mirror of
https://github.com/ilyakooo0/urbit.git
synced 2024-12-30 18:31:36 +03:00
1712 lines
39 KiB
C
1712 lines
39 KiB
C
/* v/sist.c
|
|
**
|
|
*/
|
|
#include <errno.h>
|
|
#include <fcntl.h>
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
#include <unistd.h>
|
|
#include <curl/curl.h>
|
|
#include <uv.h>
|
|
|
|
#include "all.h"
|
|
#include "vere/vere.h"
|
|
|
|
#if defined(U3_OS_linux)
|
|
#include <stdio_ext.h>
|
|
#define fpurge(fd) __fpurge(fd)
|
|
#define DEVRANDOM "/dev/urandom"
|
|
#else
|
|
#define DEVRANDOM "/dev/random"
|
|
#endif
|
|
|
|
|
|
/* u3_sist_pack(): write a blob to disk, transferring.
|
|
*/
|
|
c3_d
|
|
u3_sist_pack(c3_w tem_w, c3_w typ_w, c3_w* bob_w, c3_w len_w)
|
|
{
|
|
u3_ulog* lug_u = &u3Z->lug_u;
|
|
c3_d tar_d;
|
|
u3_ular lar_u;
|
|
|
|
tar_d = lug_u->len_d + len_w;
|
|
|
|
lar_u.tem_w = tem_w;
|
|
lar_u.typ_w = typ_w;
|
|
lar_u.syn_w = u3r_mug_d(tar_d);
|
|
lar_u.mug_w = u3r_mug_both(u3r_mug_words(bob_w, len_w),
|
|
u3r_mug_both(u3r_mug(lar_u.tem_w),
|
|
u3r_mug(lar_u.typ_w)));
|
|
lar_u.ent_d = u3A->ent_d;
|
|
u3A->ent_d++;
|
|
lar_u.len_w = len_w;
|
|
|
|
if ( -1 == lseek64(lug_u->fid_i, 4ULL * tar_d, SEEK_SET) ) {
|
|
perror("lseek");
|
|
uL(fprintf(uH, "sist_pack: seek failed\n"));
|
|
c3_assert(0);
|
|
}
|
|
if ( sizeof(lar_u) != write(lug_u->fid_i, &lar_u, sizeof(lar_u)) ) {
|
|
perror("write");
|
|
uL(fprintf(uH, "sist_pack: write failed\n"));
|
|
c3_assert(0);
|
|
}
|
|
if ( -1 == lseek64(lug_u->fid_i, 4ULL * lug_u->len_d, SEEK_SET) ) {
|
|
perror("lseek");
|
|
uL(fprintf(uH, "sist_pack: seek failed\n"));
|
|
c3_assert(0);
|
|
}
|
|
#if 0
|
|
uL(fprintf(uH, "sist_pack: write %" PRIu64 ", %" PRIu64 ": lar ent %" PRIu64 ", len %d, mug %x\n",
|
|
lug_u->len_d,
|
|
tar_d,
|
|
lar_u.ent_d,
|
|
lar_u.len_w,
|
|
lar_u.mug_w));
|
|
#endif
|
|
if ( (4 * len_w) != write(lug_u->fid_i, bob_w, (4 * len_w)) ) {
|
|
perror("write");
|
|
uL(fprintf(uH, "sist_pack: write failed\n"));
|
|
c3_assert(0);
|
|
}
|
|
lug_u->len_d += (c3_d)(lar_u.len_w + c3_wiseof(lar_u));
|
|
free(bob_w);
|
|
|
|
// Sync. Or, what goes by sync.
|
|
{
|
|
fsync(lug_u->fid_i); // fsync is almost useless, F_FULLFSYNC too slow
|
|
#if defined(U3_OS_linux)
|
|
fdatasync(lug_u->fid_i);
|
|
#elif defined(U3_OS_osx)
|
|
fcntl(lug_u->fid_i, F_FULLFSYNC);
|
|
#elif defined(U3_OS_bsd)
|
|
fsync(lug_u->fid_i);
|
|
#else
|
|
# error "port: datasync"
|
|
#endif
|
|
}
|
|
|
|
return u3A->ent_d;
|
|
}
|
|
|
|
/* u3_sist_put(): moronic key-value store put.
|
|
*/
|
|
void
|
|
u3_sist_put(const c3_c* key_c, const c3_y* val_y, size_t siz_i)
|
|
{
|
|
c3_c ful_c[2048];
|
|
c3_i ret_i;
|
|
c3_i fid_i;
|
|
|
|
ret_i = snprintf(ful_c, 2048, "%s/.urb/sis/_%s", u3_Host.dir_c, key_c);
|
|
c3_assert(ret_i < 2048);
|
|
|
|
if ( (fid_i = open(ful_c, O_CREAT | O_TRUNC | O_WRONLY, 0600)) < 0 ) {
|
|
uL(fprintf(uH, "sist: could not put %s\n", key_c));
|
|
perror("open");
|
|
u3_lo_bail();
|
|
}
|
|
if ( (ret_i = write(fid_i, val_y, siz_i)) != siz_i ) {
|
|
uL(fprintf(uH, "sist: could not write %s\n", key_c));
|
|
if ( ret_i < 0 ) {
|
|
perror("write");
|
|
}
|
|
u3_lo_bail();
|
|
}
|
|
ret_i = c3_sync(fid_i);
|
|
if ( ret_i < 0 ) {
|
|
perror("sync");
|
|
}
|
|
ret_i = close(fid_i);
|
|
c3_assert(0 == ret_i);
|
|
}
|
|
|
|
/* u3_sist_has(): moronic key-value store existence check.
|
|
*/
|
|
ssize_t
|
|
u3_sist_has(const c3_c* key_c)
|
|
{
|
|
c3_c ful_c[2048];
|
|
c3_i ret_i;
|
|
struct stat sat_u;
|
|
|
|
ret_i = snprintf(ful_c, 2048, "%s/.urb/sis/_%s", u3_Host.dir_c, key_c);
|
|
c3_assert(ret_i < 2048);
|
|
|
|
if ( (ret_i = stat(ful_c, &sat_u)) < 0 ) {
|
|
if ( errno == ENOENT ) {
|
|
return -1;
|
|
}
|
|
else {
|
|
uL(fprintf(uH, "sist: could not stat %s\n", key_c));
|
|
perror("stat");
|
|
u3_lo_bail();
|
|
}
|
|
}
|
|
else {
|
|
return sat_u.st_size;
|
|
}
|
|
c3_assert(!"not reached");
|
|
}
|
|
|
|
/* u3_sist_get(): moronic key-value store get.
|
|
*/
|
|
void
|
|
u3_sist_get(const c3_c* key_c, c3_y* val_y)
|
|
{
|
|
c3_c ful_c[2048];
|
|
c3_i ret_i;
|
|
c3_i fid_i;
|
|
struct stat sat_u;
|
|
|
|
ret_i = snprintf(ful_c, 2048, "%s/.urb/sis/_%s", u3_Host.dir_c, key_c);
|
|
c3_assert(ret_i < 2048);
|
|
|
|
if ( (fid_i = open(ful_c, O_RDONLY)) < 0 ) {
|
|
uL(fprintf(uH, "sist: could not get %s\n", key_c));
|
|
perror("open");
|
|
u3_lo_bail();
|
|
}
|
|
if ( (ret_i = fstat(fid_i, &sat_u)) < 0 ) {
|
|
uL(fprintf(uH, "sist: could not stat %s\n", key_c));
|
|
perror("fstat");
|
|
u3_lo_bail();
|
|
}
|
|
if ( (ret_i = read(fid_i, val_y, sat_u.st_size)) != sat_u.st_size ) {
|
|
uL(fprintf(uH, "sist: could not read %s\n", key_c));
|
|
if ( ret_i < 0 ) {
|
|
perror("read");
|
|
}
|
|
u3_lo_bail();
|
|
}
|
|
ret_i = close(fid_i);
|
|
c3_assert(0 == ret_i);
|
|
}
|
|
|
|
/* u3_sist_nil(): moronic key-value store rm.
|
|
*/
|
|
void
|
|
u3_sist_nil(const c3_c* key_c)
|
|
{
|
|
c3_c ful_c[2048];
|
|
c3_i ret_i;
|
|
|
|
ret_i = snprintf(ful_c, 2048, "%s/.urb/sis/_%s", u3_Host.dir_c, key_c);
|
|
c3_assert(ret_i < 2048);
|
|
|
|
if ( (ret_i = unlink(ful_c)) < 0 ) {
|
|
if ( errno == ENOENT ) {
|
|
return;
|
|
}
|
|
else {
|
|
uL(fprintf(uH, "sist: could not unlink %s\n", key_c));
|
|
perror("unlink");
|
|
u3_lo_bail();
|
|
}
|
|
}
|
|
}
|
|
|
|
/* _sist_suck(): past failure.
