mirror of
https://github.com/servalproject/serval-dna.git
synced 2024-12-19 05:07:56 +00:00
2252fdcaa7
OUT()s or where return() is used instead of RETURN(). Added OUT() to end of all functions using IN() that lacked it to make it easier to statically analyse this invariant. Fixed several return instead of RETURNs detected through use of this tool. #49
1670 lines
62 KiB
C
1670 lines
62 KiB
C
/*
|
|
Serval Rhizome file sharing
|
|
Copyright (C) 2012 The Serval Project, Inc.
|
|
|
|
This program is free software; you can redistribute it and/or
|
|
modify it under the terms of the GNU General Public License
|
|
as published by the Free Software Foundation; either version 2
|
|
of the License, or (at your option) any later version.
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU General Public License for more details.
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
along with this program; if not, write to the Free Software
|
|
Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
|
|
*/
|
|
|
|
#define __RHIZOME_INLINE
|
|
#include <stdlib.h>
|
|
#include <time.h>
|
|
#include "serval.h"
|
|
#include "conf.h"
|
|
#include "rhizome.h"
|
|
#include "strbuf.h"
|
|
#include "strbuf_helpers.h"
|
|
#include "str.h"
|
|
|
|
static char rhizome_thisdatastore_path[256];
|
|
|
|
const char *rhizome_datastore_path()
|
|
{
|
|
if (!rhizome_thisdatastore_path[0])
|
|
rhizome_set_datastore_path(NULL);
|
|
return rhizome_thisdatastore_path;
|
|
}
|
|
|
|
int rhizome_set_datastore_path(const char *path)
|
|
{
|
|
strbuf b = strbuf_local(rhizome_thisdatastore_path, sizeof rhizome_thisdatastore_path);
|
|
strbuf_path_join(b, serval_instancepath(), config.rhizome.datastore_path, path, NULL);
|
|
INFOF("Rhizome datastore path = %s", alloca_str_toprint(rhizome_thisdatastore_path));
|
|
return 0;
|
|
}
|
|
|
|
int form_rhizome_datastore_path(char * buf, size_t bufsiz, const char *fmt, ...)
|
|
{
|
|
va_list ap;
|
|
strbuf b = strbuf_local(buf, bufsiz);
|
|
strbuf_puts(b, rhizome_datastore_path());
|
|
if (fmt) {
|
|
va_start(ap, fmt);
|
|
if (*strbuf_substr(b, -1) != '/')
|
|
strbuf_putc(b, '/');
|
|
strbuf_vsprintf(b, fmt, ap);
|
|
va_end(ap);
|
|
}
|
|
if (strbuf_overrun(b)) {
|
|
WHY("Path buffer overrun");
|
|
return 0;
|
|
}
|
|
return 1;
|
|
}
|
|
|
|
int form_rhizome_import_path(char * buf, size_t bufsiz, const char *fmt, ...)
|
|
{
|
|
va_list ap;
|
|
strbuf b = strbuf_local(buf, bufsiz);
|
|
strbuf_sprintf(b, "%s/import", rhizome_datastore_path());
|
|
if (fmt) {
|
|
va_start(ap, fmt);
|
|
strbuf_putc(b, '/');
|
|
strbuf_vsprintf(b, fmt, ap);
|
|
va_end(ap);
|
|
}
|
|
if (strbuf_overrun(b)) {
|
|
WHY("Path buffer overrun");
|
|
return 0;
|
|
}
|
|
return 1;
|
|
}
|
|
|
|
int create_rhizome_datastore_dir()
|
|
{
|
|
if (config.debug.rhizome) DEBUGF("mkdirs(%s, 0700)", rhizome_datastore_path());
|
|
return mkdirs(rhizome_datastore_path(), 0700);
|
|
}
|
|
|
|
int create_rhizome_import_dir()
|
|
{
|
|
char dirname[1024];
|
|
if (!form_rhizome_import_path(dirname, sizeof dirname, NULL))
|
|
return -1;
|
|
if (config.debug.rhizome) DEBUGF("mkdirs(%s, 0700)", dirname);
|
|
return mkdirs(dirname, 0700);
|
|
}
|
|
|
|
sqlite3 *rhizome_db=NULL;
|
|
|
|
/* XXX Requires a messy join that might be slow. */
|
|
int rhizome_manifest_priority(sqlite_retry_state *retry, const char *id)
|
|
{
|
|
long long result = 0;
|
|
if (sqlite_exec_int64_retry(retry, &result,
|
|
"select max(grouplist.priorty) from grouplist,manifests,groupmemberships"
|
|
" where manifests.id='%s'"
|
|
" and grouplist.id=groupmemberships.groupid"
|
|
" and groupmemberships.manifestid=manifests.id;",
|
|
id
|
|
) == -1
|
|
)
|
|
return -1;
|
|
return (int) result;
|
|
}
|
|
|
|
int is_debug_rhizome()
|
|
{
|
|
return config.debug.rhizome;
|
|
}
|
|
|
|
int is_debug_rhizome_ads()
|
|
{
|
|
return config.debug.rhizome_ads;
|
|
}
|
|
|
|
static int (*sqlite_trace_func)() = is_debug_rhizome;
|
|
const struct __sourceloc *sqlite_trace_whence = NULL;
|
|
|
|
static void sqlite_trace_callback(void *context, const char *rendered_sql)
|
|
{
|
|
if (sqlite_trace_func())
|
|
logMessage(LOG_LEVEL_DEBUG, sqlite_trace_whence ? *sqlite_trace_whence : __HERE__, "%s", rendered_sql);
|
|
}
|
|
|
|
/* This function allows code like:
|
|
*
|
|
* debugflags_t oldmask = sqlite_set_debugmask(DEBUG_SOMETHING_ELSE);
|
|
* ...
|
|
* sqlite3_stmt *statement = sqlite_prepare(&retry, "select blah blah blah");
|
|
* while (sqlite_step_retry(&retry, statement) == SQLITE_ROW) {
|
|
* // do blah blah blah
|
|
* }
|
|
* ...
|
|
* sqlite_set_debugmask(oldmask);
|
|
* return result;
|
|
*
|
|
* so that code can choose which DEBUG_ flags control the logging of rendered SQL queries.
|
|
*
|
|
* @author Andrew Bettison <andrew@servalproject.com>
|
|
*/
|
|
int (*sqlite_set_tracefunc(int (*newfunc)()))()
|
|
{
|
|
int (*oldfunc)() = sqlite_trace_func;
|
|
sqlite_trace_func = newfunc;
|
|
return oldfunc;
|
|
}
|
|
|
|
void sqlite_log(void *ignored, int result, const char *msg){
|
|
WARNF("Sqlite: %d %s", result, msg);
|
|
}
|
|
|
|
static void verify_bundles(){
|
|
// assume that only the manifest itself can be trusted
|
|
// fetch all manifests and reinsert them.
|
|
sqlite_retry_state retry = SQLITE_RETRY_STATE_DEFAULT;
|
|
// This cursor must be ordered descending as re-inserting the manifests will give them a new higher manifest id.
|
|
// If we didn't, we'd get stuck in an infinite loop.
|
|
sqlite3_stmt *statement = sqlite_prepare(&retry, "SELECT ROWID, MANIFEST FROM MANIFESTS ORDER BY ROWID DESC;");
|
|
while(sqlite_step_retry(&retry, statement)==SQLITE_ROW){
|
|
sqlite3_int64 rowid = sqlite3_column_int64(statement, 0);
|
|
const void *manifest = sqlite3_column_blob(statement, 1);
|
|
int manifest_length = sqlite3_column_bytes(statement, 1);
|
|
|
|
rhizome_manifest *m=rhizome_new_manifest();
|
|
int ret=0;
|
|
ret = rhizome_read_manifest_file(m, manifest, manifest_length);
|
|
if (ret==0 && m->errors)
|
|
ret=-1;
|
|
if (ret==0)
|
|
ret=rhizome_manifest_verify(m);
|
|
if (ret==0){
|
|
m->finalised=1;
|
|
m->manifest_bytes=m->manifest_all_bytes;
|
|
// store it again, to ensure it is valid and stored correctly with matching file content.
|
|
ret=rhizome_store_bundle(m);
|
|
}
|
|
if (ret!=0){
|
|
DEBUGF("Removing invalid manifest entry @%lld", rowid);
|
|
//sqlite_exec_void_retry(&retry, "DELETE FROM MANIFESTS WHERE ROWID=%lld;", rowid);
|
|
}
|
|
rhizome_manifest_free(m);
|
|
}
|
|
sqlite3_finalize(statement);
|
|
}
|
|
|
|
/*
|
|
* The MANIFESTS table 'author' column records the cryptographically verified SID of the author
|
|
* that has write permission on the bundle, ie, possesses the Rhizome secret key that generated the
|
|
* BID, and hence can derive the Bundle Secret from the bundle's BK field:
|
|
* - The MANIFESTS table 'author' column is set to the author SID when a bundle is created
|
|
* locally bu a non-secret identity, so no verification need ever be performed for one's own
|
|
* bundles while they remain in the Rhizome store.
|
|
* - When a bundle is imported, the 'author' column is set to NULL to indicate that no
|
|
* verification has passed yet. This includes one's own bundles that have been purged from
|
|
* the local Rhizome store then recovered from a remote Rhizome node.
|
|
* - When a manifest with NULL 'author' is examined closely, ie extracted, not merely
|
|
* listed, the keyring is searched for an identity that is the author. If an author is
|
|
* found, the MANIFESTS table 'author' column is updated. This allows one to regain the
|
|
* ability to overwrite one's own bundles that have been lost but recovered from an exterior
|
|
* Rhizome node.
|
|
* - The above check automates the "own bundle recovery" mechanism at the expense of a CPU-heavy
|
|
* cryptographic check every time a foreign bundle is examined, but at least listing is fast.
|
|
* This will not scale as many identities are added to the keyring. It will eventually have to be
|
|
* replaced with a means to cache positive and negative verifications in the Rhizome db for local,
|
|
* non-secret identities.
