2012-09-09 04:20:09 +00:00
|
|
|
/*
|
|
|
|
Serval Mesh Software
|
|
|
|
Copyright (C) 2010-2012 Paul Gardner-Stephen
|
|
|
|
|
|
|
|
This program is free software; you can redistribute it and/or
|
|
|
|
modify it under the terms of the GNU General Public License
|
|
|
|
as published by the Free Software Foundation; either version 2
|
|
|
|
of the License, or (at your option) any later version.
|
|
|
|
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
GNU General Public License for more details.
|
|
|
|
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
|
|
along with this program; if not, write to the Free Software
|
|
|
|
Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include "serval.h"
|
|
|
|
#include "rhizome.h"
|
2012-12-04 03:42:28 +00:00
|
|
|
#include "conf.h"
|
2012-09-09 04:20:09 +00:00
|
|
|
#include "str.h"
|
2012-09-28 08:23:20 +00:00
|
|
|
#include "strbuf.h"
|
|
|
|
#include "strbuf_helpers.h"
|
2012-09-09 04:20:09 +00:00
|
|
|
#include <assert.h>
|
2012-09-21 11:41:27 +00:00
|
|
|
#include <sys/stat.h>
|
|
|
|
#include <sys/wait.h>
|
2012-10-05 05:39:10 +00:00
|
|
|
#include <arpa/inet.h>
|
2012-09-09 04:20:09 +00:00
|
|
|
|
2013-10-16 07:55:58 +00:00
|
|
|
static int _form_temporary_file_path(struct __sourceloc __whence, rhizome_http_request *r, char *pathbuf, size_t bufsiz, const char *field)
|
2012-09-09 04:20:09 +00:00
|
|
|
{
|
2013-10-16 07:55:58 +00:00
|
|
|
strbuf b = strbuf_local(pathbuf, bufsiz);
|
|
|
|
// TODO: use a temporary directory
|
|
|
|
strbuf_sprintf(b, "rhizomedirect.%d.%s", r->http.alarm.poll.fd, field);
|
|
|
|
if (strbuf_overrun(b)) {
|
|
|
|
WHYF("Rhizome Direct pathname overflow: %s", alloca_str_toprint(pathbuf));
|
|
|
|
return -1;
|
2012-09-09 04:20:09 +00:00
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2013-10-16 07:55:58 +00:00
|
|
|
#define form_temporary_file_path(r,buf,field) _form_temporary_file_path(__WHENCE__, (r), (buf), sizeof(buf), (field))
|
2012-09-11 03:39:40 +00:00
|
|
|
|
2013-10-16 07:55:58 +00:00
|
|
|
static void rhizome_direct_clear_temporary_files(rhizome_http_request *r)
|
|
|
|
{
|
|
|
|
const char *fields[] = { "manifest", "data" };
|
|
|
|
int i;
|
|
|
|
for (i = 0; i != NELS(fields); ++i) {
|
|
|
|
char path[1024];
|
|
|
|
if (form_temporary_file_path(r, path, fields[i]) != -1)
|
|
|
|
if (unlink(path) == -1 && errno != ENOENT)
|
|
|
|
WARNF_perror("unlink(%s)", alloca_str_toprint(path));
|
|
|
|
}
|
|
|
|
}
|
2012-09-11 03:39:40 +00:00
|
|
|
|
2013-10-16 07:55:58 +00:00
|
|
|
int rhizome_direct_import_end(struct http_request *hr)
|
|
|
|
{
|
|
|
|
rhizome_http_request *r = (rhizome_http_request *) hr;
|
|
|
|
if (!r->received_manifest) {
|
|
|
|
http_request_simple_response(&r->http, 400, "Missing 'manifest' part");
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
if (!r->received_data) {
|
|
|
|
http_request_simple_response(&r->http, 400, "Missing 'data' part");
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
/* Got a bundle to import */
|
|
|
|
char manifest_path[512];
|
|
|
|
char payload_path[512];
|
|
|
|
if ( form_temporary_file_path(r, manifest_path, "manifest") == -1
|
|
|
|
|| form_temporary_file_path(r, payload_path, "data") == -1
|
|
|
|
) {
|
|
|
|
http_request_simple_response(&r->http, 500, "Internal Error: Buffer overrun");
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
if (config.debug.rhizome)
|
|
|
|
DEBUGF("Call rhizome_bundle_import_files(%s, %s)",
|
|
|
|
alloca_str_toprint(manifest_path),
|
|
|
|
alloca_str_toprint(payload_path)
|
|
|
|
);
|
|
|
|
int ret = 0;
|
|
|
|
rhizome_manifest *m = rhizome_new_manifest();
|
|
|
|
if (!m)
|
|
|
|
ret = WHY("Out of manifests");
|
|
|
|
else {
|
|
|
|
ret = rhizome_bundle_import_files(m, manifest_path, payload_path);
|
|
|
|
rhizome_manifest_free(m);
|
|
|
|
}
|
|
|
|
rhizome_direct_clear_temporary_files(r);
|
|
|
|
/* report back to caller.
|
|
|
|
200 = ok, which is probably appropriate for when we already had the bundle.
|
|
|
|
201 = content created, which is probably appropriate for when we successfully
|
|
|
|
import a bundle (or if we already have it).
|
|
|
|
403 = forbidden, which might be appropriate if we refuse to accept it, e.g.,
|
|
|
|
the import fails due to malformed data etc.
