mirror of
https://github.com/monero-project/monero.git
synced 2024-11-18 10:01:02 +00:00
11c6718865
It's obsolete and removed from at least Arch Linux 8.2 Reported by moneroexamples
956 lines
28 KiB
C++
956 lines
28 KiB
C++
// Copyright (c) 2014-2018, The Monero Project
|
|
//
|
|
// All rights reserved.
|
|
//
|
|
// Redistribution and use in source and binary forms, with or without modification, are
|
|
// permitted provided that the following conditions are met:
|
|
//
|
|
// 1. Redistributions of source code must retain the above copyright notice, this list of
|
|
// conditions and the following disclaimer.
|
|
//
|
|
// 2. Redistributions in binary form must reproduce the above copyright notice, this list
|
|
// of conditions and the following disclaimer in the documentation and/or other
|
|
// materials provided with the distribution.
|
|
//
|
|
// 3. Neither the name of the copyright holder nor the names of its contributors may be
|
|
// used to endorse or promote products derived from this software without specific
|
|
// prior written permission.
|
|
//
|
|
// THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY
|
|
// EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
|
|
// MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
|
|
// THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
|
// SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
|
|
// PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
|
|
// INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
|
|
// STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF
|
|
// THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
//
|
|
// Parts of this file are originally copyright (c) 2012-2013 The Cryptonote developers
|
|
|
|
#include <cstdio>
|
|
|
|
#ifdef __GLIBC__
|
|
#include <gnu/libc-version.h>
|
|
#endif
|
|
|
|
#ifdef __GLIBC__
|
|
#include <sys/types.h>
|
|
#include <sys/stat.h>
|
|
#include <sys/resource.h>
|
|
#include <unistd.h>
|
|
#include <dirent.h>
|
|
#include <string.h>
|
|
#include <ctype.h>
|
|
#include <string>
|
|
#endif
|
|
|
|
#include "unbound.h"
|
|
|
|
#include "include_base_utils.h"
|
|
#include "file_io_utils.h"
|
|
#include "wipeable_string.h"
|
|
using namespace epee;
|
|
|
|
#include "crypto/crypto.h"
|
|
#include "util.h"
|
|
#include "stack_trace.h"
|
|
#include "memwipe.h"
|
|
#include "cryptonote_config.h"
|
|
#include "net/http_client.h" // epee::net_utils::...
|
|
|
|
#ifdef WIN32
|
|
#include <windows.h>
|
|
#include <shlobj.h>
|
|
#include <strsafe.h>
|
|
#else
|
|
#include <sys/file.h>
|
|
#include <sys/utsname.h>
|
|
#include <sys/stat.h>
|
|
#endif
|
|
#include <boost/filesystem.hpp>
|
|
#include <boost/algorithm/string.hpp>
|
|
#include <boost/asio.hpp>
|
|
#include <openssl/sha.h>
|
|
|
|
namespace tools
|
|
{
|
|
std::function<void(int)> signal_handler::m_handler;
|
|
|
|
private_file::private_file() noexcept : m_handle(), m_filename() {}
|
|
|
|
private_file::private_file(std::FILE* handle, std::string&& filename) noexcept
|
|
: m_handle(handle), m_filename(std::move(filename)) {}
|
|
|
|
private_file private_file::create(std::string name)
|
|
{
|
|
#ifdef WIN32
|
|
struct close_handle
|
|
{
|
|
void operator()(HANDLE handle) const noexcept
|
|
{
|
|
CloseHandle(handle);
|
|
}
|
|
};
|
|
|
|
std::unique_ptr<void, close_handle> process = nullptr;
|
|
{
|
|
