diff options
author | erdgeist <> | 2008-10-04 05:40:51 +0000 |
---|---|---|
committer | erdgeist <> | 2008-10-04 05:40:51 +0000 |
commit | e534db03c6877f8ac0559f63840e9a00e9bd43bf (patch) | |
tree | 811181b9b39d0484e28eb25cbb9f2eea094978e2 | |
parent | 8cbfc8602c73e55770f3c06d8ea42758b22a0401 (diff) |
added live sync code
added a config file parser
added tracker id
changed WANT_CLOSED_TRACKER and WANT_BLACKLIST into WANT_ACCESS_WHITE and WANT_ACCESS_BLACK
changed WANT_TRACKER_SYNC to WANT_SYNC_BATCH and added WANT_SYNC_LIVE
added an option to switch off fullscrapes
cleaned up many internal hardcoded values, like PROTO_FLAG,
-rw-r--r-- | opentracker.c | 179 | ||||
-rw-r--r-- | opentracker.xcodeproj/project.pbxproj | 6 | ||||
-rw-r--r-- | ot_accesslist.c | 18 | ||||
-rw-r--r-- | ot_accesslist.h | 16 | ||||
-rw-r--r-- | ot_clean.c | 4 | ||||
-rw-r--r-- | ot_fullscrape.c | 3 | ||||
-rw-r--r-- | ot_fullscrape.h | 9 | ||||
-rw-r--r-- | ot_http.c | 35 | ||||
-rw-r--r-- | ot_stats.c | 20 | ||||
-rw-r--r-- | ot_stats.h | 2 | ||||
-rw-r--r-- | ot_sync.c | 4 | ||||
-rw-r--r-- | ot_sync.h | 7 | ||||
-rw-r--r-- | ot_udp.c | 14 | ||||
-rw-r--r-- | scan_urlencoded_query.c | 4 | ||||
-rw-r--r-- | tests/testsuite2.sh | 14 | ||||
-rw-r--r-- | trackerlogic.c | 70 | ||||
-rw-r--r-- | trackerlogic.h | 25 |
17 files changed, 304 insertions, 126 deletions
diff --git a/opentracker.c b/opentracker.c index fda914a..b7431d4 100644 --- a/opentracker.c +++ b/opentracker.c | |||
@@ -8,12 +8,14 @@ | |||
8 | #include <string.h> | 8 | #include <string.h> |
9 | #include <sys/types.h> | 9 | #include <sys/types.h> |
10 | #include <sys/socket.h> | 10 | #include <sys/socket.h> |
11 | #include <arpa/inet.h> | ||
11 | #include <unistd.h> | 12 | #include <unistd.h> |
12 | #include <stdlib.h> | 13 | #include <stdlib.h> |
13 | #include <errno.h> | 14 | #include <errno.h> |
14 | #include <signal.h> | 15 | #include <signal.h> |
15 | #include <stdio.h> | 16 | #include <stdio.h> |
16 | #include <pwd.h> | 17 | #include <pwd.h> |
18 | #include <ctype.h> | ||
17 | #include <arpa/inet.h> | 19 | #include <arpa/inet.h> |
18 | 20 | ||
19 | /* Libowfat */ | 21 | /* Libowfat */ |
@@ -21,6 +23,7 @@ | |||
21 | #include "io.h" | 23 | #include "io.h" |
22 | #include "iob.h" | 24 | #include "iob.h" |
23 | #include "array.h" | 25 | #include "array.h" |
26 | #include "byte.h" | ||
24 | #include "fmt.h" | 27 | #include "fmt.h" |
25 | #include "scan.h" | 28 | #include "scan.h" |
26 | #include "ip4.h" | 29 | #include "ip4.h" |
@@ -34,17 +37,18 @@ | |||
34 | #include "ot_clean.h" | 37 | #include "ot_clean.h" |
35 | #include "ot_accesslist.h" | 38 | #include "ot_accesslist.h" |
36 | #include "ot_stats.h" | 39 | #include "ot_stats.h" |
40 | #include "ot_livesync.h" | ||
37 | 41 | ||
38 | /* Globals */ | 42 | /* Globals */ |
39 | time_t g_now; | 43 | time_t g_now; |
40 | char * g_redirecturl = NULL; | 44 | char * g_redirecturl = NULL; |
45 | uint32_t g_tracker_id; | ||
46 | |||
47 | static char * g_serverdir = NULL; | ||
41 | 48 | ||
42 | /* To always have space for error messages ;) */ | 49 | /* To always have space for error messages ;) */ |
43 | static char static_inbuf[8192]; | 50 | static char static_inbuf[8192]; |
44 | 51 | ||
45 | static char *FLAG_TCP = "T"; | ||
46 | static char *FLAG_UDP = "U"; | ||
47 | |||
48 | static void panic( const char *routine ) { | 52 | static void panic( const char *routine ) { |
49 | fprintf( stderr, "%s: %s\n", routine, strerror(errno) ); | 53 | fprintf( stderr, "%s: %s\n", routine, strerror(errno) ); |
50 | exit( 111 ); | 54 | exit( 111 ); |
@@ -63,10 +67,10 @@ static void signal_handler( int s ) { | |||
63 | } | 67 | } |
64 | 68 | ||
65 | static void usage( char *name ) { | 69 | static void usage( char *name ) { |
66 | fprintf( stderr, "Usage: %s [-i ip] [-p port] [-P port] [-r redirect] [-d dir] [-A ip]" | 70 | fprintf( stderr, "Usage: %s [-i ip] [-p port] [-P port] [-r redirect] [-d dir] [-A ip] [-f config] [-s livesyncport]" |
67 | #ifdef WANT_BLACKLISTING | 71 | #ifdef WANT_ACCESSLIST_BLACK |
68 | " [-b blacklistfile]" | 72 | " [-b blacklistfile]" |
69 | #elif defined ( WANT_CLOSED_TRACKER ) | 73 | #elif defined ( WANT_ACCESSLIST_WHITE ) |
70 | " [-w whitelistfile]" | 74 | " [-w whitelistfile]" |
71 | #endif | 75 | #endif |
72 | "\n", name ); | 76 | "\n", name ); |
@@ -82,9 +86,9 @@ static void help( char *name ) { | |||
82 | HELPLINE("-r redirecturl","specify url where / should be redirected to (default none)"); | 86 | HELPLINE("-r redirecturl","specify url where / should be redirected to (default none)"); |
83 | HELPLINE("-d dir","specify directory to try to chroot to (default: \".\")"); | 87 | HELPLINE("-d dir","specify directory to try to chroot to (default: \".\")"); |
84 | HELPLINE("-A ip","bless an ip address as admin address (e.g. to allow syncs from this address)"); | 88 | HELPLINE("-A ip","bless an ip address as admin address (e.g. to allow syncs from this address)"); |
85 | #ifdef WANT_BLACKLISTING | 89 | #ifdef WANT_ACCESSLIST_BLACK |
86 | HELPLINE("-b file","specify blacklist file."); | 90 | HELPLINE("-b file","specify blacklist file."); |
87 | #elif defined( WANT_CLOSED_TRACKER ) | 91 | #elif defined( WANT_ACCESSLIST_WHITE ) |
88 | HELPLINE("-w file","specify whitelist file."); | 92 | HELPLINE("-w file","specify whitelist file."); |
89 | #endif | 93 | #endif |
90 | 94 | ||
@@ -168,7 +172,7 @@ static void handle_accept( const int64 serversocket ) { | |||
168 | memset( h, 0, sizeof( struct http_data ) ); | 172 | memset( h, 0, sizeof( struct http_data ) ); |
169 | memmove( h->ip, ip, sizeof( ip ) ); | 173 | memmove( h->ip, ip, sizeof( ip ) ); |
170 | 174 | ||
171 | stats_issue_event( EVENT_ACCEPT, 1, ntohl(*(uint32_t*)ip)); | 175 | stats_issue_event( EVENT_ACCEPT, FLAG_TCP, ntohl(*(uint32_t*)ip)); |
172 | 176 | ||
173 | /* That breaks taia encapsulation. But there is no way to take system | 177 | /* That breaks taia encapsulation. But there is no way to take system |
174 | time this often in FreeBSD and libowfat does not allow to set unix time */ | 178 | time this often in FreeBSD and libowfat does not allow to set unix time */ |
@@ -194,10 +198,12 @@ static void server_mainloop( ) { | |||
194 | 198 | ||
195 | while( ( i = io_canread( ) ) != -1 ) { | 199 | while( ( i = io_canread( ) ) != -1 ) { |
196 | const void *cookie = io_getcookie( i ); | 200 | const void *cookie = io_getcookie( i ); |
197 | if( cookie == FLAG_TCP ) | 201 | if( (int)cookie == FLAG_TCP ) |
198 | handle_accept( i ); | 202 | handle_accept( i ); |
199 | else if( cookie == FLAG_UDP ) | 203 | else if( (int)cookie == FLAG_UDP ) |
200 | handle_udp4( i ); | 204 | handle_udp4( i ); |
205 | else if( (int)cookie == FLAG_MCA ) | ||
206 | handle_livesync(i); | ||
201 | else | 207 | else |
202 | handle_read( i ); | 208 | handle_read( i ); |
203 | } | 209 | } |
@@ -214,6 +220,8 @@ static void server_mainloop( ) { | |||
214 | next_timeout_check = g_now + OT_CLIENT_TIMEOUT_CHECKINTERVAL; | 220 | next_timeout_check = g_now + OT_CLIENT_TIMEOUT_CHECKINTERVAL; |
215 | } | 221 | } |
216 | 222 | ||
223 | livesync_ticker(); | ||
224 | |||
217 | /* See if we need to move our pools */ | 225 | /* See if we need to move our pools */ |
218 | if( NOW != ot_last_clean_time ) { | 226 | if( NOW != ot_last_clean_time ) { |
219 | ot_last_clean_time = NOW; | 227 | ot_last_clean_time = NOW; |
@@ -225,55 +233,148 @@ static void server_mainloop( ) { | |||
225 | } | 233 | } |
226 | } | 234 | } |
227 | 235 | ||
228 | static void ot_try_bind( char ip[4], uint16 port, int is_tcp ) { | 236 | int64_t ot_try_bind( char ip[4], uint16_t port, PROTO_FLAG proto ) { |
229 | int64 s = is_tcp ? socket_tcp4( ) : socket_udp4(); | 237 | int64 s = proto == FLAG_TCP ? socket_tcp4( ) : socket_udp4(); |
230 | 238 | ||
231 | if( socket_bind4_reuse( s, ip, port ) == -1 ) | 239 | if( socket_bind4_reuse( s, ip, port ) == -1 ) |
232 | panic( "socket_bind4_reuse" ); | 240 | panic( "socket_bind4_reuse" ); |
233 | 241 | ||
234 | if( is_tcp && ( socket_listen( s, SOMAXCONN) == -1 ) ) | 242 | if( ( proto == FLAG_TCP ) && ( socket_listen( s, SOMAXCONN) == -1 ) ) |
235 | panic( "socket_listen" ); | 243 | panic( "socket_listen" ); |
236 | 244 | ||
237 | if( !io_fd( s ) ) | 245 | if( !io_fd( s ) ) |
238 | panic( "io_fd" ); | 246 | panic( "io_fd" ); |
239 | 247 | ||
240 | io_setcookie( s, is_tcp ? FLAG_TCP : FLAG_UDP ); | 248 | io_setcookie( s, (void*)proto ); |
241 | 249 | ||
242 | io_wantread( s ); | 250 | io_wantread( s ); |
251 | |||
252 | return s; | ||
253 | } | ||
254 | |||
255 | char * set_config_option( char **option, char *value ) { | ||
