You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
290 lines
13 KiB
290 lines
13 KiB
// ConfigNetwork_p.java
|
|
// --------------------
|
|
// (C) 2007 by Michael Peter Christen; mc@yacy.net, Frankfurt a. M., Germany
|
|
// first published 20.04.2007 on http://yacy.net
|
|
//
|
|
// This is a part of YaCy, a peer-to-peer based web search engine
|
|
//
|
|
// $LastChangedDate$
|
|
// $LastChangedRevision$
|
|
// $LastChangedBy$
|
|
//
|
|
// LICENSE
|
|
//
|
|
// This program is free software; you can redistribute it and/or modify
|
|
// it under the terms of the GNU General Public License as published by
|
|
// the Free Software Foundation; either version 2 of the License, or
|
|
// (at your option) any later version.
|
|
//
|
|
// This program is distributed in the hope that it will be useful,
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
// GNU General Public License for more details.
|
|
//
|
|
// You should have received a copy of the GNU General Public License
|
|
// along with this program; if not, write to the Free Software
|
|
// Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
|
|
|
|
package net.yacy.htroot;
|
|
|
|
import java.io.File;
|
|
import java.io.FileNotFoundException;
|
|
import java.io.IOException;
|
|
import java.util.Set;
|
|
|
|
import net.yacy.cora.document.encoding.ASCII;
|
|
import net.yacy.cora.protocol.RequestHeader;
|
|
import net.yacy.cora.util.CommonPattern;
|
|
import net.yacy.data.TransactionManager;
|
|
import net.yacy.data.WorkTables;
|
|
import net.yacy.kelondro.util.FileUtils;
|
|
import net.yacy.kelondro.util.MapTools;
|
|
import net.yacy.search.Switchboard;
|
|
import net.yacy.search.SwitchboardConstants;
|
|
import net.yacy.server.serverObjects;
|
|
import net.yacy.server.serverSwitch;
|
|
|
|
public class ConfigNetwork_p
|
|
{
|
|
|
|
public static serverObjects respond(
|
|
final RequestHeader header,
|
|
final serverObjects post,
|
|
final serverSwitch env) throws FileNotFoundException, IOException {
|
|
|
|
final Switchboard sb = (Switchboard) env;
|
|
final serverObjects prop = new serverObjects();
|
|
|
|
/* Acquire a transaction token for the next POST form submission */
|
|
prop.put(TransactionManager.TRANSACTION_TOKEN_PARAM, TransactionManager.getTransactionToken(header));
|
|
|
|
int commit = 0;
|
|
|
|
// load all options for network definitions
|
|
final File networkBootstrapLocationsFile =
|
|
new File(new File(sb.getAppPath(), "defaults"), "yacy.networks");
|
|
final Set<String> networkBootstrapLocations = FileUtils.loadList(networkBootstrapLocationsFile);
|
|
|
|
if ( post != null ) {
|
|
|
|
// store this call as api call
|
|
sb.tables.recordAPICall(
|
|
post,
|
|
"ConfigNetwork_p.html",
|
|
WorkTables.TABLE_API_TYPE_CONFIGURATION,
|
|
"network settings");
|
|
|
|
if ( post.containsKey("changeNetwork") ) {
|
|
/* Settings will be modified : check this is a valid transaction using HTTP POST method */
|
|
TransactionManager.checkPostTransaction(header, post);
|
|
|
|
String networkDefinition = post.get("networkDefinition", "defaults/yacy.network.freeworld.unit");
|
|