|
|
*/
|
|
static void
|
|
_sist_suck(u3_noun ovo, u3_noun gon)
|
|
{
|
|
uL(fprintf(uH, "sing: ovum failed!\n"));
|
|
{
|
|
c3_c* hed_c = u3r_string(u3h(u3t(ovo)));
|
|
|
|
uL(fprintf(uH, "fail %s\n", hed_c));
|
|
free(hed_c);
|
|
}
|
|
|
|
u3_lo_punt(2, u3kb_flop(u3k(u3t(gon))));
|
|
// u3_loom_exit();
|
|
#if 1
|
|
u3_lo_exit();
|
|
|
|
exit(1);
|
|
#else
|
|
u3z(ovo); u3z(gon);
|
|
#endif
|
|
}
|
|
|
|
/* _sist_sing(): replay ovum from the past, time already set.
|
|
*/
|
|
static void
|
|
_sist_sing(u3_noun ovo)
|
|
{
|
|
u3_noun gon = u3m_soft(0, u3v_poke, u3k(ovo));
|
|
|
|
if ( u3_blip != u3h(gon) ) {
|
|
_sist_suck(ovo, gon);
|
|
}
|
|
else {
|
|
u3_noun vir = u3k(u3h(u3t(gon)));
|
|
u3_noun cor = u3k(u3t(u3t(gon)));
|
|
u3_noun nug;
|
|
|
|
u3z(gon);
|
|
nug = u3v_nick(vir, cor);
|
|
|
|
if ( u3_blip != u3h(nug) ) {
|
|
_sist_suck(ovo, nug);
|
|
}
|
|
else {
|
|
vir = u3h(u3t(nug));
|
|
cor = u3k(u3t(u3t(nug)));
|
|
|
|
while ( u3_nul != vir ) {
|
|
u3_noun fex = u3h(vir);
|
|
u3_noun fav = u3t(fex);
|
|
|
|
if ( c3__init == u3h(fav) ) {
|
|
u3A->own = u3k(u3t(fav));
|
|
// note: c3__boot == u3h(u3t(ovo))
|
|
u3A->fak = ( c3__fake == u3h(u3t(u3t(ovo))) ) ? c3y : c3n;
|
|
}
|
|
|
|
vir = u3t(vir);
|
|
}
|
|
u3z(nug);
|
|
u3z(u3A->roc);
|
|
u3A->roc = cor;
|
|
}
|
|
u3z(ovo);
|
|
}
|
|
}
|
|
|
|
/* _sist_cask(): ask for a passcode.
|
|
*/
|
|
static u3_noun
|
|
_sist_cask(c3_c* dir_c, u3_noun nun)
|
|
{
|
|
c3_c paw_c[60];
|
|
u3_noun key;
|
|
u3_utty* uty_u = calloc(1, sizeof(u3_utty));
|
|
uty_u->fid_i = 0;
|
|
|
|
uH;
|
|
|
|
// disable terminal echo when typing in passcode
|
|
if ( 0 != tcgetattr(uty_u->fid_i, &uty_u->bak_u) ) {
|
|
c3_assert(!"init-tcgetattr");
|
|
}
|
|
uty_u->raw_u = uty_u->bak_u;
|
|
uty_u->raw_u.c_lflag &= ~ECHO;
|
|
if ( 0 != tcsetattr(uty_u->fid_i, TCSADRAIN, &uty_u->raw_u) ) {
|
|
c3_assert(!"init-tcsetattr");
|
|
}
|
|
|
|
while ( 1 ) {
|
|
printf("passcode for %s%s? ~", dir_c, (c3y == nun) ? " [none]" : "");
|
|
|
|
paw_c[0] = 0;
|
|
c3_fpurge(stdin);
|
|
fgets(paw_c, 59, stdin);
|
|
printf("\n");
|
|
|
|
if ( '\n' == paw_c[0] ) {
|
|
if ( c3y == nun ) {
|
|
key = 0; break;
|
|
}
|
|
else {
|
|
continue;
|
|
}
|
|
}
|
|
else {
|
|
c3_c* say_c = c3_malloc(strlen(paw_c) + 2);
|
|
u3_noun say;
|
|
|
|
say_c[0] = '~';
|
|
say_c[1] = 0;
|
|
strncat(say_c, paw_c, strlen(paw_c) - 1);
|
|
|
|
say = u3do("slay", u3i_string(say_c));
|
|
if ( (u3_nul == say) ||
|
|
(u3_blip != u3h(u3t(say))) ||
|
|
('p' != u3h(u3t(u3t(say)))) )
|
|
{
|
|
printf("invalid passcode\n");
|
|
continue;
|
|
}
|
|
key = u3k(u3t(u3t(u3t(say))));
|
|
|
|
u3z(say);
|
|
break;
|
|
}
|
|
}
|
|
if ( 0 != tcsetattr(uty_u->fid_i, TCSADRAIN, &uty_u->bak_u) ) {
|
|
c3_assert(!"init-tcsetattr");
|
|
}
|
|
free(uty_u);
|
|
uL(0);
|
|
return key;
|
|
}
|
|
|
|
/* _sist_text(): ask for a name string.
|
|
*/
|
|
static u3_noun
|
|
_sist_text(c3_c* pom_c)
|
|
{
|
|
c3_c paw_c[180];
|
|
u3_noun say;
|
|
|
|
uH;
|
|
while ( 1 ) {
|
|
printf("%s: ", pom_c);
|
|
|
|
paw_c[0] = 0;
|
|
fpurge(stdin);
|
|
fgets(paw_c, 179, stdin);
|
|
|
|
if ( '\n' == paw_c[0] ) {
|
|
continue;
|
|
}
|
|
else {
|
|
c3_w len_w = strlen(paw_c);
|
|
|
|
if ( paw_c[len_w - 1] == '\n' ) {
|
|
paw_c[len_w-1] = 0;
|
|
}
|
|
say = u3i_string(paw_c);
|
|
break;
|
|
}
|
|
}
|
|
uL(0);
|
|
return say;
|
|
}
|
|
|
|
#if 0
|
|
/* _sist_bask(): ask a yes or no question.
|
|
*/
|
|
static u3_noun
|
|
_sist_bask(c3_c* pop_c, u3_noun may)
|
|
{
|
|
u3_noun yam;
|
|
|
|
uH;
|
|
while ( 1 ) {
|
|
c3_c ans_c[3];
|
|
|
|
printf("%s [y/n]? ", pop_c);
|
|
ans_c[0] = 0;
|
|
|
|
c3_fpurge(stdin);
|
|
fgets(ans_c, 2, stdin);
|
|
|
|
if ( (ans_c[0] != 'y') && (ans_c[0] != 'n') ) {
|
|
continue;
|
|
} else {
|
|
yam = (ans_c[0] != 'n') ? c3y : c3n;
|
|
break;
|
|
}
|
|
}
|
|
uL(0);
|
|
return yam;
|
|
}
|
|
#endif
|
|
|
|
/* u3_sist_rand(): fill a 512-bit (16-word) buffer.
|
|
*/
|
|
void
|
|
u3_sist_rand(c3_w* rad_w)
|
|
{
|
|
c3_i fid_i = open(DEVRANDOM, O_RDONLY);
|
|
|
|
if ( 64 != read(fid_i, (c3_y*) rad_w, 64) ) {
|
|
c3_assert(!"lo_rand");
|
|
}
|
|
close(fid_i);
|
|
}
|
|
|
|
/* _sist_fast(): offer to save passcode by mug in home directory.
|
|
*/
|
|
static void
|
|
_sist_fast(u3_noun pas, c3_l key_l)
|
|
{
|
|
c3_c ful_c[2048];
|
|
c3_c* hom_c = u3_Host.dir_c;
|
|
u3_noun gum = u3dc("scot", 'p', key_l);
|
|
c3_c* gum_c = u3r_string(gum);
|
|
u3_noun yek = u3dc("scot", 'p', pas);
|
|
c3_c* yek_c = u3r_string(yek);
|
|
|
|
printf("saving passcode in %s/.urb/code.%s\r\n", hom_c, gum_c);
|
|
printf("(for real security, write it down and delete the file...)\r\n");
|
|
{
|
|
c3_i fid_i;
|
|
|
|
snprintf(ful_c, 2048, "%s/.urb/code.%s", hom_c, gum_c);
|
|
if ( (fid_i = open(ful_c, O_CREAT | O_TRUNC | O_WRONLY, 0600)) < 0 ) {
|
|
uL(fprintf(uH, "fast: could not save %s\n", ful_c));
|
|
u3_lo_bail();
|
|
}
|
|
write(fid_i, yek_c, strlen(yek_c));
|
|
close(fid_i);
|
|
}
|
|
free(gum_c);
|
|
u3z(gum);
|
|
|
|
free(yek_c);
|
|
u3z(yek);
|
|
}
|
|
|
|
/* _sist_staf(): try to load passcode by mug from home directory.
