httpd.c 22 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837
  1. /* snac - A simple, minimalistic ActivityPub instance */
  2. /* copyright (c) 2022 - 2024 grunfink et al. / MIT license */
  3. #include "xs.h"
  4. #include "xs_io.h"
  5. #include "xs_json.h"
  6. #include "xs_socket.h"
  7. #include "xs_httpd.h"
  8. #include "xs_mime.h"
  9. #include "xs_time.h"
  10. #include "xs_openssl.h"
  11. #include "xs_fcgi.h"
  12. #include "xs_html.h"
  13. #include "snac.h"
  14. #include <setjmp.h>
  15. #include <pthread.h>
  16. #include <semaphore.h>
  17. #include <fcntl.h>
  18. #include <stdint.h>
  19. #include <sys/resource.h> // for getrlimit()
  20. #include <sys/mman.h>
  21. #ifdef USE_POLL_FOR_SLEEP
  22. #include <poll.h>
  23. #endif
  24. /** server state **/
  25. srv_state *p_state = NULL;
  26. /** job control **/
  27. /* mutex to access the lists of jobs */
  28. static pthread_mutex_t job_mutex;
  29. /* semaphore to trigger job processing */
  30. static sem_t *job_sem;
  31. typedef struct job_fifo_item {
  32. struct job_fifo_item *next;
  33. xs_val *job;
  34. } job_fifo_item;
  35. static job_fifo_item *job_fifo_first = NULL;
  36. static job_fifo_item *job_fifo_last = NULL;
  37. /** other global data **/
  38. static jmp_buf on_break;
  39. /** code **/
  40. /* nodeinfo 2.0 template */
  41. const char *nodeinfo_2_0_template = ""
  42. "{\"version\":\"2.0\","
  43. "\"software\":{\"name\":\"snac\",\"version\":\"" VERSION "\"},"
  44. "\"protocols\":[\"activitypub\"],"
  45. "\"services\":{\"outbound\":[],\"inbound\":[]},"
  46. "\"usage\":{\"users\":{\"total\":%d,\"activeMonth\":%d,\"activeHalfyear\":%d},"
  47. "\"localPosts\":%d},"
  48. "\"openRegistrations\":false,\"metadata\":{}}";
  49. xs_str *nodeinfo_2_0(void)
  50. /* builds a nodeinfo json object */
  51. {
  52. int n_utotal = 0;
  53. int n_umonth = 0;
  54. int n_uhyear = 0;
  55. int n_posts = 0;
  56. xs *users = user_list();
  57. xs_list *p = users;
  58. char *v;
  59. double now = (double)time(NULL);
  60. while (xs_list_iter(&p, &v)) {
  61. /* build the full path name to the last usage log */
  62. xs *llfn = xs_fmt("%s/user/%s/lastlog.txt", srv_basedir, v);
  63. double llsecs = now - mtime(llfn);
  64. if (llsecs < 60 * 60 * 24 * 30 * 6) {
  65. n_uhyear++;
  66. if (llsecs < 60 * 60 * 24 * 30)
  67. n_umonth++;
  68. }
  69. n_utotal++;
  70. /* build the file to each user public.idx */
  71. xs *pidxfn = xs_fmt("%s/user/%s/public.idx", srv_basedir, v);
  72. n_posts += index_len(pidxfn);
  73. }
  74. return xs_fmt(nodeinfo_2_0_template, n_utotal, n_umonth, n_uhyear, n_posts);
  75. }
  76. static xs_str *greeting_html(void)
  77. /* processes and returns greeting.html */
  78. {
  79. /* try to open greeting.html */
  80. xs *fn = xs_fmt("%s/greeting.html", srv_basedir);
  81. FILE *f;
  82. xs_str *s = NULL;
  83. if ((f = fopen(fn, "r")) != NULL) {
  84. s = xs_readall(f);
  85. fclose(f);
  86. /* replace %host% */
  87. s = xs_replace_i(s, "%host%", xs_dict_get(srv_config, "host"));
  88. const char *adm_email = xs_dict_get(srv_config, "admin_email");
  89. if (xs_is_null(adm_email) || *adm_email == '\0')
