4 * This contains a simple multithreaded TCP server manager. It sits around
5 * waiting on the specified port for incoming HTTP connections. When a
6 * connection is established, it calls context_loop() from context_loop.c.
21 #include <sys/types.h>
23 #include <sys/socket.h>
24 #ifdef HAVE_SYS_TIME_H
30 #include <netinet/in.h>
39 #include "webserver.h"
42 int vsnprintf(char *buf, size_t max, const char *fmt, va_list argp);
45 int verbosity = 9; /* Logging level */
46 int msock; /* master listening socket */
47 int is_https = 0; /* Nonzero if I am an HTTPS service */
48 extern void *context_loop(int);
49 extern void *housekeeping_loop(void);
50 extern pthread_mutex_t SessionListMutex;
51 extern pthread_key_t MyConKey;
54 char *server_cookie = NULL;
57 char *ctdlhost = DEFAULT_HOST;
58 char *ctdlport = DEFAULT_PORT;
61 * This is a generic function to set up a master socket for listening on
62 * a TCP port. The server shuts down if the bind fails.
64 int ig_tcp_server(int port_number, int queue_len)
66 struct sockaddr_in sin;
69 memset(&sin, 0, sizeof(sin));
70 sin.sin_family = AF_INET;
71 sin.sin_addr.s_addr = INADDR_ANY;
73 if (port_number == 0) {
74 lprintf(1, "Cannot start: no port number specified.\n");
77 sin.sin_port = htons((u_short) port_number);
79 s = socket(PF_INET, SOCK_STREAM, (getprotobyname("tcp")->p_proto));
81 lprintf(1, "Can't create a socket: %s\n",
85 /* Set some socket options that make sense. */
87 setsockopt(s, SOL_SOCKET, SO_REUSEADDR, &i, sizeof(i));
89 if (bind(s, (struct sockaddr *) &sin, sizeof(sin)) < 0) {
90 lprintf(1, "Can't bind: %s\n", strerror(errno));
93 if (listen(s, queue_len) < 0) {
94 lprintf(1, "Can't listen: %s\n", strerror(errno));
102 * Read data from the client socket.
104 * 1 Requested number of bytes has been read.
105 * 0 Request timed out.
106 * -1 Connection is broken, or other error.
108 int client_read_to(int sock, char *buf, int bytes, int timeout)
118 return(client_read_ssl(buf, bytes, timeout));
123 while (len < bytes) {
129 retval = select((sock) + 1,
130 &rfds, NULL, NULL, &tv);
131 if (FD_ISSET(sock, &rfds) == 0) {
135 rlen = read(sock, &buf[len], bytes - len);
138 lprintf(2, "client_read() failed: %s\n",
148 ssize_t client_write(const void *buf, size_t count) {
151 client_write_ssl((char *)buf, count);
155 return(write(WC->http_sock, buf, count));
160 * Read data from the client socket with default timeout.
161 * (This is implemented in terms of client_read_to() and could be
162 * justifiably moved out of sysdep.c)
164 int client_read(int sock, char *buf, int bytes)
166 return (client_read_to(sock, buf, bytes, SLEEPING));
171 * client_gets() ... Get a LF-terminated line of text from the client.
172 * (This is implemented in terms of client_read() and could be
173 * justifiably moved out of sysdep.c)
175 int client_gets(int sock, char *buf)
179 /* Read one character at a time.
182 retval = client_read(sock, &buf[i], 1);
183 if (retval != 1 || buf[i] == '\n' || i == 255)
187 /* If we got a long line, discard characters until the newline.
190 while (buf[i] != '\n' && retval == 1)
191 retval = client_read(sock, &buf[i], 1);
194 * Strip any trailing non-printable characters.
197 while ((strlen(buf) > 0) && (!isprint(buf[strlen(buf) - 1]))) {
198 buf[strlen(buf) - 1] = 0;
205 * Start running as a daemon. Only close stdio if do_close_stdio is set.
207 void start_daemon(int do_close_stdio)
209 if (do_close_stdio) {
214 signal(SIGHUP, SIG_IGN);
215 signal(SIGINT, SIG_IGN);
216 signal(SIGQUIT, SIG_IGN);
221 void spawn_another_worker_thread() {
222 pthread_t SessThread; /* Thread descriptor */
223 pthread_attr_t attr; /* Thread attributes */
225 lprintf(3, "Creating a new thread\n");
227 /* set attributes for the new thread */
228 pthread_attr_init(&attr);
229 pthread_attr_setdetachstate(&attr, PTHREAD_CREATE_DETACHED);
231 /* now create the thread */
232 if (pthread_create(&SessThread, &attr,
233 (void *(*)(void *)) worker_entry, NULL)
235 lprintf(1, "Can't create thread: %s\n",
241 * Here's where it all begins.
