2
0

pypubsub.py 18 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416
  1. #!/usr/bin/env python3
  2. # Licensed to the Apache Software Foundation (ASF) under one
  3. # or more contributor license agreements. See the NOTICE file
  4. # distributed with this work for additional information
  5. # regarding copyright ownership. The ASF licenses this file
  6. # to you under the Apache License, Version 2.0 (the
  7. # "License"); you may not use this file except in compliance
  8. # with the License. You may obtain a copy of the License at
  9. #
  10. # http://www.apache.org/licenses/LICENSE-2.0
  11. #
  12. # Unless required by applicable law or agreed to in writing,
  13. # software distributed under the License is distributed on an
  14. # "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
  15. # KIND, either express or implied. See the License for the
  16. # specific language governing permissions and limitations
  17. # under the License.
  18. """PyPubSub - a simple publisher/subscriber service written in Python 3"""
  19. import asyncio
  20. import aiohttp.web
  21. import aiofile
  22. import os
  23. import time
  24. import json
  25. import yaml
  26. import netaddr
  27. import binascii
  28. import base64
  29. import argparse
  30. import collections
  31. import plugins.ldap
  32. import plugins.sqs
  33. # Some consts
  34. PUBSUB_VERSION = '0.6.3'
  35. PUBSUB_CONTENT_TYPE = 'application/vnd.pypubsub-stream'
  36. PUBSUB_DEFAULT_PORT = 2069
  37. PUBSUB_DEFAULT_IP = '0.0.0.0'
  38. PUBSUB_DEFAULT_MAX_PAYLOAD_SIZE = 102400
  39. PUBSUB_DEFAULT_BACKLOG_SIZE = 0
  40. PUBSUB_DEFAULT_BACKLOG_AGE = 0
  41. PUBSUB_BAD_REQUEST = "I could not understand your request, sorry! Please see https://pubsub.apache.org/api.html \
  42. for usage documentation.\n"
  43. PUBSUB_PAYLOAD_RECEIVED = "Payload received, thank you very much!\n"
  44. PUBSUB_NOT_ALLOWED = "You are not authorized to deliver payloads!\n"
  45. PUBSUB_BAD_PAYLOAD = "Bad payload type. Payloads must be JSON dictionary objects, {..}!\n"
  46. PUBSUB_PAYLOAD_TOO_LARGE = "Payload is too large for me to serve, please make it shorter.\n"
  47. PUBSUB_WRITE_TIMEOUT = 0.35 # If we can't deliver to a pipe within N seconds, drop it.
  48. class Configuration:
  49. def __init__(self, yml):
  50. # LDAP Settings
  51. self.ldap = None
  52. lyml = yml.get('clients', {}).get('ldap')
  53. if isinstance(lyml, dict):
  54. self.ldap = plugins.ldap.LDAPConnection(lyml)
  55. # SQS?
  56. self.sqs = yml.get('sqs')
  57. # Main server config
  58. self.server = collections.namedtuple('serverConfig', 'ip port payload_limit')
  59. self.server.ip = yml['server'].get('bind', PUBSUB_DEFAULT_IP)
  60. self.server.port = int(yml['server'].get('port', PUBSUB_DEFAULT_PORT))
  61. self.server.payload_limit = int(yml['server'].get('max_payload_size', PUBSUB_DEFAULT_MAX_PAYLOAD_SIZE))
  62. # Backlog settings
  63. self.backlog = collections.namedtuple('backlogConfig', 'max_age queue_size storage')
  64. bma = yml['server'].get('backlog', {}).get('max_age', PUBSUB_DEFAULT_BACKLOG_AGE)
  65. if isinstance(bma, str):
  66. bma = bma.lower()
  67. if bma.endswith('s'):
  68. bma = int(bma.replace('s', ''))
  69. elif bma.endswith('m'):
  70. bma = int(bma.replace('m', '')) * 60
  71. elif bma.endswith('h'):
  72. bma = int(bma.replace('h', '')) * 3600
  73. elif bma.endswith('d'):
  74. bma = int(bma.replace('d', '')) * 86400
  75. self.backlog.max_age = bma
  76. self.backlog.queue_size = yml['server'].get('backlog', {}).get('size',
  77. PUBSUB_DEFAULT_BACKLOG_SIZE)
  78. self.backlog.storage = yml['server'].get('backlog', {}).get('storage')
  79. # Payloaders - clients that can post payloads
  80. self.payloaders = [netaddr.IPNetwork(x) for x in yml['clients'].get('payloaders', [])]
  81. # Binary backwards compatibility
  82. self.oldschoolers = yml['clients'].get('oldschoolers', [])
  83. class Server:
  84. """Main server class, responsible for handling requests and publishing events """
  85. def __init__(self, args):
  86. self.yaml = yaml.safe_load(open(args.config))
  87. self.config = Configuration(self.yaml)
  88. self.subscribers = []
  89. self.pending_events = []
  90. self.backlog = []
  91. self.last_ping = time.time()
  92. self.server = None
  93. self.acl = {}
  94. try:
  95. self.acl = yaml.safe_load(open(args.acl))
  96. except FileNotFoundError:
  97. print(f"ACL configuration file {args.acl} not found, private events will not be broadcast.")
