4 * This contains a simple multithreaded TCP server manager. It sits around
5 * waiting on the specified port for incoming HTTP connections. When a
6 * connection is established, it calls context_loop() from context_loop.c.
8 * Copyright (c) 1996-2009 by the citadel.org developers.
9 * This program is released under the terms of the GNU General Public License v3.
14 #include "webserver.h"
19 #include "modules_init.h"
21 int vsnprintf(char *buf
, size_t max
, const char *fmt
, va_list argp
);
24 int verbosity
= 9; /* Logging level */
25 int msock
; /* master listening socket */
26 int is_https
= 0; /* Nonzero if I am an HTTPS service */
27 int follow_xff
= 0; /* Follow X-Forwarded-For: header */
28 int home_specified
= 0; /* did the user specify a homedir? */
29 int time_to_die
= 0; /* Nonzero if server is shutting down */
31 extern void *context_loop(int*);
32 extern void *housekeeping_loop(void);
33 extern pthread_mutex_t SessionListMutex
;
34 extern pthread_key_t MyConKey
;
37 char ctdl_key_dir
[PATH_MAX
]=SSL_DIR
;
38 char file_crpt_file_key
[PATH_MAX
]="";
39 char file_crpt_file_csr
[PATH_MAX
]="";
40 char file_crpt_file_cer
[PATH_MAX
]="";
42 char socket_dir
[PATH_MAX
]; /* where to talk to our citadel server */
43 static const char editor_absolut_dir
[PATH_MAX
]=EDITORDIR
; /* nailed to what configure gives us. */
44 static char static_dir
[PATH_MAX
]; /* calculated on startup */
45 static char static_local_dir
[PATH_MAX
]; /* calculated on startup */
46 static char static_icon_dir
[PATH_MAX
]; /* where should we find our mime icons? */
47 char *static_dirs
[]={ /* needs same sort order as the web mapping */
48 (char*)static_dir
, /* our templates on disk */
49 (char*)static_local_dir
, /* user provided templates disk */
50 (char*)editor_absolut_dir
, /* the editor on disk */
51 (char*)static_icon_dir
/* our icons... */
55 * Subdirectories from which the client may request static content
57 * (If you add more, remember to increment 'ndirs' below)
59 char *static_content_dirs
[] = {
60 "static", /* static templates */
61 "static.local", /* site local static templates */
62 "tiny_mce" /* rich text editor */
68 char *server_cookie
= NULL
; /* our Cookie connection to the client */
69 int http_port
= PORT_NUM
; /* Port to listen on */
70 char *ctdlhost
= DEFAULT_HOST
; /* our name */
71 char *ctdlport
= DEFAULT_PORT
; /* our Port */
72 int setup_wizard
= 0; /* should we run the setup wizard? \todo */
73 char wizard_filename
[PATH_MAX
]; /* where's the setup wizard? */
74 int running_as_daemon
= 0; /* should we deamonize on startup? */
78 * This is a generic function to set up a master socket for listening on
79 * a TCP port. The server shuts down if the bind fails.
