# -*- coding: utf-8 -*- # # Copyright (C) 2014 GNS3 Technologies Inc. # # This program is free software: you can redistribute it and/or modify # it under the terms of the GNU General Public License as published by # the Free Software Foundation, either version 3 of the License, or # (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program. If not, see . """ vpcs server module. """ import os import sys import base64 import tempfile import struct import socket import shutil from gns3server.modules import IModule from gns3server.config import Config import gns3server.jsonrpc as jsonrpc from .vpcs_device import vpcsDevice from .vpcs_error import vpcsError from .nios.nio_udp import NIO_UDP from .nios.nio_tap import NIO_TAP from ..attic import find_unused_port from .schemas import VPCS_CREATE_SCHEMA from .schemas import VPCS_DELETE_SCHEMA from .schemas import VPCS_UPDATE_SCHEMA from .schemas import VPCS_START_SCHEMA from .schemas import VPCS_STOP_SCHEMA from .schemas import VPCS_RELOAD_SCHEMA from .schemas import VPCS_ALLOCATE_UDP_PORT_SCHEMA from .schemas import VPCS_ADD_NIO_SCHEMA from .schemas import VPCS_DELETE_NIO_SCHEMA import logging log = logging.getLogger(__name__) class vpcs(IModule): """ vpcs module. :param name: module name :param args: arguments for the module :param kwargs: named arguments for the module """ def __init__(self, name, *args, **kwargs): # get the vpcs location config = Config.instance() vpcs_config = config.get_section_config(name.upper()) self._vpcs = vpcs_config.get("vpcs") if not self._vpcs or not os.path.isfile(self._vpcs): vpcs_in_cwd = os.path.join(os.getcwd(), "vpcs") if os.path.isfile(vpcs_in_cwd): self._vpcs = vpcs_in_cwd else: # look for vpcs if none is defined or accessible for path in os.environ["PATH"].split(":"): try: if "vpcs" in os.listdir(path) and os.access(os.path.join(path, "vpcs"), os.X_OK): self._vpcs = os.path.join(path, "vpcs") break except OSError: continue if not self._vpcs: log.warning("vpcs binary couldn't be found!") elif not os.access(self._vpcs, os.X_OK): log.warning("vpcs is not executable") # a new process start when calling IModule IModule.__init__(self, name, *args, **kwargs) self._vpcs_instances = {} self._console_start_port_range = 4001 self._console_end_port_range = 4512 self._allocated_console_ports = [] self._current_console_port = self._console_start_port_range self._udp_start_port_range = 30001 self._udp_end_port_range = 40001 self._current_udp_port = self._udp_start_port_range self._host = kwargs["host"] self._projects_dir = kwargs["projects_dir"] self._tempdir = kwargs["temp_dir"] self._working_dir = self._projects_dir self._vpcsrc = "" # check every 5 seconds #self._vpcs_callback = self.add_periodic_callback(self._check_vpcs_is_alive, 5000) #self._vpcs_callback.start() def stop(self, signum=None): """ Properly stops the module. :param signum: signal number (if called by the signal handler) """ self._vpcs_callback.stop() # delete all vpcs instances for vpcs_id in self._vpcs_instances: vpcs_instance = self._vpcs_instances[vpcs_id] vpcs_instance.delete() IModule.stop(self, signum) # this will stop the I/O loop def _check_vpcs_is_alive(self): """ Periodic callback to check if vpcs and vpcs are alive for each vpcs instance. Sends a notification to the client if not. """ for vpcs_id in self._vpcs_instances: vpcs_instance = self._vpcs_instances[vpcs_id] if vpcs_instance.started and (not vpcs_instance.is_running() or not vpcs_instance.is_vpcs_running()): notification = {"module": self.name, "id": vpcs_id, "name": vpcs_instance.name} if not vpcs_instance.is_running(): stdout = vpcs_instance.read_vpcs_stdout() notification["message"] = "vpcs has stopped running" notification["details"] = stdout self.send_notification("{}.vpcs_stopped".format(self.name), notification) vpcs_instance.stop() def get_vpcs_instance(self, vpcs_id): """ Returns an vpcs device instance. :param vpcs_id: vpcs device identifier :returns: vpcsDevice instance """ if vpcs_id not in self._vpcs_instances: log.debug("vpcs device ID {} doesn't exist".format(vpcs_id), exc_info=1) self.send_custom_error("vpcs device ID {} doesn't exist".format(vpcs_id)) return None return self._vpcs_instances[vpcs_id] @IModule.route("vpcs.reset") def reset(self, request): """ Resets the module. :param request: JSON request """ # delete all vpcs instances for vpcs_id in self._vpcs_instances: vpcs_instance = self._vpcs_instances[vpcs_id] vpcs_instance.delete() # resets the instance IDs vpcsDevice.reset() self._vpcs_instances.clear() self._remote_server = False self._current_console_port = self._console_start_port_range self._current_udp_port = self._udp_start_port_range log.info("vpcs module has been reset") @IModule.route("vpcs.settings") def settings(self, request): """ Set or update settings. Optional request parameters: - working_dir (path to a working directory) - project_name - console_start_port_range - console_end_port_range - udp_start_port_range - udp_end_port_range :param request: JSON request """ if request == None: self.send_param_error() return if "vpcs" in request and request["vpcs"]: self._vpcs = request["vpcs"] log.info("vpcs path set to {}".format(self._vpcs)) if "working_dir" in request: new_working_dir = request["working_dir"] log.info("this server is local with working directory path to {}".format(new_working_dir)) else: new_working_dir = os.path.join(self._projects_dir, request["project_name"] + ".gns3") log.info("this server is remote with working directory path to {}".format(new_working_dir)) if self._projects_dir != self._working_dir != new_working_dir: if not os.path.isdir(new_working_dir): try: shutil.move(self._working_dir, new_working_dir) except OSError as e: log.error("could not move working directory from {} to {}: {}".format(self._working_dir, new_working_dir, e)) return # update the working directory if it has changed if self._working_dir != new_working_dir: self._working_dir = new_working_dir for vpcs_id in self._vpcs_instances: vpcs_instance = self._vpcs_instances[vpcs_id] vpcs_instance.working_dir = self._working_dir if "console_start_port_range" in request and "console_end_port_range" in request: self._console_start_port_range = request["console_start_port_range"] self._console_end_port_range = request["console_end_port_range"] if "udp_start_port_range" in request and "udp_end_port_range" in request: self._udp_start_port_range = request["udp_start_port_range"] self._udp_end_port_range = request["udp_end_port_range"] log.debug("received request {}".format(request)) def test_result(self, message, result="error"): """ """ return {"result": result, "message": message} @IModule.route("vpcs.test_settings") def test_settings(self, request): """ """ response = [] self.send_response(response) @IModule.route("vpcs.create") def vpcs_create(self, request): """ Creates a new vpcs instance. Mandatory request parameters: - path (path to the vpcs executable) Optional request parameters: - name (vpcs name) Response parameters: - id (vpcs instance identifier) - name (vpcs name) - default settings :param request: JSON request """ # validate the request if not self.validate_request(request, VPCS_CREATE_SCHEMA): return name = None if "name" in request: name = request["name"] vpcs_path = request["path"] try: try: os.makedirs(self._working_dir) except FileExistsError: pass except OSError as e: raise vpcsError("Could not create working directory {}".format(e)) vpcs_instance = vpcsDevice(vpcs_path, self._working_dir, host=self._host, name=name) # find a console port if self._current_console_port > self._console_end_port_range: self._current_console_port = self._console_start_port_range try: vpcs_instance.console = find_unused_port(self._current_console_port, self._console_end_port_range, self._host) except Exception as e: raise vpcsError(e) self._current_console_port += 1 except vpcsError as e: self.send_custom_error(str(e)) return response = {"name": vpcs_instance.name, "id": vpcs_instance.id} defaults = vpcs_instance.defaults() response.update(defaults) self._vpcs_instances[vpcs_instance.id] = vpcs_instance self.send_response(response) @IModule.route("vpcs.delete") def vpcs_delete(self, request): """ Deletes an vpcs instance. Mandatory request parameters: - id (vpcs instance identifier) Response parameter: - True on success :param request: JSON request """ # validate the request if not self.validate_request(request, VPCS_DELETE_SCHEMA): return # get the instance vpcs_instance = self.get_vpcs_instance(request["id"]) if not vpcs_instance: return try: vpcs_instance.delete() del self._vpcs_instances[request["id"]] except vpcsError as e: self.send_custom_error(str(e)) return self.send_response(True) @IModule.route("vpcs.update") def vpcs_update(self, request): """ Updates an vpcs instance Mandatory request parameters: - id (vpcs instance identifier) Optional request parameters: - any setting to update - script_file_base64 (script-file base64 encoded) Response parameters: - updated settings :param request: JSON request """ # validate the request if not self.validate_request(request, VPCS_UPDATE_SCHEMA): return # get the instance vpcs_instance = self.get_vpcs_instance(request["id"]) if not vpcs_instance: return response = {} try: # a new script-file has been pushed if "script_file_base64" in request: config = base64.decodestring(request["script_file_base64"].encode("utf-8")).decode("utf-8") config = "!