blob: 86f57f4ec6f6fb37875739f9e3407fbd04741a4c [file] [log] [blame]
Jiri Simsad7616c92015-03-24 23:44:30 -07001// Copyright 2015 The Vanadium Authors. All rights reserved.
2// Use of this source code is governed by a BSD-style
3// license that can be found in the LICENSE file.
4
Jiri Simsa5293dcb2014-05-10 09:56:38 -07005package impl
6
7import (
Bogdan Capritac87a9142014-07-21 10:38:13 -07008 "fmt"
Gautham82bb9952014-08-28 14:11:51 -07009 "os"
Robert Kroegeracc778b2014-11-03 17:17:21 -080010 "path"
Gautham82bb9952014-08-28 14:11:51 -070011 "path/filepath"
Bogdan Caprita4d67c042014-08-19 10:41:19 -070012 "strings"
Gautham6fe61e52014-09-16 13:58:17 -070013 "sync"
Jiri Simsa24e87aa2014-06-09 09:27:34 -070014
Jiri Simsa6ac95222015-02-23 16:11:49 -080015 "v.io/v23"
16 "v.io/v23/context"
Jiri Simsa6ac95222015-02-23 16:11:49 -080017 "v.io/v23/naming"
Matt Rosencrantz94502cf2015-03-18 09:43:44 -070018 "v.io/v23/rpc"
Jiri Simsa6ac95222015-02-23 16:11:49 -080019 "v.io/v23/security"
Todd Wang387d8a42015-03-30 17:09:05 -070020 "v.io/v23/security/access"
Todd Wang94c9d0b2015-04-01 14:27:00 -070021 "v.io/v23/services/device"
22 "v.io/v23/services/pprof"
23 "v.io/v23/services/stats"
gauthamtfd1e34e2015-03-05 15:30:52 -080024 "v.io/v23/vdl"
25 "v.io/v23/vdlroot/signature"
Jiri Simsa6ac95222015-02-23 16:11:49 -080026 "v.io/v23/verror"
Jiri Simsa337af232015-02-27 14:36:46 -080027 "v.io/x/lib/vlog"
Todd Wang8123b5e2015-05-14 18:44:43 -070028 "v.io/x/ref"
Todd Wangb3511492015-04-07 23:32:34 -070029 "v.io/x/ref/services/agent/keymgr"
30 s_device "v.io/x/ref/services/device"
31 "v.io/x/ref/services/device/internal/config"
Todd Wangfb939032015-04-08 16:42:44 -070032 "v.io/x/ref/services/internal/logreaderlib"
Adam Sadovskya4d4a692015-04-20 11:36:49 -070033 "v.io/x/ref/services/internal/pathperms"
Jiri Simsa5293dcb2014-05-10 09:56:38 -070034)
35
Bogdan Caprita2b219362014-12-09 17:03:33 -080036// internalState wraps state shared between different device manager
Bogdan Caprita4d67c042014-08-19 10:41:19 -070037// invocations.
38type internalState struct {
Bogdan Caprita29a3b352015-01-16 16:28:49 -080039 callback *callbackState
40 updating *updatingState
41 securityAgent *securityAgentState
42 restartHandler func()
Robin Thellend9299b782015-02-03 08:42:46 -080043 testMode bool
Bogdan Caprita4d67c042014-08-19 10:41:19 -070044}
45
Bogdan Caprita2b219362014-12-09 17:03:33 -080046// dispatcher holds the state of the device manager dispatcher.
Jiri Simsa5293dcb2014-05-10 09:56:38 -070047type dispatcher struct {
Bogdan Caprita4d67c042014-08-19 10:41:19 -070048 // internal holds the state that persists across RPC method invocations.
Bogdan Capritac87a9142014-07-21 10:38:13 -070049 internal *internalState
Bogdan Caprita2b219362014-12-09 17:03:33 -080050 // config holds the device manager's (immutable) configuration state.
Bogdan Caprita4d67c042014-08-19 10:41:19 -070051 config *config.State
Gautham6fe61e52014-09-16 13:58:17 -070052 // dispatcherMutex is a lock for coordinating concurrent access to some
53 // dispatcher methods.
