/usr/lib/ocaml/rpc/rpc_server.mli is in libocamlnet-ocaml-dev 4.1.2-3.
This file is owned by root:root, with mode 0o644.
The actual contents of the file can be viewed below.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597 598 599 600 601 602 603 604 605 606 607 608 609 610 611 612 613 614 615 616 617 618 619 620 621 622 623 624 625 | (* $Id$
* ----------------------------------------------------------------------
*
*)
(** RPC servers *)
(** Like the client, the RPC server module is programmed on top of the
* Unixqueue event system. It pushes itself on an existing Unixqueue
* as a new service that accepts RPC calls, forwards them to configurable
* functions, and sends the replies back.
*
* The server module can manage two kinds of RPC functions: synchronous
* and asynchronous. Synchronous functions compute their result immediately
* and thus the result can be sent back just after the evaluation of the
* function has finished. In contrast to this, asynchronous functions only
* get noticed about the call and need not to know immediately what should
* be answered. Typically, an asynchronous function initiates a second
* communication channel and its result depends on what happens on the
* second channel. The communication on this channel is done in an
* asynchronous way, too, and can be managed by the same event system that
* carries out the RPC service. After several input or output events,
* the result has somehow been computed, and the answer can be sent
* back to the original caller. To do so, the asynchronous RPC function
* invokes 'reply' together with the necessary session IDs that identify
* the answer among all answers.
*)
open Netnumber
open Netxdr
open Rpc
exception Connection_lost
(** raised by the 'reply' function if the connection to the original caller
* has been lost in the meantime.
*)
type t
(** represents a server for an RPC program *)
type session
(** identifies a pair of a call and a reply *)
type connection_id
(** identifies the connection of a session. For connectionless servers,
* every session gets a new connection_id.
* You can compare connection_ids to find out whether two sessions
* belong to the same connection. Use "=" for equality.
*)
type connector =
| Localhost of int
(** The service is installed on 'localhost' and listens on the
* given port number. A number of 0 means that the port is
* chosen by the operating system.
* Note: The service is only locally reachable.
*
* IPv6: not supported for compatibility reasons
*)
| Portmapped
(** The service is installed on every network interface; the port is
* chosen by the operating system; the program is registered with the
* portmapper (or rpcbind).
*
* IPv6: if the socket can be bound to ::, this is preferred. Also,
* if {!Netsys.is_ipv6_system} returns true, the IPv6 capability is
* registered with rpcbind.
*)
| Internet of (Unix.inet_addr * int)
(** The service is installed on the passed interface/port combination.
* Use [Unix.inet_addr_any] to listen on all network interfaces (IPv4),
* or [Unix.inet6_addr_any] for IPv6 and IPv4.
* Use port 0 to automatically choose the port number.
*)
| Unix of string
(** The service is installed on a Unix domain socket.
* Note: the socket path must not exist when the server is started,
* and the socket must be unlinked when the server terminates.
* Note Win32: Unix domain sockets are emulated by writing the
* inet4 port number into a one-line file.
*)
| W32_pipe of string
(** The service is installed for a named pipe. (Only for Win32.) *)
| Descriptor of Unix.file_descr
(** The service listens on the given file descriptor. *)
| Dynamic_descriptor of (unit -> Unix.file_descr)
(** The service listens on the returned file descriptor. *)
type binding_sync =
{ sync_name : string; (** procedure name *)
sync_proc : t -> xdr_value -> xdr_value (** the function that implements
* the procedure
*)
}
type binding_async =
{ async_name : string; (** procedure name *)
async_invoke : t -> session -> xdr_value -> unit
(** A function that is called when the procedure is called *)
}
type binding =
Sync of binding_sync (** bind a synchonous procedure *)
| Async of binding_async (** bind an asynchonous procedure *)
val connector_of_sockaddr : Unix.sockaddr -> connector
(** Converts the socket address into a connector *)
val connector_of_socksymbol : Netsockaddr.socksymbol -> connector
(** Converts the {!Netsockaddr.socksymbol} into a connector *)
val create :
?program_number:uint4 -> (* Override program number *)
?version_number:uint4 -> (* Override version number *)
Unixqueue.event_system -> (* the underlying event queue *)
connector -> (* the address of the service *)
protocol -> (* Tcp: stream-oriented; Udp: datagram-oriented *)
mode -> (* Socket: serve multiple connections/datagrams;
* BiPipe: serve only a single connection
*)
Rpc_program.t -> (* The specification of the program *)
binding list -> (* The procedures *)
int -> (* maximum number of waiting connections (backlog) *)
t
(** Deprecated creation of an RPC server. For new programs, use [create2]
* or one of its variants.
