diff options
| author | erdgeist <> | 2008-10-04 05:40:51 +0000 |
|---|---|---|
| committer | erdgeist <> | 2008-10-04 05:40:51 +0000 |
| commit | e534db03c6877f8ac0559f63840e9a00e9bd43bf (patch) | |
| tree | 811181b9b39d0484e28eb25cbb9f2eea094978e2 /opentracker.c | |
| parent | 8cbfc8602c73e55770f3c06d8ea42758b22a0401 (diff) | |
added live sync code
added a config file parser
added tracker id
changed WANT_CLOSED_TRACKER and WANT_BLACKLIST into WANT_ACCESS_WHITE and WANT_ACCESS_BLACK
changed WANT_TRACKER_SYNC to WANT_SYNC_BATCH and added WANT_SYNC_LIVE
added an option to switch off fullscrapes
cleaned up many internal hardcoded values, like PROTO_FLAG,
Diffstat (limited to 'opentracker.c')
| -rw-r--r-- | opentracker.c | 179 |
1 files changed, 139 insertions, 40 deletions
diff --git a/opentracker.c b/opentracker.c index fda914a..b7431d4 100644 --- a/opentracker.c +++ b/opentracker.c | |||
| @@ -8,12 +8,14 @@ | |||
| 8 | #include <string.h> | 8 | #include <string.h> |
| 9 | #include <sys/types.h> | 9 | #include <sys/types.h> |
| 10 | #include <sys/socket.h> | 10 | #include <sys/socket.h> |
| 11 | #include <arpa/inet.h> | ||
| 11 | #include <unistd.h> | 12 | #include <unistd.h> |
| 12 | #include <stdlib.h> | 13 | #include <stdlib.h> |
| 13 | #include <errno.h> | 14 | #include <errno.h> |
| 14 | #include <signal.h> | 15 | #include <signal.h> |
| 15 | #include <stdio.h> | 16 | #include <stdio.h> |
| 16 | #include <pwd.h> | 17 | #include <pwd.h> |
| 18 | #include <ctype.h> | ||
| 17 | #include <arpa/inet.h> | 19 | #include <arpa/inet.h> |
| 18 | 20 | ||
| 19 | /* Libowfat */ | 21 | /* Libowfat */ |
| @@ -21,6 +23,7 @@ | |||
| 21 | #include "io.h" | 23 | #include "io.h" |
| 22 | #include "iob.h" | 24 | #include "iob.h" |
| 23 | #include "array.h" | 25 | #include "array.h" |
| 26 | #include "byte.h" | ||
| 24 | #include "fmt.h" | 27 | #include "fmt.h" |
| 25 | #include "scan.h" | 28 | #include "scan.h" |
| 26 | #include "ip4.h" | 29 | #include "ip4.h" |
| @@ -34,17 +37,18 @@ | |||
| 34 | #include "ot_clean.h" | 37 | #include "ot_clean.h" |
| 35 | #include "ot_accesslist.h" | 38 | #include "ot_accesslist.h" |
| 36 | #include "ot_stats.h" | 39 | #include "ot_stats.h" |
| 40 | #include "ot_livesync.h" | ||
| 37 | 41 | ||
| 38 | /* Globals */ | 42 | /* Globals */ |
| 39 | time_t g_now; | 43 | time_t g_now; |
| 40 | char * g_redirecturl = NULL; | 44 | char * g_redirecturl = NULL; |
| 45 | uint32_t g_tracker_id; | ||
| 46 | |||
| 47 | static char * g_serverdir = NULL; | ||
| 41 | 48 | ||
| 42 | /* To always have space for error messages ;) */ | 49 | /* To always have space for error messages ;) */ |
| 43 | static char static_inbuf[8192]; | 50 | static char static_inbuf[8192]; |
| 44 | 51 | ||
| 45 | static char *FLAG_TCP = "T"; | ||
