

20 files changed

Lines changed: 673 additions & 285 deletions

File tree

.github/workflows/nginx.yml

Lines changed: 57 additions & 32 deletions
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,10 @@ concurrency:
1212
cancel-in-progress: true
1313
# END OF COMMON SECTION
1414

15+
# clang has better sanitizer support
16+
env:
17+
CC: clang
18+
1519
jobs:
1620
build_wolfssl:
1721
name: Build wolfSSL
@@ -31,7 +35,8 @@ jobs:
3135
uses: wolfSSL/actions-build-autotools-project@v1
3236
with:
3337
path: wolfssl
34-
configure: --enable-nginx ${{ env.wolf_debug_flags }}
38+
configure: >-
39+
--enable-nginx --enable-curve25519 --enable-ed25519 ${{ env.wolf_debug_flags }}
3540
install: true
3641

3742
- name: tar build-dir
@@ -50,6 +55,41 @@ jobs:
5055
matrix:
5156
include:
5257
# in general we want to pass all tests that match *ssl*
58+
- ref: 1.28.1
59+
test-ref: 0fccfcef1278263416043e0bbb3e0116b84026e4
60+
# Following tests pass with sanitizer on
61+
sanitize-ok: >-
62+
h2_ssl_proxy_cache.t h2_ssl.t h2_ssl_variables.t
63+
h2_ssl_verify_client.t mail_imap_ssl.t mail_ssl_session_reuse.t
64+
mail_ssl.t proxy_ssl_certificate_cache.t
65+
proxy_ssl_certificate_empty.t proxy_ssl_certificate.t
66+
proxy_ssl_certificate_vars.t proxy_ssl_name.t ssl_cache_reload.t
67+
ssl_certificate_aux.t ssl_certificate_cache.t
68+
ssl_certificate_chain.t ssl_certificates.t ssl_certificate.t
69+
ssl_client_escaped_cert.t ssl_crl.t ssl_curve.t ssl_ocsp.t
70+
ssl_password_file.t ssl_proxy_upgrade.t ssl_reject_handshake.t
71+
ssl_session_reuse.t ssl_session_ticket_key.t ssl_sni_protocols.t
72+
ssl_sni_reneg.t ssl_sni_sessions.t ssl_sni.t ssl_stapling.t ssl.t
73+
ssl_verify_client.t ssl_verify_client_trusted.t ssl_verify_depth.t
74+
stream_proxy_ssl_certificate_cache.t stream_proxy_ssl_certificate.t
75+
stream_proxy_ssl_certificate_vars.t
76+
stream_proxy_ssl_name_complex.t stream_proxy_ssl_name.t
77+
stream_ssl_alpn.t stream_ssl_certificate_cache.t
78+
stream_ssl_certificate.t stream_ssl_ocsp.t stream_ssl_preread_alpn.t
79+
stream_ssl_preread_protocol.t stream_ssl_preread.t
80+
stream_ssl_reject_handshake.t stream_ssl_session_reuse.t
81+
stream_ssl_sni_protocols.t stream_ssl_stapling.t stream_ssl.t
82+
stream_ssl_variables.t stream_ssl_verify_client.t
83+
stream_upstream_zone_ssl.t upstream_zone_ssl.t
84+
uwsgi_ssl_certificate.t uwsgi_ssl_certificate_vars.t
85+
# Following tests do not pass with sanitizer on (with OpenSSL too)
86+
sanitize-not-ok: >-
87+
grpc_ssl.t h2_proxy_request_buffering_ssl.t h2_proxy_ssl.t
88+
proxy_request_buffering_ssl.t proxy_ssl_conf_command.t
89+
proxy_ssl_keepalive.t proxy_ssl.t proxy_ssl_verify.t ssl_cache.t
90+
stream_proxy_protocol_ssl.t stream_proxy_ssl_conf_command.t
91+
stream_proxy_ssl.t stream_proxy_ssl_verify.t
92+
5393
- ref: 1.25.0
5494
test-ref: 5b2894ea1afd01a26c589ce11f310df118e42592
5595
# Following tests pass with sanitizer on
@@ -120,35 +160,26 @@ jobs:
120160
- name: untar build-dir
121161
run: tar -xf build-dir.tgz
122162

123-
- name: Install dependencies
124-
run: |
125-
sudo cpan -iT Proc::Find
163+
- name: Openssl version
164+
run: openssl version -a
126165

