mirror of
https://gitlab.com/libvirt/libvirt.git
synced 2024-10-31 18:33:11 +00:00
71ec40e917
Signed-off-by: Ján Tomko <jtomko@redhat.com> Reviewed-by: Michal Privoznik <mprivozn@redhat.com>
1685 lines
47 KiB
C
1685 lines
47 KiB
C
/*
|
|
* virnetserverclient.c: generic network RPC server client
|
|
*
|
|
* Copyright (C) 2006-2014 Red Hat, Inc.
|
|
* Copyright (C) 2006 Daniel P. Berrange
|
|
*
|
|
* This library is free software; you can redistribute it and/or
|
|
* modify it under the terms of the GNU Lesser General Public
|
|
* License as published by the Free Software Foundation; either
|
|
* version 2.1 of the License, or (at your option) any later version.
|
|
*
|
|
* This library is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
* Lesser General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU Lesser General Public
|
|
* License along with this library. If not, see
|
|
* <http://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
#include <config.h>
|
|
|
|
#include "internal.h"
|
|
#if WITH_SASL
|
|
# include <sasl/sasl.h>
|
|
#endif
|
|
|
|
#include "virnetserver.h"
|
|
#include "virnetserverclient.h"
|
|
|
|
#include "virlog.h"
|
|
#include "virerror.h"
|
|
#include "viralloc.h"
|
|
#include "virthread.h"
|
|
#include "virkeepalive.h"
|
|
#include "virprobe.h"
|
|
#include "virstring.h"
|
|
#include "virutil.h"
|
|
|
|
#define VIR_FROM_THIS VIR_FROM_RPC
|
|
|
|
VIR_LOG_INIT("rpc.netserverclient");
|
|
|
|
/* Allow for filtering of incoming messages to a custom
|
|
* dispatch processing queue, instead of the workers.
|
|
* This allows for certain types of messages to be handled
|
|
* strictly "in order"
|
|
*/
|
|
|
|
typedef struct _virNetServerClientFilter virNetServerClientFilter;
|
|
typedef virNetServerClientFilter *virNetServerClientFilterPtr;
|
|
|
|
struct _virNetServerClientFilter {
|
|
int id;
|
|
virNetServerClientFilterFunc func;
|
|
void *opaque;
|
|
|
|
virNetServerClientFilterPtr next;
|
|
};
|
|
|
|
|
|
struct _virNetServerClient
|
|
{
|
|
virObjectLockable parent;
|
|
|
|
unsigned long long id;
|
|
bool wantClose;
|
|
bool delayedClose;
|
|
virNetSocketPtr sock;
|
|
int auth;
|
|
bool auth_pending;
|
|
bool readonly;
|
|
virNetTLSContextPtr tlsCtxt;
|
|
virNetTLSSessionPtr tls;
|
|
#if WITH_SASL
|
|
virNetSASLSessionPtr sasl;
|
|
#endif
|
|
int sockTimer; /* Timer to be fired upon cached data,
|
|
* so we jump out from poll() immediately */
|
|
|
|
|
|
virIdentityPtr identity;
|
|
|
|
/* Connection timestamp, i.e. when a client connected to the daemon (UTC).
|
|
* For old clients restored by post-exec-restart, which did not have this
|
|
* attribute, value of 0 (epoch time) is used to indicate we have no
|
|
* information about their connection time.
|
|
*/
|
|
long long conn_time;
|
|
|
|
/* Count of messages in the 'tx' queue,
|
|
* and the server worker pool queue
|
|
* ie RPC calls in progress. Does not count
|
|
* async events which are not used for
|
|
* throttling calculations */
|
|
size_t nrequests;
|
|
size_t nrequests_max;
|
|
/* Zero or one messages being received. Zero if
|
|
* nrequests >= max_clients and throttling */
|
|
virNetMessagePtr rx;
|
|
/* Zero or many messages waiting for transmit
|
|
* back to client, including async events */
|
|
virNetMessagePtr tx;
|
|
|
|
/* Filters to capture messages that would otherwise
|
|
* end up on the 'dx' queue */
|
|
virNetServerClientFilterPtr filters;
|
|
int nextFilterID;
|
|
|
|
virNetServerClientDispatchFunc dispatchFunc;
|
|
void *dispatchOpaque;
|
|
|
|
void *privateData;
|
|
virFreeCallback privateDataFreeFunc;
|
|
virNetServerClientPrivPreExecRestart privateDataPreExecRestart;
|
|
virNetServerClientCloseFunc privateDataCloseFunc;
|
|
|
|
virKeepAlivePtr keepalive;
|
|
};
|
|
|
|
|
|
static virClassPtr virNetServerClientClass;
|
|
static void virNetServerClientDispose(void *obj);
|
|
|
|
static int virNetServerClientOnceInit(void)
|
|
{
|
|
if (!VIR_CLASS_NEW(virNetServerClient, virClassForObjectLockable()))
|
|
return -1;
|
|
|
|
return 0;
|
|
}
|
|
|
|
VIR_ONCE_GLOBAL_INIT(virNetServerClient);
|
|
|
|
|
|
static void virNetServerClientDispatchEvent(virNetSocketPtr sock, int events, void *opaque);
|
|
static void virNetServerClientUpdateEvent(virNetServerClientPtr client);
|
|
static virNetMessagePtr virNetServerClientDispatchRead(virNetServerClientPtr client);
|
|
static int virNetServerClientSendMessageLocked(virNetServerClientPtr client,
|
|
virNetMessagePtr msg);
|
|
|
|
/*
|
|
* @client: a locked client object
|
|
*/
|
|
static int
|
|
virNetServerClientCalculateHandleMode(virNetServerClientPtr client)
|
|
{
|
|
int mode = 0;
|
|
|
|
|
|
VIR_DEBUG("tls=%p hs=%d, rx=%p tx=%p",
|
|
client->tls,
|
|
client->tls ? virNetTLSSessionGetHandshakeStatus(client->tls) : -1,
|
|
client->rx,
|
|
client->tx);
|
|
if (!client->sock || client->wantClose)
|
|
return 0;
|
|
|
|
if (client->tls) {
|
|
switch (virNetTLSSessionGetHandshakeStatus(client->tls)) {
|
|
case VIR_NET_TLS_HANDSHAKE_RECVING:
|
|
mode |= VIR_EVENT_HANDLE_READABLE;
|
|
break;
|
|
case VIR_NET_TLS_HANDSHAKE_SENDING:
|
|
mode |= VIR_EVENT_HANDLE_WRITABLE;
|
|
break;
|
