2016-03-19 15:14:35 +00:00
# include "first.h"
2005-02-20 14:27:00 +00:00
# include "network.h"
2018-03-25 07:45:05 +00:00
# include "base.h"
2005-02-20 14:27:00 +00:00
# include "fdevent.h"
# include "log.h"
# include "connections.h"
2009-10-14 14:32:24 +00:00
# include "configfile.h"
2017-10-29 05:23:19 +00:00
# include "sock_addr.h"
2005-02-20 14:27:00 +00:00
2017-10-30 02:36:49 +00:00
# include "network_write.h"
2005-02-20 14:27:00 +00:00
# include "sys-socket.h"
2009-10-11 14:31:42 +00:00
# include <sys/types.h>
# include <sys/stat.h>
# include <sys/time.h>
# include <errno.h>
# include <fcntl.h>
# include <unistd.h>
# include <string.h>
# include <stdlib.h>
2016-06-30 01:02:44 +00:00
void
network_accept_tcp_nagle_disable ( const int fd )
{
static int noinherit_tcpnodelay = - 1 ;
int opt ;
if ( ! noinherit_tcpnodelay ) /* TCP_NODELAY inherited from listen socket */
return ;
if ( noinherit_tcpnodelay < 0 ) {
socklen_t optlen = sizeof ( opt ) ;
if ( 0 = = getsockopt ( fd , IPPROTO_TCP , TCP_NODELAY , & opt , & optlen ) ) {
noinherit_tcpnodelay = ! opt ;
if ( opt ) /* TCP_NODELAY inherited from listen socket */
return ;
}
}
opt = 1 ;
( void ) setsockopt ( fd , IPPROTO_TCP , TCP_NODELAY , & opt , sizeof ( opt ) ) ;
}
2010-08-06 21:57:15 +00:00
static handler_t network_server_handle_fdevent ( server * srv , void * context , int revents ) {
2005-02-20 14:27:00 +00:00
server_socket * srv_socket = ( server_socket * ) context ;
connection * con ;
2005-09-23 16:31:49 +00:00
int loops = 0 ;
2006-10-04 13:26:23 +00:00
2005-02-20 14:27:00 +00:00
UNUSED ( context ) ;
2006-10-04 13:26:23 +00:00
2010-08-06 21:57:19 +00:00
if ( 0 = = ( revents & FDEVENT_IN ) ) {
2006-10-04 13:26:23 +00:00
log_error_write ( srv , __FILE__ , __LINE__ , " sdd " ,
2005-02-20 14:27:00 +00:00
" strange event for server socket " ,
srv_socket - > fd ,
revents ) ;
2005-03-01 23:01:12 +00:00
return HANDLER_ERROR ;
2005-02-20 14:27:00 +00:00
}
2005-09-23 16:31:49 +00:00
/* accept()s at most 100 connections directly
*
2006-10-04 13:26:23 +00:00
* we jump out after 100 to give the waiting connections a chance */
2005-09-23 16:31:49 +00:00
for ( loops = 0 ; loops < 100 & & NULL ! = ( con = connection_accept ( srv , srv_socket ) ) ; loops + + ) {
2005-02-20 14:27:00 +00:00
connection_state_machine ( srv , con ) ;
}
return HANDLER_GO_ON ;
}
2017-10-22 16:27:22 +00:00
static void network_host_normalize_addr_str ( buffer * host , sock_addr * addr ) {
2018-11-23 05:37:38 +00:00
buffer_clear ( host ) ;
2017-10-29 05:23:19 +00:00
sock_addr_stringify_append_buffer ( host , addr ) ;
2017-10-22 16:27:22 +00:00
}
static int network_host_parse_addr ( server * srv , sock_addr * addr , socklen_t * addr_len , buffer * host , int use_ipv6 ) {
char * h ;
char * colon = NULL ;
const char * chost ;
