blob: 8592f7157dda47a46126363936aadcdf25ee36f0 [file] [log] [blame]
Jiri Simsad7616c92015-03-24 23:44:30 -07001// Copyright 2015 The Vanadium Authors. All rights reserved.
2// Use of this source code is governed by a BSD-style
3// license that can be found in the LICENSE file.
4
Jiri Simsa78b646f2014-10-08 10:23:05 -07005// An implementation of a server for WSPR
6
7package server
8
9import (
10 "encoding/json"
Nicolas LaCassee3867dc2015-02-05 14:44:53 -080011 "fmt"
Jiri Simsa78b646f2014-10-08 10:23:05 -070012 "sync"
Matt Rosencrantz4aabe572014-10-22 09:25:50 -070013 "time"
Jiri Simsa78b646f2014-10-08 10:23:05 -070014
Jiri Simsa1f1302c2015-02-23 16:18:34 -080015 "v.io/v23"
16 "v.io/v23/context"
Jiri Simsa1f1302c2015-02-23 16:18:34 -080017 "v.io/v23/naming"
Matt Rosencrantz94502cf2015-03-18 09:43:44 -070018 "v.io/v23/rpc"
Jiri Simsa1f1302c2015-02-23 16:18:34 -080019 "v.io/v23/security"
20 "v.io/v23/vdl"
Todd Wangac9e1902015-02-25 01:58:01 -080021 "v.io/v23/vdlroot/signature"
Shyam Jayaraman7efedbe2015-03-05 12:57:18 -080022 vdltime "v.io/v23/vdlroot/time"
Jiri Simsa1f1302c2015-02-23 16:18:34 -080023 "v.io/v23/verror"
Matt Rosencrantze7bf2bc2015-03-13 09:54:27 -070024 "v.io/v23/vtrace"
Jiri Simsa337af232015-02-27 14:36:46 -080025 "v.io/x/lib/vlog"
Todd Wang5b77a342015-04-06 18:31:37 -070026 "v.io/x/ref/services/wspr/internal/lib"
27 "v.io/x/ref/services/wspr/internal/principal"
Jiri Simsa78b646f2014-10-08 10:23:05 -070028)
29
30type Flow struct {
Benjamin Prosnitz86d52282014-12-19 15:48:38 -080031 ID int32
Jiri Simsa78b646f2014-10-08 10:23:05 -070032 Writer lib.ClientWriter
33}
34
Jiri Simsa78b646f2014-10-08 10:23:05 -070035type FlowHandler interface {
Benjamin Prosnitzbf71e962015-04-14 16:43:07 -070036 CreateNewFlow(server interface{}, sender rpc.Stream) *Flow
Jiri Simsa78b646f2014-10-08 10:23:05 -070037
Benjamin Prosnitz86d52282014-12-19 15:48:38 -080038 CleanupFlow(id int32)
Jiri Simsa78b646f2014-10-08 10:23:05 -070039}
40
41type HandleStore interface {
Shyam Jayaraman07136a72015-04-13 13:34:41 -070042 GetBlessings(handle principal.BlessingsHandle) security.Blessings
Benjamin Prosnitz9e423992015-04-10 13:10:35 -070043 // Gets or adds blessings to the store and returns handle to the blessings
44 GetOrAddBlessingsHandle(blessings security.Blessings) principal.BlessingsHandle
Jiri Simsa78b646f2014-10-08 10:23:05 -070045}
46
47type ServerHelper interface {
48 FlowHandler
49 HandleStore
50
Shyam Jayaramanc17abda2015-04-06 16:49:17 -070051 SendLogMessage(level lib.LogLevel, msg string) error
52
Matt Rosencrantzc90eb7b2015-01-09 08:32:01 -080053 Context() *context.T
Jiri Simsa78b646f2014-10-08 10:23:05 -070054}
55
56type authReply struct {
Mike Burrows2ec2bb32015-02-26 15:14:43 -080057 Err *verror.E
Jiri Simsa78b646f2014-10-08 10:23:05 -070058}
59
Shyam Jayaraman907219d2014-11-26 12:14:37 -080060// AuthRequest is a request for a javascript authorizer to run
61// This is exported to make the app test easier.
62type AuthRequest struct {
Benjamin Prosnitz2be28dc2015-03-11 13:33:22 -070063 ServerId uint32 `json:"serverId"`
Shyam Jayaraman250aac32015-03-05 15:29:11 -080064 Handle int32 `json:"handle"`
65 Call SecurityCall `json:"call"`
Jiri Simsa78b646f2014-10-08 10:23:05 -070066}
67
68type Server struct {
Benjamin Prosnitze8e2b9b2015-02-24 12:55:25 -080069 // serverStateLock should be aquired when starting or stopping the server.
70 // This should be locked before outstandingRequestLock.
71 serverStateLock sync.Mutex
Jiri Simsa78b646f2014-10-08 10:23:05 -070072
Matt Rosencrantz94502cf2015-03-18 09:43:44 -070073 // The rpc.ListenSpec to use with server.Listen
74 listenSpec *rpc.ListenSpec
Jiri Simsa78b646f2014-10-08 10:23:05 -070075
Matt Rosencrantz94502cf2015-03-18 09:43:44 -070076 // The server that handles the rpc layer. Listen on this server is
Jiri Simsa78b646f2014-10-08 10:23:05 -070077 // lazily started.
Matt Rosencrantz94502cf2015-03-18 09:43:44 -070078 server rpc.Server
Jiri Simsa78b646f2014-10-08 10:23:05 -070079
80 // The saved dispatcher to reuse when serve is called multiple times.
81 dispatcher *dispatcher
82
Nicolas LaCasse27b57c72014-11-19 13:40:20 -080083 // Whether the server is listening.
84 isListening bool
Jiri Simsa78b646f2014-10-08 10:23:05 -070085
86 // The server id.
Benjamin Prosnitz86d52282014-12-19 15:48:38 -080087 id uint32
Jiri Simsa78b646f2014-10-08 10:23:05 -070088 helper ServerHelper
89
Suharsh Sivakumar4cc7c2d2015-04-09 15:21:56 -070090 // outstandingRequestLock should be acquired only to update the outstanding request maps below.
91 outstandingRequestLock sync.Mutex
92 outstandingServerRequests map[int32]chan *lib.ServerRpcReply // GUARDED_BY outstandingRequestLock
93 outstandingAuthRequests map[int32]chan error // GUARDED_BY outstandingRequestLock
94 outstandingValidationRequests map[int32]chan []error // GUARDED_BY outstandingRequestLock
Shyam Jayaramanc17abda2015-04-06 16:49:17 -070095
96 // statusClose will be closed when the server is shutting down, this will
97 // cause the status poller to exit.
