mirror of
https://gitlab.com/fabinfra/fabaccess/bffh.git
synced 2024-11-22 06:47:56 +01:00
Showcase version commit
This commit is contained in:
parent
796e957b27
commit
9c4144ac66
@ -1,5 +1,5 @@
|
|||||||
[package]
|
[package]
|
||||||
name = "bffh"
|
name = "diflouroborane"
|
||||||
version = "0.1.0"
|
version = "0.1.0"
|
||||||
authors = ["Gregor Reitzenstein <me@dequbed.space>"]
|
authors = ["Gregor Reitzenstein <me@dequbed.space>"]
|
||||||
edition = "2018"
|
edition = "2018"
|
||||||
|
@ -5,37 +5,50 @@ use slog::Logger;
|
|||||||
|
|
||||||
use casbin::prelude::*;
|
use casbin::prelude::*;
|
||||||
|
|
||||||
use super::config::Config;
|
|
||||||
|
|
||||||
use futures_signals::signal::Mutable;
|
use futures_signals::signal::Mutable;
|
||||||
|
|
||||||
use crate::api::api;
|
use crate::api::api;
|
||||||
|
use crate::config::Config;
|
||||||
use crate::auth::Authentication;
|
use crate::auth::Authentication;
|
||||||
use crate::error::Result;
|
use crate::error::Result;
|
||||||
|
|
||||||
|
use std::rc::Rc;
|
||||||
|
use async_std::sync::{Arc, RwLock};
|
||||||
|
|
||||||
|
use std::ops::Deref;
|
||||||
|
|
||||||
|
pub struct PermissionsProvider {
|
||||||
|
log: Logger,
|
||||||
|
pdb: Enforcer,
|
||||||
|
}
|
||||||
|
|
||||||
|
impl PermissionsProvider {
|
||||||
|
pub fn new(log: Logger, pdb: Enforcer) -> Self {
|
||||||
|
Self { log, pdb }
|
||||||
|
}
|
||||||
|
|
||||||
|
pub fn enforce(&self, actor: &str, object: &str, action: &str) -> Result<bool> {
|
||||||
|
let b = self.pdb.enforce(vec![actor, object, action])?;
|
||||||
|
Ok(b)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
#[derive(Clone)]
|
#[derive(Clone)]
|
||||||
pub struct Permissions {
|
pub struct Permissions {
|
||||||
log: Logger,
|
inner: Arc<RwLock<PermissionsProvider>>,
|
||||||
pdb: Mutable<Enforcer>,
|
auth: Rc<Authentication>,
|
||||||
auth: Authentication,
|
|
||||||
}
|
}
|
||||||
|
|
||||||
impl Permissions {
|
impl Permissions {
|
||||||
pub fn new(log: Logger, pdb: Mutable<Enforcer>, auth: Authentication) -> Self {
|
pub fn new(inner: Arc<RwLock<PermissionsProvider>>, auth: Rc<Authentication>) -> Self {
|
||||||
Self { log, pdb, auth }
|
Self { inner, auth }
|
||||||
}
|
}
|
||||||
|
|
||||||
pub fn enforce(&self, object: &str, action: &str) -> bool {
|
pub async fn enforce(&self, object: &str, action: &str) -> Result<bool> {
|
||||||
if let Some(actor) = self.auth.get_authzid() {
|
if let Some(actor) = self.auth.state.read().await.deref() {
|
||||||
trace!(self.log, "Checking permission {} for {} on {}", action, actor, object);
|
self.inner.read().await.enforce(&actor, object, action)
|
||||||
let r = self.pdb.lock_ref().enforce(vec![&actor,object,action]).unwrap();
|
|
||||||
if !r {
|
|
||||||
info!(self.log, "Failed permission {} for {} on {}", action, actor, object);
|
|
||||||
}
|
|
||||||
return r;
|
|
||||||
} else {
|
} else {
|
||||||
info!(self.log, "Attempted anonymous access: {} on {}", action, object);
|
Ok(false)
|
||||||
false
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@ -45,11 +58,11 @@ impl api::permissions::Server for Permissions {
|
|||||||
}
|
}
|
||||||
|
|
||||||
/// This line documents init
|
/// This line documents init
|
||||||
pub async fn init(config: &Config) -> std::result::Result<Enforcer, Box<dyn std::error::Error>> {
|
pub async fn init(log: Logger, config: &Config) -> std::result::Result<PermissionsProvider, Box<dyn std::error::Error>> {
|
||||||
let model = Model::from_file(config.access.model.clone()).await?;
|
let model = Model::from_file(config.access.model.clone()).await?;
|
||||||
let adapter = Box::new(FileAdapter::new(config.access.policy.clone()));
|
let adapter = Box::new(FileAdapter::new(config.access.policy.clone()));
|
||||||
|
|
||||||
let e = Enforcer::new(model, adapter).await?;
|
let e = Enforcer::new(model, adapter).await?;
|
||||||
|
|
||||||
return Ok(e);
|
return Ok(PermissionsProvider::new(log, e));
|
||||||
}
|
}
|
||||||
|
86
src/api.rs
86
src/api.rs
@ -7,13 +7,20 @@ pub mod api {
|
|||||||
use std::default::Default;
|
use std::default::Default;
|
||||||
use async_std::net::TcpStream;
|
use async_std::net::TcpStream;
|
||||||
|
|
||||||
|
use futures::task::Spawn;
|
||||||
|
use futures::FutureExt;
|
||||||
use futures_signals::signal::Mutable;
|
use futures_signals::signal::Mutable;
|
||||||
use casbin::Enforcer;
|
use casbin::Enforcer;
|
||||||
use casbin::MgmtApi;
|
use casbin::MgmtApi;
|
||||||
|
|
||||||
use crate::machine::Machines;
|
use slog::Logger;
|
||||||
use crate::auth::Authentication;
|
|
||||||
use crate::access::Permissions;
|
use std::rc::Rc;
|
||||||
|
use async_std::sync::{Arc, RwLock};
|
||||||
|
|
||||||
|
