Skip to content

Commit f44f563

Browse files
committed
Merge branch 'ssl' of https://github.com/tarcieri/redis-rb into 3.3
2 parents 14726d4 + 0f44131 commit f44f563

16 files changed

+517
-4
lines changed

README.md

Lines changed: 40 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -222,6 +222,46 @@ end
222222

223223
See lib/redis/errors.rb for information about what exceptions are possible.
224224

225+
## SSL/TLS Support
226+
227+
This library supports natively terminating client side SSL/TLS connections
228+
when talking to Redis via a server-side proxy such as [stunnel], [hitch],
229+
or [ghostunnel].
230+
231+
To enable SSL support, pass the `:ssl => :true` option when configuring the
232+
Redis client, or pass in `:url => "rediss://..."` (like HTTPS for Redis).
233+
You will also need to pass in an `:ssl_params => { ... }` hash used to
234+
configure the `OpenSSL::SSL::SSLContext` object used for the connection:
235+
236+
```ruby
237+
redis = Redis.new(:url => "rediss://:[email protected]:6381/15", :ssl_params => { :ca_file => "/path/to/ca.crt" })
238+
```
239+
240+
The options given to `:ssl_params` are passed directly to the
241+
`OpenSSL::SSL::SSLContext#set_params` method and can be any valid attribute
242+
of the SSL context. Please see the [OpenSSL::SSL::SSLContext documentation]
243+
for all of the available attributes.
244+
245+
Here is an example of passing in params that can be used for SSL client
246+
certificate authentication (a.k.a. mutual TLS):
247+
248+
```ruby
249+
redis = Redis.new(
250+
:url => "rediss://:[email protected]:6381/15",
251+
:ssl_params => {
252+
:ca_file => "/path/to/ca.crt",
253+
:cert => OpenSSL::X509::Certificate.new(File.read("client.crt")),
254+
:key => OpenSSL::PKey::RSA.new(File.read("client.key"))
255+
}
256+
)
257+
```
258+
259+
[stunnel]: https://www.stunnel.org/
260+
[hitch]: https://hitch-tls.org/
261+
[ghostunnel]: https://github.com/square/ghostunnel
262+
[OpenSSL::SSL::SSLContext documentation]: http://ruby-doc.org/stdlib-2.3.0/libdoc/openssl/rdoc/OpenSSL/SSL/SSLContext.html
263+
264+
*NOTE:* SSL is only supported by the default "Ruby" driver
225265

226266
## Timeouts
227267

lib/redis/client.rb

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -405,7 +405,7 @@ def _parse_options(options)
405405

406406
if uri.scheme == "unix"
407407
defaults[:path] = uri.path
408-
elsif uri.scheme == "redis"
408+
elsif uri.scheme == "redis" || uri.scheme == "rediss"
409409
defaults[:scheme] = uri.scheme
410410
defaults[:host] = uri.host if uri.host
411411
defaults[:port] = uri.port if uri.port
@@ -415,6 +415,8 @@ def _parse_options(options)
415415
else
416416
raise ArgumentError, "invalid uri scheme '#{uri.scheme}'"
417417
end
418+
419+
defaults[:ssl] = true if uri.scheme == "rediss"
418420
end
419421

420422
# Use default when option is not specified or nil

lib/redis/connection/hiredis.rb

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,8 @@ def self.connect(config)
1313

1414
if config[:scheme] == "unix"
1515
connection.connect_unix(config[:path], connect_timeout)
16+
elsif config[:scheme] == "rediss" || config[:ssl]
17+
raise NotImplementedError, "SSL not supported by hiredis driver"
1618
else
1719
connection.connect(config[:host], config[:port], connect_timeout)
1820
end

lib/redis/connection/ruby.rb

Lines changed: 36 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,12 +4,22 @@
44
require "socket"
55
require "timeout"
66

7+
begin
8+
require "openssl"
9+
rescue LoadError
10+
# Not all systems have OpenSSL support
11+
end
12+
713
class Redis
814
module Connection
915
module SocketMixin
1016

