3 * brisk - Obj/sac-a-push.phh
5 * Copyright (C) 2012-2014 Matteo Nastasi
6 * mailto: nastasi@alternativeoutput.it
7 * matteo.nastasi@milug.org
8 * web: http://www.alternativeoutput.it
10 * This program is free software; you can redistribute it and/or modify
11 * it under the terms of the GNU General Public License as published by
12 * the Free Software Foundation; either version 2 of the License, or
13 * (at your option) any later version.
15 * This program is distributed in the hope that it will be useful, but
16 * WITHOUT ANY WARRANTY; without even the implied warranty of
17 * MERCHANTABLILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
18 * General Public License for more details. You should have received a
19 * copy of the GNU General Public License along with this program; if
20 * not, write to the Free Software Foundation, Inc, 59 Temple Place -
21 * Suite 330, Boston, MA 02111-1307, USA.
25 define('SITE_PREFIX', "/brisk/");
26 define('SITE_PREFIX_LEN', 7);
28 define('DIRECT_ST_READ', 1);
29 define('DIRECT_ST_WRITE', 2);
33 /* this list is created with bin/get_globals.sh */
34 $_globals_list = array(
35 'G_admin_mail', 'G_alarm_passwd', 'G_all_points', 'G_ban_list', 'G_base',
36 'G_black_list', 'G_brisk_version', 'G_btrace_pref_sub', 'G_cloud_smasher',
37 'G_crypt_key', 'G_dbasetype', 'G_dbauth', 'G_dbpfx', 'G_doc_path',
38 'G_proto', 'G_domain', 'G_donors_all', 'G_donors_cur', 'G_is_local', 'G_lang', 'G_lng',
39 'G_mail_seed', 'G_notguar_code', 'G_PG_cons', 'G_PG_cons_n', 'G_PG_vow',
40 'G_PG_vow_n', 'G_poll_entries', 'G_poll_name', 'G_poll_title',
41 'G_provider_proxy', 'G_proxy_white_list', 'G_room_about', 'G_room_help',
42 'G_room_passwdhowto', 'G_room_roadmap',
43 'G_selfreg_mask', 'G_selfreg_tout', 'G_shutdown', 'G_sidebanner',
44 'G_sidebanner_idx', 'G_splash_content', 'G_splash_contents',
45 'G_splash_cont_idx', 'G_splash_h', 'G_splash_idx', 'G_splash_interval',
46 'G_splash_timeout', 'G_splash_w', 'G_topbanner', 'G_tos_dthard',
47 'G_tos_dtsoft', 'G_tos_fname', 'G_tos_idx', 'G_tos_vers', 'G_webbase');
49 function global_dump()
51 GLOBAL $G_alarm_passwd, $G_ban_list, $G_black_list, $G_btrace_pref_sub, $G_dbauth;
52 GLOBAL $G_dbpfx, $G_donors_all, $G_donors_cur, $G_is_local, $G_lang;
53 GLOBAL $G_poll_entries, $G_poll_name, $G_poll_title, $G_proxy_white_list;
54 GLOBAL $G_room_roadmap, $G_shutdown;
55 GLOBAL $G_splash_content, $G_splash_contents, $G_splash_cont_idx;
56 GLOBAL $G_splash_h, $G_splash_idx, $G_splash_interval, $G_splash_timeout;
57 GLOBAL $G_splash_w, $G_topbanner, $G_with_donors, $G_with_poll;
58 GLOBAL $G_with_splash, $G_sidebanner, $G_sidebanner_idx;
59 GLOBAL $G_with_topbanner, $G_selfreg_tout, $G_selfreg_mask;
61 fprintf(STDERR, "G_alarm_passwd = [%s]\n", print_r($G_alarm_passwd, TRUE));
62 fprintf(STDERR, "G_ban_list = [%s]\n", print_r($G_ban_list, TRUE));
63 fprintf(STDERR, "G_black_list = [%s]\n", print_r($G_black_list, TRUE));
64 fprintf(STDERR, "G_btrace_pref_sub = [%s]\n", print_r($G_btrace_pref_sub, TRUE));
65 fprintf(STDERR, "G_dbauth = [%s]\n", print_r($G_dbauth, TRUE));
66 fprintf(STDERR, "G_dbpfx = [%s]\n", print_r($G_dbpfx, TRUE));
67 fprintf(STDERR, "G_donors_all = [%s]\n", print_r($G_donors_all, TRUE));
68 fprintf(STDERR, "G_donors_cur = [%s]\n", print_r($G_donors_cur, TRUE));
69 fprintf(STDERR, "G_is_local = [%s]\n", print_r($G_is_local, TRUE));
70 fprintf(STDERR, "G_lang = [%s]\n", print_r($G_lang, TRUE));
71 fprintf(STDERR, "G_poll_entries = [%s]\n", print_r($G_poll_entries, TRUE));
72 fprintf(STDERR, "G_poll_name = [%s]\n", print_r($G_poll_name, TRUE));
73 fprintf(STDERR, "G_poll_title = [%s]\n", print_r($G_poll_title, TRUE));
74 fprintf(STDERR, "G_proxy_white_list = [%s]\n", print_r($G_proxy_white_list, TRUE));
75 fprintf(STDERR, "G_room_roadmap = [%s]\n", print_r($G_room_roadmap, TRUE));
76 fprintf(STDERR, "G_shutdown = [%s]\n", print_r($G_shutdown, TRUE));