use crate::machine::{MachinesProvider, Machines};
|
||||||
|
use crate::auth::{AuthenticationProvider, Authentication};
|
||||||
|
use crate::access::{PermissionsProvider, Permissions};
|
||||||
|
|
||||||
use capnp::{Error};
|
use capnp::{Error};
|
||||||
use capnp::capability::Promise;
|
use capnp::capability::Promise;
|
||||||
@ -21,35 +28,76 @@ use capnp_rpc::RpcSystem;
|
|||||||
use capnp_rpc::twoparty::VatNetwork;
|
use capnp_rpc::twoparty::VatNetwork;
|
||||||
use capnp_rpc::rpc_twoparty_capnp::Side;
|
use capnp_rpc::rpc_twoparty_capnp::Side;
|
||||||
|
|
||||||
|
use std::ops::Deref;
|
||||||
|
|
||||||
use api::diflouroborane;
|
use api::diflouroborane;
|
||||||
|
|
||||||
pub fn init() {
|
#[derive(Clone)]
|
||||||
|
pub struct API<S> {
|
||||||
|
auth: Arc<RwLock<AuthenticationProvider>>,
|
||||||
|
perm: Arc<RwLock<PermissionsProvider>>,
|
||||||
|
mach: Arc<RwLock<MachinesProvider>>,
|
||||||
|
|
||||||
|
spawner: S,
|
||||||
|
}
|
||||||
|
impl<S: Spawn> API<S> {
|
||||||
|
pub fn new(auth: AuthenticationProvider,
|
||||||
|
perm: PermissionsProvider,
|
||||||
|
mach: MachinesProvider,
|
||||||
|
spawner: S)
|
||||||
|
-> Self
|
||||||
|
{
|
||||||
|
let auth = Arc::new(RwLock::new(auth));
|
||||||
|
let perm = Arc::new(RwLock::new(perm));
|
||||||
|
let mach = Arc::new(RwLock::new(mach));
|
||||||
|
|
||||||
|
Self { auth, perm, mach, spawner }
|
||||||
|
}
|
||||||
|
|
||||||
|
pub fn into_connection(self) -> Bootstrap {
|
||||||
|
let auth = Rc::new(Authentication::new(self.auth));
|
||||||
|
let perm = Rc::new(Permissions::new(self.perm, auth.clone()));
|
||||||
|
let mach = Machines::new(self.mach, perm.clone());
|
||||||
|
Bootstrap {
|
||||||
|
auth: auth,
|
||||||
|
perm: perm,
|
||||||
|
mach: mach,
|
||||||
|
}
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
pub async fn process_socket(auth: Authentication, perm: Permissions, mach: Machines, socket: TcpStream)
|
pub async fn handle_connection<S: Spawn>(api: API<S>, log: Logger, socket: TcpStream) -> Result<(), Error> {
|
||||||
-> Result<(), Error>
|
info!(log, "A new connection");
|
||||||
{
|
let client = api.into_connection();
|
||||||
let api = Api { auth, perm, mach };
|
let a = api::diflouroborane::ToClient::new(client).into_client::<capnp_rpc::Server>();
|
||||||
let a = api::diflouroborane::ToClient::new(api).into_client::<capnp_rpc::Server>();
|
|
||||||
let netw = VatNetwork::new(socket.clone(), socket, Side::Server, Default::default());
|
let netw = VatNetwork::new(socket.clone(), socket, Side::Server, Default::default());
|
||||||
let rpc = RpcSystem::new(Box::new(netw), Some(a.clone().client));
|
|
||||||
rpc.await
|
let rpc = RpcSystem::new(Box::new(netw), Some(a.clone().client)).map(|_| ());
|
||||||
|
|
||||||
|
rpc.await;
|
||||||
|
|
||||||
|
Ok(())
|
||||||
}
|
}
|
||||||
|
|
||||||
struct Api {
|
/// Bootstrap capability of the Diflouroborane API
|
||||||
auth: Authentication,
|
///
|
||||||
perm: Permissions,
|
/// This is the starting point for any client connecting
|
||||||
|
#[derive(Clone)]
|
||||||
|
pub struct Bootstrap {
|
||||||
|
auth: Rc<Authentication>,
|
||||||
|
perm: Rc<Permissions>,
|
||||||
mach: Machines,
|
mach: Machines,
|
||||||
}
|
}
|
||||||
|
|
||||||
impl diflouroborane::Server for Api {
|
impl diflouroborane::Server for Bootstrap {
|
||||||
fn authentication(&mut self,
|
fn authentication(&mut self,
|
||||||
_params: diflouroborane::AuthenticationParams,
|
_params: diflouroborane::AuthenticationParams,
|
||||||
mut results: diflouroborane::AuthenticationResults)
|
mut results: diflouroborane::AuthenticationResults)
|
||||||
-> Promise<(), Error>
|
-> Promise<(), Error>
|
||||||
{
|
{
|
||||||
let mut b = results.get();
|
let mut b = results.get();
|
||||||
let auth = api::authentication::ToClient::new(self.auth.clone()).into_client::<capnp_rpc::Server>();
|
let auth = api::authentication::ToClient::new(self.auth.deref().clone()).into_client::<capnp_rpc::Server>();
|
||||||
b.set_auth(auth);
|
b.set_auth(auth);
|
||||||
Promise::ok(())
|
Promise::ok(())
|
||||||
}
|
}
|
||||||
@ -59,9 +107,9 @@ impl diflouroborane::Server for Api {
|
|||||||
mut results: diflouroborane::PermissionsResults)
|
mut results: diflouroborane::PermissionsResults)
|
||||||
-> Promise<(), Error>
|
-> Promise<(), Error>
|
||||||
{
|
{
|
||||||
let mut b = results.get();
|
//let mut b = results.get();
|
||||||
let perm = api::permissions::ToClient::new(self.perm.clone()).into_client::<capnp_rpc::Server>();
|
//let perm = api::permissions::ToClient::new(self.perm).into_client::<capnp_rpc::Server>();
|
||||||
b.set_perm(perm);
|
//b.set_perm(perm);
|
||||||
Promise::ok(())
|
Promise::ok(())
|
||||||
}
|
}
|
||||||