|
default:
|
|
case VIR_NET_TLS_HANDSHAKE_COMPLETE:
|
|
if (client->rx)
|
|
mode |= VIR_EVENT_HANDLE_READABLE;
|
|
if (client->tx)
|
|
mode |= VIR_EVENT_HANDLE_WRITABLE;
|
|
}
|
|
} else {
|
|
/* If there is a message on the rx queue, and
|
|
* we're not in middle of a delayedClose, then
|
|
* we're wanting more input */
|
|
if (client->rx && !client->delayedClose)
|
|
mode |= VIR_EVENT_HANDLE_READABLE;
|
|
|
|
/* If there are one or more messages to send back to client,
|
|
then monitor for writability on socket */
|
|
if (client->tx)
|
|
mode |= VIR_EVENT_HANDLE_WRITABLE;
|
|
}
|
|
VIR_DEBUG("mode=0%o", mode);
|
|
return mode;
|
|
}
|
|
|
|
/*
|
|
* @server: a locked or unlocked server object
|
|
* @client: a locked client object
|
|
*/
|
|
static int virNetServerClientRegisterEvent(virNetServerClientPtr client)
|
|
{
|
|
int mode = virNetServerClientCalculateHandleMode(client);
|
|
|
|
if (!client->sock)
|
|
return -1;
|
|
|
|
virObjectRef(client);
|
|
VIR_DEBUG("Registering client event callback %d", mode);
|
|
if (virNetSocketAddIOCallback(client->sock,
|
|
mode,
|
|
virNetServerClientDispatchEvent,
|
|
client,
|
|
virObjectFreeCallback) < 0) {
|
|
virObjectUnref(client);
|
|
return -1;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
/*
|
|
* @client: a locked client object
|
|
*/
|
|
static void virNetServerClientUpdateEvent(virNetServerClientPtr client)
|
|
{
|
|
int mode;
|
|
|
|
if (!client->sock)
|
|
return;
|
|
|
|
mode = virNetServerClientCalculateHandleMode(client);
|
|
|
|
virNetSocketUpdateIOCallback(client->sock, mode);
|
|
|
|
if (client->rx && virNetSocketHasCachedData(client->sock))
|
|
virEventUpdateTimeout(client->sockTimer, 0);
|
|
}
|
|
|
|
|
|
int virNetServerClientAddFilter(virNetServerClientPtr client,
|
|
virNetServerClientFilterFunc func,
|
|
void *opaque)
|
|
{
|
|
virNetServerClientFilterPtr filter;
|
|
virNetServerClientFilterPtr *place;
|
|
int ret;
|
|
|
|
filter = g_new0(virNetServerClientFilter, 1);
|
|
|
|
virObjectLock(client);
|
|
|
|
filter->id = client->nextFilterID++;
|
|
filter->func = func;
|
|
filter->opaque = opaque;
|
|
|
|
place = &client->filters;
|
|
while (*place)
|
|
place = &(*place)->next;
|
|
*place = filter;
|
|
|
|
ret = filter->id;
|
|
|
|
virObjectUnlock(client);
|
|
|
|
return ret;
|
|
}
|
|
|
|
void virNetServerClientRemoveFilter(virNetServerClientPtr client,
|
|
int filterID)
|
|
{
|
|
virNetServerClientFilterPtr tmp, prev;
|
|
|
|
virObjectLock(client);
|
|
|
|
prev = NULL;
|
|
tmp = client->filters;
|
|
while (tmp) {
|
|
if (tmp->id == filterID) {
|
|
if (prev)
|
|
prev->next = tmp->next;
|
|
else
|
|
client->filters = tmp->next;
|
|
|
|
VIR_FREE(tmp);
|
|
break;
|
|
}
|
|
prev = tmp;
|
|
tmp = tmp->next;
|
|
}
|
|
|
|
virObjectUnlock(client);
|
|
}
|
|
|
|
|
|
/* Check the client's access. */
|
|
static int
|
|
virNetServerClientCheckAccess(virNetServerClientPtr client)
|
|
{
|
|
virNetMessagePtr confirm;
|
|
|
|
/* Verify client certificate. */
|
|
if (virNetTLSContextCheckCertificate(client->tlsCtxt, client->tls) < 0)
|
|
return -1;
|
|
|
|
if (client->tx) {
|
|
VIR_DEBUG("client had unexpected data pending tx after access check");
|
|
return -1;
|
|
}
|
|
|
|
if (!(confirm = virNetMessageNew(false)))
|
|
return -1;
|
|
|
|
/* Checks have succeeded. Write a '\1' byte back to the client to
|
|
* indicate this (otherwise the socket is abruptly closed).
|
|
* (NB. The '\1' byte is sent in an encrypted record).
|
|
*/
|
|
confirm->bufferLength = 1;
|
|
confirm->buffer = g_new0(char, confirm->bufferLength);
|
|
confirm->bufferOffset = 0;
|
|
confirm->buffer[0] = '\1';
|
|
|
|
client->tx = confirm;
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
static void virNetServerClientDispatchMessage(virNetServerClientPtr client,
|
|
virNetMessagePtr msg)
|
|
{
|
|
virObjectLock(client);
|
|
if (!client->dispatchFunc) {
|
|
virNetMessageFree(msg);
|
|
client->wantClose = true;
|
|
virObjectUnlock(client);
|
|
} else {
|
|
virObjectUnlock(client);
|
|
/* Accessing 'client' is safe, because virNetServerClientSetDispatcher
|
|
* only permits setting 'dispatchFunc' once, so if non-NULL, it will
|
|
* never change again
|
|
*/
|
|
client->dispatchFunc(client, msg, client->dispatchOpaque);
|
|
}
|
|
}
|
|
|
|
|
|
static void virNetServerClientSockTimerFunc(int timer,
|
|
void *opaque)
|
|
{
|
|
virNetServerClientPtr client = opaque;
|
|
virNetMessagePtr msg = NULL;
|
|
virObjectLock(client);
|
|
virEventUpdateTimeout(timer, -1);
|
|
/* Although client->rx != NULL when this timer is enabled, it might have
|
|
* changed since the client was unlocked in the meantime. */
|
|
if (client->rx)
|
|
msg = virNetServerClientDispatchRead(client);
|
|
virObjectUnlock(client);
|
|
|
|
if (msg)
|
|
virNetServerClientDispatchMessage(client, msg);
|
|
}
|
|
|
|
|
|
/**
|
|
* virNetServerClientAuthMethodImpliesAuthenticated:
|
|
* @auth: authentication method to check
|
|
*
|
|
* Check if the passed authentication method implies that a client is
|
|
* automatically authenticated.
|
|
*
|
|
* Returns true if @auth implies that a client is automatically
|
|
* authenticated, otherwise false.
