summaryrefslogtreecommitdiff
path: root/opentracker.c
diff options
context:
space:
mode:
authorerdgeist <>2007-01-08 00:57:35 +0000
committererdgeist <>2007-01-08 00:57:35 +0000
commit1d66041fd595a73434bb9c803180b941de82e33f (patch)
tree6ce5430e1f9c7406e1dff55bebbc0d3302746823 /opentracker.c
parentbef60daf2b4a6da2f33572958ddf1ce264fda1b2 (diff)
Indent. Sorry. Plus timeout on every connection, for every byte we got.
Diffstat (limited to 'opentracker.c')
-rw-r--r--opentracker.c223
1 files changed, 107 insertions, 116 deletions
diff --git a/opentracker.c b/opentracker.c
index 0e499fe..58704bb 100644
--- a/opentracker.c
+++ b/opentracker.c
@@ -342,130 +342,121 @@ void help( char *name ) {
342} 342}
343 343
344int main( int argc, char **argv ) { 344int main( int argc, char **argv ) {
345 int s=socket_tcp4(); 345 int s=socket_tcp4();
346 tai6464 t; 346 tai6464 t;
347 unsigned long ip; 347 unsigned long ip;
348 char *serverip = NULL; 348 char *serverip = NULL;
349 char *serverdir = "."; 349 char *serverdir = ".";
350 uint16 port = 6969; 350 uint16 port = 6969;
351 351
352 while( 1 ) { 352 while( 1 ) {
353 switch( getopt(argc,argv,":i:p:d:ocbBh") ) { 353 switch( getopt(argc,argv,":i:p:d:ocbBh") ) {
354 case -1: goto allparsed; 354 case -1: goto allparsed;
355 case 'i': serverip = optarg; break; 355 case 'i': serverip = optarg; break;
356 case 'p': port = (uint16)atol( optarg ); break; 356 case 'p': port = (uint16)atol( optarg ); break;
357 case 'd': serverdir = optarg; break; 357 case 'd': serverdir = optarg; break;
358 case 'h': help( argv[0]); exit(0); 358 case 'h': help( argv[0]); exit(0);
359#ifdef WANT_CLOSED_TRACKER 359#ifdef WANT_CLOSED_TRACKER
360 case 'o': g_closedtracker = 0; break; 360 case 'o': g_closedtracker = 0; break;
361 case 'c': g_closedtracker = 1; break; 361 case 'c': g_closedtracker = 1; break;
362#endif 362#endif
363#ifdef WANT_BLACKLIST 363#ifdef WANT_BLACKLIST
364 case 'b': g_check_blacklist = 1; break; 364 case 'b': g_check_blacklist = 1; break;
365 case 'B': g_check_blacklist = 0; break; 365 case 'B': g_check_blacklist = 0; break;
366#endif 366#endif
367 default: 367 default:
368 case '?': usage( argv[0] ); exit(1); 368 case '?': usage( argv[0] ); exit(1);
369 }
370 } 369 }
370 }
371 371
372allparsed: 372allparsed:
373 ot_start_time = time( NULL ); 373 ot_start_time = time( NULL );
374 if (socket_bind4_reuse(s,serverip,port)==-1) 374 if (socket_bind4_reuse(s,serverip,port)==-1)
375 panic("socket_bind4_reuse"); 375 panic("socket_bind4_reuse");
376 376
377 if (socket_listen(s,16)==-1) 377 if (socket_listen(s,16)==-1)
378 panic("socket_listen"); 378 panic("socket_listen");
379 379
380 if (!io_fd(s)) 380 if (!io_fd(s))
381 panic("io_fd"); 381 panic("io_fd");
382 382
383 signal( SIGINT, graceful ); 383 signal( SIGINT, graceful );
384 if( init_logic( serverdir ) == -1 ) 384 if( init_logic( serverdir ) == -1 )
385 panic("Logic not started"); 385 panic("Logic not started");
386 386
387 io_wantread(s); 387 io_wantread(s);
388 388
389 for (;;) 389 for (;;) {
390 { 390 int64 i;
391 int64 i; 391 io_wait();
392 io_wait(); 392
393 393 while ((i=io_canread())!=-1) {
394 while ((i=io_canread())!=-1) 394 if (i==s) { // ist es der serversocket?