256 | while( isspace(*value) ) ++value; | ||
257 | if( *option ) free( *option ); | ||
258 | return *option = strdup( value ); | ||
259 | } | ||
260 | |||
261 | /* WARNING! Does not behave like scan_ip4 regarding return values */ | ||
262 | static int scan_ip4_port( const char *src, char *ip, uint16 *port ) { | ||
263 | int off; | ||
264 | while( isspace(*src) ) ++src; | ||
265 | if( !(off = scan_ip4( src, ip ) ) ) | ||
266 | return -1; | ||
267 | src += off; | ||
268 | if( *src == 0 ) return 0; | ||
269 | if( *src != ':' ) | ||
270 | return -1; | ||
271 | *port = atol(src+1); | ||
272 | return 0; | ||
273 | } | ||
274 | |||
275 | int parse_configfile( char * config_filename ) { | ||
276 | FILE * accesslist_filehandle; | ||
277 | char inbuf[512], tmpip[4]; | ||
278 | int bound = 0; | ||
279 | |||
280 | accesslist_filehandle = fopen( config_filename, "r" ); | ||
281 | |||
282 | if( accesslist_filehandle == NULL ) { | ||
283 | fprintf( stderr, "Warning: Can't open config file: %s.", config_filename ); | ||
284 | return 0; | ||
285 | } | ||
286 | |||
287 | while( fgets( inbuf, sizeof(inbuf), accesslist_filehandle ) ) { | ||
288 | char *newl; | ||
289 | char *p = inbuf; | ||
290 | |||
291 | /* Skip white spaces */ | ||
292 | while(isspace(*p)) ++p; | ||
293 | |||
294 | /* Ignore comments and empty lines */ | ||
295 | if((*p=='#')||(*p=='\n')||(*p==0)) continue; | ||
296 | |||
297 | /* chomp */ | ||
298 | if(( newl = strchr(p, '\n' ))) *newl = 0; | ||
299 | |||
300 | /* Scan for commands */ | ||
301 | if(!byte_diff(p,15,"tracker.rootdir" ) && isspace(p[15])) { | ||
302 | set_config_option( &g_serverdir, p+16 ); | ||
303 | } else if(!byte_diff(p,10,"listen.tcp" ) && isspace(p[10])) { | ||
304 | uint16_t tmpport = 6969; | ||
305 | if( scan_ip4_port( p+11, tmpip, &tmpport )) goto parse_error; | ||
306 | ot_try_bind( tmpip, tmpport, FLAG_TCP ); | ||
307 | ++bound; | ||
308 | } else if(!byte_diff(p, 10, "listen.udp" ) && isspace(p[10])) { | ||
309 | uint16_t tmpport = 6969; | ||
310 | if( scan_ip4_port( p+11, tmpip, &tmpport )) goto parse_error; | ||
311 | ot_try_bind( tmpip, tmpport, FLAG_UDP ); | ||
312 | ++bound; | ||
313 | #ifdef WANT_ACCESSLIST_BLACK | ||
314 | } else if(!byte_diff(p, 16, "access.whitelist" ) && isspace(p[16])) { | ||
315 | set_config_option( &g_accesslist_filename, p+17 ); | ||
316 | #elif defined( WANT_ACCESSLIST_WHITE ) | ||
317 | } else if(!byte_diff(p, 16, "access.blacklist" ) && isspace(p[16])) { | ||
318 | set_config_option( &g_accesslist_filename, p+17 ); | ||
319 | #endif | ||
320 | } else if(!byte_diff(p, 20, "tracker.redirect_url" ) && isspace(p[20])) { | ||
321 | set_config_option( &g_redirecturl, p+21 ); | ||
322 | #ifdef WANT_SYNC_BATCH | ||
323 | } else if(!byte_diff(p, 26, "batchsync.cluster.admin_ip" ) && isspace(p[26])) { | ||
324 | if(!scan_ip4( p+27, tmpip )) goto parse_error; | ||
325 | accesslist_blessip( tmpip, OT_PERMISSION_MAY_SYNC ); | ||
326 | #endif | ||
327 | #ifdef WANT_SYNC_LIVE | ||
328 | } else if(!byte_diff(p, 24, "livesync.cluster.node_ip" ) && isspace(p[24])) { | ||
329 | if( !scan_ip4( p+25, tmpip )) goto parse_error; | ||
330 | accesslist_blessip( tmpip, OT_PERMISSION_MAY_LIVESYNC ); | ||
331 | } else if(!byte_diff(p, 23, "livesync.cluster.listen" ) && isspace(p[23])) { | ||
332 | uint16_t tmpport = LIVESYNC_PORT; | ||
333 | if( scan_ip4_port( p+24, tmpip, &tmpport )) goto parse_error; | ||
334 | livesync_bind_mcast( tmpip, tmpport ); | ||
335 | #endif | ||
336 | } else | ||
337 | fprintf( stderr, "Unhandled line in config file: %s\n", inbuf ); | ||
338 | continue; | ||
339 | parse_error: | ||
340 | fprintf( stderr, "Parse error in config file: %s\n", inbuf); | ||
341 | } | ||
342 | fclose( accesslist_filehandle ); | ||
343 | return bound; | ||
243 | } | 344 | } |
244 | 345 | ||
245 | int main( int argc, char **argv ) { | 346 | int main( int argc, char **argv ) { |
246 | struct passwd *pws = NULL; | 347 | struct passwd *pws = NULL; |
247 | char serverip[4] = {0,0,0,0}, tmpip[4]; | 348 | char serverip[4] = {0,0,0,0}, tmpip[4]; |
248 | char *serverdir = "."; | ||
249 | int bound = 0, scanon = 1; | 349 | int bound = 0, scanon = 1; |
250 | #ifdef WANT_ACCESS_CONTROL | 350 | |
251 | char *accesslist_filename = NULL; | 351 | while( scanon ) { |
252 | #endif | 352 | switch( getopt( argc, argv, ":i:p:A:P:d:r:s:f:v" |
253 | 353 | #ifdef WANT_ACCESSLIST_BLACK | |
254 | while( scanon ) { | ||
255 | switch( getopt( argc, argv, ":i:p:A:P:d:r:v" | ||
256 | #ifdef WANT_BLACKLISTING | ||
257 | "b:" | 354 | "b:" |
258 | #elif defined( WANT_CLOSED_TRACKER ) | 355 | #elif defined( WANT_ACCESSLIST_WHITE ) |
259 | "w:" | 356 | "w:" |
260 | #endif | 357 | #endif |
261 | "h" ) ) { | 358 | "h" ) ) { |
262 | case -1 : scanon = 0; break; | 359 | case -1 : scanon = 0; break; |
263 | case 'i': scan_ip4( optarg, serverip ); break; | 360 | case 'i': scan_ip4( optarg, serverip ); break; |
264 | #ifdef WANT_BLACKLISTING | 361 | #ifdef WANT_ACCESSLIST_BLACK |
265 | case 'b': accesslist_filename = optarg; break; | 362 | case 'b': set_config_option( &g_accesslist_filename, optarg); break; |
266 | #elif defined( WANT_CLOSED_TRACKER ) | 363 | #elif defined( WANT_ACCESSLIST_WHITE ) |
267 | case 'w': accesslist_filename = optarg; break; | 364 | case 'w': set_config_option( &g_accesslist_filename, optarg); break; |
268 | #endif | 365 | #endif |
269 | case 'p': ot_try_bind( serverip, (uint16)atol( optarg ), 1 ); bound++; break; | 366 | case 'p': ot_try_bind( serverip, (uint16)atol( optarg ), FLAG_TCP ); bound++; break; |
270 | case 'P': ot_try_bind( serverip, (uint16)atol( optarg ), 0 ); bound++; break; | 367 | case 'P': ot_try_bind( serverip, (uint16)atol( optarg ), FLAG_UDP ); bound++; break; |
271 | case 'd': serverdir = optarg; break; | 368 | #ifdef WANT_SYNC_LIVE |
272 | case 'r': g_redirecturl = optarg; break; | 369 | case 's': livesync_bind_mcast( serverip, (uint16)atol( optarg )); break; |
370 | #endif | ||
371 | case 'd': set_config_option( &g_serverdir, optarg ); break; | ||
372 | case 'r': set_config_option( &g_redirecturl, optarg ); break; | ||
273 | case 'A': | 373 | case 'A': |
274 | scan_ip4( optarg, tmpip ); | 374 | scan_ip4( optarg, tmpip ); |
275 | accesslist_blessip( tmpip, 0xffff ); /* Allow everything for now */ | 375 | accesslist_blessip( tmpip, 0xffff ); /* Allow everything for now */ |
276 | break; | 376 | break; |
377 | case 'f': bound += parse_configfile( optarg ); break; | ||
277 | case 'h': help( argv[0] ); exit( 0 ); | 378 | case 'h': help( argv[0] ); exit( 0 ); |
278 | case 'v': write( 2, static_inbuf, stats_return_tracker_version( static_inbuf )); exit( 0 ); | 379 | case 'v': write( 2, static_inbuf, stats_return_tracker_version( static_inbuf )); exit( 0 ); |
279 | default: | 380 | default: |
@@ -283,8 +384,8 @@ int main( int argc, char **argv ) { | |||
283 | 384 | ||
284 | /* Bind to our default tcp/udp ports */ | 385 | /* Bind to our default tcp/udp ports */ |
285 | if( !bound) { | 386 | if( !bound) { |
286 | ot_try_bind( serverip, 6969, 1 ); | 387 | ot_try_bind( serverip, 6969, FLAG_TCP ); |
287 | ot_try_bind( serverip, 6969, 0 ); | 388 | ot_try_bind( serverip, 6969, FLAG_UDP ); |
288 | } | 389 | } |
289 | 390 | ||
290 | /* Drop permissions */ | 391 | /* Drop permissions */ |
@@ -298,15 +399,13 @@ int main( int argc, char **argv ) { | |||
298 | } | 399 | } |
299 | endpwent(); | 400 | endpwent(); |
300 | 401 | ||
301 | accesslist_init( accesslist_filename ); | ||
302 | |||
303 | signal( SIGPIPE, SIG_IGN ); | 402 | signal( SIGPIPE, SIG_IGN ); |
304 | signal( SIGINT, signal_handler ); | 403 | signal( SIGINT, signal_handler ); |
305 | signal( SIGALRM, signal_handler ); | 404 | signal( SIGALRM, signal_handler ); |
306 | 405 | ||
307 | g_now = time( NULL ); | 406 | g_now = time( NULL ); |
308 | 407 | ||
309 | if( trackerlogic_init( serverdir ) == -1 ) | 408 | if( trackerlogic_init( g_serverdir ? g_serverdir : "." ) == -1 ) |
310 | panic( "Logic not started" ); | 409 | panic( "Logic not started" ); |
311 | 410 | ||
312 | alarm(5); | 411 | alarm(5); |
diff --git a/opentracker.xcodeproj/project.pbxproj b/opentracker.xcodeproj/project.pbxproj index 7068fa5..895f63f 100644 --- a/opentracker.xcodeproj/project.pbxproj +++ b/opentracker.xcodeproj/project.pbxproj | |||
@@ -21,6 +21,7 @@ | |||
21 | 65542EE80CE0CA6B00469330 /* ot_udp.c in Sources */ = {isa = PBXBuildFile; fileRef = 65542EE70CE0CA6B00469330 /* ot_udp.c */; }; | 21 | 65542EE80CE0CA6B00469330 /* ot_udp.c in Sources */ = {isa = PBXBuildFile; fileRef = 65542EE70CE0CA6B00469330 /* ot_udp.c */; }; |
