adamc@853
|
1 #define _GNU_SOURCE
|
adamc@853
|
2
|
adamc@853
|
3 #include <stdio.h>
|
adamc@853
|
4 #include <string.h>
|
adamc@853
|
5 #include <stdlib.h>
|
adamc@853
|
6 #include <sys/types.h>
|
adamc@853
|
7 #include <sys/socket.h>
|
adamc@853
|
8 #include <netinet/in.h>
|
adamc@853
|
9 #include <unistd.h>
|
adamc@853
|
10 #include <signal.h>
|
adamc@853
|
11
|
adamc@853
|
12 #include <pthread.h>
|
adamc@853
|
13
|
adamc@853
|
14 #include <mhash.h>
|
adamc@853
|
15
|
adamc@853
|
16 #include "urweb.h"
|
adamc@853
|
17
|
adamc@853
|
18 #define MAX_RETRIES 5
|
adamc@853
|
19
|
adamc@856
|
20 static int try_rollback(uw_context ctx, void *logger_data, uw_logger log_error) {
|
adamc@853
|
21 int r = uw_rollback(ctx);
|
adamc@853
|
22
|
adamc@853
|
23 if (r) {
|
adamc@856
|
24 log_error(logger_data, "Error running SQL ROLLBACK\n");
|
adamc@853
|
25 uw_reset(ctx);
|
adamc@853
|
26 uw_write(ctx, "HTTP/1.1 500 Internal Server Error\n\r");
|
adamc@853
|
27 uw_write(ctx, "Content-type: text/plain\r\n\r\n");
|
adamc@853
|
28 uw_write(ctx, "Error running SQL ROLLBACK\n");
|
adamc@853
|
29 }
|
adamc@853
|
30
|
adamc@853
|
31 return r;
|
adamc@853
|
32 }
|
adamc@853
|
33
|
adamc@856
|
34 uw_context uw_request_new_context(void *logger_data, uw_logger log_error, uw_logger log_debug) {
|
adamc@853
|
35 uw_context ctx = uw_init();
|
adamc@853
|
36 int retries_left = MAX_RETRIES;
|
adamc@853
|
37
|
adamc@853
|
38 while (1) {
|
adamc@853
|
39 failure_kind fk = uw_begin_init(ctx);
|
adamc@853
|
40
|
adamc@853
|
41 if (fk == SUCCESS) {
|
adamc@856
|
42 log_debug(logger_data, "Database connection initialized.\n");
|
adamc@853
|
43 break;
|
adamc@853
|
44 } else if (fk == BOUNDED_RETRY) {
|
adamc@853
|
45 if (retries_left) {
|
adamc@856
|
46 log_debug(logger_data, "Initialization error triggers bounded retry: %s\n", uw_error_message(ctx));
|
adamc@853
|
47 --retries_left;
|
adamc@853
|
48 } else {
|
adamc@856
|
49 log_error(logger_data, "Fatal initialization error (out of retries): %s\n", uw_error_message(ctx));
|
adamc@853
|
50 uw_free(ctx);
|
adamc@853
|
51 return NULL;
|
adamc@853
|
52 }
|
adamc@853
|
53 } else if (fk == UNLIMITED_RETRY)
|
adamc@856
|
54 log_debug(logger_data, "Initialization error triggers unlimited retry: %s\n", uw_error_message(ctx));
|
adamc@853
|
55 else if (fk == FATAL) {
|
adamc@856
|
56 log_error(logger_data, "Fatal initialization error: %s\n", uw_error_message(ctx));
|
adamc@853
|
57 uw_free(ctx);
|
adamc@853
|
58 return NULL;
|
adamc@853
|
59 } else {
|
adamc@856
|
60 log_error(logger_data, "Unknown uw_begin_init return code!\n");
|
adamc@853
|
61 uw_free(ctx);
|
adamc@853
|
62 return NULL;
|
adamc@853
|
63 }
|
adamc@853
|
64 }
|
adamc@853
