2 * Copyright (C) 1997-2006 Andre Noll <maan@systemlinux.org>
4 * This program is free software; you can redistribute it and/or modify
5 * it under the terms of the GNU General Public License as published by
6 * the Free Software Foundation; either version 2 of the License, or
7 * (at your option) any later version.
9 * This program is distributed in the hope that it will be useful,
10 * but WITHOUT ANY WARRANTY; without even the implied warranty of
11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 * GNU General Public License for more details.
14 * You should have received a copy of the GNU General Public License
15 * along with this program; if not, write to the Free Software
16 * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111, USA.
19 /** \file server.c Paraslash's main server */
22 /** \mainpage Paraslash API Reference
24 * Good starting points for reading are probably \ref audio_file_selector,
25 * \ref sender, \ref receiver, \ref receiver_node, \ref filter, \ref
32 #include "server.cmdline.h"
37 #include "close_on_fork.h"
47 /** define the array of error lists needed by para_server */
50 /** shut down non-authorized connections after that many seconds */
51 #define ALARM_TIMEOUT 10
53 /* these are exported to afs.c. command.c and to all selectors */
54 struct misc_meta_data *mmd;
55 /** the configuration of para_server
57 * It also contains the options for all audio file selectors and all supported
60 struct server_args_info conf;
61 char *user_list_file = NULL;
62 struct list_head user_list;
63 extern void dccp_send_init(struct sender *);
64 extern void http_send_init(struct sender *);
65 extern void ortp_send_init(struct sender *);
67 /* TODO: This is better handled by autoconf */
68 /** the list of supported audio file selectors */
69 struct audio_file_selector selectors[] = {
72 .init = random_selector_init,
73 .update_audio_file = NULL,
77 .init = playlist_selector_init,
78 .update_audio_file = NULL,
85 .init = mysql_selector_init,
86 .update_audio_file = NULL,
96 /** the list of supported senders */
97 struct sender senders[] = {
100 .init = http_send_init,
104 .init = dccp_send_init,
109 .init = ortp_send_init,
118 /* global variables for server-internal use */
119 static FILE *logfile;
120 static int mmd_mutex, mmd_shm_id;
121 static int signal_pipe;
124 * para_server's log function
126 * \param ll the log level
127 * \param fmt the format string describing the log message
129 void para_log(int ll, const char* fmt,...)
135 char str[MAXLINE] = "";
138 if (ll < conf.loglevel_arg)
140 outfd = logfile? logfile : stderr;
143 strftime(str, MAXLINE, "%b %d %H:%M:%S", tm);
144 fprintf(outfd, "%s ", str);
145 if (conf.loglevel_arg <= INFO)
146 fprintf(outfd, "%i: ", ll);
148 if (conf.loglevel_arg <= INFO)
149 fprintf(outfd, "(%d) ", mypid);
151 vfprintf(outfd, fmt, argp);
156 * setup shared memory area and get mutex for locking
158 static void shm_init(void)
161 int ret = shm_new(sizeof(struct misc_meta_data));
166 ret = shm_attach(ret, ATTACH_RW, &shm);
177 mmd->selector_num = 0;
179 mmd->num_commands = 0;
181 mmd->num_connects = 0;
182 mmd->active_connections = 0;
183 strcpy(mmd->filename, "(none)");
184 mmd->audio_format = -1;
185 mmd->afs_status_flags = AFS_NEXT;
186 mmd->new_afs_status_flags = AFS_NEXT;
187 mmd->sender_cmd_data.cmd_num = -1;
190 PARA_EMERG_LOG("%s", PARA_STRERROR(-ret));
195 * lock the shared memory area containing the mmd struct
197 * \sa semop(2), struct misc_meta_data
201 mutex_lock(mmd_mutex);
205 * unlock the shared memory area containing the mmd struct
207 * \sa semop(2), struct misc_meta_data
210 void mmd_unlock(void)
212 mutex_unlock(mmd_mutex);
215 static void parse_config(int override)
217 char *home = para_homedir();
222 if (conf.config_file_given)
223 cf = conf.config_file_arg;
225 cf = make_message("%s/.paraslash/server.conf", home);
226 free(user_list_file);
227 if (!conf.user_list_given)
228 user_list_file = make_message("%s/.paraslash/server.users", home);
230 user_list_file = para_strdup(conf.user_list_arg);
231 ret = stat(cf, &statbuf);
232 if (ret && conf.config_file_given) {
234 PARA_EMERG_LOG("can not stat config file %s\n", cf);
238 int tmp = conf.daemon_given;
239 server_cmdline_parser_configfile(cf, &conf, override, 0, 0);
240 conf.daemon_given = tmp;
243 if (!conf.logfile_given && conf.daemon_given) {
245 PARA_EMERG_LOG("%s", "daemon, but no log file\n");
248 if (conf.logfile_given)
249 logfile = open_log(conf.logfile_arg);
256 free(user_list_file);
257 user_list_file = NULL;
261 static void setup_signal_handling(void)
265 signal_pipe = para_signal_init();
266 PARA_NOTICE_LOG("%s", "setting up signal handlers\n");
267 ret += para_install_sighandler(SIGINT);
268 ret += para_install_sighandler(SIGTERM);
269 ret += para_install_sighandler(SIGHUP);
270 ret += para_install_sighandler(SIGCHLD);
271 ret += para_install_sighandler(SIGUSR1);
272 signal(SIGPIPE, SIG_IGN);
274 PARA_EMERG_LOG("%s", "could not install signal handlers\n");
280 * lookup user in user list file. Fills in a user struct containing
281 * filename of the user's public key as well as the permissions of that user.