77 fprintf(STDERR, "G_splash_content = [%s]\n", print_r($G_splash_content, TRUE));
78 fprintf(STDERR, "G_splash_contents = [%s]\n", print_r($G_splash_contents, TRUE));
79 fprintf(STDERR, "G_splash_cont_idx = [%s]\n", print_r($G_splash_cont_idx, TRUE));
80 fprintf(STDERR, "G_splash_h = [%s]\n", print_r($G_splash_h, TRUE));
81 fprintf(STDERR, "G_splash_idx = [%s]\n", print_r($G_splash_idx, TRUE));
82 fprintf(STDERR, "G_splash_interval = [%s]\n", print_r($G_splash_interval, TRUE));
83 fprintf(STDERR, "G_splash_timeout = [%s]\n", print_r($G_splash_timeout, TRUE));
84 fprintf(STDERR, "G_splash_w = [%s]\n", print_r($G_splash_w, TRUE));
85 fprintf(STDERR, "G_topbanner = [%s]\n", print_r($G_topbanner, TRUE));
86 fprintf(STDERR, "G_with_donors = [%s]\n", print_r($G_with_donors, TRUE));
87 fprintf(STDERR, "G_with_poll = [%s]\n", print_r($G_with_poll, TRUE));
88 fprintf(STDERR, "G_sidebanner = [%s]\n", print_r($G_sidebanner, TRUE));
89 fprintf(STDERR, "G_sidebanner_idx = [%s]\n", print_r($G_sidebanner_idx, TRUE));
90 fprintf(STDERR, "G_with_splash = [%s]\n", print_r($G_with_splash, TRUE));
91 fprintf(STDERR, "G_with_topbanner = [%s]\n", print_r($G_with_topbanner, TRUE));
92 fprintf(STDERR, "G_selfreg_mask = [%x]\n", print_r($G_selfreg_mask, TRUE));
94 fprintf(STDERR, "G_selfreg_tout = [%s]\n", print_r($G_selfreg_tout, TRUE));
101 $fname = LEGAL_PATH."/brisk.pid";
103 if (file_exists($fname)) {
104 log_crit("WARN: brisk.pid already exists");
106 file_put_contents($fname, sprintf("%d\n", $pid));
109 function pid_remove()
111 $fname = LEGAL_PATH."/brisk.pid";
113 if (file_exists($fname)) {
118 function post_manage(&$post, $line)
120 $a = explode('&', $line);
121 for ($i = 0 ; $i < count($a) ; $i++) {
122 $b = explode('=', $a[$i]);
125 $post[$b[0]] = urldecode($b[1]);
134 function spu_process_info($stream_info, &$method, &$header, &$get, &$post, &$cookie, &$rest, &$cont)
141 foreach(preg_split("/(\r?\n)/", $stream_info) as $line) {
142 // printf("LINE: [%s]\n", $line);
144 if (!isset($header['The-Request'])) {
147 $req = explode(" ", $header['The-Request']);
150 if (isset($header['Cookie'])) {
152 // LINE: [Cookie:sess=50e053a9511ef; CO_splashdate4=1356420646; CO_list=all; table_idx=7; table_token=510d494986925; lang=it; CO_bin5_pref_ring_endauct=false; CO_splashdate5=1358372822; CO_splashdate1=1363203374; CO_splashdate2=1363374826; __utma=43654517.209888411.1356605271.1356605271.1356605271.1; __utmz=43654517.1356605271.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none)]
154 $cookies = explode("; ", $header['Cookie']);
155 for ($i = 0 ; $i < count($cookies) ; $i++) {
156 $name = mb_strstr($cookies[$i], "=", TRUE, 'UTF-8');
157 if ($name == FALSE) {
158 if (mb_strlen($cookies[$i]) > 0) {
159 $cookie[$cookies[$i]] = "";
162 printf("WARNING: malformat cookie element [%s]\n", $cookies[$i]);
167 $value = mb_substr($cookies[$i], mb_strlen($name)+1, 10140, 'UTF-8');
168 $cookie[$name] = urldecode($value);
171 // GET params management
172 $get_vars = explode('?', $req[1], 2);
173 $path = $get_vars[0];
174 if (count($get_vars) > 1) {
175 $a = explode('&', $get_vars[1]);
176 // printf("A COUNT: [%s] %d\n", $a[0], count($a));
177 for ($i = 0 ; $i < count($a) ; $i++) {
178 $b = explode('=', $a[$i]);
181 $get[$b[0]] = urldecode($b[1]);
184 // POST params management
185 if ($req[0] == 'POST') {
186 $conttype_all = explode(";", $header['Content-Type']);
187 $header['Content-Type'] = $conttype_all[0];
188 // $path_all[1-] other things like charset and so on
190 // if (content-type is wrong || content-length isn't set)
193 if ($header['Content-Type'] != 'application/x-www-form-urlencoded'
194 || !isset($header['Content-Length'])) {
197 $post_len = mb_strlen($line, "ASCII");
198 // printf("INFO: postlen: %d\n", $post_len);
199 $rest = (int)($header['Content-Length']) - $post_len;
202 post_manage($post, $line);
214 $split = explode(":", $line, 2);