|
|
*
|
|
* -- Andrew Bettison <andrew@servalproject.com>, October 2012
|
|
*/
|
|
|
|
int rhizome_opendb()
|
|
{
|
|
if (rhizome_db) return 0;
|
|
|
|
IN();
|
|
|
|
if (create_rhizome_datastore_dir() == -1){
|
|
RETURN(WHY("No Directory"));
|
|
}
|
|
char dbpath[1024];
|
|
if (!sqlite3_temp_directory){
|
|
if (!FORM_RHIZOME_DATASTORE_PATH(dbpath, "")){
|
|
RETURN(WHY("Invalid path"));
|
|
}
|
|
sqlite3_temp_directory = sqlite3_mprintf("%s", dbpath);
|
|
}
|
|
|
|
if (!FORM_RHIZOME_DATASTORE_PATH(dbpath, "rhizome.db")){
|
|
RETURN(WHY("Invalid path"));
|
|
}
|
|
|
|
sqlite3_config(SQLITE_CONFIG_LOG,sqlite_log,NULL);
|
|
|
|
if (sqlite3_open(dbpath,&rhizome_db)){
|
|
RETURN(WHYF("SQLite could not open database %s: %s", dbpath, sqlite3_errmsg(rhizome_db)));
|
|
}
|
|
sqlite3_trace(rhizome_db, sqlite_trace_callback, NULL);
|
|
int loglevel = (config.debug.rhizome) ? LOG_LEVEL_DEBUG : LOG_LEVEL_SILENT;
|
|
|
|
/* Read Rhizome configuration */
|
|
if (config.debug.rhizome) {
|
|
DEBUGF("Rhizome will use %lluB of storage for its database.", (unsigned long long) config.rhizome.database_size);
|
|
}
|
|
|
|
sqlite_retry_state retry = SQLITE_RETRY_STATE_DEFAULT;
|
|
|
|
long long version;
|
|
if (sqlite_exec_int64_retry(&retry, &version, "PRAGMA user_version;")<0)
|
|
RETURN(WHY("Failed to check schema version"));
|
|
|
|
if (version<1){
|
|
/* Create tables as required */
|
|
sqlite_exec_void_loglevel(loglevel, "PRAGMA auto_vacuum=2;");
|
|
if ( sqlite_exec_void_retry(&retry, "CREATE TABLE IF NOT EXISTS GROUPLIST(id text not null primary key, closed integer,ciphered integer,priority integer);") == -1
|
|
|| sqlite_exec_void_retry(&retry, "CREATE TABLE IF NOT EXISTS MANIFESTS(id text not null primary key, version integer,inserttime integer, filesize integer, filehash text, author text, bar blob, manifest blob);") == -1
|
|
|| sqlite_exec_void_retry(&retry, "CREATE TABLE IF NOT EXISTS FILES(id text not null primary key, length integer, highestpriority integer, datavalid integer, inserttime integer);") == -1
|
|
|| sqlite_exec_void_retry(&retry, "CREATE TABLE IF NOT EXISTS FILEBLOBS(id text not null primary key, data blob);") == -1
|
|
|| sqlite_exec_void_retry(&retry, "DROP TABLE IF EXISTS FILEMANIFESTS;") == -1
|
|
|| sqlite_exec_void_retry(&retry, "CREATE TABLE IF NOT EXISTS GROUPMEMBERSHIPS(manifestid text not null, groupid text not null);") == -1
|
|
|| sqlite_exec_void_retry(&retry, "CREATE TABLE IF NOT EXISTS VERIFICATIONS(sid text not null, did text, name text, starttime integer, endtime integer, signature blob);") == -1
|
|
) {
|
|
RETURN(WHY("Failed to create schema"));
|
|
}
|
|
|
|
/* Create indexes if they don't already exist */
|
|
sqlite_exec_void_loglevel(LOG_LEVEL_WARN, "CREATE INDEX IF NOT EXISTS bundlesizeindex ON manifests (filesize);");
|
|
sqlite_exec_void_loglevel(LOG_LEVEL_WARN, "CREATE INDEX IF NOT EXISTS IDX_MANIFESTS_HASH ON MANIFESTS(filehash);");
|
|
|
|
sqlite_exec_void_loglevel(LOG_LEVEL_WARN, "PRAGMA user_version=1;");
|
|
}
|
|
if (version<2){
|
|
sqlite_exec_void_loglevel(LOG_LEVEL_WARN, "ALTER TABLE MANIFESTS ADD COLUMN service text;");
|
|
sqlite_exec_void_loglevel(LOG_LEVEL_WARN, "ALTER TABLE MANIFESTS ADD COLUMN name text;");
|
|
sqlite_exec_void_loglevel(LOG_LEVEL_WARN, "ALTER TABLE MANIFESTS ADD COLUMN sender text collate nocase;");
|
|
sqlite_exec_void_loglevel(LOG_LEVEL_WARN, "ALTER TABLE MANIFESTS ADD COLUMN recipient text collate nocase;");
|
|
// if more bundle verification is required in later upgrades, move this to the end, don't run it more than once.
|
|
verify_bundles();
|
|
sqlite_exec_void_loglevel(LOG_LEVEL_WARN, "PRAGMA user_version=2;");
|
|
}
|
|
|
|
if (version<3){
|
|
sqlite_exec_void_loglevel(LOG_LEVEL_WARN, "CREATE INDEX IF NOT EXISTS IDX_MANIFESTS_ID_VERSION ON MANIFESTS(id, version);");
|
|
sqlite_exec_void_loglevel(LOG_LEVEL_WARN, "PRAGMA user_version=3;");
|
|
}
|
|
|
|
// TODO recreate tables with collate nocase on hex columns
|
|
|
|
/* Future schema updates should be performed here.
|
|
The above schema can be assumed to exist.
|
|
All changes should attempt to preserve any existing data */
|
|
|
|
// We can't delete a file that is being transferred in another process at this very moment...
|
|
RETURN(0);
|
|
OUT();
|
|
}
|
|
|
|
int rhizome_close_db()
|
|
{
|
|
IN();
|
|
if (rhizome_db) {
|
|
if (!sqlite3_get_autocommit(rhizome_db)){
|
|
WHY("Uncommitted transaction!");
|
|
sqlite_exec_void("ROLLBACK;");
|
|
}
|
|
sqlite3_stmt *stmt = NULL;
|
|
while ((stmt = sqlite3_next_stmt(rhizome_db, stmt))) {
|
|
const char *sql = sqlite3_sql(stmt);
|
|
WARNF("closing Rhizome db with unfinalised statement: %s", sql ? sql : "BLOB");
|
|
}
|
|
int r = sqlite3_close(rhizome_db);
|
|
if (r != SQLITE_OK)
|
|
RETURN(WHYF("Failed to close sqlite database, %s",sqlite3_errmsg(rhizome_db)));
|
|
}
|
|
rhizome_db=NULL;
|
|
RETURN(0);
|
|
OUT();
|
|
}
|
|
|
|
/* SQL query retry logic.
|
|
|
|
The common retry-on-busy logic is factored into this function. This logic encapsulates the
|
|
maximum time (timeout) that the caller may wait for a lock to be released and the sleep interval
|
|
while waiting. The way to use it is this:
|
|
|
|
sqlite_retry_state retry = SQLITE_RETRY_STATE_DEFAULT;
|
|
do ret = some_sqlite_operation(...);
|
|
while (is_busy(ret) && sqlite_retry(&retry, "some_sqlite_operation"));
|
|
if (is_error(ret) || is_busy(ret))
|
|
return -1; // an error has already been logged
|
|
sqlite_retry_done(&retry, "some_sqlite_operation");
|
|
...
|
|
|
|
If the database is currently locked for updates, then some_sqlite_operation() will return a code
|
|
indicating busy (which is distinguishable from the codes for success or any other error).
|
|
sqlite_retry() will then log a DEBUG or INFO message, sleep for a short period and return true if
|
|
the timeout has not been reached. It keeps this information in the 'retry' variable, which must
|
|
be initialised as shown. As long as the timeout has not been reached, sqlite_retry() will keep
|
|
sleeping and returning true. If the timeout is reached, then sqlite_retry() will log an error
|
|
and return false. If the operation is successful, sqlite_retry_done() must be called to log the
|
|
success as a DEBUG or INFO message to provide closure to the prior messages already logged by
|
|
sqlite_retry() and to reset the 'retry' variable for re-use.
|
|
|
|
The timeout and sleep interval depend on whether the caller is the servald server process or not.
|
|
See the definition of the SQLITE_RETRY_STATE_DEFAULT macro for the default settings.
|
|
|
|
A single 'retry' variable may be initialised once then used for a succession of database
|
|
operations. If invoked by the server process, then the timeout timer will not be reset by
|
|
sqlite_retry() or sqlite_retry_done(), so that the timeout limit will apply to the cumulative
|
|
latency, not just to each individual query, which could potentially add up to much greater
|
|
latency than desired. However, in non-server processes, each query may be allowed its own
|
|
timeout, giving a greater chance of success at the expense of potentially greater latency.
|
|
*/
|
|
|
|
/* In the servald server process, by default we retry every 10 ms for up to 50 ms, so as to not
|
|
introduce too much latency into server responsiveness. In other processes (eg, Batphone MeshMS
|
|
thread), by default we allow busy retries to go for over a second, waiting 100 ms between each
|
|
retry.
|
|
*/
|
|
sqlite_retry_state sqlite_retry_state_init(int serverLimit, int serverSleep, int otherLimit, int otherSleep)
|
|
{
|
|
return (sqlite_retry_state){
|
|
.limit = serverMode ? (serverLimit < 0 ? 50 : serverLimit) : (otherLimit < 0 ? 5000 : otherLimit),
|
|
.sleep = serverMode ? (serverSleep < 0 ? 10 : serverSleep) : (otherSleep < 0 ? 100 : otherSleep),
|
|
.elapsed = 0,
|
|
.start = -1,
|
|
.busytries = 0
|
|
};
|
|
}
|
|
|
|
int _sqlite_retry(struct __sourceloc __whence, sqlite_retry_state *retry, const char *action)
|
|
{
|
|
time_ms_t now = gettime_ms();
|
|
++retry->busytries;
|
|
if (retry->start == -1)
|
|
retry->start = now;
|
|
retry->elapsed = now - retry->start;
|
|
|
|
INFOF("%s on try %u after %.3f seconds (limit %.3f): %s",
|
|
sqlite3_errmsg(rhizome_db),
|
|
retry->busytries,
|
|
(retry->elapsed) / 1e3,
|
|
(retry->limit) / 1e3,
|
|
action
|
|
);
|
|
|
|
if (retry->elapsed >= retry->limit) {
|
|
// reset ready for next query
|
|
retry->busytries = 0;
|
|
if (!serverMode)
|
|
retry->start = -1;
|
|
return 0; // tell caller to stop trying
|
|
}
|
|
|
|
if (retry->sleep)
|
|
sleep_ms(retry->sleep);
|
|
return 1; // tell caller to try again
|
|
}
|
|
|
|
void _sqlite_retry_done(struct __sourceloc __whence, sqlite_retry_state *retry, const char *action)
|
|
{
|
|
if (retry->busytries) {
|
|
time_ms_t now = gettime_ms();
|
|
INFOF("succeeded on try %u after %.3f seconds (limit %.3f): %s",
|
|
retry->busytries + 1,
|
|
(now - retry->start) / 1e3,
|
|
(retry->limit) / 1e3,
|
|
action
|
|
);
|
|
}
|
|
// reset ready for next query
|
|
retry->busytries = 0;
|
|
if (!serverMode)
|
|
retry->start = -1;
|
|
}
|
|
|
|
/*
|
|
Convenience wrapper for preparing an SQL command.
|
|
Returns -1 if an error occurs (logged as an error), otherwise zero with the prepared
|
|
statement in *statement.
|
|
*/
|
|
sqlite3_stmt *_sqlite_prepare(struct __sourceloc __whence, sqlite_retry_state *retry, const char *sqlformat, ...)
