Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Implement SSL_CTX_set_cert_cb #456

Merged
merged 81 commits into from
Sep 16, 2024
Merged

Implement SSL_CTX_set_cert_cb #456

merged 81 commits into from
Sep 16, 2024

Conversation

AndrewBarba
Copy link
Contributor

@AndrewBarba AndrewBarba commented Jan 15, 2024

This is a first pass at reviving #311 in order to fix #310

Credit to @TechnikEmpire, I did my best to address the comments in the original PR from @Lukasa

If the approach looks okay I'll move to testing

@AndrewBarba AndrewBarba changed the title First pass at reviving #311 Implement SSL_CTX_set_cert_cb Jan 15, 2024
@AndrewBarba AndrewBarba requested a review from Lukasa January 16, 2024 03:16
@AndrewBarba
Copy link
Contributor Author

AndrewBarba commented Jan 16, 2024

@Lukasa Thanks so much for the comments earlier. I've since changed quite a bit now that I have a better understanding of whats going on. I was able to create a test that at least ensures the handshake is completing successfully, where as before I was never signaling to the connection that our async lookup was complete. Im sure there's still a lot more testing and error handling we can do but I wanted to pause here and wait for more feedback.

I also want to call out that I'm concerned about this API returning a new NIOSSLContext given how expensive it is to create one. The main purpose of this API would be to serve many dynamic certificates, and at scale if we're constantly creating new contexts could this be a big problem? I'm wondering if a better API is return a new TLSConfiguration struct, and then apply the relevant parts of the configuration instead of swapping the entire context.

@AndrewBarba AndrewBarba requested a review from Lukasa July 23, 2024 03:45
@AndrewBarba AndrewBarba requested a review from Lukasa July 23, 2024 19:18
@AndrewBarba
Copy link
Contributor Author

@Lukasa I'm having problems getting CI to pass, it's failing to compile with a fatalError but no details reported. Everything builds and tests pass locally

@Lukasa
Copy link
Contributor

Lukasa commented Aug 23, 2024

So you can use the docker-compose files in the repo to generate a simulacrum of the CI (for now, until we cut over to GHA). The steps are:

docker-compose -f docker/docker-compose.yaml -f docker/docker-compose.2204.510.yaml build
docker-compose -f docker/docker-compose.yaml -f docker/docker-compose.2204.510.yaml run test

That latter command reveals the issue:

/swift-nio-ssl/Tests/NIOSSLTests/TLSConfigurationTest.swift:824:98: error: 'file' is deprecated: Use 'NIOSSLPrivateKeySource.privateKey(NIOSSLPrivateKey)' to set private key
        var config = TLSConfiguration.makeServerConfiguration(certificateChain: [], privateKey: .file("fake.file"))
                                                                                                 ^
/swift-nio-ssl/Tests/NIOSSLTests/TLSConfigurationTest.swift:824:98: error: 'file' is deprecated: Use 'NIOSSLPrivateKeySource.privateKey(NIOSSLPrivateKey)' to set private key
        var config = TLSConfiguration.makeServerConfiguration(certificateChain: [], privateKey: .file("fake.file"))

@AndrewBarba AndrewBarba requested a review from Lukasa August 30, 2024 19:26
@AndrewBarba
Copy link
Contributor Author

Thanks @Lukasa I think this is ready for another review.

@Lukasa Lukasa added the 🆕 semver/minor Adds new public API. label Sep 16, 2024
Copy link
Contributor

@Lukasa Lukasa left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Great, really nice job here @AndrewBarba! Thanks for persevering with the reviews, I think it left this patch in a great state. We're good to go.

@Lukasa Lukasa merged commit e9021d1 into apple:main Sep 16, 2024
8 of 9 checks passed
@AndrewBarba AndrewBarba deleted the dynamic-certs branch September 16, 2024 14:28
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
🆕 semver/minor Adds new public API.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Certificate selection for servers is missing
2 participants