**tl;dr:** The functions `{add,del}_ssl` modify a server section of the UCI config if there is no `.conf` file with the same name in `/etc/nginx/conf.d/`. Then `init_lan` creates `/var/lib/nginx/uci.conf` files by copying the `/etc/nginx/uci.conf.template` and standard options from the UCI config; additionally the special path `logd` can be used in `{access,error}_log`. The init does not change the configuration beside re-creating self-signed certificates when needed. This is also the only purpose of the new `check_ssl`, which is installed as yearly cron job. **Initialization:** Invoking `nginx-util init_lan` parses the UCI configuration for package `nginx`. It creates a server part in `/var/lib/nginx/uci.conf` for each `section server '$name'` by copying all UCI options but the following: * `option uci_manage_ssl` is skipped. It is set to 'self-signed' by `nginx-util add_ssl $name`, removed by `nginx-util del_ssl $name` and used by `nginx-util check_ssl` (see below). * `logd` as path in `error_log` or `access_log` writes them to STDERR respective STDOUT, which are fowarded by Nginx's init to the log daemon. Specifically: `option error_log 'logd'` becomes `error_log stderr;` and `option access_log 'logd openwrt'` becomes `access_log /proc/self/fd/1 openwrt;` Other `[option|list] key 'value'` entries just become `key value;` directives. The init.d calls internally also `check_ssl` for rebuilding self-signed SSL certificates if needed (see below). And it still sets up `/var/lib/nginx/lan{,_ssl}.listen` files as it is doing in the current version (so they stay available). **Defaults:** The package installs the file `/etc/nginx/restrict_locally` containing allow/deny directives for restricting the access to LAN addresses by including it into a server part. The default server '_lan' includes this file and listens on all IPs (instead of only the local IPs as it did before; other servers do not need to listen explicitly on the local IPs anymore). The default server is contained together with a server that redirects HTTP requests for inexistent URLs to HTTPS in the UCI configuration file `/etc/config/nginx`. Furthermore, the packages installs a `/etc/nginx/uci.conf.template` containing the current setup and a marker, which will be replaced by the created UCI servers when calling `init_lan`. **Other:** If there is a file named `/etc/nginx/conf.d/$name.conf` the functions `init_lan`, `add_ssl $name` and `del_ssl $name` will use that file instead of a UCI server section (this is similar to the current version). Else it selects the UCI `section server $name`, or, when there is no such section, it searches for the first one having `option server_name '… $name …'`. For this section: * `nginx-util add_ssl $name` will add to it: `option uci_manage_ssl 'self-signed'` `option ssl_certificate '/etc/nginx/conf.d/$name.crt'` `option ssl_certificate_key '/etc/nginx/conf.d/$name.key'` `option ssl_session_cache 'shared:SSL:32k'` `option ssl_session_timeout '64m'` If these options are already present, they will stay the same; just the first option `uci_manage_ssl` will always be changed to 'self-signed'. The command also changes all `listen` list items to use port 443 and ssl