|
|
{
|
|
strbuf sql = strbuf_alloca(8192);
|
|
strbuf_va_printf(sql, sqlformat);
|
|
return _sqlite_prepare_loglevel(__whence, LOG_LEVEL_ERROR, retry, sql);
|
|
}
|
|
|
|
sqlite3_stmt *_sqlite_prepare_loglevel(struct __sourceloc __whence, int log_level, sqlite_retry_state *retry, strbuf stmt)
|
|
{
|
|
sqlite3_stmt *statement = NULL;
|
|
if (strbuf_overrun(stmt)) {
|
|
WHYF("SQL overrun: %s", strbuf_str(stmt));
|
|
return NULL;
|
|
}
|
|
if (!rhizome_db && rhizome_opendb() == -1)
|
|
return NULL;
|
|
while (1) {
|
|
switch (sqlite3_prepare_v2(rhizome_db, strbuf_str(stmt), -1, &statement, NULL)) {
|
|
case SQLITE_OK:
|
|
return statement;
|
|
case SQLITE_BUSY:
|
|
case SQLITE_LOCKED:
|
|
if (retry && _sqlite_retry(__whence, retry, strbuf_str(stmt))) {
|
|
break; // back to sqlite3_prepare_v2()
|
|
}
|
|
// fall through...
|
|
default:
|
|
LOGF(log_level, "query invalid, %s: %s", sqlite3_errmsg(rhizome_db), strbuf_str(stmt));
|
|
sqlite3_finalize(statement);
|
|
return NULL;
|
|
}
|
|
}
|
|
}
|
|
|
|
int _sqlite_step_retry(struct __sourceloc __whence, int log_level, sqlite_retry_state *retry, sqlite3_stmt *statement)
|
|
{
|
|
int ret = -1;
|
|
sqlite_trace_whence = &__whence;
|
|
while (statement) {
|
|
int stepcode = sqlite3_step(statement);
|
|
switch (stepcode) {
|
|
case SQLITE_OK:
|
|
case SQLITE_DONE:
|
|
case SQLITE_ROW:
|
|
if (retry)
|
|
_sqlite_retry_done(__whence, retry, sqlite3_sql(statement));
|
|
ret = stepcode;
|
|
statement = NULL;
|
|
break;
|
|
case SQLITE_BUSY:
|
|
case SQLITE_LOCKED:
|
|
if (retry && _sqlite_retry(__whence, retry, sqlite3_sql(statement))) {
|
|
sqlite3_reset(statement);
|
|
break; // back to sqlite3_step()
|
|
}
|
|
// fall through...
|
|
default:
|
|
LOGF(log_level, "query failed (%d), %s: %s", stepcode, sqlite3_errmsg(rhizome_db), sqlite3_sql(statement));
|
|
ret = -1;
|
|
statement = NULL;
|
|
break;
|
|
}
|
|
}
|
|
sqlite_trace_whence = NULL;
|
|
return ret;
|
|
}
|
|
|
|
/*
|
|
Convenience wrapper for executing a prepared SQL statement that returns no value. If an error
|
|
occurs then logs it at the given level and returns -1. If 'retry' is non-NULL and the BUSY error
|
|
occurs (indicating the database is locked, ie, currently in use by another process), then resets
|
|
the statement and retries while sqlite_retry() returns true. If sqlite_retry() returns false
|
|
then returns -1. Otherwise returns zero. Always finalises the statement before returning.
|
|
*/
|
|
static int _sqlite_exec_void_prepared(struct __sourceloc __whence, int log_level, sqlite_retry_state *retry, sqlite3_stmt *statement)
|
|
{
|
|
if (!statement)
|
|
return -1;
|
|
int rowcount = 0;
|
|
int stepcode;
|
|
while ((stepcode = _sqlite_step_retry(__whence, log_level, retry, statement)) == SQLITE_ROW)
|
|
++rowcount;
|
|
if (rowcount)
|
|
WARNF("void query unexpectedly returned %d row%s", rowcount, rowcount == 1 ? "" : "s");
|
|
sqlite3_finalize(statement);
|
|
return sqlite_code_ok(stepcode) ? 0 : -1;
|
|
}
|
|
|
|
static int _sqlite_vexec_void(struct __sourceloc __whence, int log_level, sqlite_retry_state *retry, const char *sqlformat, va_list ap)
|
|
{
|
|
strbuf stmt = strbuf_alloca(8192);
|
|
strbuf_vsprintf(stmt, sqlformat, ap);
|
|
return _sqlite_exec_void_prepared(__whence, log_level, retry, _sqlite_prepare_loglevel(__whence, log_level, retry, stmt));
|
|
}
|
|
|
|
/* Convenience wrapper for executing an SQL command that returns no value.
|
|
If an error occurs then logs it at ERROR level and returns -1. Otherwise returns zero.
|
|
@author Andrew Bettison <andrew@servalproject.com>
|
|
*/
|
|
int _sqlite_exec_void(struct __sourceloc __whence, const char *sqlformat, ...)
|
|
{
|
|
va_list ap;
|
|
va_start(ap, sqlformat);
|
|
sqlite_retry_state retry = SQLITE_RETRY_STATE_DEFAULT;
|
|
int ret = _sqlite_vexec_void(__whence, LOG_LEVEL_ERROR, &retry, sqlformat, ap);
|
|
va_end(ap);
|
|
return ret;
|
|
}
|
|
|
|
/* Same as sqlite_exec_void(), but logs any error at the given level instead of ERROR.
|
|
@author Andrew Bettison <andrew@servalproject.com>
|
|
*/
|
|
int _sqlite_exec_void_loglevel(struct __sourceloc __whence, int log_level, const char *sqlformat, ...)
|
|
{
|
|
va_list ap;
|
|
va_start(ap, sqlformat);
|
|
sqlite_retry_state retry = SQLITE_RETRY_STATE_DEFAULT;
|
|
int ret = _sqlite_vexec_void(__whence, log_level, &retry, sqlformat, ap);
|
|
va_end(ap);
|
|
return ret;
|
|
}
|
|
|
|
/* Same as sqlite_exec_void() but if the statement cannot be executed because the database is
|
|
currently locked for updates, then will call sqlite_retry() on the supplied retry state variable
|
|
instead of its own, internal one. If 'retry' is passed as NULL, then will not sleep and retry at
|
|
all in the event of a busy condition, but will log it as an error and return immediately.
|
|
@author Andrew Bettison <andrew@servalproject.com>
|
|
*/
|
|
int _sqlite_exec_void_retry(struct __sourceloc __whence, sqlite_retry_state *retry, const char *sqlformat, ...)
|
|
{
|
|
va_list ap;
|
|
va_start(ap, sqlformat);
|
|
int ret = _sqlite_vexec_void(__whence, LOG_LEVEL_ERROR, retry, sqlformat, ap);
|
|
va_end(ap);
|
|
return ret;
|
|
}
|
|
|
|
static int _sqlite_vexec_int64(struct __sourceloc __whence, sqlite_retry_state *retry, long long *result, const char *sqlformat, va_list ap)
|
|
{
|
|
strbuf stmt = strbuf_alloca(8192);
|
|
strbuf_vsprintf(stmt, sqlformat, ap);
|
|
sqlite3_stmt *statement = _sqlite_prepare_loglevel(__whence, LOG_LEVEL_ERROR, retry, stmt);
|
|
if (!statement)
|
|
return -1;
|
|
int ret = 0;
|
|
int rowcount = 0;
|
|
int stepcode;
|
|
while ((stepcode = _sqlite_step_retry(__whence, LOG_LEVEL_ERROR, retry, statement)) == SQLITE_ROW) {
|
|
int columncount = sqlite3_column_count(statement);
|
|
if (columncount != 1)
|
|
ret = WHYF("incorrect column count %d (should be 1): %s", columncount, sqlite3_sql(statement));
|
|
else if (++rowcount == 1)
|
|
*result = sqlite3_column_int64(statement, 0);
|
|
}
|
|
if (rowcount > 1)
|
|
WARNF("query unexpectedly returned %d rows, ignored all but first", rowcount);
|
|
sqlite3_finalize(statement);
|
|
return sqlite_code_ok(stepcode) && ret != -1 ? rowcount : -1;
|
|
}
|
|
|
|
/*
|
|
Convenience wrapper for executing an SQL command that returns a single int64 value.
|
|
Logs an error and returns -1 if an error occurs.
|
|
If no row is found, then returns 0 and does not alter *result.
|
|
If exactly one row is found, the assigns its value to *result and returns 1.
|
|
If more than one row is found, then logs a warning, assigns the value of the first row to *result
|
|
and returns the number of rows.
|
|
*/
|
|
int _sqlite_exec_int64(struct __sourceloc __whence, long long *result, const char *sqlformat,...)
|
|
{
|
|
va_list ap;
|
|
va_start(ap, sqlformat);
|
|
sqlite_retry_state retry = SQLITE_RETRY_STATE_DEFAULT;
|
|
int ret = _sqlite_vexec_int64(__whence, &retry, result, sqlformat, ap);
|
|
va_end(ap);
|
|
return ret;
|
|
}
|
|
|
|
/* Same as sqlite_exec_int64() but if the statement cannot be executed because the database is
|
|
currently locked for updates, then will call sqlite_retry() on the supplied retry state variable
|
|
instead of its own, internal one. If 'retry' is passed as NULL, then will not sleep and retry at
|
|
all in the event of a busy condition, but will log it as an error and return immediately.
|
|
@author Andrew Bettison <andrew@servalproject.com>
|
|
*/
|
|
int _sqlite_exec_int64_retry(struct __sourceloc __whence, sqlite_retry_state *retry, long long *result, const char *sqlformat,...)
|
|
{
|
|
va_list ap;
|
|
va_start(ap, sqlformat);
|
|
int ret = _sqlite_vexec_int64(__whence, retry, result, sqlformat, ap);
|
|
va_end(ap);
|
|
return ret;
|
|
}
|
|
|
|
/*
|
|
Convenience wrapper for executing an SQL command that returns a single text value.
|
|
Logs an error and returns -1 if an error occurs, otherwise the number of rows that were found:
|
|
0 means no rows, nothing is appended to the strbuf
|
|
1 means exactly one row, appends its column to the strbuf
|
|
2 more than one row, logs a warning and appends the first row's column to the strbuf
|
|
@author Andrew Bettison <andrew@servalproject.com>
|
|
*/
|
|
int _sqlite_exec_strbuf(struct __sourceloc __whence, strbuf sb, const char *sqlformat,...)