|
|
*/
|
|
static u3_noun
|
|
_sist_staf(c3_l key_l)
|
|
{
|
|
c3_c ful_c[2048];
|
|
c3_c* hom_c = u3_Host.dir_c;
|
|
u3_noun gum = u3dc("scot", 'p', key_l);
|
|
c3_c* gum_c = u3r_string(gum);
|
|
u3_noun txt;
|
|
|
|
snprintf(ful_c, 2048, "%s/.urb/code.%s", hom_c, gum_c);
|
|
free(gum_c);
|
|
u3z(gum);
|
|
txt = u3_walk_safe(ful_c);
|
|
|
|
if ( 0 == txt ) {
|
|
uL(fprintf(uH, "staf: no passcode %s\n", ful_c));
|
|
return 0;
|
|
}
|
|
else {
|
|
// c3_c* txt_c = u3r_string(txt);
|
|
u3_noun say = u3do("slay", txt);
|
|
u3_noun pas;
|
|
|
|
|
|
if ( (u3_nul == say) ||
|
|
(u3_blip != u3h(u3t(say))) ||
|
|
('p' != u3h(u3t(u3t(say)))) )
|
|
{
|
|
uL(fprintf(uH, "staf: %s is corrupt\n", ful_c));
|
|
u3z(say);
|
|
return 0;
|
|
}
|
|
uL(fprintf(uH, "loaded passcode from %s\n", ful_c));
|
|
pas = u3k(u3t(u3t(u3t(say))));
|
|
|
|
u3z(say);
|
|
return pas;
|
|
}
|
|
}
|
|
|
|
/* _sist_fatt(): stretch a 64-bit passcode to make a 128-bit key.
|
|
*/
|
|
static u3_noun
|
|
_sist_fatt(c3_l sal_l, u3_noun pas)
|
|
{
|
|
c3_w i_w;
|
|
u3_noun key = pas;
|
|
|
|
// XX use scrypt() - this is a stupid iterated hash
|
|
//
|
|
for ( i_w = 0; i_w < 32768; i_w++ ) {
|
|
key = u3dc("shaf", sal_l, key);
|
|
}
|
|
return key;
|
|
}
|
|
|
|
/* _sist_zest(): create a new, empty record.
|
|
*/
|
|
static void
|
|
_sist_zest()
|
|
{
|
|
struct stat buf_b;
|
|
c3_i fid_i;
|
|
c3_c ful_c[8193];
|
|
c3_l sal_l;
|
|
|
|
// Create the record file.
|
|
{
|
|
c3_i pig_i = O_CREAT | O_WRONLY | O_EXCL;
|
|
#ifdef O_DSYNC
|
|
pig_i |= O_DSYNC;
|
|
#endif
|
|
snprintf(ful_c, 2048, "%s/.urb/egz.hope", u3_Host.dir_c);
|
|
|
|
if ( ((fid_i = open(ful_c, pig_i, 0600)) < 0) ||
|
|
(fstat(fid_i, &buf_b) < 0) )
|
|
{
|
|
uL(fprintf(uH, "can't create record (%s)\n", ful_c));
|
|
u3_lo_bail();
|
|
}
|
|
#ifdef F_NOCACHE
|
|
if ( -1 == fcntl(fid_i, F_NOCACHE, 1) ) {
|
|
uL(fprintf(uH, "zest: can't uncache %s: %s\n", ful_c, strerror(errno)));
|
|
u3_lo_bail();
|
|
}
|
|
#endif
|
|
u3Z->lug_u.fid_i = fid_i;
|
|
}
|
|
|
|
// Generate a 31-bit salt.
|
|
//
|
|
{
|
|
c3_w rad_w[16];
|
|
|
|
c3_rand(rad_w);
|
|
sal_l = (0x7fffffff & rad_w[0]);
|
|
}
|
|
|
|
// Create and save a passcode.
|
|
//
|
|
{
|
|
c3_w rad_w[16];
|
|
u3_noun pas;
|
|
|
|
c3_rand(rad_w);
|
|
pas = u3i_words(2, rad_w);
|
|
|
|
u3A->key = _sist_fatt(sal_l, u3k(pas));
|
|
_sist_fast(pas, u3r_mug(u3A->key));
|
|
}
|
|
|
|
// Write the header.
|
|
{
|
|
u3_uled led_u;
|
|
|
|
led_u.mag_l = u3r_mug('g');
|
|
led_u.kno_w = 163;
|
|
|
|
if ( 0 == u3A->key ) {
|
|
led_u.key_l = 0;
|
|
} else {
|
|
led_u.key_l = u3r_mug(u3A->key);
|
|
|
|
c3_assert(!(led_u.key_l >> 31));
|
|
}
|
|
led_u.sal_l = sal_l;
|
|
led_u.sev_l = u3A->sev_l;
|
|
led_u.tno_l = 1;
|
|
|
|
if ( sizeof(led_u) != write(fid_i, &led_u, sizeof(led_u)) ) {
|
|
uL(fprintf(uH, "can't write record (%s)\n", ful_c));
|
|
u3_lo_bail();
|
|
}
|
|
|
|
u3Z->lug_u.len_d = c3_wiseof(led_u);
|
|
}
|
|
|
|
// Work through the boot events.
|
|
u3_raft_work();
|
|
}
|
|
|
|
/* _sist_rest_nuu(): upgrade log from previous format.
|
|
*/
|
|
static void
|
|
_sist_rest_nuu(u3_ulog* lug_u, u3_uled led_u, c3_c* old_c)
|
|
{
|
|
c3_c nuu_c[2048];
|
|
u3_noun roe = u3_nul;
|
|
c3_i fid_i = lug_u->fid_i;
|
|
c3_i fud_i;
|
|
c3_i ret_i;
|
|
c3_d end_d = lug_u->len_d;
|
|
|
|
uL(fprintf(uH, "rest: converting log from prior format\n"));
|
|
|
|
c3_assert(led_u.mag_l == u3r_mug('f'));
|
|
|
|
if ( -1 == lseek64(fid_i, 4ULL * end_d, SEEK_SET) ) {
|
|
uL(fprintf(uH, "rest_nuu failed (a)\n"));
|
|
perror("lseek64");
|
|
u3_lo_bail();
|
|
}
|
|
|
|
while ( end_d != c3_wiseof(u3_uled) ) {
|
|
c3_d tar_d;
|
|
u3_olar lar_u;
|
|
c3_w* img_w;
|
|
u3_noun ron;
|
|
|
|
tar_d = (end_d - (c3_d)c3_wiseof(u3_olar));
|
|
|
|
if ( -1 == lseek64(fid_i, 4ULL * tar_d, SEEK_SET) ) {
|
|
uL(fprintf(uH, "rest_nuu failed (b)\n"));
|
|
perror("lseek64");
|
|
u3_lo_bail();
|
|
}
|
|
if ( sizeof(u3_olar) != read(fid_i, &lar_u, sizeof(u3_olar)) ) {
|
|
uL(fprintf(uH, "rest_nuu failed (c)\n"));
|
|
perror("read");
|
|
u3_lo_bail();
|
|
}
|
|
|
|
if ( lar_u.syn_w != u3r_mug_d(tar_d) ) {
|
|
uL(fprintf(uH, "rest_nuu failed (d)\n"));
|
|
u3_lo_bail();
|
|
}
|
|
|
|
img_w = c3_malloc(4 * lar_u.len_w);
|
|
end_d = (tar_d - (c3_d)lar_u.len_w);
|
|
|
|
if ( -1 == lseek64(fid_i, 4ULL * end_d, SEEK_SET) ) {
|
|
uL(fprintf(uH, "rest_nuu failed (e)\n"));
|
|
perror("lseek64");
|
|
u3_lo_bail();
|
|
}
|
|
if ( (4 * lar_u.len_w) != read(fid_i, img_w, (4 * lar_u.len_w)) ) {
|
|
uL(fprintf(uH, "rest_nuu failed (f)\n"));
|
|
perror("read");
|
|
u3_lo_bail();
|
|
}
|
|
|
|
ron = u3i_words(lar_u.len_w, img_w);
|
|
free(img_w);
|
|
|
|
if ( lar_u.mug_w != u3r_mug(ron) ) {
|
|
uL(fprintf(uH, "rest_nuu failed (g)\n"));
|
|
u3_lo_bail();
|
|
}
|
|
|
|
roe = u3nc(ron, roe);
|
|
}
|
|
|
|
if ( 0 != close(fid_i) ) {
|
|
uL(fprintf(uH, "rest: could not close\n"));
|
