2005-01-20 23:22:22 +00:00
|
|
|
// Berkeley Open Infrastructure for Network Computing
|
|
|
|
// http://boinc.berkeley.edu
|
|
|
|
// Copyright (C) 2005 University of California
|
2003-07-02 02:02:18 +00:00
|
|
|
//
|
2005-01-20 23:22:22 +00:00
|
|
|
// This is free software; you can redistribute it and/or
|
|
|
|
// modify it under the terms of the GNU Lesser General Public
|
|
|
|
// License as published by the Free Software Foundation;
|
|
|
|
// either version 2.1 of the License, or (at your option) any later version.
|
2003-07-02 02:02:18 +00:00
|
|
|
//
|
2005-01-20 23:22:22 +00:00
|
|
|
// This software is distributed in the hope that it will be useful,
|
|
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
|
|
|
|
// See the GNU Lesser General Public License for more details.
|
2002-04-30 22:22:54 +00:00
|
|
|
//
|
2005-01-20 23:22:22 +00:00
|
|
|
// To view the GNU Lesser General Public License visit
|
|
|
|
// http://www.gnu.org/copyleft/lesser.html
|
|
|
|
// or write to the Free Software Foundation, Inc.,
|
|
|
|
// 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
|
2002-04-30 22:22:54 +00:00
|
|
|
|
2004-01-30 22:19:19 +00:00
|
|
|
// The "policy" part of file transfer is here.
|
|
|
|
// The "mechanism" part is in pers_file_xfer.C and file_xfer.C
|
2002-04-30 22:22:54 +00:00
|
|
|
//
|
|
|
|
|
2003-10-16 19:03:49 +00:00
|
|
|
#include "cpp.h"
|
2002-06-06 18:42:01 +00:00
|
|
|
|
|
|
|
#ifdef _WIN32
|
2004-06-16 23:16:08 +00:00
|
|
|
#include "boinc_win.h"
|
2002-06-06 18:42:01 +00:00
|
|
|
#endif
|
|
|
|
|
2004-03-04 11:41:43 +00:00
|
|
|
#ifndef _WIN32
|
2005-11-21 18:34:44 +00:00
|
|
|
#include "config.h"
|
2003-07-23 22:24:28 +00:00
|
|
|
#include <cassert>
|
2002-04-30 22:22:54 +00:00
|
|
|
#include <sys/stat.h>
|
2002-06-06 18:42:01 +00:00
|
|
|
#include <sys/types.h>
|
2004-03-04 11:41:43 +00:00
|
|
|
#endif
|
2002-04-30 22:22:54 +00:00
|
|
|
|
|
|
|
#include "md5_file.h"
|
2002-07-07 20:39:24 +00:00
|
|
|
#include "crypt.h"
|
2007-02-21 16:26:51 +00:00
|
|
|
#include "str_util.h"
|
2004-04-08 08:15:23 +00:00
|
|
|
#include "filesys.h"
|
|
|
|
#include "error_numbers.h"
|
2006-01-17 22:48:09 +00:00
|
|
|
|
2002-04-30 22:22:54 +00:00
|
|
|
#include "file_names.h"
|
2002-06-01 20:26:21 +00:00
|
|
|
#include "client_types.h"
|
2002-04-30 22:22:54 +00:00
|
|
|
#include "client_state.h"
|
2004-04-08 08:15:23 +00:00
|
|
|
#include "client_msgs.h"
|
|
|
|
#include "file_xfer.h"
|
2002-04-30 22:22:54 +00:00
|
|
|
|
2003-12-02 22:47:32 +00:00
|
|
|
#define MAX_TRANSFERS_PER_PROJECT 2
|
2006-10-23 21:00:36 +00:00
|
|
|
#define MAX_TRANSFERS_TOTAL 8
|
|
|
|
// kind of arbitrary
|
2003-12-02 22:47:32 +00:00
|
|
|
|