|
|
|
|
(should probably also indicate if we have a newer version if possible)
|
2012-10-02 23:25:04 +00:00
|
|
|
*/
|
2013-10-16 07:55:58 +00:00
|
|
|
switch (ret) {
|
|
|
|
case 0:
|
|
|
|
http_request_simple_response(&r->http, 201, "Bundle succesfully imported");
|
|
|
|
return 0;
|
|
|
|
case 2:
|
|
|
|
http_request_simple_response(&r->http, 200, "Bundle already imported");
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
http_request_simple_response(&r->http, 500, "Internal Error: Rhizome import failed");
|
|
|
|
return 0;
|
|
|
|
}
|
2012-10-02 23:25:04 +00:00
|
|
|
|
2013-10-16 07:55:58 +00:00
|
|
|
int rhizome_direct_enquiry_end(struct http_request *hr)
|
|
|
|
{
|
|
|
|
rhizome_http_request *r = (rhizome_http_request *) hr;
|
|
|
|
if (!r->received_data) {
|
|
|
|
http_request_simple_response(&r->http, 400, "Missing 'data' part");
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
char data_path[512];
|
|
|
|
if (form_temporary_file_path(r, data_path, "data") == -1) {
|
|
|
|
http_request_simple_response(&r->http, 500, "Internal Error: Buffer overrun");
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
if (config.debug.rhizome)
|
|
|
|
DEBUGF("Call rhizome_direct_fill_response(%s)", alloca_str_toprint(data_path));
|
|
|
|
/* Read data buffer in, pass to rhizome direct for comparison with local
|
|
|
|
rhizome database, and send back responses. */
|
|
|
|
int fd = open(data_path, O_RDONLY);
|
|
|
|
if (fd == -1) {
|
|
|
|
WHYF_perror("open(%s, O_RDONLY)", alloca_str_toprint(data_path));
|
|
|
|
/* Clean up after ourselves */
|
|
|
|
rhizome_direct_clear_temporary_files(r);
|
|
|
|
http_request_simple_response(&r->http, 500, "Internal Error: Couldn't read file");
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
struct stat stat;
|
|
|
|
if (fstat(fd, &stat) == -1) {
|
|
|
|
WHYF_perror("stat(%d)", fd);
|
|
|
|
/* Clean up after ourselves */
|
|
|
|
close(fd);
|
|
|
|
rhizome_direct_clear_temporary_files(r);
|
|
|
|
http_request_simple_response(&r->http, 500, "Internal Error: Couldn't stat file");
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
unsigned char *addr = mmap(NULL, stat.st_size, PROT_READ, MAP_SHARED, fd, 0);
|
|
|
|
if (addr==MAP_FAILED) {
|
|
|
|
WHYF_perror("mmap(NULL,%"PRId64",PROT_READ,MAP_SHARED,%d,0)", (int64_t) stat.st_size, fd);
|
|
|
|
/* Clean up after ourselves */
|
|
|
|
close(fd);
|
|
|
|
rhizome_direct_clear_temporary_files(r);
|
|
|
|
http_request_simple_response(&r->http, 500, "Internal Error: Couldn't mmap file");
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
/* Ask for a fill response. Regardless of the size of the set of BARs passed
|
|
|
|
to us, we will allow up to 64KB of response. */
|
|
|
|
rhizome_direct_bundle_cursor *c = rhizome_direct_get_fill_response(addr, stat.st_size, 65536);
|
|
|
|
munmap(addr,stat.st_size);
|
|
|
|
close(fd);
|
|
|
|
if (c) {
|
|
|
|
size_t bytes = c->buffer_offset_bytes + c->buffer_used;
|
|
|
|
if (http_request_set_response_bufsize(&r->http, bytes) == -1)
|
|
|
|
http_request_simple_response(&r->http, 500, "Internal Error: Out of memory");
|
|
|
|
else
|
|
|
|
http_request_response(&r->http, 200, "binary/octet-stream", (const char *)c->buffer, bytes);
|
|
|
|
rhizome_direct_bundle_iterator_free(&c);
|
|
|
|
} else
|
|
|
|
http_request_simple_response(&r->http, 500, "Internal Error: No response to enquiry");
|
|
|
|
rhizome_direct_clear_temporary_files(r);
|
|
|
|
return 0;
|
|
|
|
}
|
2012-10-02 23:25:04 +00:00
|
|
|
|
2013-10-16 07:55:58 +00:00
|
|
|
int rhizome_direct_addfile_end(struct http_request *hr)
|
|
|
|
{
|
|
|
|
rhizome_http_request *r = (rhizome_http_request *) hr;
|
|
|
|
// If given a file without a manifest, we should only accept if it we are configured to do so, and
|
|
|
|
// the connection is from localhost. Otherwise people could cause your servald to create
|
|
|
|
// arbitrary bundles, which would be bad.
|
|
|
|
if (!r->received_manifest) {
|
|
|
|
char payload_path[512];
|
|
|
|
if (form_temporary_file_path(r, payload_path, "data") == -1) {
|
|
|
|
http_request_simple_response(&r->http, 500, "Internal Error: Buffer overrun");
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
if (config.debug.rhizome)
|
|
|
|
DEBUGF("Call rhizome_add_file(%s)", alloca_str_toprint(payload_path));
|
|
|
|
char manifestTemplate[1024];
|
|
|
|
manifestTemplate[0] = '\0';
|
|
|
|
if (config.rhizome.api.addfile.manifest_template_file[0]) {
|
|
|
|
strbuf b = strbuf_local(manifestTemplate, sizeof manifestTemplate);
|
|
|
|
strbuf_path_join(b, serval_instancepath(), config.rhizome.api.addfile.manifest_template_file, NULL);
|
|
|
|
if (strbuf_overrun(b)) {
|
2012-10-02 23:25:04 +00:00
|
|
|
rhizome_direct_clear_temporary_files(r);
|
2013-10-16 07:55:58 +00:00
|
|
|
http_request_simple_response(&r->http, 500, "Internal Error: Template path too long");
|
|
|
|
return 0;
|
2012-10-02 23:25:04 +00:00
|
|
|
}
|
2013-10-16 07:55:58 +00:00
|
|
|
if (access(manifestTemplate, R_OK) != 0) {
|
2012-10-02 23:25:04 +00:00
|
|
|
rhizome_direct_clear_temporary_files(r);
|
2013-10-16 07:55:58 +00:00
|
|
|
http_request_simple_response(&r->http, 500, "Internal Error: Cannot read template");
|
|
|
|
return 0;
|
2012-10-02 23:25:04 +00:00
|
|
|
}
|
2013-10-16 07:55:58 +00:00
|
|
|
if (config.debug.rhizome)
|
|
|
|
DEBUGF("Using manifest template %s", alloca_str_toprint(manifestTemplate));
|
|
|
|
}
|
|
|
|
rhizome_manifest *m = rhizome_new_manifest();
|
|
|
|
if (!m) {
|
|
|
|
WHY("Manifest struct could not be allocated -- not added to rhizome");
|
|
|
|
http_request_simple_response(&r->http, 500, "Internal Error: No free manifest slots");
|
|
|
|
rhizome_direct_clear_temporary_files(r);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
if (manifestTemplate[0] && rhizome_read_manifest_file(m, manifestTemplate, 0) == -1) {
|
|
|
|
WHY("Manifest template read failed");
|
|
|
|
rhizome_manifest_free(m);
|
|
|
|
rhizome_direct_clear_temporary_files(r);
|
|
|
|
http_request_simple_response(&r->http, 500, "Internal Error: Malformed manifest template");
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
if (rhizome_stat_file(m, payload_path)) {
|
|
|
|
WHY("Payload file stat failed");
|
|
|
|
rhizome_manifest_free(m);
|
|
|
|
rhizome_direct_clear_temporary_files(r);
|
|
|
|
http_request_simple_response(&r->http, 500, "Internal Error: Could not store file");
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
// If manifest template did not specify a service field, then by default it is "file".
