* MiniDLNA can now pass the DLNA Conformance Test! * Dependence on libdlna has been removed, and the ffmpeg libs are used directly. * Lots of unused code has been cleaned up. * File transfers will now be forked off into a new process, so as not to tie up the server when sending data.
866 lines
21 KiB
C
866 lines
21 KiB
C
/* MiniDLNA project
|
|
*
|
|
* http://sourceforge.net/projects/minidlna/
|
|
* (c) 2008 Justin Maggard
|
|
* This software is subject to the conditions detailed
|
|
* in the LICENCE file provided within the distribution
|
|
*
|
|
* Portions of the code (c) Thomas Bernard, subject to
|
|
* the conditions detailed in the LICENSE.miniupnpd file.
|
|
*/
|
|
#include <stdlib.h>
|
|
#include <unistd.h>
|
|
#include <string.h>
|
|
#include <stdio.h>
|
|
#include <ctype.h>
|
|
#include <sys/types.h>
|
|
#include <sys/socket.h>
|
|
#include <netinet/in.h>
|
|
#include <arpa/inet.h>
|
|
#include <fcntl.h>
|
|
#include <sys/file.h>
|
|
#include <syslog.h>
|
|
#include <sys/time.h>
|
|
#include <time.h>
|
|
#include <signal.h>
|
|
#include <sys/param.h>
|
|
#if defined(sun)
|
|
#include <kstat.h>
|
|
#else
|
|
/* for BSD's sysctl */
|
|
#include <sys/sysctl.h>
|
|
#endif
|
|
|
|
#include <sqlite3.h>
|
|
|
|
/* unix sockets */
|
|
#include "config.h"
|
|
|
|
#include "upnpglobalvars.h"
|
|
#include "upnphttp.h"
|
|
#include "upnpdescgen.h"
|
|
#include "miniupnpdpath.h"
|
|
#include "getifaddr.h"
|
|
#include "upnpsoap.h"
|
|
#include "options.h"
|
|
#include "minissdp.h"
|
|
#include "miniupnpdtypes.h"
|
|
#include "daemonize.h"
|
|
#include "upnpevents.h"
|
|
#include "scanner.h"
|
|
#include "commonrdr.h"
|
|
|
|
/* MAX_LAN_ADDR : maximum number of interfaces
|
|
* to listen to SSDP traffic */
|
|
/*#define MAX_LAN_ADDR (4)*/
|
|
|
|
static volatile int quitting = 0;
|
|
|
|
/* OpenAndConfHTTPSocket() :
|
|
* setup the socket used to handle incoming HTTP connections. */
|
|
static int
|
|
OpenAndConfHTTPSocket(unsigned short port)
|
|
{
|
|
int s;
|
|
int i = 1;
|
|
struct sockaddr_in listenname;
|
|
|
|
if( (s = socket(PF_INET, SOCK_STREAM, 0)) < 0)
|
|
{
|
|
syslog(LOG_ERR, "socket(http): %m");
|
|
return -1;
|
|
}
|
|
|
|
if(setsockopt(s, SOL_SOCKET, SO_REUSEADDR, &i, sizeof(i)) < 0)
|
|
{
|
|
syslog(LOG_WARNING, "setsockopt(http, SO_REUSEADDR): %m");
|
|
}
|
|
|
|
memset(&listenname, 0, sizeof(struct sockaddr_in));
|
|
listenname.sin_family = AF_INET;
|
|
listenname.sin_port = htons(port);
|
|
listenname.sin_addr.s_addr = htonl(INADDR_ANY);
|
|
|
|
if(bind(s, (struct sockaddr *)&listenname, sizeof(struct sockaddr_in)) < 0)
|
|
{
|
|
syslog(LOG_ERR, "bind(http): %m");
|
|
close(s);
|
|
return -1;
|
|
}
|
|
|
|
if(listen(s, 6) < 0)
|
|
{
|
|
syslog(LOG_ERR, "listen(http): %m");
|
|
close(s);
|
|
return -1;
|
|
}
|
|
|
|
return s;
|
|
}
|
|
|
|
/* Handler for the SIGTERM signal (kill)
|
|
* SIGINT is also handled */
|
|
static void
