Tue, 19 Apr 2022 19:14:49 +0200
add function for registering webdav backends
1 | 1 | /* |
2 | * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS HEADER. | |
3 | * | |
44
3da1f7b6847f
added some error messages
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
41
diff
changeset
|
4 | * Copyright 2013 Olaf Wintermann. All rights reserved. |
1 | 5 | * |
6 | * Redistribution and use in source and binary forms, with or without | |
7 | * modification, are permitted provided that the following conditions are met: | |
8 | * | |
9 | * 1. Redistributions of source code must retain the above copyright | |
10 | * notice, this list of conditions and the following disclaimer. | |
11 | * | |
12 | * 2. Redistributions in binary form must reproduce the above copyright | |
13 | * notice, this list of conditions and the following disclaimer in the | |
14 | * documentation and/or other materials provided with the distribution. | |
15 | * | |
16 | * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" | |
17 | * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | |
18 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | |
19 | * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE | |
20 | * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR | |
21 | * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF | |
22 | * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS | |
23 | * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN | |
24 | * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) | |
25 | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE | |
26 | * POSSIBILITY OF SUCH DAMAGE. | |
27 | */ | |
28 | ||
41
bb7a1f5a8b48
added Linux support
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
39
diff
changeset
|
29 | |
bb7a1f5a8b48
added Linux support
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
39
diff
changeset
|
30 | #ifdef __gnu_linux__ |
bb7a1f5a8b48
added Linux support
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
39
diff
changeset
|
31 | #define _GNU_SOURCE |
bb7a1f5a8b48
added Linux support
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
39
diff
changeset
|
32 | #endif |
bb7a1f5a8b48
added Linux support
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
39
diff
changeset
|
33 | |
1 | 34 | #include <stdio.h> |
35 | #include <stdlib.h> | |
9
30e51941a673
Added mod_jk dependencies
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
6
diff
changeset
|
36 | #include <dlfcn.h> |
47
ce9790523346
server can change uid
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
44
diff
changeset
|
37 | #include <grp.h> |
58
66c22e54aa90
webdav uses the vfs api
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
47
diff
changeset
|
38 | #include <sys/types.h> |
66c22e54aa90
webdav uses the vfs api
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
47
diff
changeset
|
39 | #include <sys/stat.h> |
1 | 40 | |
106
b122f34ddc80
added minimal ssl support
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
85
diff
changeset
|
41 | #include <openssl/bio.h> |
b122f34ddc80
added minimal ssl support
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
85
diff
changeset
|
42 | #include <openssl/ssl.h> |
b122f34ddc80
added minimal ssl support
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
85
diff
changeset
|
43 | #include <openssl/err.h> |
b122f34ddc80
added minimal ssl support
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
85
diff
changeset
|
44 | |
14
b8bf95b39952
New source folder layout
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
9
diff
changeset
|
45 | #include "../public/nsapi.h" |
59
ab25c0a231d0
some fixes and new public APIs
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
58
diff
changeset
|
46 | #include "../public/auth.h" |
14
b8bf95b39952
New source folder layout
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
9
diff
changeset
|
47 | #include "../util/systhr.h" |
32
ebba53de8b18
added solaris 10 support
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
28
diff
changeset
|
48 | #include "../util/io.h" |
47
ce9790523346
server can change uid
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
44
diff
changeset
|
49 | #include "../util/util.h" |
1 | 50 | |
254 | 51 | #include <ucx/utils.h> |
156
724e107983e9
adds unix domain socket for server control ops
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
154
diff
changeset
|
52 | |
154
6394ce09889a
adds set-variable saf
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
146
diff
changeset
|
53 | #include "../safs/common.h" |
6394ce09889a
adds set-variable saf
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
146
diff
changeset
|
54 | |
1 | 55 | #include "func.h" |
18
73aacbf6e492
Added server.conf parser
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
14
diff
changeset
|
56 | #include "config.h" |
19
d680536f8c2f
Added configuration manager
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
18
diff
changeset
|