final String networkDefinitionURL = post.get("networkDefinitionURL", "");
|
|
if ( !networkDefinitionURL.equals("")) {
|
|
networkDefinition = networkDefinitionURL;
|
|
}
|
|
if ( networkDefinition.equals(sb.getConfig("network.unit.definition", "")) ) {
|
|
// no change
|
|
commit = 3;
|
|
} else {
|
|
// shut down old network and index, start up new network and index
|
|
commit = 1;
|
|
sb.setConfig(SwitchboardConstants.CORE_SERVICE_RWI, networkDefinition.indexOf("freeworld") >= 0);
|
|
sb.switchNetwork(networkDefinition);
|
|
}
|
|
}
|
|
|
|
if (post.containsKey("setEncryption")) {
|
|
/*
|
|
* Settings will be modified : check this is a valid transaction using HTTP POST
|
|
* method
|
|
*/
|
|
TransactionManager.checkPostTransaction(header, post);
|
|
|
|
final boolean httpsPreferred = sb.getConfigBool(SwitchboardConstants.NETWORK_PROTOCOL_HTTPS_PREFERRED,
|
|
SwitchboardConstants.NETWORK_PROTOCOL_HTTPS_PREFERRED_DEFAULT);
|
|
final boolean newHttpsPreferred = post
|
|
.getBoolean(SwitchboardConstants.NETWORK_PROTOCOL_HTTPS_PREFERRED);
|
|
if (httpsPreferred == newHttpsPreferred) {
|
|
// no change
|
|
commit = 3;
|
|
} else {
|
|
commit = 1;
|
|
sb.setConfig(SwitchboardConstants.NETWORK_PROTOCOL_HTTPS_PREFERRED, newHttpsPreferred);
|
|
}
|
|
}
|
|
|
|
if ( post.containsKey("save") ) {
|
|
/* Settings will be modified : check this is a valid transaction using HTTP POST method */
|
|
TransactionManager.checkPostTransaction(header, post);
|
|
|
|
// DHT control
|
|
boolean indexDistribute = "on".equals(post.get("indexDistribute", ""));
|
|
boolean indexReceive = "on".equals(post.get("indexReceive", ""));
|
|
final boolean indexReceiveSearch = "on".equals(post.get("indexReceiveSearch", ""));
|
|
if ( !indexReceive ) {
|
|
// remove heuristics
|
|
sb.setConfig(SwitchboardConstants.HEURISTIC_SITE, false);
|
|
sb.setConfig(SwitchboardConstants.HEURISTIC_OPENSEARCH, false);
|
|
}
|
|
final boolean robinsonmode = "robinson".equals(post.get("network", ""));
|
|
if ( robinsonmode ) {
|
|
indexDistribute = false;
|
|
indexReceive = false;
|
|
commit = 1;
|
|
} else {
|
|
if ( !indexDistribute && !indexReceive ) {
|
|
prop.put("commitDHTIsRobinson", "1");
|
|
commit = 2;
|
|
} else if ( indexDistribute && indexReceive ) {
|
|
commit = 1;
|
|
} else {
|
|
if ( !indexReceive ) {
|
|
prop.put("commitDHTNoGlobalSearch", "1");
|
|
}
|
|
commit = 1;
|
|
}
|
|
}
|
|
|
|
sb.setConfig(SwitchboardConstants.INDEX_DIST_ALLOW, indexDistribute);
|
|
sb.setConfig(SwitchboardConstants.INDEX_DIST_ALLOW_WHILE_CRAWLING, "on".equals(post.get("indexDistributeWhileCrawling", "")));
|
|
sb.setConfig(SwitchboardConstants.INDEX_DIST_ALLOW_WHILE_INDEXING, "on".equals(post.get("indexDistributeWhileIndexing", "")));
|
|
sb.peers.mySeed().setFlagAcceptRemoteIndex(indexReceive);
|
|
sb.setConfig(SwitchboardConstants.INDEX_RECEIVE_ALLOW, indexReceive);
|
|
sb.setConfig(SwitchboardConstants.INDEX_RECEIVE_ALLOW_SEARCH, indexReceiveSearch);
|
|
sb.setConfig(SwitchboardConstants.INDEX_RECEIVE_AUTODISABLED, false);
|
|
|
|
sb.setConfig(SwitchboardConstants.INDEX_RECEIVE_BLOCK_BLACKLIST, "on".equals(post.get("indexReceiveBlockBlacklist", "")));