22 | 65542F920CE17CA900469330 /* ot_fullscrape.c in Sources */ = {isa = PBXBuildFile; fileRef = 65542F910CE17CA900469330 /* ot_fullscrape.c */; }; | 22 | 65542F920CE17CA900469330 /* ot_fullscrape.c in Sources */ = {isa = PBXBuildFile; fileRef = 65542F910CE17CA900469330 /* ot_fullscrape.c */; }; |
23 | 65B8DF3C0D0310D20017149E /* ot_http.c in Sources */ = {isa = PBXBuildFile; fileRef = 65B8DF3B0D0310D20017149E /* ot_http.c */; }; | 23 | 65B8DF3C0D0310D20017149E /* ot_http.c in Sources */ = {isa = PBXBuildFile; fileRef = 65B8DF3B0D0310D20017149E /* ot_http.c */; }; |
24 | 65FA33990E7EF09200F7D5A5 /* ot_livesync.c in Sources */ = {isa = PBXBuildFile; fileRef = 65FA33980E7EF09200F7D5A5 /* ot_livesync.c */; }; | ||
24 | 8DD76FB00486AB0100D96B5E /* opentracker.1 in CopyFiles */ = {isa = PBXBuildFile; fileRef = C6A0FF2C0290799A04C91782 /* opentracker.1 */; }; | 25 | 8DD76FB00486AB0100D96B5E /* opentracker.1 in CopyFiles */ = {isa = PBXBuildFile; fileRef = C6A0FF2C0290799A04C91782 /* opentracker.1 */; }; |
25 | /* End PBXBuildFile section */ | 26 | /* End PBXBuildFile section */ |
26 | 27 | ||
@@ -66,6 +67,8 @@ | |||
66 | 65542F910CE17CA900469330 /* ot_fullscrape.c */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.c; path = ot_fullscrape.c; sourceTree = "<group>"; }; | 67 | 65542F910CE17CA900469330 /* ot_fullscrape.c */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.c; path = ot_fullscrape.c; sourceTree = "<group>"; }; |
67 | 65B8DF3A0D0310D20017149E /* ot_http.h */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.h; path = ot_http.h; sourceTree = "<group>"; }; | 68 | 65B8DF3A0D0310D20017149E /* ot_http.h */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.h; path = ot_http.h; sourceTree = "<group>"; }; |
68 | 65B8DF3B0D0310D20017149E /* ot_http.c */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.c; path = ot_http.c; sourceTree = "<group>"; }; | 69 | 65B8DF3B0D0310D20017149E /* ot_http.c */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.c; path = ot_http.c; sourceTree = "<group>"; }; |
70 | 65FA33970E7EF09200F7D5A5 /* ot_livesync.h */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.h; path = ot_livesync.h; sourceTree = "<group>"; }; | ||
71 | 65FA33980E7EF09200F7D5A5 /* ot_livesync.c */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.c; path = ot_livesync.c; sourceTree = "<group>"; }; | ||
69 | C6A0FF2C0290799A04C91782 /* opentracker.1 */ = {isa = PBXFileReference; lastKnownFileType = text.man; path = opentracker.1; sourceTree = "<group>"; }; | 72 | C6A0FF2C0290799A04C91782 /* opentracker.1 */ = {isa = PBXFileReference; lastKnownFileType = text.man; path = opentracker.1; sourceTree = "<group>"; }; |
70 | /* End PBXFileReference section */ | 73 | /* End PBXFileReference section */ |
71 | 74 | ||
@@ -107,6 +110,7 @@ | |||
107 | 65542E740CE08B9100469330 /* ot_clean.c */, | 110 | 65542E740CE08B9100469330 /* ot_clean.c */, |
108 | 65542F910CE17CA900469330 /* ot_fullscrape.c */, | 111 | 65542F910CE17CA900469330 /* ot_fullscrape.c */, |
109 | 65B8DF3B0D0310D20017149E /* ot_http.c */, | 112 | 65B8DF3B0D0310D20017149E /* ot_http.c */, |
113 | 65FA33980E7EF09200F7D5A5 /* ot_livesync.c */, | ||
110 | 653A56B40CE28EC5000CF140 /* ot_iovec.c */, | 114 | 653A56B40CE28EC5000CF140 /* ot_iovec.c */, |
111 | 65542D8F0CE07CED00469330 /* ot_mutex.c */, | 115 | 65542D8F0CE07CED00469330 /* ot_mutex.c */, |
112 | 65542D910CE07CED00469330 /* ot_stats.c */, | 116 | 65542D910CE07CED00469330 /* ot_stats.c */, |
@@ -132,6 +136,7 @@ | |||
132 | 65542D810CE0786F00469330 /* Headers */ = { | 136 | 65542D810CE0786F00469330 /* Headers */ = { |
133 | isa = PBXGroup; | 137 | isa = PBXGroup; |
134 | children = ( | 138 | children = ( |
139 | 65FA33970E7EF09200F7D5A5 /* ot_livesync.h */, | ||
135 | 653A320A0CE7F475007F0D03 /* ot_accesslist.h */, | 140 | 653A320A0CE7F475007F0D03 /* ot_accesslist.h */, |
136 | 65542E730CE08B9100469330 /* ot_clean.h */, | 141 | 65542E730CE08B9100469330 /* ot_clean.h */, |
137 | 65542F900CE17CA900469330 /* ot_fullscrape.h */, | 142 | 65542F900CE17CA900469330 /* ot_fullscrape.h */, |
@@ -248,6 +253,7 @@ | |||
248 | 653A56B50CE28EC5000CF140 /* ot_iovec.c in Sources */, | 253 | 653A56B50CE28EC5000CF140 /* ot_iovec.c in Sources */, |
249 | 653A320C0CE7F475007F0D03 /* ot_accesslist.c in Sources */, | 254 | 653A320C0CE7F475007F0D03 /* ot_accesslist.c in Sources */, |
250 | 65B8DF3C0D0310D20017149E /* ot_http.c in Sources */, | 255 | 65B8DF3C0D0310D20017149E /* ot_http.c in Sources */, |
256 | 65FA33990E7EF09200F7D5A5 /* ot_livesync.c in Sources */, | ||
251 | ); | 257 | ); |
252 | runOnlyForDeploymentPostprocessing = 0; | 258 | runOnlyForDeploymentPostprocessing = 0; |
253 | }; | 259 | }; |
diff --git a/ot_accesslist.c b/ot_accesslist.c index df3d64c..cebb064 100644 --- a/ot_accesslist.c +++ b/ot_accesslist.c | |||
@@ -18,8 +18,8 @@ | |||
18 | #include "ot_accesslist.h" | 18 | #include "ot_accesslist.h" |
19 | 19 | ||
20 | /* GLOBAL VARIABLES */ | 20 | /* GLOBAL VARIABLES */ |
21 | #ifdef WANT_ACCESS_CONTROL | 21 | #ifdef WANT_ACCESSLIST |
22 | static char *accesslist_filename = NULL; | 22 | char *g_accesslist_filename = NULL; |
23 | static ot_vector accesslist; | 23 | static ot_vector accesslist; |
24 | 24 | ||
25 | static void accesslist_reset( void ) { | 25 | static void accesslist_reset( void ) { |
@@ -46,13 +46,13 @@ static void accesslist_readfile( int foo ) { | |||
46 | char inbuf[512]; | 46 | char inbuf[512]; |
47 | foo = foo; | 47 | foo = foo; |
48 | 48 | ||
49 | accesslist_filehandle = fopen( accesslist_filename, "r" ); | 49 | accesslist_filehandle = fopen( g_accesslist_filename, "r" ); |
50 | 50 | ||
51 | /* Free accesslist vector in trackerlogic.c*/ | 51 | /* Free accesslist vector in trackerlogic.c*/ |
52 | accesslist_reset(); | 52 | accesslist_reset(); |
53 | 53 | ||
54 | if( accesslist_filehandle == NULL ) { | 54 | if( accesslist_filehandle == NULL ) { |
55 | fprintf( stderr, "Warning: Can't open accesslist file: %s (but will try to create it later, if necessary and possible).", accesslist_filename ); | 55 | fprintf( stderr, "Warning: Can't open accesslist file: %s (but will try to create it later, if necessary and possible).", g_accesslist_filename ); |
56 | return; | 56 | return; |
57 | } | 57 | } |
58 | 58 | ||
@@ -79,21 +79,20 @@ int accesslist_hashisvalid( ot_hash *hash ) { | |||
79 | int exactmatch; | 79 | int exactmatch; |
80 | binary_search( hash, accesslist.data, accesslist.size, OT_HASH_COMPARE_SIZE, OT_HASH_COMPARE_SIZE, &exactmatch ); | 80 | binary_search( hash, accesslist.data, accesslist.size, OT_HASH_COMPARE_SIZE, OT_HASH_COMPARE_SIZE, &exactmatch ); |
81 | 81 | ||
82 | #ifdef WANT_BLACKLISTING | 82 | #ifdef WANT_ACCESSLIST_BLACK |
83 | exactmatch = !exactmatch; | 83 | exactmatch = !exactmatch; |
84 | #endif | 84 | #endif |
85 | 85 | ||
86 | return exactmatch; | 86 | return exactmatch; |
87 | } | 87 | } |
88 | 88 | ||
89 | void accesslist_init( char *accesslist_filename_in ) { | 89 | void accesslist_init( ) { |
90 | byte_zero( &accesslist, sizeof( accesslist ) ); | 90 | byte_zero( &accesslist, sizeof( accesslist ) ); |
91 | 91 | ||
92 | /* Passing "0" since read_blacklist_file also is SIGHUP handler */ | 92 | /* Passing "0" since read_blacklist_file also is SIGHUP handler */ |
93 | if( accesslist_filename_in ) { | 93 | if( g_accesslist_filename ) { |
94 | accesslist_filename = accesslist_filename_in; | ||
95 | accesslist_readfile( 0 ); | 94 | accesslist_readfile( 0 ); |
96 | signal( SIGHUP, accesslist_readfile ); | 95 | signal( SIGHUP, accesslist_readfile ); |
97 | } | 96 | } |
98 | } | 97 | } |
99 | 98 | ||
@@ -108,6 +107,7 @@ int accesslist_blessip( char *ip, ot_permissions permissions ) { | |||
108 | return -1; | 107 | return -1; |
109 | memmove( g_adminip_addresses + g_adminip_count, ip, 4 ); | 108 | memmove( g_adminip_addresses + g_adminip_count, ip, 4 ); |
110 | g_adminip_permissions[ g_adminip_count++ ] = permissions; | 109 | g_adminip_permissions[ g_adminip_count++ ] = permissions; |
110 | // fprintf( stderr, "Blessing ip address %d.%d.%d.%d with %02x\n", (uint8_t)ip[0], (uint8_t)ip[1], (uint8_t)ip[2], (uint8_t)ip[3], permissions ); | ||
111 | return 0; | 111 | return 0; |
112 | } | 112 | } |
113 | 113 | ||
diff --git a/ot_accesslist.h b/ot_accesslist.h index 6adefd9..2783b3c 100644 --- a/ot_accesslist.h +++ b/ot_accesslist.h | |||
@@ -6,14 +6,17 @@ | |||
6 | #ifndef __OT_ACCESSLIST_H__ | 6 | #ifndef __OT_ACCESSLIST_H__ |
7 | #define __OT_ACCESSLIST_H__ | 7 | #define __OT_ACCESSLIST_H__ |
8 | 8 | ||