|
|
*/
|
|
static bool
|
|
virNetServerClientAuthMethodImpliesAuthenticated(int auth)
|
|
{
|
|
return auth == VIR_NET_SERVER_SERVICE_AUTH_NONE;
|
|
}
|
|
|
|
|
|
static virNetServerClientPtr
|
|
virNetServerClientNewInternal(unsigned long long id,
|
|
virNetSocketPtr sock,
|
|
int auth,
|
|
bool auth_pending,
|
|
virNetTLSContextPtr tls,
|
|
bool readonly,
|
|
size_t nrequests_max,
|
|
long long timestamp)
|
|
{
|
|
virNetServerClientPtr client;
|
|
|
|
if (virNetServerClientInitialize() < 0)
|
|
return NULL;
|
|
|
|
if (!(client = virObjectLockableNew(virNetServerClientClass)))
|
|
return NULL;
|
|
|
|
client->id = id;
|
|
client->sock = virObjectRef(sock);
|
|
client->auth = auth;
|
|
client->auth_pending = auth_pending;
|
|
client->readonly = readonly;
|
|
client->tlsCtxt = virObjectRef(tls);
|
|
client->nrequests_max = nrequests_max;
|
|
client->conn_time = timestamp;
|
|
|
|
client->sockTimer = virEventAddTimeout(-1, virNetServerClientSockTimerFunc,
|
|
client, NULL);
|
|
if (client->sockTimer < 0)
|
|
goto error;
|
|
|
|
/* Prepare one for packet receive */
|
|
if (!(client->rx = virNetMessageNew(true)))
|
|
goto error;
|
|
client->rx->bufferLength = VIR_NET_MESSAGE_LEN_MAX;
|
|
client->rx->buffer = g_new0(char, client->rx->bufferLength);
|
|
client->nrequests = 1;
|
|
|
|
PROBE(RPC_SERVER_CLIENT_NEW,
|
|
"client=%p sock=%p",
|
|
client, client->sock);
|
|
|
|
return client;
|
|
|
|
error:
|
|
virObjectUnref(client);
|
|
return NULL;
|
|
}
|
|
|
|
|
|
virNetServerClientPtr virNetServerClientNew(unsigned long long id,
|
|
virNetSocketPtr sock,
|
|
int auth,
|
|
bool readonly,
|
|
size_t nrequests_max,
|
|
virNetTLSContextPtr tls,
|
|
virNetServerClientPrivNew privNew,
|
|
virNetServerClientPrivPreExecRestart privPreExecRestart,
|
|
virFreeCallback privFree,
|
|
void *privOpaque)
|
|
{
|
|
virNetServerClientPtr client;
|
|
time_t now;
|
|
bool auth_pending = !virNetServerClientAuthMethodImpliesAuthenticated(auth);
|
|
|
|
VIR_DEBUG("sock=%p auth=%d tls=%p", sock, auth, tls);
|
|
|
|
if ((now = time(NULL)) == (time_t)-1) {
|
|
virReportSystemError(errno, "%s", _("failed to get current time"));
|
|
return NULL;
|
|
}
|
|
|
|
if (!(client = virNetServerClientNewInternal(id, sock, auth, auth_pending,
|
|
tls, readonly, nrequests_max,
|
|
now)))
|
|
return NULL;
|
|
|
|
if (!(client->privateData = privNew(client, privOpaque))) {
|
|
virObjectUnref(client);
|
|
return NULL;
|
|
}
|
|
client->privateDataFreeFunc = privFree;
|
|
client->privateDataPreExecRestart = privPreExecRestart;
|
|
|
|
return client;
|
|
}
|
|
|
|
|
|
virNetServerClientPtr virNetServerClientNewPostExecRestart(virNetServerPtr srv,
|
|
virJSONValuePtr object,
|
|
virNetServerClientPrivNewPostExecRestart privNew,
|
|
virNetServerClientPrivPreExecRestart privPreExecRestart,
|
|
virFreeCallback privFree,
|
|
void *privOpaque)
|
|
{
|
|
virJSONValuePtr child;
|
|
virNetServerClientPtr client = NULL;
|
|
virNetSocketPtr sock;
|
|
int auth;
|
|
bool readonly, auth_pending;
|
|
unsigned int nrequests_max;
|
|
unsigned long long id;
|
|
long long timestamp;
|
|
|
|
if (virJSONValueObjectGetNumberInt(object, "auth", &auth) < 0) {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
|
|
_("Missing auth field in JSON state document"));
|
|
return NULL;
|
|
}
|
|
|
|
if (!virJSONValueObjectHasKey(object, "auth_pending")) {
|
|
auth_pending = !virNetServerClientAuthMethodImpliesAuthenticated(auth);
|
|
} else {
|
|
if (virJSONValueObjectGetBoolean(object, "auth_pending", &auth_pending) < 0) {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
|
|
_("Malformed auth_pending field in JSON state document"));
|
|
return NULL;
|
|
}
|
|
|
|
/* If the used authentication method implies that the new
|
|
* client is automatically authenticated, the authentication
|
|
* cannot be pending */
|
|
if (auth_pending && virNetServerClientAuthMethodImpliesAuthenticated(auth)) {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
|
|
_("Invalid auth_pending and auth combination in JSON state document"));
|
|
return NULL;
|
|
}
|
|
}
|
|
|
|
if (virJSONValueObjectGetBoolean(object, "readonly", &readonly) < 0) {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
|
|
_("Missing readonly field in JSON state document"));
|
|
return NULL;
|
|
}
|
|
if (virJSONValueObjectGetNumberUint(object, "nrequests_max",
|
|
&nrequests_max) < 0) {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
|
|
_("Missing nrequests_client_max field in JSON state document"));
|
|
return NULL;
|
|
}
|
|
|
|
if (!(child = virJSONValueObjectGet(object, "sock"))) {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
|
|
_("Missing sock field in JSON state document"));
|
|
return NULL;
|
|
}
|
|
|
|
if (!virJSONValueObjectHasKey(object, "id")) {
|
|
/* no ID found in, a new one must be generated */
|
|
id = virNetServerNextClientID(srv);
|
|
} else {
|
|
if (virJSONValueObjectGetNumberUlong(object, "id", &id) < 0) {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
|
|
_("Malformed id field in JSON state document"));
|
|
return NULL;
|
|
}
|
|
}
|
|
|
|
if (!virJSONValueObjectHasKey(object, "conn_time")) {
|
|
timestamp = 0;
|
|
} else {
|
|
if (virJSONValueObjectGetNumberLong(object, "conn_time", ×tamp) < 0) {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
|
|
_("Malformed conn_time field in JSON "
|
|
"state document"));
|
|
return NULL;
|
|
}
|
|
}
|
|
|
|
if (!(sock = virNetSocketNewPostExecRestart(child))) {
|
|
