Jiri Simsa | 5293dcb | 2014-05-10 09:56:38 -0700 | [diff] [blame] | 1 | package impl |
| 2 | |
| 3 | import ( |
Bogdan Caprita | c87a914 | 2014-07-21 10:38:13 -0700 | [diff] [blame] | 4 | "fmt" |
Gautham | 82bb995 | 2014-08-28 14:11:51 -0700 | [diff] [blame] | 5 | "os" |
Robert Kroeger | acc778b | 2014-11-03 17:17:21 -0800 | [diff] [blame] | 6 | "path" |
Gautham | 82bb995 | 2014-08-28 14:11:51 -0700 | [diff] [blame] | 7 | "path/filepath" |
Bogdan Caprita | 4d67c04 | 2014-08-19 10:41:19 -0700 | [diff] [blame] | 8 | "strings" |
Gautham | 6fe61e5 | 2014-09-16 13:58:17 -0700 | [diff] [blame] | 9 | "sync" |
Jiri Simsa | 24e87aa | 2014-06-09 09:27:34 -0700 | [diff] [blame] | 10 | |
Jiri Simsa | 764efb7 | 2014-12-25 20:57:03 -0800 | [diff] [blame] | 11 | "v.io/core/veyron/security/agent" |
| 12 | "v.io/core/veyron/security/agent/keymgr" |
Robert Kroeger | e95ed6d | 2015-01-14 17:41:04 -0800 | [diff] [blame] | 13 | "v.io/core/veyron/security/flag" |
Jiri Simsa | 764efb7 | 2014-12-25 20:57:03 -0800 | [diff] [blame] | 14 | idevice "v.io/core/veyron/services/mgmt/device" |
| 15 | "v.io/core/veyron/services/mgmt/device/config" |
Robert Kroeger | ebfb62a | 2014-12-10 14:42:09 -0800 | [diff] [blame] | 16 | "v.io/core/veyron/services/mgmt/lib/acls" |
Jiri Simsa | 764efb7 | 2014-12-25 20:57:03 -0800 | [diff] [blame] | 17 | logsimpl "v.io/core/veyron/services/mgmt/logreader/impl" |
Jiri Simsa | 24e87aa | 2014-06-09 09:27:34 -0700 | [diff] [blame] | 18 | |
Jiri Simsa | 764efb7 | 2014-12-25 20:57:03 -0800 | [diff] [blame] | 19 | "v.io/core/veyron2/ipc" |
| 20 | "v.io/core/veyron2/naming" |
| 21 | "v.io/core/veyron2/security" |
| 22 | "v.io/core/veyron2/services/mgmt/device" |
| 23 | "v.io/core/veyron2/services/mgmt/pprof" |
| 24 | "v.io/core/veyron2/services/mgmt/stats" |
| 25 | "v.io/core/veyron2/services/security/access" |
| 26 | verror "v.io/core/veyron2/verror2" |
| 27 | "v.io/core/veyron2/vlog" |
Jiri Simsa | 5293dcb | 2014-05-10 09:56:38 -0700 | [diff] [blame] | 28 | ) |
| 29 | |
Bogdan Caprita | 2b21936 | 2014-12-09 17:03:33 -0800 | [diff] [blame] | 30 | // internalState wraps state shared between different device manager |
Bogdan Caprita | 4d67c04 | 2014-08-19 10:41:19 -0700 | [diff] [blame] | 31 | // invocations. |
| 32 | type internalState struct { |
Bogdan Caprita | 29a3b35 | 2015-01-16 16:28:49 -0800 | [diff] [blame] | 33 | callback *callbackState |
| 34 | updating *updatingState |
| 35 | securityAgent *securityAgentState |
| 36 | restartHandler func() |
Bogdan Caprita | 4d67c04 | 2014-08-19 10:41:19 -0700 | [diff] [blame] | 37 | } |
| 38 | |
Bogdan Caprita | 2b21936 | 2014-12-09 17:03:33 -0800 | [diff] [blame] | 39 | // dispatcher holds the state of the device manager dispatcher. |
Jiri Simsa | 5293dcb | 2014-05-10 09:56:38 -0700 | [diff] [blame] | 40 | type dispatcher struct { |
Bogdan Caprita | 4d67c04 | 2014-08-19 10:41:19 -0700 | [diff] [blame] | 41 | // internal holds the state that persists across RPC method invocations. |
Bogdan Caprita | c87a914 | 2014-07-21 10:38:13 -0700 | [diff] [blame] | 42 | internal *internalState |