  90. adm_email = "the administrator of this instance";
  91. /* replace %admin_email */
  92. s = xs_replace_i(s, "%admin_email%", adm_email);
  93. /* does it have a %userlist% mark? */
  94. if (xs_str_in(s, "%userlist%") != -1) {
  95. char *host = xs_dict_get(srv_config, "host");
  96. xs *list = user_list();
  97. xs_list *p = list;
  98. xs_str *uid;
  99. xs_html *ul = xs_html_tag("ul",
  100. xs_html_attr("class", "snac-user-list"));
  101. p = list;
  102. while (xs_list_iter(&p, &uid)) {
  103. snac user;
  104. if (user_open(&user, uid)) {
  105. xs_html_add(ul,
  106. xs_html_tag("li",
  107. xs_html_tag("a",
  108. xs_html_attr("href", user.actor),
  109. xs_html_text("@"),
  110. xs_html_text(uid),
  111. xs_html_text("@"),
  112. xs_html_text(host),
  113. xs_html_text(" ("),
  114. xs_html_text(xs_dict_get(user.config, "name")),
  115. xs_html_text(")"))));
  116. user_free(&user);
  117. }
  118. }
  119. xs *s1 = xs_html_render(ul);
  120. s = xs_replace_i(s, "%userlist%", s1);
  121. }
  122. }
  123. return s;
  124. }
  125. int server_get_handler(xs_dict *req, const char *q_path,
  126. char **body, int *b_size, char **ctype)
  127. /* basic server services */
  128. {
  129. int status = 0;
  130. (void)req;
  131. /* is it the server root? */
  132. if (*q_path == '\0') {
  133. xs_dict *q_vars = xs_dict_get(req, "q_vars");
  134. char *t = NULL;
  135. if (xs_type(q_vars) == XSTYPE_DICT && (t = xs_dict_get(q_vars, "t"))) {
  136. int skip = 0;
  137. int show = xs_number_get(xs_dict_get(srv_config, "max_timeline_entries"));
  138. char *v;
  139. if ((v = xs_dict_get(q_vars, "skip")) != NULL)
  140. skip = atoi(v);
  141. if ((v = xs_dict_get(q_vars, "show")) != NULL)
  142. show = atoi(v);
  143. xs *tl = tag_search(t, skip, show + 1);
  144. int more = 0;
  145. if (xs_list_len(tl) >= show + 1) {
  146. /* drop the last one */
  147. tl = xs_list_del(tl, -1);
  148. more = 1;
  149. }
  150. *body = html_timeline(NULL, tl, 0, skip, show, more, t);
  151. }
  152. else
  153. if (xs_type(xs_dict_get(srv_config, "show_instance_timeline")) == XSTYPE_TRUE) {
  154. xs *tl = timeline_instance_list(0, 30);
  155. *body = html_timeline(NULL, tl, 0, 0, 0, 0, NULL);
  156. }
  157. else
  158. *body = greeting_html();
  159. if (*body)
  160. status = 200;
  161. }
  162. else
  163. if (strcmp(q_path, "/susie.png") == 0 || strcmp(q_path, "/favicon.ico") == 0 ) {
  164. status = 200;
  165. *body = xs_base64_dec(default_avatar_base64(), b_size);
  166. *ctype = "image/png";
  167. }
  168. else
  169. if (strcmp(q_path, "/.well-known/nodeinfo") == 0) {
  170. status = 200;
  171. *ctype = "application/json; charset=utf-8";
  172. *body = xs_fmt("{\"links\":["
  173. "{\"rel\":\"http:/" "/nodeinfo.diaspora.software/ns/schema/2.0\","
  174. "\"href\":\"%s/nodeinfo_2_0\"}]}",
  175. srv_baseurl);
  176. }
  177. else
  178. if (strcmp(q_path, "/.well-known/host-meta") == 0) {
  179. status = 200;
  180. *ctype = "application/xrd+xml";
  181. *body = xs_str_new("<XRD>"
  182. "<Link rel=\"lrdd\" type=\"application/xrd+xml\" template=\"%s/.well-known/webfinger?resource={uri}\"/>"
