(* (c) 2018 Hannes Mehnert, all rights reserved *) open Lwt.Infix open X509 let read fd = (* now we busy read and process output *) Logs.debug (fun m -> m "reading tls stream") ; let rec loop () = Vmm_tls_lwt.read_tls fd >>= function | Error `Eof -> Logs.debug (fun m -> m "eof from server"); Lwt.return Albatross_cli.Success | Error _ -> Lwt.return Albatross_cli.Communication_failed | Ok wire -> match Albatross_cli.output_result wire with | Ok () -> loop () | Error e -> Lwt.return e in loop () let key_ids exts pub issuer = let auth = (Some (Public_key.id issuer), General_name.empty, None) in Extension.(add Subject_key_id (false, (Public_key.id pub)) (add Authority_key_id (false, auth) exts)) let timestamps validity = let now = Ptime_clock.now () in match (* subtracting some seconds here to not require perfectly synchronised clocks on client and server *) Ptime.sub_span now (Ptime.Span.of_int_s 10), Ptime.add_span now (Ptime.Span.of_int_s validity) with | None, _ | _, None -> invalid_arg "span too big - reached end of ptime" | Some now, Some exp -> (now, exp) let handle (host, port) cert key ca id (cmd : Vmm_commands.t) = Printexc.register_printer (function | Tls_lwt.Tls_alert x -> Some ("TLS alert: " ^ Tls.Packet.alert_type_to_string x) | Tls_lwt.Tls_failure f -> Some ("TLS failure: " ^ Tls.Engine.string_of_failure f) | _ -> None) ; Vmm_lwt.read_from_file cert >>= fun cert_cs -> Vmm_lwt.read_from_file key >>= fun key_cs -> match Certificate.decode_pem cert_cs, Private_key.decode_pem key_cs with | Error (`Msg e), _ -> Lwt.fail_with ("couldn't parse certificate (" ^ cert ^ "): " ^ e) | _, Error (`Msg e) -> Lwt.fail_with ("couldn't parse private key (" ^ key ^ "): " ^ e) | Ok cert, Ok key -> let tmpkey = Mirage_crypto_pk.Rsa.generate ~bits:4096 () in let name = Vmm_core.Name.to_string id in let extensions = let v = Vmm_asn.to_cert_extension cmd in Extension.(add Key_usage (true, [ `Digital_signature ; `Key_encipherment ]) (add Basic_constraints (true, (false, None)) (add Ext_key_usage (true, [ `Client_auth ]) (singleton (Unsupported Vmm_asn.oid) (false, v))))) in let csr = let name = [ Distinguished_name.(Relative_distinguished_name.singleton (CN name)) ] in let extensions = Signing_request.Ext.(singleton Extensions extensions) in Signing_request.create name ~extensions (`RSA tmpkey) in let valid_from, valid_until = timestamps 300 in let extensions = let capub = match key with `RSA key -> Mirage_crypto_pk.Rsa.pub_of_priv key in key_ids extensions Signing_request.((info csr).public_key) (`RSA capub) in let issuer = Certificate.subject cert in match Rresult.R.error_to_msg ~pp_error:X509.Validation.pp_signature_error (Signing_request.sign csr ~valid_from ~valid_until ~extensions key issuer) with | Error `Msg m -> Lwt.fail_with m | Ok mycert -> let certificates = `Single ([ mycert ; cert ], tmpkey) in X509_lwt.authenticator (`Ca_file ca) >>= fun authenticator -> Lwt_unix.gethostbyname host >>= fun host_entry -> let host_inet_addr = Array.get host_entry.Lwt_unix.h_addr_list 0 in let sockaddr = Lwt_unix.ADDR_INET (host_inet_addr, port) in Vmm_lwt.connect host_entry.h_addrtype sockaddr >>= function | None -> Logs.err (fun m -> m "connection failed to %a" Vmm_lwt.pp_sockaddr sockaddr); Lwt.return Albatross_cli.Connect_failed | Some fd -> Logs.debug (fun m -> m "connected to remote host") ; (* reneg true to allow re-negotiation over the server-authenticated TLS channel (to transport client certificate encrypted), once TLS 1.3 is in (and required) be removed! *) let client = Tls.Config.client ~reneg:true ~certificates ~authenticator () in Lwt.catch (fun () -> Tls_lwt.Unix.client_of_fd client (* TODO ~host *) fd >>= fun t -> Logs.debug (fun m -> m "finished tls handshake") ; read t) (fun exn -> Lwt.return (Albatross_tls_common.classify_tls_error exn)) let jump endp cert key ca name cmd = Lwt_main.run (handle endp cert key ca name cmd) let info_policy _ endp cert key ca name = jump endp cert key ca name (`Policy_cmd `Policy_info) let remove_policy _ endp cert key ca name = jump endp cert key ca name (`Policy_cmd `Policy_remove) let add_policy _ endp cert key ca name vms memory cpus block bridges = let p = Albatross_cli.policy vms memory cpus block bridges in jump endp cert key ca name (`Policy_cmd (`Policy_add p)) let info_ _ endp cert key ca name = jump endp cert key ca name (`Unikernel_cmd `Unikernel_info) let get _ endp cert key ca name = jump endp cert key ca name (`Unikernel_cmd `Unikernel_get) let destroy _ endp cert key ca name = jump endp cert key ca name (`Unikernel_cmd `Unikernel_destroy) let create _ endp cert key ca force name image cpuid memory argv block network compression restart_on_fail exit_code = match Albatross_cli.create_vm force image cpuid memory argv block network compression restart_on_fail exit_code with | Ok cmd -> jump endp cert key ca name (`Unikernel_cmd cmd) | Error (`Msg msg) -> failwith msg let console _ endp cert key ca name since count = jump endp cert key ca name (`Console_cmd (`Console_subscribe (Albatross_cli.since_count since count))) let stats _ endp cert key ca name = jump endp cert key ca name (`Stats_cmd `Stats_subscribe) let event_log _ endp cert key ca name since count = jump endp cert key ca name (`Log_cmd (`Log_subscribe (Albatross_cli.since_count since count))) let block_info _ endp cert key ca block_name = jump endp cert key ca block_name (`Block_cmd `Block_info) let block_create _ endp cert key ca block_name block_size = jump endp cert key ca block_name (`Block_cmd (`Block_add block_size)) let block_destroy _ endp cert key ca block_name = jump endp cert key ca block_name (`Block_cmd `Block_remove) let help _ _ man_format cmds = function | None -> `Help (`Pager, None) | Some t when List.mem t cmds -> `Help (man_format, Some t) | Some x -> print_endline ("unknown command '" ^ x ^ "', available commands:"); List.iter print_endline cmds; `Ok Albatross_cli.Cli_failed open Cmdliner open Albatross_cli let exits = auth_exits @ exits let server_ca = let doc = "The certificate authority used to verify the remote server." in Arg.(value & opt string "cacert.pem" & info [ "server-ca" ] ~doc) let ca_cert = let doc = "The certificate authority used to issue the certificate" in Arg.(value & opt string "ca.pem" & info [ "ca" ] ~doc) let ca_key = let doc = "The private key of the signing certificate authority" in Arg.(value & opt string "ca.key" & info [ "ca-key" ] ~doc) let destination = let doc = "the destination hostname:port to connect to" in Arg.(value & opt host_port ("localhost", 1025) & info [ "d" ; "destination" ] ~doc ~docv:"HOST:PORT") let destroy_cmd = let doc = "destroys a virtual machine" in let man = [`S "DESCRIPTION"; `P "Destroy a virtual machine."] in Term.(const destroy $ setup_log $ destination $ ca_cert $ ca_key $ server_ca $ vm_name), Term.info "destroy" ~doc ~man ~exits let remove_policy_cmd = let doc = "removes a policy" in let man = [`S "DESCRIPTION"; `P "Removes a policy."] in Term.(const remove_policy $ setup_log $ destination $ ca_cert $ ca_key $ server_ca $ opt_vm_name), Term.info "remove_policy" ~doc ~man ~exits let info_cmd = let doc = "information about VMs" in let man = [`S "DESCRIPTION"; `P "Shows information about VMs."] in Term.(const info_ $ setup_log $ destination $ ca_cert $ ca_key $ server_ca $ opt_vm_name), Term.info "info" ~doc ~man ~exits let get_cmd = let doc = "retrieve a VM" in let man = [`S "DESCRIPTION"; `P "Downloads a VM."] in Term.