|
|
sigterm(int sig)
|
|
{
|
|
/*int save_errno = errno;*/
|
|
signal(sig, SIG_IGN); /* Ignore this signal while we are quitting */
|
|
|
|
syslog(LOG_NOTICE, "received signal %d, good-bye", sig);
|
|
|
|
quitting = 1;
|
|
/*errno = save_errno;*/
|
|
}
|
|
|
|
/* record the startup time, for returning uptime */
|
|
static void
|
|
set_startup_time(int sysuptime)
|
|
{
|
|
startup_time = time(NULL);
|
|
if(sysuptime)
|
|
{
|
|
/* use system uptime instead of daemon uptime */
|
|
char buff[64];
|
|
int uptime, fd;
|
|
fd = open("/proc/uptime", O_RDONLY);
|
|
if(fd < 0)
|
|
{
|
|
syslog(LOG_ERR, "open(\"/proc/uptime\" : %m");
|
|
}
|
|
else
|
|
{
|
|
memset(buff, 0, sizeof(buff));
|
|
read(fd, buff, sizeof(buff) - 1);
|
|
uptime = atoi(buff);
|
|
syslog(LOG_INFO, "system uptime is %d seconds", uptime);
|
|
close(fd);
|
|
startup_time -= uptime;
|
|
}
|
|
}
|
|
}
|
|
|
|
/* structure containing variables used during "main loop"
|
|
* that are filled during the init */
|
|
struct runtime_vars {
|
|
/* LAN IP addresses for SSDP traffic and HTTP */
|
|
/* moved to global vars */
|
|
/*int n_lan_addr;*/
|
|
/*struct lan_addr_s lan_addr[MAX_LAN_ADDR];*/
|
|
int port; /* HTTP Port */
|
|
int notify_interval; /* seconds between SSDP announces */
|
|
/* unused rules cleaning related variables : */
|
|
int clean_ruleset_threshold; /* threshold for removing unused rules */
|
|
int clean_ruleset_interval; /* (minimum) interval between checks */
|
|
};
|
|
|
|
/* parselanaddr()
|
|
* parse address with mask
|
|
* ex: 192.168.1.1/24
|
|
* return value :
|
|
* 0 : ok
|
|
* -1 : error */
|
|
static int
|
|
parselanaddr(struct lan_addr_s * lan_addr, const char * str)
|
|
{
|
|
const char * p;
|
|
int nbits = 24;
|
|
int n;
|
|
p = str;
|
|
while(*p && *p != '/' && !isspace(*p))
|
|
p++;
|
|
n = p - str;
|
|
if(*p == '/')
|
|
{
|
|
nbits = atoi(++p);
|
|
while(*p && !isspace(*p))
|
|
p++;
|
|
}
|
|
if(n>15)
|
|
{
|
|
fprintf(stderr, "Error parsing address/mask : %s\n", str);
|
|
return -1;
|
|
}
|
|
memcpy(lan_addr->str, str, n);
|
|
lan_addr->str[n] = '\0';
|
|
if(!inet_aton(lan_addr->str, &lan_addr->addr))
|
|
{
|
|
fprintf(stderr, "Error parsing address/mask : %s\n", str);
|
|
return -1;
|
|
}
|
|
lan_addr->mask.s_addr = htonl(nbits ? (0xffffffff << (32 - nbits)) : 0);
|
|
#ifdef MULTIPLE_EXTERNAL_IP
|
|
while(*p && isspace(*p))
|
|
p++;
|
|
if(*p) {
|
|
n = 0;
|
|
while(p[n] && !isspace(*p))
|
|
n++;
|
|
if(n<=15) {
|
|
memcpy(lan_addr->ext_ip_str, p, n);
|
|
lan_addr->ext_ip_str[n] = '\0';
|
|
if(!inet_aton(lan_addr->ext_ip_str, &lan_addr->ext_ip_addr)) {
|
|
/* error */
|
|
fprintf(stderr, "Error parsing address : %s\n", lan_addr->ext_ip_str);
|
|
}
|
|
}
|
|
}
|
|
#endif
|
|
return 0;
|
|
}
|
|
|
|
void
|
|
getfriendlyname(char * buf, int len)
|
|
{
|
|
char * hn = calloc(1, 256);
|
|
if( gethostname(hn, 256) == 0 )
|
|
{
|
|
strncpy(buf, hn, len-1);