9 | #if defined ( WANT_BLACKLISTING ) && defined (WANT_CLOSED_TRACKER ) | 9 | #if defined ( WANT_ACCESSLIST_BLACK ) && defined (WANT_ACCESSLIST_WHITE ) |
10 | #error WANT_BLACKLISTING and WANT_CLOSED_TRACKER are exclusive. | 10 | #error WANT_ACCESSLIST_BLACK and WANT_ACCESSLIST_WHITE are exclusive. |
11 | #endif | 11 | #endif |
12 | 12 | ||
13 | #if defined ( WANT_BLACKLISTING ) || defined (WANT_CLOSED_TRACKER ) | 13 | #if defined ( WANT_ACCESSLIST_BLACK ) || defined (WANT_ACCESSLIST_WHITE ) |
14 | #define WANT_ACCESS_CONTROL | 14 | #define WANT_ACCESSLIST |
15 | void accesslist_init( char *accesslist_filename ); | 15 | void accesslist_init( ); |
16 | int accesslist_hashisvalid( ot_hash *hash ); | 16 | int accesslist_hashisvalid( ot_hash *hash ); |
17 | |||
18 | extern char *g_accesslist_filename; | ||
19 | |||
17 | #else | 20 | #else |
18 | #define accesslist_init( accesslist_filename ) | 21 | #define accesslist_init( accesslist_filename ) |
19 | #define accesslist_hashisvalid( hash ) 1 | 22 | #define accesslist_hashisvalid( hash ) 1 |
@@ -22,7 +25,8 @@ int accesslist_hashisvalid( ot_hash *hash ); | |||
22 | typedef enum { | 25 | typedef enum { |
23 | OT_PERMISSION_MAY_FULLSCRAPE, | 26 | OT_PERMISSION_MAY_FULLSCRAPE, |
24 | OT_PERMISSION_MAY_SYNC, | 27 | OT_PERMISSION_MAY_SYNC, |
25 | OT_PERMISSION_MAY_STAT | 28 | OT_PERMISSION_MAY_STAT, |
29 | OT_PERMISSION_MAY_LIVESYNC | ||
26 | } ot_permissions; | 30 | } ot_permissions; |
27 | 31 | ||
28 | int accesslist_blessip( char * ip, ot_permissions permissions ); | 32 | int accesslist_blessip( char * ip, ot_permissions permissions ); |
@@ -25,7 +25,7 @@ int clean_single_torrent( ot_torrent *torrent ) { | |||
25 | size_t peers_count = 0, seeds_count; | 25 | size_t peers_count = 0, seeds_count; |
26 | time_t timedout = (int)( NOW - peer_list->base ); | 26 | time_t timedout = (int)( NOW - peer_list->base ); |
27 | int i; | 27 | int i; |
28 | #ifdef WANT_TRACKER_SYNC | 28 | #ifdef WANT_SYNC_BATCH |
29 | char *new_peers; | 29 | char *new_peers; |
30 | #endif | 30 | #endif |
31 | 31 | ||
@@ -55,7 +55,7 @@ int clean_single_torrent( ot_torrent *torrent ) { | |||
55 | memmove( peer_list->seed_counts + timedout, peer_list->seed_counts, sizeof( size_t ) * ( OT_POOLS_COUNT - timedout ) ); | 55 | memmove( peer_list->seed_counts + timedout, peer_list->seed_counts, sizeof( size_t ) * ( OT_POOLS_COUNT - timedout ) ); |
56 | byte_zero( peer_list->seed_counts, sizeof( size_t ) * timedout ); | 56 | byte_zero( peer_list->seed_counts, sizeof( size_t ) * timedout ); |
57 | 57 | ||
58 | #ifdef WANT_TRACKER_SYNC | 58 | #ifdef WANT_SYNC_BATCH |
59 | /* Save the block modified within last OT_POOLS_TIMEOUT */ | 59 | /* Save the block modified within last OT_POOLS_TIMEOUT */ |
60 | if( peer_list->peers[1].size && | 60 | if( peer_list->peers[1].size && |
61 | ( new_peers = realloc( peer_list->changeset.data, sizeof( ot_peer ) * peer_list->peers[1].size ) ) ) | 61 | ( new_peers = realloc( peer_list->changeset.data, sizeof( ot_peer ) * peer_list->peers[1].size ) ) ) |
diff --git a/ot_fullscrape.c b/ot_fullscrape.c index 0aa7fb9..8175722 100644 --- a/ot_fullscrape.c +++ b/ot_fullscrape.c | |||
@@ -3,6 +3,8 @@ | |||
3 | 3 | ||
4 | $id$ */ | 4 | $id$ */ |
5 | 5 | ||
6 | #ifdef WANT_FULLSCRAPE | ||
7 | |||
6 | /* System */ | 8 | /* System */ |
7 | #include <sys/param.h> | 9 | #include <sys/param.h> |
8 | #include <sys/uio.h> | 10 | #include <sys/uio.h> |
@@ -226,5 +228,6 @@ static void fullscrape_make( int *iovec_entries, struct iovec **iovector, ot_tas | |||
226 | /* Release unused memory in current output buffer */ | 228 | /* Release unused memory in current output buffer */ |
227 | iovec_fixlast( iovec_entries, iovector, r ); | 229 | iovec_fixlast( iovec_entries, iovector, r ); |
228 | } | 230 | } |
231 | #endif | ||
229 | 232 | ||
230 | const char *g_version_fullscrape_c = "$Source$: $Revision$\n"; | 233 | const char *g_version_fullscrape_c = "$Source$: $Revision$\n"; |
diff --git a/ot_fullscrape.h b/ot_fullscrape.h index ccd39f4..4025be1 100644 --- a/ot_fullscrape.h +++ b/ot_fullscrape.h | |||
@@ -6,8 +6,17 @@ | |||
6 | #ifndef __OT_FULLSCRAPE_H__ | 6 | #ifndef __OT_FULLSCRAPE_H__ |
7 | #define __OT_FULLSCRAPE_H__ | 7 | #define __OT_FULLSCRAPE_H__ |
8 | 8 | ||
9 | #ifdef WANT_FULLSCRAPE | ||
10 | |||
9 | void fullscrape_init( ); | 11 | void fullscrape_init( ); |
10 | void fullscrape_deinit( ); | 12 | void fullscrape_deinit( ); |
11 | void fullscrape_deliver( int64 socket, ot_tasktype tasktype ); | 13 | void fullscrape_deliver( int64 socket, ot_tasktype tasktype ); |
12 | 14 | ||
15 | #else | ||
16 | |||
17 | #define fullscrape_init() | ||
18 | #define fullscrape_deinit() | ||
19 | |||
20 | #endif | ||
21 | |||
13 | #endif | 22 | #endif |
@@ -28,10 +28,6 @@ | |||
28 | #include "ot_accesslist.h" | 28 | #include "ot_accesslist.h" |
29 | #include "ot_sync.h" | 29 | #include "ot_sync.h" |
30 | 30 | ||
31 | #ifndef WANT_TRACKER_SYNC | ||
32 | #define add_peer_to_torrent(A,B,C) add_peer_to_torrent(A,B) | ||
33 | #endif | ||
34 | |||
35 | #define OT_MAXMULTISCRAPE_COUNT 64 | 31 | #define OT_MAXMULTISCRAPE_COUNT 64 |
36 | static ot_hash multiscrape_buf[OT_MAXMULTISCRAPE_COUNT]; | 32 | static ot_hash multiscrape_buf[OT_MAXMULTISCRAPE_COUNT]; |
37 | extern char *g_redirecturl; | 33 | extern char *g_redirecturl; |
@@ -103,7 +99,7 @@ ssize_t http_issue_error( const int64 client_socket, int code ) { | |||
103 | #ifdef _DEBUG_HTTPERROR | 99 | #ifdef _DEBUG_HTTPERROR |
104 | fprintf( stderr, "DEBUG: invalid request was: %s\n", debug_request ); | 100 | fprintf( stderr, "DEBUG: invalid request was: %s\n", debug_request ); |
105 | #endif | 101 | #endif |
106 | stats_issue_event( EVENT_FAILED, 1, code ); | 102 | stats_issue_event( EVENT_FAILED, FLAG_TCP, code ); |
107 | http_senddata( client_socket, static_outbuf, reply_size); | 103 | http_senddata( client_socket, static_outbuf, reply_size); |
108 | return -2; | 104 | return -2; |
109 | } | 105 | } |
@@ -169,7 +165,7 @@ ssize_t http_sendiovecdata( const int64 client_socket, int iovec_entries, struct | |||
169 | return 0; | 165 | return 0; |
170 | } | 166 | } |
171 | 167 | ||
172 | #ifdef WANT_TRACKER_SYNC | 168 | #ifdef WANT_SYNC_BATCH |
173 | static ssize_t http_handle_sync( const int64 client_socket, char *data ) { | 169 | static ssize_t http_handle_sync( const int64 client_socket, char *data ) { |
174 | struct http_data* h = io_getcookie( client_socket ); | 170 | struct http_data* h = io_getcookie( client_socket ); |
175 | size_t len; | 171 | size_t len; |
@@ -193,7 +189,7 @@ static ssize_t http_handle_sync( const int64 client_socket, char *data ) { | |||
193 | if( ( len = scan_urlencoded_query( &c, data = c, SCAN_SEARCHPATH_VALUE ) ) < 10 ) HTTPERROR_400_PARAM; | 189 | if( ( len = scan_urlencoded_query( &c, data = c, SCAN_SEARCHPATH_VALUE ) ) < 10 ) HTTPERROR_400_PARAM; |
194 | if( add_changeset_to_tracker( (uint8_t*)data, len ) ) HTTPERROR_400_PARAM; | 190 | if( add_changeset_to_tracker( (uint8_t*)data, len ) ) HTTPERROR_400_PARAM; |
195 | if( mode == SYNC_OUT ) { | 191 | if( mode == SYNC_OUT ) { |
196 | stats_issue_event( EVENT_SYNC_IN, 1, 0 ); | 192 | stats_issue_event( EVENT_SYNC_IN, FLAG_TCP, 0 ); |
197 | mode = SYNC_IN; | 193 | mode = SYNC_IN; |
198 | } | 194 | } |
199 | break; | 195 | break; |
@@ -203,7 +199,7 @@ static ssize_t http_handle_sync( const int64 client_socket, char *data ) { | |||
203 | if( mode == SYNC_OUT ) { | 199 | if( mode == SYNC_OUT ) { |
204 | /* Pass this task to the worker thread */ | 200 | /* Pass this task to the worker thread */ |
205 | h->flag |= STRUCT_HTTP_FLAG_WAITINGFORTASK; | 201 | h->flag |= STRUCT_HTTP_FLAG_WAITINGFORTASK; |
206 | stats_issue_event( EVENT_SYNC_OUT_REQUEST, 1, 0 ); | 202 | stats_issue_event( EVENT_SYNC_OUT_REQUEST, FLAG_TCP, 0 ); |
207 | sync_deliver( client_socket ); | 203 | sync_deliver( client_socket ); |
208 | io_dontwantread( client_socket ); | 204 | io_dontwantread( client_socket ); |
209 | return -2; | 205 | return -2; |
@@ -216,7 +212,6 @@ static ssize_t http_handle_sync( const int64 client_socket, char *data ) { | |||
216 | #endif | 212 | #endif |
217 | 213 | ||
218 | static ssize_t http_handle_stats( const int64 client_socket, char *data, char *d, size_t l ) { | 214 | static ssize_t http_handle_stats( const int64 client_socket, char *data, char *d, size_t l ) { |
219 | struct http_data* h = io_getcookie( client_socket ); | ||
220 | char *c = data; | 215 | char *c = data; |
221 | int mode = TASK_STATS_PEERS, scanon = 1, format = 0; | 216 | int mode = TASK_STATS_PEERS, scanon = 1, format = 0; |
222 | 217 | ||
@@ -284,7 +279,11 @@ static ssize_t http_handle_stats( const int64 client_socket, char *data, char *d | |||
