Fix C90 warnings. Made the report error testing similar. Add warning for return witho...
[pazpar2-moved-to-github.git] / src / http_command.c
1 /* This file is part of Pazpar2.
2    Copyright (C) 2006-2012 Index Data
3
4 Pazpar2 is free software; you can redistribute it and/or modify it under
5 the terms of the GNU General Public License as published by the Free
6 Software Foundation; either version 2, or (at your option) any later
7 version.
8
9 Pazpar2 is distributed in the hope that it will be useful, but WITHOUT ANY
10 WARRANTY; without even the implied warranty of MERCHANTABILITY or
11 FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
12 for more details.
13
14 You should have received a copy of the GNU General Public License
15 along with this program; if not, write to the Free Software
16 Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA  02110-1301  USA
17
18 */
19
20 #if HAVE_CONFIG_H
21 #include <config.h>
22 #endif
23 #include <stdio.h>
24 #include <sys/types.h>
25 #if HAVE_UNISTD_H
26 #include <unistd.h>
27 #endif
28 #include <stdlib.h>
29 #include <string.h>
30 #if HAVE_SYS_TIME_H
31 #include <sys/time.h>
32 #endif
33 #include <yaz/snprintf.h>
34 #include <yaz/yaz-util.h>
35
36 #include "ppmutex.h"
37 #include "eventl.h"
38 #include "parameters.h"
39 #include "session.h"
40 #include "http.h"
41 #include "settings.h"
42 #include "client.h"
43
44 #ifdef HAVE_MALLINFO
45 #include <malloc.h>
46
47 void print_meminfo(WRBUF wrbuf)
48 {
49     struct mallinfo minfo;
50     minfo = mallinfo();
51     wrbuf_printf(wrbuf, "  <memory>\n"
52                         "   <arena>%d</arena>\n" 
53                         "   <uordblks>%d</uordblks>\n"
54                         "   <fordblks>%d</fordblks>\n"
55                         "   <ordblks>%d</ordblks>\n"
56                         "   <keepcost>%d</keepcost>\n"
57                         "   <hblks>%d</hblks>\n" 
58                         "   <hblkhd>%d</hblkhd>\n"
59                         "   <virt>%d</virt>\n"
60                         "   <virtuse>%d</virtuse>\n"
61                         "  </memory>\n", 
62                  minfo.arena, minfo.uordblks, minfo.fordblks,minfo.ordblks, minfo.keepcost, minfo.hblks, minfo.hblkhd, minfo.arena + minfo.hblkhd, minfo.uordblks + minfo.hblkhd);
63
64 }
65 #else
66 #define print_meminfo(x)
67 #endif
68
69
70 // Update this when the protocol changes
71 #define PAZPAR2_PROTOCOL_VERSION "1"
72
73 #define HTTP_COMMAND_RESPONSE_PREFIX "<?xml version=\"1.0\" encoding=\"UTF-8\"?>\n"
74
75 struct http_session {
76     IOCHAN timeout_iochan;     // NOTE: This is NOT associated with a socket
77     struct session *psession;
78     unsigned int session_id;
79     int timestamp;
80     int destroy_counter;
81     int activity_counter;
82     NMEM nmem;
83     http_sessions_t http_sessions;
84     struct http_session *next;
85 };
86
87 struct http_sessions {
88     struct http_session *session_list;
89     YAZ_MUTEX mutex;
90     int log_level;
91 };
92
93 static YAZ_MUTEX g_http_session_mutex = 0;
94 static int g_http_sessions = 0;
95
96 int http_session_use(int delta)
97 {
98     int sessions;
99     if (!g_http_session_mutex)
100         yaz_mutex_create(&g_http_session_mutex);
101     yaz_mutex_enter(g_http_session_mutex);
102     g_http_sessions += delta;
103     sessions = g_http_sessions;
104     yaz_mutex_leave(g_http_session_mutex);
105     yaz_log(YLOG_DEBUG, "%s sessions=%d", delta == 0 ? "" : (delta > 0 ? "INC" : "DEC"), sessions);
106     return sessions;
107
108 }
109
110 http_sessions_t http_sessions_create(void)
111 {
112     http_sessions_t hs = xmalloc(sizeof(*hs));
113     hs->session_list = 0;
114     hs->mutex = 0;
115     pazpar2_mutex_create(&hs->mutex, "http_sessions");
116     hs->log_level = yaz_log_module_level("HTTP");
117     return hs;
118 }
119
120 void http_sessions_destroy(http_sessions_t hs)
121 {
122     if (hs)
123     {
124         struct http_session *s = hs->session_list;
125         while (s)
126         {
127             struct http_session *s_next = s->next;
128             iochan_destroy(s->timeout_iochan);
129             session_destroy(s->psession);
130             nmem_destroy(s->nmem);
131             s = s_next;
132         }
133         yaz_mutex_destroy(&hs->mutex);
134         xfree(hs);
135     }
136 }
137
138 void http_session_destroy(struct http_session *s);
139
140 static void session_timeout(IOCHAN i, int event)
141 {
142     struct http_session *s = iochan_getdata(i);
143     http_session_destroy(s);
144 }
145
146 struct http_session *http_session_create(struct conf_service *service,
147                                          http_sessions_t http_sessions,
148                                          unsigned int sesid)
149 {
150     NMEM nmem = nmem_create();
151     struct http_session *r = nmem_malloc(nmem, sizeof(*r));
152     char tmp_str[50];
153
154     sprintf(tmp_str, "session#%u", sesid);
155     r->psession = new_session(nmem, service, sesid);
156     r->session_id = sesid;
157     r->timestamp = 0;
158     r->nmem = nmem;
159     r->destroy_counter = r->activity_counter = 0;
160     r->http_sessions = http_sessions;
161
162     yaz_mutex_enter(http_sessions->mutex);
163     r->next = http_sessions->session_list;
164     http_sessions->session_list = r;
165     yaz_mutex_leave(http_sessions->mutex);