*
* Creates a new server that is pushed onto the event queue.
* The [connector], [protocol] and [mode] values control the network
* type of the server. Note that not all combinations are valid; the
* following can be used:
* - any [connector], [protocol=Tcp], [mode=Socket]:
* creates a classic TCP server socket that allows multiple
* stream connections at the same time
* - [connector=Descriptor s], [protocol=Tcp], [mode=BiPipe]:
* (where [s] is one half of a socketpair)
* creates a stream socket that is the endpoint of a point-to-point
* stream connection (bidirectional pipe)
* - any Internet namespace connector, [protocol=Udp], [mode=Socket]:
* creates a UDP server socket that allows serving multiple datagrams
*
* Note: If [connector = Descriptor _] the file descriptor is not opened by
* this module and not closed. The other [connector]s work automatically
* regarding this point, i.e. descriptors are opened and closed as
* necessary.
*
* [connector = Dynamic_descriptor]: The open descriptor is closed after use.
*
* The [Rpc_program.t] specifies the procedures that are available and
* their signatures. The [binding list] should contain for every procedure
* name the function that handles calls of the procedures.
*
* The remaining integer is the maximum number of waiting connections
* if a classic Tcp server socket is used; other connection types ignore
* this number.
*
* The optional arguments [?program_number] and [?version_number] override
* the numbers specified in the passed program.
*
* {b Notes on servers:}
* - servers that allow multiple connections never terminate by themselves
* - servers for only one connection (endpoint of a bidirectional pipe)
* terminate if they see an EOF on the stream; in this case the stream
* is closed by the server
* - the [create] function may block if the connector is Portmapped
*
* {b Note for UDP servers:} Due to limitations of the ocaml runtime
* there is a limit of 16K per message.
*)
class type socket_config =
object
method listen_options : Uq_engines.listen_options
method multiplexing :
dbg_name:string ref ->
close_inactive_descr:bool ->
protocol -> Unix.file_descr -> Unixqueue.event_system ->
Rpc_transport.rpc_multiplex_controller Uq_engines.engine
end
val default_socket_config : socket_config
class default_socket_config : socket_config
val tls_socket_config : (module Netsys_crypto_types.TLS_CONFIG) ->
socket_config
(** This configuration establishes TLS when accepting new connections.
It is (so far) only compatible with {!Rpc.Tcp}.
*)
class tls_socket_config : (module Netsys_crypto_types.TLS_CONFIG) ->
socket_config
(** TLS configuration as class *)
type internal_pipe =
Netxdr.xdr_value Netsys_polypipe.polypipe
type internal_socket =
Netxdr.xdr_value Netsys_polysocket.polyserver
type mode2 =
[ `Socket_endpoint of protocol * Unix.file_descr
| `Multiplexer_endpoint of Rpc_transport.rpc_multiplex_controller
| `Socket of protocol * connector * socket_config
| `Dummy of protocol
| `Internal_endpoint of internal_pipe * internal_pipe
| `Internal_socket of internal_socket
]
(** Determines the type of the server for [create2]:
*
* - [`Socket_endpoint(proto,fd)]: Socket [fd] is a connected socket
* descriptor used for communication. [proto] determines the
* encapsulation; should be [Tcp] for stream sockets and [Udp] for
* datagram sockets.
*
* - [`Multiplexer_endpoint m]: [m] is an RPC multiplex controller.
*
* - [`Socket(proto, conn, config)]: Opens or uses a server socket
* according to [conn]. [proto] determines the
* encapsulation; should be [Tcp] for stream sockets and [Udp] for
* datagram sockets. [config] specifies configuration details.
