summaryrefslogtreecommitdiff
path: root/opentracker.c
diff options
context:
space:
mode:
authorerdgeist <>2007-10-15 18:01:38 +0000
committererdgeist <>2007-10-15 18:01:38 +0000
commit65cc45f129fae1b961fa27615b7532c9380e4522 (patch)
tree1fec05c7534cb7839b0d36e63badbb81fcc9668c /opentracker.c
parentffffd807193f3504107c405458ab0fa15b0b1e3c (diff)
Log all expansive operations to stderr
Diffstat (limited to 'opentracker.c')
-rw-r--r--opentracker.c12
1 files changed, 12 insertions, 0 deletions
diff --git a/opentracker.c b/opentracker.c
index 872a891..052d9b9 100644
--- a/opentracker.c
+++ b/opentracker.c
@@ -48,6 +48,8 @@ static char *accesslist_filename = NULL;
48#define WANT_ACCESS_CONTROL 48#define WANT_ACCESS_CONTROL
49#endif 49#endif
50 50
51#define LOG_TO_STDERR( ... ) fprintf( stderr, __VA_ARGS__ )
52
51/* To always have space for error messages ;) */ 53/* To always have space for error messages ;) */
52 54
53static char static_inbuf[8192]; 55static char static_inbuf[8192];
@@ -220,6 +222,8 @@ static void httpresponse( const int64 s, char *data ) {
220 if( byte_diff( data, 4, "sync") ) HTTPERROR_404; 222 if( byte_diff( data, 4, "sync") ) HTTPERROR_404;
221 if( !h->blessed ) HTTPERROR_403_IP; 223 if( !h->blessed ) HTTPERROR_403_IP;
222 224
225LOG_TO_STDERR( "sync: %d.%d.%d.%d\n", h->ip[0], h->ip[1], h->ip[2], h->ip[3] );
226
223 mode = SYNC_OUT; 227 mode = SYNC_OUT;
224 scanon = 1; 228 scanon = 1;
225 229
@@ -292,6 +296,8 @@ static void httpresponse( const int64 s, char *data ) {
292 switch( mode) 296 switch( mode)
293 { 297 {
294 case STATS_DMEM: 298 case STATS_DMEM:
299LOG_TO_STDERR( "stats: %d.%d.%d.%d - mode: dmem", h->ip[0], h->ip[1], h->ip[2], h->ip[3] );
300
295 if( !( reply_size = return_memstat_for_tracker( &reply ) ) ) HTTPERROR_500; 301 if( !( reply_size = return_memstat_for_tracker( &reply ) ) ) HTTPERROR_500;
296 return sendmallocdata( s, reply, reply_size ); 302 return sendmallocdata( s, reply, reply_size );
297 303
@@ -316,6 +322,8 @@ static void httpresponse( const int64 s, char *data ) {
316 break; 322 break;
317 case STATS_SLASH24S: 323 case STATS_SLASH24S:
318{ 324{
325LOG_TO_STDERR( "stats: %d.%d.%d.%d - mode: s24s", h->ip[0], h->ip[1], h->ip[2], h->ip[3] );
326
319 ot_dword diff; struct timeval tv1, tv2; gettimeofday( &tv1, NULL ); 327 ot_dword diff; struct timeval tv1, tv2; gettimeofday( &tv1, NULL );
320 if( !( reply_size = return_stats_for_slash24s( SUCCESS_HTTP_HEADER_LENGTH + static_outbuf, 25, 16 ) ) ) HTTPERROR_500; 328 if( !( reply_size = return_stats_for_slash24s( SUCCESS_HTTP_HEADER_LENGTH + static_outbuf, 25, 16 ) ) ) HTTPERROR_500;
321 gettimeofday( &tv2, NULL ); diff = ( tv2.tv_sec - tv1.tv_sec ) * 1000000 + tv2.tv_usec - tv1.tv_usec; 329 gettimeofday( &tv2, NULL ); diff = ( tv2.tv_sec - tv1.tv_sec ) * 1000000 + tv2.tv_usec - tv1.tv_usec;
@@ -324,6 +332,8 @@ static void httpresponse( const int64 s, char *data ) {
324} 332}
325 case STATS_SLASH24S_OLD: 333 case STATS_SLASH24S_OLD:
326{ 334{
335LOG_TO_STDERR( "stats: %d.%d.%d.%d - mode: s24s old", h->ip[0], h->ip[1], h->ip[2], h->ip[3] );
336
327 ot_dword diff; struct timeval tv1, tv2; gettimeofday( &tv1, NULL ); 337 ot_dword diff; struct timeval tv1, tv2; gettimeofday( &tv1, NULL );
328 if( !( reply_size = return_stats_for_slash24s_old( SUCCESS_HTTP_HEADER_LENGTH + static_outbuf, 25, 16 ) ) ) HTTPERROR_500; 338 if( !( reply_size = return_stats_for_slash24s_old( SUCCESS_HTTP_HEADER_LENGTH + static_outbuf, 25, 16 ) ) ) HTTPERROR_500;
329 gettimeofday( &tv2, NULL ); diff = ( tv2.tv_sec - tv1.tv_sec ) * 1000000 + tv2.tv_usec - tv1.tv_usec; 339 gettimeofday( &tv2, NULL ); diff = ( tv2.tv_sec - tv1.tv_sec ) * 1000000 + tv2.tv_usec - tv1.tv_usec;
@@ -361,6 +371,8 @@ SCRAPE_WORKAROUND:
361 371
362 /* Scanned whole query string, no hash means full scrape... you might want to limit that */ 372 /* Scanned whole query string, no hash means full scrape... you might want to limit that */
363 if( !hash ) { 373 if( !hash ) {
374LOG_TO_STDERR( "scrp: %d.%d.%d.%d - FULL SCRAPE", h->ip[0], h->ip[1], h->ip[2], h->ip[3] );
375
364 if( !( reply_size = return_fullscrape_for_tracker( &reply ) ) ) HTTPERROR_500; 376 if( !( reply_size = return_fullscrape_for_tracker( &reply ) ) ) HTTPERROR_500;
365 ot_overall_tcp_successfulannounces++; 377 ot_overall_tcp_successfulannounces++;
366 return sendmallocdata( s, reply, reply_size ); 378 return sendmallocdata( s, reply, reply_size );