summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--TODO56
-rw-r--r--contrib/defaults.conf12
-rw-r--r--src/core/core_api.c4
-rw-r--r--src/fs/fs.h177
-rw-r--r--src/fs/gnunet-service-fs.c1617
-rw-r--r--src/include/gnunet_bio_lib.h2
-rw-r--r--src/include/gnunet_constants.h11
-rw-r--r--src/include/gnunet_core_service.h3
-rw-r--r--src/include/gnunet_protocols.h12
9 files changed, 1648 insertions, 246 deletions
diff --git a/TODO b/TODO
index e37e66739..5cacc1603 100644
--- a/TODO
+++ b/TODO
@@ -12,36 +12,14 @@ away), in order in which they will likely be done:
* MySQL / Postgres plugins (datastore, datacache)
* UPNP
-
Urgent items (before announcing ng.gnunet.org):
-* TESTING (needed for DV, DHT, Topology)
- - implement library for local testing
- + modify configuration to allow controlling
- connections for non-local starts
- + CORE service does not start with valid peer ID (all zeros)
- -- testcase fails!
- + consider changing API for peer-group termination
- to call continuation when done
- + testbed creation with topology (needs working F2F topology) [Nate]
- + testbed with churn [Nate]
- - implement testcases for library
- + get test for basic peer start to work!
- + test basic peer connect
- + test group start
- + test basic peer re-configure [Nate]
- + test topology creation [Nate]
- + test churn generation [Nate]
-* TOPOLOGY:
- - implement testcases (needs TESTING)
-* HOSTLIST:
- - implement testcases
* FS (basic anonymous FS only)
- - design network structs (P2P)
- + query
- + response
+ - need way to determine network load (up/down)
+ - need *fast* way to check/update trust in peers
+ (async peerinfo would not be right)
- implement FS service
- + CS-functions (query BF, on-demand encoding, indexed-list serialization/deserialization)
- + P2P-functions (query, response)
+ + P2P-functions (query, response, peer-disconnect)
+ + CS/P2P-functions (initiate P2P, handle P2P->CS)
- implement testcases
+ URI API
+ getopt API
@@ -52,6 +30,18 @@ Urgent items (before announcing ng.gnunet.org):
~ search
~ unindex
+ directory API
+* TESTING (needed for DV, DHT, Topology)
+ - implement library for local testing
+ + modify configuration to allow controlling connections for non-local starts
+ + CORE service does not start with valid peer ID (all zeros) -- testcase fails!
+ + consider changing API for peer-group termination to call continuation when done
+ - implement testcases for library
+ + get test for basic peer start to work!
+ + test basic peer connect
+ + test group start
+* TEST:
+ - topology (needs TESTING)
+ - hostlist (maybe easier with TESTING?)
* new webpage
- prevent?
- migrate Mantis!?
@@ -64,9 +54,8 @@ Urgent items (before announcing ng.gnunet.org):
0.9.0pre0:
* Module features to implement:
- advanced FS API parts
- + namespaces
- ~ fundamental namespace API
- + search: SBlocks, KSBlocks, probes
+ + namespaces: fundamental namespace API
+ + search: SBlocks, KSBlocks, probes, notify FS-service of known results
+ collection
+ location URIs (publish, search, download)
+ persistence support (publish, unindex, search, download)
@@ -79,6 +68,8 @@ Urgent items (before announcing ng.gnunet.org):
+ gnunet-download (many options)
+ gnunet-directory (man page, options)
+ gnunet-pseudonym (all of it)
+ + gnunet-service-fs (remove failing on-demand blocks)
+ + datastore: do active migration support here?
- implement adv. FS testcases
+ insert: sblocks, loc uris
+ download: loc uris
@@ -98,8 +89,13 @@ Urgent items (before announcing ng.gnunet.org):
+ default generation
+ need to settle basic design; do we want to keep guile?
- testing (RC-pre0)
+ + testbed creation with topology (needs working F2F topology) [Nate]
+ + testbed with churn [Nate]
+ implement library for distributed testing [Nate]
+ implement testcases for distributed testing [Nate]
+ + test basic peer re-configure [Nate]
+ + test topology creation [Nate]
+ + test churn generation [Nate]
0.9.0pre1:
* Module features to implement:
diff --git a/contrib/defaults.conf b/contrib/defaults.conf
index 0af2752fb..1f3f5c5a4 100644
--- a/contrib/defaults.conf
+++ b/contrib/defaults.conf
@@ -177,3 +177,15 @@ DATABASE = sqlite
[datastore-sqlite]
FILENAME = $SERVICEHOME/datastore/sqlite.db
+
+[fs]
+INDEXDB = $SERVICEHOME/idxinfo.lst
+PORT = 2094
+HOSTNAME = localhost
+HOME = $SERVICEHOME
+CONFIG = $DEFAULTCONFIG
+BINARY = gnunet-service-fs
+ACCEPT_FROM = 127.0.0.1;
+ACCEPT_FROM6 = ::1;
+ALLOW_SHUTDOWN = YES
+
diff --git a/src/core/core_api.c b/src/core/core_api.c
index 6aca88640..05f34ec27 100644
--- a/src/core/core_api.c
+++ b/src/core/core_api.c
@@ -550,8 +550,8 @@ main_handler (void *cls, const struct GNUNET_MessageHeader *msg)
GNUNET_TIME_relative_ntoh (cim->latency),
(int) ntohl (cim->reserved_amount),
cim->preference);
- /* done, clean up! */
- GNUNET_CORE_notify_transmit_ready_cancel (h->submitted);
+ /* done, clean up! */
+ GNUNET_CORE_notify_transmit_ready_cancel (h->submitted); // HUH?
trigger_next_request (h);
break;
case GNUNET_MESSAGE_TYPE_CORE_SOLICIT_TRAFFIC:
diff --git a/src/fs/fs.h b/src/fs/fs.h
index c2a2e7d03..002ffb6b3 100644
--- a/src/fs/fs.h
+++ b/src/fs/fs.h
@@ -26,6 +26,7 @@
#ifndef FS_H
#define FS_H
+#include "gnunet_constants.h"
#include "gnunet_datastore_service.h"
#include "gnunet_fs_service.h"
@@ -61,6 +62,63 @@
*/
#define HASHING_BLOCKSIZE (1024 * 1024)
+/**
+ * Number of bits we set per entry in the bloomfilter.
+ * Do not change!
+ */
+#define BLOOMFILTER_K 16
+
+/**
+ * By how much (in ms) do we decrement the TTL
+ * at each hop?
+ */
+#define TTL_DECREMENT 5000
+
+/**
+ * How long are we willing to wait for the datastore to be ready to
+ * process a request for a query without priority?
+ */
+#define BASIC_DATASTORE_REQUEST_DELAY GNUNET_TIME_relative_multiply (GNUNET_TIME_UNIT_SECONDS, 5)
+
+
+/**
+ * How long are we willing to wait for the core to be ready to
+ * transmit a reply to the target peer (if we can not transmit
+ * until then, we will discard the reply).
+ */
+#define ACCEPTABLE_REPLY_DELAY GNUNET_TIME_relative_multiply (GNUNET_TIME_UNIT_MINUTES, 5)
+
+
+/**
+ * Bandwidth value of an (effectively) 0-priority query.
+ */
+#define QUERY_BANDWIDTH_VALUE 0.001
+
+/**
+ * Bandwidth value of a 0-priority content (must be
+ * fairly high compared to query since content is
+ * typically significantly larger -- and more valueable
+ * since it can take many queries to get one piece of
+ * content).
+ */
+#define CONTENT_BANDWIDTH_VALUE 0.8
+
+/**
+ * By which amount do we decrement the TTL for simple forwarding /
+ * indirection of the query; in milli-seconds. Set somewhat in
+ * accordance to your network latency (above the time it'll take you
+ * to send a packet and get a reply).
+ */
+#define TTL_DECREMENT 5000
+
+/**
+ * Until which load do we consider the peer idle and do not
+ * charge at all? (should be larger than GNUNET_IDLE_LOAD_THRESHOLD used
+ * by the rest of the code)!
+ */
+#define IDLE_LOAD_THRESHOLD ((100 + GNUNET_CONSTANTS_IDLE_LOAD_THRESHOLD) / 2)
+
+
/**
* @brief content hash key
@@ -1209,7 +1267,12 @@ struct SearchMessage
* SBLOCKS (aka query).
*/
GNUNET_HashCode query;
-
+
+ /* this is followed by the hash codes of already-known
+ results (which should hence be excluded from what
+ the service returns); naturally, this only applies
+ to queries that can have multiple results, such as
+ those for KBLOCKS (KSK) and SBLOCKS (SKS) */
};
@@ -1243,6 +1306,118 @@ struct ContentMessage
};
+/**
+ * Only the (mandatory) query is included.