| 46 | static char *FLAG_UDP = "U"; | ||
| 47 | |||
| 48 | static void panic( const char *routine ) { | 52 | static void panic( const char *routine ) { |
| 49 | fprintf( stderr, "%s: %s\n", routine, strerror(errno) ); | 53 | fprintf( stderr, "%s: %s\n", routine, strerror(errno) ); |
| 50 | exit( 111 ); | 54 | exit( 111 ); |
| @@ -63,10 +67,10 @@ static void signal_handler( int s ) { | |||
| 63 | } | 67 | } |
| 64 | 68 | ||
| 65 | static void usage( char *name ) { | 69 | static void usage( char *name ) { |
| 66 | fprintf( stderr, "Usage: %s [-i ip] [-p port] [-P port] [-r redirect] [-d dir] [-A ip]" | 70 | fprintf( stderr, "Usage: %s [-i ip] [-p port] [-P port] [-r redirect] [-d dir] [-A ip] [-f config] [-s livesyncport]" |
| 67 | #ifdef WANT_BLACKLISTING | 71 | #ifdef WANT_ACCESSLIST_BLACK |
| 68 | " [-b blacklistfile]" | 72 | " [-b blacklistfile]" |
| 69 | #elif defined ( WANT_CLOSED_TRACKER ) | 73 | #elif defined ( WANT_ACCESSLIST_WHITE ) |
| 70 | " [-w whitelistfile]" | 74 | " [-w whitelistfile]" |
| 71 | #endif | 75 | #endif |
| 72 | "\n", name ); | 76 | "\n", name ); |
| @@ -82,9 +86,9 @@ static void help( char *name ) { | |||
| 82 | HELPLINE("-r redirecturl","specify url where / should be redirected to (default none)"); | 86 | HELPLINE("-r redirecturl","specify url where / should be redirected to (default none)"); |
| 83 | HELPLINE("-d dir","specify directory to try to chroot to (default: \".\")"); | 87 | HELPLINE("-d dir","specify directory to try to chroot to (default: \".\")"); |
| 84 | HELPLINE("-A ip","bless an ip address as admin address (e.g. to allow syncs from this address)"); | 88 | HELPLINE("-A ip","bless an ip address as admin address (e.g. to allow syncs from this address)"); |
| 85 | #ifdef WANT_BLACKLISTING | 89 | #ifdef WANT_ACCESSLIST_BLACK |
| 86 | HELPLINE("-b file","specify blacklist file."); | 90 | HELPLINE("-b file","specify blacklist file."); |
| 87 | #elif defined( WANT_CLOSED_TRACKER ) | 91 | #elif defined( WANT_ACCESSLIST_WHITE ) |
| 88 | HELPLINE("-w file","specify whitelist file."); | 92 | HELPLINE("-w file","specify whitelist file."); |
| 89 | #endif | 93 | #endif |
| 90 | 94 | ||
| @@ -168,7 +172,7 @@ static void handle_accept( const int64 serversocket ) { | |||
| 168 | memset( h, 0, sizeof( struct http_data ) ); | 172 | memset( h, 0, sizeof( struct http_data ) ); |
| 169 | memmove( h->ip, ip, sizeof( ip ) ); | 173 | memmove( h->ip, ip, sizeof( ip ) ); |
| 170 | 174 | ||
| 171 | stats_issue_event( EVENT_ACCEPT, 1, ntohl(*(uint32_t*)ip)); | 175 | stats_issue_event( EVENT_ACCEPT, FLAG_TCP, ntohl(*(uint32_t*)ip)); |
| 172 | 176 | ||
| 173 | /* That breaks taia encapsulation. But there is no way to take system | 177 | /* That breaks taia encapsulation. But there is no way to take system |