Bogdan Caprita7f491672014-11-13 14:51:08 -080054 mu sync.RWMutex
55 // TODO(rjkroege): Consider moving this inside internal.
Adam Sadovskya4d4a692015-04-20 11:36:49 -070056 uat BlessingSystemAssociationStore
57 permsStore *pathperms.PathStore
Robin Thellendacaa4322015-02-05 11:00:28 -080058 // Namespace
59 mtAddress string // The address of the local mounttable.
Robert Kroeger936853a2015-01-28 17:42:55 -080060 // reap is the app process monitoring subsystem.
61 reap reaper
Jiri Simsa5293dcb2014-05-10 09:56:38 -070062}
63
Matt Rosencrantz94502cf2015-03-18 09:43:44 -070064var _ rpc.Dispatcher = (*dispatcher)(nil)
Benjamin Prosnitzfdfbf7b2014-10-08 09:47:21 -070065
Bogdan Caprita4d67c042014-08-19 10:41:19 -070066const (
67 appsSuffix = "apps"
Bogdan Caprita9c4aa222014-12-10 14:46:30 -080068 deviceSuffix = "device"
Bogdan Caprita4d67c042014-08-19 10:41:19 -070069 configSuffix = "cfg"
Todd Wang34ed4c62014-11-26 15:15:52 -080070
Todd Wangcd4b3cc2015-04-06 16:42:02 -070071 pkgPath = "v.io/x/ref/services/device/internal/impl"
Bogdan Caprita4d67c042014-08-19 10:41:19 -070072)
73
74var (
Asim Shankar23dac322015-02-14 12:42:26 -080075 ErrInvalidSuffix = verror.Register(pkgPath+".InvalidSuffix", verror.NoRetry, "{1:}{2:} invalid suffix{:_}")
76 ErrOperationFailed = verror.Register(pkgPath+".OperationFailed", verror.NoRetry, "{1:}{2:} operation failed{:_}")
77 ErrOperationInProgress = verror.Register(pkgPath+".OperationInProgress", verror.NoRetry, "{1:}{2:} operation in progress{:_}")
78 ErrAppTitleMismatch = verror.Register(pkgPath+".AppTitleMismatch", verror.NoRetry, "{1:}{2:} app title mismatch{:_}")
79 ErrUpdateNoOp = verror.Register(pkgPath+".UpdateNoOp", verror.NoRetry, "{1:}{2:} update is no op{:_}")
80 ErrInvalidOperation = verror.Register(pkgPath+".InvalidOperation", verror.NoRetry, "{1:}{2:} invalid operation{:_}")
81 ErrInvalidBlessing = verror.Register(pkgPath+".InvalidBlessing", verror.NoRetry, "{1:}{2:} invalid blessing{:_}")
82 ErrInvalidPairingToken = verror.Register(pkgPath+".InvalidPairingToken", verror.NoRetry, "{1:}{2:} pairing token mismatch{:_}")
83 ErrUnclaimedDevice = verror.Register(pkgPath+".UnclaimedDevice", verror.NoRetry, "{1:}{2:} device needs to be claimed first")
84 ErrDeviceAlreadyClaimed = verror.Register(pkgPath+".AlreadyClaimed", verror.NoRetry, "{1:}{2:} device has already been claimed")
Mike Burrows39bbaaf2015-03-24 11:27:32 -070085
86 errInvalidConfig = verror.Register(pkgPath+".errInvalidConfig", verror.NoRetry, "{1:}{2:} invalid config {3}{:_}")
87 errCantCreateAccountStore = verror.Register(pkgPath+".errCantCreateAccountStore", verror.NoRetry, "{1:}{2:} cannot create persistent store for identity to system account associations{:_}")
88 errCantCreateAppWatcher = verror.Register(pkgPath+".errCantCreateAppWatcher", verror.NoRetry, "{1:}{2:} cannot create app status watcher{:_}")
89 errNewAgentFailed = verror.Register(pkgPath+".errNewAgentFailed", verror.NoRetry, "{1:}{2:} NewAgent() failed{:_}")
Bogdan Caprita4d67c042014-08-19 10:41:19 -070090)
91
Matt Rosencrantz94502cf2015-03-18 09:43:44 -070092// NewClaimableDispatcher returns an rpc.Dispatcher that allows the device to
Asim Shankar23dac322015-02-14 12:42:26 -080093// be Claimed if it hasn't been already and a channel that will be closed once
94// the device has been claimed.