|
65
|
adamc@853
|
66 return ctx;
|
adamc@853
|
67 }
|
adamc@853
|
68
|
adamc@853
|
69 #define KEYSIZE 16
|
adamc@853
|
70 #define PASSSIZE 4
|
adamc@853
|
71
|
adamc@853
|
72 #define HASH_ALGORITHM MHASH_SHA256
|
adamc@853
|
73 #define HASH_BLOCKSIZE 32
|
adamc@853
|
74 #define KEYGEN_ALGORITHM KEYGEN_MCRYPT
|
adamc@853
|
75
|
adamc@853
|
76 int uw_hash_blocksize = HASH_BLOCKSIZE;
|
adamc@853
|
77
|
adamc@853
|
78 static int password[PASSSIZE];
|
adamc@853
|
79 static unsigned char private_key[KEYSIZE];
|
adamc@853
|
80
|
adamc@856
|
81 static void init_crypto(void *logger_data, uw_logger log_error) {
|
adamc@853
|
82 KEYGEN kg = {{HASH_ALGORITHM, HASH_ALGORITHM}};
|
adamc@853
|
83 int i;
|
adamc@853
|
84
|
adamc@853
|
85 assert(mhash_get_block_size(HASH_ALGORITHM) == HASH_BLOCKSIZE);
|
adamc@853
|
86
|
adamc@853
|
87 for (i = 0; i < PASSSIZE; ++i)
|
adamc@853
|
88 password[i] = rand();
|
adamc@853
|
89
|
adamc@853
|
90 if (mhash_keygen_ext(KEYGEN_ALGORITHM, kg,
|
adamc@853
|
91 private_key, sizeof(private_key),
|
adamc@853
|
92 (unsigned char*)password, sizeof(password)) < 0) {
|
adamc@856
|
93 log_error(logger_data, "Key generation failed\n");
|
adamc@853
|
94 exit(1);
|
adamc@853
|
95 }
|
adamc@853
|
96 }
|
adamc@853
|
97
|
adamc@856
|
98 void uw_request_init(void *logger_data, uw_logger log_error, uw_logger log_debug) {
|
adamc@853
|
99 uw_context ctx;
|
adamc@853
|
100 failure_kind fk;
|
adamc@853
|
101
|
adamc@853
|
102 uw_global_init();
|
adamc@853
|
103
|
adamc@856
|
104 ctx = uw_request_new_context(logger_data, log_error, log_debug);
|
adamc@853
|
105
|
adamc@853
|
106 if (!ctx)
|
adamc@853
|
107 exit(1);
|
adamc@853
|
108
|
adamc@853
|
109 for (fk = uw_initialize(ctx); fk == UNLIMITED_RETRY; fk = uw_initialize(ctx)) {
|
adamc@856
|
110 log_debug(logger_data, "Unlimited retry during init: %s\n", uw_error_message(ctx));
|
adamc@853
|
111 uw_db_rollback(ctx);
|
adamc@853
|
112 uw_reset(ctx);
|
adamc@853
|
113 }
|
adamc@853
|
114
|
adamc@853
|
115 if (fk != SUCCESS) {
|
adamc@856
|
116 log_error(logger_data, "Failed to initialize database! %s\n", uw_error_message(ctx));
|
adamc@853
|
117 uw_db_rollback(ctx);
|
adamc@853
|
118 exit(1);
|
adamc@853
|
119 }
|
adamc@853
|
120
|
adamc@853
|
121 uw_free(ctx);
|
adamc@853
|
122
|
adamc@856
|
123 init_crypto(logger_data, log_error);
|
adamc@853
|
124 }
|
adamc@853
|
125
|
adamc@853
|
126 void uw_sign(const char *in, char *out) {
|
adamc@853
|
127 MHASH td;
|
adamc@853
|
128
|
adamc@853
|
129 td = mhash_hmac_init(HASH_ALGORITHM, private_key, sizeof(private_key),
|
adamc@853
|
130 mhash_get_hash_pblock(HASH_ALGORITHM));
|
adamc@853
|
131
|
adamc@853
|
132 mhash(td, in, strlen(in));
|
adamc@853