+ */
+#define GET_MESSAGE_BIT_QUERY_ONLY 0
+
+/**
+ * The peer identity of a peer waiting for the
+ * reply is included (used if the response
+ * should be transmitted to someone other than
+ * the sender of the GET).
+ */
+#define GET_MESSAGE_BIT_RETURN_TO 1
+
+/**
+ * The hash of the public key of the target
+ * namespace is included (for SKS queries).
+ */
+#define GET_MESSAGE_BIT_SKS_NAMESPACE 2
+
+/**
+ * The peer identity of a peer that had claimed to have the content
+ * previously is included (can be used if responder-anonymity is not
+ * desired; note that the precursor presumably lacked a direct
+ * connection to the specified peer; still, the receiver is in no way
+ * required to limit forwarding only to the specified peer, it should
+ * only prefer it somewhat if possible).
+ */
+#define GET_MESSAGE_BIT_TRANSMIT_TO 4
+
+
+/**
+ * Message sent between peers asking for FS-content.
+ */
+struct GetMessage
+{
+
+ /**
+ * Message type will be GNUNET_MESSAGE_TYPE_FS_GET.
+ */
+ struct GNUNET_MessageHeader header;
+
+ /**
+ * Type of the query (block type).
+ */
+ uint32_t type GNUNET_PACKED;
+
+ /**
+ * How important is this request (network byte order)
+ */
+ uint32_t priority GNUNET_PACKED;
+
+ /**
+ * Relative time to live in GNUNET_CRON_MILLISECONDS (network byte order)
+ */
+ int32_t ttl GNUNET_PACKED;
+
+ /**
+ * The content hash should be mutated using this value
+ * before checking against the bloomfilter (used to
+ * get many different filters for the same hash codes).
+ * The number should be in big-endian format when used
+ * for mingling.
+ */
+ int32_t filter_mutator GNUNET_PACKED;
+
+ /**
+ * Which of the optional hash codes are present at the end of the
+ * message? See GET_MESSAGE_BIT_xx constants. For each bit that is
+ * set, an additional GNUNET_HashCode with the respective content
+ * (in order of the bits) will be appended to the end of the GET
+ * message.
+ */
+ uint32_t hash_bitmap GNUNET_PACKED;
+
+ /**
+ * Hashcodes of the file(s) we're looking for.
+ * Details depend on the query type.
+ */
+ GNUNET_HashCode query GNUNET_PACKED;
+
+ /* this is followed by hash codes
+ as specified in the "hash_bitmap";
+ after that, an optional bloomfilter
+ (with bits set for replies that should
+ be suppressed) can be present */
+};
+
+
+/**
+ * Message sent between peers providing FS-content.
+ */
+struct PutMessage
+{
+
+ /**
+ * Message type will be GNUNET_MESSAGE_TYPE_FS_PUT.
+ */
+ struct GNUNET_MessageHeader header;
+
+ /**
+ * Type of the block (in big endian).
+ */
+ uint32_t type GNUNET_PACKED;
+
+ /**
+ * When does this result expire?
+ */
+ struct GNUNET_TIME_RelativeNBO expiration;
+
+ /* this is followed by the actual encrypted content */
+
+};
#endif
diff --git a/src/fs/gnunet-service-fs.c b/src/fs/gnunet-service-fs.c
index 8d36e74c5..1f248c059 100644
--- a/src/fs/gnunet-service-fs.c
+++ b/src/fs/gnunet-service-fs.c
@@ -24,34 +24,29 @@
* @author Christian Grothoff
*
* TODO:
- * - read_index_list
- * - write_index_list
- * - bloomfilter support (GET, CS-request with BF, etc.)
- * - handling of on-demand blocks from datastore (need to use indexed-list!)
- * - all P2P messages
+ * - tracking of PendingRequests (and defining that struct...)
+ * - setup P2P search on CS request
+ * - setup P2P search on P2P GET
+ * - forward replies based on tracked requests
+ * - validation of KBLOCKS (almost done)
+ * - validation of SBLOCKS
+ * - validation of KSBLOCKS
+ * - content migration (put in local DS)
+ * - possible major issue: we may
+ * queue "gazillions" of (K|S)Blocks for the
+ * core to transmit to another peer; need
+ * to make sure this is bounded overall...
+ * - various load-based actions (can wait)
+ * - remove on-demand blocks if they keep failing (can wait)
*/
#include "platform.h"
-#include "gnunet_protocols.h"
#include "gnunet_core_service.h"
#include "gnunet_datastore_service.h"
+#include "gnunet_protocols.h"
+#include "gnunet_signatures.h"
#include "gnunet_util_lib.h"
#include "fs.h"
-/**
- * Our connection to the datastore.
- */
-static struct GNUNET_DATASTORE_Handle *dsh;
-
-/**
- * Our scheduler.
- */
-static struct GNUNET_SCHEDULER_Handle *sched;
-
-/**
- * Our configuration.
- */
-const struct GNUNET_CONFIGURATION_Handle *cfg;
-
/**
* In-memory information about indexed files (also available
@@ -72,7 +67,7 @@ struct IndexInfo
const char *filename;
/**
- * Context for tranmitting confirmation to client,
+ * Context for transmitting confirmation to client,
* NULL if we've done this already.
*/
struct GNUNET_SERVER_TransmitContext *tc;
@@ -86,10 +81,367 @@ struct IndexInfo
/**
+ * Signature of a function that is called whenever a datastore
+ * request can be processed (or an entry put on the queue times out).
+ *
+ * @param cls closure
+ * @param ok GNUNET_OK if DS is ready, GNUNET_SYSERR on timeout
+ */
+typedef void (*RequestFunction)(void *cls,
+ int ok);
+
+
+/**
+ * Doubly-linked list of our requests for the datastore.
+ */
+struct DatastoreRequestQueue
+{
+
+ /**
+ * This is a doubly-linked list.
+ */
+ struct DatastoreRequestQueue *next;
+
+ /**
+ * This is a doubly-linked list.
+ */
+ struct DatastoreRequestQueue *prev;
+
+ /**
+ * Function to call (will issue the request).
+ */
+ RequestFunction req;
+
+ /**
+ * Closure for req.
+ */
+ void *req_cls;
+
+ /**
+ * When should this request time-out because we don't care anymore?
+ */
+ struct GNUNET_TIME_Absolute timeout;
+
+ /**
+ * ID of task used for signaling timeout.
+ */
+ GNUNET_SCHEDULER_TaskIdentifier task;
+
+};
+
+
+/**
+ * Closure for processing START_SEARCH messages from a client.
+ */
+struct LocalGetContext
+{
+
+ /**
+ * This is a doubly-linked list.
+ */
+ struct LocalGetContext *next;
+
+ /**
+ * This is a doubly-linked list.
+ */
+ struct LocalGetContext *prev;
+
+ /**
+ * Client that initiated the search.
+ */
+ struct GNUNET_SERVER_Client *client;
+
+ /**
+ * Array of results that we've already received
+ * (can be NULL).
+ */
+ GNUNET_HashCode *results;
+
+ /**
+ * Bloomfilter over all results (for fast query construction);
+ * NULL if we don't have any results.
+ */
+ struct GNUNET_CONTAINER_BloomFilter *results_bf;
+
+ /**
+ * DS request associated with this operation.
+ */
+ struct DatastoreRequestQueue *req;
+
+ /**
+ * Current result message to transmit to client (or NULL).
+ */
+ struct ContentMessage *result;
+
+ /**
+ * Type of the content that we're looking for.
+ * 0 for any.
+ */
+ uint32_t type;
+
+ /**
+ * Desired anonymity level.
+ */
+ uint32_t anonymity_level;
+
+ /**
+ * Number of results actually stored in the results array.
+ */
+ unsigned int results_used;
+
+ /**
+ * Size of the results array in memory.
+ */
+ unsigned int results_size;
+
+ /**
+ * If the request is for a DBLOCK or IBLOCK, this is the identity of
+ * the peer that is known to have a response. Set to all-zeros if
+ * such a target is not known (note that even if OUR anonymity
+ * level is >0 we may happen to know the responder's identity;
+ * nevertheless, we should probably not use it for a DHT-lookup
+ * or similar blunt actions in order to avoid exposing ourselves).
+ * <p>
+ * If the request is for an SBLOCK, this is the identity of the
+ * pseudonym to which the SBLOCK belongs.
+ * <p>
+ * If the request is for a KBLOCK, "target" must be all zeros.
+ */
+ GNUNET_HashCode target;
+
+ /**
+ * Hash of the keyword (aka query) for KBLOCKs; Hash of
+ * the CHK-encoded block for DBLOCKS and IBLOCKS (aka query)
+ * and hash of the identifier XORed with the target for
+ * SBLOCKS (aka query).
+ */
+ GNUNET_HashCode query;
+
+};
+
+
+/**
+ * Possible routing policies for an FS-GET request.
