// Copyright (c) Microsoft Corporation. // Licensed under the MIT License. /* * Common file that contains interface definitions for generic server and client * transport managers. * */ using System.Management.Automation.Tracing; using System.Text; using System.IO; using System.Xml; using System.Collections.Generic; using System.Globalization; using System.Threading; using System.Management.Automation.Internal; #if !UNIX using System.Security.Principal; #endif // Don't expose the System.Management.Automation namespace here. This is transport layer // and it shouldn't know anything about the engine. using System.Management.Automation.Remoting.Client; // TODO: this seems ugly...Remoting datatypes should be in remoting namespace using System.Management.Automation.Runspaces.Internal; using PSRemotingCryptoHelper = System.Management.Automation.Internal.PSRemotingCryptoHelper; using RunspaceConnectionInfo = System.Management.Automation.Runspaces.RunspaceConnectionInfo; using TypeTable = System.Management.Automation.Runspaces.TypeTable; using Dbg = System.Management.Automation.Diagnostics; namespace System.Management.Automation.Remoting { #region TransportErrorOccuredEventArgs /// /// Transport method for error reporting. /// public enum TransportMethodEnum { /// /// CreateShellEx /// CreateShellEx = 0, /// /// RunShellCommandEx /// RunShellCommandEx = 1, /// /// SendShellInputEx /// SendShellInputEx = 2, /// /// ReceiveShellOutputEx /// ReceiveShellOutputEx = 3, /// /// CloseShellOperationEx /// CloseShellOperationEx = 4, /// /// CommandInputEx /// CommandInputEx = 5, /// /// ReceiveCommandOutputEx /// ReceiveCommandOutputEx = 6, /// /// DisconnectShellEx /// DisconnectShellEx = 7, /// /// ReconnectShellEx /// ReconnectShellEx = 8, /// /// ConnectShellEx /// ConnectShellEx = 9, /// /// ReconnectShellCommandEx /// ReconnectShellCommandEx = 10, /// /// ConnectShellCommandEx /// ConnectShellCommandEx = 11, /// /// Unknown /// Unknown = 12, } /// /// Event arguments passed to TransportErrorOccurred handlers. /// public sealed class TransportErrorOccuredEventArgs : EventArgs { /// /// Constructor. /// /// /// Error occurred. /// /// /// The transport method that raised the error. /// public TransportErrorOccuredEventArgs( PSRemotingTransportException e, TransportMethodEnum m) { Exception = e; ReportingTransportMethod = m; } /// /// Gets the error occurred. /// internal PSRemotingTransportException Exception { get; set; } /// /// Transport method that is reporting this error. /// internal TransportMethodEnum ReportingTransportMethod { get; } } #endregion #region ConnectionStatusEventArgs /// /// Robust Connection notifications. /// internal enum ConnectionStatus { NetworkFailureDetected = 1, ConnectionRetryAttempt = 2, ConnectionRetrySucceeded = 3, AutoDisconnectStarting = 4, AutoDisconnectSucceeded = 5, InternalErrorAbort = 6 } /// /// ConnectionStatusEventArgs. /// internal class ConnectionStatusEventArgs : EventArgs { internal ConnectionStatusEventArgs(ConnectionStatus notification) { Notification = notification; } internal ConnectionStatus Notification { get; } } #endregion #region CreateCompleteEventArgs /// /// CreateCompleteEventArgs. /// internal class CreateCompleteEventArgs : EventArgs { internal RunspaceConnectionInfo ConnectionInfo { get; } internal CreateCompleteEventArgs( RunspaceConnectionInfo connectionInfo) { ConnectionInfo = connectionInfo; } } #endregion /// /// Contains implementation that is common to both client and server /// transport managers. /// public abstract class BaseTransportManager : IDisposable { #region tracer [TraceSource("Transport", "Traces BaseWSManTransportManager")] private static readonly PSTraceSource s_baseTracer = PSTraceSource.GetTracer("Transport", "Traces BaseWSManTransportManager"); #endregion #region Global Constants // KeepAlive: Server 4 minutes, Client 3 minutes // The server timeout value has to be bigger than the client timeout value. // This is due to the WinRM implementation on the Listener. // So We added a 1 minute network delay to count for this. internal const int ServerDefaultKeepAliveTimeoutMs = 4 * 60 * 1000; // milliseconds = 4 minutes internal const int ClientDefaultOperationTimeoutMs = 3 * 60 * 1000; // milliseconds = 3 minutes // Close timeout: to prevent unbounded close operation, we set a 1 minute bound. internal const int ClientCloseTimeoutMs = 60 * 1000; // This value instructs the server to use whatever setting it has for idle timeout. internal const int UseServerDefaultIdleTimeout = -1; internal const uint UseServerDefaultIdleTimeoutUInt = UInt32.MaxValue; // Minimum allowed idle timeout time is 60 seconds. internal const int MinimumIdleTimeout = 60 * 1000; internal const int DefaultFragmentSize = 32 << 10; // 32KB // Quota related consts and session variables. internal const int MaximumReceivedDataSize = 50 << 20; // 50MB internal const int MaximumReceivedObjectSize = 10 << 20; // 10MB // Session variables supporting powershell quotas. internal const string MAX_RECEIVED_DATA_PER_COMMAND_MB = "PSMaximumReceivedDataSizePerCommandMB"; internal const string MAX_RECEIVED_OBJECT_SIZE_MB = "PSMaximumReceivedObjectSizeMB"; #endregion #region Private Data // fragmentor used to fragment & defragment objects added to this collection. private readonly ReceiveDataCollection.OnDataAvailableCallback _onDataAvailableCallback; // crypto helper used for encrypting/decrypting // secure string #endregion #region EventHandlers internal event EventHandler WSManTransportErrorOccured; /// /// Event that is raised when a remote object is available. The event is raised /// from a WSMan transport thread. Since this thread can hold on to a HTTP /// connection, the event handler should complete processing as fast as possible. /// Importantly the event handler should not generate any call that results in a /// user request like host.ReadLine(). /// internal event EventHandler DataReceived; /// /// Listen to this event to observe the PowerShell guid of the processed object. /// public event EventHandler PowerShellGuidObserver; #endregion #region Constructor internal BaseTransportManager(PSRemotingCryptoHelper cryptoHelper) { CryptoHelper = cryptoHelper; // create a common fragmentor used by this transport manager to send and receive data. // so type information is serialized only the first time an object of a particular type // is sent. only data is serialized for the rest of the objects of the same type. Fragmentor = new Fragmentor(DefaultFragmentSize, cryptoHelper); ReceivedDataCollection = new PriorityReceiveDataCollection(Fragmentor, (this is BaseClientTransportManager)); _onDataAvailableCallback = new ReceiveDataCollection.OnDataAvailableCallback(OnDataAvailableCallback); } #endregion #region Helper Methods internal Fragmentor Fragmentor { get; set; } /// /// This is needed to deserialize objects coming from the network. /// This may be null..in which case type rehydration does not happen. /// At construction time we may not have typetable (server runspace /// is created only when a request from the client)..so this is /// a property on the base transport manager to allow for setting at /// a later time. /// internal TypeTable TypeTable { get { return Fragmentor.TypeTable; } set { Fragmentor.TypeTable = value; } } /// /// Uses the "OnDataAvailableCallback" to handle Deserialized objects. /// /// /// data to process /// /// /// priority stream this data belongs to /// internal virtual void ProcessRawData(byte[] data, string stream) { try { ProcessRawData(data, stream, _onDataAvailableCallback); } catch (Exception exception) { // This will get executed on a thread pool thread.. // so we need to protect that thread, hence catching // all exceptions s_baseTracer.WriteLine("Exception processing data. {0}", exception.Message); PSRemotingTransportException e = new PSRemotingTransportException(exception.Message, exception); TransportErrorOccuredEventArgs eventargs = new TransportErrorOccuredEventArgs(e, TransportMethodEnum.ReceiveShellOutputEx); RaiseErrorHandler(eventargs); return; } } /// /// /// /// data to process /// /// /// priority stream this data belongs to /// /// /// used by the caller to supply a callback to handle deserialized object. /// /// /// Since dataAvailableCallback is called in this method, and the handler /// may be handled by 3rd party code (eventually),this may throw any exception. /// internal void ProcessRawData(byte[] data, string stream, ReceiveDataCollection.OnDataAvailableCallback dataAvailableCallback) { Dbg.Assert(data != null, "Cannot process null data"); s_baseTracer.WriteLine("Processing incoming data for stream {0}.", stream); bool shouldProcess = false; DataPriorityType dataPriority = DataPriorityType.Default; if (stream.Equals(WSManNativeApi.WSMAN_STREAM_ID_STDIN, StringComparison.OrdinalIgnoreCase) || stream.Equals(WSManNativeApi.WSMAN_STREAM_ID_STDOUT, StringComparison.OrdinalIgnoreCase)) { shouldProcess = true; } else if (stream.Equals(WSManNativeApi.WSMAN_STREAM_ID_PROMPTRESPONSE, StringComparison.OrdinalIgnoreCase)) { dataPriority = DataPriorityType.PromptResponse; shouldProcess = true; } if (!shouldProcess) { // we dont support this stream..so ignore the data Dbg.Assert(false, string.Format( CultureInfo.InvariantCulture, "Data should be from one of the streams : {0} or {1} or {2}", WSManNativeApi.WSMAN_STREAM_ID_STDIN, WSManNativeApi.WSMAN_STREAM_ID_STDOUT, WSManNativeApi.WSMAN_STREAM_ID_PROMPTRESPONSE)); s_baseTracer.WriteLine("{0} is not a valid stream", stream); } // process data ReceivedDataCollection.ProcessRawData(data, dataPriority, dataAvailableCallback); } /// /// /// /// /// The handler may be handled by 3rd party code (eventually), /// this may throw any exception. /// internal void OnDataAvailableCallback(RemoteDataObject remoteObject) { // log the data to crimson logs PSEtwLog.LogAnalyticInformational(PSEventId.TransportReceivedObject, PSOpcode.Open, PSTask.None, PSKeyword.Transport | PSKeyword.UseAlwaysAnalytic, remoteObject.RunspacePoolId.ToString(), remoteObject.PowerShellId.ToString(), (UInt32)(remoteObject.Destination), (UInt32)(remoteObject.DataType), (UInt32)(remoteObject.TargetInterface)); // This might throw exceptions which the caller handles. PowerShellGuidObserver.SafeInvoke(remoteObject.PowerShellId, EventArgs.Empty); RemoteDataEventArgs eventArgs = new RemoteDataEventArgs(remoteObject); DataReceived.SafeInvoke(this, eventArgs); } /// /// Copy the DataReceived event handlers to the supplied transport Manager. /// /// public void MigrateDataReadyEventHandlers(BaseTransportManager transportManager) { foreach (Delegate handler in transportManager.DataReceived.GetInvocationList()) { DataReceived += (EventHandler)handler; } } /// /// Raise the error handlers. /// /// public virtual void RaiseErrorHandler(TransportErrorOccuredEventArgs eventArgs) { WSManTransportErrorOccured.SafeInvoke(this, eventArgs); } /// /// Crypto