]> code.citadel.org Git - citadel.git/blobdiff - webcit/webserver.c
* remove accidently committed test stuff
[citadel.git] / webcit / webserver.c
index 8f04c224f67245f5596242d222203af7308a2141..4bc12f512b21910bde982cc0dd1813031d559531 100644 (file)
@@ -27,6 +27,7 @@ int is_https = 0;             /* Nonzero if I am an HTTPS service */
 int follow_xff = 0;            /* Follow X-Forwarded-For: header */
 int home_specified = 0;                /* did the user specify a homedir? */
 int time_to_die = 0;            /* Nonzero if server is shutting down */
+int DisableGzip = 0;
 extern void *context_loop(int*);
 extern void *housekeeping_loop(void);
 extern pthread_mutex_t SessionListMutex;
@@ -113,10 +114,12 @@ int ig_tcp_server(char *ip_addr, int port_number, int queue_len)
        i = 1;
        setsockopt(s, SOL_SOCKET, SO_REUSEADDR, &i, sizeof(i));
 
+       #ifndef __APPLE__
        fcntl(s, F_SETFL, O_NONBLOCK); /* maide: this statement is incorrect
                                          there should be a preceding F_GETFL
                                          and a bitwise OR with the previous
                                          fd flags */
+       #endif
        
        if (bind(s, (struct sockaddr *) &sin, sizeof(sin)) < 0) {
                lprintf(1, "Can't bind: %s\n", strerror(errno));
@@ -147,7 +150,7 @@ int ig_uds_server(char *sockpath, int queue_len)
        if (actual_queue_len < 5) actual_queue_len = 5;
 
        i = unlink(sockpath);
-       if (i != 0) if (errno != ENOENT) {
+       if ((i != 0) && (errno != ENOENT)) {
                lprintf(1, "webcit: can't unlink %s: %s\n",
                        sockpath, strerror(errno));
                exit(WC_EXIT_BIND);
@@ -196,43 +199,44 @@ int ig_uds_server(char *sockpath, int queue_len)
  *      0       Request timed out.
  *     -1      Connection is broken, or other error.
  */
-int client_read_to(int *sock, char *buf, int bytes, int timeout)
+int client_read_to(int *sock, StrBuf *Target, StrBuf *Buf, int bytes, int timeout)
 {
-       int len, rlen;
-       fd_set rfds;
-       struct timeval tv;
-       int retval;
-
+       const char *Error;
+       int retval = 0;
 
 #ifdef HAVE_OPENSSL
        if (is_https) {
-               return (client_read_ssl(buf, bytes, timeout));
-       }
+               while ((StrLength(Buf) + StrLength(Target) < bytes) &&
+                      (retval >= 0))
+                       retval = client_read_sslbuffer(Buf, timeout);
+               if (retval >= 0) {
+                       StrBufAppendBuf(Target, Buf, 0); /// todo: Buf > bytes?
+#ifdef HTTP_TRACING
+                       write(2, "\033[32m", 5);
+                       write(2, buf, bytes);
+                       write(2, "\033[30m", 5);
 #endif
-
-       len = 0;
-       while ((len < bytes) && (*sock > 0)) {
-               FD_ZERO(&rfds);
-               FD_SET(*sock, &rfds);
-               tv.tv_sec = timeout;
-               tv.tv_usec = 0;
-
-               retval = select((*sock) + 1, &rfds, NULL, NULL, &tv);
-               if (FD_ISSET(*sock, &rfds) == 0) {
-                       return (0);
+                       return 1;
                }
-
-               rlen = read(*sock, &buf[len], bytes - len);
-
-               if (rlen < 1) {
-                       lprintf(2, "client_read() failed: %s\n",
-                               strerror(errno));
-                       if (*sock > 0)
-                               close(*sock);
-                       *sock = -1;     
-                       return (-1);
+               else {
+                       lprintf(2, "client_read_ssl() failed\n");
+                       return -1;
                }
-               len = len + rlen;
+       }
+#endif
+
+       if (StrLength(Buf) > 0) {//// todo: what if Buf > bytes?
+               StrBufAppendBuf(Target, Buf, 0);
+       }
+       retval = StrBufReadBLOB(Target, 
+                          sock, 
+                          (StrLength(Target) > 0), 
+                          bytes - StrLength(Target), 
+                               &Error);
+       if (retval < 0) {
+               lprintf(2, "client_read() failed: %s\n",
+                       Error);
+               return retval;
        }
 
 #ifdef HTTP_TRACING
@@ -240,7 +244,7 @@ int client_read_to(int *sock, char *buf, int bytes, int timeout)
        write(2, buf, bytes);
        write(2, "\033[30m", 5);
 #endif
-       return (1);
+       return 1;
 }
 