|
|
{
|
|
strbuf stmt = strbuf_alloca(8192);
|
|
strbuf_va_printf(stmt, sqlformat);
|
|
sqlite_retry_state retry = SQLITE_RETRY_STATE_DEFAULT;
|
|
sqlite3_stmt *statement = _sqlite_prepare_loglevel(__whence, LOG_LEVEL_ERROR, &retry, stmt);
|
|
if (!statement)
|
|
return -1;
|
|
int ret = 0;
|
|
int rowcount = 0;
|
|
int stepcode;
|
|
while ((stepcode = _sqlite_step_retry(__whence, LOG_LEVEL_ERROR, &retry, statement)) == SQLITE_ROW) {
|
|
int columncount = sqlite3_column_count(statement);
|
|
if (columncount != 1)
|
|
ret - WHYF("incorrect column count %d (should be 1): %s", columncount, sqlite3_sql(statement));
|
|
else if (++rowcount == 1)
|
|
strbuf_puts(sb, (const char *)sqlite3_column_text(statement, 0));
|
|
}
|
|
if (rowcount > 1)
|
|
WARNF("query unexpectedly returned %d rows, ignored all but first", rowcount);
|
|
sqlite3_finalize(statement);
|
|
return sqlite_code_ok(stepcode) && ret != -1 ? rowcount : -1;
|
|
}
|
|
|
|
long long rhizome_database_used_bytes()
|
|
{
|
|
long long db_page_size;
|
|
long long db_page_count;
|
|
long long db_free_page_count;
|
|
if ( sqlite_exec_int64(&db_page_size, "PRAGMA page_size;") == -1LL
|
|
|| sqlite_exec_int64(&db_page_count, "PRAGMA page_count;") == -1LL
|
|
|| sqlite_exec_int64(&db_free_page_count, "PRAGMA free_count;") == -1LL
|
|
)
|
|
return WHY("Cannot measure database used bytes");
|
|
return db_page_size * (db_page_count - db_free_page_count);
|
|
}
|
|
|
|
|
|
|
|
char blobfile[1024];
|
|
char *rhizome_database_get_blob_filename(int64_t rowid)
|
|
{
|
|
const char *blobpath=config.rhizome.datastore_path;
|
|
if (!blobpath||!blobpath[0]) {
|
|
blobpath=serval_instancepath();
|
|
}
|
|
if (!blobpath) return NULL;
|
|
|
|
snprintf(blobfile,1024,"%s/blob.%lld",blobpath,rowid);
|
|
return blobfile;
|
|
}
|
|
|
|
rhizome_blob_handle *rhizome_database_open_blob_bybid(const char *id,
|
|
uint64_t version,
|
|
int writeP)
|
|
{
|
|
IN();
|
|
|
|
long long row_id=-1;
|
|
if (sqlite_exec_int64(&row_id, "SELECT rowid FROM FILEBLOBS WHERE id IN (SELECT filehash FROM MANIFESTS WHERE manifests.version=%lld AND manifests.id='%s');",
|
|
version,id) < 1)
|
|
{
|
|
DEBUGF("Couldn't find stored bundle.");
|
|
#if 0
|
|
sqlite_retry_state retry = SQLITE_RETRY_STATE_DEFAULT;
|
|
sqlite3_stmt *statement = sqlite_prepare(&retry, "SELECT rowid,id,filehash FROM MANIFESTS");
|
|
while(sqlite_step_retry(&retry, statement)==SQLITE_ROW){
|
|
sqlite3_int64 rowid = sqlite3_column_int64(statement, 0);
|
|
const char *idhex = (const char *) sqlite3_column_text(statement, 1);
|
|
const char *filehashhex = (const char *) sqlite3_column_text(statement, 2);
|
|
DEBUGF("rowid=%lld, id='%s', filehash='%s'",
|
|
rowid,idhex,filehashhex);
|
|
}
|
|
sqlite3_finalize(statement);
|
|
#endif
|
|
RETURN(NULL);
|
|
}
|
|
|
|
if (row_id==-1) {
|
|
DEBUGF("Couldn't find stored bundle.");
|
|
RETURN(NULL);
|
|
}
|
|
RETURN(rhizome_database_open_blob_byrowid(row_id,writeP));
|
|
OUT();
|
|
}
|
|
|
|
rhizome_blob_handle *rhizome_database_open_blob_byrowid(int row_id,int writeP)
|
|
{
|
|
IN();
|
|
struct rhizome_blob_handle *blob=calloc(sizeof(struct rhizome_blob_handle),1);
|
|
if (!blob) RETURN(NULL);
|
|
|
|
DEBUGF("Opening blob for rowid #%d",row_id);
|
|
|
|
// Try opening as internal blob.
|
|
// If column is not a blob, then this will fail.
|
|
int ret=sqlite3_blob_open(rhizome_db, "main", "fileblobs", "data",
|
|
row_id, writeP, &blob->sqlite_blob);
|
|
if (ret==SQLITE_OK) {
|
|
blob->blob_bytes=sqlite3_blob_bytes(blob->sqlite_blob);
|
|
RETURN(blob);
|
|
}
|
|
|
|
// Try opening as an external file
|
|
{
|
|
char *blobfile=rhizome_database_get_blob_filename(row_id);
|
|
errno=0;
|
|
blob->fd_blob=open(blobfile,O_RDWR);
|
|
if (blob->fd_blob==-1&&writeP) blob->fd_blob=open(blobfile,O_CREAT|O_RDWR,0664);
|
|
if (blob->fd_blob>-1) {
|
|
// File is stored externally
|
|
blob->blob_bytes=lseek(blob->fd_blob,0,SEEK_END);
|
|
DEBUGF("Opened fileblobs blob file '%s' (%lld bytes)",
|
|
blobfile,blob->blob_bytes);
|
|
RETURN(blob);
|
|
}
|
|
DEBUGF("Could not open fileblobs blob file '%s', will try sqlite blob",
|
|
blobfile);
|
|
// WHY_perror("open");
|
|
}
|
|
|
|
// Couldn't open, so fail
|
|
free(blob);
|
|
RETURN(NULL);
|
|
OUT();
|
|
}
|
|
|
|
int rhizome_database_blob_close(rhizome_blob_handle *blob)
|
|
{
|
|
if (!blob) return 0;
|
|
if (blob->sqlite_blob) sqlite3_blob_close(blob->sqlite_blob);
|
|
if (blob->fd_blob) close(blob->fd_blob);
|
|
bzero(blob,sizeof(struct rhizome_blob_handle));
|
|
return 0;
|
|
}
|
|
|
|
int rhizome_database_blob_read(rhizome_blob_handle *blob,unsigned char *out,
|
|
uint64_t count,uint64_t offset)
|
|
{
|
|
IN();
|
|
if (!blob) RETURN(-1);
|
|
if (blob->sqlite_blob) RETURN(sqlite3_blob_read(blob->sqlite_blob,
|
|
out,count,offset));
|
|
if (blob->fd_blob) {
|
|
lseek(blob->fd_blob,offset,SEEK_SET);
|
|
int r=read(blob->fd_blob,out,count);
|
|
if (r==count) RETURN(SQLITE_OK);
|
|
}
|
|
RETURN(-1);
|
|
OUT();
|
|
}
|
|
|
|
int rhizome_database_blob_write(rhizome_blob_handle *blob,unsigned char *buffer,
|
|
uint64_t count,uint64_t offset)
|
|
{
|
|
IN();
|
|
if (!blob) RETURN(-1);
|
|
if (blob->sqlite_blob) RETURN(sqlite3_blob_write(blob->sqlite_blob,
|
|
buffer,count,offset));
|
|
if (blob->fd_blob) {
|
|
DEBUGF("Writing to external file backed blob");
|
|
if (lseek(blob->fd_blob,offset,SEEK_SET)<0)
|
|
RETURN(WHYF("lseek(fd,%lld,SEEK_SET) failed",offset));
|
|
int r=write(blob->fd_blob,buffer,count);
|
|
DEBUGF(" wrote %d of %lld bytes",r,count);
|
|
if (r==count) RETURN(SQLITE_OK);
|
|
}
|
|
RETURN(-1);
|
|
OUT();
|
|
}
|
|
|
|
const char *rhizome_database_blob_errmsg(rhizome_blob_handle *blob)
|
|
{
|
|
if (!blob) return "blob is null";
|
|
if (blob->sqlite_blob) return sqlite3_errmsg(rhizome_db);
|
|
if (blob->fd_blob) return strerror(errno);
|
|
return "blob has no open channel";
|
|
}
|
|
|
|
void rhizome_cleanup()
|
|
{
|
|
IN();
|
|
// clean out unreferenced files
|
|
// TODO keep updating inserttime for *very* long transfers?
