2008-08-06 18:36:30 +00:00
|
|
|
// This file is part of BOINC.
|
2005-01-20 23:22:22 +00:00
|
|
|
// http://boinc.berkeley.edu
|
2008-08-06 18:36:30 +00:00
|
|
|
// Copyright (C) 2008 University of California
|
2003-07-02 02:02:18 +00:00
|
|
|
//
|
2008-08-06 18:36:30 +00:00
|
|
|
// BOINC is free software; you can redistribute it and/or modify it
|
|
|
|
// under the terms of the GNU Lesser General Public License
|
|
|
|
// as published by the Free Software Foundation,
|
|
|
|
// either version 3 of the License, or (at your option) any later version.
|
2003-07-02 02:02:18 +00:00
|
|
|
//
|
2008-08-06 18:36:30 +00:00
|
|
|
// BOINC is distributed in the hope that it will be useful,
|
2005-01-20 23:22:22 +00:00
|
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
|
|
|
|
// See the GNU Lesser General Public License for more details.
|
2002-04-30 22:22:54 +00:00
|
|
|
//
|
2008-08-06 18:36:30 +00:00
|
|
|
// You should have received a copy of the GNU Lesser General Public License
|
|
|
|
// along with BOINC. If not, see <http://www.gnu.org/licenses/>.
|
2002-04-30 22:22:54 +00:00
|
|
|
|
2004-01-30 22:19:19 +00:00
|
|
|
// The "policy" part of file transfer is here.
|
|
|
|
// The "mechanism" part is in pers_file_xfer.C and file_xfer.C
|
2002-04-30 22:22:54 +00:00
|
|
|
//
|
|
|
|
|
2003-10-16 19:03:49 +00:00
|
|
|
#include "cpp.h"
|
2002-06-06 18:42:01 +00:00
|
|
|
|
|
|
|
#ifdef _WIN32
|
2004-06-16 23:16:08 +00:00
|
|
|
#include "boinc_win.h"
|
2010-05-11 19:10:29 +00:00
|
|
|
#else
|
2005-11-21 18:34:44 +00:00
|
|
|
#include "config.h"
|
2003-07-23 22:24:28 +00:00
|
|
|
#include <cassert>
|
2002-04-30 22:22:54 +00:00
|
|
|
#include <sys/stat.h>
|
2002-06-06 18:42:01 +00:00
|
|
|
#include <sys/types.h>
|
2004-03-04 11:41:43 +00:00
|
|
|
#endif
|
2002-04-30 22:22:54 +00:00
|
|
|
|
|
|
|
#include "md5_file.h"
|
2002-07-07 20:39:24 +00:00
|
|
|
#include "crypt.h"
|
2007-02-21 16:26:51 +00:00
|
|
|
#include "str_util.h"
|
2004-04-08 08:15:23 +00:00
|
|
|
#include "filesys.h"
|
2008-09-04 12:50:54 +00:00
|
|
|
#include "cert_sig.h"
|
2004-04-08 08:15:23 +00:00
|
|
|
#include "error_numbers.h"
|
2006-01-17 22:48:09 +00:00
|
|
|
|
2002-04-30 22:22:54 +00:00
|
|
|
#include "file_names.h"
|
2002-06-01 20:26:21 +00:00
|
|
|
#include "client_types.h"
|
2002-04-30 22:22:54 +00:00
|
|
|
#include "client_state.h"
|
2004-04-08 08:15:23 +00:00
|
|
|
#include "client_msgs.h"
|
|
|
|
#include "file_xfer.h"
|
2002-04-30 22:22:54 +00:00
|
|
|
|
2004-06-30 18:17:21 +00:00
|
|
|
using std::vector;
|
|
|
|
|
2003-03-02 19:24:09 +00:00
|
|
|
// Decide whether to consider starting a new file transfer
|
2002-08-30 22:11:36 +00:00
|
|
|
//
|
2003-12-02 22:47:32 +00:00
|
|
|
bool CLIENT_STATE::start_new_file_xfer(PERS_FILE_XFER& pfx) {
|
|
|
|
unsigned int i;
|
2007-02-20 04:18:02 +00:00
|
|
|
int ntotal=0, nproj=0;
|
2003-12-02 22:47:32 +00:00
|
|
|
|
2005-12-24 06:32:07 +00:00
|
|
|
if (network_suspended) return false;
|
