+ * Initialize a struct sender status.
+ *
+ * \param ss The struct to initialize.
+ * \param acl_opt_result Contains array of --{http|dccp}-access arguments.
+ * \param listen_address_opt_result Where to listen on.
+ * \param default_port Used for addresses with no specified port.
+ * \param max_clients The maximal number of simultaneous connections.
+ * \param default_deny Whether a blacklist should be used for access control.
+ */
+void init_sender_status(struct sender_status *ss,
+ const struct lls_opt_result *acl_opt_result,
+ const struct lls_opt_result *listen_address_opt_result,
+ int default_port, int max_clients, int default_deny)
+{
+ int i;
+ unsigned n = lls_opt_given(listen_address_opt_result);
+
+ if (n == 0) {
+ ss->num_listen_fds = 1;
+ ss->listen_addresses = para_malloc(sizeof(char *));
+ ss->listen_addresses[0] = NULL;
+ ss->listen_fds = para_malloc(sizeof(int));
+ ss->listen_fds[0] = -1;
+ } else {
+ ss->num_listen_fds = n;
+ ss->listen_addresses = para_malloc(n * sizeof(char *));
+ ss->listen_fds = para_malloc(n * sizeof(int));
+ FOR_EACH_LISTEN_FD(i, ss) {
+ ss->listen_addresses[i] = para_strdup(lls_string_val(i,
+ listen_address_opt_result));
+ ss->listen_fds[i] = -1;
+ }
+ }
+ ss->default_port = default_port;
+
+ INIT_LIST_HEAD(&ss->client_list);
+ /* Initialize an access control list */
+ INIT_LIST_HEAD(&ss->acl);
+ for (i = 0; i < lls_opt_given(acl_opt_result); i++) {
+ const char *arg = lls_string_val(i, acl_opt_result);
+ char addr[16];
+ int mask;
+ if (!parse_cidr(arg, addr, sizeof(addr), &mask))
+ PARA_WARNING_LOG("ACL syntax error: %s, ignoring\n",
+ arg);
+ else
+ acl_add_entry(&ss->acl, addr, mask);
+ }
+ ss->num_clients = 0;
+ ss->max_clients = max_clients;
+ ss->default_deny = default_deny;
+}
+
+/**
+ * Return a string containing the current status of a sender.
+ *
+ * \param ss The sender.
+ * \param name Used for printing the header line.
+ *
+ * \return The string printed in the "si" command.
+ */
+char *generic_sender_status(struct sender_status *ss, const char *name)
+{
+ char *clnts = NULL, *ret, *addr = NULL;
+ struct sender_client *sc, *tmp_sc;
+ unsigned n;
+ char *acl_contents = acl_get_contents(&ss->acl);
+
+ list_for_each_entry_safe(sc, tmp_sc, &ss->client_list, node) {
+ char *tmp = make_message("%s%s ", clnts? clnts : "", sc->name);
+ free(clnts);
+ clnts = tmp;
+ }
+ FOR_EACH_LISTEN_FD(n, ss) {
+ char *url = format_url(ss->listen_addresses[n], ss->default_port);
+ char *tmp = make_message("%s%s%s (fd %d)", addr?
+ addr : "", addr? ", " : "", url,
+ ss->listen_fds[n]);
+ free(url);
+ free(addr);
+ addr = tmp;
+ }
+ ret = make_message(
+ "listening address(es): %s\n"
+ "default port: %s\n"
+ "number of connected clients: %d\n"
+ "maximal number of clients: %d%s\n"
+ "connected clients: %s\n"
+ "access %s list: %s\n",
+ addr,
+ stringify_port(ss->default_port,
+ strcmp(name, "http")? "dccp" : "tcp"),
+ ss->num_clients,
+ ss->max_clients,
+ ss->max_clients > 0? "" : " (unlimited)",
+ clnts? clnts : "(none)",
+ ss->default_deny? "allow" : "deny",
+ acl_contents? acl_contents : "(empty)"
+ );
+ free(acl_contents);
+ free(clnts);
+ return ret;
+}
+
+/**
+ * Allow connections from the given range of IP addresses.
+ *
+ * \param scd Contains the IP and the netmask.
+ * \param ss The sender.
+ *
+ * \sa \ref generic_com_deny().
+ */
+void generic_com_allow(struct sender_command_data *scd,
+ struct sender_status *ss)
+{
+ acl_allow(scd->host, scd->netmask, &ss->acl, ss->default_deny);
+}
+
+/**
+ * Empty the access control list of a sender.
+ *
+ * \param acl The access control list of the sender.
+ *
+ * This is called from the ->shutdown methods of the http and the dccp sender.
+ */
+void generic_acl_deplete(struct list_head *acl)
+{
+ /*
+ * Since default_deny is false, the ACL is considered a blacklist. A
+ * netmask of zero matches any IP address, so this call empties the ACL.
+ */
+ acl_allow("0.0.0.0", 0 /* netmask */, acl, 0 /* default_deny */);
+}
+
+/**
+ * Deny connections from the given range of IP addresses.
+ *
+ * \param scd see \ref generic_com_allow().
+ * \param ss see \ref generic_com_allow().
+ *
+ * \sa \ref generic_com_allow().
+ */
+void generic_com_deny(struct sender_command_data *scd,
+ struct sender_status *ss)
+{
+ acl_deny(scd->host, scd->netmask, &ss->acl, ss->default_deny);
+}
+
+/**
+ * Activate a paraslash sender.
+ *
+ * \param ss The sender to activate.
+ * \param protocol layer4 type (IPPROTO_TCP or IPPROTO_DCCP).