  183. "</XRD>");
  184. }
  185. else
  186. if (strcmp(q_path, "/nodeinfo_2_0") == 0) {
  187. status = 200;
  188. *ctype = "application/json; charset=utf-8";
  189. *body = nodeinfo_2_0();
  190. }
  191. else
  192. if (strcmp(q_path, "/robots.txt") == 0) {
  193. status = 200;
  194. *ctype = "text/plain";
  195. *body = xs_str_new("User-agent: *\n"
  196. "Disallow: /\n");
  197. }
  198. else
  199. if (strcmp(q_path, "/.well-known/host-meta") == 0) {
  200. status = 200;
  201. *ctype = "application/xrd+xml";
  202. *body = xs_str_new("<XRD>"
  203. "<Link rel=\"lrdd\" type=\"application/xrd+xml\" template=\"%s/.well-known/webfinger?resource={uri}\"/>"
  204. "</XRD>");
  205. }
  206. if (status != 0)
  207. srv_debug(1, xs_fmt("server_get_handler serving '%s' %d", q_path, status));
  208. return status;
  209. }
  210. void httpd_connection(FILE *f)
  211. /* the connection processor */
  212. {
  213. xs *req;
  214. char *method;
  215. int status = 0;
  216. xs_str *body = NULL;
  217. int b_size = 0;
  218. char *ctype = NULL;
  219. xs *headers = xs_dict_new();
  220. xs *q_path = NULL;
  221. xs *payload = NULL;
  222. xs *etag = NULL;
  223. int p_size = 0;
  224. char *p;
  225. int fcgi_id;
  226. if (p_state->use_fcgi)
  227. req = xs_fcgi_request(f, &payload, &p_size, &fcgi_id);
  228. else
  229. req = xs_httpd_request(f, &payload, &p_size);
  230. if (req == NULL) {
  231. /* probably because a timeout */
  232. fclose(f);
  233. return;
  234. }
  235. if (!(method = xs_dict_get(req, "method")) || !(p = xs_dict_get(req, "path"))) {
  236. /* missing needed headers; discard */
  237. fclose(f);
  238. return;
  239. }
  240. q_path = xs_dup(p);
  241. /* crop the q_path from leading / and the prefix */
  242. if (xs_endswith(q_path, "/"))
  243. q_path = xs_crop_i(q_path, 0, -1);
  244. p = xs_dict_get(srv_config, "prefix");
  245. if (xs_startswith(q_path, p))
  246. q_path = xs_crop_i(q_path, strlen(p), 0);
  247. if (strcmp(method, "GET") == 0 || strcmp(method, "HEAD") == 0) {
  248. /* cascade through */
  249. if (status == 0)
  250. status = server_get_handler(req, q_path, &body, &b_size, &ctype);
  251. if (status == 0)
  252. status = webfinger_get_handler(req, q_path, &body, &b_size, &ctype);
  253. if (status == 0)
  254. status = activitypub_get_handler(req, q_path, &body, &b_size, &ctype);
  255. #ifndef NO_MASTODON_API
  256. if (status == 0)
  257. status = oauth_get_handler(req, q_path, &body, &b_size, &ctype);
  258. if (status == 0)
  259. status = mastoapi_get_handler(req, q_path, &body, &b_size, &ctype);
  260. #endif /* NO_MASTODON_API */
  261. if (status == 0)
  262. status = html_get_handler(req, q_path, &body, &b_size, &ctype, &etag);
  263. }
  264. else
  265. if (strcmp(method, "POST") == 0) {
  266. #ifndef NO_MASTODON_API
  267. if (status == 0)
  268. status = oauth_post_handler(req, q_path,
  269. payload, p_size, &body, &b_size, &ctype);
  270. if (status == 0)
  271. status = mastoapi_post_handler(req, q_path,
  272. payload, p_size, &body, &b_size, &ctype);
  273. #endif
  274. if (status == 0)
