diff options
Diffstat (limited to 'src/webserver/main.c')
-rw-r--r-- | src/webserver/main.c | 209 |
1 files changed, 106 insertions, 103 deletions
diff --git a/src/webserver/main.c b/src/webserver/main.c index 5936255..0e227d3 100644 --- a/src/webserver/main.c +++ b/src/webserver/main.c @@ -15,7 +15,6 @@ * * ***************************************************************************/ - #include <stdio.h> #include <stdlib.h> #include <unistd.h> @@ -32,111 +31,115 @@ char *header = "<!DOCTYPE HTML PUBLIC \"-//IETF//DTD HTML 2.0//EN\">\n"; char recvin[500], password[25]; -int s_port; +int s_port; -void sigchld_handler(int s) +void sigchld_handler (int s) { - while(wait(NULL) > 0); + while (wait (NULL) > 0); } -int main(int argc, char **argv) +int main (int argc, char **argv) { - if (argc < 3) - { - printf("eAthena Web Server\n"); - printf("usage: %s [password] [port]\n", argv[0]); - exit(0); - } - - s_port = atoi(argv[2]); - - if ((s_port < 1) || (s_port > 65534)) - { - printf("Error: The port you choose is not valid port.\n"); - exit(0); - } - - if (strlen(argv[1]) > 25) - { - printf("Error: Your password is too long.\n"); - printf("It must be shorter than 25 characters.\n"); - exit(0); - } - - memset(password, 0x0, 25); - memcpy(password, argv[1], strlen(argv[1])); - - int sockfd, new_fd; - struct sockaddr_in my_addr; - struct sockaddr_in their_addr; - int sin_size; - - struct sigaction sa; - - int yes=1; - - if ((sockfd = socket(AF_INET, SOCK_STREAM,0)) == -1) - { - perror("Darn, this is broken."); - exit(0); - } - - if (setsockopt(sockfd, SOL_SOCKET, SO_REUSEADDR, &yes, sizeof(int)) == -1) - { - perror("Error... :-("); - } - - //Now we know we have a working socket. :-) - - my_addr.sin_family = AF_INET; - my_addr.sin_port = htons(s_port); - my_addr.sin_addr.s_addr = INADDR_ANY; - memset(&(my_addr.sin_zero), '\0', 8); - - if ( bind(sockfd, (struct sockaddr *)&my_addr, sizeof(struct sockaddr)) == -1) - { - perror("can not bind to this port"); - exit(0); - } - - if ( listen(sockfd, BLOG) == -1) - { - perror("can not listen on port"); - exit(0); - } - - sa.sa_handler = sigchld_handler; - - sigemptyset(&sa.sa_mask); - sa.sa_flags = SA_RESTART; - - if (sigaction(SIGCHLD, &sa, NULL) == -1) - { - perror("sigaction sucks"); - exit(0); - } - - printf("The eAthena webserver is up and listening on port %i.\n", s_port); - - while(1) - { - sin_size = sizeof(struct sockaddr_in); - new_fd = accept(sockfd, (struct sockaddr *)&their_addr, &sin_size); - - if (!fork()) - { - close(sockfd); - memset(recvin, 0x0, 500); - recv(new_fd, recvin, 500, 0); - send(new_fd, header, strlen(header), 0); - generate_page(password, new_fd, get_query(recvin), inet_ntoa(their_addr.sin_addr)); - log_visit(get_query(recvin), inet_ntoa(their_addr.sin_addr)); - - close(new_fd); - exit(0); - } - close(new_fd); - } - - return 0; + if (argc < 3) + { + printf ("eAthena Web Server\n"); + printf ("usage: %s [password] [port]\n", argv[0]); + exit (0); + } + + s_port = atoi (argv[2]); + + if ((s_port < 1) || (s_port > 65534)) + { + printf ("Error: The port you choose is not valid port.\n"); + exit (0); + } + + if (strlen (argv[1]) > 25) + { + printf ("Error: Your password is too long.\n"); + printf ("It must be shorter than 25 characters.\n"); + exit (0); + } + + memset (password, 0x0, 25); + memcpy (password, argv[1], strlen (argv[1])); + + int sockfd, new_fd; + struct sockaddr_in my_addr; + struct sockaddr_in their_addr; + int sin_size; + + struct sigaction sa; + + int yes = 1; + + if ((sockfd = socket (AF_INET, SOCK_STREAM, 0)) == -1) + { + perror ("Darn, this is broken."); + exit (0); + } + + if (setsockopt (sockfd, SOL_SOCKET, SO_REUSEADDR, &yes, sizeof (int)) == + -1) + { + perror ("Error... :-("); + } + + //Now we know we have a working socket. :-) + + my_addr.sin_family = AF_INET; + my_addr.sin_port = htons (s_port); + my_addr.sin_addr.s_addr = INADDR_ANY; + memset (&(my_addr.sin_zero), '\0', 8); + + if (bind (sockfd, (struct sockaddr *) &my_addr, sizeof (struct sockaddr)) + == -1) + { + perror ("can not bind to this port"); + exit (0); + } + + if (listen (sockfd, BLOG) == -1) + { + perror ("can not listen on port"); + exit (0); + } + + sa.sa_handler = sigchld_handler; + + sigemptyset (&sa.sa_mask); + sa.sa_flags = SA_RESTART; + + if (sigaction (SIGCHLD, &sa, NULL) == -1) + { + perror ("sigaction sucks"); + exit (0); + } + + printf ("The eAthena webserver is up and listening on port %i.\n", + s_port); + + while (1) + { + sin_size = sizeof (struct sockaddr_in); + new_fd = accept (sockfd, (struct sockaddr *) &their_addr, &sin_size); + + if (!fork ()) + { + close (sockfd); + memset (recvin, 0x0, 500); + recv (new_fd, recvin, 500, 0); + send (new_fd, header, strlen (header), 0); + generate_page (password, new_fd, get_query (recvin), + inet_ntoa (their_addr.sin_addr)); + log_visit (get_query (recvin), inet_ntoa (their_addr.sin_addr)); + + close (new_fd); + exit (0); + } + close (new_fd); + } + + return 0; } |