mirror of
https://github.com/yacy/yacy_search_server.git
synced 2024-09-21 00:00:13 +02:00
1d8d51075c
- removed the plasma package. The name of that package came from a very early pre-version of YaCy, even before YaCy was named AnomicHTTPProxy. The Proxy project introduced search for cache contents using class files that had been developed during the plasma project. Information from 2002 about plasma can be found here: http://web.archive.org/web/20020802110827/http://anomic.de/AnomicPlasma/index.html We stil have one class that comes mostly unchanged from the plasma project, the Condenser class. But this is now part of the document package and all other classes in the plasma package can be assigned to other packages. - cleaned up the http package: better structure of that class and clean isolation of server and client classes. The old HTCache becomes part of the client sub-package of http. - because the plasmaSwitchboard is now part of the search package all servlets had to be touched to declare a different package source. git-svn-id: https://svn.berlios.de/svnroot/repos/yacy/trunk@6232 6c8d7289-2bf4-0310-a012-ef5d649a1542
267 lines
14 KiB
Java
267 lines
14 KiB
Java
// ConfigNetwork_p.java
|
|
// --------------------
|
|
// (C) 2007 by Michael Peter Christen; mc@yacy.net, Frankfurt a. M., Germany
|
|
// first published 20.04.2007 on http://yacy.net
|
|
//
|
|
// This is a part of YaCy, a peer-to-peer based web search engine
|
|
//
|
|
// $LastChangedDate: 2006-04-02 22:40:07 +0200 (So, 02 Apr 2006) $
|
|
// $LastChangedRevision: 1986 $
|
|
// $LastChangedBy: orbiter $
|
|
//
|
|
// LICENSE
|
|
//
|
|
// This program is free software; you can redistribute it and/or modify
|
|
// it under the terms of the GNU General Public License as published by
|
|
// the Free Software Foundation; either version 2 of the License, or
|
|
// (at your option) any later version.
|
|
//
|
|
// This program is distributed in the hope that it will be useful,
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
// GNU General Public License for more details.
|
|
//
|
|
// You should have received a copy of the GNU General Public License
|
|
// along with this program; if not, write to the Free Software
|
|
// Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
|
|
|
|
import java.io.File;
|
|
import java.util.HashSet;
|
|
|
|
import de.anomic.http.metadata.RequestHeader;
|
|
import de.anomic.http.server.HTTPDemon;
|
|
import de.anomic.kelondro.util.FileUtils;
|
|
import de.anomic.search.Switchboard;
|
|
import de.anomic.search.SwitchboardConstants;
|
|
import de.anomic.server.serverBusyThread;
|
|
import de.anomic.server.serverCodings;
|
|
import de.anomic.server.serverObjects;
|
|
import de.anomic.server.serverSwitch;
|
|
|
|
public class ConfigNetwork_p {
|
|
|
|
public static serverObjects respond(final RequestHeader header, final serverObjects post, final serverSwitch env) {
|
|
|
|
final Switchboard sb = (Switchboard) env;
|
|
final serverObjects prop = new serverObjects();
|
|
int commit = 0;
|
|
|
|
// load all options for network definitions
|
|
final File networkBootstrapLocationsFile = new File(new File(sb.getRootPath(), "defaults"), "yacy.networks");
|
|
final HashSet<String> networkBootstrapLocations = FileUtils.loadList(networkBootstrapLocationsFile);
|
|
|
|
|
|
if (post != null) {
|
|
|
|
if (post.containsKey("changeNetwork")) {
|
|
final String networkDefinition = post.get("networkDefinition", "defaults/yacy.network.freeworld.unit");
|
|
if (networkDefinition.equals(sb.getConfig("network.unit.definition", ""))) {
|
|
// no change
|
|
commit = 3;
|
|
} else {
|
|
// shut down old network and index, start up new network and index
|
|
commit = 1;
|
|
sb.switchNetwork(networkDefinition);
|
|
// check if the password is given
|
|
if (sb.getConfig(HTTPDemon.ADMIN_ACCOUNT_B64MD5, "").length() == 0) {