| 174 | time this often in FreeBSD and libowfat does not allow to set unix time */ | 178 | time this often in FreeBSD and libowfat does not allow to set unix time */ |
| @@ -194,10 +198,12 @@ static void server_mainloop( ) { | |||
| 194 | 198 | ||
| 195 | while( ( i = io_canread( ) ) != -1 ) { | 199 | while( ( i = io_canread( ) ) != -1 ) { |
| 196 | const void *cookie = io_getcookie( i ); | 200 | const void *cookie = io_getcookie( i ); |
| 197 | if( cookie == FLAG_TCP ) | 201 | if( (int)cookie == FLAG_TCP ) |
| 198 | handle_accept( i ); | 202 | handle_accept( i ); |
| 199 | else if( cookie == FLAG_UDP ) | 203 | else if( (int)cookie == FLAG_UDP ) |
| 200 | handle_udp4( i ); | 204 | handle_udp4( i ); |
| 205 | else if( (int)cookie == FLAG_MCA ) | ||
| 206 | handle_livesync(i); | ||
| 201 | else | 207 | else |
| 202 | handle_read( i ); | 208 | handle_read( i ); |
| 203 | } | 209 | } |
| @@ -214,6 +220,8 @@ static void server_mainloop( ) { | |||
| 214 | next_timeout_check = g_now + OT_CLIENT_TIMEOUT_CHECKINTERVAL; | 220 | next_timeout_check = g_now + OT_CLIENT_TIMEOUT_CHECKINTERVAL; |
| 215 | } | 221 | } |
| 216 | 222 | ||
| 223 | livesync_ticker(); | ||
| 224 | |||
| 217 | /* See if we need to move our pools */ | 225 | /* See if we need to move our pools */ |
| 218 | if( NOW != ot_last_clean_time ) { | 226 | if( NOW != ot_last_clean_time ) { |
| 219 | ot_last_clean_time = NOW; | 227 | ot_last_clean_time = NOW; |
| @@ -225,55 +233,148 @@ static void server_mainloop( ) { | |||
| 225 | } | 233 | } |
| 226 | } | 234 | } |
| 227 | 235 | ||
| 228 | static void ot_try_bind( char ip[4], uint16 port, int is_tcp ) { | 236 | int64_t ot_try_bind( char ip[4], uint16_t port, PROTO_FLAG proto ) { |
| 229 | int64 s = is_tcp ? socket_tcp4( ) : socket_udp4(); | 237 | int64 s = proto == FLAG_TCP ? socket_tcp4( ) : socket_udp4(); |
| 230 | 238 | ||
| 231 | if( socket_bind4_reuse( s, ip, port ) == -1 ) | 239 | if( socket_bind4_reuse( s, ip, port ) == -1 ) |
| 232 | panic( "socket_bind4_reuse" ); | 240 | panic( "socket_bind4_reuse" ); |
| 233 | 241 | ||
| 234 | if( is_tcp && ( socket_listen( s, SOMAXCONN) == -1 ) ) | 242 | if( ( proto == FLAG_TCP ) && ( socket_listen( s, SOMAXCONN) == -1 ) ) |
| 235 | panic( "socket_listen" ); | 243 | panic( "socket_listen" ); |
| 236 | 244 | ||
| 237 | if( !io_fd( s ) ) | 245 | if( !io_fd( s ) ) |
| 238 | panic( "io_fd" ); | 246 | panic( "io_fd" ); |
| 239 | 247 | ||
| 240 | io_setcookie( s, is_tcp ? FLAG_TCP : FLAG_UDP ); | 248 | io_setcookie( s, (void*)proto ); |
| 241 | 249 | ||
| 242 | io_wantread( s ); | 250 | io_wantread( s ); |
| 251 | |||
| 252 | return s; | ||
| 253 | } | ||
| 254 | |||
| 255 | char * set_config_option( char **option, char *value ) { | ||
| 256 | while( isspace(*value) ) ++value; | ||