|
133 if (mhash_hmac_deinit(td, out) < 0)
|
adamc@856
|
134 fprintf(stderr, "Signing failed\n");
|
adamc@853
|
135 }
|
adamc@853
|
136
|
adamc@853
|
137 typedef struct uw_rc {
|
adamc@853
|
138 size_t path_copy_size;
|
adamc@853
|
139 char *path_copy;
|
adamc@853
|
140 } *uw_request_context;
|
adamc@853
|
141
|
adamc@853
|
142 uw_request_context uw_new_request_context(void) {
|
adamc@853
|
143 uw_request_context r = malloc(sizeof(struct uw_rc));
|
adamc@853
|
144 r->path_copy_size = 0;
|
adamc@853
|
145 r->path_copy = malloc(0);
|
adamc@853
|
146 return r;
|
adamc@853
|
147 }
|
adamc@853
|
148
|
adamc@853
|
149 void uw_free_request_context(uw_request_context r) {
|
adamc@853
|
150 free(r->path_copy);
|
adamc@853
|
151 free(r);
|
adamc@853
|
152 }
|
adamc@853
|
153
|
adamc@863
|
154 extern char *uw_url_prefix;
|
adamc@863
|
155
|
adamc@854
|
156 request_result uw_request(uw_request_context rc, uw_context ctx,
|
adamc@854
|
157 char *method, char *path, char *query_string,
|
adamc@854
|
158 char *body, size_t body_len,
|
adamc@856
|
159 void (*on_success)(uw_context), void (*on_failure)(uw_context),
|
adamc@856
|
160 void *logger_data, uw_logger log_error, uw_logger log_debug,
|
adamc@863
|
161 int sock,
|
adamc@863
|
162 int (*send)(int sockfd, const void *buf, size_t len),
|
adamc@863
|
163 int (*close)(int fd)) {
|
adamc@853
|
164 int retries_left = MAX_RETRIES;
|
adamc@853
|
165 char *s;
|
adamc@853
|
166 failure_kind fk;
|
adamc@853
|
167 int is_post = 0, do_normal_send = 1;
|
adamc@853
|
168 char *boundary = NULL;
|
adamc@853
|
169 size_t boundary_len;
|
adamc@854
|
170 char *inputs;
|
adamc@853
|
171
|
adamc@854
|
172 if (!strcmp(method, "POST")) {
|
adamc@853
|
173 char *clen_s = uw_Basis_requestHeader(ctx, "Content-length");
|
adamc@853
|
174 if (!clen_s) {
|
adamc@1037
|
175 clen_s = "0";
|
adamc@1037
|
176 /*log_error(logger_data, "No Content-length with POST\n");
|
adamc@1037
|
177 return FAILED;*/
|
adamc@853
|
178 }
|
adamc@853
|
179 int clen = atoi(clen_s);
|
adamc@853
|
180 if (clen < 0) {
|
adamc@856
|
181 log_error(logger_data, "Negative Content-length with POST\n");
|
adamc@853
|
182 return FAILED;
|
adamc@853
|
183 }
|
adamc@853
|
184
|
adamc@854
|
185 if (body_len < clen) {
|
adamc@856
|
186 log_error(logger_data, "Request doesn't contain all POST data (according to Content-Length)\n");
|
adamc@853
|
187 return FAILED;
|
adamc@853
|
188 }
|
adamc@853
|
189
|
adamc@853
|
190 is_post = 1;
|
adamc@853
|
191
|
adamc@853
|
192 clen_s = uw_Basis_requestHeader(ctx, "Content-type");
|
adamc@853
|
193 if (clen_s && !strncasecmp(clen_s, "multipart/form-data", 19)) {
|
adamc@853
|
194 if (strncasecmp(clen_s + 19, "; boundary=", 11)) {
|