|
perror("close");
|
|
u3_lo_bail();
|
|
}
|
|
|
|
ret_i = snprintf(nuu_c, 2048, "%s/.urb/ham.hope", u3_Host.dir_c);
|
|
c3_assert(ret_i < 2048);
|
|
|
|
if ( (fud_i = open(nuu_c, O_CREAT | O_TRUNC | O_RDWR, 0600)) < 0 ) {
|
|
uL(fprintf(uH, "rest: can't open record (%s)\n", nuu_c));
|
|
perror("open");
|
|
u3_lo_bail();
|
|
}
|
|
|
|
led_u.mag_l = u3r_mug('g');
|
|
if ( (sizeof(led_u) != write(fud_i, &led_u, sizeof(led_u))) ) {
|
|
uL(fprintf(uH, "rest: can't write header\n"));
|
|
perror("write");
|
|
u3_lo_bail();
|
|
}
|
|
|
|
{
|
|
c3_d ent_d = 1;
|
|
|
|
c3_assert(end_d == c3_wiseof(u3_uled));
|
|
while ( u3_nul != roe ) {
|
|
u3_noun ovo = u3k(u3h(roe));
|
|
u3_noun nex = u3k(u3t(roe));
|
|
u3_ular lar_u;
|
|
c3_w* img_w;
|
|
c3_d tar_d;
|
|
|
|
lar_u.len_w = u3r_met(5, ovo);
|
|
tar_d = end_d + lar_u.len_w;
|
|
lar_u.syn_w = u3r_mug(tar_d);
|
|
lar_u.ent_d = ent_d;
|
|
lar_u.tem_w = 0;
|
|
lar_u.typ_w = c3__ov;
|
|
lar_u.mug_w = u3r_mug_both(u3r_mug(ovo),
|
|
u3r_mug_both(u3r_mug(0),
|
|
u3r_mug(c3__ov)));
|
|
|
|
img_w = c3_malloc(lar_u.len_w << 2);
|
|
u3r_words(0, lar_u.len_w, img_w, ovo);
|
|
u3z(ovo);
|
|
|
|
if ( (lar_u.len_w << 2) != write(fud_i, img_w, lar_u.len_w << 2) ) {
|
|
uL(fprintf(uH, "rest_nuu failed (h)\n"));
|
|
perror("write");
|
|
u3_lo_bail();
|
|
}
|
|
if ( sizeof(u3_ular) != write(fud_i, &lar_u, sizeof(u3_ular)) ) {
|
|
uL(fprintf(uH, "rest_nuu failed (i)\n"));
|
|
perror("write");
|
|
u3_lo_bail();
|
|
}
|
|
|
|
ent_d++;
|
|
end_d = tar_d + c3_wiseof(u3_ular);
|
|
u3z(roe); roe = nex;
|
|
}
|
|
}
|
|
if ( 0 != rename(nuu_c, old_c) ) {
|
|
uL(fprintf(uH, "rest_nuu failed (k)\n"));
|
|
perror("rename");
|
|
u3_lo_bail();
|
|
}
|
|
if ( -1 == lseek64(fud_i, sizeof(u3_uled), SEEK_SET) ) {
|
|
uL(fprintf(uH, "rest_nuu failed (l)\n"));
|
|
perror("lseek64");
|
|
u3_lo_bail();
|
|
}
|
|
lug_u->fid_i = fud_i;
|
|
lug_u->len_d = end_d;
|
|
}
|
|
|
|
/* _sist_rest(): restore from record, or exit.
|
|
*/
|
|
static void
|
|
_sist_rest()
|
|
{
|
|
struct stat buf_b;
|
|
c3_i fid_i;
|
|
c3_c ful_c[2048];
|
|
c3_d old_d = u3A->ent_d;
|
|
c3_d las_d = 0;
|
|
u3_noun roe = u3_nul;
|
|
u3_noun sev_l, key_l, sal_l;
|
|
u3_noun ohh = c3n;
|
|
|
|
if ( 0 != u3A->ent_d ) {
|
|
u3_noun ent;
|
|
c3_c* ent_c;
|
|
|
|
ent = u3i_chubs(1, &u3A->ent_d);
|
|
ent = u3dc("scot", c3__ud, ent);
|
|
ent_c = u3r_string(ent);
|
|
uL(fprintf(uH, "rest: checkpoint to event %s\n", ent_c));
|
|
free(ent_c);
|
|
u3z(ent);
|
|
}
|
|
|
|
// Open the fscking file. Does it even exist?
|
|
{
|
|
c3_i pig_i = O_RDWR;
|
|
#ifdef O_DSYNC
|
|
pig_i |= O_DSYNC;
|
|
#endif
|
|
snprintf(ful_c, 2048, "%s/.urb/egz.hope", u3_Host.dir_c);
|
|
if ( ((fid_i = open(ful_c, pig_i)) < 0) || (fstat(fid_i, &buf_b) < 0) ) {
|
|
uL(fprintf(uH, "rest: can't open record (%s)\n", ful_c));
|
|
u3_lo_bail();
|
|
|
|
return;
|
|
}
|
|
#ifdef F_NOCACHE
|
|
if ( -1 == fcntl(fid_i, F_NOCACHE, 1) ) {
|
|
uL(fprintf(uH, "rest: can't uncache %s: %s\n", ful_c, strerror(errno)));
|
|
u3_lo_bail();
|
|
|
|
return;
|
|
}
|
|
#endif
|
|
u3Z->lug_u.fid_i = fid_i;
|
|
u3Z->lug_u.len_d = ((buf_b.st_size + 3ULL) >> 2ULL);
|
|
}
|
|
|
|
// Check the fscking header. It's probably corrupt.
|
|
{
|
|
u3_uled led_u;
|
|
|
|
if ( sizeof(led_u) != read(fid_i, &led_u, sizeof(led_u)) ) {
|
|
uL(fprintf(uH, "record (%s) is corrupt (a)\n", ful_c));
|
|
u3_lo_bail();
|
|
}
|
|
|
|
if ( u3r_mug('f') == led_u.mag_l ) {
|
|
_sist_rest_nuu(&u3Z->lug_u, led_u, ful_c);
|
|
fid_i = u3Z->lug_u.fid_i;
|
|
}
|
|
else if (u3r_mug('g') != led_u.mag_l ) {
|
|
uL(fprintf(uH, "record (%s) is obsolete (or corrupt)\n", ful_c));
|
|
u3_lo_bail();
|
|
}
|
|
|
|
if ( led_u.kno_w != 163 ) {
|
|
// XX perhaps we should actually do something here
|
|
//
|
|
uL(fprintf(uH, "rest: (not) translating events (old %d, now %d)\n",
|
|
led_u.kno_w,
|
|
163));
|
|
}
|
|
sev_l = led_u.sev_l;
|
|
sal_l = led_u.sal_l;
|
|
key_l = led_u.key_l;
|
|
|
|
{
|
|
u3_noun old = u3dc("scot", c3__uv, sev_l);
|
|
u3_noun nuu = u3dc("scot", c3__uv, u3A->sev_l);
|
|
c3_c* old_c = u3r_string(old);
|
|
c3_c* nuu_c = u3r_string(nuu);
|
|
|
|
uL(fprintf(uH, "rest: old %s, new %s\n", old_c, nuu_c));
|
|
free(old_c); free(nuu_c);
|
|
|
|
u3z(old); u3z(nuu);
|
|
}
|
|
c3_assert(sev_l != u3A->sev_l); // 1 in 2 billion, just retry
|
|
}
|
|
|
|
// Oh, and let's hope you didn't forget the fscking passcode.
|
|
{
|
|
if ( 0 != key_l ) {
|
|
u3_noun pas = _sist_staf(key_l);
|
|
u3_noun key;
|
|
|
|
while ( 1 ) {
|
|
pas = pas ? pas : _sist_cask(u3_Host.dir_c, c3n);
|
|
|
|
key = _sist_fatt(sal_l, pas);
|
|
|
|
if ( u3r_mug(key) != key_l ) {
|
|
uL(fprintf(uH, "incorrect passcode\n"));
|
|
u3z(key);
|
|
pas = 0;
|
|
}
|
|
else {
|
|
u3z(u3A->key);
|
|
u3A->key = key;
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
// Read in the fscking events. These are probably corrupt as well.
