mirror of git://erdgeist.org/opentracker
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
808 lines
22 KiB
808 lines
22 KiB
/* This software was written by Dirk Engling <erdgeist@erdgeist.org> |
|
It is considered beerware. Prost. Skol. Cheers or whatever. |
|
Some of the stuff below is stolen from Fefes example libowfat httpd. |
|
|
|
$Id$ */ |
|
|
|
/* System */ |
|
#include <arpa/inet.h> |
|
#include <ctype.h> |
|
#include <errno.h> |
|
#include <pthread.h> |
|
#include <pwd.h> |
|
#include <signal.h> |
|
#include <stdio.h> |
|
#include <stdlib.h> |
|
#include <string.h> |
|
#include <sys/socket.h> |
|
#include <unistd.h> |
|
#ifdef WANT_SYSLOGS |
|
#include <syslog.h> |
|
#endif |
|
|
|
/* Libowfat */ |
|
#include "byte.h" |
|
#include "io.h" |
|
#include "iob.h" |
|
#include "ip6.h" |
|
#include "scan.h" |
|
#include "socket.h" |
|
|
|
/* Opentracker */ |
|
#include "ot_accesslist.h" |
|
#include "ot_http.h" |
|
#include "ot_livesync.h" |
|
#include "ot_mutex.h" |
|
#include "ot_stats.h" |
|
#include "ot_udp.h" |
|
#include "trackerlogic.h" |
|
|
|
/* Globals */ |
|
time_t g_now_seconds; |
|
char *g_redirecturl; |
|
uint32_t g_tracker_id; |
|
volatile int g_opentracker_running = 1; |
|
int g_self_pipe[2]; |
|
|
|
static char *g_serverdir; |
|
static char *g_serveruser; |
|
static unsigned int g_udp_workers; |
|
|
|
static void panic(const char *routine) __attribute__((noreturn)); |
|
static void panic(const char *routine) { |
|
fprintf(stderr, "%s: %s\n", routine, strerror(errno)); |
|
exit(111); |
|
} |
|
|
|
static void signal_handler(int s) { |
|
if (s == SIGINT) { |
|
/* Any new interrupt signal quits the application */ |
|
signal(SIGINT, SIG_DFL); |
|
|
|
/* Tell all other threads to not acquire any new lock on a bucket |
|
but cancel their operations and return */ |
|
g_opentracker_running = 0; |
|
|
|
trackerlogic_deinit(); |
|
|
|
#ifdef WANT_SYSLOGS |
|
closelog(); |
|
#endif |
|
|
|
exit(0); |
|
} |
|
} |
|
|
|
static void defaul_signal_handlers(void) { |
|
sigset_t signal_mask; |
|
sigemptyset(&signal_mask); |
|
sigaddset(&signal_mask, SIGPIPE); |
|
sigaddset(&signal_mask, SIGHUP); |
|
sigaddset(&signal_mask, SIGINT); |
|
sigaddset(&signal_mask, SIGALRM); |
|
pthread_sigmask(SIG_BLOCK, &signal_mask, NULL); |
|
} |
|
|
|
static void install_signal_handlers(void) { |
|
struct sigaction sa; |
|
sigset_t signal_mask; |
|
sigemptyset(&signal_mask); |
|
|
|
sa.sa_handler = signal_handler; |
|
sigemptyset(&sa.sa_mask); |
|
sa.sa_flags = SA_RESTART; |
|
if ((sigaction(SIGINT, &sa, NULL) == -1) || (sigaction(SIGALRM, &sa, NULL) == -1)) |
|
panic("install_signal_handlers"); |
|
|
|
sigaddset(&signal_mask, SIGINT); |
|
pthread_sigmask(SIG_UNBLOCK, &signal_mask, NULL); |
|
} |
|
|
|
static void usage(char *name) { |
|
fprintf(stderr, |
|
"Usage: %s [-i ip] [-p port] [-P port] [-r redirect] [-d dir] [-u user] [-A ip[/bits]] [-f config] [-s livesyncport]" |
|
#ifdef WANT_ACCESSLIST_BLACK |