 
@@ -259,7 +263,7 @@ void begin_burst(void)
  */
 long end_burst(void)
 {
-       struct wcsession *WCC = WC;
+       wcsession *WCC = WC;
         const char *ptr, *eptr;
         long count;
        ssize_t res;
@@ -268,7 +272,7 @@ long end_burst(void)
 
 #ifdef HAVE_ZLIB
        /* Perform gzip compression, if enabled and supported by client */
-       if ((WCC->gzip_ok) && CompressBuffer(WCC->WBuf))
+       if (!DisableGzip && (WCC->gzip_ok) && CompressBuffer(WCC->WBuf))
        {
                hprintf("Content-encoding: gzip\r\n");
        }
@@ -364,9 +368,9 @@ long end_burst(void)
  * buf         the buffer to write to
  * bytes       Number of bytes to read
  */
-int client_read(int *sock, char *buf, int bytes)
+int client_read(int *sock, StrBuf *Target, StrBuf *buf, int bytes)
 {
-       return (client_read_to(sock, buf, bytes, SLEEPING));
+       return (client_read_to(sock, Target, buf, bytes, SLEEPING));
 }
 
 
@@ -381,38 +385,37 @@ int client_read(int *sock, char *buf, int bytes)
  *
  * returns the number of bytes read
  */
-int client_getln(int *sock, char *buf, int bufsiz)
-{
-       int i = 0;
-       int retval = 0;
-
-       /* Read one character at a time.*/
-       for (i = 0; *sock > 0; i++) {
-               retval = client_read(sock, &buf[i], 1);
-               if (retval < 0)
-                       return retval;
-               if (retval != 1 || buf[i] == '\n' || i == (bufsiz-1))
-                       break;
-               if ( (!isspace(buf[i])) && (!isprint(buf[i])) ) {
-                       /* Non printable character recieved from client */
-                       return(-1);
-               }
-       }
-
-       /* If we got a long line, discard characters until the newline. */
-       if (i == (bufsiz-1))
-               while (buf[i] != '\n' && retval == 1)
-                       retval = client_read(sock, &buf[i], 1);
-
-       /*
-        * Strip any trailing non-printable characters.
-        */
-       buf[i] = 0;
-       while ((i > 0) && (!isprint(buf[i - 1]))) {
-               buf[--i] = 0;
-       }
-       return (retval);
-}
+/////int client_getln(int *sock, char *buf, int bufsiz)
+/////{
+/////  int i, retval;
+/////
+/////  /* Read one character at a time.*/
+/////  for (i = 0; *sock > 0; i++) {
+/////          retval = client_read(sock, &buf[i], 1);
+/////          if (retval < 0)
+/////                  return retval;
+/////          if (retval != 1 || buf[i] == '\n' || i == (bufsiz-1))
+/////                  break;
+/////          if ( (!isspace(buf[i])) && (!isprint(buf[i])) ) {
+/////                  /* Non printable character recieved from client */
+/////                  return(-1);
+/////          }
+/////  }
+/////
+/////  /* If we got a long line, discard characters until the newline. */
+/////  if (i == (bufsiz-1))
+/////          while (buf[i] != '\n' && retval == 1)
+/////                  retval = client_read(sock, &buf[i], 1);
+/////
+/////  /*
+/////   * Strip any trailing non-printable characters.
+/////   */
+/////  buf[i] = 0;
+/////  while ((i > 0) && (!isprint(buf[i - 1]))) {
+/////          buf[--i] = 0;
+/////  }
+/////  return (retval);
+/////}
 
 /*
  * Shut us down the regular way.
@@ -426,6 +429,69 @@ void graceful_shutdown_watcher(int signum) {
                exit(0);
 }
 