1117
CRLF = "\r\n".freeze
1218

19+
# Exceptions raised during non-blocking I/O ops that require retrying the op
20+
NBIO_EXCEPTIONS = [Errno::EWOULDBLOCK, Errno::EAGAIN]
21+
NBIO_EXCEPTIONS << IO::WaitReadable if RUBY_VERSION >= "1.9.3"
22+
1323
def initialize(*args)
1424
super(*args)
1525

@@ -54,10 +64,11 @@ def gets
5464
end
5565

5666
def _read_from_socket(nbytes)
67+
5768
begin
5869
read_nonblock(nbytes)
5970

60-
rescue Errno::EWOULDBLOCK, Errno::EAGAIN
71+
rescue *NBIO_EXCEPTIONS
6172
if IO.select([self], nil, nil, @timeout)
6273
retry
6374
else
@@ -209,6 +220,27 @@ def self.connect(path, timeout)
209220

210221
end
211222

223+
if defined?(OpenSSL)
224+
class SSLSocket < ::OpenSSL::SSL::SSLSocket
225+
include SocketMixin
226+
227+
def self.connect(host, port, timeout, ssl_params)
228+
# Note: this is using Redis::Connection::TCPSocket
229+
tcp_sock = TCPSocket.connect(host, port, timeout)
230+
231+
ctx = OpenSSL::SSL::SSLContext.new
232+
ctx.set_params(ssl_params) if ssl_params && !ssl_params.empty?
233+
234+
ssl_sock = new(tcp_sock, ctx)
235+
ssl_sock.hostname = host
236+
ssl_sock.connect
237+
ssl_sock.post_connection_check(host)
238+
239+
ssl_sock
240+
end
241+
end
242+
end
243+
212244
class Ruby
213245
include Redis::Connection::CommandHelper
214246

@@ -220,7 +252,10 @@ class Ruby
220252

221253
def self.connect(config)
222254
if config[:scheme] == "unix"
255+
raise ArgumentError, "SSL incompatible with unix sockets" if config[:ssl]
223256
sock = UNIXSocket.connect(config[:path], config[:connect_timeout])
257+
elsif config[:scheme] == "rediss" || config[:ssl]
258+
sock = SSLSocket.connect(config[:host], config[:port], config[:connect_timeout], config[:ssl_params])
224259
else
225260
sock = TCPSocket.connect(config[:host], config[:port], config[:connect_timeout])
226261
end

lib/redis/connection/synchrony.rb

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -68,6 +68,8 @@ class Synchrony
6868
def self.connect(config)
6969
if config[:scheme] == "unix"
7070
conn = EventMachine.connect_unix_domain(config[:path], RedisClient)
71+
elsif config[:scheme] == "rediss" || config[:ssl]
72+
raise NotImplementedError, "SSL not supported by synchrony driver"
7173
else
7274
conn = EventMachine.connect(config[:host], config[:port], RedisClient) do |c|
7375
c.pending_connect_timeout = [config[:connect_timeout], 0.1].max