|
|
|
|
if (post.containsKey("peertags")) {
|
|
sb.peers.mySeed().setPeerTags(MapTools.string2set(normalizedList(post.get("peertags")), ","));
|
|
}
|
|
|
|
sb.setConfig(SwitchboardConstants.CLUSTER_MODE, post.get(SwitchboardConstants.CLUSTER_MODE, SwitchboardConstants.CLUSTER_MODE_PUBLIC_PEER));
|
|
sb.setConfig(SwitchboardConstants.CLUSTER_PEERS_IPPORT, checkIPPortList(post.get(SwitchboardConstants.CLUSTER_PEERS_IPPORT, "")));
|
|
sb.setConfig(
|
|
"cluster.peers.yacydomain",
|
|
checkYaCyDomainList(post.get("cluster.peers.yacydomain", "")));
|
|
|
|
// update the cluster hash set
|
|
sb.clusterhashes = sb.peers.clusterHashes(sb.getConfig("cluster.peers.yacydomain", ""));
|
|
}
|
|
}
|
|
|
|
// write answer code
|
|
prop.put("commit", commit);
|
|
|
|
// write remote crawl request settings
|
|
prop.put("crawlResponse", sb.getConfigBool(SwitchboardConstants.CRAWLJOB_REMOTE, false) ? "1" : "0");
|
|
final long RTCbusySleep =
|
|
Math
|
|
.max(1, env.getConfigInt(SwitchboardConstants.CRAWLJOB_REMOTE_TRIGGERED_CRAWL_BUSYSLEEP, 100));
|
|
final int RTCppm = (int) (60000L / RTCbusySleep);
|
|
prop.put("acceptCrawlLimit", RTCppm);
|
|
|
|
prop.put("indexDistributeWhileCrawling.on", sb.getConfigBool(SwitchboardConstants.INDEX_DIST_ALLOW_WHILE_CRAWLING, true));
|
|
prop.put("indexDistributeWhileCrawling.off", !sb.getConfigBool(SwitchboardConstants.INDEX_DIST_ALLOW_WHILE_CRAWLING, true));
|
|
prop.put("indexDistributeWhileIndexing.on", sb.getConfigBool(SwitchboardConstants.INDEX_DIST_ALLOW_WHILE_INDEXING, true));
|
|
prop.put("indexDistributeWhileIndexing.off", !sb.getConfigBool(SwitchboardConstants.INDEX_DIST_ALLOW_WHILE_INDEXING, true));
|
|
prop.put("indexReceiveBlockBlacklistChecked.on", sb.getConfigBool(SwitchboardConstants.INDEX_RECEIVE_BLOCK_BLACKLIST, true));
|
|
prop.put("indexReceiveBlockBlacklistChecked.off", !sb.getConfigBool(SwitchboardConstants.INDEX_RECEIVE_BLOCK_BLACKLIST, true));
|
|
prop.putHTML("peertags", MapTools.set2string(sb.peers.mySeed().getPeerTags(), ",", false));
|
|
|
|
final boolean indexDistribute = sb.getConfigBool(SwitchboardConstants.INDEX_DIST_ALLOW, true);
|
|
final boolean indexReceive = sb.getConfigBool(SwitchboardConstants.INDEX_RECEIVE_ALLOW, true);
|
|
final boolean indexReceiveSearch = sb.getConfigBool(SwitchboardConstants.INDEX_RECEIVE_ALLOW_SEARCH, true);
|
|
prop.put("indexDistributeChecked", indexDistribute);
|
|
prop.put("indexReceiveChecked", indexReceive);
|
|
prop.put("indexReceiveSearchChecked", indexReceiveSearch);
|
|
|
|
// set seed information directly
|
|
sb.peers.mySeed().setFlagAcceptRemoteCrawl(sb.getConfigBool(SwitchboardConstants.CRAWLJOB_REMOTE, false));
|
|
sb.peers.mySeed().setFlagAcceptRemoteIndex(indexReceive);
|
|
|
|
// set p2p/robinson mode flags and values
|
|
prop.put("p2p.checked", indexDistribute || indexReceive);
|
|
prop.put("robinson.checked", !(indexDistribute || indexReceive));
|
|
prop.putHTML("cluster.peers.ipport", sb.getConfig("cluster.peers.ipport", ""));
|
|
prop.putHTML("cluster.peers.yacydomain", sb.getConfig("cluster.peers.yacydomain", ""));
|
|
StringBuilder hashes = new StringBuilder();