+
+int ClientGetLine(int *sock, StrBuf *Target, StrBuf *CLineBuf)
+{
+       const char *Error, *pch, *pchs;
+       int rlen, len, retval = 0;
+
+       if (is_https) {
+               int ntries = 0;
+               if (StrLength(CLineBuf) > 0) {
+                       pchs = ChrPtr(CLineBuf);
+                       pch = strchr(pchs, '\n');
+                       if (pch != NULL) {
+                               rlen = 0;
+                               len = pch - pchs;
+                               if (len > 0 && (*(pch - 1) == '\r') )
+                                       rlen ++;
+                               StrBufSub(Target, CLineBuf, 0, len - rlen);
+                               StrBufCutLeft(CLineBuf, len + 1);
+                               return len - rlen;
+                       }
+               }
+
+               while (retval == 0) { 
+                               pch = NULL;
+                               pchs = ChrPtr(CLineBuf);
+                               if (*pchs != '\0')
+                                       pch = strchr(pchs, '\n');
+                               if (pch == NULL) {
+                                       retval = client_read_sslbuffer(CLineBuf, SLEEPING);
+                                       pchs = ChrPtr(CLineBuf);
+                                       pch = strchr(pchs, '\n');
+                               }
+                               if (retval == 0) {
+                                       sleeeeeeeeeep(1);
+                                       ntries ++;
+                               }
+                               if (ntries > 10)
+                                       return 0;
+               }
+               if ((retval > 0) && (pch != NULL)) {
+                       rlen = 0;
+                       len = pch - pchs;
+                       if (len > 0 && (*(pch - 1) == '\r') )
+                               rlen ++;
+                       StrBufSub(Target, CLineBuf, 0, len - rlen);
+                       StrBufCutLeft(CLineBuf, len + 1);
+                       return len - rlen;
+
+               }
+               else 
+                       return -1;
+       }
+       else 
+               return StrBufTCP_read_buffered_line(Target, 
+                                                   CLineBuf,
+                                                   sock,
+                                                   5,
+                                                   1,
+                                                   &Error);
+}
+
+
+
 /*
  * Shut us down the regular way.
  * signum is the signal we want to forward
@@ -593,7 +659,7 @@ const char *nix(void *vptr) {snprintf(foobuf, 32, "%0x", (long) vptr); return fo
 void InitTemplateCache(void);
 extern int LoadTemplates;
 extern void LoadZoneFiles(void);
-
+StrBuf *csslocal = NULL;
 /*
  * Here's where it all begins.
  */
@@ -627,9 +693,12 @@ int main(int argc, char **argv)
        TemplateCache = NewHash(1, NULL);
        GlobalNS = NewHash(1, NULL);
        Iterators = NewHash(1, NULL);
-       Contitionals = NewHash(1, NULL);
-       LoadZoneFiles();
+       Conditionals = NewHash(1, NULL);
+       MsgHeaderHandler = NewHash(1, NULL);
+       MimeRenderHandler = NewHash(1, NULL);
+       SortHash = NewHash(1, NULL);
 
+       LoadZoneFiles();
 
 #ifdef DBG_PRINNT_HOOKS_AT_START
        dbg_PrintHash(HandlerHash, nix, NULL);
@@ -648,9 +717,9 @@ int main(int argc, char **argv)
 
        /* Parse command line */
 #ifdef HAVE_OPENSSL
-       while ((a = getopt(argc, argv, "h:i:p:t:T:x:dD:cfs")) != EOF)
+       while ((a = getopt(argc, argv, "h:i:p:t:T:x:dD:cfsZ")) != EOF)
 #else
-       while ((a = getopt(argc, argv, "h:i:p:t:T:x:dD:cf")) != EOF)
+       while ((a = getopt(argc, argv, "h:i:p:t:T:x:dD:cfZ")) != EOF)
 #endif
                switch (a) {
                case 'h':
@@ -690,6 +759,9 @@ int main(int argc, char **argv)
                case 'T':
                        LoadTemplates = atoi(optarg);
                        break;
+               case 'Z':
+                       DisableGzip = 1;
+                       break;
                case 'x':
                        verbosity = atoi(optarg);
                        break;
@@ -719,7 +791,7 @@ int main(int argc, char **argv)
                                "[-i ip_addr] [-p http_port] "
                                "[-t tracefile] [-c] [-f] "
                                "[-T Templatedebuglevel] "
-                               "[-d] "
+                               "[-d] [-Z] "
 #ifdef HAVE_OPENSSL
                                "[-s] "
 #endif
@@ -805,15 +877,23 @@ int main(int argc, char **argv)
                perror("chdir");
        }
        LoadIconDir(static_icon_dir);
-       InitTemplateCache();
 
        initialise_modules();
        initialize_viewdefs();
        initialize_axdefs();
 
+       InitTemplateCache();
+
+       if (!access("static.local/webcit.css", R_OK)) {
+               csslocal = NewStrBufPlain(HKEY("<link href=\"static.local/webcit.css\" rel=\"stylesheet\" type=\"text/css\">"));
+       }
+
        /* Tell libical to return an error instead of aborting if it sees badly formed iCalendar data. */
        icalerror_errors_are_fatal = 0;
 
+       /* Use our own prefix on tzid's generated from system tzdata */
+       icaltimezone_set_tzid_prefix("/citadel.org/");
+
        /*
         * Set up a place to put thread-specific data.
         * We only need a single pointer per thread - it points to the
@@ -903,7 +983,10 @@ void ShutDownWebcit(void)
        DeleteHash(&TemplateCache);
        DeleteHash(&LocalTemplateCache);
        DeleteHash(&Iterators);
-       DeleteHash(&Contitionals);
+       DeleteHash(&MimeRenderHandler);
+       DeleteHash(&Conditionals);
+       DeleteHash(&MsgHeaderHandler);
+       DeleteHash(&SortHash);
 #ifdef ENABLE_NLS
        ShutdownLocale();
 #endif