+ */
+enum RoutingPolicy
+ {
+ /**
+ * Simply drop the request.
+ */
+ ROUTING_POLICY_NONE = 0,
+
+ /**
+ * Answer it if we can from local datastore.
+ */
+ ROUTING_POLICY_ANSWER = 1,
+
+ /**
+ * Forward the request to other peers (if possible).
+ */
+ ROUTING_POLICY_FORWARD = 2,
+
+ /**
+ * Forward to other peers, and ask them to route
+ * the response via ourselves.
+ */
+ ROUTING_POLICY_INDIRECT = 6,
+
+ /**
+ * Do everything we could possibly do (that would
+ * make sense).
+ */
+ ROUTING_POLICY_ALL = 7
+ };
+
+
+/**
+ * Internal context we use for our initial processing
+ * of a GET request.
+ */
+struct ProcessGetContext
+{
+ /**
+ * The search query (used for datastore lookup).
+ */
+ GNUNET_HashCode query;
+
+ /**
+ * Which peer we should forward the response to.
+ */
+ struct GNUNET_PeerIdentity reply_to;
+
+ /**
+ * Namespace for the result (only set for SKS requests)
+ */
+ GNUNET_HashCode namespace;
+
+ /**
+ * Peer that we should forward the query to if possible
+ * (since that peer likely has the content).
+ */
+ struct GNUNET_PeerIdentity prime_target;
+
+ /**
+ * When did we receive this request?
+ */
+ struct GNUNET_TIME_Absolute start_time;
+
+ /**
+ * Our entry in the DRQ (non-NULL while we wait for our
+ * turn to interact with the local database).
+ */
+ struct DatastoreRequestQueue *drq;
+
+ /**
+ * Filter used to eliminate duplicate
+ * results. Can be NULL if we are
+ * not yet filtering any results.
+ */
+ struct GNUNET_CONTAINER_BloomFilter *bf;
+
+ /**
+ * Bitmap describing which of the optional
+ * hash codes / peer identities were given to us.
+ */
+ uint32_t bm;
+
+ /**
+ * Desired block type.
+ */
+ uint32_t type;
+
+ /**
+ * Priority of the request.
+ */
+ uint32_t priority;
+
+ /**
+ * In what ways are we going to process
+ * the request?
+ */
+ enum RoutingPolicy policy;
+
+ /**
+ * Time-to-live for the request (value
+ * we use).
+ */
+ int32_t ttl;
+
+ /**
+ * Number to mingle hashes for bloom-filter
+ * tests with.
+ */
+ int32_t mingle;
+
+ /**
+ * Number of results that were found so far.
+ */
+ unsigned int results_found;
+};
+
+
+/**
+ * Information we keep for each pending
+ * request.
+ */
+struct PendingRequest
+{
+ // FIXME
+};
+
+
+/**
+ * Closure for "process_reply" function.
+ */
+struct ProcessReplyClosure
+{
+ /**
+ * The data for the reply.
+ */
+ const void *data;
+
+ /**
+ * When the reply expires.
+ */
+ struct GNUNET_TIME_Absolute expiration;
+
+ /**
+ * Size of data.
+ */
+ size_t size;
+
+ /**
+ * Type of the block.
+ */
+ uint32_t type;
+
+ /**
+ * How much was this reply worth to us?
+ */
+ uint32_t priority;
+};
+
+
+/**
+ * Map from queries to pending requests ("struct PendingRequest") for
+ * this query.
+ */
+static struct GNUNET_CONTAINER_MultiHashMap *request_map;
+
+/**
+ * Our connection to the datastore.
+ */
+static struct GNUNET_DATASTORE_Handle *dsh;
+
+/**
+ * Our scheduler.
+ */
+static struct GNUNET_SCHEDULER_Handle *sched;
+
+/**
+ * Our configuration.
+ */
+const struct GNUNET_CONFIGURATION_Handle *cfg;
+
+/**
+ * Handle to the core service (NULL until we've
+ * connected to it).
+ */
+struct GNUNET_CORE_Handle *core;
+
+/**
+ * Head of doubly-linked LGC list.
+ */
+static struct LocalGetContext *lgc_head;
+
+/**
+ * Tail of doubly-linked LGC list.
+ */
+static struct LocalGetContext *lgc_tail;
+
+/**
+ * Head of request queue for the datastore, sorted by timeout.
+ */
+static struct DatastoreRequestQueue *drq_head;
+
+/**
+ * Tail of request queue for the datastore.
+ */
+static struct DatastoreRequestQueue *drq_tail;
+
+/**
* Linked list of indexed files.
*/
static struct IndexInfo *indexed_files;
+/**
+ * Maps hash over content of indexed files
+ * to the respective filename. The filenames
+ * are pointers into the indexed_files linked
+ * list and do not need to be freed.
+ */
+static struct GNUNET_CONTAINER_MultiHashMap *ifm;
+
/**
* Write the current index information list to disk.
@@ -97,7 +449,54 @@ static struct IndexInfo *indexed_files;
static void
write_index_list ()
{
- // FIXME
+ struct GNUNET_BIO_WriteHandle *wh;
+ char *fn;
+ struct IndexInfo *pos;
+
+ if (GNUNET_OK !=
+ GNUNET_CONFIGURATION_get_value_filename (cfg,
+ "FS",
+ "INDEXDB",
+ &fn))
+ {
+ GNUNET_log (GNUNET_ERROR_TYPE_ERROR | GNUNET_ERROR_TYPE_BULK,
+ _("Configuration option `%s' in section `%s' missing.\n"),
+ "INDEXDB",
+ "FS");
+ return;
+ }
+ wh = GNUNET_BIO_write_open (fn);
+ if (NULL == wh)
+ {
+ GNUNET_log (GNUNET_ERROR_TYPE_ERROR | GNUNET_ERROR_TYPE_BULK,
+ _("Could not open `%s'.\n"),
+ fn);
+ GNUNET_free (fn);
+ return;
+ }
+ pos = indexed_files;
+ while (pos != NULL)
+ {
+ if ( (GNUNET_OK !=
+ GNUNET_BIO_write (wh,
+ &pos->file_id,
+ sizeof (GNUNET_HashCode))) ||
+ (GNUNET_OK !=
+ GNUNET_BIO_write_string (wh,
+ pos->filename)) )
+ break;
+ pos = pos->next;
+ }
+ if (GNUNET_OK !=
+ GNUNET_BIO_write_close (wh))
+ {
+ GNUNET_log (GNUNET_ERROR_TYPE_ERROR | GNUNET_ERROR_TYPE_BULK,
+ _("Error writing `%s'.\n"),
+ fn);
+ GNUNET_free (fn);
+ return;
+ }
+ GNUNET_free (fn);
}
@@ -107,7 +506,70 @@ write_index_list ()
static void
read_index_list ()
{
- // FIXME
+ struct GNUNET_BIO_ReadHandle *rh;
+ char *fn;
+ struct IndexInfo *pos;
+ char *fname;
+ GNUNET_HashCode hc;
+ size_t slen;
+ char *emsg;
+
+ if (GNUNET_OK !=
+ GNUNET_CONFIGURATION_get_value_filename (cfg,
+ "FS",
+ "INDEXDB",
+ &fn))
+ {
+ GNUNET_log (GNUNET_ERROR_TYPE_ERROR | GNUNET_ERROR_TYPE_BULK,
+ _("Configuration option `%s' in section `%s' missing.\n"),
+ "INDEXDB",
+ "FS");
+ return;
+ }
+ rh = GNUNET_BIO_read_open (fn);
+ if (NULL == rh)
+ {
+ GNUNET_log (GNUNET_ERROR_TYPE_ERROR | GNUNET_ERROR_TYPE_BULK,
+ _("Could not open `%s'.\n"),
+ fn);
+ GNUNET_free (fn);
+ return;
+ }
+
+ while ( (GNUNET_OK ==
+ GNUNET_BIO_read (rh,
+ "Hash of indexed file",
+ &hc,
+ sizeof (GNUNET_HashCode))) &&
+ (GNUNET_OK ==
+ GNUNET_BIO_read_string (rh,
+ "Name of indexed file",
+ &fname,
+ 1024 * 16)) )
+ {
+ slen = strlen (fname) + 1;
+ pos = GNUNET_malloc (sizeof (struct IndexInfo) + slen);
+ pos->file_id = hc;
+ pos->filename = (const char *) &pos[1];
+ memcpy (&pos[1], fname, slen);
+ if (GNUNET_SYSERR ==
+ GNUNET_CONTAINER_multihashmap_put (ifm,
+ &hc,
+ (void*) pos->filename,
+ GNUNET_CONTAINER_MULTIHASHMAPOPTION_UNIQUE_ONLY))
+ {
+ GNUNET_free (pos);
+ }
+ else
+ {
+ pos->next = indexed_files;
+ indexed_files = pos;
+ }
+ }
+ if (GNUNET_OK !=
+ GNUNET_BIO_read_close (rh, &emsg))
+ GNUNET_free (emsg);
+ GNUNET_free (fn);
}
@@ -121,6 +583,25 @@ read_index_list ()
static void
signal_index_ok (struct IndexInfo *ii)
{
+ if (GNUNET_SYSERR ==
+ GNUNET_CONTAINER_multihashmap_put (ifm,
+ &ii->file_id,
+ (void*) ii->filename,
+ GNUNET_CONTAINER_MULTIHASHMAPOPTION_UNIQUE_ONLY))
+ {
+ GNUNET_log (GNUNET_ERROR_TYPE_WARNING,
+ _("Index request received for file `%s' is indexed as `%s'. Permitting anyway.\n"),
+ ii->filename,
+ (const char*) GNUNET_CONTAINER_multihashmap_get (ifm,
+ &ii->file_id));
+ GNUNET_SERVER_transmit_context_append (ii->tc,
+ NULL, 0,
+ GNUNET_MESSAGE_TYPE_FS_INDEX_START_OK);
+ GNUNET_SERVER_transmit_context_run (ii->tc,
+ GNUNET_TIME_UNIT_MINUTES);
+ GNUNET_free (ii);
+ return;
+ }
ii->next = indexed_files;
indexed_files = ii;
write_index_list ();
@@ -133,7 +614,6 @@ signal_index_ok (struct IndexInfo *ii)
}
-
/**
* Function called once the hash computation over an
* indexed file has completed.
