// Berkeley Open Infrastructure for Network Computing // http://boinc.berkeley.edu // Copyright (C) 2005 University of California // // This is free software; you can redistribute it and/or // modify it under the terms of the GNU Lesser General Public // License as published by the Free Software Foundation; // either version 2.1 of the License, or (at your option) any later version. // // This software is distributed in the hope that it will be useful, // but WITHOUT ANY WARRANTY; without even the implied warranty of // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. // See the GNU Lesser General Public License for more details. // // To view the GNU Lesser General Public License visit // http://www.gnu.org/copyleft/lesser.html // or write to the Free Software Foundation, Inc., // 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA #ifdef _WIN32 #include "boinc_win.h" #endif #ifndef _WIN32 #include "config.h" #endif #include "parse.h" #include "error_numbers.h" #include "client_msgs.h" #include "util.h" #include "file_names.h" #include "filesys.h" #include "client_state.h" #include "gui_http.h" #include "crypt.h" #include "acct_mgr.h" static const char *run_mode_name[] = {"", "always", "auto", "never"}; // do an account manager RPC; // if url is null, detach from current account manager // int ACCT_MGR_OP::do_rpc( std::string url, std::string name, std::string password_hash ) { int retval; unsigned int i; char buf[256], password[256]; FILE *pwdf; strcpy(buf, url.c_str()); error_num = ERR_IN_PROGRESS; if (!strlen(buf) && strlen(gstate.acct_mgr_info.acct_mgr_url)) { msg_printf(NULL, MSG_INFO, "Removing account manager info"); gstate.acct_mgr_info.clear(); boinc_delete_file(ACCT_MGR_URL_FILENAME); boinc_delete_file(ACCT_MGR_LOGIN_FILENAME); error_num = 0; for (i=0; iattached_via_acct_mgr = false; } return 0; } canonicalize_master_url(buf); if (!valid_master_url(buf)) { error_num = ERR_INVALID_URL; return 0; } strcpy(ami.acct_mgr_url, url.c_str()); strcpy(ami.acct_mgr_name, ""); strcpy(ami.login_name, name.c_str()); strcpy(ami.password_hash, password_hash.c_str()); FILE* f = boinc_fopen(ACCT_MGR_REQUEST_FILENAME, "w"); if (!f) return ERR_FOPEN; fprintf(f, "\n" " %s\n" " %s\n" " %s\n" " %s\n" " %d.%d.%d\n" " %s\n", name.c_str(), password_hash.c_str(), gstate.host_info.host_cpid, gstate.host_info.domain_name, gstate.core_client_major_version, gstate.core_client_minor_version, gstate.core_client_release, run_mode_name[gstate.user_run_request] ); if (strlen(ami.previous_host_cpid)) { fprintf(f, " %s\n", ami.previous_host_cpid ); } if (gstate.acct_mgr_info.send_gui_rpc_info) { // send GUI RPC port and password hash. // User must enable this by hand // this is for the "farm" account manager so it // can know where to send gui rpc requests to // without having to configure each host // if (gstate.cmdline_gui_rpc_port) { fprintf(f," %d\n", gstate.cmdline_gui_rpc_port); } else { fprintf(f," %d\n", GUI_RPC_PORT); } if (boinc_file_exists(GUI_RPC_PASSWD_FILE)) { strcpy(password, ""); pwdf = fopen(GUI_RPC_PASSWD_FILE, "r"); if (pwdf) { fgets(password, 256, pwdf); strip_whitespace(password); fclose(pwdf); } fprintf(f," %s\n", password); } } for (i=0; i\n" " %s\n" " %s\n" " %d\n" " %s\n" " %d\n" "%s" " \n", p->master_url, p->project_name, p->suspended_via_gui, p->authenticator, p->hostid, p->attached_via_acct_mgr?" \n":"" ); } fprintf(f, "\n"); fclose(f); sprintf(buf, "%srpc.php", url.c_str()); retval = gstate.gui_http.do_rpc_post( this, buf, ACCT_MGR_REQUEST_FILENAME, ACCT_MGR_REPLY_FILENAME ); if (retval) { error_num = retval; return retval; } msg_printf(NULL, MSG_INFO, "Contacting account manager at %s", url.c_str()); return 0; } int AM_ACCOUNT::parse(FILE* f) { char buf[256]; int retval; detach = false; url = ""; strcpy(url_signature, ""); authenticator = ""; while (fgets(buf, sizeof(buf), f)) { if (match_tag(buf, "")) { if (url.length() && authenticator.length()) return 0; return ERR_XML_PARSE; } if (parse_str(buf, "", url)) continue; if (match_tag(buf, "")) { retval = copy_element_contents( f, "", url_signature, sizeof(url_signature) ); if (retval) return retval; continue; } if (parse_str(buf, "", authenticator)) continue; if (parse_bool(buf, "detach", detach)) continue; } return ERR_XML_PARSE; } int ACCT_MGR_OP::parse(FILE* f) { char buf[256]; string message; int retval; accounts.clear(); error_str = ""; error_num = 0; repeat_sec = 0; while (fgets(buf, sizeof(buf), f)) { if (match_tag(buf, "")) return 0; if (parse_str(buf, "", ami.acct_mgr_name, 256)) continue; if (parse_int(buf, "", error_num)) continue; if (parse_str(buf, "", error_str)) continue; if (parse_double(buf, "", repeat_sec)) continue; if (parse_str(buf, "", message)) { msg_printf(NULL, MSG_INFO, "Account manager: %s", message.c_str()); continue; } if (match_tag(buf, "")) { retval = copy_element_contents( f, "", ami.signing_key, sizeof(ami.signing_key) ); if (retval) return retval; continue; } if (match_tag(buf, "")) { AM_ACCOUNT account; retval = account.parse(f); if (!retval) accounts.push_back(account); continue; } } return ERR_XML_PARSE; } void ACCT_MGR_OP::handle_reply(int http_op_retval) { unsigned int i; int retval; bool verified; PROJECT* pp; bool sig_ok; if (http_op_retval == 0) { FILE* f = fopen(ACCT_MGR_REPLY_FILENAME, "r"); if (f) { retval = parse(f); fclose(f); } else { retval = ERR_FOPEN; } } else { error_num = http_op_retval; } // check both error_str and error_num since an account manager may only // return a BOINC based error code for password failures or invalid // email addresses // if (error_str.size()) { msg_printf(NULL, MSG_ERROR, "Account manager error: %d %s", error_num, error_str.c_str()); if (!error_num) { error_num = ERR_XML_PARSE; } } else if (error_num) { msg_printf(NULL, MSG_ERROR, "Account manager error: %s", boincerror(error_num)); } if (error_num) return; msg_printf(NULL, MSG_INFO, "Account manager contact succeeded"); // demand a signing key // sig_ok = true; if (!strlen(ami.signing_key)) { msg_printf(NULL, MSG_ERROR, "No signing key from account manager"); sig_ok = false; } // don't accept new signing key if we already have one // if (strlen(gstate.acct_mgr_info.signing_key) && strcmp(gstate.acct_mgr_info.signing_key, ami.signing_key) ) { msg_printf(NULL, MSG_ERROR, "Inconsistent signing key from account manager"); sig_ok = false; } if (sig_ok) { gstate.acct_mgr_info = ami; // attach to new projects // for (i=0; iauthenticator, acct.authenticator.c_str())) { msg_printf(pp, MSG_ERROR, "Already attached under another account" ); } else { msg_printf(pp, MSG_INFO, "Already attached"); pp->attached_via_acct_mgr = true; } } } else { if (!acct.detach) { msg_printf(NULL, MSG_INFO, "Attaching to %s", acct.url.c_str()); gstate.add_project(acct.url.c_str(), acct.authenticator.c_str(), true); } } } } strcpy(ami.previous_host_cpid, gstate.host_info.host_cpid); if (repeat_sec) { gstate.acct_mgr_info.next_rpc_time = gstate.now + repeat_sec; } else { gstate.acct_mgr_info.next_rpc_time = gstate.now + 86400; } gstate.acct_mgr_info.write_info(); gstate.set_client_state_dirty("account manager RPC"); } int ACCT_MGR_INFO::write_info() { FILE* p; if (strlen(acct_mgr_url)) { p = fopen(ACCT_MGR_URL_FILENAME, "w"); if (p) { fprintf(p, "\n" " %s\n" " %s\n", acct_mgr_name, acct_mgr_url ); if (send_gui_rpc_info) fprintf(p," \n"); if (strlen(signing_key)) { fprintf(p, " \n%s\n", signing_key ); } fprintf(p, "\n" ); fclose(p); } } if (strlen(login_name)) { p = fopen(ACCT_MGR_LOGIN_FILENAME, "w"); if (p) { fprintf( p, "\n" " %s\n" " %s\n" " %s\n" " %f\n" "\n", login_name, password_hash, previous_host_cpid, next_rpc_time ); fclose(p); } } return 0; } void ACCT_MGR_INFO::clear() { strcpy(acct_mgr_name, ""); strcpy(acct_mgr_url, ""); strcpy(login_name, ""); strcpy(password_hash, ""); strcpy(signing_key, ""); strcpy(previous_host_cpid, ""); next_rpc_time = 0; send_gui_rpc_info = false; } ACCT_MGR_INFO::ACCT_MGR_INFO() { clear(); } int ACCT_MGR_INFO::init() { char buf[256]; MIOFILE mf; FILE* p; int retval; clear(); p = fopen(ACCT_MGR_URL_FILENAME, "r"); if (!p) return 0; mf.init_file(p); while(mf.fgets(buf, sizeof(buf))) { if (match_tag(buf, "")) break; else if (parse_str(buf, "", acct_mgr_name, 256)) continue; else if (parse_str(buf, "", acct_mgr_url, 256)) continue; else if (match_tag(buf, "")) { send_gui_rpc_info = true; } else if (match_tag(buf, "")) { retval = copy_element_contents( p, "", signing_key, sizeof(signing_key) ); if (retval) return retval; } } fclose(p); p = fopen(ACCT_MGR_LOGIN_FILENAME, "r"); if (p) { mf.init_file(p); while(mf.fgets(buf, sizeof(buf))) { if (match_tag(buf, "")) break; else if (parse_str(buf, "", login_name, 256)) continue; else if (parse_str(buf, "", password_hash, 256)) continue; else if (parse_str(buf, "", previous_host_cpid, sizeof(previous_host_cpid))) continue; else if (parse_double(buf, "", next_rpc_time)) continue; } fclose(p); } return 0; } bool ACCT_MGR_INFO::poll() { if (gstate.acct_mgr_op.error_num == ERR_IN_PROGRESS) return false; // if we do not any any credentials we shouldn't attempt to contact // the account manager should should reject us anyway for a bad // login. This also avoids the bug where the content of // acct_mgr_url.xml is overwritten with incomplete information such // as the account manager name. // if (!strlen(login_name) && !strlen(password_hash)) return false; if (gstate.now > next_rpc_time) { next_rpc_time = gstate.now + 86400; gstate.acct_mgr_op.do_rpc(acct_mgr_url, login_name, password_hash); return true; } return false; } const char *BOINC_RCSID_8fd9e873bf="$Id$";