/*
- * This contains a simple multithreaded TCP server manager. It sits around
- * waiting on the specified port for incoming HTTP connections. When a
- * connection is established, it calls context_loop() from context_loop.c.
+ * Copyright (c) 1996-2011 by the citadel.org team
*
- * Copyright (c) 1996-2011 by the citadel.org developers.
- * This program is released under the terms of the GNU General Public License v3.
+ * This program is open source software. You can redistribute it and/or
+ * modify it under the terms of the GNU General Public License as
+ * published by the Free Software Foundation; either version 3 of the
+ * License, or (at your option) any later version.
*
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program; if not, write to the Free Software
+ * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
*/
#include "webcit.h"
int vsnprintf(char *buf, size_t max, const char *fmt, va_list argp);
#endif
-
-extern int msock; /* master listening socket */
-extern int verbosity; /* Logging level */
+extern int msock; /* master listening socket */
extern char static_icon_dir[PATH_MAX]; /* where should we find our mime icons */
-int is_https = 0; /* Nonzero if I am an HTTPS service */
-int follow_xff = 0; /* Follow X-Forwarded-For: header */
-int home_specified = 0; /* did the user specify a homedir? */
+int is_https = 0; /* Nonzero if I am an HTTPS service */
+int follow_xff = 0; /* Follow X-Forwarded-For: header? */
int DisableGzip = 0;
-struct redirector *redir = NULL;
char *default_landing_page = NULL;
-int num_redir = 0;
extern pthread_mutex_t SessionListMutex;
extern pthread_key_t MyConKey;
extern void worker_entry(void);
extern void drop_root(uid_t UID);
-char socket_dir[PATH_MAX]; /* where to talk to our citadel server */
-
+char socket_dir[PATH_MAX]; /* where to talk to our citadel server */
char *server_cookie = NULL; /* our Cookie connection to the client */
int http_port = PORT_NUM; /* Port to listen on */
-char *ctdlhost = DEFAULT_HOST; /* our name */
-char *ctdlport = DEFAULT_PORT; /* our Port */
-int setup_wizard = 0; /* should we run the setup wizard? \todo */
-char wizard_filename[PATH_MAX]; /* where's the setup wizard? */
+char *ctdlhost = DEFAULT_HOST; /* Host name or IP address of Citadel server */
+char *ctdlport = DEFAULT_PORT; /* Port number of Citadel server */
+int setup_wizard = 0; /* should we run the setup wizard? */
+char wizard_filename[PATH_MAX]; /* location of file containing the last webcit version against which we ran setup wizard */
int running_as_daemon = 0; /* should we deamonize on startup? */
-
-
/* #define DBG_PRINNT_HOOKS_AT_START */
#ifdef DBG_PRINNT_HOOKS_AT_START
extern HashList *HandlerHash;
extern int LoadTemplates;
-
-
-
-/*
- * Handle redirects to legacy web servers
- */
-void handle_redir(void) {
- if (num_redir > 0) {
- int i;
- const char *req = ChrPtr(WC->Hdr->this_page);
- if (!req) {
- do_404();
- return;
- }
- if (req[0] == '/') ++req;
- syslog(9, "handle_redir() called; redirect this: %s", req);
- for (i=0; i<num_redir; ++i) {
- if (!strncmp(redir[i].urlpart, req, strlen(redir[i].urlpart))) {
- char go_here[1024];
- snprintf(go_here, sizeof go_here, redir[i].redirect_to, req);
- syslog(9, "redirecting to: %s", go_here);
- http_redirect(go_here);
