/nova/console/websocketproxy.py

https://github.com/bcwaldon/nova · Python · 95 lines · 52 code · 16 blank · 27 comment · 10 complexity · b5645c41caaa34a84b7dea78c79a6b64 MD5 · raw file

  1. # vim: tabstop=4 shiftwidth=4 softtabstop=4
  2. # Copyright (c) 2012 OpenStack Foundation
  3. # All Rights Reserved.
  4. #
  5. # Licensed under the Apache License, Version 2.0 (the "License"); you may
  6. # not use this file except in compliance with the License. You may obtain
  7. # a copy of the License at
  8. #
  9. # http://www.apache.org/licenses/LICENSE-2.0
  10. #
  11. # Unless required by applicable law or agreed to in writing, software
  12. # distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
  13. # WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
  14. # License for the specific language governing permissions and limitations
  15. # under the License.
  16. '''
  17. Websocket proxy that is compatible with OpenStack Nova.
  18. Leverages websockify.py by Joel Martin
  19. '''
  20. import Cookie
  21. import socket
  22. import websockify
  23. from nova.consoleauth import rpcapi as consoleauth_rpcapi
  24. from nova import context
  25. from nova.openstack.common.gettextutils import _
  26. from nova.openstack.common import log as logging
  27. LOG = logging.getLogger(__name__)
  28. class NovaWebSocketProxy(websockify.WebSocketProxy):
  29. def __init__(self, *args, **kwargs):
  30. websockify.WebSocketProxy.__init__(self, unix_target=None,
  31. target_cfg=None,
  32. ssl_target=None, *args, **kwargs)
  33. def new_client(self):
  34. """
  35. Called after a new WebSocket connection has been established.
  36. """
  37. # Reopen the eventlet hub to make sure we don't share an epoll
  38. # fd with parent and/or siblings, which would be bad
  39. from eventlet import hubs
  40. hubs.use_hub()
  41. cookie = Cookie.SimpleCookie()
  42. cookie.load(self.headers.getheader('cookie'))
  43. token = cookie['token'].value
  44. ctxt = context.get_admin_context()
  45. rpcapi = consoleauth_rpcapi.ConsoleAuthAPI()
  46. connect_info = rpcapi.check_token(ctxt, token=token)
  47. if not connect_info:
  48. LOG.audit("Invalid Token: %s", token)
  49. raise Exception(_("Invalid Token"))
  50. host = connect_info['host']
  51. port = int(connect_info['port'])
  52. # Connect to the target
  53. self.msg("connecting to: %s:%s" % (host, port))
  54. LOG.audit("connecting to: %s:%s" % (host, port))
  55. tsock = self.socket(host, port, connect=True)
  56. # Handshake as necessary
  57. if connect_info.get('internal_access_path'):
  58. tsock.send("CONNECT %s HTTP/1.1\r\n\r\n" %
  59. connect_info['internal_access_path'])
  60. while True:
  61. data = tsock.recv(4096, socket.MSG_PEEK)
  62. if data.find("\r\n\r\n") != -1:
  63. if not data.split("\r\n")[0].find("200"):
  64. LOG.audit("Invalid Connection Info %s", token)
  65. raise Exception(_("Invalid Connection Info"))
  66. tsock.recv(len(data))
  67. break
  68. if self.verbose and not self.daemon:
  69. print(self.traffic_legend)
  70. # Start proxying
  71. try:
  72. self.do_proxy(tsock)
  73. except Exception:
  74. if tsock:
  75. tsock.shutdown(socket.SHUT_RDWR)
  76. tsock.close()
  77. self.vmsg("%s:%s: Target closed" % (host, port))
  78. LOG.audit("%s:%s: Target closed" % (host, port))
  79. raise