166
167     r->timeout_iochan = iochan_create(-1, session_timeout, 0, "http_session_timeout");
168     iochan_setdata(r->timeout_iochan, r);
169     yaz_log(http_sessions->log_level, "Session %u created. timeout chan=%p timeout=%d", sesid, r->timeout_iochan, service->session_timeout);
170     iochan_settimeout(r->timeout_iochan, service->session_timeout);
171
172     iochan_add(service->server->iochan_man, r->timeout_iochan);
173     http_session_use(1);
174     return r;
175 }
176
177 void http_session_destroy(struct http_session *s)
178 {
179     int must_destroy = 0;
180
181     http_sessions_t http_sessions = s->http_sessions;
182
183     yaz_log(http_sessions->log_level, "Session %u destroy", s->session_id);
184     yaz_mutex_enter(http_sessions->mutex);
185     /* only if http_session has no active http sessions on it can be destroyed */
186     if (s->destroy_counter == s->activity_counter)
187     {
188         struct http_session **p = 0;
189         must_destroy = 1;
190         for (p = &http_sessions->session_list; *p; p = &(*p)->next)
191             if (*p == s)
192             {
193                 *p = (*p)->next;
194                 break;
195             }
196     }
197     yaz_mutex_leave(http_sessions->mutex);
198     if (must_destroy)
199     {   /* destroying for real */
200         yaz_log(http_sessions->log_level, "Session %u destroyed", s->session_id);
201         iochan_destroy(s->timeout_iochan);
202         session_destroy(s->psession);
203         http_session_use(-1);
204         nmem_destroy(s->nmem);
205     }
206     else {
207         yaz_log(http_sessions->log_level, "Session %u destroying delayed. Active clients (%d-%d). Waiting for new timeout.",
208                 s->session_id, s->activity_counter, s->destroy_counter);
209     }
210
211 }
212
213 static const char *get_msg(enum pazpar2_error_code code)
214 {
215     struct pazpar2_error_msg {
216         enum pazpar2_error_code code;
217         const char *msg;
218     };
219     static const struct pazpar2_error_msg ar[] = {
220         { PAZPAR2_NO_SESSION, "Session does not exist or it has expired"},
221         { PAZPAR2_MISSING_PARAMETER, "Missing parameter"},
222         { PAZPAR2_MALFORMED_PARAMETER_VALUE, "Malformed parameter value"},
223         { PAZPAR2_MALFORMED_PARAMETER_ENCODING, "Malformed parameter encoding"},
224         { PAZPAR2_MALFORMED_SETTING, "Malformed setting argument"},
225         { PAZPAR2_HITCOUNTS_FAILED, "Failed to retrieve hitcounts"},
226         { PAZPAR2_RECORD_MISSING, "Record missing"},
227         { PAZPAR2_NO_TARGETS, "No targets"},
228         { PAZPAR2_CONFIG_TARGET, "Target cannot be configured"},
229         { PAZPAR2_RECORD_FAIL, "Record command failed"},
230         { PAZPAR2_NOT_IMPLEMENTED, "Not implemented"},
231         { PAZPAR2_NO_SERVICE, "No service"},
232         { PAZPAR2_ALREADY_BLOCKED, "Already blocked in session on: "},
233         { PAZPAR2_LAST_ERROR, "Last error"},
234         { 0, 0 }
235     };
236     int i = 0;
237     while (ar[i].msg)
238     {
239         if (code == ar[i].code)
240             return ar[i].msg;
241         i++;
242     }
243     return "No error";
244 }
245
246 static void error(struct http_response *rs, 
247                   enum pazpar2_error_code code,
248                   const char *addinfo)
249 {
250     struct http_channel *c = rs->channel;
251     WRBUF text = wrbuf_alloc();
252     const char *http_status = "417";
253     const char *msg = get_msg(code);
254     
255     rs->msg = nmem_strdup(c->nmem, msg);
256     strcpy(rs->code, http_status);
257
258     wrbuf_printf(text, HTTP_COMMAND_RESPONSE_PREFIX "<error code=\"%d\" msg=\"%s\">", (int) code,
259                msg);
260     if (addinfo)
261         wrbuf_xmlputs(text, addinfo);
262     wrbuf_puts(text, "</error>");
263
264     yaz_log(YLOG_WARN, "HTTP %s %s%s%s", http_status,
265             msg, addinfo ? ": " : "" , addinfo ? addinfo : "");
266     rs->payload = nmem_strdup(c->nmem, wrbuf_cstr(text));
267     wrbuf_destroy(text);
268     http_send_response(c);
269 }
270
271 static void response_open_no_status(struct http_channel *c, const char *command)
272 {
273     wrbuf_rewind(c->wrbuf);
274     wrbuf_printf(c->wrbuf, "%s<%s>",
275                  HTTP_COMMAND_RESPONSE_PREFIX, command);
276 }
277
278 static void response_open(struct http_channel *c, const char *command)
279 {
280     response_open_no_status(c, command);
281     wrbuf_puts(c->wrbuf, "<status>OK</status>");
282 }
283
284 static void response_close(struct http_channel *c, const char *command)
285 {
286     struct http_response *rs = c->response;
287
288     wrbuf_printf(c->wrbuf, "</%s>", command);
289     rs->payload = nmem_strdup(c->nmem, wrbuf_cstr(c->wrbuf));
290     http_send_response(c);
291 }
292
293 unsigned int make_sessionid(void)
294 {
295     static int seq = 0; /* thread pr */
296     unsigned int res;
297
298     seq++;
299     if (global_parameters.predictable_sessions)
300         res = seq;
301     else
302     {
303 #ifdef WIN32
304         res = seq;
305 #else
306         struct timeval t;
307
308         if (gettimeofday(&t, 0) < 0)
309         {
310             yaz_log(YLOG_WARN|YLOG_ERRNO, "gettimeofday");
311             exit(1);
312         }
313         /* at most 256 sessions per second .. 