2004-06-30 18:17:21 +00:00
|
|
|
using std::vector;
|
|
|
|
|
2003-03-02 19:24:09 +00:00
|
|
|
// Decide whether to consider starting a new file transfer
|
2002-08-30 22:11:36 +00:00
|
|
|
//
|
2003-12-02 22:47:32 +00:00
|
|
|
bool CLIENT_STATE::start_new_file_xfer(PERS_FILE_XFER& pfx) {
|
|
|
|
unsigned int i;
|
2007-02-20 04:18:02 +00:00
|
|
|
int ntotal=0, nproj=0;
|
2003-12-02 22:47:32 +00:00
|
|
|
|
2005-12-24 06:32:07 +00:00
|
|
|
if (network_suspended) return false;
|
2003-12-02 22:47:32 +00:00
|
|
|
|
2006-10-23 21:00:36 +00:00
|
|
|
|
2003-12-02 22:47:32 +00:00
|
|
|
// limit the number of file transfers per project
|
2007-02-20 04:18:02 +00:00
|
|
|
// (uploads and downloads are limited separately)
|
2003-12-02 22:47:32 +00:00
|
|
|
//
|
|
|
|
for (i=0; i<file_xfers->file_xfers.size(); i++) {
|
|
|
|
FILE_XFER* fxp = file_xfers->file_xfers[i];
|
2007-02-20 04:18:02 +00:00
|
|
|
if (pfx.is_upload == fxp->is_upload) {
|
|
|
|
ntotal++;
|
|
|
|
if (pfx.fip->project == fxp->fip->project) {
|
|
|
|
nproj++;
|
|
|
|
}
|
2003-12-02 22:47:32 +00:00
|
|
|
}
|
|
|
|
}
|
2007-02-20 04:18:02 +00:00
|
|
|
if (nproj >= config.max_file_xfers_per_project) return false;
|
|
|
|
if (ntotal >= config.max_file_xfers) return false;
|
2003-12-02 22:47:32 +00:00
|
|
|
return true;
|
2002-08-30 22:11:36 +00:00
|
|
|
}
|
|
|
|
|
2003-03-02 19:24:09 +00:00
|
|
|
// Make a directory for each of the projects in the client state
|
2002-08-22 21:29:58 +00:00
|
|
|
//
|
|
|
|
int CLIENT_STATE::make_project_dirs() {
|
|
|
|
unsigned int i;
|
2003-03-08 23:48:05 +00:00
|
|
|
int retval;
|
2002-08-22 21:29:58 +00:00
|
|
|
for (i=0; i<projects.size(); i++) {
|
2003-03-08 23:48:05 +00:00
|
|
|
retval = make_project_dir(*projects[i]);
|
|
|
|
if (retval) return retval;
|
2002-08-22 21:29:58 +00:00
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2006-06-20 17:36:28 +00:00
|
|
|
// Check the existence and/or validity of a file
|
|
|
|
// If "strict" is true, check either the digital signature of the file
|
|
|
|
// (if signature_required is set) or its MD5 checksum.
|
|
|
|
// Otherwise check its size.
|
|
|
|
//
|
2005-04-12 22:53:35 +00:00
|
|
|
// This is called
|
|
|
|
// 1) right after download is finished (CLIENT_STATE::handle_pers_file_xfers())
|
|
|
|
// 2) if a needed file is already on disk (PERS_FILE_XFER::start_xfer())
|
|
|
|
// 3) in checking whether a result's input files are available
|
|
|
|
// (CLIENT_STATE::input_files_available()).
|
2006-04-28 17:23:00 +00:00
|
|
|
// In this case "strict" is false,
|
2005-06-07 23:12:47 +00:00
|
|
|
// and we just check existence and size (no checksum)
|
|
|
|
//
|
|
|
|
// If a failure occurs, set the file's "status" field.