instead of port 80 (without ssl). If they stated another port than 80 before, they are kept the same. Furthermore, it creates a self-signed SSL certificate if necessary, i.e., if there is no *valid* certificate and key at the locations given by the options `ssl_certificate` and `ssl_certificate_key`. * `nginx-util del_ssl $name` checks if `uci_manage_ssl` is set 'self-signed' in the corresponding UCI section. Only then it removes all of the above options regardless of the value looking just at the key name. Then, it also changes all `listen` list items to use port 80 (without ssl) instead of port 443 with ssl. If stating another port than 443, they are kept the same. Furthermore, it removes the SSL certificate and key that were indicated by `ssl_certificate{,_key}`. * `nginx-util check_ssl` looks through all server sections of the UCI config for `uci_manage_ssl 'self-signed'`. On every hit it checks if the SSL certificate-key-pair indicated by the options `ssl_certificate{,_key}` is expired. Then it re-creates a self-signed certificate. If there exists at least one `section server` with `uci_manage_ssl 'self-signed'`, it will try to install itself as cron job. If there are no such sections, it removes that cron job if possible. For installing a ssl certificate and key managed by another app, you can call: `nginx-util add_ssl $name $manager $crtpath $keypath` Hereby `$name` is as above, `$manager` is an arbitrary string, and the the ssl certificate and its key are indicated by their absolute path. If you want to remove the directives again, then you can use: `nginx-util del_ssl $name $manager` Signed-off-by: Peter Stadler <peter.stadler@student.uibk.ac.at>
378 lines
12 KiB
C++
378 lines
12 KiB
C++
#include <iostream>
|
|
#include <numeric>
|
|
|
|
#include "nginx-ssl-util.hpp"
|
|
#include "nginx-util.hpp"
|
|
|
|
static auto constexpr file_comment_auto_created =
|
|
std::string_view{"# This file is re-created when Nginx starts.\n"};
|
|
|
|
// TODO(pst) replace it with blobmsg_get_string if upstream takes const:
|
|
#ifndef NO_UBUS
|
|
static inline auto _pst_get_string(const blob_attr* attr) -> char*
|
|
{
|
|
return static_cast<char*>(blobmsg_data(attr));
|
|
}
|
|
#endif
|
|
|
|
void create_lan_listen() // create empty files for compatibility:
|
|
{
|
|
// TODO(pst): replace by dummies after transitioning nginx config to UCI:
|
|
std::vector<std::string> ips;
|
|
|
|
#ifndef NO_UBUS
|
|
try {
|
|
auto loopback_status = ubus::call("network.interface.loopback", "status");
|
|
|
|
for (const auto* ip : loopback_status.filter("ipv4-address", "", "address")) {
|
|
ips.emplace_back(_pst_get_string(ip));
|
|
}
|
|
|
|
for (const auto* ip : loopback_status.filter("ipv6-address", "", "address")) {
|
|
ips.emplace_back(std::string{"["} + _pst_get_string(ip) + "]");
|
|
}
|
|
}
|
|
catch (const std::runtime_error&) { /* do nothing about it */
|
|
}
|
|
|
|
try {
|
|
auto lan_status = ubus::call("network.interface.lan", "status");
|
|
|
|
for (const auto* ip : lan_status.filter("ipv4-address", "", "address")) {
|
|
ips.emplace_back(_pst_get_string(ip));
|
|
}
|
|
|
|
for (const auto* ip : lan_status.filter("ipv6-address", "", "address")) {
|
|