314            (long long would be more appropriate)*/
315         res = t.tv_sec;
316         res = ((res << 8) | (seq & 0xff)) & ((1U << 31) - 1);
317 #endif
318     }
319     return res;
320 }
321
322 static struct http_session *locate_session(struct http_channel *c)
323 {
324     struct http_request *rq = c->request;
325     struct http_response *rs = c->response;
326     struct http_session *p;
327     const char *session = http_argbyname(rq, "session");
328     http_sessions_t http_sessions = c->http_sessions;
329     unsigned int id;
330
331     if (!session)
332     {
333         error(rs, PAZPAR2_MISSING_PARAMETER, "session");
334         return 0;
335     }
336     id = atoi(session);
337     yaz_mutex_enter(http_sessions->mutex);
338     for (p = http_sessions->session_list; p; p = p->next)
339         if (id == p->session_id)
340             break;
341     if (p)
342         p->activity_counter++;
343     yaz_mutex_leave(http_sessions->mutex);
344     if (p)
345         iochan_activity(p->timeout_iochan);
346     else
347         error(rs, PAZPAR2_NO_SESSION, session);
348     return p;
349 }
350
351 // Call after use of locate_session, in order to increment the destroy_counter
352 static void release_session(struct http_channel *c,
353                             struct http_session *session)
354 {
355     http_sessions_t http_sessions = c->http_sessions;
356     yaz_mutex_enter(http_sessions->mutex);
357     if (session)
358         session->destroy_counter++;
359     yaz_mutex_leave(http_sessions->mutex);
360 }
361
362 // Decode settings parameters and apply to session
363 // Syntax: setting[target]=value
364 static int process_settings(struct session *se, struct http_request *rq,
365                             struct http_response *rs)
366 {
367     struct http_argument *a;
368
369     for (a = rq->arguments; a; a = a->next)
370         if (strchr(a->name, '['))
371         {
372             char **res;
373             int num;
374             char *dbname;
375             char *setting;
376
377             // Nmem_strsplit *rules*!!!
378             nmem_strsplit(se->session_nmem, "[]", a->name, &res, &num);
379             if (num != 2)
380             {
381                 error(rs, PAZPAR2_MALFORMED_SETTING, a->name);
382                 return -1;
383             }
384             setting = res[0];
385             dbname = res[1];
386             session_apply_setting(se, dbname, setting,
387                     nmem_strdup(se->session_nmem, a->value));
388         }
389     return 0;
390 }
391
392 static void cmd_exit(struct http_channel *c)
393 {
394     yaz_log(YLOG_WARN, "exit");
395
396     response_open(c, "exit");
397     response_close(c, "exit");
398     http_close_server(c->server);
399 }
400
401 static void cmd_init(struct http_channel *c)
402 {
403     struct http_request *r = c->request;
404     const char *clear = http_argbyname(r, "clear");
405     const char *content_type = http_lookup_header(r->headers, "Content-Type");
406     unsigned int sesid;
407     struct http_session *s;
408     struct http_response *rs = c->response;
409     struct conf_service *service = 0; /* no service (yet) */
410     
411     if (r->content_len && content_type && 
412         !yaz_strcmp_del("text/xml", content_type, "; "))
413     {
414         xmlDoc *doc = xmlParseMemory(r->content_buf, r->content_len);
415         xmlNode *root_n;
416         if (!doc)
417         {
418             error(rs, PAZPAR2_MALFORMED_SETTING, 0);
419             return;
420         }
421         root_n = xmlDocGetRootElement(doc);
422         service = service_create(c->server, root_n);
423         xmlFreeDoc(doc);
424         if (!service)
425         {
426             error(rs, PAZPAR2_MALFORMED_SETTING, 0);
427             return;
428         }
429     }
430     
431     if (!service)
432     {
433         const char *service_name = http_argbyname(c->request, "service");
434         service = locate_service(c->server, service_name);
435         if (!service)
436         {
437             error(rs, PAZPAR2_NO_SERVICE, service_name ? service_name : "unnamed");
438             return;
439         }
440     }
441     sesid = make_sessionid();
442     s = http_session_create(service, c->http_sessions, sesid);
443     
444     yaz_log(c->http_sessions->log_level, "Session init %u ", sesid);
445     if (!clear || *clear == '0')
446         session_init_databases(s->psession);
447     else
448         yaz_log(YLOG_LOG, "Session %u init: No databases preloaded", sesid);
449     
450     if (process_settings(s->psession, c->request, c->response) < 0)
451         return;
452
453     response_open(c, "init");
454     wrbuf_printf(c->wrbuf, "<session>%d", sesid);
455     if (c->server->server_id)
456     {
457         wrbuf_puts(c->wrbuf, ".");
458         wrbuf_puts(c->wrbuf, c->server->server_id);
459     }
460     wrbuf_puts(c->wrbuf, "</session>"
461                "<protocol>" PAZPAR2_PROTOCOL_VERSION "</protocol>");
462     
463     response_close(c, "init");
464 }
465
466 static void apply_local_setting(void *client_data,
467                                 struct setting *set)
468 {
469     struct session *se =  (struct session *) client_data;
470
471     session_apply_setting(se, nmem_strdup(se->session_nmem, set->target),
472                           nmem_strdup(se->session_nmem, set->name),
473                           nmem_strdup(se->session_nmem, set->value));
474 }
475
476 static void cmd_settings(struct http_channel *c)
477 {
478     struct http_response *rs = c->response;
479     struct http_request *rq = c->request;
480     struct http_session *s = locate_session(c);
481     const char *content_type = http_lookup_header(rq->headers, "Content-Type");
482
483     if (!s)
484         return;
485
486     if (rq->content_len && content_type && 
487         !yaz_strcmp_del("text/xml", content_type, "; "))
488     {
489         xmlDoc *doc = xmlParseMemory(rq->content_buf, rq->content_len);
490         xmlNode *root_n;
491         if (!doc)
492         {
493             error(rs, PAZPAR2_MALFORMED_SETTING, 0);
494             release_session(c,s);
495             return;
496         }
497         root_n = xmlDocGetRootElement(doc);
498
499         settings_read_node_x(root_n, s->psession, apply_local_setting);
500
501         xmlFreeDoc(doc);
502     }