handler to be used for encrypting/decrypting /// secure strings. /// internal PSRemotingCryptoHelper CryptoHelper { get; set; } /// /// A data buffer used to store data received from remote machine. /// internal PriorityReceiveDataCollection ReceivedDataCollection { get; } #endregion #region IDisposable implementation /// /// Dispose the transport and release resources. /// public void Dispose() { Dispose(true); // if already disposing..no need to let finalizer thread // put resources to clean this object. System.GC.SuppressFinalize(this); } /// /// Dispose resources. /// protected virtual void Dispose(bool isDisposing) { if (isDisposing) { ReceivedDataCollection.Dispose(); } } #endregion } } namespace System.Management.Automation.Remoting.Client { /// /// Remoting base client transport manager. /// public abstract class BaseClientTransportManager : BaseTransportManager, IDisposable { #region Tracer [TraceSource("ClientTransport", "Traces ClientTransportManager")] internal static PSTraceSource tracer = PSTraceSource.GetTracer("ClientTransport", "Traces ClientTransportManager"); #endregion #region Data internal bool isClosed; internal object syncObject = new object(); internal PrioritySendDataCollection dataToBeSent; // used to handle callbacks from the server..these are used to synchronize received callbacks private readonly Queue _callbackNotificationQueue; private readonly ReceiveDataCollection.OnDataAvailableCallback _onDataAvailableCallback; private bool _isServicingCallbacks; private bool _suspendQueueServicing; private bool _isDebuggerSuspend; // this is used log crimson messages. // keeps track of whether a receive request has been placed on transport internal bool receiveDataInitiated; #endregion #region Constructors internal BaseClientTransportManager(Guid runspaceId, PSRemotingCryptoHelper cryptoHelper) : base(cryptoHelper) { RunspacePoolInstanceId = runspaceId; dataToBeSent = new PrioritySendDataCollection(); _onDataAvailableCallback = new ReceiveDataCollection.OnDataAvailableCallback(OnDataAvailableHandler); _callbackNotificationQueue = new Queue(); } #endregion #region Events /// /// Event that is raised when a create operation on transport has been successfully completed /// The event is raised /// from a WSMan transport thread. Since this thread can hold on to a HTTP /// connection, the event handler should complete processing as fast as possible. /// Importantly the event handler should not generate any call that results in a /// user request like host.ReadLine(). /// /// Errors (occurred during connection attempt) are reported through WSManTransportErrorOccured /// event. /// internal event EventHandler CreateCompleted; /// /// Event that is raised when a remote connection is successfully closed. The event is raised /// from a WSMan transport thread. Since this thread can hold on to a HTTP /// connection, the event handler should complete processing as fast as possible. /// Importantly the event handler should not generate any call that results in a /// user request like host.ReadLine(). /// /// Errors (occurred during connection attempt) are reported through WSManTransportErrorOccured /// event. /// /// /// The eventhandler should make sure not to throw any exceptions. /// internal event EventHandler CloseCompleted; /// /// Indicated successful completion of a connect operation on transport /// /// Errors are reported through WSManTransportErrorOccured /// event. /// internal event EventHandler ConnectCompleted; /// /// Indicated successful completion of a disconnect operation on transport /// /// Errors are reported through WSManTransportErrorOccured /// event. /// internal event EventHandler DisconnectCompleted; /// /// Indicated successful completion of a reconnect operation on transport /// /// Errors are reported through WSManTransportErrorOccured /// event. /// internal event EventHandler ReconnectCompleted; /// /// Indicates that the transport/command is ready for a disconnect operation. /// /// Errors are reported through WSManTransportErrorOccured event. /// internal event EventHandler ReadyForDisconnect; /// /// Event to pass Robust Connection notifications to client. /// internal event EventHandler RobustConnectionNotification; /// /// Indicates successful processing of a delay stream request on a receive operation /// /// this event is useful when PS wants to invoke a pipeline in disconnected mode. /// internal event EventHandler DelayStreamRequestProcessed; #endregion #region Properties /// /// Gets the data collection which is used by this transport manager to send /// data to the server. /// internal PrioritySendDataCollection DataToBeSentCollection { get { return dataToBeSent; } } /// /// Used to log crimson messages. /// internal Guid RunspacePoolInstanceId { get; } /// /// Raise the Connect completed handler. /// internal void RaiseCreateCompleted(CreateCompleteEventArgs eventArgs) { CreateCompleted.SafeInvoke(this, eventArgs); } internal void RaiseConnectCompleted() { ConnectCompleted.SafeInvoke(this, EventArgs.Empty); } internal void RaiseDisconnectCompleted() { DisconnectCompleted.SafeInvoke(this, EventArgs.Empty); } internal void RaiseReconnectCompleted() { ReconnectCompleted.SafeInvoke(this, EventArgs.Empty); } /// /// Raise the close completed handler. /// internal void RaiseCloseCompleted() { CloseCompleted.SafeInvoke(this, EventArgs.Empty); } /// /// Raise the ReadyForDisconnect event. /// internal