(const get $ setup_log $ destination $ ca_cert $ ca_key $ server_ca $ vm_name), Term.info "get" ~doc ~man ~exits let policy_cmd = let doc = "active policies" in let man = [`S "DESCRIPTION"; `P "Shows information about policies."] in Term.(const info_policy $ setup_log $ destination $ ca_cert $ ca_key $ server_ca $ opt_vm_name), Term.info "policy" ~doc ~man ~exits let add_policy_cmd = let doc = "Add a policy" in let man = [`S "DESCRIPTION"; `P "Adds a policy."] in Term.(const add_policy $ setup_log $ destination $ ca_cert $ ca_key $ server_ca $ vm_name $ vms $ mem $ cpus $ opt_block_size $ bridge), Term.info "add_policy" ~doc ~man ~exits let create_cmd = let doc = "creates a virtual machine" in let man = [`S "DESCRIPTION"; `P "Creates a virtual machine."] in Term.(const create $ setup_log $ destination $ ca_cert $ ca_key $ server_ca $ force $ vm_name $ image $ cpu $ vm_mem $ args $ block $ net $ compress_level 9 $ restart_on_fail $ exit_code), Term.info "create" ~doc ~man ~exits let console_cmd = let doc = "console of a VM" in let man = [`S "DESCRIPTION"; `P "Shows console output of a VM."] in Term.(const console $ setup_log $ destination $ ca_cert $ ca_key $ server_ca $ vm_name $ since $ count), Term.info "console" ~doc ~man ~exits let stats_cmd = let doc = "statistics of VMs" in let man = [`S "DESCRIPTION"; `P "Shows statistics of VMs."] in Term.(const stats $ setup_log $ destination $ ca_cert $ ca_key $ server_ca $ opt_vm_name), Term.info "stats" ~doc ~man ~exits let log_cmd = let doc = "Event log" in let man = [`S "DESCRIPTION"; `P "Shows event log of VM."] in Term.(const event_log $ setup_log $ destination $ ca_cert $ ca_key $ server_ca $ opt_vm_name $ since $ count), Term.info "log" ~doc ~man ~exits let block_info_cmd = let doc = "Information about block devices" in let man = [`S "DESCRIPTION"; `P "Block device information."] in Term.(const block_info $ setup_log $ destination $ ca_cert $ ca_key $ server_ca $ opt_block_name), Term.info "block" ~doc ~man ~exits let block_create_cmd = let doc = "Create a block device" in let man = [`S "DESCRIPTION"; `P "Creation of a block device."] in Term.(const block_create $ setup_log $ destination $ ca_cert $ ca_key $ server_ca $ block_name $ block_size), Term.info "create_block" ~doc ~man ~exits let block_destroy_cmd = let doc = "Destroys a block device" in let man = [`S "DESCRIPTION"; `P "Destroys a block device."] in Term.(const block_destroy $ setup_log $ destination $ ca_cert $ ca_key $ server_ca $ block_name), Term.info "destroy_block" ~doc ~man ~exits let help_cmd = let topic = let doc = "The topic to get help on. `topics' lists the topics." in Arg.(value & pos 0 (some string) None & info [] ~docv:"TOPIC" ~doc) in let doc = "display help about vmmc" in let man = [`S "DESCRIPTION"; `P "Prints help about conex commands and subcommands"] in Term.(ret (const help $ setup_log $ destination $ Term.man_format $ Term.choice_names $ topic)), Term.info "help" ~doc ~man ~exits let default_cmd = let doc = "Albatross client and go to bistro" in let man = [ `S "DESCRIPTION" ; `P "$(tname) executes the provided subcommand on a remote albatross" ] in Term.(ret (const help $ setup_log $ destination $ Term.man_format $ Term.choice_names $ Term.pure None)), Term.info "albatross_client_bistro" ~version ~doc ~man ~exits let cmds = [ help_cmd ; policy_cmd ; remove_policy_cmd ; add_policy_cmd ; info_cmd ; get_cmd ; destroy_cmd ; create_cmd ; block_info_cmd ; block_create_cmd ; block_destroy_cmd ; console_cmd ; stats_cmd ; log_cmd ] let () = match Term.eval_choice default_cmd cmds with | `Ok x -> exit (exit_status_to_int x) | y -> exit (Term.exit_status_of_result y)