503     if (process_settings(s->psession, rq, rs) < 0)
504     {
505         release_session(c, s);
506         return;
507     }
508     response_open(c, "settings");
509     response_close(c, "settings");
510     release_session(c, s);
511 }
512
513 static void termlist_response(struct http_channel *c, struct http_session *s, const char *cmd_status)
514 {
515     struct http_request *rq = c->request;
516     const char *name = http_argbyname(rq, "name");
517     const char *nums = http_argbyname(rq, "num");
518     int num = 15;
519     int status;
520
521     if (nums)
522         num = atoi(nums);
523
524     status = session_active_clients(s->psession);
525
526     response_open_no_status(c, "termlist");
527     /* new protocol add a status to response. Triggered by a status parameter */
528     if (cmd_status != 0) {
529         wrbuf_printf(c->wrbuf, "<status>%s</status>\n", cmd_status);
530     }
531     wrbuf_printf(c->wrbuf, "<activeclients>%d</activeclients>\n", status);
532
533     perform_termlist(c, s->psession, name, num);
534
535     response_close(c, "termlist");
536 }
537
538 static void termlist_result_ready(void *data)
539 {
540     struct http_channel *c = (struct http_channel *) data;
541     struct http_request *rq = c->request;
542     const char *report = http_argbyname(rq, "report");
543     const char *status = 0;
544     struct http_session *s = locate_session(c);
545     if (report && !strcmp("status", report))
546         status = "OK";
547     if (s) {
548         yaz_log(c->http_sessions->log_level, "Session %u termlist watch released", s->session_id);
549         termlist_response(c, s, status);
550         release_session(c,s);
551     }
552 }
553
554 static void cmd_termlist(struct http_channel *c)
555 {
556     struct http_request *rq = c->request;
557     struct http_response *rs = c->response;
558     struct http_session *s = locate_session(c);
559     const char *block = http_argbyname(rq, "block");
560     const char *report = http_argbyname(rq, "report");
561     int report_status = 0;
562     int report_error = 0;
563     const char *status_message = 0;
564     int active_clients;
565     if (report  && !strcmp("error", report)) {
566         report_error = 1;
567         status_message = "OK";
568     }
569     if (report  && !strcmp("status", report)) {
570         report_status = 1;
571         status_message = "OK";
572     }
573     if (!s)
574         return;
575
576     active_clients = session_active_clients(s->psession);
577     if (block && !strcmp("1", block) && active_clients)
578     {
579         // if there is already a watch/block. we do not block this one
580         if (session_set_watch(s->psession, SESSION_WATCH_TERMLIST,
581                               termlist_result_ready, c, c) != 0)
582         {
583             yaz_log(YLOG_WARN, "Session %u: Attempt to block multiple times on termlist block. Not supported!", s->session_id);
584             if (report_error) {
585                 error(rs, PAZPAR2_ALREADY_BLOCKED, "termlist");
586                 release_session(c, s);
587                 return;
588             }
589             else if (report_status) {
590                 status_message = "WARNING (Already blocked on termlist)";
591             }
592             else {
593                 yaz_log(YLOG_WARN, "Session %u: Ignoring termlist block. Return current result", s->session_id);
594             }
595         }
596         else
597         {
598             yaz_log(c->http_sessions->log_level, "Session %u: Blocking on command termlist", s->session_id);
599             release_session(c, s);
600             return;
601         }
602     }
603
604     termlist_response(c, s, status_message);
605     release_session(c, s);
606 }
607
608 size_t session_get_memory_status(struct session *session);
609
610 static void session_status(struct http_channel *c, struct http_session *s)
611 {
612     size_t session_nmem;
613     wrbuf_printf(c->wrbuf, "<http_count>%u</http_count>\n", s->activity_counter);
614     wrbuf_printf(c->wrbuf, "<http_nmem>%zu</http_nmem>\n", nmem_total(s->nmem) );
615     session_nmem = session_get_memory_status(s->psession);
616     wrbuf_printf(c->wrbuf, "<session_nmem>%zu</session_nmem>\n", session_nmem);
617 }
618
619 static void cmd_session_status(struct http_channel *c)
620 {
621     struct http_session *s = locate_session(c);
622     if (!s)
623         return;
624
625     response_open(c, "session-status");
626     session_status(c, s);
627     response_close(c, "session-status");
628     release_session(c, s);
629 }
630
631 int sessions_count(void);
632 int clients_count(void);
633 #ifdef HAVE_RESULTSETS_COUNT
634 int resultsets_count(void);
635 #else
636 #define resultsets_count()      0
637 #endif
638
639 static void cmd_server_status(struct http_channel *c)
640 {
641     int sessions   = sessions_count();
642     int clients    = clients_count();
643     int resultsets = resultsets_count();
644
645     response_open(c, "server-status");
646     wrbuf_printf(c->wrbuf, "\n  <sessions>%u</sessions>\n", sessions);
647     wrbuf_printf(c->wrbuf, "  <clients>%u</clients>\n",   clients);
648     /* Only works if yaz has been compiled with enabling of this */
649     wrbuf_printf(c->wrbuf, "  <resultsets>%u</resultsets>\n",resultsets);
650     print_meminfo(c->wrbuf);
651
652 /* TODO add all sessions status                         */
653 /*    http_sessions_t http_sessions = c->http_sessions; */
654 /*    struct http_session *p;                           */
655 /*
656     yaz_mutex_enter(http_sessions->mutex);
657     for (p = http_sessions->session_list; p; p = p->next)
658     {
659         p->activity_counter++;
660         wrbuf_puts(c->wrbuf, "<session-status>\n");
661         wrbuf_printf(c->wrbuf, "<id>%s</id>\n", p->session_id);
662         yaz_mutex_leave(http_sessions->mutex);
663         session_status(c, p);
664         wrbuf_puts(c->wrbuf, "</session-status>\n");
665         yaz_mutex_enter(http_sessions->mutex);
666         p->activity_counter--;
667     }
668     yaz_mutex_leave(http_sessions->mutex);
669 */
670     response_close(c, "server-status");
671     xmalloc_trav(0);
672 }
673
674 static void bytarget_response(struct http_channel *c, struct http_session *s, const char *cmd_status) {
675     int count, i;
676     struct hitsbytarget *ht;