  98. async def poll(self):
  99. """Polls for new stuff to publish, and if found, publishes to whomever wants it."""
  100. while True:
  101. for payload in self.pending_events:
  102. bad_subs = await payload.publish(self.subscribers)
  103. # Cull subscribers we couldn't deliver payload to.
  104. for bad_sub in bad_subs:
  105. print("Culling %r due to connection errors" % bad_sub)
  106. try:
  107. self.subscribers.remove(bad_sub)
  108. except ValueError: # Already removed elsewhere
  109. pass
  110. self.pending_events = []
  111. await asyncio.sleep(0.1)
  112. async def handle_request(self, request):
  113. """Generic handler for all incoming HTTP requests"""
  114. # Define response headers first...
  115. headers = {
  116. 'Server': 'PyPubSub/%s' % PUBSUB_VERSION,
  117. 'X-Subscribers': str(len(self.subscribers)),
  118. 'X-Requests': str(self.server.requests_count),
  119. }
  120. # Are we handling a publisher payload request? (PUT/POST)
  121. if request.method in ['PUT', 'POST']:
  122. ip = netaddr.IPAddress(request.remote)
  123. allowed = False
  124. for network in self.config.payloaders:
  125. if ip in network:
  126. allowed = True
  127. break
  128. if not allowed:
  129. resp = aiohttp.web.Response(headers=headers, status=403, text=PUBSUB_NOT_ALLOWED)
  130. return resp
  131. if request.can_read_body:
  132. try:
  133. if request.content_length > self.config.server.payload_limit:
  134. resp = aiohttp.web.Response(headers=headers, status=400, text=PUBSUB_PAYLOAD_TOO_LARGE)
  135. return resp
  136. body = await request.text()
  137. as_json = json.loads(body)
  138. assert isinstance(as_json, dict) # Payload MUST be an dictionary object, {...}
  139. pl = Payload(request.path, as_json)
  140. self.pending_events.append(pl)
  141. # Add to backlog?
  142. if self.config.backlog.queue_size > 0:
  143. self.backlog.append(pl)
  144. # If backlog has grown too large, delete the first (oldest) item in it.
  145. if len(self.backlog) > self.config.backlog.queue_size:
  146. del self.backlog[0]
  147. resp = aiohttp.web.Response(headers=headers, status=202, text=PUBSUB_PAYLOAD_RECEIVED)
  148. return resp
  149. except json.decoder.JSONDecodeError:
  150. resp = aiohttp.web.Response(headers=headers, status=400, text=PUBSUB_BAD_REQUEST)
  151. return resp
  152. except AssertionError:
  153. resp = aiohttp.web.Response(headers=headers, status=400, text=PUBSUB_BAD_PAYLOAD)
  154. return resp
  155. # Is this a subscriber request? (GET)
  156. elif request.method == 'GET':
  157. resp = aiohttp.web.StreamResponse(headers=headers)
  158. # We do not support HTTP 1.0 here...
  159. if request.version.major == 1 and request.version.minor == 0:
  160. return resp
  161. subscriber = Subscriber(self, resp, request)
  162. # Is there a basic auth in this request? If so, set up ACL
  163. auth = request.headers.get('Authorization')
  164. if auth:
  165. subscriber.acl = await subscriber.parse_acl(auth)
  166. # Subscribe the user before we deal with the potential backlog request and pings
  167. self.subscribers.append(subscriber)
  168. resp.content_type = PUBSUB_CONTENT_TYPE
  169. try:
  170. resp.enable_chunked_encoding()
  171. await resp.prepare(request)
  172. # Is the client requesting a backlog of items?
  173. backlog = request.headers.get('X-Fetch-Since')
  174. if backlog:
  175. try:
  176. backlog_ts = int(backlog)
  177. except ValueError: # Default to 0 if we can't parse the epoch
  178. backlog_ts = 0
  179. # If max age is specified, force the TS to minimum that age
  180. if self.config.backlog.max_age > 0:
  181. backlog_ts = max(backlog_ts, time.time() - self.config.backlog.max_age)
  182. # For each item, publish to client if new enough.
