2002-08-07 22:52:10 +00:00
|
|
|
// There are two possible inputs to this program.
|
|
|
|
// One is for uploading a completed result, this looks as follows:
|
2002-06-14 05:49:34 +00:00
|
|
|
//
|
2002-07-05 05:33:40 +00:00
|
|
|
// <file_info>
|
2002-06-14 05:49:34 +00:00
|
|
|
// ...
|
2002-07-07 20:39:24 +00:00
|
|
|
// <xml_signature>
|
2002-07-05 05:33:40 +00:00
|
|
|
// ...
|
2002-07-07 20:39:24 +00:00
|
|
|
// </xml_signature>
|
2002-07-05 05:33:40 +00:00
|
|
|
// </file_info>
|
|
|
|
// <nbytes>x</nbytes>
|
|
|
|
// <offset>x</offset>
|
|
|
|
// <data>
|
2002-06-14 05:49:34 +00:00
|
|
|
// ... (data)
|
2002-07-05 05:33:40 +00:00
|
|
|
//
|
2002-08-07 22:52:10 +00:00
|
|
|
// The return for an uploaded result looks like
|
2002-07-05 05:33:40 +00:00
|
|
|
//
|
|
|
|
// <status>0</status>
|
|
|
|
// or
|
|
|
|
// <status>2</status>
|
|
|
|
// <error>bad file size</error>
|
2002-08-07 22:52:10 +00:00
|
|
|
//
|
|
|
|
// The other kind of input is a file size request. This is used
|
|
|
|
// to determine how much of a file has been uploaded already.
|
|
|
|
// This kind of request should always be made before starting
|
|
|
|
// a file upload.
|
|
|
|
// The input for this looks as follows:
|
|
|
|
// <file_size_req>result_1234_file</file_size_req>
|
|
|
|
//
|
|
|
|
// The return for this information request looks like
|
|
|
|
//
|
2002-08-12 21:54:19 +00:00
|
|
|
// <status>0</status>
|
2002-08-07 22:52:10 +00:00
|
|
|
// <nbytes>1234</nbytes>
|
|
|
|
//
|
|
|
|
// Where nbytes will be 0 if the file doesn't exist
|
|
|
|
//
|
2002-07-05 05:33:40 +00:00
|
|
|
|
|
|
|
#include <stdio.h>
|
2002-07-12 00:01:11 +00:00
|
|
|
#include <stdlib.h>
|
2002-07-05 05:33:40 +00:00
|
|
|
#include <string.h>
|
2002-07-11 01:09:53 +00:00
|
|
|
#include <assert.h>
|
2002-08-07 22:52:10 +00:00
|
|
|
#include <sys/stat.h>
|
|
|
|
#include <sys/types.h>
|
|
|
|
#include <errno.h>
|
2002-07-05 05:33:40 +00:00
|
|
|
|
|
|
|
#include "parse.h"
|
|
|
|
#include "crypt.h"
|
|
|
|
|
|
|
|
#define MAX_FILES 32
|
|
|
|
|
|
|
|
struct FILE_INFO {
|
|
|
|
char name[256];
|
|
|
|
double max_nbytes;
|
2002-07-07 20:39:24 +00:00
|
|
|
char* xml_signature;
|
2002-07-05 05:33:40 +00:00
|
|
|
char* signed_xml;
|
|
|
|
int parse(FILE*);
|
|
|
|
};
|
|
|
|
|
|
|
|
int FILE_INFO::parse(FILE* in) {
|
|
|
|
char buf[256];
|
|
|
|
int retval;
|
2002-07-11 01:09:53 +00:00
|
|
|
assert(in!=NULL);
|
2002-07-05 05:33:40 +00:00
|
|
|
memset(this, 0, sizeof(FILE_INFO));
|
|
|
|
signed_xml = strdup("");
|
|
|
|
while (fgets(buf, 256, in)) {
|
|
|
|
if (match_tag(buf, "</file_info>")) return 0;
|
2002-07-07 20:39:24 +00:00
|
|
|
else if (match_tag(buf, "<xml_signature>")) {
|
|
|
|
retval = dup_element_contents(in, "</xml_signature>", &xml_signature);
|
2002-07-05 05:33:40 +00:00
|
|
|
if (retval) return retval;
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
strcatdup(signed_xml, buf);
|
|
|
|
if (parse_str(buf, "<name>", name)) continue;
|
|
|
|
if (parse_double(buf, "<max_nbytes>", max_nbytes)) continue;
|
2002-08-26 22:57:17 +00:00
|
|
|