virObjectUnref(sock);
|
|
return NULL;
|
|
}
|
|
|
|
if (!(client = virNetServerClientNewInternal(id,
|
|
sock,
|
|
auth,
|
|
auth_pending,
|
|
NULL,
|
|
readonly,
|
|
nrequests_max,
|
|
timestamp))) {
|
|
virObjectUnref(sock);
|
|
return NULL;
|
|
}
|
|
virObjectUnref(sock);
|
|
|
|
if (!(child = virJSONValueObjectGet(object, "privateData"))) {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
|
|
_("Missing privateData field in JSON state document"));
|
|
goto error;
|
|
}
|
|
|
|
if (!(client->privateData = privNew(client, child, privOpaque)))
|
|
goto error;
|
|
|
|
client->privateDataFreeFunc = privFree;
|
|
client->privateDataPreExecRestart = privPreExecRestart;
|
|
|
|
|
|
return client;
|
|
|
|
error:
|
|
virObjectUnref(client);
|
|
return NULL;
|
|
}
|
|
|
|
|
|
virJSONValuePtr virNetServerClientPreExecRestart(virNetServerClientPtr client)
|
|
{
|
|
virJSONValuePtr object = virJSONValueNewObject();
|
|
virJSONValuePtr child;
|
|
|
|
virObjectLock(client);
|
|
|
|
if (virJSONValueObjectAppendNumberUlong(object, "id",
|
|
client->id) < 0)
|
|
goto error;
|
|
|
|
if (virJSONValueObjectAppendNumberInt(object, "auth", client->auth) < 0)
|
|
goto error;
|
|
if (virJSONValueObjectAppendBoolean(object, "auth_pending", client->auth_pending) < 0)
|
|
goto error;
|
|
if (virJSONValueObjectAppendBoolean(object, "readonly", client->readonly) < 0)
|
|
goto error;
|
|
if (virJSONValueObjectAppendNumberUint(object, "nrequests_max", client->nrequests_max) < 0)
|
|
goto error;
|
|
|
|
if (client->conn_time &&
|
|
virJSONValueObjectAppendNumberLong(object, "conn_time",
|
|
client->conn_time) < 0)
|
|
goto error;
|
|
|
|
if (!(child = virNetSocketPreExecRestart(client->sock)))
|
|
goto error;
|
|
|
|
if (virJSONValueObjectAppend(object, "sock", child) < 0) {
|
|
virJSONValueFree(child);
|
|
goto error;
|
|
}
|
|
|
|
if (!(child = client->privateDataPreExecRestart(client, client->privateData)))
|
|
goto error;
|
|
|
|
if (virJSONValueObjectAppend(object, "privateData", child) < 0) {
|
|
virJSONValueFree(child);
|
|
goto error;
|
|
}
|
|
|
|
virObjectUnlock(client);
|
|
return object;
|
|
|
|
error:
|
|
virObjectUnlock(client);
|
|
virJSONValueFree(object);
|
|
return NULL;
|
|
}
|
|
|
|
|
|
int virNetServerClientGetAuth(virNetServerClientPtr client)
|
|
{
|
|
int auth;
|
|
virObjectLock(client);
|
|
auth = client->auth;
|
|
virObjectUnlock(client);
|
|
return auth;
|
|
}
|
|
|
|
|
|
void
|
|
virNetServerClientSetAuthLocked(virNetServerClientPtr client,
|
|
int auth)
|
|
{
|
|
client->auth = auth;
|
|
}
|
|
|
|
|
|
bool virNetServerClientGetReadonly(virNetServerClientPtr client)
|
|
{
|
|
bool readonly;
|
|
virObjectLock(client);
|
|
readonly = client->readonly;
|
|
virObjectUnlock(client);
|
|
return readonly;
|
|
}
|
|
|
|
|
|
void
|
|
virNetServerClientSetReadonly(virNetServerClientPtr client,
|
|
bool readonly)
|
|
{
|
|
virObjectLock(client);
|
|
client->readonly = readonly;
|
|
virObjectUnlock(client);
|
|
}
|
|
|
|
|
|
unsigned long long virNetServerClientGetID(virNetServerClientPtr client)
|
|
{
|
|
return client->id;
|
|
}
|
|
|
|
long long virNetServerClientGetTimestamp(virNetServerClientPtr client)
|
|
{
|
|
return client->conn_time;
|
|
}
|
|
|
|
bool virNetServerClientHasTLSSession(virNetServerClientPtr client)
|
|
{
|
|
bool has;
|
|
virObjectLock(client);
|
|
has = client->tls ? true : false;
|
|
virObjectUnlock(client);
|
|
return has;
|
|
}
|
|
|
|
|
|
virNetTLSSessionPtr virNetServerClientGetTLSSession(virNetServerClientPtr client)
|
|
{
|
|
virNetTLSSessionPtr tls;
|
|
virObjectLock(client);
|
|
tls = client->tls;
|
|
virObjectUnlock(client);
|
|
return tls;
|
|
}
|
|
|
|
int virNetServerClientGetTLSKeySize(virNetServerClientPtr client)
|
|
{
|
|
int size = 0;
|
|
virObjectLock(client);
|
|
if (client->tls)
|
|
size = virNetTLSSessionGetKeySize(client->tls);
|
|
virObjectUnlock(client);
|
|
return size;
|
|
}
|
|
|
|
int virNetServerClientGetFD(virNetServerClientPtr client)
|
|
{
|
|
int fd = -1;
|
|
virObjectLock(client);
|
|
if (client->sock)
|
|
fd = virNetSocketGetFD(client->sock);
|
|
virObjectUnlock(client);
|
|
return fd;
|
|
}
|
|
|
|
|
|
bool virNetServerClientIsLocal(virNetServerClientPtr client)
|
|
{
|
|
bool local = false;
|
|
virObjectLock(client);
|
|
if (client->sock)
|
|
local = virNetSocketIsLocal(client->sock);
|
|
virObjectUnlock(client);
|
|
return local;
|
|
}
|
|
|
|
|
|
int virNetServerClientGetUNIXIdentity(virNetServerClientPtr client,
|
|
uid_t *uid, gid_t *gid, pid_t *pid,
|
|
unsigned long long *timestamp)
|
|
{
|
|
int ret = -1;
|
|
virObjectLock(client);
|
|
if (client->sock)
|
|
ret = virNetSocketGetUNIXIdentity(client->sock,
|
|
uid, gid, pid,
|
|
timestamp);
|
|
virObjectUnlock(client);
|
|
return ret;
|
|
}
|
|
|
|
|
|
static virIdentityPtr
|
|
virNetServerClientCreateIdentity(virNetServerClientPtr client)
|
|
{
|
|
g_autofree char *username = NULL;
|
|
g_autofree char *groupname = NULL;
|
|
g_autofree char *seccontext = NULL;
|
|
g_autoptr(virIdentity) ret = NULL;
|
|
|
|
if (!(ret = virIdentityNew()))
|
|
return NULL;
|
|
|
|
if (client->sock && virNetSocketIsLocal(client->sock)) {
|
|
gid_t gid;
|
|
uid_t uid;
|
|
pid_t pid;
|
|
unsigned long long timestamp;
|
|
if (virNetSocketGetUNIXIdentity(client->sock,
|
|
&uid, &gid, &pid,
|
|
×tamp) < 0)
|
|
return NULL;
|
|
|
|
if (!(username = virGetUserName(uid)))
|
|
return NULL;
|
|
if (virIdentitySetUserName(ret, username) < 0)
|
|
return NULL;
|
|