|
|
|
|
if (rhizome_manifest_get(m, "service", NULL, 0) == NULL)
|
|
|
|
rhizome_manifest_set(m, "service", RHIZOME_SERVICE_FILE);
|
|
|
|
sid_t *author = NULL;
|
|
|
|
if (!is_sid_t_any(config.rhizome.api.addfile.default_author))
|
|
|
|
author = &config.rhizome.api.addfile.default_author;
|
|
|
|
rhizome_bk_t bsk = config.rhizome.api.addfile.bundle_secret_key;
|
|
|
|
if (rhizome_fill_manifest(m, r->data_file_name, author, &bsk)) {
|
|
|
|
rhizome_manifest_free(m);
|
|
|
|
rhizome_direct_clear_temporary_files(r);
|
|
|
|
http_request_simple_response(&r->http, 500, "Internal Error: Could not fill manifest");
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
m->payloadEncryption=0;
|
|
|
|
rhizome_manifest_set_ll(m,"crypt",m->payloadEncryption?1:0);
|
|
|
|
// import file contents
|
|
|
|
// TODO, stream file into database
|
|
|
|
if (m->fileLength) {
|
|
|
|
if (rhizome_add_file(m, payload_path)) {
|
2012-10-02 23:25:04 +00:00
|
|
|
rhizome_manifest_free(m);
|
|
|
|
rhizome_direct_clear_temporary_files(r);
|
2013-10-16 07:55:58 +00:00
|
|
|
http_request_simple_response(&r->http, 500, "Internal Error: Could not store file");
|
|
|
|
return 0;
|
2012-10-02 23:25:04 +00:00
|
|
|
}
|
2013-10-16 07:55:58 +00:00
|
|
|
}
|
|
|
|
rhizome_manifest *mout = NULL;
|
|
|
|
if (rhizome_manifest_finalise(m, &mout, 1)) {
|
|
|
|
if (mout && mout != m)
|
2012-12-20 04:48:59 +00:00
|
|
|
rhizome_manifest_free(mout);
|
2012-10-02 23:25:04 +00:00
|
|
|
rhizome_manifest_free(m);
|
|
|
|
rhizome_direct_clear_temporary_files(r);
|
2013-10-16 07:55:58 +00:00
|
|
|
http_request_simple_response(&r->http, 500, "Internal Error: Could not finalise manifest");
|
2012-10-02 23:25:04 +00:00
|
|
|
return 0;
|
|
|
|
}
|
2013-10-16 07:55:58 +00:00
|
|
|
if (config.debug.rhizome)
|
|
|
|
DEBUGF("Import sans-manifest appeared to succeed");
|
|
|
|
/* Respond with the manifest that was added. */
|
|
|
|
http_request_response(&r->http, 200, "text/plain", (const char *)m->manifestdata, m->manifest_bytes);
|
|
|
|
/* clean up after ourselves */
|
|
|
|
if (mout && mout != m)
|
|
|
|
rhizome_manifest_free(mout);
|
|
|
|
rhizome_manifest_free(m);
|
|
|
|
rhizome_direct_clear_temporary_files(r);
|
|
|
|
return 0;
|
|
|
|
} else {
|
|
|
|
http_request_simple_response(&r->http, 501, "Not Implemented: Rhizome add with manifest");
|
|
|
|
return 0;
|
|
|
|
}
|
2012-09-09 04:20:09 +00:00
|
|
|
}
|
|
|
|
|
2013-10-16 07:55:58 +00:00
|
|
|
void rhizome_direct_process_mime_start(struct http_request *hr)
|
2012-09-09 04:20:09 +00:00
|
|
|
{
|
2013-10-16 07:55:58 +00:00
|
|
|
rhizome_http_request *r = (rhizome_http_request *) hr;
|
|
|
|
assert(r->current_part == NONE);
|
|
|
|
assert(r->part_fd == -1);
|
|
|
|
}
|
2012-09-09 04:20:09 +00:00
|
|
|
|
2013-10-16 07:55:58 +00:00
|
|
|
void rhizome_direct_process_mime_end(struct http_request *hr)
|
|
|
|
{
|
|
|
|
rhizome_http_request *r = (rhizome_http_request *) hr;
|
|
|
|
if (r->part_fd != -1) {
|
|
|
|
if (close(r->part_fd) == -1) {
|
|
|
|
WHYF_perror("close(%d)", r->part_fd);
|
|
|
|
http_request_simple_response(&r->http, 500, "Internal Error: Close temporary file failed");
|
|
|
|
return;
|
2012-09-09 04:20:09 +00:00
|
|
|
}
|
2013-10-16 07:55:58 +00:00
|
|
|
r->part_fd = -1;
|
2012-09-09 04:20:09 +00:00
|
|
|
}
|
2013-10-16 07:55:58 +00:00
|
|
|
switch (r->current_part) {
|
|
|
|
case MANIFEST:
|
|
|
|
r->received_manifest = 1;
|
|
|
|
break;
|
|
|
|
case DATA:
|
|
|
|
r->received_data = 1;
|
|
|
|
break;
|
|
|
|
case NONE:
|
|
|
|
break;
|
2013-03-18 06:09:08 +00:00
|
|
|
}
|
2012-09-09 04:20:09 +00:00
|
|
|
}
|
|
|
|
|
2013-10-16 07:55:58 +00:00
|
|
|
void rhizome_direct_process_mime_content_disposition(struct http_request *hr, const struct mime_content_disposition *cd)
|
2012-09-09 04:20:09 +00:00
|
|
|
{
|
2013-10-16 07:55:58 +00:00
|
|
|
rhizome_http_request *r = (rhizome_http_request *) hr;
|
|
|
|
if (strcmp(cd->name, "data") == 0) {
|
|
|
|
r->current_part = DATA;
|
|
|
|
strncpy(r->data_file_name, cd->filename, sizeof r->data_file_name)[sizeof r->data_file_name - 1] = '\0';
|
2012-09-09 04:20:09 +00:00
|
|
|
}
|
2013-10-16 07:55:58 +00:00
|
|
|
else if (strcmp(cd->name, "manifest") == 0) {
|
|
|
|
r->current_part = MANIFEST;
|
|
|
|
} else
|
|
|
|
return;
|
|
|
|
char path[512];
|
|
|
|
if (form_temporary_file_path(r, path, cd->name) == -1) {
|
|
|
|
http_request_simple_response(&r->http, 500, "Internal Error: Buffer overrun");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
if ((r->part_fd = open(path, O_WRONLY | O_CREAT, 0666)) == -1) {
|
|
|
|
WHYF_perror("open(%s,O_WRONLY|O_CREAT,0666)", alloca_str_toprint(path));
|
|
|
|
http_request_simple_response(&r->http, 500, "Internal Error: Create temporary file failed");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
2012-09-09 04:20:09 +00:00
|
|
|
|
2013-10-16 07:55:58 +00:00
|
|
|
void rhizome_direct_process_mime_body(struct http_request *hr, const char *buf, size_t len)