//fprintf(stderr, "file_upload_handler (%s): FILE_INFO::parse: unrecognized: %s \n", BOINC_USER, buf);
|
2002-07-05 05:33:40 +00:00
|
|
|
}
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
int print_status(int status, char* message) {
|
|
|
|
printf("Content-type: text/plain\n\n<status>%d</status>\n", status);
|
2002-08-28 21:50:51 +00:00
|
|
|
if (message) {
|
|
|
|
printf("<error>%s</error>\n", message);
|
|
|
|
fprintf(stderr,
|
|
|
|
"file_upload_handler (%s): status %d: %s>\n",
|
|
|
|
BOINC_USER, status, message
|
|
|
|
);
|
|
|
|
}
|
2002-07-05 05:33:40 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
#define BLOCK_SIZE 16382
|
|
|
|
|
|
|
|
// read from socket, write to file
|
|
|
|
//
|
2002-07-07 20:39:24 +00:00
|
|
|
int copy_socket_to_file(FILE* in, char* path, double offset, double nbytes) {
|
2002-07-05 05:33:40 +00:00
|
|
|
unsigned char buf[BLOCK_SIZE];
|
|
|
|
FILE* out;
|
|
|
|
int retval, n, m;
|
|
|
|
double bytes_left;
|
2002-07-11 01:09:53 +00:00
|
|
|
assert(in!=NULL);
|
|
|
|
assert(path!=NULL);
|
|
|
|
assert(offset>=0);
|
|
|
|
assert(nbytes>=0);
|
2002-07-05 05:33:40 +00:00
|
|
|
out = fopen(path, "wb");
|
|
|
|
if (!out) {
|
|
|
|
print_status(-1, "can't open file");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
// TODO: use a 64-bit variant
|
|
|
|
retval = fseek(out, (long)offset, SEEK_SET);
|
|
|
|
if (retval) {
|
|
|
|
fclose(out);
|
|
|
|
print_status(-1, "can't fseek file");
|
|
|
|
return retval;
|
|
|
|
}
|
|
|
|
bytes_left = nbytes - offset;
|
|
|
|
while (1) {
|
|
|
|
m = BLOCK_SIZE;
|
|
|
|
if (m > bytes_left) m = (int)bytes_left;
|
|
|
|
n = fread(buf, 1, m, in);
|
|
|
|
if (n <= 0) {
|
|
|
|
print_status(-1, "can't fread socket");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
m = fwrite(buf, 1, n, out);
|
|
|
|
if (m != n) {
|
|
|
|
print_status(-1, "can't fwrite file");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
bytes_left -= n;
|
|
|
|
if (bytes_left == 0) break;
|
|
|
|
}
|
|
|
|
fclose(out);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
int handle_request(FILE* in, R_RSA_PUBLIC_KEY& key) {
|
|
|
|
char buf[256];
|
|
|
|
double nbytes=0, offset=0;
|
2002-08-07 22:52:10 +00:00
|
|
|
char path[256],file_name[256];
|
2002-07-05 05:33:40 +00:00
|
|
|
FILE_INFO file_info;
|
|
|
|
int retval;
|
|
|
|
bool is_valid;
|
2002-07-11 01:09:53 +00:00
|
|
|
assert(in!=NULL);
|
2002-07-05 05:33:40 +00:00
|
|
|
while (fgets(buf, 256, in)) {
|
|
|
|
if (match_tag(buf, "<file_info>")) {
|
|
|
|
retval = file_info.parse(in);
|
2002-07-18 21:29:50 +00:00
|
|
|
if (retval) {
|
2002-08-28 21:50:51 +00:00
|
|
|
fprintf(stderr,
|
|
|
|
"file_upload_handler (%s): FILE_INFO.parse\n",
|
|
|
|
BOINC_USER
|
|
|
|
);
|
|
|
|
return retval;
|
|
|
|
}
|
2002-07-05 05:33:40 +00:00
|
|
|
retval = verify_string(
|
2002-07-07 20:39:24 +00:00
|
|
|
file_info.signed_xml, file_info.xml_signature, key, is_valid
|
2002-07-05 05:33:40 +00:00
|
|
|
);
|
|
|
|
if (retval || !is_valid) {
|
2002-07-07 20:39:24 +00:00
|
|
|
print_status(-1, "invalid XML signature");
|
2002-07-05 05:33:40 +00:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