HANDLE temp{};
|
|
const bool fail = OpenProcessToken(GetCurrentProcess(), TOKEN_QUERY, std::addressof(temp)) == 0;
|
|
process.reset(temp);
|
|
if (fail)
|
|
return {};
|
|
}
|
|
|
|
DWORD sid_size = 0;
|
|
GetTokenInformation(process.get(), TokenOwner, nullptr, 0, std::addressof(sid_size));
|
|
if (GetLastError() != ERROR_INSUFFICIENT_BUFFER)
|
|
return {};
|
|
|
|
std::unique_ptr<char[]> sid{new char[sid_size]};
|
|
if (!GetTokenInformation(process.get(), TokenOwner, sid.get(), sid_size, std::addressof(sid_size)))
|
|
return {};
|
|
|
|
const PSID psid = reinterpret_cast<const PTOKEN_OWNER>(sid.get())->Owner;
|
|
const DWORD daclSize =
|
|
sizeof(ACL) + sizeof(ACCESS_ALLOWED_ACE) + GetLengthSid(psid) - sizeof(DWORD);
|
|
|
|
const std::unique_ptr<char[]> dacl{new char[daclSize]};
|
|
if (!InitializeAcl(reinterpret_cast<PACL>(dacl.get()), daclSize, ACL_REVISION))
|
|
return {};
|
|
|
|
if (!AddAccessAllowedAce(reinterpret_cast<PACL>(dacl.get()), ACL_REVISION, (READ_CONTROL | FILE_GENERIC_READ | DELETE), psid))
|
|
return {};
|
|
|
|
SECURITY_DESCRIPTOR descriptor{};
|
|
if (!InitializeSecurityDescriptor(std::addressof(descriptor), SECURITY_DESCRIPTOR_REVISION))
|
|
return {};
|
|
|
|
if (!SetSecurityDescriptorDacl(std::addressof(descriptor), true, reinterpret_cast<PACL>(dacl.get()), false))
|
|
return {};
|
|
|
|
SECURITY_ATTRIBUTES attributes{sizeof(SECURITY_ATTRIBUTES), std::addressof(descriptor), false};
|
|
std::unique_ptr<void, close_handle> file{
|
|
CreateFile(
|
|
name.c_str(),
|
|
GENERIC_WRITE, FILE_SHARE_READ,
|
|
std::addressof(attributes),
|
|
CREATE_NEW, (FILE_ATTRIBUTE_TEMPORARY | FILE_FLAG_DELETE_ON_CLOSE),
|
|
nullptr
|
|
)
|
|
};
|
|
if (file)
|
|
{
|
|
const int fd = _open_osfhandle(reinterpret_cast<intptr_t>(file.get()), 0);
|
|
if (0 <= fd)
|
|
{
|
|
file.release();
|
|
std::FILE* real_file = _fdopen(fd, "w");
|
|
if (!real_file)
|
|
{
|
|
_close(fd);
|
|
}
|
|
return {real_file, std::move(name)};
|
|
}
|
|
}
|
|
#else
|
|
const int fdr = open(name.c_str(), (O_RDONLY | O_CREAT), S_IRUSR);
|
|
if (0 <= fdr)
|
|
{
|
|
struct stat rstats = {};
|
|
if (fstat(fdr, std::addressof(rstats)) != 0)
|
|
{
|
|
close(fdr);
|
|
return {};
|
|
}
|
|
fchmod(fdr, (S_IRUSR | S_IWUSR));
|
|
const int fdw = open(name.c_str(), O_RDWR);
|
|
fchmod(fdr, rstats.st_mode);
|
|
close(fdr);
|
|
|
|
if (0 <= fdw)
|
|
{
|
|
struct stat wstats = {};
|
|
if (fstat(fdw, std::addressof(wstats)) == 0 &&
|
|
rstats.st_dev == wstats.st_dev && rstats.st_ino == wstats.st_ino &&
|
|
flock(fdw, (LOCK_EX | LOCK_NB)) == 0 && ftruncate(fdw, 0) == 0)
|
|
{
|
|
std::FILE* file = fdopen(fdw, "w");
|
|
if (file) return {file, std::move(name)};
|
|
}
|
|
close(fdw);
|
|
}
|
|
}
|
|
#endif
|
|
return {};
|
|
}
|
|
|
|
private_file::~private_file() noexcept
|
|
{
|
|
try
|
|
{
|
|
boost::system::error_code ec{};
|
|
boost::filesystem::remove(filename(), ec);
|
|
}
|
|
catch (...) {}
|
|
}
|
|
|
|
file_locker::file_locker(const std::string &filename)
|
|
{
|
|
#ifdef WIN32
|
|
m_fd = INVALID_HANDLE_VALUE;
|
|
std::wstring filename_wide;
|
|
try
|
|
{
|
|
filename_wide = string_tools::utf8_to_utf16(filename);
|
|
}
|
|
catch (const std::exception &e)
|
|
{
|
|
MERROR("Failed to convert path \"" << filename << "\" to UTF-16: " << e.what());
|
|
return;
|
|
}
|
|
m_fd = CreateFileW(filename_wide.c_str(), GENERIC_READ, 0, NULL, OPEN_ALWAYS, FILE_ATTRIBUTE_NORMAL, NULL);