57 | #include "configmanager.h" |
1 | 58 | #include "httplistener.h" |
59 | #include "webserver.h" | |
28 | 60 | #include "log.h" |
66
74babc0082b7
added authentication cache
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
63
diff
changeset
|
61 | #include "auth.h" |
158
77f4f0079428
adds reconfig and shutdown handler to srvctrl
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
156
diff
changeset
|
62 | #include "srvctrl.h" |
269
3dfbd0b91950
add ResourcePool initialization
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
256
diff
changeset
|
63 | #include "resourcepool.h" |
1 | 64 | |
65 | extern struct FuncStruct webserver_funcs[]; | |
66 | ||
68
f5102a892ed4
some fixes for mod_jk
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
66
diff
changeset
|
67 | static RestartCallback *atrestart; |
1 | 68 | |
129
fd324464f56f
adds support for ssl cert chain files and improves ssl error handling
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
115
diff
changeset
|
69 | int webserver_init() { |
1 | 70 | // init NSPR |
71 | systhread_init("webserver"); | |
28 | 72 | |
106
b122f34ddc80
added minimal ssl support
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
85
diff
changeset
|
73 | // init ssl |
b122f34ddc80
added minimal ssl support
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
85
diff
changeset
|
74 | if(ws_init_ssl()) { |
b122f34ddc80
added minimal ssl support
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
85
diff
changeset
|
75 | return -1; |
b122f34ddc80
added minimal ssl support
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
85
diff
changeset
|
76 | } |
b122f34ddc80
added minimal ssl support
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
85
diff
changeset
|
77 | |
1 | 78 | // init NSAPI functions |
79 | func_init(); | |
80 | add_functions(webserver_funcs); | |
38
d07810b02147
added ldap authentication
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
32
diff
changeset
|
81 | |
269
3dfbd0b91950
add ResourcePool initialization
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
256
diff
changeset
|
82 | // init resource pools |
3dfbd0b91950
add ResourcePool initialization
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
256
diff
changeset
|
83 | if(init_resource_pools()) { |
3dfbd0b91950
add ResourcePool initialization
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
256
diff
changeset
|
84 | return -1; |
3dfbd0b91950
add ResourcePool initialization
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
256
diff
changeset
|
85 | } |
3dfbd0b91950
add ResourcePool initialization
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
256
diff
changeset
|
86 | |
1 | 87 | // load init.conf |
60
feb2f1e115c6
improved logging
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
59
diff
changeset
|
88 | if(load_init_conf("config/init.conf")) { |
feb2f1e115c6
improved logging
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
59
diff
changeset
|
89 | return -1; |
feb2f1e115c6
improved logging
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
59
diff
changeset
|
90 | } |
1 | 91 | |
92 | // load server.conf | |
19
d680536f8c2f
Added configuration manager
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
18
diff
changeset
|
93 | init_configuration_manager(); |
85
b62e77d8e80c
replaced propfind parser with new libxml2 parser
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
73
diff
changeset
|
94 | ServerConfiguration *cfg; |
b62e77d8e80c
replaced propfind parser with new libxml2 parser
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
73
diff
changeset
|
95 | if(cfgmgr_load_config(&cfg) != 0) { |
19
d680536f8c2f
Added configuration manager
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
18
diff
changeset
|
96 | return -1; |
d680536f8c2f
Added configuration manager
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
18
diff
changeset
|
97 | } |
47
ce9790523346
server can change uid
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
44
diff
changeset
|
98 | |
66
74babc0082b7
added authentication cache
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
63
diff
changeset
|
99 | // init caches |
74babc0082b7
added authentication cache
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
63
diff
changeset
|
100 | auth_cache_init(); |
74babc0082b7
added authentication cache
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
63
diff
changeset
|
101 | |
154
6394ce09889a
adds set-variable saf
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
146
diff
changeset
|
102 | // init SAFs |
6394ce09889a
adds set-variable saf
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
146
diff
changeset
|
103 | common_saf_init(); |
6394ce09889a
adds set-variable saf
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
146
diff
changeset
|
104 | |
47
ce9790523346
server can change uid
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
44
diff
changeset
|
105 | // set global vars |
ce9790523346