sa_family_t family = use_ipv6 ? AF_INET6 : AF_INET ;
unsigned int port = srv - > srvconf . port ;
if ( buffer_string_is_empty ( host ) ) {
log_error_write ( srv , __FILE__ , __LINE__ , " s " , " value of $SERVER[ \" socket \" ] must not be empty " ) ;
return - 1 ;
}
h = host - > ptr ;
if ( h [ 0 ] = = ' / ' ) {
# ifdef HAVE_SYS_UN_H
return ( 1 = = sock_addr_from_str_hints ( srv , addr , addr_len , h , AF_UNIX , 0 ) )
? 0
: - 1 ;
# else
log_error_write ( srv , __FILE__ , __LINE__ , " s " ,
" ERROR: Unix Domain sockets are not supported. " ) ;
return - 1 ;
# endif
}
buffer_copy_buffer ( srv - > tmp_buf , host ) ;
h = srv - > tmp_buf - > ptr ;
if ( h [ 0 ] = = ' [ ' ) {
family = AF_INET6 ;
if ( ( h = strchr ( h , ' ] ' ) ) ) {
* h + + = ' \0 ' ;
if ( * h = = ' : ' ) colon = h ;
} /*(else should not happen; validated in configparser.y)*/
h = srv - > tmp_buf - > ptr + 1 ;
}
else {
colon = strrchr ( h , ' : ' ) ;
}
if ( colon ) {
* colon + + = ' \0 ' ;
port = strtol ( colon , NULL , 10 ) ;
if ( port = = 0 | | port > 65535 ) {
log_error_write ( srv , __FILE__ , __LINE__ , " sd " ,
" port not set or out of range: " , port ) ;
return - 1 ;
}
}
chost = * h ? h : family = = AF_INET ? " 0.0.0.0 " : " :: " ;
if ( 1 ! = sock_addr_from_str_hints ( srv , addr , addr_len , chost , family , port ) ) {
return - 1 ;
}
return 0 ;
}
2019-01-18 06:55:33 +00:00
static void network_srv_sockets_append ( server * srv , server_socket * srv_socket ) {
if ( srv - > srv_sockets . size = = 0 ) {
srv - > srv_sockets . size = 4 ;
srv - > srv_sockets . used = 0 ;
srv - > srv_sockets . ptr = malloc ( srv - > srv_sockets . size * sizeof ( server_socket * ) ) ;
force_assert ( NULL ! = srv - > srv_sockets . ptr ) ;
} else if ( srv - > srv_sockets . used = = srv - > srv_sockets . size ) {
srv - > srv_sockets . size + = 4 ;
srv - > srv_sockets . ptr = realloc ( srv - > srv_sockets . ptr , srv - > srv_sockets . size * sizeof ( server_socket * ) ) ;
force_assert ( NULL ! = srv - > srv_sockets . ptr ) ;
}
srv - > srv_sockets . ptr [ srv - > srv_sockets . used + + ] = srv_socket ;
}
2017-10-08 00:16:09 +00:00
static int network_server_init ( server * srv , buffer * host_token , size_t sidx , int stdin_fd ) {
2005-02-20 14:27:00 +00:00
server_socket * srv_socket ;
const char * host ;
2016-12-22 01:23:43 +00:00
specific_config * s = srv - > config_storage [ sidx ] ;
2017-10-22 18:11:26 +00:00
socklen_t addr_len = sizeof ( sock_addr ) ;
2017-10-08 01:45:38 +00:00
sock_addr addr ;
2017-10-29 05:23:19 +00:00
int family = 0 ;
2017-10-28 02:16:00 +00:00
int set_v6only = 0 ;
2006-10-04 13:26:23 +00:00
2017-10-22 18:11:26 +00:00
if ( buffer_string_is_empty ( host_token ) ) {
log_error_write ( srv , __FILE__ , __LINE__ , " s " , " value of $SERVER[ \" socket \" ] must not be empty " ) ;