void RaiseReadyForDisconnect() { ReadyForDisconnect.SafeInvoke(this, EventArgs.Empty); } /// /// Queue the robust connection notification event. /// /// Determines what kind of notification. internal void QueueRobustConnectionNotification(int flags) { ConnectionStatusEventArgs args = null; switch (flags) { case (int)WSManNativeApi.WSManCallbackFlags.WSMAN_FLAG_CALLBACK_NETWORK_FAILURE_DETECTED: args = new ConnectionStatusEventArgs(ConnectionStatus.NetworkFailureDetected); break; case (int)WSManNativeApi.WSManCallbackFlags.WSMAN_FLAG_CALLBACK_RETRYING_AFTER_NETWORK_FAILURE: args = new ConnectionStatusEventArgs(ConnectionStatus.ConnectionRetryAttempt); break; case (int)WSManNativeApi.WSManCallbackFlags.WSMAN_FLAG_CALLBACK_RECONNECTED_AFTER_NETWORK_FAILURE: args = new ConnectionStatusEventArgs(ConnectionStatus.ConnectionRetrySucceeded); break; case (int)WSManNativeApi.WSManCallbackFlags.WSMAN_FLAG_CALLBACK_SHELL_AUTODISCONNECTING: args = new ConnectionStatusEventArgs(ConnectionStatus.AutoDisconnectStarting); break; case (int)WSManNativeApi.WSManCallbackFlags.WSMAN_FLAG_CALLBACK_SHELL_AUTODISCONNECTED: args = new ConnectionStatusEventArgs(ConnectionStatus.AutoDisconnectSucceeded); break; case (int)WSManNativeApi.WSManCallbackFlags.WSMAN_FLAG_CALLBACK_RETRY_ABORTED_DUE_TO_INTERNAL_ERROR: args = new ConnectionStatusEventArgs(ConnectionStatus.InternalErrorAbort); break; } // Queue worker item to raise the event so that all robust connection // events are raised in the same order as received. EnqueueAndStartProcessingThread(null, null, args); } /// /// Raise the Robust Connection notification event. /// /// ConnectionStatusEventArgs. internal void RaiseRobustConnectionNotification(ConnectionStatusEventArgs args) { RobustConnectionNotification.SafeInvoke(this, args); } internal void RaiseDelayStreamProcessedEvent() { DelayStreamRequestProcessed.SafeInvoke(this, EventArgs.Empty); } #endregion #region Received Data Processing Thread internal override void ProcessRawData(byte[] data, string stream) { if (isClosed) { return; } try { base.ProcessRawData(data, stream, _onDataAvailableCallback); } catch (PSRemotingTransportException pte) { // PSRemotingTransportException need not be wrapped in another PSRemotingTransportException. tracer.WriteLine("Exception processing data. {0}", pte.Message); TransportErrorOccuredEventArgs eventargs = new TransportErrorOccuredEventArgs(pte, TransportMethodEnum.ReceiveShellOutputEx); EnqueueAndStartProcessingThread(null, eventargs, null); return; } catch (Exception exception) { // Enqueue an Exception to process in a thread-pool thread. Processing // Exception in a thread pool thread is important as calling // WSManCloseShell/Command from a Receive callback results in a deadlock. tracer.WriteLine("Exception processing data. {0}", exception.Message); PSRemotingTransportException e = new PSRemotingTransportException(exception.Message); TransportErrorOccuredEventArgs eventargs = new TransportErrorOccuredEventArgs(e, TransportMethodEnum.ReceiveShellOutputEx); EnqueueAndStartProcessingThread(null, eventargs, null); return; } } private void OnDataAvailableHandler(RemoteDataObject remoteObject) { EnqueueAndStartProcessingThread(remoteObject, null, null); } /// /// Enqueue a deserialized object or an Exception to process in a thread pool /// thread. Processing Exception in a thread pool thread is important as calling /// WSManCloseShell/Command from a Receive callback results in a deadlock. /// /// /// Deserialized Object to process in a thread-pool thread. This should be null /// when is specified. /// /// /// Data that is neither RemoteObject or Exception. This is used by Client Command /// Transport manager to raise SignalCompleted callback. /// /// /// Error containing transport exception. /// internal void EnqueueAndStartProcessingThread(RemoteDataObject remoteObject, TransportErrorOccuredEventArgs transportErrorArgs, object privateData) { if (isClosed) { return; } lock (_callbackNotificationQueue) { if ((remoteObject != null) || (transportErrorArgs != null) || (privateData != null)) { CallbackNotificationInformation rcvdDataInfo = new CallbackNotificationInformation(); rcvdDataInfo.remoteObject = remoteObject; rcvdDataInfo.transportError = transportErrorArgs; rcvdDataInfo.privateData = privateData; if (remoteObject != null && (remoteObject.DataType == RemotingDataType.PublicKey || remoteObject.DataType == RemotingDataType.EncryptedSessionKey || remoteObject.DataType == RemotingDataType.PublicKeyRequest)) { CryptoHelper.Session.BaseSessionDataStructureHandler.RaiseKeyExchangeMessageReceived(remoteObject); } else { _callbackNotificationQueue.Enqueue(rcvdDataInfo); } } if (_suspendQueueServicing && _isDebuggerSuspend) { // Remove debugger queue suspension if remoteObject requires user response. _suspendQueueServicing = !CheckForInteractiveHostCall(remoteObject); } if (_isServicingCallbacks || _suspendQueueServicing) { // a thread pool thread is already processing callbacks or // the queue processing is suspended. return; } if (_callbackNotificationQueue.Count > 0) { _isServicingCallbacks = true; // Start a thread pool thread to process callbacks. #if !UNIX WindowsIdentity identityToImpersonate; Utils.TryGetWindowsImpersonatedIdentity(out identityToImpersonate); Utils.QueueWorkItemWithImpersonation( identityToImpersonate, new WaitCallback(ServicePendingCallbacks), null); #else ThreadPool.QueueUserWorkItem(new