server can change uid
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
44
diff
changeset
|
106 | conf_global_vars_s *vars = conf_getglobals(); |
ce9790523346
server can change uid
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
44
diff
changeset
|
107 | |
146
a9591a91c004
fixes server user init
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
133
diff
changeset
|
108 | WSBool changeuid = FALSE; |
73
79fa26ecd135
added file system ACLs for linux
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
68
diff
changeset
|
109 | uid_t ws_uid = geteuid(); |
63
66442f81f823
supports file system ACLs on Solaris
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
60
diff
changeset
|
110 | setpwent(); |
73
79fa26ecd135
added file system ACLs for linux
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
68
diff
changeset
|
111 | char *pwbuf = malloc(DEF_PWBUF); |
79fa26ecd135
added file system ACLs for linux
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
68
diff
changeset
|
112 | vars->Vuserpw = malloc(sizeof(struct passwd)); |
79fa26ecd135
added file system ACLs for linux
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
68
diff
changeset
|
113 | if(cfg->user.ptr) { |
79fa26ecd135
added file system ACLs for linux
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
68
diff
changeset
|
114 | if(!util_getpwnam(cfg->user.ptr, vars->Vuserpw, pwbuf, DEF_PWBUF)) { |
79fa26ecd135
added file system ACLs for linux
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
68
diff
changeset
|
115 | log_ereport( |
79fa26ecd135
added file system ACLs for linux
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
68
diff
changeset
|
116 | LOG_MISCONFIG, |
79fa26ecd135
added file system ACLs for linux
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
68
diff
changeset
|
117 | "user %s does not exist!", |
79fa26ecd135
added file system ACLs for linux
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
68
diff
changeset
|
118 | cfg->user.ptr); |
79fa26ecd135
added file system ACLs for linux
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
68
diff
changeset
|
119 | free(vars->Vuserpw); |
79fa26ecd135
added file system ACLs for linux
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
68
diff
changeset
|
120 | vars->Vuserpw = NULL; |
146
a9591a91c004
fixes server user init
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
133
diff
changeset
|
121 | } else { |
a9591a91c004
fixes server user init
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
133
diff
changeset
|
122 | changeuid = TRUE; |
73
79fa26ecd135
added file system ACLs for linux
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
68
diff
changeset
|
123 | } |
79fa26ecd135
added file system ACLs for linux
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
68
diff
changeset
|
124 | } else { |
79fa26ecd135
added file system ACLs for linux
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
68
diff
changeset
|
125 | if(!util_getpwuid(ws_uid, vars->Vuserpw, pwbuf, DEF_PWBUF)) { |
79fa26ecd135
added file system ACLs for linux
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
68
diff
changeset
|
126 | log_ereport(LOG_FAILURE, "webserver_init: cannot get passwd data"); |
79fa26ecd135
added file system ACLs for linux
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
68
diff
changeset
|
127 | free(vars->Vuserpw); |
79fa26ecd135
added file system ACLs for linux
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
68
diff
changeset
|
128 | vars->Vuserpw = NULL; |
79fa26ecd135
added file system ACLs for linux
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
68
diff
changeset
|
129 | } |
79fa26ecd135
added file system ACLs for linux
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
68
diff
changeset
|
130 | } |
79fa26ecd135
added file system ACLs for linux
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
68
diff
changeset
|
131 | if(!vars->Vuserpw) { |
79fa26ecd135
added file system ACLs for linux
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
68
diff
changeset
|
132 | log_ereport(LOG_WARN, "globalvars->Vuserpw is null"); |
79fa26ecd135
added file system ACLs for linux
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
68
diff
changeset
|
133 | } |
22
adb0bda54e6b
Server can run as daemon
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
19
diff
changeset
|
134 | |
47
ce9790523346
server can change uid
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
44
diff
changeset
|
135 | // change uid |
146
a9591a91c004
fixes server user init
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
133
diff
changeset
|
136 | if(changeuid && ws_uid == 0) { |
47
ce9790523346
server can change uid
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
44
diff
changeset
|
137 | // a webserver user is set and we are root |
ce9790523346
server can change uid
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
44
diff
changeset
|
138 | |
ce9790523346
server can change uid