81 * ip_addr IP address to bind
82 * port_number port number to bind
83 * queue_len number of incoming connections to allow in the queue
85 int ig_tcp_server(char *ip_addr
, int port_number
, int queue_len
)
87 struct sockaddr_in sin
;
90 memset(&sin
, 0, sizeof(sin
));
91 sin
.sin_family
= AF_INET
;
92 if (ip_addr
== NULL
) {
93 sin
.sin_addr
.s_addr
= INADDR_ANY
;
95 sin
.sin_addr
.s_addr
= inet_addr(ip_addr
);
98 if (sin
.sin_addr
.s_addr
== INADDR_NONE
) {
99 sin
.sin_addr
.s_addr
= INADDR_ANY
;
102 if (port_number
== 0) {
103 lprintf(1, "Cannot start: no port number specified.\n");
106 sin
.sin_port
= htons((u_short
) port_number
);
108 s
= socket(PF_INET
, SOCK_STREAM
, (getprotobyname("tcp")->p_proto
));
110 lprintf(1, "Can't create a socket: %s\n", strerror(errno
));
113 /* Set some socket options that make sense. */
115 setsockopt(s
, SOL_SOCKET
, SO_REUSEADDR
, &i
, sizeof(i
));
118 fcntl(s
, F_SETFL
, O_NONBLOCK
); /* maide: this statement is incorrect
119 there should be a preceding F_GETFL
120 and a bitwise OR with the previous
124 if (bind(s
, (struct sockaddr
*) &sin
, sizeof(sin
)) < 0) {
125 lprintf(1, "Can't bind: %s\n", strerror(errno
));
128 if (listen(s
, queue_len
) < 0) {
129 lprintf(1, "Can't listen: %s\n", strerror(errno
));
138 * Create a Unix domain socket and listen on it
139 * sockpath - file name of the unix domain socket
140 * queue_len - Number of incoming connections to allow in the queue
142 int ig_uds_server(char *sockpath
, int queue_len
)
144 struct sockaddr_un addr
;
147 int actual_queue_len
;
149 actual_queue_len
= queue_len
;
150 if (actual_queue_len
< 5) actual_queue_len
= 5;
152 i
= unlink(sockpath
);
153 if ((i
!= 0) && (errno
!= ENOENT
)) {
154 lprintf(1, "webcit: can't unlink %s: %s\n",
155 sockpath
, strerror(errno
));
159 memset(&addr
, 0, sizeof(addr
));
160 addr
.sun_family
= AF_UNIX
;
161 safestrncpy(addr
.sun_path
, sockpath
, sizeof addr
.sun_path
);
163 s
= socket(AF_UNIX
, SOCK_STREAM
, 0);
165 lprintf(1, "webcit: Can't create a socket: %s\n",
170 if (bind(s
, (struct sockaddr
*)&addr
, sizeof(addr
)) < 0) {
171 lprintf(1, "webcit: Can't bind: %s\n",
176 if (listen(s
, actual_queue_len
) < 0) {
177 lprintf(1, "webcit: Can't listen: %s\n",
182 chmod(sockpath
, 0777);
190 * Read data from the client socket.
192 * sock socket fd to read from
193 * buf buffer to read into
194 * bytes number of bytes to read
195 * timeout Number of seconds to wait before timing out
197 * Possible return values:
198 * 1 Requested number of bytes has been read.
199 * 0 Request timed out.
200 * -1 Connection is broken, or other error.
202 int client_read_to(int *sock
, StrBuf
*Target
, StrBuf
*Buf
, int bytes
, int timeout
)
209 while ((StrLength(Buf
) + StrLength(Target
) < bytes
) &&
211 retval
= client_read_sslbuffer(Buf
, timeout
);
213 StrBufAppendBuf(Target
, Buf
, 0); /* todo: Buf > bytes? */
215 write(2, "\033[32m", 5);
216 write(2, buf
, bytes
);
217 write(2, "\033[30m", 5);
222 lprintf(2, "client_read_ssl() failed\n");
228 if (StrLength(Buf
) > 0) {/*/// todo: what if Buf > bytes?*/
229 StrBufAppendBuf(Target
, Buf
, 0);
231 retval
= StrBufReadBLOB(Target
,
233 (StrLength(Target
) > 0),
234 bytes
- StrLength(Target
),
237 lprintf(2, "client_read() failed: %s\n",
243 write(2, "\033[32m", 5);
244 write(2, buf
, bytes
);
245 write(2, "\033[30m", 5);
252 * Begin buffering HTTP output so we can transmit it all in one write operation later.
254 void begin_burst(void)
256 if (WC
->WBuf
== NULL
) {
257 WC
->WBuf
= NewStrBufPlain(NULL
, 32768);
263 * Finish buffering HTTP output. [Compress using zlib and] output with a Content-Length: header.