ips.emplace_back(std::string{"["} + _pst_get_string(ip) + "]");
|
|
}
|
|
|
|
for (const auto* ip :
|
|
lan_status.filter("ipv6-prefix-assignment", "", "local-address", "address")) {
|
|
ips.emplace_back(std::string{"["} + _pst_get_string(ip) + "]");
|
|
}
|
|
}
|
|
catch (const std::runtime_error&) { /* do nothing about it */
|
|
}
|
|
#else
|
|
ips.emplace_back("127.0.0.1");
|
|
#endif
|
|
|
|
std::string listen = std::string{file_comment_auto_created};
|
|
std::string listen_default = std::string{file_comment_auto_created};
|
|
for (const auto& ip : ips) {
|
|
listen += "\tlisten " + ip + ":80;\n";
|
|
listen_default += "\tlisten " + ip + ":80 default_server;\n";
|
|
}
|
|
write_file(LAN_LISTEN, listen);
|
|
write_file(LAN_LISTEN_DEFAULT, listen_default);
|
|
|
|
std::string ssl_listen = std::string{file_comment_auto_created};
|
|
std::string ssl_listen_default = std::string{file_comment_auto_created};
|
|
for (const auto& ip : ips) {
|
|
ssl_listen += "\tlisten " + ip + ":443 ssl;\n";
|
|
ssl_listen_default += "\tlisten " + ip + ":443 ssl default_server;\n";
|
|
}
|
|
write_file(LAN_SSL_LISTEN, ssl_listen);
|
|
write_file(LAN_SSL_LISTEN_DEFAULT, ssl_listen_default);
|
|
}
|
|
|
|
inline auto change_if_starts_with(const std::string_view& subject,
|
|
const std::string_view& prefix,
|
|
const std::string_view& substitute,
|
|
const std::string_view& seperator = " \t\n;") -> std::string
|
|
{
|
|
auto view = subject;
|
|
view = view.substr(view.find_first_not_of(seperator));
|
|
if (view.rfind(prefix, 0) == 0) {
|
|
if (view.size() == prefix.size()) {
|
|
return std::string{substitute};
|
|
}
|
|
view = view.substr(prefix.size());
|
|
if (seperator.find(view[0]) != std::string::npos) {
|
|
auto ret = std::string{substitute};
|
|
ret += view;
|
|
return ret;
|
|
}
|
|
}
|
|
return std::string{subject};
|
|
}
|
|
|
|
inline auto create_server_conf(const uci::section& sec, const std::string& indent = "")
|
|
-> std::string
|
|
{
|
|
auto secname = sec.name();
|
|
|
|
auto legacypath = std::string{CONF_DIR} + secname + ".conf";
|
|
if (access(legacypath.c_str(), R_OK) == 0) {
|
|
auto message = std::string{"skipped UCI server 'nginx."} + secname;
|
|
message += "' as it could conflict with: " + legacypath + "\n";
|
|
|
|
// TODO(pst) std::cerr<<"create_server_conf notice: "<<message;
|
|
|
|
return indent + "# " + message;
|
|
} // else:
|
|
|
|
auto conf = indent + "server { #see uci show 'nginx." + secname + "'\n";
|
|
|
|
for (auto opt : sec) {
|
|
for (auto itm : opt) {
|
|
if (opt.name().rfind("uci_", 0) == 0) {
|
|
continue;
|
|
}
|
|
// else: standard opt.name()
|
|
|
|
auto val = itm.name();
|
|
|
|
if (opt.name() == "error_log") {
|
|
val = change_if_starts_with(val, "logd", "/proc/self/fd/1");
|
|
}
|
|
|
|
else if (opt.name() == "access_log") {
|
|
val = change_if_starts_with(val, "logd", "stderr");
|
|
}
|
|
|
|
conf += indent + "\t" + opt.name() + " " + itm.name() + ";\n";
|
|
}
|
|
}
|
|
|
|
conf += indent + "}\n";
|
|
|
|
return conf;
|
|
}
|
|
|
|
void init_uci(const uci::package& pkg)
|
|
{
|
|
auto conf = std::string{file_comment_auto_created};
|
|
|
|
static const auto uci_http_config = std::string_view{"#UCI_HTTP_CONFIG\n"};
|
|
|
|