Bogdan Caprita | 2b21936 | 2014-12-09 17:03:33 -0800 | [diff] [blame] | 43 | // config holds the device manager's (immutable) configuration state. |
Bogdan Caprita | 4d67c04 | 2014-08-19 10:41:19 -0700 | [diff] [blame] | 44 | config *config.State |
Gautham | 6fe61e5 | 2014-09-16 13:58:17 -0700 | [diff] [blame] | 45 | // dispatcherMutex is a lock for coordinating concurrent access to some |
| 46 | // dispatcher methods. |
Bogdan Caprita | 7f49167 | 2014-11-13 14:51:08 -0800 | [diff] [blame] | 47 | mu sync.RWMutex |
| 48 | // TODO(rjkroege): Consider moving this inside internal. |
Robert Kroeger | e95ed6d | 2015-01-14 17:41:04 -0800 | [diff] [blame] | 49 | uat BlessingSystemAssociationStore |
| 50 | locks *acls.Locks |
| 51 | principal security.Principal |
Jiri Simsa | 5293dcb | 2014-05-10 09:56:38 -0700 | [diff] [blame] | 52 | } |
| 53 | |
Benjamin Prosnitz | fdfbf7b | 2014-10-08 09:47:21 -0700 | [diff] [blame] | 54 | var _ ipc.Dispatcher = (*dispatcher)(nil) |
| 55 | |
Bogdan Caprita | 4d67c04 | 2014-08-19 10:41:19 -0700 | [diff] [blame] | 56 | const ( |
| 57 | appsSuffix = "apps" |
Bogdan Caprita | 9c4aa22 | 2014-12-10 14:46:30 -0800 | [diff] [blame] | 58 | deviceSuffix = "device" |
Bogdan Caprita | 4d67c04 | 2014-08-19 10:41:19 -0700 | [diff] [blame] | 59 | configSuffix = "cfg" |
Todd Wang | 34ed4c6 | 2014-11-26 15:15:52 -0800 | [diff] [blame] | 60 | |
Jiri Simsa | 764efb7 | 2014-12-25 20:57:03 -0800 | [diff] [blame] | 61 | pkgPath = "v.io/core/veyron/services/mgmt/device/impl" |
Bogdan Caprita | 4d67c04 | 2014-08-19 10:41:19 -0700 | [diff] [blame] | 62 | ) |
| 63 | |
| 64 | var ( |
Mike Burrows | d65df96 | 2014-12-17 10:01:19 -0800 | [diff] [blame] | 65 | ErrInvalidSuffix = verror.Register(pkgPath+".InvalidSuffix", verror.NoRetry, "{1:}{2:} invalid suffix{:_}") |
| 66 | ErrOperationFailed = verror.Register(pkgPath+".OperationFailed", verror.NoRetry, "{1:}{2:} operation failed{:_}") |
| 67 | ErrOperationInProgress = verror.Register(pkgPath+".OperationInProgress", verror.NoRetry, "{1:}{2:} operation in progress{:_}") |
| 68 | ErrAppTitleMismatch = verror.Register(pkgPath+".AppTitleMismatch", verror.NoRetry, "{1:}{2:} app title mismatch{:_}") |
| 69 | ErrUpdateNoOp = verror.Register(pkgPath+".UpdateNoOp", verror.NoRetry, "{1:}{2:} update is no op{:_}") |
| 70 | ErrInvalidOperation = verror.Register(pkgPath+".InvalidOperation", verror.NoRetry, "{1:}{2:} invalid operation{:_}") |
| 71 | ErrInvalidBlessing = verror.Register(pkgPath+".InvalidBlessing", verror.NoRetry, "{1:}{2:} invalid blessing{:_}") |
Bogdan Caprita | 4d67c04 | 2014-08-19 10:41:19 -0700 | [diff] [blame] | 72 | ) |
| 73 | |
Bogdan Caprita | 2b21936 | 2014-12-09 17:03:33 -0800 | [diff] [blame] | 74 | // NewDispatcher is the device manager dispatcher factory. |
Bogdan Caprita | 29a3b35 | 2015-01-16 16:28:49 -0800 | [diff] [blame] | 75 | func NewDispatcher(principal security.Principal, config *config.State, restartHandler func()) (*dispatcher, error) { |
Bogdan Caprita | c87a914 | 2014-07-21 10:38:13 -0700 | [diff] [blame] | 76 | if err := config.Validate(); err != nil { |