WaitCallback(ServicePendingCallbacks)); #endif } } } /// /// Helper method to check RemoteDataObject for a host call requiring user /// interaction. /// /// Remote data object. /// True if remote data object requires a user response. private static bool CheckForInteractiveHostCall(RemoteDataObject remoteObject) { bool interactiveHostCall = false; if ((remoteObject != null) && (remoteObject.DataType == RemotingDataType.RemoteHostCallUsingPowerShellHost)) { RemoteHostMethodId methodId = 0; try { methodId = RemotingDecoder.GetPropertyValue(remoteObject.Data, RemoteDataNameStrings.MethodId); } catch (PSArgumentNullException) { } catch (PSRemotingDataStructureException) { } // If new remote host call methods are added then we need to evaluate if they are interactive. Dbg.Assert(methodId <= RemoteHostMethodId.PromptForChoiceMultipleSelection, "A new remote host method Id was added. Update switch statement as needed."); switch (methodId) { case RemoteHostMethodId.Prompt: case RemoteHostMethodId.PromptForChoice: case RemoteHostMethodId.PromptForChoiceMultipleSelection: case RemoteHostMethodId.PromptForCredential1: case RemoteHostMethodId.PromptForCredential2: case RemoteHostMethodId.ReadKey: case RemoteHostMethodId.ReadLine: case RemoteHostMethodId.ReadLineAsSecureString: interactiveHostCall = true; break; } } return interactiveHostCall; } internal void ServicePendingCallbacks(object objectToProcess) { tracer.WriteLine("ServicePendingCallbacks thread is starting"); PSEtwLog.ReplaceActivityIdForCurrentThread(RunspacePoolInstanceId, PSEventId.OperationalTransferEventRunspacePool, PSEventId.AnalyticTransferEventRunspacePool, PSKeyword.Transport, PSTask.None); try { while (true) { // if the transport manager is closed return. if (isClosed) { return; } CallbackNotificationInformation rcvdDataInfo = null; lock (_callbackNotificationQueue) { // If queue is empty or if queue servicing is suspended // then break out of loop. if (_callbackNotificationQueue.Count == 0 || _suspendQueueServicing) { break; } rcvdDataInfo = _callbackNotificationQueue.Dequeue(); } // Handle callback. if (rcvdDataInfo != null) { // Handling transport exception in thread-pool thread if (rcvdDataInfo.transportError != null) { RaiseErrorHandler(rcvdDataInfo.transportError); break; } else if (rcvdDataInfo.privateData != null) { ProcessPrivateData(rcvdDataInfo.privateData); } else { base.OnDataAvailableCallback(rcvdDataInfo.remoteObject); } } } } catch (Exception exception) { // This will get executed on a thread pool thread.. // so we need to protect that thread, hence catching // all exceptions tracer.WriteLine("Exception processing data. {0}", exception.Message); PSRemotingTransportException e = new PSRemotingTransportException(exception.Message, exception); TransportErrorOccuredEventArgs eventargs = new TransportErrorOccuredEventArgs(e, TransportMethodEnum.ReceiveShellOutputEx); RaiseErrorHandler(eventargs); return; } finally { lock (_callbackNotificationQueue) { tracer.WriteLine("ServicePendingCallbacks thread is exiting"); _isServicingCallbacks = false; // check if any new runspace request has arrived.. EnqueueAndStartProcessingThread(null, null, null); } } } internal bool IsServicing { get { lock (_callbackNotificationQueue) { return _isServicingCallbacks; } } } internal void SuspendQueue(bool debuggerSuspend = false) { lock (_callbackNotificationQueue) { _isDebuggerSuspend = debuggerSuspend; _suspendQueueServicing = true; } } internal void ResumeQueue() { lock (_callbackNotificationQueue) { _isDebuggerSuspend = false; if (_suspendQueueServicing) { _suspendQueueServicing = false; // Process any items in queue. EnqueueAndStartProcessingThread(null, null, null); } } } /// /// Used by ServicePendingCallbacks to give the control to derived classes for /// processing data that the base class does not understand. /// /// /// Derived class specific data to process. For command transport manager this /// should be a boolean. /// internal virtual void ProcessPrivateData(object privateData) { } internal class CallbackNotificationInformation { // only one of the following 2 should be present.. // anyway transportException takes precedence over remoteObject. internal RemoteDataObject remoteObject; internal TransportErrorOccuredEventArgs transportError; // Used by ServicePendingCallbacks to give the control to derived classes for // processing data that the base class does not understand. internal object privateData; } #endregion #region Abstract / Virtual methods /// /// Create the transport manager and initiate connection. /// public abstract void CreateAsync(); internal abstract void ConnectAsync(); /// /// The caller should make sure the call is synchronized. /// public virtual void CloseAsync() { // Clear the send collection dataToBeSent.Clear(); } internal virtual void StartReceivingData() { throw new NotImplementedException(); } /// /// Method to have transport prepare for a disconnect operation. /// internal virtual void PrepareForDisconnect() { throw new NotImplementedException(); } /// /// Method to resume post disconnect operations. /// internal virtual void PrepareForConnect() { throw new NotImplementedException(); } #endregion #region Clean up /// /// Finalizes an instance of the class. /// ~BaseClientTransportManager() { if (isClosed) { Dispose(false); } else { // wait for the close to be completed and then release the resources. this.CloseCompleted += (object source, EventArgs args) => Dispose(false); try { // looks like Dispose is not called for this transport manager // try closing the transport manager. CloseAsync(); } catch (ObjectDisposedException) { // intentionally blank } } } /// /// Dispose resources. /// protected override void Dispose(bool isDisposing) { // clear event handlers this.CreateCompleted = null; this.CloseCompleted = null; this.ConnectCompleted = null; this.DisconnectCompleted = null; this.ReconnectCompleted = null; // let base dispose its resources. base.Dispose(isDisposing); } #endregion } /// /// Remoting base client session transport manager. /// public abstract class BaseClientSessionTransportManager : BaseClientTransportManager, IDisposable { #region Constructors internal BaseClientSessionTransportManager(Guid runspaceId, PSRemotingCryptoHelper cryptoHelper) : base(runspaceId, cryptoHelper) { } #endregion #region Abstract / Virtual Methods /// /// Creates a command transport manager. This will create a new PrioritySendDataCollection which should be used to /// send data to the server. /// /// /// Connection info to be used for creating the command. /// /// /// Command for which transport manager is created. /// /// /// true if the command has input. /// /// internal virtual BaseClientCommandTransportManager CreateClientCommandTransportManager(RunspaceConnectionInfo connectionInfo, ClientRemotePowerShell cmd, bool noInput) { throw new NotImplementedException(); } /// /// RunspacePool data structure handler uses this method to remove association of a command transport manager /// from a session transport manager. /// /// internal virtual void RemoveCommandTransportManager(Guid powerShellCmdId) { } /// /// Temporarily disconnect an active session. /// internal virtual void DisconnectAsync() { throw new NotImplementedException(); } /// /// Reconnect back a temporarily disconnected session. /// internal virtual void ReconnectAsync() { throw new NotImplementedException(); } /// /// Redirect the transport manager to point to a new URI. /// /// /// Redirect Uri to connect to. /// /// /// Connection info object used for retrieving credential, auth. mechanism etc. /// internal virtual void Redirect(Uri newUri, RunspaceConnectionInfo connectionInfo) { throw new NotImplementedException(); } /// /// Used by callers to prepare the session transportmanager for a URI redirection. /// This must be called only after Create callback (or Error form create) is received. /// Callers must catch the close completed event and call Redirect to perform the redirection. /// internal virtual void PrepareForRedirection() { throw new NotImplementedException(); } #endregion } internal abstract class BaseClientCommandTransportManager : BaseClientTransportManager, IDisposable { #region Private / Protected Data // pipeline in the form cmd1 | cmd2.. this is used by authz module for early validation. protected StringBuilder cmdText; protected SerializedDataStream serializedPipeline; protected Guid powershellInstanceId; protected Guid PowershellInstanceId { get { return powershellInstanceId; } } #endregion internal bool startInDisconnectedMode = false; #region Constructors protected BaseClientCommandTransportManager(ClientRemotePowerShell shell, PSRemotingCryptoHelper cryptoHelper, BaseClientSessionTransportManager sessnTM) : base(sessnTM.RunspacePoolInstanceId, cryptoHelper) { Fragmentor.FragmentSize = sessnTM.Fragmentor.FragmentSize; Fragmentor.TypeTable = sessnTM.Fragmentor.TypeTable; dataToBeSent.Fragmentor = base.Fragmentor; // used for Crimson logging. powershellInstanceId = shell.PowerShell.InstanceId; cmdText = new StringBuilder(); foreach (System.Management.Automation.Runspaces.Command cmd in shell.PowerShell.Commands.Commands) { cmdText.Append(cmd.CommandText); cmdText.Append(" | "); } cmdText.Remove(cmdText.Length - 3, 3); // remove ending " | " RemoteDataObject message; if (shell.PowerShell.IsGetCommandMetadataSpecialPipeline) { message = RemotingEncoder.GenerateGetCommandMetadata(shell); } else { message = RemotingEncoder.GenerateCreatePowerShell(shell); } serializedPipeline = new SerializedDataStream(base.Fragmentor.FragmentSize); Fragmentor.Fragment(message, serializedPipeline); } #endregion #region Events internal event EventHandler SignalCompleted; internal void RaiseSignalCompleted() { SignalCompleted.SafeInvoke(this, EventArgs.Empty); } #endregion #region Overrides protected override void Dispose(bool isDisposing) { base.Dispose(isDisposing); if (isDisposing) { // dispose serialized pipeline serializedPipeline.Dispose(); } } #endregion #region Abstract / Virtual Methods /// /// Reconnects a previously disconnected commandTM. Implemented by WSMan transport /// Note that there is not explicit disconnect on commandTM. It is implicity disconnected /// when disconnect is called on sessionTM . The TM's also dont maintain specific connection state /// This is done by DSHandlers. /// internal virtual void ReconnectAsync() { throw new NotImplementedException(); } /// /// Used by powershell/pipeline to send a stop message to the server command. /// internal virtual void SendStopSignal() { throw new NotImplementedException(); } #endregion } } namespace System.Management.Automation.Remoting.Server { /// /// This represents an abstraction for server transport manager. /// internal abstract class AbstractServerTransportManager : BaseTransportManager { #region Private Data private readonly object _syncObject = new object(); // used to listen to data available