blob: a30a728d6e1220a9ba299e7d3142d101eb1427ef [file] [log] [blame]
Jiri Simsad7616c92015-03-24 23:44:30 -07001// Copyright 2015 The Vanadium Authors. All rights reserved.
2// Use of this source code is governed by a BSD-style
3// license that can be found in the LICENSE file.
4
Jiri Simsa78b646f2014-10-08 10:23:05 -07005// An implementation of a server for WSPR
6
7package server
8
9import (
10 "encoding/json"
Nicolas LaCassee3867dc2015-02-05 14:44:53 -080011 "fmt"
Jiri Simsa78b646f2014-10-08 10:23:05 -070012 "sync"
Matt Rosencrantz4aabe572014-10-22 09:25:50 -070013 "time"
Jiri Simsa78b646f2014-10-08 10:23:05 -070014
Jiri Simsa1f1302c2015-02-23 16:18:34 -080015 "v.io/v23"
16 "v.io/v23/context"
Jiri Simsa1f1302c2015-02-23 16:18:34 -080017 "v.io/v23/naming"
Matt Rosencrantz94502cf2015-03-18 09:43:44 -070018 "v.io/v23/rpc"
Jiri Simsa1f1302c2015-02-23 16:18:34 -080019 "v.io/v23/security"
20 "v.io/v23/vdl"
Todd Wangac9e1902015-02-25 01:58:01 -080021 "v.io/v23/vdlroot/signature"
Shyam Jayaraman7efedbe2015-03-05 12:57:18 -080022 vdltime "v.io/v23/vdlroot/time"
Jiri Simsa1f1302c2015-02-23 16:18:34 -080023 "v.io/v23/verror"
Matt Rosencrantze7bf2bc2015-03-13 09:54:27 -070024 "v.io/v23/vtrace"
Jiri Simsa337af232015-02-27 14:36:46 -080025 "v.io/x/lib/vlog"
Todd Wang5b77a342015-04-06 18:31:37 -070026 "v.io/x/ref/services/wspr/internal/lib"
27 "v.io/x/ref/services/wspr/internal/principal"
Jiri Simsa78b646f2014-10-08 10:23:05 -070028)
29
30type Flow struct {
Benjamin Prosnitz86d52282014-12-19 15:48:38 -080031 ID int32
Jiri Simsa78b646f2014-10-08 10:23:05 -070032 Writer lib.ClientWriter
33}
34
Jiri Simsa78b646f2014-10-08 10:23:05 -070035type FlowHandler interface {
Benjamin Prosnitzbf71e962015-04-14 16:43:07 -070036 CreateNewFlow(server interface{}, sender rpc.Stream) *Flow
Jiri Simsa78b646f2014-10-08 10:23:05 -070037
Benjamin Prosnitz86d52282014-12-19 15:48:38 -080038 CleanupFlow(id int32)
Jiri Simsa78b646f2014-10-08 10:23:05 -070039}
40
41type HandleStore interface {
Shyam Jayaraman07136a72015-04-13 13:34:41 -070042 GetBlessings(handle principal.BlessingsHandle) security.Blessings
Benjamin Prosnitz9e423992015-04-10 13:10:35 -070043 // Gets or adds blessings to the store and returns handle to the blessings
44 GetOrAddBlessingsHandle(blessings security.Blessings) principal.BlessingsHandle
Jiri Simsa78b646f2014-10-08 10:23:05 -070045}
46
47type ServerHelper interface {
48 FlowHandler
49 HandleStore
50
Shyam Jayaramanc17abda2015-04-06 16:49:17 -070051 SendLogMessage(level lib.LogLevel, msg string) error
52
Matt Rosencrantzc90eb7b2015-01-09 08:32:01 -080053 Context() *context.T
Jiri Simsa78b646f2014-10-08 10:23:05 -070054}
55
56type authReply struct {
Mike Burrows2ec2bb32015-02-26 15:14:43 -080057 Err *verror.E
Jiri Simsa78b646f2014-10-08 10:23:05 -070058}
59
Shyam Jayaraman907219d2014-11-26 12:14:37 -080060// AuthRequest is a request for a javascript authorizer to run
61// This is exported to make the app test easier.
62type AuthRequest struct {
Benjamin Prosnitz2be28dc2015-03-11 13:33:22 -070063 ServerId uint32 `json:"serverId"`
Shyam Jayaraman250aac32015-03-05 15:29:11 -080064 Handle int32 `json:"handle"`
65 Call SecurityCall `json:"call"`
Jiri Simsa78b646f2014-10-08 10:23:05 -070066}
67
68type Server struct {
Benjamin Prosnitze8e2b9b2015-02-24 12:55:25 -080069 // serverStateLock should be aquired when starting or stopping the server.
70 // This should be locked before outstandingRequestLock.
71 serverStateLock sync.Mutex
Jiri Simsa78b646f2014-10-08 10:23:05 -070072
Matt Rosencrantz94502cf2015-03-18 09:43:44 -070073 // The rpc.ListenSpec to use with server.Listen
74 listenSpec *rpc.ListenSpec
Jiri Simsa78b646f2014-10-08 10:23:05 -070075
Matt Rosencrantz94502cf2015-03-18 09:43:44 -070076 // The server that handles the rpc layer. Listen on this server is
Jiri Simsa78b646f2014-10-08 10:23:05 -070077 // lazily started.
Matt Rosencrantz94502cf2015-03-18 09:43:44 -070078 server rpc.Server
Jiri Simsa78b646f2014-10-08 10:23:05 -070079
80 // The saved dispatcher to reuse when serve is called multiple times.
81 dispatcher *dispatcher
82
Nicolas LaCasse27b57c72014-11-19 13:40:20 -080083 // Whether the server is listening.
84 isListening bool
Jiri Simsa78b646f2014-10-08 10:23:05 -070085
86 // The server id.
Benjamin Prosnitz86d52282014-12-19 15:48:38 -080087 id uint32
Jiri Simsa78b646f2014-10-08 10:23:05 -070088 helper ServerHelper
89
Suharsh Sivakumar4cc7c2d2015-04-09 15:21:56 -070090 // outstandingRequestLock should be acquired only to update the outstanding request maps below.
91 outstandingRequestLock sync.Mutex
92 outstandingServerRequests map[int32]chan *lib.ServerRpcReply // GUARDED_BY outstandingRequestLock
93 outstandingAuthRequests map[int32]chan error // GUARDED_BY outstandingRequestLock
94 outstandingValidationRequests map[int32]chan []error // GUARDED_BY outstandingRequestLock
Shyam Jayaramanc17abda2015-04-06 16:49:17 -070095
96 // statusClose will be closed when the server is shutting down, this will
97 // cause the status poller to exit.
