1992-12-14 19:25:04 -04:00
|
|
|
# Implement (a subset of) Sun RPC, version 2 -- RFC1057.
|
|
|
|
|
1992-12-17 13:12:17 -04:00
|
|
|
# XXX There should be separate exceptions for the various reasons why
|
|
|
|
# XXX an RPC can fail, rather than using RuntimeError for everything
|
|
|
|
|
|
|
|
# XXX The UDP version of the protocol resends requests when it does
|
|
|
|
# XXX not receive a timely reply -- use only for idempotent calls!
|
|
|
|
|
1992-12-14 19:25:04 -04:00
|
|
|
import xdr
|
|
|
|
import socket
|
|
|
|
import os
|
|
|
|
|
|
|
|
RPCVERSION = 2
|
|
|
|
|
|
|
|
CALL = 0
|
|
|
|
REPLY = 1
|
|
|
|
|
|
|
|
AUTH_NULL = 0
|
|
|
|
AUTH_UNIX = 1
|
|
|
|
AUTH_SHORT = 2
|
|
|
|
AUTH_DES = 3
|
|
|
|
|
|
|
|
MSG_ACCEPTED = 0
|
|
|
|
MSG_DENIED = 1
|
|
|
|
|
|
|
|
SUCCESS = 0 # RPC executed successfully
|
|
|
|
PROG_UNAVAIL = 1 # remote hasn't exported program
|
|
|
|
PROG_MISMATCH = 2 # remote can't support version #
|
|
|
|
PROC_UNAVAIL = 3 # program can't support procedure
|
|
|
|
GARBAGE_ARGS = 4 # procedure can't decode params
|
|
|
|
|
|
|
|
RPC_MISMATCH = 0 # RPC version number != 2
|
|
|
|
AUTH_ERROR = 1 # remote can't authenticate caller
|
|
|
|
|
|
|
|
AUTH_BADCRED = 1 # bad credentials (seal broken)
|
|
|
|
AUTH_REJECTEDCRED = 2 # client must begin new session
|
|
|
|
AUTH_BADVERF = 3 # bad verifier (seal broken)
|
|
|
|
AUTH_REJECTEDVERF = 4 # verifier expired or replayed
|
|
|
|
AUTH_TOOWEAK = 5 # rejected for security reasons
|
|
|
|
|
|
|
|
|
|
|
|
class Packer(xdr.Packer):
|
|
|
|
|
|
|
|
def pack_auth(self, auth):
|
|
|
|
flavor, stuff = auth
|
|
|
|
self.pack_enum(flavor)
|
|
|
|
self.pack_opaque(stuff)
|
|
|
|
|
|
|
|
def pack_auth_unix(self, stamp, machinename, uid, gid, gids):
|
|
|
|
self.pack_uint(stamp)
|
|
|
|
self.pack_string(machinename)
|
|
|
|
self.pack_uint(uid)
|
|
|
|
self.pack_uint(gid)
|
|
|
|
self.pack_uint(len(gids))
|
|
|
|
for i in gids:
|
|
|
|
self.pack_uint(i)
|
|
|
|
|
|
|
|
def pack_callheader(self, xid, prog, vers, proc, cred, verf):
|
|
|
|
self.pack_uint(xid)
|
|
|
|
self.pack_enum(CALL)
|
|
|
|
self.pack_uint(RPCVERSION)
|
|
|
|
self.pack_uint(prog)
|
|
|
|
self.pack_uint(vers)
|
|
|
|
self.pack_uint(proc)
|
|
|
|
self.pack_auth(cred)
|
|
|
|
self.pack_auth(verf)
|
|
|
|
# Caller must add procedure-specific part of call
|
|
|
|
|
|
|
|
def pack_replyheader(self, xid, verf):
|
|
|
|
self.pack_uint(xid)
|
|
|
|
self.pack_enum(REPLY)
|
|
|
|
self.pack_uint(MSG_ACCEPTED)
|
|
|
|
self.pack_auth(verf)
|
|
|
|
self.pack_enum(SUCCESS)
|
|
|
|
# Caller must add procedure-specific part of reply
|
|
|
|
|
|
|
|
|
|
|
|
class Unpacker(xdr.Unpacker):