  275. status = activitypub_post_handler(req, q_path,
  276. payload, p_size, &body, &b_size, &ctype);
  277. if (status == 0)
  278. status = html_post_handler(req, q_path,
  279. payload, p_size, &body, &b_size, &ctype);
  280. }
  281. else
  282. if (strcmp(method, "PUT") == 0) {
  283. #ifndef NO_MASTODON_API
  284. if (status == 0)
  285. status = mastoapi_put_handler(req, q_path,
  286. payload, p_size, &body, &b_size, &ctype);
  287. #endif
  288. }
  289. else
  290. if (strcmp(method, "OPTIONS") == 0) {
  291. status = 200;
  292. }
  293. else
  294. if (strcmp(method, "DELETE") == 0) {
  295. #ifndef NO_MASTODON_API
  296. if (status == 0)
  297. status = mastoapi_delete_handler(req, q_path,
  298. &body, &b_size, &ctype);
  299. #endif
  300. }
  301. /* unattended? it's an error */
  302. if (status == 0) {
  303. srv_archive_error("unattended_method", "unattended method", req, payload);
  304. srv_debug(1, xs_fmt("httpd_connection unattended %s %s", method, q_path));
  305. status = 404;
  306. }
  307. if (status == 403)
  308. body = xs_str_new("<h1>403 Forbidden</h1>");
  309. if (status == 404)
  310. body = xs_str_new("<h1>404 Not Found</h1>");
  311. if (status == 400 && body != NULL)
  312. body = xs_str_new("<h1>400 Bad Request</h1>");
  313. if (status == 303)
  314. headers = xs_dict_append(headers, "location", body);
  315. if (status == 401) {
  316. xs *www_auth = xs_fmt("Basic realm=\"@%s@%s snac login\"",
  317. body, xs_dict_get(srv_config, "host"));
  318. headers = xs_dict_append(headers, "WWW-Authenticate", www_auth);
  319. }
  320. if (ctype == NULL)
  321. ctype = "text/html; charset=utf-8";
  322. headers = xs_dict_append(headers, "content-type", ctype);
  323. headers = xs_dict_append(headers, "x-creator", USER_AGENT);
  324. if (!xs_is_null(etag))
  325. headers = xs_dict_append(headers, "etag", etag);
  326. /* if there are any additional headers, add them */
  327. xs_dict *more_headers = xs_dict_get(srv_config, "http_headers");
  328. if (xs_type(more_headers) == XSTYPE_DICT) {
  329. char *k, *v;
  330. while (xs_dict_iter(&more_headers, &k, &v))
  331. headers = xs_dict_set(headers, k, v);
  332. }
  333. if (b_size == 0 && body != NULL)
  334. b_size = strlen(body);
  335. /* if it was a HEAD, no body will be sent */
  336. if (strcmp(method, "HEAD") == 0)
  337. body = xs_free(body);
  338. headers = xs_dict_append(headers, "access-control-allow-origin", "*");
  339. headers = xs_dict_append(headers, "access-control-allow-headers", "*");
  340. if (p_state->use_fcgi)
  341. xs_fcgi_response(f, status, headers, body, b_size, fcgi_id);
  342. else
  343. xs_httpd_response(f, status, headers, body, b_size);
  344. fclose(f);
  345. srv_archive("RECV", NULL, req, payload, p_size, status, headers, body, b_size);
  346. /* JSON validation check */
  347. if (!xs_is_null(body) && strcmp(ctype, "application/json") == 0) {
  348. xs *j = xs_json_loads(body);
  349. if (j == NULL) {
  350. srv_log(xs_fmt("bad JSON"));
  351. srv_archive_error("bad_json", "bad JSON", req, body);
  352. }
  353. }
  354. xs_free(body);
  355. }
  356. void job_post(const xs_val *job, int urgent)