@@ -146,7 +626,7 @@ hash_for_index_val (void *cls,
const GNUNET_HashCode *
res)
{
- struct IndexInfo *ii;
+ struct IndexInfo *ii = cls;
if ( (res == NULL) ||
(0 != memcmp (res,
@@ -199,7 +679,7 @@ handle_index_start (void *cls,
GNUNET_SYSERR);
return;
}
-
+ ism = (const struct IndexStartMessage*) message;
fn = (const char*) &ism[1];
dev = ntohl (ism->device);
ino = GNUNET_ntohll (ism->inode);
@@ -341,67 +821,6 @@ handle_unindex (void *cls,
/**
- * Signature of a function that is called whenever a datastore
- * request can be processed (or an entry put on the queue times out).
- *
- * @param cls closure
- * @param ok GNUNET_OK if DS is ready, GNUNET_SYSERR on timeout
- */
-typedef void (*RequestFunction)(void *cls,
- int ok);
-
-
-/**
- * Doubly-linked list of our requests for the datastore.
- */
-struct DatastoreRequestQueue
-{
-
- /**
- * This is a doubly-linked list.
- */
- struct DatastoreRequestQueue *next;
-
- /**
- * This is a doubly-linked list.
- */
- struct DatastoreRequestQueue *prev;
-
- /**
- * Function to call (will issue the request).
- */
- RequestFunction req;
-
- /**
- * Closure for req.
- */
- void *req_cls;
-
- /**
- * When should this request time-out because we don't care anymore?
- */
- struct GNUNET_TIME_Absolute timeout;
-
- /**
- * ID of task used for signaling timeout.
- */
- GNUNET_SCHEDULER_TaskIdentifier task;
-
-};
-
-
-/**
- * Head of request queue for the datastore, sorted by timeout.
- */
-static struct DatastoreRequestQueue *drq_head;
-
-/**
- * Tail of request queue for the datastore.
- */
-static struct DatastoreRequestQueue *drq_tail;
-
-
-/**
* Run the next DS request in our
* queue, we're done with the current one.
*/
@@ -503,107 +922,6 @@ queue_ds_request (struct GNUNET_TIME_Relative deadline,
/**
- * Closure for processing START_SEARCH messages from a client.
- */
-struct LocalGetContext
-{
-
- /**
- * This is a doubly-linked list.
- */
- struct LocalGetContext *next;
-
- /**
- * This is a doubly-linked list.
- */
- struct LocalGetContext *prev;
-
- /**
- * Client that initiated the search.
- */
- struct GNUNET_SERVER_Client *client;
-
- /**
- * Array of results that we've already received
- * (can be NULL).
- */
- GNUNET_HashCode *results;
-
- /**
- * Bloomfilter over all results (for fast query construction);
- * NULL if we don't have any results.
- */
- struct GNUNET_CONTAINER_BloomFilter *results_bf;
-
- /**
- * DS request associated with this operation.
- */
- struct DatastoreRequestQueue *req;
-
- /**
- * Current result message to transmit to client (or NULL).
- */
- struct ContentMessage *result;
-
- /**
- * Type of the content that we're looking for.
- * 0 for any.
- */
- uint32_t type;
-
- /**
- * Desired anonymity level.
- */
- uint32_t anonymity_level;
-
- /**
- * Number of results actually stored in the results array.
- */
- unsigned int results_used;
-
- /**
- * Size of the results array in memory.
- */
- unsigned int results_size;
-
- /**
- * If the request is for a DBLOCK or IBLOCK, this is the identity of
- * the peer that is known to have a response. Set to all-zeros if
- * such a target is not known (note that even if OUR anonymity
- * level is >0 we may happen to know the responder's identity;
- * nevertheless, we should probably not use it for a DHT-lookup
- * or similar blunt actions in order to avoid exposing ourselves).
- * <p>
- * If the request is for an SBLOCK, this is the identity of the
- * pseudonym to which the SBLOCK belongs.
- * <p>
- * If the request is for a KBLOCK, "target" must be all zeros.
- */
- GNUNET_HashCode target;
-
- /**
- * Hash of the keyword (aka query) for KBLOCKs; Hash of
- * the CHK-encoded block for DBLOCKS and IBLOCKS (aka query)
- * and hash of the identifier XORed with the target for
- * SBLOCKS (aka query).
- */
- GNUNET_HashCode query;
-
-};
-
-
-/**
- * Head of doubly-linked LGC list.
- */
-static struct LocalGetContext *lgc_head;
-
-/**
- * Tail of doubly-linked LGC list.
- */
-static struct LocalGetContext *lgc_tail;
-
-
-/**
* Free the state associated with a local get context.
*
* @param lgc the lgc to free
@@ -664,6 +982,167 @@ transmit_local_result (void *cls,
/**
+ * Continuation called from datastore's remove
+ * function.
+ *
+ * @param cls unused
+ * @param success did the deletion work?
+ * @param msg error message
+ */
+static void
+remove_cont (void *cls,
+ int success,
+ const char *msg)
+{
+ if (GNUNET_OK != success)
+ GNUNET_log (GNUNET_ERROR_TYPE_WARNING,
+ _("Failed to delete bogus block: %s\n"),
+ msg);
+ GNUNET_DATASTORE_get_next (dsh, GNUNET_YES);
+}
+
+
+/**
+ * Mingle hash with the mingle_number to
+ * produce different bits.
+ */
+static void
+mingle_hash (const GNUNET_HashCode * in,
+ int32_t mingle_number,
+ GNUNET_HashCode * hc)
+{
+ GNUNET_HashCode m;
+
+ GNUNET_CRYPTO_hash (&mingle_number,
+ sizeof (int32_t),
+ &m);
+ GNUNET_CRYPTO_hash_xor (&m, in, hc);
+}
+
+
+/**
+ * We've received an on-demand encoded block
+ * from the datastore. Attempt to do on-demand
+ * encoding and (if successful), call the
+ * continuation with the resulting block. On
+ * error, clean up and ask the datastore for
+ * more results.