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
44
diff
changeset
|
139 | if(setgid(vars->Vuserpw->pw_gid) != 0) { |
ce9790523346
server can change uid
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
44
diff
changeset
|
140 | log_ereport( |
60
feb2f1e115c6
improved logging
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
59
diff
changeset
|
141 | LOG_FAILURE, |
47
ce9790523346
server can change uid
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
44
diff
changeset
|
142 | "setgid(%d) failed", |
ce9790523346
server can change uid
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
44
diff
changeset
|
143 | vars->Vuserpw->pw_gid); |
ce9790523346
server can change uid
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
44
diff
changeset
|
144 | } else { |
ce9790523346
server can change uid
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
44
diff
changeset
|
145 | // setgid was successful |
ce9790523346
server can change uid
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
44
diff
changeset
|
146 | // we need to call initgroups to have all group permissions |
ce9790523346
server can change uid
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
44
diff
changeset
|
147 | if(initgroups(vars->Vuserpw->pw_name, vars->Vuserpw->pw_gid)!=0) { |
60
feb2f1e115c6
improved logging
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
59
diff
changeset
|
148 | log_ereport(LOG_FAILURE, "initgroups failed"); |
47
ce9790523346
server can change uid
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
44
diff
changeset
|
149 | } |
ce9790523346
server can change uid
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
44
diff
changeset
|
150 | } |
ce9790523346
server can change uid
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
44
diff
changeset
|
151 | |
ce9790523346
server can change uid
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
44
diff
changeset
|
152 | // change the uid |
ce9790523346
server can change uid
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
44
diff
changeset
|
153 | if(setuid(vars->Vuserpw->pw_uid)) { |
ce9790523346
server can change uid
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
44
diff
changeset
|
154 | log_ereport( |
60
feb2f1e115c6
improved logging
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
59
diff
changeset
|
155 | LOG_FAILURE, |
47
ce9790523346
server can change uid
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
44
diff
changeset
|
156 | "setuid(%d) failed", |
ce9790523346
server can change uid
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
44
diff
changeset
|
157 | vars->Vuserpw->pw_uid); |
ce9790523346
server can change uid
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
44
diff
changeset
|
158 | } |
ce9790523346
server can change uid
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
44
diff
changeset
|
159 | } else if(vars->Vuserpw) { |
ce9790523346
server can change uid
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
44
diff
changeset
|
160 | log_ereport( |
60
feb2f1e115c6
improved logging
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
59
diff
changeset
|
161 | LOG_WARN, |
47
ce9790523346
server can change uid
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
44
diff
changeset
|
162 | "server must be started as root to change uid"); |
ce9790523346
server can change uid
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
44
diff
changeset
|
163 | } |
66
74babc0082b7
added authentication cache
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
63
diff
changeset
|
164 | |
156
724e107983e9
adds unix domain socket for server control ops
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
154
diff
changeset
|
165 | // create tmp dir and pid file |
724e107983e9
adds unix domain socket for server control ops
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
154
diff
changeset
|
166 | char *mkdir_cmd = NULL; |
724e107983e9
adds unix domain socket for server control ops
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
154
diff
changeset
|
167 | asprintf(&mkdir_cmd, "mkdir -p %s", cfg->tmp.ptr); |
724e107983e9
adds unix domain socket for server control ops
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
154
diff
changeset
|
168 | system(mkdir_cmd); |
724e107983e9
adds unix domain socket for server control ops
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
154
diff
changeset
|
169 | free(mkdir_cmd); |
724e107983e9
adds unix domain socket for server control ops
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
154
diff
changeset
|
170 | |
724e107983e9
adds unix domain socket for server control ops
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
154
diff
changeset
|
171 | char *pid_file_path = NULL; |
724e107983e9
adds unix domain socket for server control ops
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
154
diff
changeset
|
172 | asprintf(&pid_file_path, "%s/pid", cfg->tmp.ptr); |
