per Intel policy to include file commit date using git cmd below. The policy does not apply to non-Intel (C) notices. git log --follow -C90% --format=%ad --date default <file> | tail -1 and then pull just the year from the result. Intel copyrights were not added to files where Intel either had no contribution ot the contribution lacked substance (ie license header updates, formatting changes, etc) Note that several files in this patch didn't end the license/(c) block with a blank comment line so these were added as the vast majority of files do have this last blank line. Simply there for consistency. Signed-off-by: paul luse <paul.e.luse@intel.com> Change-Id: I6cd3f18d1b469d5ef249d26ddb2923ca6b970bd4 Reviewed-on: https://review.spdk.io/gerrit/c/spdk/spdk/+/15208 Tested-by: SPDK CI Jenkins <sys_sgci@intel.com> Reviewed-by: Ben Walker <benjamin.walker@intel.com> Reviewed-by: Jim Harris <james.r.harris@intel.com>
156 lines
4.4 KiB
Python
Executable File
156 lines
4.4 KiB
Python
Executable File
#!/usr/bin/env python3
|
|
# SPDX-License-Identifier: BSD-3-Clause
|
|
# Copyright (C) 2018 Intel Corporation
|
|
# All rights reserved.
|
|
#
|
|
|
|
import argparse
|
|
import base64
|
|
import errno
|
|
import json
|
|
import os
|
|
import socket
|
|
import ssl
|
|
import sys
|
|
try:
|
|
from BaseHTTPServer import HTTPServer, BaseHTTPRequestHandler
|
|
except ImportError:
|
|
from http.server import HTTPServer
|
|
from http.server import BaseHTTPRequestHandler
|
|
|
|
sys.path.append(os.path.dirname(__file__) + '/../python')
|
|
|
|
from spdk.rpc.client import print_json # noqa
|
|
|
|
rpc_sock = None
|
|
|
|
parser = argparse.ArgumentParser(description='http(s) proxy for SPDK RPC calls')
|
|
parser.add_argument('host', help='Host name / IP representing proxy server')
|
|
parser.add_argument('port', help='Port number', type=int)
|
|
parser.add_argument('user', help='User name used for authentication')
|
|
parser.add_argument('password', help='Password used for authentication')
|
|
parser.add_argument('-s', dest='sock', help='RPC domain socket path', default='/var/tmp/spdk.sock')
|
|
parser.add_argument('-c', dest='cert', help='SSL certificate')
|
|
|
|
|
|
def print_usage_and_exit(status):
|
|
print('Usage: rpc_http_proxy.py <server IP> <server port> <user name>' +
|
|
' <password> <SPDK RPC socket (optional, default: /var/tmp/spdk.sock)>')
|
|
sys.exit(status)
|
|
|
|
|
|
def rpc_call(req):
|
|
global rpc_sock
|
|
|
|
sock = socket.socket(socket.AF_UNIX, socket.SOCK_STREAM)
|
|
sock.connect(rpc_sock)
|
|
sock.sendall(req)
|
|
|
|
if 'id' not in json.loads(req.decode('ascii')):
|
|
sock.close()
|
|
return None
|
|
|
|
buf = ''
|
|
closed = False
|
|
response = None
|
|
|
|
print_json(req.decode('ascii'))
|
|
|
|
while not closed:
|
|
newdata = sock.recv(1024)
|
|
if (newdata == b''):
|
|
closed = True
|
|
buf += newdata.decode('ascii')
|
|
try:
|
|
response = json.loads(buf)
|
|
except ValueError:
|
|
continue # incomplete response; keep buffering
|
|
break
|
|
|
|
sock.close()
|
|
|
|
if not response and len(buf) > 0:
|
|
raise
|
|
|
|
print_json(buf)
|
|
|
|
return buf
|
|
|
|
|
|
class ServerHandler(BaseHTTPRequestHandler):
|
|
|
|
key = ""
|
|
|
|
def do_HEAD(self):
|
|
self.send_response(200)
|
|
self.send_header('Content-type', 'text/html')
|
|
self.end_headers()
|
|
|
|
def do_AUTHHEAD(self):
|
|
self.send_response(401)
|
|
self.send_header('WWW-Authenticate', 'text/html')
|
|
self.send_header('Content-type', 'text/html')
|
|
self.end_headers()
|
|
|
|
def do_INTERNALERROR(self):
|
|
self.send_response(500)
|
|
self.send_header('Content-type', 'text/html')
|
|
self.end_headers()
|
|
|
|
def do_POST(self):
|
|
if self.headers['Authorization'] != 'Basic ' + self.key:
|
|
self.do_AUTHHEAD()
|
|
else:
|
|
if "Content-Length" in self.headers:
|
|
data_string = self.rfile.read(int(self.headers['Content-Length']))
|
|
elif "chunked" in self.headers.get("Transfer-Encoding", ""):
|
|
data_string = b''
|
|
while True:
|
|
line = self.rfile.readline().strip()
|
|
chunk_length = int(line, 16)
|
|
|
|
if chunk_length != 0:
|
|
chunk = self.rfile.read(chunk_length)
|
|
data_string += chunk
|
|
|
|
# Each chunk is followed by an additional empty newline
|
|
# that we have to consume.
|
|
self.rfile.readline()
|
|
|
|
# Finally, a chunk size of 0 is an end indication
|
|
if chunk_length == 0:
|
|
break
|
|
|
|
try:
|
|
response = rpc_call(data_string)
|
|
if response is not None:
|
|
self.do_HEAD()
|
|
self.wfile.write(bytes(response.encode(encoding='ascii')))
|
|
except ValueError:
|
|
self.do_INTERNALERROR()
|
|
|
|
|
|
def main():
|
|
global rpc_sock
|
|
|
|
args = parser.parse_args()
|
|
rpc_sock = args.sock
|
|
|
|
# encoding user name and password
|
|
key = base64.b64encode((args.user+':'+args.password).encode(encoding='ascii')).decode('ascii')
|
|
|
|
try:
|
|
ServerHandler.key = key
|
|
httpd = HTTPServer((args.host, args.port), ServerHandler)
|
|
if args.cert is not None:
|
|
httpd.socket = ssl.wrap_socket(httpd.socket, certfile=args.cert, server_side=True)
|
|
print('Started RPC http proxy server')
|
|
httpd.serve_forever()
|
|
except KeyboardInterrupt:
|
|
print('Shutting down server')
|
|
httpd.socket.close()
|
|
|
|
|
|
if __name__ == '__main__':
|
|
main()
|