adamc@856
|
195 log_error(logger_data, "Bad multipart boundary spec");
|
adamc@853
|
196 return FAILED;
|
adamc@853
|
197 }
|
adamc@853
|
198
|
adamc@853
|
199 boundary = clen_s + 28;
|
adamc@853
|
200 boundary[0] = '-';
|
adamc@853
|
201 boundary[1] = '-';
|
adamc@853
|
202 boundary_len = strlen(boundary);
|
adamc@853
|
203 }
|
adamc@854
|
204 } else if (strcmp(method, "GET")) {
|
adamc@856
|
205 log_error(logger_data, "Not ready for non-GET/POST command: %s\n", method);
|
adamc@853
|
206 return FAILED;
|
adamc@853
|
207 }
|
adamc@853
|
208
|
adamc@863
|
209 if (!strncmp(path, uw_url_prefix, strlen(uw_url_prefix))
|
adamc@863
|
210 && !strcmp(path + strlen(uw_url_prefix), ".msgs")) {
|
adamc@853
|
211 char *id = uw_Basis_requestHeader(ctx, "UrWeb-Client");
|
adamc@853
|
212 char *pass = uw_Basis_requestHeader(ctx, "UrWeb-Pass");
|
adamc@853
|
213
|
adamc@853
|
214 if (sock < 0) {
|
adamc@856
|
215 log_error(logger_data, ".msgs requested, but not socket supplied\n");
|
adamc@853
|
216 return FAILED;
|
adamc@853
|
217 }
|
adamc@853
|
218
|
adamc@853
|
219 if (id && pass) {
|
adamc@853
|
220 unsigned idn = atoi(id);
|
adamc@864
|
221 uw_client_connect(idn, atoi(pass), sock, send, close, logger_data, log_error);
|
adamc@856
|
222 log_error(logger_data, "Processed request for messages by client %u\n\n", idn);
|
adamc@853
|
223 return KEEP_OPEN;
|
adamc@853
|
224 }
|
adamc@853
|
225 else {
|
adamc@856
|
226 log_error(logger_data, "Missing fields in .msgs request: %s, %s\n\n", id, pass);
|
adamc@853
|
227 return FAILED;
|
adamc@853
|
228 }
|
adamc@853
|
229 }
|
adamc@853
|
230
|
adamc@853
|
231 if (boundary) {
|
adamc@854
|
232 char *part = body, *after_sub_headers, *header, *after_header;
|
adamc@853
|
233 size_t part_len;
|
adamc@853
|
234
|
adamc@853
|
235 part = strstr(part, boundary);
|
adamc@853
|
236 if (!part) {
|
adamc@856
|
237 log_error(logger_data, "Missing first multipart boundary\n");
|
adamc@853
|
238 return FAILED;
|
adamc@853
|
239 }
|
adamc@853
|
240 part += boundary_len;
|
adamc@853
|
241
|
adamc@853
|
242 while (1) {
|
adamc@853
|
243 char *name = NULL, *filename = NULL, *type = NULL;
|
adamc@853
|
244
|
adamc@853
|
245 if (part[0] == '-' && part[1] == '-')
|
adamc@853
|
246 break;
|
adamc@853
|
247
|
adamc@853
|
248 if (*part != '\r') {
|
adamc@856
|
249 log_error(logger_data, "No \\r after multipart boundary\n");
|
adamc@853
|
250 return FAILED;
|
adamc@853
|
251 }
|
adamc@853
|
252 ++part;
|
adamc@853
|
253 if (*part != '\n') {
|
adamc@856
|
254 log_error(logger_data, "No \\n after multipart boundary\n");
|
adamc@853
|
255 return FAILED;
|
adamc@853
|
256 }
|
adamc@853
|
257 ++part;
|
adamc@853
|
258
|
adamc@853
|