98 statusClose chan struct{}
Jiri Simsa78b646f2014-10-08 10:23:05 -070099}
100
Todd Wang555097f2015-04-21 10:49:06 -0700101type serverContextKey struct{}
102
Matt Rosencrantz94502cf2015-03-18 09:43:44 -0700103func NewServer(id uint32, listenSpec *rpc.ListenSpec, helper ServerHelper) (*Server, error) {
Jiri Simsa78b646f2014-10-08 10:23:05 -0700104 server := &Server{
Benjamin Prosnitze8e2b9b2015-02-24 12:55:25 -0800105 id: id,
106 helper: helper,
107 listenSpec: listenSpec,
Todd Wangbaf16842015-03-16 14:12:29 -0700108 outstandingServerRequests: make(map[int32]chan *lib.ServerRpcReply),
Benjamin Prosnitze8e2b9b2015-02-24 12:55:25 -0800109 outstandingAuthRequests: make(map[int32]chan error),
110 outstandingValidationRequests: make(map[int32]chan []error),
Jiri Simsa78b646f2014-10-08 10:23:05 -0700111 }
112 var err error
Benjamin Prosnitze8e2b9b2015-02-24 12:55:25 -0800113 ctx := helper.Context()
Todd Wang555097f2015-04-21 10:49:06 -0700114 ctx = context.WithValue(ctx, serverContextKey{}, server)
Benjamin Prosnitze8e2b9b2015-02-24 12:55:25 -0800115 if server.server, err = v23.NewServer(ctx); err != nil {
Jiri Simsa78b646f2014-10-08 10:23:05 -0700116 return nil, err
117 }
118 return server, nil
119}
120
121// remoteInvokeFunc is a type of function that can invoke a remote method and
122// communicate the result back via a channel to the caller
Todd Wang54feabe2015-04-15 23:38:26 -0700123type remoteInvokeFunc func(ctx *context.T, call rpc.StreamServerCall, methodName string, args []interface{}) <-chan *lib.ServerRpcReply
Jiri Simsa78b646f2014-10-08 10:23:05 -0700124
Benjamin Prosnitz86d52282014-12-19 15:48:38 -0800125func (s *Server) createRemoteInvokerFunc(handle int32) remoteInvokeFunc {
Todd Wang54feabe2015-04-15 23:38:26 -0700126 return func(ctx *context.T, call rpc.StreamServerCall, methodName string, args []interface{}) <-chan *lib.ServerRpcReply {
Todd Wang4264e4b2015-04-16 22:43:40 -0700127 securityCall := ConvertSecurityCall(s.helper, ctx, call.Security(), true)
Benjamin Prosnitze8e2b9b2015-02-24 12:55:25 -0800128
Jiri Simsa78b646f2014-10-08 10:23:05 -0700129 flow := s.helper.CreateNewFlow(s, call)
Todd Wangbaf16842015-03-16 14:12:29 -0700130 replyChan := make(chan *lib.ServerRpcReply, 1)
Benjamin Prosnitze8e2b9b2015-02-24 12:55:25 -0800131 s.outstandingRequestLock.Lock()
Jiri Simsa78b646f2014-10-08 10:23:05 -0700132 s.outstandingServerRequests[flow.ID] = replyChan
Benjamin Prosnitze8e2b9b2015-02-24 12:55:25 -0800133 s.outstandingRequestLock.Unlock()
Matt Rosencrantz4aabe572014-10-22 09:25:50 -0700134
Shyam Jayaraman7efedbe2015-03-05 12:57:18 -0800135 var timeout vdltime.Deadline
Todd Wang54feabe2015-04-15 23:38:26 -0700136 if deadline, ok := ctx.Deadline(); ok {
Shyam Jayaraman7efedbe2015-03-05 12:57:18 -0800137 timeout.Time = deadline
Matt Rosencrantz4aabe572014-10-22 09:25:50 -0700138 }
139
Todd Wangbaf16842015-03-16 14:12:29 -0700140 errHandler := func(err error) <-chan *lib.ServerRpcReply {
Matt Rosencrantz4aabe572014-10-22 09:25:50 -0700141 if ch := s.popServerRequest(flow.ID); ch != nil {
Todd Wang54feabe2015-04-15 23:38:26 -0700142 stdErr := verror.Convert(verror.ErrInternal, ctx, err).(verror.E)
Todd Wangbaf16842015-03-16 14:12:29 -0700143 ch <- &lib.ServerRpcReply{nil, &stdErr, vtrace.Response{}}
Matt Rosencrantz4aabe572014-10-22 09:25:50 -0700144 s.helper.CleanupFlow(flow.ID)
Jiri Simsa78b646f2014-10-08 10:23:05 -0700145 }
146 return replyChan
Shyam Jayaramanc96e1aa2014-11-12 16:42:39 -0800147 }
Shyam Jayaraman907219d2014-11-26 12:14:37 -0800148
Benjamin Prosnitzbf71e962015-04-14 16:43:07 -0700149 var grantedBlessings *principal.JsBlessings
150 if !call.GrantedBlessings().IsZero() {
151 grantedBlessings = convertBlessingsToHandle(s.helper, call.GrantedBlessings())
Shyam Jayaraman907219d2014-11-26 12:14:37 -0800152 }
Benjamin Prosnitzbf71e962015-04-14 16:43:07 -0700153
154 rpcCall := ServerRpcRequestCall{
155 SecurityCall: securityCall,
156 Deadline: timeout,
Todd Wang54feabe2015-04-15 23:38:26 -0700157 TraceRequest: vtrace.GetRequest(ctx),
Benjamin Prosnitzbf71e962015-04-14 16:43:07 -0700158 GrantedBlessings: grantedBlessings,
159 }
160
161 var vdlValArgs []*vdl.Value = make([]*vdl.Value, len(args))
162 for i, arg := range args {
Shyam Jayaraman07136a72015-04-13 13:34:41 -0700163 if blessings, ok := arg.(security.Blessings); ok {
164 arg = principal.ConvertBlessingsToHandle(blessings, s.helper.GetOrAddBlessingsHandle(blessings))
165 }
Benjamin Prosnitzbf71e962015-04-14 16:43:07 -0700166 vdlValArgs[i] = vdl.ValueOf(arg)
Shyam Jayaraman07136a72015-04-13 13:34:41 -0700167 }
Benjamin Prosnitzbf71e962015-04-14 16:43:07 -0700168
Shyam Jayaraman907219d2014-11-26 12:14:37 -0800169 // Send a invocation request to JavaScript
Benjamin Prosnitzbf71e962015-04-14 16:43:07 -0700170 message := ServerRpcRequest{
Shyam Jayaraman907219d2014-11-26 12:14:37 -0800171 ServerId: s.id,
172 Handle: handle,
173 Method: lib.LowercaseFirstCharacter(methodName),
Benjamin Prosnitzbf71e962015-04-14 16:43:07 -0700174 Args: vdlValArgs,
Shyam Jayaraman250aac32015-03-05 15:29:11 -0800175 Call: rpcCall,
Shyam Jayaraman907219d2014-11-26 12:14:37 -0800176 }
Shyam Jayaraman907219d2014-11-26 12:14:37 -0800177 vomMessage, err := lib.VomEncode(message)
Shyam Jayaramanc96e1aa2014-11-12 16:42:39 -0800178 if err != nil {
179 return errHandler(err)
180 }
Shyam Jayaraman907219d2014-11-26 12:14:37 -0800181 if err := flow.Writer.Send(lib.ResponseServerRequest, vomMessage); err != nil {
Shyam Jayaramanc96e1aa2014-11-12 16:42:39 -0800182 return errHandler(err)
Jiri Simsa78b646f2014-10-08 10:23:05 -0700183 }
184
Matt Rosencrantz99ed6782015-01-27 19:58:34 -0800185 vlog.VI(3).Infof("calling method %q with args %v, MessageID %d assigned\n", methodName, args, flow.ID)
Jiri Simsa78b646f2014-10-08 10:23:05 -0700186
Matt Rosencrantz4aabe572014-10-22 09:25:50 -0700187 // Watch for cancellation.