215 $hea_id = trim(mb_convert_case($split[0], MB_CASE_TITLE, 'UTF-8'));
216 $header[$hea_id] = $split[1];
221 function gpcs_var($name, $get, $post, $cookie)
223 if (isset($GLOBALS[$name]))
225 else if (isset($cookie[$name]))
226 return ($cookie[$name]);
227 else if (isset($post[$name]))
228 return ($post[$name]);
229 else if (isset($get[$name]))
230 return ($get[$name]);
235 function headers_render($header, $len)
239 if (isset($header['cookies'])) {
240 $cookies = $header['cookies']->render();
241 unset($header['cookies']);
243 if (isset($header['Location'])) {
244 $s = sprintf("HTTP/1.1 302 OK\r\n%sLocation: %s\r\n", $cookies, $header['Location']);
246 else if (isset($header['HTTP-Response'])) {
247 $s = sprintf("HTTP/1.1 %s\r\n", $header['HTTP-Response']);
248 foreach($header as $key => $value) {
249 if (strtolower($key) == "http-response")
251 $s .= sprintf("%s: %s\r\n", $key, $value);
254 $s .= sprintf("Content-Length: %ld\r\n", $len);
258 $s = "HTTP/1.1 200 OK\r\n";
260 if (!isset($header['Date']))
261 $s .= sprintf("Date: %s\r\n", date(DATE_RFC822));
262 if (!isset($header['Connection']))
263 $s .= "Connection: close\r\n";
264 if (!isset($header['Content-Type']))
265 $s .= "Content-Type: text/html\r\n";
266 foreach($header as $key => $value) {
267 $s .= sprintf("%s: %s\r\n", $key, $value);
270 $s .= sprintf("Content-Length: %d\r\n", $len);
273 $s .= "Cache-Control: no-cache, must-revalidate\r\n";
274 $s .= "Expires: Mon, 26 Jul 1997 05:00:00 GMT\r\n";
275 if (!isset($header['Content-Encoding'])) {
276 $s .= "Content-Encoding: chunked\r\n";
278 $s .= "Transfer-Encoding: chunked\r\n";
288 * Caching system using ob php system to cache old style pages
289 * to a var and than send it with more calm
294 log_rd2("SHUTTA [".connection_status()."] !");
297 register_shutdown_function('shutta');
303 function get_encoding($header)
306 if (isset($header['Accept-Encoding'])) {
307 $acc = explode(',', $header['Accept-Encoding']);
309 if (array_search('gzip', $acc) !== FALSE) {
312 else if (array_search('deflate', $acc) !== FALSE) {
322 // Set-Cookie: reg_fb_gate=deleted; Expires=Thu, 01-Jan-1970 00:00:01 GMT; Path=/; Domain=.foo.com; HttpOnly
323 // string $name [, string $value [, int $expire = 0 [, string $path [, string $domain [, bool $secure = false [, bool $httponly = false ]]]]]] )
326 $this->attr = array();
329 static function create($name)
331 $thiz = new Cookie();
333 $thiz->attr[$name] = "";
335 $argc = func_num_args();
336 for ($i = 1 ; $i < $argc ; $i++) {
337 $arg = func_get_arg($i);
340 $thiz->attr[$name] = urlencode($arg);
343 $thiz->attr['Expires'] = gmdate('D, d M Y H:i:s \G\M\T', $arg); // RFC 1211 format
346 $thiz->attr['Path'] = $arg;
349 $thiz->attr['Domain'] = $arg;
353 $thiz->attr['Secure'] = NULL;
358 $thiz->attr['HttpOnly'] = NULL;
374 foreach ($this->attr as $k => $v) {
376 $r .= sprintf("%s%s", ($isfirst ? "" : "; "), $k);
379 $r .= sprintf("%s%s=%s", ($isfirst ? "" : "; "), $k, $v);
394 $this->cookies = array();
399 if (($cookie = call_user_func_array("Cookie::create", func_get_args())) == FALSE)
402 array_push($this->cookies, $cookie);
410 foreach ($this->cookies as $cookie) {
411 $r .= $cookie->render();
420 // maybe fixed_fd is unuseful
421 static $fixed_fd = 3;
422 static $cnt_master = NULL;
423 static $cnt_slave = NULL;
425 var $provider_proxy; // list of provider/browser that offer proxy service
427 var $file_socket_pfx;
428 var $unix_socket_pfx;
429 var $direct_socket; // socket where read direct commands
431 var $s2u; // user associated with input socket
432 var $s2p; // pending page associated with input socket
433 var $s2c; // ws sockets in closing phase
451 function Sac_a_push()
455 function sig_handler($sig)
462 if (static::$cnt_master != NULL) {
463 fwrite(static::$cnt_master, "\nshutdown\n");
464 fflush(static::$cnt_master);
471 if (static::$cnt_master != NULL) {