259 if (!(after_sub_headers = strstr(part, "\r\n\r\n"))) {
|
adamc@856
|
260 log_error(logger_data, "Missing end of headers after multipart boundary\n");
|
adamc@853
|
261 return FAILED;
|
adamc@853
|
262 }
|
adamc@853
|
263 after_sub_headers[2] = 0;
|
adamc@853
|
264 after_sub_headers += 4;
|
adamc@853
|
265
|
adamc@853
|
266 for (header = part; after_header = strstr(header, "\r\n"); header = after_header + 2) {
|
adamc@853
|
267 char *colon, *after_colon;
|
adamc@853
|
268
|
adamc@853
|
269 *after_header = 0;
|
adamc@853
|
270 if (!(colon = strchr(header, ':'))) {
|
adamc@856
|
271 log_error(logger_data, "Missing colon in multipart sub-header\n");
|
adamc@853
|
272 return FAILED;
|
adamc@853
|
273 }
|
adamc@853
|
274 *colon++ = 0;
|
adamc@853
|
275 if (*colon++ != ' ') {
|
adamc@856
|
276 log_error(logger_data, "No space after colon in multipart sub-header\n");
|
adamc@853
|
277 return FAILED;
|
adamc@853
|
278 }
|
adamc@853
|
279
|
adamc@853
|
280 if (!strcasecmp(header, "Content-Disposition")) {
|
adamc@853
|
281 if (strncmp(colon, "form-data; ", 11)) {
|
adamc@856
|
282 log_error(logger_data, "Multipart data is not \"form-data\"\n");
|
adamc@853
|
283 return FAILED;
|
adamc@853
|
284 }
|
adamc@853
|
285
|
adamc@853
|
286 for (colon += 11; after_colon = strchr(colon, '='); colon = after_colon) {
|
adamc@853
|
287 char *data;
|
adamc@853
|
288 after_colon[0] = 0;
|
adamc@853
|
289 if (after_colon[1] != '"') {
|
adamc@856
|
290 log_error(logger_data, "Disposition setting is missing initial quote\n");
|
adamc@853
|
291 return FAILED;
|
adamc@853
|
292 }
|
adamc@853
|
293 data = after_colon+2;
|
adamc@853
|
294 if (!(after_colon = strchr(data, '"'))) {
|
adamc@856
|
295 log_error(logger_data, "Disposition setting is missing final quote\n");
|
adamc@853
|
296 return FAILED;
|
adamc@853
|
297 }
|
adamc@853
|
298 after_colon[0] = 0;
|
adamc@853
|
299 ++after_colon;
|
adamc@853
|
300 if (after_colon[0] == ';' && after_colon[1] == ' ')
|
adamc@853
|
301 after_colon += 2;
|
adamc@853
|
302
|
adamc@853
|
303 if (!strcasecmp(colon, "name"))
|
adamc@853
|
304 name = data;
|
adamc@853
|
305 else if (!strcasecmp(colon, "filename"))
|
adamc@853
|
306 filename = data;
|
adamc@853
|
307 }
|
adamc@853
|
308 } else if (!strcasecmp(header, "Content-Type")) {
|
adamc@853
|
309 type = colon;
|
adamc@853
|
310 }
|
adamc@853
|
311 }
|
adamc@853
|
312
|
adamc@854
|
313 part = memmem(after_sub_headers, body + body_len - after_sub_headers, boundary, boundary_len);
|
adamc@853
|
314 if (!part) {
|
adamc@856
|
315 log_error(logger_data, "Missing boundary after multipart payload\n");
|
adamc@853
|
316 return FAILED;
|
adamc@853
|
317 }
|
adamc@853
|
318 part[-2] = 0;
|
adamc@853
|