|
|
||||||
|
74
src/auth.rs
74
src/auth.rs
@ -11,6 +11,9 @@ use std::fs::File;
|
|||||||
use std::io::{Read, Write};
|
use std::io::{Read, Write};
|
||||||
use std::ops::Deref;
|
use std::ops::Deref;
|
||||||
|
|
||||||
|
use async_std::sync::{Arc, RwLock};
|
||||||
|
use capnp::capability::Promise;
|
||||||
|
|
||||||
use futures_signals::signal::Mutable;
|
use futures_signals::signal::Mutable;
|
||||||
use casbin::{Enforcer, Model, FileAdapter};
|
use casbin::{Enforcer, Model, FileAdapter};
|
||||||
|
|
||||||
@ -133,24 +136,16 @@ impl AuthenticationProvider {
|
|||||||
|
|
||||||
#[derive(Clone)]
|
#[derive(Clone)]
|
||||||
pub struct Authentication {
|
pub struct Authentication {
|
||||||
state: Mutable<Option<String>>,
|
pub state: Arc<RwLock<Option<String>>>,
|
||||||
provider: Mutable<AuthenticationProvider>,
|
provider: Arc<RwLock<AuthenticationProvider>>,
|
||||||
}
|
}
|
||||||
impl Authentication {
|
impl Authentication {
|
||||||
pub fn new(provider: Mutable<AuthenticationProvider>) -> Self {
|
pub fn new(provider: Arc<RwLock<AuthenticationProvider>>) -> Self {
|
||||||
Self {
|
Self {
|
||||||
state: Mutable::new(None),
|
state: Arc::new(RwLock::new(None)),
|
||||||
provider: provider,
|
provider: provider,
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
pub fn get_authzid(&self) -> Option<String> {
|
|
||||||
self.state.lock_ref().clone()
|
|
||||||
}
|
|
||||||
|
|
||||||
pub fn mechs(&self) -> Vec<&'static str> {
|
|
||||||
self.provider.lock_ref().mechs()
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
@ -162,15 +157,19 @@ impl api::authentication::Server for Authentication {
|
|||||||
mut results: api::authentication::AvailableMechanismsResults)
|
mut results: api::authentication::AvailableMechanismsResults)
|
||||||
-> ::capnp::capability::Promise<(), ::capnp::Error>
|
-> ::capnp::capability::Promise<(), ::capnp::Error>
|
||||||
{
|
{
|
||||||
let m = self.mechs();
|
let p = self.provider.clone();
|
||||||
|
let f = async move {
|
||||||
|
let m = p.read().await.mechs();
|
||||||
let mut b = results.get()
|
let mut b = results.get()
|
||||||
.init_mechanisms(m.len() as u32);
|
.init_mechanisms(m.len() as u32);
|
||||||
for (i, mech) in m.iter().enumerate() {
|
for (i, mech) in m.iter().enumerate() {
|
||||||
let mut bldr = b.reborrow();
|
let mut bldr = b.reborrow();
|
||||||
bldr.set(i as u32, mech);
|
bldr.set(i as u32, mech);
|
||||||
}
|
}
|
||||||
|
Ok(())
|
||||||
|
};
|
||||||
|
|
||||||
::capnp::capability::Promise::ok(())
|
::capnp::capability::Promise::from_future(f)
|
||||||
}
|
}
|
||||||
|
|
||||||
fn initialize_authentication(&mut self,
|
fn initialize_authentication(&mut self,
|
||||||
@ -178,20 +177,24 @@ impl api::authentication::Server for Authentication {
|
|||||||
mut results: api::authentication::InitializeAuthenticationResults)
|
mut results: api::authentication::InitializeAuthenticationResults)
|
||||||
-> ::capnp::capability::Promise<(), ::capnp::Error>
|
-> ::capnp::capability::Promise<(), ::capnp::Error>
|
||||||
{
|
{
|
||||||
let params = pry!(params.get());
|
let prov = self.provider.clone();
|
||||||
let mechanism = pry!(params.get_mechanism());
|
let stat = self.state.clone();
|
||||||
|
|
||||||
|
Promise::from_future(async move {
|
||||||
|
let params = params.get()?;
|
||||||
|
let mechanism = params.get_mechanism()?;
|
||||||
|
|
||||||
match mechanism {
|
match mechanism {
|
||||||
"PLAIN" => {
|
"PLAIN" => {
|
||||||
use api::authentication::maybe_data::Which;
|
use api::authentication::maybe_data::Which;
|
||||||
|
|
||||||
let data = pry!(params.get_initial_data());
|
let data = params.get_initial_data()?;
|
||||||
if let Ok(Which::Some(data)) = data.which() {
|
if let Ok(Which::Some(data)) = data.which() {
|
||||||
let data = pry!(data);
|
let data = data?;
|
||||||
if let Ok((b, name)) = self.provider.lock_ref().plain.step(data) {
|
if let Ok((b, name)) = prov.read().await.plain.step(data) {
|
||||||
|
// If login was successful set the authzid
|
||||||
// If login was successful, also set the current authzid
|
|
||||||
if b {
|
if b {
|
||||||
self.state.lock_mut().replace(name.to_string());
|
stat.write().await.replace(name.to_string());
|
||||||
}
|
}
|
||||||
|
|
||||||
let outcome = Outcome::value(b);
|
let outcome = Outcome::value(b);
|
||||||
@ -201,19 +204,20 @@ impl api::authentication::Server for Authentication {
|
|||||||
.set_outcome(api::authentication::outcome::ToClient::new(outcome)
|
.set_outcome(api::authentication::outcome::ToClient::new(outcome)
|
||||||
.into_client::<::capnp_rpc::Server>());
|
.into_client::<::capnp_rpc::Server>());
|
||||||
}
|
}
|
||||||
::capnp::capability::Promise::ok(())
|
Ok(())
|
||||||