472 fwrite(static::$cnt_master, "\nreload\n");
473 fflush(static::$cnt_master);
479 static function create(&$app, $sockname_pfx, $debug, $blocking_mode, $provider_proxy, $argv)
481 $thiz = new Sac_a_push();
485 $thiz->provider_proxy = ProviderProxy::create();
487 $thiz->file_socket_pfx = $sockname_pfx;
488 $thiz->unix_socket_pfx = "unix://$sockname_pfx";
489 $thiz->direct_socket = "unix://${sockname_pfx}_admin.sock";
490 $thiz->debug = $debug;
491 $thiz->list_web = array();
492 $thiz->socks = array();
493 $thiz->s2u = array();
494 $thiz->s2p = array();
495 $thiz->s2c = array();
496 $thiz->pending_pages = array();
497 $thiz->is_daemon = FALSE;
499 if (array_search("-d", $argv) !== FALSE || array_search("--daemon", $argv) !== FALSE) {
500 $thiz->is_daemon = TRUE;
503 // create a couple of sockets for control management
504 if (($sockpair = stream_socket_pair(STREAM_PF_UNIX, STREAM_SOCK_STREAM,
505 STREAM_IPPROTO_IP)) == FALSE) {
508 static::$cnt_master = $sockpair[0];
509 static::$cnt_slave = $sockpair[1];
511 pcntl_signal(SIGTERM, array("Sac_a_push", "sig_handler"));
512 pcntl_signal(SIGINT, array("Sac_a_push", "sig_handler"));
513 pcntl_signal(SIGHUP, array("Sac_a_push", "sig_handler"));
515 $thiz->blocking_mode = 0; // 0 for non-blocking
518 for ($i = 0 ; $i < 4096 ; $i++) {
520 $thiz->rndstr .= " ";
522 $thiz->rndstr .= chr(mt_rand(65, 90));
525 for ($i = 0 ; $i < USOCK_POOL_N ; $i++) {
526 $file_socket = $thiz->file_socket_pfx . sprintf("%d.sock", $i);
527 if (file_exists($file_socket)) {
528 unlink($file_socket);
531 $file_socket_admin = $thiz->file_socket_pfx . "_admin.sock";
532 if (file_exists($file_socket_admin)) {
533 unlink($file_socket_admin);
536 $old_umask = umask(0);
537 for ($i = 0 ; $i < USOCK_POOL_N ; $i++) {
538 $unix_socket = sprintf("%s%d.sock", $thiz->unix_socket_pfx, $i);
539 if (($list_sock = stream_socket_server($unix_socket, $err, $errs)) === FALSE) {
542 array_push($thiz->list_web, $list_sock);
544 if (($thiz->list_cmd = stream_socket_server($thiz->direct_socket, $err, $errs)) === FALSE) {
548 for ($i = 0 ; $i < USOCK_POOL_N ; $i++) {
549 stream_set_blocking($thiz->list_web[$i], $thiz->blocking_mode); # Set the stream to non-blocking
551 stream_set_blocking($thiz->list_cmd, $thiz->blocking_mode); # Set the stream to non-blocking
553 if (($thiz->in = fopen("php://stdin", "r")) === FALSE) {
557 $thiz->main_loop = FALSE;
558 $thiz->reload(TRUE, $provider_proxy);
563 function socks_set($sock, $user, $pendpage, $postclose = NULL)
567 $this->socks[$id] = $sock;
569 $this->s2u[$id] = $user;
570 if ($pendpage != NULL)
571 $this->s2p[$id] = $pendpage;
572 if ($postclose != NULL)
573 $this->s2c[$id] = $postclose;
576 function socks_unset($sock)
580 if (isset($this->s2u[$id]))
581 unset($this->s2u[$id]);
582 if (isset($this->s2p[$id]))
583 unset($this->s2p[$id]);
584 if (isset($this->s2c[$id]))
585 unset($this->s2c[$id]);
586 unset($this->socks[$id]);
589 function pendpage_try_addcont(&$new_socket, $tout, $method, $header, $get, $post, $cookie, $path, $addr, $rest, $cont)
591 $pendpage = PendingPage::pendingpage_continue( $new_socket, $this->curtime, $tout, $method,
592 $header, $get, $post, $cookie,
593 $path, $addr, $rest, $cont);
595 $pendpage->try_flush($this->curtime);
596 // Add $pendpage to the pendpage array (in any case)
597 // fprintf(STDERR, "IMPORTANT: Pendadd: %d\n", $pendpage->status);
598 $this->pendpage_add($pendpage);
601 function pendpage_try_addflush(&$new_socket, $tout, $enc, $header_out, $content)
603 $pendpage = PendingPage::pendingpage_flushing($new_socket, $this->curtime, $tout, $enc, $header_out, $content);
605 if ($pendpage->try_flush($this->curtime) == FALSE) {
606 // Add $pendpage to the pendpage array
607 $this->pendpage_add($pendpage);
611 function pendpage_add($pendpage)
613 array_push($this->pending_pages, $pendpage);
614 $this->socks_set($pendpage->socket_get(), NULL, $pendpage);