724e107983e9
adds unix domain socket for server control ops
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
154
diff
changeset
|
173 | FILE *pidfile = fopen(pid_file_path, "w"); // TODO: check error |
724e107983e9
adds unix domain socket for server control ops
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
154
diff
changeset
|
174 | pid_t pid = getpid(); |
724e107983e9
adds unix domain socket for server control ops
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
154
diff
changeset
|
175 | fprintf(pidfile, "%d", pid); |
724e107983e9
adds unix domain socket for server control ops
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
154
diff
changeset
|
176 | fclose(pidfile); |
724e107983e9
adds unix domain socket for server control ops
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
154
diff
changeset
|
177 | free(pid_file_path); |
724e107983e9
adds unix domain socket for server control ops
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
154
diff
changeset
|
178 | |
724e107983e9
adds unix domain socket for server control ops
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
154
diff
changeset
|
179 | // create unix domain socket for server control |
724e107983e9
adds unix domain socket for server control ops
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
154
diff
changeset
|
180 | sstr_t tmp_priv = ucx_sprintf("%s/private", cfg->tmp.ptr); |
724e107983e9
adds unix domain socket for server control ops
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
154
diff
changeset
|
181 | // TODO: remove existing private dir |
724e107983e9
adds unix domain socket for server control ops
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
154
diff
changeset
|
182 | if(mkdir(tmp_priv.ptr, S_IRWXU)) { |
724e107983e9
adds unix domain socket for server control ops
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
154
diff
changeset
|
183 | if(errno == EEXIST) { |
724e107983e9
adds unix domain socket for server control ops
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
154
diff
changeset
|
184 | if(chmod(tmp_priv.ptr, S_IRWXU)) { |
724e107983e9
adds unix domain socket for server control ops
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
154
diff
changeset
|
185 | log_ereport( |
724e107983e9
adds unix domain socket for server control ops
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
154
diff
changeset
|
186 | LOG_CATASTROPHE, |
724e107983e9
adds unix domain socket for server control ops
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
154
diff
changeset
|
187 | "cannot change permissions of tmp dir %s:", |
724e107983e9
adds unix domain socket for server control ops
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
154
diff
changeset
|
188 | tmp_priv.ptr, |
724e107983e9
adds unix domain socket for server control ops
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
154
diff
changeset
|
189 | strerror(errno)); |
724e107983e9
adds unix domain socket for server control ops
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
154
diff
changeset
|
190 | return 0; |
724e107983e9
adds unix domain socket for server control ops
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
154
diff
changeset
|
191 | } |
724e107983e9
adds unix domain socket for server control ops
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
154
diff
changeset
|
192 | } else { |
724e107983e9
adds unix domain socket for server control ops
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
154
diff
changeset
|
193 | log_ereport( |
724e107983e9
adds unix domain socket for server control ops
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
154
diff
changeset
|
194 | LOG_CATASTROPHE, |
724e107983e9
adds unix domain socket for server control ops
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
154
diff
changeset
|
195 | "cannot create tmp dir %s:", |
724e107983e9
adds unix domain socket for server control ops
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
154
diff
changeset
|
196 | tmp_priv.ptr, |
724e107983e9
adds unix domain socket for server control ops
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
154
diff
changeset
|
197 | strerror(errno)); |
724e107983e9
adds unix domain socket for server control ops
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
154
diff
changeset
|
198 | return -1; |
724e107983e9
adds unix domain socket for server control ops
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
154
diff
changeset
|
199 | } |
724e107983e9
adds unix domain socket for server control ops
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
154
diff
changeset
|
200 | } |
724e107983e9
adds unix domain socket for server control ops
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
154
diff
changeset
|
201 | |
724e107983e9
adds unix domain socket for server control ops
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
154
diff
changeset
|
202 | |
724e107983e9
adds unix domain socket for server control ops