|
|
if (m_fd != INVALID_HANDLE_VALUE)
|
|
{
|
|
OVERLAPPED ov;
|
|
memset(&ov, 0, sizeof(ov));
|
|
if (!LockFileEx(m_fd, LOCKFILE_FAIL_IMMEDIATELY | LOCKFILE_EXCLUSIVE_LOCK, 0, 1, 0, &ov))
|
|
{
|
|
MERROR("Failed to lock " << filename << ": " << std::error_code(GetLastError(), std::system_category()));
|
|
CloseHandle(m_fd);
|
|
m_fd = INVALID_HANDLE_VALUE;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
MERROR("Failed to open " << filename << ": " << std::error_code(GetLastError(), std::system_category()));
|
|
}
|
|
#else
|
|
m_fd = open(filename.c_str(), O_RDONLY | O_CREAT, 0666);
|
|
if (m_fd != -1)
|
|
{
|
|
if (flock(m_fd, LOCK_EX | LOCK_NB) == -1)
|
|
{
|
|
MERROR("Failed to lock " << filename << ": " << std::strerror(errno));
|
|
close(m_fd);
|
|
m_fd = -1;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
MERROR("Failed to open " << filename << ": " << std::strerror(errno));
|
|
}
|
|
#endif
|
|
}
|
|
file_locker::~file_locker()
|
|
{
|
|
if (locked())
|
|
{
|
|
#ifdef WIN32
|
|
CloseHandle(m_fd);
|
|
#else
|
|
close(m_fd);
|
|
#endif
|
|
}
|
|
}
|
|
bool file_locker::locked() const
|
|
{
|
|
#ifdef WIN32
|
|
return m_fd != INVALID_HANDLE_VALUE;
|
|
#else
|
|
return m_fd != -1;
|
|
#endif
|
|
}
|
|
|
|
#ifdef WIN32
|
|
std::string get_windows_version_display_string()
|
|
{
|
|
typedef void (WINAPI *PGNSI)(LPSYSTEM_INFO);
|
|
typedef BOOL (WINAPI *PGPI)(DWORD, DWORD, DWORD, DWORD, PDWORD);
|
|
#define BUFSIZE 10000
|
|
|
|
char pszOS[BUFSIZE] = {0};
|
|
OSVERSIONINFOEX osvi;
|
|
SYSTEM_INFO si;
|
|
PGNSI pGNSI;
|
|
PGPI pGPI;
|
|
BOOL bOsVersionInfoEx;
|
|
DWORD dwType;
|
|
|
|
ZeroMemory(&si, sizeof(SYSTEM_INFO));
|
|
ZeroMemory(&osvi, sizeof(OSVERSIONINFOEX));
|
|
|
|
osvi.dwOSVersionInfoSize = sizeof(OSVERSIONINFOEX);
|
|
bOsVersionInfoEx = GetVersionEx((OSVERSIONINFO*) &osvi);
|
|
|
|
if(!bOsVersionInfoEx) return pszOS;
|
|
|
|
// Call GetNativeSystemInfo if supported or GetSystemInfo otherwise.
|
|
|
|
pGNSI = (PGNSI) GetProcAddress(
|
|
GetModuleHandle(TEXT("kernel32.dll")),
|
|
"GetNativeSystemInfo");
|
|
if(NULL != pGNSI)
|
|
pGNSI(&si);
|
|
else GetSystemInfo(&si);
|
|
|
|
if ( VER_PLATFORM_WIN32_NT==osvi.dwPlatformId &&
|
|
osvi.dwMajorVersion > 4 )
|
|
{
|
|
StringCchCopy(pszOS, BUFSIZE, TEXT("Microsoft "));
|
|
|
|
// Test for the specific product.
|
|
|
|
if ( osvi.dwMajorVersion == 6 )
|
|
{
|
|
if( osvi.dwMinorVersion == 0 )
|
|
{
|
|
if( osvi.wProductType == VER_NT_WORKSTATION )
|
|
StringCchCat(pszOS, BUFSIZE, TEXT("Windows Vista "));
|
|
else StringCchCat(pszOS, BUFSIZE, TEXT("Windows Server 2008 " ));
|
|
}
|
|
|
|
if ( osvi.dwMinorVersion == 1 )
|
|
{
|
|
if( osvi.wProductType == VER_NT_WORKSTATION )
|
|
StringCchCat(pszOS, BUFSIZE, TEXT("Windows 7 "));
|
|
else StringCchCat(pszOS, BUFSIZE, TEXT("Windows Server 2008 R2 " ));
|
|
}
|
|
|
|
pGPI = (PGPI) GetProcAddress(
|
|
GetModuleHandle(TEXT("kernel32.dll")),
|
|
"GetProductInfo");
|
|
|
|
pGPI( osvi.dwMajorVersion, osvi.dwMinorVersion, 0, 0, &dwType);
|
|
|
|
switch( dwType )
|
|
{
|
|
case PRODUCT_ULTIMATE:
|
|
StringCchCat(pszOS, BUFSIZE, TEXT("Ultimate Edition" ));
|
|
break;
|
|
case PRODUCT_PROFESSIONAL:
|
|
StringCchCat(pszOS, BUFSIZE, TEXT("Professional" ));
|
|
break;
|
|
case PRODUCT_HOME_PREMIUM:
|
|
StringCchCat(pszOS, BUFSIZE, TEXT("Home Premium Edition" ));
|
|