|
|
buf[len] = '\0';
|
|
*strstr(buf, ".") = '\0';
|
|
}
|
|
else
|
|
{
|
|
strcpy(buf, "Unknown");
|
|
}
|
|
free(hn);
|
|
strcat(buf, ": ");
|
|
#ifdef READYNAS
|
|
strncat(buf, "ReadyNAS", len-strlen(buf)-1);
|
|
#else
|
|
strncat(buf, getenv("LOGNAME"), len-strlen(buf)-1);
|
|
#endif
|
|
}
|
|
|
|
/* init phase :
|
|
* 1) read configuration file
|
|
* 2) read command line arguments
|
|
* 3) daemonize
|
|
* 4) open syslog
|
|
* 5) check and write pid file
|
|
* 6) set startup time stamp
|
|
* 7) compute presentation URL
|
|
* 8) set signal handlers */
|
|
static int
|
|
init(int argc, char * * argv, struct runtime_vars * v)
|
|
{
|
|
int i;
|
|
int pid;
|
|
int debug_flag = 0;
|
|
int options_flag = 0;
|
|
int openlog_option;
|
|
struct sigaction sa;
|
|
/*const char * logfilename = 0;*/
|
|
const char * presurl = 0;
|
|
const char * optionsfile = "/etc/minidlna.conf";
|
|
char * mac_str = calloc(1, 64);
|
|
|
|
/* first check if "-f" option is used */
|
|
for(i=2; i<argc; i++)
|
|
{
|
|
if(0 == strcmp(argv[i-1], "-f"))
|
|
{
|
|
optionsfile = argv[i];
|
|
options_flag = 1;
|
|
break;
|
|
}
|
|
}
|
|
|
|
/* set up uuid based on mac address */
|
|
if( (getifhwaddr("eth0", mac_str, 64) < 0) &&
|
|
(getifhwaddr("eth1", mac_str, 64) < 0) )
|
|
{
|
|
printf("No MAC addresses found!\n");
|
|
strcpy(mac_str, "554e4b4e4f57");
|
|
}
|
|
strcpy(uuidvalue+5, "4d696e69-444c-164e-9d41-");
|
|
strncat(uuidvalue, mac_str, 12);
|
|
free(mac_str);
|
|
|
|
getfriendlyname(friendly_name, FRIENDLYNAME_MAX_LEN);
|
|
|
|
/*v->n_lan_addr = 0;*/
|
|
char ext_ip_addr[INET_ADDRSTRLEN];
|
|
if( (getifaddr("eth0", ext_ip_addr, INET_ADDRSTRLEN) < 0) &&
|
|
(getifaddr("eth1", ext_ip_addr, INET_ADDRSTRLEN) < 0) )
|
|
{
|
|
printf("No IP!\n");
|
|
return 1;
|
|
}
|
|
if( parselanaddr(&lan_addr[n_lan_addr], ext_ip_addr) == 0 )
|
|
n_lan_addr++;
|
|
v->port = -1;
|
|
v->notify_interval = 30; /* seconds between SSDP announces */
|
|
v->clean_ruleset_threshold = 20;
|
|
v->clean_ruleset_interval = 0; /* interval between ruleset check. 0=disabled */
|
|
|
|
/* read options file first since
|
|
* command line arguments have final say */
|
|
if(readoptionsfile(optionsfile) < 0)
|
|
{
|
|
/* only error if file exists or using -f */
|
|
if(access(optionsfile, F_OK) == 0 || options_flag)
|
|
fprintf(stderr, "Error reading configuration file %s\n", optionsfile);
|
|
}
|
|
else
|
|
{
|
|
for(i=0; i<num_options; i++)
|
|
{
|
|
switch(ary_options[i].id)
|
|
{
|
|
case UPNPLISTENING_IP:
|
|
if(n_lan_addr < MAX_LAN_ADDR)/* if(v->n_lan_addr < MAX_LAN_ADDR)*/
|
|
{
|
|
/*if(parselanaddr(&v->lan_addr[v->n_lan_addr],*/
|
|
if(parselanaddr(&lan_addr[n_lan_addr],
|
|
ary_options[i].value) == 0)
|
|
n_lan_addr++; /*v->n_lan_addr++; */
|
|
}
|
|
else
|
|
{
|
|
fprintf(stderr, "Too many listening ips (max: %d), ignoring %s\n",
|
|
MAX_LAN_ADDR, ary_options[i].value);
|
|
}
|
|
break;
|
|
