directory.c 9.39 KB
Newer Older
1
/* Copyright 2001,2002 Roger Dingledine, Matej Pfajfar. */
2
3
4
5
6
7
8
/* See LICENSE for licensing information */
/* $Id$ */

#include "or.h"

#define MAX_DIR_SIZE 50000 /* XXX, big enough? */

9
static int directory_send_command(connection_t *conn, int command);
Roger Dingledine's avatar
Roger Dingledine committed
10
11
12
static void directory_rebuild(void);
static int directory_handle_command(connection_t *conn);

13
14
15
16
17
18
/********* START VARIABLES **********/

extern or_options_t options; /* command-line and config-file options */

static char the_directory[MAX_DIR_SIZE+1];
static int directorylen=0;
19
static int directory_dirty=1;
20

21
static char fetchstring[] = "GET / HTTP/1.0\r\n\r\n";
22
static char answerstring[] = "HTTP/1.0 200 OK\r\n\r\n";
23
24
25

/********* END VARIABLES ************/

26
void directory_initiate_command(routerinfo_t *router, int command) {
27
28
29
30
31
  connection_t *conn;

  if(!router) /* i guess they didn't have one in mind for me to use */
    return;

32
33
#if 0 /* there's no problem with parallel get/posts now. whichever 'get' ends
         last is the directory. */
34
35
  if(connection_get_by_type(CONN_TYPE_DIR)) { /* there's already a dir conn running */
    log_fn(LOG_DEBUG,"Canceling connect, dir conn already active.");
36
    return;
37
  }
38
#endif
39

40
41
  if(command == DIR_CONN_STATE_CONNECTING_FETCH)
    log_fn(LOG_DEBUG,"initiating directory fetch");
42
  else
43
    log_fn(LOG_DEBUG,"initiating directory upload");
44

45
46
47
  conn = connection_new(CONN_TYPE_DIR);

  /* set up conn so it's got all the data we need to remember */
Roger Dingledine's avatar
Roger Dingledine committed
48
49
  conn->addr = router->addr;
  conn->port = router->dir_port;
50
  conn->address = strdup(router->address);
51
52
  if (router->identity_pkey)
    conn->identity_pkey = crypto_pk_dup_key(router->identity_pkey);
Nick Mathewson's avatar
Nick Mathewson committed
53
  else {
54
    log_fn(LOG_WARNING, "No signing key known for dirserver %s; signature won't be checked", conn->address);
55
    conn->identity_pkey = NULL;
56
    /* XXX is there really any situation where router doesn't have an identity_pkey? */
Nick Mathewson's avatar
Nick Mathewson committed
57
  }
58

59
  if(connection_add(conn) < 0) { /* no space, forget it */
60
61
62
63
    connection_free(conn);
    return;
  }

64
65
  switch(connection_connect(conn, router->address, router->addr, router->dir_port)) {
    case -1:
66
      router_forget_router(conn->addr, conn->port); /* XXX don't try him again */
67
68
      connection_free(conn);
      return;
69
70
    case 0:
      connection_set_poll_socket(conn);
71
72
73
      connection_watch_events(conn, POLLIN | POLLOUT | POLLERR);
      /* writable indicates finish, readable indicates broken link,
         error indicates broken link in windowsland. */
74
      conn->state = command;
75
      return;
76
    /* case 1: fall through */
77
78
  }

79
  connection_set_poll_socket(conn);
80
  if(directory_send_command(conn, command) < 0) {
81
82
83
84
85
    connection_remove(conn);
    connection_free(conn);
  }
}

86
static int directory_send_command(connection_t *conn, int command) {
87
88
  const char *s;
  char tmp[8192];
89
90
91

  assert(conn && conn->type == CONN_TYPE_DIR);