617 function pendpage_rem($pendpage)
619 $sock = $pendpage->socket_get();
620 if (($key = array_search($pendpage, $this->pending_pages)) !== FALSE) {
621 unset($this->pending_pages[$key]);
624 fprintf(STDERR, "WARNING: pendpage not found\n");
626 $this->socks_unset($sock);
627 fprintf(STDERR, "PP_REM: %d\n", intval($sock));
631 function pendpage_try_addwait(&$new_socket, $tout, $method, $header, $get, $post, $cookie, $path, $addr, $rest, $cont)
633 $pendpage = PendingPage::pendingpage_waiting($new_socket, $this->curtime, $tout, $method, $header, $get, $post, $cookie, $path, $addr, $rest, $cont);
635 if ($pendpage->try_flush($this->curtime) == FALSE) {
636 // Add $pendpage to the pendpage array
638 $this->pendpage_add($pendpage);
644 function garbage_manager($force)
646 $this->app->garbage_manager($force);
648 foreach ($this->socks as $k => $sock) {
650 if (isset($this->s2c[$id])) {
651 $postclose = $this->s2c[$id];
652 if ($postclose->read('', $this->curtime) == 0) {
654 $this->socks_unset($sock);
657 else if (isset($this->s2u[$id])) {
658 $user = $this->s2u[$id];
659 if ($user->the_end) {
660 if (($user->rd_toflush == FALSE && $user->rd_step == $user->step)
661 || $user->rd_endtime_is_expired($this->curtime)) {
662 if ($user->rd_socket_get() != NULL) {
663 $user->rd_socket_set(NULL);
665 unset($this->socks[$id]);
666 unset($this->s2u[$id]);
668 // printf("CLOSE ON GARBAGE MANAGER\n");
673 $this->app->users_cleanup();
676 function check_globals()
678 GLOBAL $_globals_list;
679 foreach ($_globals_list as $g) {
680 if (!array_search($g, $GLOBALS) || !isset($GLOBALS[$g])) {
681 error_log(sprintf("Global [%s] not declared", $g));
690 GLOBAL $DOCUMENT_ROOT, $HTTP_HOST;
692 GLOBAL $G_alarm_passwd, $G_ban_list, $G_black_list, $G_cloud_smasher, $G_provider_proxy;
693 GLOBAL $G_btrace_pref_sub, $G_dbauth;
694 GLOBAL $G_dbpfx, $G_donors_all, $G_donors_cur, $G_is_local, $G_lang;
695 GLOBAL $G_poll_entries, $G_poll_name, $G_poll_title, $G_proxy_white_list;
696 GLOBAL $G_room_roadmap, $G_shutdown;
697 GLOBAL $G_splash_content, $G_splash_contents, $G_splash_cont_idx;
698 GLOBAL $G_splash_h, $G_splash_idx, $G_splash_interval, $G_splash_timeout;
699 GLOBAL $G_splash_w, $G_topbanner, $G_with_donors, $G_with_poll;
700 GLOBAL $G_with_splash, $G_sidebanner, $G_sidebanner_idx;
701 GLOBAL $G_with_topbanner;
702 GLOBAL $G_tos_vers, $G_tos_fname, $G_tos_dtsoft, $G_tos_dthard, $G_tos_idx, $G_doc_path;
704 if (!$this->check_globals()) {
705 fprintf(STDERR, "Take a look to the phplog file, GLOBALS missing!\n");
709 if ($this->main_loop) {
713 $this->main_loop = TRUE;
715 $list_web_arr = array();
716 for ($i = 0 ; $i < USOCK_POOL_N ; $i++) {
717 $list_web_arr[intval($this->list_web[$i])] = $this->list_web[$i];
722 $sock_shard_cur = -1;
723 while ($this->main_loop) {
724 $sock_shard_cur = ($sock_shard_cur + 1) % SOCK_SHARD_N;
725 $this->app->sess_cur_set(FALSE);
726 $this->curtime = time();
727 if ($lastime != ($this->curtime >> 2)) {
728 fprintf(STDERR, "\nIN LOOP: Current opened: %d pending_pages: %d\n", count($this->socks), count($this->pending_pages));
731 /* Prepare the read array */
732 /* // when we manage it ... */
734 /* $read = array_merge(array("$in" => $in), $socks); */
736 $pre_read = array_merge($list_web_arr, array(
737 intval($this->list_cmd) => $this->list_cmd,
738 intval(static::$cnt_slave) => static::$cnt_slave),
740 if ($this->is_daemon == FALSE) {
741 $read = array_merge($pre_read, array(intval($this->in) => $this->in));
747 if ($this->debug > 1) {
748 printf("PRE_SELECT\n");
753 $num_changed_sockets = @stream_select($read, $write, $except, 0, 500000);
755 if ($num_changed_sockets == 0) {
756 // printf(" no data in 5 secs, splash [%d]\n", $G_with_splash);
759 else if ($num_changed_sockets > 0) {
760 if ($lastime != ($this->curtime >> 2)) {
761 printf("num sock %d num_of_socket: %d\n", $num_changed_sockets, count($read));