188 go func() {
Todd Wang54feabe2015-04-15 23:38:26 -0700189 <-ctx.Done()
Matt Rosencrantz4aabe572014-10-22 09:25:50 -0700190 ch := s.popServerRequest(flow.ID)
191 if ch == nil {
192 return
193 }
194
195 // Send a cancel message to the JS server.
196 flow.Writer.Send(lib.ResponseCancel, nil)
197 s.helper.CleanupFlow(flow.ID)
198
Todd Wang54feabe2015-04-15 23:38:26 -0700199 err := verror.Convert(verror.ErrAborted, ctx, ctx.Err()).(verror.E)
Todd Wangbaf16842015-03-16 14:12:29 -0700200 ch <- &lib.ServerRpcReply{nil, &err, vtrace.Response{}}
Matt Rosencrantz4aabe572014-10-22 09:25:50 -0700201 }()
202
Shyam Jayaraman07136a72015-04-13 13:34:41 -0700203 go proxyStream(call, flow.Writer, s.helper)
Matt Rosencrantz4aabe572014-10-22 09:25:50 -0700204
Jiri Simsa78b646f2014-10-08 10:23:05 -0700205 return replyChan
206 }
207}
208
Shyam Jayaramaneb10b9b2015-01-12 12:23:20 -0800209type globStream struct {
Todd Wang2331dd02015-03-17 15:38:39 -0700210 ch chan naming.GlobReply
Matt Rosencrantz99ed6782015-01-27 19:58:34 -0800211 ctx *context.T
Shyam Jayaramaneb10b9b2015-01-12 12:23:20 -0800212}
213
214func (g *globStream) Send(item interface{}) error {
Todd Wang2331dd02015-03-17 15:38:39 -0700215 if v, ok := item.(naming.GlobReply); ok {
Shyam Jayaramaneb10b9b2015-01-12 12:23:20 -0800216 g.ch <- v
217 return nil
218 }
Jiri Simsa94f68d02015-02-17 10:22:08 -0800219 return verror.New(verror.ErrBadArg, g.ctx, item)
Shyam Jayaramaneb10b9b2015-01-12 12:23:20 -0800220}
221
222func (g *globStream) Recv(itemptr interface{}) error {
Jiri Simsa94f68d02015-02-17 10:22:08 -0800223 return verror.New(verror.ErrNoExist, g.ctx, "Can't call recieve on glob stream")
Shyam Jayaramaneb10b9b2015-01-12 12:23:20 -0800224}
225
226func (g *globStream) CloseSend() error {
227 close(g.ch)
228 return nil
229}
230
231// remoteGlobFunc is a type of function that can invoke a remote glob and
232// communicate the result back via the channel returned
Todd Wang54feabe2015-04-15 23:38:26 -0700233type remoteGlobFunc func(ctx *context.T, call rpc.ServerCall, pattern string) (<-chan naming.GlobReply, error)
Shyam Jayaramaneb10b9b2015-01-12 12:23:20 -0800234
235func (s *Server) createRemoteGlobFunc(handle int32) remoteGlobFunc {
Todd Wang54feabe2015-04-15 23:38:26 -0700236 return func(ctx *context.T, call rpc.ServerCall, pattern string) (<-chan naming.GlobReply, error) {
Benjamin Prosnitze8e2b9b2015-02-24 12:55:25 -0800237 // Until the tests get fixed, we need to create a security context before creating the flow
238 // because creating the security context creates a flow and flow ids will be off.