|
|
{
|
|
c3_d ent_d;
|
|
c3_d end_d;
|
|
u3_noun rup = c3n;
|
|
|
|
end_d = u3Z->lug_u.len_d;
|
|
ent_d = 0;
|
|
|
|
if ( -1 == lseek64(fid_i, 4ULL * end_d, SEEK_SET) ) {
|
|
fprintf(stderr, "end_d %" PRIu64 "\n", end_d);
|
|
perror("lseek");
|
|
uL(fprintf(uH, "record (%s) is corrupt (c)\n", ful_c));
|
|
u3_lo_bail();
|
|
}
|
|
|
|
while ( end_d != c3_wiseof(u3_uled) ) {
|
|
c3_d tar_d = (end_d - (c3_d)c3_wiseof(u3_ular));
|
|
u3_ular lar_u;
|
|
c3_w* img_w;
|
|
u3_noun ron;
|
|
|
|
// uL(fprintf(uH, "rest: reading event at %" PRIx64 "\n", end_d));
|
|
|
|
if ( -1 == lseek64(fid_i, 4ULL * tar_d, SEEK_SET) ) {
|
|
uL(fprintf(uH, "record (%s) is corrupt (d)\n", ful_c));
|
|
u3_lo_bail();
|
|
}
|
|
if ( sizeof(u3_ular) != read(fid_i, &lar_u, sizeof(u3_ular)) ) {
|
|
uL(fprintf(uH, "record (%s) is corrupt (e)\n", ful_c));
|
|
u3_lo_bail();
|
|
}
|
|
|
|
if ( lar_u.syn_w != u3r_mug_d(tar_d) ) {
|
|
if ( c3n == rup ) {
|
|
uL(fprintf(uH, "corruption detected; attempting to fix\n"));
|
|
rup = c3y;
|
|
}
|
|
uL(fprintf(uH, "lar:%x mug:%x\n", lar_u.syn_w, u3r_mug_d(tar_d)));
|
|
end_d--; u3Z->lug_u.len_d--;
|
|
continue;
|
|
}
|
|
else if ( c3y == rup ) {
|
|
uL(fprintf(uH, "matched at %x\n", lar_u.syn_w));
|
|
rup = c3n;
|
|
}
|
|
|
|
if ( lar_u.ent_d == 0 ) {
|
|
ohh = c3y;
|
|
}
|
|
|
|
#if 0
|
|
uL(fprintf(uH, "log: read: at %d, %d: lar ent %" PRIu64 ", len %d, mug %x\n",
|
|
(tar_w - lar_u.len_w),
|
|
tar_w,
|
|
lar_u.ent_d,
|
|
lar_u.len_w,
|
|
lar_u.mug_w));
|
|
#endif
|
|
if ( end_d == u3Z->lug_u.len_d ) {
|
|
ent_d = las_d = lar_u.ent_d;
|
|
}
|
|
else {
|
|
if ( lar_u.ent_d != (ent_d - 1ULL) ) {
|
|
uL(fprintf(uH, "record (%s) is corrupt (g)\n", ful_c));
|
|
uL(fprintf(uH, "lar_u.ent_d %" PRIx64 ", ent_d %" PRIx64 "\n", lar_u.ent_d, ent_d));
|
|
u3_lo_bail();
|
|
}
|
|
ent_d -= 1ULL;
|
|
}
|
|
end_d = (tar_d - (c3_d)lar_u.len_w);
|
|
|
|
if ( ent_d < old_d ) {
|
|
/* change to continue to check all events */
|
|
break;
|
|
}
|
|
|
|
img_w = c3_malloc(4 * lar_u.len_w);
|
|
|
|
if ( -1 == lseek64(fid_i, 4ULL * end_d, SEEK_SET) ) {
|
|
uL(fprintf(uH, "record (%s) is corrupt (h)\n", ful_c));
|
|
u3_lo_bail();
|
|
}
|
|
if ( (4 * lar_u.len_w) != read(fid_i, img_w, (4 * lar_u.len_w)) ) {
|
|
uL(fprintf(uH, "record (%s) is corrupt (i)\n", ful_c));
|
|
u3_lo_bail();
|
|
}
|
|
|
|
ron = u3i_words(lar_u.len_w, img_w);
|
|
free(img_w);
|
|
|
|
if ( lar_u.mug_w !=
|
|
u3r_mug_both(u3r_mug(ron),
|
|
u3r_mug_both(u3r_mug(lar_u.tem_w),
|
|
u3r_mug(lar_u.typ_w))) )
|
|
{
|
|
uL(fprintf(uH, "record (%s) is corrupt (j)\n", ful_c));
|
|
u3_lo_bail();
|
|
}
|
|
|
|
if ( c3__ov != lar_u.typ_w ) {
|
|
u3z(ron);
|
|
continue;
|
|
}
|
|
|
|
#if 0
|
|
// disable encryption for now
|
|
//
|
|
if ( u3A->key ) {
|
|
u3_noun dep;
|
|
|
|
dep = u3dc("de:crua", u3k(u3A->key), ron);
|
|
if ( c3n == u3du(dep) ) {
|
|
uL(fprintf(uH, "record (%s) is corrupt (k)\n", ful_c));
|
|
u3_lo_bail();
|
|
}
|
|
else {
|
|
ron = u3k(u3t(dep));
|
|
u3z(dep);
|
|
}
|
|
}
|
|
#endif
|
|
roe = u3nc(u3ke_cue(ron), roe);
|
|
}
|
|
u3A->ent_d = c3_max(las_d + 1ULL, old_d);
|
|
}
|
|
|
|
if ( u3_nul == roe ) {
|
|
// Nothing in the log that was not also in the checkpoint.
|
|
//
|
|
c3_assert(u3A->ent_d == old_d);
|
|
if ( las_d + 1 != old_d ) {
|
|
uL(fprintf(uH, "checkpoint and log disagree! las:%" PRIu64 " old:%" PRIu64 "\n",
|
|
las_d + 1, old_d));
|
|
uL(fprintf(uH, "Some events appear to be missing from the log.\n"
|
|
"Please contact the authorities, "
|
|
"and do not delete your pier!\n"));
|
|
u3_lo_bail();
|
|
}
|
|
}
|
|
else {
|
|
u3_noun rou = roe;
|
|
c3_w xno_w;
|
|
|
|
// Execute the fscking things. This is pretty much certain to crash.
|
|
//
|
|
uL(fprintf(uH, "rest: replaying through event %" PRIu64 "\n", las_d));
|
|
fprintf(uH, "---------------- playback starting----------------\n");
|
|
|
|
xno_w = 0;
|
|
while ( u3_nul != roe ) {
|
|
u3_noun i_roe = u3h(roe);
|
|
u3_noun t_roe = u3t(roe);
|
|
u3_noun now = u3h(i_roe);
|
|
u3_noun ovo = u3t(i_roe);
|
|
|
|
u3v_time(u3k(now));
|
|
if ( (c3y == u3_Host.ops_u.vno) &&
|
|
( (c3__veer == u3h(u3t(ovo)) ||
|
|
(c3__vega == u3h(u3t(ovo)))) ) )
|
|
{
|
|
fprintf(stderr, "replay: skipped veer\n");
|
|
}
|
|
else if ( c3y == u3_Host.ops_u.fog &&
|
|
u3_nul == t_roe ) {
|
|
fprintf(stderr, "replay: -Xwtf, skipped last event\n");
|
|
}
|
|
else {
|
|
_sist_sing(u3k(ovo));
|
|
fputc('.', stderr);
|
|
}
|
|
|
|
// fprintf(stderr, "playback: sing: %d\n", xno_w));
|
|
|
|
roe = t_roe;
|
|
xno_w++;
|
|
|
|
if ( 0 == (xno_w % 1000) ) {
|
|
uL(fprintf(uH, "{%d}\n", xno_w));
|
|
// u3_lo_grab("rest", rou, u3_none);
|
|
}
|
|
}
|
|
u3z(rou);
|
|
}
|
|
uL(fprintf(stderr, "\n---------------- playback complete----------------\r\n"));
|
|
|
|
#if 0
|
|
// If you see this error, your record is totally fscking broken!
|
|
// Which probably serves you right. Please consult a consultant.
|
|
{
|
|
if ( u3_nul == u3A->own ) {
|
|
uL(fprintf(uH, "record did not install a master!\n"));
|
|
u3_lo_bail();
|
|
}
|
|
u3A->our = u3k(u3h(u3A->own));
|
|
u3A->pod = u3dc("scot", 'p', u3k(u3A->our)));
|
|
}
|
|
|
|
// Now, who the fsck are you? No, really.