677     struct http_request *rq = c->request;
678     const char *settings = http_argbyname(rq, "settings");
679
680     ht = get_hitsbytarget(s->psession, &count, c->nmem);
681     if (!cmd_status)
682         /* Old protocol, always ok */
683         response_open(c, "bytarget");
684     else {
685         /* New protocol, OK or WARNING (...)*/
686         response_open_no_status(c, "bytarget");
687         wrbuf_printf(c->wrbuf, "<status>%s</status>", cmd_status);
688     }
689
690     if (count == 0)
691         yaz_log(YLOG_WARN, "Empty bytarget Response. No targets found!");
692     for (i = 0; i < count; i++)
693     {
694         wrbuf_puts(c->wrbuf, "\n<target>");
695
696         wrbuf_puts(c->wrbuf, "<id>");
697         wrbuf_xmlputs(c->wrbuf, ht[i].id);
698         wrbuf_puts(c->wrbuf, "</id>\n");
699
700         if (ht[i].name && ht[i].name[0]) 
701         {
702             wrbuf_puts(c->wrbuf, "<name>");
703             wrbuf_xmlputs(c->wrbuf, ht[i].name);
704             wrbuf_puts(c->wrbuf, "</name>\n");
705         }
706
707         wrbuf_printf(c->wrbuf, "<hits>" ODR_INT_PRINTF "</hits>\n", ht[i].hits);
708         wrbuf_printf(c->wrbuf, "<diagnostic>%d</diagnostic>\n", ht[i].diagnostic);
709         if (ht[i].diagnostic)
710         {
711             wrbuf_puts(c->wrbuf, "<addinfo>");
712             if (ht[i].addinfo)
713                 wrbuf_xmlputs(c->wrbuf, ht[i].addinfo);
714             wrbuf_puts(c->wrbuf, "</addinfo>\n");
715         }
716
717         wrbuf_printf(c->wrbuf, "<records>%d</records>\n", ht[i].records);
718
719         wrbuf_puts(c->wrbuf, "<state>");
720         wrbuf_xmlputs(c->wrbuf, ht[i].state);
721         wrbuf_puts(c->wrbuf, "</state>\n");
722         if (settings && *settings == '1')
723         {
724             wrbuf_puts(c->wrbuf, "<settings>\n");
725             wrbuf_puts(c->wrbuf, ht[i].settings_xml);
726             wrbuf_puts(c->wrbuf, "</settings>\n");
727         }
728         if (ht[i].suggestions_xml && ht[i].suggestions_xml[0]) {
729             wrbuf_puts(c->wrbuf, "<suggestions>");
730             wrbuf_puts(c->wrbuf, ht[i].suggestions_xml);
731             wrbuf_puts(c->wrbuf, "</suggestions>");
732         }
733         wrbuf_puts(c->wrbuf, "</target>");
734     }
735     response_close(c, "bytarget");
736 }
737
738 static void bytarget_result_ready(void *data)
739 {
740     struct http_channel *c = (struct http_channel *) data;
741     struct http_session *s = locate_session(c);
742     const char *status_message = "OK";
743     if (s) {
744         yaz_log(c->http_sessions->log_level, "Session %u: bytarget watch released", s->session_id);
745         bytarget_response(c, s, status_message);
746         release_session(c, s);
747     }
748     else {
749         yaz_log(c->http_sessions->log_level, "No Session found for released bytarget watch");
750     }
751 }
752
753
754 static void cmd_bytarget(struct http_channel *c)
755 {
756     struct http_request *rq = c->request;
757     struct http_response *rs = c->response;
758     struct http_session *s = locate_session(c);
759     const char *block = http_argbyname(rq, "block");
760     const char *report = http_argbyname(rq, "report");
761     int report_error = 0;
762     int report_status = 0;
763     const char *status_message = "OK";
764     int no_active;
765
766     if (report && !strcmp("error", report)) {
767         report_error = 1;
768     }
769     if (report && !strcmp("status", report)) {
770         report_status = 1;
771     }
772
773     if (!s)
774         return;
775
776     no_active = session_active_clients(s->psession);
777     if (block && !strcmp("1",block) && no_active)
778     {
779         // if there is already a watch/block. we do not block this one
780         if (session_set_watch(s->psession, SESSION_WATCH_BYTARGET,
781                               bytarget_result_ready, c, c) != 0)
782         {
783             yaz_log(YLOG_WARN, "Session %u: Attempt to block multiple times on bytarget block. Not supported!", s->session_id);
784             if (report_error) {
785                 error(rs, PAZPAR2_ALREADY_BLOCKED, "bytarget");
786                 release_session(c, s);
787                 return;
788             }
789             else if (report_status) {
790                 status_message = "WARNING (Already blocked on bytarget)";
791             }
792             else {
793                 yaz_log(YLOG_WARN, "Session %u: Ignoring bytarget block. Return current result.", s->session_id);
794             }
795         }
796         else
797         {
798             yaz_log(c->http_sessions->log_level, "Session %u: Blocking on command bytarget", s->session_id);
799             release_session(c, s);
800             return;
801         }
802     }
803     bytarget_response(c, s, status_message);
804     release_session(c, s);
805 }
806
807 static void write_metadata(WRBUF w, struct conf_service *service,
808         struct record_metadata **ml, int full)
809 {
810     int imeta;
811
812     for (imeta = 0; imeta < service->num_metadata; imeta++)
813     {
814         struct conf_metadata *cmd = &service->metadata[imeta];
815         struct record_metadata *md;
816         if (!cmd->brief && !full)
817             continue;
818         for (md = ml[imeta]; md; md = md->next)
819         {
820             struct record_metadata_attr *attr = md->attributes;
821             wrbuf_printf(w, "\n<md-%s", cmd->name);
822
823             for (; attr; attr = attr->next)
824             {
825                 wrbuf_printf(w, " %s=\"", attr->name);
826                 wrbuf_xmlputs(w, attr->value);
827                 wrbuf_puts(w, "\"");
828             }
829             wrbuf_puts(w, ">");
830             switch (cmd->type)
831             {
832                 case Metadata_type_generic:
833                     wrbuf_xmlputs(w, md->data.text.disp);
834                     break;
835                 case Metadata_type_year:
836                     wrbuf_printf(w, "%d", md->data.number.min);
837                     if (md->data.number.min != md->data.number.max)
838                         wrbuf_printf(w, "-%d", md->data.number.max);
839                     break;
840                 default:
841                     wrbuf_puts(w, "[can't represent]");
842                     break;
843             }
