/*
- * Copyright (C) 1997-2006 Andre Noll <maan@systemlinux.org>
+ * Copyright (C) 1997-2007 Andre Noll <maan@systemlinux.org>
*
- * This program is free software; you can redistribute it and/or modify
- * it under the terms of the GNU General Public License as published by
- * the Free Software Foundation; either version 2 of the License, or
- * (at your option) any later version.
- *
- * This program is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- * GNU General Public License for more details.
- *
- * You should have received a copy of the GNU General Public License
- * along with this program; if not, write to the Free Software
- * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111, USA.
+ * Licensed under the GPL v2. For licencing details see COPYING.
*/
/** \file server.c Paraslash's main server */
*
*/
+#include <signal.h>
+#include <sys/types.h>
+#include <dirent.h>
-
+#include "para.h"
#include "server.cmdline.h"
-#include "db.h"
+#include "afs_common.h"
+#include "afh.h"
#include "server.h"
-#include "afs.h"
+#include "vss.h"
#include "config.h"
#include "close_on_fork.h"
#include "send.h"
#include "string.h"
#include "ipc.h"
#include "fd.h"
-#include "crypt.h"
+#include "list.h"
+#include "sched.h"
+#include "signal.h"
+#include "user_list.h"
+#include "afs.h"
/** define the array of error lists needed by para_server */
INIT_SERVER_ERRLISTS;
/** shut down non-authorized connections after that many seconds */
#define ALARM_TIMEOUT 10
-/* these are exported to afs.c. command.c and to all selectors */
+/**
+ * pointer to shared memory area for communication between para_server
+ * and its children. exported to vss.c. command.c and to all selectors.
+ */
struct misc_meta_data *mmd;
-/** the configuration of para_server
+
+/**
+ * the configuration of para_server
*
- * It also contains the options for all audio file selectors and all supported
- * senders.
-*/
+ * It also contains the options for all audio file selectors, audio format handler
+ * and all supported senders.
+ */
struct server_args_info conf;
+
+/** the file containing user information (public key, permissions) */
char *user_list_file = NULL;
-struct list_head user_list;
+
extern void dccp_send_init(struct sender *);
extern void http_send_init(struct sender *);
extern void ortp_send_init(struct sender *);
mmd->active_connections = 0;
strcpy(mmd->filename, "(none)");
mmd->audio_format = -1;
- mmd->afs_status_flags = AFS_NEXT;
- mmd->new_afs_status_flags = AFS_NEXT;
+ mmd->vss_status_flags = VSS_NEXT;
+ mmd->new_vss_status_flags = VSS_NEXT;
mmd->sender_cmd_data.cmd_num = -1;
return;
err_out:
}
if (!ret) {
int tmp = conf.daemon_given;
- server_cmdline_parser_configfile(cf, &conf, override, 0, 0);
+ struct server_cmdline_parser_params params = {
+ .override = override,
+ .initialize = 0,
+ .check_required = 0,
+ .check_ambiguity = 0
+ };
+ server_cmdline_parser_config_file(cf, &conf, ¶ms);
conf.daemon_given = tmp;
}
/* logfile */
}
}
-/*
- * lookup user in user list file. Fills in a user struct containing
- * filename of the user's public key as well as the permissions of that user.
- * Returns 1 on success, 0 if user does not exist and < 0 on errors.