|
|
|
|
|
|
|
|
def unpack_auth(self):
|
|
|
|
flavor = self.unpack_enum()
|
|
|
|
stuff = self.unpack_opaque()
|
|
|
|
return (flavor, stuff)
|
|
|
|
|
|
|
|
def unpack_replyheader(self):
|
|
|
|
xid = self.unpack_uint()
|
|
|
|
mtype = self.unpack_enum()
|
|
|
|
if mtype <> REPLY:
|
1992-12-17 13:12:17 -04:00
|
|
|
raise RuntimeError, 'no REPLY but ' + `mtype`
|
1992-12-14 19:25:04 -04:00
|
|
|
stat = self.unpack_enum()
|
1992-12-17 13:12:17 -04:00
|
|
|
if stat == MSG_DENIED:
|
|
|
|
stat = self.unpack_enum()
|
|
|
|
if stat == RPC_MISMATCH:
|
|
|
|
low = self.unpack_uint()
|
|
|
|
high = self.unpack_uint()
|
|
|
|
raise RuntimeError, \
|
|
|
|
'MSG_DENIED: RPC_MISMATCH: ' + `low, high`
|
|
|
|
if stat == AUTH_ERROR:
|
|
|
|
stat = self.unpack_uint()
|
|
|
|
raise RuntimeError, \
|
|
|
|
'MSG_DENIED: AUTH_ERROR: ' + `stat`
|
|
|
|
raise RuntimeError, 'MSG_DENIED: ' + `stat`
|
1992-12-14 19:25:04 -04:00
|
|
|
if stat <> MSG_ACCEPTED:
|
1992-12-17 13:12:17 -04:00
|
|
|
raise RuntimeError, \
|
|
|
|
'Neither MSG_DENIED nor MSG_ACCEPTED: ' + `stat`
|
1992-12-14 19:25:04 -04:00
|
|
|
verf = self.unpack_auth()
|
|
|
|
stat = self.unpack_enum()
|
1992-12-17 13:12:17 -04:00
|
|
|
if stat == PROG_MISMATCH:
|
|
|
|
low = self.unpack_uint()
|
|
|
|
high = self.unpack_uint()
|
|
|
|
raise RuntimeError, \
|
|
|
|
'call failed: PROG_MISMATCH: ' + `low, high`
|
1992-12-14 19:25:04 -04:00
|
|
|
if stat <> SUCCESS:
|
1992-12-17 13:12:17 -04:00
|
|
|
raise RuntimeError, 'call failed: ' + `stat`
|
1992-12-14 19:25:04 -04:00
|
|
|
return xid, verf
|
|
|
|
# Caller must get procedure-specific part of reply
|
|
|
|
|
|
|
|
|
1992-12-15 16:52:53 -04:00
|
|
|
# Subroutines to create opaque authentication objects
|
|
|
|
|
|
|
|
def make_auth_null():
|
|
|
|
return ''
|
|
|
|
|
|
|
|
def make_auth_unix(seed, host, uid, gid, groups):
|
|
|
|
p = Packer().init()
|
|
|
|
p.pack_auth_unix(seed, host, uid, gid, groups)
|
|
|
|
return p.get_buf()
|
|
|
|
|
|
|
|
def make_auth_unix_default():
|
|
|
|
return make_auth_unix(0, socket.gethostname(), \
|
|
|
|
os.getuid(), os.getgid(), [])
|
|
|
|
|
|
|
|
|
1992-12-14 19:25:04 -04:00
|
|
|
# Common base class for clients
|
|
|
|
|
|
|
|
class Client:
|
|
|
|
|
|
|
|
def init(self, host, prog, vers, port, type):
|
|
|
|
self.host = host
|
|
|
|
self.prog = prog
|
|
|
|
self.vers = vers
|
|
|
|
self.port = port
|
|
|
|
self.type = type
|
|
|
|
self.sock = socket.socket(socket.AF_INET, type)
|
|
|
|
self.sock.connect((host, port))
|
|
|
|
self.lastxid = 0
|
|
|
|
self.addpackers()
|
|
|
|
self.cred = None
|
|
|
|
self.verf = None
|
|
|
|
return self
|
|
|
|
|
|
|
|