Gautham | 6fe61e5 | 2014-09-16 13:58:17 -0700 | [diff] [blame] | 77 | return nil, fmt.Errorf("invalid config %v: %v", config, err) |
Bogdan Caprita | c87a914 | 2014-07-21 10:38:13 -0700 | [diff] [blame] | 78 | } |
Bogdan Caprita | c7e72b6 | 2015-01-07 19:22:23 -0800 | [diff] [blame] | 79 | // TODO(caprita): use some mechansim (a file lock or presence of entry |
| 80 | // in mounttable) to ensure only one device manager is running in an |
| 81 | // installation? |
| 82 | mi := &managerInfo{ |
| 83 | MgrName: naming.Join(config.Name, deviceSuffix), |
| 84 | Pid: os.Getpid(), |
| 85 | } |
| 86 | if err := saveManagerInfo(filepath.Join(config.Root, "device-manager"), mi); err != nil { |
| 87 | return nil, fmt.Errorf("failed to save info: %v", err) |
| 88 | } |
Robert Kroeger | 1cb4a0d | 2014-10-20 11:55:38 -0700 | [diff] [blame] | 89 | uat, err := NewBlessingSystemAssociationStore(config.Root) |
| 90 | if err != nil { |
| 91 | return nil, fmt.Errorf("cannot create persistent store for identity to system account associations: %v", err) |
| 92 | } |
Gautham | 82bb995 | 2014-08-28 14:11:51 -0700 | [diff] [blame] | 93 | d := &dispatcher{ |
Bogdan Caprita | c87a914 | 2014-07-21 10:38:13 -0700 | [diff] [blame] | 94 | internal: &internalState{ |
Bogdan Caprita | 29a3b35 | 2015-01-16 16:28:49 -0800 | [diff] [blame] | 95 | callback: newCallbackState(config.Name), |
| 96 | updating: newUpdatingState(), |
| 97 | restartHandler: restartHandler, |
Jiri Simsa | 70c3205 | 2014-06-18 11:38:21 -0700 | [diff] [blame] | 98 | }, |
Robert Kroeger | e95ed6d | 2015-01-14 17:41:04 -0800 | [diff] [blame] | 99 | config: config, |
| 100 | uat: uat, |
| 101 | locks: acls.NewLocks(), |
| 102 | principal: principal, |
Gautham | 82bb995 | 2014-08-28 14:11:51 -0700 | [diff] [blame] | 103 | } |
Robert Kroeger | e95ed6d | 2015-01-14 17:41:04 -0800 | [diff] [blame] | 104 | |
| 105 | tam, err := flag.TaggedACLMapFromFlag() |
| 106 | if err != nil { |
| 107 | return nil, err |
| 108 | } |
| 109 | if tam != nil { |
| 110 | if err := d.locks.SetPathACL(principal, d.getACLDir(), tam, ""); err != nil { |
Gautham | 6fe61e5 | 2014-09-16 13:58:17 -0700 | [diff] [blame] | 111 | return nil, err |
| 112 | } |
Gautham | 82bb995 | 2014-08-28 14:11:51 -0700 | [diff] [blame] | 113 | } |
Bogdan Caprita | 7f49167 | 2014-11-13 14:51:08 -0800 | [diff] [blame] | 114 | // If we're in 'security agent mode', set up the key manager agent. |
| 115 | if len(os.Getenv(agent.FdVarName)) > 0 { |
| 116 | if keyMgrAgent, err := keymgr.NewAgent(); err != nil { |
| 117 | return nil, fmt.Errorf("NewAgent() failed: %v", err) |
| 118 | } else { |
| 119 | d.internal.securityAgent = &securityAgentState{ |
| 120 | keyMgrAgent: keyMgrAgent, |
| 121 | } |
| 122 | } |
| 123 | } |
Gautham | 82bb995 | 2014-08-28 14:11:51 -0700 | [diff] [blame] | 124 | return d, nil |
| 125 | } |
| 126 | |
Robert Kroeger | e95ed6d | 2015-01-14 17:41:04 -0800 | [diff] [blame] | 127 | func (d *dispatcher) getACLDir() string { |
| 128 | return filepath.Join(d.config.Root, "device-manager", "device-data", "acls") |