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
154
diff
changeset
|
203 | // create srvctrl unix domain socket |
724e107983e9
adds unix domain socket for server control ops
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
154
diff
changeset
|
204 | // this socket is used for stop, reconfigure and other operations |
158
77f4f0079428
adds reconfig and shutdown handler to srvctrl
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
156
diff
changeset
|
205 | if(srvctrl_init(cfg)) { |
156
724e107983e9
adds unix domain socket for server control ops
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
154
diff
changeset
|
206 | return -1; |
158
77f4f0079428
adds reconfig and shutdown handler to srvctrl
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
156
diff
changeset
|
207 | } |
156
724e107983e9
adds unix domain socket for server control ops
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
154
diff
changeset
|
208 | |
146
a9591a91c004
fixes server user init
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
133
diff
changeset
|
209 | //endpwent(); // TODO: close or not? |
a9591a91c004
fixes server user init
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
133
diff
changeset
|
210 | //free(pwbuf); // TODO: ? |
a9591a91c004
fixes server user init
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
133
diff
changeset
|
211 | |
1 | 212 | return 0; |
213 | } | |
214 | ||
215 | int webserver_run() { | |
115
51d9a15eac98
improves logging
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
106
diff
changeset
|
216 | log_ereport(LOG_VERBOSE, "webserver_run"); |
1 | 217 | |
218 | // start all http listener | |
219 | if(start_all_listener() != 0) { | |
220 | fprintf(stderr, "Error: Cannot start http listener\n"); | |
221 | } | |
115
51d9a15eac98
improves logging
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
106
diff
changeset
|
222 | |
51d9a15eac98
improves logging
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
106
diff
changeset
|
223 | log_ereport(LOG_INFORM, "webserver started"); |
1 | 224 | |
225 | return 0; | |
226 | } | |
9
30e51941a673
Added mod_jk dependencies
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
6
diff
changeset
|
227 | |
68
f5102a892ed4
some fixes for mod_jk
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
66
diff
changeset
|
228 | void webserver_shutdown() { |
115
51d9a15eac98
improves logging
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
106
diff
changeset
|
229 | log_ereport(LOG_INFORM, "webserver shutdown"); |
68
f5102a892ed4
some fixes for mod_jk
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
66
diff
changeset
|
230 | |
158
77f4f0079428
adds reconfig and shutdown handler to srvctrl
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
156
diff
changeset
|
231 | srvctrl_shutdown(); |
77f4f0079428
adds reconfig and shutdown handler to srvctrl
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
156
diff
changeset
|
232 | |
68
f5102a892ed4
some fixes for mod_jk
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
66
diff
changeset
|
233 | // execute restart callbacks |
f5102a892ed4
some fixes for mod_jk
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
66
diff
changeset
|
234 | RestartCallback *re = atrestart; |
f5102a892ed4
some fixes for mod_jk
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
66
diff
changeset
|
235 | while(re) { |
f5102a892ed4
some fixes for mod_jk
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
66
diff
changeset
|
236 | re->func(re->data); |
f5102a892ed4
some fixes for mod_jk
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
66
diff
changeset
|
237 | re = re->next; |
f5102a892ed4
some fixes for mod_jk
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
66
diff
changeset
|
238 | } |
f5102a892ed4
some fixes for mod_jk
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
66
diff
changeset
|
239 | } |
9
30e51941a673
Added mod_jk dependencies
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
6
diff
changeset
|
240 | |
158
77f4f0079428
adds reconfig and shutdown handler to srvctrl
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
156
diff
changeset
|
241 | int webserver_reconfig() { |
77f4f0079428
adds reconfig and shutdown handler to srvctrl
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
156
diff
changeset
|
242 | if(cfgmgr_load_config(NULL) != 0) { |
77f4f0079428
adds reconfig and shutdown handler to srvctrl
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
156
diff
changeset
|
243 | return -1; |
77f4f0079428
adds reconfig and shutdown handler to srvctrl
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
156
diff
changeset
|
244 | } |
77f4f0079428
adds reconfig and shutdown handler to srvctrl
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
156
diff
changeset
|
245 | // start newly created listeners |
77f4f0079428
adds reconfig and shutdown handler to srvctrl
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