| 257 | if( *option ) free( *option ); | ||
| 258 | return *option = strdup( value ); | ||
| 259 | } | ||
| 260 | |||
| 261 | /* WARNING! Does not behave like scan_ip4 regarding return values */ | ||
| 262 | static int scan_ip4_port( const char *src, char *ip, uint16 *port ) { | ||
| 263 | int off; | ||
| 264 | while( isspace(*src) ) ++src; | ||
| 265 | if( !(off = scan_ip4( src, ip ) ) ) | ||
| 266 | return -1; | ||
| 267 | src += off; | ||
| 268 | if( *src == 0 ) return 0; | ||
| 269 | if( *src != ':' ) | ||
| 270 | return -1; | ||
| 271 | *port = atol(src+1); | ||
| 272 | return 0; | ||
| 273 | } | ||
| 274 | |||
| 275 | int parse_configfile( char * config_filename ) { | ||
| 276 | FILE * accesslist_filehandle; | ||
| 277 | char inbuf[512], tmpip[4]; | ||
| 278 | int bound = 0; | ||
| 279 | |||
| 280 | accesslist_filehandle = fopen( config_filename, "r" ); | ||
| 281 | |||
| 282 | if( accesslist_filehandle == NULL ) { | ||
| 283 | fprintf( stderr, "Warning: Can't open config file: %s.", config_filename ); | ||
| 284 | return 0; | ||
| 285 | } | ||
| 286 | |||
| 287 | while( fgets( inbuf, sizeof(inbuf), accesslist_filehandle ) ) { | ||
| 288 | char *newl; | ||
| 289 | char *p = inbuf; | ||
| 290 | |||
| 291 | /* Skip white spaces */ | ||
| 292 | while(isspace(*p)) ++p; | ||
| 293 | |||
| 294 | /* Ignore comments and empty lines */ | ||
| 295 | if((*p=='#')||(*p=='\n')||(*p==0)) continue; | ||
| 296 | |||
| 297 | /* chomp */ | ||
| 298 | if(( newl = strchr(p, '\n' ))) *newl = 0; | ||
| 299 | |||
| 300 | /* Scan for commands */ | ||
| 301 | if(!byte_diff(p,15,"tracker.rootdir" ) && isspace(p[15])) { | ||
| 302 | set_config_option( &g_serverdir, p+16 ); | ||
| 303 | } else if(!byte_diff(p,10,"listen.tcp" ) && isspace(p[10])) { | ||
| 304 | uint16_t tmpport = 6969; | ||
| 305 | if( scan_ip4_port( p+11, tmpip, &tmpport )) goto parse_error; | ||
| 306 | ot_try_bind( tmpip, tmpport, FLAG_TCP ); | ||
| 307 | ++bound; | ||
| 308 | } else if(!byte_diff(p, 10, "listen.udp" ) && isspace(p[10])) { | ||
| 309 | uint16_t tmpport = 6969; | ||
| 310 | if( scan_ip4_port( p+11, tmpip, &tmpport )) goto parse_error; | ||
| 311 | ot_try_bind( tmpip, tmpport, FLAG_UDP ); | ||
| 312 | ++bound; | ||
| 313 | #ifdef WANT_ACCESSLIST_BLACK | ||
| 314 | } else if(!byte_diff(p, 16, "access.whitelist" ) && isspace(p[16])) { | ||
| 315 | set_config_option( &g_accesslist_filename, p+17 ); | ||
| 316 | #elif defined( WANT_ACCESSLIST_WHITE ) | ||
| 317 | } else if(!byte_diff(p, 16, "access.blacklist" ) && isspace(p[16])) { | ||
| 318 | set_config_option( &g_accesslist_filename, p+17 ); | ||
| 319 | #endif | ||
| 320 | } else if(!byte_diff(p, 20, "tracker.redirect_url" ) && isspace(p[20])) { | ||
| 321 | set_config_option( &g_redirecturl, p+21 ); | ||