Gautham | 82bb995 | 2014-08-28 14:11:51 -0700 | [diff] [blame] | 129 | } |
| 130 | |
Robin Thellend | 888f8cf | 2014-12-15 16:19:10 -0800 | [diff] [blame] | 131 | func (d *dispatcher) claimDeviceManager(ctx ipc.ServerContext) error { |
Robert Kroeger | acc778b | 2014-11-03 17:17:21 -0800 | [diff] [blame] | 132 | // TODO(rjkroege): Scrub the state tree of installation and instance ACL files. |
Robin Thellend | 888f8cf | 2014-12-15 16:19:10 -0800 | [diff] [blame] | 133 | |
| 134 | // Get the blessings to be used by the claimant. |
| 135 | blessings := ctx.Blessings() |
| 136 | if blessings == nil { |
Matt Rosencrantz | 8f9fca1 | 2014-12-19 14:02:31 -0800 | [diff] [blame] | 137 | return verror.Make(ErrInvalidBlessing, ctx.Context()) |
Robin Thellend | 888f8cf | 2014-12-15 16:19:10 -0800 | [diff] [blame] | 138 | } |
| 139 | principal := ctx.LocalPrincipal() |
| 140 | if err := principal.AddToRoots(blessings); err != nil { |
| 141 | vlog.Errorf("principal.AddToRoots(%s) failed: %v", blessings, err) |
Matt Rosencrantz | 8f9fca1 | 2014-12-19 14:02:31 -0800 | [diff] [blame] | 142 | return verror.Make(ErrInvalidBlessing, ctx.Context()) |
Robin Thellend | 888f8cf | 2014-12-15 16:19:10 -0800 | [diff] [blame] | 143 | } |
| 144 | names := blessings.ForContext(ctx) |
Asim Shankar | 8f05c22 | 2014-10-06 22:08:19 -0700 | [diff] [blame] | 145 | if len(names) == 0 { |
Robin Thellend | 888f8cf | 2014-12-15 16:19:10 -0800 | [diff] [blame] | 146 | vlog.Errorf("No names for claimer(%v) are trusted", blessings) |
Mike Burrows | d65df96 | 2014-12-17 10:01:19 -0800 | [diff] [blame] | 147 | return verror.Make(ErrOperationFailed, nil) |
Gautham | 82bb995 | 2014-08-28 14:11:51 -0700 | [diff] [blame] | 148 | } |
Robin Thellend | 888f8cf | 2014-12-15 16:19:10 -0800 | [diff] [blame] | 149 | principal.BlessingStore().Set(blessings, security.AllPrincipals) |
| 150 | principal.BlessingStore().SetDefault(blessings) |
Bogdan Caprita | 2b21936 | 2014-12-09 17:03:33 -0800 | [diff] [blame] | 151 | // Create ACLs to transfer devicemanager permissions to the provided identity. |
Asim Shankar | 6888519 | 2014-11-26 12:48:35 -0800 | [diff] [blame] | 152 | acl := make(access.TaggedACLMap) |
| 153 | for _, n := range names { |
| 154 | for _, tag := range access.AllTypicalTags() { |
Ankur | 2b61d35 | 2015-01-27 14:59:37 -0800 | [diff] [blame] | 155 | // TODO(caprita, ataly, ashankar): Do we really need the NonExtendable restriction |
| 156 | // below? |
| 157 | acl.Add(security.BlessingPattern(n).MakeNonExtendable(), string(tag)) |
Asim Shankar | 6888519 | 2014-11-26 12:48:35 -0800 | [diff] [blame] | 158 | } |
Gautham | 82bb995 | 2014-08-28 14:11:51 -0700 | [diff] [blame] | 159 | } |
Robert Kroeger | e95ed6d | 2015-01-14 17:41:04 -0800 | [diff] [blame] | 160 | if err := d.locks.SetPathACL(principal, d.getACLDir(), acl, ""); err != nil { |
Robert Kroeger | acc778b | 2014-11-03 17:17:21 -0800 | [diff] [blame] | 161 | vlog.Errorf("Failed to setACL:%v", err) |
Mike Burrows | d65df96 | 2014-12-17 10:01:19 -0800 | [diff] [blame] | 162 | return verror.Make(ErrOperationFailed, nil) |