844             wrbuf_printf(w, "</md-%s>", cmd->name);
845         }
846     }
847 }
848
849 static void write_subrecord(struct record *r, WRBUF w,
850         struct conf_service *service, int show_details)
851 {
852     const char *name = session_setting_oneval(
853         client_get_database(r->client), PZ_NAME);
854
855     wrbuf_puts(w, "<location id=\"");
856     wrbuf_xmlputs(w, client_get_id(r->client));
857     wrbuf_puts(w, "\" ");
858
859     wrbuf_puts(w, "name=\"");
860     wrbuf_xmlputs(w,  *name ? name : "Unknown");
861     wrbuf_puts(w, "\">");
862
863     write_metadata(w, service, r->metadata, show_details);
864     wrbuf_puts(w, "</location>\n");
865 }
866
867 static void show_raw_record_error(void *data, const char *addinfo)
868 {
869     http_channel_observer_t obs = data;
870     struct http_channel *c = http_channel_observer_chan(obs);
871     struct http_response *rs = c->response;
872
873     http_remove_observer(obs);
874
875     error(rs, PAZPAR2_RECORD_FAIL, addinfo);
876 }
877
878 static void show_raw_record_ok(void *data, const char *buf, size_t sz)
879 {
880     http_channel_observer_t obs = data;
881     struct http_channel *c = http_channel_observer_chan(obs);
882     struct http_response *rs = c->response;
883
884     http_remove_observer(obs);
885
886     wrbuf_write(c->wrbuf, buf, sz);
887     rs->payload = nmem_strdup(c->nmem, wrbuf_cstr(c->wrbuf));
888     http_send_response(c);
889 }
890
891
892 static void show_raw_record_ok_binary(void *data, const char *buf, size_t sz)
893 {
894     http_channel_observer_t obs = data;
895     struct http_channel *c = http_channel_observer_chan(obs);
896     struct http_response *rs = c->response;
897
898     http_remove_observer(obs);
899
900     wrbuf_write(c->wrbuf, buf, sz);
901     rs->payload = nmem_strdup(c->nmem, wrbuf_cstr(c->wrbuf));
902
903     rs->content_type = "application/octet-stream";
904     http_send_response(c);
905 }
906
907
908 void show_raw_reset(void *data, struct http_channel *c, void *data2)
909 {
910     //struct client *client = data;
911     //client_show_raw_remove(client, data2);
912 }
913
914 static void cmd_record_ready(void *data);
915
916 static void show_record(struct http_channel *c, struct http_session *s)
917 {
918     struct http_response *rs = c->response;
919     struct http_request *rq = c->request;
920     struct record_cluster *rec, *prev_r, *next_r;
921     struct record *r;
922     struct conf_service *service;
923     const char *idstr = http_argbyname(rq, "id");
924     const char *offsetstr = http_argbyname(rq, "offset");
925     const char *binarystr = http_argbyname(rq, "binary");
926     
927     if (!s)
928         return;
929     service = s->psession->service;
930     if (!idstr)
931     {
932         error(rs, PAZPAR2_MISSING_PARAMETER, "id");
933         return;
934     }
935     wrbuf_rewind(c->wrbuf);
936     if (!(rec = show_single_start(s->psession, idstr, &prev_r, &next_r)))
937     {
938         if (session_active_clients(s->psession) == 0)
939         {
940             error(rs, PAZPAR2_RECORD_MISSING, idstr);
941         }
942         else if (session_set_watch(s->psession, SESSION_WATCH_RECORD,
943                               cmd_record_ready, c, c) != 0)
944         {
945             error(rs, PAZPAR2_RECORD_MISSING, idstr);
946         }
947         return;
948     }
949     if (offsetstr)
950     {
951         int offset = atoi(offsetstr);
952         const char *syntax = http_argbyname(rq, "syntax");
953         const char *esn = http_argbyname(rq, "esn");
954         int i;
955         struct record*r = rec->records;
956         int binary = 0;
957         const char *nativesyntax = http_argbyname(rq, "nativesyntax");
958         
959         if (binarystr && *binarystr != '0')
960             binary = 1;
961
962         for (i = 0; i < offset && r; r = r->next, i++)
963             ;
964         if (!r)
965         {
966             error(rs, PAZPAR2_RECORD_FAIL, "no record at offset given");
967         }
968         else
969         {
970             http_channel_observer_t obs =
971                 http_add_observer(c, r->client, show_raw_reset);
972             int ret = client_show_raw_begin(r->client, r->position,
973                                             syntax, esn,
974                                             obs /* data */,
975                                             show_raw_record_error,
976                                             (binary ? 
977                                              show_raw_record_ok_binary : 
978                                              show_raw_record_ok),
979                                             (binary ? 1 : 0),
980                                             nativesyntax);
981             if (ret == -1)
982             {
983                 http_remove_observer(obs);
984                 error(rs, PAZPAR2_NO_SESSION, 0);
985             }
986         }
987     }
988     else
989     {
990         response_open_no_status(c, "record");
991         wrbuf_puts(c->wrbuf, "\n<recid>");
992         wrbuf_xmlputs(c->wrbuf, rec->recid);
993         wrbuf_puts(c->wrbuf, "</recid>\n");
994         if (prev_r)
995         {
996             wrbuf_puts(c->wrbuf, "<prevrecid>");
997             wrbuf_xmlputs(c->wrbuf, prev_r->recid);
998             wrbuf_puts(c->wrbuf, "</prevrecid>\n");
999         }
1000         if (next_r)
1001         {
1002             wrbuf_puts(c->wrbuf, "<nextrecid>");
1003             wrbuf_xmlputs(c->wrbuf, next_r->recid);
1004             wrbuf_puts(c->wrbuf, "</nextrecid>\n");
1005         }
1006         wrbuf_printf(c->wrbuf, "<activeclients>%d</activeclients>\n", 
1007                      session_active_clients(s->psession));
1008         write_metadata(c->wrbuf, service, rec->metadata, 1);
1009         for (r = rec->records; r; r = r->next)
1010             write_subrecord(r, c->wrbuf, service, 1);
1011         response_close(c, "record");
1012     }
1013     show_single_stop(s->psession, rec);
1014 }
1015
1016 static void cmd_record_ready(void *data)
1017 {
1018     struct http_channel *c = (struct http_channel *) data;
1019     struct http_session *s = locate_session(c);
1020     if (s) {
1021         yaz_log(c->http_sessions->log_level, "Session %u: record watch released", s->session_id);
1022         show_record(c, s);