|
|
if (sqlite_exec_void("DELETE FROM FILES WHERE inserttime < %lld AND datavalid=0;", gettime_ms() - 300000)) {
|
|
WARNF("delete failed: %s", sqlite3_errmsg(rhizome_db));
|
|
}
|
|
if (sqlite_exec_void("DELETE FROM FILES WHERE inserttime < %lld AND datavalid=1 AND NOT EXISTS( SELECT 1 FROM MANIFESTS WHERE MANIFESTS.filehash = FILES.id);", gettime_ms() - 1000)) {
|
|
WARNF("delete failed: %s", sqlite3_errmsg(rhizome_db));
|
|
}
|
|
// Clean up unreferenced blobs and files
|
|
{
|
|
char sqlcmd[1024];
|
|
strbuf b = strbuf_local(sqlcmd, sizeof sqlcmd);
|
|
strbuf_puts(b, "SELECT rowid FROM fileblobs WHERE TYPEOF(data)<>\"blob\" AND NOT EXISTS ( SELECT 1 FROM FILES WHERE FILES.id = FILEBLOBS.id );");
|
|
if (!strbuf_overrun(b)) {
|
|
sqlite_retry_state retry = SQLITE_RETRY_STATE_DEFAULT;
|
|
sqlite3_stmt *statement = sqlite_prepare(&retry, "%s", strbuf_str(b));
|
|
while (sqlite_step_retry(&retry, statement) == SQLITE_ROW) {
|
|
int64_t rowid = sqlite3_column_int64(statement, 0);
|
|
char *blobfile=rhizome_database_get_blob_filename(rowid);
|
|
if (blobfile) {
|
|
INFOF("Cleaning up orphaned blob file %s",blobfile);
|
|
unlink(blobfile);
|
|
}
|
|
}
|
|
sqlite3_finalize(statement);
|
|
}
|
|
if (sqlite_exec_void("DELETE FROM FILEBLOBS WHERE NOT EXISTS ( SELECT 1 FROM FILES WHERE FILES.id = FILEBLOBS.id );")) {
|
|
WARNF("delete failed: %s", sqlite3_errmsg(rhizome_db));
|
|
}
|
|
}
|
|
OUT();
|
|
}
|
|
|
|
int rhizome_make_space(int group_priority, long long bytes)
|
|
{
|
|
/* Asked for impossibly large amount */
|
|
if (bytes>=(config.rhizome.database_size-65536))
|
|
return WHYF("bytes=%lld is too large", bytes);
|
|
|
|
long long db_used = rhizome_database_used_bytes();
|
|
if (db_used == -1)
|
|
return -1;
|
|
|
|
rhizome_cleanup();
|
|
|
|
/* If there is already enough space now, then do nothing more */
|
|
if (db_used<=(config.rhizome.database_size-bytes-65536))
|
|
return 0;
|
|
|
|
/* Okay, not enough space, so free up some. */
|
|
sqlite_retry_state retry = SQLITE_RETRY_STATE_DEFAULT;
|
|
sqlite3_stmt *statement = sqlite_prepare(&retry, "select id,length from files where highestpriority < %d order by descending length", group_priority);
|
|
if (!statement)
|
|
return -1;
|
|
while (bytes > (config.rhizome.database_size - 65536 - rhizome_database_used_bytes())
|
|
&& sqlite_step_retry(&retry, statement) == SQLITE_ROW
|
|
) {
|
|
/* Make sure we can drop this blob, and if so drop it, and recalculate number of bytes required */
|
|
const unsigned char *id;
|
|
|
|
/* Get values */
|
|
if (sqlite3_column_type(statement, 0)==SQLITE_TEXT)
|
|
id = sqlite3_column_text(statement, 0);
|
|
else {
|
|
WHY("Incorrect type in id column of files table");
|
|
break;
|
|
}
|
|
if (sqlite3_column_type(statement, 1)==SQLITE_INTEGER)
|
|
; //length=sqlite3_column_int(statement, 1);
|
|
else {
|
|
WHY("Incorrect type in length column of files table");
|
|
break;
|
|
}
|
|
/* Try to drop this file from storage, discarding any references that do not trump the priority
|
|
of this request. The query done earlier should ensure this, but it doesn't hurt to be
|
|
paranoid, and it also protects against inconsistency in the database. */
|
|
rhizome_drop_stored_file((char *)id, group_priority + 1);
|
|
}
|
|
sqlite3_finalize(statement);
|
|
|
|
//long long equal_priority_larger_file_space_used = sqlite_exec_int64("SELECT COUNT(length) FROM FILES WHERE highestpriority=%d and length>%lld",group_priority,bytes);
|
|
/* XXX Get rid of any equal priority files that are larger than this one */
|
|
|
|
/* XXX Get rid of any higher priority files that are not relevant in this time or location */
|
|
|
|
/* Couldn't make space */
|
|
return WHY("Incomplete");
|
|
}
|
|
|
|
/* Drop the specified file from storage, and any manifests that reference it,
|
|
provided that none of those manifests are being retained at a higher priority
|
|
than the maximum specified here. */
|
|
int rhizome_drop_stored_file(const char *id,int maximum_priority)
|
|
{
|
|
if (!rhizome_str_is_file_hash(id))
|
|
return WHYF("invalid file hash id=%s", alloca_toprint(-1, id, strlen(id)));
|
|
sqlite_retry_state retry = SQLITE_RETRY_STATE_DEFAULT;
|
|
sqlite3_stmt *statement = sqlite_prepare(&retry, "select id from manifests where filehash='%s'", id);
|
|
if (!statement)
|
|
return WHYF("Could not drop stored file id=%s", id);
|
|
int can_drop = 1;
|
|
while (sqlite_step_retry(&retry, statement) == SQLITE_ROW) {
|
|
/* Find manifests for this file */
|
|
if (sqlite3_column_type(statement, 0) != SQLITE_TEXT) {
|
|
WHYF("Incorrect type in id column of manifests table");
|
|
break;
|
|
}
|
|
const char *manifestId = (char *) sqlite3_column_text(statement, 0);
|
|
/* Check that manifest is not part of a higher priority group.
|
|
If so, we cannot drop the manifest or the file.
|
|
However, we will keep iterating, as we can still drop any other manifests pointing to this file
|
|
that are lower priority, and thus free up a little space. */
|
|
int priority = rhizome_manifest_priority(&retry, manifestId);
|
|
if (priority == -1)
|
|
WHYF("Cannot drop fileid=%s due to error, manifestId=%s", id, manifestId);
|
|
else if (priority > maximum_priority) {
|
|
WHYF("Cannot drop fileid=%s due to manifest priority, manifestId=%s", id, manifestId);
|
|
can_drop = 0;
|
|
} else {
|
|
if (config.debug.rhizome)
|
|
DEBUGF("removing stale manifests, groupmemberships");
|
|
sqlite_exec_void_retry(&retry, "delete from manifests where id='%s';", manifestId);
|
|
sqlite_exec_void_retry(&retry, "delete from keypairs where public='%s';", manifestId);
|
|
sqlite_exec_void_retry(&retry, "delete from groupmemberships where manifestid='%s';", manifestId);
|
|
}
|
|
}
|
|
sqlite3_finalize(statement);
|
|
if (can_drop) {
|
|
sqlite_exec_void_retry(&retry, "delete from files where id='%s';",id);
|
|
int64_t fileblob_rowid=-1;
|
|
sqlite_exec_int64_retry(&retry,&fileblob_rowid,"select rowid from fileblobs where id='%s';",id);
|
|
if (fileblob_rowid>-1) {
|
|
char *blobfile=rhizome_database_get_blob_filename(fileblob_rowid);
|
|
if (blobfile) unlink(blobfile);
|
|
}
|
|
sqlite_exec_void_retry(&retry, "delete from fileblobs where id='%s';",id);
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
/*
|
|
Store the specified manifest into the sqlite database.
|
|
We assume that sufficient space has been made for us.
|
|
The manifest should be finalised, and so we don't need to
|
|
look at the underlying manifest file, but can just write m->manifest_data
|
|
as a blob.
|
|
|
|
associated_filename needs to be read in and stored as a blob. Hopefully that
|
|
can be done in pieces so that we don't have memory exhaustion issues on small
|
|
architectures. However, we do know it's hash apriori from m, and so we can
|
|
skip loading the file in if it is already stored. mmap() apparently works on
|
|
Linux FAT file systems, and is probably the best choice since it doesn't need
|
|
all pages to be in RAM at the same time.
|
|
|
|
SQLite does allow modifying of blobs once stored in the database.
|
|
The trick is to insert the blob as all zeroes using a special function, and then
|
|
substitute bytes in the blog progressively.
|
|
|
|
We need to also need to create the appropriate row(s) in the MANIFESTS, FILES,
|
|
and GROUPMEMBERSHIPS tables, and possibly GROUPLIST as well.
|
|
*/
|
|
int rhizome_store_bundle(rhizome_manifest *m)
|
|
{
|
|
if (!m->finalised) return WHY("Manifest was not finalised");
|
|
|
|
if (m->haveSecret) {
|
|
/* We used to store the secret in the database, but we don't anymore, as we use
|
|
the BK field in the manifest. So nothing to do here. */
|
|
} else {
|
|
/* We don't have the secret for this manifest, so only allow updates if
|
|
the self-signature is valid */
|
|
if (!m->selfSigned)
|
|
return WHY("Manifest is not signed, and I don't have the key. Manifest might be forged or corrupt.");
|
|
}
|
|
|
|
char manifestid[RHIZOME_MANIFEST_ID_STRLEN + 1];
|
|
rhizome_manifest_get(m, "id", manifestid, sizeof manifestid);
|
|
str_toupper_inplace(manifestid);
|
|
|
|
/* Bind BAR to data field */
|
|
unsigned char bar[RHIZOME_BAR_BYTES];
|
|
rhizome_manifest_to_bar(m,bar);
|
|
|
|
/* Store the file (but not if it is already in the database) */
|
|
char filehash[RHIZOME_FILEHASH_STRLEN + 1];
|
|
if (m->fileLength > 0) {
|
|
strncpy(filehash, m->fileHexHash, sizeof filehash);
|
|
str_toupper_inplace(filehash);
|
|
|
|
if (!rhizome_exists(filehash))
|
|
return WHY("File should already be stored by now");
|
|
} else {
|
|
filehash[0] = '\0';
|
|
}
|
|
|
|
const char *author = is_sid_any(m->author) ? NULL : alloca_tohex_sid(m->author);
|
|
const char *name = rhizome_manifest_get(m, "name", NULL, 0);
|
|
const char *sender = rhizome_manifest_get(m, "sender", NULL, 0);
|
|
const char *recipient = rhizome_manifest_get(m, "recipient", NULL, 0);
|
|
const char *service = rhizome_manifest_get(m, "service", NULL, 0);
|
|
|
|
sqlite_retry_state retry = SQLITE_RETRY_STATE_DEFAULT;
|
|
if (sqlite_exec_void_retry(&retry, "BEGIN TRANSACTION;") != SQLITE_OK)
|
|
return WHY("Failed to begin transaction");
|
|
|
|
sqlite3_stmt *stmt;
|
|
if ((stmt = sqlite_prepare(&retry, "INSERT OR REPLACE INTO MANIFESTS(id,manifest,version,inserttime,bar,filesize,filehash,author,service,name,sender,recipient) VALUES(?,?,?,?,?,?,?,?,?,?,?,?);")) == NULL)
|
|
goto rollback;
|
|
if (!( sqlite_code_ok(sqlite3_bind_text(stmt, 1, manifestid, -1, SQLITE_STATIC))
|
|
&& sqlite_code_ok(sqlite3_bind_blob(stmt, 2, m->manifestdata, m->manifest_bytes, SQLITE_STATIC))
|
|
&& sqlite_code_ok(sqlite3_bind_int64(stmt, 3, m->version))
|
|
&& sqlite_code_ok(sqlite3_bind_int64(stmt, 4, (long long) gettime_ms()))
|
|
&& sqlite_code_ok(sqlite3_bind_blob(stmt, 5, bar, RHIZOME_BAR_BYTES, SQLITE_STATIC))
|
|
&& sqlite_code_ok(sqlite3_bind_int64(stmt, 6, m->fileLength))
|
|
&& sqlite_code_ok(sqlite3_bind_text(stmt, 7, filehash, -1, SQLITE_STATIC))
|
|
&& sqlite_code_ok(sqlite3_bind_text(stmt, 8, author, -1, SQLITE_STATIC))
|
|
&& sqlite_code_ok(sqlite3_bind_text(stmt, 9, service, -1, SQLITE_STATIC))
|
|
&& sqlite_code_ok(sqlite3_bind_text(stmt, 10, name, -1, SQLITE_STATIC))
|
|
&& sqlite_code_ok(sqlite3_bind_text(stmt, 11, sender, -1, SQLITE_STATIC))
|
|
&& sqlite_code_ok(sqlite3_bind_text(stmt, 12, recipient, -1, SQLITE_STATIC))
|
|
)) {
|
|
WHYF("query failed, %s: %s", sqlite3_errmsg(rhizome_db), sqlite3_sql(stmt));
|
|
goto rollback;
|
|
}
|
|
if (sqlite_step_retry(&retry, stmt) == -1)
|
|
goto rollback;
|
|
sqlite3_finalize(stmt);
|
|
stmt = NULL;
|
|
|
|
// TODO remove old payload?