if (virIdentitySetUNIXUserID(ret, uid) < 0)
|
|
return NULL;
|
|
|
|
if (!(groupname = virGetGroupName(gid)))
|
|
return NULL;
|
|
if (virIdentitySetGroupName(ret, groupname) < 0)
|
|
return NULL;
|
|
if (virIdentitySetUNIXGroupID(ret, gid) < 0)
|
|
return NULL;
|
|
|
|
if (virIdentitySetProcessID(ret, pid) < 0)
|
|
return NULL;
|
|
if (virIdentitySetProcessTime(ret, timestamp) < 0)
|
|
return NULL;
|
|
}
|
|
|
|
#if WITH_SASL
|
|
if (client->sasl) {
|
|
const char *identity = virNetSASLSessionGetIdentity(client->sasl);
|
|
if (virIdentitySetSASLUserName(ret, identity) < 0)
|
|
return NULL;
|
|
}
|
|
#endif
|
|
|
|
if (client->tls) {
|
|
const char *identity = virNetTLSSessionGetX509DName(client->tls);
|
|
if (virIdentitySetX509DName(ret, identity) < 0)
|
|
return NULL;
|
|
}
|
|
|
|
if (client->sock &&
|
|
virNetSocketGetSELinuxContext(client->sock, &seccontext) < 0)
|
|
return NULL;
|
|
if (seccontext &&
|
|
virIdentitySetSELinuxContext(ret, seccontext) < 0)
|
|
return NULL;
|
|
|
|
return g_steal_pointer(&ret);
|
|
}
|
|
|
|
|
|
virIdentityPtr virNetServerClientGetIdentity(virNetServerClientPtr client)
|
|
{
|
|
virIdentityPtr ret = NULL;
|
|
virObjectLock(client);
|
|
if (!client->identity)
|
|
client->identity = virNetServerClientCreateIdentity(client);
|
|
if (client->identity)
|
|
ret = g_object_ref(client->identity);
|
|
virObjectUnlock(client);
|
|
return ret;
|
|
}
|
|
|
|
|
|
void virNetServerClientSetIdentity(virNetServerClientPtr client,
|
|
virIdentityPtr identity)
|
|
{
|
|
virObjectLock(client);
|
|
g_clear_object(&client->identity);
|
|
client->identity = identity;
|
|
if (client->identity)
|
|
g_object_ref(client->identity);
|
|
virObjectUnlock(client);
|
|
}
|
|
|
|
|
|
int virNetServerClientGetSELinuxContext(virNetServerClientPtr client,
|
|
char **context)
|
|
{
|
|
int ret = 0;
|
|
*context = NULL;
|
|
virObjectLock(client);
|
|
if (client->sock)
|
|
ret = virNetSocketGetSELinuxContext(client->sock, context);
|
|
virObjectUnlock(client);
|
|
return ret;
|
|
}
|
|
|
|
|
|
bool virNetServerClientIsSecure(virNetServerClientPtr client)
|
|
{
|
|
bool secure = false;
|
|
virObjectLock(client);
|
|
if (client->tls)
|
|
secure = true;
|
|
#if WITH_SASL
|
|
if (client->sasl)
|
|
secure = true;
|
|
#endif
|
|
if (client->sock && virNetSocketIsLocal(client->sock))
|
|
secure = true;
|
|
virObjectUnlock(client);
|
|
return secure;
|
|
}
|
|
|
|
|
|
#if WITH_SASL
|
|
void virNetServerClientSetSASLSession(virNetServerClientPtr client,
|
|
virNetSASLSessionPtr sasl)
|
|
{
|
|
/* We don't set the sasl session on the socket here
|
|
* because we need to send out the auth confirmation
|
|
* in the clear. Only once we complete the next 'tx'
|
|
* operation do we switch to SASL mode
|
|
*/
|
|
virObjectLock(client);
|
|
client->sasl = virObjectRef(sasl);
|
|
virObjectUnlock(client);
|
|
}
|
|
|
|
|
|
virNetSASLSessionPtr virNetServerClientGetSASLSession(virNetServerClientPtr client)
|
|
{
|
|
virNetSASLSessionPtr sasl;
|
|
virObjectLock(client);
|
|
sasl = client->sasl;
|
|
virObjectUnlock(client);
|
|
return sasl;
|
|
}
|
|
|
|
bool virNetServerClientHasSASLSession(virNetServerClientPtr client)
|
|
{
|
|
bool has = false;
|
|
virObjectLock(client);
|
|
has = !!client->sasl;
|
|
virObjectUnlock(client);
|
|
return has;
|
|
}
|
|
#endif
|
|
|
|
|
|
void *virNetServerClientGetPrivateData(virNetServerClientPtr client)
|
|
{
|
|
void *data;
|
|
virObjectLock(client);
|
|
data = client->privateData;
|
|
virObjectUnlock(client);
|
|
return data;
|
|
}
|
|
|
|
|
|
void virNetServerClientSetCloseHook(virNetServerClientPtr client,
|
|
virNetServerClientCloseFunc cf)
|
|
{
|
|
virObjectLock(client);
|
|
client->privateDataCloseFunc = cf;
|
|
virObjectUnlock(client);
|
|
}
|
|
|
|
|
|
void virNetServerClientSetDispatcher(virNetServerClientPtr client,
|
|
virNetServerClientDispatchFunc func,
|
|
void *opaque)
|
|
{
|
|
virObjectLock(client);
|
|
/* Only set dispatcher if not already set, to avoid race
|
|
* with dispatch code that runs without locks held
|
|
*/
|
|
if (!client->dispatchFunc) {
|
|
client->dispatchFunc = func;
|
|
client->dispatchOpaque = opaque;
|
|
}
|
|
virObjectUnlock(client);
|
|
}
|
|
|
|
|
|
const char *virNetServerClientLocalAddrStringSASL(virNetServerClientPtr client)
|
|
{
|
|
if (!client->sock)
|
|
return NULL;
|
|
return virNetSocketLocalAddrStringSASL(client->sock);
|
|
}
|
|
|
|
|
|
const char *virNetServerClientRemoteAddrStringSASL(virNetServerClientPtr client)
|
|
{
|
|
if (!client->sock)
|
|
return NULL;
|
|
return virNetSocketRemoteAddrStringSASL(client->sock);
|
|
}
|
|
|
|
const char *virNetServerClientRemoteAddrStringURI(virNetServerClientPtr client)
|
|
{
|
|
if (!client->sock)
|
|
return NULL;
|
|
return virNetSocketRemoteAddrStringURI(client->sock);
|
|
}
|
|
|
|
void virNetServerClientDispose(void *obj)
|
|
{
|
|
virNetServerClientPtr client = obj;
|
|
|
|
PROBE(RPC_SERVER_CLIENT_DISPOSE,
|
|
"client=%p", client);
|
|
|
|
if (client->privateData)
|
|
client->privateDataFreeFunc(client->privateData);
|
|
|
|
g_clear_object(&client->identity);
|
|
|
|
#if WITH_SASL
|
|
virObjectUnref(client->sasl);
|
|
#endif
|
|
if (client->sockTimer > 0)
|
|
virEventRemoveTimeout(client->sockTimer);
|
|
virObjectUnref(client->tls);
|
|
virObjectUnref(client->tlsCtxt);
|
|
virObjectUnref(client->sock);
|
|
}
|
|
|
|
|
|
/*
|
|
*
|
|
* We don't free stuff here, merely disconnect the client's
|
|
* network socket & resources.