events from serialized datastream. private readonly SerializedDataStream.OnDataAvailableCallback _onDataAvailable; // the following variable are used by onDataAvailableCallback. private bool _shouldFlushData; private bool _reportAsPending; private Guid _runspacePoolInstanceId; private Guid _powerShellInstanceId; private RemotingDataType _dataType; private RemotingTargetInterface _targetInterface; // End: the following variable are used by onDataAvailableCallback. private Queue> _dataToBeSentQueue; private bool _isSerializing; #endregion #region Constructor protected AbstractServerTransportManager(int fragmentSize, PSRemotingCryptoHelper cryptoHelper) : base(cryptoHelper) { base.Fragmentor.FragmentSize = fragmentSize; _onDataAvailable = new SerializedDataStream.OnDataAvailableCallback(OnDataAvailable); } #endregion #region Helper Methods /// /// Sends an object from the server end. The object is fragmented and each fragment is sent /// separately. The call blocks until all the fragments are sent to the client. If there /// is a failure sending any of the fragments WSManTransportErrorOccured event is raised. /// /// /// /// /// true to immediately send data to client. /// /// /// reported as true when host message requests are sent to client /// internal void SendDataToClient(RemoteDataObject data, bool flush, bool reportPending = false) { // make sure only one data packet can be sent in its entirety at any // given point of time using this transport manager. lock (_syncObject) { // Win8: 491001 Icm -computername $env:COMPUTERNAME {Get-NetIpInterface} fails with Unexpected ObjectId // This is because the output object has some extended script properties. Getter of one of the // script properties is calling write-progress. Write-Progress in turn results in a progress record // being sent to client. This breaks the fragmentation rule when the original object (without progress) // does not fit in fragmented packet. // ******************** repro using powershell ********************************* // icm . { // $a = new-object psobject // $a.pstypenames.Insert(0, "Microsoft.PowerShell.Test.Bug491001") // Update-TypeData -TypeName Microsoft.PowerShell.Test.Bug491001 -MemberType ScriptProperty -MemberName name -Value {( 1..50kb | % { get-random -min 97 -max 122 | % { [char]$psitem } }) -join ""} // Update-TypeData -TypeName Microsoft.PowerShell.Test.Bug491001 -MemberType ScriptProperty -MemberName Verbose -Value {write-progress "blah" -Completed; "Some verbose data"} // Update-TypeData -TypeName Microsoft.PowerShell.Test.Bug491001 -MemberType ScriptProperty -MemberName zname -Value {( 1..10kb | % { get-random -min 97 -max 122 | % { [char]$psitem } }) -join ""} // $a // } // 1. The value of "name" property is huge 50kb and cannot fit in one fragment (with fragment size 32kb) // 2. The value of "Verbose" is actually writing a progress record // 3. The value of "zname" property is also huge // 4. Notice the ascending order of property names. This is because serializer serializes properties in sort order // ******************** End of repro ****************************************** // To fix the issue, I am creating a Queue and enqueuing the data objects if we are already serializing another data object // Notice this is in lock() above. An object is serialized in its entirety in one thread. So, in my example above "name", // "verbose","zname" properties are serialized in one thread. So lock() essentially protects from serializing other objects // and not this (parent)object. RemoteDataObject dataToBeSent = RemoteDataObject.CreateFrom(data.Destination, data.DataType, data.RunspacePoolId, data.PowerShellId, data.Data); if (_isSerializing) { _dataToBeSentQueue ??= new Queue>(); _dataToBeSentQueue.Enqueue(new Tuple(dataToBeSent, flush, reportPending)); return; } _isSerializing = true; try { do { // tell stream to notify us whenever a fragment is available instead of writing data // into internal buffers. This will save write + read + dispose.) using (SerializedDataStream serializedData = new SerializedDataStream(Fragmentor.FragmentSize, _onDataAvailable)) { _shouldFlushData = flush; _reportAsPending = reportPending; _runspacePoolInstanceId = dataToBeSent.RunspacePoolId; _powerShellInstanceId = dataToBeSent.PowerShellId; _dataType = dataToBeSent.DataType; _targetInterface = dataToBeSent.TargetInterface; Fragmentor.Fragment(dataToBeSent, serializedData); } if ((_dataToBeSentQueue != null) && (_dataToBeSentQueue.Count > 0)) { Tuple dataToBeSentQueueItem = _dataToBeSentQueue.Dequeue(); dataToBeSent = dataToBeSentQueueItem.Item1; flush = dataToBeSentQueueItem.Item2; reportPending = dataToBeSentQueueItem.Item3; } else { dataToBeSent = null; } } while (dataToBeSent != null); } finally { _isSerializing = false; } } } private void OnDataAvailable(byte[] dataToSend, bool isEndFragment) { Dbg.Assert(dataToSend != null, "ServerTransportManager cannot send null fragment"); // log to crimson log. PSEtwLog.LogAnalyticInformational(PSEventId.ServerSendData, PSOpcode.Send, PSTask.None, PSKeyword.Transport | PSKeyword.UseAlwaysAnalytic, _runspacePoolInstanceId.ToString(), _powerShellInstanceId.ToString(), dataToSend.Length.ToString(CultureInfo.InvariantCulture), (UInt32)_dataType, (UInt32)_targetInterface); SendDataToClient(dataToSend, isEndFragment && _shouldFlushData, _reportAsPending, isEndFragment); } /// /// Sends an object to the server end. The object is fragmented and each