239 // See https://github.com/veyron/release-issues/issues/1181
Todd Wang4264e4b2015-04-16 22:43:40 -0700240 securityCall := ConvertSecurityCall(s.helper, ctx, call.Security(), true)
Benjamin Prosnitze8e2b9b2015-02-24 12:55:25 -0800241
Todd Wang2331dd02015-03-17 15:38:39 -0700242 globChan := make(chan naming.GlobReply, 1)
Shyam Jayaramaneb10b9b2015-01-12 12:23:20 -0800243 flow := s.helper.CreateNewFlow(s, &globStream{
Matt Rosencrantz99ed6782015-01-27 19:58:34 -0800244 ch: globChan,
Todd Wang54feabe2015-04-15 23:38:26 -0700245 ctx: ctx,
Shyam Jayaramaneb10b9b2015-01-12 12:23:20 -0800246 })
Todd Wangbaf16842015-03-16 14:12:29 -0700247 replyChan := make(chan *lib.ServerRpcReply, 1)
Benjamin Prosnitze8e2b9b2015-02-24 12:55:25 -0800248 s.outstandingRequestLock.Lock()
Shyam Jayaramaneb10b9b2015-01-12 12:23:20 -0800249 s.outstandingServerRequests[flow.ID] = replyChan
Benjamin Prosnitze8e2b9b2015-02-24 12:55:25 -0800250 s.outstandingRequestLock.Unlock()
Shyam Jayaramaneb10b9b2015-01-12 12:23:20 -0800251
Shyam Jayaraman7efedbe2015-03-05 12:57:18 -0800252 var timeout vdltime.Deadline
Todd Wang54feabe2015-04-15 23:38:26 -0700253 if deadline, ok := ctx.Deadline(); ok {
Shyam Jayaraman7efedbe2015-03-05 12:57:18 -0800254 timeout.Time = deadline
Shyam Jayaramaneb10b9b2015-01-12 12:23:20 -0800255 }
256
Todd Wang2331dd02015-03-17 15:38:39 -0700257 errHandler := func(err error) (<-chan naming.GlobReply, error) {
Shyam Jayaramaneb10b9b2015-01-12 12:23:20 -0800258 if ch := s.popServerRequest(flow.ID); ch != nil {
259 s.helper.CleanupFlow(flow.ID)
260 }
Todd Wang54feabe2015-04-15 23:38:26 -0700261 return nil, verror.Convert(verror.ErrInternal, ctx, err).(verror.E)
Shyam Jayaramaneb10b9b2015-01-12 12:23:20 -0800262 }
263
Benjamin Prosnitzbf71e962015-04-14 16:43:07 -0700264 var grantedBlessings *principal.JsBlessings
265 if !call.GrantedBlessings().IsZero() {
266 grantedBlessings = convertBlessingsToHandle(s.helper, call.GrantedBlessings())
267 }
268
269 rpcCall := ServerRpcRequestCall{
270 SecurityCall: securityCall,
271 Deadline: timeout,
272 GrantedBlessings: grantedBlessings,
Shyam Jayaramaneb10b9b2015-01-12 12:23:20 -0800273 }
274
275 // Send a invocation request to JavaScript
Benjamin Prosnitzbf71e962015-04-14 16:43:07 -0700276 message := ServerRpcRequest{
Shyam Jayaramaneb10b9b2015-01-12 12:23:20 -0800277 ServerId: s.id,
278 Handle: handle,
279 Method: "Glob__",
Benjamin Prosnitzbf71e962015-04-14 16:43:07 -0700280 Args: []*vdl.Value{vdl.ValueOf(pattern)},
Shyam Jayaraman250aac32015-03-05 15:29:11 -0800281 Call: rpcCall,
Shyam Jayaramaneb10b9b2015-01-12 12:23:20 -0800282 }
283 vomMessage, err := lib.VomEncode(message)
284 if err != nil {
285 return errHandler(err)
286 }
287 if err := flow.Writer.Send(lib.ResponseServerRequest, vomMessage); err != nil {
288 return errHandler(err)
289 }
290
Matt Rosencrantz99ed6782015-01-27 19:58:34 -0800291 vlog.VI(3).Infof("calling method 'Glob__' with args %v, MessageID %d assigned\n", []interface{}{pattern}, flow.ID)
Shyam Jayaramaneb10b9b2015-01-12 12:23:20 -0800292
293 // Watch for cancellation.
294 go func() {
Todd Wang54feabe2015-04-15 23:38:26 -0700295 <-ctx.Done()
Shyam Jayaramaneb10b9b2015-01-12 12:23:20 -0800296 ch := s.popServerRequest(flow.ID)
297 if ch == nil {
298 return
299 }
300
301 // Send a cancel message to the JS server.
302 flow.Writer.Send(lib.ResponseCancel, nil)
303 s.helper.CleanupFlow(flow.ID)
304
Todd Wang54feabe2015-04-15 23:38:26 -0700305 err := verror.Convert(verror.ErrAborted, ctx, ctx.Err()).(verror.E)
Todd Wangbaf16842015-03-16 14:12:29 -0700306 ch <- &lib.ServerRpcReply{nil, &err, vtrace.Response{}}
Shyam Jayaramaneb10b9b2015-01-12 12:23:20 -0800307 }()
308
309 return globChan, nil
310 }
311}
312
Shyam Jayaraman07136a72015-04-13 13:34:41 -0700313func proxyStream(stream rpc.Stream, w lib.ClientWriter, blessingsCache HandleStore) {
Jiri Simsa78b646f2014-10-08 10:23:05 -0700314 var item interface{}
315 for err := stream.Recv(&item); err == nil; err = stream.Recv(&item) {
Shyam Jayaraman07136a72015-04-13 13:34:41 -0700316 if blessings, ok := item.(security.Blessings); ok {
317 item = principal.ConvertBlessingsToHandle(blessings, blessingsCache.GetOrAddBlessingsHandle(blessings))
318
319 }
Benjamin Prosnitza2ac3b32014-12-12 11:40:31 -0800320 vomItem, err := lib.VomEncode(item)
Shyam Jayaramanc96e1aa2014-11-12 16:42:39 -0800321 if err != nil {
Jiri Simsa94f68d02015-02-17 10:22:08 -0800322 w.Error(verror.Convert(verror.ErrInternal, nil, err))
Shyam Jayaramanc96e1aa2014-11-12 16:42:39 -0800323 return
324 }
Benjamin Prosnitza2ac3b32014-12-12 11:40:31 -0800325 if err := w.Send(lib.ResponseStream, vomItem); err != nil {
Jiri Simsa94f68d02015-02-17 10:22:08 -0800326 w.Error(verror.Convert(verror.ErrInternal, nil, err))
Jiri Simsa78b646f2014-10-08 10:23:05 -0700327 return
328 }
329 }
Jiri Simsa78b646f2014-10-08 10:23:05 -0700330 if err := w.Send(lib.ResponseStreamClose, nil); err != nil {
Jiri Simsa94f68d02015-02-17 10:22:08 -0800331 w.Error(verror.Convert(verror.ErrInternal, nil, err))
Jiri Simsa78b646f2014-10-08 10:23:05 -0700332 return
333 }
334}
335
Benjamin Prosnitzbf71e962015-04-14 16:43:07 -0700336func convertBlessingsToHandle(helper ServerHelper, blessings security.Blessings) *principal.JsBlessings {
337 return principal.ConvertBlessingsToHandle(blessings, helper.GetOrAddBlessingsHandle(blessings))
Jiri Simsa78b646f2014-10-08 10:23:05 -0700338}
339
Benjamin Prosnitze8e2b9b2015-02-24 12:55:25 -0800340func makeListOfErrors(numErrors int, err error) []error {
341 errs := make([]error, numErrors)
342 for i := 0; i < numErrors; i++ {
343 errs[i] = err
Shyam Jayaramana42622c2015-01-05 16:55:53 -0800344 }
Benjamin Prosnitze8e2b9b2015-02-24 12:55:25 -0800345 return errs
346}
347
Todd Wang555097f2015-04-21 10:49:06 -0700348// caveatValidationInGo validates caveats in Go, using the default logic.
349func caveatValidationInGo(ctx *context.T, call security.Call, sets [][]security.Caveat) []error {
350 results := make([]error, len(sets))
351 for i, set := range sets {
352 for _, cav := range set {
353 if err := cav.Validate(ctx, call); err != nil {
354 results[i] = err
355 break
356 }
357 }
358 }
359 return results
360}
361
362// caveatValidationInJavascript validates caveats in javascript. It resolves
363// each []security.Caveat in cavs to an error (or nil) and collects them in a
364// slice.