|
|
{
|
|
u3_noun who;
|
|
c3_c* fil_c;
|
|
c3_c* who_c;
|
|
|
|
if ( (fil_c = strrchr(u3_Host.dir_c, '/')) ) {
|
|
fil_c++;
|
|
} else fil_c = u3_Host.dir_c;
|
|
|
|
who = u3dc("scot", 'p', u3k(u3A->our)));
|
|
who_c = u3r_string(who);
|
|
u3z(who);
|
|
|
|
if ( strncmp(fil_c, who_c + 1, strlen(fil_c)) ) {
|
|
uL(fprintf(uH, "record master (%s) does not match filename!\n", who_c));
|
|
u3_lo_bail();
|
|
}
|
|
free(who_c);
|
|
}
|
|
#endif
|
|
|
|
// Increment sequence numbers. New logs start at 1.
|
|
if ( c3y == ohh ) {
|
|
uL(fprintf(uH, "rest: bumping ent_d\n"));
|
|
u3_ular lar_u;
|
|
c3_d end_d;
|
|
c3_d tar_d;
|
|
|
|
u3A->ent_d++;
|
|
end_d = u3Z->lug_u.len_d;
|
|
while ( end_d != c3_wiseof(u3_uled) ) {
|
|
tar_d = end_d - c3_wiseof(u3_ular);
|
|
if ( -1 == lseek64(fid_i, 4ULL * tar_d, SEEK_SET) ) {
|
|
uL(fprintf(uH, "bumping sequence numbers failed (a)\n"));
|
|
u3_lo_bail();
|
|
}
|
|
if ( sizeof(lar_u) != read(fid_i, &lar_u, sizeof(lar_u)) ) {
|
|
uL(fprintf(uH, "bumping sequence numbers failed (b)\n"));
|
|
u3_lo_bail();
|
|
}
|
|
lar_u.ent_d++;
|
|
if ( -1 == lseek64(fid_i, 4ULL * tar_d, SEEK_SET) ) {
|
|
uL(fprintf(uH, "bumping sequence numbers failed (c)\n"));
|
|
u3_lo_bail();
|
|
}
|
|
if ( sizeof(lar_u) != write(fid_i, &lar_u, sizeof(lar_u)) ) {
|
|
uL(fprintf(uH, "bumping sequence numbers failed (d)\n"));
|
|
u3_lo_bail();
|
|
}
|
|
end_d = tar_d - lar_u.len_w;
|
|
}
|
|
}
|
|
|
|
// Rewrite the header. Will probably corrupt the record.
|
|
{
|
|
u3_uled led_u;
|
|
|
|
led_u.mag_l = u3r_mug('g');
|
|
led_u.sal_l = sal_l;
|
|
led_u.sev_l = u3A->sev_l;
|
|
led_u.key_l = u3A->key ? u3r_mug(u3A->key) : 0;
|
|
led_u.kno_w = 163; // may need actual translation!
|
|
led_u.tno_l = 1;
|
|
|
|
if ( (-1 == lseek64(fid_i, 0, SEEK_SET)) ||
|
|
(sizeof(led_u) != write(fid_i, &led_u, sizeof(led_u))) )
|
|
{
|
|
uL(fprintf(uH, "record (%s) failed to rewrite\n", ful_c));
|
|
u3_lo_bail();
|
|
}
|
|
}
|
|
|
|
// Hey, fscker! It worked.
|
|
{
|
|
u3_term_ef_boil();
|
|
}
|
|
}
|
|
|
|
/* _sist_curl_alloc(): allocate a response buffer for curl
|
|
*/
|
|
static size_t
|
|
_sist_curl_alloc(void* dat_v, size_t uni_t, size_t mem_t, uv_buf_t* buf_u)
|
|
{
|
|
size_t siz_t = uni_t * mem_t;
|
|
buf_u->base = realloc(buf_u->base, 1 + siz_t + buf_u->len);
|
|
|
|
if ( 0 == buf_u->base ) {
|
|
fprintf(stderr, "out of memory\n");
|
|
u3_lo_bail();
|
|
}
|
|
|
|
memcpy(buf_u->base + buf_u->len, dat_v, siz_t);
|
|
buf_u->len += siz_t;
|
|
buf_u->base[buf_u->len] = 0;
|
|
|
|
return siz_t;
|
|
}
|
|
|
|
/* _sist_post_json(): POST JSON to url_c
|
|
*/
|
|
static uv_buf_t
|
|
_sist_post_json(c3_c* url_c, uv_buf_t lod_u)
|
|
{
|
|
CURL *curl;
|
|
CURLcode result;
|
|
long cod_l;
|
|
struct curl_slist* hed_u = 0;
|
|
|
|
uv_buf_t buf_u = uv_buf_init(c3_malloc(1), 0);
|
|
|
|
if ( !(curl = curl_easy_init()) ) {
|
|
fprintf(stderr, "failed to initialize libcurl\n");
|
|
u3_lo_bail();
|
|
}
|
|
|
|
hed_u = curl_slist_append(hed_u, "Accept: application/json");
|
|
hed_u = curl_slist_append(hed_u, "Content-Type: application/json");
|
|
hed_u = curl_slist_append(hed_u, "charsets: utf-8");
|
|
|
|
// XX require TLS, pin default cert?
|
|
|
|
curl_easy_setopt(curl, CURLOPT_URL, url_c);
|
|
curl_easy_setopt(curl, CURLOPT_WRITEFUNCTION, _sist_curl_alloc);
|
|
curl_easy_setopt(curl, CURLOPT_WRITEDATA, (void*)&buf_u);
|
|
curl_easy_setopt(curl, CURLOPT_HTTPHEADER, hed_u);
|
|
|
|
// note: must be terminated!
|
|
curl_easy_setopt(curl, CURLOPT_POSTFIELDS, lod_u.base);
|
|
|
|
result = curl_easy_perform(curl);
|
|
curl_easy_getinfo(curl, CURLINFO_RESPONSE_CODE, &cod_l);
|
|
|
|
// XX retry?