|
|
*
|
|
* Full free of the client is done later in a safe point
|
|
* where it can be guaranteed it is no longer in use
|
|
*/
|
|
void
|
|
virNetServerClientCloseLocked(virNetServerClientPtr client)
|
|
{
|
|
virNetServerClientCloseFunc cf;
|
|
virKeepAlivePtr ka;
|
|
|
|
VIR_DEBUG("client=%p", client);
|
|
if (!client->sock)
|
|
return;
|
|
|
|
if (client->keepalive) {
|
|
virKeepAliveStop(client->keepalive);
|
|
ka = client->keepalive;
|
|
client->keepalive = NULL;
|
|
virObjectRef(client);
|
|
virObjectUnlock(client);
|
|
virObjectUnref(ka);
|
|
virObjectLock(client);
|
|
virObjectUnref(client);
|
|
}
|
|
|
|
if (client->privateDataCloseFunc) {
|
|
cf = client->privateDataCloseFunc;
|
|
virObjectRef(client);
|
|
virObjectUnlock(client);
|
|
(cf)(client);
|
|
virObjectLock(client);
|
|
virObjectUnref(client);
|
|
}
|
|
|
|
/* Do now, even though we don't close the socket
|
|
* until end, to ensure we don't get invoked
|
|
* again due to tls shutdown */
|
|
if (client->sock)
|
|
virNetSocketRemoveIOCallback(client->sock);
|
|
|
|
if (client->tls) {
|
|
virObjectUnref(client->tls);
|
|
client->tls = NULL;
|
|
}
|
|
client->wantClose = true;
|
|
|
|
while (client->rx) {
|
|
virNetMessagePtr msg
|
|
= virNetMessageQueueServe(&client->rx);
|
|
virNetMessageFree(msg);
|
|
}
|
|
while (client->tx) {
|
|
virNetMessagePtr msg
|
|
= virNetMessageQueueServe(&client->tx);
|
|
virNetMessageFree(msg);
|
|
}
|
|
|
|
if (client->sock) {
|
|
virObjectUnref(client->sock);
|
|
client->sock = NULL;
|
|
}
|
|
}
|
|
|
|
|
|
void
|
|
virNetServerClientClose(virNetServerClientPtr client)
|
|
{
|
|
virObjectLock(client);
|
|
virNetServerClientCloseLocked(client);
|
|
virObjectUnlock(client);
|
|
}
|
|
|
|
|
|
bool
|
|
virNetServerClientIsClosedLocked(virNetServerClientPtr client)
|
|
{
|
|
return client->sock == NULL;
|
|
}
|
|
|
|
|
|
void virNetServerClientDelayedClose(virNetServerClientPtr client)
|
|
{
|
|
virObjectLock(client);
|
|
client->delayedClose = true;
|
|
virObjectUnlock(client);
|
|
}
|
|
|
|
void virNetServerClientImmediateClose(virNetServerClientPtr client)
|
|
{
|
|
virObjectLock(client);
|
|
client->wantClose = true;
|
|
virObjectUnlock(client);
|
|
}
|
|
|
|
|
|
bool
|
|
virNetServerClientWantCloseLocked(virNetServerClientPtr client)
|
|
{
|
|
return client->wantClose;
|
|
}
|
|
|
|
|
|
int virNetServerClientInit(virNetServerClientPtr client)
|
|
{
|
|
virObjectLock(client);
|
|
|
|
if (!client->tlsCtxt) {
|
|
/* Plain socket, so prepare to read first message */
|
|
if (virNetServerClientRegisterEvent(client) < 0)
|
|
goto error;
|
|
} else {
|
|
int ret;
|
|
|
|
if (!(client->tls = virNetTLSSessionNew(client->tlsCtxt,
|
|
NULL)))
|
|
goto error;
|
|
|
|
virNetSocketSetTLSSession(client->sock,
|
|
client->tls);
|
|
|
|
/* Begin the TLS handshake. */
|
|
virObjectLock(client->tlsCtxt);
|
|
ret = virNetTLSSessionHandshake(client->tls);
|
|
virObjectUnlock(client->tlsCtxt);
|
|
if (ret == 0) {
|
|
/* Unlikely, but ... Next step is to check the certificate. */
|
|
if (virNetServerClientCheckAccess(client) < 0)
|
|
goto error;
|
|
|
|
/* Handshake & cert check OK, so prepare to read first message */
|
|
if (virNetServerClientRegisterEvent(client) < 0)
|
|
goto error;
|
|
} else if (ret > 0) {
|
|
/* Most likely, need to do more handshake data */
|
|
if (virNetServerClientRegisterEvent(client) < 0)
|
|
goto error;
|
|
} else {
|
|
goto error;
|
|
}
|
|
}
|
|
|
|
virObjectUnlock(client);
|
|
return 0;
|
|
|
|
error:
|
|
client->wantClose = true;
|
|
virObjectUnlock(client);
|
|
return -1;
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
* Read data into buffer using wire decoding (plain or TLS)
|
|
*
|
|
* Returns:
|
|
* -1 on error or EOF
|
|
* 0 on EAGAIN
|
|
* n number of bytes
|
|
*/
|
|
static ssize_t virNetServerClientRead(virNetServerClientPtr client)
|
|
{
|
|
ssize_t ret;
|
|
|
|
if (client->rx->bufferLength <= client->rx->bufferOffset) {
|
|
virReportError(VIR_ERR_RPC,
|
|
_("unexpected zero/negative length request %lld"),
|
|
(long long int)(client->rx->bufferLength - client->rx->bufferOffset));
|
|
client->wantClose = true;
|
|
return -1;
|
|
}
|
|
|
|
ret = virNetSocketRead(client->sock,
|
|
client->rx->buffer + client->rx->bufferOffset,
|
|
client->rx->bufferLength - client->rx->bufferOffset);
|
|
|
|
if (ret <= 0)
|
|
return ret;
|
|
|
|
client->rx->bufferOffset += ret;
|
|
return ret;
|
|
}
|
|
|
|
|
|
/*
|
|
* Read data until we get a complete message to process.
|
|
* If a complete message is available, it will be returned
|
|
* from this method, for dispatch by the caller.
|
|
*
|
|
* Returns a complete message for dispatch, or NULL if none is
|
|
* yet available, or an error occurred. On error, the wantClose
|
|
* flag will be set.
|
|
*/
|
|
static virNetMessagePtr virNetServerClientDispatchRead(virNetServerClientPtr client)
|
|
{
|
|
readmore:
|
|
if (client->rx->nfds == 0) {
|
|
if (virNetServerClientRead(client) < 0) {
|
|
client->wantClose = true;
|
|
return NULL; /* Error */
|
|
}
|
|
}
|
|
|
|
if (client->rx->bufferOffset < client->rx->bufferLength)
|
|
return NULL; /* Still not read enough */
|
|
|
|
/* Either done with length word header */
|
|
if (client->rx->bufferLength == VIR_NET_MESSAGE_LEN_MAX) {
|
|
if (virNetMessageDecodeLength(client->rx) < 0) {
|
|
client->wantClose = true;
|
|
return NULL;
|
|
}
|
|
|
|
virNetServerClientUpdateEvent(client);
|
|
|
|
/* Try and read payload immediately instead of going back
|
|
into poll() because chances are the data is already
|
|
waiting for us */
|
|
goto readmore;
|
|
} else {
|
|
/* Grab the completed message */
|
|
virNetMessagePtr msg = client->rx;
|
|
virNetMessagePtr response = NULL;
|
|
virNetServerClientFilterPtr filter;
|
|
size_t i;
|
|
|
|
/* Decode the header so we can use it for routing decisions */
|
|
if (virNetMessageDecodeHeader(msg) < 0) {
|
|
virNetMessageQueueServe(&client->rx);
|
|
virNetMessageFree(msg);