break;
|
|
case PRODUCT_HOME_BASIC:
|
|
StringCchCat(pszOS, BUFSIZE, TEXT("Home Basic Edition" ));
|
|
break;
|
|
case PRODUCT_ENTERPRISE:
|
|
StringCchCat(pszOS, BUFSIZE, TEXT("Enterprise Edition" ));
|
|
break;
|
|
case PRODUCT_BUSINESS:
|
|
StringCchCat(pszOS, BUFSIZE, TEXT("Business Edition" ));
|
|
break;
|
|
case PRODUCT_STARTER:
|
|
StringCchCat(pszOS, BUFSIZE, TEXT("Starter Edition" ));
|
|
break;
|
|
case PRODUCT_CLUSTER_SERVER:
|
|
StringCchCat(pszOS, BUFSIZE, TEXT("Cluster Server Edition" ));
|
|
break;
|
|
case PRODUCT_DATACENTER_SERVER:
|
|
StringCchCat(pszOS, BUFSIZE, TEXT("Datacenter Edition" ));
|
|
break;
|
|
case PRODUCT_DATACENTER_SERVER_CORE:
|
|
StringCchCat(pszOS, BUFSIZE, TEXT("Datacenter Edition (core installation)" ));
|
|
break;
|
|
case PRODUCT_ENTERPRISE_SERVER:
|
|
StringCchCat(pszOS, BUFSIZE, TEXT("Enterprise Edition" ));
|
|
break;
|
|
case PRODUCT_ENTERPRISE_SERVER_CORE:
|
|
StringCchCat(pszOS, BUFSIZE, TEXT("Enterprise Edition (core installation)" ));
|
|
break;
|
|
case PRODUCT_ENTERPRISE_SERVER_IA64:
|
|
StringCchCat(pszOS, BUFSIZE, TEXT("Enterprise Edition for Itanium-based Systems" ));
|
|
break;
|
|
case PRODUCT_SMALLBUSINESS_SERVER:
|
|
StringCchCat(pszOS, BUFSIZE, TEXT("Small Business Server" ));
|
|
break;
|
|
case PRODUCT_SMALLBUSINESS_SERVER_PREMIUM:
|
|
StringCchCat(pszOS, BUFSIZE, TEXT("Small Business Server Premium Edition" ));
|
|
break;
|
|
case PRODUCT_STANDARD_SERVER:
|
|
StringCchCat(pszOS, BUFSIZE, TEXT("Standard Edition" ));
|
|
break;
|
|
case PRODUCT_STANDARD_SERVER_CORE:
|
|
StringCchCat(pszOS, BUFSIZE, TEXT("Standard Edition (core installation)" ));
|
|
break;
|
|
case PRODUCT_WEB_SERVER:
|
|
StringCchCat(pszOS, BUFSIZE, TEXT("Web Server Edition" ));
|
|
break;
|
|
}
|
|
}
|
|
|
|
if ( osvi.dwMajorVersion == 5 && osvi.dwMinorVersion == 2 )
|
|
{
|
|
if( GetSystemMetrics(SM_SERVERR2) )
|
|
StringCchCat(pszOS, BUFSIZE, TEXT( "Windows Server 2003 R2, "));
|
|
else if ( osvi.wSuiteMask & VER_SUITE_STORAGE_SERVER )
|
|
StringCchCat(pszOS, BUFSIZE, TEXT( "Windows Storage Server 2003"));
|
|
else if ( osvi.wSuiteMask & VER_SUITE_WH_SERVER )
|
|
StringCchCat(pszOS, BUFSIZE, TEXT( "Windows Home Server"));
|
|
else if( osvi.wProductType == VER_NT_WORKSTATION &&
|
|
si.wProcessorArchitecture==PROCESSOR_ARCHITECTURE_AMD64)
|
|
{
|
|
StringCchCat(pszOS, BUFSIZE, TEXT( "Windows XP Professional x64 Edition"));
|
|
}
|
|
else StringCchCat(pszOS, BUFSIZE, TEXT("Windows Server 2003, "));
|
|
|
|
// Test for the server type.
|
|
if ( osvi.wProductType != VER_NT_WORKSTATION )
|
|
{
|
|
if ( si.wProcessorArchitecture==PROCESSOR_ARCHITECTURE_IA64 )
|
|
{
|
|
if( osvi.wSuiteMask & VER_SUITE_DATACENTER )
|
|
StringCchCat(pszOS, BUFSIZE, TEXT( "Datacenter Edition for Itanium-based Systems" ));
|
|
else if( osvi.wSuiteMask & VER_SUITE_ENTERPRISE )
|
|
StringCchCat(pszOS, BUFSIZE, TEXT( "Enterprise Edition for Itanium-based Systems" ));
|
|
}
|
|
|
|
else if ( si.wProcessorArchitecture==PROCESSOR_ARCHITECTURE_AMD64 )
|
|
{
|
|
if( osvi.wSuiteMask & VER_SUITE_DATACENTER )
|
|
StringCchCat(pszOS, BUFSIZE, TEXT( "Datacenter x64 Edition" ));
|
|
else if( osvi.wSuiteMask & VER_SUITE_ENTERPRISE )
|
|
StringCchCat(pszOS, BUFSIZE, TEXT( "Enterprise x64 Edition" ));
|
|
else StringCchCat(pszOS, BUFSIZE, TEXT( "Standard x64 Edition" ));
|
|
}
|
|
|
|
else
|
|
{
|
|