return - 1 ;
}
2017-10-08 01:45:38 +00:00
/* check if we already know this socket, and if yes, don't init it
* ( optimization : check strings here to filter out exact matches ;
* binary addresses are matched further below ) */
for ( size_t i = 0 ; i < srv - > srv_sockets . used ; + + i ) {
2017-10-21 18:47:30 +00:00
if ( buffer_is_equal ( srv - > srv_sockets . ptr [ i ] - > srv_token , host_token ) ) {
buffer_copy_buffer ( host_token , srv - > srv_sockets . ptr [ i ] - > srv_token ) ;
2017-10-08 01:45:38 +00:00
return 0 ;
2017-10-21 18:47:30 +00:00
}
2017-10-07 20:05:48 +00:00
}
2017-10-22 18:11:26 +00:00
host = host_token - > ptr ;
if ( ( s - > use_ipv6 & & ( * host = = ' \0 ' | | * host = = ' : ' ) ) | | ( host [ 0 ] = = ' [ ' & & host [ 1 ] = = ' ] ' ) ) {
2010-08-07 13:16:16 +00:00
log_error_write ( srv , __FILE__ , __LINE__ , " s " , " warning: please use server.use-ipv6 only for hostnames, not without server.bind / empty address; your config will break if the kernel default for IPV6_V6ONLY changes " ) ;
2017-06-24 15:26:27 +00:00
}
2017-10-22 18:11:26 +00:00
if ( * host = = ' [ ' ) s - > use_ipv6 = 1 ;
2005-11-23 10:46:21 +00:00
2017-10-08 01:45:38 +00:00
memset ( & addr , 0 , sizeof ( addr ) ) ;
if ( - 1 ! = stdin_fd ) {
if ( - 1 = = getsockname ( stdin_fd , ( struct sockaddr * ) & addr , & addr_len ) ) {
log_error_write ( srv , __FILE__ , __LINE__ , " ss " ,
" getsockname() " , strerror ( errno ) ) ;
return - 1 ;
}
2017-10-22 18:11:26 +00:00
} else if ( 0 ! = network_host_parse_addr ( srv , & addr , & addr_len , host_token , s - > use_ipv6 ) ) {
2017-10-07 20:05:48 +00:00
return - 1 ;
2016-04-29 00:53:33 +00:00
}
2017-10-28 02:16:00 +00:00
2017-10-29 05:23:19 +00:00
family = sock_addr_get_family ( & addr ) ;
2017-10-28 02:16:00 +00:00
# ifdef HAVE_IPV6
2017-10-29 05:23:19 +00:00
if ( * host ! = ' \0 ' & & AF_INET6 = = family ) {
2017-10-28 02:16:00 +00:00
if ( s - > set_v6only ) {
set_v6only = 1 ;
} else {
log_error_write ( srv , __FILE__ , __LINE__ , " s " , " warning: server.set-v6only will be removed soon, update your config to have different sockets for ipv4 and ipv6 " ) ;
}
}
# endif
2017-10-22 18:11:26 +00:00
network_host_normalize_addr_str ( host_token , & addr ) ;
host = host_token - > ptr ;
2016-03-26 13:39:54 +00:00
2016-04-29 00:53:33 +00:00
if ( srv - > srvconf . preflight_check ) {
2017-10-07 20:05:48 +00:00
return 0 ;
2016-04-29 00:53:33 +00:00
}
2006-01-14 17:02:44 +00:00
2017-10-08 01:45:38 +00:00
/* check if we already know this socket (after potential DNS resolution), and if yes, don't init it */
for ( size_t i = 0 ; i < srv - > srv_sockets . used ; + + i ) {
2017-10-21 18:47:30 +00:00
if ( 0 = = memcmp ( & srv - > srv_sockets . ptr [ i ] - > addr , & addr , sizeof ( addr ) ) ) {