} else {
|
} else {
|
||||||
return
|
Err(::capnp::Error::unimplemented(
|
||||||
::capnp::capability::Promise::err(::capnp::Error::unimplemented(
|
"SASL PLAIN requires initial data set".to_string()))
|
||||||
"SASL PLAIN requires initial data set".to_string()));
|
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
m => {
|
m => {
|
||||||
return
|
Err(::capnp::Error::unimplemented(
|
||||||
::capnp::capability::Promise::err(::capnp::Error::unimplemented(
|
format!("SASL Mechanism {} is not implemented", m)
|
||||||
format!("SASL Mechanism {} is not implemented", m)));
|
))
|
||||||
}
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
})
|
||||||
}
|
}
|
||||||
|
|
||||||
fn get_authzid(&mut self,
|
fn get_authzid(&mut self,
|
||||||
@ -221,12 +225,18 @@ impl api::authentication::Server for Authentication {
|
|||||||
mut results: api::authentication::GetAuthzidResults)
|
mut results: api::authentication::GetAuthzidResults)
|
||||||
-> ::capnp::capability::Promise<(), ::capnp::Error>
|
-> ::capnp::capability::Promise<(), ::capnp::Error>
|
||||||
{
|
{
|
||||||
if let Some(zid) = self.state.lock_ref().deref() {
|
let state = self.state.clone();
|
||||||
results.get().set_authzid(zid);
|
let f = async move {
|
||||||
|
if let Some(zid) = state.read().await.deref() {
|
||||||
|
results.get().set_authzid(&zid);
|
||||||
} else {
|
} else {
|
||||||
results.get().set_authzid("");
|
results.get().set_authzid("");
|
||||||
}
|
}
|
||||||
::capnp::capability::Promise::ok(())
|
|
||||||
|
Ok(())
|
||||||
|
};
|
||||||
|
|
||||||
|
Promise::from_future(f)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -1,25 +1,28 @@
|
|||||||
use std::str::FromStr;
|
use std::str::FromStr;
|
||||||
use std::path::PathBuf;
|
use std::path::{Path, PathBuf};
|
||||||
use serde::{Serialize, Deserialize};
|
use serde::{Serialize, Deserialize};
|
||||||
|
use std::io::Read;
|
||||||
|
use std::fs::File;
|
||||||
|
|
||||||
use crate::error::Result;
|
use crate::error::Result;
|
||||||
|
|
||||||
pub fn read() -> Result<Config> {
|
use std::default::Default;
|
||||||
Ok(Config {
|
|
||||||
machinedb: PathBuf::from_str("/tmp/machines.db").unwrap(),
|
pub fn read(path: &Path) -> Result<Config> {
|
||||||
access: Access {
|
let mut fp = File::open(path)?;
|
||||||
model: PathBuf::from_str("/tmp/model.conf").unwrap(),
|
let mut contents = String::new();
|
||||||
policy: PathBuf::from_str("/tmp/policy.csv").unwrap(),
|
fp.read_to_string(&mut contents)?;
|
||||||
},
|
|
||||||
passdb: PathBuf::from_str("/tmp/passwd.db").unwrap(),
|
let config = toml::from_str(&contents)?;
|
||||||
})
|
Ok(config)
|
||||||
}
|
}
|
||||||
|
|
||||||
#[derive(Debug, Clone, Serialize, Deserialize)]
|
#[derive(Debug, Clone, Serialize, Deserialize)]
|
||||||
pub struct Config {
|
pub struct Config {
|
||||||
pub(crate) access: Access,
|
|
||||||
pub machinedb: PathBuf,
|
pub machinedb: PathBuf,
|
||||||
pub passdb: PathBuf,
|
pub passdb: PathBuf,
|
||||||
|
pub(crate) access: Access,
|
||||||
|
pub listen: Box<[Listen]>,
|
||||||
}
|
}
|
||||||
|
|
||||||
#[derive(Debug, Clone, Serialize, Deserialize)]
|
#[derive(Debug, Clone, Serialize, Deserialize)]
|
||||||
@ -27,3 +30,33 @@ pub struct Access {
|
|||||||
pub(crate) model: PathBuf,
|
pub(crate) model: PathBuf,
|
||||||
pub(crate) policy: PathBuf
|
pub(crate) policy: PathBuf
|
||||||
}
|
}
|
||||||
|
|
||||||
|
#[derive(Debug, Clone, Serialize, Deserialize)]
|
||||||
|
pub struct Listen {
|
||||||
|
pub address: String,
|
||||||
|
pub port: Option<u16>,
|
||||||
|
}
|
||||||
|
|
||||||
|
impl Default for Config {
|
||||||
|
fn default() -> Self {
|
||||||
|
Config {
|
||||||
|
machinedb: PathBuf::from_str("/tmp/machines.db").unwrap(),
|
||||||
|
access: Access {
|
||||||
|
model: PathBuf::from_str("/tmp/model.conf").unwrap(),
|
||||||
|
policy: PathBuf::from_str("/tmp/policy.csv").unwrap(),
|
||||||
|
},
|
||||||
|
passdb: PathBuf::from_str("/tmp/passwd.db").unwrap(),
|
||||||
|
listen: Box::new([Listen {
|
||||||
|
address: "127.0.0.1".to_string(),
|
||||||
|
port: Some(DEFAULT_PORT)
|
||||||
|
},
|
||||||
|
Listen {
|
||||||
|
address: "::1".to_string(),
|
||||||
|
port: Some(DEFAULT_PORT)
|
||||||
|
}]),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// The default port in the non-assignable i.e. free-use area
|
||||||
|
pub const DEFAULT_PORT: u16 = 59661;
|
||||||
|
@ -9,6 +9,7 @@ pub enum Error {
|
|||||||
TomlSer(toml::ser::Error),
|
TomlSer(toml::ser::Error),
|
||||||
SASL(SASLError),
|
SASL(SASLError),
|
||||||
IO(io::Error),
|
IO(io::Error),
|
||||||
|
Boxed(Box<dyn std::error::Error>),
|
||||||
}
|
}
|
||||||
|
|
||||||
impl From<SASLError> for Error {
|
impl From<SASLError> for Error {
