httpd.c 28 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032
  1. /* snac - A simple, minimalistic ActivityPub instance */
  2. /* copyright (c) 2022 - 2025 grunfink et al. / MIT license */
  3. #include "xs.h"
  4. #include "xs_io.h"
  5. #include "xs_json.h"
  6. #include "xs_socket.h"
  7. #include "xs_unix_socket.h"
  8. #include "xs_httpd.h"
  9. #include "xs_mime.h"
  10. #include "xs_time.h"
  11. #include "xs_openssl.h"
  12. #include "xs_fcgi.h"
  13. #include "xs_html.h"
  14. #include "snac.h"
  15. #include <setjmp.h>
  16. #include <pthread.h>
  17. #include <semaphore.h>
  18. #include <fcntl.h>
  19. #include <stdint.h>
  20. #include <sys/resource.h> // for getrlimit()
  21. #include <sys/mman.h>
  22. #ifdef USE_POLL_FOR_SLEEP
  23. #include <poll.h>
  24. #endif
  25. /** server state **/
  26. srv_state *p_state = NULL;
  27. /** job control **/
  28. /* mutex to access the lists of jobs */
  29. static pthread_mutex_t job_mutex;
  30. /* semaphore to trigger job processing */
  31. static sem_t *job_sem;
  32. typedef struct job_fifo_item {
  33. struct job_fifo_item *next;
  34. xs_val *job;
  35. } job_fifo_item;
  36. static job_fifo_item *job_fifo_first = NULL;
  37. static job_fifo_item *job_fifo_last = NULL;
  38. /** other global data **/
  39. static jmp_buf on_break;
  40. /** code **/
  41. /* nodeinfo 2.0 template */
  42. const char *nodeinfo_2_0_template = ""
  43. "{\"version\":\"2.0\","
  44. "\"software\":{\"name\":\"snac\",\"version\":\"" VERSION "\"},"
  45. "\"protocols\":[\"activitypub\"],"
  46. "\"services\":{\"outbound\":[],\"inbound\":[]},"
  47. "\"usage\":{\"users\":{\"total\":%d,\"activeMonth\":%d,\"activeHalfyear\":%d},"
  48. "\"localPosts\":%d},"
  49. "\"openRegistrations\":false,\"metadata\":{}}";
  50. xs_str *nodeinfo_2_0(void)
  51. /* builds a nodeinfo json object */
  52. {
  53. int n_utotal = 0;
  54. int n_umonth = 0;
  55. int n_uhyear = 0;
  56. int n_posts = 0;
  57. xs *users = user_list();
  58. xs_list *p = users;
  59. const char *v;
  60. double now = (double)time(NULL);
  61. while (xs_list_iter(&p, &v)) {
  62. /* build the full path name to the last usage log */
  63. xs *llfn = xs_fmt("%s/user/%s/lastlog.txt", srv_basedir, v);
  64. double llsecs = now - mtime(llfn);
  65. if (llsecs < 60 * 60 * 24 * 30 * 6) {
  66. n_uhyear++;
  67. if (llsecs < 60 * 60 * 24 * 30)
  68. n_umonth++;
  69. }
  70. n_utotal++;
  71. /* build the file to each user public.idx */
  72. xs *pidxfn = xs_fmt("%s/user/%s/public.idx", srv_basedir, v);
  73. n_posts += index_len(pidxfn);
  74. }
  75. return xs_fmt(nodeinfo_2_0_template, n_utotal, n_umonth, n_uhyear, n_posts);
  76. }
  77. static xs_str *greeting_html(void)
  78. /* processes and returns greeting.html */
  79. {
  80. /* try to open greeting.html */
  81. xs *fn = xs_fmt("%s/greeting.html", srv_basedir);
  82. FILE *f;
  83. xs_str *s = NULL;
  84. if ((f = fopen(fn, "r")) != NULL) {
  85. s = xs_readall(f);
  86. fclose(f);
  87. /* replace %host% */
  88. s = xs_replace_i(s, "%host%", xs_dict_get(srv_config, "host"));
  89. const char *adm_email = xs_dict_get(srv_config, "admin_email");
  90. if (xs_is_null(adm_email) || *adm_email == '\0')
  91. adm_email = "the administrator of this instance";
  92. /* replace %admin_email */
  93. s = xs_replace_i(s, "%admin_email%", adm_email);
  94. /* does it have a %userlist% mark? */
  95. if (xs_str_in(s, "%userlist%") != -1) {
  96. const char *host = xs_dict_get(srv_config, "host");
  97. xs *list = user_list();
  98. xs_list *p = list;