365func (s *Server) caveatValidationInJavascript(ctx *context.T, call security.Call, cavs [][]security.Caveat) []error {
Benjamin Prosnitze8e2b9b2015-02-24 12:55:25 -0800366 flow := s.helper.CreateNewFlow(s, nil)
367 req := CaveatValidationRequest{
Todd Wang4264e4b2015-04-16 22:43:40 -0700368 Call: ConvertSecurityCall(s.helper, ctx, call, false),
Ankuref39ba82015-03-19 13:34:03 -0700369 Cavs: cavs,
Benjamin Prosnitze8e2b9b2015-02-24 12:55:25 -0800370 }
371
372 replyChan := make(chan []error, 1)
373 s.outstandingRequestLock.Lock()
374 s.outstandingValidationRequests[flow.ID] = replyChan
375 s.outstandingRequestLock.Unlock()
376
377 defer func() {
378 s.outstandingRequestLock.Lock()
379 delete(s.outstandingValidationRequests, flow.ID)
380 s.outstandingRequestLock.Unlock()
381 s.cleanupFlow(flow.ID)
382 }()
383
384 if err := flow.Writer.Send(lib.ResponseValidate, req); err != nil {
385 vlog.VI(2).Infof("Failed to send validate response: %v", err)
386 replyChan <- makeListOfErrors(len(cavs), err)
387 }
388
Matt Rosencrantz94502cf2015-03-18 09:43:44 -0700389 // TODO(bprosnitz) Consider using a different timeout than the standard rpc timeout.
Todd Wangf6a06882015-02-27 17:38:01 -0800390 var timeoutChan <-chan time.Time
Matt Rosencrantz317b0c52015-03-24 20:47:01 -0700391 if deadline, ok := ctx.Deadline(); ok {
Todd Wangf6a06882015-02-27 17:38:01 -0800392 timeoutChan = time.After(deadline.Sub(time.Now()))
Benjamin Prosnitze8e2b9b2015-02-24 12:55:25 -0800393 }
Benjamin Prosnitze8e2b9b2015-02-24 12:55:25 -0800394
395 select {
Shyam Jayaramanf0a995c2015-04-21 17:34:38 -0700396 case <-s.statusClose:
397 return caveatValidationInGo(ctx, call, cavs)
Benjamin Prosnitze8e2b9b2015-02-24 12:55:25 -0800398 case <-timeoutChan:
Matt Rosencrantz317b0c52015-03-24 20:47:01 -0700399 return makeListOfErrors(len(cavs), NewErrCaveatValidationTimeout(ctx))
Benjamin Prosnitze8e2b9b2015-02-24 12:55:25 -0800400 case reply := <-replyChan:
401 if len(reply) != len(cavs) {
402 vlog.VI(2).Infof("Wspr caveat validator received %d results from javascript but expected %d", len(reply), len(cavs))
Matt Rosencrantz317b0c52015-03-24 20:47:01 -0700403 return makeListOfErrors(len(cavs), NewErrInvalidValidationResponseFromJavascript(ctx))
Benjamin Prosnitze8e2b9b2015-02-24 12:55:25 -0800404 }
405
406 return reply
407 }
408}
409
Todd Wang555097f2015-04-21 10:49:06 -0700410// CaveatValidation implements a function suitable for passing to
411// security.OverrideCaveatValidation.
412//
413// Certain caveats (PublicKeyThirdPartyCaveatX) are intercepted and handled in
414// go, while all other caveats are evaluated in javascript.
415func CaveatValidation(ctx *context.T, call security.Call, cavs [][]security.Caveat) []error {
416 // If the server isn't set in the context, we just perform validation in Go.
417 ctxServer := ctx.Value(serverContextKey{})
418 if ctxServer == nil {
419 return caveatValidationInGo(ctx, call, cavs)
420 }
421 // Otherwise we run our special logic.
422 server := ctxServer.(*Server)
Benjamin Prosnitz2c8c2372015-03-13 12:03:08 -0700423 type validationStatus struct {
424 err error
425 isSet bool
426 }
427 valStatus := make([]validationStatus, len(cavs))
428
429 var caveatChainsToValidate [][]security.Caveat
430nextCav:
431 for i, chainCavs := range cavs {
432 var newChainCavs []security.Caveat
433 for _, cav := range chainCavs {
Suharsh Sivakumarbc740892015-04-17 10:54:17 -0700434 // If the server is closed handle all caveats in Go, because Javascript is
435 // no longer there.
436 select {
Todd Wang555097f2015-04-21 10:49:06 -0700437 case <-server.statusClose:
Suharsh Sivakumarbc740892015-04-17 10:54:17 -0700438 res := cav.Validate(ctx, call)
439 if res != nil {
440 valStatus[i] = validationStatus{
441 err: res,
442 isSet: true,
443 }
444 continue nextCav
445 }
446 default:
447 }
Benjamin Prosnitz2c8c2372015-03-13 12:03:08 -0700448 switch cav.Id {
449 case security.PublicKeyThirdPartyCaveatX.Id:
Todd Wang4264e4b2015-04-16 22:43:40 -0700450 res := cav.Validate(ctx, call)
Benjamin Prosnitz2c8c2372015-03-13 12:03:08 -0700451 if res != nil {
452 valStatus[i] = validationStatus{
453 err: res,
454 isSet: true,
455 }
456 continue nextCav
457 }
458 default:
459 newChainCavs = append(newChainCavs, cav)
460 }
461 }
462 if len(newChainCavs) == 0 {
463 valStatus[i] = validationStatus{
464 err: nil,
465 isSet: true,
466 }
467 } else {
468 caveatChainsToValidate = append(caveatChainsToValidate, newChainCavs)
469 }
470 }
471
Todd Wang555097f2015-04-21 10:49:06 -0700472 jsRes := server.caveatValidationInJavascript(ctx, call, caveatChainsToValidate)
Benjamin Prosnitz2c8c2372015-03-13 12:03:08 -0700473
474 outResults := make([]error, len(cavs))
475 jsIndex := 0