- */
-static void populate_user_list(void) {
- FILE *file_ptr = NULL;
- char *char_ptr;
- char line[MAXLINE];
- /* keyword, user, key, perms */
- char w[MAXLINE], n[MAXLINE], k[MAXLINE], p[MAXLINE], tmp[4][MAXLINE];
- int num, ret;
-
- file_ptr = fopen(user_list_file, "r");
- ret = -E_USERLIST;
- if (!file_ptr)
- goto out;
- for (;;) {
- struct user *u;
- ret = para_fgets(line, MAXLINE, file_ptr);
- if (ret < 0)
- PARA_ERROR_LOG("%s\n", PARA_STRERROR(-ret));
- if (ret <= 0)
- break;
- if (sscanf(line,"%200s %200s %200s %200s", w, n, k, p) < 3)
- continue;
- if (strcmp(w, "user"))
- continue;
- PARA_DEBUG_LOG("found entry for %s\n", n);
- u = para_malloc(sizeof(struct user));
- u->name = para_strdup(n);
- u->rsa = para_malloc(sizeof(RSA));
- ret = get_rsa_key(k, &u->rsa, LOAD_PUBLIC_KEY);
- if (ret < 0)
- break;
- u->perms = 0;
- char_ptr = p;
- num = sscanf(char_ptr, "%200[A-Z_],%200[A-Z_],%200[A-Z_],%200[A-Z_]",
- tmp[0], tmp[1], tmp[2], tmp[3]);
- PARA_DEBUG_LOG("found %i perm entries\n", num);
- u->perms = 0;
- while (num > 0) {
- num--;
- if (!strcmp(tmp[num], "AFS_READ"))
- u->perms |= AFS_READ;
- else if (!strcmp(tmp[num], "AFS_WRITE"))
- u->perms |= AFS_WRITE;
- else if (!strcmp(tmp[num], "DB_READ"))
- u->perms |= DB_READ;
- else if (!strcmp(tmp[num], "DB_WRITE"))
- u->perms |= DB_WRITE;
- else /* unknown permission */
- PARA_WARNING_LOG("unknown permission: %s\n",
- tmp[num]);
- }
- para_list_add(&u->node, &user_list);
- }
-out:
- if (file_ptr)
- fclose(file_ptr);
- if (ret >= 0)
- return;
- PARA_EMERG_LOG("%s\n", PARA_STRERROR(-ret));
- exit(EXIT_FAILURE);
-}
-
-static void init_user_list(void)
-{
- struct user *u, *tmp;
- static int initialized;
-
- if (initialized) {
- list_for_each_entry_safe(u, tmp, &user_list, node) {
- list_del(&u->node);
- free(u->name);
- free(u->rsa);
- free(u);
- }
- } else
- INIT_LIST_HEAD(&user_list);
- initialized = 1;
- populate_user_list();
-}
-
-/**
- * lookup user in user_list.
- *
- * \param user: must initially contain the name of the user and is filled
- * in by this function on success.
- *
- * \return 1 on success and < 0 on errors.
- */
-int get_user(struct user *user)
-{
- struct user *u;
- list_for_each_entry(u, &user_list, node) {
- if (strcmp(u->name, user->name))
- continue;
- *user = *u;
- return 1;
- }
- return -E_BAD_USER;
-}
-
static void init_selector(void)
{
int i, ret;
static void init_random_seed(void)
{
- int fd, ret = -1, len = sizeof(unsigned int);
+ int fd, ret = -1;
unsigned int seed;
+ size_t len = sizeof(unsigned int);
fd = open("/dev/urandom", O_RDONLY);
if (fd < 0)
exit(EXIT_FAILURE);
}
+uint32_t afs_socket_cookie;
+static int afs_socket;
+static pid_t afs_pid;
+
+static void init_afs(void)
+{
+ int ret, afs_server_socket[2];
+
+ ret = socketpair(PF_UNIX, SOCK_DGRAM, 0, afs_server_socket);
+ if (ret < 0)
+ exit(EXIT_FAILURE);
+ afs_socket_cookie = para_random((uint32_t)-1);
+ afs_pid = fork();
+ if (afs_pid < 0)
+ exit(EXIT_FAILURE);
+ if (!afs_pid) { /* child (afs) */
+ close(afs_server_socket[0]);
+ afs_init(afs_socket_cookie, afs_server_socket[1]);
+ }
+ close(afs_server_socket[1]);
+ afs_socket = afs_server_socket[0];
+ ret = mark_fd_nonblock(afs_socket);