  99. const xs_str *uid;
  100. xs_html *ul = xs_html_tag("ul",
  101. xs_html_attr("class", "snac-user-list"));
  102. p = list;
  103. while (xs_list_iter(&p, &uid)) {
  104. snac user;
  105. if (strcmp(uid, "relay") && user_open(&user, uid)) {
  106. xs_html_add(ul,
  107. xs_html_tag("li",
  108. xs_html_tag("a",
  109. xs_html_attr("href", user.actor),
  110. xs_html_text("@"),
  111. xs_html_text(uid),
  112. xs_html_text("@"),
  113. xs_html_text(host),
  114. xs_html_text(" ("),
  115. xs_html_text(xs_dict_get(user.config, "name")),
  116. xs_html_text(")"))));
  117. user_free(&user);
  118. }
  119. }
  120. xs *s1 = xs_html_render(ul);
  121. s = xs_replace_i(s, "%userlist%", s1);
  122. }
  123. }
  124. return s;
  125. }
  126. const char *share_page = ""
  127. "<!DOCTYPE html>\n"
  128. "<html>\n"
  129. "<head>\n"
  130. "<title>%s - snac</title>\n"
  131. "<meta content=\"width=device-width, initial-scale=1, minimum-scale=1, user-scalable=no\" name=\"viewport\">\n"
  132. "<link rel=\"stylesheet\" type=\"text/css\" href=\"%s/style.css\"/>\n"
  133. "<style>:root {color-scheme: light dark}</style>\n"
  134. "</head>\n"
  135. "<body><h1>%s link share</h1>\n"
  136. "<form method=\"get\" action=\"%s/share-bridge\">\n"
  137. "<textarea name=\"content\" rows=\"6\" wrap=\"virtual\" required=\"required\" style=\"width: 50em\">%s</textarea>\n"
  138. "<p>Login: <input type=\"text\" name=\"login\" autocapitalize=\"off\" required=\"required\"></p>\n"
  139. "<input type=\"submit\" value=\"OK\">\n"
  140. "</form><p>%s</p></body></html>\n"
  141. "";
  142. const char *authorize_interaction_page = ""
  143. "<!DOCTYPE html>\n"
  144. "<html>\n"
  145. "<head>\n"
  146. "<title>%s - snac</title>\n"
  147. "<meta content=\"width=device-width, initial-scale=1, minimum-scale=1, user-scalable=no\" name=\"viewport\">\n"
  148. "<link rel=\"stylesheet\" type=\"text/css\" href=\"%s/style.css\"/>\n"
  149. "<style>:root {color-scheme: light dark}</style>\n"
  150. "</head>\n"
  151. "<body><h1>%s authorize interaction</h1>\n"
  152. "<form method=\"get\" action=\"%s/auth-int-bridge\">\n"
  153. "<select name=\"action\">\n"
  154. "<option value=\"Follow\">Follow</option>\n"
  155. "<option value=\"Boost\">Boost</option>\n"
  156. "<option value=\"Like\">Like</option>\n"
  157. "</select> %s\n"
  158. "<input type=\"hidden\" name=\"id\" value=\"%s\">\n"
  159. "<p>Login: <input type=\"text\" name=\"login\" autocapitalize=\"off\" required=\"required\"></p>\n"
  160. "<input type=\"submit\" value=\"OK\">\n"
  161. "</form><p>%s</p></body></html>\n"
  162. "";
  163. int server_get_handler(xs_dict *req, const char *q_path,
  164. char **body, int *b_size, char **ctype)
  165. /* basic server services */
  166. {
  167. int status = 0;
  168. const snac *user = NULL;
  169. /* is it the server root? */
  170. if (*q_path == '\0' || strcmp(q_path, "/") == 0) {
  171. const xs_dict *q_vars = xs_dict_get(req, "q_vars");
  172. const char *t = NULL;
  173. if (xs_type(q_vars) == XSTYPE_DICT && (t = xs_dict_get(q_vars, "t"))) {
  174. /** search by tag **/
  175. int skip = 0;
  176. int show = xs_number_get(xs_dict_get_def(srv_config, "def_timeline_entries",
  177. xs_dict_get_def(srv_config, "max_timeline_entries", "50")));
  178. const char *v;
  179. if ((v = xs_dict_get(q_vars, "skip")) != NULL)
  180. skip = atoi(v);
  181. if ((v = xs_dict_get(q_vars, "show")) != NULL)
  182. show = atoi(v);
  183. xs *tl = tag_search(t, skip, show + 1);
  184. int more = 0;
  185. if (xs_list_len(tl) >= show + 1) {
  186. /* drop the last one */