95//
96// It returns (nil, nil) if the device is no longer claimable.
Matt Rosencrantz94502cf2015-03-18 09:43:44 -070097func NewClaimableDispatcher(ctx *context.T, config *config.State, pairingToken string) (rpc.Dispatcher, <-chan struct{}) {
Asim Shankar23dac322015-02-14 12:42:26 -080098 var (
Adam Sadovskya4d4a692015-04-20 11:36:49 -070099 permsDir = PermsDir(config)
100 permsStore = pathperms.NewPathStore(v23.GetPrincipal(ctx))
Asim Shankar23dac322015-02-14 12:42:26 -0800101 )
Adam Sadovskya4d4a692015-04-20 11:36:49 -0700102 if _, _, err := permsStore.Get(permsDir); !os.IsNotExist(err) {
Asim Shankar23dac322015-02-14 12:42:26 -0800103 return nil, nil
104 }
105 // The device is claimable only if Claim hasn't been called before. The
Adam Sadovskya4d4a692015-04-20 11:36:49 -0700106 // existence of the Permissions file is an indication of a successful prior
Asim Shankar23dac322015-02-14 12:42:26 -0800107 // call to Claim.
108 notify := make(chan struct{})
Adam Sadovskya4d4a692015-04-20 11:36:49 -0700109 return &claimable{token: pairingToken, permsStore: permsStore, permsDir: permsDir, notify: notify}, notify
Asim Shankar23dac322015-02-14 12:42:26 -0800110}
111
Bogdan Caprita2b219362014-12-09 17:03:33 -0800112// NewDispatcher is the device manager dispatcher factory.
Adam Sadovskya4d4a692015-04-20 11:36:49 -0700113func NewDispatcher(ctx *context.T, config *config.State, mtAddress string, testMode bool, restartHandler func(), permStore *pathperms.PathStore) (rpc.Dispatcher, error) {
Bogdan Capritac87a9142014-07-21 10:38:13 -0700114 if err := config.Validate(); err != nil {
Mike Burrows39bbaaf2015-03-24 11:27:32 -0700115 return nil, verror.New(errInvalidConfig, ctx, config, err)
Bogdan Capritac87a9142014-07-21 10:38:13 -0700116 }
Robert Kroeger1cb4a0d2014-10-20 11:55:38 -0700117 uat, err := NewBlessingSystemAssociationStore(config.Root)
118 if err != nil {
Mike Burrows39bbaaf2015-03-24 11:27:32 -0700119 return nil, verror.New(errCantCreateAccountStore, ctx, err)
Robert Kroeger1cb4a0d2014-10-20 11:55:38 -0700120 }
Robert Kroeger74645172015-02-11 14:22:21 -0800121 reap, err := newReaper(ctx, config.Root)
122 if err != nil {
Mike Burrows39bbaaf2015-03-24 11:27:32 -0700123 return nil, verror.New(errCantCreateAppWatcher, ctx, err)
Robert Kroeger74645172015-02-11 14:22:21 -0800124 }
Arup Mukherjee746444f2015-04-16 19:13:24 -0700125 initSuidHelper(config.Helper)
Gautham82bb9952014-08-28 14:11:51 -0700126 d := &dispatcher{
Bogdan Capritac87a9142014-07-21 10:38:13 -0700127 internal: &internalState{
Bogdan Caprita29a3b352015-01-16 16:28:49 -0800128 callback: newCallbackState(config.Name),
129 updating: newUpdatingState(),
130 restartHandler: restartHandler,
Robin Thellend9299b782015-02-03 08:42:46 -0800131 testMode: testMode,
Jiri Simsa70c32052014-06-18 11:38:21 -0700132 },
Adam Sadovskya4d4a692015-04-20 11:36:49 -0700133 config: config,
134 uat: uat,
135 permsStore: permStore,
136 mtAddress: mtAddress,
137 reap: reap,
Gautham82bb9952014-08-28 14:11:51 -0700138 }
Robert Kroegere95ed6d2015-01-14 17:41:04 -0800139
Bogdan Caprita7f491672014-11-13 14:51:08 -0800140 // If we're in 'security agent mode', set up the key manager agent.