92
  switch(command) {
93
94
    case DIR_CONN_STATE_CONNECTING_FETCH:
      if(connection_write_to_buf(fetchstring, strlen(fetchstring), conn) < 0) {
95
        log_fn(LOG_WARNING,"Couldn't write fetch to buffer.");
96
97
        return -1;
      }
98
      conn->state = DIR_CONN_STATE_CLIENT_SENDING_FETCH;
99
      break;
100
    case DIR_CONN_STATE_CONNECTING_UPLOAD:
101
102
      s = router_get_my_descriptor();
      if(!s) {
103
        log_fn(LOG_WARNING,"Failed to get my descriptor.");
104
105
        return -1;
      }
106
107
108
      snprintf(tmp, sizeof(tmp), "POST / HTTP/1.0\r\nContent-Length: %d\r\n\r\n%s",
               strlen(s), s);
      if(connection_write_to_buf(tmp, strlen(tmp), conn) < 0) {
109
        log_fn(LOG_WARNING,"Couldn't write post/descriptor to buffer.");
110
111
        return -1;
      }
112
      conn->state = DIR_CONN_STATE_CLIENT_SENDING_UPLOAD;
113
      break;
114
115
116
117
  }
  return 0;
}

118
119
120
void directory_set_dirty(void) {
  directory_dirty = 1;
}
121

Roger Dingledine's avatar
Roger Dingledine committed
122
static void directory_rebuild(void) {
123
  if(directory_dirty) {
124
    if (dump_signed_directory_to_string(the_directory, MAX_DIR_SIZE,
125
                                        get_identity_key())) {
126
      log(LOG_WARNING, "Error creating directory");
127
128
      return;
    }
129
    directorylen = strlen(the_directory);
130
    log(LOG_INFO,"New directory (size %d):\n%s",directorylen,the_directory);
131
132
133
134
    directory_dirty = 0;
  } else {
    log(LOG_INFO,"Directory still clean, reusing.");
  }
135
136
137
138
139
140
141
}

int connection_dir_process_inbuf(connection_t *conn) {

  assert(conn && conn->type == CONN_TYPE_DIR);

  if(conn->inbuf_reached_eof) {
142
    switch(conn->state) {
143
      case DIR_CONN_STATE_CLIENT_READING_FETCH:
144
        /* kill it, but first process the_directory and learn about new routers. */
145
        switch(fetch_from_buf_http(conn->inbuf,
146
                                   NULL, 0, the_directory, MAX_DIR_SIZE)) {
147
          case -1: /* overflow */
148
            log_fn(LOG_WARNING,"'fetch' response too large. Failing.");
149
150
            return -1;
          case 0:
151
            log_fn(LOG_INFO,"'fetch' response not all here, but we're at eof. Closing.");
152
153
154
            return -1;
          /* case 1, fall through */
        }
155
        /* XXX check headers, at least make sure returned 2xx */
156
        directorylen = strlen(the_directory);
157
        log_fn(LOG_INFO,"Received directory (size %d):\n%s", directorylen, the_directory);
158
        if(directorylen == 0) {
159
          log_fn(LOG_INFO,"Empty directory. Ignoring.");
160
161
          return -1;
        }
162
        if(router_get_dir_from_string(the_directory, conn->identity_pkey) < 0){
163
          log_fn(LOG_INFO,"...but parsing failed. Ignoring.");
164
        } else {
165
          log_fn(LOG_INFO,"and got an %s directory; updated routers.", 
166
              conn->identity_pkey ? "authenticated" : "unauthenticated");
167
168
169
170
171
        }
        if(options.OnionRouter) { /* connect to them all */
          router_retry_connections();
        }
        return -1;
172
      case DIR_CONN_STATE_CLIENT_READING_UPLOAD:
173
        /* XXX make sure there's a 200 OK on the buffer */
174
        log_fn(LOG_INFO,"eof while reading upload response. Finished.");
175
176
        return -1;
      default:
177
        log_fn(LOG_INFO,"conn reached eof, not reading. Closing.");
178
        return -1;
Roger Dingledine's avatar
cleanup    
Roger Dingledine committed
179
    }
180
181
  }

182
183
184
185
  if(conn->state == DIR_CONN_STATE_SERVER_COMMAND_WAIT)
    return directory_handle_command(conn);

  /* XXX for READ states, might want to make sure inbuf isn't too big */
186

187
  log_fn(LOG_DEBUG,"Got data, not eof. Leaving on inbuf.");
188
189
190
  return 0;
}

Roger Dingledine's avatar
Roger Dingledine committed
191
static int directory_handle_command(connection_t *conn) {
192
  char headers[1024];
193
  char body[50000]; /* XXX */
194
195
196

  assert(conn && conn->type == CONN_TYPE_DIR);