476 for i, status := range valStatus {
477 if status.isSet {
478 outResults[i] = status.err
479 } else {
480 outResults[i] = jsRes[jsIndex]
481 jsIndex++
482 }
483 }
484
485 return outResults
486}
487
Todd Wang4264e4b2015-04-16 22:43:40 -0700488func ConvertSecurityCall(helper ServerHelper, ctx *context.T, call security.Call, includeBlessingStrings bool) SecurityCall {
Benjamin Prosnitze8e2b9b2015-02-24 12:55:25 -0800489 var localEndpoint string
Matt Rosencrantz9dce9b22015-03-02 10:48:37 -0800490 if call.LocalEndpoint() != nil {
491 localEndpoint = call.LocalEndpoint().String()
Benjamin Prosnitze8e2b9b2015-02-24 12:55:25 -0800492 }
493 var remoteEndpoint string
Matt Rosencrantz9dce9b22015-03-02 10:48:37 -0800494 if call.RemoteEndpoint() != nil {
495 remoteEndpoint = call.RemoteEndpoint().String()
Benjamin Prosnitze8e2b9b2015-02-24 12:55:25 -0800496 }
Benjamin Prosnitz23bf1a02015-03-30 16:17:04 -0700497 var localBlessings principal.JsBlessings
Matt Rosencrantz9dce9b22015-03-02 10:48:37 -0800498 if !call.LocalBlessings().IsZero() {
Benjamin Prosnitzbf71e962015-04-14 16:43:07 -0700499 localBlessings = *convertBlessingsToHandle(helper, call.LocalBlessings())
Benjamin Prosnitze8e2b9b2015-02-24 12:55:25 -0800500 }
Matt Rosencrantz9dce9b22015-03-02 10:48:37 -0800501 anymtags := make([]*vdl.Value, len(call.MethodTags()))
502 for i, mtag := range call.MethodTags() {
Benjamin Prosnitze8e2b9b2015-02-24 12:55:25 -0800503 anymtags[i] = mtag
504 }
Matt Rosencrantz250558f2015-03-17 11:37:31 -0700505 secCall := SecurityCall{
Matt Rosencrantz9dce9b22015-03-02 10:48:37 -0800506 Method: lib.LowercaseFirstCharacter(call.Method()),
507 Suffix: call.Suffix(),
Benjamin Prosnitze8e2b9b2015-02-24 12:55:25 -0800508 MethodTags: anymtags,
509 LocalEndpoint: localEndpoint,
510 RemoteEndpoint: remoteEndpoint,
511 LocalBlessings: localBlessings,
Benjamin Prosnitzbf71e962015-04-14 16:43:07 -0700512 RemoteBlessings: *convertBlessingsToHandle(helper, call.RemoteBlessings()),
Benjamin Prosnitze8e2b9b2015-02-24 12:55:25 -0800513 }
514 if includeBlessingStrings {
Todd Wang4264e4b2015-04-16 22:43:40 -0700515 secCall.LocalBlessingStrings = security.LocalBlessingNames(ctx, call)
516 secCall.RemoteBlessingStrings, _ = security.RemoteBlessingNames(ctx, call)
Benjamin Prosnitze8e2b9b2015-02-24 12:55:25 -0800517 }
Matt Rosencrantz250558f2015-03-17 11:37:31 -0700518 return secCall
Shyam Jayaramana42622c2015-01-05 16:55:53 -0800519}
520
Todd Wang4264e4b2015-04-16 22:43:40 -0700521type remoteAuth struct {
522 Func func(*context.T, security.Call, int32) error
523 Handle int32
524}
Jiri Simsa78b646f2014-10-08 10:23:05 -0700525
Todd Wang4264e4b2015-04-16 22:43:40 -0700526func (r remoteAuth) Authorize(ctx *context.T, call security.Call) error {
527 return r.Func(ctx, call, r.Handle)
528}
Benjamin Prosnitze8e2b9b2015-02-24 12:55:25 -0800529
Todd Wang4264e4b2015-04-16 22:43:40 -0700530func (s *Server) createRemoteAuthorizer(handle int32) security.Authorizer {
531 return remoteAuth{s.authorizeRemote, handle}
532}
Jiri Simsa78b646f2014-10-08 10:23:05 -0700533
Todd Wang4264e4b2015-04-16 22:43:40 -0700534func (s *Server) authorizeRemote(ctx *context.T, call security.Call, handle int32) error {
535 // Until the tests get fixed, we need to create a security context before
536 // creating the flow because creating the security context creates a flow and
537 // flow ids will be off.
538 securityCall := ConvertSecurityCall(s.helper, ctx, call, true)
Jiri Simsa78b646f2014-10-08 10:23:05 -0700539
Todd Wang4264e4b2015-04-16 22:43:40 -0700540 flow := s.helper.CreateNewFlow(s, nil)
541 replyChan := make(chan error, 1)
542 s.outstandingRequestLock.Lock()
543 s.outstandingAuthRequests[flow.ID] = replyChan
544 s.outstandingRequestLock.Unlock()
545 message := AuthRequest{
546 ServerId: s.id,
547 Handle: handle,
548 Call: securityCall,
Jiri Simsa78b646f2014-10-08 10:23:05 -0700549 }
Todd Wang4264e4b2015-04-16 22:43:40 -0700550 vlog.VI(0).Infof("Sending out auth request for %v, %v", flow.ID, message)
551
552 vomMessage, err := lib.VomEncode(message)
553 if err != nil {
554 replyChan <- verror.Convert(verror.ErrInternal, nil, err)
555 } else if err := flow.Writer.Send(lib.ResponseAuthRequest, vomMessage); err != nil {
556 replyChan <- verror.Convert(verror.ErrInternal, nil, err)
557 }
558
559 err = <-replyChan
560 vlog.VI(0).Infof("going to respond with %v", err)
561 s.outstandingRequestLock.Lock()
562 delete(s.outstandingAuthRequests, flow.ID)
563 s.outstandingRequestLock.Unlock()
564 s.helper.CleanupFlow(flow.ID)
565 return err
Jiri Simsa78b646f2014-10-08 10:23:05 -0700566}
567
Shyam Jayaramanc17abda2015-04-06 16:49:17 -0700568func (s *Server) readStatus() {
569 // A map of names to the last error message sent.