Todd Wang8123b5e2015-05-14 18:44:43 -0700141 if len(os.Getenv(ref.EnvAgentEndpoint)) > 0 {
Bogdan Caprita7f491672014-11-13 14:51:08 -0800142 if keyMgrAgent, err := keymgr.NewAgent(); err != nil {
Mike Burrows39bbaaf2015-03-24 11:27:32 -0700143 return nil, verror.New(errNewAgentFailed, ctx, err)
Bogdan Caprita7f491672014-11-13 14:51:08 -0800144 } else {
145 d.internal.securityAgent = &securityAgentState{
146 keyMgrAgent: keyMgrAgent,
147 }
148 }
149 }
Robin Thellend9299b782015-02-03 08:42:46 -0800150 if testMode {
151 return &testModeDispatcher{d}, nil
152 }
Gautham82bb9952014-08-28 14:11:51 -0700153 return d, nil
154}
155
Robert Kroeger936853a2015-01-28 17:42:55 -0800156// Shutdown the dispatcher.
Matt Rosencrantz94502cf2015-03-18 09:43:44 -0700157func Shutdown(rpcd rpc.Dispatcher) {
158 switch d := rpcd.(type) {
Robert Kroeger936853a2015-01-28 17:42:55 -0800159 case *dispatcher:
160 d.reap.shutdown()
161 case *testModeDispatcher:
162 Shutdown(d.realDispatcher)
163 default:
Matt Rosencrantz94502cf2015-03-18 09:43:44 -0700164 vlog.Panicf("%v not a supported dispatcher type.", rpcd)
Robert Kroeger936853a2015-01-28 17:42:55 -0800165 }
166}
167
gauthamtfd1e34e2015-03-05 15:30:52 -0800168// Logging invoker that logs any error messages before returning.
Matt Rosencrantz94502cf2015-03-18 09:43:44 -0700169func newLoggingInvoker(obj interface{}) (rpc.Invoker, error) {
170 if invoker, ok := obj.(rpc.Invoker); ok {
gauthamtfd1e34e2015-03-05 15:30:52 -0800171 return &loggingInvoker{invoker}, nil
172 }
Matt Rosencrantz94502cf2015-03-18 09:43:44 -0700173 invoker, err := rpc.ReflectInvoker(obj)
gauthamtfd1e34e2015-03-05 15:30:52 -0800174 if err != nil {
Matt Rosencrantz94502cf2015-03-18 09:43:44 -0700175 vlog.Errorf("rpc.ReflectInvoker returned error: %v", err)
gauthamtfd1e34e2015-03-05 15:30:52 -0800176 return nil, err
177 }
178 return &loggingInvoker{invoker}, nil
179}
180
181type loggingInvoker struct {
Matt Rosencrantz94502cf2015-03-18 09:43:44 -0700182 invoker rpc.Invoker
gauthamtfd1e34e2015-03-05 15:30:52 -0800183}
184
185func (l *loggingInvoker) Prepare(method string, numArgs int) (argptrs []interface{}, tags []*vdl.Value, err error) {
186 argptrs, tags, err = l.invoker.Prepare(method, numArgs)
187 if err != nil {
188 vlog.Errorf("Prepare(%s %d) returned error: %v", method, numArgs, err)
189 }
190 return
191}
192
Todd Wang54feabe2015-04-15 23:38:26 -0700193func (l *loggingInvoker) Invoke(ctx *context.T, call rpc.StreamServerCall, method string, argptrs []interface{}) (results []interface{}, err error) {
194 results, err = l.invoker.Invoke(ctx, call, method, argptrs)
gauthamtfd1e34e2015-03-05 15:30:52 -0800195 if err != nil {
196 vlog.Errorf("Invoke(method:%s argptrs:%v) returned error: %v", method, argptrs, err)
197 }
198 return
199}
200
Todd Wang54feabe2015-04-15 23:38:26 -0700201func (l *loggingInvoker) Signature(ctx *context.T, call rpc.ServerCall) ([]signature.Interface, error) {
202 sig, err := l.invoker.Signature(ctx, call)
gauthamtfd1e34e2015-03-05 15:30:52 -0800203 if err != nil {
204 vlog.Errorf("Signature returned error: %v", err)
205 }
206 return sig, err
207}
208
