/usr/share/pyshared/nwss/protocol.py is in python-nwsserver 2.0.0-2build1.
This file is owned by root:root, with mode 0o644.
The actual contents of the file can be viewed below.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 | #
# Copyright (c) 2005-2009, REvolution Computing, Inc.
#
# NetWorkSpaces is free software; you can redistribute it and/or
# modify it under the terms of the GNU General Public License as published
# by the Free Software Foundation; either version 2 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307
# USA
#
"""Protocol implementation for NetWorkSpaces server."""
# TODO: In some cases, the client is expecting a long response and in some
# cases, a short response. In many error conditions, we send only a
# short response... Wacky Hijinks (TM) ensue.
import os, time
from tempfile import mkstemp
from twisted.protocols import stateful
from twisted.python import log
from twisted.internet import reactor
from nwss.base import Value, DIRECT_STRING, Response, ERROR_VALUE
from nwss.protoutils import DictReceiver, ArgTupleReceiver, FileProducer
from nwss.protoutils import map_proto_generator
import nwss
try:
from twisted.internet.ssl import DefaultOpenSSLContextFactory
except ImportError:
DefaultOpenSSLContextFactory = None #pylint: disable-msg=C0103
_DEBUG = nwss.config.is_debug_enabled('NWS:protocol')
def server_configured_ssl():
"""Return True if the server has configured SSL support."""
return (nwss.config.serversslkey is not None and
nwss.config.serversslcert is not None)
def clear_server_ssl_config():
"""Clear the server's SSL configuration to avoid spamming the logs."""
nwss.config.serversslkey = None
nwss.config.serversslcert = None
def ssl_is_available():
"""Return True if the PyOpenSSL library is available on the server."""
return DefaultOpenSSLContextFactory is not None
if server_configured_ssl() and not ssl_is_available():
log.msg("Failed to import PyOpenSSL. SSL support is disabled.")
clear_server_ssl_config()
class WsSessionStats(object):
"""Counter for some informational statistics about a given NWS session."""
def __init__(self):
"""Create a new session statistics counter."""
self.__num_operations = 0
self.__last_operation = ''
self.__last_operation_time = ''
self.__num_long_values = 0
def mark_operation(self, opname):
"""Mark the occurrence of an operation, updating all relevant
statistics."""
self.__last_operation = opname
self.__last_operation_time = time.asctime()
self.__num_operations += 1
def mark_new_long_value(self):
"""Mark the creation of a new long value, updating all relevant
statistics."""
self.__num_long_values += 1
def __get_num_operations(self):
"""Get the number of operations we've performed since this session
started."""
return self.__num_operations
num_operations = property(__get_num_operations)
def __get_last_operation(self):
"""Get a tuple of the name and time of the last operation performed.
For instance:
("store", "Sun Apr 19 20:04:42 PDT 2009")
"""
return self.__last_operation, self.__last_operation_time
last_operation = property(__get_last_operation)
def __get_num_long_values(self):
"""Get the number of values which have been stored through this
connection which have resulted in the creation of "long value" files.
"""
return self.__num_long_values
num_long_values = property(__get_num_long_values)
class WsBlockingInfo(object):
"""Manager for the 'blocking' state of a protocol object. Responsible for
ensuring that the protocol is on at most 1 waiter list, and is removed at
the appropriate time."""
def __init__(self):
self.__blocking = False
self.__waiter_list = [] # Var's blocked clients list containing us
self.__var = None # Var for which this conn. is blocking
def block(self):
"""Put this session into the "blocking" state if it is not blocking
already."""
if self.__blocking:
return False
self.__blocking = True
return True
def clear(self):
"""If this connection was blocking, mark it as no longer so. This will
not remove the connection from any "waiter" lists, so if we may still
be on a waiter list, we need to call remove_from_waiter_list first.