2017-10-08 01:45:38 +00:00
return 0 ;
2017-10-21 18:47:30 +00:00
}
2017-10-08 01:45:38 +00:00
}
srv_socket = calloc ( 1 , sizeof ( * srv_socket ) ) ;
force_assert ( NULL ! = srv_socket ) ;
memcpy ( & srv_socket - > addr , & addr , addr_len ) ;
srv_socket - > fd = - 1 ;
srv_socket - > fde_ndx = - 1 ;
srv_socket - > sidx = sidx ;
srv_socket - > is_ssl = s - > ssl_enabled ;
2017-10-22 18:11:26 +00:00
srv_socket - > srv_token = buffer_init_buffer ( host_token ) ;
2017-10-08 01:45:38 +00:00
2019-01-18 06:55:33 +00:00
network_srv_sockets_append ( srv , srv_socket ) ;
2017-10-08 01:45:38 +00:00
2016-04-29 04:11:45 +00:00
if ( srv - > sockets_disabled ) { /* lighttpd -1 (one-shot mode) */
2017-10-07 20:05:48 +00:00
return 0 ;
2016-04-29 04:11:45 +00:00
}
2017-10-08 01:45:38 +00:00
if ( - 1 ! = stdin_fd ) {
srv_socket - > fd = stdin_fd ;
2017-10-09 12:50:26 +00:00
if ( - 1 = = fdevent_fcntl_set_nb_cloexec ( srv - > ev , stdin_fd ) ) {
log_error_write ( srv , __FILE__ , __LINE__ , " ss " , " fcntl: " , strerror ( errno ) ) ;
return - 1 ;
}
2017-10-08 01:45:38 +00:00
} else
2016-04-29 00:53:33 +00:00
# ifdef HAVE_SYS_UN_H
2017-10-29 05:23:19 +00:00
if ( AF_UNIX = = family ) {
2016-04-29 00:53:33 +00:00
/* check if the socket exists and try to connect to it. */
2016-06-21 07:39:17 +00:00
force_assert ( host ) ; /*(static analysis hint)*/
2017-10-29 05:23:19 +00:00
if ( - 1 = = ( srv_socket - > fd = fdevent_socket_cloexec ( AF_UNIX , SOCK_STREAM , 0 ) ) ) {
2016-04-29 00:53:33 +00:00
log_error_write ( srv , __FILE__ , __LINE__ , " ss " , " socket failed: " , strerror ( errno ) ) ;
2017-10-07 20:05:48 +00:00
return - 1 ;
2016-04-29 00:53:33 +00:00
}
if ( 0 = = connect ( srv_socket - > fd , ( struct sockaddr * ) & ( srv_socket - > addr ) , addr_len ) ) {
2006-10-04 13:26:23 +00:00
log_error_write ( srv , __FILE__ , __LINE__ , " ss " ,
" server socket is still in use: " ,
2006-01-14 17:02:44 +00:00
host ) ;
2017-10-07 20:05:48 +00:00
return - 1 ;
2006-01-14 17:02:44 +00:00
}
/* connect failed */
switch ( errno ) {
case ECONNREFUSED :
unlink ( host ) ;
break ;
case ENOENT :
break ;
default :
2006-10-04 13:26:23 +00:00
log_error_write ( srv , __FILE__ , __LINE__ , " sds " ,
" testing socket failed: " ,
2006-01-14 17:02:44 +00:00
host , strerror ( errno ) ) ;
2017-10-07 20:05:48 +00:00
return - 1 ;
2006-01-14 17:02:44 +00:00
}
2013-12-24 04:28:44 +00:00
fdevent_fcntl_set_nb ( srv - > ev , srv_socket - > fd ) ;
2016-04-29 00:53:33 +00:00
} else
# endif
{
2017-10-29 05:23:19 +00:00
if ( - 1 = = ( srv_socket - > fd = fdevent_socket_nb_cloexec ( family , SOCK_STREAM , IPPROTO_TCP ) ) ) {
2016-04-29 00:53:33 +00:00
log_error_write ( srv , __FILE__ , __LINE__ , " ss " , " socket failed: " , strerror ( errno ) ) ;
2017-10-07 20:05:48 +00:00
return - 1 ;