+ *
+ * @param key key for the content
+ * @param size number of bytes in data
+ * @param data content stored
+ * @param type type of the content
+ * @param priority priority of the content
+ * @param anonymity anonymity-level for the content
+ * @param expiration expiration time for the content
+ * @param uid unique identifier for the datum;
+ * maybe 0 if no unique identifier is available
+ * @param cont function to call with the actual block
+ * @param cont_cls closure for cont
+ */
+static void
+handle_on_demand_block (const GNUNET_HashCode * key,
+ uint32_t size,
+ const void *data,
+ uint32_t type,
+ uint32_t priority,
+ uint32_t anonymity,
+ struct GNUNET_TIME_Absolute
+ expiration, uint64_t uid,
+ GNUNET_DATASTORE_Iterator cont,
+ void *cont_cls)
+{
+ const struct OnDemandBlock *odb;
+ GNUNET_HashCode nkey;
+ struct GNUNET_CRYPTO_AesSessionKey skey;
+ struct GNUNET_CRYPTO_AesInitializationVector iv;
+ GNUNET_HashCode query;
+ ssize_t nsize;
+ char ndata[DBLOCK_SIZE];
+ char edata[DBLOCK_SIZE];
+ const char *fn;
+ struct GNUNET_DISK_FileHandle *fh;
+ uint64_t off;
+
+ if (size != sizeof (struct OnDemandBlock))
+ {
+ GNUNET_break (0);
+ GNUNET_DATASTORE_remove (dsh,
+ key,
+ size,
+ data,
+ &remove_cont,
+ NULL,
+ GNUNET_TIME_UNIT_FOREVER_REL);
+ return;
+ }
+ odb = (const struct OnDemandBlock*) data;
+ off = GNUNET_ntohll (odb->offset);
+ fn = (const char*) GNUNET_CONTAINER_multihashmap_get (ifm,
+ &odb->file_id);
+ if ( (NULL == fn) ||
+ (NULL == (fh = GNUNET_DISK_file_open (fn,
+ GNUNET_DISK_OPEN_READ))) ||
+ (off !=
+ GNUNET_DISK_file_seek (fh,
+ off,
+ GNUNET_DISK_SEEK_SET)) ||
+ (-1 ==
+ (nsize = GNUNET_DISK_file_read (fh,
+ ndata,
+ sizeof (ndata)))) )
+ {
+ GNUNET_log (GNUNET_ERROR_TYPE_WARNING,
+ _("Could not access indexed file `%s' at offset %llu: %s\n"),
+ GNUNET_h2s (&odb->file_id),
+ (unsigned long long) off,
+ STRERROR (errno));
+ if (fh != NULL)
+ GNUNET_DISK_file_close (fh);
+ /* FIXME: if this happens often, we need
+ to remove the OnDemand block from the DS! */
+ GNUNET_DATASTORE_get_next (dsh, GNUNET_YES);
+ return;
+ }
+ GNUNET_DISK_file_close (fh);
+ GNUNET_CRYPTO_hash (ndata,
+ nsize,
+ &nkey);
+ GNUNET_CRYPTO_hash_to_aes_key (&nkey, &skey, &iv);
+ GNUNET_CRYPTO_aes_encrypt (ndata,
+ nsize,
+ &skey,
+ &iv,
+ edata);
+ GNUNET_CRYPTO_hash (edata,
+ nsize,
+ &query);
+ if (0 != memcmp (&query,
+ key,
+ sizeof (GNUNET_HashCode)))
+ {
+ GNUNET_log (GNUNET_ERROR_TYPE_WARNING,
+ _("Indexed file `%s' changed at offset %llu\n"),
+ fn,
+ (unsigned long long) off);
+ /* FIXME: if this happens often, we need
+ to remove the OnDemand block from the DS! */
+ GNUNET_DATASTORE_get_next (dsh, GNUNET_YES);
+ return;
+ }
+ cont (cont_cls,
+ key,
+ nsize,
+ edata,
+ GNUNET_DATASTORE_BLOCKTYPE_DBLOCK,
+ priority,
+ anonymity,
+ expiration,
+ uid);
+}
+
+
+/**
* We're processing (local) results for a search request
* from a (local) client. Pass applicable results to the
* client and if we are done either clean up (operation
@@ -694,8 +1173,8 @@ process_local_get_result (void *cls,
{
struct LocalGetContext *lgc = cls;
size_t msize;
+ unsigned int i;
- // FIXME: handle ONDEMAND blocks!
if (key == NULL)
{
/* no further results from datastore; continue
@@ -717,25 +1196,40 @@ process_local_get_result (void *cls,
local_get_context_free (lgc);
return;
}
- if (lgc->results_used == lgc->results_size)
+ if (type == GNUNET_DATASTORE_BLOCKTYPE_ONDEMAND)
{
- GNUNET_array_grow (lgc->results,
- lgc->results_size,
- lgc->results_size * 2 + 2);
- if ( (lgc->type != GNUNET_DATASTORE_BLOCKTYPE_DBLOCK) ||
- (lgc->type != GNUNET_DATASTORE_BLOCKTYPE_IBLOCK) )
- {
- // FIXME: possibly grow/create BF!
- }
+ handle_on_demand_block (key, size, data, type, priority,
+ anonymity, expiration, uid,
+ &process_local_get_result,
+ lgc);
+ return;
+ }
+ if (type != lgc->type)
+ {
+ /* this should be virtually impossible to reach (DBLOCK
+ query hash being identical to KBLOCK/SBLOCK query hash);
+ nevertheless, if it happens, the correct thing is to
+ simply skip the result. */
+ GNUNET_DATASTORE_get_next (dsh, GNUNET_YES);
+ return;
}
+ /* check if this is a result we've alredy
+ received */
+ for (i=0;i<lgc->results_used;i++)
+ if (0 == memcmp (key,
+ &lgc->results[i],
+ sizeof (GNUNET_HashCode)))
+ {
+ GNUNET_DATASTORE_get_next (dsh, GNUNET_YES);
+ return;
+ }
+ if (lgc->results_used == lgc->results_size)
+ GNUNET_array_grow (lgc->results,
+ lgc->results_size,
+ lgc->results_size * 2 + 2);
GNUNET_CRYPTO_hash (data,
size,
&lgc->results[lgc->results_used++]);
- if ( (lgc->type != GNUNET_DATASTORE_BLOCKTYPE_DBLOCK) ||
- (lgc->type != GNUNET_DATASTORE_BLOCKTYPE_IBLOCK) )
- {
- // FIXME: add result to BF!
- }
msize = size + sizeof (struct ContentMessage);
GNUNET_assert (msize < GNUNET_SERVER_MAX_MESSAGE_SIZE);
lgc->result = GNUNET_malloc (msize);
@@ -766,11 +1260,14 @@ transmit_local_get (void *cls,
const struct GNUNET_SCHEDULER_TaskContext *tc)
{
struct LocalGetContext *lgc = cls;
-
- // FIXME: handle ONDEMAND blocks (change type to ANY for DBLOCK/IBLOCK)
+ uint32_t type;
+
+ type = lgc->type;
+ if (type == GNUNET_DATASTORE_BLOCKTYPE_DBLOCK)
+ type = GNUNET_DATASTORE_BLOCKTYPE_ANY; /* to get on-demand as well */
GNUNET_DATASTORE_get (dsh,
&lgc->query,
- lgc->type,
+ type,
&process_local_get_result,
lgc,
GNUNET_TIME_UNIT_FOREVER_REL);
@@ -813,10 +1310,32 @@ handle_start_search (void *cls,
{
const struct SearchMessage *sm;
struct LocalGetContext *lgc;
-
+ uint16_t msize;
+ unsigned int sc;
+
+ msize = ntohs (message->size);
+ if ( (msize < sizeof (struct SearchMessage)) ||
+ (0 != (msize - sizeof (struct SearchMessage)) % sizeof (GNUNET_HashCode)) )
+ {
+ GNUNET_break (0);
+ GNUNET_SERVER_receive_done (client,
+ GNUNET_SYSERR);
+ return;
+ }
+ sc = (msize - sizeof (struct SearchMessage)) / sizeof (GNUNET_HashCode);
sm = (const struct SearchMessage*) message;
GNUNET_SERVER_client_keep (client);
lgc = GNUNET_malloc (sizeof (struct LocalGetContext));
+ if (sc > 0)
+ {
+ lgc->results_used = sc;
+ GNUNET_array_grow (lgc->results,
+ lgc->results_size,
+ sc * 2);
+ memcpy (lgc->results,
+ &sm[1],
+ sc * sizeof (GNUNET_HashCode));
+ }
lgc->client = client;
lgc->type = ntohl (sm->type);
lgc->anonymity_level = ntohl (sm->anonymity_level);
@@ -841,7 +1360,7 @@ static struct GNUNET_SERVER_MessageHandler handlers[] = {
{&handle_unindex, NULL, GNUNET_MESSAGE_TYPE_FS_UNINDEX,
sizeof (struct UnindexMessage) },
{&handle_start_search, NULL, GNUNET_MESSAGE_TYPE_FS_START_SEARCH,
- sizeof (struct SearchMessage) },
+ 0 },
{NULL, NULL, 0, 0}
};
@@ -879,9 +1398,682 @@ static void
shutdown_task (void *cls,
const struct GNUNET_SCHEDULER_TaskContext *tc)
{
+ struct IndexInfo *pos;
+
+ if (NULL != core)
+ GNUNET_CORE_disconnect (core);
GNUNET_DATASTORE_disconnect (dsh,
GNUNET_NO);
dsh = NULL;
+ // FIXME: iterate over 'request_map' to free entries!
+ GNUNET_CONTAINER_multihashmap_destroy (request_map);
+ request_map = NULL;
+ GNUNET_CONTAINER_multihashmap_destroy (ifm);
+ ifm = NULL;
+ while (NULL != (pos = indexed_files))
+ {
+ indexed_files = pos->next;
+ GNUNET_free (pos);
+ }
+}
+
+
+/**
+ * Method called whenever a peer disconnects.
