X-Git-Url: https://git.distorted.org.uk/~mdw/sgt/agedu/blobdiff_plain/995db5990865ab0772e0f0902ba39c1fb9336fa3..f59a5d3459678d4a4e9d9c9beecbfd0a53035894:/httpd.c diff --git a/httpd.c b/httpd.c index 8087a28..bbe82ab 100644 --- a/httpd.c +++ b/httpd.c @@ -2,24 +2,6 @@ * httpd.c: implementation of httpd.h. */ -#define _GNU_SOURCE - -#include -#include -#include -#include -#include -#include -#include -#include -#include -#include -#include -#include -#include -#include -#include - #include "agedu.h" #include "alloc.h" #include "html.h" @@ -278,10 +260,10 @@ char *got_data(struct connctx *ctx, char *data, int length, } if (!magic_access && !auth_correct) { - if (auth_string && !auth_provided) { + if (auth_string) { ret = http_error("401", "Unauthorized", "WWW-Authenticate: Basic realm=\""PNAME"\"\r", - "\nPlease authenticate to view these pages."); + "\nYou must authenticate to view these pages."); } else { ret = http_error("403", "Forbidden", NULL, "This is a restricted-access set of pages."); @@ -421,7 +403,7 @@ static void base64_encode_atom(unsigned char *data, int n, char *out) void run_httpd(const void *t, int authmask, const struct httpd_config *dcfg, const struct html_config *incfg) { - int fd; + int fd, ret; int authtype; char *authstring = NULL; unsigned long ipaddr; @@ -450,12 +432,24 @@ void run_httpd(const void *t, int authmask, const struct httpd_config *dcfg, ipaddr += (1 + rand() % 255); addr.sin_addr.s_addr = htonl(ipaddr); addr.sin_port = htons(0); + } else { addr.sin_addr.s_addr = inet_addr(dcfg->address); - addr.sin_port = dcfg->port ? htons(dcfg->port) : 80; + addr.sin_port = dcfg->port ? htons(dcfg->port) : 0; } addrlen = sizeof(addr); - if (bind(fd, (struct sockaddr *)&addr, addrlen) < 0) { + ret = bind(fd, (const struct sockaddr *)&addr, addrlen); + if (ret < 0 && errno == EADDRNOTAVAIL && !dcfg->address) { + /* + * Some systems don't like us binding to random weird + * localhost-space addresses. Try again with the official + * INADDR_LOOPBACK. + */ + addr.sin_addr.s_addr = htonl(INADDR_LOOPBACK); + addr.sin_port = htons(0); + ret = bind(fd, (const struct sockaddr *)&addr, addrlen); + } + if (ret < 0) { fprintf(stderr, "bind: %s\n", strerror(errno)); exit(1); } @@ -555,13 +549,13 @@ void run_httpd(const void *t, int authmask, const struct httpd_config *dcfg, fprintf(stderr, PNAME ": authentication method not supported\n"); exit(1); } - if (!dcfg->address) { - if (ntohs(addr.sin_port) == 80) { - printf("URL: http://%s/\n", inet_ntoa(addr.sin_addr)); - } else { - printf("URL: http://%s:%d/\n", - inet_ntoa(addr.sin_addr), ntohs(addr.sin_port)); - } + if (ntohs(addr.sin_addr.s_addr) == INADDR_ANY) { + printf("Server port: %d\n", ntohs(addr.sin_port)); + } else if (ntohs(addr.sin_port) == 80) { + printf("URL: http://%s/\n", inet_ntoa(addr.sin_addr)); + } else { + printf("URL: http://%s:%d/\n", + inet_ntoa(addr.sin_addr), ntohs(addr.sin_port)); } /* @@ -581,7 +575,9 @@ void run_httpd(const void *t, int authmask, const struct httpd_config *dcfg, */ while (1) { fd_set rfds, wfds; - int i, j, maxfd, ret; + int i, j; + SELECT_TYPE_ARG1 maxfd; + int ret; #define FD_SET_MAX(fd, set, max) \ do { FD_SET((fd),(set)); (max) = ((max)<=(fd)?(fd)+1:(max)); } while(0) @@ -605,6 +601,8 @@ void run_httpd(const void *t, int authmask, const struct httpd_config *dcfg, switch (fds[i].type) { case FD_CLIENT: + FD_SET_MAX(fds[i].fd, &rfds, maxfd); + break; case FD_LISTENER: FD_SET_MAX(fds[i].fd, &rfds, maxfd); break; @@ -630,7 +628,9 @@ void run_httpd(const void *t, int authmask, const struct httpd_config *dcfg, } nfds = i; - ret = select(maxfd, &rfds, &wfds, NULL, NULL); + ret = select(maxfd, SELECT_TYPE_ARG234 &rfds, + SELECT_TYPE_ARG234 &wfds, SELECT_TYPE_ARG234 NULL, + SELECT_TYPE_ARG5 NULL); if (ret <= 0) { if (ret < 0 && (errno != EINTR)) { fprintf(stderr, "select: %s", strerror(errno));