98 statusClose chan struct{}
Jiri Simsa78b646f2014-10-08 10:23:05 -070099}
100
Matt Rosencrantz94502cf2015-03-18 09:43:44 -0700101func NewServer(id uint32, listenSpec *rpc.ListenSpec, helper ServerHelper) (*Server, error) {
Jiri Simsa78b646f2014-10-08 10:23:05 -0700102 server := &Server{
Benjamin Prosnitze8e2b9b2015-02-24 12:55:25 -0800103 id: id,
104 helper: helper,
105 listenSpec: listenSpec,
Todd Wangbaf16842015-03-16 14:12:29 -0700106 outstandingServerRequests: make(map[int32]chan *lib.ServerRpcReply),
Benjamin Prosnitze8e2b9b2015-02-24 12:55:25 -0800107 outstandingAuthRequests: make(map[int32]chan error),
108 outstandingValidationRequests: make(map[int32]chan []error),
Jiri Simsa78b646f2014-10-08 10:23:05 -0700109 }
110 var err error
Benjamin Prosnitze8e2b9b2015-02-24 12:55:25 -0800111 ctx := helper.Context()
Benjamin Prosnitzf39783b2015-02-25 17:28:50 -0800112 ctx = context.WithValue(ctx, "customChainValidator", server.wsprCaveatValidator)
Benjamin Prosnitze8e2b9b2015-02-24 12:55:25 -0800113 if server.server, err = v23.NewServer(ctx); err != nil {
Jiri Simsa78b646f2014-10-08 10:23:05 -0700114 return nil, err
115 }
116 return server, nil
117}
118
119// remoteInvokeFunc is a type of function that can invoke a remote method and
120// communicate the result back via a channel to the caller
Todd Wang54feabe2015-04-15 23:38:26 -0700121type remoteInvokeFunc func(ctx *context.T, call rpc.StreamServerCall, methodName string, args []interface{}) <-chan *lib.ServerRpcReply
Jiri Simsa78b646f2014-10-08 10:23:05 -0700122
Benjamin Prosnitz86d52282014-12-19 15:48:38 -0800123func (s *Server) createRemoteInvokerFunc(handle int32) remoteInvokeFunc {
Todd Wang54feabe2015-04-15 23:38:26 -0700124 return func(ctx *context.T, call rpc.StreamServerCall, methodName string, args []interface{}) <-chan *lib.ServerRpcReply {
Todd Wang4264e4b2015-04-16 22:43:40 -0700125 securityCall := ConvertSecurityCall(s.helper, ctx, call.Security(), true)
Benjamin Prosnitze8e2b9b2015-02-24 12:55:25 -0800126
Jiri Simsa78b646f2014-10-08 10:23:05 -0700127 flow := s.helper.CreateNewFlow(s, call)
Todd Wangbaf16842015-03-16 14:12:29 -0700128 replyChan := make(chan *lib.ServerRpcReply, 1)
Benjamin Prosnitze8e2b9b2015-02-24 12:55:25 -0800129 s.outstandingRequestLock.Lock()
Jiri Simsa78b646f2014-10-08 10:23:05 -0700130 s.outstandingServerRequests[flow.ID] = replyChan
Benjamin Prosnitze8e2b9b2015-02-24 12:55:25 -0800131 s.outstandingRequestLock.Unlock()
Matt Rosencrantz4aabe572014-10-22 09:25:50 -0700132
Shyam Jayaraman7efedbe2015-03-05 12:57:18 -0800133 var timeout vdltime.Deadline
Todd Wang54feabe2015-04-15 23:38:26 -0700134 if deadline, ok := ctx.Deadline(); ok {
Shyam Jayaraman7efedbe2015-03-05 12:57:18 -0800135 timeout.Time = deadline
Matt Rosencrantz4aabe572014-10-22 09:25:50 -0700136 }
137
Todd Wangbaf16842015-03-16 14:12:29 -0700138 errHandler := func(err error) <-chan *lib.ServerRpcReply {
Matt Rosencrantz4aabe572014-10-22 09:25:50 -0700139 if ch := s.popServerRequest(flow.ID); ch != nil {
Todd Wang54feabe2015-04-15 23:38:26 -0700140 stdErr := verror.Convert(verror.ErrInternal, ctx, err).(verror.E)
Todd Wangbaf16842015-03-16 14:12:29 -0700141 ch <- &lib.ServerRpcReply{nil, &stdErr, vtrace.Response{}}
Matt Rosencrantz4aabe572014-10-22 09:25:50 -0700142 s.helper.CleanupFlow(flow.ID)
Jiri Simsa78b646f2014-10-08 10:23:05 -0700143 }
144 return replyChan
Shyam Jayaramanc96e1aa2014-11-12 16:42:39 -0800145 }
Shyam Jayaraman907219d2014-11-26 12:14:37 -0800146
Benjamin Prosnitzbf71e962015-04-14 16:43:07 -0700147 var grantedBlessings *principal.JsBlessings
148 if !call.GrantedBlessings().IsZero() {
149 grantedBlessings = convertBlessingsToHandle(s.helper, call.GrantedBlessings())
Shyam Jayaraman907219d2014-11-26 12:14:37 -0800150 }
Benjamin Prosnitzbf71e962015-04-14 16:43:07 -0700151
152 rpcCall := ServerRpcRequestCall{
153 SecurityCall: securityCall,
154 Deadline: timeout,
Todd Wang54feabe2015-04-15 23:38:26 -0700155 TraceRequest: vtrace.GetRequest(ctx),
Benjamin Prosnitzbf71e962015-04-14 16:43:07 -0700156 GrantedBlessings: grantedBlessings,
157 }
158
159 var vdlValArgs []*vdl.Value = make([]*vdl.Value, len(args))
160 for i, arg := range args {
Shyam Jayaraman07136a72015-04-13 13:34:41 -0700161 if blessings, ok := arg.(security.Blessings); ok {
162 arg = principal.ConvertBlessingsToHandle(blessings, s.helper.GetOrAddBlessingsHandle(blessings))
163 }
Benjamin Prosnitzbf71e962015-04-14 16:43:07 -0700164 vdlValArgs[i] = vdl.ValueOf(arg)
Shyam Jayaraman07136a72015-04-13 13:34:41 -0700165 }
Benjamin Prosnitzbf71e962015-04-14 16:43:07 -0700166
Shyam Jayaraman907219d2014-11-26 12:14:37 -0800167 // Send a invocation request to JavaScript
Benjamin Prosnitzbf71e962015-04-14 16:43:07 -0700168 message := ServerRpcRequest{
Shyam Jayaraman907219d2014-11-26 12:14:37 -0800169 ServerId: s.id,
170 Handle: handle,
171 Method: lib.LowercaseFirstCharacter(methodName),
Benjamin Prosnitzbf71e962015-04-14 16:43:07 -0700172 Args: vdlValArgs,
Shyam Jayaraman250aac32015-03-05 15:29:11 -0800173 Call: rpcCall,
Shyam Jayaraman907219d2014-11-26 12:14:37 -0800174 }
Shyam Jayaraman907219d2014-11-26 12:14:37 -0800175 vomMessage, err := lib.VomEncode(message)
Shyam Jayaramanc96e1aa2014-11-12 16:42:39 -0800176 if err != nil {
177 return errHandler(err)
178 }
Shyam Jayaraman907219d2014-11-26 12:14:37 -0800179 if err := flow.Writer.Send(lib.ResponseServerRequest, vomMessage); err != nil {
Shyam Jayaramanc96e1aa2014-11-12 16:42:39 -0800180 return errHandler(err)
Jiri Simsa78b646f2014-10-08 10:23:05 -0700181 }
182
Matt Rosencrantz99ed6782015-01-27 19:58:34 -0800183 vlog.VI(3).Infof("calling method %q with args %v, MessageID %d assigned\n", methodName, args, flow.ID)
Jiri Simsa78b646f2014-10-08 10:23:05 -0700184
Matt Rosencrantz4aabe572014-10-22 09:25:50 -0700185 // Watch for cancellation.