case UPNPPORT:
|
|
v->port = atoi(ary_options[i].value);
|
|
break;
|
|
case UPNPBITRATE_UP:
|
|
upstream_bitrate = strtoul(ary_options[i].value, 0, 0);
|
|
break;
|
|
case UPNPBITRATE_DOWN:
|
|
downstream_bitrate = strtoul(ary_options[i].value, 0, 0);
|
|
break;
|
|
case UPNPPRESENTATIONURL:
|
|
presurl = ary_options[i].value;
|
|
break;
|
|
case UPNPNOTIFY_INTERVAL:
|
|
v->notify_interval = atoi(ary_options[i].value);
|
|
break;
|
|
case UPNPSYSTEM_UPTIME:
|
|
if(strcmp(ary_options[i].value, "yes") == 0)
|
|
SETFLAG(SYSUPTIMEMASK); /*sysuptime = 1;*/
|
|
break;
|
|
case UPNPPACKET_LOG:
|
|
if(strcmp(ary_options[i].value, "yes") == 0)
|
|
SETFLAG(LOGPACKETSMASK); /*logpackets = 1;*/
|
|
break;
|
|
case UPNPSERIAL:
|
|
strncpy(serialnumber, ary_options[i].value, SERIALNUMBER_MAX_LEN);
|
|
serialnumber[SERIALNUMBER_MAX_LEN-1] = '\0';
|
|
break;
|
|
case UPNPMODEL_NUMBER:
|
|
strncpy(modelnumber, ary_options[i].value, MODELNUMBER_MAX_LEN);
|
|
modelnumber[MODELNUMBER_MAX_LEN-1] = '\0';
|
|
break;
|
|
case UPNPCLEANTHRESHOLD:
|
|
v->clean_ruleset_threshold = atoi(ary_options[i].value);
|
|
break;
|
|
case UPNPCLEANINTERVAL:
|
|
v->clean_ruleset_interval = atoi(ary_options[i].value);
|
|
break;
|
|
case UPNPSECUREMODE:
|
|
if(strcmp(ary_options[i].value, "yes") == 0)
|
|
SETFLAG(SECUREMODEMASK);
|
|
break;
|
|
#ifdef ENABLE_LEASEFILE
|
|
case UPNPLEASEFILE:
|
|
lease_file = ary_options[i].value;
|
|
remove(lease_file);
|
|
break;
|
|
#endif
|
|
case UPNPFRIENDLYNAME:
|
|
strncpy(friendly_name, ary_options[i].value, FRIENDLYNAME_MAX_LEN);
|
|
friendly_name[FRIENDLYNAME_MAX_LEN-1] = '\0';
|
|
break;
|
|
case UPNPMEDIADIR:
|
|
strncpy(media_dir, ary_options[i].value, MEDIADIR_MAX_LEN);
|
|
media_dir[MEDIADIR_MAX_LEN-1] = '\0';
|
|
break;
|
|
default:
|
|
fprintf(stderr, "Unknown option in file %s\n",
|
|
optionsfile);
|
|
}
|
|
}
|
|
}
|
|
|
|
/* command line arguments processing */
|
|
for(i=1; i<argc; i++)
|
|
{
|
|
if(argv[i][0]!='-')
|
|
{
|
|
fprintf(stderr, "Unknown option: %s\n", argv[i]);
|
|
}
|
|
else switch(argv[i][1])
|
|
{
|
|
case 't':
|
|
if(i+1 < argc)
|
|
v->notify_interval = atoi(argv[++i]);
|
|
else
|
|
fprintf(stderr, "Option -%c takes one argument.\n", argv[i][1]);
|
|
break;
|
|
case 's':
|
|
if(i+1 < argc)
|
|
strncpy(serialnumber, argv[++i], SERIALNUMBER_MAX_LEN);
|
|
else
|
|
fprintf(stderr, "Option -%c takes one argument.\n", argv[i][1]);
|
|
serialnumber[SERIALNUMBER_MAX_LEN-1] = '\0';
|
|
break;
|
|
case 'm':
|
|
if(i+1 < argc)
|
|
strncpy(modelnumber, argv[++i], MODELNUMBER_MAX_LEN);
|
|
else
|
|
fprintf(stderr, "Option -%c takes one argument.\n", argv[i][1]);
|
|
modelnumber[MODELNUMBER_MAX_LEN-1] = '\0';
|
|
break;
|
|
case 'U':
|
|
/*sysuptime = 1;*/
|
|
SETFLAG(SYSUPTIMEMASK);
|
|
break;
|
|
/*case 'l':
|
|
logfilename = argv[++i];
|
|
break;*/
|
|
case 'L':
|
|
/*logpackets = 1;*/
|
|
SETFLAG(LOGPACKETSMASK);
|