+ *
+ * @param cls closure, not used
+ * @param peer peer identity this notification is about
+ */
+static void
+peer_disconnect_handler (void *cls,
+ const struct
+ GNUNET_PeerIdentity * peer)
+{
+ // FIXME: remove all pending requests from this
+ // peer from our memory
+ // (iterate over request_map)
+}
+
+
+/**
+ * We're processing a GET request from
+ * another peer and have decided to forward
+ * it to other peers.
+ *
+ * @param cls our "struct ProcessGetContext *"
+ * @param tc unused
+ */
+static void
+forward_get_request (void *cls,
+ const struct GNUNET_SCHEDULER_TaskContext *tc)
+{
+ struct ProcessGetContext *pgc = cls;
+
+ // FIXME: install entry in
+ // 'request_map' and do actual
+ // forwarding...
+ if (pgc->bf != NULL)
+ GNUNET_CONTAINER_bloomfilter_free (pgc->bf);
+ GNUNET_free (pgc);
+}
+
+
+/**
+ * Transmit the given message by copying it to
+ * the target buffer "buf". "buf" will be
+ * NULL and "size" zero if the socket was closed for
+ * writing in the meantime. In that case, only
+ * free the message
+ *
+ * @param cls closure, pointer to the message
+ * @param size number of bytes available in buf
+ * @param buf where the callee should write the message
+ * @return number of bytes written to buf
+ */
+static size_t
+transmit_message (void *cls,
+ size_t size, void *buf)
+{
+ struct GNUNET_MessageHeader *msg = cls;
+ uint16_t msize;
+
+ if (NULL == buf)
+ {
+#if DEBUG_FS
+ GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
+ "Dropping reply, core too busy.\n");
+#endif
+ GNUNET_free (msg);
+ return 0;
+ }
+ msize = ntohs (msg->size);
+ GNUNET_assert (size >= msize);
+ memcpy (buf, msg, msize);
+ GNUNET_free (msg);
+ return msize;
+}
+
+
+/**
+ * Test if the load on this peer is too high
+ * to even consider processing the query at
+ * all.
+ *
+ * @return GNUNET_YES if the load is too high, GNUNET_NO otherwise
+ */
+static int
+test_load_too_high ()
+{
+ return GNUNET_NO; // FIXME
+}
+
+
+/**
+ * We're processing (local) results for a search request
+ * from another peer. Pass applicable results to the
+ * peer and if we are done either clean up (operation
+ * complete) or forward to other peers (more results possible).
+ *
+ * @param cls our closure (struct LocalGetContext)
+ * @param key key for the content
+ * @param size number of bytes in data
+ * @param data content stored
+ * @param type type of the content
+ * @param priority priority of the content
+ * @param anonymity anonymity-level for the content
+ * @param expiration expiration time for the content
+ * @param uid unique identifier for the datum;
+ * maybe 0 if no unique identifier is available
+ */
+static void
+process_p2p_get_result (void *cls,
+ const GNUNET_HashCode * key,
+ uint32_t size,
+ const void *data,
+ uint32_t type,
+ uint32_t priority,
+ uint32_t anonymity,
+ struct GNUNET_TIME_Absolute
+ expiration,
+ uint64_t uid)
+{
+ struct ProcessGetContext *pgc = cls;
+ GNUNET_HashCode dhash;
+ GNUNET_HashCode mhash;
+ struct PutMessage *reply;
+
+ if (NULL == key)
+ {
+ /* no more results */
+ if ( ( (pgc->policy & ROUTING_POLICY_FORWARD) == ROUTING_POLICY_FORWARD) &&
+ ( (0 == pgc->results_found) ||
+ (pgc->type == GNUNET_DATASTORE_BLOCKTYPE_KBLOCK) ||
+ (pgc->type == GNUNET_DATASTORE_BLOCKTYPE_SBLOCK) ||
+ (pgc->type == GNUNET_DATASTORE_BLOCKTYPE_SKBLOCK) ) )
+ {
+ GNUNET_SCHEDULER_add_continuation (sched,
+ GNUNET_NO,
+ &forward_get_request,
+ pgc,
+ GNUNET_SCHEDULER_REASON_PREREQ_DONE);
+ }
+ else
+ {
+ if (pgc->bf != NULL)
+ GNUNET_CONTAINER_bloomfilter_free (pgc->bf);
+ GNUNET_free (pgc);
+ }
+ next_ds_request ();
+ return;
+ }
+ if (type == GNUNET_DATASTORE_BLOCKTYPE_ONDEMAND)
+ {
+ handle_on_demand_block (key, size, data, type, priority,
+ anonymity, expiration, uid,
+ &process_p2p_get_result,
+ pgc);
+ return;
+ }
+ /* check for duplicates */
+ GNUNET_CRYPTO_hash (data, size, &dhash);
+ mingle_hash (&dhash,
+ pgc->mingle,
+ &mhash);
+ if ( (pgc->bf != NULL) &&
+ (GNUNET_YES ==
+ GNUNET_CONTAINER_bloomfilter_test (pgc->bf,
+ &mhash)) )
+ {
+#if DEBUG_FS
+ GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
+ "Result from datastore filtered by bloomfilter.\n");
+#endif
+ GNUNET_DATASTORE_get_next (dsh, GNUNET_YES);
+ return;
+ }
+ pgc->results_found++;
+ if ( (pgc->type == GNUNET_DATASTORE_BLOCKTYPE_KBLOCK) ||
+ (pgc->type == GNUNET_DATASTORE_BLOCKTYPE_SBLOCK) ||
+ (pgc->type == GNUNET_DATASTORE_BLOCKTYPE_SKBLOCK) )
+ {
+ if (pgc->bf == NULL)
+ pgc->bf = GNUNET_CONTAINER_bloomfilter_init (NULL,
+ 32,
+ BLOOMFILTER_K);
+ GNUNET_CONTAINER_bloomfilter_add (pgc->bf,
+ &mhash);
+ }
+
+ reply = GNUNET_malloc (sizeof (struct PutMessage) + size);
+ reply->header.size = htons (sizeof (struct PutMessage) + size);
+ reply->header.type = htons (GNUNET_MESSAGE_TYPE_FS_PUT);
+ reply->type = htonl (type);
+ reply->expiration = GNUNET_TIME_relative_hton (GNUNET_TIME_absolute_get_remaining (expiration));
+ memcpy (&reply[1], data, size);
+ GNUNET_CORE_notify_transmit_ready (core,
+ pgc->priority,
+ ACCEPTABLE_REPLY_DELAY,
+ &pgc->reply_to,
+ sizeof (struct PutMessage) + size,
+ &transmit_message,
+ reply);
+ if ( (GNUNET_YES == test_load_too_high()) ||
+ (pgc->results_found > 5 + 2 * pgc->priority) )
+ {
+ GNUNET_DATASTORE_get_next (dsh, GNUNET_NO);
+ pgc->policy &= ~ ROUTING_POLICY_FORWARD;
+ return;
+ }
+ GNUNET_DATASTORE_get_next (dsh, GNUNET_YES);
+}
+
+
+/**
+ * We're processing a GET request from
+ * another peer. Give it to our local
+ * datastore.
+ *
+ * @param cls our "struct ProcessGetContext"
+ * @param ok did we get a datastore slice or not?
+ */
+static void
+ds_get_request (void *cls,
+ int ok)
+{
+ struct ProcessGetContext *pgc = cls;
+ uint32_t type;
+ struct GNUNET_TIME_Relative timeout;
+
+ if (GNUNET_OK != ok)
+ {
+ /* no point in doing P2P stuff if we can't even do local */
+ GNUNET_free (dsh);
+ return;
+ }
+ type = pgc->type;
+ if (type == GNUNET_DATASTORE_BLOCKTYPE_DBLOCK)
+ type = GNUNET_DATASTORE_BLOCKTYPE_ANY; /* to get on-demand as well */
+ timeout = GNUNET_TIME_relative_multiply (BASIC_DATASTORE_REQUEST_DELAY,
+ (pgc->priority + 1));
+ GNUNET_DATASTORE_get (dsh,
+ &pgc->query,
+ type,
+ &process_p2p_get_result,
+ pgc,
+ timeout);
+}
+
+
+/**
+ * The priority level imposes a bound on the maximum
+ * value for the ttl that can be requested.
+ *
+ * @param ttl_in requested ttl
+ * @param priority given priority
+ * @return ttl_in if ttl_in is below the limit,
+ * otherwise the ttl-limit for the given priority
+ */
+static int32_t
+bound_ttl (int32_t ttl_in, uint32_t prio)
+{
+ unsigned long long allowed;
+
+ if (ttl_in <= 0)
+ return ttl_in;
+ allowed = ((unsigned long long) prio) * TTL_DECREMENT / 1000;
+ if (ttl_in > allowed)
+ {
+ if (allowed >= (1 << 30))
+ return 1 << 30;
+ return allowed;
+ }
+ return ttl_in;
+}
+
+
+/**
+ * We've received a request with the specified
+ * priority. Bound it according to how much
+ * we trust the given peer.