395 { 395 int n;
396 if (i==s) // ist es der serversocket? 396 while ((n=socket_accept4(s,(void*)&ip,&port))!=-1) {
397 { 397 if (io_fd(n)) {
398 int n; 398 struct http_data* h=(struct http_data*)malloc(sizeof(struct http_data));
399 while ((n=socket_accept4(s,(void*)&ip,&port))!=-1) 399 io_wantread(n);
400 { 400
401 if (io_fd(n)) 401 if (h) {
402 { 402 byte_zero(h,sizeof(struct http_data));
403 struct http_data* h=(struct http_data*)malloc(sizeof(struct http_data)); 403 h->ip=ip;
404 io_wantread(n); 404 taia_now(&t);
405 405 taia_addsec(&t,&t,OT_CLIENT_TIMEOUT);
406 if (h) 406 io_timeout(n,t);
407 { 407 io_setcookie(n,h);
408 byte_zero(h,sizeof(struct http_data)); 408 ++ot_overall_connections;
409 h->ip=ip; 409 } else
410 taia_now(&t); 410 io_close(n);
411 taia_addsec(&t,&t,OT_CLIENT_TIMEOUT); 411 } else
412 io_timeout(n,t); 412 io_close(n);
413 io_setcookie(n,h);
414 ++ot_overall_connections;
415 } else
416 io_close(n);
417 } else
418 io_close(n);
419 }
420 if (errno==EAGAIN)
421 io_eagain(s);
422 else
423 carp("socket_accept4");
424 }
425 else
426 {
427 char buf[8192];
428 struct http_data* h=io_getcookie(i);
429
430 int l=io_tryread(i,buf,sizeof buf);
431 if (l<=0)
432 {
433 if (h)
434 {
435 array_reset(&h->r);
436 free(h);
437 }
438 io_close(i);
439 }
440 else
441 {
442 array_catb(&h->r,buf,l);
443
444 if (array_failed(&h->r))
445 httperror(i,h,"500 Server Error","Request too long.");
446 else if (array_bytes(&h->r)>8192)
447 httperror(i,h,"500 request too long","You sent too much headers");
448 else if ((l=header_complete(h)))
449 httpresponse(i,h);
450 }
451 }
452 } 413 }
453 414 if( errno==EAGAIN )
454 while ((i=io_canwrite())!=-1) 415 io_eagain(s);
455 { 416 else
456 struct http_data* h=io_getcookie(i); 417 carp("socket_accept4");
457 418 } else {
458 int64 r=iob_send(i,&h->iob); 419 char buf[8192];
459 if (r==-1) 420 struct http_data* h=io_getcookie(i);
460 io_eagain(i); 421
461 else 422 int l=io_tryread(i,buf,sizeof buf);
462 if ((r<=0)||(h->iob.bytesleft==0)) 423 if( l <= 0 ) {
463 { 424 if( h ) {
464 iob_reset(&h->iob); 425 array_reset(&h->r);
465 free(h); 426 free(h);
466 io_close(i); 427 }
467 } 428 io_close(i);
429 } else {
430 array_catb(&h->r,buf,l);
431
432 if( array_failed(&h->r))
433 httperror(i,h,"500 Server Error","Request too long.");
434 else if (array_bytes(&h->r)>8192)
435 httperror(i,h,"500 request too long","You sent too much headers");
436 else if ((l=header_complete(h)))
437 httpresponse(i,h);
438 else {
439 taia_now(&t);
440 taia_addsec(&t,&t,OT_CLIENT_TIMEOUT);
441 io_timeout(i,t);
442 }
468 } 443 }
444 }
469 } 445 }
470 return 0; 446
447 while ((i=io_canwrite())!=-1) {
448 struct http_data* h=io_getcookie(i);
449
450 int64 r=iob_send(i,&h->iob);
451 if (r==-1)
452 io_eagain(i);
453 else
454 if ((r<=0)||(h->iob.bytesleft==0)) {
455 iob_reset(&h->iob);
456 free(h);
457 io_close(i);
458 }
459 }
460 }
461 return 0;
471} 462}