*
* - [`Internal_endpoint(rd,wr)]: Creates a server that exchanges
* data over the pair of polypipes [(rd,wr)] (see {!Netsys_polypipe}).
* The polypipes will be closed when the connection is terminated.
*
* - [`Internal_socket psock]: Creates a server that accepts connections
* from the polysocket server [psock] (see {!Netsys_polysocket}).
* The polysocket will be closed when the server is stopped.
*
* Despite their names, [`Socket_endpoint] and [`Socket] also support
* Win32 named pipes.
*)
val create2 :
mode2 ->
Unixqueue.event_system ->
t
(** Creates a server according to the [mode2] argument. This kind of server
* does initially not have any bindings.
*)
val bind :
?program_number:uint4 -> (* Override program number *)
?version_number:uint4 -> (* Override version number *)
?pm_continue:bool ->
Rpc_program.t ->
binding list ->
t ->
unit
(** Binds the program as specified by the [binding list]. If the portmapper
* must be informed, this action is started (and continued in the
* background). One can bind several programs in several versions to the
* same server.
*
* [pm_continue]: you need to set this to [true] for all follow-up binds
* after the first one. If [pm_continue] is [false], the portmapper entry
* is completely removed before a new registration is done. If it is [true],
* the new registration is appended to the existing one.
*)
val unbind :
?program_number:uint4 -> (* Override program number *)
?version_number:uint4 -> (* Override version number *)
Rpc_program.t ->
t ->
unit
(** Unbinds the program if it is bound by the server *)
val bound_programs : t -> Rpc_program.t list
(** Returns the bound programs *)
val get_event_system : session -> Unixqueue.event_system
(** Find out the event system that contains the 'session' *)
val get_connection_id : session -> connection_id
(** Get the connection_id *)
val get_xid : session -> Netnumber.uint4
(** Returns the session ID.
* Important note: This number identifies the session from the caller's
* view, not from the server's view!
*)
val get_socket_name : session -> Unix.sockaddr
val get_peer_name : session -> Unix.sockaddr
(** Return the address of the socket serving the session, and the client
* socket, resp. These functions fail if the server is not running on
* a socket.
*)
val get_conn_socket_name : connection_id -> Unix.sockaddr
val get_conn_peer_name : connection_id -> Unix.sockaddr
(** Return the address of the socket serving the connection, and the client
* socket, resp. These functions fail if the server is not running on
* a socket.
*)
val get_server : session -> t
(** Returns the server instance of the session *)
val get_main_socket_name : t -> Unix.sockaddr
(** Returns the address of the server socket, or the address of the
* bidirectional pipe.
* This function fails if the main file descriptor is not a socket.
*)
val get_protocol : t -> protocol
(** Return whether Tcp or Udp *)
val get_srv_event_system : t -> Unixqueue.unix_event_system
(** Returns the event system *)
val get_last_proc_info : t -> string
(** Get a debug string describing the last invoked procedure *)
val is_dummy : t -> bool
(** Whether this is a server in [`Dummy] mode. These servers cannot be
used for communication
*)
val get_tls_session_props : session -> Nettls_support.tls_session_props option
(** Get the TLS properties so far TLS is enabled *)
val get_gssapi_props : session -> Netsys_gssapi.server_props option
(** Get the GSSAPI properties if available *)
type rule =
[ `Deny
| `Drop
| `Reject
| `Reject_with of Rpc.server_error
| `Accept
| `Accept_limit_length of (int * rule)
]
(* similar to Rpc_transport.in_rule *)
val set_session_filter : t -> (Rpc_transport.sockaddr -> rule) -> unit
(** If set, the filter function is invoked every time the beginning of a new
* RPC call is received, and the result of the filter function determines
* what to do with the call:
*
* `Deny: TCP connections are immediately closed; UDP packets are dropped
* `Drop: The call is dropped (it does not allocate memory)
* `Reject_with: A response is sent back that the call is rejected. The
* parameter specified the error code
* `Reject: The same as [`Reject_with Rpc.Auth_too_weak]
* `Accept: The call is accepted without limitation (the default if no
* filter is installed)
* `Accept_limit_length(n,r): If the call is longer than n bytes, the rule
* r will be applied
*
* The parameter of the filter function is the socket address of the
* client.