2010-04-26 19:31:28 +00:00
|
|
|
if (file_xfers_suspended) return false;
|
2003-12-02 22:47:32 +00:00
|
|
|
|
2006-10-23 21:00:36 +00:00
|
|
|
|
2003-12-02 22:47:32 +00:00
|
|
|
// limit the number of file transfers per project
|
2007-02-20 04:18:02 +00:00
|
|
|
// (uploads and downloads are limited separately)
|
2003-12-02 22:47:32 +00:00
|
|
|
//
|
|
|
|
for (i=0; i<file_xfers->file_xfers.size(); i++) {
|
|
|
|
FILE_XFER* fxp = file_xfers->file_xfers[i];
|
2007-02-20 04:18:02 +00:00
|
|
|
if (pfx.is_upload == fxp->is_upload) {
|
|
|
|
ntotal++;
|
|
|
|
if (pfx.fip->project == fxp->fip->project) {
|
|
|
|
nproj++;
|
|
|
|
}
|
2003-12-02 22:47:32 +00:00
|
|
|
}
|
|
|
|
}
|
2007-02-20 04:18:02 +00:00
|
|
|
if (nproj >= config.max_file_xfers_per_project) return false;
|
2011-01-06 23:09:13 +00:00
|
|
|
if (ntotal >= config.max_file_xfers) return false;
|
2003-12-02 22:47:32 +00:00
|
|
|
return true;
|
2002-08-30 22:11:36 +00:00
|
|
|
}
|
|
|
|
|
2003-03-02 19:24:09 +00:00
|
|
|
// Make a directory for each of the projects in the client state
|
2002-08-22 21:29:58 +00:00
|
|
|
//
|
|
|
|
int CLIENT_STATE::make_project_dirs() {
|
|
|
|
unsigned int i;
|
2003-03-08 23:48:05 +00:00
|
|
|
int retval;
|
2002-08-22 21:29:58 +00:00
|
|
|
for (i=0; i<projects.size(); i++) {
|
2003-03-08 23:48:05 +00:00
|
|
|
retval = make_project_dir(*projects[i]);
|
|
|
|
if (retval) return retval;
|
2002-08-22 21:29:58 +00:00
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2008-09-04 12:17:58 +00:00
|
|
|
// Is app signed by one of the Application Certifiers?
|
|
|
|
//
|
|
|
|
bool FILE_INFO::verify_file_certs() {
|
2008-09-04 12:50:54 +00:00
|
|
|
char file[256];
|
2008-09-04 12:17:58 +00:00
|
|
|
bool retval = false;
|
|
|
|
|
|
|
|
if (!is_dir(CERTIFICATE_DIRECTORY)) return false;
|
|
|
|
DIRREF dir = dir_open(CERTIFICATE_DIRECTORY);
|
2008-09-04 15:13:54 +00:00
|
|
|
while (dir_scan(file, dir, sizeof(file))) {
|
2008-09-04 12:50:54 +00:00
|
|
|
if (cert_verify_file(cert_sigs, file, CERTIFICATE_DIRECTORY)) {
|
2008-09-04 12:17:58 +00:00
|
|
|
msg_printf(project, MSG_INFO,
|
2008-09-04 12:50:54 +00:00
|
|
|
"Signature verified using certificate %s", file
|
2008-09-04 12:17:58 +00:00
|
|
|
);
|
|
|
|
retval = true;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
dir_close(dir);
|
|
|
|
return retval;
|
|
|
|
}
|
|
|
|
|
2006-06-20 17:36:28 +00:00
|
|
|
// Check the existence and/or validity of a file
|
|
|
|
// If "strict" is true, check either the digital signature of the file
|
|
|
|
// (if signature_required is set) or its MD5 checksum.
|
|
|
|
// Otherwise check its size.
|
|
|
|
//
|
2005-04-12 22:53:35 +00:00
|
|
|
// This is called
|
|
|
|
// 1) right after download is finished (CLIENT_STATE::handle_pers_file_xfers())
|
|
|
|
// 2) if a needed file is already on disk (PERS_FILE_XFER::start_xfer())
|
|
|
|
// 3) in checking whether a result's input files are available
|
|
|
|
// (CLIENT_STATE::input_files_available()).