  187. tl = xs_list_del(tl, -1);
  188. more = 1;
  189. }
  190. const char *accept = xs_dict_get(req, "accept");
  191. if (!xs_is_null(accept) && strcmp(accept, "application/rss+xml") == 0) {
  192. xs *link = xs_fmt("%s/?t=%s", srv_baseurl, t);
  193. *body = timeline_to_rss(NULL, tl, link, link, link);
  194. *ctype = "application/rss+xml; charset=utf-8";
  195. }
  196. else {
  197. xs *page = xs_fmt("?t=%s", t);
  198. xs *title = xs_fmt(L("Search results for tag #%s"), t);
  199. *body = html_timeline(NULL, tl, 0, skip, show, more, title, page, 0, NULL);
  200. }
  201. }
  202. else
  203. if (xs_type(xs_dict_get(srv_config, "show_instance_timeline")) == XSTYPE_TRUE) {
  204. /** instance timeline **/
  205. xs *tl = timeline_instance_list(0, 30);
  206. *body = html_timeline(NULL, tl, 0, 0, 0, 0,
  207. L("Recent posts by users in this instance"), NULL, 0, NULL);
  208. }
  209. else
  210. *body = greeting_html();
  211. if (*body)
  212. status = HTTP_STATUS_OK;
  213. }
  214. else
  215. if (strcmp(q_path, "/susie.png") == 0 || strcmp(q_path, "/favicon.ico") == 0 ) {
  216. status = HTTP_STATUS_OK;
  217. *body = xs_base64_dec(default_avatar_base64(), b_size);
  218. *ctype = "image/png";
  219. }
  220. else
  221. if (strcmp(q_path, "/.well-known/nodeinfo") == 0) {
  222. status = HTTP_STATUS_OK;
  223. *ctype = "application/json; charset=utf-8";
  224. *body = xs_fmt("{\"links\":["
  225. "{\"rel\":\"http:/" "/nodeinfo.diaspora.software/ns/schema/2.0\","
  226. "\"href\":\"%s/nodeinfo_2_0\"}]}",
  227. srv_baseurl);
  228. }
  229. else
  230. if (strcmp(q_path, "/.well-known/host-meta") == 0) {
  231. status = HTTP_STATUS_OK;
  232. *ctype = "application/xrd+xml";
  233. *body = xs_fmt("<?xml version=\"1.0\" encoding=\"UTF-8\"?>\n"
  234. "<XRD>"
  235. "<Link rel=\"lrdd\" type=\"application/xrd+xml\" template=\"https://%s/.well-known/webfinger?resource={uri}\"/>"
  236. "</XRD>", xs_dict_get(srv_config, "host"));
  237. }
  238. else
  239. if (strcmp(q_path, "/nodeinfo_2_0") == 0) {
  240. status = HTTP_STATUS_OK;
  241. *ctype = "application/json; charset=utf-8";
  242. *body = nodeinfo_2_0();
  243. }
  244. else
  245. if (strcmp(q_path, "/robots.txt") == 0) {
  246. status = HTTP_STATUS_OK;
  247. *ctype = "text/plain";
  248. *body = xs_str_new("User-agent: *\n"
  249. "Disallow: /\n");
  250. }
  251. else
  252. if (strcmp(q_path, "/style.css") == 0) {
  253. FILE *f;
  254. xs *css_fn = xs_fmt("%s/style.css", srv_basedir);
  255. if ((f = fopen(css_fn, "r")) != NULL) {
  256. *body = xs_readall(f);
  257. fclose(f);
  258. status = HTTP_STATUS_OK;
  259. *ctype = "text/css";
  260. }
  261. }
  262. else
  263. if (strcmp(q_path, "/share") == 0) {
  264. const xs_dict *q_vars = xs_dict_get(req, "q_vars");
  265. const char *url = xs_dict_get(q_vars, "url");
  266. const char *text = xs_dict_get(q_vars, "text");
  267. xs *s = NULL;
  268. if (xs_type(text) == XSTYPE_STRING) {
  269. if (xs_type(url) == XSTYPE_STRING)
  270. s = xs_fmt("%s:\n\n%s\n", text, url);
  271. else
  272. s = xs_fmt("%s\n", text);
  273. }
  274. else
  275. if (xs_type(url) == XSTYPE_STRING)
  276. s = xs_fmt("%s\n", url);
  277. else
  278. s = xs_str_new(NULL);
  279. status = HTTP_STATUS_OK;
  280. *ctype = "text/html; charset=utf-8";
  281. *body = xs_fmt(share_page,
  282. xs_dict_get(srv_config, "host"),
  283. srv_baseurl,
  284. xs_dict_get(srv_config, "host"),
  285. srv_baseurl,
  286. s,
  287. USER_AGENT
  288. );
  289. }
  290. else
  291. if (strcmp(q_path, "/authorize_interaction") == 0) {