763 if ($this->debug > 1) {
766 /* At least at one of the sockets something interesting happened */
767 foreach ($read as $i => $sock) {
769 $manage_page = FALSE;
770 /* is_resource check is required because there is the possibility that
771 during new request an old connection is closed */
772 if (!is_resource($sock)) {
775 $list_web_idx = array_search($sock, $this->list_web, TRUE);
776 if ($list_web_idx !== FALSE) {
777 $list_web_usock = $this->list_web[$list_web_idx];
778 // printf("NUOVA CONNEX\n");
779 if (($new_unix = stream_socket_accept($list_web_usock)) == FALSE) {
780 printf("SOCKET_ACCEPT FAILED\n");
790 if (($new_socket = ancillary_getstream($new_unix, $stream_info)) !== FALSE) {
791 // printf("NEW_SOCKET: %d\n", intval($new_socket));
792 stream_set_blocking($new_socket, $this->blocking_mode); // Set the stream to non-blocking
793 // error_log(sprintf("RECEIVED HEADER:\n%s", $stream_info));
794 if (($path = spu_process_info($stream_info, $method, $header,
795 $get, $post, $cookie, $rest, $cont))
797 fprintf(STDERR, "TODO: fix wrong header management\n");
800 // We try to get real IP from header (passed by proxy) and then fallback to direct connection IP
801 // error_log(sprintf("addr: [%s]", $addr));
802 // error_log(sprintf("X-Real-Ip: [%s]", array_key_exists('X-Real-Ip', $header) ? $header['X-Real-Ip'] : "Not exists"));
803 if (array_key_exists('X-Real-Ip', $header)) {
804 $addr = $header['X-Real-Ip'];
807 $addr = addrtoipv4(stream_socket_get_name($new_socket, TRUE));
810 // FOR TEST $header['X-Forwarded-For'] = '154.155.22.33';
811 $addr = $this->pproxy_realip($header, $addr);
813 // printf("PATH: [%s] [%s]\n", $path, print_r($header, TRUE));
814 if ($method == "POST" && $rest > 0) {
815 if (isset($header['Expect']) && $header['Expect'] == '100-continue') {
816 // fprintf(STDERR, "\nPOSTA DE CHE\n\n");
817 $this->pendpage_try_addcont($new_socket, 20,
818 $method, $header, $get, $post, $cookie,
819 $path, $addr, $rest, $cont);
822 $this->pendpage_try_addwait($new_socket, 20,
823 $method, $header, $get, $post, $cookie,
824 $path, $addr, $rest, $cont);
831 // printf("number of sockets after %d\n", count($this->socks));
834 printf("WARNING: ancillary_getstream failed\n");
837 else if ($sock === $this->list_cmd) {
838 // printf("NUOVA DIRECT CONNEX\n");
839 if (($new_unix = stream_socket_accept($this->list_cmd)) == FALSE) {
840 printf("SOCKET_ACCEPT FAILED\n");
843 stream_set_blocking($new_unix, $this->blocking_mode);
844 $this->direct_mgmt($new_unix);
845 } // not socket_list nor socket_list_cmd
846 else if ($id % SOCK_SHARD_N == $sock_shard_cur) { // already opened socket
847 $buf = fread($sock, 4096);
848 // if socket is closed
849 if ($buf == FALSE || mb_strlen($buf, "ASCII") == 0 || feof($sock)) {
853 // printf("INFO: read return false\n");
856 if (array_search($sock, $this->list_web, TRUE) !== FALSE) {
857 // printf("Arrivati %d bytes da list\n", mb_strlen($buf, "ASCII"));
860 else if ($sock === $this->list_cmd) {
861 // printf("Arrivati %d bytes da list_cmd\n", mb_strlen($buf, "ASCII"));
864 else if ($sock === $this->in || $sock === static::$cnt_slave) {
865 // printf("Arrivati %d bytes da stdin\n", mb_strlen($buf, "ASCII"));
869 unset($this->socks[$id]);
870 if (isset($this->s2u[$id])) {
871 // $user_a[$s2u[$id]]->disable();
872 if ($this->s2u[$id]->rd_socket_get() != NULL) {
873 // try to send close frame (for websocket)
874 $clo = $this->s2u[$id]->stream_close();
875 $postclose = $user->stream_postclose_get($sock, $this->curtime);
876 $clo_l = mb_strlen($clo, "ASCII");
877 @fwrite($sock, $clo, $clo_l);
878 $this->s2u[$id]->rd_socket_set(NULL);
880 unset($this->s2u[$id]);
883 if ($postclose != NULL) {
884 // print("POSTCLOSE found!");
885 $this->socks_set($sock, NULL, NULL, $postclose);
890 // printf("CLOSE ON READ\n");
892 if ($this->debug > 1) {
893 printf("post unset\n");
894 print_r($this->socks);