if ( osvi.wSuiteMask & VER_SUITE_COMPUTE_SERVER )
|
|
StringCchCat(pszOS, BUFSIZE, TEXT( "Compute Cluster Edition" ));
|
|
else if( osvi.wSuiteMask & VER_SUITE_DATACENTER )
|
|
StringCchCat(pszOS, BUFSIZE, TEXT( "Datacenter Edition" ));
|
|
else if( osvi.wSuiteMask & VER_SUITE_ENTERPRISE )
|
|
StringCchCat(pszOS, BUFSIZE, TEXT( "Enterprise Edition" ));
|
|
else if ( osvi.wSuiteMask & VER_SUITE_BLADE )
|
|
StringCchCat(pszOS, BUFSIZE, TEXT( "Web Edition" ));
|
|
else StringCchCat(pszOS, BUFSIZE, TEXT( "Standard Edition" ));
|
|
}
|
|
}
|
|
}
|
|
|
|
if ( osvi.dwMajorVersion == 5 && osvi.dwMinorVersion == 1 )
|
|
{
|
|
StringCchCat(pszOS, BUFSIZE, TEXT("Windows XP "));
|
|
if( osvi.wSuiteMask & VER_SUITE_PERSONAL )
|
|
StringCchCat(pszOS, BUFSIZE, TEXT( "Home Edition" ));
|
|
else StringCchCat(pszOS, BUFSIZE, TEXT( "Professional" ));
|
|
}
|
|
|
|
if ( osvi.dwMajorVersion == 5 && osvi.dwMinorVersion == 0 )
|
|
{
|
|
StringCchCat(pszOS, BUFSIZE, TEXT("Windows 2000 "));
|
|
|
|
if ( osvi.wProductType == VER_NT_WORKSTATION )
|
|
{
|
|
StringCchCat(pszOS, BUFSIZE, TEXT( "Professional" ));
|
|
}
|
|
else
|
|
{
|
|
if( osvi.wSuiteMask & VER_SUITE_DATACENTER )
|
|
StringCchCat(pszOS, BUFSIZE, TEXT( "Datacenter Server" ));
|
|
else if( osvi.wSuiteMask & VER_SUITE_ENTERPRISE )
|
|
StringCchCat(pszOS, BUFSIZE, TEXT( "Advanced Server" ));
|
|
else StringCchCat(pszOS, BUFSIZE, TEXT( "Server" ));
|
|
}
|
|
}
|
|
|
|
// Include service pack (if any) and build number.
|
|
|
|
if( strlen(osvi.szCSDVersion) > 0 )
|
|
{
|
|
StringCchCat(pszOS, BUFSIZE, TEXT(" ") );
|
|
StringCchCat(pszOS, BUFSIZE, osvi.szCSDVersion);
|
|
}
|
|
|
|
TCHAR buf[80];
|
|
|
|
StringCchPrintf( buf, 80, TEXT(" (build %d)"), osvi.dwBuildNumber);
|
|
StringCchCat(pszOS, BUFSIZE, buf);
|
|
|
|
if ( osvi.dwMajorVersion >= 6 )
|
|
{
|
|
if ( si.wProcessorArchitecture==PROCESSOR_ARCHITECTURE_AMD64 )
|
|
StringCchCat(pszOS, BUFSIZE, TEXT( ", 64-bit" ));
|
|
else if (si.wProcessorArchitecture==PROCESSOR_ARCHITECTURE_INTEL )
|
|
StringCchCat(pszOS, BUFSIZE, TEXT(", 32-bit"));
|
|
}
|
|
|
|
return pszOS;
|
|
}
|
|
else
|
|
{
|
|
printf( "This sample does not support this version of Windows.\n");
|
|
return pszOS;
|
|
}
|
|
}
|
|
#else
|
|
std::string get_nix_version_display_string()
|
|
{
|
|
struct utsname un;
|
|
|
|
if(uname(&un) < 0)
|
|
return std::string("*nix: failed to get os version");
|
|
return std::string() + un.sysname + " " + un.version + " " + un.release;
|
|
}
|
|
#endif
|
|
|
|
|
|
|
|
std::string get_os_version_string()
|
|
{
|
|
#ifdef WIN32
|
|
return get_windows_version_display_string();
|
|
#else
|
|
return get_nix_version_display_string();
|
|
#endif
|
|
}
|
|
|
|
|
|
|
|
#ifdef WIN32
|
|
std::string get_special_folder_path(int nfolder, bool iscreate)
|
|
{
|
|
WCHAR psz_path[MAX_PATH] = L"";
|
|
|
|
if (SHGetSpecialFolderPathW(NULL, psz_path, nfolder, iscreate))
|
|
{
|
|
try
|
|
{
|
|
return string_tools::utf16_to_utf8(psz_path);
|
|
}
|
|
catch (const std::exception &e)
|
|
{
|
|
MERROR("utf16_to_utf8 failed: " << e.what());
|
|
return "";
|
|
}
|
|
}
|
|
|
|
LOG_ERROR("SHGetSpecialFolderPathW() failed, could not obtain requested path.");
|
|
return "";
|
|
}
|
|
#endif
|
|
|
|
std::string get_default_data_dir()
|
|
{
|
|
/* Please for the love of god refactor the ifdefs out of this */
|
|
|
|
// namespace fs = boost::filesystem;
|
|
