From f95e336d91af36a6a2d842516d3c6d03a302b5cc Mon Sep 17 00:00:00 2001 From: Timothy Stack <stack@flux.utah.edu> Date: Sun, 7 Nov 2004 17:13:34 +0000 Subject: [PATCH] Change to the SSL version of the event scheduler. * db/libdb.py.in, xmlrpc/emulabserver.py.in: Only add the testbed library path to sys.path if it is not already there. * event/sched/GNUmakefile.in: Make the SSL version of the scheduler the default instead of the SSH version and statically link the executable. * event/sched/event-sched.c: Pass the default SSL port number (3069) to RPC_init. * event/sched/rpc.cc: Bring the SSL code up to date: read the cert from the user's home directory, make the connection persistent, and use TBROOT as the request path, so the development version of the XML-RPC library is used when appropriate. * xmlrpc/sslxmlrpc_server.py.in: Updated to let the user select from a set of allowed library paths where the 'emulabserver' module should be imported from. Import the 'emulabserver' module after the fork so we always get the latest version of the module. Twiddled the necessary bits to turn on persistent connection support. --- db/libdb.py.in | 8 +- event/sched/GNUmakefile.in | 12 +-- event/sched/event-sched.c | 2 +- event/sched/rpc.cc | 29 +++---- xmlrpc/emulabserver.py.in | 15 +++- xmlrpc/sslxmlrpc_server.py.in | 153 +++++++++++++++++++++++++++++++--- 6 files changed, 179 insertions(+), 40 deletions(-) diff --git a/db/libdb.py.in b/db/libdb.py.in index 829876ffc3..f5e80f6a37 100644 --- a/db/libdb.py.in +++ b/db/libdb.py.in @@ -10,10 +10,14 @@ # import sys -sys.path.append("@prefix@/lib") -import os +import os, os.path import pwd +TBPATH = os.path.join("@prefix@", "lib") +if TBPATH not in sys.path: + sys.path.append(TBPATH) + pass + import MySQLdb from libtestbed import * diff --git a/event/sched/GNUmakefile.in b/event/sched/GNUmakefile.in index f6cf02dc7a..9c21e4c0c6 100644 --- a/event/sched/GNUmakefile.in +++ b/event/sched/GNUmakefile.in @@ -11,7 +11,7 @@ SUBDIR = event/sched include $(OBJDIR)/Makeconf -all: event-sched event-sched_rpc +all: event-sched event-sched_rrpc include $(TESTBED_SRCDIR)/GNUmakerules @@ -50,7 +50,7 @@ event-sched_rpc: event-sched_rpc.o rpc.o queue.o event-sched.h \ event-sched_rrpc: event-sched_rpc.o rrpc.o queue.o event-sched.h \ ../lib/libevent.a - $(CXX) $(CFLAGS) $(LDFLAGS) -o $@ event-sched_rpc.o \ + $(CXX) $(CFLAGS) -static $(LDFLAGS) -o $@ event-sched_rpc.o \ rrpc.o queue.o $(ULXRLIBS) $(LIBS) queue.o: event-sched.h @@ -62,12 +62,12 @@ rpc.o: rpc.cc rpc.h rrpc.o: rpc.cc rpc.h $(CXX) $(CXXFLAGS) -DSSLRPC $(ULXRINC) -c -o rrpc.o $< -install: event-sched_rpc +install: event-sched_rrpc -mkdir -p $(INSTALL_DIR)/opsdir/sbin - $(INSTALL_PROGRAM) event-sched_rpc $(INSTALL_DIR)/opsdir/sbin/event-sched + $(INSTALL_PROGRAM) event-sched_rrpc $(INSTALL_DIR)/opsdir/sbin/event-sched -control-install: event-sched_rpc - $(INSTALL_PROGRAM) event-sched_rpc $(INSTALL_SBINDIR)/event-sched +control-install: event-sched_rrpc + $(INSTALL_PROGRAM) event-sched_rrpc $(INSTALL_SBINDIR)/event-sched # not a client thing client: diff --git a/event/sched/event-sched.c b/event/sched/event-sched.c index 6c099de894..cd2f3d3639 100644 --- a/event/sched/event-sched.c +++ b/event/sched/event-sched.c @@ -154,7 +154,7 @@ main(int argc, char **argv) if (!server) server = "localhost"; #ifdef RPC - if (RPC_init(NULL, BOSSNODE, 0)) { + if (RPC_init(NULL, BOSSNODE, 3069)) { fatal("could not connect to rpc server"); } #endif diff --git a/event/sched/rpc.cc b/event/sched/rpc.cc index 1d23448030..54b19d844e 100644 --- a/event/sched/rpc.cc +++ b/event/sched/rpc.cc @@ -50,15 +50,15 @@ main(int argc, char **argv) int RPC_init(char *certpath, char *host, int port) { + struct passwd *pwd; int retval = -1; + pwd = getpwuid(getuid()); #ifdef SSHRPC { char identity_path[PATH_MAX]; - struct passwd *pwd; /* Construct the path to the identity and */ - pwd = getpwuid(getuid()); snprintf(identity_path, sizeof(identity_path), "%s/.ssh/identity", @@ -115,13 +115,19 @@ int RPC_init(char *certpath, char *host, int port) } } #else - /* XXX THIS IS OUT OF DATE */ { - ulxr::SSLConnection conn(false, host, port); - ulxr::HttpProtocol proto(&conn, conn.getHostName()); - if (certpath == NULL) - certpath = "/usr/testbed/etc/client.pem"; - conn.setCryptographyData("", certpath, certpath); + ulxr::SSLConnection *sslconn; + char buf[BUFSIZ]; + + rpc_data.conn = sslconn = new ulxr::SSLConnection(false, host, port); + rpc_data.proto = new ulxr::HttpProtocol(rpc_data.conn, + sslconn->getHostName()); + rpc_data.proto->setPersistent(true); + if (certpath == NULL) { + snprintf(buf, sizeof(buf), "%s/.ssl/emulab.pem", pwd->pw_dir); + certpath = buf; + } + sslconn->setCryptographyData("", certpath, certpath); } #endif return 0; @@ -150,12 +156,7 @@ RPC_invoke(char *pid, char *eid, char *method, emulab::EmulabResponse *er) { try { -#ifdef SSHRPC - emulab::ServerProxy proxy(rpc_data.proto); -#else - /* XXX THIS IS OUT OF DATE */ - emulab::ServerProxy proxy(rpc_data.proto, false, "/RPC2"); -#endif + emulab::ServerProxy proxy(rpc_data.proto, false, TBROOT); *er = proxy.invoke(method, emulab::SPA_String, "proj", pid, diff --git a/xmlrpc/emulabserver.py.in b/xmlrpc/emulabserver.py.in index ccd3b18066..4005ad1fd8 100755 --- a/xmlrpc/emulabserver.py.in +++ b/xmlrpc/emulabserver.py.in @@ -22,15 +22,22 @@ import xmlrpclib import signal import types import datetime -sys.path.append("@prefix@/lib") -from libdb import * -from libtestbed import SENDMAIL, TBOPS -from emulabclient import * # Configure variables TBDIR = "@prefix@" BOSSNODE = "@BOSSNODE@" BOSSEVENTPORT = "@BOSSEVENTPORT@" +OURDOMAIN = "@OURDOMAIN@" +USERNODE = "@USERNODE@" + +TBPATH = os.path.join(TBDIR, "lib") +if TBPATH not in sys.path: + sys.path.append(TBPATH) + pass + +from libdb import * +from libtestbed import SENDMAIL, TBOPS +from emulabclient import * # Version VERSION = 0.1 diff --git a/xmlrpc/sslxmlrpc_server.py.in b/xmlrpc/sslxmlrpc_server.py.in index 9197a91e46..dd644f0dbe 100755 --- a/xmlrpc/sslxmlrpc_server.py.in +++ b/xmlrpc/sslxmlrpc_server.py.in @@ -6,21 +6,30 @@ # import sys import getopt -import os +import os, os.path import traceback import syslog import string +import BaseHTTPServer + +from SimpleXMLRPCServer import SimpleXMLRPCDispatcher + # Testbed specific stuff -sys.path.append("@prefix@/lib") +TBPATH = "@prefix@/lib" +if TBPATH not in sys.path: + sys.path.append(TBPATH) + pass + from libdb import * -from libtestbed import SENDMAIL, TBOPS -from emulabserver import * -from SimpleXMLRPCServer import SimpleXMLRPCDispatcher -from SimpleXMLRPCServer import SimpleXMLRPCRequestHandler -from M2Crypto import SSL -from M2Crypto.SSL import SSLError +try: + from M2Crypto import SSL + from M2Crypto.SSL import SSLError +except ImportError, e: + sys.stderr.write("error: The py-m2crypto port is not installed\n") + sys.exit(1) + pass # When debugging, runs in foreground printing to stdout instead of syslog debug = 0 @@ -43,9 +52,89 @@ ca_cert = "@prefix@/etc/emulab.pem" DEFAULT_MODULE = "EmulabServer" module = DEFAULT_MODULE +# +# "Standard" paths for the real and development versions of the software. +# +STD_PATH = "/usr/testbed" +STD_DEVEL_PATH = "/usr/testbed/devel" + +# +# The set of paths that the user is allowed to specify in their request. The +# path specifies where the 'emulabserver' module will be loaded from. In +# reality, the path only has an effect on the first request in a persistent +# connection, any subsequent requests will reuse the same module. +# +ALLOWED_PATHS = [ STD_PATH, "@prefix@" ] +ALLOWED_PATHS.extend(map(lambda x: os.path.join(STD_DEVEL_PATH, x), + os.listdir(STD_DEVEL_PATH))) + # syslog facility LOGFACIL = "@TBLOGFACIL@" +## +# Taken from the SimpleXMLRPCServer module in the python installation and +# modified to support persistent connections. +# +class MyXMLRPCRequestHandler(BaseHTTPServer.BaseHTTPRequestHandler): + """Simple XML-RPC request handler class. + + Handles all HTTP POST requests and attempts to decode them as + XML-RPC requests. + """ + + ## + # Change the default protocol so that persistent connections are the norm. + # + protocol_version = "HTTP/1.1" + + ## + # Handle a POST request from the user. This method was changed from the + # standard version to not close the + # + def do_POST(self): + """Handles the HTTP POST request. + + Attempts to interpret all HTTP POST requests as XML-RPC calls, + which are forwarded to the server's _dispatch method for handling. + """ + + # Update PYTHONPATH with the user's requested path. + self.server.set_path(self.path) + + try: + # get arguments + data = self.rfile.read(int(self.headers["content-length"])) + # In previous versions of SimpleXMLRPCServer, _dispatch + # could be overridden in this class, instead of in + # SimpleXMLRPCDispatcher. To maintain backwards compatibility, + # check to see if a subclass implements _dispatch and dispatch + # using that method if present. + response = self.server._marshaled_dispatch( + data, getattr(self, '_dispatch', None) + ) + except: # This should only happen if the module is buggy + # internal error, report as HTTP server error + self.send_response(500) + self.end_headers() + self.wfile.flush() + else: + # got a valid XML RPC response + self.send_response(200) + self.send_header("Content-type", "text/xml") + self.send_header("Content-length", str(len(response))) + self.end_headers() + self.wfile.write(response) + self.wfile.flush() + pass + return + + def log_request(self, code='-', size='-'): + """Selectively log an accepted request.""" + + if self.server.logRequests: + BaseHTTPServer.BaseHTTPRequestHandler.log_request(self, code, size) + + # # A simple server based on the forking version SSLServer. We fork cause # we want to change our uid/gid to that of the person on the other end. @@ -62,12 +151,17 @@ class MyServer(SSL.ForkingSSLServer, SimpleXMLRPCDispatcher): ctx.set_verify(SSL.verify_peer | SSL.verify_fail_if_no_peer_cert, 16) ctx.set_allow_unknown_ca(0) #ctx.set_info_callback() - + SimpleXMLRPCDispatcher.__init__(self) SSL.SSLServer.__init__(self, (ADDR, PORT), - SimpleXMLRPCRequestHandler, ctx) + MyXMLRPCRequestHandler, ctx) pass + ## + # Log a message to stdout, if in debug mode, otherwise write to syslog. + # + # @param msg The message to log. + # def logit(self, msg): if debug: print msg @@ -76,6 +170,36 @@ class MyServer(SSL.ForkingSSLServer, SimpleXMLRPCDispatcher): syslog.syslog(syslog.LOG_INFO, msg); pass return + + ## + # Updates PYTHONPATH and imports the 'emulabserver' module on its first + # invocation. The specified path must be in the ALLOWED_PATHS list and + # readable by the user, otherwise the request will fail. + # + # @param path The path from the POST request, should not include "lib" on + # the end (e.g. "/usr/testbed") + # + def set_path(self, path): + if not self.emulabserver: + if path not in ALLOWED_PATHS: + self.logit("Disallowed path: %s" % path) + raise Exception("Path not allowed: %s" % path) + path = os.path.join(path, "lib") + if not os.access(path, os.X_OK): + self.logit("Path not accessible by user: %s" % path) + raise Exception("Permission denied: %s" % path) + + print `path` + print `sys.path` + + if path not in sys.path: + sys.path.append(path) + pass + from emulabserver import EmulabServer + + self.emulabserver = EmulabServer(readonly=0) + pass + return # # There might be a better arrangement, but the problem is that we @@ -221,7 +345,10 @@ class MyServer(SSL.ForkingSSLServer, SimpleXMLRPCDispatcher): # This must never return, hence os._exit()! try: self.fliptouser(request, client_address); - self.emulabserver = EmulabServer(readonly=0) + + # Remove the old path since the user can request a different + # one. + sys.path.remove(TBPATH) self.finish_request(request, client_address) self.close_request(request) self.logit("request finished"); @@ -249,10 +376,10 @@ if len(sys.argv) > 1 and sys.argv[1] == "-d": # if not debug: # - # Connect to syslog. + # Connect to syslog. # syslog.openlog("sslxmlrpc", syslog.LOG_PID, - eval("syslog.LOG_" + string.upper(LOGFACIL))) + getattr(syslog, "LOG_" + string.upper(LOGFACIL))) syslog.syslog(syslog.LOG_INFO, "SSL XMLRPC server starting up"); # -- GitLab