Robert Kroeger | acc778b | 2014-11-03 17:17:21 -0800 | [diff] [blame] | 163 | } |
| 164 | return nil |
| 165 | } |
| 166 | |
Robert Kroeger | e95ed6d | 2015-01-14 17:41:04 -0800 | [diff] [blame] | 167 | // TODO(rjkroege): Consider refactoring authorizer implementations to |
| 168 | // be shareable with other components. |
| 169 | func newAuthorizer(principal security.Principal, dir string, locks *acls.Locks) (security.Authorizer, error) { |
| 170 | rootTam, _, err := locks.GetPathACL(principal, dir) |
Robert Kroeger | acc778b | 2014-11-03 17:17:21 -0800 | [diff] [blame] | 171 | |
Robert Kroeger | e95ed6d | 2015-01-14 17:41:04 -0800 | [diff] [blame] | 172 | if err != nil && os.IsNotExist(err) { |
| 173 | vlog.Errorf("GetPathACL(%s) failed: %v", dir, err) |
| 174 | return allowEveryone{}, nil |
| 175 | } else if err != nil { |
| 176 | return nil, err |
Robert Kroeger | acc778b | 2014-11-03 17:17:21 -0800 | [diff] [blame] | 177 | } |
Robert Kroeger | acc778b | 2014-11-03 17:17:21 -0800 | [diff] [blame] | 178 | |
Robert Kroeger | e95ed6d | 2015-01-14 17:41:04 -0800 | [diff] [blame] | 179 | auth, err := access.TaggedACLAuthorizer(rootTam, access.TypicalTagType()) |
Robert Kroeger | acc778b | 2014-11-03 17:17:21 -0800 | [diff] [blame] | 180 | if err != nil { |
Robert Kroeger | e95ed6d | 2015-01-14 17:41:04 -0800 | [diff] [blame] | 181 | vlog.Errorf("Successfully obtained an ACL from the filesystem but TaggedACLAuthorizer couldn't use it: %v", err) |
| 182 | return nil, err |
Robert Kroeger | acc778b | 2014-11-03 17:17:21 -0800 | [diff] [blame] | 183 | } |
Robert Kroeger | e95ed6d | 2015-01-14 17:41:04 -0800 | [diff] [blame] | 184 | return auth, nil |
Robert Kroeger | acc778b | 2014-11-03 17:17:21 -0800 | [diff] [blame] | 185 | |
Gautham | 6fe61e5 | 2014-09-16 13:58:17 -0700 | [diff] [blame] | 186 | } |
| 187 | |
Jiri Simsa | 5293dcb | 2014-05-10 09:56:38 -0700 | [diff] [blame] | 188 | // DISPATCHER INTERFACE IMPLEMENTATION |
Robin Thellend | a02fe8f | 2014-11-19 09:58:29 -0800 | [diff] [blame] | 189 | func (d *dispatcher) Lookup(suffix string) (interface{}, security.Authorizer, error) { |
Bogdan Caprita | 4d67c04 | 2014-08-19 10:41:19 -0700 | [diff] [blame] | 190 | components := strings.Split(suffix, "/") |
| 191 | for i := 0; i < len(components); i++ { |
| 192 | if len(components[i]) == 0 { |
| 193 | components = append(components[:i], components[i+1:]...) |
| 194 | i-- |
| 195 | } |
| 196 | } |
Robert Kroeger | e95ed6d | 2015-01-14 17:41:04 -0800 | [diff] [blame] | 197 | auth, err := newAuthorizer(d.principal, d.getACLDir(), d.locks) |
| 198 | if err != nil { |
| 199 | return nil, nil, err |
| 200 | } |
| 201 | |
Bogdan Caprita | 4d67c04 | 2014-08-19 10:41:19 -0700 | [diff] [blame] | 202 | if len(components) == 0 { |
Robert Kroeger | e95ed6d | 2015-01-14 17:41:04 -0800 | [diff] [blame] | 203 | return ipc.ChildrenGlobberInvoker(deviceSuffix, appsSuffix), auth, nil |
Bogdan Caprita | 4d67c04 | 2014-08-19 10:41:19 -0700 | [diff] [blame] | 204 | } |
Bogdan Caprita | 2b21936 | 2014-12-09 17:03:33 -0800 | [diff] [blame] | 205 | // The implementation of the device manager is split up into several |