|
||||||
@ -35,4 +36,10 @@ impl From<toml::ser::Error> for Error {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
impl From<Box<dyn std::error::Error>> for Error {
|
||||||
|
fn from(e: Box<dyn std::error::Error>) -> Error {
|
||||||
|
Error::Boxed(e)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
pub type Result<T> = std::result::Result<T, Error>;
|
pub type Result<T> = std::result::Result<T, Error>;
|
||||||
|
@ -1,8 +1,9 @@
|
|||||||
use slog::{Drain, Logger};
|
use slog::{Drain, Logger};
|
||||||
use slog_async;
|
use slog_async;
|
||||||
use slog_term::{TermDecorator, FullFormat};
|
use slog_term::{TermDecorator, FullFormat};
|
||||||
|
use crate::config::Config;
|
||||||
|
|
||||||
pub fn init() -> Logger {
|
pub fn init(_config: &Config) -> Logger {
|
||||||
let decorator = TermDecorator::new().build();
|
let decorator = TermDecorator::new().build();
|
||||||
let drain = FullFormat::new(decorator).build().fuse();
|
let drain = FullFormat::new(decorator).build().fuse();
|
||||||
let drain = slog_async::Async::new(drain).build().fuse();
|
let drain = slog_async::Async::new(drain).build().fuse();
|
||||||
|
200
src/machine.rs
200
src/machine.rs
@ -15,6 +15,9 @@ use crate::config::Config;
|
|||||||
use crate::api::api;
|
use crate::api::api;
|
||||||
use crate::access::Permissions;
|
use crate::access::Permissions;
|
||||||
|
|
||||||
|
use std::rc::Rc;
|
||||||
|
use async_std::sync::{Arc, RwLock};
|
||||||
|
|
||||||
use capnp::capability::Promise;
|
use capnp::capability::Promise;
|
||||||
use capnp::Error;
|
use capnp::Error;
|
||||||
use capnp_rpc::Server;
|
use capnp_rpc::Server;
|
||||||
@ -32,16 +35,64 @@ pub enum Status {
|
|||||||
Blocked,
|
Blocked,
|
||||||
}
|
}
|
||||||
|
|
||||||
#[derive(Clone)]
|
pub struct MachinesProvider {
|
||||||
pub struct Machines {
|
|
||||||
log: Logger,
|
log: Logger,
|
||||||
mdb: Mutable<MachineDB>,
|
mdb: MachineDB,
|
||||||
perm: Permissions
|
|
||||||
}
|
}
|
||||||
|
|
||||||
|
impl MachinesProvider {
|
||||||
|
pub fn new(log: Logger, mdb: MachineDB) -> Self {
|
||||||
|
Self { log, mdb }
|
||||||
|
}
|
||||||
|
|
||||||
|
pub fn use_(&mut self, uuid: &Uuid) -> std::result::Result<(), capnp::Error> {
|
||||||
|
if let Some(m) = self.mdb.get_mut(uuid) {
|
||||||
|
match m.status {
|
||||||
|
Status::Free => {
|
||||||
|
trace!(self.log, "Granted use on machine {}", uuid);
|
||||||
|
|
||||||
|
m.status = Status::Occupied;
|
||||||
|
|
||||||
|
Ok(())
|
||||||
|
},
|
||||||
|
Status::Occupied => {
|
||||||
|
info!(self.log, "Attempted use on an occupied machine {}", uuid);
|
||||||
|
Err(Error::failed("Machine is occupied".to_string()))
|
||||||
|
},
|
||||||
|
Status::Blocked => {
|
||||||
|
info!(self.log, "Attempted use on a blocked machine {}", uuid);
|
||||||
|
Err(Error::failed("Machine is blocked".to_string()))
|
||||||
|
}
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
info!(self.log, "Attempted use on invalid machine {}", uuid);
|
||||||
|
Err(Error::failed("No such machine".to_string()))
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
pub fn give_back(&mut self, uuid: &Uuid) -> std::result::Result<(), capnp::Error> {
|
||||||
|
if let Some(m) = self.mdb.get_mut(uuid) {
|
||||||
|
m.status = Status::Free;
|
||||||
|
} else {
|
||||||
|
warn!(self.log, "A giveback was issued for a unknown machine {}", uuid);
|
||||||
|
}
|
||||||
|
|
||||||
|
Ok(())
|
||||||
|
}
|
||||||
|
|
||||||
|
pub fn get_perm_req(&self, uuid: &Uuid) -> Option<String> {
|
||||||
|
self.mdb.get(uuid).map(|m| m.perm.clone())
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
#[derive(Clone)]
|
||||||
|
pub struct Machines {
|
||||||
|
inner: Arc<RwLock<MachinesProvider>>,
|
||||||
|
perm: Rc<Permissions>,
|
||||||
|
}
|
||||||
impl Machines {
|
impl Machines {
|
||||||
pub fn new(log: Logger, mdb: Mutable<MachineDB>, perm: Permissions) -> Self {
|
pub fn new(inner: Arc<RwLock<MachinesProvider>>, perm: Rc<Permissions>) -> Self {
|
||||||
Self { log, mdb, perm }
|
Self { inner, perm }
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
impl api::machines::Server for Machines {
|
impl api::machines::Server for Machines {
|
||||||
@ -52,79 +103,95 @@ impl api::machines::Server for Machines {
|
|||||||
{
|
{
|
||||||
let params = pry!(params.get());
|
let params = pry!(params.get());
|
||||||
let uuid_s = pry!(params.get_uuid());
|
let uuid_s = pry!(params.get_uuid());
|
||||||
|
|
||||||
let uuid = uuid_from_api(uuid_s);
|
let uuid = uuid_from_api(uuid_s);
|
||||||
|
|
||||||
let db = self.mdb.lock_ref();
|
// We need to copy the Arc here because we don't have access to it from within the closure
|
||||||
|
// witout moving it out of self.