| 322 | #ifdef WANT_SYNC_BATCH | ||
| 323 | } else if(!byte_diff(p, 26, "batchsync.cluster.admin_ip" ) && isspace(p[26])) { | ||
| 324 | if(!scan_ip4( p+27, tmpip )) goto parse_error; | ||
| 325 | accesslist_blessip( tmpip, OT_PERMISSION_MAY_SYNC ); | ||
| 326 | #endif | ||
| 327 | #ifdef WANT_SYNC_LIVE | ||
| 328 | } else if(!byte_diff(p, 24, "livesync.cluster.node_ip" ) && isspace(p[24])) { | ||
| 329 | if( !scan_ip4( p+25, tmpip )) goto parse_error; | ||
| 330 | accesslist_blessip( tmpip, OT_PERMISSION_MAY_LIVESYNC ); | ||
| 331 | } else if(!byte_diff(p, 23, "livesync.cluster.listen" ) && isspace(p[23])) { | ||
| 332 | uint16_t tmpport = LIVESYNC_PORT; | ||
| 333 | if( scan_ip4_port( p+24, tmpip, &tmpport )) goto parse_error; | ||
| 334 | livesync_bind_mcast( tmpip, tmpport ); | ||
| 335 | #endif | ||
| 336 | } else | ||
| 337 | fprintf( stderr, "Unhandled line in config file: %s\n", inbuf ); | ||
| 338 | continue; | ||
| 339 | parse_error: | ||
| 340 | fprintf( stderr, "Parse error in config file: %s\n", inbuf); | ||
| 341 | } | ||
| 342 | fclose( accesslist_filehandle ); | ||
| 343 | return bound; | ||
| 243 | } | 344 | } |
| 244 | 345 | ||
| 245 | int main( int argc, char **argv ) { | 346 | int main( int argc, char **argv ) { |
| 246 | struct passwd *pws = NULL; | 347 | struct passwd *pws = NULL; |
| 247 | char serverip[4] = {0,0,0,0}, tmpip[4]; | 348 | char serverip[4] = {0,0,0,0}, tmpip[4]; |
| 248 | char *serverdir = "."; | ||
| 249 | int bound = 0, scanon = 1; | 349 | int bound = 0, scanon = 1; |
| 250 | #ifdef WANT_ACCESS_CONTROL | 350 | |
| 251 | char *accesslist_filename = NULL; | 351 | while( scanon ) { |
| 252 | #endif | 352 | switch( getopt( argc, argv, ":i:p:A:P:d:r:s:f:v" |
| 253 | 353 | #ifdef WANT_ACCESSLIST_BLACK | |
| 254 | while( scanon ) { | ||
| 255 | switch( getopt( argc, argv, ":i:p:A:P:d:r:v" | ||
| 256 | #ifdef WANT_BLACKLISTING | ||
| 257 | "b:" | 354 | "b:" |
| 258 | #elif defined( WANT_CLOSED_TRACKER ) | 355 | #elif defined( WANT_ACCESSLIST_WHITE ) |
| 259 | "w:" | 356 | "w:" |
| 260 | #endif | 357 | #endif |
| 261 | "h" ) ) { | 358 | "h" ) ) { |
| 262 | case -1 : scanon = 0; break; | 359 | case -1 : scanon = 0; break; |
| 263 | case 'i': scan_ip4( optarg, serverip ); break; | 360 | case 'i': scan_ip4( optarg, serverip ); break; |
| 264 | #ifdef WANT_BLACKLISTING | 361 | #ifdef WANT_ACCESSLIST_BLACK |
| 265 | case 'b': accesslist_filename = optarg; break; | 362 | case 'b': set_config_option( &g_accesslist_filename, optarg); break; |
| 266 | #elif defined( WANT_CLOSED_TRACKER ) | 363 | #elif defined( WANT_ACCESSLIST_WHITE ) |
| 267 | case 'w': accesslist_filename = optarg; break; | 364 | case 'w': set_config_option( &g_accesslist_filename, optarg); break; |
| 268 | #endif | 365 | #endif |