268 const char *ptr
, *eptr
;
275 /* Perform gzip compression, if enabled and supported by client */
276 if (!DisableGzip
&& (WCC
->gzip_ok
) && CompressBuffer(WCC
->WBuf
))
278 hprintf("Content-encoding: gzip\r\n");
280 //#endif /* HAVE_ZLIB */
282 hprintf("Content-length: %d\r\n\r\n", StrLength(WCC
->WBuf
));
284 ptr
= ChrPtr(WCC
->HBuf
);
285 count
= StrLength(WCC
->HBuf
);
290 client_write_ssl(WCC
->HBuf
);
291 client_write_ssl(WCC
->WBuf
);
299 write(2, "\033[34m", 5);
300 write(2, ptr
, StrLength(WCC
->WBuf
));
301 write(2, "\033[30m", 5);
303 fdflags
= fcntl(WC
->http_sock
, F_GETFL
);
306 if ((fdflags
& O_NONBLOCK
) == O_NONBLOCK
) {
308 FD_SET(WCC
->http_sock
, &wset
);
309 if (select(WCC
->http_sock
+ 1, NULL
, &wset
, NULL
, NULL
) == -1) {
310 lprintf(2, "client_write: Socket select failed (%s)\n", strerror(errno
));
315 if ((res
= write(WCC
->http_sock
,
318 lprintf(2, "client_write: Socket write failed (%s)\n", strerror(errno
));
326 ptr
= ChrPtr(WCC
->WBuf
);
327 count
= StrLength(WCC
->WBuf
);
332 write(2, "\033[34m", 5);
333 write(2, ptr
, StrLength(WCC
->WBuf
));
334 write(2, "\033[30m", 5);
338 if ((fdflags
& O_NONBLOCK
) == O_NONBLOCK
) {
340 FD_SET(WCC
->http_sock
, &wset
);
341 if (select(WCC
->http_sock
+ 1, NULL
, &wset
, NULL
, NULL
) == -1) {
342 lprintf(2, "client_write: Socket select failed (%s)\n", strerror(errno
));
347 if ((res
= write(WCC
->http_sock
,
350 lprintf(2, "client_write: Socket write failed (%s)\n", strerror(errno
));
358 return StrLength(WCC
->WBuf
);
364 * Read data from the client socket with default timeout.
365 * (This is implemented in terms of client_read_to() and could be
366 * justifiably moved out of sysdep.c)
368 * sock the socket fd to read from
369 * buf the buffer to write to
370 * bytes Number of bytes to read
372 int client_read(int *sock
, StrBuf
*Target
, StrBuf
*buf
, int bytes
)
374 return (client_read_to(sock
, Target
, buf
, bytes
, SLEEPING
));
380 * Shut us down the regular way.
381 * signum is the signal we want to forward
384 void graceful_shutdown_watcher(int signum
) {
385 lprintf (1, "bye; shutting down watcher.");
386 kill(current_child
, signum
);
387 if (signum
!= SIGHUP
)
392 int ClientGetLine(int *sock
, StrBuf
*Target
, StrBuf
*CLineBuf
)
394 const char *Error
, *pch
, *pchs
;
395 int rlen
, len
, retval
= 0;
399 if (StrLength(CLineBuf
) > 0) {
400 pchs
= ChrPtr(CLineBuf
);
401 pch
= strchr(pchs
, '\n');
405 if (len
> 0 && (*(pch
- 1) == '\r') )
407 StrBufSub(Target
, CLineBuf
, 0, len
- rlen
);
408 StrBufCutLeft(CLineBuf
, len
+ 1);
413 while (retval
== 0) {
415 pchs
= ChrPtr(CLineBuf
);
417 pch
= strchr(pchs
, '\n');
419 retval
= client_read_sslbuffer(CLineBuf
, SLEEPING
);
420 pchs
= ChrPtr(CLineBuf
);
421 pch
= strchr(pchs
, '\n');
430 if ((retval
> 0) && (pch
!= NULL
)) {
433 if (len
> 0 && (*(pch
- 1) == '\r') )
435 StrBufSub(Target
, CLineBuf
, 0, len
- rlen
);
436 StrBufCutLeft(CLineBuf
, len
+ 1);
444 return StrBufTCP_read_buffered_line(Target
,
455 * Shut us down the regular way.
456 * signum is the signal we want to forward
459 void graceful_shutdown(int signum
) {
464 lprintf (1, "bye going down gracefull.[%d][%s]\n", signum
, wd
);
476 * Start running as a daemon.
478 void start_daemon(char *pid_file
)
487 /* Close stdin/stdout/stderr and replace them with /dev/null.
488 * We don't just call close() because we don't want these fd's
489 * to be reused for other files.