def Null(self): # Procedure 0 is always like this
|
|
|
|
self.start_call(0)
|
|
|
|
self.do_call(0)
|
|
|
|
self.end_call()
|
|
|
|
|
|
|
|
def close(self):
|
|
|
|
self.sock.close()
|
|
|
|
|
|
|
|
# Functions that may be overridden by specific derived classes
|
|
|
|
|
|
|
|
def addpackers(self):
|
|
|
|
self.packer = Packer().init()
|
|
|
|
self.unpacker = Unpacker().init('')
|
|
|
|
|
|
|
|
def mkcred(self, proc):
|
|
|
|
if self.cred == None:
|
1992-12-15 16:52:53 -04:00
|
|
|
self.cred = (AUTH_NULL, make_auth_null())
|
|
|
|
return self.cred
|
1992-12-14 19:25:04 -04:00
|
|
|
|
|
|
|
def mkverf(self, proc):
|
1992-12-15 16:52:53 -04:00
|
|
|
if self.verf == None:
|
|
|
|
self.verf = (AUTH_NULL, make_auth_null())
|
|
|
|
return self.verf
|
1992-12-14 19:25:04 -04:00
|
|
|
|
|
|
|
|
|
|
|
# Record-Marking standard support
|
|
|
|
|
|
|
|
def sendfrag(sock, last, frag):
|
|
|
|
x = len(frag)
|
|
|
|
if last: x = x | 0x80000000L
|
|
|
|
header = (chr(int(x>>24 & 0xff)) + chr(int(x>>16 & 0xff)) + \
|
|
|
|
chr(int(x>>8 & 0xff)) + chr(int(x & 0xff)))
|
|
|
|
sock.send(header + frag)
|
|
|
|
|
|
|
|
def sendrecord(sock, record):
|
|
|
|
sendfrag(sock, 1, record)
|
|
|
|
|
|
|
|
def recvfrag(sock):
|
|
|
|
header = sock.recv(4)
|
|
|
|
x = long(ord(header[0]))<<24 | ord(header[1])<<16 | \
|
|
|
|
ord(header[2])<<8 | ord(header[3])
|
|
|
|
last = ((x & 0x80000000) != 0)
|
|
|
|
n = int(x & 0x7fffffff)
|
|
|
|
frag = ''
|
|
|
|
while n > 0:
|
|
|
|
buf = sock.recv(n)
|
|
|
|
if not buf: raise EOFError
|
|
|
|
n = n - len(buf)
|
|
|
|
frag = frag + buf
|
|
|
|
return last, frag
|
|
|
|
|
|
|
|
def recvrecord(sock):
|
|
|
|
record = ''
|
|
|
|
last = 0
|
|
|
|
while not last:
|
|
|
|
last, frag = recvfrag(sock)
|
|
|
|
record = record + frag
|
|
|
|
return record
|
|
|
|
|
|
|
|
|
|
|
|
# Raw TCP-based client
|
|
|
|
|
|
|
|
class RawTCPClient(Client):
|
|
|
|
|
|
|
|
def init(self, host, prog, vers, port):
|
|
|
|
return Client.init(self, host, prog, vers, port, \
|
|
|
|
socket.SOCK_STREAM)
|
|
|
|
|
|
|
|
def start_call(self, proc):
|
|
|
|
self.lastxid = xid = self.lastxid + 1
|
|
|
|
cred = self.mkcred(proc)
|
|
|
|
verf = self.mkverf(proc)
|
|
|
|
p = self.packer
|
|
|
|
p.reset()
|
|
|
|
p.pack_callheader(xid, self.prog, self.vers, proc, cred, verf)
|
|
|
|
|
|
|
|
def do_call(self, *rest):
|
|
|
|
# rest is used for UDP buffer size; ignored for TCP
|
|
|
|
call = self.packer.get_buf()
|
|
|
|
sendrecord(self.sock, call)
|
|
|
|
reply = recvrecord(self.sock)
|
|
|
|
u = self.unpacker
|
|
|
|
u.reset(reply)
|
|
|
|
xid, verf = u.unpack_replyheader()
|
|
|
|
if xid <> self.lastxid:
|
|
|
|
# Can't really happen since this is TCP...
|
|
|
|
raise RuntimeError, 'wrong xid in reply ' + `xid` + \
|
|
|
|
' instead of ' + `self.lastxid`
|
|
|
|
|
|
|
|
def end_call(self):
|
|
|
|
self.unpacker.done()
|
|
|
|
|
|
|
|
|
|
|
|
# Raw UDP-based client
|
|
|
|
|
|
|
|
class RawUDPClient(Client):
|
|
|
|
|
|
|
|
def init(self, host, prog, vers, port):
|
|
|
|
return Client.init(self, host, prog, vers, port, \
|
|
|
|
socket.SOCK_DGRAM)
|
|
|
|
|
|
|
|
def start_call(self, proc):
|
|
|
|
self.lastxid = xid = self.lastxid + 1
|
|
|
|
cred = self.mkcred(proc)
|
|
|
|
verf = self.mkverf(proc)
|
|
|
|
p = self.packer
|
|
|
|
p.reset()
|
|
|
|
p.pack_callheader(xid, self.prog, self.vers, proc, cred, verf)
|
|
|
|
|
|
|
|
def do_call(self, *rest):
|
1992-12-15 17:44:31 -04:00
|
|
|
from select import select
|
1992-12-14 19:25:04 -04:00
|
|
|
if len(rest) == 0:
|
|
|
|
bufsize = 8192
|
|
|
|
elif len(rest) > 1:
|
|
|
|
raise TypeError, 'too many args'
|
|
|
|
else:
|
|
|
|
bufsize = rest[0] + 512
|
|
|
|
call = self.packer.get_buf()
|
1992-12-15 17:44:31 -04:00
|
|
|
timeout = 1
|
|
|
|
count = 5
|
1992-12-14 19:25:04 -04:00
|
|
|
self.sock.send(call)
|
1992-12-15 17:44:31 -04:00
|
|
|
while 1:
|
|
|
|
r, w, x = select([self.sock], [], [], timeout)
|
|
|
|
if self.sock not in r:
|
|
|
|
count = count - 1
|
|
|
|
if count < 0: raise RuntimeError, 'timeout'
|
|
|
|
if timeout < 25: timeout = timeout *2
|
|
|
|
print 'RESEND', timeout, count
|
|
|
|
self.sock.send(call)
|
|
|
|
continue
|
|
|
|
reply = self.sock.recv(bufsize)
|
|
|
|
u = self.unpacker
|
|
|
|
u.reset(reply)
|
|
|
|
xid, verf = u.unpack_replyheader()
|
|
|
|
if xid <> self.lastxid:
|
|
|
|
print 'BAD xid'
|
|
|
|
continue
|
|
|
|
break
|
1992-12-14 19:25:04 -04:00
|
|
|
|
|
|
|
def end_call(self):
|
|
|
|
self.unpacker.done()