|
|
for (final byte[] h: sb.clusterhashes) {
|
|
hashes.append(", ").append(ASCII.String(h));
|
|
}
|
|
if (hashes.length() > 2) {
|
|
hashes = hashes.delete(0, 2);
|
|
}
|
|
|
|
prop.put("cluster.peers.yacydomain.hashes", hashes.toString());
|
|
|
|
// set p2p mode flags
|
|
prop.put("privatepeerChecked", SwitchboardConstants.CLUSTER_MODE_PRIVATE_PEER.equals(sb.getConfig(SwitchboardConstants.CLUSTER_MODE, "")));
|
|
prop.put("publicclusterChecked", SwitchboardConstants.CLUSTER_MODE_PUBLIC_CLUSTER.equals(sb.getConfig(SwitchboardConstants.CLUSTER_MODE, "")));
|
|
prop.put("publicpeerChecked", SwitchboardConstants.CLUSTER_MODE_PUBLIC_PEER.equals(sb.getConfig(SwitchboardConstants.CLUSTER_MODE, "")));
|
|
|
|
// set network configuration
|
|
prop.putHTML("network.unit.definition", sb.getConfig("network.unit.definition", ""));
|
|
prop.putHTML("network.unit.name", sb.getConfig(SwitchboardConstants.NETWORK_NAME, ""));
|
|
prop.putHTML("network.unit.description", sb.getConfig("network.unit.description", ""));
|
|
prop.putHTML("network.unit.domain", sb.getConfig(SwitchboardConstants.NETWORK_DOMAIN, ""));
|
|
prop.putHTML("network.unit.dht", sb.getConfig(SwitchboardConstants.NETWORK_UNIT_DHT, ""));
|
|
networkBootstrapLocations.remove(sb.getConfig("network.unit.definition", ""));
|
|
int c = 0;
|
|
for ( final String s : networkBootstrapLocations ) {
|
|
prop.put("networks_" + c++ + "_network", s);
|
|
}
|
|
prop.put("networks", c);
|
|
|
|
// set encryption setting
|
|
prop.put(SwitchboardConstants.NETWORK_PROTOCOL_HTTPS_PREFERRED,
|
|
sb.getConfigBool(SwitchboardConstants.NETWORK_PROTOCOL_HTTPS_PREFERRED,
|
|
SwitchboardConstants.NETWORK_PROTOCOL_HTTPS_PREFERRED_DEFAULT));
|
|
|
|
return prop;
|
|
}
|
|
|
|
private static String normalizedList(String input) {
|
|
input = input.replace(' ', ',');
|
|
input = input.replace(' ', ';');
|
|
input = input.replaceAll(",,", ",");
|
|
if ( input.length() > 0 && input.charAt(0) == ',' ) {
|
|
input = input.substring(1);
|
|
}
|
|
if ( input.endsWith(",") ) {
|
|
input = input.substring(0, input.length() - 1);
|
|
}
|
|
return input;
|
|
}
|
|
|
|
private static String checkYaCyDomainList(final String input) {
|
|
final String[] array = CommonPattern.COMMA.split(normalizedList(input));
|
|
final StringBuilder output = new StringBuilder();
|
|
for ( final String element : array ) {
|
|
if ( (element.endsWith(".yacyh"))
|
|
|| (element.endsWith(".yacy"))
|
|
|| (element.indexOf(".yacyh=", 0) > 0)
|
|
|| (element.indexOf(".yacy=", 0) > 0) ) {
|
|
output.append(",").append(element);
|
|
}
|
|
}
|
|
|
|
if ( output.length() == 0 ) {
|
|
return input;
|
|
}
|
|
return output.delete(0, 1).toString();
|
|
}
|
|
|
|
private static String checkIPPortList(final String input) {
|
|
final String[] array = CommonPattern.COMMA.split(normalizedList(input));
|
|
final StringBuilder output = new StringBuilder();
|
|
for ( final String element : array ) {
|
|
if ( element.indexOf(':', 0) >= 9 ) {
|
|
output.append(",").append(element);
|
|
}
|
|
}
|
|
if ( input.isEmpty() ) {
|
|
return input;
|
|
}
|
|
return output.delete(0, 1).toString();
|
|
}
|
|
}
|