Bogdan Caprita | 4d67c04 | 2014-08-19 10:41:19 -0700 | [diff] [blame] | 206 | // invokers, which are instantiated depending on the receiver name |
| 207 | // prefix. |
Bogdan Caprita | 4d67c04 | 2014-08-19 10:41:19 -0700 | [diff] [blame] | 208 | switch components[0] { |
Bogdan Caprita | 2b21936 | 2014-12-09 17:03:33 -0800 | [diff] [blame] | 209 | case deviceSuffix: |
Bogdan Caprita | a456f47 | 2014-12-10 10:18:03 -0800 | [diff] [blame] | 210 | receiver := device.DeviceServer(&deviceService{ |
Bogdan Caprita | 29a3b35 | 2015-01-16 16:28:49 -0800 | [diff] [blame] | 211 | callback: d.internal.callback, |
| 212 | updating: d.internal.updating, |
| 213 | restartHandler: d.internal.restartHandler, |
| 214 | config: d.config, |
| 215 | disp: d, |
| 216 | uat: d.uat, |
Bogdan Caprita | 4d67c04 | 2014-08-19 10:41:19 -0700 | [diff] [blame] | 217 | }) |
Robert Kroeger | e95ed6d | 2015-01-14 17:41:04 -0800 | [diff] [blame] | 218 | return receiver, auth, nil |
Bogdan Caprita | 4d67c04 | 2014-08-19 10:41:19 -0700 | [diff] [blame] | 219 | case appsSuffix: |
Robin Thellend | 8a0f04f | 2014-11-17 10:40:24 -0800 | [diff] [blame] | 220 | // Requests to apps/*/*/*/logs are handled locally by LogFileService. |
Robin Thellend | b9dd9bb | 2014-10-29 13:54:08 -0700 | [diff] [blame] | 221 | // Requests to apps/*/*/*/pprof are proxied to the apps' __debug/pprof object. |
| 222 | // Requests to apps/*/*/*/stats are proxied to the apps' __debug/stats object. |
Robin Thellend | 9bc8fcb | 2014-11-17 10:23:04 -0800 | [diff] [blame] | 223 | // Everything else is handled by the Application server. |
Robin Thellend | ac7128c | 2014-11-11 09:58:28 -0800 | [diff] [blame] | 224 | if len(components) >= 5 { |
Robin Thellend | 4c5266e | 2014-10-27 13:19:29 -0700 | [diff] [blame] | 225 | appInstanceDir, err := instanceDir(d.config.Root, components[1:4]) |
| 226 | if err != nil { |
| 227 | return nil, nil, err |
| 228 | } |
Robin Thellend | b9dd9bb | 2014-10-29 13:54:08 -0700 | [diff] [blame] | 229 | switch kind := components[4]; kind { |
| 230 | case "logs": |
| 231 | logsDir := filepath.Join(appInstanceDir, "logs") |
| 232 | suffix := naming.Join(components[5:]...) |
Robert Kroeger | e95ed6d | 2015-01-14 17:41:04 -0800 | [diff] [blame] | 233 | return logsimpl.NewLogFileService(logsDir, suffix), auth, nil |
Robin Thellend | b9dd9bb | 2014-10-29 13:54:08 -0700 | [diff] [blame] | 234 | case "pprof", "stats": |
| 235 | info, err := loadInstanceInfo(appInstanceDir) |
| 236 | if err != nil { |
| 237 | return nil, nil, err |
| 238 | } |
| 239 | if !instanceStateIs(appInstanceDir, started) { |
Mike Burrows | d65df96 | 2014-12-17 10:01:19 -0800 | [diff] [blame] | 240 | return nil, nil, verror.Make(ErrInvalidSuffix, nil) |
Robin Thellend | b9dd9bb | 2014-10-29 13:54:08 -0700 | [diff] [blame] | 241 | } |
Todd Wang | f519f8f | 2015-01-21 10:07:41 -0800 | [diff] [blame] | 242 | var desc []ipc.InterfaceDesc |
| 243 | switch kind { |
| 244 | case "pprof": |
| 245 | desc = pprof.PProfServer(nil).Describe__() |
| 246 | case "stats": |
| 247 | desc = stats.StatsServer(nil).Describe__() |
