summaryrefslogtreecommitdiff
path: root/src/webserver/main.c
diff options
context:
space:
mode:
authorChuck Miller <shadowmil@gmail.com>2009-12-25 05:00:31 -0500
committerJared Adams <jaxad0127@gmail.com>2009-12-26 00:40:11 -0700
commit634aeeb9d58b01f9de6632a014a063ef0c4cf31e (patch)
tree70023dd2bcc12a3f96ec6f118d80e27411920531 /src/webserver/main.c
parent113fcc4f0a7a0921e94bc415515dd4b393a29d60 (diff)
downloadtmwa-634aeeb9d58b01f9de6632a014a063ef0c4cf31e.tar.gz
tmwa-634aeeb9d58b01f9de6632a014a063ef0c4cf31e.tar.bz2
tmwa-634aeeb9d58b01f9de6632a014a063ef0c4cf31e.tar.xz
tmwa-634aeeb9d58b01f9de6632a014a063ef0c4cf31e.zip
Used the "indent" C formatting program from GNU to do some clean ups
The command options used was: -nbad -bap -sc -bl -blf -bli0 -cli4 -cbi0 -di5 -nbc -bls -ip2 -nut -ts4 -bap -i4 -sob -npsl
Diffstat (limited to 'src/webserver/main.c')
-rw-r--r--src/webserver/main.c209
1 files changed, 106 insertions, 103 deletions
diff --git a/src/webserver/main.c b/src/webserver/main.c
index 5936255..0e227d3 100644
--- a/src/webserver/main.c
+++ b/src/webserver/main.c
@@ -15,7 +15,6 @@
* *
***************************************************************************/
-
#include <stdio.h>
#include <stdlib.h>
#include <unistd.h>
@@ -32,111 +31,115 @@
char *header = "<!DOCTYPE HTML PUBLIC \"-//IETF//DTD HTML 2.0//EN\">\n";
char recvin[500], password[25];
-int s_port;
+int s_port;
-void sigchld_handler(int s)
+void sigchld_handler (int s)
{
- while(wait(NULL) > 0);
+ while (wait (NULL) > 0);
}
-int main(int argc, char **argv)
+int main (int argc, char **argv)
{
- if (argc < 3)
- {
- printf("eAthena Web Server\n");
- printf("usage: %s [password] [port]\n", argv[0]);
- exit(0);
- }
-
- s_port = atoi(argv[2]);
-
- if ((s_port < 1) || (s_port > 65534))
- {
- printf("Error: The port you choose is not valid port.\n");
- exit(0);
- }
-
- if (strlen(argv[1]) > 25)
- {
- printf("Error: Your password is too long.\n");
- printf("It must be shorter than 25 characters.\n");
- exit(0);
- }
-
- memset(password, 0x0, 25);
- memcpy(password, argv[1], strlen(argv[1]));
-
- int sockfd, new_fd;
- struct sockaddr_in my_addr;
- struct sockaddr_in their_addr;
- int sin_size;
-
- struct sigaction sa;
-
- int yes=1;
-
- if ((sockfd = socket(AF_INET, SOCK_STREAM,0)) == -1)
- {
- perror("Darn, this is broken.");
- exit(0);
- }
-
- if (setsockopt(sockfd, SOL_SOCKET, SO_REUSEADDR, &yes, sizeof(int)) == -1)
- {
- perror("Error... :-(");
- }
-
- //Now we know we have a working socket. :-)
-
- my_addr.sin_family = AF_INET;
- my_addr.sin_port = htons(s_port);
- my_addr.sin_addr.s_addr = INADDR_ANY;
- memset(&(my_addr.sin_zero), '\0', 8);
-
- if ( bind(sockfd, (struct sockaddr *)&my_addr, sizeof(struct sockaddr)) == -1)
- {
- perror("can not bind to this port");
- exit(0);
- }
-
- if ( listen(sockfd, BLOG) == -1)
- {
- perror("can not listen on port");
- exit(0);