1023         release_session(c,s);
1024     }
1025 }
1026
1027 static void cmd_record(struct http_channel *c)
1028 {
1029     struct http_session *s = locate_session(c);
1030     if (s) {
1031         show_record(c, s);
1032         release_session(c,s);
1033     }
1034 }
1035
1036
1037 static void show_records(struct http_channel *c, struct http_session *s, int active)
1038 {
1039     struct http_request *rq = c->request;
1040     struct http_response *rs = c->response;
1041     struct record_cluster **rl;
1042     struct reclist_sortparms *sp;
1043     const char *start = http_argbyname(rq, "start");
1044     const char *num = http_argbyname(rq, "num");
1045     const char *sort = http_argbyname(rq, "sort");
1046     int startn = 0;
1047     int numn = 20;
1048     int total;
1049     Odr_int total_hits;
1050     int i;
1051
1052     if (!s)
1053         return;
1054
1055     // We haven't counted clients yet if we're called on a block release
1056     if (active < 0)
1057         active = session_active_clients(s->psession);
1058
1059     if (start)
1060         startn = atoi(start);
1061     if (num)
1062         numn = atoi(num);
1063     if (!sort)
1064         sort = "relevance";
1065     if (!(sp = reclist_parse_sortparms(c->nmem, sort, s->psession->service)))
1066     {
1067         error(rs, PAZPAR2_MALFORMED_PARAMETER_VALUE, "sort");
1068         return;
1069
1070     }
1071     
1072     rl = show_range_start(s->psession, sp, startn, &numn, &total, &total_hits);
1073
1074     response_open(c, "show");
1075     wrbuf_printf(c->wrbuf, "\n<activeclients>%d</activeclients>\n", active);
1076     wrbuf_printf(c->wrbuf, "<merged>%d</merged>\n", total);
1077     wrbuf_printf(c->wrbuf, "<total>" ODR_INT_PRINTF "</total>\n", total_hits);
1078     wrbuf_printf(c->wrbuf, "<start>%d</start>\n", startn);
1079     wrbuf_printf(c->wrbuf, "<num>%d</num>\n", numn);
1080
1081     for (i = 0; i < numn; i++)
1082     {
1083         int ccount;
1084         struct record *p;
1085         struct record_cluster *rec = rl[i];
1086         struct conf_service *service = s->psession->service;
1087
1088         wrbuf_puts(c->wrbuf, "<hit>\n");
1089         write_metadata(c->wrbuf, service, rec->metadata, 0);
1090         for (ccount = 0, p = rl[i]->records; p;  p = p->next, ccount++)
1091             write_subrecord(p, c->wrbuf, service, 0); // subrecs w/o details
1092         if (ccount > 1)
1093             wrbuf_printf(c->wrbuf, "<count>%d</count>\n", ccount);
1094         if (strstr(sort, "relevance"))
1095             wrbuf_printf(c->wrbuf, "<relevance>%d</relevance>\n",
1096                          rec->relevance_score);
1097         wrbuf_puts(c->wrbuf, "<recid>");
1098         wrbuf_xmlputs(c->wrbuf, rec->recid);
1099         wrbuf_puts(c->wrbuf, "</recid>\n");
1100         wrbuf_puts(c->wrbuf, "</hit>\n");
1101     }
1102
1103     show_range_stop(s->psession, rl);
1104
1105     response_close(c, "show");
1106 }
1107
1108 static void show_records_ready(void *data)
1109 {
1110     struct http_channel *c = (struct http_channel *) data;
1111     struct http_session *s = locate_session(c);
1112     if (s) {
1113         yaz_log(c->http_sessions->log_level, "Session %u: show watch released", s->session_id);
1114         show_records(c, s, -1);
1115     }
1116     else {
1117         /* some error message  */
1118     }
1119     release_session(c,s);
1120 }
1121
1122 static void cmd_show(struct http_channel *c)
1123 {
1124     struct http_request  *rq = c->request;
1125     struct http_response *rs = c->response;
1126     struct http_session *s = locate_session(c);
1127     const char *block = http_argbyname(rq, "block");
1128     const char *sort = http_argbyname(rq, "sort");
1129     const char *block_error = http_argbyname(rq, "report");
1130     struct reclist_sortparms *sp;
1131     int status;
1132     int report_error = 0;
1133     if (block_error && !strcmp("1", block_error)) {
1134         report_error = 1;
1135     }    
1136     if (!s)
1137         return;
1138
1139     if (!sort)
1140         sort = "relevance";
1141     
1142     if (!(sp = reclist_parse_sortparms(c->nmem, sort, s->psession->service)))
1143     {
1144         error(c->response, PAZPAR2_MALFORMED_PARAMETER_VALUE, "sort");
1145         release_session(c, s);
1146         return;
1147     }
1148     session_sort(s->psession, sp->name, sp->increasing);
1149
1150     status = session_active_clients(s->psession);
1151
1152     if (block)
1153     {
1154         if (!strcmp(block, "preferred") && !session_is_preferred_clients_ready(s->psession) && reclist_get_num_records(s->psession->reclist) == 0)
1155         {
1156             // if there is already a watch/block. we do not block this one
1157             if (session_set_watch(s->psession, SESSION_WATCH_SHOW_PREF,
1158                                   show_records_ready, c, c) == 0)
1159             {
1160                 yaz_log(c->http_sessions->log_level,
1161                         "Session %u: Blocking on command show (preferred targets)", s->session_id);
1162                 release_session(c, s);
1163                 return;
1164             }
1165             else
1166             {
1167                 yaz_log(YLOG_WARN, "Session %u: Attempt to block multiple times on show (preferred targets) block. Not supported!", 
1168                     s->session_id);
1169                 if (report_error) {
1170                     error(rs, PAZPAR2_ALREADY_BLOCKED, "show (preferred targets)");
1171                     release_session(c, s);
1172                     return;
1173                 }
1174                 else {
1175                     yaz_log(YLOG_WARN, "Session %u: Ignoring show(preferred) block. Returning current result.", s->session_id);
1176                 }
1177             }
1178
1179         }
1180         else if (status)
1181         {
1182             // if there is already a watch/block. we do not block this one
1183             if (session_set_watch(s->psession, SESSION_WATCH_SHOW,
1184                                   show_records_ready, c, c) != 0)
1185             {
1186                 yaz_log(YLOG_WARN, "Session %u: Attempt to block multiple times on show block. Not supported!", s->session_id);
1187                 if (report_error) {
1188                     error(rs, PAZPAR2_ALREADY_BLOCKED, "show");
