summaryrefslogtreecommitdiffstats
path: root/src/nserve.c
blob: 75457afbf5768e86b952b8fa5b5fd4a23e55dc56 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
/* SPDX-License-Identifier: BSD-3-Clause */
/*
 * Copyright © 2020 rsiddharth <s@ricketyspace.net>
 */

#include <nserve.h>

int slurpsock(char *buf, size_t buf_sz, int sock)
{
    ssize_t bytes;

    bytes = recv(sock, buf, buf_sz, 0);
    check(bytes >= 0, "Failed to read from socket: %d", sock);

    return bytes;

 error:
    return -1;
}

int barfsock(char *buf, size_t buf_sz, int sock)
{
    ssize_t bytes = 0;

    bytes = send(sock, buf, buf_sz, 0);
    check(bytes >= 0, "barfsock: send failed");

    return bytes;
 error:
    return -1;
}

void nserve(int sock)
{
    char *out = (char *) calloc(RSP_SIZE + 1, sizeof(char));
    check_mem(out);

    char *cmd = (char *) calloc(CMD_MAX_SIZE  + 1, sizeof(char));
    check_mem(cmd);

    int rc = 0, done = 0;
    do {
        // clear out, cmd.
        memset(out, '\0', RSP_SIZE + 1);
        memset(cmd, '\0', CMD_MAX_SIZE + 1);

        // Read command from socket.
        ssize_t bytes = slurpsock(cmd, CMD_MAX_SIZE, sock);
        check(bytes >= 0, "nserve: slurpsock failed");

        rc = process(cmd, out);
        if (rc < 0) {
            done = 1;
        }

        // Write response to socket.
        rc = barfsock(out, strlen(out), sock);
        check(rc != -1, "nserve: echo failed");
    } while(done != 1);

    // Close socket.
    rc = close(sock);
    check(rc == 0, "nserve: close failed");

    // Cleanup.
    free(cmd);

    exit(0);
 error:
    rc = close(sock);
    check(rc == 0, "nserve: close failed");

    // Cleanup if needed.
    if (cmd)
        free(cmd);

    exit(1);
}