319 part_len = part - after_sub_headers - 2;
|
adamc@853
|
320 part[0] = 0;
|
adamc@853
|
321 part += boundary_len;
|
adamc@853
|
322
|
adamc@853
|
323 if (filename) {
|
adamc@853
|
324 uw_Basis_file f = {filename, type, {part_len, after_sub_headers}};
|
adamc@853
|
325
|
adamc@853
|
326 if (uw_set_file_input(ctx, name, f)) {
|
adamc@856
|
327 log_error(logger_data, "%s\n", uw_error_message(ctx));
|
adamc@853
|
328 return FAILED;
|
adamc@853
|
329 }
|
adamc@853
|
330 } else if (uw_set_input(ctx, name, after_sub_headers)) {
|
adamc@856
|
331 log_error(logger_data, "%s\n", uw_error_message(ctx));
|
adamc@853
|
332 return FAILED;
|
adamc@853
|
333 }
|
adamc@853
|
334 }
|
adamc@853
|
335 }
|
adamc@853
|
336 else {
|
adamc@854
|
337 inputs = is_post ? body : query_string;
|
adamc@853
|
338
|
adamc@853
|
339 if (inputs) {
|
adamc@853
|
340 char *name, *value;
|
adamc@853
|
341
|
adamc@853
|
342 while (*inputs) {
|
adamc@853
|
343 name = inputs;
|
adamc@853
|
344 if (inputs = strchr(inputs, '&'))
|
adamc@853
|
345 *inputs++ = 0;
|
adamc@853
|
346 else
|
adamc@853
|
347 inputs = strchr(name, 0);
|
adamc@853
|
348
|
adamc@853
|
349 if (value = strchr(name, '=')) {
|
adamc@853
|
350 *value++ = 0;
|
adamc@853
|
351 if (uw_set_input(ctx, name, value)) {
|
adamc@856
|
352 log_error(logger_data, "%s\n", uw_error_message(ctx));
|
adamc@853
|
353 return FAILED;
|
adamc@853
|
354 }
|
adamc@853
|
355 }
|
adamc@853
|
356 else if (uw_set_input(ctx, name, "")) {
|
adamc@856
|
357 log_error(logger_data, "%s\n", uw_error_message(ctx));
|
adamc@853
|
358 return FAILED;
|
adamc@853
|
359 }
|
adamc@853
|
360 }
|
adamc@853
|
361 }
|
adamc@853
|
362 }
|
adamc@853
|
363
|
adamc@856
|
364 log_debug(logger_data, "Serving URI %s....\n", path);
|
adamc@853
|
365
|
adamc@853
|
366 while (1) {
|
adamc@853
|
367 size_t path_len = strlen(path);
|
adamc@853
|
368
|
adamc@856
|
369 on_success(ctx);
|
adamc@853
|
370
|
adamc@853
|
371 if (path_len + 1 > rc->path_copy_size) {
|
adamc@853
|
372 rc->path_copy_size = path_len + 1;
|
adamc@853
|
373 rc->path_copy = realloc(rc->path_copy, rc->path_copy_size);
|
adamc@853
|
374 }
|
adamc@853
|
375 strcpy(rc->path_copy, path);
|
adamc@853
|
376 fk = uw_begin(ctx, rc->path_copy);
|
adamc@853
|
377 if (fk == SUCCESS || fk == RETURN_BLOB) {
|
adamc@853
|
378 uw_commit(ctx);
|
adamc@853
|
379 return SERVED;
|
adamc@853
|
380 } else if (fk == BOUNDED_RETRY) {
|
adamc@853
|
381 if (retries_left) {
|
adamc@856
|
382 log_debug(logger_data, "Error triggers bounded retry: %s\n", uw_error_message(ctx));
|
adamc@853
|
383 --retries_left;
|
adamc@853
|
384 }
|
adamc@853
|
385 else {
|
adamc@856
|
386 log_error(logger_data, "Fatal error (out of retries): %s\n", uw_error_message(ctx));
