#include #include #include #include #include #include #include "buffer.hpp" #include "encode.hpp" #include "fs.hpp" #include "logger.hpp" #include "mem.hpp" static const char skiplist_subdirs[] = "0123456789abcdef"; struct llarp_nodedb { llarp_nodedb(llarp_crypto *c) : crypto(c) { } llarp_crypto *crypto; // std::map< llarp::pubkey, llarp_rc * > entries; std::unordered_map< llarp::PubKey, llarp_rc *, llarp::PubKeyHash > entries; fs::path nodePath; void Clear() { auto itr = entries.begin(); while(itr != entries.end()) { delete itr->second; itr = entries.erase(itr); } } llarp_rc * getRC(llarp::PubKey pk) { return entries[pk]; } bool pubKeyExists(llarp_rc *rc) { // extract pk from rc llarp::PubKey pk = rc->pubkey; // return true if we found before end return entries.find(pk) != entries.end(); } bool check(llarp_rc *rc) { if(!pubKeyExists(rc)) { // we don't have it return false; } llarp::PubKey pk = rc->pubkey; // TODO: zero out any fields you don't want to compare // serialize both and memcmp byte_t nodetmp[MAX_RC_SIZE]; auto nodebuf = llarp::StackBuffer< decltype(nodetmp) >(nodetmp); if(llarp_rc_bencode(entries[pk], &nodebuf)) { byte_t paramtmp[MAX_RC_SIZE]; auto parambuf = llarp::StackBuffer< decltype(paramtmp) >(paramtmp); if(llarp_rc_bencode(rc, ¶mbuf)) { if(memcmp(¶mbuf, &nodebuf, MAX_RC_SIZE) == 0) { return true; } } } return false; } std::string getRCFilePath(const byte_t *pubkey) { char ftmp[68] = {0}; const char *hexname = llarp::HexEncode< llarp::PubKey, decltype(ftmp) >(pubkey, ftmp); std::string hexString(hexname); std::string filepath = nodePath; filepath.append(PATH_SEP); filepath.append(&hexString[hexString.length() - 1]); filepath.append(PATH_SEP); filepath.append(hexname); filepath.append(".signed"); return filepath; } bool setRC(llarp_rc *rc) { byte_t tmp[MAX_RC_SIZE]; auto buf = llarp::StackBuffer< decltype(tmp) >(tmp); // extract pk from rc llarp::PubKey pk = rc->pubkey; // set local db entries[pk] = rc; if(llarp_rc_bencode(rc, &buf)) { buf.sz = buf.cur - buf.base; auto filepath = getRCFilePath(rc->pubkey); llarp::Debug("saving RC.pubkey ", filepath); std::ofstream ofs( filepath, std::ofstream::out & std::ofstream::binary & std::ofstream::trunc); ofs.write((char *)buf.base, buf.sz); ofs.close(); if(!ofs) { llarp::Error("Failed to write: ", filepath); return false; } llarp::Debug("saved RC.pubkey: ", filepath); return true; } return false; } ssize_t Load(const fs::path &path) { std::error_code ec; if(!fs::exists(path, ec)) { return -1; } ssize_t loaded = 0; for(const char &ch : skiplist_subdirs) { std::string p; p += ch; fs::path sub = path / p; ssize_t l = loadSubdir(sub); if(l > 0) loaded += l; } return loaded; } ssize_t loadSubdir(const fs::path &dir) { ssize_t sz = 0; for(auto &path : fs::directory_iterator(dir)) { if(loadfile(path)) sz++; } return sz; } bool loadfile(const fs::path &fpath) { std::ifstream f(fpath, std::ios::binary); if(!f.is_open()) return false; byte_t tmp[MAX_RC_SIZE]; auto buf = llarp::StackBuffer< decltype(tmp) >(tmp); f.seekg(0, std::ios::end); size_t sz = f.tellg(); f.seekg(0, std::ios::beg); if(sz > buf.sz) return false; // TODO: error checking f.read((char *)buf.base, sz); buf.sz = sz; llarp_rc *rc = new