  292. const xs_dict *q_vars = xs_dict_get(req, "q_vars");
  293. const char *uri = xs_dict_get(q_vars, "uri");
  294. if (xs_is_string(uri)) {
  295. status = HTTP_STATUS_OK;
  296. *ctype = "text/html; charset=utf-8";
  297. *body = xs_fmt(authorize_interaction_page,
  298. xs_dict_get(srv_config, "host"),
  299. srv_baseurl,
  300. xs_dict_get(srv_config, "host"),
  301. srv_baseurl,
  302. uri,
  303. uri,
  304. USER_AGENT
  305. );
  306. }
  307. }
  308. if (status != 0)
  309. srv_debug(1, xs_fmt("server_get_handler serving '%s' %d", q_path, status));
  310. return status;
  311. }
  312. void httpd_connection(FILE *f)
  313. /* the connection processor */
  314. {
  315. xs *req;
  316. const char *method;
  317. int status = 0;
  318. xs_str *body = NULL;
  319. int b_size = 0;
  320. char *ctype = NULL;
  321. xs *headers = xs_dict_new();
  322. xs *q_path = NULL;
  323. xs *payload = NULL;
  324. xs *etag = NULL;
  325. xs *last_modified = NULL;
  326. xs *link = NULL;
  327. int p_size = 0;
  328. const char *p;
  329. int fcgi_id;
  330. if (p_state->use_fcgi)
  331. req = xs_fcgi_request(f, &payload, &p_size, &fcgi_id);
  332. else
  333. req = xs_httpd_request(f, &payload, &p_size);
  334. if (req == NULL) {
  335. /* probably because a timeout */
  336. fclose(f);
  337. return;
  338. }
  339. if (!(method = xs_dict_get(req, "method")) || !(p = xs_dict_get(req, "path"))) {
  340. /* missing needed headers; discard */
  341. fclose(f);
  342. return;
  343. }
  344. q_path = xs_dup(p);
  345. /* crop the q_path from leading / and the prefix */
  346. if (xs_endswith(q_path, "/"))
  347. q_path = xs_crop_i(q_path, 0, -1);
  348. p = xs_dict_get(srv_config, "prefix");
  349. if (xs_startswith(q_path, p))
  350. q_path = xs_crop_i(q_path, strlen(p), 0);
  351. if (strcmp(method, "GET") == 0 || strcmp(method, "HEAD") == 0) {
  352. /* cascade through */
  353. if (status == 0)
  354. status = server_get_handler(req, q_path, &body, &b_size, &ctype);
  355. if (status == 0)
  356. status = webfinger_get_handler(req, q_path, &body, &b_size, &ctype);
  357. if (status == 0)
  358. status = activitypub_get_handler(req, q_path, &body, &b_size, &ctype);
  359. #ifndef NO_MASTODON_API
  360. if (status == 0)
  361. status = oauth_get_handler(req, q_path, &body, &b_size, &ctype);
  362. if (status == 0)
  363. status = mastoapi_get_handler(req, q_path, &body, &b_size, &ctype, &link);
  364. #endif /* NO_MASTODON_API */
  365. if (status == 0)
  366. status = html_get_handler(req, q_path, &body, &b_size, &ctype, &etag, &last_modified);
  367. }
  368. else
  369. if (strcmp(method, "POST") == 0) {
  370. #ifndef NO_MASTODON_API
  371. if (status == 0)
  372. status = oauth_post_handler(req, q_path,
  373. payload, p_size, &body, &b_size, &ctype);
  374. if (status == 0)
  375. status = mastoapi_post_handler(req, q_path,
  376. payload, p_size, &body, &b_size, &ctype);
  377. #endif
  378. if (status == 0)
  379. status = activitypub_post_handler(req, q_path,
  380. payload, p_size, &body, &b_size, &ctype);
  381. if (status == 0)
  382. status = html_post_handler(req, q_path,
  383. payload, p_size, &body, &b_size, &ctype);
  384. }
  385. else
  386. if (strcmp(method, "PUT") == 0) {
  387. #ifndef NO_MASTODON_API
  388. if (status == 0)
  389. status = mastoapi_put_handler(req, q_path,
  390. payload, p_size, &body, &b_size, &ctype);
  391. #endif
  392. }
  393. else
  394. if (strcmp(method, "PATCH") == 0) {
  395. #ifndef NO_MASTODON_API
  396. if (status == 0)
  397. status = mastoapi_patch_handler(req, q_path,