|
||||||
|
let i = self.inner.clone();
|
||||||
|
let p = self.perm.clone();
|
||||||
|
|
||||||
if let Some(m) = db.get(&uuid) {
|
let f = async move {
|
||||||
let manager = MachineManager::new(uuid, self.mdb.clone());
|
// We only need a read lock at first there's no reason to aquire a write lock.
|
||||||
|
let i_lock = i.read().await;
|
||||||
|
|
||||||
if self.perm.enforce(&m.perm, "manage") {
|
if let Some(ps) = i_lock.get_perm_req(&uuid) {
|
||||||
|
// drop the lock as soon as possible to prevent locking as much as possible
|
||||||
|
drop(i_lock);
|
||||||
|
if let Ok(true) = p.enforce(&ps, "manage").await {
|
||||||
|
// We're here and have not returned an error yet - that means we're free to
|
||||||
|
// send a successful manage back.
|
||||||
let mut b = results.get();
|
let mut b = results.get();
|
||||||
let mngr = api::machines::manage::ToClient::new(manager).into_client::<Server>();
|
|
||||||
b.set_manage(mngr);
|
// Magic incantation to get a capability to send
|
||||||
trace!(self.log, "Granted manage on machine {}", uuid);
|
// Also since we move i in here we at this point *must* have dropped
|
||||||
Promise::ok(())
|
// all locks we may still have on it.
|
||||||
} else {
|
b.set_manage(api::machines::give_back::ToClient::new(
|
||||||
Promise::err(Error::failed("Permission denied".to_string()))
|
MachineManager::new(i, uuid)).into_client::<Server>());
|
||||||
}
|
}
|
||||||
} else {
|
|
||||||
info!(self.log, "Attempted manage on invalid machine {}", uuid);
|
|
||||||
Promise::err(Error::failed("No such machine".to_string()))
|
|
||||||
}
|
}
|
||||||
|
Ok(())
|
||||||
|
};
|
||||||
|
|
||||||
|
Promise::from_future(f)
|
||||||
}
|
}
|
||||||
|
|
||||||
fn use_(&mut self,
|
fn use_(&mut self,
|
||||||
params: api::machines::UseParams,
|
params: api::machines::UseParams,
|
||||||
mut results: api::machines::UseResults)
|
mut results: api::machines::UseResults)
|
||||||
-> Promise<(), Error>
|
-> Promise<(), capnp::Error>
|
||||||
{
|
{
|
||||||
let params = pry!(params.get());
|
let params = pry!(params.get());
|
||||||
let uuid_s = pry!(params.get_uuid());
|
let uuid_s = pry!(params.get_uuid());
|
||||||
let uuid = uuid_from_api(uuid_s);
|
let uuid = uuid_from_api(uuid_s);
|
||||||
|
|
||||||
let mdb = self.mdb.lock_ref();
|
// We need to copy the Arc here because we don't have access to it from within the closure
|
||||||
if let Some(m) = mdb.get(&uuid) {
|
// witout moving it out of self.
|
||||||
match m.status {
|
let i = self.inner.clone();
|
||||||
Status::Free => {
|
let p = self.perm.clone();
|
||||||
trace!(self.log, "Granted use on machine {}", uuid);
|
|
||||||
|
|
||||||
|
let f = async move {
|
||||||
|
// We only need a read lock at first there's no reason to aquire a write lock.
|
||||||
|
let i_lock = i.read().await;
|
||||||
|
|
||||||
|
if let Some(ps) = i_lock.get_perm_req(&uuid) {
|
||||||
|
// drop the lock as soon as possible to prevent locking as much as possible
|
||||||
|
drop(i_lock);
|
||||||
|
if let Ok(true) = p.enforce(&ps, "write").await {
|
||||||
|
{
|
||||||
|
// If use_() returns an error that is our error. If it doesn't that means we can use
|
||||||
|
// the machine
|
||||||
|
// Using a subscope to again make the time the lock is valid as short as
|
||||||
|
// possible. Less locking == more good
|
||||||
|
let mut i_lock = i.write().await;
|
||||||
|
i_lock.use_(&uuid)?;
|
||||||
|
}
|
||||||
|
|
||||||
|
// We're here and have not returned an error yet - that means we're free to
|
||||||
|
// send a successful use back.
|
||||||
let mut b = results.get();
|
let mut b = results.get();
|
||||||
|
|
||||||
let gb = api::machines::give_back::ToClient::new(
|
// Magic incantation to get a capability to send
|
||||||
GiveBack::new(self.log.new(o!()), uuid, self.mdb.clone())
|
// Also since we move i in here we at this point *must* have dropped
|
||||||
).into_client::<Server>();
|
// all locks we may still have on it.