|
2006-04-28 17:23:00 +00:00
|
|
|
// In this case "strict" is false,
|
2005-06-07 23:12:47 +00:00
|
|
|
// and we just check existence and size (no checksum)
|
|
|
|
//
|
|
|
|
// If a failure occurs, set the file's "status" field.
|
|
|
|
// This will cause the app_version or workunit that used the file
|
|
|
|
// to error out (via APP_VERSION::had_download_failure()
|
|
|
|
// WORKUNIT::had_download_failure())
|
2002-07-15 23:21:20 +00:00
|
|
|
//
|
2007-01-19 20:56:49 +00:00
|
|
|
int FILE_INFO::verify_file(bool strict, bool show_errors) {
|
2004-09-02 16:23:21 +00:00
|
|
|
char cksum[64], pathname[256];
|
2002-07-07 20:39:24 +00:00
|
|
|
bool verified;
|
|
|
|
int retval;
|
2006-07-25 21:21:50 +00:00
|
|
|
double size, local_nbytes;
|
2002-07-07 20:39:24 +00:00
|
|
|
|
2007-03-13 19:33:27 +00:00
|
|
|
get_pathname(this, pathname, sizeof(pathname));
|
2005-06-07 23:12:47 +00:00
|
|
|
|
- client: add a mechanism for restartable download of compressed files.
(It turns out that the compression schemes supported by
Apache and libcurl, suprisingly, aren't restartable.)
if a <file_info> from the server contains <gzipped_url> tags,
use those instead of the <url> tags,
and flag the file as "download_gzipped".
If this is the case, download NAME.gz and save it as NAME.gzt.
When the download is complete, rename NAME.gzt to NAME.gz,
and uncompress it to NAME.
(this ensures that if NAME.gz is present, it's complete).
Also do the uncompression, if needed, in verify_file().
This ensures that the uncompression will eventually get done
even if the client quits are crashes in the middle.
- update_versions: if <gzip> is present in a <file_info>,
add a gzipped copy in the download directory
and add a <gzipped_url> elements to the app version's xml_doc.
svn path=/trunk/boinc/; revision=25112
2012-01-20 23:34:15 +00:00
|
|
|
if (download_gzipped) {
|
|
|
|
char gzpath[256];
|
|
|
|
sprintf(gzpath, "%s.gz", pathname);
|
|
|
|
if (boinc_file_exists(gzpath) && !boinc_file_exists(pathname)) {
|
|
|
|
retval = gunzip();
|
|
|
|
if (retval) return retval;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2005-06-07 23:12:47 +00:00
|
|
|
// If the file isn't there at all, set status to FILE_NOT_PRESENT;
|
|
|
|
// this will trigger a new download rather than erroring out
|
|
|
|
//
|
2005-04-12 21:54:40 +00:00
|
|
|
if (file_size(pathname, size)) {
|
2005-04-12 22:53:35 +00:00
|
|
|
status = FILE_NOT_PRESENT;
|
2005-04-12 21:54:40 +00:00
|
|
|
return ERR_FILE_MISSING;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (gstate.global_prefs.dont_verify_images
|
|
|
|
&& is_image_file(name)
|
|
|
|
&& size>0
|
|
|
|
) {
|
2005-04-06 19:41:31 +00:00
|
|
|
return 0;
|
|
|
|
}
|
2005-04-12 21:54:40 +00:00
|
|
|
|
2006-05-22 09:54:31 +00:00
|
|
|