|
break;
|
|
case 'S':
|
|
SETFLAG(SECUREMODEMASK);
|
|
break;
|
|
case 'p':
|
|
if(i+1 < argc)
|
|
v->port = atoi(argv[++i]);
|
|
else
|
|
fprintf(stderr, "Option -%c takes one argument.\n", argv[i][1]);
|
|
break;
|
|
case 'P':
|
|
if(i+1 < argc)
|
|
pidfilename = argv[++i];
|
|
else
|
|
fprintf(stderr, "Option -%c takes one argument.\n", argv[i][1]);
|
|
break;
|
|
case 'd':
|
|
debug_flag = 1;
|
|
break;
|
|
case 'w':
|
|
if(i+1 < argc)
|
|
presurl = argv[++i];
|
|
else
|
|
fprintf(stderr, "Option -%c takes one argument.\n", argv[i][1]);
|
|
break;
|
|
case 'B':
|
|
if(i+2<argc)
|
|
{
|
|
downstream_bitrate = strtoul(argv[++i], 0, 0);
|
|
upstream_bitrate = strtoul(argv[++i], 0, 0);
|
|
}
|
|
else
|
|
fprintf(stderr, "Option -%c takes two arguments.\n", argv[i][1]);
|
|
break;
|
|
case 'a':
|
|
if(i+1 < argc)
|
|
{
|
|
int address_already_there = 0;
|
|
int j;
|
|
i++;
|
|
for(j=0; j<n_lan_addr; j++)/* for(j=0; j<v->n_lan_addr; j++)*/
|
|
{
|
|
struct lan_addr_s tmpaddr;
|
|
parselanaddr(&tmpaddr, argv[i]);
|
|
/*if(0 == strcmp(v->lan_addr[j].str, tmpaddr.str))*/
|
|
if(0 == strcmp(lan_addr[j].str, tmpaddr.str))
|
|
address_already_there = 1;
|
|
}
|
|
if(address_already_there)
|
|
break;
|
|
if(n_lan_addr < MAX_LAN_ADDR) /*if(v->n_lan_addr < MAX_LAN_ADDR)*/
|
|
{
|
|
/*v->lan_addr[v->n_lan_addr++] = argv[i];*/
|
|
/*if(parselanaddr(&v->lan_addr[v->n_lan_addr], argv[i]) == 0)*/
|
|
if(parselanaddr(&lan_addr[n_lan_addr], argv[i]) == 0)
|
|
n_lan_addr++; /*v->n_lan_addr++;*/
|
|
}
|
|
else
|
|
{
|
|
fprintf(stderr, "Too many listening ips (max: %d), ignoring %s\n",
|
|
MAX_LAN_ADDR, argv[i]);
|
|
}
|
|
}
|
|
else
|
|
fprintf(stderr, "Option -%c takes one argument.\n", argv[i][1]);
|
|
break;
|
|
case 'f':
|
|
i++; /* discarding, the config file is already read */
|
|
break;
|
|
default:
|
|
fprintf(stderr, "Unknown option: %s\n", argv[i]);
|
|
}
|
|
}
|
|
if( (/*v->*/n_lan_addr==0) || (v->port<=0) )
|
|
{
|
|
fprintf(stderr, "Usage:\n\t"
|
|
"%s [-f config_file] [-i ext_ifname] [-o ext_ip]\n"
|
|
"\t\t[-a listening_ip] [-p port] [-d] [-L] [-U] [-S]\n"
|
|
/*"[-l logfile] " not functionnal */
|
|
"\t\t[-s serial] [-m model_number] \n"
|
|
"\t\t[-t notify_interval] [-P pid_filename]\n"
|
|
"\t\t[-B down up] [-w url]\n"
|
|
"\nNotes:\n\tThere can be one or several listening_ips.\n"
|
|
"\tNotify interval is in seconds. Default is 30 seconds.\n"
|
|
"\tDefault pid file is %s.\n"
|
|
"\tWith -d miniupnpd will run as a standard program.\n"
|
|
"\t-L sets packet log in pf and ipf on.\n"
|
|
"\t-S sets \"secure\" mode : clients can only add mappings to their own ip\n"
|
|
"\t-U causes miniupnpd to report system uptime instead "
|
|
"of daemon uptime.\n"
|
|
"\t-B sets bitrates reported by daemon in bits per second.\n"
|
|
"\t-w sets the presentation url. Default is http address on port 80\n"
|
|
"", argv[0], pidfilename);
|
|
return 1;
|
|
}
|