const auto tmpl = read_file(std::string{UCI_CONF} + ".template");
|
|
auto pos = tmpl.find(uci_http_config);
|
|
|
|
if (pos == std::string::npos) {
|
|
conf += tmpl;
|
|
}
|
|
|
|
else {
|
|
const auto index = tmpl.find_last_not_of(" \t", pos - 1);
|
|
|
|
const auto before = tmpl.begin() + index + 1;
|
|
const auto middle = tmpl.begin() + pos;
|
|
const auto after = middle + uci_http_config.length();
|
|
|
|
conf.append(tmpl.begin(), before);
|
|
|
|
const auto indent = std::string{before, middle};
|
|
for (auto sec : pkg) {
|
|
if (sec.type() == std::string_view{"server"}) {
|
|
conf += create_server_conf(sec, indent) + "\n";
|
|
}
|
|
}
|
|
|
|
conf.append(after, tmpl.end());
|
|
}
|
|
|
|
write_file(VAR_UCI_CONF, conf);
|
|
}
|
|
|
|
auto is_enabled(const uci::package& pkg) -> bool
|
|
{
|
|
for (auto sec : pkg) {
|
|
if (sec.type() != std::string_view{"main"}) {
|
|
continue;
|
|
}
|
|
if (sec.name() != std::string_view{"global"}) {
|
|
continue;
|
|
}
|
|
for (auto opt : sec) {
|
|
if (opt.name() != "uci_enable") {
|
|
continue;
|
|
}
|
|
for (auto itm : opt) {
|
|
if (itm) {
|
|
return true;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
return false;
|
|
}
|
|
|
|
/*
|
|
* ___________main_thread________________|______________thread_1________________
|
|
* create_lan_listen() or do nothing | config = uci::package("nginx")
|
|
* if config_enabled (set in thread_1): | config_enabled = is_enabled(config)
|
|
* then init_uci(config) | check_ssl(config, config_enabled)
|
|
*/
|
|
void init_lan()
|
|
{
|
|
std::exception_ptr ex;
|
|
std::unique_ptr<uci::package> config;
|
|
bool config_enabled = false;
|
|
std::mutex configuring;
|
|
|
|
configuring.lock();
|
|
auto thrd = std::thread([&config, &config_enabled, &configuring, &ex] {
|
|
try {
|
|
config = std::make_unique<uci::package>("nginx");
|
|
config_enabled = is_enabled(*config);
|
|
configuring.unlock();
|
|
check_ssl(*config, config_enabled);
|
|
}
|
|
catch (...) {
|
|
std::cerr << "init_lan error: checking UCI file /etc/config/nginx\n";
|
|
ex = std::current_exception();
|
|
}
|
|
});
|
|
|
|
try {
|
|
create_lan_listen();
|
|
}
|
|
catch (...) {
|
|
std::cerr << "init_lan error: cannot create listen files of local IPs.\n";
|
|
ex = std::current_exception();
|
|
}
|
|
|
|
configuring.lock();
|
|
if (config_enabled) {
|
|
try {
|
|
init_uci(*config);
|
|
}
|
|
catch (...) {
|
|
std::cerr << "init_lan error: cannot create " << VAR_UCI_CONF << " from ";
|
|
std::cerr << UCI_CONF << ".template using UCI file /etc/config/nginx\n";
|
|
ex = std::current_exception();
|
|
}
|
|
}
|
|
|
|
thrd.join();
|
|
if (ex) {
|
|
std::rethrow_exception(ex);
|
|
}
|
|
}
|
|
|
|
void get_env()
|
|
{
|
|
std::cout << "UCI_CONF="
|
|
<< "'" << UCI_CONF << "'" << std::endl;
|
|
std::cout << "NGINX_CONF="
|
|
<< "'" << NGINX_CONF << "'" << std::endl;
|
|
std::cout << "CONF_DIR="
|
|
<< "'" << CONF_DIR << "'" << std::endl;
|
|
std::cout << "LAN_NAME="
|
|
<< "'" << LAN_NAME << "'" << std::endl;
|
|
std::cout << "LAN_LISTEN="
|
|
<< "'" << LAN_LISTEN << "'" << std::endl;
|
|
std::cout << "LAN_SSL_LISTEN="
|
|
<< "'" << LAN_SSL_LISTEN << "'" << std::endl;
|
|
std::cout << "SSL_SESSION_CACHE_ARG="
|
|