|
||||||
|
b.set_giveback(api::machines::give_back::ToClient::new(
|
||||||
|
GiveBack::new(i, uuid)).into_client::<Server>());
|
||||||
|
}
|
||||||
|
}
|
||||||
|
Ok(())
|
||||||
|
};
|
||||||
|
|
||||||
b.set_giveback(gb);
|
Promise::from_future(f)
|
||||||
|
|
||||||
Promise::ok(())
|
|
||||||
},
|
|
||||||
Status::Occupied => {
|
|
||||||
info!(self.log, "Attempted use on an occupied machine {}", uuid);
|
|
||||||
Promise::err(Error::failed("Machine is occupied".to_string()))
|
|
||||||
},
|
|
||||||
Status::Blocked => {
|
|
||||||
info!(self.log, "Attempted use on a blocked machine {}", uuid);
|
|
||||||
Promise::err(Error::failed("Machine is blocked".to_string()))
|
|
||||||
}
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
info!(self.log, "Attempted use on invalid machine {}", uuid);
|
|
||||||
Promise::err(Error::failed("No such machine".to_string()))
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
#[derive(Clone)]
|
||||||
pub struct GiveBack {
|
pub struct GiveBack {
|
||||||
log: Logger,
|
mdb: Arc<RwLock<MachinesProvider>>,
|
||||||
mdb: Mutable<MachineDB>,
|
|
||||||
uuid: Uuid,
|
uuid: Uuid,
|
||||||
}
|
}
|
||||||
impl GiveBack {
|
impl GiveBack {
|
||||||
pub fn new(log: Logger, uuid: Uuid, mdb: Mutable<MachineDB>) -> Self {
|
pub fn new(mdb: Arc<RwLock<MachinesProvider>>, uuid: Uuid) -> Self {
|
||||||
trace!(log, "Giveback initialized for {}", uuid);
|
Self { mdb, uuid }
|
||||||
Self { log, mdb, uuid }
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -134,19 +201,16 @@ impl api::machines::give_back::Server for GiveBack {
|
|||||||
_results: api::machines::give_back::GivebackResults)
|
_results: api::machines::give_back::GivebackResults)
|
||||||
-> Promise<(), Error>
|
-> Promise<(), Error>
|
||||||
{
|
{
|
||||||
trace!(log, "Returning {}...", uuid);
|
let mdb = self.mdb.clone();
|
||||||
let mut mdb = self.mdb.lock_mut();
|
let uuid = self.uuid.clone();
|
||||||
if let Some(m) = mdb.get_mut(&self.uuid) {
|
let f = async move {
|
||||||
m.status = Status::Free;
|
mdb.write().await.give_back(&uuid)
|
||||||
} else {
|
};
|
||||||
warn!(self.log, "A giveback was issued for a unknown machine {}", self.uuid);
|
|
||||||
}
|
|
||||||
|
|
||||||
Promise::ok(())
|
Promise::from_future(f)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// FIXME: Test this exhaustively!
|
|
||||||
fn uuid_from_api(uuid: api::u_u_i_d::Reader) -> Uuid {
|
fn uuid_from_api(uuid: api::u_u_i_d::Reader) -> Uuid {
|
||||||
let uuid0 = uuid.get_uuid0() as u128;
|
let uuid0 = uuid.get_uuid0() as u128;
|
||||||
let uuid1 = uuid.get_uuid1() as u128;
|
let uuid1 = uuid.get_uuid1() as u128;
|
||||||
@ -163,12 +227,12 @@ fn api_from_uuid(uuid: Uuid, mut wr: api::u_u_i_d::Builder) {
|
|||||||
|
|
||||||
#[derive(Clone)]
|
#[derive(Clone)]
|
||||||
pub struct MachineManager {
|
pub struct MachineManager {
|
||||||
mdb: Mutable<MachineDB>,
|
mdb: Arc<RwLock<MachinesProvider>>,
|
||||||
uuid: Uuid,
|
uuid: Uuid,
|
||||||
}
|
}
|
||||||
|
|
||||||
impl MachineManager {
|
impl MachineManager {
|
||||||
pub fn new(uuid: Uuid, mdb: Mutable<MachineDB>) -> Self {
|
pub fn new(uuid: Uuid, mdb: Arc<RwLock<MachineDB>>) -> Self {
|
||||||
Self { mdb, uuid }
|
Self { mdb, uuid }
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@ -222,16 +286,18 @@ impl Machine {
|
|||||||
|
|
||||||
pub type MachineDB = HashMap<Uuid, Machine>;
|
pub type MachineDB = HashMap<Uuid, Machine>;
|
||||||
|
|
||||||
pub fn init(config: &Config) -> Result<MachineDB> {
|
pub async fn init(log: Logger, config: &Config) -> Result<MachinesProvider> {
|
||||||
if config.machinedb.is_file() {
|
let mdb = if config.machinedb.is_file() {
|
||||||
let mut fp = File::open(&config.machinedb)?;
|
let mut fp = File::open(&config.machinedb)?;
|
||||||
let mut content = String::new();
|
let mut content = String::new();
|
||||||
fp.read_to_string(&mut content)?;
|
fp.read_to_string(&mut content)?;
|
||||||
let map = toml::from_str(&content)?;
|
let map = toml::from_str(&content)?;
|
||||||
return Ok(map);
|
map
|
||||||
} else {
|
} else {
|
||||||
return Ok(HashMap::new());
|
HashMap::new()
|
||||||
}
|
};
|
||||||
|
|
||||||
|
Ok(MachinesProvider::new(log, mdb))
|
||||||
}
|
}
|
||||||
|
|
||||||
pub fn save(config: &Config, mdb: &MachineDB) -> Result<()> {
|
pub fn save(config: &Config, mdb: &MachineDB) -> Result<()> {
|
||||||
|
24
src/main.rs
24
src/main.rs
@ -26,7 +26,7 @@ use futures::prelude::*;
|
|||||||
use futures::executor::{LocalPool, ThreadPool};
|
use futures::executor::{LocalPool, ThreadPool};
|
||||||
use futures::compat::Stream01CompatExt;
|
use futures::compat::Stream01CompatExt;
|
||||||
use futures::join;
|
use futures::join;
|
||||||
use futures::task::SpawnExt;
|
use futures::task::{SpawnExt, LocalSpawn};
|
||||||
|
|
||||||
use capnp_rpc::twoparty::{VatNetwork, VatId};
|
use capnp_rpc::twoparty::{VatNetwork, VatId};
|
||||||
use capnp_rpc::rpc_twoparty_capnp::Side;
|
use capnp_rpc::rpc_twoparty_capnp::Side;
|
||||||
@ -43,6 +43,8 @@ use std::sync::Arc;
|
|||||||
|
|
||||||
use error::Error;
|
use error::Error;
|
||||||
|
|
||||||
|
use api::API;
|
||||||
|
|
||||||
// Returning a `Result` from `main` allows us to use the `?` shorthand.