Todd Wang54feabe2015-04-15 23:38:26 -0700209func (l *loggingInvoker) MethodSignature(ctx *context.T, call rpc.ServerCall, method string) (signature.Method, error) {
210 methodSig, err := l.invoker.MethodSignature(ctx, call, method)
gauthamtfd1e34e2015-03-05 15:30:52 -0800211 if err != nil {
212 vlog.Errorf("MethodSignature(%s) returned error: %v", method, err)
213 }
214 return methodSig, err
215}
216
Matt Rosencrantz94502cf2015-03-18 09:43:44 -0700217func (l *loggingInvoker) Globber() *rpc.GlobState {
gauthamtfd1e34e2015-03-05 15:30:52 -0800218 return l.invoker.Globber()
219}
220
Jiri Simsa5293dcb2014-05-10 09:56:38 -0700221// DISPATCHER INTERFACE IMPLEMENTATION
Robin Thellenda02fe8f2014-11-19 09:58:29 -0800222func (d *dispatcher) Lookup(suffix string) (interface{}, security.Authorizer, error) {
gauthamtfd1e34e2015-03-05 15:30:52 -0800223 invoker, auth, err := d.internalLookup(suffix)
224 if err != nil {
225 return nil, nil, err
226 }
227 loggingInvoker, err := newLoggingInvoker(invoker)
228 if err != nil {
229 return nil, nil, err
230 }
231 return loggingInvoker, auth, nil
232}
233
Adam Sadovskya4d4a692015-04-20 11:36:49 -0700234func newTestableHierarchicalAuth(testMode bool, rootDir, childDir string, get pathperms.PermsGetter) (security.Authorizer, error) {
Robert Kroeger7a8b2222015-03-06 07:58:57 -0800235 if testMode {
Adam Sadovskya4d4a692015-04-20 11:36:49 -0700236 // In test mode, the device manager will not be able to read the
237 // Permissions, because they were signed with the key of the real device
238 // manager. It's not a problem because the testModeDispatcher overrides the
239 // authorizer anyway.
Robert Kroeger7a8b2222015-03-06 07:58:57 -0800240 return nil, nil
241 }
Adam Sadovskya4d4a692015-04-20 11:36:49 -0700242 return pathperms.NewHierarchicalAuthorizer(rootDir, childDir, get)
Robert Kroeger7a8b2222015-03-06 07:58:57 -0800243}
244
gauthamtfd1e34e2015-03-05 15:30:52 -0800245func (d *dispatcher) internalLookup(suffix string) (interface{}, security.Authorizer, error) {
Bogdan Caprita4d67c042014-08-19 10:41:19 -0700246 components := strings.Split(suffix, "/")
247 for i := 0; i < len(components); i++ {
248 if len(components[i]) == 0 {
249 components = append(components[:i], components[i+1:]...)
250 i--
251 }
252 }
Robin Thellend9299b782015-02-03 08:42:46 -0800253
Adam Sadovskya4d4a692015-04-20 11:36:49 -0700254 // TODO(rjkroege): Permit the root Permissions to diverge for the device and
255 // app sub-namespaces of the device manager after claiming.
256 auth, err := newTestableHierarchicalAuth(d.internal.testMode, PermsDir(d.config), PermsDir(d.config), d.permsStore)
Robert Kroegere95ed6d2015-01-14 17:41:04 -0800257 if err != nil {
258 return nil, nil, err
259 }
260
Bogdan Caprita4d67c042014-08-19 10:41:19 -0700261 if len(components) == 0 {
Matt Rosencrantz94502cf2015-03-18 09:43:44 -0700262 return rpc.ChildrenGlobberInvoker(deviceSuffix, appsSuffix), auth, nil
Bogdan Caprita4d67c042014-08-19 10:41:19 -0700263 }
Bogdan Caprita2b219362014-12-09 17:03:33 -0800264 // The implementation of the device manager is split up into several
Bogdan Caprita4d67c042014-08-19 10:41:19 -0700265 // invokers, which are instantiated depending on the receiver name
266 // prefix.