test/ssl_test.rb

Lines changed: 66 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,66 @@
1+
# encoding: UTF-8
2+
3+
if RUBY_VERSION >= "1.9.3"
4+
require File.expand_path("helper", File.dirname(__FILE__))
5+
6+
class SslTest < Test::Unit::TestCase
7+
8+
include Helper::Client
9+
10+
driver(:ruby) do
11+
12+
def test_verified_ssl_connection
13+
RedisMock.start({ :ping => proc { "+PONG" } }, ssl_server_opts("trusted")) do |port|
14+
redis = Redis.new(:port => port, :ssl => true, :ssl_params => { :ca_file => ssl_ca_file })
15+
assert_equal redis.ping, "PONG"
16+
end
17+
end
18+
19+
def test_unverified_ssl_connection
20+
assert_raise(OpenSSL::SSL::SSLError) do
21+
RedisMock.start({ :ping => proc { "+PONG" } }, ssl_server_opts("untrusted")) do |port|
22+
redis = Redis.new(:port => port, :ssl => true, :ssl_params => { :ca_file => ssl_ca_file })
23+
redis.ping
24+
end
25+
end
26+
end
27+
28+
end
29+
30+
driver(:hiredis, :synchrony) do
31+
32+
def test_ssl_not_implemented_exception
33+
assert_raise(NotImplementedError) do
34+
RedisMock.start({ :ping => proc { "+PONG" } }, ssl_server_opts("trusted")) do |port|
35+
redis = Redis.new(:port => port, :ssl => true, :ssl_params => { :ca_file => ssl_ca_file })
36+
redis.ping
37+
end
38+
end
39+
end
40+
41+
end
42+
43+
private
44+
45+
def ssl_server_opts(prefix)
46+
ssl_cert = File.join(cert_path, "#{prefix}-cert.crt")
47+
ssl_key = File.join(cert_path, "#{prefix}-cert.key")
48+
49+
{
50+
:ssl => true,
51+
:ssl_params => {
52+
:cert => OpenSSL::X509::Certificate.new(File.read(ssl_cert)),
53+
:key => OpenSSL::PKey::RSA.new(File.read(ssl_key))
54+
}
55+
}
56+
end
57+
58+
def ssl_ca_file
59+
File.join(cert_path, "trusted-ca.crt")
60+
end
61+
62+
def cert_path
63+
File.expand_path("../support/ssl/", __FILE__)
64+
end
65+
end
66+
end

test/support/redis_mock.rb

Lines changed: 13 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,19 @@
33
module RedisMock
44
class Server
55
def initialize(options = {}, &block)
6-
@server = TCPServer.new(options[:host] || "127.0.0.1", 0)
7-
@server.setsockopt(Socket::SOL_SOCKET, Socket::SO_REUSEADDR, true)
6+
tcp_server = TCPServer.new(options[:host] || "127.0.0.1", 0)
7+
tcp_server.setsockopt(Socket::SOL_SOCKET, Socket::SO_REUSEADDR, true)
8+
9+
if options[:ssl]
10+
ctx = OpenSSL::SSL::SSLContext.new
11+
12+
ssl_params = options.fetch(:ssl_params, {})
13+
ctx.set_params(ssl_params) unless ssl_params.empty?
14+
15+
@server = OpenSSL::SSL::SSLServer.new(tcp_server, ctx)
16+
else
17+
@server = tcp_server
18+
end
819
end
920

1021
def port

test/support/ssl/gen_certs.sh

Lines changed: 31 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,31 @@
1+
#!/bin/sh
2+
3+
get_subject() {
4+
if [ "$1" = "trusted" ]
5+
then
6+
echo "/C=IT/ST=Sicily/L=Catania/O=Redis/OU=Security/CN=127.0.0.1"
7+
else
8+
echo "/C=XX/ST=Untrusted/L=Evilville/O=Evil Hacker/OU=Attack Department/CN=127.0.0.1"
9+
fi
10+
}
11+
12+
# Generate two CAs: one to be considered trusted, and one that's untrusted
13+
for type in trusted untrusted; do
14+
rm -rf ./demoCA
15+
mkdir -p ./demoCA
16+
mkdir -p ./demoCA/certs
17+
mkdir -p ./demoCA/crl
18+
mkdir -p ./demoCA/newcerts
19+
mkdir -p ./demoCA/private
20+
touch ./demoCA/index.txt
21+
22+
openssl genrsa -out ${type}-ca.key 2048
23+
openssl req -new -x509 -days 12500 -key ${type}-ca.key -out ${type}-ca.crt -subj "$(get_subject $type)"
24+
openssl x509 -in ${type}-ca.crt -noout -next_serial -out ./demoCA/serial
25+
26+
openssl req -newkey rsa:2048 -keyout ${type}-cert.key -nodes -out ${type}-cert.req -subj "$(get_subject $type)"
27+
openssl ca -days 12500 -cert ${type}-ca.crt -keyfile ${type}-ca.key -out ${type}-cert.crt -infiles ${type}-cert.req
28+
rm ${type}-cert.req
29+
done
30+
31+
rm -rf ./demoCA