if (nbytes && (nbytes != size) && (!config.dont_check_file_sizes)) {
|
2009-09-18 20:49:54 +00:00
|
|
|
if (show_errors) {
|
|
|
|
msg_printf(project, MSG_INTERNAL_ERROR,
|
|
|
|
"File %s has wrong size: expected %.0f, got %.0f",
|
|
|
|
name, nbytes, size
|
|
|
|
);
|
|
|
|
}
|
2005-06-07 23:12:47 +00:00
|
|
|
status = ERR_WRONG_SIZE;
|
2005-04-12 21:54:40 +00:00
|
|
|
return ERR_WRONG_SIZE;
|
|
|
|
}
|
2005-04-12 22:53:35 +00:00
|
|
|
|
|
|
|
if (!strict) return 0;
|
|
|
|
|
2004-09-02 16:23:21 +00:00
|
|
|
if (signature_required) {
|
2008-09-04 12:50:54 +00:00
|
|
|
if (!strlen(file_signature) && !cert_sigs) {
|
2007-01-25 23:39:06 +00:00
|
|
|
msg_printf(project, MSG_INTERNAL_ERROR,
|
2006-01-17 22:48:09 +00:00
|
|
|
"Application file %s missing signature", name
|
|
|
|
);
|
2007-01-25 23:39:06 +00:00
|
|
|
msg_printf(project, MSG_INTERNAL_ERROR,
|
2006-01-17 22:48:09 +00:00
|
|
|
"BOINC cannot accept this file"
|
|
|
|
);
|
2004-09-02 16:23:21 +00:00
|
|
|
error_msg = "missing signature";
|
2005-06-07 23:12:47 +00:00
|
|
|
status = ERR_NO_SIGNATURE;
|
2002-08-30 20:56:02 +00:00
|
|
|
return ERR_NO_SIGNATURE;
|
|
|
|
}
|
2008-09-04 12:17:58 +00:00
|
|
|
if (config.use_certs || config.use_certs_only) {
|
|
|
|
if (verify_file_certs()) {
|
|
|
|
verified = true;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (config.use_certs_only) {
|
|
|
|
msg_printf(project, MSG_INTERNAL_ERROR,
|
|
|
|
"Unable to verify %s using certificates", name
|
|
|
|
);
|
|
|
|
return ERR_NO_SIGNATURE;
|
|
|
|
}
|
2002-07-07 20:39:24 +00:00
|
|
|
retval = verify_file2(
|
2004-09-02 16:23:21 +00:00
|
|
|
pathname, file_signature, project->code_sign_key, verified
|
2002-07-07 20:39:24 +00:00
|
|
|
);
|
2002-08-15 21:52:04 +00:00
|
|
|
if (retval) {
|
2007-01-25 23:39:06 +00:00
|
|
|
msg_printf(project, MSG_INTERNAL_ERROR,
|
2006-01-17 22:48:09 +00:00
|
|
|
"Signature verification error for %s",
|
2004-09-02 16:23:21 +00:00
|
|
|
name
|
2003-10-13 00:41:02 +00:00
|
|
|
);
|
2004-09-02 16:23:21 +00:00
|
|
|
error_msg = "signature verification error";
|
2005-06-07 23:12:47 +00:00
|
|
|
status = ERR_RSA_FAILED;
|
2002-08-15 21:52:04 +00:00
|
|
|
return ERR_RSA_FAILED;
|
2002-07-11 01:09:53 +00:00
|
|
|
}
|
2007-01-19 20:56:49 +00:00
|
|
|
if (!verified && show_errors) {
|
2007-01-25 23:39:06 +00:00
|
|
|
msg_printf(project, MSG_INTERNAL_ERROR,
|
2006-01-17 22:48:09 +00:00
|
|
|
"Signature verification failed for %s",
|
2004-09-02 16:23:21 +00:00
|
|
|
name
|
2003-10-13 00:41:02 +00:00
|
|
|
);
|
2004-09-02 16:23:21 +00:00
|
|
|
error_msg = "signature verification failed";
|
2005-06-07 23:12:47 +00:00
|
|
|
status = ERR_RSA_FAILED;
|
2002-08-13 22:36:54 +00:00
|
|
|
return ERR_RSA_FAILED;
|
2002-07-11 01:09:53 +00:00
|
|
|
}
|
2004-09-02 16:23:21 +00:00