Bogdan Caprita4d67c042014-08-19 10:41:19 -0700267 switch components[0] {
Bogdan Caprita2b219362014-12-09 17:03:33 -0800268 case deviceSuffix:
Bogdan Capritaa456f472014-12-10 10:18:03 -0800269 receiver := device.DeviceServer(&deviceService{
Bogdan Caprita29a3b352015-01-16 16:28:49 -0800270 callback: d.internal.callback,
271 updating: d.internal.updating,
272 restartHandler: d.internal.restartHandler,
273 config: d.config,
274 disp: d,
275 uat: d.uat,
Robin Thellend9299b782015-02-03 08:42:46 -0800276 securityAgent: d.internal.securityAgent,
Bogdan Caprita4d67c042014-08-19 10:41:19 -0700277 })
Robert Kroegere95ed6d2015-01-14 17:41:04 -0800278 return receiver, auth, nil
Bogdan Caprita4d67c042014-08-19 10:41:19 -0700279 case appsSuffix:
Robin Thellend8a0f04f2014-11-17 10:40:24 -0800280 // Requests to apps/*/*/*/logs are handled locally by LogFileService.
Robin Thellendb9dd9bb2014-10-29 13:54:08 -0700281 // Requests to apps/*/*/*/pprof are proxied to the apps' __debug/pprof object.
282 // Requests to apps/*/*/*/stats are proxied to the apps' __debug/stats object.
Robin Thellend9bc8fcb2014-11-17 10:23:04 -0800283 // Everything else is handled by the Application server.
Robin Thellendac7128c2014-11-11 09:58:28 -0800284 if len(components) >= 5 {
Robin Thellend4c5266e2014-10-27 13:19:29 -0700285 appInstanceDir, err := instanceDir(d.config.Root, components[1:4])
286 if err != nil {
287 return nil, nil, err
288 }
Robin Thellendb9dd9bb2014-10-29 13:54:08 -0700289 switch kind := components[4]; kind {
290 case "logs":
291 logsDir := filepath.Join(appInstanceDir, "logs")
292 suffix := naming.Join(components[5:]...)
Adam Sadovskya4d4a692015-04-20 11:36:49 -0700293 appSpecificAuthorizer, err := newAppSpecificAuthorizer(auth, d.config, components[1:], d.permsStore)
Robert Kroeger8f914be2015-03-14 16:32:37 -0700294 if err != nil {
295 return nil, nil, err
296 }
Todd Wang1ea8f192015-04-03 17:31:51 -0700297 return logreaderlib.NewLogFileService(logsDir, suffix), appSpecificAuthorizer, nil
Robin Thellendb9dd9bb2014-10-29 13:54:08 -0700298 case "pprof", "stats":
gauthamtfd1e34e2015-03-05 15:30:52 -0800299 info, err := loadInstanceInfo(nil, appInstanceDir)
Robin Thellendb9dd9bb2014-10-29 13:54:08 -0700300 if err != nil {
301 return nil, nil, err
302 }
Bogdan Caprita2b050322015-04-17 09:04:03 -0700303 if !instanceStateIs(appInstanceDir, device.InstanceStateRunning) {
Todd Wangff73e1f2015-02-10 21:45:52 -0800304 return nil, nil, verror.New(ErrInvalidSuffix, nil)
Robin Thellendb9dd9bb2014-10-29 13:54:08 -0700305 }
Matt Rosencrantz94502cf2015-03-18 09:43:44 -0700306 var desc []rpc.InterfaceDesc
Todd Wangf519f8f2015-01-21 10:07:41 -0800307 switch kind {
308 case "pprof":
309 desc = pprof.PProfServer(nil).Describe__()
310 case "stats":
311 desc = stats.StatsServer(nil).Describe__()
Robin Thellendb9dd9bb2014-10-29 13:54:08 -0700312 }
313 suffix := naming.Join("__debug", naming.Join(components[4:]...))
314 remote := naming.JoinAddressName(info.AppCycleMgrName, suffix)
Robert Kroeger16ee22b2015-03-12 14:57:09 -0700315
316 // Use hierarchical auth with debugacls under debug access.