// Windows < Vista: C:\Documents and Settings\Username\Application Data\CRYPTONOTE_NAME
|
|
// Windows >= Vista: C:\Users\Username\AppData\Roaming\CRYPTONOTE_NAME
|
|
// Unix & Mac: ~/.CRYPTONOTE_NAME
|
|
std::string config_folder;
|
|
|
|
#ifdef WIN32
|
|
config_folder = get_special_folder_path(CSIDL_COMMON_APPDATA, true) + "\\" + CRYPTONOTE_NAME;
|
|
#else
|
|
std::string pathRet;
|
|
char* pszHome = getenv("HOME");
|
|
if (pszHome == NULL || strlen(pszHome) == 0)
|
|
pathRet = "/";
|
|
else
|
|
pathRet = pszHome;
|
|
config_folder = (pathRet + "/." + CRYPTONOTE_NAME);
|
|
#endif
|
|
|
|
return config_folder;
|
|
}
|
|
|
|
bool create_directories_if_necessary(const std::string& path)
|
|
{
|
|
namespace fs = boost::filesystem;
|
|
boost::system::error_code ec;
|
|
fs::path fs_path(path);
|
|
if (fs::is_directory(fs_path, ec))
|
|
{
|
|
return true;
|
|
}
|
|
|
|
bool res = fs::create_directories(fs_path, ec);
|
|
if (res)
|
|
{
|
|
LOG_PRINT_L2("Created directory: " << path);
|
|
}
|
|
else
|
|
{
|
|
LOG_PRINT_L2("Can't create directory: " << path << ", err: "<< ec.message());
|
|
}
|
|
|
|
return res;
|
|
}
|
|
|
|
std::error_code replace_file(const std::string& replacement_name, const std::string& replaced_name)
|
|
{
|
|
int code;
|
|
#if defined(WIN32)
|
|
// Maximizing chances for success
|
|
std::wstring wide_replacement_name;
|
|
try { wide_replacement_name = string_tools::utf8_to_utf16(replacement_name); }
|
|
catch (...) { return std::error_code(GetLastError(), std::system_category()); }
|
|
std::wstring wide_replaced_name;
|
|
try { wide_replaced_name = string_tools::utf8_to_utf16(replaced_name); }
|
|
catch (...) { return std::error_code(GetLastError(), std::system_category()); }
|
|
|
|
DWORD attributes = ::GetFileAttributesW(wide_replaced_name.c_str());
|
|
if (INVALID_FILE_ATTRIBUTES != attributes)
|
|
{
|
|
::SetFileAttributesW(wide_replaced_name.c_str(), attributes & (~FILE_ATTRIBUTE_READONLY));
|
|
}
|
|
|
|
bool ok = 0 != ::MoveFileExW(wide_replacement_name.c_str(), wide_replaced_name.c_str(), MOVEFILE_REPLACE_EXISTING);
|
|
code = ok ? 0 : static_cast<int>(::GetLastError());
|
|
#else
|
|
bool ok = 0 == std::rename(replacement_name.c_str(), replaced_name.c_str());
|
|
code = ok ? 0 : errno;
|
|
#endif
|
|
return std::error_code(code, std::system_category());
|
|
}
|
|
|
|
static bool unbound_built_with_threads()
|
|
{
|
|
ub_ctx *ctx = ub_ctx_create();
|
|
if (!ctx) return false; // cheat a bit, should not happen unless OOM
|
|
char *monero = strdup("monero"), *unbound = strdup("unbound");
|
|
ub_ctx_zone_add(ctx, monero, unbound); // this calls ub_ctx_finalize first, then errors out with UB_SYNTAX
|
|
free(unbound);
|
|
free(monero);
|
|
// if no threads, bails out early with UB_NOERROR, otherwise fails with UB_AFTERFINAL id already finalized
|
|
bool with_threads = ub_ctx_async(ctx, 1) != 0; // UB_AFTERFINAL is not defined in public headers, check any error
|
|
ub_ctx_delete(ctx);
|
|
MINFO("libunbound was built " << (with_threads ? "with" : "without") << " threads");
|
|
return with_threads;
|
|
}
|
|
|
|
bool sanitize_locale()
|
|
{
|
|
// boost::filesystem throws for "invalid" locales, such as en_US.UTF-8, or kjsdkfs,
|
|
// so reset it here before any calls to it
|
|
try
|
|
{
|
|
boost::filesystem::path p {std::string("test")};
|
|
p /= std::string("test");
|
|
}
|
|
catch (...)