|
|
|
} else if (strlen(md5_cksum)) {
|
2006-07-25 21:21:50 +00:00
|
|
|
retval = md5_file(pathname, cksum, local_nbytes);
|
2003-11-29 02:41:28 +00:00
|
|
|
if (retval) {
|
2007-01-25 23:39:06 +00:00
|
|
|
msg_printf(project, MSG_INTERNAL_ERROR,
|
2006-01-17 22:48:09 +00:00
|
|
|
"MD5 computation error for %s: %s\n",
|
|
|
|
name, boincerror(retval)
|
2003-11-29 02:41:28 +00:00
|
|
|
);
|
2004-09-02 16:23:21 +00:00
|
|
|
error_msg = "MD5 computation error";
|
2005-06-07 23:12:47 +00:00
|
|
|
status = retval;
|
2003-11-29 02:41:28 +00:00
|
|
|
return retval;
|
|
|
|
}
|
2004-09-02 16:23:21 +00:00
|
|
|
if (strcmp(cksum, md5_cksum)) {
|
2007-01-19 20:56:49 +00:00
|
|
|
if (show_errors) {
|
2007-01-25 23:39:06 +00:00
|
|
|
msg_printf(project, MSG_INTERNAL_ERROR,
|
2007-01-19 20:56:49 +00:00
|
|
|
"MD5 check failed for %s", name
|
|
|
|
);
|
2007-01-25 23:39:06 +00:00
|
|
|
msg_printf(project, MSG_INTERNAL_ERROR,
|
2007-01-19 20:56:49 +00:00
|
|
|
"expected %s, got %s\n", md5_cksum, cksum
|
|
|
|
);
|
|
|
|
}
|
2004-09-02 16:23:21 +00:00
|
|
|
error_msg = "MD5 check failed";
|
2005-06-07 23:12:47 +00:00
|
|
|
status = ERR_MD5_FAILED;
|
2002-08-15 21:52:04 +00:00
|
|
|
return ERR_MD5_FAILED;
|
|
|
|
}
|
2002-07-07 20:39:24 +00:00
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2010-09-24 20:02:42 +00:00
|
|
|
#ifndef SIM
|
2011-10-13 19:05:18 +00:00
|
|
|
// scan FILE_INFOs and create PERS_FILE_XFERs as needed.
|
|
|
|
// NOTE: this doesn't start the file transfers
|
|
|
|
// scan PERS_FILE_XFERs and delete finished ones.
|
2002-07-15 23:21:20 +00:00
|
|
|
//
|
2011-11-04 20:25:30 +00:00
|
|
|
bool CLIENT_STATE::create_and_delete_pers_file_xfers() {
|
2002-04-30 22:22:54 +00:00
|
|
|
unsigned int i;
|
|
|
|
FILE_INFO* fip;
|
2002-08-07 22:52:10 +00:00
|
|
|
PERS_FILE_XFER *pfx;
|
2002-04-30 22:22:54 +00:00
|
|
|
bool action = false;
|
2003-11-02 22:51:49 +00:00
|
|
|
int retval;
|
2004-10-14 22:01:05 +00:00
|
|
|
static double last_time;
|
|
|
|
|
2009-02-26 03:24:39 +00:00
|
|
|
if (now - last_time < PERS_FILE_XFER_START_PERIOD) return false;
|
2007-05-10 16:23:10 +00:00
|
|
|
last_time = now;
|
2002-04-30 22:22:54 +00:00
|
|
|
|
2003-02-20 00:06:07 +00:00
|
|
|
// Look for FILE_INFOs for which we should start a transfer,
|
|
|
|
// and make PERS_FILE_XFERs for them
|
|
|
|
//
|
2002-04-30 22:22:54 +00:00
|
|
|
for (i=0; i<file_infos.size(); i++) {
|
|
|
|
fip = file_infos[i];
|
2002-08-07 22:52:10 +00:00
|
|
|
pfx = fip->pers_file_xfer;
|
2002-08-28 21:50:51 +00:00
|
|
|
if (pfx) continue;
|
2011-07-20 19:12:10 +00:00
|
|
|
if (fip->downloadable() && fip->status == FILE_NOT_PRESENT) {
|
2002-08-07 22:52:10 +00:00
|
|
|
pfx = new PERS_FILE_XFER;
|
2002-08-15 21:52:04 +00:00
|
|
|
pfx->init(fip, false);
|
2002-08-07 22:52:10 +00:00