- }
-
- sa.sa_handler = sigchld_handler;
-
- sigemptyset(&sa.sa_mask);
- sa.sa_flags = SA_RESTART;
-
- if (sigaction(SIGCHLD, &sa, NULL) == -1)
- {
- perror("sigaction sucks");
- exit(0);
- }
-
- printf("The eAthena webserver is up and listening on port %i.\n", s_port);
-
- while(1)
- {
- sin_size = sizeof(struct sockaddr_in);
- new_fd = accept(sockfd, (struct sockaddr *)&their_addr, &sin_size);
-
- if (!fork())
- {
- close(sockfd);
- memset(recvin, 0x0, 500);
- recv(new_fd, recvin, 500, 0);
- send(new_fd, header, strlen(header), 0);
- generate_page(password, new_fd, get_query(recvin), inet_ntoa(their_addr.sin_addr));
- log_visit(get_query(recvin), inet_ntoa(their_addr.sin_addr));
-
- close(new_fd);
- exit(0);
- }
- close(new_fd);
- }
-
- return 0;
+ if (argc < 3)
+ {
+ printf ("eAthena Web Server\n");
+ printf ("usage: %s [password] [port]\n", argv[0]);
+ exit (0);
+ }
+
+ s_port = atoi (argv[2]);
+
+ if ((s_port < 1) || (s_port > 65534))
+ {
+ printf ("Error: The port you choose is not valid port.\n");
+ exit (0);
+ }
+
+ if (strlen (argv[1]) > 25)
+ {
+ printf ("Error: Your password is too long.\n");
+ printf ("It must be shorter than 25 characters.\n");
+ exit (0);
+ }
+
+ memset (password, 0x0, 25);
+ memcpy (password, argv[1], strlen (argv[1]));
+
+ int sockfd, new_fd;
+ struct sockaddr_in my_addr;
+ struct sockaddr_in their_addr;
+ int sin_size;
+
+ struct sigaction sa;
+
+ int yes = 1;
+
+ if ((sockfd = socket (AF_INET, SOCK_STREAM, 0)) == -1)
+ {
+ perror ("Darn, this is broken.");
+ exit (0);
+ }
+
+ if (setsockopt (sockfd, SOL_SOCKET, SO_REUSEADDR, &yes, sizeof (int)) ==
+ -1)
+ {
+ perror ("Error... :-(");
+ }
+
+ //Now we know we have a working socket. :-)
+
+ my_addr.sin_family = AF_INET;
+ my_addr.sin_port = htons (s_port);
+ my_addr.sin_addr.s_addr = INADDR_ANY;
+ memset (&(my_addr.sin_zero), '\0', 8);
+
+ if (bind (sockfd, (struct sockaddr *) &my_addr, sizeof (struct sockaddr))
+ == -1)
+ {
+ perror ("can not bind to this port");
+ exit (0);
+ }
+
+ if (listen (sockfd, BLOG) == -1)
+ {
+ perror ("can not listen on port");
+ exit (0);
+ }
+
+ sa.sa_handler = sigchld_handler;
+
+ sigemptyset (&sa.sa_mask);
+ sa.sa_flags = SA_RESTART;
+
+ if (sigaction (SIGCHLD, &sa, NULL) == -1)
+ {
+ perror ("sigaction sucks");
+ exit (0);
+ }
+
+ printf ("The eAthena webserver is up and listening on port %i.\n",
+ s_port);
+
+ while (1)
+ {
+ sin_size = sizeof (struct sockaddr_in);
+ new_fd = accept (sockfd, (struct sockaddr *) &their_addr, &sin_size);
+
+ if (!fork ())
+ {
+ close (sockfd);
+ memset (recvin, 0x0, 500);
+ recv (new_fd, recvin, 500, 0);
+ send (new_fd, header, strlen (header), 0);
+ generate_page (password, new_fd, get_query (recvin),
+ inet_ntoa (their_addr.sin_addr));
+ log_visit (get_query (recvin), inet_ntoa (their_addr.sin_addr));
+
+ close (new_fd);
+ exit (0);
+ }
+ close (new_fd);
+ }
+
+ return 0;
}