2018-10-28 00:03:27 +00:00
|
|
|
(* (c) 2018 Hannes Mehnert, all rights reserved *)
|
|
|
|
|
|
|
|
open Lwt.Infix
|
2019-05-03 18:57:09 +00:00
|
|
|
open X509
|
2018-10-28 00:03:27 +00:00
|
|
|
|
|
|
|
let read fd =
|
|
|
|
(* now we busy read and process output *)
|
2018-11-23 19:28:33 +00:00
|
|
|
Logs.debug (fun m -> m "reading tls stream") ;
|
2018-10-28 00:03:27 +00:00
|
|
|
let rec loop () =
|
2018-11-01 00:51:39 +00:00
|
|
|
Vmm_tls_lwt.read_tls fd >>= function
|
2019-10-10 20:26:36 +00:00
|
|
|
| Error `Eof ->
|
|
|
|
Logs.warn (fun m -> m "eof from server");
|
|
|
|
Lwt.return (Ok ())
|
|
|
|
| Error _ -> Lwt.return (Error (`Msg ("read failure")))
|
2018-11-01 00:51:39 +00:00
|
|
|
| Ok wire ->
|
2019-11-11 20:49:51 +00:00
|
|
|
Albatross_cli.print_result wire ;
|
2018-11-01 00:51:39 +00:00
|
|
|
loop ()
|
2018-10-28 00:03:27 +00:00
|
|
|
in
|
|
|
|
loop ()
|
|
|
|
|
2019-05-03 18:57:09 +00:00
|
|
|
let key_ids exts pub issuer =
|
|
|
|
let auth = (Some (Public_key.id issuer), General_name.empty, None) in
|
|
|
|
Extension.(add Subject_key_id (false, (Public_key.id pub))
|
|
|
|
(add Authority_key_id (false, auth) exts))
|
2018-10-28 00:03:27 +00:00
|
|
|
|
|
|
|
let timestamps validity =
|
|
|
|
let now = Ptime_clock.now () in
|
2019-03-02 20:29:51 +00:00
|
|
|
match
|
2019-05-03 18:57:09 +00:00
|
|
|
(* subtracting some seconds here to not require perfectly synchronised
|
|
|
|
clocks on client and server *)
|
2019-03-02 20:29:51 +00:00
|
|
|
Ptime.sub_span now (Ptime.Span.of_int_s 10),
|
|
|
|
Ptime.add_span now (Ptime.Span.of_int_s validity)
|
|
|
|
with
|
|
|
|
| None, _ | _, None -> invalid_arg "span too big - reached end of ptime"
|
|
|
|
| Some now, Some exp -> (now, exp)
|
2018-10-28 00:03:27 +00:00
|
|
|
|
|
|
|
let handle (host, port) cert key ca id (cmd : Vmm_commands.t) =
|
2019-11-11 20:49:51 +00:00
|
|
|
Printexc.register_printer (function
|
|
|
|
| Tls_lwt.Tls_alert x -> Some ("TLS alert: " ^ Tls.Packet.alert_type_to_string x)
|
|
|
|
| Tls_lwt.Tls_failure f -> Some ("TLS failure: " ^ Tls.Engine.string_of_failure f)
|
|
|
|
| _ -> None) ;
|
2018-10-28 00:03:27 +00:00
|
|
|
Vmm_lwt.read_from_file cert >>= fun cert_cs ->
|
|
|
|
Vmm_lwt.read_from_file key >>= fun key_cs ->
|
2019-05-03 18:57:09 +00:00
|
|
|
match Certificate.decode_pem cert_cs, Private_key.decode_pem key_cs with
|
|
|
|
| Error (`Msg e), _ ->
|
|
|
|
Lwt.fail_with ("couldn't parse certificate (" ^ cert ^ "): " ^ e)
|
|
|
|
| _, Error (`Msg e) ->
|
|
|
|
Lwt.fail_with ("couldn't parse private key (" ^ key ^ "): " ^ e)
|
|
|
|
| Ok cert, Ok key ->
|
|
|
|
let tmpkey = Nocrypto.Rsa.generate 4096 in
|
|
|
|
let name = Vmm_core.Name.to_string id in
|
2018-10-28 00:03:27 +00:00
|
|
|
let extensions =
|
2019-11-11 20:49:51 +00:00
|
|
|
let v = Vmm_asn.to_cert_extension cmd in
|
2019-05-03 18:57:09 +00:00
|
|
|
Extension.(add Key_usage (true, [ `Digital_signature ; `Key_encipherment ])
|
|
|
|
(add Basic_constraints (true, (false, None))
|
|
|
|
(add Ext_key_usage (true, [ `Client_auth ])
|
|
|
|
(singleton (Unsupported Vmm_asn.oid) (false, v)))))
|
2018-10-28 00:03:27 +00:00
|
|
|
in