570 lastErrors := map[string]string{}
571 for {
572 status := s.server.Status()
573 for _, mountStatus := range status.Mounts {
574 var errMsg string
575 if mountStatus.LastMountErr != nil {
576 errMsg = mountStatus.LastMountErr.Error()
577 }
578 mountName := mountStatus.Name
579 if lastMessage, ok := lastErrors[mountName]; !ok || errMsg != lastMessage {
580 if errMsg == "" {
581 s.helper.SendLogMessage(
582 lib.LogLevelInfo, "serve: "+mountName+" successfully mounted ")
583 } else {
584 s.helper.SendLogMessage(
585 lib.LogLevelError, "serve: "+mountName+" failed with: "+errMsg)
586 }
587 }
588 lastErrors[mountName] = errMsg
589 }
590 select {
591 case <-time.After(10 * time.Second):
592 continue
593 case <-s.statusClose:
594 return
595 }
596 }
597}
598
Nicolas LaCasse27b57c72014-11-19 13:40:20 -0800599func (s *Server) Serve(name string) error {
Benjamin Prosnitze8e2b9b2015-02-24 12:55:25 -0800600 s.serverStateLock.Lock()
601 defer s.serverStateLock.Unlock()
Jiri Simsa78b646f2014-10-08 10:23:05 -0700602
603 if s.dispatcher == nil {
Matt Rosencrantz99ed6782015-01-27 19:58:34 -0800604 s.dispatcher = newDispatcher(s.id, s, s, s)
Jiri Simsa78b646f2014-10-08 10:23:05 -0700605 }
606
Nicolas LaCasse27b57c72014-11-19 13:40:20 -0800607 if !s.isListening {
608 _, err := s.server.Listen(*s.listenSpec)
Jiri Simsa78b646f2014-10-08 10:23:05 -0700609 if err != nil {
Nicolas LaCasse27b57c72014-11-19 13:40:20 -0800610 return err
Jiri Simsa78b646f2014-10-08 10:23:05 -0700611 }
Nicolas LaCasse27b57c72014-11-19 13:40:20 -0800612 s.isListening = true
Jiri Simsa78b646f2014-10-08 10:23:05 -0700613 }
Cosmos Nicolaou89303d62014-11-02 12:58:11 -0800614 if err := s.server.ServeDispatcher(name, s.dispatcher); err != nil {
Nicolas LaCasse27b57c72014-11-19 13:40:20 -0800615 return err
Jiri Simsa78b646f2014-10-08 10:23:05 -0700616 }
Shyam Jayaramanc17abda2015-04-06 16:49:17 -0700617 s.statusClose = make(chan struct{}, 1)
618 go s.readStatus()
Nicolas LaCasse27b57c72014-11-19 13:40:20 -0800619 return nil
Jiri Simsa78b646f2014-10-08 10:23:05 -0700620}
621
Todd Wangbaf16842015-03-16 14:12:29 -0700622func (s *Server) popServerRequest(id int32) chan *lib.ServerRpcReply {
Benjamin Prosnitze8e2b9b2015-02-24 12:55:25 -0800623 s.outstandingRequestLock.Lock()
624 defer s.outstandingRequestLock.Unlock()
Jiri Simsa78b646f2014-10-08 10:23:05 -0700625 ch := s.outstandingServerRequests[id]
626 delete(s.outstandingServerRequests, id)
Matt Rosencrantz4aabe572014-10-22 09:25:50 -0700627
628 return ch
629}
630
Benjamin Prosnitz86d52282014-12-19 15:48:38 -0800631func (s *Server) HandleServerResponse(id int32, data string) {
Matt Rosencrantz4aabe572014-10-22 09:25:50 -0700632 ch := s.popServerRequest(id)
Jiri Simsa78b646f2014-10-08 10:23:05 -0700633 if ch == nil {
Matt Rosencrantz99ed6782015-01-27 19:58:34 -0800634 vlog.Errorf("unexpected result from JavaScript. No channel "+
Jiri Simsa78b646f2014-10-08 10:23:05 -0700635 "for MessageId: %d exists. Ignoring the results.", id)
Benjamin Prosnitza2ac3b32014-12-12 11:40:31 -0800636 // Ignore unknown responses that don't belong to any channel
Jiri Simsa78b646f2014-10-08 10:23:05 -0700637 return
638 }
Matt Rosencrantz4aabe572014-10-22 09:25:50 -0700639
Jiri Simsa78b646f2014-10-08 10:23:05 -0700640 // Decode the result and send it through the channel
Todd Wangbaf16842015-03-16 14:12:29 -0700641 var reply lib.ServerRpcReply
Benjamin Prosnitza2ac3b32014-12-12 11:40:31 -0800642 if err := lib.VomDecode(data, &reply); err != nil {
643 reply.Err = err
Jiri Simsa78b646f2014-10-08 10:23:05 -0700644 }
645
Matt Rosencrantz99ed6782015-01-27 19:58:34 -0800646 vlog.VI(0).Infof("response received from JavaScript server for "+
Benjamin Prosnitza2ac3b32014-12-12 11:40:31 -0800647 "MessageId %d with result %v", id, reply)
Jiri Simsa78b646f2014-10-08 10:23:05 -0700648 s.helper.CleanupFlow(id)
Shyam Jayaraman07136a72015-04-13 13:34:41 -0700649 if reply.Err != nil {
650 ch <- &reply
651 return
652 }
653 jsBlessingsType := vdl.TypeOf(principal.JsBlessings{})
654 for i, val := range reply.Results {
655 if val.Type() == jsBlessingsType {
656 var jsBlessings principal.JsBlessings
657 if err := vdl.Convert(&jsBlessings, val); err != nil {
658 reply.Err = err
659 break
660 }
661 reply.Results[i] = vdl.ValueOf(
662 s.helper.GetBlessings(jsBlessings.Handle))
663 }
664 }
Benjamin Prosnitza2ac3b32014-12-12 11:40:31 -0800665 ch <- &reply
Jiri Simsa78b646f2014-10-08 10:23:05 -0700666}
667
Benjamin Prosnitz86d52282014-12-19 15:48:38 -0800668func (s *Server) HandleLookupResponse(id int32, data string) {
Jiri Simsa78b646f2014-10-08 10:23:05 -0700669 s.dispatcher.handleLookupResponse(id, data)
670}
671
Benjamin Prosnitz86d52282014-12-19 15:48:38 -0800672func (s *Server) HandleAuthResponse(id int32, data string) {
Benjamin Prosnitze8e2b9b2015-02-24 12:55:25 -0800673 s.outstandingRequestLock.Lock()
Jiri Simsa78b646f2014-10-08 10:23:05 -0700674 ch := s.outstandingAuthRequests[id]
Benjamin Prosnitze8e2b9b2015-02-24 12:55:25 -0800675 s.outstandingRequestLock.Unlock()
Jiri Simsa78b646f2014-10-08 10:23:05 -0700676 if ch == nil {
Matt Rosencrantz99ed6782015-01-27 19:58:34 -0800677 vlog.Errorf("unexpected result from JavaScript. No channel "+
Shyam Jayaramane56df9a2014-11-20 17:38:54 -0800678 "for MessageId: %d exists. Ignoring the results(%s)", id, data)
Suharsh Sivakumar4cc7c2d2015-04-09 15:21:56 -0700679 // Ignore unknown responses that don't belong to any channel
Jiri Simsa78b646f2014-10-08 10:23:05 -0700680 return
681 }
682 // Decode the result and send it through the channel
683 var reply authReply
684 if decoderErr := json.Unmarshal([]byte(data), &reply); decoderErr != nil {
Mike Burrows2ec2bb32015-02-26 15:14:43 -0800685 err := verror.Convert(verror.ErrInternal, nil, decoderErr).(verror.E)
Mike Burrowsb6689c22014-10-08 11:14:15 -0700686 reply = authReply{Err: &err}
Jiri Simsa78b646f2014-10-08 10:23:05 -0700687 }
688
Matt Rosencrantz99ed6782015-01-27 19:58:34 -0800689 vlog.VI(0).Infof("response received from JavaScript server for "+
Jiri Simsa78b646f2014-10-08 10:23:05 -0700690 "MessageId %d with result %v", id, reply)
691 s.helper.CleanupFlow(id)
Mike Burrows2ec2bb32015-02-26 15:14:43 -0800692 // A nil verror.E does not result in an nil error. Instead, we have create
Jiri Simsa78b646f2014-10-08 10:23:05 -0700693 // a variable for the error interface and only set it's value if the struct is non-
694 // nil.