127-
# Locking in the version of SSLeay used with testing
128-
- name: Download and install Net::SSLeay 1.94 manually
129-
run: |
130-
curl -LO https://www.cpan.org/modules/by-module/Net/CHRISN/Net-SSLeay-1.94.tar.gz
131-
tar -xzf Net-SSLeay-1.94.tar.gz
132-
cd Net-SSLeay-1.94
133-
perl Makefile.PL
134-
make
135-
sudo make install
166+
- name: Setup Perl environment
167+
uses: shogo82148/actions-setup-perl@v1
168+
with:
169+
perl-version: '5.38.2'
136170

137171
# SSL version 2.091 changes '' return to undef causing test case to fail.
138172
# Locking in the test version to use as 2.090
139-
- name: Download and install IO::Socket::SSL 2.090 manually
173+
- name: Install dependencies
140174
run: |
141-
curl -LO https://www.cpan.org/modules/by-module/IO/IO-Socket-SSL-2.090.tar.gz
142-
tar -xzf IO-Socket-SSL-2.090.tar.gz
143-
cd IO-Socket-SSL-2.090
144-
perl Makefile.PL
145-
make
146-
sudo make install
175+
cpanm --notest Proc::Find Net::SSLeay@1.94 IO::Socket::SSL@2.090
147176
148177
- name: Checkout wolfssl-nginx
149178
uses: actions/checkout@v4
150179
with:
151-
repository: wolfssl/wolfssl-nginx
180+
# TODO fix this
181+
repository: julek-wolfssl/wolfssl-nginx
182+
ref: 1.28.0
152183
path: wolfssl-nginx
153184

154185
- name: Checkout nginx
@@ -211,37 +242,31 @@ jobs:
211242
run: |
212243
echo "nginx_c_flags=-O0" >> $GITHUB_ENV
213244
214-
- name: workaround high-entropy ASLR
215-
# not needed after either an update to llvm or runner is done
216-
run: sudo sysctl vm.mmap_rnd_bits=28
217-
218245
- name: Build nginx with sanitizer
219246
working-directory: nginx
220247
run: |
221248
./auto/configure --with-wolfssl=$GITHUB_WORKSPACE/build-dir --with-http_ssl_module \
222249
--with-stream --with-stream_ssl_module --with-stream_ssl_preread_module \
223250
--with-http_v2_module --with-mail --with-mail_ssl_module \
224-
--with-cc-opt='-fsanitize=address -DNGX_DEBUG_PALLOC=1 -g3 ${{ env.nginx_c_flags }}' \
251+
--with-cc-opt='-fsanitize=address -DNGX_DEBUG_PALLOC=1 -g3 \
252+
${{ env.nginx_c_flags }}' \
225253
--with-ld-opt='-fsanitize=address ${{ env.nginx_c_flags }}'
226254
make -j
227255
228256
- name: Confirm nginx built with wolfSSL
229257
working-directory: nginx
230258
run: ldd objs/nginx | grep wolfssl
231259

232-
- if: ${{ runner.debug }}
233-
name: Run nginx-tests with sanitizer (debug)
260+
- name: Create LSAN suppression file
234261
working-directory: nginx-tests
235262
run: |
236-
LD_LIBRARY_PATH=$LD_LIBRARY_PATH:$GITHUB_WORKSPACE/build-dir/lib \
237-
TMPDIR=$GITHUB_WORKSPACE TEST_NGINX_VERBOSE=y TEST_NGINX_CATLOG=y \
238-
TEST_NGINX_BINARY=../nginx/objs/nginx prove -v ${{ matrix.sanitize-ok }}
263+
echo "leak:ngx_worker_process_init" > lsan.supp
239264
240265
- if: ${{ !runner.debug }}
241266
name: Run nginx-tests with sanitizer
242267
working-directory: nginx-tests
243268
run: |
244269
LD_LIBRARY_PATH=$LD_LIBRARY_PATH:$GITHUB_WORKSPACE/build-dir/lib \
270+
LSAN_OPTIONS=suppressions=$GITHUB_WORKSPACE/nginx-tests/lsan.supp \
245271
TMPDIR=$GITHUB_WORKSPACE TEST_NGINX_BINARY=../nginx/objs/nginx \
246272
prove ${{ matrix.sanitize-ok }}
247-