*
* The intention of filters is to prevent denial of service attacks.
* A simple but good filter for TCP servers is
* set_filter srv (fun _ -> (`Accept_limit_length(n,`Deny))
* which accepts messages up to n bytes without limit, and denies longer
* messages. n is the length of the longest sensible message.
*
* For UDP servers, there is an implicit limit of 16K, so it is
* not necessary to care about this.
*
* Another application is to restrict which systems can contact this
* server, based on the IP address of the client.
*
* Note that this is not a protection against distributed denial of service
* attacks.
*)
val set_session_filter_2 : t -> (Rpc_transport.sockaddr -> connection_id -> rule) -> unit
(** Same as [set_session_filter], but the filter gets as second argument the
* connection ID.
*)
val set_mstring_factories : t -> Netxdr_mstring.named_mstring_factories -> unit
(** Sets the mstring factories to use for decoding requests containing
managed strings
*)
val reply : session -> xdr_value -> unit
(** Asynchronous procedures can reply their results with this function.
*
* NOTES:
* - As with synchronous procedures, the transfer is not reliable since
* the connection may be broken at any time
* - If it is already known that the connection is down, a Connection_lost
* exception is raised.
* - If you don't want to reply to a certain call, just don't [reply].
* Unreplied calls do not allocate memory.
* - It is possible to reply several times ("batch mode"), but the client
* must support it, too. Just call [reply] several times for the same
* session.
*)
val reply_error : session -> Rpc.server_error -> unit
(** Like [reply], but an error condition is sent back to the caller. *)
val set_exception_handler : t -> (exn -> string -> unit) -> unit
(** Sets the exception handler for the server.
* The exception handler gets most exceptions raised by the functions that
* are bound to procedures. The exception handler does not get Abort
* exceptions and any exceptions resulting from I/O problems.
*
* The string is the backtrace if present, or "" otherwise.
*
* NOTES ABOUT EXCEPTIONS:
* - The default exception handler logs a [`Crit] message using {!Netlog}.
* - I/O problems usually lead to an 'Abort' of the whole server.
*)
val set_onclose_action : t -> (connection_id -> unit) -> unit
(** Every time a connection is closed, the onclose function is called
* with the closed connection.
* The default onclose action is to do nothing. The function is also
* called for [Descriptor] connectors when the socket should be closed
* (for these connectors the socket is not closed by this module).
*
* Note that this action only applies to closed connections. It will
* not be executed for closed sockets in general (closed master socket,
* closed datagram socket).
*
* If several onclose actions are set, they will be executed in reverse
* order.
*)
val set_timeout : t -> float -> unit
(** Sets the timeout for the transport. *)
val stop_server : ?graceful:bool -> t -> unit
(** Stops the server: If a TCP server socket is listening, it is immediately
* closed. The shutdown procedure for the connections is initiated.
* Pending result messages are dropped.
*
* [graceful]: If true, the shutdown procedure is deferred until all
* responses have been transferred back to the caller. This includes
* any responses added to the message queue in the current callback.
* New calls are not accepted.
*)
val stop_connection : t -> connection_id -> unit
(** Schedules a special event that causes the connection to be stopped in the
* very near future. The function has only an effect for stream-oriented
* servers (mode = Tcp). The connection socket will be closed (unless it
* was passed using [Descriptor]). Nothing happens for datagram-oriented
* servers (mode = Udp).
*)
(************************* authentication **************************)
type auth_result =
Auth_positive of (string * string * string *
Netxdr.encoder option * Netxdr.decoder option *
Netsys_gssapi.server_props option)
(** Successful authentication:
[(username, returned_verifier_flavour, returned_verifier_data,
enc_opt, dec_opt, gss_opt
)]
Encoders and decoders are allowed to raise the exceptions
{!Rpc_server.Late_drop} and {!Rpc.Rpc_server}.