|
" [-b blacklistfile]" |
|
#elif defined(WANT_ACCESSLIST_WHITE) |
|
" [-w whitelistfile]" |
|
#endif |
|
"\n", |
|
name); |
|
} |
|
|
|
#define HELPLINE(opt, desc) fprintf(stderr, "\t%-10s%s\n", opt, desc) |
|
static void help(char *name) { |
|
usage(name); |
|
|
|
HELPLINE("-f config", "include and execute the config file"); |
|
HELPLINE("-i ip", "specify ip to bind to with next -[pP] (default: any, overrides preceeding ones)"); |
|
HELPLINE("-p port", "do bind to tcp port (default: 6969, you may specify more than one)"); |
|
HELPLINE("-P port", "do bind to udp port (default: 6969, you may specify more than one)"); |
|
HELPLINE("-r redirecturl", "specify url where / should be redirected to (default none)"); |
|
HELPLINE("-d dir", "specify directory to try to chroot to (default: \".\")"); |
|
HELPLINE("-u user", "specify user under whose privileges opentracker should run (default: \"nobody\")"); |
|
HELPLINE("-A ip[/bits]", "bless an ip address or net as admin address (e.g. to allow syncs from this address)"); |
|
#ifdef WANT_ACCESSLIST_BLACK |
|
HELPLINE("-b file", "specify blacklist file."); |
|
#elif defined(WANT_ACCESSLIST_WHITE) |
|
HELPLINE("-w file", "specify whitelist file."); |
|
#endif |
|
|
|
fprintf(stderr, "\nExample: ./opentracker -i 127.0.0.1 -p 6969 -P 6969 -f ./opentracker.conf -i 10.1.1.23 -p 2710 -p 80\n"); |
|
fprintf(stderr, " Here -i 127.0.0.1 selects the ip address for the next -p 6969 and -P 6969.\n"); |
|
fprintf(stderr, " If no port is bound from config file or command line, the last address given\n"); |
|
fprintf(stderr, " (or ::1 if none is set) will be used on port 6969.\n"); |
|
} |
|
#undef HELPLINE |
|
|
|
static ssize_t header_complete(char *request, ssize_t byte_count) { |
|
ssize_t i = 0, state = 0; |
|
|
|
for (i = 1; i < byte_count; i += 2) |
|
if (request[i] <= 13) { |
|
i--; |
|
for (state = 0; i < byte_count; ++i) { |
|
char c = request[i]; |
|
if (c == '\r' || c == '\n') |
|
state = (state >> 2) | ((c << 6) & 0xc0); |
|
else |
|
break; |
|
if (state >= 0xa0 || state == 0x99) |
|
return i + 1; |
|
} |
|
} |
|
return 0; |
|
} |
|
|
|
static void handle_dead(const int64 sock) { |
|
struct http_data *cookie = io_getcookie(sock); |
|
if (cookie) { |
|
size_t i; |
|
for (i = 0; i < cookie->batches; ++i) |
|
iob_reset(cookie->batch + i); |
|
free(cookie->batch); |
|
array_reset(&cookie->request); |
|
if (cookie->flag & (STRUCT_HTTP_FLAG_WAITINGFORTASK | STRUCT_HTTP_FLAG_CHUNKED_IN_TRANSFER)) |
|
mutex_workqueue_canceltask(sock); |
|
free(cookie); |
|
} |
|
io_close(sock); |
|
} |
|
|
|
static void handle_read(const int64 sock, struct ot_workstruct *ws) { |
|
struct http_data *cookie = io_getcookie(sock); |
|
ssize_t byte_count = io_tryread(sock, ws->inbuf, G_INBUF_SIZE); |
|
|
|
if (byte_count == 0 || byte_count == -3) { |
|
handle_dead(sock); |
|
return; |
|
} |
|
|
|
if (byte_count == -1) |
|
return; |
|
|
|
/* If we get the whole request in one packet, handle it without copying */ |