493 signal(SIGHUP
, SIG_IGN
);
494 signal(SIGINT
, SIG_IGN
);
495 signal(SIGQUIT
, SIG_IGN
);
504 freopen("/dev/null", "r", stdin
);
505 freopen("/dev/null", "w", stdout
);
506 freopen("/dev/null", "w", stderr
);
507 signal(SIGTERM
, graceful_shutdown_watcher
);
508 signal(SIGHUP
, graceful_shutdown_watcher
);
511 current_child
= fork();
514 if (current_child
< 0) {
516 ShutDownLibCitadel ();
520 else if (current_child
== 0) { /* child process */
521 signal(SIGHUP
, graceful_shutdown
);
523 return; /* continue starting webcit. */
525 else { /* watcher process */
527 fp
= fopen(pid_file
, "w");
529 fprintf(fp
, "%d\n", getpid());
533 waitpid(current_child
, &status
, 0);
538 /* Did the main process exit with an actual exit code? */
539 if (WIFEXITED(status
)) {
541 /* Exit code 0 means the watcher should exit */
542 if (WEXITSTATUS(status
) == 0) {
546 /* Exit code 101-109 means the watcher should exit */
547 else if ( (WEXITSTATUS(status
) >= 101) && (WEXITSTATUS(status
) <= 109) ) {
551 /* Any other exit code means we should restart. */
557 /* Any other type of termination (signals, etc.) should also restart. */
562 } while (do_restart
);
567 ShutDownLibCitadel ();
568 exit(WEXITSTATUS(status
));
572 * Spawn an additional worker thread into the pool.
574 void spawn_another_worker_thread()
576 pthread_t SessThread
; /* Thread descriptor */
577 pthread_attr_t attr
; /* Thread attributes */
580 lprintf(3, "Creating a new thread\n");
582 /* set attributes for the new thread */
583 pthread_attr_init(&attr
);
584 pthread_attr_setdetachstate(&attr
, PTHREAD_CREATE_DETACHED
);
587 * Our per-thread stacks need to be bigger than the default size, otherwise
588 * the MIME parser crashes on FreeBSD, and the IMAP service crashes on
591 if ((ret
= pthread_attr_setstacksize(&attr
, 1024 * 1024))) {
592 lprintf(1, "pthread_attr_setstacksize: %s\n",
594 pthread_attr_destroy(&attr
);
597 /* now create the thread */
598 if (pthread_create(&SessThread
, &attr
,
599 (void *(*)(void *)) worker_entry
, NULL
)
601 lprintf(1, "Can't create thread: %s\n", strerror(errno
));
604 /* free up the attributes */
605 pthread_attr_destroy(&attr
);
608 /* #define DBG_PRINNT_HOOKS_AT_START */
609 #ifdef DBG_PRINNT_HOOKS_AT_START
610 const char foobuf
[32];
611 const char *nix(void *vptr
) {snprintf(foobuf
, 32, "%0x", (long) vptr
); return foobuf
;}
613 extern int dbg_analyze_msg
;
614 extern int dbg_bactrace_template_errors
;
615 void InitTemplateCache(void);
616 extern int LoadTemplates
;
617 extern void LoadZoneFiles(void);
618 StrBuf
*csslocal
= NULL
;
620 * Here's where it all begins.
622 int main(int argc
, char **argv
)
624 pthread_t SessThread
; /* Thread descriptor */
625 pthread_attr_t attr
; /* Thread attributes */
626 int a
, i
; /* General-purpose variables */
627 char tracefile
[PATH_MAX
];
628 char ip_addr
[256]="0.0.0.0";
629 char dirbuffer
[PATH_MAX
]="";
632 int home_specified
=0;
633 char relhome
[PATH_MAX
]="";
634 char webcitdir
[PATH_MAX
] = DATADIR
;
635 char *pidfile
= NULL
;
641 #endif /* ENABLE_NLS */
642 char uds_listen_path
[PATH_MAX
]; /* listen on a unix domain socket? */
644 WildFireInitBacktrace(argv
[0], 2);
646 HandlerHash
= NewHash(1, NULL
);
647 PreferenceHooks
= NewHash(1, NULL
);
648 WirelessTemplateCache
= NewHash(1, NULL
);
649 WirelessLocalTemplateCache
= NewHash(1, NULL
);