|
|
client->wantClose = true;
|
|
return NULL;
|
|
}
|
|
|
|
/* Now figure out if we need to read more data to get some
|
|
* file descriptors */
|
|
if (msg->header.type == VIR_NET_CALL_WITH_FDS) {
|
|
if (virNetMessageDecodeNumFDs(msg) < 0) {
|
|
virNetMessageQueueServe(&client->rx);
|
|
virNetMessageFree(msg);
|
|
client->wantClose = true;
|
|
return NULL; /* Error */
|
|
}
|
|
|
|
/* Try getting the file descriptors (may fail if blocking) */
|
|
for (i = msg->donefds; i < msg->nfds; i++) {
|
|
int rv;
|
|
if ((rv = virNetSocketRecvFD(client->sock, &(msg->fds[i]))) < 0) {
|
|
virNetMessageQueueServe(&client->rx);
|
|
virNetMessageFree(msg);
|
|
client->wantClose = true;
|
|
return NULL;
|
|
}
|
|
if (rv == 0) /* Blocking */
|
|
break;
|
|
msg->donefds++;
|
|
}
|
|
|
|
/* Need to poll() until FDs arrive */
|
|
if (msg->donefds < msg->nfds) {
|
|
/* Because DecodeHeader/NumFDs reset bufferOffset, we
|
|
* put it back to what it was, so everything works
|
|
* again next time we run this method
|
|
*/
|
|
client->rx->bufferOffset = client->rx->bufferLength;
|
|
return NULL;
|
|
}
|
|
}
|
|
|
|
/* Definitely finished reading, so remove from queue */
|
|
virNetMessageQueueServe(&client->rx);
|
|
PROBE(RPC_SERVER_CLIENT_MSG_RX,
|
|
"client=%p len=%zu prog=%u vers=%u proc=%u type=%u status=%u serial=%u",
|
|
client, msg->bufferLength,
|
|
msg->header.prog, msg->header.vers, msg->header.proc,
|
|
msg->header.type, msg->header.status, msg->header.serial);
|
|
|
|
if (virKeepAliveCheckMessage(client->keepalive, msg, &response)) {
|
|
virNetMessageFree(msg);
|
|
client->nrequests--;
|
|
msg = NULL;
|
|
|
|
if (response &&
|
|
virNetServerClientSendMessageLocked(client, response) < 0)
|
|
virNetMessageFree(response);
|
|
}
|
|
|
|
/* Maybe send off for queue against a filter */
|
|
if (msg) {
|
|
filter = client->filters;
|
|
while (filter) {
|
|
int ret = filter->func(client, msg, filter->opaque);
|
|
if (ret < 0) {
|
|
virNetMessageFree(msg);
|
|
msg = NULL;
|
|
client->wantClose = true;
|
|
break;
|
|
}
|
|
if (ret > 0) {
|
|
msg = NULL;
|
|
break;
|
|
}
|
|
|
|
filter = filter->next;
|
|
}
|
|
}
|
|
|
|
/* Possibly need to create another receive buffer */
|
|
if (client->nrequests < client->nrequests_max) {
|
|
if (!(client->rx = virNetMessageNew(true))) {
|
|
client->wantClose = true;
|
|
} else {
|
|
client->rx->bufferLength = VIR_NET_MESSAGE_LEN_MAX;
|
|
client->rx->buffer = g_new0(char, client->rx->bufferLength);
|
|
client->nrequests++;
|
|
}
|
|
}
|
|
virNetServerClientUpdateEvent(client);
|
|
|
|
return msg;
|
|
}
|
|
}
|
|
|
|
|
|
/*
|
|
* Send client->tx using no encoding
|
|
*
|
|
* Returns:
|
|
* -1 on error or EOF
|
|
* 0 on EAGAIN
|
|
* n number of bytes
|
|
*/
|
|
static ssize_t virNetServerClientWrite(virNetServerClientPtr client)
|
|
{
|
|
ssize_t ret;
|
|
|
|
if (client->tx->bufferLength < client->tx->bufferOffset) {
|
|
virReportError(VIR_ERR_RPC,
|
|
_("unexpected zero/negative length request %lld"),
|
|
(long long int)(client->tx->bufferLength - client->tx->bufferOffset));
|
|
client->wantClose = true;
|
|
return -1;
|
|
}
|
|
|
|
if (client->tx->bufferLength == client->tx->bufferOffset)
|
|
return 1;
|
|
|
|
ret = virNetSocketWrite(client->sock,
|
|
client->tx->buffer + client->tx->bufferOffset,
|
|
client->tx->bufferLength - client->tx->bufferOffset);
|
|
if (ret <= 0)
|
|
return ret; /* -1 error, 0 = egain */
|
|
|
|
client->tx->bufferOffset += ret;
|
|
return ret;
|
|
}
|
|
|
|
|
|
/*
|
|
* Process all queued client->tx messages until
|
|
* we would block on I/O
|
|
*/
|
|
static void
|
|
virNetServerClientDispatchWrite(virNetServerClientPtr client)
|
|
{
|
|
while (client->tx) {
|
|
if (client->tx->bufferOffset < client->tx->bufferLength) {
|
|
ssize_t ret;
|
|
ret = virNetServerClientWrite(client);
|
|
if (ret < 0) {
|
|
client->wantClose = true;
|
|
return;
|
|
}
|
|
if (ret == 0)
|
|
return; /* Would block on write EAGAIN */
|
|
}
|
|
|
|
if (client->tx->bufferOffset == client->tx->bufferLength) {
|
|
virNetMessagePtr msg;
|
|
size_t i;
|
|
|
|
for (i = client->tx->donefds; i < client->tx->nfds; i++) {
|
|
int rv;
|
|
if ((rv = virNetSocketSendFD(client->sock, client->tx->fds[i])) < 0) {
|
|
client->wantClose = true;
|
|
return;
|
|
}
|
|
if (rv == 0) /* Blocking */
|
|
return;
|
|
client->tx->donefds++;
|
|
}
|
|
|
|
#if WITH_SASL
|
|
/* Completed this 'tx' operation, so now read for all
|
|
* future rx/tx to be under a SASL SSF layer
|
|
*/
|
|
if (client->sasl) {
|
|
virNetSocketSetSASLSession(client->sock, client->sasl);
|
|
virObjectUnref(client->sasl);
|
|
client->sasl = NULL;
|
|
}
|
|
#endif
|
|
|
|
/* Get finished msg from head of tx queue */
|
|
msg = virNetMessageQueueServe(&client->tx);
|
|
|
|
if (msg->tracked) {
|
|
client->nrequests--;
|
|
/* See if the recv queue is currently throttled */
|
|
if (!client->rx &&
|
|
client->nrequests < client->nrequests_max) {
|
|
/* Ready to recv more messages */
|
|
virNetMessageClear(msg);
|
|
msg->bufferLength = VIR_NET_MESSAGE_LEN_MAX;
|
|
msg->buffer = g_new0(char, msg->bufferLength);
|
|
client->rx = msg;
|
|
msg = NULL;
|
|
client->nrequests++;
|
|
}
|
|
}
|
|
|
|
virNetMessageFree(msg);
|
|
|
|
virNetServerClientUpdateEvent(client);
|
|
|
|
if (client->delayedClose)
|
|
client->wantClose = true;
|
|
}
|
|
}
|
|
}
|
|
|
|
|
|
static void
|
|
virNetServerClientDispatchHandshake(virNetServerClientPtr client)
|
|
{
|
|
int ret;
|
|
/* Continue the handshake. */
|
|
virObjectLock(client->tlsCtxt);
|
|
ret = virNetTLSSessionHandshake(client->tls);
|
|
virObjectUnlock(client->tlsCtxt);
|
|
if (ret == 0) {
|
|
/* Finished. Next step is to check the certificate. */
|
|
if (virNetServerClientCheckAccess(client) < 0)
|
|
client->wantClose = true;
|
|
else
|
|
virNetServerClientUpdateEvent(client);
|
|
} else if (ret > 0) {
|
|
/* Carry on waiting for more handshake. Update
|
|
the events just in case handshake data flow