1189                     release_session(c, s);
1190                     return;
1191                 }
1192                 else {
1193                     yaz_log(YLOG_WARN, "Session %u: Ignoring show block. Returning current result.", s->session_id);
1194                 }
1195             }
1196             else
1197             {
1198                 yaz_log(c->http_sessions->log_level, "Session %u: Blocking on command show", s->session_id);
1199                 release_session(c, s);
1200                 return;
1201             }
1202         }
1203     }
1204     show_records(c, s, status);
1205     release_session(c, s);
1206 }
1207
1208 static void cmd_ping(struct http_channel *c)
1209 {
1210     struct http_session *s = locate_session(c);
1211     if (!s)
1212         return;
1213     response_open(c, "ping");
1214     response_close(c, "ping");
1215     release_session(c, s);
1216 }
1217
1218 static void cmd_search(struct http_channel *c)
1219 {
1220     struct http_request *rq = c->request;
1221     struct http_response *rs = c->response;
1222     struct http_session *s = locate_session(c);
1223     const char *query = http_argbyname(rq, "query");
1224     const char *filter = http_argbyname(rq, "filter");
1225     const char *maxrecs = http_argbyname(rq, "maxrecs");
1226     const char *startrecs = http_argbyname(rq, "startrecs");
1227     const char *limit = http_argbyname(rq, "limit");
1228     enum pazpar2_error_code code;
1229     const char *addinfo = 0;
1230
1231     if (!s)
1232         return;
1233     if (!query)
1234     {
1235         error(rs, PAZPAR2_MISSING_PARAMETER, "query");
1236         release_session(c, s);
1237         return;
1238     }
1239     if (!yaz_utf8_check(query))
1240     {
1241         error(rs, PAZPAR2_MALFORMED_PARAMETER_ENCODING, "query");
1242         release_session(c, s);
1243         return;
1244     }
1245     code = session_search(s->psession, query, startrecs, maxrecs, filter, limit,
1246                           &addinfo, "relevance", 0);
1247     if (code)
1248     {
1249         error(rs, code, addinfo);
1250         release_session(c, s);
1251         return;
1252     }
1253     response_open(c, "search");
1254     response_close(c, "search");
1255     release_session(c, s);
1256 }
1257
1258
1259 static void cmd_stat(struct http_channel *c)
1260 {
1261     struct http_session *s = locate_session(c);
1262     struct statistics stat;
1263     int clients;
1264
1265     float progress = 0;
1266
1267     if (!s)
1268         return;
1269
1270     clients = session_active_clients(s->psession);
1271     statistics(s->psession, &stat);
1272
1273     if (stat.num_clients > 0)
1274     {
1275         progress = (stat.num_clients  - clients) / (float)stat.num_clients;
1276     }
1277
1278     response_open_no_status(c, "stat");
1279     wrbuf_printf(c->wrbuf, "<activeclients>%d</activeclients>\n", clients);
1280     wrbuf_printf(c->wrbuf, "<hits>" ODR_INT_PRINTF "</hits>\n", stat.num_hits);
1281     wrbuf_printf(c->wrbuf, "<records>%d</records>\n", stat.num_records);
1282     wrbuf_printf(c->wrbuf, "<clients>%d</clients>\n", stat.num_clients);
1283     wrbuf_printf(c->wrbuf, "<unconnected>%d</unconnected>\n", stat.num_no_connection);
1284     wrbuf_printf(c->wrbuf, "<connecting>%d</connecting>\n", stat.num_connecting);
1285     wrbuf_printf(c->wrbuf, "<working>%d</working>\n", stat.num_working);
1286     wrbuf_printf(c->wrbuf, "<idle>%d</idle>\n", stat.num_idle);
1287     wrbuf_printf(c->wrbuf, "<failed>%d</failed>\n", stat.num_failed);
1288     wrbuf_printf(c->wrbuf, "<error>%d</error>\n", stat.num_error);
1289     wrbuf_printf(c->wrbuf, "<progress>%.2f</progress>\n", progress);
1290     response_close(c, "stat");
1291     release_session(c, s);
1292 }
1293
1294 static void cmd_info(struct http_channel *c)
1295 {
1296     char yaz_version_str[20];
1297
1298     response_open_no_status(c, "info");
1299     wrbuf_puts(c->wrbuf, " <version>\n");
1300     wrbuf_puts(c->wrbuf, "  <pazpar2");
1301 #ifdef PAZPAR2_VERSION_SHA1
1302     wrbuf_printf(c->wrbuf, " sha1=\"%s\"", PAZPAR2_VERSION_SHA1);
1303 #endif
1304     wrbuf_puts(c->wrbuf, ">");
1305     wrbuf_xmlputs(c->wrbuf, VERSION);
1306     wrbuf_puts(c->wrbuf, "</pazpar2>");
1307
1308     yaz_version(yaz_version_str, 0);
1309     wrbuf_puts(c->wrbuf, "  <yaz compiled=\"");
1310     wrbuf_xmlputs(c->wrbuf, YAZ_VERSION);
1311     wrbuf_puts(c->wrbuf, "\">");
1312     wrbuf_xmlputs(c->wrbuf, yaz_version_str);
1313     wrbuf_puts(c->wrbuf, "</yaz>\n");
1314
1315     wrbuf_puts(c->wrbuf, " </version>\n");
1316     
1317     info_services(c->server, c->wrbuf);
1318
1319     response_close(c, "info");
1320 }
1321
1322 struct {
1323     char *name;
1324     void (*fun)(struct http_channel *c);
1325 } commands[] = {
1326     { "init", cmd_init },
1327     { "settings", cmd_settings },
1328     { "stat", cmd_stat },
1329     { "bytarget", cmd_bytarget },
1330     { "show", cmd_show },
1331     { "search", cmd_search },
1332     { "termlist", cmd_termlist },
1333     { "exit", cmd_exit },
1334     { "session-status", cmd_session_status },
1335     { "server-status", cmd_server_status },
1336     { "ping", cmd_ping },
1337     { "record", cmd_record },
1338     { "info", cmd_info },
1339     {0,0}
1340 };
1341
1342 void http_command(struct http_channel *c)
1343 {
1344     const char *command = http_argbyname(c->request, "command");
1345     struct http_response *rs = http_create_response(c);
1346     int i;
1347
1348     c->response = rs;
1349
1350     http_addheader(rs, "Expires", "Thu, 19 Nov 1981 08:52:00 GMT");
1351     http_addheader(rs, "Cache-Control", "no-store, no-cache, must-revalidate, post-check=0, pre-check=0");
1352
1353     if (!command)
1354     {
1355         error(rs, PAZPAR2_MISSING_PARAMETER, "command");
1356         return;
1357     }
1358     for (i = 0; commands[i].name; i++)
1359         if (!strcmp(commands[i].name, command))
1360         {
1361             (*commands[i].fun)(c);
1362             break;
1363         }
1364     if (!commands[i].name)
1365         error(rs, PAZPAR2_MALFORMED_PARAMETER_VALUE, "command");
1366
1367     return;
1368 }
1369
1370 /*
1371  * Local variables:
1372  * c-basic-offset: 4
1373  * c-file-style: "Stroustrup"
1374  * indent-tabs-mode: nil
1375  * End:
1376  * vim: shiftwidth=4 tabstop=8 expandtab
1377  */
1378