|
|
|
|
{
|
|
|
|
rhizome_http_request *r = (rhizome_http_request *) hr;
|
|
|
|
if (r->part_fd != -1) {
|
|
|
|
if (write_all(r->part_fd, buf, len) == -1) {
|
|
|
|
http_request_simple_response(&r->http, 500, "Internal Error: Write temporary file failed");
|
|
|
|
return;
|
2012-09-09 04:20:09 +00:00
|
|
|
}
|
2013-10-16 07:55:58 +00:00
|
|
|
}
|
|
|
|
}
|
2012-09-09 04:20:09 +00:00
|
|
|
|
2013-10-16 07:55:58 +00:00
|
|
|
int rhizome_direct_import(rhizome_http_request *r, const char *remainder)
|
|
|
|
{
|
|
|
|
if (r->http.verb != HTTP_VERB_POST) {
|
|
|
|
http_request_simple_response(&r->http, 405, NULL);
|
|
|
|
return 0;
|
2012-09-09 04:20:09 +00:00
|
|
|
}
|
2013-10-16 07:55:58 +00:00
|
|
|
r->http.form_data.handle_mime_part_start = rhizome_direct_process_mime_start;
|
|
|
|
r->http.form_data.handle_mime_part_end = rhizome_direct_process_mime_end;
|
|
|
|
r->http.form_data.handle_mime_content_disposition = rhizome_direct_process_mime_content_disposition;
|
|
|
|
r->http.form_data.handle_mime_body = rhizome_direct_process_mime_body;
|
|
|
|
r->http.handle_content_end = rhizome_direct_import_end;
|
|
|
|
r->current_part = NONE;
|
|
|
|
r->part_fd = -1;
|
|
|
|
r->data_file_name[0] = '\0';
|
2012-09-09 04:20:09 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2013-10-16 07:55:58 +00:00
|
|
|
int rhizome_direct_enquiry(rhizome_http_request *r, const char *remainder)
|
2012-09-09 04:20:09 +00:00
|
|
|
{
|
2013-10-16 07:55:58 +00:00
|
|
|
if (r->http.verb != HTTP_VERB_POST) {
|
|
|
|
http_request_simple_response(&r->http, 405, NULL);
|
|
|
|
return 0;
|
2012-10-03 08:21:37 +00:00
|
|
|
}
|
2013-10-16 07:55:58 +00:00
|
|
|
r->http.form_data.handle_mime_part_start = rhizome_direct_process_mime_start;
|
|
|
|
r->http.form_data.handle_mime_part_end = rhizome_direct_process_mime_end;
|
|
|
|
r->http.form_data.handle_mime_content_disposition = rhizome_direct_process_mime_content_disposition;
|
|
|
|
r->http.form_data.handle_mime_body = rhizome_direct_process_mime_body;
|
|
|
|
r->http.handle_content_end = rhizome_direct_enquiry_end;
|
|
|
|
r->current_part = NONE;
|
|
|
|
r->part_fd = -1;
|
|
|
|
r->data_file_name[0] = '\0';
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Servald can be configured to accept files without manifests via HTTP from localhost, so that
|
|
|
|
* rhizome bundles can be created programatically. There are probably still some security
|
|
|
|
* loop-holes here, which is part of why we leave it disabled by default, but it will be sufficient
|
|
|
|
* for testing possible uses, including integration with OpenDataKit.
|
|
|
|
*/
|
|
|
|
int rhizome_direct_addfile(rhizome_http_request *r, const char *remainder)
|
|
|
|
{
|
|
|
|
if (r->http.verb != HTTP_VERB_POST) {
|
|
|
|
http_request_simple_response(&r->http, 405, NULL);
|
|
|
|
return 0;
|
2012-10-03 08:21:37 +00:00
|
|
|
}
|
2013-10-16 07:55:58 +00:00
|
|
|
if (cmp_sockaddr((struct sockaddr *)&r->http.client_in_addr, sizeof r->http.client_in_addr,
|
|
|
|
(struct sockaddr *)&config.rhizome.api.addfile.allow_host, sizeof config.rhizome.api.addfile.allow_host
|
|
|
|
) != 0
|
2012-10-04 05:05:09 +00:00
|
|
|
) {
|
2013-10-16 07:55:58 +00:00
|
|
|
INFOF("rhizome.api.addfile request received from %s, but is only allowed from %s",
|
|
|
|
alloca_sockaddr(&r->http.client_in_addr, sizeof r->http.client_in_addr),
|
|
|
|
alloca_sockaddr(&config.rhizome.api.addfile.allow_host, sizeof config.rhizome.api.addfile.allow_host)
|
|
|
|
);
|
|
|
|
rhizome_direct_clear_temporary_files(r);
|
|
|
|
http_request_simple_response(&r->http, 404, "<html><h1>Not available from here</h1></html>");
|
2012-10-04 05:05:09 +00:00
|
|
|
return 0;
|
2012-09-09 04:20:09 +00:00
|
|
|
}
|
2013-10-16 07:55:58 +00:00
|
|
|
r->http.form_data.handle_mime_part_start = rhizome_direct_process_mime_start;
|
|
|
|
r->http.form_data.handle_mime_part_end = rhizome_direct_process_mime_end;
|
|
|
|
r->http.form_data.handle_mime_content_disposition = rhizome_direct_process_mime_content_disposition;
|
|
|
|
r->http.form_data.handle_mime_body = rhizome_direct_process_mime_body;
|
|
|
|
r->http.handle_content_end = rhizome_direct_addfile_end;
|
|
|
|
r->current_part = NONE;
|
|
|
|
r->part_fd = -1;
|
|
|
|
r->data_file_name[0] = '\0';
|
2012-09-09 04:20:09 +00:00
|
|
|
return 0;
|
|
|
|
}
|
2012-09-09 23:46:27 +00:00
|
|
|
|
2013-10-16 07:55:58 +00:00
|
|
|
int rhizome_direct_dispatch(rhizome_http_request *r, const char *remainder)
|
|
|
|
{
|
|
|
|
if ( config.rhizome.api.addfile.uri_path[0]
|
|
|
|
&& strcmp(r->http.path, config.rhizome.api.addfile.uri_path) == 0
|
|
|
|
)
|
|
|
|
return rhizome_direct_addfile(r, remainder);
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2012-10-04 08:08:33 +00:00
|
|
|
static int receive_http_response(int sock, char *buffer, size_t buffer_len, struct http_response_parts *parts)
|
|
|
|
{
|
|
|
|
int len = 0;