|
|
|
|
if (rhizome_manifest_get(m,"isagroup",NULL,0)!=NULL) {
|
|
int closed=rhizome_manifest_get_ll(m,"closedgroup");
|
|
if (closed<1) closed=0;
|
|
int ciphered=rhizome_manifest_get_ll(m,"cipheredgroup");
|
|
if (ciphered<1) ciphered=0;
|
|
if ((stmt = sqlite_prepare(&retry, "INSERT OR REPLACE INTO GROUPLIST(id,closed,ciphered,priority) VALUES (?,?,?,?);")) == NULL)
|
|
goto rollback;
|
|
if (!( sqlite_code_ok(sqlite3_bind_text(stmt, 1, manifestid, -1, SQLITE_TRANSIENT))
|
|
&& sqlite_code_ok(sqlite3_bind_int(stmt, 2, closed))
|
|
&& sqlite_code_ok(sqlite3_bind_int(stmt, 3, ciphered))
|
|
&& sqlite_code_ok(sqlite3_bind_int(stmt, 4, RHIZOME_PRIORITY_DEFAULT))
|
|
)) {
|
|
WHYF("query failed, %s: %s", sqlite3_errmsg(rhizome_db), sqlite3_sql(stmt));
|
|
goto rollback;
|
|
}
|
|
if (sqlite_step_retry(&retry, stmt) == -1)
|
|
goto rollback;
|
|
sqlite3_finalize(stmt);
|
|
stmt = NULL;
|
|
}
|
|
|
|
if (m->group_count > 0) {
|
|
if ((stmt = sqlite_prepare(&retry, "INSERT OR REPLACE INTO GROUPMEMBERSHIPS(manifestid,groupid) VALUES(?, ?);")) == NULL)
|
|
goto rollback;
|
|
int i;
|
|
for (i=0;i<m->group_count;i++){
|
|
if (!( sqlite_code_ok(sqlite3_bind_text(stmt, 1, manifestid, -1, SQLITE_TRANSIENT))
|
|
&& sqlite_code_ok(sqlite3_bind_text(stmt, 2, m->groups[i], -1, SQLITE_TRANSIENT))
|
|
)) {
|
|
WHYF("query failed, %s: %s", sqlite3_errmsg(rhizome_db), sqlite3_sql(stmt));
|
|
goto rollback;
|
|
}
|
|
if (sqlite_step_retry(&retry, stmt) == -1)
|
|
goto rollback;
|
|
sqlite3_reset(stmt);
|
|
}
|
|
sqlite3_finalize(stmt);
|
|
stmt = NULL;
|
|
}
|
|
if (sqlite_exec_void_retry(&retry, "COMMIT;") == SQLITE_OK){
|
|
// This message used in tests; do not modify or remove.
|
|
const char *service = rhizome_manifest_get(m, "service", NULL, 0);
|
|
INFOF("RHIZOME ADD MANIFEST service=%s bid=%s version=%lld",
|
|
service ? service : "NULL",
|
|
alloca_tohex_sid(m->cryptoSignPublic),
|
|
m->version
|
|
);
|
|
monitor_announce_bundle(m);
|
|
return 0;
|
|
}
|
|
rollback:
|
|
if (stmt)
|
|
sqlite3_finalize(stmt);
|
|
WHYF("Failed to store bundle bid=%s", manifestid);
|
|
sqlite_exec_void_retry(&retry, "ROLLBACK;");
|
|
return -1;
|
|
}
|
|
|
|
int rhizome_list_manifests(const char *service, const char *name,
|
|
const char *sender_sid, const char *recipient_sid,
|
|
int limit, int offset, char count_rows)
|
|
{
|
|
IN();
|
|
strbuf b = strbuf_alloca(1024);
|
|
strbuf_sprintf(b, "SELECT id, manifest, version, inserttime, author, rowid FROM manifests WHERE 1=1");
|
|
|
|
if (service && *service)
|
|
strbuf_sprintf(b, " AND service = ?1");
|
|
if (name && *name)
|
|
strbuf_sprintf(b, " AND name like ?2");
|
|
if (sender_sid && *sender_sid)
|
|
strbuf_sprintf(b, " AND sender = ?3");
|
|
if (recipient_sid && *recipient_sid)
|
|
strbuf_sprintf(b, " AND recipient = ?4");
|
|
|
|
strbuf_sprintf(b, " ORDER BY inserttime DESC");
|
|
|
|
if (offset)
|
|
strbuf_sprintf(b, " OFFSET %u", offset);
|
|
|
|
if (strbuf_overrun(b))
|
|
RETURN(WHYF("SQL command too long: ", strbuf_str(b)));
|
|
|
|
sqlite_retry_state retry = SQLITE_RETRY_STATE_DEFAULT;
|
|
sqlite3_stmt *statement = sqlite_prepare(&retry, "%s", strbuf_str(b));
|
|
if (!statement)
|
|
RETURN(-1);
|
|
|
|
int ret = 0;
|
|
|
|
if (service && *service)
|
|
ret = sqlite3_bind_text(statement, 1, service, -1, SQLITE_STATIC);
|
|
if (ret==SQLITE_OK && name && *name)
|
|
ret = sqlite3_bind_text(statement, 2, name, -1, SQLITE_STATIC);
|
|
if (ret==SQLITE_OK && sender_sid && *sender_sid)
|
|
ret = sqlite3_bind_text(statement, 3, sender_sid, -1, SQLITE_STATIC);
|
|
if (ret==SQLITE_OK && recipient_sid && *recipient_sid)
|
|
ret = sqlite3_bind_text(statement, 4, recipient_sid, -1, SQLITE_STATIC);
|
|
|
|
if (ret!=SQLITE_OK){
|
|
ret = WHYF("Failed to bind parameters: %s", sqlite3_errmsg(rhizome_db));
|
|
goto cleanup;
|
|
}
|
|
|
|
ret=0;
|
|
size_t rows = 0;
|
|
|
|
const char *names[]={
|
|
"_id",
|
|
"service",
|
|
"id",
|
|
"version",
|
|
"date",
|
|
".inserttime",
|
|
".author",
|
|
".fromhere",
|
|
"filesize",
|
|
"filehash",
|
|
"sender",
|
|
"recipient",
|
|
"name"
|
|
};
|
|
cli_columns(13,names);
|
|
|
|
while (sqlite_step_retry(&retry, statement) == SQLITE_ROW) {
|
|
++rows;
|
|
if (limit>0 && rows>limit)
|
|
break;
|
|
if (!( sqlite3_column_count(statement) == 6
|
|
&& sqlite3_column_type(statement, 0) == SQLITE_TEXT
|
|
&& sqlite3_column_type(statement, 1) == SQLITE_BLOB
|
|
&& sqlite3_column_type(statement, 2) == SQLITE_INTEGER
|
|
&& sqlite3_column_type(statement, 3) == SQLITE_INTEGER
|
|
&& ( sqlite3_column_type(statement, 4) == SQLITE_TEXT
|
|
|| sqlite3_column_type(statement, 4) == SQLITE_NULL
|
|
)
|
|
)) {
|
|
ret = WHY("Incorrect statement column");
|
|
break;
|
|
}
|
|
rhizome_manifest *m = rhizome_new_manifest();
|
|
if (m == NULL) {
|
|
ret = WHY("Out of manifests");
|
|
break;
|
|
}
|
|
const char *q_manifestid = (const char *) sqlite3_column_text(statement, 0);
|
|
const char *manifestblob = (char *) sqlite3_column_blob(statement, 1);
|
|
size_t manifestblobsize = sqlite3_column_bytes(statement, 1); // must call after sqlite3_column_blob()
|
|
long long q_version = sqlite3_column_int64(statement, 2);
|
|
long long q_inserttime = sqlite3_column_int64(statement, 3);
|
|
const char *q_author = (const char *) sqlite3_column_text(statement, 4);
|
|
long long rowid = sqlite3_column_int64(statement, 5);
|
|
|
|
if (rhizome_read_manifest_file(m, manifestblob, manifestblobsize) == -1) {
|
|
WARNF("MANIFESTS row id=%s has invalid manifest blob -- skipped", q_manifestid);
|
|
} else {
|
|
long long blob_version = rhizome_manifest_get_ll(m, "version");
|
|
if (blob_version != q_version)
|
|
WARNF("MANIFESTS row id=%s version=%lld does not match manifest blob.version=%lld", q_manifestid, q_version, blob_version);
|
|
int match = 1;
|
|
|
|
const char *blob_service = rhizome_manifest_get(m, "service", NULL, 0);
|
|
if (service[0] && !(blob_service && strcasecmp(service, blob_service) == 0))
|
|
match = 0;
|
|
const char *blob_sender = rhizome_manifest_get(m, "sender", NULL, 0);
|
|
const char *blob_recipient = rhizome_manifest_get(m, "recipient", NULL, 0);
|
|
if (match && sender_sid[0]) {
|
|
if (!(blob_sender && strcasecmp(sender_sid, blob_sender) == 0))
|
|
match = 0;
|
|
}
|
|
if (match && recipient_sid[0]) {
|
|
if (!(blob_recipient && strcasecmp(recipient_sid, blob_recipient) == 0))
|
|
match = 0;
|
|
}
|
|
|
|
if (match) {
|
|
const char *blob_name = rhizome_manifest_get(m, "name", NULL, 0);
|
|
long long blob_date = rhizome_manifest_get_ll(m, "date");
|
|
const char *blob_filehash = rhizome_manifest_get(m, "filehash", NULL, 0);
|
|
long long blob_filesize = rhizome_manifest_get_ll(m, "filesize");
|
|
int from_here = 0;
|
|
unsigned char senderSid[SID_SIZE];
|
|
unsigned char recipientSid[SID_SIZE];
|
|
|
|
if (blob_sender)
|
|
stowSid(senderSid, 0, blob_sender);
|
|
if (blob_recipient)
|
|
stowSid(recipientSid, 0, blob_recipient);
|
|
|
|
if (q_author) {
|
|
if (config.debug.rhizome) DEBUGF("q_author=%s", alloca_str_toprint(q_author));
|
|
stowSid(m->author, 0, q_author);
|
|
int cn = 0, in = 0, kp = 0;
|
|
from_here = keyring_find_sid(keyring, &cn, &in, &kp, m->author);
|
|
}
|
|
if (!from_here && blob_sender) {
|
|
if (config.debug.rhizome) DEBUGF("blob_sender=%s", alloca_str_toprint(blob_sender));
|
|
int cn = 0, in = 0, kp = 0;
|
|
from_here = keyring_find_sid(keyring, &cn, &in, &kp, senderSid);
|
|
}
|
|
if (config.debug.rhizome) DEBUGF("manifest payload size = %lld", blob_filesize);
|
|
|
|
cli_put_long(rowid, ":");
|
|
cli_put_string(blob_service, ":");
|
|
cli_put_hexvalue(m->cryptoSignPublic, RHIZOME_MANIFEST_ID_BYTES, ":");
|
|
cli_put_long(blob_version, ":");
|
|
cli_put_long(blob_date, ":");
|
|
cli_put_long(q_inserttime, ":");
|
|
cli_put_hexvalue(q_author?m->author:NULL, SID_SIZE, ":");
|
|
cli_put_long(from_here, ":");
|
|
cli_put_long(m->fileLength, ":");
|
|
|
|
unsigned char filehash[SHA512_DIGEST_LENGTH];
|
|
if (m->fileLength)
|
|
fromhex(filehash, blob_filehash, SHA512_DIGEST_LENGTH);
|
|
|
|
cli_put_hexvalue(m->fileLength?filehash:NULL, SHA512_DIGEST_LENGTH, ":");
|
|
|
|
cli_put_hexvalue(blob_sender?senderSid:NULL, SID_SIZE, ":");
|
|
cli_put_hexvalue(blob_recipient?recipientSid:NULL, SID_SIZE, ":");
|
|
cli_put_string(blob_name, "\n");
|
|
}
|
|
}
|
|
if (m) rhizome_manifest_free(m);
|
|
}
|
|
|
|
if (ret==0 && count_rows){
|
|
while (sqlite_step_retry(&retry, statement) == SQLITE_ROW)
|
|
++rows;
|
|
}
|
|
cli_row_count(rows);
|
|
|
|
cleanup:
|
|
sqlite3_finalize(statement);
|
|
RETURN(ret);
|
|
OUT();
|
|
}
|
|
|
|
int64_t rhizome_database_create_blob_for(const char *filehashhex_or_tempid,
|
|
int64_t fileLength, int priority)
|
|
{
|
|
IN();
|
|
sqlite_retry_state retry = SQLITE_RETRY_STATE_DEFAULT;
|
|
|
|
DEBUGF("Creating blob for (filehash or temp id)='%s', length=%d, priority=%d",
|
|
filehashhex_or_tempid,fileLength,priority);
|
|
|
|
if (sqlite_exec_void_retry(&retry, "BEGIN TRANSACTION;") != SQLITE_OK)
|
|
RETURN(WHY("Failed to begin transaction"));
|
|
|
|
/* INSERT INTO FILES(id as text, data blob, length integer, highestpriority integer).