896 } // if ($buf == FALSE || mb_strlen($buf, "ASCII") == 0) {
897 else { // data on the socket
898 if ($this->debug > 1) {
901 if (array_search($sock, $this->list_web, TRUE) !== FALSE) {
902 // printf("Arrivati %d bytes da list\n", mb_strlen($buf, "ASCII"));
905 else if ($sock === $this->list_cmd) {
906 // printf("Arrivati %d bytes da list_cmd\n", mb_strlen($buf, "ASCII"));
909 else if ($sock === $this->in || $sock === static::$cnt_slave) {
910 // printf("Arrivati %d bytes da stdin\n", mb_strlen($buf, "ASCII"));
912 if ($line == "reload") {
913 require("$DOCUMENT_ROOT/Etc/".BRISK_CONF);
914 $this->reload(FALSE, $G_provider_proxy);
915 $this->app->reload(FALSE, $G_ban_list, $G_black_list,
917 if (!$this->check_globals()) {
918 fprintf(STDERR, "Take a look to the phplog file, GLOBALS missing!\n");
923 else if ($line == "dump") {
926 else if ($line == "shutdown" || $line == "sd") {
927 if ($this->app->dump_data()) {
935 else { // data arrived from not special socket
936 $key = array_search("$sock", $this->socks);
937 // fprintf(STDERR, "Arrivati %d bytes dalla socket n. %d\n", mb_strlen($buf, "ASCII"), $key);
939 if (isset($this->s2u[$id])) {
943 // fix $this->pendpage_try_addflush below (probably not required)
946 $user = $this->s2u[$id];
948 // fprintf(STDERR, 'POST USER');
949 if ($user && $user->rd_transp && strpos($user->rd_transp->type, "websocket") !== FALSE) {
950 $clie_cmd = $user->rd_transp->unchunk($buf, $sock);
951 $clie_cmd = json_decode($clie_cmd, TRUE);
952 // fprintf(STDERR, "HERE WE ARE INCOMING DATA [%s]\n", print_r($clie_cmd, TRUE));
954 $wr_addr = substr(parse_url($clie_cmd["target"])["path"], strlen(SITE_PREFIX));
955 if ($wr_addr == "index_wr.php") {
957 // complete: index_wr_main($this->app, $addr, $get, $post, $cookie);
958 index_wr_main($this->app, $addr, $clie_cmd, NULL, NULL);
959 $content = ob_get_contents();
962 else if ($wr_addr == "briskin5/index_wr.php") {
963 $table_idx = $clie_cmd['table_idx'];
964 $table_token = $clie_cmd['table_token'];
966 if (($bri = $this->app->match_get($table_idx, $table_token)) != FALSE) {
968 bin5_index_wr_main($bri, $addr, $clie_cmd, NULL, NULL);
969 $content = ob_get_contents();
974 fprintf(STDERR, "Unknown page [%s]\n", $wr_addr);
977 briskin5/index_wr.php
979 if (isset($table_idx) && isset($table_token)) {
980 if (($bri = $s_a_p->app->match_get($table_idx, $table_token)) != FALSE) {
982 bin5_index_wr_main($bri, $addr, $get, $post, $cookie);
983 $content = ob_get_contents();
987 $content = "Bin5 Load data error";
991 $content = "Bin5 Load data error";
993 $s_a_p->pendpage_try_addflush($new_socket, 20, $enc, $header_out, $content);
998 fprintf(STDERR, "User associated with ID: %s not found\n", $id);
1001 if (isset($this->s2p[$id])) {
1002 $this->s2p[$id]->rest -= mb_strlen($buf, "ASCII");
1003 $this->s2p[$id]->cont .= $buf;
1004 if ($this->s2p[$id]->rest <= 0) {
1005 $header = $new_socket = $path = $addr = $get = $cookie = 0;
1008 $this->s2p[$id]->context_get($header, $new_socket, $path, $addr, $get, $post, $cookie);
1009 $this->pendpage_rem($this->s2p[$id]);
1010 fprintf(STDERR, "SOCKET RUN: %s\n", $new_socket);
1012 $manage_page = TRUE;
1017 if (isset($this->s2c[$id])) {
1018 $postclose = $this->s2c[$id];
1019 // printf("POSTCLOSE: found pc in s2c list\n");
1020 if ($postclose->read($buf, $this->curtime) == 0) {
1021 printf("POSTCLOSE: received end opcode, close\n");
1023 $this->socks_unset($sock);
1030 if ($manage_page == TRUE) {
1032 printf("M: %s\nHEADER:\n", $method);
1038 printf("COOKIE:\n");
1042 $header_out = array();
1043 // TODO: MOVE DOWN request_mgr to factorize new_sockets and POST closed
1045 if (!strncmp($path, SITE_PREFIX, SITE_PREFIX_LEN)) {
1046 $rret = $this->app->request_mgr($this, $header, $header_out, $new_socket, substr($path, SITE_PREFIX_LEN), $addr, $get, $post, $cookie);
1048 if ($rret == FALSE) {
1049 // FIXME: manage 404 !!!