|
|
|
|
// This will cause the app_version or workunit that used the file
|
|
|
|
// to error out (via APP_VERSION::had_download_failure()
|
|
|
|
// WORKUNIT::had_download_failure())
|
2002-07-15 23:21:20 +00:00
|
|
|
//
|
2007-01-19 20:56:49 +00:00
|
|
|
int FILE_INFO::verify_file(bool strict, bool show_errors) {
|
2004-09-02 16:23:21 +00:00
|
|
|
char cksum[64], pathname[256];
|
2002-07-07 20:39:24 +00:00
|
|
|
bool verified;
|
|
|
|
int retval;
|
2006-07-25 21:21:50 +00:00
|
|
|
double size, local_nbytes;
|
2002-07-07 20:39:24 +00:00
|
|
|
|
2007-03-13 19:33:27 +00:00
|
|
|
get_pathname(this, pathname, sizeof(pathname));
|
2005-06-07 23:12:47 +00:00
|
|
|
|
|
|
|
// If the file isn't there at all, set status to FILE_NOT_PRESENT;
|
|
|
|
// this will trigger a new download rather than erroring out
|
|
|
|
//
|
2005-04-12 21:54:40 +00:00
|
|
|
if (file_size(pathname, size)) {
|
2005-04-12 22:53:35 +00:00
|
|
|
status = FILE_NOT_PRESENT;
|
2005-04-12 21:54:40 +00:00
|
|
|
return ERR_FILE_MISSING;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (gstate.global_prefs.dont_verify_images
|
|
|
|
&& is_image_file(name)
|
|
|
|
&& size>0
|
|
|
|
) {
|
2005-04-06 19:41:31 +00:00
|
|
|
return 0;
|
|
|
|
}
|
2005-04-12 21:54:40 +00:00
|
|
|
|
2006-05-22 09:54:31 +00:00
|
|
|
if (nbytes && (nbytes != size) && (!config.dont_check_file_sizes)) {
|
2005-06-07 23:12:47 +00:00
|
|
|
status = ERR_WRONG_SIZE;
|
2005-04-12 21:54:40 +00:00
|
|
|
return ERR_WRONG_SIZE;
|
|
|
|
}
|
2005-04-12 22:53:35 +00:00
|
|
|
|
|
|
|
if (!strict) return 0;
|
|
|
|
|
2004-09-02 16:23:21 +00:00
|
|
|
if (signature_required) {
|
2005-02-26 06:35:19 +00:00
|
|
|
if (!strlen(file_signature)) {
|
2007-01-25 23:39:06 +00:00
|
|
|
msg_printf(project, MSG_INTERNAL_ERROR,
|
2006-01-17 22:48:09 +00:00
|
|
|
"Application file %s missing signature", name
|
|
|
|
);
|
2007-01-25 23:39:06 +00:00
|
|
|
msg_printf(project, MSG_INTERNAL_ERROR,
|
2006-01-17 22:48:09 +00:00
|
|
|
"BOINC cannot accept this file"
|
|
|
|
);
|
2004-09-02 16:23:21 +00:00
|
|
|
error_msg = "missing signature";
|
2005-06-07 23:12:47 +00:00
|
|
|
status = ERR_NO_SIGNATURE;
|
2002-08-30 20:56:02 +00:00
|
|
|
return ERR_NO_SIGNATURE;
|
|
|
|
}
|
2002-07-07 20:39:24 +00:00
|
|
|
retval = verify_file2(
|
2004-09-02 16:23:21 +00:00
|
|
|
pathname, file_signature, project->code_sign_key, verified
|
2002-07-07 20:39:24 +00:00
|
|
|
);
|
2002-08-15 21:52:04 +00:00
|
|
|
if (retval) {
|