"""
self.__blocking = False
self.__waiter_list = []
self.__var = None
def remove(self, proto):
"""Remove us from whichever waiter list we appear in, if, indeed, we
appear in a waiter list."""
try:
self.__waiter_list.remove(proto)
except ValueError:
if _DEBUG:
log.msg("Blocked client was not in blocked clients list.")
self.clear()
def set_var(self, var, waiter_list):
"""Set the variable into whose waiter list this connection has been
entered, as well as the waiter list itself. When a value becomes
availble, this information will be used to remove this connection from
the appropriate waiter list."""
self.__var = var
self.__waiter_list = waiter_list
def __is_blocking(self):
"""Check if this connection is currently waiting on a response from the
server code. This flag is briefly true for any operation, but may be
true for an extended period of time if we are performing a blocking
operation for a value not yet available."""
return self.__blocking
blocking = property(__is_blocking)
def __get_var(self):
"""Get the variable in whose waiter lists we appear. Used for
monitoring purposes."""
return self.__var
var = property(__get_var)
def coerce_status(status):
"""Utility to coerce status to a 4-byte string in appropriate format
for inclusion in the protocol. This is primarily to handle the integer
-> string case."""
if isinstance(status, int):
status = '%04d' % status
elif not isinstance(status, str):
log.msg('Internal error: status of %s [%s] returned to client' %
(str(status), str(type(status))))
log.msg('Converting to string.')
status = str(status)
if len(status) != 4:
log.msg('Internal error: status of %s returned to client' %
status)
log.msg('Truncating to 4 bytes.')
status = status[0:4]
return status
class NwsProtocol(object, stateful.StatefulProtocol):
#pylint: disable-msg=R0901,R0902
"""Twisted protocol object for NetWorkSpaces server.
The generic structure of the protocol consists mostly of fixed length
ASCII sequences. The core of a NWS message consists of a 4-digit
0-padded ASCII decimal count of the elements of a tuple, which must
always have at least one argument. The tuple elements are each
serialized as a 20-digit 0-padded ASCII decimal length followed by raw
bytes. The first element of the tuple is always a command-name, of
which a dozen or so valid values exist.
A 20-digit count is used to allow accommodation of any 64-bit value.
The interpretation of the remainder of the elements in the tuple depend
on the specific command used.
"""
DEFAULT_OPTIONS = {
'MetadataToServer': '',
'MetadataFromServer': '',
'KillServerOnClose': '',
}
if server_configured_ssl():
DEFAULT_OPTIONS['SSL'] = ''
def __init__(self):
# Twisted will initialize 'factory' to point at the NwsService
self.factory = None
# Twisted will initialize 'peer' to point at details about the client
# self.peer = None
# Twisted stashes a unique id here for this client
self.__protokey = -1
# Connection options
self.__metadata_receive = False
self.__metadata_send = False
self.__deadman = False
self.__reply_long_preamble = self.__reply_long_preamble_nocookie
# Session statistics
self.__statistics = WsSessionStats()
# Blocking info
self.__blocking_state = WsBlockingInfo()
def __str__(self):
if hasattr(self, 'peer'):
return 'NwsProtocol[%s]' % self.peer
else:
return 'NwsProtocol[not connected]'
#######################################################
# Overrides for Twisted methods
#######################################################
def connectionMade(self):
#pylint: disable-msg=C0103
"""Callback from Twisted after a new connection is made. Note that
protocol objects are not reused, so the only real purpose of this
method is to initialize state which requires access to the factory and
transport objects."""
self.transport.setTcpNoDelay(1)
self.transport.setTcpKeepAlive(1)
# HACK: dig through the factory for the web port, add it to the
# advertised options.
if hasattr(self.factory, 'nwsWebPort'):
port = str(self.factory.nwsWebPort())
self.DEFAULT_OPTIONS['NwsWebPort'] = str(port)
def connectionLost(self, reason):
#pylint: disable-msg=C0103,W0222
"""Callback from Twisted to indicate that this connection has been
shutdown.
"""
if _DEBUG:
log.msg('connectionLost called')
self.factory.goodbye(self)
if self.__deadman:
log.msg('stopping the server due to deadman switch')
#pylint: disable-msg=E1101
reactor.stop()
def getInitialState(self):
#pylint: disable-msg=C0103
"""Callback from Twisted to find the start state for this protocol.
The NWS protocol always begins with a 4-byte handshake."""
return (self.__receive_handshake_request, 4)
#######################################################
# Interface exposed to server
#######################################################
def __get_protocol_key(self):
"""Attribute accessor for the "protocol key", which is actually a
unique id for this client connection. (One of several, since twisted
also assigns a unique sessionid...)"""
return self.__protokey
def __set_protocol_key(self, key):
"""Attribute mutator for the "protocol key"."""
self.__protokey = key
protokey = property(__get_protocol_key, __set_protocol_key)
def get_peer(self):
"""Get a semi-human-readable textual identifier for the host on the
other side of the connection. Generally something containing the IP
address and port number for the remote side."""
return str(self.transport.getPeer())
peer = property(get_peer)
def __get_num_operations(self):
"""Get the number of operations we've performed since connection
creation."""
return self.__statistics.num_operations
num_operations = property(__get_num_operations)
def __get_last_operation(self):
"""Get a tuple of the name and time of the last operation performed.