|
if (!array_start(&cookie->request)) { |
|
if ((ws->header_size = header_complete(ws->inbuf, byte_count))) { |
|
ws->request = ws->inbuf; |
|
ws->request_size = byte_count; |
|
http_handle_request(sock, ws); |
|
} else |
|
array_catb(&cookie->request, ws->inbuf, (size_t)byte_count); |
|
return; |
|
} |
|
|
|
array_catb(&cookie->request, ws->inbuf, byte_count); |
|
if (array_failed(&cookie->request) || array_bytes(&cookie->request) > 8192) { |
|
http_issue_error(sock, ws, CODE_HTTPERROR_500); |
|
return; |
|
} |
|
|
|
while ((ws->header_size = header_complete(array_start(&cookie->request), array_bytes(&cookie->request)))) { |
|
ws->request = array_start(&cookie->request); |
|
ws->request_size = array_bytes(&cookie->request); |
|
http_handle_request(sock, ws); |
|
#ifdef WANT_KEEPALIVE |
|
if (!ws->keep_alive) |
|
#endif |
|
return; |
|
} |
|
} |
|
|
|
static void handle_write(const int64 sock) { |
|
struct http_data *cookie = io_getcookie(sock); |
|
size_t i; |
|
int chunked = 0; |
|
|
|
/* Look for the first io_batch still containing bytes to write */ |
|
if (cookie) { |
|
if (cookie->flag & STRUCT_HTTP_FLAG_CHUNKED_IN_TRANSFER) |
|
chunked = 1; |
|
|
|
for (i = 0; i < cookie->batches; ++i) { |
|
if (cookie->batch[i].bytesleft) { |
|
int64 res = iob_send(sock, cookie->batch + i); |
|
|
|
if (res == -3) { |
|
handle_dead(sock); |
|
return; |
|
} |
|
|
|
if (!cookie->batch[i].bytesleft) |
|
continue; |
|
|
|
if (res == -1 || res > 0 || i < cookie->batches - 1) |
|
return; |
|
} |
|
} |
|
} |
|
|
|
/* In a chunked transfer after all batches accumulated have been sent, wait for the next one */ |
|
if (chunked) |
|
io_dontwantwrite(sock); |
|
else |
|
handle_dead(sock); |
|
} |
|
|
|
static void handle_accept(const int64 serversocket) { |
|
struct http_data *cookie; |
|
int64 sock; |
|
ot_ip6 ip; |
|
uint16 port; |
|
tai6464 t; |
|
|
|
while ((sock = socket_accept6(serversocket, ip, &port, NULL)) != -1) { |
|
|
|
/* Put fd into a non-blocking mode */ |
|
io_nonblock(sock); |
|
|
|
if (!io_fd(sock) || !(cookie = (struct http_data *)malloc(sizeof(struct http_data)))) { |
|
io_close(sock); |
|
continue; |
|
} |
|
memset(cookie, 0, sizeof(struct http_data)); |
|
memcpy(cookie->ip, ip, sizeof(ot_ip6)); |
|
|
|
io_setcookie(sock, cookie); |
|
io_wantread(sock); |
|
|
|
stats_issue_event(EVENT_ACCEPT, FLAG_TCP, (uintptr_t)ip); |
|
|
|
/* That breaks taia encapsulation. But there is no way to take system |
|
time this often in FreeBSD and libowfat does not allow to set unix time */ |
|
taia_uint(&t, 0); /* Clear t */ |
|
tai_unix(&(t.sec), (g_now_seconds + OT_CLIENT_TIMEOUT)); |
|
io_timeout(sock, t); |
|
} |
|
io_eagain(serversocket); |
|
} |
|
|
|
static void *server_mainloop(void *args) { |
|
struct ot_workstruct ws; |
|
time_t next_timeout_check = g_now_seconds + OT_CLIENT_TIMEOUT_CHECKINTERVAL; |
|
struct iovec *iovector; |
|
int iovec_entries, is_partial; |
|
|
|
(void)args; |
