1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
use anyhow::Result;
#[cfg(feature = "mesalock_sgx")]
use sgx_types::error::SgxStatus;
use teaclave_types::FileAgentRequest;
#[cfg(feature = "mesalock_sgx")]
extern "C" {
fn ocall_handle_file_request(p_retval: *mut u32, in_buf: *const u8, in_len: u32) -> SgxStatus;
}
#[cfg(feature = "mesalock_sgx")]
pub(crate) fn handle_file_request(request: FileAgentRequest) -> Result<()> {
let mut rt: u32 = 2;
let bytes = serde_json::to_vec(&request)?;
let buf_len = bytes.len();
let res =
unsafe { ocall_handle_file_request(&mut rt as _, bytes.as_ptr() as _, buf_len as u32) };
anyhow::ensure!(res == SgxStatus::Success, "ocall sgx_error = {:?}", res);
anyhow::ensure!(rt == 0, "ocall error = {:?}", rt);
Ok(())
}
#[cfg(not(feature = "mesalock_sgx"))]
pub(crate) fn handle_file_request(request: FileAgentRequest) -> Result<()> {
let bytes = serde_json::to_vec(&request)?;
teaclave_file_agent::handle_file_request(&bytes)
}
#[cfg(feature = "enclave_unit_test")]
pub mod tests {
use super::*;
use std::path::PathBuf;
use std::vec;
use teaclave_types::*;
use url::Url;
pub fn test_handle_file_request() {
let test_install_dir = env!("TEACLAVE_TEST_INSTALL_DIR");
let fixture_dir = format!(
"file:///{}/fixtures/functions/mesapy/input.txt",
test_install_dir
);
let url = Url::parse(&fixture_dir).unwrap();
let dest = PathBuf::from("/tmp/execution_input_test.txt");
let info = HandleFileInfo::new(&dest, &url);
let request =
FileAgentRequest::new(HandleFileCommand::Download, vec![info], "/tmp/fusion_data");
handle_file_request(request).unwrap();
std::untrusted::fs::remove_file(&dest).unwrap();
}
}