+}
+
+static void termlist_result_ready(void *data)
+{
+ struct http_channel *c = (struct http_channel *) data;
+ struct http_request *rq = c->request;
+ const char *report = http_argbyname(rq, "report");
+ const char *status = 0;
+ struct http_session *s = locate_session(c);
+ if (report && !strcmp("status", report))
+ status = "OK";
+ if (s)
+ {
+ session_log(s->psession, c->http_sessions->log_level,
+ "termlist watch released");
+ termlist_response(c, s, status);
+ release_session(c, s);
+ }
+}
+
+static void cmd_termlist(struct http_channel *c)
+{
+ struct http_request *rq = c->request;
+ struct http_response *rs = c->response;
+ struct http_session *s = locate_session(c);
+ const char *block = http_argbyname(rq, "block");
+ const char *report = http_argbyname(rq, "report");
+ int report_status = 0;
+ int report_error = 0;
+ const char *status_message = 0;
+ int active_clients;
+
+ if (report && !strcmp("error", report))
+ {
+ report_error = 1;
+ status_message = "OK";
+ }
+ if (report && !strcmp("status", report))
+ {
+ report_status = 1;
+ status_message = "OK";
+ }
+ if (!s)
+ return;
+
+ active_clients = session_active_clients(s->psession);
+ if (block && !strcmp("1", block) && active_clients)
+ {
+ // if there is already a watch/block. we do not block this one
+ if (session_set_watch(s->psession, SESSION_WATCH_TERMLIST,
+ termlist_result_ready, c, c) != 0)
+ {
+ session_log(s->psession, YLOG_WARN, "Attempt to block "
+ "multiple times on termlist block. Not supported!");
+ if (report_error) {
+ error(rs, PAZPAR2_ALREADY_BLOCKED, "termlist");
+ release_session(c, s);
+ return;
+ }
+ else if (report_status)
+ status_message = "WARNING (Already blocked on termlist)";
+ else
+ session_log(s->psession, YLOG_WARN,
+ "Ignoring termlist block. Return current result");
+ }
+ else
+ {
+ session_log(s->psession, c->http_sessions->log_level,
+ "Blocking on command termlist");
+ release_session(c, s);
+ return;
+ }
+ }
+
+ termlist_response(c, s, status_message);