284 | } | 279 | } |
285 | } | 280 | } |
286 | 281 | ||
282 | /* Touch variable */ | ||
283 | d=d; | ||
284 | #ifdef WANT_FULLSCRAPE | ||
287 | if( mode == TASK_STATS_TPB ) { | 285 | if( mode == TASK_STATS_TPB ) { |
286 | struct http_data* h = io_getcookie( client_socket ); | ||
288 | tai6464 t; | 287 | tai6464 t; |
289 | #ifdef WANT_COMPRESSION_GZIP | 288 | #ifdef WANT_COMPRESSION_GZIP |
290 | d[l-1] = 0; | 289 | d[l-1] = 0; |
@@ -292,9 +291,6 @@ static ssize_t http_handle_stats( const int64 client_socket, char *data, char *d | |||
292 | h->flag |= STRUCT_HTTP_FLAG_GZIP; | 291 | h->flag |= STRUCT_HTTP_FLAG_GZIP; |
293 | format |= TASK_FLAG_GZIP; | 292 | format |= TASK_FLAG_GZIP; |
294 | } | 293 | } |
295 | #else | ||
296 | /* Touch variable */ | ||
297 | d=d; | ||
298 | #endif | 294 | #endif |
299 | /* Pass this task to the worker thread */ | 295 | /* Pass this task to the worker thread */ |
300 | h->flag |= STRUCT_HTTP_FLAG_WAITINGFORTASK; | 296 | h->flag |= STRUCT_HTTP_FLAG_WAITINGFORTASK; |
@@ -305,12 +301,14 @@ static ssize_t http_handle_stats( const int64 client_socket, char *data, char *d | |||
305 | io_dontwantread( client_socket ); | 301 | io_dontwantread( client_socket ); |
306 | return -2; | 302 | return -2; |
307 | } | 303 | } |
304 | #endif | ||
308 | 305 | ||
309 | /* default format for now */ | 306 | /* default format for now */ |
310 | if( !( l = return_stats_for_tracker( static_outbuf + SUCCESS_HTTP_HEADER_LENGTH, mode, 0 ) ) ) HTTPERROR_500; | 307 | if( !( l = return_stats_for_tracker( static_outbuf + SUCCESS_HTTP_HEADER_LENGTH, mode, 0 ) ) ) HTTPERROR_500; |
311 | return l; | 308 | return l; |
312 | } | 309 | } |
313 | 310 | ||
311 | #ifdef WANT_FULLSCRAPE | ||
314 | static ssize_t http_handle_fullscrape( const int64 client_socket, char *d, size_t l ) { | 312 | static ssize_t http_handle_fullscrape( const int64 client_socket, char *d, size_t l ) { |
315 | struct http_data* h = io_getcookie( client_socket ); | 313 | struct http_data* h = io_getcookie( client_socket ); |
316 | int format = 0; | 314 | int format = 0; |
@@ -341,6 +339,7 @@ write( 2, debug_request, l ); | |||
341 | io_dontwantread( client_socket ); | 339 | io_dontwantread( client_socket ); |
342 | return -2; | 340 | return -2; |
343 | } | 341 | } |
342 | #endif | ||
344 | 343 | ||
345 | static ssize_t http_handle_scrape( const int64 client_socket, char *data ) { | 344 | static ssize_t http_handle_scrape( const int64 client_socket, char *data ) { |
346 | int scanon = 1, numwant = 0; | 345 | int scanon = 1, numwant = 0; |
@@ -387,7 +386,7 @@ UTORRENT1600_WORKAROUND: | |||
387 | 386 | ||
388 | /* Enough for http header + whole scrape string */ | 387 | /* Enough for http header + whole scrape string */ |
389 | if( !( l = return_tcp_scrape_for_torrent( multiscrape_buf, numwant, SUCCESS_HTTP_HEADER_LENGTH + static_outbuf ) ) ) HTTPERROR_500; | 388 | if( !( l = return_tcp_scrape_for_torrent( multiscrape_buf, numwant, SUCCESS_HTTP_HEADER_LENGTH + static_outbuf ) ) ) HTTPERROR_500; |
390 | stats_issue_event( EVENT_SCRAPE, 1, l ); | 389 | stats_issue_event( EVENT_SCRAPE, FLAG_TCP, l ); |
391 | return l; | 390 | return l; |
392 | } | 391 | } |
393 | 392 | ||
@@ -486,12 +485,12 @@ static ssize_t http_handle_announce( const int64 client_socket, char *data ) { | |||
486 | return sprintf( static_outbuf + SUCCESS_HTTP_HEADER_LENGTH, "d14:failure reason81:Your client forgot to send your torrent's info_hash. Please upgrade your client.e" ); | 485 | return sprintf( static_outbuf + SUCCESS_HTTP_HEADER_LENGTH, "d14:failure reason81:Your client forgot to send your torrent's info_hash. Please upgrade your client.e" ); |
487 | 486 | ||
488 | if( OT_FLAG( &peer ) & PEER_FLAG_STOPPED ) | 487 | if( OT_FLAG( &peer ) & PEER_FLAG_STOPPED ) |
489 | len = remove_peer_from_torrent( hash, &peer, SUCCESS_HTTP_HEADER_LENGTH + static_outbuf, 1 ); | 488 | len = remove_peer_from_torrent( hash, &peer, SUCCESS_HTTP_HEADER_LENGTH + static_outbuf, FLAG_TCP ); |
490 | else { | 489 | else { |
491 | torrent = add_peer_to_torrent( hash, &peer, 0 ); | 490 | torrent = add_peer_to_torrent( hash, &peer WANT_SYNC_PARAM( 0 ) ); |
492 | if( !torrent || !( len = return_peers_for_torrent( hash, numwant, SUCCESS_HTTP_HEADER_LENGTH + static_outbuf, 1 ) ) ) HTTPERROR_500; | 491 | if( !torrent || !( len = return_peers_for_torrent( hash, numwant, SUCCESS_HTTP_HEADER_LENGTH + static_outbuf, 1 ) ) ) HTTPERROR_500; |
493 | } | 492 | } |
494 | stats_issue_event( EVENT_ANNOUNCE, 1, len); | 493 | stats_issue_event( EVENT_ANNOUNCE, FLAG_TCP, len); |
495 | return len; | 494 | return len; |
496 | } | 495 | } |
497 | 496 | ||
@@ -529,14 +528,16 @@ ssize_t http_handle_request( const int64 client_socket, char *data, size_t recv_ | |||
529 | /* This is the hardcore match for announce*/ | 528 | /* This is the hardcore match for announce*/ |
530 | if( ( *data == 'a' ) || ( *data == '?' ) ) | 529 | if( ( *data == 'a' ) || ( *data == '?' ) ) |
531 | reply_size = http_handle_announce( client_socket, c ); | 530 | reply_size = http_handle_announce( client_socket, c ); |
531 | #ifdef WANT_FULLSCRAPE | ||
532 | else if( !byte_diff( data, 12, "scrape HTTP/" ) ) | 532 | else if( !byte_diff( data, 12, "scrape HTTP/" ) ) |
533 | reply_size = http_handle_fullscrape( client_socket, recv_header, recv_length ); | 533 | reply_size = http_handle_fullscrape( client_socket, recv_header, recv_length ); |
534 | #endif | ||
534 | /* This is the hardcore match for scrape */ | 535 | /* This is the hardcore match for scrape */ |
535 | else if( !byte_diff( data, 2, "sc" ) ) | 536 | else if( !byte_diff( data, 2, "sc" ) ) |
536 | reply_size = http_handle_scrape( client_socket, c ); | 537 | reply_size = http_handle_scrape( client_socket, c ); |
537 | /* All the rest is matched the standard way */ | 538 | /* All the rest is matched the standard way */ |
538 | else switch( len ) { | 539 | else switch( len ) { |
539 | #ifdef WANT_TRACKER_SYNC | 540 | #ifdef WANT_SYNC_BATCH |
540 | case 4: /* sync ? */ | 541 | case 4: /* sync ? */ |
541 | if( byte_diff( data, 4, "sync") ) HTTPERROR_404; | 542 | if( byte_diff( data, 4, "sync") ) HTTPERROR_404; |
542 | reply_size = http_handle_sync( client_socket, c ); | 543 | reply_size = http_handle_sync( client_socket, c ); |
@@ -443,13 +443,13 @@ static size_t stats_httperrors_txt ( char * reply ) { | |||
443 | extern const char | 443 | extern const char |
444 | *g_version_opentracker_c, *g_version_accesslist_c, *g_version_clean_c, *g_version_fullscrape_c, *g_version_http_c, | 444 | *g_version_opentracker_c, *g_version_accesslist_c, *g_version_clean_c, *g_version_fullscrape_c, *g_version_http_c, |
445 | *g_version_iovec_c, *g_version_mutex_c, *g_version_stats_c, *g_version_sync_c, *g_version_udp_c, *g_version_vector_c, | 445 | *g_version_iovec_c, *g_version_mutex_c, *g_version_stats_c, *g_version_sync_c, *g_version_udp_c, *g_version_vector_c, |
446 | *g_version_scan_urlencoded_query_c, *g_version_trackerlogic_c; | 446 | *g_version_scan_urlencoded_query_c, *g_version_trackerlogic_c, *g_version_livesync_c; |
447 | 447 | ||
448 | size_t stats_return_tracker_version( char *reply ) { | 448 | size_t stats_return_tracker_version( char *reply ) { |
449 | return sprintf( reply, "%s%s%s%s%s%s%s%s%s%s%s%s%s", | 449 | return sprintf( reply, "%s%s%s%s%s%s%s%s%s%s%s%s%s%s", |
450 | g_version_opentracker_c, g_version_accesslist_c, g_version_clean_c, g_version_fullscrape_c, g_version_http_c, | 450 | g_version_opentracker_c, g_version_accesslist_c, g_version_clean_c, g_version_fullscrape_c, g_version_http_c, |
451 | g_version_iovec_c, g_version_mutex_c, g_version_stats_c, g_version_sync_c, g_version_udp_c, g_version_vector_c, | 451 | g_version_iovec_c, g_version_mutex_c, g_version_stats_c, g_version_sync_c, g_version_udp_c, g_version_vector_c, |
452 | g_version_scan_urlencoded_query_c, g_version_trackerlogic_c ); | 452 | g_version_scan_urlencoded_query_c, g_version_trackerlogic_c, g_version_livesync_c ); |
453 | } | 453 | } |
454 | 454 | ||
455 | size_t return_stats_for_tracker( char *reply, int mode, int format ) { | 455 | size_t return_stats_for_tracker( char *reply, int mode, int format ) { |
@@ -490,36 +490,36 @@ size_t return_stats_for_tracker( char *reply, int mode, int format ) { | |||
490 | } | 490 | } |
491 | } | 491 | } |
492 | 492 | ||
493 | void stats_issue_event( ot_status_event event, int is_tcp, uint32_t event_data ) { | 493 | void stats_issue_event( ot_status_event event, PROTO_FLAG proto, uint32_t event_data ) { |
494 | switch( event ) { | 494 | switch( event ) { |