282 * Returns 1 on success, 0 if user does not exist and < 0 on errors.
284 static void populate_user_list(void) {
285 FILE *file_ptr = NULL;
288 /* keyword, user, key, perms */
289 char w[MAXLINE], n[MAXLINE], k[MAXLINE], p[MAXLINE], tmp[4][MAXLINE];
292 file_ptr = fopen(user_list_file, "r");
298 ret = para_fgets(line, MAXLINE, file_ptr);
300 PARA_ERROR_LOG("%s\n", PARA_STRERROR(-ret));
303 if (sscanf(line,"%200s %200s %200s %200s", w, n, k, p) < 3)
305 if (strcmp(w, "user"))
307 PARA_DEBUG_LOG("found entry for %s\n", n);
308 u = para_malloc(sizeof(struct user));
309 u->name = para_strdup(n);
310 u->rsa = para_malloc(sizeof(RSA));
311 ret = get_rsa_key(k, &u->rsa, LOAD_PUBLIC_KEY);
316 num = sscanf(char_ptr, "%200[A-Z_],%200[A-Z_],%200[A-Z_],%200[A-Z_]",
317 tmp[0], tmp[1], tmp[2], tmp[3]);
318 PARA_DEBUG_LOG("found %i perm entries\n", num);
322 if (!strcmp(tmp[num], "AFS_READ"))
323 u->perms |= AFS_READ;
324 else if (!strcmp(tmp[num], "AFS_WRITE"))
325 u->perms |= AFS_WRITE;
326 else if (!strcmp(tmp[num], "DB_READ"))
328 else if (!strcmp(tmp[num], "DB_WRITE"))
329 u->perms |= DB_WRITE;
330 else /* unknown permission */
331 PARA_WARNING_LOG("unknown permission: %s\n",
334 para_list_add(&u->node, &user_list);
341 PARA_EMERG_LOG("%s\n", PARA_STRERROR(-ret));
345 static void init_user_list(void)
347 struct user *u, *tmp;
348 static int initialized;
351 list_for_each_entry_safe(u, tmp, &user_list, node) {
358 INIT_LIST_HEAD(&user_list);
360 populate_user_list();
364 * lookup user in user_list.
366 * \param user: must initially contain the name of the user and is filled
367 * in by this function on success.
369 * \return 1 on success and < 0 on errors.
371 int get_user(struct user *user)
374 list_for_each_entry(u, &user_list, node) {
375 if (strcmp(u->name, user->name))
383 static void init_selector(void)
387 mmd->selector_change = -1; /* no change nec., set to new num by com_chs */
388 if (!conf.selector_given)
390 for (i = 0; selectors[i].name; i++) {
391 if (strcmp(selectors[i].name, conf.selector_arg))
393 PARA_NOTICE_LOG("initializing %s audio file selector\n",
395 ret = selectors[i].init(&selectors[i]);
397 PARA_WARNING_LOG("%s", PARA_STRERROR(-ret));
400 mmd->selector_num = i;
403 PARA_WARNING_LOG("%s", "falling back to the random selector\n");
405 mmd->selector_num = 0;
406 selectors[0].init(&selectors[0]); /* always successful */
409 static unsigned init_network(void)
411 int fd, ret = init_tcp_socket(conf.port_arg);
416 ret = mark_fd_nonblock(fd);
421 PARA_EMERG_LOG("%s\n", PARA_STRERROR(-ret));
425 static void init_random_seed(void)
427 int fd, ret = -1, len = sizeof(unsigned int);
430 fd = open("/dev/urandom", O_RDONLY);
434 if (read(fd, &seed, len) != len)
443 PARA_EMERG_LOG("can not seed pseudo random generator (ret = %d)\n",
448 static unsigned do_inits(int argc, char **argv)
450 /* connector's address information */
454 /* parse command line options */
455 server_cmdline_parser(argc, argv, &conf);
456 para_drop_privileges(conf.user_arg, conf.group_arg);
457 /* parse config file, open log and set defaults */
459 log_welcome("para_server", conf.loglevel_arg);
460 shm_init(); /* init mmd struct */
461 server_uptime(UPTIME_SET); /* reset server uptime */
464 if (conf.daemon_given)
467 PARA_NOTICE_LOG("%s", "initializing audio file sender\n");
468 /* audio file sender */
470 mmd->server_pid = getpid();
471 setup_signal_handling();
473 /* init network socket */
474 PARA_NOTICE_LOG("%s", "initializing tcp command socket\n");
475 sockfd = init_network();
476 PARA_NOTICE_LOG("%s", "init complete\n");
480 static void change_selector(void)
482 int ret, old = mmd->selector_num, new = mmd->selector_change;
484 selectors[old].shutdown();
485 ret = selectors[new].init(&selectors[new]);
486 mmd->selector_change = -1; /* reset */
488 mmd->selector_num = new;
492 PARA_ERROR_LOG("%s -- switching to the random selector\n", PARA_STRERROR(-ret));
493 selectors[0].init(&selectors[0]);
494 mmd->selector_num = 0;
498 * called when server gets SIGHUP or when client invokes hup command.