continue;
|
|
|
|
}
|
2002-08-07 22:52:10 +00:00
|
|
|
// Handle a file size request
|
|
|
|
else if (parse_str(buf, "<file_size_req>", file_name)) {
|
|
|
|
struct stat sbuf;
|
2002-08-28 21:50:51 +00:00
|
|
|
// TODO: check to ensure path doesn't point somewhere bad
|
|
|
|
//
|
2002-08-07 22:52:10 +00:00
|
|
|
sprintf( path, "%s/%s", BOINC_UPLOAD_DIR, file_name );
|
|
|
|
retval = stat( path, &sbuf );
|
2002-08-28 21:50:51 +00:00
|
|
|
if (retval && errno != ENOENT) {
|
|
|
|
print_status( -1, "cannot open file" );
|
|
|
|
} else if (retval) {
|
|
|
|
printf(
|
|
|
|
"Content-type: text/plain\n\n<nbytes>0</nbytes>\n"
|
|
|
|
"<status>0</status>\n"
|
|
|
|
);
|
|
|
|
} else {
|
|
|
|
printf(
|
|
|
|
"Content-type: text/plain\n\n<nbytes>%d</nbytes>\n"
|
|
|
|
"<status>0</status>\n", (int)sbuf.st_size
|
|
|
|
);
|
|
|
|
}
|
2002-08-07 22:52:10 +00:00
|
|
|
exit(0);
|
|
|
|
}
|
2002-07-05 05:33:40 +00:00
|
|
|
else if (parse_double(buf, "<offset>", offset)) continue;
|
|
|
|
else if (parse_double(buf, "<nbytes>", nbytes)) continue;
|
|
|
|
else if (match_tag(buf, "<data>")) {
|
|
|
|
if (nbytes == 0) {
|
|
|
|
print_status(-1, "nbytes missing");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
// enforce limits in signed XML
|
|
|
|
if (nbytes > file_info.max_nbytes) {
|
|
|
|
sprintf(buf,
|
2002-07-05 05:43:57 +00:00
|
|
|
"nbytes too large: %f > %f",
|
2002-07-05 05:33:40 +00:00
|
|
|
nbytes, file_info.max_nbytes
|
|
|
|
);
|
|
|
|
print_status(-1, buf);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2002-07-12 19:19:31 +00:00
|
|
|
sprintf(path, "%s/%s", BOINC_UPLOAD_DIR, file_info.name);
|
2002-07-07 20:39:24 +00:00
|
|
|
retval = copy_socket_to_file(in, path, offset, nbytes);
|
2002-08-28 21:50:51 +00:00
|
|
|
if (retval) {
|
|
|
|
fprintf(stderr,
|
|
|
|
"file_upload_handler (%s): copy_socket_to_file %d %s\n",
|
|
|
|
BOINC_USER, retval, path
|
|
|
|
);
|
|
|
|
}
|
2002-07-05 05:33:40 +00:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
int get_key(R_RSA_PUBLIC_KEY& key) {
|
|
|
|
FILE* f;
|
|
|
|
int retval;
|
2002-07-12 18:27:29 +00:00
|
|
|
char buf[256];
|
2002-07-12 19:19:31 +00:00
|
|
|
sprintf(buf, "%s/upload_public", BOINC_KEY_DIR);
|
2002-07-12 18:27:29 +00:00
|
|
|
f = fopen(buf, "r");
|
2002-07-05 05:33:40 +00:00
|
|
|
if (!f) return -1;
|
|
|
|
retval = scan_key_hex(f, (KEY*)&key, sizeof(key));
|
|
|
|
fclose(f);
|
|
|
|
if (retval) return retval;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
int main() {
|
|
|
|
int retval;
|
|
|
|
R_RSA_PUBLIC_KEY key;
|
|
|
|
|
|
|
|
retval = get_key(key);
|
|
|
|
if (retval) {
|
2002-07-09 00:10:58 +00:00
|
|
|
fprintf(stderr, "file_upload_handler: can't read key file\n");
|
2002-07-05 05:33:40 +00:00
|
|
|
print_status(-1, "can't read key file");
|
|
|
|
exit(0);
|
|
|
|
}
|
|
|
|
|
|
|
|
retval = handle_request(stdin, key);
|
|
|
|
if (retval) {
|
2002-07-09 00:10:58 +00:00
|
|
|
fprintf(stderr, "file_upload_handler: handle_request: %d\n", retval);
|
2002-07-05 05:33:40 +00:00
|
|
|
} else {
|
|
|
|
print_status(0, 0);
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|