495 | case EVENT_ACCEPT: | 495 | case EVENT_ACCEPT: |
496 | if( is_tcp ) ot_overall_tcp_connections++; else ot_overall_udp_connections++; | 496 | if( proto == FLAG_TCP ) ot_overall_tcp_connections++; else ot_overall_udp_connections++; |
497 | #ifdef WANT_LOG_NETWORKS | 497 | #ifdef WANT_LOG_NETWORKS |
498 | stat_increase_network_count( &stats_network_counters_root, 0, event_data ); | 498 | stat_increase_network_count( &stats_network_counters_root, 0, event_data ); |
499 | #endif | 499 | #endif |
500 | break; | 500 | break; |
501 | case EVENT_ANNOUNCE: | 501 | case EVENT_ANNOUNCE: |
502 | if( is_tcp ) ot_overall_tcp_successfulannounces++; else ot_overall_udp_successfulannounces++; | 502 | if( proto == FLAG_TCP ) ot_overall_tcp_successfulannounces++; else ot_overall_udp_successfulannounces++; |
503 | break; | 503 | break; |
504 | case EVENT_CONNECT: | 504 | case EVENT_CONNECT: |
505 | if( is_tcp ) ot_overall_tcp_connects++; else ot_overall_udp_connects++; | 505 | if( proto == FLAG_TCP ) ot_overall_tcp_connects++; else ot_overall_udp_connects++; |
506 | break; | 506 | break; |
507 | case EVENT_SCRAPE: | 507 | case EVENT_SCRAPE: |
508 | if( is_tcp ) ot_overall_tcp_successfulscrapes++; else ot_overall_udp_successfulscrapes++; | 508 | if( proto == FLAG_TCP ) ot_overall_tcp_successfulscrapes++; else ot_overall_udp_successfulscrapes++; |
509 | case EVENT_FULLSCRAPE: | 509 | case EVENT_FULLSCRAPE: |
510 | ot_full_scrape_count++; | 510 | ot_full_scrape_count++; |
511 | ot_full_scrape_size += event_data; | 511 | ot_full_scrape_size += event_data; |
512 | break; | 512 | break; |
513 | case EVENT_FULLSCRAPE_REQUEST: | 513 | case EVENT_FULLSCRAPE_REQUEST: |
514 | { | 514 | { |
515 | unsigned char ip[4]; *(int*)ip = is_tcp; /* ugly hack to transfer ip to stats */ | 515 | unsigned char ip[4]; *(int*)ip = (int)proto; /* ugly hack to transfer ip to stats */ |
516 | LOG_TO_STDERR( "[%08d] scrp: %d.%d.%d.%d - FULL SCRAPE\n", (unsigned int)(g_now - ot_start_time), ip[0], ip[1], ip[2], ip[3] ); | 516 | LOG_TO_STDERR( "[%08d] scrp: %d.%d.%d.%d - FULL SCRAPE\n", (unsigned int)(g_now - ot_start_time), ip[0], ip[1], ip[2], ip[3] ); |
517 | ot_full_scrape_request_count++; | 517 | ot_full_scrape_request_count++; |
518 | } | 518 | } |
519 | break; | 519 | break; |
520 | case EVENT_FULLSCRAPE_REQUEST_GZIP: | 520 | case EVENT_FULLSCRAPE_REQUEST_GZIP: |
521 | { | 521 | { |
522 | unsigned char ip[4]; *(int*)ip = is_tcp; /* ugly hack to transfer ip to stats */ | 522 | unsigned char ip[4]; *(int*)ip = (int)proto; /* ugly hack to transfer ip to stats */ |
523 | LOG_TO_STDERR( "[%08d] scrp: %d.%d.%d.%d - FULL SCRAPE GZIP\n", (unsigned int)(g_now - ot_start_time), ip[0], ip[1], ip[2], ip[3] ); | 523 | LOG_TO_STDERR( "[%08d] scrp: %d.%d.%d.%d - FULL SCRAPE GZIP\n", (unsigned int)(g_now - ot_start_time), ip[0], ip[1], ip[2], ip[3] ); |
524 | ot_full_scrape_request_count++; | 524 | ot_full_scrape_request_count++; |
525 | } | 525 | } |
@@ -34,7 +34,7 @@ enum { | |||
34 | CODE_HTTPERROR_COUNT | 34 | CODE_HTTPERROR_COUNT |
35 | }; | 35 | }; |
36 | 36 | ||
37 | void stats_issue_event( ot_status_event event, int is_tcp, uint32_t event_data ); | 37 | void stats_issue_event( ot_status_event event, PROTO_FLAG proto, uint32_t event_data ); |
38 | size_t return_stats_for_tracker( char *reply, int mode, int format ); | 38 | size_t return_stats_for_tracker( char *reply, int mode, int format ); |
39 | size_t stats_return_tracker_version( char *reply ); | 39 | size_t stats_return_tracker_version( char *reply ); |
40 | void stats_init( ); | 40 | void stats_init( ); |
@@ -23,7 +23,7 @@ | |||
23 | #include "ot_stats.h" | 23 | #include "ot_stats.h" |
24 | #include "ot_iovec.h" | 24 | #include "ot_iovec.h" |
25 | 25 | ||
26 | #ifdef WANT_TRACKER_SYNC | 26 | #ifdef WANT_SYNC_BATCH |
27 | 27 | ||
28 | #define OT_SYNC_CHUNK_SIZE (512*1024) | 28 | #define OT_SYNC_CHUNK_SIZE (512*1024) |
29 | 29 | ||
@@ -141,7 +141,7 @@ static void * sync_worker( void * args) { | |||
141 | ot_tasktype tasktype = TASK_SYNC_OUT; | 141 | ot_tasktype tasktype = TASK_SYNC_OUT; |
142 | ot_taskid taskid = mutex_workqueue_poptask( &tasktype ); | 142 | ot_taskid taskid = mutex_workqueue_poptask( &tasktype ); |
143 | sync_make( &iovec_entries, &iovector ); | 143 | sync_make( &iovec_entries, &iovector ); |
144 | stats_issue_event( EVENT_SYNC_OUT, 1, iovec_length( &iovec_entries, &iovector) ); | 144 | stats_issue_event( EVENT_SYNC_OUT, FLAG_TCP, iovec_length( &iovec_entries, &iovector) ); |
145 | if( mutex_workqueue_pushresult( taskid, iovec_entries, iovector ) ) | 145 | if( mutex_workqueue_pushresult( taskid, iovec_entries, iovector ) ) |
146 | iovec_free( &iovec_entries, &iovector ); | 146 | iovec_free( &iovec_entries, &iovector ); |
147 | } | 147 | } |
@@ -6,7 +6,7 @@ | |||
6 | #ifndef __OT_SYNC_H__ | 6 | #ifndef __OT_SYNC_H__ |
7 | #define __OT_SYNC_H__ | 7 | #define __OT_SYNC_H__ |
8 | 8 | ||
9 | #ifdef WANT_TRACKER_SYNC | 9 | #ifdef WANT_SYNC_BATCH |
10 | enum { SYNC_IN, SYNC_OUT }; | 10 | enum { SYNC_IN, SYNC_OUT }; |
11 | 11 | ||
12 | void sync_init( ); | 12 | void sync_init( ); |
@@ -14,6 +14,11 @@ void sync_deinit( ); | |||
14 | void sync_deliver( int64 socket ); | 14 | void sync_deliver( int64 socket ); |
15 | 15 | ||
16 | int add_changeset_to_tracker( uint8_t *data, size_t len ); | 16 | int add_changeset_to_tracker( uint8_t *data, size_t len ); |
17 | #else | ||
18 | |||
19 | #define sync_init() | ||
20 | #define sync_deinit() | ||
21 | |||
17 | #endif | 22 | #endif |
18 | 23 | ||
19 | #endif | 24 | #endif |
@@ -52,8 +52,8 @@ void handle_udp4( int64 serversocket ) { | |||
52 | 52 | ||
53 | r = socket_recv4( serversocket, static_inbuf, sizeof( static_inbuf ), remoteip, &remoteport); | 53 | r = socket_recv4( serversocket, static_inbuf, sizeof( static_inbuf ), remoteip, &remoteport); |
54 | 54 | ||
55 | stats_issue_event( EVENT_ACCEPT, 0, ntohl(*(uint32_t*)remoteip) ); | 55 | stats_issue_event( EVENT_ACCEPT, FLAG_UDP, ntohl(*(uint32_t*)remoteip) ); |
56 | stats_issue_event( EVENT_READ, 0, r ); | 56 | stats_issue_event( EVENT_READ, FLAG_UDP, r ); |
57 | 57 | ||
58 | /* Minimum udp tracker packet size, also catches error */ | 58 | /* Minimum udp tracker packet size, also catches error */ |
59 | if( r < 16 ) | 59 | if( r < 16 ) |
@@ -72,7 +72,7 @@ void handle_udp4( int64 serversocket ) { | |||
72 | udp_make_connectionid( outpacket + 2, remoteip ); | 72 | udp_make_connectionid( outpacket + 2, remoteip ); |
73 | 73 | ||
74 | socket_send4( serversocket, static_outbuf, 16, remoteip, remoteport ); | 74 | socket_send4( serversocket, static_outbuf, 16, remoteip, remoteport ); |
75 | stats_issue_event( EVENT_CONNECT, 0, 16 ); | 75 | stats_issue_event( EVENT_CONNECT, FLAG_UDP, 16 ); |
76 | break; | 76 | break; |
77 | case 1: /* This is an announce action */ | 77 | case 1: /* This is an announce action */ |
78 | /* Minimum udp announce packet size */ | 78 | /* Minimum udp announce packet size */ |
@@ -109,9 +109,9 @@ void handle_udp4( int64 serversocket ) { | |||
109 | outpacket[1] = inpacket[12/4]; | 109 | outpacket[1] = inpacket[12/4]; |
110 | 110 | ||
111 | if( OT_FLAG( &peer ) & PEER_FLAG_STOPPED ) /* Peer is gone. */ | 111 | if( OT_FLAG( &peer ) & PEER_FLAG_STOPPED ) /* Peer is gone. */ |
112 | r = remove_peer_from_torrent( hash, &peer, static_outbuf, 0 ); | 112 | r = remove_peer_from_torrent( hash, &peer, static_outbuf, FLAG_UDP ); |
113 | else { | 113 | else { |
114 | torrent = add_peer_to_torrent( hash, &peer WANT_TRACKER_SYNC_PARAM( 0 ) ); | 114 | torrent = add_peer_to_torrent( hash, &peer WANT_SYNC_PARAM( 0 ) ); |
115 | if( !torrent ) | 115 | if( !torrent ) |
116 | return; /* XXX maybe send error */ | 116 | return; /* XXX maybe send error */ |
117 | 117 | ||
@@ -119,7 +119,7 @@ void handle_udp4( int64 serversocket ) { | |||
119 | } | 119 | } |
120 | 120 | ||
121 | socket_send4( serversocket, static_outbuf, r, remoteip, remoteport ); | 121 | socket_send4( serversocket, static_outbuf, r, remoteip, remoteport ); |
122 | stats_issue_event( EVENT_ANNOUNCE, 0, r ); | 122 | stats_issue_event( EVENT_ANNOUNCE, FLAG_UDP, r ); |
123 | break; | 123 | break; |
124 | 124 | ||
125 | case 2: /* This is a scrape action */ | 125 | case 2: /* This is a scrape action */ |
@@ -133,7 +133,7 @@ void handle_udp4( int64 serversocket ) { | |||
133 | return_udp_scrape_for_torrent( (ot_hash*)( static_inbuf + 16 + 20 * r_out ), static_outbuf + 8 + 12 * r_out ); | 133 | return_udp_scrape_for_torrent( (ot_hash*)( static_inbuf + 16 + 20 * r_out ), static_outbuf + 8 + 12 * r_out ); |
134 | 134 | ||