|
|
if ( CURLE_OK != result ) {
|
|
fprintf(stderr, "failed to fetch %s: %s\n",
|
|
url_c, curl_easy_strerror(result));
|
|
u3_lo_bail();
|
|
}
|
|
if ( 300 <= cod_l ) {
|
|
fprintf(stderr, "error fetching %s: HTTP %ld\n", url_c, cod_l);
|
|
u3_lo_bail();
|
|
}
|
|
|
|
curl_easy_cleanup(curl);
|
|
curl_slist_free_all(hed_u);
|
|
|
|
return buf_u;
|
|
}
|
|
|
|
/* _sist_oct_to_buf(): +octs to uv_buf_t
|
|
*/
|
|
static uv_buf_t
|
|
_sist_oct_to_buf(u3_noun oct)
|
|
{
|
|
if ( c3n == u3a_is_cat(u3h(oct)) ) {
|
|
u3_lo_bail();
|
|
}
|
|
|
|
c3_w len_w = u3h(oct);
|
|
c3_y* buf_y = c3_malloc(1 + len_w);
|
|
buf_y[len_w] = 0;
|
|
|
|
u3r_bytes(0, len_w, buf_y, u3t(oct));
|
|
|
|
u3z(oct);
|
|
return uv_buf_init((void*)buf_y, len_w);
|
|
}
|
|
|
|
/* _sist_buf_to_oct(): uv_buf_t to +octs
|
|
*/
|
|
static u3_noun
|
|
_sist_buf_to_oct(uv_buf_t buf_u)
|
|
{
|
|
u3_noun len = u3i_words(1, (c3_w*)&buf_u.len);
|
|
|
|
if ( c3n == u3a_is_cat(len) ) {
|
|
u3_lo_bail();
|
|
}
|
|
|
|
return u3nc(len, u3i_bytes(buf_u.len, (const c3_y*)buf_u.base));
|
|
}
|
|
|
|
/* _sist_eth_rpc(): ethereum JSON RPC with request/response as +octs
|
|
*/
|
|
static u3_noun
|
|
_sist_eth_rpc(c3_c* url_c, u3_noun oct)
|
|
{
|
|
return _sist_buf_to_oct(_sist_post_json(url_c, _sist_oct_to_buf(oct)));
|
|
}
|
|
|
|
/* _sist_dawn_fail(): pre-boot validation failed
|
|
*/
|
|
static void
|
|
_sist_dawn_fail(u3_noun who, u3_noun rac, u3_noun sas)
|
|
{
|
|
u3_noun how = u3dc("scot", 'p', u3k(who));
|
|
c3_c* how_c = u3r_string(u3k(how));
|
|
|
|
c3_c* rac_c;
|
|
|
|
switch (rac) {
|
|
default: c3_assert(0);
|
|
case c3__czar: {
|
|
rac_c = "galaxy";
|
|
break;
|
|
}
|
|
case c3__king: {
|
|
rac_c = "star";
|
|
break;
|
|
}
|
|
case c3__duke: {
|
|
rac_c = "planet";
|
|
break;
|
|
}
|
|
case c3__earl: {
|
|
rac_c = "moon";
|
|
break;
|
|
}
|
|
case c3__pawn: {
|
|
rac_c = "comet";
|
|
break;
|
|
}
|
|
}
|
|
|
|
fprintf(stderr, "dawn: invalid keys for %s '%s'\r\n", rac_c, how_c);
|
|
|
|
// XX deconstruct sas, print helpful error messages
|
|
u3m_p("pre-boot error", u3t(sas));
|
|
|
|
u3z(how);
|
|
free(how_c);
|
|
u3_lo_bail();
|
|
}
|
|
|
|
/* _sist_dawn_turf(): override contract domains with -H
|
|
*/
|
|
static u3_noun
|
|
_sist_dawn_turf(c3_c* dns_c)
|
|
{
|
|
u3_noun tuf;
|
|
|
|
u3_noun par = u3v_wish("thos:de-purl:html");
|
|
u3_noun dns = u3i_string(dns_c);
|
|
u3_noun rul = u3dc("rush", u3k(dns), u3k(par));
|
|
|
|
if ( (u3_nul == rul) || (c3n == u3h(u3t(rul))) ) {
|
|
fprintf(stderr, "boot: invalid domain specified with -H %s\r\n", dns_c);
|
|
// bails, won't return
|
|
u3_lo_bail();
|
|
return u3_none;
|
|
}
|
|
else {
|
|
fprintf(stderr, "boot: overriding network domains with %s\r\n", dns_c);
|
|
u3_noun dom = u3t(u3t(rul));
|
|
tuf = u3nc(u3k(dom), u3_nul);
|
|
}
|
|
|
|
u3z(par); u3z(dns); u3z(rul);
|
|
|
|
return tuf;
|
|
}
|
|
|
|
/* _sist_dawn(): produce %dawn boot card - validate keys and query contract
|
|
*/
|
|
static u3_noun
|
|
_sist_dawn(u3_noun sed)
|
|
{
|
|
u3_noun url, bok, pon, zar, tuf, sap;
|
|
|
|
u3_noun who = u3h(sed);
|
|
u3_noun rac = u3do("clan:title", u3k(who));
|
|
|
|
// load snapshot if exists
|
|
if ( 0 != u3_Host.ops_u.ets_c ) {
|
|
fprintf(stderr, "boot: loading ethereum snapshot\r\n");
|
|
u3_noun raw_snap = u3ke_cue(u3m_file(u3_Host.ops_u.ets_c));
|
|
sap = u3nc(u3_nul, raw_snap);
|
|
}
|
|
else {
|
|
sap = u3_nul;
|
|
}
|
|
|
|
// ethereum gateway as (unit purl)
|
|
if ( 0 == u3_Host.ops_u.eth_c ) {
|
|
if ( c3__czar == rac ) {
|
|
fprintf(stderr, "boot: galaxy requires ethereum gateway via -e\r\n");
|
|
// bails, won't return
|
|
u3_lo_bail();
|
|
return u3_none;
|
|
}
|
|
|
|
url = u3_nul;
|
|
}
|
|
else {
|
|
u3_noun par = u3v_wish("auru:de-purl:html");
|
|
u3_noun lur = u3i_string(u3_Host.ops_u.eth_c);
|
|
u3_noun rul = u3dc("rush", u3k(lur), u3k(par));
|
|
|
|
if ( u3_nul == rul ) {
|
|
if ( c3__czar == rac ) {
|
|
fprintf(stderr, "boot: galaxy requires ethereum gateway via -e\r\n");
|
|
// bails, won't return
|
|
u3_lo_bail();
|
|
return u3_none;
|
|
}
|
|
|
|
url = u3_nul;
|
|
}
|
|
else {
|
|
// auru:de-purl:html parses to (pair user purl)
|
|
// we need (unit purl)
|
|
// (we're using it to avoid the +hoke weirdness)
|
|
// XX revisit upon merging with release-candidate
|
|
url = u3nc(u3_nul, u3k(u3t(u3t(rul))));
|
|
}
|
|
|
|
u3z(par); u3z(lur); u3z(rul);
|
|
}
|
|
|
|
// XX require https?
|
|
c3_c* url_c = ( 0 != u3_Host.ops_u.eth_c ) ?
|
|
u3_Host.ops_u.eth_c :
|
|
"https://ropsten.infura.io/v3/196a7f37c7d54211b4a07904ec73ad87";
|
|
|
|
{
|
|
fprintf(stderr, "boot: retrieving latest block\r\n");
|
|
|
|
if ( c3y == u3_Host.ops_u.etn ) {
|
|
bok = u3do("bloq:snap:dawn", u3k(u3t(sap)));
|
|
}
|
|
else {
|
|
// @ud: block number
|
|
u3_noun oct = u3v_wish("bloq:give:dawn");
|
|
u3_noun kob = _sist_eth_rpc(url_c, u3k(oct));
|
|
bok = u3do("bloq:take:dawn", u3k(kob));
|
|
|
|
u3z(oct); u3z(kob);
|
|
}
|
|
}
|
|
|
|
{
|
|
// +hull:constitution:ethe: on-chain state
|
|
u3_noun hul;
|
|
|
|
if ( c3y == u3_Host.ops_u.etn ) {
|
|
hul = u3dc("hull:snap:dawn", u3k(who), u3k(u3t(sap)));
|
|
}
|
|
else {
|
|
if ( c3__pawn == rac ) {
|
|
// irrelevant, just bunt +hull
|
|
hul = u3v_wish("*hull:constitution:ethe");
|
|
}
|
|
else {
|
|
u3_noun oct;
|
|
|
|
if ( c3__earl == rac ) {
|
|
u3_noun seg = u3do("^sein:title", u3k(who));
|
|
u3_noun ges = u3dc("scot", 'p', u3k(seg));
|
|
c3_c* seg_c = u3r_string(ges);
|
|
|
|
fprintf(stderr, "boot: retrieving %s's public keys (for %s)\r\n",
|
|
seg_c, u3_Host.ops_u.who_c);
|
|
oct = u3dc("hull:give:dawn", u3k(bok), u3k(seg));
|
|
|
|
free(seg_c);
|
|
u3z(seg); u3z(ges);
|
|
}
|
|
else {
|
|
fprintf(stderr, "boot: retrieving %s's public keys\r\n",
|
|
u3_Host.ops_u.who_c);
|
|
oct = u3dc("hull:give:dawn", u3k(bok), u3k(who));
|
|
}
|
|
|
|
u3_noun luh = _sist_eth_rpc(url_c, u3k(oct));
|
|
hul = u3dc("hull:take:dawn", u3k(who), u3k(luh));
|
|
|
|
u3z(oct); u3z(luh);
|
|
}
|
|
}
|
|
|
|
// +live:dawn: network state
|
|
// XX actually make request
|
|
// u3_noun liv = _sist_get_json(parent, /some/url)
|
|
u3_noun liv = u3_nul;
|
|
|
|
fprintf(stderr, "boot: verifying keys\r\n");
|
|
|
|
// (each sponsor=(unit ship) error=@tas)
|
|
u3_noun sas = u3dt("veri:dawn", u3k(sed), u3k(hul), u3k(liv));
|
|
|
|
if ( c3n == u3h(sas) ) {
|
|
// bails, won't return
|
|
_sist_dawn_fail(who, rac, sas);
|
|
return u3_none;
|
|
}
|
|
|
|
// (unit ship): sponsor
|
|
// produced by +veri:dawn to avoid coupling to +hull structure
|
|
pon = u3k(u3t(sas));
|
|
|
|
u3z(hul); u3z(liv); u3z(sas);
|
|
}
|
|
|
|
{
|
|
if ( c3y == u3_Host.ops_u.etn ) {
|
|
zar = u3do("czar:snap:dawn", u3k(u3t(sap)));
|
|
|
|
if ( 0 != u3_Host.ops_u.dns_c ) {
|
|
tuf = _sist_dawn_turf(u3_Host.ops_u.dns_c);
|
|
}
|
|
else {
|
|
tuf = u3do("turf:snap:dawn", u3k(u3t(sap)));
|
|
}
|
|
}
|
|
else {
|
|
{
|
|
fprintf(stderr, "boot: retrieving galaxy table\r\n");
|
|
|
|
// (map ship [=life =pass]): galaxy table
|
|
u3_noun oct = u3do("czar:give:dawn", u3k(bok));
|
|
u3_noun raz = _sist_eth_rpc(url_c, u3k(oct));
|
|
zar = u3do("czar:take:dawn", u3k(raz));
|
|
|
|
u3z(oct); u3z(raz);
|
|
}
|
|
|
|
if ( 0 != u3_Host.ops_u.dns_c ) {
|
|
tuf = _sist_dawn_turf(u3_Host.ops_u.dns_c);
|
|
}
|
|
else {
|
|
fprintf(stderr, "boot: retrieving network domains\r\n");
|
|
|
|
// (list turf): ames domains
|
|
u3_noun oct = u3do("turf:give:dawn", u3k(bok));
|
|
u3_noun fut = _sist_eth_rpc(url_c, u3k(oct));
|
|
tuf = u3do("turf:take:dawn", u3k(fut));
|
|
|
|
u3z(oct); u3z(fut);
|
|
}
|
|
}
|
|
}
|
|
|
|
u3z(rac);
|
|
|
|
// [%dawn seed sponsor galaxies domains block eth-url snap]
|
|
return u3nc(c3__dawn, u3nq(sed, pon, zar, u3nq(tuf, bok, url, sap)));
|
|
}
|
|
|
|
/* _sist_zen(): get OS entropy.