|
|
|
if(debug_flag)
|
|
{
|
|
pid = getpid();
|
|
}
|
|
else
|
|
{
|
|
#ifdef USE_DAEMON
|
|
if(daemon(0, 0)<0) {
|
|
perror("daemon()");
|
|
}
|
|
pid = getpid();
|
|
#else
|
|
pid = daemonize();
|
|
#endif
|
|
}
|
|
|
|
openlog_option = LOG_PID|LOG_CONS;
|
|
if(debug_flag)
|
|
{
|
|
openlog_option |= LOG_PERROR; /* also log on stderr */
|
|
}
|
|
|
|
openlog("minidlna", openlog_option, LOG_MINIDLNA);
|
|
|
|
if(!debug_flag)
|
|
{
|
|
/* speed things up and ignore LOG_INFO and LOG_DEBUG */
|
|
setlogmask(LOG_UPTO(LOG_NOTICE));
|
|
}
|
|
|
|
if(checkforrunning(pidfilename) < 0)
|
|
{
|
|
syslog(LOG_ERR, "MiniDLNA is already running. EXITING");
|
|
return 1;
|
|
}
|
|
|
|
set_startup_time(GETFLAG(SYSUPTIMEMASK)/*sysuptime*/);
|
|
|
|
/* presentation url */
|
|
if(presurl)
|
|
{
|
|
strncpy(presentationurl, presurl, PRESENTATIONURL_MAX_LEN);
|
|
presentationurl[PRESENTATIONURL_MAX_LEN-1] = '\0';
|
|
}
|
|
else
|
|
{
|
|
snprintf(presentationurl, PRESENTATIONURL_MAX_LEN,
|
|
"http://%s/", lan_addr[0].str);
|
|
/*"http://%s:%d/", lan_addr[0].str, 80);*/
|
|
/*"http://%s:%d/", v->lan_addr[0].str, 80);*/
|
|
}
|
|
|
|
/* set signal handler */
|
|
signal(SIGCLD, SIG_IGN);
|
|
memset(&sa, 0, sizeof(struct sigaction));
|
|
sa.sa_handler = sigterm;
|
|
if (sigaction(SIGTERM, &sa, NULL))
|
|
{
|
|
syslog(LOG_ERR, "Failed to set %s handler. EXITING", "SIGTERM");
|
|
return 1;
|
|
}
|
|
if (sigaction(SIGINT, &sa, NULL))
|
|
{
|
|
syslog(LOG_ERR, "Failed to set %s handler. EXITING", "SIGINT");
|
|
return 1;
|
|
}
|
|
|
|
if(signal(SIGPIPE, SIG_IGN) == SIG_ERR) {
|
|
syslog(LOG_ERR, "Failed to ignore SIGPIPE signals");
|
|
}
|
|
|
|
writepidfile(pidfilename, pid);
|
|
|
|
return 0;
|
|
}
|
|
|
|
/* === main === */
|
|
/* process HTTP or SSDP requests */
|
|
int
|
|
main(int argc, char * * argv)
|
|
{
|
|
int i;
|
|
int sudp = -1, shttpl = -1;
|
|
int snotify[MAX_LAN_ADDR];
|
|
LIST_HEAD(httplisthead, upnphttp) upnphttphead;
|
|
struct upnphttp * e = 0;
|
|
struct upnphttp * next;
|
|
fd_set readset; /* for select() */
|
|
#ifdef ENABLE_EVENTS
|
|
fd_set writeset;
|
|
#endif
|
|
struct timeval timeout, timeofday, lasttimeofday = {0, 0};
|
|
int max_fd = -1;
|
|
struct runtime_vars v;
|
|
|
|
if(init(argc, argv, &v) != 0)
|
|
return 1;
|
|
|
|
LIST_INIT(&upnphttphead);
|
|
|
|
if( access(DB_PATH, F_OK) )
|
|
{
|
|
sqlite3_open(DB_PATH, &db);
|
|
freopen("/dev/null", "a", stderr);
|
|
ScanDirectory(media_dir, NULL);
|
|
freopen("/proc/self/fd/2", "a", stderr);
|
|
}
|
|
else
|
|
{
|
|
char **result;
|
|
int rows;
|
|
sqlite3_open(DB_PATH, &db);
|
|
if( sqlite3_get_table(db, "pragma user_version", &result, &rows, 0, 0) == SQLITE_OK )
|
|
{
|
|
if( atoi(result[1]) != DB_VERSION ) {
|
|
printf("Database version mismatch; need to recreate...\n");
|
|
sqlite3_close(db);
|
|
unlink(DB_PATH);
|
|
sqlite3_open(DB_PATH, &db);
|
|
freopen("/dev/null", "a", stderr);