*)
| Auth_negative of Rpc.server_error
(** Failed authentication *)
| Auth_reply of (Netxdr_mstring.mstring list * string * string)
(** The authentication method generates the positive response
of this RPC call:
[(data, verf_flavor, verf_data)]
(new in Ocamlnet-3.3)
*)
| Auth_drop
(** Authentication demands to drop the message *)
exception Late_drop
(** This can be raised in encryption/decryption functions to prevent
that a response is sent.
*)
type auth_peeker =
[ `None
| `Peek_descriptor of Unix.file_descr -> string option
| `Peek_multiplexer of Rpc_transport.rpc_multiplex_controller -> string option
]
class type auth_details =
object
method server_addr : Unix.sockaddr option
method client_addr : Unix.sockaddr option
method program : uint4
method version : uint4
method procedure : uint4
method xid : uint4
method credential : string * string
method verifier : string * string
method frame_len : int
method message : Rpc_packer.packed_value
method transport_user : string option
end
class type auth_method =
object
method name : string
(** The name of the authentication method *)
method flavors : string list
(** Which credential flavors are handled by this method *)
method peek : auth_peeker
(** If available, this function is called for every accepted connection.
* It may return the user name.
* Notes:
* - peeked user names override [authenticate]
* - [peek] is only called once after the stream connection has been
* accepted
*)
method authenticate :
t ->
connection_id ->
auth_details ->
(auth_result -> unit) ->
unit
(** [authenticate srv conn_id details f]:
* This method is called when a remote call has arrived. Its task is
* to determine the client user and pass the user name (and the verifier)
* back. If the user cannot be authenticated, the call must be rejected.
* When the method has done the authentication, it calls the passed
* function [f] with the [auth_result]. This function can be called
* immediately or asynchronously.
*
* Changed in Ocamlnet-3.3: the arguments [program], [version],
* [procedure], and [xid] are new. Added new [auth_result] of
* [Auth_reply].
*)
method invalidate_connection : connection_id -> unit
(** Removes all auth sessions for this connection *)
method invalidate : unit -> unit
(** Remove all auth sessions *)
end
val set_auth_methods : t -> auth_method list -> unit
(** Sets the available authentication methods.
* By default, the list is set to [ auth_none ].
* If none of the methods apply, the call is rejected (Auth_too_weak).
*)
val auth_none : auth_method
(** The authentication method "AUTH_NONE", i.e. no user name is passed.
* The function [get_user] will return "".
*)
val auth_too_weak : auth_method
(** The method that always rejects. *)
val auth_transport : auth_method
(** Authenticate by trusting the transport layer. The user returned by
* the multiplexer's method peer_user_name is taken. Use this for getting
* the user name from a client certificate.
*)
val get_user : session -> string
(** Returns the user name as returned by the authentication method. See
* the description of the method for the format of the user name string.
*)
val get_auth_method : session -> auth_method
(** Returns the method that was used to authenticate the user. *)
val xdr_ctx : t -> Netxdr.ctx
(** Get the recommended XDR context *)
val verbose : bool -> unit
(** {b Deprecated.}
Set whether you want debug messages to stderr or not
*)
val detach : t -> unit
(** {b Internal function.} Cancels all pending I/O operations, and
deallocates buffers. This function has only one purpose: The
RPC servers inherited by a Netplex child process return memory.
The RPC server is unusable after this.
*)
val set_debug_name : t -> string -> unit
(** Set a name printed with debug messages *)
val get_debug_name : t -> string
(** Get the debug name *)
module Debug : sig
val enable : bool ref
(** Whether debug messages of general kind are enabled.
See {!Netlog.Debug} for more information.
*)
val enable_ctrace : bool ref
(** Whether debug messages are enabled that trace connection events.
See {!Netlog.Debug} for more information.
The "module name" for these messages is "Rpc_server.Ctrace".
*)
val enable_ptrace : bool ref
(** Whether the procedure trace is enabled.
The procedure trace outputs for every RPC call and response
a debug message. [ptrace_verbosity] says how verbose.
*)
val ptrace_verbosity : Rpc_util.verbosity ref
(** How verbose the ptrace is. Defaults to [`Name_abbrev_args] *)
val disable_for_server : t -> unit
(** Disables logging for this server *)
end
|