test/support/ssl/trusted-ca.crt

Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,25 @@
1+
-----BEGIN CERTIFICATE-----
2+
MIIEIDCCAwigAwIBAgIJAM7kyjC89Qj/MA0GCSqGSIb3DQEBCwUAMGcxCzAJBgNV
3+
BAYTAklUMQ8wDQYDVQQIEwZTaWNpbHkxEDAOBgNVBAcTB0NhdGFuaWExDjAMBgNV
4+
BAoTBVJlZGlzMREwDwYDVQQLEwhTZWN1cml0eTESMBAGA1UEAxMJMTI3LjAuMC4x
5+
MCAXDTE2MDQwMjAzMzQ0MVoYDzIwNTAwNjIzMDMzNDQxWjBnMQswCQYDVQQGEwJJ
6+
VDEPMA0GA1UECBMGU2ljaWx5MRAwDgYDVQQHEwdDYXRhbmlhMQ4wDAYDVQQKEwVS
7+
ZWRpczERMA8GA1UECxMIU2VjdXJpdHkxEjAQBgNVBAMTCTEyNy4wLjAuMTCCASIw
8+
DQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMeibFqEG38mtN9DSXy6NZdd7AjH
9+
4/D+VdDzlbJlI5IBACCV9p6P2j5PFlFvkHFE6vr6biMaLXNAmUHYfDzeT95LODHH
10+
t+8HlR51cNYrnt9B3eiVwEnJ7+axuDHg6nUgLXeKeog+vEqreZwLnFibxt2qpFze
11+
xzyKJ37Pm+iAey5glCc/v7ECYQ4sWVVV+ciC+sAwmZDfZXCBQtRRokJ6ikqQDwWV
12+
DugGcV46feTpu79OmkLLM8PI3E7ow2F/3iv67gmdlO5m9wX1ahWzJKUapBTxgf4X
13+
QG0s60WbC9iJIvgXRGW7wWSsqSVJkfLYllDTPgfpLyl1+FR3A4awrsPiMVUCAwEA
14+
AaOBzDCByTAdBgNVHQ4EFgQU+YG9kJR3Vy31d7QVyxRAYyKTK18wgZkGA1UdIwSB
15+
kTCBjoAU+YG9kJR3Vy31d7QVyxRAYyKTK1+ha6RpMGcxCzAJBgNVBAYTAklUMQ8w
16+
DQYDVQQIEwZTaWNpbHkxEDAOBgNVBAcTB0NhdGFuaWExDjAMBgNVBAoTBVJlZGlz
17+
MREwDwYDVQQLEwhTZWN1cml0eTESMBAGA1UEAxMJMTI3LjAuMC4xggkAzuTKMLz1
18+
CP8wDAYDVR0TBAUwAwEB/zANBgkqhkiG9w0BAQsFAAOCAQEAeFKB7DUixmxbdvNw
19+
n/mNoHK+OOZXmfxZDCo0v2gcQ4WXUiCqL6MagrImCvkEz5RL6Fk2ZflEV2iGQ5Ds
20+
CmF2n47ISpqG29bfI5R1rcbfqK/5tazUIhQu12ThNmkEh7hCuW/0LqJrnmxpuRLy
21+
le9e3svCC96lwjFczzU/utWurKt7S7Di3C4P+AXAJJuszDMLMCBLaB/3j24cNpOx
22+
zzeZo02x4rpsD2+MMfRDWMWezVEyk63KnI0kt3JGnepsKCFc48ZOk09LwFk3Rfaq
23+
zuKSgEJJw1mfsdBfysM0HQw20yyjSdoTEfQq3bXctTNi+pEOgW6x7TMsnngYYLXV
24+
9XTrpg==
25+
-----END CERTIFICATE-----