|
|
{
|
|
#if defined(__MINGW32__) || defined(__MINGW__)
|
|
putenv("LC_ALL=C");
|
|
putenv("LANG=C");
|
|
#else
|
|
setenv("LC_ALL", "C", 1);
|
|
setenv("LANG", "C", 1);
|
|
#endif
|
|
return true;
|
|
}
|
|
return false;
|
|
}
|
|
|
|
#ifdef STACK_TRACE
|
|
#ifdef _WIN32
|
|
// https://stackoverflow.com/questions/1992816/how-to-handle-seg-faults-under-windows
|
|
static LONG WINAPI windows_crash_handler(PEXCEPTION_POINTERS pExceptionInfo)
|
|
{
|
|
tools::log_stack_trace("crashing");
|
|
exit(1);
|
|
return EXCEPTION_CONTINUE_SEARCH;
|
|
}
|
|
static void setup_crash_dump()
|
|
{
|
|
SetUnhandledExceptionFilter(windows_crash_handler);
|
|
}
|
|
#else
|
|
static void posix_crash_handler(int signal)
|
|
{
|
|
tools::log_stack_trace(("crashing with fatal signal " + std::to_string(signal)).c_str());
|
|
#ifdef NDEBUG
|
|
_exit(1);
|
|
#else
|
|
abort();
|
|
#endif
|
|
}
|
|
static void setup_crash_dump()
|
|
{
|
|
signal(SIGSEGV, posix_crash_handler);
|
|
signal(SIGBUS, posix_crash_handler);
|
|
signal(SIGILL, posix_crash_handler);
|
|
signal(SIGFPE, posix_crash_handler);
|
|
}
|
|
#endif
|
|
#else
|
|
static void setup_crash_dump() {}
|
|
#endif
|
|
|
|
bool disable_core_dumps()
|
|
{
|
|
#ifdef __GLIBC__
|
|
// disable core dumps in release mode
|
|
struct rlimit rlimit;
|
|
rlimit.rlim_cur = rlimit.rlim_max = 0;
|
|
if (setrlimit(RLIMIT_CORE, &rlimit))
|
|
{
|
|
MWARNING("Failed to disable core dumps");
|
|
return false;
|
|
}
|
|
#endif
|
|
return true;
|
|
}
|
|
|
|
bool on_startup()
|
|
{
|
|
mlog_configure("", true);
|
|
|
|
setup_crash_dump();
|
|
|
|
sanitize_locale();
|
|
|
|
#ifdef __GLIBC__
|
|
const char *ver = gnu_get_libc_version();
|
|
if (!strcmp(ver, "2.25"))
|
|
MCLOG_RED(el::Level::Warning, "global", "Running with glibc " << ver << ", hangs may occur - change glibc version if possible");
|
|
#endif
|
|
|
|
#if OPENSSL_VERSION_NUMBER < 0x10100000 || defined(LIBRESSL_VERSION_TEXT)
|
|
SSL_library_init();
|
|
#else
|
|
OPENSSL_init_ssl(0, NULL);
|
|
#endif
|
|
|
|
if (!unbound_built_with_threads())
|
|
MCLOG_RED(el::Level::Warning, "global", "libunbound was not built with threads enabled - crashes may occur");
|
|
|
|
return true;
|
|
}
|
|
void set_strict_default_file_permissions(bool strict)
|
|
{
|
|
#if defined(__MINGW32__) || defined(__MINGW__)
|
|
// no clue about the odd one out
|
|
#else
|
|
mode_t mode = strict ? 077 : 0;
|
|
umask(mode);
|
|
#endif
|
|
}
|
|
|
|
bool is_hdd(const char *path)
|
|
{
|
|
#ifdef __GLIBC__
|
|
std::string device = "";
|
|
struct stat st, dst;
|
|
if (stat(path, &st) < 0)
|
|
return 0;
|
|
|
|
DIR *dir = opendir("/dev/block");
|
|
if (!dir)
|
|
return 0;
|
|
struct dirent *de;
|
|
while ((de = readdir(dir)))
|
|
{
|
|
if (strcmp(de->d_name, ".") && strcmp(de->d_name, ".."))
|
|
{
|
|
std::string dev_path = std::string("/dev/block/") + de->d_name;
|
|
char resolved[PATH_MAX];
|
|
if (realpath(dev_path.c_str(), resolved) && !strncmp(resolved, "/dev/", 5))
|
|
{
|
|
if (stat(resolved, &dst) == 0)
|
|
{
|
|
if (dst.st_rdev == st.st_dev)
|
|
{
|
|
// take out trailing digits (eg, sda1 -> sda)
|
|
char *ptr = resolved;
|
|
while (*ptr)
|
|
++ptr;
|
|
while (ptr > resolved && isdigit(*--ptr))
|
|
*ptr = 0;
|
|
device = resolved + 5;
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
closedir(dir);
|
|
|
|
if (device.empty())
|
|
return 0;
|
|
|
|
std::string sys_path = "/sys/block/" + device + "/queue/rotational";
|
|
FILE *f = fopen(sys_path.c_str(), "r");
|
|
if (!f)
|
|
return false;
|
|
char s[8];
|
|
char *ptr = fgets(s, sizeof(s), f);
|
|
fclose(f);
|
|
if (!ptr)
|
|
return 0;
|
|
s[sizeof(s) - 1] = 0;
|
|
int n = atoi(s); // returns 0 on parse error
|
|
return n == 1;
|
|
#else
|
|
return 0;
|
|
#endif
|
|
}
|
|
|
|
namespace
|
|
{
|
|
boost::mutex max_concurrency_lock;
|
|
unsigned max_concurrency = boost::thread::hardware_concurrency();
|
|
}
|
|
|
|
void set_max_concurrency(unsigned n)
|
|
{
|
|
if (n < 1)
|
|
n = boost::thread::hardware_concurrency();
|
|
unsigned hwc = boost::thread::hardware_concurrency();
|
|
if (n > hwc)
|
|
n = hwc;
|
|
boost::lock_guard<boost::mutex> lock(max_concurrency_lock);