|
|
|
/* Initialize our "thread local storage" */ |
|
ws.inbuf = malloc(G_INBUF_SIZE); |
|
ws.outbuf = malloc(G_OUTBUF_SIZE); |
|
#ifdef _DEBUG_HTTPERROR |
|
ws.debugbuf = malloc(G_DEBUGBUF_SIZE); |
|
#endif |
|
|
|
if (!ws.inbuf || !ws.outbuf) |
|
panic("Initializing worker failed"); |
|
|
|
#ifdef WANT_ARC4RANDOM |
|
arc4random_buf(&ws.rand48_state[0], 3 * sizeof(uint16_t)); |
|
#else |
|
ws.rand48_state[0] = (uint16_t)random(); |
|
ws.rand48_state[1] = (uint16_t)random(); |
|
ws.rand48_state[2] = (uint16_t)random(); |
|
#endif |
|
|
|
for (;;) { |
|
int64 sock; |
|
|
|
io_wait(); |
|
|
|
while ((sock = io_canread()) != -1) { |
|
const void *cookie = io_getcookie(sock); |
|
if ((intptr_t)cookie == FLAG_TCP) |
|
handle_accept(sock); |
|
else if ((intptr_t)cookie == FLAG_UDP) |
|
handle_udp6(sock, &ws); |
|
else if ((intptr_t)cookie == FLAG_SELFPIPE) |
|
io_tryread(sock, ws.inbuf, G_INBUF_SIZE); |
|
else |
|
handle_read(sock, &ws); |
|
} |
|
|
|
while ((sock = mutex_workqueue_popresult(&iovec_entries, &iovector, &is_partial)) != -1) |
|
http_sendiovecdata(sock, &ws, iovec_entries, iovector, is_partial); |
|
|
|
while ((sock = io_canwrite()) != -1) |
|
handle_write(sock); |
|
|
|
if (g_now_seconds > next_timeout_check) { |
|
while ((sock = io_timeouted()) != -1) |
|
handle_dead(sock); |
|
next_timeout_check = g_now_seconds + OT_CLIENT_TIMEOUT_CHECKINTERVAL; |
|
} |
|
|
|
livesync_ticker(); |
|
} |
|
return 0; |
|
} |
|
|
|
static int64_t ot_try_bind(ot_ip6 ip, uint16_t port, PROTO_FLAG proto) { |
|
int64 sock = proto == FLAG_TCP ? socket_tcp6() : socket_udp6(); |
|
|
|
#ifdef _DEBUG |
|
{ |
|
char *protos[] = {"TCP", "UDP", "UDP mcast"}; |
|
char _debug[512]; |
|
int off = snprintf(_debug, sizeof(_debug), "Binding socket type %s to address [", protos[proto]); |
|
off += fmt_ip6c(_debug + off, ip); |
|
snprintf(_debug + off, sizeof(_debug) - off, "]:%d...", port); |
|
fputs(_debug, stderr); |
|
} |
|
#endif |
|
|
|
if (socket_bind6_reuse(sock, ip, port, 0) == -1) |
|
panic("socket_bind6_reuse"); |
|
|
|
if ((proto == FLAG_TCP) && (socket_listen(sock, SOMAXCONN) == -1)) |
|
panic("socket_listen"); |
|
|
|
if (!io_fd(sock)) |
|
panic("io_fd"); |
|
|
|
io_setcookie(sock, (void *)proto); |
|
|
|
if ((proto == FLAG_UDP) && g_udp_workers) { |
|
io_block(sock); |
|
udp_init(sock, g_udp_workers); |
|
} else |
|
io_wantread(sock); |
|
|
|
#ifdef _DEBUG |
|
fputs(" success.\n", stderr); |
|
#endif |
|
|
|
return sock; |
|
} |
|
|
|
char *set_config_option(char **option, char *value) { |
|
#ifdef _DEBUG |
|
fprintf(stderr, "Setting config option: %s\n", value); |
|
#endif |
|
while (isspace(*value)) |
|
++value; |
|
free(*option); |
|
return *option = strdup(value); |
|
} |
|
|
|
static int scan_ip6_port(const char *src, ot_ip6 ip, uint16 *port) { |
|
const char *s = src; |
|
int off, bracket = 0; |
|
while (isspace(*s)) |
|
++s; |
|
if (*s == '[') |
|
++s, ++bracket; /* for v6 style notation */ |
|