2007-01-25 23:39:06 +00:00
|
|
|
msg_printf(project, MSG_INTERNAL_ERROR,
|
2006-01-17 22:48:09 +00:00
|
|
|
"Signature verification error for %s",
|
2004-09-02 16:23:21 +00:00
|
|
|
name
|
2003-10-13 00:41:02 +00:00
|
|
|
);
|
2004-09-02 16:23:21 +00:00
|
|
|
error_msg = "signature verification error";
|
2005-06-07 23:12:47 +00:00
|
|
|
status = ERR_RSA_FAILED;
|
2002-08-15 21:52:04 +00:00
|
|
|
return ERR_RSA_FAILED;
|
2002-07-11 01:09:53 +00:00
|
|
|
}
|
2007-01-19 20:56:49 +00:00
|
|
|
if (!verified && show_errors) {
|
2007-01-25 23:39:06 +00:00
|
|
|
msg_printf(project, MSG_INTERNAL_ERROR,
|
2006-01-17 22:48:09 +00:00
|
|
|
"Signature verification failed for %s",
|
2004-09-02 16:23:21 +00:00
|
|
|
name
|
2003-10-13 00:41:02 +00:00
|
|
|
);
|
2004-09-02 16:23:21 +00:00
|
|
|
error_msg = "signature verification failed";
|
2005-06-07 23:12:47 +00:00
|
|
|
status = ERR_RSA_FAILED;
|
2002-08-13 22:36:54 +00:00
|
|
|
return ERR_RSA_FAILED;
|
2002-07-11 01:09:53 +00:00
|
|
|
}
|
2004-09-02 16:23:21 +00:00
|
|
|
} else if (strlen(md5_cksum)) {
|
2006-07-25 21:21:50 +00:00
|
|
|
retval = md5_file(pathname, cksum, local_nbytes);
|
2003-11-29 02:41:28 +00:00
|
|
|
if (retval) {
|
2007-01-25 23:39:06 +00:00
|
|
|
msg_printf(project, MSG_INTERNAL_ERROR,
|
2006-01-17 22:48:09 +00:00
|
|
|
"MD5 computation error for %s: %s\n",
|
|
|
|
name, boincerror(retval)
|
2003-11-29 02:41:28 +00:00
|
|
|
);
|
2004-09-02 16:23:21 +00:00
|
|
|
error_msg = "MD5 computation error";
|
2005-06-07 23:12:47 +00:00
|
|
|
status = retval;
|
2003-11-29 02:41:28 +00:00
|
|
|
return retval;
|
|
|
|
}
|
2004-09-02 16:23:21 +00:00
|
|
|
if (strcmp(cksum, md5_cksum)) {
|
2007-01-19 20:56:49 +00:00
|
|
|
if (show_errors) {
|
2007-01-25 23:39:06 +00:00
|
|
|
msg_printf(project, MSG_INTERNAL_ERROR,
|
2007-01-19 20:56:49 +00:00
|
|
|
"MD5 check failed for %s", name
|
|
|
|
);
|
2007-01-25 23:39:06 +00:00
|
|
|
msg_printf(project, MSG_INTERNAL_ERROR,
|
2007-01-19 20:56:49 +00:00
|
|
|
"expected %s, got %s\n", md5_cksum, cksum
|
|
|
|
);
|
|
|
|
}
|
2004-09-02 16:23:21 +00:00
|
|
|
error_msg = "MD5 check failed";
|
2005-06-07 23:12:47 +00:00
|
|
|
status = ERR_MD5_FAILED;
|
2002-08-15 21:52:04 +00:00
|
|
|
return ERR_MD5_FAILED;
|
|
|
|
}
|
2002-07-07 20:39:24 +00:00
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2002-08-21 19:12:42 +00:00
|
|
|
// scan all FILE_INFOs and PERS_FILE_XFERs.
|
|
|
|
// start and finish downloads and uploads as needed.