|
|
max_concurrency = n;
|
|
}
|
|
|
|
unsigned get_max_concurrency()
|
|
{
|
|
boost::lock_guard<boost::mutex> lock(max_concurrency_lock);
|
|
return max_concurrency;
|
|
}
|
|
|
|
bool is_local_address(const std::string &address)
|
|
{
|
|
// always assume Tor/I2P addresses to be untrusted by default
|
|
if (boost::ends_with(address, ".onion") || boost::ends_with(address, ".i2p"))
|
|
{
|
|
MDEBUG("Address '" << address << "' is Tor/I2P, non local");
|
|
return false;
|
|
}
|
|
|
|
// extract host
|
|
epee::net_utils::http::url_content u_c;
|
|
if (!epee::net_utils::parse_url(address, u_c))
|
|
{
|
|
MWARNING("Failed to determine whether address '" << address << "' is local, assuming not");
|
|
return false;
|
|
}
|
|
if (u_c.host.empty())
|
|
{
|
|
MWARNING("Failed to determine whether address '" << address << "' is local, assuming not");
|
|
return false;
|
|
}
|
|
|
|
// resolve to IP
|
|
boost::asio::io_service io_service;
|
|
boost::asio::ip::tcp::resolver resolver(io_service);
|
|
boost::asio::ip::tcp::resolver::query query(u_c.host, "");
|
|
boost::asio::ip::tcp::resolver::iterator i = resolver.resolve(query);
|
|
while (i != boost::asio::ip::tcp::resolver::iterator())
|
|
{
|
|
const boost::asio::ip::tcp::endpoint &ep = *i;
|
|
if (ep.address().is_loopback())
|
|
{
|
|
MDEBUG("Address '" << address << "' is local");
|
|
return true;
|
|
}
|
|
++i;
|
|
}
|
|
|
|
MDEBUG("Address '" << address << "' is not local");
|
|
return false;
|
|
}
|
|
int vercmp(const char *v0, const char *v1)
|
|
{
|
|
std::vector<std::string> f0, f1;
|
|
boost::split(f0, v0, boost::is_any_of(".-"));
|
|
boost::split(f1, v1, boost::is_any_of(".-"));
|
|
for (size_t i = 0; i < std::max(f0.size(), f1.size()); ++i) {
|
|
if (i >= f0.size())
|
|
return -1;
|
|
if (i >= f1.size())
|
|
return 1;
|
|
int f0i = atoi(f0[i].c_str()), f1i = atoi(f1[i].c_str());
|
|
int n = f0i - f1i;
|
|
if (n)
|
|
return n;
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
bool sha256sum(const uint8_t *data, size_t len, crypto::hash &hash)
|
|
{
|
|
SHA256_CTX ctx;
|
|
if (!SHA256_Init(&ctx))
|
|
return false;
|
|
if (!SHA256_Update(&ctx, data, len))
|
|
return false;
|
|
if (!SHA256_Final((unsigned char*)hash.data, &ctx))
|
|
return false;
|
|
return true;
|
|
}
|
|
|
|
bool sha256sum(const std::string &filename, crypto::hash &hash)
|
|
{
|
|
if (!epee::file_io_utils::is_file_exist(filename))
|
|
return false;
|
|
std::ifstream f;
|
|
f.exceptions(std::ifstream::failbit | std::ifstream::badbit);
|
|
f.open(filename, std::ios_base::binary | std::ios_base::in | std::ios::ate);
|
|
if (!f)
|
|
return false;
|
|
std::ifstream::pos_type file_size = f.tellg();
|
|
SHA256_CTX ctx;
|
|
if (!SHA256_Init(&ctx))
|
|
return false;
|
|
size_t size_left = file_size;
|
|
f.seekg(0, std::ios::beg);
|
|
while (size_left)
|
|
{
|
|
char buf[4096];
|
|
std::ifstream::pos_type read_size = size_left > sizeof(buf) ? sizeof(buf) : size_left;
|
|
f.read(buf, read_size);
|
|
if (!f || !f.good())
|
|
return false;
|
|
if (!SHA256_Update(&ctx, buf, read_size))
|
|
return false;
|
|
size_left -= read_size;
|
|
}
|
|
f.close();
|
|
if (!SHA256_Final((unsigned char*)hash.data, &ctx))
|
|
return false;
|
|
return true;
|
|
}
|
|
|
|
boost::optional<std::pair<uint32_t, uint32_t>> parse_subaddress_lookahead(const std::string& str)
|
|
{
|
|
auto pos = str.find(":");
|
|
bool r = pos != std::string::npos;
|
|
uint32_t major;
|
|
r = r && epee::string_tools::get_xtype_from_string(major, str.substr(0, pos));
|
|
uint32_t minor;
|
|
r = r && epee::string_tools::get_xtype_from_string(minor, str.substr(pos + 1));
|
|
if (r)
|
|
{
|
|
return std::make_pair(major, minor);
|
|
}
|
|
else
|
|
{
|
|
return {};
|
|
}
|
|
}
|
|
|
|
std::string glob_to_regex(const std::string &val)
|
|
{
|
|
std::string newval;
|
|
|
|
bool escape = false;
|
|
for (char c: val)
|
|
{
|
|
if (c == '*')
|
|
newval += escape ? "*" : ".*";
|
|
else if (c == '?')
|
|
newval += escape ? "?" : ".";
|
|
else if (c == '\\')
|
|
newval += '\\', escape = !escape;
|
|
else
|
|
newval += c;
|
|
}
|
|
return newval;
|
|
}
|
|
}
|