186 go func() {
Todd Wang54feabe2015-04-15 23:38:26 -0700187 <-ctx.Done()
Matt Rosencrantz4aabe572014-10-22 09:25:50 -0700188 ch := s.popServerRequest(flow.ID)
189 if ch == nil {
190 return
191 }
192
193 // Send a cancel message to the JS server.
194 flow.Writer.Send(lib.ResponseCancel, nil)
195 s.helper.CleanupFlow(flow.ID)
196
Todd Wang54feabe2015-04-15 23:38:26 -0700197 err := verror.Convert(verror.ErrAborted, ctx, ctx.Err()).(verror.E)
Todd Wangbaf16842015-03-16 14:12:29 -0700198 ch <- &lib.ServerRpcReply{nil, &err, vtrace.Response{}}
Matt Rosencrantz4aabe572014-10-22 09:25:50 -0700199 }()
200
Shyam Jayaraman07136a72015-04-13 13:34:41 -0700201 go proxyStream(call, flow.Writer, s.helper)
Matt Rosencrantz4aabe572014-10-22 09:25:50 -0700202
Jiri Simsa78b646f2014-10-08 10:23:05 -0700203 return replyChan
204 }
205}
206
Shyam Jayaramaneb10b9b2015-01-12 12:23:20 -0800207type globStream struct {
Todd Wang2331dd02015-03-17 15:38:39 -0700208 ch chan naming.GlobReply
Matt Rosencrantz99ed6782015-01-27 19:58:34 -0800209 ctx *context.T
Shyam Jayaramaneb10b9b2015-01-12 12:23:20 -0800210}
211
212func (g *globStream) Send(item interface{}) error {
Todd Wang2331dd02015-03-17 15:38:39 -0700213 if v, ok := item.(naming.GlobReply); ok {
Shyam Jayaramaneb10b9b2015-01-12 12:23:20 -0800214 g.ch <- v
215 return nil
216 }
Jiri Simsa94f68d02015-02-17 10:22:08 -0800217 return verror.New(verror.ErrBadArg, g.ctx, item)
Shyam Jayaramaneb10b9b2015-01-12 12:23:20 -0800218}
219
220func (g *globStream) Recv(itemptr interface{}) error {
Jiri Simsa94f68d02015-02-17 10:22:08 -0800221 return verror.New(verror.ErrNoExist, g.ctx, "Can't call recieve on glob stream")
Shyam Jayaramaneb10b9b2015-01-12 12:23:20 -0800222}
223
224func (g *globStream) CloseSend() error {
225 close(g.ch)
226 return nil
227}
228
229// remoteGlobFunc is a type of function that can invoke a remote glob and
230// communicate the result back via the channel returned
Todd Wang54feabe2015-04-15 23:38:26 -0700231type remoteGlobFunc func(ctx *context.T, call rpc.ServerCall, pattern string) (<-chan naming.GlobReply, error)
Shyam Jayaramaneb10b9b2015-01-12 12:23:20 -0800232
233func (s *Server) createRemoteGlobFunc(handle int32) remoteGlobFunc {
Todd Wang54feabe2015-04-15 23:38:26 -0700234 return func(ctx *context.T, call rpc.ServerCall, pattern string) (<-chan naming.GlobReply, error) {
Benjamin Prosnitze8e2b9b2015-02-24 12:55:25 -0800235 // Until the tests get fixed, we need to create a security context before creating the flow
236 // because creating the security context creates a flow and flow ids will be off.