|
2002-07-15 23:21:20 +00:00
|
|
|
//
|
2005-06-07 19:22:50 +00:00
|
|
|
bool CLIENT_STATE::handle_pers_file_xfers() {
|
2002-04-30 22:22:54 +00:00
|
|
|
unsigned int i;
|
|
|
|
FILE_INFO* fip;
|
2002-08-07 22:52:10 +00:00
|
|
|
PERS_FILE_XFER *pfx;
|
2002-04-30 22:22:54 +00:00
|
|
|
bool action = false;
|
2003-11-02 22:51:49 +00:00
|
|
|
int retval;
|
2004-10-14 22:01:05 +00:00
|
|
|
static double last_time;
|
|
|
|
|
2005-06-07 19:22:50 +00:00
|
|
|
if (gstate.now - last_time < 1.0) return false;
|
|
|
|
last_time = gstate.now;
|
2002-04-30 22:22:54 +00:00
|
|
|
|
2003-02-20 00:06:07 +00:00
|
|
|
// Look for FILE_INFOs for which we should start a transfer,
|
|
|
|
// and make PERS_FILE_XFERs for them
|
|
|
|
//
|
2002-04-30 22:22:54 +00:00
|
|
|
for (i=0; i<file_infos.size(); i++) {
|
|
|
|
fip = file_infos[i];
|
2002-08-07 22:52:10 +00:00
|
|
|
pfx = fip->pers_file_xfer;
|
2002-08-28 21:50:51 +00:00
|
|
|
if (pfx) continue;
|
2002-08-23 00:53:00 +00:00
|
|
|
if (!fip->generated_locally && fip->status == FILE_NOT_PRESENT) {
|
2002-08-07 22:52:10 +00:00
|
|
|
pfx = new PERS_FILE_XFER;
|
2002-08-15 21:52:04 +00:00
|
|
|
pfx->init(fip, false);
|
2002-08-07 22:52:10 +00:00
|
|
|
fip->pers_file_xfer = pfx;
|
2003-07-29 23:26:32 +00:00
|
|
|
pers_file_xfers->insert(fip->pers_file_xfer);
|
2002-04-30 22:22:54 +00:00
|
|
|
action = true;
|
2002-08-23 00:53:00 +00:00
|
|
|
} else if (fip->upload_when_present && fip->status == FILE_PRESENT && !fip->uploaded) {
|
2002-08-07 22:52:10 +00:00
|
|
|
pfx = new PERS_FILE_XFER;
|
2002-08-23 00:53:00 +00:00
|
|
|
pfx->init(fip, true);
|
2002-08-07 22:52:10 +00:00
|
|
|
fip->pers_file_xfer = pfx;
|
2003-07-29 23:26:32 +00:00
|
|
|
pers_file_xfers->insert(fip->pers_file_xfer);
|
2002-04-30 22:22:54 +00:00
|
|
|
action = true;
|
2004-08-05 21:42:26 +00:00
|
|
|
|
2002-04-30 22:22:54 +00:00
|
|
|
}
|
|
|
|
}
|
2002-08-21 19:12:42 +00:00
|
|
|
|
2003-02-20 00:06:07 +00:00
|
|
|
// Scan existing PERS_FILE_XFERs, looking for those that are done,
|
|
|
|
// and deleting them
|
|
|
|
//
|
|
|
|
vector<PERS_FILE_XFER*>::iterator iter;
|
2003-07-29 23:26:32 +00:00
|
|
|
iter = pers_file_xfers->pers_file_xfers.begin();
|
|
|
|
while (iter != pers_file_xfers->pers_file_xfers.end()) {
|
2003-02-20 00:06:07 +00:00
|
|
|
pfx = *iter;
|
2002-08-23 00:53:00 +00:00
|
|
|
|
2002-08-21 19:12:42 +00:00
|
|
|
// If the transfer finished, remove the PERS_FILE_XFER object
|
|
|
|
// from the set and delete it
|
2002-08-28 21:50:51 +00:00
|
|
|
//
|
2004-09-04 05:21:33 +00:00
|
|
|
if (pfx->pers_xfer_done) {
|
2003-11-02 22:51:49 +00:00
|
|
|
fip = pfx->fip;
|
2004-07-06 18:31:56 +00:00
|
|
|
if (fip->generated_locally || fip->upload_when_present) {
|
2003-11-02 22:51:49 +00:00
|
|
|
// file has been uploaded - delete if not sticky
|
|
|
|
//
|
|
|
|
if (!fip->sticky) {
|
|
|
|
fip->delete_file();
|
|
|
|
}
|
|
|
|
fip->uploaded = true;
|