|
|
|
|
int count;
|
|
|
|
do {
|
|
|
|
if ((count = read(sock, &buffer[len], buffer_len - len)) == -1)
|
2013-07-15 00:29:24 +00:00
|
|
|
return WHYF_perror("read(%d, %p, %d)", sock, &buffer[len], (int)buffer_len - len);
|
2012-10-04 08:08:33 +00:00
|
|
|
len += count;
|
2013-10-16 00:52:02 +00:00
|
|
|
} while (len < buffer_len && count != 0 && !is_http_header_complete(buffer, len, len));
|
2012-12-11 05:29:46 +00:00
|
|
|
if (config.debug.rhizome_rx)
|
2012-10-04 08:08:33 +00:00
|
|
|
DEBUGF("Received HTTP response %s", alloca_toprint(-1, buffer, len));
|
|
|
|
if (unpack_http_response(buffer, parts) == -1)
|
|
|
|
return -1;
|
|
|
|
if (parts->code != 200 && parts->code != 201) {
|
2013-07-15 00:29:24 +00:00
|
|
|
INFOF("Failed HTTP request: server returned %03u %s", parts->code, parts->reason);
|
2012-10-04 08:08:33 +00:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
if (parts->content_length == -1) {
|
2012-12-11 05:29:46 +00:00
|
|
|
if (config.debug.rhizome_rx)
|
2012-10-04 08:08:33 +00:00
|
|
|
DEBUGF("Invalid HTTP reply: missing Content-Length header");
|
|
|
|
return -1;
|
|
|
|
}
|
2013-10-16 07:55:58 +00:00
|
|
|
if (config.debug.rhizome_rx)
|
|
|
|
DEBUGF("content_length=%"PRId64, parts->content_length);
|
2013-02-08 00:10:12 +00:00
|
|
|
return len - (parts->content_start - buffer);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int fill_buffer(int sock, unsigned char *buffer, int len, int buffer_size){
|
|
|
|
int count;
|
|
|
|
do {
|
|
|
|
if ((count = read(sock, &buffer[len], buffer_size - len)) == -1)
|
|
|
|
return WHYF_perror("read(%d, %p, %d)", sock, &buffer[len], buffer_size - len);
|
|
|
|
len += count;
|
|
|
|
} while (len < buffer_size);
|
2012-10-04 08:08:33 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2012-09-09 23:46:27 +00:00
|
|
|
void rhizome_direct_http_dispatch(rhizome_direct_sync_request *r)
|
|
|
|
{
|
2013-10-16 07:55:58 +00:00
|
|
|
if (config.debug.rhizome_tx)
|
|
|
|
DEBUGF("Dispatch size_high=%"PRId64,r->cursor->size_high);
|
2012-10-03 08:21:37 +00:00
|
|
|
rhizome_direct_transport_state_http *state = r->transport_specific_state;
|
2012-09-10 21:26:04 +00:00
|
|
|
|
2013-10-09 08:24:21 +00:00
|
|
|
sid_t zerosid = SID_ANY;
|
2012-11-29 05:08:04 +00:00
|
|
|
|
2012-09-10 21:26:04 +00:00
|
|
|
int sock=socket(AF_INET, SOCK_STREAM, 0);
|
|
|
|
if (sock==-1) {
|
2013-10-16 07:55:58 +00:00
|
|
|
WHY_perror("socket");
|
2012-09-10 21:26:04 +00:00
|
|
|
goto end;
|
2013-10-16 07:55:58 +00:00
|
|
|
}
|
2012-09-10 21:26:04 +00:00
|
|
|
|
|
|
|
struct hostent *hostent;
|
|
|
|
hostent = gethostbyname(state->host);
|
|
|
|
if (!hostent) {
|
2013-10-16 07:55:58 +00:00
|
|
|
if (config.debug.rhizome_tx)
|
|
|
|
DEBUGF("could not resolve hostname");
|
2012-09-10 21:26:04 +00:00
|
|
|
goto end;
|
|
|
|
}
|
2012-09-10 10:52:14 +00:00
|
|
|
|
2013-10-16 07:55:58 +00:00
|
|
|
struct sockaddr_in addr;
|
|
|
|
addr.sin_family = AF_INET;
|
|
|
|
addr.sin_port = htons(state->port);
|
2012-09-10 21:26:04 +00:00
|
|
|
addr.sin_addr = *((struct in_addr *)hostent->h_addr);
|
2013-10-16 07:55:58 +00:00
|
|
|
bzero(&(addr.sin_zero),8);
|
2012-09-10 21:26:04 +00:00
|
|
|
|
2013-10-16 07:55:58 +00:00
|
|
|
if (connect(sock, (struct sockaddr *)&addr, sizeof addr) == -1) {
|
|
|
|
WHYF_perror("connect(%s)", alloca_sockaddr(&addr, sizeof addr));
|
2012-10-03 08:21:37 +00:00
|
|
|
close(sock);
|
|
|
|
goto end;
|
|
|
|
}
|
2013-10-16 07:55:58 +00:00
|
|
|
|
2012-10-03 08:21:37 +00:00
|
|
|
char boundary[20];
|
|
|
|
char buffer[8192];
|
|
|
|
|
|
|
|
strbuf bb = strbuf_local(boundary, sizeof boundary);
|
|
|
|
strbuf_sprintf(bb, "%08lx%08lx", random(), random());
|
|
|
|
assert(!strbuf_overrun(bb));
|
|
|
|
strbuf content_preamble = strbuf_alloca(200);
|
|
|
|
strbuf content_postamble = strbuf_alloca(40);
|
|
|
|
strbuf_sprintf(content_preamble,
|
|
|
|
"--%s\r\n"
|
|
|
|
"Content-Disposition: form-data; name=\"data\"; filename=\"IHAVEs\"\r\n"
|
|
|
|
"Content-Type: application/octet-stream\r\n"
|
|
|
|
"\r\n",
|
|
|
|
boundary
|
|
|
|
);
|
|
|
|
strbuf_sprintf(content_postamble, "\r\n--%s--\r\n", boundary);
|
|
|
|
assert(!strbuf_overrun(content_preamble));
|
|
|
|
assert(!strbuf_overrun(content_postamble));
|
|
|
|
int content_length = strbuf_len(content_preamble)
|
|
|
|
+ r->cursor->buffer_offset_bytes
|
|
|
|
+ r->cursor->buffer_used
|
|
|
|
+ strbuf_len(content_postamble);
|
|
|
|
strbuf request = strbuf_local(buffer, sizeof buffer);
|
|
|
|
strbuf_sprintf(request,
|
|
|
|
"POST /rhizome/enquiry HTTP/1.0\r\n"
|
|
|
|
"Content-Length: %d\r\n"
|
|
|
|
"Content-Type: multipart/form-data; boundary=%s\r\n"
|
|
|
|
"\r\n%s",
|
|
|
|
content_length, boundary, strbuf_str(content_preamble)
|
|
|
|
);
|
|
|
|
assert(!strbuf_overrun(request));
|
2012-09-10 21:26:04 +00:00
|
|
|
|
2012-09-10 23:34:38 +00:00
|
|
|
/* TODO: Refactor this code so that it uses our asynchronous framework.