  357. /* posts a job for the threads to process it */
  358. {
  359. if (job != NULL) {
  360. /* lock the mutex */
  361. pthread_mutex_lock(&job_mutex);
  362. job_fifo_item *i = xs_realloc(NULL, sizeof(job_fifo_item));
  363. *i = (job_fifo_item){ NULL, xs_dup(job) };
  364. if (job_fifo_first == NULL)
  365. job_fifo_first = job_fifo_last = i;
  366. else
  367. if (urgent) {
  368. /* prepend */
  369. i->next = job_fifo_first;
  370. job_fifo_first = i;
  371. }
  372. else {
  373. /* append */
  374. job_fifo_last->next = i;
  375. job_fifo_last = i;
  376. }
  377. p_state->job_fifo_size++;
  378. if (p_state->job_fifo_size > p_state->peak_job_fifo_size)
  379. p_state->peak_job_fifo_size = p_state->job_fifo_size;
  380. /* unlock the mutex */
  381. pthread_mutex_unlock(&job_mutex);
  382. /* ask for someone to attend it */
  383. sem_post(job_sem);
  384. }
  385. }
  386. void job_wait(xs_val **job)
  387. /* waits for an available job */
  388. {
  389. *job = NULL;
  390. if (sem_wait(job_sem) == 0) {
  391. /* lock the mutex */
  392. pthread_mutex_lock(&job_mutex);
  393. /* dequeue */
  394. job_fifo_item *i = job_fifo_first;
  395. if (i != NULL) {
  396. job_fifo_first = i->next;
  397. if (job_fifo_first == NULL)
  398. job_fifo_last = NULL;
  399. *job = i->job;
  400. xs_free(i);
  401. p_state->job_fifo_size--;
  402. }
  403. /* unlock the mutex */
  404. pthread_mutex_unlock(&job_mutex);
  405. }
  406. }
  407. static void *job_thread(void *arg)
  408. /* job thread */
  409. {
  410. int pid = (int)(uintptr_t)arg;
  411. srv_debug(1, xs_fmt("job thread %d started", pid));
  412. for (;;) {
  413. xs *job = NULL;
  414. p_state->th_state[pid] = THST_WAIT;
  415. job_wait(&job);
  416. if (job == NULL) /* corrupted message? */
  417. continue;
  418. if (xs_type(job) == XSTYPE_FALSE) /* special message: exit */
  419. break;
  420. else
  421. if (xs_type(job) == XSTYPE_DATA) {
  422. /* it's a socket */
  423. FILE *f = NULL;
  424. p_state->th_state[pid] = THST_IN;
  425. xs_data_get(&f, job);
  426. if (f != NULL)
  427. httpd_connection(f);
  428. }
  429. else {
  430. /* it's a q_item */
  431. p_state->th_state[pid] = THST_QUEUE;
  432. process_queue_item(job);
  433. }
  434. }
  435. p_state->th_state[pid] = THST_STOP;
  436. srv_debug(1, xs_fmt("job thread %d stopped", pid));
  437. return NULL;
  438. }
  439. /* background thread sleep control */
  440. static pthread_mutex_t sleep_mutex;
  441. static pthread_cond_t sleep_cond;
  442. static void *background_thread(void *arg)
  443. /* background thread (queue management and other things) */
  444. {
  445. time_t purge_time;
  446. (void)arg;
  447. /* first purge time */
  448. purge_time = time(NULL) + 10 * 60;
  449. srv_log(xs_fmt("background thread started"));
  450. while (p_state->srv_running) {
  451. time_t t;
  452. int cnt = 0;
  453. p_state->th_state[0] = THST_QUEUE;
  454. {
  455. xs *list = user_list();
  456. char *p, *uid;
  457. /* process queues for all users */
  458. p = list;
  459. while (xs_list_iter(&p, &uid)) {
  460. snac snac;
  461. if (user_open(&snac, uid)) {