if (!(off = scan_ip6(s, ip))) |
|
return 0; |
|
s += off; |
|
if (bracket && *s == ']') |
|
++s; |
|
if (*s == 0 || isspace(*s)) |
|
return s - src; |
|
if (!ip6_isv4mapped(ip)) { |
|
if (*s != ':' && *s != '.') |
|
return 0; |
|
if (!bracket && *(s) == ':') |
|
return 0; |
|
s++; |
|
} else { |
|
if (*(s++) != ':') |
|
return 0; |
|
} |
|
if (!(off = scan_ushort(s, port))) |
|
return 0; |
|
return off + s - src; |
|
} |
|
|
|
static int scan_ip6_net(const char *src, ot_net *net) { |
|
const char *s = src; |
|
int off; |
|
while (isspace(*s)) |
|
++s; |
|
if (!(off = scan_ip6(s, net->address))) |
|
return 0; |
|
s += off; |
|
if (*s != '/') |
|
net->bits = 128; |
|
else { |
|
s++; |
|
if (!(off = scan_int(s, &net->bits))) |
|
return 0; |
|
if (ip6_isv4mapped(net->address)) |
|
net->bits += 96; |
|
if (net->bits > 128) |
|
return 0; |
|
s += off; |
|
} |
|
return off + s - src; |
|
} |
|
|
|
int parse_configfile(char *config_filename) { |
|
FILE *accesslist_filehandle; |
|
char inbuf[512]; |
|
ot_ip6 tmpip; |
|
#if defined(WANT_RESTRICT_STATS) || defined(WANT_IP_FROM_PROXY) || defined(WANT_SYNC_LIVE) |
|
ot_net tmpnet; |
|
#endif |
|
int bound = 0; |
|
|
|
accesslist_filehandle = fopen(config_filename, "r"); |
|
|
|
if (accesslist_filehandle == NULL) { |
|
fprintf(stderr, "Warning: Can't open config file: %s.", config_filename); |
|
return 0; |
|
} |
|
|
|
while (fgets(inbuf, sizeof(inbuf), accesslist_filehandle)) { |
|
char *p = inbuf; |
|
size_t strl; |
|
|
|
/* Skip white spaces */ |
|
while (isspace(*p)) |
|
++p; |
|
|
|
/* Ignore comments and empty lines */ |
|
if ((*p == '#') || (*p == '\n') || (*p == 0)) |
|
continue; |
|
|
|
/* consume trailing new lines and spaces */ |
|
strl = strlen(p); |
|
while (strl && isspace(p[strl - 1])) |
|
p[--strl] = 0; |
|
|
|
/* Scan for commands */ |
|
if (!byte_diff(p, 15, "tracker.rootdir") && isspace(p[15])) { |
|
set_config_option(&g_serverdir, p + 16); |
|
} else if (!byte_diff(p, 12, "tracker.user") && isspace(p[12])) { |
|
set_config_option(&g_serveruser, p + 13); |
|
} else if (!byte_diff(p, 14, "listen.tcp_udp") && isspace(p[14])) { |
|
uint16_t tmpport = 6969; |
|
if (!scan_ip6_port(p + 15, tmpip, &tmpport)) |
|
goto parse_error; |
|
ot_try_bind(tmpip, tmpport, FLAG_TCP); |
|
++bound; |
|
ot_try_bind(tmpip, tmpport, FLAG_UDP); |
|
++bound; |
|
} else if (!byte_diff(p, 10, "listen.tcp") && isspace(p[10])) { |
|
uint16_t tmpport = 6969; |
|
if (!scan_ip6_port(p + 11, tmpip, &tmpport)) |
|
goto parse_error; |
|
ot_try_bind(tmpip, tmpport, FLAG_TCP); |
|
++bound; |
|
} else if (!byte_diff(p, 10, "listen.udp") && isspace(p[10])) { |
|
uint16_t tmpport = 6969; |
|
if (!scan_ip6_port(p + 11, tmpip, &tmpport)) |
|
goto parse_error; |
|
ot_try_bind(tmpip, tmpport, FLAG_UDP); |
|
++bound; |
|
} else if (!byte_diff(p, 18, "listen.udp.workers") && isspace(p[18])) { |
|
char *value = p + 18; |
|
while (isspace(*value)) |
|
++value; |
|
scan_uint(value, &g_udp_workers); |