For instance:
("store", "Sun Apr 19 20:04:42 PDT 2009")
"""
return self.__statistics.last_operation
last_operation = property(__get_last_operation)
def __get_num_long_values(self):
"""Get the number of values which have been stored through this
connection which have resulted in the creation of "long value" files.
"""
return self.__statistics.num_long_values
num_long_values = property(__get_num_long_values)
def __is_blocking(self):
"""Check if this connection is currently waiting on a response from the
server code."""
return self.__blocking_state.blocking
blocking = property(__is_blocking)
def set_blocking_var(self, var, waiter_list):
"""Set the variable into whose waiter list this connection has been
entered, as well as the waiter list itself."""
self.__blocking_state.set_var(var, waiter_list)
def __get_blocking_var(self):
"""Get the variable in whose waiter lists we appear. Used for
monitoring purposes."""
return self.__blocking_state.var
blocking_var = property(__get_blocking_var)
def remove_from_waiter_list(self):
"""Remove us from whichever waiter list we appear in, if, indeed, we
appear in a waiter list."""
self.__blocking_state.remove(self)
def mark_for_death(self):
"""Mark this connection as a deadman connection. When this connection
is closed, it will stop the reactor, resulting in the shutdown of the
server."""
self.__deadman = True
def new_long_arg_file(self):
"""Allocate a new file for a long argument. The file will be uniquely
named and securely created in the NWS temporary directory."""
self.__statistics.mark_new_long_value()
try:
filedesc, tmpname = mkstemp(prefix='__nwss',
suffix='.dat', dir=nwss.config.tmpdir)
return os.fdopen(filedesc, 'w+b'), tmpname
except OSError, exc:
log.msg('error creating temporary file: ' + str(exc))
return None
#######################################################
# Generic protocol utilities
#######################################################
def __send_dictionary(self, dictionary):
"""Marshal and write the contents of a dictionary to the transport in
the canonical form, as interpreted by the DictReceiver utility."""
maplen = len(dictionary)
self.transport.write('%04d' % maplen)
#pylint: disable-msg=W0141
map(self.transport.write, map_proto_generator(dictionary))
#######################################################
# Handshake protocol machinery
#######################################################
def __receive_handshake_request(self, data):
"""Receive a handshake request from the client-side. This is the entry
point to the NWS protocol."""
if _DEBUG:
log.msg('handshake initiated with: ' + repr(data))
# New-style handshake
if data.startswith('X'):
self.__reply_long_preamble = self.__reply_long_preamble_cookie
self.__send_options_advertise(self.DEFAULT_OPTIONS)
return (self.__receive_options_request, 4)
# Old-style handshake
if data not in ['0000', '1111']:
self.__reply_long_preamble = self.__reply_long_preamble_cookie
self.transport.write('2223')
# Beginning of the protocol proper.
return self.__get_command_state()
def __send_options_advertise(self, opts):
"""Send an options advertisement to the client with a list of the
options the server supports as well as required or forbidden
options."""
self.transport.write('P000')
self.__send_dictionary(opts)
def __receive_options_request(self, data):
"""Receive a "connection options" request packet from the client or
terminate the connection."""
if data != 'R000':
log.msg('Client send invalid handshake response.')
self.transport.loseConnection()
receiver = DictReceiver(self, self.__receive_connection_options)
return receiver.start, receiver.start_count
def __receive_connection_options(self, options):
"""Callback from the protocol handlers when we have a handshake options
negotiation request."""
if self.__validate_connection_options(options):
self.__process_connection_options(options)
if options.get('SSL') == '1':
if ssl_is_available():
key = nwss.config.serversslkey
cert = nwss.config.serversslcert
ctx = DefaultOpenSSLContextFactory(key, cert)
self.__send_accept_connection()
self.transport.startTLS(ctx)
else:
# SSL requested, but not available server side
log.msg('Internal error: SSL not available.')
self.__send_deny_connection()
return None
else:
self.__send_accept_connection()
return self.__get_command_state()
else:
self.__send_deny_connection()
return None
def __validate_connection_options(self, options):
"""Check that the requested connection options are compatible with our
advertised options."""