650 LocalTemplateCache
= NewHash(1, NULL
);
651 TemplateCache
= NewHash(1, NULL
);
652 GlobalNS
= NewHash(1, NULL
);
653 Iterators
= NewHash(1, NULL
);
654 Conditionals
= NewHash(1, NULL
);
655 MsgHeaderHandler
= NewHash(1, NULL
);
656 MimeRenderHandler
= NewHash(1, NULL
);
657 SortHash
= NewHash(1, NULL
);
661 #ifdef DBG_PRINNT_HOOKS_AT_START
662 dbg_PrintHash(HandlerHash
, nix
, NULL
);
665 /* Ensure that we are linked to the correct version of libcitadel */
666 if (libcitadel_version_number() < LIBCITADEL_VERSION_NUMBER
) {
667 fprintf(stderr
, " You are running libcitadel version %d.%02d\n",
668 (libcitadel_version_number() / 100), (libcitadel_version_number() % 100));
669 fprintf(stderr
, "WebCit was compiled against version %d.%02d\n",
670 (LIBCITADEL_VERSION_NUMBER
/ 100), (LIBCITADEL_VERSION_NUMBER
% 100));
674 strcpy(uds_listen_path
, "");
676 /* Parse command line */
678 while ((a
= getopt(argc
, argv
, "h:i:p:t:T:x:dD:cfsZ")) != EOF
)
680 while ((a
= getopt(argc
, argv
, "h:i:p:t:T:x:dD:cfZ")) != EOF
)
684 hdir
= strdup(optarg
);
686 if (!relh
) safestrncpy(webcitdir
, hdir
,
689 safestrncpy(relhome
, relhome
,
691 /* free(hdir); TODO: SHOULD WE DO THIS? */
696 running_as_daemon
= 1;
699 pidfile
= strdup(optarg
);
700 running_as_daemon
= 1;
703 safestrncpy(ip_addr
, optarg
, sizeof ip_addr
);
706 http_port
= atoi(optarg
);
707 if (http_port
== 0) {
708 safestrncpy(uds_listen_path
, optarg
, sizeof uds_listen_path
);
712 safestrncpy(tracefile
, optarg
, sizeof tracefile
);
713 freopen(tracefile
, "w", stdout
);
714 freopen(tracefile
, "w", stderr
);
715 freopen(tracefile
, "r", stdin
);
718 LoadTemplates
= atoi(optarg
);
719 dbg_analyze_msg
= (LoadTemplates
&& (1<<1)) != 0;
720 dbg_bactrace_template_errors
= (LoadTemplates
&& (1<<2)) != 0;
726 verbosity
= atoi(optarg
);
732 server_cookie
= malloc(256);
733 if (server_cookie
!= NULL
) {
734 safestrncpy(server_cookie
,
735 "Set-cookie: wcserver=",
738 (&server_cookie
[strlen(server_cookie
)],
740 lprintf(2, "gethostname: %s\n",
750 fprintf(stderr
, "usage: webcit "
751 "[-i ip_addr] [-p http_port] "
752 "[-t tracefile] [-c] [-f] "
753 "[-T Templatedebuglevel] "
758 "[remotehost [remoteport]]\n");
763 ctdlhost
= argv
[optind
];
765 ctdlport
= argv
[optind
];
768 /* daemonize, if we were asked to */
769 if (running_as_daemon
) {
770 start_daemon(pidfile
);
773 signal(SIGHUP
, graceful_shutdown
);
776 /* Tell 'em who's in da house */
777 lprintf(1, PACKAGE_STRING
"\n");
778 lprintf(1, "Copyright (C) 1996-2009 by the Citadel development team.\n"
779 "This software is distributed under the terms of the "
780 "GNU General Public License.\n\n"
784 /* initialize the International Bright Young Thing */
786 initialize_locales();
788 locale
= setlocale(LC_ALL
, "");
790 mo
= malloc(strlen(webcitdir
) + 20);
791 lprintf(9, "Message catalog directory: %s\n", bindtextdomain("webcit", LOCALEDIR
"/locale"));
793 lprintf(9, "Text domain: %s\n", textdomain("webcit"));
794 lprintf(9, "Text domain Charset: %s\n", bind_textdomain_codeset("webcit","UTF8"));
799 /* calculate all our path on a central place */
800 /* where to keep our config */
802 #define COMPUTE_DIRECTORY(SUBDIR) memcpy(dirbuffer,SUBDIR, sizeof dirbuffer);\
803 snprintf(SUBDIR,sizeof SUBDIR, "%s%s%s%s%s%s%s", \
804 (home&!relh)?webcitdir:basedir, \
805 ((basedir!=webcitdir)&(home&!relh))?basedir:"/", \