|
|
|
|
*/
|
2012-10-03 08:21:37 +00:00
|
|
|
int len = strbuf_len(request);
|
2012-09-10 21:26:04 +00:00
|
|
|
int sent=0;
|
|
|
|
while(sent<len) {
|
2013-10-16 07:55:58 +00:00
|
|
|
if (config.debug.rhizome_tx)
|
|
|
|
DEBUGF("write(%d, %s, %d)", sock, alloca_toprint(-1, &buffer[sent], len-sent), len-sent);
|
2012-09-10 21:26:04 +00:00
|
|
|
int count=write(sock,&buffer[sent],len-sent);
|
2012-10-03 08:21:37 +00:00
|
|
|
if (count == -1) {
|
2012-09-10 23:34:38 +00:00
|
|
|
if (errno==EPIPE) goto rx;
|
2012-10-03 08:21:37 +00:00
|
|
|
WHYF_perror("write(%d)", len - sent);
|
2012-09-10 21:26:04 +00:00
|
|
|
close(sock);
|
|
|
|
goto end;
|
|
|
|
}
|
|
|
|
sent+=count;
|
|
|
|
}
|
|
|
|
|
|
|
|
len=r->cursor->buffer_offset_bytes+r->cursor->buffer_used;
|
|
|
|
sent=0;
|
|
|
|
while(sent<len) {
|
|
|
|
int count=write(sock,&r->cursor->buffer[sent],len-sent);
|
2012-10-03 08:21:37 +00:00
|
|
|
if (count == -1) {
|
|
|
|
if (errno == EPIPE)
|
|
|
|
goto rx;
|
|
|
|
WHYF_perror("write(%d)", count);
|
2012-09-10 21:26:04 +00:00
|
|
|
close(sock);
|
|
|
|
goto end;
|
|
|
|
}
|
|
|
|
sent+=count;
|
|
|
|
}
|
|
|
|
|
2012-10-03 08:21:37 +00:00
|
|
|
strbuf_reset(request);
|
|
|
|
strbuf_puts(request, strbuf_str(content_postamble));
|
|
|
|
len = strbuf_len(request);
|
2012-09-10 21:26:04 +00:00
|
|
|
sent=0;
|
|
|
|
while(sent<len) {
|
2013-10-16 07:55:58 +00:00
|
|
|
if (config.debug.rhizome_tx)
|
|
|
|
DEBUGF("write(%d, %s, %d)", sock, alloca_toprint(-1, &buffer[sent], len-sent), len-sent);
|
2012-09-10 21:26:04 +00:00
|
|
|
int count=write(sock,&buffer[sent],len-sent);
|
2012-10-03 08:21:37 +00:00
|
|
|
if (count == -1) {
|
2012-09-10 23:34:38 +00:00
|
|
|
if (errno==EPIPE) goto rx;
|
2012-10-03 08:21:37 +00:00
|
|
|
WHYF_perror("write(%d)", len - sent);
|
2012-09-10 21:26:04 +00:00
|
|
|
close(sock);
|
|
|
|
goto end;
|
|
|
|
}
|
|
|
|
sent+=count;
|
|
|
|
}
|
|
|
|
|
2012-10-04 08:08:33 +00:00
|
|
|
struct http_response_parts parts;
|
2012-09-10 23:34:38 +00:00
|
|
|
rx:
|
|
|
|
/* request sent, now get response back. */
|
2013-02-08 00:10:12 +00:00
|
|
|
len=receive_http_response(sock, buffer, sizeof buffer, &parts);
|
|
|
|
if (len == -1) {
|
2012-10-04 08:08:33 +00:00
|
|
|
close(sock);
|
|
|
|
goto end;
|
2012-09-10 23:58:11 +00:00
|
|
|
}
|
|
|
|
|
2013-02-08 00:10:12 +00:00
|
|
|
/* Allocate a buffer to receive the entire action list */
|
|
|
|
content_length = parts.content_length;
|
2013-08-15 06:17:39 +00:00
|
|
|
unsigned char *actionlist=emalloc(content_length);
|
|
|
|
if (!actionlist){
|
|
|
|
close(sock);
|
|
|
|
goto end;
|
|
|
|
}
|
2013-02-08 00:10:12 +00:00
|
|
|
bcopy(parts.content_start, actionlist, len);
|
|
|
|
if (fill_buffer(sock, actionlist, len, content_length)==-1){
|
|
|
|
free(actionlist);
|
|
|
|
close(sock);
|
|
|
|
goto end;
|
|
|
|
}
|
|
|
|
close(sock);
|
2013-10-16 07:55:58 +00:00
|
|
|
|
2012-10-02 09:54:35 +00:00
|
|
|
/* We now have the list of (1+RHIZOME_BAR_PREFIX_BYTES)-byte records that indicate
|
|
|
|
the list of BAR prefixes that differ between the two nodes. We can now action
|
2013-10-16 07:55:58 +00:00
|
|
|
those which are relevant, i.e., based on whether we are pushing, pulling or
|
2012-10-02 09:54:35 +00:00
|
|
|
synchronising (both).
|
2012-09-21 12:31:14 +00:00
|
|
|
|
|
|
|
I am currently undecided as to whether it is cleaner to have some general
|
|
|
|
rhizome direct function for doing that, or whether it just adds unnecessary
|
|
|
|
complication, and the responses should just be handled in here.
|
|
|
|
|
|
|
|
For now, I am just going to implement it in here, and we can generalise later.
|
|
|
|
*/
|
2012-09-21 12:40:36 +00:00
|
|
|
int i;
|
2012-10-02 09:54:35 +00:00
|
|
|
for(i=10;i<content_length;i+=(1+RHIZOME_BAR_PREFIX_BYTES))
|
2012-09-21 12:40:36 +00:00
|
|
|
{
|
2012-10-03 15:55:55 +00:00
|
|
|
int type=actionlist[i];
|
2012-09-22 05:51:02 +00:00
|
|
|
if (type==2&&r->pullP) {
|
|
|
|
/* Need to fetch manifest. Once we have the manifest, then we can
|
2013-10-16 07:55:58 +00:00
|
|
|
use our normal bundle fetch routines from rhizome_fetch.c
|
2012-10-02 13:56:21 +00:00
|
|
|
|
|
|
|
Generate a request like: GET /rhizome/manifestbybar/<hex of bar>
|
|
|
|
and add it to our list of HTTP fetch requests, then watch
|
|
|
|
until the request is finished. That will give us the manifest.
|
|
|
|
Then as noted above, we can use that to pull the file down using
|
|
|
|
existing routines.