2016-04-29 00:53:33 +00:00
}
2017-10-08 00:16:09 +00:00
}
2006-01-14 17:02:44 +00:00
2016-04-29 00:53:33 +00:00
# ifdef HAVE_IPV6
2017-10-28 02:16:00 +00:00
if ( set_v6only & & - 1 = = stdin_fd ) {
2017-09-23 14:30:08 +00:00
int val = 1 ;
2016-04-29 00:53:33 +00:00
if ( - 1 = = setsockopt ( srv_socket - > fd , IPPROTO_IPV6 , IPV6_V6ONLY , & val , sizeof ( val ) ) ) {
2017-09-23 14:30:08 +00:00
log_error_write ( srv , __FILE__ , __LINE__ , " ss " , " setsockopt(IPV6_V6ONLY) failed: " , strerror ( errno ) ) ;
2017-10-07 20:05:48 +00:00
return - 1 ;
2016-04-29 00:53:33 +00:00
}
}
# endif
2006-10-04 13:26:23 +00:00
2016-04-29 00:53:33 +00:00
/* */
srv - > cur_fds = srv_socket - > fd ;
2017-09-23 14:30:08 +00:00
if ( fdevent_set_so_reuseaddr ( srv_socket - > fd , 1 ) < 0 ) {
log_error_write ( srv , __FILE__ , __LINE__ , " ss " , " setsockopt(SO_REUSEADDR) failed: " , strerror ( errno ) ) ;
2017-10-07 20:05:48 +00:00
return - 1 ;
2016-03-26 13:39:54 +00:00
}
2017-10-29 05:23:19 +00:00
if ( family ! = AF_UNIX ) {
2017-09-23 14:30:08 +00:00
if ( fdevent_set_tcp_nodelay ( srv_socket - > fd , 1 ) < 0 ) {
log_error_write ( srv , __FILE__ , __LINE__ , " ss " , " setsockopt(TCP_NODELAY) failed: " , strerror ( errno ) ) ;
2017-10-07 20:05:48 +00:00
return - 1 ;
2016-06-30 01:02:44 +00:00
}
}
2017-10-08 00:16:09 +00:00
if ( - 1 ! = stdin_fd ) { } else
2005-02-20 14:27:00 +00:00
if ( 0 ! = bind ( srv_socket - > fd , ( struct sockaddr * ) & ( srv_socket - > addr ) , addr_len ) ) {
2017-10-22 18:11:26 +00:00
log_error_write ( srv , __FILE__ , __LINE__ , " sss " ,
" can't bind to socket: " , host , strerror ( errno ) ) ;
2017-10-07 20:05:48 +00:00
return - 1 ;
2005-02-20 14:27:00 +00:00
}
2006-10-04 13:26:23 +00:00
2017-10-08 00:16:09 +00:00
if ( - 1 ! = stdin_fd ) { } else
2017-10-29 05:23:19 +00:00
if ( AF_UNIX = = family & & ! buffer_string_is_empty ( s - > socket_perms ) ) {
2017-06-13 03:40:31 +00:00
mode_t m = 0 ;
for ( char * str = s - > socket_perms - > ptr ; * str ; + + str ) {
m < < = 3 ;
m | = ( * str - ' 0 ' ) ;
}
if ( 0 ! = m & & - 1 = = chmod ( host , m ) ) {
log_error_write ( srv , __FILE__ , __LINE__ , " sssbss " , " chmod( \" " , host , " \" , " , s - > socket_perms , " ): " , strerror ( errno ) ) ;
}
}
2017-10-08 00:16:09 +00:00
if ( - 1 ! = stdin_fd ) { } else
2017-08-03 04:37:43 +00:00
if ( - 1 = = listen ( srv_socket - > fd , s - > listen_backlog ) ) {
log_error_write ( srv , __FILE__ , __LINE__ , " ss " , " listen failed: " , strerror ( errno ) ) ;
2017-10-07 20:05:48 +00:00
return - 1 ;
2017-08-03 04:37:43 +00:00
}
2013-07-31 20:23:21 +00:00
if ( s - > ssl_enabled ) {
2009-04-26 17:59:55 +00:00
# ifdef TCP_DEFER_ACCEPT
} else if ( s - > defer_accept ) {
int v = s - > defer_accept ;