+ *
+ * @param prio_in requested priority
+ * @param peer the peer making the request
+ * @return effective priority
+ */
+static uint32_t
+bound_priority (uint32_t prio_in,
+ const struct GNUNET_PeerIdentity *peer)
+{
+ return 0; // FIXME!
+}
+
+
+/**
+ * Handle P2P "GET" request.
+ *
+ * @param cls closure, always NULL
+ * @param peer the other peer involved (sender or receiver, NULL
+ * for loopback messages where we are both sender and receiver)
+ * @param message the actual message
+ * @return GNUNET_OK to keep the connection open,
+ * GNUNET_SYSERR to close it (signal serious error)
+ */
+static int
+handle_p2p_get (void *cls,
+ const struct GNUNET_PeerIdentity *other,
+ const struct GNUNET_MessageHeader *message)
+{
+ uint16_t msize;
+ const struct GetMessage *gm;
+ unsigned int bits;
+ const GNUNET_HashCode *opt;
+ struct ProcessGetContext *pgc;
+ uint32_t bm;
+ size_t bfsize;
+ uint32_t ttl_decrement;
+ double preference;
+ int net_load_up;
+ int net_load_down;
+
+ msize = ntohs(message->size);
+ if (msize < sizeof (struct GetMessage))
+ {
+ GNUNET_break_op (0);
+ return GNUNET_SYSERR;
+ }
+ gm = (const struct GetMessage*) message;
+ bm = ntohl (gm->hash_bitmap);
+ bits = 0;
+ while (bm > 0)
+ {
+ if (1 == (bm & 1))
+ bits++;
+ bm >>= 1;
+ }
+ if (msize < sizeof (struct GetMessage) + bits * sizeof (GNUNET_HashCode))
+ {
+ GNUNET_break_op (0);
+ return GNUNET_SYSERR;
+ }
+ opt = (const GNUNET_HashCode*) &gm[1];
+ bfsize = msize - sizeof (struct GetMessage) + bits * sizeof (GNUNET_HashCode);
+ pgc = GNUNET_malloc (sizeof (struct ProcessGetContext));
+ if (bfsize > 0)
+ pgc->bf = GNUNET_CONTAINER_bloomfilter_init ((const char*) &pgc[1],
+ bfsize,
+ BLOOMFILTER_K);
+ pgc->type = ntohl (gm->type);
+ pgc->bm = ntohl (gm->hash_bitmap);
+ pgc->mingle = gm->filter_mutator;
+ bits = 0;
+ if (0 != (pgc->bm & GET_MESSAGE_BIT_RETURN_TO))
+ pgc->reply_to.hashPubKey = opt[bits++];
+ else
+ pgc->reply_to = *other;
+ if (0 != (pgc->bm & GET_MESSAGE_BIT_SKS_NAMESPACE))
+ pgc->namespace = opt[bits++];
+ else if (pgc->type == GNUNET_DATASTORE_BLOCKTYPE_SBLOCK)
+ {
+ GNUNET_break_op (0);
+ GNUNET_free (pgc);
+ return GNUNET_SYSERR;
+ }
+ if (0 != (pgc->bm & GET_MESSAGE_BIT_TRANSMIT_TO))
+ pgc->prime_target.hashPubKey = opt[bits++];
+ /* note that we can really only check load here since otherwise
+ peers could find out that we are overloaded by being disconnected
+ after sending us a malformed query... */
+ if (GNUNET_YES == test_load_too_high ())
+ {
+ if (NULL != pgc->bf)
+ GNUNET_CONTAINER_bloomfilter_free (pgc->bf);
+ GNUNET_free (pgc);
+#if DEBUG_FS
+ GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
+ "Dropping query from `%s', this peer is too busy.\n",
+ GNUNET_h2s (other));
+#endif
+ return GNUNET_OK;
+ }
+ net_load_up = 50; // FIXME
+ net_load_down = 50; // FIXME
+ pgc->policy = ROUTING_POLICY_NONE;
+ if ( (net_load_up < IDLE_LOAD_THRESHOLD) &&
+ (net_load_down < IDLE_LOAD_THRESHOLD) )
+ {
+ pgc->policy |= ROUTING_POLICY_ALL;
+ pgc->priority = 0; /* no charge */
+ }
+ else
+ {
+ pgc->priority = bound_priority (ntohl (gm->priority), other);
+ if ( (net_load_up <
+ IDLE_LOAD_THRESHOLD + pgc->priority * pgc->priority) &&
+ (net_load_down <
+ IDLE_LOAD_THRESHOLD + pgc->priority * pgc->priority) )
+ {
+ pgc->policy |= ROUTING_POLICY_ALL;
+ }
+ else
+ {
+ // FIXME: is this sound?
+ if (net_load_up < 90 + 10 * pgc->priority)
+ pgc->policy |= ROUTING_POLICY_FORWARD;
+ if (net_load_down < 90 + 10 * pgc->priority)
+ pgc->policy |= ROUTING_POLICY_ANSWER;
+ }
+ }
+ if (pgc->policy == ROUTING_POLICY_NONE)
+ {
+#if DEBUG_FS
+ GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
+ "Dropping query from `%s', network saturated.\n",
+ GNUNET_h2s (other));
+#endif
+ if (NULL != pgc->bf)
+ GNUNET_CONTAINER_bloomfilter_free (pgc->bf);
+ GNUNET_free (pgc);
+ return GNUNET_OK; /* drop */
+ }
+ if ((pgc->policy & ROUTING_POLICY_INDIRECT) != ROUTING_POLICY_INDIRECT)
+ pgc->priority = 0; /* kill the priority (we cannot benefit) */
+ pgc->ttl = bound_ttl (ntohl (gm->ttl), pgc->priority);
+ /* decrement ttl (always) */
+ ttl_decrement = 2 * TTL_DECREMENT +
+ GNUNET_CRYPTO_random_u32 (GNUNET_CRYPTO_QUALITY_WEAK,
+ TTL_DECREMENT);
+ if ( (pgc->ttl < 0) &&
+ (pgc->ttl - ttl_decrement > 0) )
+ {
+#if DEBUG_FS
+ GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
+ "Dropping query from `%s' due to TTL underflow.\n",
+ GNUNET_h2s (other));
+#endif
+ /* integer underflow => drop (should be very rare)! */
+ if (NULL != pgc->bf)
+ GNUNET_CONTAINER_bloomfilter_free (pgc->bf);
+ GNUNET_free (pgc);
+ return GNUNET_OK;
+ }
+ pgc->ttl -= ttl_decrement;
+ pgc->start_time = GNUNET_TIME_absolute_get ();
+ preference = (double) pgc->priority;
+ if (preference < QUERY_BANDWIDTH_VALUE)
+ preference = QUERY_BANDWIDTH_VALUE;
+ // FIXME: also reserve bandwidth for reply?
+ GNUNET_CORE_peer_configure (core,
+ other,
+ GNUNET_TIME_UNIT_FOREVER_REL,
+ 0, 0, preference, NULL, NULL);
+ if (0 != (pgc->policy & ROUTING_POLICY_ANSWER))
+ pgc->drq = queue_ds_request (BASIC_DATASTORE_REQUEST_DELAY,
+ &ds_get_request,
+ pgc);
+ else
+ GNUNET_SCHEDULER_add_continuation (sched,
+ GNUNET_NO,
+ &forward_get_request,
+ pgc,
+ GNUNET_SCHEDULER_REASON_PREREQ_DONE);
+ return GNUNET_OK;
+}
+
+
+/**
+ * Iterator over pending requests.
+ *
+ * @param cls response (struct ProcessReplyClosure)
+ * @param key our query
+ * @param value value in the hash map (meta-info about the query)
+ * @return GNUNET_YES (we should continue to iterate)
+ */
+static int
+process_reply (void *cls,
+ const GNUNET_HashCode * key,
+ void *value)
+{
+ struct ProcessReplyClosure *prq = cls;
+ struct PendingRequest *pr = value;
+
+ fprintf (stderr, "FIXME %p %p\n", prq, pr);
+ // FIXME: forward reply to client
+ // or other peers (depending on pr...)
+ return GNUNET_YES;
+}
+
+
+/**
+ * Handle P2P "PUT" request.