|
#ifdef WANT_ACCESSLIST_WHITE |
|
} else if (!byte_diff(p, 16, "access.whitelist") && isspace(p[16])) { |
|
set_config_option(&g_accesslist_filename, p + 17); |
|
#elif defined(WANT_ACCESSLIST_BLACK) |
|
} else if (!byte_diff(p, 16, "access.blacklist") && isspace(p[16])) { |
|
set_config_option(&g_accesslist_filename, p + 17); |
|
#endif |
|
#ifdef WANT_DYNAMIC_ACCESSLIST |
|
} else if (!byte_diff(p, 15, "access.fifo_add") && isspace(p[15])) { |
|
set_config_option(&g_accesslist_pipe_add, p + 16); |
|
} else if (!byte_diff(p, 18, "access.fifo_delete") && isspace(p[18])) { |
|
set_config_option(&g_accesslist_pipe_delete, p + 19); |
|
#endif |
|
#ifdef WANT_RESTRICT_STATS |
|
} else if (!byte_diff(p, 12, "access.stats") && isspace(p[12])) { |
|
if (!scan_ip6_net(p + 13, &tmpnet)) |
|
goto parse_error; |
|
accesslist_bless_net(&tmpnet, OT_PERMISSION_MAY_STAT); |
|
#endif |
|
} else if (!byte_diff(p, 17, "access.stats_path") && isspace(p[17])) { |
|
set_config_option(&g_stats_path, p + 18); |
|
#ifdef WANT_IP_FROM_PROXY |
|
} else if (!byte_diff(p, 12, "access.proxy") && isspace(p[12])) { |
|
if (!scan_ip6_net(p + 13, &tmpnet)) |
|
goto parse_error; |
|
accesslist_bless_net(&tmpnet, OT_PERMISSION_MAY_PROXY); |
|
#endif |
|
} else if (!byte_diff(p, 20, "tracker.redirect_url") && isspace(p[20])) { |
|
set_config_option(&g_redirecturl, p + 21); |
|
#ifdef WANT_SYNC_LIVE |
|
} else if (!byte_diff(p, 24, "livesync.cluster.node_ip") && isspace(p[24])) { |
|
if (!scan_ip6_net(p + 25, &tmpnet)) |
|
goto parse_error; |
|
accesslist_bless_net(&tmpnet, OT_PERMISSION_MAY_LIVESYNC); |
|
} else if (!byte_diff(p, 23, "livesync.cluster.listen") && isspace(p[23])) { |
|
uint16_t tmpport = LIVESYNC_PORT; |
|
if (!scan_ip6_port(p + 24, tmpip, &tmpport)) |
|
goto parse_error; |
|
livesync_bind_mcast(tmpip, tmpport); |
|
#endif |
|
} else |
|
fprintf(stderr, "Unhandled line in config file: %s\n", inbuf); |
|
continue; |
|
parse_error: |
|
fprintf(stderr, "Parse error in config file: %s\n", inbuf); |
|
} |
|
fclose(accesslist_filehandle); |
|
return bound; |
|
} |
|
|
|
void load_state(const char *const state_filename) { |
|
FILE *state_filehandle; |
|
char inbuf[512]; |
|
ot_hash infohash; |
|
unsigned long long base, downcount; |
|
int consumed; |
|
|
|
state_filehandle = fopen(state_filename, "r"); |
|
|
|
if (state_filehandle == NULL) { |
|
fprintf(stderr, "Warning: Can't open config file: %s.", state_filename); |
|
return; |
|
} |
|
|
|
/* We do ignore anything that is not of the form "^[:xdigit:]:\d+:\d+" */ |
|
while (fgets(inbuf, sizeof(inbuf), state_filehandle)) { |
|
int i; |
|
for (i = 0; i < (int)sizeof(ot_hash); ++i) { |
|
int eger = 16 * scan_fromhex(inbuf[2 * i]) + scan_fromhex(inbuf[1 + 2 * i]); |
|
if (eger < 0) |
|
continue; |
|
infohash[i] = eger; |
|
} |
|
|
|
if (i != (int)sizeof(ot_hash)) |
|
continue; |
|
i *= 2; |
|
|
|
if (inbuf[i++] != ':' || !(consumed = scan_ulonglong(inbuf + i, &base))) |