fragment is sent /// separately. The call blocks until all the fragments are sent to the client. If there /// is a failure sending any of the fragments WSManTransportErrorOccured event is raised. /// /// /// /// true to immediately send data to client. /// /// /// reported as true when sending host message requests are reported true /// internal void SendDataToClient(RemoteDataObject psObjectData, bool flush, bool reportAsPending = false) { SendDataToClient((RemoteDataObject)(psObjectData), flush, reportAsPending); } /// /// Reports error from a thread pool thread. Thread Pool is used in order to /// not block Pipeline closing. This method is generally called when the /// TransportManager fails to Send data (SendDataToClient). Pipeline Execution /// Thread directly calls SendDataToClient method from its execution thread, /// so we cannot call Stop from the same thread (as it will result in a deadlock) /// internal void ReportError(int errorCode, string methodName) { string messageResource = RemotingErrorIdStrings.GeneralError; string errorMessage = string.Format(CultureInfo.InvariantCulture, messageResource, new object[] { errorCode, methodName }); PSRemotingTransportException e = new PSRemotingTransportException(errorMessage); e.ErrorCode = errorCode; // Use thread-pool thread to raise the error handler..see explanation // in the method summary ThreadPool.QueueUserWorkItem(new WaitCallback( (object state) => { TransportErrorOccuredEventArgs eventArgs = new TransportErrorOccuredEventArgs(e, TransportMethodEnum.Unknown); RaiseErrorHandler(eventArgs); })); } /// /// Raises the closing event. /// internal void RaiseClosingEvent() { Closing.SafeInvoke(this, EventArgs.Empty); } #endregion #region Event Handlers /// /// Event that is raised when this transport manager is closing. /// internal event EventHandler Closing; #endregion #region Abstract interfaces /// /// /// /// /// flush data by sending data immediately to the client. /// /// /// reported as true when sending host message requests to client /// /// /// reported as true when data being reported is as object boundary, i.e the corresponding fragment is an end fragment /// protected abstract void SendDataToClient(byte[] data, bool flush, bool reportAsPending, bool reportAsDataBoundary); /// /// internal abstract void ReportExecutionStatusAsRunning(); /// /// /// /// message describing why the transport manager must be closed /// internal abstract void Close(Exception reasonForClose); /// /// Prepare the transport manager to send data (because a command /// is about to start). This is used by underlying infrastructure /// to send ACK to client..so client can start sending input and /// other data to server. /// internal virtual void Prepare() { // command may hijack the calling thread to run the command // so this method call notifies the ReceivedData buffer to // allow another thread to ProcessRawData. ReceivedDataCollection.AllowTwoThreadsToProcessRawData(); } #endregion } /// /// This represents an abstraction for server session transport manager. /// internal abstract class AbstractServerSessionTransportManager : AbstractServerTransportManager { #region Constructors protected AbstractServerSessionTransportManager(int fragmentSize, PSRemotingCryptoHelper cryptoHelper) : base(fragmentSize, cryptoHelper) { } #endregion #region Abstract interfaces /// /// Server RunspacePool driver uses this method to attach to a server transport manager. /// /// /// internal abstract AbstractServerTransportManager GetCommandTransportManager(Guid powerShellCmdId); /// /// Server RunspacePool driver uses this method to remove association of a command transport manager /// from a session transport manager. /// /// internal abstract void RemoveCommandTransportManager(Guid powerShellCmdId); #endregion } /// /// A container for helper functions that accomplish common client and server tasks. /// internal static class ServerOperationHelpers { #region Public Helper Methods /// /// A helper method to extract a base-64 encoded XML element from a specified input /// buffer. The calls required are not compatible with the Managed C++ CoreCLR /// mscorlib, but this operation is supported as managed C# code. /// /// The input buffer to search. It must be base-64 encoded XML. /// The XML tag used to identify the value to extract. /// The extracted tag converted from a base-64 string. internal static byte[] ExtractEncodedXmlElement(string xmlBuffer, string xmlTag) { if (xmlBuffer == null || xmlTag == null) return new byte[1]; // the inboundShellInformation is in Xml format as per the SOAP WSMan spec. // Retrieve the string (Base64 encoded) we are interested in. XmlReaderSettings readerSettings = new XmlReaderSettings(); readerSettings.CheckCharacters = false; readerSettings.IgnoreComments = true; readerSettings.IgnoreProcessingInstructions = true; readerSettings.XmlResolver = null; readerSettings.ConformanceLevel = ConformanceLevel.Fragment; readerSettings.MaxCharactersFromEntities = 1024; readerSettings.DtdProcessing = System.Xml.DtdProcessing.Prohibit; XmlReader reader = XmlReader.Create(new StringReader(xmlBuffer), readerSettings); string additionalData; if (reader.MoveToContent() == XmlNodeType.Element) { additionalData = reader.ReadElementContentAsString(xmlTag, reader.NamespaceURI); } else // No element found, so return a default value { return new byte[1]; } return Convert.FromBase64String(additionalData); } #endregion } }