+ *
+ * @param cls closure, always NULL
+ * @param peer the other peer involved (sender or receiver, NULL
+ * for loopback messages where we are both sender and receiver)
+ * @param message the actual message
+ * @return GNUNET_OK to keep the connection open,
+ * GNUNET_SYSERR to close it (signal serious error)
+ */
+static int
+handle_p2p_put (void *cls,
+ const struct GNUNET_PeerIdentity *other,
+ const struct GNUNET_MessageHeader *message)
+{
+ const struct PutMessage *put;
+ uint16_t msize;
+ size_t dsize;
+ uint32_t type;
+ struct GNUNET_TIME_Absolute expiration;
+ GNUNET_HashCode query;
+ const struct KBlock *kb;
+ struct ProcessReplyClosure prq;
+
+ msize = ntohs (message->size);
+ if (msize < sizeof (struct PutMessage))
+ {
+ GNUNET_break_op(0);
+ return GNUNET_SYSERR;
+ }
+ put = (const struct PutMessage*) message;
+ dsize = msize - sizeof (struct PutMessage);
+ type = ntohl (put->type);
+ expiration = GNUNET_TIME_relative_to_absolute (GNUNET_TIME_relative_ntoh (put->expiration));
+
+ /* first, validate! */
+ switch (type)
+ {
+ case GNUNET_DATASTORE_BLOCKTYPE_DBLOCK:
+ case GNUNET_DATASTORE_BLOCKTYPE_IBLOCK:
+ GNUNET_CRYPTO_hash (&put[1], dsize, &query);
+ break;
+ case GNUNET_DATASTORE_BLOCKTYPE_KBLOCK:
+ if (dsize < sizeof (struct KBlock))
+ {
+ GNUNET_break_op (0);
+ return GNUNET_SYSERR;
+ }
+ kb = (const struct KBlock*) &put[1];
+ // FIXME -- validation code below broken...
+ if ( (dsize != ntohs (kb->purpose.size) + 42) ||
+ (GNUNET_OK !=
+ GNUNET_CRYPTO_rsa_verify (GNUNET_SIGNATURE_PURPOSE_FS_KBLOCK,
+ &kb->purpose,
+ &kb->signature,
+ &kb->keyspace)) )
+ {
+ GNUNET_break_op (0);
+ return GNUNET_SYSERR;
+ }
+ GNUNET_CRYPTO_hash (&kb->keyspace,
+ sizeof (struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded),
+ &query);
+ break;
+ case GNUNET_DATASTORE_BLOCKTYPE_SBLOCK:
+ // FIXME -- validate SBLOCK!
+ GNUNET_break (0);
+ return GNUNET_OK;
+ case GNUNET_DATASTORE_BLOCKTYPE_SKBLOCK:
+ // FIXME -- validate SKBLOCK!
+ GNUNET_break (0);
+ return GNUNET_OK;
+ default:
+ /* unknown block type */
+ GNUNET_break_op (0);
+ return GNUNET_SYSERR;
+ }
+
+ /* now, lookup 'query' */
+ prq.data = (const void*) &put[1];
+ prq.size = dsize;
+ prq.type = type;
+ prq.expiration = expiration;
+ prq.priority = 0;
+ GNUNET_CONTAINER_multihashmap_get_multiple (request_map,
+ &query,
+ &process_reply,
+ &prq);
+ // FIXME: if migration is on and load is low,
+ // queue to store data in datastore;
+ // use "prq.priority" for that!
+ return GNUNET_OK;
+}
+
+
+/**
+ * List of handlers for P2P messages
+ * that we care about.
+ */
+static struct GNUNET_CORE_MessageHandler p2p_handlers[] =
+ {
+ { &handle_p2p_get,
+ GNUNET_MESSAGE_TYPE_FS_GET, 0 },
+ { &handle_p2p_put,
+ GNUNET_MESSAGE_TYPE_FS_PUT, 0 },
+ { NULL, 0, 0 }
+ };
+
+
+/**
+ * Task that will try to initiate a connection with the
+ * core service.
+ *
+ * @param cls unused
+ * @param tc unused
+ */
+static void
+core_connect_task (void *cls,
+ const struct GNUNET_SCHEDULER_TaskContext *tc);
+
+
+/**
+ * Function called by the core after we've
+ * connected.
+ */
+static void
+core_start_cb (void *cls,
+ struct GNUNET_CORE_Handle * server,
+ const struct GNUNET_PeerIdentity *
+ my_identity,
+ const struct
+ GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded *
+ publicKey)
+{
+ if (server == NULL)
+ {
+ GNUNET_SCHEDULER_add_delayed (sched,
+ GNUNET_NO,
+ GNUNET_SCHEDULER_PRIORITY_HIGH,
+ GNUNET_SCHEDULER_NO_TASK,
+ GNUNET_TIME_UNIT_SECONDS,
+ &core_connect_task,
+ NULL);
+ return;
+ }
+ core = server;
+}
+
+
+/**
+ * Task that will try to initiate a connection with the
+ * core service.
+ *
+ * @param cls unused
+ * @param tc unused
+ */
+static void
+core_connect_task (void *cls,
+ const struct GNUNET_SCHEDULER_TaskContext *tc)
+{
+ GNUNET_CORE_connect (sched,
+ cfg,
+ GNUNET_TIME_UNIT_FOREVER_REL,
+ NULL,
+ &core_start_cb,
+ NULL,
+ &peer_disconnect_handler,
+ NULL,
+ NULL, GNUNET_NO,
+ NULL, GNUNET_NO,
+ p2p_handlers);
}
@@ -899,9 +2091,12 @@ run (void *cls,
struct GNUNET_SERVER_Handle *server,
const struct GNUNET_CONFIGURATION_Handle *c)
{
- read_index_list ();
sched = s;
cfg = c;
+
+ ifm = GNUNET_CONTAINER_multihashmap_create (128);
+ request_map = GNUNET_CONTAINER_multihashmap_create (128); // FIXME: get size from config
+ read_index_list ();
dsh = GNUNET_DATASTORE_connect (cfg,
sched);
if (NULL == dsh)
@@ -914,7 +2109,7 @@ run (void *cls,
&handle_client_disconnect,
NULL);
GNUNET_SERVER_add_handlers (server, handlers);
- // FIXME: also register with core to handle P2P messages!
+ core_connect_task (NULL, NULL);
GNUNET_SCHEDULER_add_delayed (sched,
GNUNET_YES,
GNUNET_SCHEDULER_PRIORITY_IDLE,
diff --git a/src/include/gnunet_bio_lib.h b/src/include/gnunet_bio_lib.h
index 2765b4695..2a2639f05 100644
--- a/src/include/gnunet_bio_lib.h
+++ b/src/include/gnunet_bio_lib.h
@@ -88,7 +88,7 @@ int GNUNET_BIO_read (struct GNUNET_BIO_ReadHandle *h,
* @param maxLen maximum allowed length for the string
* @return GNUNET_OK on success, GNUNET_SYSERR on failure
*/
-int GNUNET_BIO_read_string (struct GNUNET_BIO_ReadHandle *h,
+int GNUNET_BIO_read_string (struct GNUNET_BIO_ReadHandle *h,
const char *what,
char **result,
size_t maxLen);
diff --git a/src/include/gnunet_constants.h b/src/include/gnunet_constants.h
index bb122eb64..eb8addf5f 100644
--- a/src/include/gnunet_constants.h
+++ b/src/include/gnunet_constants.h
@@ -63,6 +63,17 @@ extern "C"
#define GNUNET_CONSTANTS_SERVICE_TIMEOUT GNUNET_TIME_relative_multiply (GNUNET_TIME_UNIT_MINUTES, 10)
+/**
+ * Until which load do we consider the peer overly idle
+ * (which means that we would like to use more resources).<p>
+ *
+ * Note that we use 70 to leave some room for applications
+ * to consume resources "idly" (i.e. up to 85%) and then
+ * still have some room for "paid for" resource consumption.
+ */
+#define GNUNET_CONSTANTS_IDLE_LOAD_THRESHOLD 70
+
+
#if 0 /* keep Emacsens' auto-indent happy */
{
#endif
diff --git a/src/include/gnunet_core_service.h b/src/include/gnunet_core_service.h
index 5d08552f4..b5dceca3a 100644
--- a/src/include/gnunet_core_service.h
+++ b/src/include/gnunet_core_service.h
@@ -77,7 +77,8 @@ typedef unsigned int
(*GNUNET_CORE_BufferFillCallback) (void *cls,
const struct GNUNET_PeerIdentity *
receiver,
- void *position, unsigned int padding);
+ void *position,
+ size_t padding);
/**
diff --git a/src/include/gnunet_protocols.h b/src/include/gnunet_protocols.h
index 664b10636..ff35c6b97 100644
--- a/src/include/gnunet_protocols.h
+++ b/src/include/gnunet_protocols.h
@@ -420,6 +420,18 @@ extern "C"
*/
#define GNUNET_MESSAGE_TYPE_FS_CONTENT 137
+/**
+ * P2P request for content (one FS to another).
+ */
+#define GNUNET_MESSAGE_TYPE_FS_GET 138
+
+
+/**
+ * P2P response with content or active
+ * migration of content.
+ */
+#define GNUNET_MESSAGE_TYPE_FS_PUT 139
+
/*
TODO:
- DV