806 ((basedir!=webcitdir)&(home&!relh))?"/":"", \
808 (relhome[0]!='\0')?"/":"",\
810 (dirbuffer[0]!='\0')?"/":"");
812 COMPUTE_DIRECTORY(socket_dir
);
813 basedir
=WWWDIR
"/static";
814 COMPUTE_DIRECTORY(static_dir
);
815 basedir
=WWWDIR
"/static/icons";
816 COMPUTE_DIRECTORY(static_icon_dir
);
817 basedir
=WWWDIR
"/static.local";
818 COMPUTE_DIRECTORY(static_local_dir
);
820 snprintf(file_crpt_file_key
,
821 sizeof file_crpt_file_key
,
824 snprintf(file_crpt_file_csr
,
825 sizeof file_crpt_file_csr
,
828 snprintf(file_crpt_file_cer
,
829 sizeof file_crpt_file_cer
,
833 /* we should go somewhere we can leave our coredump, if enabled... */
834 lprintf(9, "Changing directory to %s\n", socket_dir
);
835 if (chdir(webcitdir
) != 0) {
838 LoadIconDir(static_icon_dir
);
840 initialise_modules();
841 initialize_viewdefs();
846 if (!access("static.local/webcit.css", R_OK
)) {
847 csslocal
= NewStrBufPlain(HKEY("<link href=\"static.local/webcit.css\" rel=\"stylesheet\" type=\"text/css\">"));
850 /* Tell libical to return an error instead of aborting if it sees badly formed iCalendar data. */
851 icalerror_errors_are_fatal
= 0;
853 /* Use our own prefix on tzid's generated from system tzdata */
854 icaltimezone_set_tzid_prefix("/citadel.org/");
857 * Set up a place to put thread-specific data.
858 * We only need a single pointer per thread - it points to the
859 * wcsession struct to which the thread is currently bound.
861 if (pthread_key_create(&MyConKey
, NULL
) != 0) {
862 lprintf(1, "Can't create TSD key: %s\n", strerror(errno
));
864 InitialiseSemaphores ();
867 * Set up a place to put thread-specific SSL data.
868 * We don't stick this in the wcsession struct because SSL starts
869 * up before the session is bound, and it gets torn down between
873 if (pthread_key_create(&ThreadSSL
, NULL
) != 0) {
874 lprintf(1, "Can't create TSD key: %s\n", strerror(errno
));
879 * Bind the server to our favorite port.
880 * There is no need to check for errors, because ig_tcp_server()
881 * exits if it doesn't succeed.
884 if (!IsEmptyStr(uds_listen_path
)) {
885 lprintf(2, "Attempting to create listener socket at %s...\n", uds_listen_path
);
886 msock
= ig_uds_server(uds_listen_path
, LISTEN_QUEUE_LENGTH
);
889 lprintf(2, "Attempting to bind to port %d...\n", http_port
);
890 msock
= ig_tcp_server(ip_addr
, http_port
, LISTEN_QUEUE_LENGTH
);
893 lprintf(2, "Listening on socket %d\n", msock
);
894 signal(SIGPIPE
, SIG_IGN
);
896 pthread_mutex_init(&SessionListMutex
, NULL
);
899 * Start up the housekeeping thread
901 pthread_attr_init(&attr
);
902 pthread_attr_setdetachstate(&attr
, PTHREAD_CREATE_DETACHED
);
903 pthread_create(&SessThread
, &attr
,
904 (void *(*)(void *)) housekeeping_loop
, NULL
);
908 * If this is an HTTPS server, fire up SSL
916 /* Start a few initial worker threads */
917 for (i
= 0; i
< (MIN_WORKER_THREADS
); ++i
) {
918 spawn_another_worker_thread();
921 /* now the original thread becomes another worker */
923 ShutDownLibCitadel ();
924 DeleteHash(&HandlerHash
);
925 DeleteHash(&PreferenceHooks
);
930 void ShutDownWebcit(void)
932 DeleteHash(&ZoneHash
);
933 free_zone_directory ();
934 icaltimezone_release_zone_tab ();
935 icalmemory_free_ring ();
936 ShutDownLibCitadel ();
937 DeleteHash(&HandlerHash
);
938 DeleteHash(&PreferenceHooks
);
939 DeleteHash(&GlobalNS
);