  398. payload, p_size, &body, &b_size, &ctype);
  399. #endif
  400. }
  401. else
  402. if (strcmp(method, "OPTIONS") == 0) {
  403. const char *methods = "OPTIONS, GET, HEAD, POST, PUT, DELETE";
  404. headers = xs_dict_append(headers, "allow", methods);
  405. headers = xs_dict_append(headers, "access-control-allow-methods", methods);
  406. status = HTTP_STATUS_OK;
  407. }
  408. else
  409. if (strcmp(method, "DELETE") == 0) {
  410. #ifndef NO_MASTODON_API
  411. if (status == 0)
  412. status = mastoapi_delete_handler(req, q_path,
  413. payload, p_size, &body, &b_size, &ctype);
  414. #endif
  415. }
  416. /* unattended? it's an error */
  417. if (status == 0) {
  418. srv_archive_error("unattended_method", "unattended method", req, payload);
  419. srv_debug(1, xs_fmt("httpd_connection unattended %s %s", method, q_path));
  420. status = HTTP_STATUS_NOT_FOUND;
  421. }
  422. if (status == HTTP_STATUS_FORBIDDEN)
  423. body = xs_str_new("<h1>403 Forbidden (" USER_AGENT ")</h1>");
  424. if (status == HTTP_STATUS_NOT_FOUND)
  425. body = xs_str_new("<h1>404 Not Found (" USER_AGENT ")</h1>");
  426. if (status == HTTP_STATUS_BAD_REQUEST && body != NULL)
  427. body = xs_str_new("<h1>400 Bad Request (" USER_AGENT ")</h1>");
  428. if (status == HTTP_STATUS_SEE_OTHER)
  429. headers = xs_dict_append(headers, "location", body);
  430. if (status == HTTP_STATUS_UNAUTHORIZED && body) {
  431. xs *www_auth = xs_fmt("Basic realm=\"@%s@%s snac login\"",
  432. body, xs_dict_get(srv_config, "host"));
  433. headers = xs_dict_append(headers, "WWW-Authenticate", www_auth);
  434. headers = xs_dict_append(headers, "Cache-Control", "no-cache, must-revalidate, max-age=0");
  435. }
  436. if (ctype == NULL)
  437. ctype = "text/html; charset=utf-8";
  438. headers = xs_dict_append(headers, "content-type", ctype);
  439. headers = xs_dict_append(headers, "x-creator", USER_AGENT);
  440. if (!xs_is_null(etag))
  441. headers = xs_dict_append(headers, "etag", etag);
  442. if (!xs_is_null(last_modified))
  443. headers = xs_dict_append(headers, "last-modified", last_modified);
  444. if (!xs_is_null(link))
  445. headers = xs_dict_append(headers, "Link", link);
  446. /* if there are any additional headers, add them */
  447. const xs_dict *more_headers = xs_dict_get(srv_config, "http_headers");
  448. if (xs_type(more_headers) == XSTYPE_DICT) {
  449. const char *k, *v;
  450. int c = 0;
  451. while (xs_dict_next(more_headers, &k, &v, &c))
  452. headers = xs_dict_set(headers, k, v);
  453. }
  454. if (b_size == 0 && body != NULL)
  455. b_size = strlen(body);
  456. /* if it was a HEAD, no body will be sent */
  457. if (strcmp(method, "HEAD") == 0)
  458. body = xs_free(body);
  459. headers = xs_dict_append(headers, "access-control-allow-origin", "*");
  460. headers = xs_dict_append(headers, "access-control-allow-headers", "*");
  461. /* disable any form of fucking JavaScript */
  462. headers = xs_dict_append(headers, "Content-Security-Policy", "script-src ;");
  463. if (p_state->use_fcgi)
  464. xs_fcgi_response(f, status, headers, body, b_size, fcgi_id);
  465. else
  466. xs_httpd_response(f, status, http_status_text(status), headers, body, b_size);
  467. fclose(f);
  468. srv_archive("RECV", NULL, req, payload, p_size, status, headers, body, b_size);
  469. /* JSON validation check */
  470. if (!xs_is_null(body) && strcmp(ctype, "application/json") == 0) {
  471. xs *j = xs_json_loads(body);
  472. if (j == NULL) {
  473. srv_log(xs_fmt("bad JSON"));
  474. srv_archive_error("bad_json", "bad JSON", req, body);