Adam Sadovskya4d4a692015-04-20 11:36:49 -0700317 appSpecificAuthorizer, err := newAppSpecificAuthorizer(auth, d.config, components[1:], d.permsStore)
Robert Kroeger16ee22b2015-03-12 14:57:09 -0700318 if err != nil {
319 return nil, nil, err
320 }
321 return newProxyInvoker(remote, access.Debug, desc), appSpecificAuthorizer, nil
Robin Thellendb9dd9bb2014-10-29 13:54:08 -0700322 }
Robin Thellend4c5266e2014-10-27 13:19:29 -0700323 }
Bogdan Capritaa456f472014-12-10 10:18:03 -0800324 receiver := device.ApplicationServer(&appService{
Robert Kroeger450fdf12015-05-19 14:40:42 -0700325 config: d.config,
326 suffix: components[1:],
327 uat: d.uat,
328 permsStore: d.permsStore,
329 reap: d.reap,
330 appStart: &appStartState{
331 callback: d.internal.callback,
332 securityAgent: d.internal.securityAgent,
333 mtAddress: d.mtAddress,
334 },
Bogdan Caprita4d67c042014-08-19 10:41:19 -0700335 })
Adam Sadovskya4d4a692015-04-20 11:36:49 -0700336 appSpecificAuthorizer, err := newAppSpecificAuthorizer(auth, d.config, components[1:], d.permsStore)
Robert Kroegeracc778b2014-11-03 17:17:21 -0800337 if err != nil {
338 return nil, nil, err
339 }
Cosmos Nicolaou710daa22014-11-11 19:39:18 -0800340 return receiver, appSpecificAuthorizer, nil
Bogdan Caprita4d67c042014-08-19 10:41:19 -0700341 case configSuffix:
342 if len(components) != 2 {
Todd Wangff73e1f2015-02-10 21:45:52 -0800343 return nil, nil, verror.New(ErrInvalidSuffix, nil)
Bogdan Caprita4d67c042014-08-19 10:41:19 -0700344 }
Todd Wangcd4b3cc2015-04-06 16:42:02 -0700345 receiver := s_device.ConfigServer(&configService{
Bogdan Caprita4d67c042014-08-19 10:41:19 -0700346 callback: d.internal.callback,
347 suffix: components[1],
348 })
Bogdan Capritab9501d12014-10-10 15:02:03 -0700349 // The nil authorizer ensures that only principals blessed by
Bogdan Caprita2b219362014-12-09 17:03:33 -0800350 // the device manager can talk back to it. All apps started by
351 // the device manager should fall in that category.
Bogdan Capritab9501d12014-10-10 15:02:03 -0700352 //
353 // TODO(caprita,rjkroege): We should further refine this, by
354 // only allowing the app to update state referring to itself
355 // (and not other apps).
Cosmos Nicolaou710daa22014-11-11 19:39:18 -0800356 return receiver, nil, nil
Bogdan Caprita4d67c042014-08-19 10:41:19 -0700357 default:
Todd Wangff73e1f2015-02-10 21:45:52 -0800358 return nil, nil, verror.New(ErrInvalidSuffix, nil)
Bogdan Caprita4d67c042014-08-19 10:41:19 -0700359 }
Jiri Simsa24e87aa2014-06-09 09:27:34 -0700360}
Robert Kroegeracc778b2014-11-03 17:17:21 -0800361
Robin Thellend9299b782015-02-03 08:42:46 -0800362// testModeDispatcher is a wrapper around the real dispatcher. It returns the
363// exact same object as the real dispatcher, but the authorizer only allows
Bogdan Caprita2b050322015-04-17 09:04:03 -0700364// calls to "device".Delete().