|
adamc@853
|
387
|
adamc@856
|
388 try_rollback(ctx, logger_data, log_error);
|
adamc@853
|
389
|
adamc@853
|
390 uw_reset_keep_error_message(ctx);
|
adamc@856
|
391 on_failure(ctx);
|
adamc@853
|
392 uw_write_header(ctx, "Content-type: text/plain\r\n");
|
adamc@853
|
393 uw_write(ctx, "Fatal error (out of retries): ");
|
adamc@853
|
394 uw_write(ctx, uw_error_message(ctx));
|
adamc@853
|
395 uw_write(ctx, "\n");
|
adamc@853
|
396
|
adamc@853
|
397 return FAILED;
|
adamc@853
|
398 }
|
adamc@853
|
399 } else if (fk == UNLIMITED_RETRY)
|
adamc@856
|
400 log_debug(logger_data, "Error triggers unlimited retry: %s\n", uw_error_message(ctx));
|
adamc@853
|
401 else if (fk == FATAL) {
|
adamc@856
|
402 log_error(logger_data, "Fatal error: %s\n", uw_error_message(ctx));
|
adamc@853
|
403
|
adamc@856
|
404 try_rollback(ctx, logger_data, log_error);
|
adamc@853
|
405
|
adamc@853
|
406 uw_reset_keep_error_message(ctx);
|
adamc@856
|
407 on_failure(ctx);
|
adamc@853
|
408 uw_write_header(ctx, "Content-type: text/html\r\n");
|
adamc@853
|
409 uw_write(ctx, "<html><head><title>Fatal Error</title></head><body>");
|
adamc@853
|
410 uw_write(ctx, "Fatal error: ");
|
adamc@853
|
411 uw_write(ctx, uw_error_message(ctx));
|
adamc@853
|
412 uw_write(ctx, "\n</body></html>");
|
adamc@853
|
413
|
adamc@853
|
414 return FAILED;
|
adamc@853
|
415 } else {
|
adamc@856
|
416 log_error(logger_data, "Unknown uw_handle return code!\n");
|
adamc@853
|
417
|
adamc@856
|
418 try_rollback(ctx, logger_data, log_error);
|
adamc@853
|
419
|
adamc@853
|
420 uw_reset_keep_request(ctx);
|
adamc@856
|
421 on_failure(ctx);
|
adamc@853
|
422 uw_write_header(ctx, "Content-type: text/plain\r\n");
|
adamc@853
|
423 uw_write(ctx, "Unknown uw_handle return code!\n");
|
adamc@853
|
424
|
adamc@853
|
425 return FAILED;
|
adamc@853
|
426 }
|
adamc@853
|
427
|
adamc@856
|
428 if (try_rollback(ctx, logger_data, log_error))
|
adamc@853
|
429 return FAILED;
|
adamc@853
|
430
|
adamc@853
|
431 uw_reset_keep_request(ctx);
|
adamc@853
|
432 }
|
adamc@853
|
433 }
|
adamc@853
|
434
|
adamc@856
|
435 typedef struct {
|
adamc@856
|
436 void *logger_data;
|
adamc@856
|
437 uw_logger log_error, log_debug;
|
adamc@856
|
438 } loggers;
|
adamc@856
|
439
|
adamc@853
|
440 void *client_pruner(void *data) {
|
adamc@856
|
441 loggers *ls = (loggers *)data;
|
adamc@856
|
442 uw_context ctx = uw_request_new_context(ls->logger_data, ls->log_error, ls->log_debug);
|
adamc@853
|
443
|
adamc@853
|
444 if (!ctx)
|
adamc@853
|
445 exit(1);
|
adamc@853
|
446
|
adamc@853
|
447 while (1) {
|
adamc@853
|
448 uw_prune_clients(ctx);
|
adamc@853
|
449 sleep(5);
|
adamc@853
|
450 }
|
adamc@853
|
451 }
|