  475. }
  476. }
  477. xs_free(body);
  478. }
  479. void job_post(const xs_val *job, int urgent)
  480. /* posts a job for the threads to process it */
  481. {
  482. if (job != NULL) {
  483. /* lock the mutex */
  484. pthread_mutex_lock(&job_mutex);
  485. job_fifo_item *i = xs_realloc(NULL, sizeof(job_fifo_item));
  486. *i = (job_fifo_item){ NULL, xs_dup(job) };
  487. if (job_fifo_first == NULL)
  488. job_fifo_first = job_fifo_last = i;
  489. else
  490. if (urgent) {
  491. /* prepend */
  492. i->next = job_fifo_first;
  493. job_fifo_first = i;
  494. }
  495. else {
  496. /* append */
  497. job_fifo_last->next = i;
  498. job_fifo_last = i;
  499. }
  500. p_state->job_fifo_size++;
  501. if (p_state->job_fifo_size > p_state->peak_job_fifo_size)
  502. p_state->peak_job_fifo_size = p_state->job_fifo_size;
  503. /* unlock the mutex */
  504. pthread_mutex_unlock(&job_mutex);
  505. /* ask for someone to attend it */
  506. sem_post(job_sem);
  507. }
  508. }
  509. void job_wait(xs_val **job)
  510. /* waits for an available job */
  511. {
  512. *job = NULL;
  513. if (sem_wait(job_sem) == 0) {
  514. /* lock the mutex */
  515. pthread_mutex_lock(&job_mutex);
  516. /* dequeue */
  517. job_fifo_item *i = job_fifo_first;
  518. if (i != NULL) {
  519. job_fifo_first = i->next;
  520. if (job_fifo_first == NULL)
  521. job_fifo_last = NULL;
  522. *job = i->job;
  523. xs_free(i);
  524. p_state->job_fifo_size--;
  525. }
  526. /* unlock the mutex */
  527. pthread_mutex_unlock(&job_mutex);
  528. }
  529. }
  530. static void *job_thread(void *arg)
  531. /* job thread */
  532. {
  533. int pid = (int)(uintptr_t)arg;
  534. srv_debug(1, xs_fmt("job thread %d started", pid));
  535. for (;;) {
  536. xs *job = NULL;
  537. p_state->th_state[pid] = THST_WAIT;
  538. job_wait(&job);
  539. if (job == NULL) /* corrupted message? */
  540. continue;
  541. if (xs_type(job) == XSTYPE_FALSE) /* special message: exit */
  542. break;
  543. else
  544. if (xs_type(job) == XSTYPE_DATA) {
  545. /* it's a socket */
  546. FILE *f = NULL;
  547. p_state->th_state[pid] = THST_IN;
  548. xs_data_get(&f, job);
  549. if (f != NULL)
  550. httpd_connection(f);
  551. }
  552. else {
  553. /* it's a q_item */
  554. p_state->th_state[pid] = THST_QUEUE;
  555. process_queue_item(job);
  556. }
  557. }
  558. p_state->th_state[pid] = THST_STOP;
  559. srv_debug(1, xs_fmt("job thread %d stopped", pid));
  560. return NULL;
  561. }
  562. /* background thread sleep control */
  563. static pthread_mutex_t sleep_mutex;
  564. static pthread_cond_t sleep_cond;
  565. static void *background_thread(void *arg)
  566. /* background thread (queue management and other things) */
  567. {
  568. time_t purge_time;
  569. (void)arg;
  570. /* first purge time */
  571. purge_time = time(NULL) + 10 * 60;
  572. srv_log(xs_fmt("background thread started"));
  573. while (p_state->srv_running) {
  574. time_t t;
  575. int cnt = 0;
  576. p_state->th_state[0] = THST_QUEUE;
  577. {
  578. xs *list = user_list();
  579. char *p;
  580. const char *uid;
  581. /* process queues for all users */
  582. p = list;
  583. while (xs_list_iter(&p, &uid)) {
  584. snac snac;
  585. if (user_open(&snac, uid)) {
  586. cnt += process_user_queue(&snac);
  587. user_free(&snac);
  588. }
  589. }
  590. }
  591. /* global queue */
  592. cnt += process_queue();
  593. /* time to purge? */
  594. if ((t = time(NULL)) > purge_time) {
  595. /* next purge time is tomorrow */
  596. purge_time = t + 24 * 60 * 60;