135 | socket_send4( serversocket, static_outbuf, 8 + 12 * r_out, remoteip, remoteport ); | 135 | socket_send4( serversocket, static_outbuf, 8 + 12 * r_out, remoteip, remoteport ); |
136 | stats_issue_event( EVENT_SCRAPE, 0, r ); | 136 | stats_issue_event( EVENT_SCRAPE, FLAG_UDP, r ); |
137 | break; | 137 | break; |
138 | } | 138 | } |
139 | } | 139 | } |
diff --git a/scan_urlencoded_query.c b/scan_urlencoded_query.c index 85f0d82..e84fbfd 100644 --- a/scan_urlencoded_query.c +++ b/scan_urlencoded_query.c | |||
@@ -64,13 +64,13 @@ void scan_urlencoded_skipvalue( char **string ) { | |||
64 | ssize_t scan_urlencoded_query(char **string, char *deststring, SCAN_SEARCHPATH_FLAG flags) { | 64 | ssize_t scan_urlencoded_query(char **string, char *deststring, SCAN_SEARCHPATH_FLAG flags) { |
65 | const unsigned char* s=*(const unsigned char**) string; | 65 | const unsigned char* s=*(const unsigned char**) string; |
66 | unsigned char *d = (unsigned char*)deststring; | 66 | unsigned char *d = (unsigned char*)deststring; |
67 | unsigned char b, c, f; | 67 | unsigned char b, c; |
68 | 68 | ||
69 | /* This is the main decoding loop. | 69 | /* This is the main decoding loop. |
70 | 'flag' determines, which characters are non-terminating in current context | 70 | 'flag' determines, which characters are non-terminating in current context |
71 | (ie. stop at '=' and '&' if scanning for a 'param'; stop at '?' if scanning for the path ) | 71 | (ie. stop at '=' and '&' if scanning for a 'param'; stop at '?' if scanning for the path ) |
72 | */ | 72 | */ |
73 | while( ( f = is_unreserved[ c = *s++ ] ) & flags ) { | 73 | while( is_unreserved[ c = *s++ ] & flags ) { |
74 | 74 | ||
75 | /* When encountering an url escaped character, try to decode */ | 75 | /* When encountering an url escaped character, try to decode */ |
76 | if( c=='%') { | 76 | if( c=='%') { |
diff --git a/tests/testsuite2.sh b/tests/testsuite2.sh new file mode 100644 index 0000000..5189187 --- /dev/null +++ b/tests/testsuite2.sh | |||
@@ -0,0 +1,14 @@ | |||
1 | #!/bin/sh | ||
2 | |||
3 | while true; do | ||
4 | request_string="GET /announce?info_hash=012345678901234567\ | ||
5 | %$(printf %02X $(( $RANDOM & 0xff )) )\ | ||
6 | %$(printf %02X $(( $RANDOM & 0xff )) )\ | ||
7 | &ip=$(( $RANDOM & 0xff )).17.13.15&port=$(( $RANDOM & 0xff )) HTTP/1.0\n" | ||
8 | |||
9 | echo $request_string | ||
10 | echo | ||
11 | echo $request_string | nc 10.0.1.3 6969 >/dev/null | ||
12 | echo | ||
13 | |||
14 | done | ||
diff --git a/trackerlogic.c b/trackerlogic.c index 37bb878..bff3a3c 100644 --- a/trackerlogic.c +++ b/trackerlogic.c | |||
@@ -14,6 +14,7 @@ | |||
14 | #include <unistd.h> | 14 | #include <unistd.h> |
15 | #include <time.h> | 15 | #include <time.h> |
16 | #include <math.h> | 16 | #include <math.h> |
17 | #include <errno.h> | ||
17 | 18 | ||
18 | /* Libowfat */ | 19 | /* Libowfat */ |
19 | #include "scan.h" | 20 | #include "scan.h" |
@@ -28,19 +29,20 @@ | |||
28 | #include "ot_accesslist.h" | 29 | #include "ot_accesslist.h" |
29 | #include "ot_fullscrape.h" | 30 | #include "ot_fullscrape.h" |
30 | #include "ot_sync.h" | 31 | #include "ot_sync.h" |
32 | #include "ot_livesync.h" | ||
31 | 33 | ||
32 | void free_peerlist( ot_peerlist *peer_list ) { | 34 | void free_peerlist( ot_peerlist *peer_list ) { |
33 | size_t i; | 35 | size_t i; |
34 | for( i=0; i<OT_POOLS_COUNT; ++i ) | 36 | for( i=0; i<OT_POOLS_COUNT; ++i ) |
35 | if( peer_list->peers[i].data ) | 37 | if( peer_list->peers[i].data ) |
36 | free( peer_list->peers[i].data ); | 38 | free( peer_list->peers[i].data ); |
37 | #ifdef WANT_TRACKER_SYNC | 39 | #ifdef WANT_SYNC_BATCH |
38 | free( peer_list->changeset.data ); | 40 | free( peer_list->changeset.data ); |
39 | #endif | 41 | #endif |
40 | free( peer_list ); | 42 | free( peer_list ); |
41 | } | 43 | } |
42 | 44 | ||
43 | ot_torrent *add_peer_to_torrent( ot_hash *hash, ot_peer *peer WANT_TRACKER_SYNC_PARAM( int from_changeset ) ) { | 45 | ot_torrent *add_peer_to_torrent( ot_hash *hash, ot_peer *peer WANT_SYNC_PARAM( int from_changeset ) ) { |
44 | int exactmatch; | 46 | int exactmatch; |
45 | ot_torrent *torrent; | 47 | ot_torrent *torrent; |
46 | ot_peer *peer_dest; | 48 | ot_peer *peer_dest; |
@@ -58,6 +60,11 @@ ot_torrent *add_peer_to_torrent( ot_hash *hash, ot_peer *peer WANT_TRACKER_SYNC | |||
58 | return NULL; | 60 | return NULL; |
59 | } | 61 | } |
60 | 62 | ||
63 | #ifdef WANT_SYNC_LIVE | ||
64 | if( !from_changeset ) | ||
65 | livesync_tell( hash, peer, PEER_FLAG_LEECHING ); | ||
66 | #endif | ||
67 | |||
61 | if( !exactmatch ) { | 68 | if( !exactmatch ) { |
62 | /* Create a new torrent entry, then */ | 69 | /* Create a new torrent entry, then */ |
63 | memmove( &torrent->hash, hash, sizeof( ot_hash ) ); | 70 | memmove( &torrent->hash, hash, sizeof( ot_hash ) ); |
@@ -79,7 +86,7 @@ ot_torrent *add_peer_to_torrent( ot_hash *hash, ot_peer *peer WANT_TRACKER_SYNC | |||
79 | if( ( OT_FLAG( peer ) & ( PEER_FLAG_COMPLETED | PEER_FLAG_SEEDING ) ) == PEER_FLAG_COMPLETED ) | 86 | if( ( OT_FLAG( peer ) & ( PEER_FLAG_COMPLETED | PEER_FLAG_SEEDING ) ) == PEER_FLAG_COMPLETED ) |
80 | OT_FLAG( peer ) ^= PEER_FLAG_COMPLETED; | 87 | OT_FLAG( peer ) ^= PEER_FLAG_COMPLETED; |
81 | 88 | ||
82 | #ifdef WANT_TRACKER_SYNC | 89 | #ifdef WANT_SYNC |
83 | if( from_changeset ) { | 90 | if( from_changeset ) { |
84 | /* Check, whether peer already is in current pool, do nothing if so */ | 91 | /* Check, whether peer already is in current pool, do nothing if so */ |
85 | peer_pool = &torrent->peer_list->peers[0]; | 92 | peer_pool = &torrent->peer_list->peers[0]; |
@@ -148,7 +155,7 @@ ot_torrent *add_peer_to_torrent( ot_hash *hash, ot_peer *peer WANT_TRACKER_SYNC | |||
148 | * RANDOM may return huge values | 155 | * RANDOM may return huge values |
149 | * does not yet check not to return self | 156 | * does not yet check not to return self |
150 | */ | 157 | */ |
151 | size_t return_peers_for_torrent( ot_hash *hash, size_t amount, char *reply, int is_tcp ) { | 158 | size_t return_peers_for_torrent( ot_hash *hash, size_t amount, char *reply, PROTO_FLAG proto ) { |
152 | char *r = reply; | 159 | char *r = reply; |
153 | int exactmatch; | 160 | int exactmatch; |
154 | ot_vector *torrents_list = mutex_bucket_lock_by_hash( hash ); | 161 | ot_vector *torrents_list = mutex_bucket_lock_by_hash( hash ); |
@@ -164,7 +171,7 @@ size_t return_peers_for_torrent( ot_hash *hash, size_t amount, char *reply, int | |||
164 | if( peer_list->peer_count < amount ) | 171 | if( peer_list->peer_count < amount ) |
165 | amount = peer_list->peer_count; | 172 | amount = peer_list->peer_count; |
166 | 173 | ||
167 | if( is_tcp ) | 174 | if( proto == FLAG_TCP ) |
168 | r += sprintf( r, "d8:completei%zde10:downloadedi%zde10:incompletei%zde8:intervali%ie5:peers%zd:", peer_list->seed_count, peer_list->down_count, peer_list->peer_count-peer_list->seed_count, OT_CLIENT_REQUEST_INTERVAL_RANDOM, 6*amount ); | 175 | r += sprintf( r, "d8:completei%zde10:downloadedi%zde10:incompletei%zde8:intervali%ie5:peers%zd:", peer_list->seed_count, peer_list->down_count, peer_list->peer_count-peer_list->seed_count, OT_CLIENT_REQUEST_INTERVAL_RANDOM, 6*amount ); |
169 | else { | 176 | else { |
170 | *(uint32_t*)(r+0) = htonl( OT_CLIENT_REQUEST_INTERVAL_RANDOM ); | 177 | *(uint32_t*)(r+0) = htonl( OT_CLIENT_REQUEST_INTERVAL_RANDOM ); |
@@ -204,7 +211,7 @@ size_t return_peers_for_torrent( ot_hash *hash, size_t amount, char *reply, int | |||
204 | r += 6; | 211 | r += 6; |
205 | } | 212 | } |
206 | } | 213 | } |
207 | if( is_tcp ) | 214 | if( proto == FLAG_TCP ) |
208 | *r++ = 'e'; | 215 | *r++ = 'e'; |
209 | 216 | ||
210 | mutex_bucket_unlock_by_hash( hash ); | 217 | mutex_bucket_unlock_by_hash( hash ); |
@@ -263,23 +270,33 @@ size_t return_tcp_scrape_for_torrent( ot_hash *hash_list, int amount, char *repl | |||
263 | return r - reply; | 270 | return r - reply; |
264 | } | 271 | } |
265 | 272 | ||
266 | size_t remove_peer_from_torrent( ot_hash *hash, ot_peer *peer, char *reply, int is_tcp ) { | 273 | size_t remove_peer_from_torrent( ot_hash *hash, ot_peer *peer, char *reply, PROTO_FLAG proto ) { |
267 | int exactmatch; | 274 | int exactmatch; |
268 | size_t index; | 275 | size_t index; |
269 | ot_vector *torrents_list = mutex_bucket_lock_by_hash( hash ); | 276 | ot_vector *torrents_list = mutex_bucket_lock_by_hash( hash ); |
270 | ot_torrent *torrent = binary_search( hash, torrents_list->data, torrents_list->size, sizeof( ot_torrent ), OT_HASH_COMPARE_SIZE, &exactmatch ); | 277 | ot_torrent *torrent = binary_search( hash, torrents_list->data, torrents_list->size, sizeof( ot_torrent ), OT_HASH_COMPARE_SIZE, &exactmatch ); |