  183. for item in self.backlog:
  184. if item.timestamp >= backlog_ts:
  185. await item.publish([subscriber])
  186. while True:
  187. await subscriber.ping()
  188. if subscriber not in self.subscribers: # If we got dislodged somehow, end session
  189. break
  190. await asyncio.sleep(5)
  191. # We may get exception types we don't have imported, so grab ANY exception and kick out the subscriber
  192. except:
  193. pass
  194. if subscriber in self.subscribers:
  195. self.subscribers.remove(subscriber)
  196. return resp
  197. elif request.method == 'HEAD':
  198. resp = aiohttp.web.Response(headers=headers, status=204, text="")
  199. return resp
  200. # I don't know this type of request :/ (DELETE, PATCH, etc)
  201. else:
  202. resp = aiohttp.web.Response(headers=headers, status=400, text=PUBSUB_BAD_REQUEST)
  203. return resp
  204. async def write_backlog_storage(self):
  205. previous_backlog = []
  206. while True:
  207. if self.config.backlog.storage:
  208. try:
  209. backlog_list = self.backlog.copy()
  210. if backlog_list != previous_backlog:
  211. previous_backlog = backlog_list
  212. async with aiofile.AIOFile(self.config.backlog.storage, 'w+') as afp:
  213. offset = 0
  214. for item in backlog_list:
  215. js =json.dumps({
  216. 'timestamp': item.timestamp,
  217. 'topics': item.topics,
  218. 'json': item.json,
  219. 'private': item.private
  220. }) + '\n'
  221. await afp.write(js, offset=offset)
  222. offset += len(js)
  223. await afp.fsync()
  224. except Exception as e:
  225. print(f"Could not write to backlog file {self.config.backlog.storage}: {e}")
  226. await asyncio.sleep(10)
  227. def read_backlog_storage(self):
  228. if self.config.backlog.storage and os.path.exists(self.config.backlog.storage):
  229. try:
  230. readlines = 0
  231. with open(self.config.backlog.storage, 'r') as fp:
  232. for line in fp.readlines():
  233. js = json.loads(line)
  234. readlines += 1
  235. ppath = "/".join(js['topics'])
  236. if js['private']:
  237. ppath = '/private/' + ppath
  238. payload = Payload(ppath, js['json'], js['timestamp'])
  239. self.backlog.append(payload)
  240. if self.config.backlog.queue_size < len(self.backlog):
  241. self.backlog.pop(0)
  242. except Exception as e:
  243. print(f"Error while reading backlog: {e}")
  244. print(f"Read {readlines} objects from {self.config.backlog.storage}, applied {len(self.backlog)} to backlog.")
  245. async def server_loop(self, loop):
  246. self.server = aiohttp.web.Server(self.handle_request)
  247. runner = aiohttp.web.ServerRunner(self.server)
  248. await runner.setup()
  249. site = aiohttp.web.TCPSite(runner, self.config.server.ip, self.config.server.port)
  250. await site.start()
  251. print("==== PyPubSub v/%s starting... ====" % PUBSUB_VERSION)
  252. print("==== Serving up PubSub goodness at %s:%s ====" % (
  253. self.config.server.ip, self.config.server.port))
  254. if self.config.sqs:
  255. for key, config in self.config.sqs.items():
  256. loop.create_task(plugins.sqs.get_payloads(self, config))
  257. self.read_backlog_storage()
  258. loop.create_task(self.write_backlog_storage())
  259. await self.poll()
  260. def run(self):
  261. loop = asyncio.get_event_loop()
  262. try:
  263. loop.run_until_complete(self.server_loop(loop))
  264. except KeyboardInterrupt:
  265. pass
  266. loop.close()
  267. class Subscriber:
  268. """Basic subscriber (client) class. Holds information about the connection and ACL"""
  269. def __init__(self, server, connection, request):
  270. self.connection = connection
  271. self.acl = {}
  272. self.server = server
  273. self.lock = asyncio.Lock()
  274. # Set topics subscribed to
  275. self.topics = [x for x in request.path.split('/') if x]
  276. # Is the client old and expecting zero-terminators?