237 // See https://github.com/veyron/release-issues/issues/1181
Todd Wang4264e4b2015-04-16 22:43:40 -0700238 securityCall := ConvertSecurityCall(s.helper, ctx, call.Security(), true)
Benjamin Prosnitze8e2b9b2015-02-24 12:55:25 -0800239
Todd Wang2331dd02015-03-17 15:38:39 -0700240 globChan := make(chan naming.GlobReply, 1)
Shyam Jayaramaneb10b9b2015-01-12 12:23:20 -0800241 flow := s.helper.CreateNewFlow(s, &globStream{
Matt Rosencrantz99ed6782015-01-27 19:58:34 -0800242 ch: globChan,
Todd Wang54feabe2015-04-15 23:38:26 -0700243 ctx: ctx,
Shyam Jayaramaneb10b9b2015-01-12 12:23:20 -0800244 })
Todd Wangbaf16842015-03-16 14:12:29 -0700245 replyChan := make(chan *lib.ServerRpcReply, 1)
Benjamin Prosnitze8e2b9b2015-02-24 12:55:25 -0800246 s.outstandingRequestLock.Lock()
Shyam Jayaramaneb10b9b2015-01-12 12:23:20 -0800247 s.outstandingServerRequests[flow.ID] = replyChan
Benjamin Prosnitze8e2b9b2015-02-24 12:55:25 -0800248 s.outstandingRequestLock.Unlock()
Shyam Jayaramaneb10b9b2015-01-12 12:23:20 -0800249
Shyam Jayaraman7efedbe2015-03-05 12:57:18 -0800250 var timeout vdltime.Deadline
Todd Wang54feabe2015-04-15 23:38:26 -0700251 if deadline, ok := ctx.Deadline(); ok {
Shyam Jayaraman7efedbe2015-03-05 12:57:18 -0800252 timeout.Time = deadline
Shyam Jayaramaneb10b9b2015-01-12 12:23:20 -0800253 }
254
Todd Wang2331dd02015-03-17 15:38:39 -0700255 errHandler := func(err error) (<-chan naming.GlobReply, error) {
Shyam Jayaramaneb10b9b2015-01-12 12:23:20 -0800256 if ch := s.popServerRequest(flow.ID); ch != nil {
257 s.helper.CleanupFlow(flow.ID)
258 }
Todd Wang54feabe2015-04-15 23:38:26 -0700259 return nil, verror.Convert(verror.ErrInternal, ctx, err).(verror.E)
Shyam Jayaramaneb10b9b2015-01-12 12:23:20 -0800260 }
261
Benjamin Prosnitzbf71e962015-04-14 16:43:07 -0700262 var grantedBlessings *principal.JsBlessings
263 if !call.GrantedBlessings().IsZero() {
264 grantedBlessings = convertBlessingsToHandle(s.helper, call.GrantedBlessings())
265 }
266
267 rpcCall := ServerRpcRequestCall{
268 SecurityCall: securityCall,
269 Deadline: timeout,
270 GrantedBlessings: grantedBlessings,
Shyam Jayaramaneb10b9b2015-01-12 12:23:20 -0800271 }
272
273 // Send a invocation request to JavaScript
Benjamin Prosnitzbf71e962015-04-14 16:43:07 -0700274 message := ServerRpcRequest{
Shyam Jayaramaneb10b9b2015-01-12 12:23:20 -0800275 ServerId: s.id,
276 Handle: handle,
277 Method: "Glob__",
Benjamin Prosnitzbf71e962015-04-14 16:43:07 -0700278 Args: []*vdl.Value{vdl.ValueOf(pattern)},
Shyam Jayaraman250aac32015-03-05 15:29:11 -0800279 Call: rpcCall,
Shyam Jayaramaneb10b9b2015-01-12 12:23:20 -0800280 }
281 vomMessage, err := lib.VomEncode(message)
282 if err != nil {
283 return errHandler(err)
284 }
285 if err := flow.Writer.Send(lib.ResponseServerRequest, vomMessage); err != nil {
286 return errHandler(err)
287 }
288
Matt Rosencrantz99ed6782015-01-27 19:58:34 -0800289 vlog.VI(3).Infof("calling method 'Glob__' with args %v, MessageID %d assigned\n", []interface{}{pattern}, flow.ID)
Shyam Jayaramaneb10b9b2015-01-12 12:23:20 -0800290
291 // Watch for cancellation.
292 go func() {
Todd Wang54feabe2015-04-15 23:38:26 -0700293 <-ctx.Done()
Shyam Jayaramaneb10b9b2015-01-12 12:23:20 -0800294 ch := s.popServerRequest(flow.ID)
295 if ch == nil {
296 return
297 }
298
299 // Send a cancel message to the JS server.
300 flow.Writer.Send(lib.ResponseCancel, nil)
301 s.helper.CleanupFlow(flow.ID)
302
Todd Wang54feabe2015-04-15 23:38:26 -0700303 err := verror.Convert(verror.ErrAborted, ctx, ctx.Err()).(verror.E)
Todd Wangbaf16842015-03-16 14:12:29 -0700304 ch <- &lib.ServerRpcReply{nil, &err, vtrace.Response{}}
Shyam Jayaramaneb10b9b2015-01-12 12:23:20 -0800305 }()
306
307 return globChan, nil
308 }
309}
310
Shyam Jayaraman07136a72015-04-13 13:34:41 -0700311func proxyStream(stream rpc.Stream, w lib.ClientWriter, blessingsCache HandleStore) {
Jiri Simsa78b646f2014-10-08 10:23:05 -0700312 var item interface{}
313 for err := stream.Recv(&item); err == nil; err = stream.Recv(&item) {
Shyam Jayaraman07136a72015-04-13 13:34:41 -0700314 if blessings, ok := item.(security.Blessings); ok {
315 item = principal.ConvertBlessingsToHandle(blessings, blessingsCache.GetOrAddBlessingsHandle(blessings))
316
317 }
Benjamin Prosnitza2ac3b32014-12-12 11:40:31 -0800318 vomItem, err := lib.VomEncode(item)
Shyam Jayaramanc96e1aa2014-11-12 16:42:39 -0800319 if err != nil {
Jiri Simsa94f68d02015-02-17 10:22:08 -0800320 w.Error(verror.Convert(verror.ErrInternal, nil, err))
Shyam Jayaramanc96e1aa2014-11-12 16:42:39 -0800321 return
322 }
Benjamin Prosnitza2ac3b32014-12-12 11:40:31 -0800323 if err := w.Send(lib.ResponseStream, vomItem); err != nil {
Jiri Simsa94f68d02015-02-17 10:22:08 -0800324 w.Error(verror.Convert(verror.ErrInternal, nil, err))
Jiri Simsa78b646f2014-10-08 10:23:05 -0700325 return
326 }
327 }
Jiri Simsa78b646f2014-10-08 10:23:05 -0700328 if err := w.Send(lib.ResponseStreamClose, nil); err != nil {
Jiri Simsa94f68d02015-02-17 10:22:08 -0800329 w.Error(verror.Convert(verror.ErrInternal, nil, err))
Jiri Simsa78b646f2014-10-08 10:23:05 -0700330 return
331 }
332}
333
Benjamin Prosnitzbf71e962015-04-14 16:43:07 -0700334func convertBlessingsToHandle(helper ServerHelper, blessings security.Blessings) *principal.JsBlessings {
335 return principal.ConvertBlessingsToHandle(blessings, helper.GetOrAddBlessingsHandle(blessings))
Jiri Simsa78b646f2014-10-08 10:23:05 -0700336}
337
Benjamin Prosnitze8e2b9b2015-02-24 12:55:25 -0800338func makeListOfErrors(numErrors int, err error) []error {
339 errs := make([]error, numErrors)
340 for i := 0; i < numErrors; i++ {
341 errs[i] = err
Shyam Jayaramana42622c2015-01-05 16:55:53 -0800342 }
Benjamin Prosnitze8e2b9b2015-02-24 12:55:25 -0800343 return errs
344}
345
Todd Wang4264e4b2015-04-16 22:43:40 -0700346// validateCavsInJavascript validates caveats in javascript.