+ if (ret < 0)
+ exit(EXIT_FAILURE);
+ add_close_on_fork_list(afs_socket);
+ PARA_INFO_LOG("afs_socket: %d, afs_socket_cookie: %u\n", afs_socket,
+ (unsigned) afs_socket_cookie);
+}
+
+
static unsigned do_inits(int argc, char **argv)
{
/* connector's address information */
init_random_seed();
/* parse command line options */
server_cmdline_parser(argc, argv, &conf);
+ HANDLE_VERSION_FLAG("server", conf);
para_drop_privileges(conf.user_arg, conf.group_arg);
/* parse config file, open log and set defaults */
parse_config(0);
log_welcome("para_server", conf.loglevel_arg);
shm_init(); /* init mmd struct */
server_uptime(UPTIME_SET); /* reset server uptime */
- init_user_list();
+ init_user_list(user_list_file);
/* become daemon */
if (conf.daemon_given)
daemon_init();
init_selector();
- PARA_NOTICE_LOG("%s", "initializing audio file sender\n");
- /* audio file sender */
- afs_init();
+// PARA_ERROR_LOG("num: %d\n", mmd->selector_num);
+ PARA_NOTICE_LOG("%s", "initializing virtual streaming system\n");
+ vss_init();
mmd->server_pid = getpid();
setup_signal_handling();
+ init_afs();
mmd_lock();
/* init network socket */
PARA_NOTICE_LOG("%s", "initializing tcp command socket\n");
parse_config(1); /* reopens log */
mmd->selector_change = mmd->selector_num; /* do not change selector.. */
change_selector(); /* .. just reload */
+ init_user_list(user_list_file); /* reload user list */
+ if (afs_pid)
+ kill(afs_pid, SIGHUP);
}
static void status_refresh(void)
if (prev_events != mmd->events)
goto out;
- if (mmd->new_afs_status_flags != mmd->afs_status_flags)
+ if (mmd->new_vss_status_flags != mmd->vss_status_flags)
goto out;
if (uptime / 60 != prev_uptime / 60)
goto out;
out:
prev_uptime = uptime;
prev_events = mmd->events;
- mmd->afs_status_flags = mmd->new_afs_status_flags;
+ mmd->vss_status_flags = mmd->new_vss_status_flags;
if (ret) {
PARA_DEBUG_LOG("%d events, forcing status update, af = %d\n",
mmd->events, mmd->audio_format);
}
}
-/*
- * MAIN
+/**
+ * the main function of para_server
+ *
+ * \param argc usual argument count
+ * \param argv usual argument vector
+ *
+ * \return EXIT_SUCCESS or EXIT_FAILURE
+ *
*/
int main(int argc, char *argv[])
{
/* check socket and signal pipe in any case */
para_fd_set(sockfd, &rfds, &max_fileno);
para_fd_set(signal_pipe, &rfds, &max_fileno);
- timeout = afs_preselect();
+ timeout = vss_preselect();
status_refresh();
for (i = 0; senders[i].name; i++) {
if (senders[i].status != SENDER_ON)
continue;
senders[i].post_select(&rfds, &wfds);
}
- afs_send_chunk();
+ vss_send_chunk();
status_refresh();
if (FD_ISSET(signal_pipe, &rfds)) {
int sig;
+ pid_t pid;
sig = para_next_signal();
switch (sig) {
case SIGHUP:
handle_sighup();
break;
case SIGCHLD:
- para_reap_children();
+ for (;;) {
+ pid = para_reap_child();
+ if (pid <= 0)
+ break;
+ if (pid != afs_pid)
+ continue;
+ PARA_EMERG_LOG("fatal: afs died\n");
+ goto genocide;
+ }
break;
/* die on sigint/sigterm. Kill all children too. */
case SIGINT:
case SIGTERM:
PARA_EMERG_LOG("terminating on signal %d\n", sig);
+genocide:
kill(0, SIGTERM);
selectors[mmd->selector_num].shutdown();
mutex_destroy(mmd_mutex);
shm_detach(mmd);
shm_destroy(mmd_shm_id);
+
exit(EXIT_FAILURE);
}
}