if ( - 1 = = setsockopt ( srv_socket - > fd , IPPROTO_TCP , TCP_DEFER_ACCEPT , & v , sizeof ( v ) ) ) {
log_error_write ( srv , __FILE__ , __LINE__ , " ss " , " can't set TCP_DEFER_ACCEPT: " , strerror ( errno ) ) ;
}
2005-04-30 10:03:29 +00:00
# endif
2016-06-04 17:47:27 +00:00
# if defined(__FreeBSD__) || defined(__NetBSD__) \
2016-08-20 18:15:14 +00:00
| | defined ( __OpenBSD__ ) | | defined ( __DragonFly__ )
2016-06-04 17:47:27 +00:00
} else if ( ! buffer_is_empty ( s - > bsd_accept_filter )
& & ( buffer_is_equal_string ( s - > bsd_accept_filter , CONST_STR_LEN ( " httpready " ) )
| | buffer_is_equal_string ( s - > bsd_accept_filter , CONST_STR_LEN ( " dataready " ) ) ) ) {
2005-04-30 10:03:29 +00:00
# ifdef SO_ACCEPTFILTER
2009-04-26 17:59:55 +00:00
/* FreeBSD accf_http filter */
struct accept_filter_arg afa ;
2005-04-30 10:03:29 +00:00
memset ( & afa , 0 , sizeof ( afa ) ) ;
2016-06-04 17:47:27 +00:00
strncpy ( afa . af_name , s - > bsd_accept_filter - > ptr , sizeof ( afa . af_name ) ) ;
2005-04-30 10:03:29 +00:00
if ( setsockopt ( srv_socket - > fd , SOL_SOCKET , SO_ACCEPTFILTER , & afa , sizeof ( afa ) ) < 0 ) {
if ( errno ! = ENOENT ) {
2016-06-04 17:47:27 +00:00
log_error_write ( srv , __FILE__ , __LINE__ , " SBss " , " can't set accept-filter ' " , s - > bsd_accept_filter , " ': " , strerror ( errno ) ) ;
2005-04-30 10:03:29 +00:00
}
}
2016-06-04 17:47:27 +00:00
# endif
2005-02-20 14:27:00 +00:00
# endif
}
2006-10-04 13:26:23 +00:00
2005-02-20 14:27:00 +00:00
return 0 ;
}
int network_close ( server * srv ) {
size_t i ;
for ( i = 0 ; i < srv - > srv_sockets . used ; i + + ) {
server_socket * srv_socket = srv - > srv_sockets . ptr [ i ] ;
2005-08-31 09:16:18 +00:00
if ( srv_socket - > fd ! = - 1 ) {
2017-01-24 16:29:10 +00:00
network_unregister_sock ( srv , srv_socket ) ;
2005-02-20 14:27:00 +00:00
close ( srv_socket - > fd ) ;
}
2006-10-04 13:26:23 +00:00
2005-02-20 14:27:00 +00:00
buffer_free ( srv_socket - > srv_token ) ;
2006-10-04 13:26:23 +00:00
2005-02-20 14:27:00 +00:00
free ( srv_socket ) ;
}
2006-10-04 13:26:23 +00:00
2005-02-20 14:27:00 +00:00
free ( srv - > srv_sockets . ptr ) ;
2017-01-24 16:29:10 +00:00
srv - > srv_sockets . ptr = NULL ;
srv - > srv_sockets . used = 0 ;
srv - > srv_sockets . size = 0 ;
2006-10-04 13:26:23 +00:00
2005-02-20 14:27:00 +00:00
return 0 ;
}
2017-10-08 00:16:09 +00:00
int network_init ( server * srv , int stdin_fd ) {
2017-10-08 01:45:38 +00:00
size_t i ;
2019-01-14 04:54:35 +00:00
# ifdef __WIN32
WSADATA wsaData ;
WORD wVersionRequested = MAKEWORD ( 2 , 2 ) ;
if ( 0 ! = WSAStartup ( wVersionRequested , & wsaData ) ) {
/* Tell the user that we could not find a usable WinSock DLL */
return - 1 ;
}
# endif
2017-10-30 02:36:49 +00:00
if ( 0 ! = network_write_init ( srv ) ) return - 1 ;
2005-10-31 15:34:00 +00:00
2017-10-08 01:45:38 +00:00