|
|
ScanDirectory(media_dir, NULL);
|
|
freopen("/proc/self/fd/2", "a", stderr);
|
|
}
|
|
sqlite3_free_table(result);
|
|
}
|
|
}
|
|
|
|
|
|
/* open socket for SSDP connections */
|
|
/*sudp = OpenAndConfSSDPReceiveSocket(v.n_lan_addr, v.lan_addr);*/
|
|
sudp = OpenAndConfSSDPReceiveSocket(n_lan_addr, lan_addr);
|
|
if(sudp < 0)
|
|
{
|
|
syslog(LOG_ERR, "Failed to open socket for receiving SSDP. EXITING");
|
|
return 1;
|
|
}
|
|
/* open socket for HTTP connections. Listen on the 1st LAN address */
|
|
shttpl = OpenAndConfHTTPSocket(v.port);
|
|
if(shttpl < 0)
|
|
{
|
|
syslog(LOG_ERR, "Failed to open socket for HTTP. EXITING");
|
|
return 1;
|
|
}
|
|
syslog(LOG_NOTICE, "HTTP listening on port %d", v.port);
|
|
|
|
/* open socket for sending notifications */
|
|
if(OpenAndConfSSDPNotifySockets(snotify) < 0)
|
|
{
|
|
syslog(LOG_ERR, "Failed to open sockets for sending SSDP notify "
|
|
"messages. EXITING");
|
|
return 1;
|
|
}
|
|
|
|
SendSSDPGoodbye(snotify, n_lan_addr);
|
|
|
|
/* main loop */
|
|
while(!quitting)
|
|
{
|
|
/* Check if we need to send SSDP NOTIFY messages and do it if
|
|
* needed */
|
|
if(gettimeofday(&timeofday, 0) < 0)
|
|
{
|
|
syslog(LOG_ERR, "gettimeofday(): %m");
|
|
timeout.tv_sec = v.notify_interval;
|
|
timeout.tv_usec = 0;
|
|
}
|
|
else
|
|
{
|
|
/* the comparaison is not very precise but who cares ? */
|
|
if(timeofday.tv_sec >= (lasttimeofday.tv_sec + v.notify_interval))
|
|
{
|
|
SendSSDPNotifies2(snotify,
|
|
(unsigned short)v.port,
|
|
(v.notify_interval << 1)+10);
|
|
memcpy(&lasttimeofday, &timeofday, sizeof(struct timeval));
|
|
timeout.tv_sec = v.notify_interval;
|
|
timeout.tv_usec = 0;
|
|
}
|
|
else
|
|
{
|
|
timeout.tv_sec = lasttimeofday.tv_sec + v.notify_interval
|
|
- timeofday.tv_sec;
|
|
if(timeofday.tv_usec > lasttimeofday.tv_usec)
|
|
{
|
|
timeout.tv_usec = 1000000 + lasttimeofday.tv_usec
|
|
- timeofday.tv_usec;
|
|
timeout.tv_sec--;
|
|
}
|
|
else
|
|
{
|
|
timeout.tv_usec = lasttimeofday.tv_usec - timeofday.tv_usec;
|
|
}
|
|
}
|
|
}
|
|
|
|
/* select open sockets (SSDP, HTTP listen, and all HTTP soap sockets) */
|
|
FD_ZERO(&readset);
|
|
|
|
if (sudp >= 0)
|
|
{
|
|
FD_SET(sudp, &readset);
|
|
max_fd = MAX( max_fd, sudp);
|
|
}
|
|
|
|
if (shttpl >= 0)
|
|
{
|
|
FD_SET(shttpl, &readset);
|
|
max_fd = MAX( max_fd, shttpl);
|
|
}
|
|
|
|
i = 0; /* active HTTP connections count */
|
|
for(e = upnphttphead.lh_first; e != NULL; e = e->entries.le_next)
|
|
{
|
|
if((e->socket >= 0) && (e->state <= 2))
|
|
{
|
|
FD_SET(e->socket, &readset);
|
|
max_fd = MAX( max_fd, e->socket);
|
|
i++;
|
|
}
|
|
}
|
|
/* for debug */
|
|
#ifdef DEBUG
|
|
if(i > 1)
|
|
{
|
|
syslog(LOG_DEBUG, "%d active incoming HTTP connections", i);
|
|
}
|
|
#endif
|
|
|
|
#ifdef ENABLE_EVENTS
|
|
FD_ZERO(&writeset);
|
|
upnpevents_selectfds(&readset, &writeset, &max_fd);
|
|
#endif
|
|
|
|
#ifdef ENABLE_EVENTS
|