|
|
|
fip->pers_file_xfer = pfx;
|
2003-07-29 23:26:32 +00:00
|
|
|
pers_file_xfers->insert(fip->pers_file_xfer);
|
2002-04-30 22:22:54 +00:00
|
|
|
action = true;
|
2011-07-20 19:12:10 +00:00
|
|
|
} else if (fip->uploadable() && fip->status == FILE_PRESENT && !fip->uploaded) {
|
2002-08-07 22:52:10 +00:00
|
|
|
pfx = new PERS_FILE_XFER;
|
2002-08-23 00:53:00 +00:00
|
|
|
pfx->init(fip, true);
|
2002-08-07 22:52:10 +00:00
|
|
|
fip->pers_file_xfer = pfx;
|
2003-07-29 23:26:32 +00:00
|
|
|
pers_file_xfers->insert(fip->pers_file_xfer);
|
2002-04-30 22:22:54 +00:00
|
|
|
action = true;
|
2004-08-05 21:42:26 +00:00
|
|
|
|
2002-04-30 22:22:54 +00:00
|
|
|
}
|
|
|
|
}
|
2002-08-21 19:12:42 +00:00
|
|
|
|
2003-02-20 00:06:07 +00:00
|
|
|
// Scan existing PERS_FILE_XFERs, looking for those that are done,
|
|
|
|
// and deleting them
|
|
|
|
//
|
|
|
|
vector<PERS_FILE_XFER*>::iterator iter;
|
2003-07-29 23:26:32 +00:00
|
|
|
iter = pers_file_xfers->pers_file_xfers.begin();
|
|
|
|
while (iter != pers_file_xfers->pers_file_xfers.end()) {
|
2003-02-20 00:06:07 +00:00
|
|
|
pfx = *iter;
|
2002-08-23 00:53:00 +00:00
|
|
|
|
2002-08-21 19:12:42 +00:00
|
|
|
// If the transfer finished, remove the PERS_FILE_XFER object
|
|
|
|
// from the set and delete it
|
2002-08-28 21:50:51 +00:00
|
|
|
//
|
2004-09-04 05:21:33 +00:00
|
|
|
if (pfx->pers_xfer_done) {
|
2003-11-02 22:51:49 +00:00
|
|
|
fip = pfx->fip;
|
2011-07-20 19:12:10 +00:00
|
|
|
if (pfx->is_upload) {
|
2003-11-02 22:51:49 +00:00
|
|
|
// file has been uploaded - delete if not sticky
|
|
|
|
//
|
|
|
|
if (!fip->sticky) {
|
|
|
|
fip->delete_file();
|
|
|
|
}
|
|
|
|
fip->uploaded = true;
|
2005-04-28 23:19:58 +00:00
|
|
|
active_tasks.upload_notify_app(fip);
|
2005-03-10 00:43:22 +00:00
|
|
|
} else if (fip->status >= 0) {
|
|
|
|
// file transfer did not fail (non-negative status)
|
2003-11-02 22:51:49 +00:00
|
|
|
|
- client: add a mechanism for restartable download of compressed files.
(It turns out that the compression schemes supported by
Apache and libcurl, suprisingly, aren't restartable.)
if a <file_info> from the server contains <gzipped_url> tags,
use those instead of the <url> tags,
and flag the file as "download_gzipped".
If this is the case, download NAME.gz and save it as NAME.gzt.
When the download is complete, rename NAME.gzt to NAME.gz,
and uncompress it to NAME.
(this ensures that if NAME.gz is present, it's complete).
Also do the uncompression, if needed, in verify_file().
This ensures that the uncompression will eventually get done
even if the client quits are crashes in the middle.
- update_versions: if <gzip> is present in a <file_info>,
add a gzipped copy in the download directory
and add a <gzipped_url> elements to the app version's xml_doc.