{
int rc ;
buffer * b = buffer_init ( ) ;
buffer_copy_buffer ( b , srv - > srvconf . bindhost ) ;
if ( b - > ptr [ 0 ] ! = ' / ' ) { /*(skip adding port if unix socket path)*/
buffer_append_string_len ( b , CONST_STR_LEN ( " : " ) ) ;
buffer_append_int ( b , srv - > srvconf . port ) ;
}
2019-01-18 05:16:55 +00:00
rc = ( - 1 = = stdin_fd | | 0 = = srv - > srv_sockets . used )
? network_server_init ( srv , b , 0 , stdin_fd )
: close ( stdin_fd ) ; /*(graceful restart listening to "/dev/stdin")*/
2017-10-08 01:45:38 +00:00
buffer_free ( b ) ;
if ( 0 ! = rc ) return - 1 ;
}
2005-02-20 14:27:00 +00:00
/* check for $SERVER["socket"] */
for ( i = 1 ; i < srv - > config_context - > used ; i + + ) {
data_config * dc = ( data_config * ) srv - > config_context - > data [ i ] ;
2006-10-04 13:26:23 +00:00
2005-02-20 14:27:00 +00:00
/* not our stage */
2005-08-08 17:25:55 +00:00
if ( COMP_SERVER_SOCKET ! = dc - > comp ) continue ;
2006-10-04 13:26:23 +00:00
2017-10-22 16:27:22 +00:00
if ( dc - > cond = = CONFIG_COND_NE ) {
socklen_t addr_len = sizeof ( sock_addr ) ;
sock_addr addr ;
if ( 0 ! = network_host_parse_addr ( srv , & addr , & addr_len , dc - > string , srv - > config_storage [ i ] - > use_ipv6 ) ) {
return - 1 ;
}
network_host_normalize_addr_str ( dc - > string , & addr ) ;
continue ;
}
2009-07-16 23:23:08 +00:00
if ( dc - > cond ! = CONFIG_COND_EQ ) continue ;
2006-03-04 14:53:57 +00:00
2017-10-08 00:16:09 +00:00
if ( 0 ! = network_server_init ( srv , dc - > string , i , - 1 ) ) return - 1 ;
2005-02-20 14:27:00 +00:00
}
2006-10-04 13:26:23 +00:00
2005-02-20 14:27:00 +00:00
return 0 ;
}
2017-01-24 16:29:10 +00:00
void network_unregister_sock ( server * srv , server_socket * srv_socket ) {
if ( - 1 = = srv_socket - > fd | | - 1 = = srv_socket - > fde_ndx ) return ;
fdevent_event_del ( srv - > ev , & srv_socket - > fde_ndx , srv_socket - > fd ) ;
fdevent_unregister ( srv - > ev , srv_socket - > fd ) ;
}
2005-02-20 14:27:00 +00:00
int network_register_fdevents ( server * srv ) {
size_t i ;
2006-10-04 13:26:23 +00:00
2005-08-30 10:42:06 +00:00
if ( - 1 = = fdevent_reset ( srv - > ev ) ) {
return - 1 ;
}
2006-10-04 13:26:23 +00:00
2016-04-29 04:11:45 +00:00
if ( srv - > sockets_disabled ) return 0 ; /* lighttpd -1 (one-shot mode) */
2005-02-20 14:27:00 +00:00
/* register fdevents after reset */
for ( i = 0 ; i < srv - > srv_sockets . used ; i + + ) {
server_socket * srv_socket = srv - > srv_sockets . ptr [ i ] ;
2006-10-04 13:26:23 +00:00
2005-02-20 14:27:00 +00:00
fdevent_register ( srv - > ev , srv_socket - > fd , network_server_handle_fdevent , srv_socket ) ;
2010-08-17 09:54:42 +00:00
fdevent_event_set ( srv - > ev , & ( srv_socket - > fde_ndx ) , srv_socket - > fd , FDEVENT_IN ) ;
2005-02-20 14:27:00 +00:00
}
return 0 ;
}