|
|
BUT, we have to do this incrementally so that we can handle blobs larger than available memory.
|
|
This is possible using:
|
|
int sqlite3_bind_zeroblob(sqlite3_stmt*, int, int n);
|
|
That binds an all zeroes blob to a field. We can then populate the data by
|
|
opening a handle to the blob using:
|
|
int sqlite3_blob_write(sqlite3_blob *, const void *z, int n, int iOffset);
|
|
*/
|
|
|
|
int ret=sqlite_exec_void_retry(&retry,
|
|
"INSERT OR REPLACE INTO FILES(id,length,highestpriority,datavalid,inserttime) VALUES('%s',%lld,%d,0,%lld);",
|
|
filehashhex_or_tempid, (long long)fileLength,
|
|
priority, (long long)gettime_ms());
|
|
if (ret!=SQLITE_OK) {
|
|
DEBUGF("insert or replace into files ... failed: %s",
|
|
sqlite3_errmsg(rhizome_db));
|
|
goto insert_row_fail;
|
|
}
|
|
sqlite3_int64 fileblob_rowid=sqlite3_last_insert_rowid(rhizome_db);
|
|
|
|
sqlite3_stmt *statement=NULL;
|
|
if (fileLength<config.rhizome.max_internal_blob_size) {
|
|
statement = sqlite_prepare(&retry,"INSERT OR REPLACE INTO FILEBLOBS(id,data) VALUES('%s',?)",filehashhex_or_tempid);
|
|
if (!statement)
|
|
goto insert_row_fail;
|
|
|
|
/* Bind appropriate sized zero-filled blob to data field */
|
|
if (sqlite3_bind_zeroblob(statement, 1, fileLength) != SQLITE_OK) {
|
|
WHYF("sqlite3_bind_zeroblob() failed: %s: %s", sqlite3_errmsg(rhizome_db), sqlite3_sql(statement));
|
|
sqlite3_finalize(statement);
|
|
goto insert_row_fail;
|
|
}
|
|
} else {
|
|
char *blobfile=rhizome_database_get_blob_filename(fileblob_rowid);
|
|
DEBUGF("Attempting to put blob for %s in %s",
|
|
filehashhex_or_tempid,blobfile?blobfile:"(null)");
|
|
int fd=open(blobfile, O_CREAT | O_TRUNC | O_WRONLY, 0664);
|
|
if (fd<0) goto insert_row_fail;
|
|
else DEBUGF("Blob file created (fd=%d)",fd);
|
|
close(fd);
|
|
|
|
statement = sqlite_prepare(&retry,"INSERT OR REPLACE INTO FILEBLOBS(id,data) VALUES('%s',%lld)",filehashhex_or_tempid,fileblob_rowid);
|
|
if (!statement)
|
|
goto insert_row_fail;
|
|
}
|
|
/* Do actual insert, and abort if it fails */
|
|
if (_sqlite_exec_void_prepared(__WHENCE__, LOG_LEVEL_ERROR, &retry, statement) == -1) {
|
|
insert_row_fail:
|
|
WHYF("Failed to insert row for fileid=%s", filehashhex_or_tempid);
|
|
sqlite_exec_void_retry(&retry, "ROLLBACK;");
|
|
RETURN(-1);
|
|
}
|
|
|
|
/* Get rowid for inserted row, so that we can modify the blob */
|
|
int64_t rowid = sqlite3_last_insert_rowid(rhizome_db);
|
|
|
|
ret = sqlite_exec_void_retry(&retry, "COMMIT;");
|
|
if (ret!=SQLITE_OK){
|
|
sqlite_exec_void_retry(&retry, "ROLLBACK;");
|
|
RETURN(WHYF("Failed to commit transaction"));
|
|
}
|
|
DEBUGF("Got rowid %lld for %s", rowid, filehashhex_or_tempid);
|
|
RETURN(rowid);
|
|
OUT();
|
|
}
|
|
|
|
void rhizome_bytes_to_hex_upper(unsigned const char *in, char *out, int byteCount)
|
|
{
|
|
(void) tohex(out, in, byteCount);
|
|
}
|
|
|
|
int rhizome_update_file_priority(const char *fileid)
|
|
{
|
|
/* work out the highest priority of any referrer */
|
|
long long highestPriority = -1;
|
|
sqlite_retry_state retry = SQLITE_RETRY_STATE_DEFAULT;
|
|
if (sqlite_exec_int64_retry(&retry, &highestPriority,
|
|
"SELECT max(grouplist.priority) FROM MANIFESTS,GROUPMEMBERSHIPS,GROUPLIST"
|
|
" where manifests.filehash='%s'"
|
|
" AND groupmemberships.manifestid=manifests.id"
|
|
" AND groupmemberships.groupid=grouplist.id;",
|
|
fileid) == -1)
|
|
return -1;
|
|
if (highestPriority >= 0 && sqlite_exec_void_retry(&retry, "UPDATE files set highestPriority=%lld WHERE id='%s';", highestPriority, fileid) != 0)
|
|
WHYF("cannot update priority for fileid=%s", fileid);
|
|
return 0;
|
|
}
|
|
|
|
/* Search the database for a manifest having the same name and payload content,
|
|
and if the version is known, having the same version.
|
|
|
|
@author Andrew Bettison <andrew@servalproject.com>
|
|
*/
|
|
int rhizome_find_duplicate(const rhizome_manifest *m, rhizome_manifest **found, int check_author)
|
|
{
|
|
// TODO, add service, name, sender & recipient to manifests table so we can simply query them.
|
|
|
|
const char *service = rhizome_manifest_get(m, "service", NULL, 0);
|
|
const char *name = NULL;
|
|
const char *sender = NULL;
|
|
const char *recipient = NULL;
|
|
if (service == NULL) {
|
|
return WHY("Manifest has no service");
|
|
} else if (strcasecmp(service, RHIZOME_SERVICE_FILE) == 0) {
|
|
name = rhizome_manifest_get(m, "name", NULL, 0);
|
|
if (!name) return WHY("Manifest has no name");
|
|
} else if (strcasecmp(service, RHIZOME_SERVICE_MESHMS) == 0) {
|
|
sender = rhizome_manifest_get(m, "sender", NULL, 0);
|
|
recipient = rhizome_manifest_get(m, "recipient", NULL, 0);
|
|
if (!sender) return WHY("Manifest has no sender");
|
|
if (!recipient) return WHY("Manifest has no recipient");
|
|
} else {
|
|
return WHYF("Unsupported service '%s'", service);
|
|
}
|
|
char sqlcmd[1024];
|
|
strbuf b = strbuf_local(sqlcmd, sizeof sqlcmd);
|
|
strbuf_puts(b, "SELECT id, manifest, version, author FROM manifests WHERE ");
|
|
if (m->fileLength != 0) {
|
|
strbuf_puts(b, "filehash = ?");
|
|
} else
|
|
strbuf_puts(b, "filesize = 0");
|
|
if (strbuf_overrun(b))
|
|
return WHYF("SQL command too long: %s", strbuf_str(b));
|
|
int ret = 0;
|
|
sqlite_retry_state retry = SQLITE_RETRY_STATE_DEFAULT;
|
|
sqlite3_stmt *statement = sqlite_prepare(&retry, "%s", strbuf_str(b));
|
|
if (!statement)
|
|
return -1;
|
|
int field = 1;
|
|
char filehash[RHIZOME_FILEHASH_STRLEN + 1];
|
|
if (m->fileLength != 0) {
|
|
strncpy(filehash, m->fileHexHash, sizeof filehash);
|
|
str_toupper_inplace(filehash);
|
|
if (config.debug.rhizome)
|
|
DEBUGF("filehash=\"%s\"", filehash);
|
|
sqlite3_bind_text(statement, field++, filehash, -1, SQLITE_STATIC);
|
|
}
|
|
size_t rows = 0;
|
|
while (sqlite_step_retry(&retry, statement) == SQLITE_ROW) {
|
|
++rows;
|
|
if (config.debug.rhizome) DEBUGF("Row %d", rows);
|
|
if (!( sqlite3_column_count(statement) == 4
|
|
&& sqlite3_column_type(statement, 0) == SQLITE_TEXT
|
|
&& sqlite3_column_type(statement, 1) == SQLITE_BLOB
|
|
&& sqlite3_column_type(statement, 2) == SQLITE_INTEGER
|
|
&& ( sqlite3_column_type(statement, 3) == SQLITE_TEXT
|
|
|| sqlite3_column_type(statement, 3) == SQLITE_NULL
|
|
)
|
|
)) {
|
|
ret = WHY("Incorrect statement columns");
|
|
break;
|
|
}
|
|
const char *q_manifestid = (const char *) sqlite3_column_text(statement, 0);
|
|
size_t manifestidsize = sqlite3_column_bytes(statement, 0); // must call after sqlite3_column_text()
|
|
unsigned char manifest_id[RHIZOME_MANIFEST_ID_BYTES];
|
|
if ( manifestidsize != crypto_sign_edwards25519sha512batch_PUBLICKEYBYTES * 2
|
|
|| fromhexstr(manifest_id, q_manifestid, RHIZOME_MANIFEST_ID_BYTES) == -1
|
|
) {
|
|
ret = WHYF("Malformed manifest.id from query: %s", q_manifestid);
|
|
break;
|
|
}
|
|
const char *manifestblob = (char *) sqlite3_column_blob(statement, 1);
|
|
size_t manifestblobsize = sqlite3_column_bytes(statement, 1); // must call after sqlite3_column_blob()
|
|
long long q_version = sqlite3_column_int64(statement, 2);
|
|
const char *q_author = (const char *) sqlite3_column_text(statement, 3);
|
|
|
|
rhizome_manifest *blob_m = rhizome_new_manifest();
|
|
if (blob_m == NULL) {
|
|
ret = WHY("Out of manifests");
|
|
break;
|
|
}
|
|
if (rhizome_read_manifest_file(blob_m, manifestblob, manifestblobsize) == -1) {
|
|
WARNF("MANIFESTS row id=%s has invalid manifest blob -- skipped", q_manifestid);
|
|
} else if (rhizome_manifest_verify(blob_m)) {
|
|