.wolfssl_known_macro_extras

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -218,6 +218,7 @@ ECDHE_SIZE
218218
ENABLE_SECURE_SOCKETS_LOGS
219219
ESP32
220220
ESP8266
221+
ESPIPE
221222
ESP_ENABLE_WOLFSSH
222223
ESP_IDF_VERSION
223224
ESP_IDF_VERSION_MAJOR
@@ -361,6 +362,7 @@ NO_ASM
361362
NO_ASN_OLD_TYPE_NAMES
362363
NO_CAMELLIA_CBC
363364
NO_CERT
365+
NO_CERT_IN_TICKET
364366
NO_CIPHER_SUITE_ALIASES
365367
NO_CLIENT_CACHE
366368
NO_CLOCK_SPEEDUP

configure.ac

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2681,7 +2681,8 @@ if test "$ENABLED_LIBWEBSOCKETS" = "yes" || test "$ENABLED_OPENVPN" = "yes" || \
26812681
test "$ENABLED_OPENRESTY" = "yes" || test "$ENABLED_RSYSLOG" = "yes" || \
26822682
test "$ENABLED_KRB" = "yes" || test "$ENABLED_CHRONY" = "yes" || \
26832683
test "$ENABLED_FFMPEG" = "yes" || test "$ENABLED_STRONGSWAN" = "yes" || \
2684-
test "$ENABLED_OPENLDAP" = "yes" || test "x$ENABLED_MOSQUITTO" = "xyes" || test "$ENABLED_HITCH" = "yes"
2684+
test "$ENABLED_OPENLDAP" = "yes" || test "x$ENABLED_MOSQUITTO" = "xyes" || \
2685+
test "$ENABLED_HITCH" = "yes" || test "$ENABLED_NGINX" = "yes"
26852686
then
26862687
ENABLED_OPENSSLALL="yes"
26872688
fi

src/bio.c

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1938,6 +1938,8 @@ int wolfSSL_BIO_get_len(WOLFSSL_BIO *bio)
19381938
len = BAD_FUNC_ARG;
19391939
if (len == 0) {
19401940
len = wolfssl_file_len(file, &memSz);
1941+
if (len == WC_NO_ERR_TRACE(WOLFSSL_BAD_FILETYPE))
1942+
len = 0;
19411943
}
19421944
if (len == 0) {
19431945
len = (int)memSz;

src/crl.c

Lines changed: 22 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1128,6 +1128,28 @@ WOLFSSL_X509_CRL* wolfSSL_X509_CRL_dup(const WOLFSSL_X509_CRL* crl)
11281128
return ret;
11291129
}
11301130

1131+
#ifdef OPENSSL_ALL
1132+
int wolfSSL_X509_CRL_up_ref(WOLFSSL_X509_CRL* crl)
1133+
{
1134+
int ret;
1135+
1136+
if (crl == NULL)
1137+
return WOLFSSL_FAILURE;
1138+
1139+
wolfSSL_RefInc(&crl->ref, &ret);
1140+
#ifdef WOLFSSL_REFCNT_ERROR_RETURN
1141+
if (ret != 0) {
1142+
WOLFSSL_MSG("Failed to lock x509 mutex");
1143+
return WOLFSSL_FAILURE;
1144+
}
1145+
#else
1146+
(void)ret;
1147+
#endif
1148+
1149+
return WOLFSSL_SUCCESS;
1150+
}
1151+
#endif
1152+
11311153
/* returns WOLFSSL_SUCCESS on success. Does not take ownership of newcrl */
11321154
int wolfSSL_X509_STORE_add_crl(WOLFSSL_X509_STORE *store, WOLFSSL_X509_CRL *newcrl)
11331155
{

src/dtls.c

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -403,8 +403,9 @@ static int TlsTicketIsValid(const WOLFSSL* ssl, WolfSSL_ConstVector exts,
403403
if (!IsAtLeastTLSv1_3(it->pv))
404404
*resume = TRUE;
405405
}
406-
if (it != NULL)
407-
ForceZero(it, sizeof(InternalTicket));
406+
/* `it` points into tempTicket on successful decryption so clearing it will
407+
* also satisfy the WOLFSSL_CHECK_MEM_ZERO check. */
408+
ForceZero(tempTicket, SESSION_TICKET_LEN);
408409
return 0;
409410
}
410411
#endif /* HAVE_SESSION_TICKET */

0 commit comments

Comments
 (0)