  462. cnt += process_user_queue(&snac);
  463. user_free(&snac);
  464. }
  465. }
  466. }
  467. /* global queue */
  468. cnt += process_queue();
  469. /* time to purge? */
  470. if ((t = time(NULL)) > purge_time) {
  471. /* next purge time is tomorrow */
  472. purge_time = t + 24 * 60 * 60;
  473. xs *q_item = xs_dict_new();
  474. q_item = xs_dict_append(q_item, "type", "purge");
  475. job_post(q_item, 0);
  476. }
  477. if (cnt == 0) {
  478. /* sleep 3 seconds */
  479. p_state->th_state[0] = THST_WAIT;
  480. #ifdef USE_POLL_FOR_SLEEP
  481. poll(NULL, 0, 3 * 1000);
  482. #else
  483. struct timespec ts;
  484. clock_gettime(CLOCK_REALTIME, &ts);
  485. ts.tv_sec += 3;
  486. pthread_mutex_lock(&sleep_mutex);
  487. while (pthread_cond_timedwait(&sleep_cond, &sleep_mutex, &ts) == 0);
  488. pthread_mutex_unlock(&sleep_mutex);
  489. #endif
  490. }
  491. }
  492. p_state->th_state[0] = THST_STOP;
  493. srv_log(xs_fmt("background thread stopped"));
  494. return NULL;
  495. }
  496. void term_handler(int s)
  497. {
  498. (void)s;
  499. longjmp(on_break, 1);
  500. }
  501. srv_state *srv_state_op(xs_str **fname, int op)
  502. /* opens or deletes the shared memory object */
  503. {
  504. int fd;
  505. srv_state *ss = NULL;
  506. if (*fname == NULL)
  507. *fname = xs_fmt("/%s_snac_state", xs_dict_get(srv_config, "host"));
  508. switch (op) {
  509. case 0: /* open for writing */
  510. if ((fd = shm_open(*fname, O_CREAT | O_RDWR, 0666)) != -1) {
  511. ftruncate(fd, sizeof(*ss));
  512. if ((ss = mmap(0, sizeof(*ss), PROT_READ | PROT_WRITE,
  513. MAP_SHARED, fd, 0)) == MAP_FAILED)
  514. ss = NULL;
  515. close(fd);
  516. }
  517. if (ss == NULL) {
  518. /* shared memory error: just create a plain structure */
  519. srv_log(xs_fmt("warning: shm object error (%s)", strerror(errno)));
  520. ss = malloc(sizeof(*ss));
  521. }
  522. /* init structure */
  523. *ss = (srv_state){0};
  524. ss->s_size = sizeof(*ss);
  525. break;
  526. case 1: /* open for reading */
  527. if ((fd = shm_open(*fname, O_RDONLY, 0666)) != -1) {
  528. if ((ss = mmap(0, sizeof(*ss), PROT_READ, MAP_SHARED, fd, 0)) == MAP_FAILED)
  529. ss = NULL;
  530. close(fd);
  531. }
  532. if (ss == NULL) {
  533. /* shared memory error */
  534. srv_log(xs_fmt("error: shm object error (%s) server not running?", strerror(errno)));
  535. }
  536. else
  537. if (ss->s_size != sizeof(*ss)) {
  538. srv_log(xs_fmt("error: struct size mismatch (%d != %d)",
  539. ss->s_size, sizeof(*ss)));
  540. munmap(ss, sizeof(*ss));
  541. ss = NULL;
  542. }
  543. break;
  544. case 2: /* unlink */
  545. if (*fname)
  546. shm_unlink(*fname);
  547. break;
  548. }
  549. return ss;
  550. }
  551. void httpd(void)
  552. /* starts the server */
  553. {
  554. const char *address;
  555. const char *port;
  556. int rs;
  557. pthread_t threads[MAX_THREADS] = {0};
  558. int n;
  559. xs *sem_name = NULL;
  560. xs *shm_name = NULL;
  561. sem_t anon_job_sem;
  562. address = xs_dict_get(srv_config, "address");
  563. port = xs_number_str(xs_dict_get(srv_config, "port"));
  564. if ((rs = xs_socket_server(address, port)) == -1) {