|
2019-05-03 18:57:09 +00:00
|
|
|
let csr =
|
2019-10-06 21:38:13 +00:00
|
|
|
let name =
|
|
|
|
[ Distinguished_name.(Relative_distinguished_name.singleton (CN name)) ]
|
|
|
|
in
|
2019-05-03 18:57:09 +00:00
|
|
|
let extensions = Signing_request.Ext.(singleton Extensions extensions) in
|
|
|
|
Signing_request.create name ~extensions (`RSA tmpkey)
|
|
|
|
in
|
|
|
|
let mycert =
|
|
|
|
let valid_from, valid_until = timestamps 300 in
|
|
|
|
let extensions =
|
|
|
|
let capub = match key with `RSA key -> Nocrypto.Rsa.pub_of_priv key in
|
|
|
|
key_ids extensions Signing_request.((info csr).public_key) (`RSA capub)
|
|
|
|
in
|
|
|
|
let issuer = Certificate.subject cert in
|
|
|
|
Signing_request.sign csr ~valid_from ~valid_until ~extensions key issuer
|
|
|
|
in
|
|
|
|
let certificates = `Single ([ mycert ; cert ], tmpkey) in
|
|
|
|
X509_lwt.authenticator (`Ca_file ca) >>= fun authenticator ->
|
|
|
|
Lwt_unix.gethostbyname host >>= fun host_entry ->
|
|
|
|
let host_inet_addr = Array.get host_entry.Lwt_unix.h_addr_list 0 in
|
2019-10-10 20:26:36 +00:00
|
|
|
let sockaddr = Lwt_unix.ADDR_INET (host_inet_addr, port) in
|
|
|
|
Vmm_lwt.connect host_entry.h_addrtype sockaddr >>= function
|
|
|
|
| None ->
|
|
|
|
let err =
|
|
|
|
Rresult.R.error_msgf "connection failed to %a" Vmm_lwt.pp_sockaddr sockaddr
|
|
|
|
in
|
|
|
|
Lwt.return err
|
|
|
|
| Some fd ->
|
|
|
|
Logs.debug (fun m -> m "connecting to remote host") ;
|
|
|
|
(* reneg true to allow re-negotiation over the server-authenticated TLS
|
|
|
|
channel (to transport client certificate encrypted), once TLS 1.3 is in
|
|
|
|
(and required) be removed! *)
|
|
|
|
let client = Tls.Config.client ~reneg:true ~certificates ~authenticator () in
|
|
|
|
Tls_lwt.Unix.client_of_fd client (* TODO ~host *) fd >>= fun t ->
|
|
|
|
Logs.debug (fun m -> m "finished tls handshake") ;
|
|
|
|
read t
|
2018-10-28 00:03:27 +00:00
|
|
|
|
|
|
|
let jump endp cert key ca name cmd =
|
2019-10-10 20:26:36 +00:00
|
|
|
Lwt_main.run (handle endp cert key ca name cmd)
|
2018-10-28 00:03:27 +00:00
|
|
|
|
2018-10-28 21:14:39 +00:00
|
|
|
let info_policy _ endp cert key ca name =
|
|
|
|
jump endp cert key ca name (`Policy_cmd `Policy_info)
|
2018-10-28 00:03:27 +00:00
|
|
|
|
|
|
|
let remove_policy _ endp cert key ca name =
|
|
|
|
jump endp cert key ca name (`Policy_cmd `Policy_remove)
|
|
|
|
|
|
|
|
let add_policy _ endp cert key ca name vms memory cpus block bridges =
|
2019-03-27 23:11:43 +00:00
|
|
|
let p = Albatross_cli.policy vms memory cpus block bridges in
|
2018-10-28 21:14:39 +00:00
|
|
|
jump endp cert key ca name (`Policy_cmd (`Policy_add p))
|
2018-10-28 00:03:27 +00:00
|
|
|
|
2018-11-13 00:02:05 +00:00
|
|
|
let info_ _ endp cert key ca name =
|
|
|
|
jump endp cert key ca name (`Unikernel_cmd `Unikernel_info)
|
|
|
|
|
2018-10-28 00:03:27 +00:00
|
|
|
let destroy _ endp cert key ca name =
|
2018-11-13 00:02:05 +00:00
|
|
|
jump endp cert key ca name (`Unikernel_cmd `Unikernel_destroy)
|
2018-10-28 00:03:27 +00:00
|
|
|
|
2019-10-11 22:01:36 +00:00
|
|
|