|
|
*/
|
|
static u3_noun
|
|
_sist_zen(void)
|
|
{
|
|
c3_w rad_w[16];
|
|
|
|
c3_rand(rad_w);
|
|
return u3i_words(16, rad_w);
|
|
}
|
|
|
|
/* _sist_come(): mine a comet.
|
|
*/
|
|
static u3_noun
|
|
_sist_come(void)
|
|
{
|
|
u3_noun tar, eny, sed;
|
|
|
|
// XX choose from list, at random, &c
|
|
tar = u3dc("slav", 'p', u3i_string("~marzod"));
|
|
eny = _sist_zen();
|
|
|
|
{
|
|
u3_noun sar = u3dc("scot", 'p', u3k(tar));
|
|
c3_c* tar_c = u3r_string(sar);
|
|
|
|
fprintf(stderr, "boot: mining a comet under %s\r\n", tar_c);
|
|
free(tar_c);
|
|
u3z(sar);
|
|
}
|
|
|
|
sed = u3dc("come:dawn", u3k(tar), u3k(eny));
|
|
|
|
{
|
|
u3_noun who = u3dc("scot", 'p', u3k(u3h(sed)));
|
|
c3_c* who_c = u3r_string(who);
|
|
|
|
fprintf(stderr, "boot: found comet %s\r\n", who_c);
|
|
free(who_c);
|
|
u3z(who);
|
|
}
|
|
|
|
u3z(tar); u3z(eny);
|
|
|
|
return sed;
|
|
}
|
|
|
|
/* sist_key(): parse a private key-file.
|
|
*/
|
|
static u3_noun
|
|
sist_key(u3_noun des)
|
|
{
|
|
u3_noun sed, who;
|
|
|
|
u3_noun eds = u3dc("slaw", c3__uw, u3k(des));
|
|
|
|
if ( u3_nul == eds ) {
|
|
c3_c* sed_c = u3r_string(des);
|
|
fprintf(stderr, "dawn: invalid private keys: %s\r\n", sed_c);
|
|
free(sed_c);
|
|
u3_lo_bail();
|
|
}
|
|
|
|
if ( 0 == u3_Host.ops_u.who_c ) {
|
|
fprintf(stderr, "dawn: -w required\r\n");
|
|
u3_lo_bail();
|
|
}
|
|
|
|
u3_noun woh = u3i_string(u3_Host.ops_u.who_c);
|
|
u3_noun whu = u3dc("slaw", 'p', u3k(woh));
|
|
|
|
if ( u3_nul == whu ) {
|
|
fprintf(stderr, "dawn: invalid ship specificed with -w %s\r\n",
|
|
u3_Host.ops_u.who_c);
|
|
u3_lo_bail();
|
|
}
|
|
|
|
// +seed:able:jael: private key file
|
|
sed = u3ke_cue(u3k(u3t(eds)));
|
|
who = u3h(sed);
|
|
|
|
if ( c3n == u3r_sing(who, u3t(whu)) ) {
|
|
u3_noun how = u3dc("scot", 'p', u3k(who));
|
|
c3_c* how_c = u3r_string(u3k(how));
|
|
fprintf(stderr, "dawn: mismatch between -w %s and -K %s\r\n",
|
|
u3_Host.ops_u.who_c, how_c);
|
|
|
|
u3z(how);
|
|
free(how_c);
|
|
u3_lo_bail();
|
|
}
|
|
|
|
u3z(woh); u3z(whu); u3z(des); u3z(eds);
|
|
|
|
return sed;
|
|
}
|
|
|
|
/* u3_sist_boot(): restore or create.
|
|
*/
|
|
void
|
|
u3_sist_boot(void)
|
|
{
|
|
if ( c3n == u3_Host.ops_u.nuu ) {
|
|
_sist_rest();
|
|
|
|
if ( c3y == u3A->fak ) {
|
|
c3_c* who_c = u3r_string(u3dc("scot", 'p', u3k(u3A->own)));
|
|
fprintf(stderr, "fake: %s\r\n", who_c);
|
|
free(who_c);
|
|
|
|
// XX review persistent options
|
|
|
|
// disable networking
|
|
u3_Host.ops_u.net = c3n;
|
|
// disable battery hashes
|
|
u3_Host.ops_u.has = c3y;
|
|
u3C.wag_w |= u3o_hashless;
|
|
}
|
|
}
|
|
else {
|
|
u3_noun pig, who;
|
|
|
|
if ( 0 != u3_Host.ops_u.fak_c ) {
|
|
u3_noun whu = u3dc("slaw", 'p', u3i_string(u3_Host.ops_u.fak_c));
|
|
|
|
if ( (u3_nul == whu) ) {
|
|
fprintf(stderr, "fake: invalid ship: %s\r\n", u3_Host.ops_u.fak_c);
|
|
u3_lo_bail();
|
|
}
|
|
else {
|
|
u3_noun rac = u3do("clan:title", u3k(u3t(whu)));
|
|
|
|
if ( c3__pawn == rac ) {
|
|
fprintf(stderr, "fake comets are disallowed\r\n");
|
|
u3_lo_bail();
|
|
}
|
|
|
|
u3z(rac);
|
|
}
|
|
|
|
fprintf(stderr, "fake: %s\r\n", u3_Host.ops_u.fak_c);
|
|
|
|
u3A->fak = c3y;
|
|
who = u3k(u3t(whu));
|
|
pig = u3nc(c3__fake, u3k(who));
|
|
|
|
u3z(whu);
|
|
}
|
|
else {
|
|
u3_noun sed;
|
|
|
|
if ( 0 != u3_Host.ops_u.key_c ) {
|
|
u3_noun des = u3m_file(u3_Host.ops_u.key_c);
|
|
sed = sist_key(des);
|
|
}
|
|
else if ( 0 != u3_Host.ops_u.gen_c ) {
|
|
u3_noun des = u3i_string(u3_Host.ops_u.gen_c);
|
|
sed = sist_key(des);
|
|
}
|
|
else {
|
|
sed = _sist_come();
|
|
}
|
|
|
|
u3A->fak = c3n;
|
|
pig = _sist_dawn(u3k(sed));
|
|
who = u3k(u3h(u3h(u3t(pig))));
|
|
|
|
u3z(sed);
|
|
}
|
|
|
|
u3A->own = who;
|
|
|
|
// initialize ames
|
|
{
|
|
u3_noun tuf = (c3y == u3A->fak) ? u3_nul : u3h(u3t(u3t(u3t(u3t(pig)))));
|
|
// with a fake event to bring up listeners and configure domains
|
|
u3_ames_ef_turf(u3k(tuf));
|
|
// and real effect to set the output duct
|
|
u3_ames_ef_bake();
|
|
}
|
|
|
|
// Authenticate and initialize terminal.
|
|
u3_term_ef_bake(pig);
|
|
|
|
// queue initial galaxy sync
|
|
{
|
|
u3_noun rac = u3do("clan:title", u3k(u3A->own));
|
|
|
|
if ( c3__czar == rac ) {
|
|
u3_unix_ef_initial_into();
|
|
}
|
|
|
|
u3z(rac);
|
|
}
|
|
|
|
// Create the event log
|
|
_sist_zest();
|
|
}
|
|
}
|