|
|
|
|
|
|
|
|
|
|
|
|
# Port mapper interface
|
|
|
|
|
|
|
|
PMAP_PORT = 111
|
|
|
|
PMAP_PROG = 100000
|
|
|
|
PMAP_VERS = 2
|
|
|
|
PMAPPROC_NULL = 0 # (void) -> void
|
|
|
|
PMAPPROC_SET = 1 # (mapping) -> bool
|
|
|
|
PMAPPROC_UNSET = 2 # (mapping) -> bool
|
|
|
|
PMAPPROC_GETPORT = 3 # (mapping) -> unsigned int
|
|
|
|
PMAPPROC_DUMP = 4 # (void) -> pmaplist
|
|
|
|
PMAPPROC_CALLIT = 5 # (call_args) -> call_result
|
|
|
|
|
|
|
|
# A mapping is (prog, vers, prot, port) and prot is one of:
|
|
|
|
|
|
|
|
IPPROTO_TCP = 6
|
|
|
|
IPPROTO_UDP = 17
|
|
|
|
|
|
|
|
# A pmaplist is a variable-length list of mappings, as follows:
|
|
|
|
# either (1, mapping, pmaplist) or (0).
|
|
|
|
|
|
|
|
# A call_args is (prog, vers, proc, args) where args is opaque;
|
|
|
|
# a call_result is (port, res) where res is opaque.
|
|
|
|
|
|
|
|
|
|
|
|
class PortMapperPacker(Packer):
|
|
|
|
|
|
|
|
def pack_mapping(self, mapping):
|
|
|
|
prog, vers, prot, port = mapping
|
|
|
|
self.pack_uint(prog)
|
|
|
|
self.pack_uint(vers)
|
|
|
|
self.pack_uint(prot)
|
|
|
|
self.pack_uint(port)
|
|
|
|
|
|
|
|
def pack_pmaplist(self, list):
|
|
|
|
self.pack_list(list, self.pack_mapping)
|
|
|
|
|
|
|
|
|
|
|
|
class PortMapperUnpacker(Unpacker):
|
|
|
|
|
|
|
|
def unpack_mapping(self):
|
|
|
|
prog = self.unpack_uint()
|
|
|
|
vers = self.unpack_uint()
|
|
|
|
prot = self.unpack_uint()
|
|
|
|
port = self.unpack_uint()
|
|
|
|
return prog, vers, prot, port
|
|
|
|
|
|
|
|
def unpack_pmaplist(self):
|
|
|
|
return self.unpack_list(self.unpack_mapping)
|
|
|
|
|
|
|
|
|
|
|
|
class PartialPortMapperClient:
|
|
|
|
|
|
|
|
def addpackers(self):
|
|
|
|
self.packer = PortMapperPacker().init()
|
|
|
|
self.unpacker = PortMapperUnpacker().init('')
|
|
|
|
|
|
|
|
def Getport(self, mapping):
|
|
|
|
self.start_call(PMAPPROC_GETPORT)
|
|
|
|
self.packer.pack_mapping(mapping)
|
|
|
|
self.do_call(4)
|
|
|
|
port = self.unpacker.unpack_uint()
|
|
|
|
self.end_call()
|
|
|
|
return port
|
|
|
|
|
|
|
|
def Dump(self):
|
|
|
|
self.start_call(PMAPPROC_DUMP)
|
|
|
|
self.do_call(8192-512)
|
|
|
|
list = self.unpacker.unpack_pmaplist()
|
|
|
|
self.end_call()
|
|
|
|
return list
|
|
|
|
|
|
|
|
|
|
|
|
class TCPPortMapperClient(PartialPortMapperClient, RawTCPClient):
|
|
|
|
|
|
|
|
def init(self, host):
|
|
|
|
return RawTCPClient.init(self, \
|
|
|
|
host, PMAP_PROG, PMAP_VERS, PMAP_PORT)
|
|
|
|
|
|
|
|
|
|
|
|
class UDPPortMapperClient(PartialPortMapperClient, RawUDPClient):
|
|
|
|
|
|
|
|
def init(self, host):
|
|
|
|
return RawUDPClient.init(self, \
|
|
|
|
host, PMAP_PROG, PMAP_VERS, PMAP_PORT)
|
|
|
|
|
|
|
|
|
|
|
|
class TCPClient(RawTCPClient):
|
|
|
|
|
|
|
|
def init(self, host, prog, vers):
|
|
|
|
pmap = TCPPortMapperClient().init(host)
|
|
|
|
port = pmap.Getport((prog, vers, IPPROTO_TCP, 0))
|
|
|
|
pmap.close()
|
|
|
|
return RawTCPClient.init(self, host, prog, vers, port)
|
|
|
|
|
|
|
|
|
|
|
|
class UDPClient(RawUDPClient):
|
|
|
|
|
|
|
|
def init(self, host, prog, vers):
|
|
|
|
pmap = UDPPortMapperClient().init(host)
|
|
|
|
port = pmap.Getport((prog, vers, IPPROTO_UDP, 0))
|
|
|
|
pmap.close()
|
|
|
|
return RawUDPClient.init(self, host, prog, vers, port)
|
|
|
|
|
|
|
|
|
|
|
|
def test():
|
|
|
|
import T
|
|
|
|
T.TSTART()
|
|
|
|
pmap = UDPPortMapperClient().init('')
|
|
|
|
T.TSTOP()
|
|
|
|
pmap.Null()
|
|
|
|
T.TSTOP()
|
|
|
|
list = pmap.Dump()
|
|
|
|
T.TSTOP()
|
|
|
|
list.sort()
|
|
|
|
for prog, vers, prot, port in list:
|
|
|
|
print prog, vers,
|
|
|
|
if prot == IPPROTO_TCP: print 'tcp',
|
|
|
|
elif prot == IPPROTO_UDP: print 'udp',
|
|
|
|
else: print prot,
|
|
|
|
print port
|