940 DeleteHash(&WirelessTemplateCache
);
941 DeleteHash(&WirelessLocalTemplateCache
);
942 DeleteHash(&TemplateCache
);
943 DeleteHash(&LocalTemplateCache
);
944 DeleteHash(&Iterators
);
945 DeleteHash(&MimeRenderHandler
);
946 DeleteHash(&Conditionals
);
947 DeleteHash(&MsgHeaderHandler
);
948 DeleteHash(&SortHash
);
960 * Entry point for worker threads
962 void worker_entry(void)
966 int fail_this_transaction
= 0;
969 fd_set readset
, tempset
;
974 FD_SET(msock
, &readset
);
977 /* Only one thread can accept at a time */
978 fail_this_transaction
= 0;
982 ret
= -1; /* just one at once should select... */
983 begin_critical_section(S_SELECT
);
986 if (msock
> 0) FD_SET(msock
, &tempset
);
989 if (msock
> 0) ret
= select(msock
+1, &tempset
, NULL
, NULL
, &tv
);
990 end_critical_section(S_SELECT
);
991 if ((ret
< 0) && (errno
!= EINTR
) && (errno
!= EAGAIN
))
992 {/* EINTR and EAGAIN are thrown but not of interest. */
993 lprintf(2, "accept() failed:%d %s\n",
994 errno
, strerror(errno
));
996 else if ((ret
> 0) && (msock
> 0) && FD_ISSET(msock
, &tempset
))
997 {/* Successfully selected, and still not shutting down? Accept! */
998 ssock
= accept(msock
, NULL
, 0);
1001 } while ((msock
> 0) && (ssock
< 0) && (time_to_die
== 0));
1003 if ((msock
== -1)||(time_to_die
))
1004 {/* ok, we're going down. */
1007 /* the first to come here will have to do the cleanup.
1008 * make shure its realy just one.
1010 begin_critical_section(S_SHUTDOWN
);
1016 end_critical_section(S_SHUTDOWN
);
1018 {/* we're the one to cleanup the mess. */
1019 lprintf(2, "I'm master shutdown: tagging sessions to be killed.\n");
1020 shutdown_sessions();
1021 lprintf(2, "master shutdown: waiting for others\n");
1022 sleeeeeeeeeep(1); /* wait so some others might finish... */
1023 lprintf(2, "master shutdown: cleaning up sessions\n");
1025 lprintf(2, "master shutdown: cleaning up libical\n");
1029 lprintf(2, "master shutdown exiting!.\n");
1034 if (ssock
< 0 ) continue;
1037 if (ssock
> 0) close (ssock
);
1038 lprintf(2, "inbetween.");
1040 } else { /* Got it? do some real work! */
1041 /* Set the SO_REUSEADDR socket option */
1043 setsockopt(ssock
, SOL_SOCKET
, SO_REUSEADDR
,
1046 /* If we are an HTTPS server, go crypto now. */
1049 if (starttls(ssock
) != 0) {
1050 fail_this_transaction
= 1;
1056 if (fail_this_transaction
== 0) {
1058 /* Perform an HTTP transaction... */
1059 context_loop(&ssock
);
1061 /* Shut down SSL/TLS if required... */
1068 /* ...and close the socket. */
1070 lingering_close(ssock
);
1075 } while (!time_to_die
);
1077 lprintf (1, "bye\n");
1082 * print log messages
1083 * logs to stderr if loglevel is lower than the verbosity set at startup
1085 * loglevel level of the message
1086 * format the printf like format string
1087 * ... the strings to put into format
1089 int lprintf(int loglevel
, const char *format
, ...)
1093 if (loglevel
<= verbosity
) {
1094 va_start(ap
, format
);
1095 vfprintf(stderr
, format
, ap
);
1104 * print the actual stack frame.
1106 void wc_backtrace(void)
1108 #ifdef HAVE_BACKTRACE
1109 void *stack_frames
[50];
1114 size
= backtrace(stack_frames
, sizeof(stack_frames
) / sizeof(void*));
1115 strings
= backtrace_symbols(stack_frames
, size
);
1116 for (i
= 0; i
< size
; i
++) {
1117 if (strings
!= NULL
)
1118 lprintf(1, "%s\n", strings
[i
]);
1120 lprintf(1, "%p\n", stack_frames
[i
]);