Benjamin Prosnitze8e2b9b2015-02-24 12:55:25 -0800347// It resolves each []security.Caveat in cavs to an error (or nil) and collects them in a slice.
Todd Wang4264e4b2015-04-16 22:43:40 -0700348func (s *Server) validateCavsInJavascript(ctx *context.T, call security.Call, cavs [][]security.Caveat) []error {
Benjamin Prosnitze8e2b9b2015-02-24 12:55:25 -0800349 flow := s.helper.CreateNewFlow(s, nil)
350 req := CaveatValidationRequest{
Todd Wang4264e4b2015-04-16 22:43:40 -0700351 Call: ConvertSecurityCall(s.helper, ctx, call, false),
Ankuref39ba82015-03-19 13:34:03 -0700352 Cavs: cavs,
Benjamin Prosnitze8e2b9b2015-02-24 12:55:25 -0800353 }
354
355 replyChan := make(chan []error, 1)
356 s.outstandingRequestLock.Lock()
357 s.outstandingValidationRequests[flow.ID] = replyChan
358 s.outstandingRequestLock.Unlock()
359
360 defer func() {
361 s.outstandingRequestLock.Lock()
362 delete(s.outstandingValidationRequests, flow.ID)
363 s.outstandingRequestLock.Unlock()
364 s.cleanupFlow(flow.ID)
365 }()
366
367 if err := flow.Writer.Send(lib.ResponseValidate, req); err != nil {
368 vlog.VI(2).Infof("Failed to send validate response: %v", err)
369 replyChan <- makeListOfErrors(len(cavs), err)
370 }
371
Matt Rosencrantz94502cf2015-03-18 09:43:44 -0700372 // TODO(bprosnitz) Consider using a different timeout than the standard rpc timeout.
Todd Wangf6a06882015-02-27 17:38:01 -0800373 var timeoutChan <-chan time.Time
Matt Rosencrantz317b0c52015-03-24 20:47:01 -0700374 if deadline, ok := ctx.Deadline(); ok {
Todd Wangf6a06882015-02-27 17:38:01 -0800375 timeoutChan = time.After(deadline.Sub(time.Now()))
Benjamin Prosnitze8e2b9b2015-02-24 12:55:25 -0800376 }
Benjamin Prosnitze8e2b9b2015-02-24 12:55:25 -0800377
378 select {
379 case <-timeoutChan:
Matt Rosencrantz317b0c52015-03-24 20:47:01 -0700380 return makeListOfErrors(len(cavs), NewErrCaveatValidationTimeout(ctx))
Benjamin Prosnitze8e2b9b2015-02-24 12:55:25 -0800381 case reply := <-replyChan:
382 if len(reply) != len(cavs) {
383 vlog.VI(2).Infof("Wspr caveat validator received %d results from javascript but expected %d", len(reply), len(cavs))
Matt Rosencrantz317b0c52015-03-24 20:47:01 -0700384 return makeListOfErrors(len(cavs), NewErrInvalidValidationResponseFromJavascript(ctx))
Benjamin Prosnitze8e2b9b2015-02-24 12:55:25 -0800385 }
386
387 return reply
388 }
389}
390
Benjamin Prosnitz2c8c2372015-03-13 12:03:08 -0700391// wsprCaveatValidator validates caveats for javascript.
392// Certain caveats (PublicKeyThirdPartyCaveatX) are intercepted and handled in go.
393// This call validateCavsInJavascript to process the remaining caveats in javascript.
Todd Wang4264e4b2015-04-16 22:43:40 -0700394func (s *Server) wsprCaveatValidator(ctx *context.T, call security.Call, cavs [][]security.Caveat) []error {
Benjamin Prosnitz2c8c2372015-03-13 12:03:08 -0700395 type validationStatus struct {
396 err error
397 isSet bool
398 }
399 valStatus := make([]validationStatus, len(cavs))
400
401 var caveatChainsToValidate [][]security.Caveat
402nextCav:
403 for i, chainCavs := range cavs {
404 var newChainCavs []security.Caveat
405 for _, cav := range chainCavs {
406 switch cav.Id {
407 case security.PublicKeyThirdPartyCaveatX.Id:
Todd Wang4264e4b2015-04-16 22:43:40 -0700408 res := cav.Validate(ctx, call)
Benjamin Prosnitz2c8c2372015-03-13 12:03:08 -0700409 if res != nil {
410 valStatus[i] = validationStatus{
411 err: res,
412 isSet: true,
413 }
414 continue nextCav
415 }
416 default:
417 newChainCavs = append(newChainCavs, cav)
418 }
419 }
420 if len(newChainCavs) == 0 {
421 valStatus[i] = validationStatus{
422 err: nil,
423 isSet: true,
424 }
425 } else {
426 caveatChainsToValidate = append(caveatChainsToValidate, newChainCavs)
427 }
428 }
429
Todd Wang4264e4b2015-04-16 22:43:40 -0700430 jsRes := s.validateCavsInJavascript(ctx, call, caveatChainsToValidate)
Benjamin Prosnitz2c8c2372015-03-13 12:03:08 -0700431
432 outResults := make([]error, len(cavs))
433 jsIndex := 0
434 for i, status := range valStatus {
435 if status.isSet {
436 outResults[i] = status.err
437 } else {
438 outResults[i] = jsRes[jsIndex]
439 jsIndex++
440 }
441 }
442
443 return outResults
444}
445
Todd Wang4264e4b2015-04-16 22:43:40 -0700446func ConvertSecurityCall(helper ServerHelper, ctx *context.T, call security.Call, includeBlessingStrings bool) SecurityCall {