Robin Thellend | b9dd9bb | 2014-10-29 13:54:08 -0700 | [diff] [blame] | 248 | } |
| 249 | suffix := naming.Join("__debug", naming.Join(components[4:]...)) |
| 250 | remote := naming.JoinAddressName(info.AppCycleMgrName, suffix) |
Todd Wang | f519f8f | 2015-01-21 10:07:41 -0800 | [diff] [blame] | 251 | invoker := newProxyInvoker(remote, access.Debug, desc) |
Robert Kroeger | e95ed6d | 2015-01-14 17:41:04 -0800 | [diff] [blame] | 252 | return invoker, auth, nil |
Robin Thellend | b9dd9bb | 2014-10-29 13:54:08 -0700 | [diff] [blame] | 253 | } |
Robin Thellend | 4c5266e | 2014-10-27 13:19:29 -0700 | [diff] [blame] | 254 | } |
Robert Kroeger | acc778b | 2014-11-03 17:17:21 -0800 | [diff] [blame] | 255 | if err != nil { |
| 256 | return nil, nil, err |
| 257 | } |
Bogdan Caprita | a456f47 | 2014-12-10 10:18:03 -0800 | [diff] [blame] | 258 | receiver := device.ApplicationServer(&appService{ |
Bogdan Caprita | 7f49167 | 2014-11-13 14:51:08 -0800 | [diff] [blame] | 259 | callback: d.internal.callback, |
| 260 | config: d.config, |
| 261 | suffix: components[1:], |
| 262 | uat: d.uat, |
| 263 | locks: d.locks, |
Bogdan Caprita | 7f49167 | 2014-11-13 14:51:08 -0800 | [diff] [blame] | 264 | securityAgent: d.internal.securityAgent, |
Bogdan Caprita | 4d67c04 | 2014-08-19 10:41:19 -0700 | [diff] [blame] | 265 | }) |
Robert Kroeger | e95ed6d | 2015-01-14 17:41:04 -0800 | [diff] [blame] | 266 | appSpecificAuthorizer, err := newAppSpecificAuthorizer(auth, d.config, components[1:]) |
Robert Kroeger | acc778b | 2014-11-03 17:17:21 -0800 | [diff] [blame] | 267 | if err != nil { |
| 268 | return nil, nil, err |
| 269 | } |
Cosmos Nicolaou | 710daa2 | 2014-11-11 19:39:18 -0800 | [diff] [blame] | 270 | return receiver, appSpecificAuthorizer, nil |
Bogdan Caprita | 4d67c04 | 2014-08-19 10:41:19 -0700 | [diff] [blame] | 271 | case configSuffix: |
| 272 | if len(components) != 2 { |
Mike Burrows | d65df96 | 2014-12-17 10:01:19 -0800 | [diff] [blame] | 273 | return nil, nil, verror.Make(ErrInvalidSuffix, nil) |
Bogdan Caprita | 4d67c04 | 2014-08-19 10:41:19 -0700 | [diff] [blame] | 274 | } |
Bogdan Caprita | a456f47 | 2014-12-10 10:18:03 -0800 | [diff] [blame] | 275 | receiver := idevice.ConfigServer(&configService{ |
Bogdan Caprita | 4d67c04 | 2014-08-19 10:41:19 -0700 | [diff] [blame] | 276 | callback: d.internal.callback, |
| 277 | suffix: components[1], |
| 278 | }) |
Bogdan Caprita | b9501d1 | 2014-10-10 15:02:03 -0700 | [diff] [blame] | 279 | // The nil authorizer ensures that only principals blessed by |
Bogdan Caprita | 2b21936 | 2014-12-09 17:03:33 -0800 | [diff] [blame] | 280 | // the device manager can talk back to it. All apps started by |
| 281 | // the device manager should fall in that category. |
Bogdan Caprita | b9501d1 | 2014-10-10 15:02:03 -0700 | [diff] [blame] | 282 | // |
| 283 | // TODO(caprita,rjkroege): We should further refine this, by |
| 284 | // only allowing the app to update state referring to itself |
| 285 | // (and not other apps). |
Cosmos Nicolaou | 710daa2 | 2014-11-11 19:39:18 -0800 | [diff] [blame] | 286 | return receiver, nil, nil |