for opt, val in options.items():
if not self.DEFAULT_OPTIONS.has_key(opt):
return False
elif (self.DEFAULT_OPTIONS[opt] != '' and
self.DEFAULT_OPTIONS[opt] != val):
return False
return True
def __process_connection_options(self, options):
"""Read through the connection options, pulling out options which are
of interest to us."""
if options.get("KillServerOnClose") == "1":
self.__deadman = True
if options.get("MetadataToServer") == "1":
self.__metadata_receive = True
if options.get("MetadataFromServer") == "1":
self.__metadata_send = True
def __send_deny_connection(self):
"""Deny the client's connection request and shut down the
connection."""
self.transport.write('F000')
self.transport.loseConnection()
log.msg('Dropped connection after handshake: invalid option requested')
def __send_accept_connection(self):
"""Accept the client's connection request."""
self.transport.write('A000')
#######################################################
# Command protocol machinery
#######################################################
def __get_command_state(self):
"""Get the protocol state for the start of a new command request. This
varies depending on whether metadata from the client is enabled."""
if self.__metadata_receive:
return DictReceiver(self, self.__receive_metadata).start, 4
else:
return self.__get_args_state(metadata={})
def __get_args_state(self, metadata):
"""Get the protocol state for the start of the arguments proper in a
command request, populating the state with the specified metadata
map."""
return ArgTupleReceiver(self, self.__handle_command, metadata).start, 4
def __receive_metadata(self, metadata):
"""Receive a metadata map from the client side and advance the protocol
to the argument list state."""
return self.__get_args_state(metadata)
def __handle_command(self, args, metadata):
"""Handle a command from the client."""
if not self.__blocking_state.block():
self.send_error('Received a request while already blocking on a ' +
'command.')
self.transport.loseConnection()
if len(args) < 1:
log.msg('Empty argument list')
self.send_error('Received an empty argument list.')
self.transport.loseConnection()
return None
#pylint: disable-msg=W0142
self.factory.handle_command(self, metadata, *args)
self.__statistics.mark_operation(args[0])
return self.__get_command_state()
def __reply_long_preamble_cookie(self, response):
"""Send the "cookie protocol" version of a long reply preamble."""
self.transport.write('%s%020d%-20.20s%020d%020d' %
(response.status,
response.value.type_descriptor,
response.iterstate[0],
response.iterstate[1],
response.value.length()))
def __reply_long_preamble_nocookie(self, response):
#pylint: disable-msg=W0613
"""Send the no-"cookie protocol" version of a long reply preamble."""
self.transport.write('%s%020d%020d' %
(response.status,
response.value.type_descriptor,
response.value.length()))
def send_error(self, reason, status=1, long_reply=False):
"""Utility to send an error reply."""
metadata = { 'nwsReason': reason }
response = Response(metadata)
response.status = status
if long_reply:
response.value = ERROR_VALUE
self.send_long_response(response)
else:
self.send_short_response(response)
def send_short_response(self, response=None):
"""Send a response to a query which expects a "short" response."""
if response is None:
response = Response()
assert response.value is None
assert response.iterstate is None
# This operation is obviously no longer blocking
self.__blocking_state.clear()
# Coerce the status to a 4-digit string
response.status = coerce_status(response.status)
# Send the metadata
if self.__metadata_send:
self.__send_dictionary(response.metadata)
# Send the reply
self.transport.write(response.status)
def send_long_response(self, response=None):
"""Send a response to a query which expects a "long" response."""
if response is None:
response = Response(value=ERROR_VALUE)
assert response.value is not None
if response.iterstate is None:
response.iterstate = ('', 0)
# This operation is obviously no longer blocking
self.__blocking_state.clear()
# Coerce the response to a Value
if not isinstance(response.value, Value):
response.value = str(response.value)
if isinstance(response.value, str):
response.value = Value(DIRECT_STRING, response.value)
# Coerce the status to a 4-digit string
response.status = coerce_status(response.status)
# Send the metadata
if self.__metadata_send:
self.__send_dictionary(response.metadata)
# Send the reply itself
self.__reply_long_preamble(response)
if response.value.is_large():
if _DEBUG:
log.msg("using long value protocol")
producer = FileProducer(response.value, self.transport)
self.transport.registerProducer(producer, None)
else:
self.transport.write(response.value.val())
|