Benjamin Prosnitze8e2b9b2015-02-24 12:55:25 -0800447 var localEndpoint string
Matt Rosencrantz9dce9b22015-03-02 10:48:37 -0800448 if call.LocalEndpoint() != nil {
449 localEndpoint = call.LocalEndpoint().String()
Benjamin Prosnitze8e2b9b2015-02-24 12:55:25 -0800450 }
451 var remoteEndpoint string
Matt Rosencrantz9dce9b22015-03-02 10:48:37 -0800452 if call.RemoteEndpoint() != nil {
453 remoteEndpoint = call.RemoteEndpoint().String()
Benjamin Prosnitze8e2b9b2015-02-24 12:55:25 -0800454 }
Benjamin Prosnitz23bf1a02015-03-30 16:17:04 -0700455 var localBlessings principal.JsBlessings
Matt Rosencrantz9dce9b22015-03-02 10:48:37 -0800456 if !call.LocalBlessings().IsZero() {
Benjamin Prosnitzbf71e962015-04-14 16:43:07 -0700457 localBlessings = *convertBlessingsToHandle(helper, call.LocalBlessings())
Benjamin Prosnitze8e2b9b2015-02-24 12:55:25 -0800458 }
Matt Rosencrantz9dce9b22015-03-02 10:48:37 -0800459 anymtags := make([]*vdl.Value, len(call.MethodTags()))
460 for i, mtag := range call.MethodTags() {
Benjamin Prosnitze8e2b9b2015-02-24 12:55:25 -0800461 anymtags[i] = mtag
462 }
Matt Rosencrantz250558f2015-03-17 11:37:31 -0700463 secCall := SecurityCall{
Matt Rosencrantz9dce9b22015-03-02 10:48:37 -0800464 Method: lib.LowercaseFirstCharacter(call.Method()),
465 Suffix: call.Suffix(),
Benjamin Prosnitze8e2b9b2015-02-24 12:55:25 -0800466 MethodTags: anymtags,
467 LocalEndpoint: localEndpoint,
468 RemoteEndpoint: remoteEndpoint,
469 LocalBlessings: localBlessings,
Benjamin Prosnitzbf71e962015-04-14 16:43:07 -0700470 RemoteBlessings: *convertBlessingsToHandle(helper, call.RemoteBlessings()),
Benjamin Prosnitze8e2b9b2015-02-24 12:55:25 -0800471 }
472 if includeBlessingStrings {
Todd Wang4264e4b2015-04-16 22:43:40 -0700473 secCall.LocalBlessingStrings = security.LocalBlessingNames(ctx, call)
474 secCall.RemoteBlessingStrings, _ = security.RemoteBlessingNames(ctx, call)
Benjamin Prosnitze8e2b9b2015-02-24 12:55:25 -0800475 }
Matt Rosencrantz250558f2015-03-17 11:37:31 -0700476 return secCall
Shyam Jayaramana42622c2015-01-05 16:55:53 -0800477}
478
Todd Wang4264e4b2015-04-16 22:43:40 -0700479type remoteAuth struct {
480 Func func(*context.T, security.Call, int32) error
481 Handle int32
482}
Jiri Simsa78b646f2014-10-08 10:23:05 -0700483
Todd Wang4264e4b2015-04-16 22:43:40 -0700484func (r remoteAuth) Authorize(ctx *context.T, call security.Call) error {
485 return r.Func(ctx, call, r.Handle)
486}
Benjamin Prosnitze8e2b9b2015-02-24 12:55:25 -0800487
Todd Wang4264e4b2015-04-16 22:43:40 -0700488func (s *Server) createRemoteAuthorizer(handle int32) security.Authorizer {
489 return remoteAuth{s.authorizeRemote, handle}
490}
Jiri Simsa78b646f2014-10-08 10:23:05 -0700491
Todd Wang4264e4b2015-04-16 22:43:40 -0700492func (s *Server) authorizeRemote(ctx *context.T, call security.Call, handle int32) error {
493 // Until the tests get fixed, we need to create a security context before
494 // creating the flow because creating the security context creates a flow and
495 // flow ids will be off.
496 securityCall := ConvertSecurityCall(s.helper, ctx, call, true)
Jiri Simsa78b646f2014-10-08 10:23:05 -0700497
Todd Wang4264e4b2015-04-16 22:43:40 -0700498 flow := s.helper.CreateNewFlow(s, nil)
499 replyChan := make(chan error, 1)
500 s.outstandingRequestLock.Lock()
501 s.outstandingAuthRequests[flow.ID] = replyChan
502 s.outstandingRequestLock.Unlock()
503 message := AuthRequest{
504 ServerId: s.id,
505 Handle: handle,
506 Call: securityCall,
Jiri Simsa78b646f2014-10-08 10:23:05 -0700507 }
Todd Wang4264e4b2015-04-16 22:43:40 -0700508 vlog.VI(0).Infof("Sending out auth request for %v, %v", flow.ID, message)
509
510 vomMessage, err := lib.VomEncode(message)
511 if err != nil {
512 replyChan <- verror.Convert(verror.ErrInternal, nil, err)
513 } else if err := flow.Writer.Send(lib.ResponseAuthRequest, vomMessage); err != nil {
514 replyChan <- verror.Convert(verror.ErrInternal, nil, err)
515 }
516
517 err = <-replyChan
518 vlog.VI(0).Infof("going to respond with %v", err)
519 s.outstandingRequestLock.Lock()
520 delete(s.outstandingAuthRequests, flow.ID)
521 s.outstandingRequestLock.Unlock()
522 s.helper.CleanupFlow(flow.ID)
523 return err
Jiri Simsa78b646f2014-10-08 10:23:05 -0700524}
525
Shyam Jayaramanc17abda2015-04-06 16:49:17 -0700526func (s *Server) readStatus() {
527 // A map of names to the last error message sent.