let create _ endp cert key ca force name image cpuid memory argv block network compression restart_on_fail exit_code =
|
|
|
|
match Albatross_cli.create_vm force image cpuid memory argv block network compression restart_on_fail exit_code with
|
2018-11-13 00:02:05 +00:00
|
|
|
| Ok cmd -> jump endp cert key ca name (`Unikernel_cmd cmd)
|
2019-04-08 14:40:58 +00:00
|
|
|
| Error (`Msg msg) -> Error (`Msg msg)
|
2018-10-28 00:03:27 +00:00
|
|
|
|
2019-10-29 18:42:55 +00:00
|
|
|
let console _ endp cert key ca name since count =
|
|
|
|
jump endp cert key ca name (`Console_cmd (`Console_subscribe (Albatross_cli.since_count since count)))
|
2018-10-28 00:03:27 +00:00
|
|
|
|
|
|
|
let stats _ endp cert key ca name =
|
|
|
|
jump endp cert key ca name (`Stats_cmd `Stats_subscribe)
|
|
|
|
|
2019-10-29 18:42:55 +00:00
|
|
|
let event_log _ endp cert key ca name since count =
|
|
|
|
jump endp cert key ca name (`Log_cmd (`Log_subscribe (Albatross_cli.since_count since count)))
|
2018-10-28 00:03:27 +00:00
|
|
|
|
2018-11-10 00:02:07 +00:00
|
|
|
let block_info _ endp cert key ca block_name =
|
|
|
|
jump endp cert key ca block_name (`Block_cmd `Block_info)
|
|
|
|
|
|
|
|
let block_create _ endp cert key ca block_name block_size =
|
|
|
|
jump endp cert key ca block_name (`Block_cmd (`Block_add block_size))
|
|
|
|
|
|
|
|
let block_destroy _ endp cert key ca block_name =
|
|
|
|
jump endp cert key ca block_name (`Block_cmd `Block_remove)
|
|
|
|
|
2018-10-28 00:03:27 +00:00
|
|
|
let help _ _ man_format cmds = function
|
|
|
|
| None -> `Help (`Pager, None)
|
|
|
|
| Some t when List.mem t cmds -> `Help (man_format, Some t)
|
|
|
|
| Some _ -> List.iter print_endline cmds; `Ok ()
|
|
|
|
|
|
|
|
open Cmdliner
|
2019-03-27 23:11:43 +00:00
|
|
|
open Albatross_cli
|
2018-10-28 00:03:27 +00:00
|
|
|
|
|
|
|
let server_ca =
|
|
|
|
let doc = "The certificate authority used to verify the remote server." in
|
|
|
|
Arg.(value & opt string "cacert.pem" & info [ "server-ca" ] ~doc)
|
|
|
|
|
|
|
|
let ca_cert =
|
|
|
|
let doc = "The certificate authority used to issue the certificate" in
|
|
|
|
Arg.(value & opt string "ca.pem" & info [ "ca" ] ~doc)
|
|
|
|
|
|
|
|
let ca_key =
|
|
|
|
let doc = "The private key of the signing certificate authority" in
|
|
|
|
Arg.(value & opt string "ca.key" & info [ "ca-key" ] ~doc)
|
|
|
|
|
|
|
|
let destination =
|
2018-10-28 23:32:07 +00:00
|
|
|
let doc = "the destination hostname:port to connect to" in
|
2018-10-31 22:41:22 +00:00
|
|
|
Arg.(value & opt host_port ("localhost", 1025) & info [ "d" ; "destination" ] ~doc ~docv:"HOST:PORT")
|
2018-10-28 00:03:27 +00:00
|
|
|
|
|
|
|
let destroy_cmd =
|
|
|
|
let doc = "destroys a virtual machine" in
|
|
|
|
let man =
|
|
|
|
[`S "DESCRIPTION";
|
|
|
|
`P "Destroy a virtual machine."]
|
|
|
|
in
|
2019-04-08 14:40:58 +00:00
|
|
|
Term.(term_result (const destroy $ setup_log $ destination $ ca_cert $ ca_key $ server_ca $ vm_name)),
|
2018-10-28 00:03:27 +00:00
|
|
|
Term.info "destroy" ~doc ~man
|
|
|
|
|
|
|
|
let remove_policy_cmd =
|
|
|
|
let doc = "removes a policy" in
|
|
|
|
let man =
|
|
|
|
[`S "DESCRIPTION";
|
|
|
|
`P "Removes a policy."]