|
2012-09-22 05:51:02 +00:00
|
|
|
*/
|
2013-10-16 07:55:58 +00:00
|
|
|
if (config.debug.rhizome_tx)
|
|
|
|
DEBUGF("Fetching manifest %s* @ 0x%x",alloca_tohex(&actionlist[i], 1+RHIZOME_BAR_PREFIX_BYTES),i);
|
2013-10-09 08:24:21 +00:00
|
|
|
if (!rhizome_fetch_request_manifest_by_prefix(&addr, &zerosid, &actionlist[i+1], RHIZOME_BAR_PREFIX_BYTES))
|
2012-10-02 13:56:21 +00:00
|
|
|
{
|
2013-10-16 07:55:58 +00:00
|
|
|
/* Fetching the manifest, and then using it to see if we want to
|
2012-10-02 13:56:21 +00:00
|
|
|
fetch the file for import is all handled asynchronously, so just
|
|
|
|
wait for it to finish. */
|
2012-11-12 05:51:38 +00:00
|
|
|
while (rhizome_any_fetch_active() || rhizome_any_fetch_queued())
|
2012-10-18 07:00:22 +00:00
|
|
|
fd_poll();
|
2012-10-02 13:56:21 +00:00
|
|
|
}
|
2013-10-16 07:55:58 +00:00
|
|
|
|
2012-09-22 05:51:02 +00:00
|
|
|
} else if (type==1&&r->pushP) {
|
|
|
|
/* Form up the POST request to submit the appropriate bundle. */
|
|
|
|
|
|
|
|
/* Start by getting the manifest, which is the main thing we need, and also
|
|
|
|
gives us the information we need for sending any associated file. */
|
2013-10-03 19:20:37 +00:00
|
|
|
rhizome_manifest *m = rhizome_direct_get_manifest(&actionlist[i+1], RHIZOME_BAR_PREFIX_BYTES);
|
|
|
|
if (m == NULL) {
|
2012-10-03 08:21:37 +00:00
|
|
|
WHY("This should never happen. The manifest exists, but when I went looking for it, it doesn't appear to be there.");
|
2012-09-22 05:51:02 +00:00
|
|
|
goto next_item;
|
|
|
|
}
|
2012-09-26 06:31:27 +00:00
|
|
|
|
|
|
|
/* Get filehash and size from manifest if present */
|
2013-10-16 07:55:58 +00:00
|
|
|
if (config.debug.rhizome_tx) {
|
|
|
|
DEBUGF("bundle id = %s", alloca_tohex_rhizome_bid_t(m->cryptoSignPublic));
|
|
|
|
DEBUGF("bundle filehash = '%s'", alloca_tohex_rhizome_filehash_t(m->filehash));
|
|
|
|
DEBUGF("file size = %"PRId64, m->fileLength);
|
|
|
|
}
|
2013-10-06 19:24:46 +00:00
|
|
|
int64_t version = rhizome_manifest_get_ll(m, "version");
|
2013-10-16 07:55:58 +00:00
|
|
|
if (config.debug.rhizome_tx)
|
|
|
|
DEBUGF("version = %"PRId64,version);
|
2012-09-26 06:31:27 +00:00
|
|
|
|
|
|
|
/* We now have everything we need to compose the POST request and send it.
|
|
|
|
*/
|
|
|
|
char *template="POST /rhizome/import HTTP/1.0\r\n"
|
|
|
|
"Content-Length: %d\r\n"
|
|
|
|
"Content-Type: multipart/form-data; boundary=%s\r\n"
|
|
|
|
"\r\n";
|
|
|
|
char *template2="--%s\r\n"
|
|
|
|
"Content-Disposition: form-data; name=\"manifest\"; filename=\"m\"\r\n"
|
|
|
|
"Content-Type: application/octet-stream\r\n"
|
|
|
|
"\r\n";
|
|
|
|
char *template3=
|
2012-09-26 07:17:55 +00:00
|
|
|
"\r\n--%s\r\n"
|
2012-09-26 06:31:27 +00:00
|
|
|
"Content-Disposition: form-data; name=\"data\"; filename=\"d\"\r\n"
|
|
|
|
"Content-Type: application/octet-stream\r\n"
|
|
|
|
"\r\n";
|
|
|
|
/* Work out what the content length should be */
|
2013-10-16 07:55:58 +00:00
|
|
|
if (config.debug.rhizome_tx)
|
|
|
|
DEBUGF("manifest_all_bytes=%d, manifest_bytes=%d", m->manifest_all_bytes,m->manifest_bytes);
|
2012-09-26 06:31:27 +00:00
|
|
|
int content_length
|
2012-09-26 07:17:55 +00:00
|
|
|
=strlen(template2)-2 /* minus 2 for the "%s" that gets replaced */
|
2012-10-03 08:21:37 +00:00
|
|
|
+strlen(boundary)
|
2012-09-26 06:31:27 +00:00
|
|
|
+m->manifest_all_bytes
|
2012-09-26 07:17:55 +00:00
|
|
|
+strlen(template3)-2 /* minus 2 for the "%s" that gets replaced */
|
2012-10-03 08:21:37 +00:00
|
|
|
+strlen(boundary)
|
2013-10-10 07:53:06 +00:00
|
|
|
+m->fileLength
|
2012-10-03 08:21:37 +00:00
|
|
|
+strlen("\r\n--")+strlen(boundary)+strlen("--\r\n");
|
2012-09-26 06:31:27 +00:00
|
|
|
|
2012-09-26 07:17:55 +00:00
|
|
|
/* XXX For some reason the above is four bytes out, so fix that */
|
|
|
|
content_length+=4;
|
|
|
|
|
2012-10-03 08:21:37 +00:00
|
|
|
int len=snprintf(buffer,8192,template,content_length,boundary);
|
|
|
|
len+=snprintf(&buffer[len],8192-len,template2,boundary);
|
2012-09-26 06:31:27 +00:00
|
|
|
memcpy(&buffer[len],m->manifestdata,m->manifest_all_bytes);
|
|
|
|
len+=m->manifest_all_bytes;
|
2012-10-03 08:21:37 +00:00
|
|
|
len+=snprintf(&buffer[len],8192-len,template3,boundary);
|
2012-09-26 06:31:27 +00:00
|
|
|
|
2013-10-16 07:55:58 +00:00
|
|
|
addr.sin_family = AF_INET;
|
|
|
|
addr.sin_port = htons(state->port);
|
2012-09-26 07:17:55 +00:00
|
|
|
addr.sin_addr = *((struct in_addr *)hostent->h_addr);
|
2013-10-16 07:55:58 +00:00
|
|
|
bzero(&(addr.sin_zero),8);
|
|
|
|
|
2012-09-26 07:17:55 +00:00
|
|
|
sock=socket(AF_INET, SOCK_STREAM, 0);
|
|
|
|
if (sock==-1) {
|
2013-10-16 07:55:58 +00:00
|
|
|
if (config.debug.rhizome_tx)
|
|
|
|
DEBUGF("could not open socket");
|
2012-09-26 07:17:55 +00:00
|
|
|
goto closeit;
|
2013-10-16 07:55:58 +00:00
|
|
|
}
|
|
|
|
if (connect(sock,(struct sockaddr *)&addr,sizeof(struct sockaddr)) == -1) {
|
|
|
|
if (config.debug.rhizome_tx)
|
2012-09-26 07:17:55 +00:00
|
|
|
DEBUGF("Could not connect to remote");
|
2013-10-16 07:55:58 +00:00
|
|
|
goto closeit;
|
|
|
|
}
|
2012-09-26 07:17:55 +00:00
|
|
|
|
|
|
|
int sent=0;