Robin Thellend9299b782015-02-03 08:42:46 -0800365type testModeDispatcher struct {
Matt Rosencrantz94502cf2015-03-18 09:43:44 -0700366 realDispatcher rpc.Dispatcher
Robin Thellend9299b782015-02-03 08:42:46 -0800367}
368
369func (d *testModeDispatcher) Lookup(suffix string) (interface{}, security.Authorizer, error) {
370 obj, _, err := d.realDispatcher.Lookup(suffix)
371 return obj, d, err
372}
373
Todd Wang4264e4b2015-04-16 22:43:40 -0700374func (testModeDispatcher) Authorize(ctx *context.T, call security.Call) error {
Bogdan Caprita2b050322015-04-17 09:04:03 -0700375 if call.Suffix() == deviceSuffix && call.Method() == "Delete" {
Matt Rosencrantz9dce9b22015-03-02 10:48:37 -0800376 vlog.Infof("testModeDispatcher.Authorize: Allow %q.%s()", call.Suffix(), call.Method())
Robin Thellend9299b782015-02-03 08:42:46 -0800377 return nil
378 }
Matt Rosencrantz9dce9b22015-03-02 10:48:37 -0800379 vlog.Infof("testModeDispatcher.Authorize: Reject %q.%s()", call.Suffix(), call.Method())
Todd Wangff73e1f2015-02-10 21:45:52 -0800380 return verror.New(ErrInvalidSuffix, nil)
Robin Thellend9299b782015-02-03 08:42:46 -0800381}
382
Adam Sadovskya4d4a692015-04-20 11:36:49 -0700383func newAppSpecificAuthorizer(sec security.Authorizer, config *config.State, suffix []string, getter pathperms.PermsGetter) (security.Authorizer, error) {
Bogdan Caprita2b219362014-12-09 17:03:33 -0800384 // TODO(rjkroege): This does not support <appname>.Start() to start all
385 // instances. Correct this.
Robert Kroegeracc778b2014-11-03 17:17:21 -0800386
Adam Sadovskya4d4a692015-04-20 11:36:49 -0700387 // If we are attempting a method invocation against "apps/", we use the root
388 // Permissions.
Robert Kroegeracc778b2014-11-03 17:17:21 -0800389 if len(suffix) == 0 || len(suffix) == 1 {
390 return sec, nil
391 }
Adam Sadovskya4d4a692015-04-20 11:36:49 -0700392 // Otherwise, we require a per-installation and per-instance Permissions file.
Robert Kroegeracc778b2014-11-03 17:17:21 -0800393 if len(suffix) == 2 {
394 p, err := installationDirCore(suffix, config.Root)
395 if err != nil {
gauthamtfd1e34e2015-03-05 15:30:52 -0800396 return nil, verror.New(ErrOperationFailed, nil, fmt.Sprintf("newAppSpecificAuthorizer failed: %v", err))
Robert Kroegeracc778b2014-11-03 17:17:21 -0800397 }
Adam Sadovskya4d4a692015-04-20 11:36:49 -0700398 return pathperms.NewHierarchicalAuthorizer(PermsDir(config), path.Join(p, "acls"), getter)
Asim Shankar68885192014-11-26 12:48:35 -0800399 }
Adam Sadovskya4d4a692015-04-20 11:36:49 -0700400 // Use the special debugacls for instance/logs, instance/pprof, instance/stats.
Robert Kroeger16ee22b2015-03-12 14:57:09 -0700401 if len(suffix) > 3 && (suffix[3] == "logs" || suffix[3] == "pprof" || suffix[3] == "stats") {
402 p, err := instanceDir(config.Root, suffix[0:3])
403 if err != nil {
404 return nil, verror.New(ErrOperationFailed, nil, fmt.Sprintf("newAppSpecificAuthorizer failed: %v", err))
405 }
Adam Sadovskya4d4a692015-04-20 11:36:49 -0700406 return pathperms.NewHierarchicalAuthorizer(PermsDir(config), path.Join(p, "debugacls"), getter)
Robert Kroeger16ee22b2015-03-12 14:57:09 -0700407 }
408
Robert Kroeger7a8b2222015-03-06 07:58:57 -0800409 p, err := instanceDir(config.Root, suffix[0:3])
410 if err != nil {
411 return nil, verror.New(ErrOperationFailed, nil, fmt.Sprintf("newAppSpecificAuthorizer failed: %v", err))
Robert Kroegeracc778b2014-11-03 17:17:21 -0800412 }
Adam Sadovskya4d4a692015-04-20 11:36:49 -0700413 return pathperms.NewHierarchicalAuthorizer(PermsDir(config), path.Join(p, "acls"), getter)
Robert Kroegeracc778b2014-11-03 17:17:21 -0800414}