|
continue; |
|
i += consumed; |
|
if (inbuf[i++] != ':' || !(consumed = scan_ulonglong(inbuf + i, &downcount))) |
|
continue; |
|
add_torrent_from_saved_state(infohash, base, downcount); |
|
} |
|
|
|
fclose(state_filehandle); |
|
} |
|
|
|
int drop_privileges(const char *const serveruser, const char *const serverdir) { |
|
struct passwd *pws = NULL; |
|
|
|
#ifdef _DEBUG |
|
if (!geteuid()) |
|
fprintf(stderr, "Dropping to user %s.\n", serveruser); |
|
if (serverdir) |
|
fprintf(stderr, "ch%s'ing to directory %s.\n", geteuid() ? "dir" : "root", serverdir); |
|
#endif |
|
|
|
/* Grab pws entry before chrooting */ |
|
pws = getpwnam(serveruser); |
|
endpwent(); |
|
|
|
if (geteuid() == 0) { |
|
/* Running as root: chroot and drop privileges */ |
|
if (serverdir && chroot(serverdir)) { |
|
fprintf(stderr, "Could not chroot to %s, because: %s\n", serverdir, strerror(errno)); |
|
return -1; |
|
} |
|
|
|
if (chdir("/")) |
|
panic("chdir() failed after chrooting: "); |
|
|
|
/* If we can't find server user, revert to nobody's default uid */ |
|
if (!pws) { |
|
fprintf(stderr, "Warning: Could not get password entry for %s. Reverting to uid -2.\n", serveruser); |
|
if (setegid((gid_t)-2) || setgid((gid_t)-2) || setuid((uid_t)-2) || seteuid((uid_t)-2)) |
|
panic("Could not set uid to value -2"); |
|
} else { |
|
if (setegid(pws->pw_gid) || setgid(pws->pw_gid) || setuid(pws->pw_uid) || seteuid(pws->pw_uid)) |
|
panic("Could not set uid to specified value"); |
|
} |
|
|
|
if (geteuid() == 0 || getegid() == 0) |
|
panic("Still running with root privileges?!"); |
|
} else { |
|
/* Normal user, just chdir() */ |
|
if (serverdir && chdir(serverdir)) { |
|
fprintf(stderr, "Could not chroot to %s, because: %s\n", serverdir, strerror(errno)); |
|
return -1; |
|
} |
|
} |
|
|
|
return 0; |
|
} |
|
|
|
/* Maintain our copy of the clock. time() on BSDs is very expensive. */ |
|
static void *time_caching_worker(void *args) { |
|
(void)args; |
|
while (1) { |
|
g_now_seconds = time(NULL); |
|
sleep(5); |
|
} |
|
return NULL; |
|
} |
|
|
|
int main(int argc, char **argv) { |
|
ot_ip6 serverip; |
|
ot_net tmpnet; |
|
int bound = 0, scanon = 1; |
|
uint16_t tmpport; |
|
char *statefile = 0; |
|
pthread_t thread_id; /* time cacher */ |
|
|
|
memset(serverip, 0, sizeof(ot_ip6)); |
|
#ifdef WANT_V4_ONLY |
|
serverip[10] = serverip[11] = -1; |
|
#endif |
|
|
|
#ifdef WANT_DEV_RANDOM |
|
srandomdev(); |
|
#else |
|
srandom(time(NULL)); |
|
#endif |
|
|
|
while (scanon) { |
|
switch (getopt(argc, argv, |
|
":i:p:A:P:d:u:r:s:f:l:v" |
|
#ifdef WANT_ACCESSLIST_BLACK |
|
"b:" |
|
#elif defined(WANT_ACCESSLIST_WHITE) |
|
"w:" |
|
#endif |
|
"h")) { |
|
case -1: |
|
scanon = 0; |
|
break; |
|
case 'i': |
|
if (!scan_ip6(optarg, serverip)) { |
|
usage(argv[0]); |
|
exit(1); |
|
} |
|
break; |
|
#ifdef WANT_ACCESSLIST_BLACK |
|
case 'b': |
|
set_config_option(&g_accesslist_filename, optarg); |
|
break; |
|