|
|
|
|
/* Send buffer now */
|
|
|
|
while(sent<len) {
|
|
|
|
int r=write(sock,&buffer[sent],len-sent);
|
|
|
|
if (r>0) sent+=r;
|
|
|
|
if (r<0) goto closeit;
|
2012-10-02 09:02:48 +00:00
|
|
|
}
|
2012-09-26 06:31:27 +00:00
|
|
|
|
2013-02-20 03:59:08 +00:00
|
|
|
/* send file contents */
|
|
|
|
{
|
2013-10-10 07:53:06 +00:00
|
|
|
rhizome_filehash_t filehash;
|
|
|
|
if (rhizome_database_filehash_from_id(&m->cryptoSignPublic, version, &filehash) == -1)
|
2013-02-20 03:59:08 +00:00
|
|
|
goto closeit;
|
2013-10-16 07:55:58 +00:00
|
|
|
|
2013-02-20 03:59:08 +00:00
|
|
|
struct rhizome_read read;
|
|
|
|
bzero(&read, sizeof read);
|
2013-10-10 07:53:06 +00:00
|
|
|
if (rhizome_open_read(&read, &filehash))
|
2013-02-20 03:59:08 +00:00
|
|
|
goto closeit;
|
2013-10-16 07:55:58 +00:00
|
|
|
|
2013-10-10 07:53:06 +00:00
|
|
|
int64_t read_ofs;
|
|
|
|
for(read_ofs=0;read_ofs<m->fileLength;){
|
2012-09-26 07:42:48 +00:00
|
|
|
unsigned char buffer[4096];
|
2013-02-20 03:59:08 +00:00
|
|
|
read.offset=read_ofs;
|
|
|
|
int bytes_read = rhizome_read(&read, buffer, sizeof buffer);
|
|
|
|
if (bytes_read<0){
|
|
|
|
rhizome_read_close(&read);
|
|
|
|
goto closeit;
|
|
|
|
}
|
|
|
|
|
|
|
|
int write_ofs=0;
|
|
|
|
while(write_ofs < bytes_read){
|
|
|
|
int written = write(sock, buffer + write_ofs, bytes_read - write_ofs);
|
|
|
|
if (written<0){
|
2012-10-04 08:08:33 +00:00
|
|
|
WHY_perror("write");
|
2013-02-20 03:59:08 +00:00
|
|
|
rhizome_read_close(&read);
|
2012-10-04 08:08:33 +00:00
|
|
|
goto closeit;
|
|
|
|
}
|
2013-02-20 03:59:08 +00:00
|
|
|
write_ofs+=written;
|
2012-09-26 07:42:48 +00:00
|
|
|
}
|
2013-10-16 07:55:58 +00:00
|
|
|
|
2013-02-20 03:59:08 +00:00
|
|
|
read_ofs+=bytes_read;
|
2012-09-26 07:42:48 +00:00
|
|
|
}
|
2013-02-20 03:59:08 +00:00
|
|
|
rhizome_read_close(&read);
|
|
|
|
}
|
2012-09-26 07:17:55 +00:00
|
|
|
/* Send final mime boundary */
|
2012-10-03 08:21:37 +00:00
|
|
|
len=snprintf(buffer,8192,"\r\n--%s--\r\n",boundary);
|
2012-09-26 07:17:55 +00:00
|
|
|
sent=0;
|
|
|
|
while(sent<len) {
|
|
|
|
int r=write(sock,&buffer[sent],len-sent);
|
|
|
|
if (r>0) sent+=r;
|
|
|
|
if (r<0) goto closeit;
|
2013-10-16 07:55:58 +00:00
|
|
|
}
|
2012-09-26 07:17:55 +00:00
|
|
|
|
2012-10-04 08:08:33 +00:00
|
|
|
/* get response back. */
|
|
|
|
if (receive_http_response(sock, buffer, sizeof buffer, &parts) == -1)
|
|
|
|
goto closeit;
|
|
|
|
INFOF("Received HTTP response %03u %s", parts.code, parts.reason);
|
2012-09-26 07:17:55 +00:00
|
|
|
|
|
|
|
closeit:
|
|
|
|
close(sock);
|
2012-09-26 06:31:27 +00:00
|
|
|
|
2012-09-22 05:51:02 +00:00
|
|
|
if (m) rhizome_manifest_free(m);
|
|
|
|
}
|
|
|
|
next_item:
|
|
|
|
continue;
|
2012-09-21 12:40:36 +00:00
|
|
|
}
|
|
|
|
|
2013-02-08 00:10:12 +00:00
|
|
|
free(actionlist);
|
2013-10-16 07:55:58 +00:00
|
|
|
|
2012-09-21 13:45:10 +00:00
|
|
|
/* now update cursor according to what range was covered in the response.
|
|
|
|
We set our current position to just past the high limit of the returned
|
|
|
|
cursor.
|
|
|
|
|
|
|
|
XXX - This introduces potential problems with the returned cursor range.
|
|
|
|
If the far end returns an earlier cursor position than we are in, we could
|
|
|
|
end up in an infinite loop. We could also end up in a very long finite loop
|
|
|
|
if the cursor doesn't advance far. A simple solution is to not adjust the
|
|
|
|
cursor position, and simply re-attempt the sync until no actions result.
|
2013-10-16 07:55:58 +00:00
|
|
|
That will do for now.
|
2012-09-21 13:45:10 +00:00
|
|
|
*/
|
|
|
|
#ifdef FANCY_CURSOR_POSITION_HANDLING
|
|
|
|
rhizome_direct_bundle_cursor *c=rhizome_direct_bundle_iterator(10);
|
|
|
|
assert(c!=NULL);
|
2013-10-16 07:55:58 +00:00
|
|
|
if (rhizome_direct_bundle_iterator_unpickle_range(c,(unsigned char *)&p[0],10)) {
|
|
|
|
if (config.debug.rhizome_tx)
|
2012-09-21 13:45:10 +00:00
|
|
|
DEBUGF("Couldn't unpickle range. This should never happen. Assuming near and far cursor ranges match.");
|
2013-10-16 07:55:58 +00:00
|
|
|
}
|
2012-09-21 13:45:10 +00:00
|
|
|
else {
|
2013-10-16 07:55:58 +00:00
|
|
|
if (config.debug.rhizome_tx) {
|
|
|
|
DEBUGF("unpickled size_high=%"PRId64", limit_size_high=%"PRId64, c->size_high, c->limit_size_high);
|
|
|
|
DEBUGF("c->buffer_size=%d",c->buffer_size);
|
|
|
|
}
|
2012-09-21 13:45:10 +00:00
|
|
|
r->cursor->size_low=c->limit_size_high;
|
|
|
|
/* Set tail of BID to all high, as we assume the far end has returned all
|
|
|
|
BIDs with the specified prefix. */
|
2013-10-03 13:46:45 +00:00
|
|
|
r->cursor->bid_low = RHIZOME_BID_MAX;
|
|
|
|
bcopy(c->limit_bid_high.binary, r->cursor->bid_low.binary, 4);
|
2012-09-21 13:45:10 +00:00
|
|
|
}
|
|
|
|
rhizome_direct_bundle_iterator_free(&c);
|
|
|
|
#endif
|
2012-09-21 12:31:14 +00:00
|
|
|
|
2012-09-10 21:26:04 +00:00
|
|
|
end:
|
2013-10-16 07:55:58 +00:00
|
|
|
/* Warning: tail recursion when done this way.
|
2012-09-09 23:46:27 +00:00
|
|
|
Should be triggered by an asynchronous event.
|
|
|
|
But this will do for now. */
|
|
|
|
rhizome_direct_continue_sync_request(r);
|
|
|
|
}
|