271 | ot_peerlist *peer_list; | 278 | ot_peerlist *peer_list; |
272 | 279 | ||
280 | #ifdef WANT_SYNC_LIVE | ||
281 | if( proto != FLAG_MCA ) | ||
282 | livesync_tell( hash, peer, PEER_FLAG_STOPPED ); | ||
283 | #endif | ||
284 | |||
273 | if( !exactmatch ) { | 285 | if( !exactmatch ) { |
274 | mutex_bucket_unlock_by_hash( hash ); | 286 | mutex_bucket_unlock_by_hash( hash ); |
275 | 287 | ||
276 | if( is_tcp ) | 288 | if( proto == FLAG_TCP ) |
277 | return sprintf( reply, "d8:completei0e10:incompletei0e8:intervali%ie5:peers0:e", OT_CLIENT_REQUEST_INTERVAL_RANDOM ); | 289 | return sprintf( reply, "d8:completei0e10:incompletei0e8:intervali%ie5:peers0:e", OT_CLIENT_REQUEST_INTERVAL_RANDOM ); |
278 | 290 | ||
279 | /* Create fake packet to satisfy parser on the other end */ | 291 | /* Create fake packet to satisfy parser on the other end */ |
280 | ((uint32_t*)reply)[2] = htonl( OT_CLIENT_REQUEST_INTERVAL_RANDOM ); | 292 | if( proto == FLAG_UDP ) { |
281 | ((uint32_t*)reply)[3] = ((uint32_t*)reply)[4] = 0; | 293 | ((uint32_t*)reply)[2] = htonl( OT_CLIENT_REQUEST_INTERVAL_RANDOM ); |
282 | return (size_t)20; | 294 | ((uint32_t*)reply)[3] = ((uint32_t*)reply)[4] = 0; |
295 | return (size_t)20; | ||
296 | } | ||
297 | |||
298 | if( proto == FLAG_MCA ) | ||
299 | return 0; | ||
283 | } | 300 | } |
284 | 301 | ||
285 | peer_list = torrent->peer_list; | 302 | peer_list = torrent->peer_list; |
@@ -296,37 +313,46 @@ size_t remove_peer_from_torrent( ot_hash *hash, ot_peer *peer, char *reply, int | |||
296 | 313 | ||
297 | exit_loop: | 314 | exit_loop: |
298 | 315 | ||
299 | if( is_tcp ) { | 316 | if( proto == FLAG_TCP ) { |
300 | size_t reply_size = sprintf( reply, "d8:completei%zde10:incompletei%zde8:intervali%ie5:peers0:e", peer_list->seed_count, peer_list->peer_count - peer_list->seed_count, OT_CLIENT_REQUEST_INTERVAL_RANDOM ); | 317 | size_t reply_size = sprintf( reply, "d8:completei%zde10:incompletei%zde8:intervali%ie5:peers0:e", peer_list->seed_count, peer_list->peer_count - peer_list->seed_count, OT_CLIENT_REQUEST_INTERVAL_RANDOM ); |
301 | mutex_bucket_unlock_by_hash( hash ); | 318 | mutex_bucket_unlock_by_hash( hash ); |
302 | return reply_size; | 319 | return reply_size; |
303 | } | 320 | } |
304 | 321 | ||
305 | /* else { Handle UDP reply */ | 322 | /* Handle UDP reply */ |
306 | ((uint32_t*)reply)[2] = htonl( OT_CLIENT_REQUEST_INTERVAL_RANDOM ); | 323 | if( proto == FLAG_TCP ) { |
307 | ((uint32_t*)reply)[3] = htonl( peer_list->peer_count - peer_list->seed_count ); | 324 | ((uint32_t*)reply)[2] = htonl( OT_CLIENT_REQUEST_INTERVAL_RANDOM ); |
308 | ((uint32_t*)reply)[4] = htonl( peer_list->seed_count); | 325 | ((uint32_t*)reply)[3] = htonl( peer_list->peer_count - peer_list->seed_count ); |
326 | ((uint32_t*)reply)[4] = htonl( peer_list->seed_count); | ||
327 | } | ||
309 | 328 | ||
310 | mutex_bucket_unlock_by_hash( hash ); | 329 | mutex_bucket_unlock_by_hash( hash ); |
311 | return (size_t)20; | 330 | return (size_t)20; |
312 | } | 331 | } |
313 | 332 | ||
333 | void exerr( char * message ) { | ||
334 | fprintf( stderr, "%s\n", message ); | ||
335 | exit( 111 ); | ||
336 | } | ||
337 | |||
314 | int trackerlogic_init( const char * const serverdir ) { | 338 | int trackerlogic_init( const char * const serverdir ) { |
315 | if( serverdir && chdir( serverdir ) ) { | 339 | if( serverdir && chdir( serverdir ) ) { |
316 | fprintf( stderr, "Could not chdir() to %s\n", serverdir ); | 340 | fprintf( stderr, "Could not chdir() to %s, because %s\n", serverdir, strerror(errno) ); |
317 | return -1; | 341 | return -1; |
318 | } | 342 | } |
319 | 343 | ||
320 | srandom( time(NULL) ); | 344 | srandom( time(NULL) ); |
321 | 345 | g_tracker_id = random(); | |
346 | |||
322 | /* Initialise background worker threads */ | 347 | /* Initialise background worker threads */ |
323 | mutex_init( ); | 348 | mutex_init( ); |
324 | clean_init( ); | 349 | clean_init( ); |
325 | fullscrape_init( ); | 350 | fullscrape_init( ); |
326 | #ifdef WANT_TRACKER_SYNC | 351 | accesslist_init( ); |
352 | livesync_init( ); | ||
327 | sync_init( ); | 353 | sync_init( ); |
328 | #endif | ||
329 | stats_init( ); | 354 | stats_init( ); |
355 | |||
330 | return 0; | 356 | return 0; |
331 | } | 357 | } |
332 | 358 | ||
@@ -349,9 +375,9 @@ void trackerlogic_deinit( void ) { | |||
349 | 375 | ||
350 | /* Deinitialise background worker threads */ | 376 | /* Deinitialise background worker threads */ |
351 | stats_deinit( ); | 377 | stats_deinit( ); |
352 | #ifdef WANT_TRACKER_SYNC | ||
353 | sync_deinit( ); | 378 | sync_deinit( ); |
354 | #endif | 379 | livesync_init( ); |
380 | accesslist_init( ); | ||
355 | fullscrape_deinit( ); | 381 | fullscrape_deinit( ); |
356 | clean_deinit( ); | 382 | clean_deinit( ); |
357 | mutex_deinit( ); | 383 | mutex_deinit( ); |
diff --git a/trackerlogic.h b/trackerlogic.h index 3525421..986c17a 100644 --- a/trackerlogic.h +++ b/trackerlogic.h | |||
@@ -43,6 +43,11 @@ typedef time_t ot_time; | |||
43 | /* From opentracker.c */ | 43 | /* From opentracker.c */ |
44 | extern time_t g_now; | 44 | extern time_t g_now; |
45 | #define NOW (g_now/OT_POOLS_TIMEOUT) | 45 | #define NOW (g_now/OT_POOLS_TIMEOUT) |
46 | extern uint32_t g_tracker_id; | ||
47 | typedef enum { FLAG_TCP, FLAG_UDP, FLAG_MCA } PROTO_FLAG; | ||
48 | |||
49 | /* Try to bind to ip:port pair. May call exit() on failure */ | ||
50 | int64_t ot_try_bind( char ip[4], uint16_t port, PROTO_FLAG proto ); | ||
46 | 51 | ||
47 | typedef struct { | 52 | typedef struct { |
48 | uint8_t data[8]; | 53 | uint8_t data[8]; |
@@ -50,6 +55,7 @@ typedef struct { | |||
50 | static const uint8_t PEER_FLAG_SEEDING = 0x80; | 55 | static const uint8_t PEER_FLAG_SEEDING = 0x80; |
51 | static const uint8_t PEER_FLAG_COMPLETED = 0x40; | 56 | static const uint8_t PEER_FLAG_COMPLETED = 0x40; |
52 | static const uint8_t PEER_FLAG_STOPPED = 0x20; | 57 | static const uint8_t PEER_FLAG_STOPPED = 0x20; |
58 | static const uint8_t PEER_FLAG_LEECHING = 0x00; | ||
53 | 59 | ||
54 | #define OT_SETIP( peer, ip ) memmove((peer),(ip),4); | 60 | #define OT_SETIP( peer, ip ) memmove((peer),(ip),4); |
55 | #define OT_SETPORT( peer, port ) memmove(((uint8_t*)peer)+4,(port),2); | 61 | #define OT_SETPORT( peer, port ) memmove(((uint8_t*)peer)+4,(port),2); |
@@ -74,7 +80,7 @@ struct ot_peerlist { | |||
74 | size_t down_count; | 80 | size_t down_count; |
75 | size_t seed_counts[ OT_POOLS_COUNT ]; | 81 | size_t seed_counts[ OT_POOLS_COUNT ]; |
76 | ot_vector peers[ OT_POOLS_COUNT ]; | 82 | ot_vector peers[ OT_POOLS_COUNT ]; |
77 | #ifdef WANT_TRACKER_SYNC | 83 | #ifdef WANT_SYNC_BATCH |
78 | ot_vector changeset; | 84 | ot_vector changeset; |
79 | #endif | 85 | #endif |
80 | }; | 86 | }; |
@@ -83,18 +89,23 @@ struct ot_peerlist { | |||
83 | Exported functions | 89 | Exported functions |
84 | */ | 90 | */ |
85 | 91 | ||
86 | #ifdef WANT_TRACKER_SYNC | 92 | #if defined( WANT_SYNC_BATCH ) || defined( WANT_SYNC_LIVE ) |
87 | #define WANT_TRACKER_SYNC_PARAM( param ) , param | 93 | #define WANT_SYNC |
94 | #endif | ||
95 | |||
96 | #ifdef WANT_SYNC | ||
97 | #define WANT_SYNC_PARAM( param ) , param | ||
88 | #else | 98 | #else |
89 | #define WANT_TRACKER_SYNC_PARAM( param ) | 99 | #define WANT_SYNC_PARAM( param ) |
90 | #endif | 100 | #endif |
91 | 101 | ||
92 | int trackerlogic_init( const char * const serverdir ); | 102 | int trackerlogic_init( const char * const serverdir ); |
93 | void trackerlogic_deinit( void ); | 103 | void trackerlogic_deinit( void ); |
104 | void exerr( char * message ); | ||
94 | 105 | ||
95 | ot_torrent *add_peer_to_torrent( ot_hash *hash, ot_peer *peer WANT_TRACKER_SYNC_PARAM( int from_changeset ) ); | 106 | ot_torrent *add_peer_to_torrent( ot_hash *hash, ot_peer *peer WANT_SYNC_PARAM( int from_changeset ) ); |
96 | size_t remove_peer_from_torrent( ot_hash *hash, ot_peer *peer, char *reply, int is_tcp ); | 107 | size_t remove_peer_from_torrent( ot_hash *hash, ot_peer *peer, char *reply, PROTO_FLAG proto ); |
97 | size_t return_peers_for_torrent( ot_hash *hash, size_t amount, char *reply, int is_tcp ); | 108 | size_t return_peers_for_torrent( ot_hash *hash, size_t amount, char *reply, PROTO_FLAG proto ); |
98 | size_t return_tcp_scrape_for_torrent( ot_hash *hash, int amount, char *reply ); | 109 | size_t return_tcp_scrape_for_torrent( ot_hash *hash, int amount, char *reply ); |
99 | size_t return_udp_scrape_for_torrent( ot_hash *hash, char *reply ); | 110 | size_t return_udp_scrape_for_torrent( ot_hash *hash, char *reply ); |
100 | 111 | ||