|
if(select(max_fd+1, &readset, &writeset, 0, &timeout) < 0)
|
|
#else
|
|
if(select(max_fd+1, &readset, 0, 0, &timeout) < 0)
|
|
#endif
|
|
{
|
|
if(quitting) goto shutdown;
|
|
syslog(LOG_ERR, "select(all): %m");
|
|
syslog(LOG_ERR, "Failed to select open sockets. EXITING");
|
|
return 1; /* very serious cause of error */
|
|
}
|
|
#ifdef ENABLE_EVENTS
|
|
upnpevents_processfds(&readset, &writeset);
|
|
#endif
|
|
/* process SSDP packets */
|
|
if(sudp >= 0 && FD_ISSET(sudp, &readset))
|
|
{
|
|
/*syslog(LOG_INFO, "Received UDP Packet");*/
|
|
/*ProcessSSDPRequest(sudp, v.lan_addr, v.n_lan_addr,*/
|
|
ProcessSSDPRequest(sudp, (unsigned short)v.port);
|
|
}
|
|
/* process active HTTP connections */
|
|
/* LIST_FOREACH macro is not available under linux */
|
|
for(e = upnphttphead.lh_first; e != NULL; e = e->entries.le_next)
|
|
{
|
|
if( (e->socket >= 0) && (e->state <= 2)
|
|
&&(FD_ISSET(e->socket, &readset)) )
|
|
{
|
|
Process_upnphttp(e);
|
|
}
|
|
}
|
|
/* process incoming HTTP connections */
|
|
if(shttpl >= 0 && FD_ISSET(shttpl, &readset))
|
|
{
|
|
int shttp;
|
|
socklen_t clientnamelen;
|
|
struct sockaddr_in clientname;
|
|
clientnamelen = sizeof(struct sockaddr_in);
|
|
shttp = accept(shttpl, (struct sockaddr *)&clientname, &clientnamelen);
|
|
if(shttp<0)
|
|
{
|
|
syslog(LOG_ERR, "accept(http): %m");
|
|
}
|
|
else
|
|
{
|
|
struct upnphttp * tmp = 0;
|
|
syslog(LOG_INFO, "HTTP connection from %s:%d",
|
|
inet_ntoa(clientname.sin_addr),
|
|
ntohs(clientname.sin_port) );
|
|
/*if (fcntl(shttp, F_SETFL, O_NONBLOCK) < 0) {
|
|
syslog(LOG_ERR, "fcntl F_SETFL, O_NONBLOCK");
|
|
}*/
|
|
/* Create a new upnphttp object and add it to
|
|
* the active upnphttp object list */
|
|
tmp = New_upnphttp(shttp);
|
|
if(tmp)
|
|
{
|
|
tmp->clientaddr = clientname.sin_addr;
|
|
LIST_INSERT_HEAD(&upnphttphead, tmp, entries);
|
|
}
|
|
else
|
|
{
|
|
syslog(LOG_ERR, "New_upnphttp() failed");
|
|
close(shttp);
|
|
}
|
|
}
|
|
}
|
|
/* delete finished HTTP connections */
|
|
for(e = upnphttphead.lh_first; e != NULL; )
|
|
{
|
|
next = e->entries.le_next;
|
|
if(e->state >= 100)
|
|
{
|
|
LIST_REMOVE(e, entries);
|
|
Delete_upnphttp(e);
|
|
}
|
|
e = next;
|
|
}
|
|
}
|
|
|
|
shutdown:
|
|
/* close out open sockets */
|
|
while(upnphttphead.lh_first != NULL)
|
|
{
|
|
e = upnphttphead.lh_first;
|
|
LIST_REMOVE(e, entries);
|
|
Delete_upnphttp(e);
|
|
}
|
|
|
|
if (sudp >= 0) close(sudp);
|
|
if (shttpl >= 0) close(shttpl);
|
|
|
|
if(SendSSDPGoodbye(snotify, n_lan_addr) < 0)
|
|
{
|
|
syslog(LOG_ERR, "Failed to broadcast good-bye notifications");
|
|
}
|
|
for(i=0; i<n_lan_addr; i++)/* for(i=0; i<v.n_lan_addr; i++)*/
|
|
close(snotify[i]);
|
|
|
|
sqlite3_close(db);
|
|
|
|
if(unlink(pidfilename) < 0)
|
|
{
|
|
syslog(LOG_ERR, "Failed to remove pidfile %s: %m", pidfilename);
|
|
}
|
|
|
|
closelog();
|
|
freeoptions();
|
|
|
|
return 0;
|
|
}
|
|
|