  565. srv_log(xs_fmt("cannot bind socket to %s:%s", address, port));
  566. return;
  567. }
  568. /* setup the server stat structure */
  569. p_state = srv_state_op(&shm_name, 0);
  570. p_state->srv_start_time = time(NULL);
  571. p_state->use_fcgi = xs_type(xs_dict_get(srv_config, "fastcgi")) == XSTYPE_TRUE;
  572. p_state->srv_running = 1;
  573. signal(SIGPIPE, SIG_IGN);
  574. signal(SIGTERM, term_handler);
  575. signal(SIGINT, term_handler);
  576. srv_log(xs_fmt("httpd%s start %s:%s %s", p_state->use_fcgi ? " (FastCGI)" : "",
  577. address, port, USER_AGENT));
  578. /* show the number of usable file descriptors */
  579. struct rlimit r;
  580. getrlimit(RLIMIT_NOFILE, &r);
  581. srv_debug(0, xs_fmt("available (rlimit) fds: %d (cur) / %d (max)",
  582. (int) r.rlim_cur, (int) r.rlim_max));
  583. /* initialize the job control engine */
  584. pthread_mutex_init(&job_mutex, NULL);
  585. sem_name = xs_fmt("/job_%d", getpid());
  586. job_sem = sem_open(sem_name, O_CREAT, 0644, 0);
  587. if (job_sem == NULL) {
  588. /* error opening a named semaphore; try with an anonymous one */
  589. if (sem_init(&anon_job_sem, 0, 0) != -1)
  590. job_sem = &anon_job_sem;
  591. }
  592. if (job_sem == NULL) {
  593. srv_log(xs_fmt("fatal error: cannot create semaphore -- cannot continue"));
  594. return;
  595. }
  596. /* initialize sleep control */
  597. pthread_mutex_init(&sleep_mutex, NULL);
  598. pthread_cond_init(&sleep_cond, NULL);
  599. p_state->n_threads = xs_number_get(xs_dict_get(srv_config, "num_threads"));
  600. #ifdef _SC_NPROCESSORS_ONLN
  601. if (p_state->n_threads == 0) {
  602. /* get number of CPUs on the machine */
  603. p_state->n_threads = sysconf(_SC_NPROCESSORS_ONLN);
  604. }
  605. #endif
  606. if (p_state->n_threads < 4)
  607. p_state->n_threads = 4;
  608. if (p_state->n_threads > MAX_THREADS)
  609. p_state->n_threads = MAX_THREADS;
  610. srv_debug(0, xs_fmt("using %d threads", p_state->n_threads));
  611. /* thread #0 is the background thread */
  612. pthread_create(&threads[0], NULL, background_thread, NULL);
  613. /* the rest of threads are for job processing */
  614. char *ptr = (char *) 0x1;
  615. for (n = 1; n < p_state->n_threads; n++)
  616. pthread_create(&threads[n], NULL, job_thread, ptr++);
  617. if (setjmp(on_break) == 0) {
  618. for (;;) {
  619. FILE *f = xs_socket_accept(rs);
  620. if (f != NULL) {
  621. xs *job = xs_data_new(&f, sizeof(FILE *));
  622. job_post(job, 1);
  623. }
  624. else
  625. break;
  626. }
  627. }
  628. p_state->srv_running = 0;
  629. /* send as many exit jobs as working threads */
  630. for (n = 1; n < p_state->n_threads; n++)
  631. job_post(xs_stock_false, 0);
  632. /* wait for all the threads to exit */
  633. for (n = 0; n < p_state->n_threads; n++)
  634. pthread_join(threads[n], NULL);
  635. sem_close(job_sem);
  636. sem_unlink(sem_name);
  637. srv_state_op(&shm_name, 2);
  638. xs *uptime = xs_str_time_diff(time(NULL) - p_state->srv_start_time);
  639. srv_log(xs_fmt("httpd%s stop %s:%s (run time: %s)",
  640. p_state->use_fcgi ? " (FastCGI)" : "",
  641. address, port, uptime));
  642. }