500 static void handle_sighup(void)
502 PARA_NOTICE_LOG("%s", "SIGHUP\n");
503 close_log(logfile); /* gets reopened if necessary by parse_config */
505 parse_config(1); /* reopens log */
506 mmd->selector_change = mmd->selector_num; /* do not change selector.. */
507 change_selector(); /* .. just reload */
510 static void status_refresh(void)
512 static int prev_uptime = -1, prev_events = -1;
513 int uptime = server_uptime(UPTIME_GET), ret = 1;
515 if (prev_events != mmd->events)
517 if (mmd->new_afs_status_flags != mmd->afs_status_flags)
519 if (uptime / 60 != prev_uptime / 60)
523 prev_uptime = uptime;
524 prev_events = mmd->events;
525 mmd->afs_status_flags = mmd->new_afs_status_flags;
527 PARA_DEBUG_LOG("%d events, forcing status update, af = %d\n",
528 mmd->events, mmd->audio_format);
536 int main(int argc, char *argv[])
538 /* listen on sock_fd, new connection on new_fd */
540 struct sockaddr_in their_addr;
541 int i, max_fileno, ret;
544 struct timeval *timeout;
547 sockfd = do_inits(argc, argv);
552 /* check socket and signal pipe in any case */
553 para_fd_set(sockfd, &rfds, &max_fileno);
554 para_fd_set(signal_pipe, &rfds, &max_fileno);
555 timeout = afs_preselect();
557 for (i = 0; senders[i].name; i++) {
558 if (senders[i].status != SENDER_ON)
560 if (!senders[i].pre_select)
562 senders[i].pre_select( &max_fileno, &rfds, &wfds);
564 if (selectors[mmd->selector_num].pre_select) {
565 ret = selectors[mmd->selector_num].pre_select(&rfds, &wfds);
566 max_fileno = PARA_MAX(max_fileno, ret);
569 ret = para_select(max_fileno + 1, &rfds, &wfds, timeout);
571 if (mmd->selector_change >= 0)
573 if (selectors[mmd->selector_num].post_select)
574 selectors[mmd->selector_num].post_select(&rfds, &wfds);
577 for (i = 0; senders[i].name; i++) {
578 if (senders[i].status != SENDER_ON)
580 if (!senders[i].post_select)
582 senders[i].post_select(&rfds, &wfds);
586 if (FD_ISSET(signal_pipe, &rfds)) {
588 sig = para_next_signal();
594 para_reap_children();
596 /* die on sigint/sigterm. Kill all children too. */
599 PARA_EMERG_LOG("terminating on signal %d\n", sig);
601 selectors[mmd->selector_num].shutdown();
602 mutex_destroy(mmd_mutex);
604 shm_destroy(mmd_shm_id);
608 if (mmd->sender_cmd_data.cmd_num >= 0) {
609 int num = mmd->sender_cmd_data.cmd_num,
610 s = mmd->sender_cmd_data.sender_num;
612 if (senders[s].client_cmds[num])
613 senders[s].client_cmds[num](&mmd->sender_cmd_data);
614 mmd->sender_cmd_data.cmd_num = -1;
616 if (!FD_ISSET(sockfd, &rfds))
619 new_fd = para_accept(sockfd, &their_addr, sizeof(struct sockaddr_in));
622 PARA_INFO_LOG("got connection from %s, forking\n",
623 inet_ntoa(their_addr.sin_addr));
625 mmd->active_connections++;
629 PARA_CRIT_LOG("%s", "fork failed\n");
634 /* parent keeps accepting connections */
637 alarm(ALARM_TIMEOUT);
639 close(sockfd); /* child doesn't need the listener */
641 * put info on who we are serving into argv[0] to make
642 * client ip visible in top/ps
644 for (i = argc - 1; i >= 0; i--)
645 memset(argv[i], 0, strlen(argv[i]));
646 sprintf(argv[0], "para_server (serving %s)",
647 inet_ntoa(their_addr.sin_addr));
648 return handle_connect(new_fd, &their_addr);