2014-06-11 04:34:28 -04:00
|
|
|
import os
|
2014-07-02 14:51:14 -04:00
|
|
|
import socket
|
|
|
|
import time
|
|
|
|
import threading
|
|
|
|
import sys
|
2014-03-10 01:18:05 -04:00
|
|
|
import sickbeard
|
2014-06-11 04:34:28 -04:00
|
|
|
import webserve
|
2014-06-15 17:45:09 -04:00
|
|
|
import webapi
|
2014-06-15 07:08:41 -04:00
|
|
|
|
2014-03-10 01:18:05 -04:00
|
|
|
from sickbeard import logger
|
|
|
|
from sickbeard.helpers import create_https_certificates
|
2014-06-15 03:16:55 -04:00
|
|
|
from tornado.web import Application, StaticFileHandler, RedirectHandler, HTTPError
|
|
|
|
from tornado.httpserver import HTTPServer
|
2014-06-16 08:19:07 -04:00
|
|
|
from tornado.ioloop import IOLoop
|
2014-06-11 04:34:28 -04:00
|
|
|
|
2014-07-09 14:41:04 -04:00
|
|
|
|
2014-06-11 04:34:28 -04:00
|
|
|
class MultiStaticFileHandler(StaticFileHandler):
|
|
|
|
def initialize(self, paths, default_filename=None):
|
|
|
|
self.paths = paths
|
2014-06-18 11:06:50 -04:00
|
|
|
self.default_filename = default_filename
|
2014-06-11 04:34:28 -04:00
|
|
|
|
|
|
|
def get(self, path, include_body=True):
|
|
|
|
for p in self.paths:
|
|
|
|
try:
|
|
|
|
# Initialize the Static file with a path
|
|
|
|
super(MultiStaticFileHandler, self).initialize(p)
|
|
|
|
# Try to get the file
|
|
|
|
return super(MultiStaticFileHandler, self).get(path)
|
|
|
|
except HTTPError as exc:
|
|
|
|
# File not found, carry on
|
|
|
|
if exc.status_code == 404:
|
|
|
|
continue
|
|
|
|
raise
|
|
|
|
|
|
|
|
# Oops file not found anywhere!
|
|
|
|
raise HTTPError(404)
|
|
|
|
|
2014-07-09 14:41:04 -04:00
|
|
|
|
2014-07-02 14:51:14 -04:00
|
|
|
class SRWebServer(threading.Thread):
|
2014-07-05 20:57:43 -04:00
|
|
|
def __init__(self, options={}, io_loop=None):
|
2014-07-02 14:51:14 -04:00
|
|
|
threading.Thread.__init__(self)
|
|
|
|
self.daemon = True
|
|
|
|
self.alive = True
|
|
|
|
self.name = "TORNADO"
|
|
|
|
self.io_loop = io_loop or IOLoop.current()
|
|
|
|
|
|
|
|
self.options = options
|
|
|
|
self.options.setdefault('port', 8081)
|
|
|
|
self.options.setdefault('host', '0.0.0.0')
|
|
|
|
self.options.setdefault('log_dir', None)
|
|
|
|
self.options.setdefault('username', '')
|
|
|
|
self.options.setdefault('password', '')
|
2014-07-09 14:41:04 -04:00
|
|
|
self.options.setdefault('web_root', None)
|
2014-07-02 14:51:14 -04:00
|
|
|
assert isinstance(self.options['port'], int)
|
|
|
|
assert 'data_root' in self.options
|
|
|
|
|
2014-07-09 14:41:04 -04:00
|
|
|
# video root
|
2014-07-10 20:20:31 -04:00
|
|
|
if sickbeard.ROOT_DIRS:
|
|
|
|
root_dirs = sickbeard.ROOT_DIRS.split('|')
|
|
|
|
self.video_root = root_dirs[int(root_dirs[0]) + 1]
|
|
|
|
else:
|
|
|
|
self.video_root = None
|
2014-07-09 14:41:04 -04:00
|
|
|
|
|
|
|
# web root
|
|
|
|
self.options['web_root'] = ('/' + self.options['web_root'].lstrip('/')) if self.options[
|
|
|
|
'web_root'] else ''
|
|
|
|
|
2014-07-02 14:51:14 -04:00
|
|
|
# tornado setup
|
|
|
|
self.enable_https = self.options['enable_https']
|
|
|
|
self.https_cert = self.options['https_cert']
|
|
|
|
self.https_key = self.options['https_key']
|
|
|
|
|
|
|
|
if self.enable_https:
|
|
|
|
# If either the HTTPS certificate or key do not exist, make some self-signed ones.
|
2014-07-09 14:41:04 -04:00
|
|
|
if not (self.https_cert and os.path.exists(self.https_cert)) or not (
|
|
|
|
self.https_key and os.path.exists(self.https_key)):
|
2014-07-02 14:51:14 -04:00
|
|
|
if not create_https_certificates(self.https_cert, self.https_key):
|
|
|
|
logger.log(u"Unable to create CERT/KEY files, disabling HTTPS")
|
|
|
|
sickbeard.ENABLE_HTTPS = False
|
2014-07-05 20:57:43 -04:00
|
|
|
self.enable_https = False
|
2014-07-02 14:51:14 -04:00
|
|
|
|
|
|
|
if not (os.path.exists(self.https_cert) and os.path.exists(self.https_key)):
|
|
|
|
logger.log(u"Disabled HTTPS because of missing CERT and KEY files", logger.WARNING)
|
2014-03-10 01:18:05 -04:00
|
|
|
sickbeard.ENABLE_HTTPS = False
|
2014-07-05 20:57:43 -04:00
|
|
|
self.enable_https = False
|
2014-03-10 01:18:05 -04:00
|
|
|
|
2014-07-02 14:51:14 -04:00
|
|
|
# Load the app
|
|
|
|
self.app = Application([],
|
2014-07-09 14:41:04 -04:00
|
|
|
debug=True,
|
|
|
|
autoreload=False,
|
|
|
|
gzip=True,
|
|
|
|
xheaders=sickbeard.HANDLE_REVERSE_PROXY,
|
|
|
|
cookie_secret='61oETzKXQAGaYdkL5gEmGeJJFuYh7EQnp2XdTP1o/Vo='
|
2014-07-02 14:51:14 -04:00
|
|
|
)
|
|
|
|
|
|
|
|
# Main Handler
|
|
|
|
self.app.add_handlers(".*$", [
|
2014-07-09 16:14:53 -04:00
|
|
|
(r'%s/api/(.*)(/?)' % self.options['web_root'], webapi.Api),
|
|
|
|
(r'%s/(.*)(/?)' % self.options['web_root'], webserve.MainHandler),
|
2014-07-03 19:51:39 -04:00
|
|
|
(r'(.*)', webserve.MainHandler)
|
2014-07-02 14:51:14 -04:00
|
|
|
])
|
|
|
|
|
|
|
|
# Static Path Handler
|
|
|
|
self.app.add_handlers(".*$", [
|
2014-07-09 14:41:04 -04:00
|
|
|
(r'%s/(favicon\.ico)' % self.options['web_root'], MultiStaticFileHandler,
|
2014-07-02 14:51:14 -04:00
|
|
|
{'paths': [os.path.join(self.options['data_root'], 'images/ico/favicon.ico')]}),
|
2014-07-09 16:14:53 -04:00
|
|
|
(r'%s/%s/(.*)(/?)' % (self.options['web_root'], 'images'), MultiStaticFileHandler,
|
2014-07-02 14:51:14 -04:00
|
|
|
{'paths': [os.path.join(self.options['data_root'], 'images'),
|
|
|
|
os.path.join(sickbeard.CACHE_DIR, 'images')]}),
|
2014-07-09 16:14:53 -04:00
|
|
|
(r'%s/%s/(.*)(/?)' % (self.options['web_root'], 'css'), MultiStaticFileHandler,
|
2014-07-02 14:51:14 -04:00
|
|
|
{'paths': [os.path.join(self.options['data_root'], 'css')]}),
|
2014-07-09 16:14:53 -04:00
|
|
|
(r'%s/%s/(.*)(/?)' % (self.options['web_root'], 'js'), MultiStaticFileHandler,
|
2014-07-09 14:41:04 -04:00
|
|
|
{'paths': [os.path.join(self.options['data_root'], 'js')]}),
|
2014-07-02 14:51:14 -04:00
|
|
|
])
|
|
|
|
|
2014-07-09 14:41:04 -04:00
|
|
|
# Static Videos Path
|
|
|
|
if self.video_root:
|
|
|
|
self.app.add_handlers(".*$", [
|
2014-07-11 07:05:33 -04:00
|
|
|
(r'%s/%s/(.*)' % (self.options['web_root'], 'videos'), MultiStaticFileHandler,
|
2014-07-09 14:41:04 -04:00
|
|
|
{'paths': [self.video_root]}),
|
|
|
|
])
|
|
|
|
|
2014-07-02 14:51:14 -04:00
|
|
|
def run(self):
|
|
|
|
if self.enable_https:
|
|
|
|
protocol = "https"
|
2014-07-24 02:36:44 -04:00
|
|
|
self.server = HTTPServer(self.app, ssl_options={"certfile": self.https_cert, "keyfile": self.https_key})
|
2014-07-02 14:51:14 -04:00
|
|
|
else:
|
|
|
|
protocol = "http"
|
2014-07-24 02:36:44 -04:00
|
|
|
self.server = HTTPServer(self.app)
|
2014-07-02 14:51:14 -04:00
|
|
|
|
|
|
|
logger.log(u"Starting SickRage on " + protocol + "://" + str(self.options['host']) + ":" + str(
|
|
|
|
self.options['port']) + "/")
|
|
|
|
|
|
|
|
try:
|
|
|
|
self.server.listen(self.options['port'], self.options['host'])
|
|
|
|
except:
|
|
|
|
etype, evalue, etb = sys.exc_info()
|
2014-07-09 14:41:04 -04:00
|
|
|
logger.log(
|
|
|
|
"Could not start webserver on %s. Excpeption: %s, Error: %s" % (self.options['port'], etype, evalue),
|
|
|
|
logger.ERROR)
|
2014-07-02 14:51:14 -04:00
|
|
|
return
|
|
|
|
|
|
|
|
try:
|
|
|
|
self.io_loop.start()
|
|
|
|
self.io_loop.close(True)
|
2014-07-14 22:00:53 -04:00
|
|
|
except (IOError, ValueError):
|
2014-07-02 14:51:14 -04:00
|
|
|
# Ignore errors like "ValueError: I/O operation on closed kqueue fd". These might be thrown during a reload.
|
|
|
|
pass
|
|
|
|
|
|
|
|
def shutDown(self):
|
|
|
|
self.alive = False
|
|
|
|
if self.server:
|
2014-07-11 19:37:09 -04:00
|
|
|
logger.log("Shutting down tornado")
|
2014-07-02 14:51:14 -04:00
|
|
|
self.server.stop()
|
2014-07-11 19:37:09 -04:00
|
|
|
self.io_loop.stop()
|
|
|
|
self.join()
|