\n" + config.replace("\r", "") config = config.replace('%h', vpcs_instance.name) config_path = os.path.join(vpcs_instance.working_dir, "script-file") try: with open(config_path, "w") as f: log.info("saving script-file to {}".format(config_path)) f.write(config) except OSError as e: raise vpcsError("Could not save the configuration {}: {}".format(config_path, e)) # update the request with the new local script-file path request["script_file"] = os.path.basename(config_path) except vpcsError as e: self.send_custom_error(str(e)) return # update the vpcs settings for name, value in request.items(): if hasattr(vpcs_instance, name) and getattr(vpcs_instance, name) != value: try: setattr(vpcs_instance, name, value) response[name] = value except vpcsError as e: self.send_custom_error(str(e)) return self.send_response(response) @IModule.route("vpcs.start") def vm_start(self, request): """ Starts an vpcs instance. Mandatory request parameters: - id (vpcs instance identifier) Response parameters: - True on success :param request: JSON request """ # validate the request if not self.validate_request(request, VPCS_START_SCHEMA): return # get the instance vpcs_instance = self.get_vpcs_instance(request["id"]) if not vpcs_instance: return try: log.debug("starting vpcs with command: {}".format(vpcs_instance.command())) vpcs_instance.vpcs = self._vpcs vpcs_instance.start() except vpcsError as e: self.send_custom_error(str(e)) return self.send_response(True) @IModule.route("vpcs.stop") def vm_stop(self, request): """ Stops an vpcs instance. Mandatory request parameters: - id (vpcs instance identifier) Response parameters: - True on success :param request: JSON request """ # validate the request if not self.validate_request(request, VPCS_STOP_SCHEMA): return # get the instance vpcs_instance = self.get_vpcs_instance(request["id"]) if not vpcs_instance: return try: vpcs_instance.stop() except vpcsError as e: self.send_custom_error(str(e)) return self.send_response(True) @IModule.route("vpcs.reload") def vm_reload(self, request): """ Reloads an vpcs instance. Mandatory request parameters: - id (vpcs identifier) Response parameters: - True on success :param request: JSON request """ # validate the request if not self.validate_request(request, VPCS_RELOAD_SCHEMA): return # get the instance vpcs_instance = self.get_vpcs_instance(request["id"]) if not vpcs_instance: return try: if vpcs_instance.is_running(): vpcs_instance.stop() vpcs_instance.start() except vpcsError as e: self.send_custom_error(str(e)) return self.send_response(True) @IModule.route("vpcs.allocate_udp_port") def allocate_udp_port(self, request): """ Allocates a UDP port in order to create an UDP NIO. Mandatory request parameters: - id (vpcs identifier) - port_id (unique port identifier) Response parameters: - port_id (unique port identifier) - lport (allocated local port) :param request: JSON request """ # validate the request if not self.validate_request(request, VPCS_ALLOCATE_UDP_PORT_SCHEMA): return # get the instance vpcs_instance = self.get_vpcs_instance(request["id"]) if not vpcs_instance: return try: # find a UDP port if self._current_udp_port >= self._udp_end_port_range: self._current_udp_port = self._udp_start_port_range try: port = find_unused_port(self._current_udp_port, self._udp_end_port_range, host=self._host, socket_type="UDP") except Exception as e: raise vpcsError(e) self._current_udp_port += 1 log.info("{} [id={}] has allocated UDP port {} with host {}".format(vpcs_instance.name, vpcs_instance.id, port, self._host)) response = {"lport": port} except vpcsError as e: self.send_custom_error(str(e)) return response["port_id"] = request["port_id"] self.send_response(response) def _check_for_privileged_access(self, device): """ Check if vpcs can access Ethernet and TAP devices. :param device: device name """ # we are root, so vpcs should have privileged access too if os.geteuid() == 0: return # test if vpcs has the CAP_NET_RAW capability if "security.capability" in os.listxattr(self._vpcs): try: caps = os.getxattr(self._vpcs, "security.capability") # test the 2nd byte and check if the 13th bit (CAP_NET_RAW) is set if struct.unpack("