  277. self.old_school = False
  278. for ua in self.server.config.oldschoolers:
  279. if ua in request.headers.get('User-Agent', ''):
  280. self.old_school = True
  281. break
  282. async def parse_acl(self, basic):
  283. """Sets the ACL if possible, based on Basic Auth"""
  284. try:
  285. decoded = str(base64.decodebytes(bytes(basic.replace('Basic ', ''), 'ascii')), 'utf-8')
  286. u, p = decoded.split(':', 1)
  287. if u in self.server.acl:
  288. acl_pass = self.server.acl[u].get('password')
  289. if acl_pass and acl_pass == p:
  290. acl = self.server.acl[u].get('acl', {})
  291. # Vet ACL for user
  292. assert isinstance(acl, dict), f"ACL for user {u} " \
  293. f"must be a dictionary of sub-IDs and topics, but is not."
  294. # Make sure each ACL segment is a list of topics
  295. for k, v in acl.items():
  296. assert isinstance(v, list), f"ACL segment {k} for user {u} is not a list of topics!"
  297. print(f"Client {u} successfully authenticated (and ACL is valid).")
  298. return acl
  299. elif self.server.config.ldap:
  300. acl = {}
  301. groups = await self.server.config.ldap.get_groups(u,p)
  302. # Make sure each ACL segment is a list of topics
  303. for k, v in self.server.config.ldap.acl.items():
  304. if k in groups:
  305. assert isinstance(v, dict), f"ACL segment {k} for user {u} is not a dictionary of segments!"
  306. for segment, topics in v.items():
  307. print(f"Enabling ACL segment {segment} for user {u}")
  308. assert isinstance(topics,
  309. list), f"ACL segment {segment} for user {u} is not a list of topics!"
  310. acl[segment] = topics
  311. return acl
  312. except binascii.Error as e:
  313. pass # Bad Basic Auth params, bail quietly
  314. except AssertionError as e:
  315. print(e)
  316. print(f"ACL configuration error: ACL scheme for {u} contains errors, setting ACL to nothing.")
  317. except Exception as e:
  318. print(f"Basic unknown exception occurred: {e}")
  319. return {}
  320. async def ping(self):
  321. """Generic ping-back to the client"""
  322. js = b"%s\n" % json.dumps({"stillalive": time.time()}).encode('utf-8')
  323. if self.old_school:
  324. js += b"\0"
  325. async with self.lock:
  326. await asyncio.wait_for(self.connection.write(js), timeout=PUBSUB_WRITE_TIMEOUT)
  327. class Payload:
  328. """A payload (event) object sent by a registered publisher."""
  329. def __init__(self, path, data, timestamp=None):
  330. self.json = data
  331. self.timestamp = timestamp or time.time()
  332. self.topics = [x for x in path.split('/') if x]
  333. self.private = False
  334. # Private payload?
  335. if self.topics and self.topics[0] == 'private':
  336. self.private = True
  337. del self.topics[0] # Remove the private bit from topics now.
  338. self.json['pubsub_timestamp'] = self.timestamp
  339. self.json['pubsub_topics'] = self.topics
  340. self.json['pubsub_path'] = path
  341. async def publish(self, subscribers):
  342. """Publishes an object to all subscribers using those topics (or a sub-set thereof)"""
  343. js = b"%s\n" % json.dumps(self.json).encode('utf-8')
  344. ojs = js + b"\0"
  345. bad_subs = []
  346. for sub in subscribers:
  347. # If a private payload, check ACL and bail if not a match
  348. if self.private:
  349. can_see = False
  350. for key, private_topics in sub.acl.items():
  351. if all(el in self.topics for el in private_topics):
  352. can_see = True
  353. break
  354. if not can_see:
  355. continue
  356. # If subscribed to all the topics, tell a subscriber about this
  357. if all(el in self.topics for el in sub.topics):
  358. try:
  359. if sub.old_school:
  360. async with sub.lock:
  361. await asyncio.wait_for(sub.connection.write(ojs), timeout=PUBSUB_WRITE_TIMEOUT)
  362. else:
  363. async with sub.lock:
  364. await asyncio.wait_for(sub.connection.write(js), timeout=PUBSUB_WRITE_TIMEOUT)
  365. except Exception:
  366. bad_subs.append(sub)
  367. return bad_subs
  368. if __name__ == '__main__':
  369. parser = argparse.ArgumentParser()
  370. parser.add_argument("--config", help="Configuration file to load (default: pypubsub.yaml)", default="pypubsub.yaml")
  371. parser.add_argument("--acl", help="ACL Configuration file to load (default: pypubsub_acl.yaml)",
  372. default="pypubsub_acl.yaml")
  373. cliargs = parser.parse_args()
  374. pubsub_server = Server(cliargs)
  375. pubsub_server.run()