528 lastErrors := map[string]string{}
529 for {
530 status := s.server.Status()
531 for _, mountStatus := range status.Mounts {
532 var errMsg string
533 if mountStatus.LastMountErr != nil {
534 errMsg = mountStatus.LastMountErr.Error()
535 }
536 mountName := mountStatus.Name
537 if lastMessage, ok := lastErrors[mountName]; !ok || errMsg != lastMessage {
538 if errMsg == "" {
539 s.helper.SendLogMessage(
540 lib.LogLevelInfo, "serve: "+mountName+" successfully mounted ")
541 } else {
542 s.helper.SendLogMessage(
543 lib.LogLevelError, "serve: "+mountName+" failed with: "+errMsg)
544 }
545 }
546 lastErrors[mountName] = errMsg
547 }
548 select {
549 case <-time.After(10 * time.Second):
550 continue
551 case <-s.statusClose:
552 return
553 }
554 }
555}
556
Nicolas LaCasse27b57c72014-11-19 13:40:20 -0800557func (s *Server) Serve(name string) error {
Benjamin Prosnitze8e2b9b2015-02-24 12:55:25 -0800558 s.serverStateLock.Lock()
559 defer s.serverStateLock.Unlock()
Jiri Simsa78b646f2014-10-08 10:23:05 -0700560
561 if s.dispatcher == nil {
Matt Rosencrantz99ed6782015-01-27 19:58:34 -0800562 s.dispatcher = newDispatcher(s.id, s, s, s)
Jiri Simsa78b646f2014-10-08 10:23:05 -0700563 }
564
Nicolas LaCasse27b57c72014-11-19 13:40:20 -0800565 if !s.isListening {
566 _, err := s.server.Listen(*s.listenSpec)
Jiri Simsa78b646f2014-10-08 10:23:05 -0700567 if err != nil {
Nicolas LaCasse27b57c72014-11-19 13:40:20 -0800568 return err
Jiri Simsa78b646f2014-10-08 10:23:05 -0700569 }
Nicolas LaCasse27b57c72014-11-19 13:40:20 -0800570 s.isListening = true
Jiri Simsa78b646f2014-10-08 10:23:05 -0700571 }
Cosmos Nicolaou89303d62014-11-02 12:58:11 -0800572 if err := s.server.ServeDispatcher(name, s.dispatcher); err != nil {
Nicolas LaCasse27b57c72014-11-19 13:40:20 -0800573 return err
Jiri Simsa78b646f2014-10-08 10:23:05 -0700574 }
Shyam Jayaramanc17abda2015-04-06 16:49:17 -0700575 s.statusClose = make(chan struct{}, 1)
576 go s.readStatus()
Nicolas LaCasse27b57c72014-11-19 13:40:20 -0800577 return nil
Jiri Simsa78b646f2014-10-08 10:23:05 -0700578}
579
Todd Wangbaf16842015-03-16 14:12:29 -0700580func (s *Server) popServerRequest(id int32) chan *lib.ServerRpcReply {
Benjamin Prosnitze8e2b9b2015-02-24 12:55:25 -0800581 s.outstandingRequestLock.Lock()
582 defer s.outstandingRequestLock.Unlock()
Jiri Simsa78b646f2014-10-08 10:23:05 -0700583 ch := s.outstandingServerRequests[id]
584 delete(s.outstandingServerRequests, id)
Matt Rosencrantz4aabe572014-10-22 09:25:50 -0700585
586 return ch
587}
588
Benjamin Prosnitz86d52282014-12-19 15:48:38 -0800589func (s *Server) HandleServerResponse(id int32, data string) {
Matt Rosencrantz4aabe572014-10-22 09:25:50 -0700590 ch := s.popServerRequest(id)
Jiri Simsa78b646f2014-10-08 10:23:05 -0700591 if ch == nil {
Matt Rosencrantz99ed6782015-01-27 19:58:34 -0800592 vlog.Errorf("unexpected result from JavaScript. No channel "+
Jiri Simsa78b646f2014-10-08 10:23:05 -0700593 "for MessageId: %d exists. Ignoring the results.", id)
Benjamin Prosnitza2ac3b32014-12-12 11:40:31 -0800594 // Ignore unknown responses that don't belong to any channel
Jiri Simsa78b646f2014-10-08 10:23:05 -0700595 return
596 }
Matt Rosencrantz4aabe572014-10-22 09:25:50 -0700597
Jiri Simsa78b646f2014-10-08 10:23:05 -0700598 // Decode the result and send it through the channel
Todd Wangbaf16842015-03-16 14:12:29 -0700599 var reply lib.ServerRpcReply
Benjamin Prosnitza2ac3b32014-12-12 11:40:31 -0800600 if err := lib.VomDecode(data, &reply); err != nil {
601 reply.Err = err
Jiri Simsa78b646f2014-10-08 10:23:05 -0700602 }
603
Matt Rosencrantz99ed6782015-01-27 19:58:34 -0800604 vlog.VI(0).Infof("response received from JavaScript server for "+
Benjamin Prosnitza2ac3b32014-12-12 11:40:31 -0800605 "MessageId %d with result %v", id, reply)
Jiri Simsa78b646f2014-10-08 10:23:05 -0700606 s.helper.CleanupFlow(id)
Shyam Jayaraman07136a72015-04-13 13:34:41 -0700607 if reply.Err != nil {
608 ch <- &reply
609 return
610 }
611 jsBlessingsType := vdl.TypeOf(principal.JsBlessings{})
612 for i, val := range reply.Results {
613 if val.Type() == jsBlessingsType {
614 var jsBlessings principal.JsBlessings
615 if err := vdl.Convert(&jsBlessings, val); err != nil {
616 reply.Err = err
617 break
618 }
619 reply.Results[i] = vdl.ValueOf(
620 s.helper.GetBlessings(jsBlessings.Handle))
621 }
622 }
Benjamin Prosnitza2ac3b32014-12-12 11:40:31 -0800623 ch <- &reply
Jiri Simsa78b646f2014-10-08 10:23:05 -0700624}
625
Benjamin Prosnitz86d52282014-12-19 15:48:38 -0800626func (s *Server) HandleLookupResponse(id int32, data string) {
Jiri Simsa78b646f2014-10-08 10:23:05 -0700627 s.dispatcher.handleLookupResponse(id, data)
628}
629
Benjamin Prosnitz86d52282014-12-19 15:48:38 -0800630func (s *Server) HandleAuthResponse(id int32, data string) {
Benjamin Prosnitze8e2b9b2015-02-24 12:55:25 -0800631 s.outstandingRequestLock.Lock()
Jiri Simsa78b646f2014-10-08 10:23:05 -0700632 ch := s.outstandingAuthRequests[id]
Benjamin Prosnitze8e2b9b2015-02-24 12:55:25 -0800633 s.outstandingRequestLock.Unlock()
Jiri Simsa78b646f2014-10-08 10:23:05 -0700634 if ch == nil {
Matt Rosencrantz99ed6782015-01-27 19:58:34 -0800635 vlog.Errorf("unexpected result from JavaScript. No channel "+
Shyam Jayaramane56df9a2014-11-20 17:38:54 -0800636 "for MessageId: %d exists. Ignoring the results(%s)", id, data)
Suharsh Sivakumar4cc7c2d2015-04-09 15:21:56 -0700637 // Ignore unknown responses that don't belong to any channel
Jiri Simsa78b646f2014-10-08 10:23:05 -0700638 return
639 }
640 // Decode the result and send it through the channel
641 var reply authReply
642 if decoderErr := json.Unmarshal([]byte(data), &reply); decoderErr != nil {
Mike Burrows2ec2bb32015-02-26 15:14:43 -0800643 err := verror.Convert(verror.ErrInternal, nil, decoderErr).(verror.E)
Mike Burrowsb6689c22014-10-08 11:14:15 -0700644 reply = authReply{Err: &err}
Jiri Simsa78b646f2014-10-08 10:23:05 -0700645 }
646
Matt Rosencrantz99ed6782015-01-27 19:58:34 -0800647 vlog.VI(0).Infof("response received from JavaScript server for "+
Jiri Simsa78b646f2014-10-08 10:23:05 -0700648 "MessageId %d with result %v", id, reply)
649 s.helper.CleanupFlow(id)
Mike Burrows2ec2bb32015-02-26 15:14:43 -0800650 // A nil verror.E does not result in an nil error. Instead, we have create
Jiri Simsa78b646f2014-10-08 10:23:05 -0700651 // a variable for the error interface and only set it's value if the struct is non-
652 // nil.