197
  switch(fetch_from_buf_http(conn->inbuf,
198
                             headers, sizeof(headers), body, sizeof(body))) {
199
    case -1: /* overflow */
200
      log_fn(LOG_WARNING,"input too large. Failing.");
201
202
203
204
205
      return -1;
    case 0:
      log_fn(LOG_DEBUG,"command not all here yet.");
      return 0;
    /* case 1, fall through */
206
207
  }

208
209
  log_fn(LOG_DEBUG,"headers '%s', body '%s'.",headers,body);
  if(!strncasecmp(headers,"GET",3)) {
210
    /* XXX should check url and http version */
211

212
    directory_rebuild(); /* rebuild it now, iff it's dirty */
213

214
    if(directorylen == 0) {
215
      log_fn(LOG_WARNING,"My directory is empty. Closing.");
216
217
      return -1;
    }
218

219
220
221
    log_fn(LOG_DEBUG,"Dumping directory to client."); 
    if((connection_write_to_buf(answerstring, strlen(answerstring), conn) < 0) ||
       (connection_write_to_buf(the_directory, directorylen, conn) < 0)) {
222
      log_fn(LOG_WARNING,"Failed to write answerstring+directory to outbuf.");
223
224
225
226
      return -1;
    }
    conn->state = DIR_CONN_STATE_SERVER_WRITING;
    return 0;
227
228
  }

229
  if(!strncasecmp(headers,"POST",4)) {
230
    /* XXX should check url and http version */
231
232
    log_fn(LOG_DEBUG,"Received POST command, body '%s'", body);
    if(connection_write_to_buf(answerstring, strlen(answerstring), conn) < 0) {
233
      log_fn(LOG_WARNING,"Failed to write answerstring to outbuf.");
234
235
236
237
      return -1;
    }
    conn->state = DIR_CONN_STATE_SERVER_WRITING;
    return 0;
238
239
  }

240
  log_fn(LOG_WARNING,"Got headers with unknown command. Closing.");
241
  return -1;
242
243
244
245
246
247
248
249
}

int connection_dir_finished_flushing(connection_t *conn) {
  int e, len=sizeof(e);

  assert(conn && conn->type == CONN_TYPE_DIR);

  switch(conn->state) {
250
251
    case DIR_CONN_STATE_CONNECTING_FETCH:
    case DIR_CONN_STATE_CONNECTING_UPLOAD:
252
      if (getsockopt(conn->s, SOL_SOCKET, SO_ERROR, (void*)&e, &len) < 0)  { /* not yet */
253
        if(!ERRNO_CONN_EINPROGRESS(errno)) {
254
          log_fn(LOG_DEBUG,"in-progress connect failed. Removing.");
255
          router_forget_router(conn->addr, conn->port); /* don't try him again */
256
257
258
259
260
261
262
          return -1;
        } else {
          return 0; /* no change, see if next time is better */
        }
      }
      /* the connect has finished. */

263
      log_fn(LOG_INFO,"Dir connection to router %s:%u established.",
264
265
          conn->address,conn->port);

266
      return directory_send_command(conn, conn->state);
267
268
269
    case DIR_CONN_STATE_CLIENT_SENDING_FETCH:
      log_fn(LOG_DEBUG,"client finished sending fetch command.");
      conn->state = DIR_CONN_STATE_CLIENT_READING_FETCH;
270
271
      connection_watch_events(conn, POLLIN);
      return 0;
272
273
274
    case DIR_CONN_STATE_CLIENT_SENDING_UPLOAD:
      log_fn(LOG_DEBUG,"client finished sending upload command.");
      conn->state = DIR_CONN_STATE_CLIENT_READING_UPLOAD;
275
276
      connection_watch_events(conn, POLLIN);
      return 0;
277
    case DIR_CONN_STATE_SERVER_WRITING:
278
      log_fn(LOG_INFO,"Finished writing server response. Closing.");
279
280
      return -1; /* kill it */
    default:
281
282
      log_fn(LOG_WARNING,"BUG: called in unexpected state.");
      return -1;
283
284
285
286
  }
  return 0;
}

287
288
289
290
291
292
293
/*
  Local Variables:
  mode:c
  indent-tabs-mode:nil
  c-basic-offset:2
  End:
*/