#elif defined(WANT_ACCESSLIST_WHITE) |
|
case 'w': |
|
set_config_option(&g_accesslist_filename, optarg); |
|
break; |
|
#endif |
|
case 'p': |
|
if (!scan_ushort(optarg, &tmpport)) { |
|
usage(argv[0]); |
|
exit(1); |
|
} |
|
ot_try_bind(serverip, tmpport, FLAG_TCP); |
|
bound++; |
|
break; |
|
case 'P': |
|
if (!scan_ushort(optarg, &tmpport)) { |
|
usage(argv[0]); |
|
exit(1); |
|
} |
|
ot_try_bind(serverip, tmpport, FLAG_UDP); |
|
bound++; |
|
break; |
|
#ifdef WANT_SYNC_LIVE |
|
case 's': |
|
if (!scan_ushort(optarg, &tmpport)) { |
|
usage(argv[0]); |
|
exit(1); |
|
} |
|
livesync_bind_mcast(serverip, tmpport); |
|
break; |
|
#endif |
|
case 'd': |
|
set_config_option(&g_serverdir, optarg); |
|
break; |
|
case 'u': |
|
set_config_option(&g_serveruser, optarg); |
|
break; |
|
case 'r': |
|
set_config_option(&g_redirecturl, optarg); |
|
break; |
|
case 'l': |
|
statefile = optarg; |
|
break; |
|
case 'A': |
|
if (!scan_ip6_net(optarg, &tmpnet)) { |
|
usage(argv[0]); |
|
exit(1); |
|
} |
|
accesslist_bless_net(&tmpnet, 0xffff); /* Allow everything for now */ |
|
break; |
|
case 'f': |
|
bound += parse_configfile(optarg); |
|
break; |
|
case 'h': |
|
help(argv[0]); |
|
exit(0); |
|
case 'v': { |
|
char buffer[8192]; |
|
stats_return_tracker_version(buffer); |
|
fputs(buffer, stderr); |
|
exit(0); |
|
} |
|
default: |
|
case '?': |
|
usage(argv[0]); |
|
exit(1); |
|
} |
|
} |
|
|
|
/* Bind to our default tcp/udp ports */ |
|
if (!bound) { |
|
ot_try_bind(serverip, 6969, FLAG_TCP); |
|
ot_try_bind(serverip, 6969, FLAG_UDP); |
|
} |
|
|
|
defaul_signal_handlers(); |
|
|
|
#ifdef WANT_SYSLOGS |
|
openlog("opentracker", 0, LOG_USER); |
|
setlogmask(LOG_UPTO(LOG_INFO)); |
|
#endif |
|
|
|
if (drop_privileges(g_serveruser ? g_serveruser : "nobody", g_serverdir) == -1) |
|
panic("drop_privileges failed, exiting. Last error"); |
|
|
|
g_now_seconds = time(NULL); |
|
pthread_create(&thread_id, NULL, time_caching_worker, NULL); |
|
|
|
/* Create our self pipe which allows us to interrupt mainloops |
|
io_wait in case some data is available to send out */ |
|
if (pipe(g_self_pipe) == -1) |
|
panic("selfpipe failed: "); |
|
if (!io_fd(g_self_pipe[0])) |
|
panic("selfpipe io_fd failed: "); |
|
if (!io_fd(g_self_pipe[1])) |
|
panic("selfpipe io_fd failed: "); |
|
io_setcookie(g_self_pipe[0], (void *)FLAG_SELFPIPE); |
|
io_wantread(g_self_pipe[0]); |
|
|
|
/* Init all sub systems. This call may fail with an exit() */ |
|
trackerlogic_init(); |
|
|
|
#ifdef _DEBUG_RANDOMTORRENTS |
|
fprintf(stderr, "DEBUG: Generating %d random peers on random torrents. This may take a while. (Setting RANDOMTORRENTS in trackerlogic.h)\n", RANDOMTORRENTS); |
|
trackerlogic_add_random_torrents(RANDOMTORRENTS); |
|
fprintf(stderr, "... done.\n"); |
|
#endif |
|
|
|
if (statefile) |
|
load_state(statefile); |
|
|
|
install_signal_handlers(); |
|
|
|
if (!g_udp_workers) |
|
udp_init(-1, 0); |
|
|
|
server_mainloop(0); |
|
|
|
return 0; |
|
}
|
|
|