  597. xs *q_item = xs_dict_new();
  598. q_item = xs_dict_append(q_item, "type", "purge");
  599. job_post(q_item, 0);
  600. }
  601. if (cnt == 0) {
  602. /* sleep 3 seconds */
  603. p_state->th_state[0] = THST_WAIT;
  604. #ifdef USE_POLL_FOR_SLEEP
  605. poll(NULL, 0, 3 * 1000);
  606. #else
  607. struct timespec ts;
  608. clock_gettime(CLOCK_REALTIME, &ts);
  609. ts.tv_sec += 3;
  610. pthread_mutex_lock(&sleep_mutex);
  611. while (pthread_cond_timedwait(&sleep_cond, &sleep_mutex, &ts) == 0);
  612. pthread_mutex_unlock(&sleep_mutex);
  613. #endif
  614. }
  615. }
  616. p_state->th_state[0] = THST_STOP;
  617. srv_log(xs_fmt("background thread stopped"));
  618. return NULL;
  619. }
  620. void term_handler(int s)
  621. {
  622. (void)s;
  623. longjmp(on_break, 1);
  624. }
  625. srv_state *srv_state_op(xs_str **fname, int op)
  626. /* opens or deletes the shared memory object */
  627. {
  628. int fd;
  629. srv_state *ss = NULL;
  630. if (*fname == NULL)
  631. *fname = xs_fmt("/%s_snac_state", xs_dict_get(srv_config, "host"));
  632. switch (op) {
  633. case 0: /* open for writing */
  634. #ifdef WITHOUT_SHM
  635. errno = ENOTSUP;
  636. #else
  637. if ((fd = shm_open(*fname, O_CREAT | O_RDWR, 0666)) != -1) {
  638. ftruncate(fd, sizeof(*ss));
  639. if ((ss = mmap(0, sizeof(*ss), PROT_READ | PROT_WRITE,
  640. MAP_SHARED, fd, 0)) == MAP_FAILED)
  641. ss = NULL;
  642. close(fd);
  643. }
  644. #endif
  645. if (ss == NULL) {
  646. /* shared memory error: just create a plain structure */
  647. srv_log(xs_fmt("warning: shm object error (%s)", strerror(errno)));
  648. ss = malloc(sizeof(*ss));
  649. }
  650. /* init structure */
  651. *ss = (srv_state){0};
  652. ss->s_size = sizeof(*ss);
  653. break;
  654. case 1: /* open for reading */
  655. #ifdef WITHOUT_SHM
  656. errno = ENOTSUP;
  657. #else
  658. if ((fd = shm_open(*fname, O_RDONLY, 0666)) != -1) {
  659. if ((ss = mmap(0, sizeof(*ss), PROT_READ, MAP_SHARED, fd, 0)) == MAP_FAILED)
  660. ss = NULL;
  661. close(fd);
  662. }
  663. #endif
  664. if (ss == NULL) {
  665. /* shared memory error */
  666. srv_log(xs_fmt("error: shm object error (%s) server not running?", strerror(errno)));
  667. }
  668. else
  669. if (ss->s_size != sizeof(*ss)) {
  670. srv_log(xs_fmt("error: struct size mismatch (%d != %d)",
  671. ss->s_size, sizeof(*ss)));
  672. munmap(ss, sizeof(*ss));
  673. ss = NULL;
  674. }
  675. break;
  676. case 2: /* unlink */
  677. #ifndef WITHOUT_SHM
  678. if (*fname)
  679. shm_unlink(*fname);
  680. #endif
  681. break;
  682. }
  683. return ss;
  684. }
  685. void httpd(void)
  686. /* starts the server */
  687. {
  688. const char *address = NULL;
  689. const char *port = NULL;
  690. xs *full_address = NULL;
  691. int rs;
  692. pthread_t threads[MAX_THREADS] = {0};
  693. int n;
  694. xs *sem_name = NULL;
  695. xs *shm_name = NULL;
  696. sem_t anon_job_sem;
  697. xs *pidfile = xs_fmt("%s/server.pid", srv_basedir);
  698. int pidfd;
  699. {
  700. /* do some pidfile locking acrobatics */
  701. if ((pidfd = open(pidfile, O_RDWR | O_CREAT, 0660)) == -1) {
  702. srv_log(xs_fmt("Cannot create pidfile %s -- cannot continue", pidfile));
  703. return;
  704. }
  705. if (lockf(pidfd, F_TLOCK, 1) == -1) {
  706. srv_log(xs_fmt("Cannot lock pidfile %s -- server already running?", pidfile));
  707. close(pidfd);
  708. return;
  709. }
  710. ftruncate(pidfd, 0);
  711. xs *s = xs_fmt("%d\n", (int)getpid());
  712. write(pidfd, s, strlen(s));
  713. }