Bogdan Caprita | 4d67c04 | 2014-08-19 10:41:19 -0700 | [diff] [blame] | 287 | default: |
Mike Burrows | d65df96 | 2014-12-17 10:01:19 -0800 | [diff] [blame] | 288 | return nil, nil, verror.Make(ErrInvalidSuffix, nil) |
Bogdan Caprita | 4d67c04 | 2014-08-19 10:41:19 -0700 | [diff] [blame] | 289 | } |
Jiri Simsa | 24e87aa | 2014-06-09 09:27:34 -0700 | [diff] [blame] | 290 | } |
Robert Kroeger | acc778b | 2014-11-03 17:17:21 -0800 | [diff] [blame] | 291 | |
| 292 | func newAppSpecificAuthorizer(sec security.Authorizer, config *config.State, suffix []string) (security.Authorizer, error) { |
Bogdan Caprita | 2b21936 | 2014-12-09 17:03:33 -0800 | [diff] [blame] | 293 | // TODO(rjkroege): This does not support <appname>.Start() to start all |
| 294 | // instances. Correct this. |
Robert Kroeger | acc778b | 2014-11-03 17:17:21 -0800 | [diff] [blame] | 295 | |
Bogdan Caprita | 2b21936 | 2014-12-09 17:03:33 -0800 | [diff] [blame] | 296 | // If we are attempting a method invocation against "apps/", we use the |
| 297 | // device-manager wide ACL. |
Robert Kroeger | acc778b | 2014-11-03 17:17:21 -0800 | [diff] [blame] | 298 | if len(suffix) == 0 || len(suffix) == 1 { |
| 299 | return sec, nil |
| 300 | } |
| 301 | // Otherwise, we require a per-installation and per-instance ACL file. |
Robert Kroeger | acc778b | 2014-11-03 17:17:21 -0800 | [diff] [blame] | 302 | if len(suffix) == 2 { |
| 303 | p, err := installationDirCore(suffix, config.Root) |
| 304 | if err != nil { |
| 305 | vlog.Errorf("newAppSpecificAuthorizer failed: %v", err) |
| 306 | return nil, err |
| 307 | } |
Asim Shankar | 6888519 | 2014-11-26 12:48:35 -0800 | [diff] [blame] | 308 | return access.TaggedACLAuthorizerFromFile(path.Join(p, "acls", "data"), access.TypicalTagType()) |
| 309 | } |
| 310 | if len(suffix) > 2 { |
Robert Kroeger | acc778b | 2014-11-03 17:17:21 -0800 | [diff] [blame] | 311 | p, err := instanceDir(config.Root, suffix[0:3]) |
| 312 | if err != nil { |
| 313 | vlog.Errorf("newAppSpecificAuthorizer failed: %v", err) |
| 314 | return nil, err |
| 315 | } |
Asim Shankar | 6888519 | 2014-11-26 12:48:35 -0800 | [diff] [blame] | 316 | return access.TaggedACLAuthorizerFromFile(path.Join(p, "acls", "data"), access.TypicalTagType()) |
Robert Kroeger | acc778b | 2014-11-03 17:17:21 -0800 | [diff] [blame] | 317 | } |
Mike Burrows | d65df96 | 2014-12-17 10:01:19 -0800 | [diff] [blame] | 318 | return nil, verror.Make(ErrInvalidSuffix, nil) |
Robert Kroeger | acc778b | 2014-11-03 17:17:21 -0800 | [diff] [blame] | 319 | } |
Asim Shankar | 6888519 | 2014-11-26 12:48:35 -0800 | [diff] [blame] | 320 | |
| 321 | // allowEveryone implements the authorization policy that allows all principals |
| 322 | // access. |
| 323 | type allowEveryone struct{} |
| 324 | |
Robin Thellend | 888f8cf | 2014-12-15 16:19:10 -0800 | [diff] [blame] | 325 | func (allowEveryone) Authorize(ctx security.Context) error { |
| 326 | vlog.Infof("Device manager is unclaimed. Allow %q.%s() from %q.", ctx.Suffix(), ctx.Method(), ctx.RemoteBlessings()) |
| 327 | return nil |
| 328 | } |