WARNF("MANIFESTS row id=%s fails verification -- skipped", q_manifestid);
|
|
} else {
|
|
const char *blob_service = rhizome_manifest_get(blob_m, "service", NULL, 0);
|
|
const char *blob_id = rhizome_manifest_get(blob_m, "id", NULL, 0);
|
|
long long blob_version = rhizome_manifest_get_ll(blob_m, "version");
|
|
const char *blob_filehash = rhizome_manifest_get(blob_m, "filehash", NULL, 0);
|
|
long long blob_filesize = rhizome_manifest_get_ll(blob_m, "filesize");
|
|
if (config.debug.rhizome)
|
|
DEBUGF("Consider manifest.service=%s manifest.id=%s manifest.version=%lld", blob_service, q_manifestid, blob_version);
|
|
if (q_author) {
|
|
if (config.debug.rhizome)
|
|
strbuf_sprintf(b, " .author=%s", q_author);
|
|
stowSid(blob_m->author, 0, q_author);
|
|
}
|
|
|
|
/* Perform consistency checks, because we're paranoid. */
|
|
int inconsistent = 0;
|
|
if (blob_id && strcasecmp(blob_id, q_manifestid)) {
|
|
WARNF("MANIFESTS row id=%s has inconsistent blob with id=%s -- skipped", q_manifestid, blob_id);
|
|
++inconsistent;
|
|
}
|
|
if (blob_version != q_version) {
|
|
WARNF("MANIFESTS row id=%s has inconsistent blob: manifests.version=%lld, blob.version=%lld -- skipped",
|
|
q_manifestid, q_version, blob_version);
|
|
++inconsistent;
|
|
}
|
|
if (blob_filesize != -1 && blob_filesize != m->fileLength) {
|
|
WARNF("MANIFESTS row id=%s has inconsistent blob: known file size %lld, blob.filesize=%lld -- skipped",
|
|
q_manifestid, m->fileLength, blob_filesize);
|
|
++inconsistent;
|
|
}
|
|
if (m->fileLength != 0) {
|
|
if (!blob_filehash && strcasecmp(blob_filehash, m->fileHexHash)) {
|
|
WARNF("MANIFESTS row id=%s has inconsistent blob: manifests.filehash=%s, blob.filehash=%s -- skipped",
|
|
q_manifestid, m->fileHexHash, blob_filehash);
|
|
++inconsistent;
|
|
}
|
|
} else {
|
|
if (blob_filehash) {
|
|
WARNF("MANIFESTS row id=%s has inconsistent blob: blob.filehash should be absent -- skipped",
|
|
q_manifestid);
|
|
++inconsistent;
|
|
}
|
|
}
|
|
if (blob_service == NULL) {
|
|
WARNF("MANIFESTS row id=%s has blob with no 'service' -- skipped", q_manifestid, blob_id);
|
|
++inconsistent;
|
|
}
|
|
if (!inconsistent) {
|
|
strbuf b = strbuf_alloca(1024);
|
|
if (strcasecmp(service, RHIZOME_SERVICE_FILE) == 0) {
|
|
const char *blob_name = rhizome_manifest_get(blob_m, "name", NULL, 0);
|
|
if (blob_name && !strcmp(blob_name, name)) {
|
|
if (config.debug.rhizome)
|
|
strbuf_sprintf(b, " name=\"%s\"", blob_name);
|
|
}else
|
|
++inconsistent;
|
|
} else if (strcasecmp(service, RHIZOME_SERVICE_MESHMS) == 0) {
|
|
const char *blob_sender = rhizome_manifest_get(blob_m, "sender", NULL, 0);
|
|
const char *blob_recipient = rhizome_manifest_get(blob_m, "recipient", NULL, 0);
|
|
if (blob_sender && !strcasecmp(blob_sender, sender) && blob_recipient && !strcasecmp(blob_recipient, recipient)) {
|
|
if (config.debug.rhizome)
|
|
strbuf_sprintf(b, " sender=%s recipient=%s", blob_sender, blob_recipient);
|
|
}else
|
|
++inconsistent;
|
|
}
|
|
}
|
|
|
|
if ((!inconsistent) && check_author) {
|
|
// check that we can re-author this manifest
|
|
if (rhizome_extract_privatekey(blob_m, NULL))
|
|
++inconsistent;
|
|
}
|
|
|
|
if (!inconsistent) {
|
|
*found = blob_m;
|
|
DEBUGF("Found duplicate payload: service=%s%s version=%llu hexhash=%s",
|
|
blob_service, strbuf_str(b), blob_m->version, blob_m->fileHexHash, q_author ? q_author : ""
|
|
);
|
|
ret = 1;
|
|
break;
|
|
}
|
|
}
|
|
if (blob_m)
|
|
rhizome_manifest_free(blob_m);
|
|
}
|
|
sqlite3_finalize(statement);
|
|
return ret;
|
|
}
|
|
|
|
/* Retrieve a manifest from the database, given its manifest ID.
|
|
*
|
|
* Returns 0 if manifest is found
|
|
* Returns 1 if manifest is not found
|
|
* Returns -1 on error
|
|
* Caller is responsible for allocating and freeing rhizome_manifest
|
|
*/
|
|
int rhizome_retrieve_manifest(const char *manifestid, rhizome_manifest *m){
|
|
int ret=0;
|
|
|
|
sqlite_retry_state retry = SQLITE_RETRY_STATE_DEFAULT;
|
|
|
|
sqlite3_stmt *statement = sqlite_prepare(&retry, "SELECT manifest, version, inserttime, author FROM manifests WHERE id like ?");
|
|
if (!statement)
|
|
return -1;
|
|
|
|
sqlite3_bind_text(statement, 1, manifestid, -1, SQLITE_STATIC);
|
|
if (sqlite_step_retry(&retry, statement) == SQLITE_ROW){
|
|
const char *manifestblob = (char *) sqlite3_column_blob(statement, 0);
|
|
long long q_version = (long long) sqlite3_column_int64(statement, 1);
|
|
long long q_inserttime = (long long) sqlite3_column_int64(statement, 2);
|
|
const char *q_author = (const char *) sqlite3_column_text(statement, 3);
|
|
size_t manifestblobsize = sqlite3_column_bytes(statement, 0); // must call after sqlite3_column_blob()
|
|
|
|
if (rhizome_read_manifest_file(m, manifestblob, manifestblobsize)){
|
|
ret=WHYF("Manifest %s exists but is invalid", manifestid);
|
|
goto done;
|
|
}
|
|
|
|
if (q_author){
|
|
if (stowSid(m->author, 0, q_author) == -1)
|
|
WARNF("Manifest %s contains invalid author=%s -- ignored", manifestid, alloca_str_toprint(q_author));
|
|
}
|
|
|
|
if (m->version!=q_version)
|
|
WARNF("Version mismatch, manifest is %lld, database is %lld", m->version, q_version);
|
|
|
|
m->inserttime = q_inserttime;
|
|
}else{
|
|
INFOF("Manifest %s was not found", manifestid);
|
|
ret=1;
|
|
}
|
|
|
|
done:
|
|
sqlite3_finalize(statement);
|
|
return ret;
|
|
}
|
|
|
|
long long lookup_time=0;
|
|
long long last_bar_lookup=0;
|
|
int rhizome_is_bar_interesting(unsigned char *bar){
|
|
IN();
|
|
|
|
if (last_bar_lookup>(gettime_ms()-1000)) {
|
|
/* Looking up rhizome bundles by BAR can be slow.
|
|
If so, then ignore some percentage of BARs. */
|
|
if (lookup_time>10) {
|
|
// if >10ms then only check 1 in 8 BARs
|
|
if (random()&0x7) RETURN(0);
|
|
}
|
|
if (lookup_time>100) {
|
|
// if >10ms then only check 1 in 32 (1 in 8 of 1 in 4) BARs
|
|
if (random()&0x3) RETURN(0);
|
|
}
|
|
}
|
|
|
|
long long start_time=gettime_ms();
|
|
|
|
int64_t version = rhizome_bar_version(bar);
|
|
int ret=1;
|
|
char id_hex[RHIZOME_MANIFEST_ID_STRLEN];
|
|
tohex(id_hex, &bar[RHIZOME_BAR_PREFIX_OFFSET], RHIZOME_BAR_PREFIX_BYTES);
|
|
strcat(id_hex, "%");
|
|
|
|
// are we ignoring this manifest?
|
|
if (rhizome_ignore_manifest_check(&bar[RHIZOME_BAR_PREFIX_OFFSET], RHIZOME_BAR_PREFIX_BYTES)){
|
|
DEBUGF("Ignoring %s", id_hex);
|
|
RETURN(0);
|
|
}
|
|
|
|
// are we already fetching this bundle [or later]?
|
|
rhizome_manifest *m=rhizome_fetch_search(&bar[RHIZOME_BAR_PREFIX_OFFSET], RHIZOME_BAR_PREFIX_BYTES);
|
|
if (m && m->version >= version)
|
|
RETURN(0);
|
|
|
|
// do we have this bundle [or later]?
|
|
sqlite_retry_state retry = SQLITE_RETRY_STATE_DEFAULT;
|
|
sqlite3_stmt *statement = sqlite_prepare(&retry,
|
|
"SELECT id, version FROM manifests WHERE id like ? and version >= ?");
|
|
|
|
sqlite3_bind_text(statement, 1, id_hex, -1, SQLITE_STATIC);
|
|
sqlite3_bind_int64(statement, 2, version);
|
|
|
|
if (sqlite_step_retry(&retry, statement) == SQLITE_ROW){
|
|
if (0){
|
|
const char *q_id = (const char *) sqlite3_column_text(statement, 0);
|
|
long long q_version = (long long) sqlite3_column_int64(statement, 1);
|
|
DEBUGF("Already have %s, %lld (vs %s, %lld)", q_id, q_version, id_hex, version);
|
|
}
|
|
ret=0;
|
|
}
|
|
sqlite3_finalize(statement);
|
|
|
|
long long end_time=gettime_ms();
|
|
lookup_time=end_time-start_time;
|
|
last_bar_lookup=end_time;
|
|
if (lookup_time>50) WARNF("Looking up a BAR took %lldms",lookup_time);
|
|
|
|
RETURN(ret);
|
|
OUT();
|
|
}
|