  714. address = xs_dict_get(srv_config, "address");
  715. if (*address == '/') {
  716. rs = xs_unix_socket_server(address, NULL);
  717. full_address = xs_fmt("unix:%s", address);
  718. }
  719. else {
  720. port = xs_number_str(xs_dict_get(srv_config, "port"));
  721. full_address = xs_fmt("%s:%s", address, port);
  722. rs = xs_socket_server(address, port);
  723. }
  724. if (rs == -1) {
  725. srv_log(xs_fmt("cannot bind socket to %s", full_address));
  726. return;
  727. }
  728. /* setup the server stat structure */
  729. p_state = srv_state_op(&shm_name, 0);
  730. p_state->srv_start_time = time(NULL);
  731. p_state->use_fcgi = xs_type(xs_dict_get(srv_config, "fastcgi")) == XSTYPE_TRUE;
  732. p_state->srv_running = 1;
  733. signal(SIGPIPE, SIG_IGN);
  734. signal(SIGTERM, term_handler);
  735. signal(SIGINT, term_handler);
  736. srv_log(xs_fmt("httpd%s start %s %s", p_state->use_fcgi ? " (FastCGI)" : "",
  737. full_address, USER_AGENT));
  738. /* show the number of usable file descriptors */
  739. struct rlimit r;
  740. getrlimit(RLIMIT_NOFILE, &r);
  741. srv_debug(1, xs_fmt("available (rlimit) fds: %d (cur) / %d (max)",
  742. (int) r.rlim_cur, (int) r.rlim_max));
  743. /* initialize the job control engine */
  744. pthread_mutex_init(&job_mutex, NULL);
  745. sem_name = xs_fmt("/job_%d", getpid());
  746. job_sem = sem_open(sem_name, O_CREAT, 0644, 0);
  747. if (job_sem == NULL) {
  748. /* error opening a named semaphore; try with an anonymous one */
  749. if (sem_init(&anon_job_sem, 0, 0) != -1)
  750. job_sem = &anon_job_sem;
  751. }
  752. if (job_sem == NULL) {
  753. srv_log(xs_fmt("fatal error: cannot create semaphore -- cannot continue"));
  754. return;
  755. }
  756. /* initialize sleep control */
  757. pthread_mutex_init(&sleep_mutex, NULL);
  758. pthread_cond_init(&sleep_cond, NULL);
  759. p_state->n_threads = xs_number_get(xs_dict_get(srv_config, "num_threads"));
  760. #ifdef _SC_NPROCESSORS_ONLN
  761. if (p_state->n_threads == 0) {
  762. /* get number of CPUs on the machine */
  763. p_state->n_threads = sysconf(_SC_NPROCESSORS_ONLN);
  764. }
  765. #endif
  766. if (p_state->n_threads < 4)
  767. p_state->n_threads = 4;
  768. if (p_state->n_threads > MAX_THREADS)
  769. p_state->n_threads = MAX_THREADS;
  770. srv_debug(0, xs_fmt("using %d threads", p_state->n_threads));
  771. /* thread #0 is the background thread */
  772. pthread_create(&threads[0], NULL, background_thread, NULL);
  773. /* the rest of threads are for job processing */
  774. char *ptr = (char *) 0x1;
  775. for (n = 1; n < p_state->n_threads; n++)
  776. pthread_create(&threads[n], NULL, job_thread, ptr++);
  777. if (setjmp(on_break) == 0) {
  778. for (;;) {
  779. int cs = xs_socket_accept(rs);
  780. if (cs != -1) {
  781. FILE *f = fdopen(cs, "r+");
  782. xs *job = xs_data_new(&f, sizeof(FILE *));
  783. job_post(job, 1);
  784. }
  785. else
  786. break;
  787. }
  788. }
  789. p_state->srv_running = 0;
  790. /* send as many exit jobs as working threads */
  791. for (n = 1; n < p_state->n_threads; n++)
  792. job_post(xs_stock(XSTYPE_FALSE), 0);
  793. /* wait for all the threads to exit */
  794. for (n = 0; n < p_state->n_threads; n++)
  795. pthread_join(threads[n], NULL);
  796. sem_close(job_sem);
  797. sem_unlink(sem_name);
  798. srv_state_op(&shm_name, 2);
  799. xs *uptime = xs_str_time_diff(time(NULL) - p_state->srv_start_time);
  800. srv_log(xs_fmt("httpd%s stop %s (run time: %s)",
  801. p_state->use_fcgi ? " (FastCGI)" : "",
  802. full_address, uptime));
  803. unlink(pidfile);
  804. }