| 269 | case 'p': ot_try_bind( serverip, (uint16)atol( optarg ), 1 ); bound++; break; | 366 | case 'p': ot_try_bind( serverip, (uint16)atol( optarg ), FLAG_TCP ); bound++; break; |
| 270 | case 'P': ot_try_bind( serverip, (uint16)atol( optarg ), 0 ); bound++; break; | 367 | case 'P': ot_try_bind( serverip, (uint16)atol( optarg ), FLAG_UDP ); bound++; break; |
| 271 | case 'd': serverdir = optarg; break; | 368 | #ifdef WANT_SYNC_LIVE |
| 272 | case 'r': g_redirecturl = optarg; break; | 369 | case 's': livesync_bind_mcast( serverip, (uint16)atol( optarg )); break; |
| 370 | #endif | ||
| 371 | case 'd': set_config_option( &g_serverdir, optarg ); break; | ||
| 372 | case 'r': set_config_option( &g_redirecturl, optarg ); break; | ||
| 273 | case 'A': | 373 | case 'A': |
| 274 | scan_ip4( optarg, tmpip ); | 374 | scan_ip4( optarg, tmpip ); |
| 275 | accesslist_blessip( tmpip, 0xffff ); /* Allow everything for now */ | 375 | accesslist_blessip( tmpip, 0xffff ); /* Allow everything for now */ |
| 276 | break; | 376 | break; |
| 377 | case 'f': bound += parse_configfile( optarg ); break; | ||
| 277 | case 'h': help( argv[0] ); exit( 0 ); | 378 | case 'h': help( argv[0] ); exit( 0 ); |
| 278 | case 'v': write( 2, static_inbuf, stats_return_tracker_version( static_inbuf )); exit( 0 ); | 379 | case 'v': write( 2, static_inbuf, stats_return_tracker_version( static_inbuf )); exit( 0 ); |
| 279 | default: | 380 | default: |
| @@ -283,8 +384,8 @@ int main( int argc, char **argv ) { | |||
| 283 | 384 | ||
| 284 | /* Bind to our default tcp/udp ports */ | 385 | /* Bind to our default tcp/udp ports */ |
| 285 | if( !bound) { | 386 | if( !bound) { |
| 286 | ot_try_bind( serverip, 6969, 1 ); | 387 | ot_try_bind( serverip, 6969, FLAG_TCP ); |
| 287 | ot_try_bind( serverip, 6969, 0 ); | 388 | ot_try_bind( serverip, 6969, FLAG_UDP ); |
| 288 | } | 389 | } |
| 289 | 390 | ||
| 290 | /* Drop permissions */ | 391 | /* Drop permissions */ |
| @@ -298,15 +399,13 @@ int main( int argc, char **argv ) { | |||
| 298 | } | 399 | } |
| 299 | endpwent(); | 400 | endpwent(); |
| 300 | 401 | ||
| 301 | accesslist_init( accesslist_filename ); | ||
| 302 | |||
| 303 | signal( SIGPIPE, SIG_IGN ); | 402 | signal( SIGPIPE, SIG_IGN ); |
| 304 | signal( SIGINT, signal_handler ); | 403 | signal( SIGINT, signal_handler ); |
| 305 | signal( SIGALRM, signal_handler ); | 404 | signal( SIGALRM, signal_handler ); |
| 306 | 405 | ||
| 307 | g_now = time( NULL ); | 406 | g_now = time( NULL ); |
| 308 | 407 | ||
| 309 | if( trackerlogic_init( serverdir ) == -1 ) | 408 | if( trackerlogic_init( g_serverdir ? g_serverdir : "." ) == -1 ) |
| 310 | panic( "Logic not started" ); | 409 | panic( "Logic not started" ); |
| 311 | 410 | ||
| 312 | alarm(5); | 411 | alarm(5); |