|
|
|
|
in
|
2019-04-08 14:40:58 +00:00
|
|
|
Term.(term_result (const remove_policy $ setup_log $ destination $ ca_cert $ ca_key $ server_ca $ opt_vm_name)),
|
2018-10-28 00:03:27 +00:00
|
|
|
Term.info "remove_policy" ~doc ~man
|
|
|
|
|
|
|
|
let info_cmd =
|
|
|
|
let doc = "information about VMs" in
|
|
|
|
let man =
|
|
|
|
[`S "DESCRIPTION";
|
|
|
|
`P "Shows information about VMs."]
|
|
|
|
in
|
2019-04-08 14:40:58 +00:00
|
|
|
Term.(term_result (const info_ $ setup_log $ destination $ ca_cert $ ca_key $ server_ca $ opt_vm_name)),
|
2018-10-28 00:03:27 +00:00
|
|
|
Term.info "info" ~doc ~man
|
|
|
|
|
|
|
|
let policy_cmd =
|
|
|
|
let doc = "active policies" in
|
|
|
|
let man =
|
|
|
|
[`S "DESCRIPTION";
|
|
|
|
`P "Shows information about policies."]
|
|
|
|
in
|
2019-04-08 14:40:58 +00:00
|
|
|
Term.(term_result (const info_policy $ setup_log $ destination $ ca_cert $ ca_key $ server_ca $ opt_vm_name)),
|
2018-10-28 00:03:27 +00:00
|
|
|
Term.info "policy" ~doc ~man
|
|
|
|
|
|
|
|
let add_policy_cmd =
|
|
|
|
let doc = "Add a policy" in
|
|
|
|
let man =
|
|
|
|
[`S "DESCRIPTION";
|
|
|
|
`P "Adds a policy."]
|
|
|
|
in
|
2019-04-08 14:40:58 +00:00
|
|
|
Term.(term_result (const add_policy $ setup_log $ destination $ ca_cert $ ca_key $ server_ca $ vm_name $ vms $ mem $ cpus $ opt_block_size $ bridge)),
|
2018-10-28 00:03:27 +00:00
|
|
|
Term.info "add_policy" ~doc ~man
|
|
|
|
|
|
|
|
let create_cmd =
|
|
|
|
let doc = "creates a virtual machine" in
|
|
|
|
let man =
|
|
|
|
[`S "DESCRIPTION";
|
|
|
|
`P "Creates a virtual machine."]
|
|
|
|
in
|
2019-10-11 22:01:36 +00:00
|
|
|
Term.(term_result (const create $ setup_log $ destination $ ca_cert $ ca_key $ server_ca $ force $ vm_name $ image $ cpu $ vm_mem $ args $ block $ net $ compress_level 9 $ restart_on_fail $ exit_code)),
|
2018-10-28 00:03:27 +00:00
|
|
|
Term.info "create" ~doc ~man
|
|
|
|
|
|
|
|
let console_cmd =
|
|
|
|
let doc = "console of a VM" in
|
|
|
|
let man =
|
|
|
|
[`S "DESCRIPTION";
|
|
|
|
`P "Shows console output of a VM."]
|
|
|
|
in
|
2019-10-29 18:42:55 +00:00
|
|
|
Term.(term_result (const console $ setup_log $ destination $ ca_cert $ ca_key $ server_ca $ vm_name $ since $ count)),
|
2018-10-28 00:03:27 +00:00
|
|
|
Term.info "console" ~doc ~man
|
|
|
|
|
|
|
|
let stats_cmd =
|
|
|
|
let doc = "statistics of VMs" in
|
|
|
|
let man =
|
|
|
|
[`S "DESCRIPTION";
|
|
|
|
`P "Shows statistics of VMs."]
|
|
|
|
in
|
2019-04-08 14:40:58 +00:00
|
|
|
Term.(term_result (const stats $ setup_log $ destination $ ca_cert $ ca_key $ server_ca $ opt_vm_name)),
|
2018-10-28 00:03:27 +00:00
|
|
|
Term.info "stats" ~doc ~man
|
|
|
|
|
|
|
|
let log_cmd =
|
|
|
|
let doc = "Event log" in
|
|
|
|
let man =
|
|
|
|
[`S "DESCRIPTION";
|
|
|
|
`P "Shows event log of VM."]