llarp_rc; llarp::Zero(rc, sizeof(llarp_rc)); if(llarp_rc_bdecode(rc, &buf)) { if(llarp_rc_verify_sig(crypto, rc)) { llarp::PubKey pk(rc->pubkey); entries[pk] = rc; return true; } } llarp_rc_free(rc); delete rc; return false; } /* bool Save() { auto itr = entries.begin(); while(itr != entries.end()) { llarp::pubkey pk = itr->first; llarp_rc *rc= itr->second; itr++; // advance } return true; } */ }; // call request hook void logic_threadworker_callback(void *user) { llarp_async_verify_rc *verify_request = static_cast< llarp_async_verify_rc * >(user); verify_request->hook(verify_request); } // write it to disk void disk_threadworker_setRC(void *user) { llarp_async_verify_rc *verify_request = static_cast< llarp_async_verify_rc * >(user); verify_request->valid = verify_request->nodedb->setRC(&verify_request->rc); llarp_logic_queue_job(verify_request->logic, {verify_request, &logic_threadworker_callback}); } // we run the crypto verify in the crypto threadpool worker void crypto_threadworker_verifyrc(void *user) { llarp_async_verify_rc *verify_request = static_cast< llarp_async_verify_rc * >(user); verify_request->valid = llarp_rc_verify_sig(verify_request->nodedb->crypto, &verify_request->rc); // if it's valid we need to set it if(verify_request->valid) { llarp::Debug("RC is valid, saving to disk"); llarp_threadpool_queue_job(verify_request->diskworker, {verify_request, &disk_threadworker_setRC}); } else { // callback to logic thread llarp::Warn("RC is not valid, can't save to disk"); llarp_logic_queue_job(verify_request->logic, {verify_request, &logic_threadworker_callback}); } } void nodedb_inform_load_rc(void *user) { llarp_async_load_rc *job = static_cast< llarp_async_load_rc * >(user); job->hook(job); } void nodedb_async_load_rc(void *user) { llarp_async_load_rc *job = static_cast< llarp_async_load_rc * >(user); auto fpath = job->nodedb->getRCFilePath(job->pubkey); job->loaded = job->nodedb->loadfile(fpath); if(job->loaded) { llarp_rc_copy(&job->rc, job->nodedb->getRC(job->pubkey)); } llarp_logic_queue_job(job->logic, {job, &nodedb_inform_load_rc}); } extern "C" { struct llarp_nodedb * llarp_nodedb_new(struct llarp_crypto *crypto) { return new llarp_nodedb(crypto); } void llarp_nodedb_free(struct llarp_nodedb **n) { if(*n) { auto i = *n; *n = nullptr; i->Clear(); delete i; } } bool llarp_nodedb_ensure_dir(const char *dir) { fs::path path(dir); std::error_code ec; if(!fs::exists(dir, ec)) fs::create_directories(path, ec); if(ec) return false; if(!fs::is_directory(path)) return false; for(const char &ch : skiplist_subdirs) { std::string p; p += ch; fs::path sub = path / p; fs::create_directory(sub, ec); if(ec) return false; } return true; } ssize_t llarp_nodedb_load_dir(struct llarp_nodedb *n, const char *dir) { std::error_code ec; if(!fs::exists(dir, ec)) { return -1; } n->nodePath = dir; return n->Load(dir); } void llarp_nodedb_async_verify(struct llarp_async_verify_rc *job) { // switch to crypto threadpool and continue with crypto_threadworker_verifyrc llarp_threadpool_queue_job(job->cryptoworker, {job, &crypto_threadworker_verifyrc}); } void llarp_nodedb_async_load_rc(struct llarp_async_load_rc *job) { // call in the disk io thread so we don't bog down the others llarp_threadpool_queue_job(job->diskworker, {job, &nodedb_async_load_rc}); } } // end extern