695 var err error
696 if reply.Err != nil {
697 err = reply.Err
698 }
699 ch <- err
700}
701
Benjamin Prosnitze8e2b9b2015-02-24 12:55:25 -0800702func (s *Server) HandleCaveatValidationResponse(id int32, data string) {
703 s.outstandingRequestLock.Lock()
704 ch := s.outstandingValidationRequests[id]
705 s.outstandingRequestLock.Unlock()
706 if ch == nil {
707 vlog.Errorf("unexpected result from JavaScript. No channel "+
708 "for validation response with MessageId: %d exists. Ignoring the results(%s)", id, data)
Suharsh Sivakumar4cc7c2d2015-04-09 15:21:56 -0700709 // Ignore unknown responses that don't belong to any channel
Benjamin Prosnitze8e2b9b2015-02-24 12:55:25 -0800710 return
711 }
712
713 var reply CaveatValidationResponse
714 if err := lib.VomDecode(data, &reply); err != nil {
715 vlog.Errorf("failed to decode validation response %q: error %v", data, err)
716 ch <- []error{}
717 return
718 }
719
720 ch <- reply.Results
721}
722
Jiri Simsa78b646f2014-10-08 10:23:05 -0700723func (s *Server) createFlow() *Flow {
724 return s.helper.CreateNewFlow(s, nil)
725}
726
Benjamin Prosnitz86d52282014-12-19 15:48:38 -0800727func (s *Server) cleanupFlow(id int32) {
Jiri Simsa78b646f2014-10-08 10:23:05 -0700728 s.helper.CleanupFlow(id)
729}
730
Matt Rosencrantz94502cf2015-03-18 09:43:44 -0700731func (s *Server) createInvoker(handle int32, sig []signature.Interface, hasGlobber bool) (rpc.Invoker, error) {
Jiri Simsa78b646f2014-10-08 10:23:05 -0700732 remoteInvokeFunc := s.createRemoteInvokerFunc(handle)
Shyam Jayaramaneb10b9b2015-01-12 12:23:20 -0800733 var globFunc remoteGlobFunc
734 if hasGlobber {
735 globFunc = s.createRemoteGlobFunc(handle)
736 }
737 return newInvoker(sig, remoteInvokeFunc, globFunc), nil
Jiri Simsa78b646f2014-10-08 10:23:05 -0700738}
739
Benjamin Prosnitz86d52282014-12-19 15:48:38 -0800740func (s *Server) createAuthorizer(handle int32, hasAuthorizer bool) (security.Authorizer, error) {
Jiri Simsa78b646f2014-10-08 10:23:05 -0700741 if hasAuthorizer {
Todd Wang4264e4b2015-04-16 22:43:40 -0700742 return s.createRemoteAuthorizer(handle), nil
Jiri Simsa78b646f2014-10-08 10:23:05 -0700743 }
Asim Shankar8572f6c2014-10-28 15:24:17 -0700744 return nil, nil
Jiri Simsa78b646f2014-10-08 10:23:05 -0700745}
746
747func (s *Server) Stop() {
Mike Burrows2ec2bb32015-02-26 15:14:43 -0800748 stdErr := verror.New(verror.ErrTimeout, nil).(verror.E)
Todd Wangbaf16842015-03-16 14:12:29 -0700749 result := lib.ServerRpcReply{
Benjamin Prosnitza2ac3b32014-12-12 11:40:31 -0800750 Results: nil,
Mike Burrowsb6689c22014-10-08 11:14:15 -0700751 Err: &stdErr,
Jiri Simsa78b646f2014-10-08 10:23:05 -0700752 }
Benjamin Prosnitze8e2b9b2015-02-24 12:55:25 -0800753 s.serverStateLock.Lock()
Nicolas LaCassee3867dc2015-02-05 14:44:53 -0800754
Shyam Jayaramanc17abda2015-04-06 16:49:17 -0700755 if s.statusClose != nil {
756 close(s.statusClose)
757 }
Nicolas LaCassee3867dc2015-02-05 14:44:53 -0800758 if s.dispatcher != nil {
759 s.dispatcher.Cleanup()
760 }
761
762 for _, ch := range s.outstandingAuthRequests {
763 ch <- fmt.Errorf("Cleaning up server")
764 }
Nicolas LaCassee3867dc2015-02-05 14:44:53 -0800765
Jiri Simsa78b646f2014-10-08 10:23:05 -0700766 for _, ch := range s.outstandingServerRequests {
767 select {
768 case ch <- &result:
769 default:
770 }
771 }
Benjamin Prosnitze8e2b9b2015-02-24 12:55:25 -0800772 s.outstandingRequestLock.Lock()
773 s.outstandingAuthRequests = make(map[int32]chan error)
Todd Wangbaf16842015-03-16 14:12:29 -0700774 s.outstandingServerRequests = make(map[int32]chan *lib.ServerRpcReply)
Benjamin Prosnitze8e2b9b2015-02-24 12:55:25 -0800775 s.outstandingRequestLock.Unlock()
776 s.serverStateLock.Unlock()
Jiri Simsa78b646f2014-10-08 10:23:05 -0700777 s.server.Stop()
Matt Rosencrantz317b0c52015-03-24 20:47:01 -0700778
Suharsh Sivakumar4cc7c2d2015-04-09 15:21:56 -0700779 // Only clear the validation requests map after stopping. Clearing them before
780 // can cause the publisher to get stuck waiting for a caveat validation that
781 // will never be answered, which prevents the server from stopping.
Matt Rosencrantz317b0c52015-03-24 20:47:01 -0700782 s.serverStateLock.Lock()
783 s.outstandingRequestLock.Lock()
784 s.outstandingValidationRequests = make(map[int32]chan []error)
785 s.outstandingRequestLock.Unlock()
786 s.serverStateLock.Unlock()
Jiri Simsa78b646f2014-10-08 10:23:05 -0700787}
Ali Ghassemi1008bbe2014-11-07 16:36:08 -0800788
789func (s *Server) AddName(name string) error {
790 return s.server.AddName(name)
791}
792
Cosmos Nicolaoub1a41af2015-01-25 22:13:40 -0800793func (s *Server) RemoveName(name string) {
794 s.server.RemoveName(name)
Ali Ghassemi1008bbe2014-11-07 16:36:08 -0800795}