2005-04-28 23:19:58 +00:00
|
|
|
active_tasks.upload_notify_app(fip);
|
2005-03-10 00:43:22 +00:00
|
|
|
} else if (fip->status >= 0) {
|
|
|
|
// file transfer did not fail (non-negative status)
|
2003-11-02 22:51:49 +00:00
|
|
|
|
|
|
|
// verify the file with RSA or MD5, and change permissions
|
|
|
|
//
|
2007-01-19 20:56:49 +00:00
|
|
|
retval = fip->verify_file(true, true);
|
2003-11-02 22:51:49 +00:00
|
|
|
if (retval) {
|
2007-01-25 23:39:06 +00:00
|
|
|
msg_printf(fip->project, MSG_INTERNAL_ERROR,
|
2005-03-01 19:56:30 +00:00
|
|
|
"Checksum or signature error for %s", fip->name
|
|
|
|
);
|
2003-11-02 22:51:49 +00:00
|
|
|
fip->status = retval;
|
|
|
|
} else {
|
|
|
|
// Set the appropriate permissions depending on whether
|
|
|
|
// it's an executable or normal file
|
|
|
|
//
|
|
|
|
retval = fip->set_permissions();
|
|
|
|
fip->status = FILE_PRESENT;
|
|
|
|
}
|
|
|
|
|
2006-06-26 19:08:00 +00:00
|
|
|
// if it's a user file, tell running apps to reread prefs
|
2003-11-02 22:51:49 +00:00
|
|
|
//
|
|
|
|
if (fip->is_user_file) {
|
|
|
|
active_tasks.request_reread_prefs(fip->project);
|
|
|
|
}
|
2006-06-26 22:58:24 +00:00
|
|
|
|
|
|
|
// if it's a project file, make a link in project dir
|
|
|
|
//
|
|
|
|
if (fip->is_project_file) {
|
|
|
|
PROJECT* p = fip->project;
|
2006-07-25 21:07:14 +00:00
|
|
|
p->write_symlink_for_project_file(fip);
|
2006-10-12 19:43:55 +00:00
|
|
|
p->update_project_files_downloaded_time();
|
2006-06-26 22:58:24 +00:00
|
|
|
}
|
2003-11-02 22:51:49 +00:00
|
|
|
}
|
2003-07-29 23:26:32 +00:00
|
|
|
iter = pers_file_xfers->pers_file_xfers.erase(iter);
|
2002-08-21 19:12:42 +00:00
|
|
|
delete pfx;
|
|
|
|
action = true;
|
2003-07-23 22:24:28 +00:00
|
|
|
// `delete pfx' should have set pfx->fip->pfx to NULL
|
2003-11-02 22:51:49 +00:00
|
|
|
assert (fip == NULL || fip->pers_file_xfer == NULL);
|
2003-02-20 00:58:55 +00:00
|
|
|
} else {
|
|
|
|
iter++;
|
2002-08-21 19:12:42 +00:00
|
|
|
}
|
|
|
|
}
|
2003-07-02 02:02:18 +00:00
|
|
|
|
2002-04-30 22:22:54 +00:00
|
|
|
return action;
|
|
|
|
}
|
2004-12-08 00:40:19 +00:00
|
|
|
|
2006-07-25 16:45:21 +00:00
|
|
|
// called at startup to ensure that if the core client
|
|
|
|
// thinks a file is there, it's actually there
|
|
|
|
//
|
|
|
|
void CLIENT_STATE::check_file_existence() {
|
|
|
|
unsigned int i;
|
|
|
|
char path[1024];
|
|
|
|
|
|
|
|
for (i=0; i<file_infos.size(); i++) {
|
|
|
|
FILE_INFO* fip = file_infos[i];
|
|
|
|
if (fip->status == FILE_PRESENT) {
|
2007-03-13 19:33:27 +00:00
|
|
|
get_pathname(fip, path, sizeof(path));
|
2006-07-25 16:45:21 +00:00
|
|
|
if (!boinc_file_exists(path)) {
|
|
|
|
fip->status = FILE_NOT_PRESENT;
|
|
|
|
msg_printf(NULL, MSG_INFO,
|
|
|
|
"file %s not found", path
|
|
|
|
);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2005-04-28 23:19:58 +00:00
|
|
|
|
2005-01-02 18:29:53 +00:00
|
|
|
const char *BOINC_RCSID_66410b3cab = "$Id$";
|