1050 printf("TODO: fix unknown page: %s\n", $path);
1051 fclose($new_socket);
1057 $this->garbage_manager(FALSE);
1059 /* manage unfinished pages */
1060 foreach ($this->pending_pages as $k => $pendpage) {
1061 // TODO: try_flush if exists in the class
1062 if ($pendpage->try_flush($this->curtime) == TRUE) {
1063 unset($this->pending_pages[$k]);
1068 $response: raw stream data not sent
1069 $content: html consistent data (<script bla bla>)
1070 $user->stream_keepalive($w_ping) ping srv->cli OR srv->cli + cli->srv if $w_ping == TRUE
1073 /* manage open streaming */
1074 foreach ($this->socks as $k => $sock) {
1075 $id = intval($sock);
1076 if (isset($this->s2u[$id])) {
1077 $user = $this->s2u[$id];
1079 if ($user->rd_toflush) {
1080 if (fflush($sock) == FALSE)
1083 $user->rd_toflush = FALSE;
1085 $response = $user->rd_cache_get();
1087 if (($this->curtime - $user->lacc) > (EXPIRE_TIME_RD / 3)) {
1091 $user->ping_req = FALSE;
1094 if ($response == "") {
1096 $user->stream_main($content, $get, $post, $cookie);
1098 printf("[%s] [%d] [%d]\n", $user->name, $user->lacc, $this->curtime);
1100 if ($do_ping && $user->ping_req == FALSE) {
1101 $content .= $user->stream_keepalive(TRUE);
1102 $user->ping_req = TRUE;
1104 else if ($content == "" && $user->rd_kalive_is_expired($this->curtime)) {
1105 $content = $user->stream_keepalive(FALSE);
1107 if ($content != "") {
1108 $response = $user->chunked_content($content);
1112 if ($response != "") {
1113 // echo "SPIA: [".substr($response, 0, 60)."...]\n";
1114 // echo "SPIA: [".$response."]\n";
1115 $response_l = mb_strlen($response, "ASCII");
1116 $wret = @fwrite($sock, $response, $response_l);
1117 if ($wret < $response_l) {
1118 printf("TROUBLE WITH FWRITE: %d\n", $wret);
1119 $user->rd_cache_set(mb_substr($response, $wret, $response_l - $wret, "ASCII"));
1122 $user->rd_cache_set("");
1124 if (fflush($sock) == FALSE) {
1125 $user->rd_toflush = TRUE;
1128 $user->rd_kalive_reset($this->curtime);
1131 // close socket after a while to prevent client memory consumption
1132 if ($user->rd_endtime_is_expired($this->curtime)) {
1133 $postclose = $user->stream_postclose_get($sock, $this->curtime);
1134 if ($user->rd_socket_get() != NULL) {
1135 $user->rd_socket_set(NULL);
1137 unset($this->socks[$id]);
1138 unset($this->s2u[$id]);
1139 $clo = $user->stream_close();
1140 $clo_l = mb_strlen($clo, "ASCII");
1141 @fwrite($sock, $clo, $clo_l);
1143 $this->socks_set($sock, NULL, NULL, $postclose);
1148 // printf("CLOSE ON LOOP\n");
1150 } // if (isset($this->s2u[$id]...
1151 } // foreach ($this->socks...
1152 $dump_users = FALSE;
1154 if (defined('CURL_DE_SAC_VERS')) {
1155 $this->app->cds->process();
1157 $lastime = ($this->curtime >> 2);
1159 } // function run(...
1161 function pproxy_realip(&$header, $ip_str)
1163 return ($this->provider_proxy->realip($header, $ip_str));
1166 function reload($is_first, $prov_proxy)
1168 fprintf(STDERR, "SAP RELOAD STUFF (%d)\n", count($prov_proxy));
1170 $this->provider_proxy->update($prov_proxy);
1173 function direct_command($cmdstr)
1175 GLOBAL $G_alarm_passwd;
1177 $cmd = cmd_deserialize($cmdstr);
1179 if (!isset($cmd['cmd'])) {
1180 return cmd_return(500, 'no cmd found');
1182 // "cmd" => "userauth", "sess" => 'xxxxxxxxxxx', 'private' => 'it_must_be_correct',
1183 // 'the_end' => 'true' );
1184 // cmd=userauth&sess=52d796ac08c47&private=yourpasswd192.168.122.152d796ac08c47&the_end=true
1185 if ($cmd['cmd'] == 'userauth') {
1186 if (!isset($cmd['sess']) || !isset($cmd['private'])) {
1187 return cmd_return(401, 'malformed cmd');
1190 if (($user = $this->app->get_user($cmd['sess'], $idx)) == FALSE)
1191 return cmd_return(402, 'user not found');
1193 if (($user->flags & USER_FLAG_TY_ADMIN) == 0x00)
1194 return cmd_return(403, 'permission denied');
1196 if (md5($G_alarm_passwd.$user->ip.$user->sess) != $cmd['private'])
1197 return cmd_return(404, 'authentication failed ['.$cmd['private'].']['.$G_alarm_passwd.$user->ip.$user->sess.']');
1199 return cmd_return(200, 'success');
1202 return cmd_return(501, 'no cmd found');
1205 function direct_mgmt($socket)
1207 printf("DIRECT: begin\n");
1208 $st = DIRECT_ST_READ;
1210 $endtime = $this->curtime + 3;
1212 while(time() <= $endtime) {
1213 printf("DIRECT: init loop %d\n", $st);
1214 if ($st == DIRECT_ST_READ) {
1215 $buf = fread($socket, 4096);
1216 if ($buf == FALSE && feof($socket)) {
1219 else if ($buf != FALSE && strlen($buf) > 0) {
1222 if (substr(trim($cmd_all), -13) == "&the_end=true") {
1223 $output_arr = $this->direct_command($cmd_all);
1224 $output = cmd_serialize($output_arr);
1226 $output_len = mb_strlen($output, "ASCII");
1227 $st = DIRECT_ST_WRITE;
1232 else if ($st == DIRECT_ST_WRITE) {
1233 $ret = fwrite($socket, $output, $output_len);
1234 if ($ret === FALSE) {
1235 if (feof($socket)) {
1239 else if ($ret > 0 && $ret < $output_len) {
1240 $output = substr($output, -($output_len - $ret));
1241 $output_len -= $ret;
1244 else if ($ret == $output_len) {
1249 // probably not needed
1256 } // class Sac_a_push