- return;
- }
- }
- }
- do_404();
-}
-
-
-
-/*
- * load redirect strings (for supporting transition of legacy web servers to citadel on the same host)
- */
-void load_redirs(char *filename) {
- char buf[1024];
- int num_redir_alloc = num_redir;
- FILE *fp = fopen(filename, "r");
- if (!fp) {
- syslog(1, "Cannot open %s: %s", filename, strerror(errno));
- return;
- }
-
- while (fgets(buf, sizeof buf, fp) != NULL) {
- char *ch;
-
- buf[strlen(buf)-1] = 0;
-
- ch = strchr(buf, '#');
- if (ch) strcpy(ch, "");
- striplt(buf);
- if (!IsEmptyStr(buf)) {
-
- if (num_redir >= num_redir_alloc) {
- if (num_redir_alloc == 0) {
- num_redir_alloc = 10;
- }
- else {
- num_redir_alloc = num_redir_alloc * 2;
- }
- redir = realloc(redir, sizeof(struct redirector) * num_redir_alloc );
- }
-
- extract_token(redir[num_redir].urlpart, buf, 0, '|', sizeof(redir[num_redir].urlpart));
- extract_token(redir[num_redir].redirect_to, buf, 1, '|', sizeof(redir[num_redir].redirect_to));
- WebcitAddUrlHandler(redir[num_redir].urlpart, strlen(redir[num_redir].urlpart), "", 0, handle_redir, ANONYMOUS|COOKIEUNNEEDED|ISSTATIC);
- if (!strcasecmp(redir[num_redir].urlpart, "home")) {
- default_landing_page = redir[num_redir].redirect_to ;
- }
- ++num_redir;
- }
-
- }
- fclose(fp);
-}
-
-
-
/*
* Here's where it all begins.
*/
pthread_t SessThread; /* Thread descriptor */
pthread_attr_t attr; /* Thread attributes */
int a; /* General-purpose variable */
- char tracefile[PATH_MAX];
char ip_addr[256]="*";
int relh=0;
int home=0;
- int home_specified=0;
char relhome[PATH_MAX]="";
char webcitdir[PATH_MAX] = DATADIR;
char *pidfile = NULL;
const char *basedir = NULL;
char uds_listen_path[PATH_MAX]; /* listen on a unix domain socket? */
const char *I18nDumpFile = NULL;
- FILE *rvfp = NULL;
- int rv = 0;
WildFireInitBacktrace(argv[0], 2);
- start_modules ();
+ start_modules();
#ifdef DBG_PRINNT_HOOKS_AT_START
/* dbg_PrintHash(HandlerHash, nix, NULL);*/
/* Parse command line */
#ifdef HAVE_OPENSSL
- while ((a = getopt(argc, argv, "u:h:i:p:t:T:B:x:dD:G:r:cfsS:Z")) != EOF)
+ while ((a = getopt(argc, argv, "u:h:i:p:t:T:B:x:g:dD:G:cfsS:Z")) != EOF)
#else
- while ((a = getopt(argc, argv, "u:h:i:p:t:T:B:x:dD:G:r:cfZ")) != EOF)
+ while ((a = getopt(argc, argv, "u:h:i:p:t:T:B:x:g:dD:G:cfZ")) != EOF)
#endif
switch (a) {
case 'u':
UID = atol(optarg);
break;
- case 'r':
- load_redirs(optarg);
- break;
case 'h':
hdir = strdup(optarg);
relh=hdir[0]!='/';
safestrncpy(relhome, relhome, sizeof relhome);
}
/* free(hdir); TODO: SHOULD WE DO THIS? */
- home_specified = 1;
home=1;
break;
case 'd':
pidfile = strdup(optarg);
running_as_daemon = 1;
break;
+ case 'g':
+ default_landing_page = strdup(optarg);
+ break;
case 'B': /* Basesize */
basesize = atoi(optarg);
if (basesize > 2)
}
break;
case 't':
- safestrncpy(tracefile, optarg, sizeof tracefile);
- rvfp = freopen(tracefile, "w", stdout);
- rvfp = freopen(tracefile, "w", stderr);
- rvfp = freopen(tracefile, "r", stdin);
+ /* no longer used, but ignored so old scripts don't break */
break;
case 'T':
LoadTemplates = atoi(optarg);
DisableGzip = 1;
break;
case 'x':
- verbosity = atoi(optarg);
+ /* no longer used, but ignored so old scripts don't break */
break;
case 'f':
follow_xff = 1;
default:
fprintf(stderr, "usage: webcit "