653 var err error
654 if reply.Err != nil {
655 err = reply.Err
656 }
657 ch <- err
658}
659
Benjamin Prosnitze8e2b9b2015-02-24 12:55:25 -0800660func (s *Server) HandleCaveatValidationResponse(id int32, data string) {
661 s.outstandingRequestLock.Lock()
662 ch := s.outstandingValidationRequests[id]
663 s.outstandingRequestLock.Unlock()
664 if ch == nil {
665 vlog.Errorf("unexpected result from JavaScript. No channel "+
666 "for validation response with MessageId: %d exists. Ignoring the results(%s)", id, data)
Suharsh Sivakumar4cc7c2d2015-04-09 15:21:56 -0700667 // Ignore unknown responses that don't belong to any channel
Benjamin Prosnitze8e2b9b2015-02-24 12:55:25 -0800668 return
669 }
670
671 var reply CaveatValidationResponse
672 if err := lib.VomDecode(data, &reply); err != nil {
673 vlog.Errorf("failed to decode validation response %q: error %v", data, err)
674 ch <- []error{}
675 return
676 }
677
678 ch <- reply.Results
679}
680
Jiri Simsa78b646f2014-10-08 10:23:05 -0700681func (s *Server) createFlow() *Flow {
682 return s.helper.CreateNewFlow(s, nil)
683}
684
Benjamin Prosnitz86d52282014-12-19 15:48:38 -0800685func (s *Server) cleanupFlow(id int32) {
Jiri Simsa78b646f2014-10-08 10:23:05 -0700686 s.helper.CleanupFlow(id)
687}
688
Matt Rosencrantz94502cf2015-03-18 09:43:44 -0700689func (s *Server) createInvoker(handle int32, sig []signature.Interface, hasGlobber bool) (rpc.Invoker, error) {
Jiri Simsa78b646f2014-10-08 10:23:05 -0700690 remoteInvokeFunc := s.createRemoteInvokerFunc(handle)
Shyam Jayaramaneb10b9b2015-01-12 12:23:20 -0800691 var globFunc remoteGlobFunc
692 if hasGlobber {
693 globFunc = s.createRemoteGlobFunc(handle)
694 }
695 return newInvoker(sig, remoteInvokeFunc, globFunc), nil
Jiri Simsa78b646f2014-10-08 10:23:05 -0700696}
697
Benjamin Prosnitz86d52282014-12-19 15:48:38 -0800698func (s *Server) createAuthorizer(handle int32, hasAuthorizer bool) (security.Authorizer, error) {
Jiri Simsa78b646f2014-10-08 10:23:05 -0700699 if hasAuthorizer {
Todd Wang4264e4b2015-04-16 22:43:40 -0700700 return s.createRemoteAuthorizer(handle), nil
Jiri Simsa78b646f2014-10-08 10:23:05 -0700701 }
Asim Shankar8572f6c2014-10-28 15:24:17 -0700702 return nil, nil
Jiri Simsa78b646f2014-10-08 10:23:05 -0700703}
704
705func (s *Server) Stop() {
Mike Burrows2ec2bb32015-02-26 15:14:43 -0800706 stdErr := verror.New(verror.ErrTimeout, nil).(verror.E)
Todd Wangbaf16842015-03-16 14:12:29 -0700707 result := lib.ServerRpcReply{
Benjamin Prosnitza2ac3b32014-12-12 11:40:31 -0800708 Results: nil,
Mike Burrowsb6689c22014-10-08 11:14:15 -0700709 Err: &stdErr,
Jiri Simsa78b646f2014-10-08 10:23:05 -0700710 }
Benjamin Prosnitze8e2b9b2015-02-24 12:55:25 -0800711 s.serverStateLock.Lock()
Nicolas LaCassee3867dc2015-02-05 14:44:53 -0800712
Shyam Jayaramanc17abda2015-04-06 16:49:17 -0700713 if s.statusClose != nil {
714 close(s.statusClose)
715 }
Nicolas LaCassee3867dc2015-02-05 14:44:53 -0800716 if s.dispatcher != nil {
717 s.dispatcher.Cleanup()
718 }
719
720 for _, ch := range s.outstandingAuthRequests {
721 ch <- fmt.Errorf("Cleaning up server")
722 }
Nicolas LaCassee3867dc2015-02-05 14:44:53 -0800723
Jiri Simsa78b646f2014-10-08 10:23:05 -0700724 for _, ch := range s.outstandingServerRequests {
725 select {
726 case ch <- &result:
727 default:
728 }
729 }
Benjamin Prosnitze8e2b9b2015-02-24 12:55:25 -0800730 s.outstandingRequestLock.Lock()
731 s.outstandingAuthRequests = make(map[int32]chan error)
Todd Wangbaf16842015-03-16 14:12:29 -0700732 s.outstandingServerRequests = make(map[int32]chan *lib.ServerRpcReply)
Benjamin Prosnitze8e2b9b2015-02-24 12:55:25 -0800733 s.outstandingRequestLock.Unlock()
734 s.serverStateLock.Unlock()
Jiri Simsa78b646f2014-10-08 10:23:05 -0700735 s.server.Stop()
Matt Rosencrantz317b0c52015-03-24 20:47:01 -0700736
Suharsh Sivakumar4cc7c2d2015-04-09 15:21:56 -0700737 // Only clear the validation requests map after stopping. Clearing them before
738 // can cause the publisher to get stuck waiting for a caveat validation that
739 // will never be answered, which prevents the server from stopping.
Matt Rosencrantz317b0c52015-03-24 20:47:01 -0700740 s.serverStateLock.Lock()
741 s.outstandingRequestLock.Lock()
742 s.outstandingValidationRequests = make(map[int32]chan []error)
743 s.outstandingRequestLock.Unlock()
744 s.serverStateLock.Unlock()
Jiri Simsa78b646f2014-10-08 10:23:05 -0700745}
Ali Ghassemi1008bbe2014-11-07 16:36:08 -0800746
747func (s *Server) AddName(name string) error {
748 return s.server.AddName(name)
749}
750
Cosmos Nicolaoub1a41af2015-01-25 22:13:40 -0800751func (s *Server) RemoveName(name string) {
752 s.server.RemoveName(name)
Ali Ghassemi1008bbe2014-11-07 16:36:08 -0800753}