|
|
|
|
in
|
2019-10-29 18:42:55 +00:00
|
|
|
Term.(term_result (const event_log $ setup_log $ destination $ ca_cert $ ca_key $ server_ca $ opt_vm_name $ since $ count)),
|
2018-10-28 00:03:27 +00:00
|
|
|
Term.info "log" ~doc ~man
|
|
|
|
|
2018-11-10 00:02:07 +00:00
|
|
|
let block_info_cmd =
|
|
|
|
let doc = "Information about block devices" in
|
|
|
|
let man =
|
|
|
|
[`S "DESCRIPTION";
|
|
|
|
`P "Block device information."]
|
|
|
|
in
|
2019-04-08 14:40:58 +00:00
|
|
|
Term.(term_result (const block_info $ setup_log $ destination $ ca_cert $ ca_key $ server_ca $ opt_block_name)),
|
2018-11-10 00:02:07 +00:00
|
|
|
Term.info "block" ~doc ~man
|
|
|
|
|
|
|
|
let block_create_cmd =
|
|
|
|
let doc = "Create a block device" in
|
|
|
|
let man =
|
|
|
|
[`S "DESCRIPTION";
|
|
|
|
`P "Creation of a block device."]
|
|
|
|
in
|
2019-04-08 14:40:58 +00:00
|
|
|
Term.(term_result (const block_create $ setup_log $ destination $ ca_cert $ ca_key $ server_ca $ block_name $ block_size)),
|
2018-11-10 00:02:07 +00:00
|
|
|
Term.info "create_block" ~doc ~man
|
|
|
|
|
|
|
|
let block_destroy_cmd =
|
|
|
|
let doc = "Destroys a block device" in
|
|
|
|
let man =
|
|
|
|
[`S "DESCRIPTION";
|
|
|
|
`P "Destroys a block device."]
|
|
|
|
in
|
2019-04-08 14:40:58 +00:00
|
|
|
Term.(term_result (const block_destroy $ setup_log $ destination $ ca_cert $ ca_key $ server_ca $ block_name)),
|
2018-11-10 00:02:07 +00:00
|
|
|
Term.info "destroy_block" ~doc ~man
|
|
|
|
|
2018-10-28 00:03:27 +00:00
|
|
|
let help_cmd =
|
|
|
|
let topic =
|
|
|
|
let doc = "The topic to get help on. `topics' lists the topics." in
|
|
|
|
Arg.(value & pos 0 (some string) None & info [] ~docv:"TOPIC" ~doc)
|
|
|
|
in
|
|
|
|
let doc = "display help about vmmc" in
|
|
|
|
let man =
|
|
|
|
[`S "DESCRIPTION";
|
|
|
|
`P "Prints help about conex commands and subcommands"]
|
|
|
|
in
|
|
|
|
Term.(ret (const help $ setup_log $ destination $ Term.man_format $ Term.choice_names $ topic)),
|
|
|
|
Term.info "help" ~doc ~man
|
|
|
|
|
|
|
|
let default_cmd =
|
2019-03-27 23:11:43 +00:00
|
|
|
let doc = "Albatross client and go to bistro" in
|
2018-10-28 00:03:27 +00:00
|
|
|
let man = [
|
|
|
|
`S "DESCRIPTION" ;
|
|
|
|
`P "$(tname) executes the provided subcommand on a remote albatross" ]
|
|
|
|
in
|
|
|
|
Term.(ret (const help $ setup_log $ destination $ Term.man_format $ Term.choice_names $ Term.pure None)),
|
2019-11-11 20:49:51 +00:00
|
|
|
Term.info "albatross_client_bistro" ~version ~doc ~man
|
2018-10-28 00:03:27 +00:00
|
|
|
|
2018-11-10 00:02:07 +00:00
|
|
|
let cmds = [ help_cmd ; info_cmd ;
|
|
|
|
policy_cmd ; remove_policy_cmd ; add_policy_cmd ;
|
|
|
|
destroy_cmd ; create_cmd ;
|
|
|
|
block_info_cmd ; block_create_cmd ; block_destroy_cmd ;
|
|
|
|
console_cmd ; stats_cmd ; log_cmd ]
|
2018-10-28 00:03:27 +00:00
|
|
|
|
|
|
|
let () =
|
|
|
|
match Term.eval_choice default_cmd cmds
|
|
|
|
with `Ok () -> exit 0 | _ -> exit 1
|