|
// Returning a `Result` from `main` allows us to use the `?` shorthand.
|
||||||
// In the case of an Err it will be printed using `fmt::Debug`
|
// In the case of an Err it will be printed using `fmt::Debug`
|
||||||
fn main() -> Result<(), Error> {
|
fn main() -> Result<(), Error> {
|
||||||
@ -106,7 +108,7 @@ fn main() -> Result<(), Error> {
|
|||||||
// Start loading the machine database, authentication system and permission system
|
// Start loading the machine database, authentication system and permission system
|
||||||
// All of those get a custom logger so the source of a log message can be better traced and
|
// All of those get a custom logger so the source of a log message can be better traced and
|
||||||
// filtered
|
// filtered
|
||||||
let machinedb_f = machine::init(log.new(o!("system" => "machinedb")), &config);
|
let machinedb_f = machine::init(log.new(o!("system" => "machines")), &config);
|
||||||
let permission_f = access::init(log.new(o!("system" => "permissions")), &config);
|
let permission_f = access::init(log.new(o!("system" => "permissions")), &config);
|
||||||
let authentication_f = auth::init(log.new(o!("system" => "authentication")), config.clone());
|
let authentication_f = auth::init(log.new(o!("system" => "authentication")), config.clone());
|
||||||
|
|
||||||
@ -132,14 +134,14 @@ fn main() -> Result<(), Error> {
|
|||||||
}
|
}
|
||||||
}).collect();
|
}).collect();
|
||||||
|
|
||||||
let (mdb, pdb, auth) = exec.run_until(async {
|
let (mach, pdb, auth) = exec.run_until(async {
|
||||||
// Rull all futures to completion in parallel.
|
// Rull all futures to completion in parallel.
|
||||||
// This will block until all three are done starting up.
|
// This will block until all three are done starting up.
|
||||||
join!(machinedb_f, permission_f, authentication_f)
|
join!(machinedb_f, permission_f, authentication_f)
|
||||||
});
|
});
|
||||||
|
|
||||||
// Error out if any of the subsystems failed to start.
|
// Error out if any of the subsystems failed to start.
|
||||||
let mdb = mdb?;
|
let mach = mach?;
|
||||||
let pdb = pdb.unwrap();
|
let pdb = pdb.unwrap();
|
||||||
let auth = auth?;
|
let auth = auth?;
|
||||||
|
|
||||||
@ -157,6 +159,12 @@ fn main() -> Result<(), Error> {
|
|||||||
info!(stop_log.new(o!("system" => "threadpool")), "Stopping Thread <{}>", i)
|
info!(stop_log.new(o!("system" => "threadpool")), "Stopping Thread <{}>", i)
|
||||||
})
|
})
|
||||||
.create()?;
|
.create()?;
|
||||||
|
let local_spawn = exec.spawner();
|
||||||
|
|
||||||
|
|
||||||
|
// The API has access to all subsystems it needs and the Threadpool as capability to spawn new
|
||||||
|
// tasks for CPU-intensive work
|
||||||
|
let api = API::new(auth, pdb, mach, pool);
|
||||||
|
|
||||||
// Closure inefficiencies. Lucky cloning an Arc is pretty cheap.
|
// Closure inefficiencies. Lucky cloning an Arc is pretty cheap.
|
||||||
let inner_log = log.clone();
|
let inner_log = log.clone();
|
||||||
@ -167,9 +175,6 @@ fn main() -> Result<(), Error> {
|
|||||||
let listeners = listeners_s.await;
|
let listeners = listeners_s.await;
|
||||||
let incoming = stream::select_all(listeners.iter().map(|l| l.incoming()));
|
let incoming = stream::select_all(listeners.iter().map(|l| l.incoming()));
|
||||||
|
|
||||||
// Spawner is a handle to the shared ThreadPool forwarded into each connection
|
|
||||||
let spawner = pool.clone();
|
|
||||||
|
|
||||||
// For each incoming connection start a new task to handle it and throw it on the thread
|
// For each incoming connection start a new task to handle it and throw it on the thread
|
||||||
// pool
|
// pool
|
||||||
let handle_sockets = incoming.map(|socket| {
|
let handle_sockets = incoming.map(|socket| {
|
||||||
@ -191,7 +196,7 @@ fn main() -> Result<(), Error> {
|
|||||||
|
|
||||||
// We handle the error using map_err, `let _` is used to quiet the compiler
|
// We handle the error using map_err, `let _` is used to quiet the compiler
|
||||||
// warning
|
// warning
|
||||||
let f = api::handle_connection(log.clone(), socket, spawner.clone())
|
let f = api::handle_connection(api.clone(), log.clone(), socket)
|
||||||
.map_err(move |e| {
|
.map_err(move |e| {
|
||||||
error!(log, "Error occured during protocol handling: {}", e);
|
error!(log, "Error occured during protocol handling: {}", e);
|
||||||
})
|
})
|
||||||
@ -199,7 +204,8 @@ fn main() -> Result<(), Error> {
|
|||||||
.map(|_| ());
|
.map(|_| ());
|
||||||
|
|
||||||
// In this case only the error is relevant since the Value is always ()
|
// In this case only the error is relevant since the Value is always ()
|
||||||
if let Err(e) = pool.spawn(f) {
|
// The future is Boxed to make it the `LocalFutureObj` that LocalSpawn expects
|
||||||
|
if let Err(e) = local_spawn.spawn_local_obj(Box::new(f).into()) {
|
||||||
error!(elog, "Failed to spawn connection handler: {}", e);
|
error!(elog, "Failed to spawn connection handler: {}", e);
|
||||||
// Failing to spawn a handler means we are most likely overloaded
|
// Failing to spawn a handler means we are most likely overloaded
|
||||||
return LoopResult::Overloaded;
|
return LoopResult::Overloaded;
|
||||||
|
Loading…
Reference in New Issue
Block a user