156
diff
changeset
|
246 | start_all_listener(); |
77f4f0079428
adds reconfig and shutdown handler to srvctrl
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
156
diff
changeset
|
247 | |
77f4f0079428
adds reconfig and shutdown handler to srvctrl
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
156
diff
changeset
|
248 | return 0; |
156
724e107983e9
adds unix domain socket for server control ops
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
154
diff
changeset
|
249 | } |
724e107983e9
adds unix domain socket for server control ops
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
154
diff
changeset
|
250 | |
9
30e51941a673
Added mod_jk dependencies
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
6
diff
changeset
|
251 | void webserver_atrestart(void (*fn)(void *), void *data) { |
68
f5102a892ed4
some fixes for mod_jk
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
66
diff
changeset
|
252 | RestartCallback *cb = malloc(sizeof(RestartCallback)); |
f5102a892ed4
some fixes for mod_jk
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
66
diff
changeset
|
253 | cb->func = fn; |
f5102a892ed4
some fixes for mod_jk
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
66
diff
changeset
|
254 | cb->data = data; |
f5102a892ed4
some fixes for mod_jk
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
66
diff
changeset
|
255 | cb->next = NULL; |
f5102a892ed4
some fixes for mod_jk
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
66
diff
changeset
|
256 | |
f5102a892ed4
some fixes for mod_jk
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
66
diff
changeset
|
257 | if(atrestart) { |
f5102a892ed4
some fixes for mod_jk
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
66
diff
changeset
|
258 | RestartCallback *elm = atrestart; |
f5102a892ed4
some fixes for mod_jk
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
66
diff
changeset
|
259 | while(elm) { |
f5102a892ed4
some fixes for mod_jk
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
66
diff
changeset
|
260 | if(!elm->next) { |
f5102a892ed4
some fixes for mod_jk
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
66
diff
changeset
|
261 | elm->next = cb; |
f5102a892ed4
some fixes for mod_jk
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
66
diff
changeset
|
262 | break; |
f5102a892ed4
some fixes for mod_jk
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
66
diff
changeset
|
263 | } |
f5102a892ed4
some fixes for mod_jk
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
66
diff
changeset
|
264 | elm = elm->next; |
f5102a892ed4
some fixes for mod_jk
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
66
diff
changeset
|
265 | } |
f5102a892ed4
some fixes for mod_jk
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
66
diff
changeset
|
266 | } else { |
f5102a892ed4
some fixes for mod_jk
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
66
diff
changeset
|
267 | atrestart = cb; |
f5102a892ed4
some fixes for mod_jk
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
66
diff
changeset
|
268 | } |
9
30e51941a673
Added mod_jk dependencies
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
6
diff
changeset
|
269 | } |
30e51941a673
Added mod_jk dependencies
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
6
diff
changeset
|
270 | |
68
f5102a892ed4
some fixes for mod_jk
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
66
diff
changeset
|
271 | int nsapi_runtime_version() { |
f5102a892ed4
some fixes for mod_jk
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
66
diff
changeset
|
272 | return 303; |
f5102a892ed4
some fixes for mod_jk
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
66
diff
changeset
|
273 | } |
106
b122f34ddc80
added minimal ssl support
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
85
diff
changeset
|
274 | |
b122f34ddc80
added minimal ssl support
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
85
diff
changeset
|
275 | |
b122f34ddc80
added minimal ssl support
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
85
diff
changeset
|
276 | int ws_init_ssl() { |
b122f34ddc80
added minimal ssl support
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
85
diff
changeset
|
277 | // TODO: handle errors |
b122f34ddc80
added minimal ssl support
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
85
diff
changeset
|
278 | SSL_load_error_strings(); |
b122f34ddc80
added minimal ssl support
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
85
diff
changeset
|
279 | SSL_library_init(); |
b122f34ddc80
added minimal ssl support
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
85
diff
changeset
|
280 | OpenSSL_add_all_algorithms(); |
b122f34ddc80
added minimal ssl support
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
85
diff
changeset
|
281 | return 0; |
b122f34ddc80
added minimal ssl support
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
85
diff
changeset
|
282 | } |