/usr/share/pyshared/qpid/framer.py is in python-qpid 0.22+dfsg-1.
This file is owned by root:root, with mode 0o644.
The actual contents of the file can be viewed below.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 | #
# Licensed to the Apache Software Foundation (ASF) under one
# or more contributor license agreements. See the NOTICE file
# distributed with this work for additional information
# regarding copyright ownership. The ASF licenses this file
# to you under the Apache License, Version 2.0 (the
# "License"); you may not use this file except in compliance
# with the License. You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing,
# software distributed under the License is distributed on an
# "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
# KIND, either express or implied. See the License for the
# specific language governing permissions and limitations
# under the License.
#
import struct, socket
from exceptions import Closed
from packer import Packer
from threading import RLock
from logging import getLogger
raw = getLogger("qpid.io.raw")
frm = getLogger("qpid.io.frm")
class FramingError(Exception): pass
class Framer(Packer):
HEADER="!4s4B"
def __init__(self, sock):
self.sock = sock
self.sock_lock = RLock()
self.tx_buf = ""
self.rx_buf = ""
self.security_layer_tx = None
self.security_layer_rx = None
self.maxbufsize = 65535
def aborted(self):
return False
def write(self, buf):
self.tx_buf += buf
def flush(self):
self.sock_lock.acquire()
try:
if self.security_layer_tx:
try:
cipher_buf = self.security_layer_tx.encode(self.tx_buf)
except SASLError, e:
raise Closed(str(e))
self._write(cipher_buf)
else:
self._write(self.tx_buf)
self.tx_buf = ""
frm.debug("FLUSHED")
finally:
self.sock_lock.release()
def _write(self, buf):
while buf:
try:
n = self.sock.send(buf)
except socket.timeout:
if self.aborted():
raise Closed()
else:
continue
raw.debug("SENT %r", buf[:n])
buf = buf[n:]
##
## Implementation Note:
##
## This function was modified to use the SASL security layer for content
## decryption. As such, the socket read should read in "self.maxbufsize"
## instead of "n" (the requested number of octets). However, since this
## is one of two places in the code where the socket is read, the read
## size had to be left at "n". This is because this function is
## apparently only used to read the first 8 octets from a TCP socket. If
## we read beyond "n" octets, the remaing octets won't be processed and
## the connection handshake will fail.
##
def read(self, n):
while len(self.rx_buf) < n:
try:
s = self.sock.recv(n) # NOTE: instead of "n", arg should be "self.maxbufsize"
if self.security_layer_rx:
try:
s = self.security_layer_rx.decode(s)
except SASLError, e:
raise Closed(str(e))
except socket.timeout:
if self.aborted():
raise Closed()
else:
continue
except socket.error, e:
if self.rx_buf != "":
raise e
else:
raise Closed()
if len(s) == 0:
raise Closed()
self.rx_buf += s
raw.debug("RECV %r", s)
data = self.rx_buf[0:n]
self.rx_buf = self.rx_buf[n:]
return data
def read_header(self):
return self.unpack(Framer.HEADER)
def write_header(self, major, minor):
self.sock_lock.acquire()
try:
self.pack(Framer.HEADER, "AMQP", 1, 1, major, minor)
self.flush()
finally:
self.sock_lock.release()
|