<< "'" << SSL_SESSION_CACHE_ARG(LAN_NAME) << "'" << std::endl;
|
|
std::cout << "SSL_SESSION_TIMEOUT_ARG="
|
|
<< "'" << SSL_SESSION_TIMEOUT_ARG << "'\n";
|
|
std::cout << "ADD_SSL_FCT="
|
|
<< "'" << ADD_SSL_FCT << "'" << std::endl;
|
|
std::cout << "MANAGE_SSL="
|
|
<< "'" << MANAGE_SSL << "'" << std::endl;
|
|
}
|
|
|
|
auto main(int argc, char* argv[]) -> int
|
|
{
|
|
// TODO(pst): use std::span when available:
|
|
auto args = std::basic_string_view<char*>{argv, static_cast<size_t>(argc)};
|
|
|
|
auto cmds = std::array{
|
|
std::array<std::string_view, 2>{"init_lan", ""},
|
|
std::array<std::string_view, 2>{"get_env", ""},
|
|
std::array<std::string_view, 2>{
|
|
ADD_SSL_FCT, "server_name [manager /path/to/ssl_certificate /path/to/ssl_key]"},
|
|
std::array<std::string_view, 2>{"del_ssl", "server_name [manager]"},
|
|
std::array<std::string_view, 2>{"check_ssl", ""},
|
|
};
|
|
|
|
try {
|
|
if (argc == 2 && args[1] == cmds[0][0]) {
|
|
init_lan();
|
|
}
|
|
|
|
else if (argc == 2 && args[1] == cmds[1][0]) {
|
|
get_env();
|
|
}
|
|
|
|
else if (argc == 3 && args[1] == cmds[2][0]) {
|
|
add_ssl_if_needed(std::string{args[2]});
|
|
}
|
|
|
|
// NOLINTNEXTLINE(readability-magic-numbers,cppcoreguidelines-avoid-magic-numbers): 6
|
|
else if (argc == 6 && args[1] == cmds[2][0]) {
|
|
// NOLINTNEXTLINE(readability-magic-numbers,cppcoreguidelines-avoid-magic-numbers): 5
|
|
add_ssl_if_needed(std::string{args[2]}, args[3], args[4], args[5]);
|
|
}
|
|
|
|
else if (argc == 3 && args[1] == cmds[3][0]) {
|
|
del_ssl(std::string{args[2]});
|
|
}
|
|
|
|
else if (argc == 4 && args[1] == cmds[3][0]) {
|
|
del_ssl(std::string{args[2]}, args[3]);
|
|
}
|
|
|
|
else if (argc == 2 && args[1] == cmds[3][0]) // TODO(pst) deprecate
|
|
{
|
|
try {
|
|
auto name = std::string{LAN_NAME};
|
|
if (del_ssl_legacy(name)) {
|
|
auto crtpath = std::string{CONF_DIR} + name + ".crt";
|
|
remove(crtpath.c_str());
|
|
auto keypath = std::string{CONF_DIR} + name + ".key";
|
|
remove(keypath.c_str());
|
|
}
|
|
}
|
|
catch (...) { /* do nothing. */
|
|
}
|
|
}
|
|
|
|
else if (argc == 2 && args[1] == cmds[4][0]) {
|
|
check_ssl(uci::package{"nginx"});
|
|
}
|
|
|
|
else {
|
|
std::cerr << "Tool for creating Nginx configuration files (";
|
|
#ifdef VERSION
|
|
std::cerr << "version " << VERSION << " ";
|
|
#endif
|
|
std::cerr << "with libuci, ";
|
|
#ifndef NO_UBUS
|
|
std::cerr << "libubus, ";
|
|
#endif
|
|
std::cerr << "libopenssl, ";
|
|
#ifndef NO_PCRE
|
|
std::cerr << "PCRE, ";
|
|
#endif
|
|
std::cerr << "pthread and libstdcpp)." << std::endl;
|
|
|
|
auto usage =
|
|
std::accumulate(cmds.begin(), cmds.end(), std::string{"usage: "} + *argv + " [",
|
|
[](const auto& use, const auto& cmd) {
|
|
return use + std::string{cmd[0]} + (cmd[1].empty() ? "" : " ") +
|
|
std::string{cmd[1]} + "|";
|
|
});
|
|
usage[usage.size() - 1] = ']';
|
|
std::cerr << usage << std::endl;
|
|
|
|
throw std::runtime_error("main error: argument not recognized");
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
catch (const std::exception& e) {
|
|
std::cerr << " * " << *argv << " " << e.what() << "\n";
|
|
}
|
|
|
|
catch (...) {
|
|
std::cerr << " * * " << *argv;
|
|
perror(" main error");
|
|
}
|
|
|
|
return 1;
|
|
}
|