test/support/ssl/trusted-ca.key

Lines changed: 27 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,27 @@
1+
-----BEGIN RSA PRIVATE KEY-----
2+
MIIEpQIBAAKCAQEAx6JsWoQbfya030NJfLo1l13sCMfj8P5V0POVsmUjkgEAIJX2
3+
no/aPk8WUW+QcUTq+vpuIxotc0CZQdh8PN5P3ks4Mce37weVHnVw1iue30Hd6JXA
4+
Scnv5rG4MeDqdSAtd4p6iD68Sqt5nAucWJvG3aqkXN7HPIonfs+b6IB7LmCUJz+/
5+
sQJhDixZVVX5yIL6wDCZkN9lcIFC1FGiQnqKSpAPBZUO6AZxXjp95Om7v06aQssz
6+
w8jcTujDYX/eK/ruCZ2U7mb3BfVqFbMkpRqkFPGB/hdAbSzrRZsL2Iki+BdEZbvB
7+
ZKypJUmR8tiWUNM+B+kvKXX4VHcDhrCuw+IxVQIDAQABAoIBAQCzbGHiQJXOA+XQ
8+
O9OSjHGaJ8n6Yl2VvaE3eZXzjj8X/Fo271GGVVgbZE10x8aUZxKim+3dEqwCx+52
9+
ZbHTqyMxcX2CEDRaWwBFLdxKQU467iIZ5m26ZAp/1v7rpXBT8KWsqQNT7L6ihdd4
10+
zl6orOlhVPsAlSGQYcL5kHJZ1w/fL0phEbwdISd3PYhGHXMNmqfXorzJYHDQA4R+
11+
yR7WpP1dmnUeEKrHc9FFcBZ75BGlWjdCPZMFKc7IndZumarhBpWH9yZMUxrUIo4V
12+
SCweRUFdD5H1lMZ0YiIAE25wKNEQ2iGd3Jfr8Vj1KFSHC9I2FJA3aFRRUgTwxx/W
13+
h0mJy1ZJAoGBAPYsSSlwQdxZjnyZiVkNSD4MoLdof//nRxeKGejq6AiXDvcsLyJy
14+
0MKk4YBFw2249TWm/KBbMAFiBE7d8uPtP5pPfjNVPX6VltH3AhSZ7Ugbpo6C3NFA
15+
GpzFVtNaWgCVDloDVdmsY7ssDFuAIih0paklPAqnLY+Ua9m1BiEPrB+bAoGBAM+a
16+
i+0NMR4AyKpuo1exdd+7BIHw5HNPwGmR1ggdGWduH0zsOhEawQKKFv1X9xKAcXxW
17+
PyeD56/Tmn7fkWvuE8dOu9E6em0vgmxhYyn4nyLAFYF5uKXYo78MpIEThdpl1ldT
18+
iHwG/25vunaBUHhwbHPUD+F989tmRuCjoFkuA5nPAoGAaqPIlcDhZvkMtoE0dHVC
19+
hE6oGIuWV17y9wmGK9YG6iG2A/EKAhxGvur6HL0b6Z4j6zgJW9Xkt9SkFR4kqAQQ
20+
d2JUQxx75SgcC5y7M/1yQrhnsHiT+7mPTbZW5HvRXUs0yl2DhSYeleiA+epJ4ciW
21+
Mu3EUsEVBYvAJLE8lHnbkF0CgYEAhyxpz3+3a4G3JsHDOWYjCfoLhVAEb9CNyC9c
22+
3QuVbvMVDlEBvgFdivm+3lZYWYOoYP0HQgNw59svzUxks5Hg7vUk9abN8CnvEgKX
23+
PszTUR0g450NzW6xr8PbmO/NR9bnKRUK2Tb1OkMldePdMY6CDykU7g3EqiZ+H+Zq
24+
kaaUUaECgYEAmk5W+S94q5jLemnfAChC5lva/0/aHdhtaoH4Lo+j0haMsdiy8/ZE
25+
sh+3gQ8pqwaCAwnKxAcppt/FNZ7tHRsH3oyY6biypn3WppQj+BA41nuzbspOKJhR
26+
ZDXKFCItbzUjyi23Dx4P4DgMivkpV+e88RMIuBnv4yjl5iOLq+vf4Rg=
27+
-----END RSA PRIVATE KEY-----

0 commit comments

Comments
 (0)