|
|
direction has changed */
|
|
virNetServerClientUpdateEvent(client);
|
|
} else {
|
|
/* Fatal error in handshake */
|
|
client->wantClose = true;
|
|
}
|
|
}
|
|
|
|
|
|
static void
|
|
virNetServerClientDispatchEvent(virNetSocketPtr sock, int events, void *opaque)
|
|
{
|
|
virNetServerClientPtr client = opaque;
|
|
virNetMessagePtr msg = NULL;
|
|
|
|
virObjectLock(client);
|
|
|
|
if (client->sock != sock) {
|
|
virNetSocketRemoveIOCallback(sock);
|
|
virObjectUnlock(client);
|
|
return;
|
|
}
|
|
|
|
if (events & (VIR_EVENT_HANDLE_WRITABLE |
|
|
VIR_EVENT_HANDLE_READABLE)) {
|
|
if (client->tls &&
|
|
virNetTLSSessionGetHandshakeStatus(client->tls) !=
|
|
VIR_NET_TLS_HANDSHAKE_COMPLETE) {
|
|
virNetServerClientDispatchHandshake(client);
|
|
} else {
|
|
if (events & VIR_EVENT_HANDLE_WRITABLE)
|
|
virNetServerClientDispatchWrite(client);
|
|
if (events & VIR_EVENT_HANDLE_READABLE &&
|
|
client->rx)
|
|
msg = virNetServerClientDispatchRead(client);
|
|
}
|
|
}
|
|
|
|
/* NB, will get HANGUP + READABLE at same time upon
|
|
* disconnect */
|
|
if (events & (VIR_EVENT_HANDLE_ERROR |
|
|
VIR_EVENT_HANDLE_HANGUP))
|
|
client->wantClose = true;
|
|
|
|
virObjectUnlock(client);
|
|
|
|
if (msg)
|
|
virNetServerClientDispatchMessage(client, msg);
|
|
}
|
|
|
|
|
|
static int
|
|
virNetServerClientSendMessageLocked(virNetServerClientPtr client,
|
|
virNetMessagePtr msg)
|
|
{
|
|
int ret = -1;
|
|
VIR_DEBUG("msg=%p proc=%d len=%zu offset=%zu",
|
|
msg, msg->header.proc,
|
|
msg->bufferLength, msg->bufferOffset);
|
|
|
|
msg->donefds = 0;
|
|
if (client->sock && !client->wantClose) {
|
|
PROBE(RPC_SERVER_CLIENT_MSG_TX_QUEUE,
|
|
"client=%p len=%zu prog=%u vers=%u proc=%u type=%u status=%u serial=%u",
|
|
client, msg->bufferLength,
|
|
msg->header.prog, msg->header.vers, msg->header.proc,
|
|
msg->header.type, msg->header.status, msg->header.serial);
|
|
virNetMessageQueuePush(&client->tx, msg);
|
|
|
|
virNetServerClientUpdateEvent(client);
|
|
ret = 0;
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
int virNetServerClientSendMessage(virNetServerClientPtr client,
|
|
virNetMessagePtr msg)
|
|
{
|
|
int ret;
|
|
|
|
virObjectLock(client);
|
|
ret = virNetServerClientSendMessageLocked(client, msg);
|
|
virObjectUnlock(client);
|
|
|
|
return ret;
|
|
}
|
|
|
|
|
|
bool
|
|
virNetServerClientIsAuthenticated(virNetServerClientPtr client)
|
|
{
|
|
bool authenticated;
|
|
virObjectLock(client);
|
|
authenticated = virNetServerClientAuthMethodImpliesAuthenticated(client->auth);
|
|
virObjectUnlock(client);
|
|
return authenticated;
|
|
}
|
|
|
|
|
|
/* The caller must hold the lock for @client */
|
|
void
|
|
virNetServerClientSetAuthPendingLocked(virNetServerClientPtr client,
|
|
bool auth_pending)
|
|
{
|
|
client->auth_pending = auth_pending;
|
|
}
|
|
|
|
|
|
/* The caller must hold the lock for @client */
|
|
bool
|
|
virNetServerClientIsAuthPendingLocked(virNetServerClientPtr client)
|
|
{
|
|
return client->auth_pending;
|
|
}
|
|
|
|
|
|
static void
|
|
virNetServerClientKeepAliveDeadCB(void *opaque)
|
|
{
|
|
virNetServerClientImmediateClose(opaque);
|
|
}
|
|
|
|
static int
|
|
virNetServerClientKeepAliveSendCB(void *opaque,
|
|
virNetMessagePtr msg)
|
|
{
|
|
return virNetServerClientSendMessage(opaque, msg);
|
|
}
|
|
|
|
|
|
int
|
|
virNetServerClientInitKeepAlive(virNetServerClientPtr client,
|
|
int interval,
|
|
unsigned int count)
|
|
{
|
|
virKeepAlivePtr ka;
|
|
int ret = -1;
|
|
|
|
virObjectLock(client);
|
|
|
|
if (!(ka = virKeepAliveNew(interval, count, client,
|
|
virNetServerClientKeepAliveSendCB,
|
|
virNetServerClientKeepAliveDeadCB,
|
|
virObjectFreeCallback)))
|
|
goto cleanup;
|
|
/* keepalive object has a reference to client */
|
|
virObjectRef(client);
|
|
|
|
client->keepalive = ka;
|
|
ret = 0;
|
|
cleanup:
|
|
virObjectUnlock(client);
|
|
|
|
return ret;
|
|
}
|
|
|
|
int
|
|
virNetServerClientStartKeepAlive(virNetServerClientPtr client)
|
|
{
|
|
int ret = -1;
|
|
|
|
virObjectLock(client);
|
|
|
|
/* The connection might have been closed before we got here and thus the
|
|
* keepalive object could have been removed too.
|
|
*/
|
|
if (!client->keepalive) {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
|
|
_("connection not open"));
|
|
goto cleanup;
|
|
}
|
|
|
|
ret = virKeepAliveStart(client->keepalive, 0, 0);
|
|
|
|
cleanup:
|
|
virObjectUnlock(client);
|
|
return ret;
|
|
}
|
|
|
|
int
|
|
virNetServerClientGetTransport(virNetServerClientPtr client)
|
|
{
|
|
int ret = -1;
|
|
|
|
virObjectLock(client);
|
|
|
|
if (client->sock && virNetSocketIsLocal(client->sock))
|
|
ret = VIR_CLIENT_TRANS_UNIX;
|
|
else
|
|
ret = VIR_CLIENT_TRANS_TCP;
|
|
|
|
if (client->tls)
|
|
ret = VIR_CLIENT_TRANS_TLS;
|
|
|
|
virObjectUnlock(client);
|
|
|
|
return ret;
|
|
}
|
|
|
|
int
|
|
virNetServerClientGetInfo(virNetServerClientPtr client,
|
|
bool *readonly, char **sock_addr,
|
|
virIdentityPtr *identity)
|
|
{
|
|
int ret = -1;
|
|
const char *addr;
|
|
|
|
virObjectLock(client);
|
|
*readonly = client->readonly;
|
|
|
|
if (!(addr = virNetServerClientRemoteAddrStringURI(client))) {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
|
|
_("No network socket associated with client"));
|
|
goto cleanup;
|
|
}
|
|
|
|
*sock_addr = g_strdup(addr);
|
|
|
|
if (!client->identity) {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
|
|
_("No identity information available for client"));
|
|
goto cleanup;
|
|
}
|
|
|
|
*identity = g_object_ref(client->identity);
|
|
|
|
ret = 0;
|
|
cleanup:
|
|
virObjectUnlock(client);
|
|
return ret;
|
|
}
|
|
|
|
|
|
/**
|
|
* virNetServerClientSetQuietEOF:
|
|
*
|
|
* Don't report errors for protocols that close connection by hangup of the
|
|
* socket rather than calling an API to close it.
|
|
*/
|
|
void
|
|
virNetServerClientSetQuietEOF(virNetServerClientPtr client)
|
|
{
|
|
virNetSocketSetQuietEOF(client->sock);
|
|
}
|