#include <sys/ioctl.h>
#include <sys/socket.h>
#include <sys/time.h>
+#include <sys/types.h>
+#include <sys/wait.h>
#include <time.h>
#include <unistd.h>
#include <math.h>
+#include <spawn.h>
#include <map>
#include <string>
#include <utility>
freeaddrinfo(base_ai);
return -1;
}
+
+int HTTPInput::open_child_process(const string &cmdline)
+{
+ int devnullfd = open("/dev/null", O_RDONLY | O_CLOEXEC);
+ if (devnullfd == -1) {
+ log_perror("/dev/null");
+ return -1;
+ }
+
+ int pipefd[2];
+ if (pipe2(pipefd, O_CLOEXEC) == -1) {
+ log_perror("pipe2()");
+ close(devnullfd);
+ return -1;
+ }
+
+ // Point stdout to us, stdin to /dev/null, and stderr remains where it is
+ // (probably the systemd log). All other file descriptors should be marked
+ // as close-on-exec, and should thus not leak into the child.
+ posix_spawn_file_actions_t actions;
+ posix_spawn_file_actions_init(&actions);
+ posix_spawn_file_actions_adddup2(&actions, devnullfd, 0);
+ posix_spawn_file_actions_adddup2(&actions, pipefd[1], 1);
+
+ pid_t child_pid;
+ char * const argv[] = {
+ strdup("/bin/sh"),
+ strdup("-c"),
+ strdup(path.c_str()),
+ nullptr
+ };
+ int err = posix_spawn(&child_pid, "/bin/sh", &actions, /*attrp=*/nullptr, argv, /*envp=*/nullptr);
+ posix_spawn_file_actions_destroy(&actions);
+ free(argv[0]);
+ free(argv[1]);
+ free(argv[2]);
+ close(pipefd[1]);
+
+ if (err == 0) {
+ return pipefd[0];
+ } else {
+ log_perror(cmdline.c_str());
+ close(pipefd[0]);
+ return -1;
+ }
+}
bool HTTPInput::parse_response(const string &request)
{
}
switch (state) {
- case NOT_CONNECTED:
+ case NOT_CONNECTED: {
+ // Reap any exited children.
+ int wstatus;
+ while (waitpid(-1, &wstatus, WNOHANG) != -1 || errno == EINTR) ;
+
request.clear();
request_bytes_sent = 0;
response.clear();
servers->set_unavailable(stream_index);
}
+ string protocol;
{
- string protocol, user; // Thrown away.
+ string user; // Thrown away.
if (!parse_url(url, &protocol, &user, &host, &port, &path)) {
if (!suppress_logging) {
log(WARNING, "[%s] Failed to parse URL '%s'", url.c_str(), url.c_str());
assert(err != -1);
}
++num_connection_attempts;
- sock = lookup_and_connect(host, port);
+ if (protocol == "pipe") {
+ sock = open_child_process(path.c_str());
+
+ if (sock != -1) {
+ // Construct a minimal HTTP header.
+ http_header = "HTTP/1.0 200 OK\r\n";
+ for (int stream_index : stream_indices) {
+ servers->set_header(stream_index, http_header, stream_header);
+ }
+ state = RECEIVING_DATA;
+ }
+ } else {
+ sock = lookup_and_connect(host, port);
+ if (sock != -1) {
+ // Yay, successful connect.
+ state = SENDING_REQUEST;
+ request = "GET " + path + " HTTP/1.0\r\nHost: " + host_header(host, port) + "\r\nUser-Agent: cubemap\r\n\r\n";
+ request_bytes_sent = 0;
+ }
+ }
if (sock != -1) {
- // Yay, successful connect.
- state = SENDING_REQUEST;
- request = "GET " + path + " HTTP/1.0\r\nHost: " + host_header(host, port) + "\r\nUser-Agent: cubemap\r\n\r\n";
- request_bytes_sent = 0;
-
lock_guard<mutex> lock(stats_mutex);
stats.connect_time = time(nullptr);
clock_gettime(CLOCK_MONOTONIC_COARSE, &last_activity);
}
break;
+ }
case SENDING_REQUEST: {
size_t to_send = request.size() - request_bytes_sent;
int ret;