"[-i ip_addr] [-p http_port] "
- "[-t tracefile] [-c] [-f] "
+ "[-c] [-f] "
"[-T Templatedebuglevel] "
"[-d] [-Z] [-G i18ndumpfile] "
#ifdef HAVE_OPENSSL
FILE *fd;
StrBufAppendBufPlain(I18nDump, HKEY("}\n"), 0);
if (StrLength(I18nDump) < 50) {
- syslog(1, "********************************************************************************\n");
- syslog(1, "* No strings found in templates! Are you sure they're there? *\n");
- syslog(1, "********************************************************************************\n");
+ syslog(1, "*******************************************************************\n");
+ syslog(1, "* No strings found in templates! Are you sure they're there? *\n");
+ syslog(1, "*******************************************************************\n");
return -1;
}
fd = fopen(I18nDumpFile, "w");
if (fd == NULL) {
- syslog(1, "********************************************************************************\n");
- syslog(1, "* unable to open I18N dumpfile [%s] *\n", I18nDumpFile);
- syslog(1, "********************************************************************************\n");
+ syslog(1, "***********************************************\n");
+ syslog(1, "* unable to open I18N dumpfile [%s] *\n", I18nDumpFile);
+ syslog(1, "***********************************************\n");
return -1;
}
- rv = fwrite(ChrPtr(I18nDump), 1, StrLength(I18nDump), fd);
+ fwrite(ChrPtr(I18nDump), 1, StrLength(I18nDump), fd);
fclose(fd);
return 0;
}
-
/* Tell libical to return an error instead of aborting if it sees badly formed iCalendar data. */
icalerror_errors_are_fatal = 0;
* wcsession struct to which the thread is currently bound.
*/
if (pthread_key_create(&MyConKey, NULL) != 0) {
- syslog(1, "Can't create TSD key: %s\n", strerror(errno));
+ syslog(1, "Can't create TSD key: %s", strerror(errno));
}
- InitialiseSemaphores ();
+ InitialiseSemaphores();
/*
* Set up a place to put thread-specific SSL data.
*/
#ifdef HAVE_OPENSSL
if (pthread_key_create(&ThreadSSL, NULL) != 0) {
- syslog(1, "Can't create TSD key: %s\n", strerror(errno));
+ syslog(1, "Can't create TSD key: %s", strerror(errno));
}
#endif
*/
if (!IsEmptyStr(uds_listen_path)) {
- syslog(2, "Attempting to create listener socket at %s...\n", uds_listen_path);
+ syslog(2, "Attempting to create listener socket at %s...", uds_listen_path);
msock = webcit_uds_server(uds_listen_path, LISTEN_QUEUE_LENGTH);
}
else {
- syslog(2, "Attempting to bind to port %d...\n", http_port);
+ syslog(2, "Attempting to bind to port %d...", http_port);
msock = webcit_tcp_server(ip_addr, http_port, LISTEN_QUEUE_LENGTH);
}
if (msock < 0)
return -msock;
}
- syslog(2, "Listening on socket %d\n", msock);
+ syslog(2, "Listening on socket %d", msock);
signal(SIGPIPE, SIG_IGN);
pthread_mutex_init(&SessionListMutex, NULL);
*/
pthread_attr_init(&attr);
pthread_attr_setdetachstate(&attr, PTHREAD_CREATE_DETACHED);
- pthread_create(&SessThread, &attr,
- (void *(*)(void *)) housekeeping_loop, NULL);
-
+ pthread_create(&SessThread, &attr, (void *(*)(void *)) housekeeping_loop, NULL);
/*
* If this is an HTTPS server, fire up SSL
/* Become a worker thread. More worker threads will be spawned as they are needed. */
worker_entry();
- ShutDownLibCitadel ();
+ ShutDownLibCitadel();
return 0;
}