243 int main(int argc, char **argv)
245 pthread_t SessThread; /* Thread descriptor */
246 pthread_attr_t attr; /* Thread attributes */
247 int a, i; /* General-purpose variables */
248 int port = PORT_NUM; /* Port to listen on */
249 char tracefile[PATH_MAX];
251 /* Parse command line */
253 while ((a = getopt(argc, argv, "hp:t:cs")) != EOF)
255 while ((a = getopt(argc, argv, "hp:t:c")) != EOF)
262 strcpy(tracefile, optarg);
263 freopen(tracefile, "w", stdout);
264 freopen(tracefile, "w", stderr);
265 freopen(tracefile, "r", stdin);
268 verbosity = atoi(optarg);
271 server_cookie = malloc(SIZ);
272 if (server_cookie != NULL) {
273 strcpy(server_cookie, "Set-cookie: wcserver=");
275 &server_cookie[strlen(server_cookie)],
277 lprintf(2, "gethostname: %s\n",
287 fprintf(stderr, "usage: webserver [-p localport] "
288 "[-t tracefile] [-c] "
292 "[remotehost [remoteport]]\n");
297 ctdlhost = argv[optind];
299 ctdlport = argv[optind];
301 /* Tell 'em who's in da house */
302 lprintf(1, SERVER "\n"
303 "Copyright (C) 1996-2004 by the Citadel/UX development team.\n"
304 "This software is distributed under the terms of the GNU General Public\n"
305 "License. If you paid for this software, someone is ripping you off.\n\n");
307 if (chdir(WEBCITDIR) != 0)
311 * Set up a place to put thread-specific data.
312 * We only need a single pointer per thread - it points to the
313 * wcsession struct to which the thread is currently bound.
315 if (pthread_key_create(&MyConKey, NULL) != 0) {
316 lprintf(1, "Can't create TSD key: %s\n", strerror(errno));
320 * Set up a place to put thread-specific SSL data.
321 * We don't stick this in the wcsession struct because SSL starts
322 * up before the session is bound, and it gets torn down between
326 if (pthread_key_create(&ThreadSSL, NULL) != 0) {
327 lprintf(1, "Can't create TSD key: %s\n", strerror(errno));
332 * Bind the server to our favorite port.
333 * There is no need to check for errors, because ig_tcp_server()
334 * exits if it doesn't succeed.
336 lprintf(2, "Attempting to bind to port %d...\n", port);
337 msock = ig_tcp_server(port, LISTEN_QUEUE_LENGTH);
338 lprintf(2, "Listening on socket %d\n", msock);
339 signal(SIGPIPE, SIG_IGN);
341 pthread_mutex_init(&SessionListMutex, NULL);
344 * Start up the housekeeping thread
346 pthread_attr_init(&attr);
347 pthread_attr_setdetachstate(&attr, PTHREAD_CREATE_DETACHED);
348 pthread_create(&SessThread, &attr,
349 (void *(*)(void *)) housekeeping_loop, NULL);
353 * If this is an HTTPS server, fire up SSL
361 /* Start a few initial worker threads */
362 for (i=0; i<(MIN_WORKER_THREADS); ++i) {
363 spawn_another_worker_thread();
366 /* now the original thread becomes another worker */
373 * Entry point for worker threads
375 void worker_entry(void) {
379 int fail_this_transaction = 0;
382 /* Only one thread can accept at a time */
383 fail_this_transaction = 0;
384 ssock = accept(msock, NULL, 0);
386 lprintf(2, "accept() failed: %s\n", strerror(errno));
388 /* Set the SO_REUSEADDR socket option */
390 setsockopt(ssock, SOL_SOCKET, SO_REUSEADDR,
393 /* If we are an HTTPS server, go crypto now. */
396 if (starttls(ssock) != 0) {
397 fail_this_transaction = 1;
403 if (fail_this_transaction == 0) {
404 /* Perform an HTTP transaction... */
406 /* ...and close the socket. */
407 lingering_close(ssock);
412 } while (!time_to_die);
418 int lprintf(int loglevel, const char *format, ...)
423 va_start(ap, format);
424 vsprintf(buf, format, ap);
427 if (loglevel <= verbosity) {
431 gettimeofday(&tv, NULL);
432 tim = localtime((time_t *)&(tv.tv_sec));
434 if (WC && WC->wc_session) {
436 "%04d/%02d/%02d %2d:%02d:%02d.%03ld [%ld:%d] %s",
437 tim->tm_year + 1900, tim->tm_mon + 1,
438 tim->tm_mday, tim->tm_hour, tim->tm_min,
439 tim->tm_sec, (long)tv.tv_usec / 1000,
440 (long)pthread_self(),
441 WC->wc_session, buf);
444 "%04d/%02d/%02d %2d:%02d:%02d.%03ld [%ld] %s",
445 tim->tm_year + 1900, tim->tm_mon + 1,
446 tim->tm_mday, tim->tm_hour, tim->tm_min,
447 tim->tm_sec, (long)tv.tv_usec / 1000,
448 (long)pthread_self(),