svn path=/trunk/boinc/; revision=25112
2012-01-20 23:34:15 +00:00
|
|
|
// If this was a compressed download, rename .gzt to .gz
|
|
|
|
//
|
|
|
|
if (fip->download_gzipped) {
|
|
|
|
char path[256], from_path[256], to_path[256];
|
|
|
|
get_pathname(fip, path, sizeof(path));
|
|
|
|
sprintf(from_path, "%s.gzt", path);
|
|
|
|
sprintf(to_path, "%s.gz", path);
|
|
|
|
boinc_rename(from_path, to_path);
|
|
|
|
}
|
|
|
|
|
2003-11-02 22:51:49 +00:00
|
|
|
// verify the file with RSA or MD5, and change permissions
|
|
|
|
//
|
2007-01-19 20:56:49 +00:00
|
|
|
retval = fip->verify_file(true, true);
|
2003-11-02 22:51:49 +00:00
|
|
|
if (retval) {
|
2007-01-25 23:39:06 +00:00
|
|
|
msg_printf(fip->project, MSG_INTERNAL_ERROR,
|
2005-03-01 19:56:30 +00:00
|
|
|
"Checksum or signature error for %s", fip->name
|
|
|
|
);
|
2003-11-02 22:51:49 +00:00
|
|
|
fip->status = retval;
|
|
|
|
} else {
|
|
|
|
// Set the appropriate permissions depending on whether
|
|
|
|
// it's an executable or normal file
|
|
|
|
//
|
|
|
|
retval = fip->set_permissions();
|
|
|
|
fip->status = FILE_PRESENT;
|
|
|
|
}
|
|
|
|
|
2006-06-26 19:08:00 +00:00
|
|
|
// if it's a user file, tell running apps to reread prefs
|
2003-11-02 22:51:49 +00:00
|
|
|
//
|
|
|
|
if (fip->is_user_file) {
|
|
|
|
active_tasks.request_reread_prefs(fip->project);
|
|
|
|
}
|
2006-06-26 22:58:24 +00:00
|
|
|
|
|
|
|
// if it's a project file, make a link in project dir
|
|
|
|
//
|
|
|
|
if (fip->is_project_file) {
|
|
|
|
PROJECT* p = fip->project;
|
2006-07-25 21:07:14 +00:00
|
|
|
p->write_symlink_for_project_file(fip);
|
2006-10-12 19:43:55 +00:00
|
|
|
p->update_project_files_downloaded_time();
|
2006-06-26 22:58:24 +00:00
|
|
|
}
|
2003-11-02 22:51:49 +00:00
|
|
|
}
|
2003-07-29 23:26:32 +00:00
|
|
|
iter = pers_file_xfers->pers_file_xfers.erase(iter);
|
2002-08-21 19:12:42 +00:00
|
|
|
delete pfx;
|
|
|
|
action = true;
|
2003-07-23 22:24:28 +00:00
|
|
|
// `delete pfx' should have set pfx->fip->pfx to NULL
|
2003-11-02 22:51:49 +00:00
|
|
|
assert (fip == NULL || fip->pers_file_xfer == NULL);
|
2003-02-20 00:58:55 +00:00
|
|
|
} else {
|
|
|
|
iter++;
|
2002-08-21 19:12:42 +00:00
|
|
|
}
|
|
|
|
}
|
2003-07-02 02:02:18 +00:00
|
|
|
|
2002-04-30 22:22:54 +00:00
|
|
|
return action;
|
|
|
|
}
|
2010-09-24 20:02:42 +00:00
|
|
|
#endif
|
2004-12-08 00:40:19 +00:00
|
|
|
|
2006-07-25 16:45:21 +00:00
|
|
|
// called at startup to ensure that if the core client
|
|
|
|
// thinks a file is there, it's actually there
|
|
|
|
//
|
|
|
|
void CLIENT_STATE::check_file_existence() {
|
|
|
|
unsigned int i;
|
|
|
|
char path[1024];
|
|
|
|
|
|
|
|
for (i=0; i<file_infos.size(); i++) {
|
|
|
|
FILE_INFO* fip = file_infos[i];
|
|
|
|
if (fip->status == FILE_PRESENT) {
|
2007-03-13 19:33:27 +00:00
|
|
|
get_pathname(fip, path, sizeof(path));
|
2006-07-25 16:45:21 +00:00
|
|
|
if (!boinc_file_exists(path)) {
|
|
|
|
fip->status = FILE_NOT_PRESENT;
|
|
|
|
msg_printf(NULL, MSG_INFO,
|
|
|
|
"file %s not found", path
|
|
|
|
);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2005-04-28 23:19:58 +00:00
|
|
|
|