|
|
prop.put("commitPasswordWarning", "1");
|
|
}
|
|
}
|
|
}
|
|
|
|
if (post.containsKey("save")) {
|
|
boolean crawlResponse = post.get("crawlResponse", "off").equals("on");
|
|
|
|
// DHT control
|
|
boolean indexDistribute = post.get("indexDistribute", "").equals("on");
|
|
boolean indexReceive = post.get("indexReceive", "").equals("on");
|
|
final boolean robinsonmode = post.get("network", "").equals("robinson");
|
|
final String clustermode = post.get("cluster.mode", "publicpeer");
|
|
if (robinsonmode) {
|
|
indexDistribute = false;
|
|
indexReceive = false;
|
|
if ((clustermode.equals("privatepeer")) || (clustermode.equals("publicpeer"))) {
|
|
prop.put("commitRobinsonWithoutRemoteIndexing", "1");
|
|
crawlResponse = false;
|
|
}
|
|
if ((clustermode.equals("privatecluster")) || (clustermode.equals("publiccluster"))) {
|
|
prop.put("commitRobinsonWithRemoteIndexing", "1");
|
|
crawlResponse = true;
|
|
}
|
|
commit = 1;
|
|
} else {
|
|
if (!indexDistribute && !indexReceive) {
|
|
prop.put("commitDHTIsRobinson", "1");
|
|
commit = 2;
|
|
} else if (indexDistribute && indexReceive) {
|
|
commit = 1;
|
|
} else {
|
|
if (!indexReceive) prop.put("commitDHTNoGlobalSearch", "1");
|
|
commit = 1;
|
|
}
|
|
if (!crawlResponse) {
|
|
prop.put("commitCrawlPlea", "1");
|
|
}
|
|
}
|
|
|
|
if (indexDistribute) {
|
|
sb.setConfig(SwitchboardConstants.INDEX_DIST_ALLOW, true);
|
|
} else {
|
|
sb.setConfig(SwitchboardConstants.INDEX_DIST_ALLOW, false);
|
|
}
|
|
|
|
if (post.get("indexDistributeWhileCrawling","").equals("on")) {
|
|
sb.setConfig(SwitchboardConstants.INDEX_DIST_ALLOW_WHILE_CRAWLING, true);
|
|
} else {
|
|
sb.setConfig(SwitchboardConstants.INDEX_DIST_ALLOW_WHILE_CRAWLING, false);
|
|
}
|
|
|
|
if (post.get("indexDistributeWhileIndexing","").equals("on")) {
|
|
sb.setConfig(SwitchboardConstants.INDEX_DIST_ALLOW_WHILE_INDEXING, true);
|
|
} else {
|
|
sb.setConfig(SwitchboardConstants.INDEX_DIST_ALLOW_WHILE_INDEXING, false);
|
|
}
|
|
|
|
if (indexReceive) {
|
|
sb.setConfig(SwitchboardConstants.INDEX_RECEIVE_ALLOW, true);
|
|
sb.peers.mySeed().setFlagAcceptRemoteIndex(true);
|
|
} else {
|
|
sb.setConfig(SwitchboardConstants.INDEX_RECEIVE_ALLOW, false);
|
|
sb.peers.mySeed().setFlagAcceptRemoteIndex(false);
|
|
}
|
|
|
|
if (post.get("indexReceiveBlockBlacklist", "").equals("on")) {
|
|
sb.setConfig("indexReceiveBlockBlacklist", true);
|
|
} else {
|
|
sb.setConfig("indexReceiveBlockBlacklist", false);
|
|
}
|
|
|
|
if (post.containsKey("peertags")) {
|
|
sb.peers.mySeed().setPeerTags(serverCodings.string2set(normalizedList(post.get("peertags")), ","));
|
|
}
|
|
|
|
sb.setConfig("cluster.mode", post.get("cluster.mode", "publicpeer"));
|
|
|
|
// read remote crawl request settings
|
|
sb.setConfig("crawlResponse", (crawlResponse) ? "true" : "false");
|
|
int newppm = 1;
|
|
try {
|
|
newppm = Math.max(1, Integer.parseInt(post.get("acceptCrawlLimit", "1")));
|
|
} catch (final NumberFormatException e) {}
|
|
final long newBusySleep = Math.max(100, 60000 / newppm);
|
|
|
|
// propagate to crawler
|
|
final serverBusyThread rct = sb.getThread(SwitchboardConstants.CRAWLJOB_REMOTE_TRIGGERED_CRAWL);
|
|
sb.setConfig(SwitchboardConstants.CRAWLJOB_REMOTE_TRIGGERED_CRAWL_BUSYSLEEP, newBusySleep);
|
|
sb.setConfig(SwitchboardConstants.CRAWLJOB_REMOTE_TRIGGERED_CRAWL_IDLESLEEP, newBusySleep * 3);
|
|
rct.setBusySleep(newBusySleep);
|
|
rct.setIdleSleep(newBusySleep * 3);
|
|
|
|
// propagate to loader
|
|
final serverBusyThread rcl = sb.getThread(SwitchboardConstants.CRAWLJOB_REMOTE_CRAWL_LOADER);
|
|
sb.setConfig(SwitchboardConstants.CRAWLJOB_REMOTE_CRAWL_LOADER_BUSYSLEEP, newBusySleep * 5);
|
|
sb.setConfig(SwitchboardConstants.CRAWLJOB_REMOTE_CRAWL_LOADER_IDLESLEEP, newBusySleep * 10);
|
|
rcl.setBusySleep(newBusySleep * 5);
|
|
rcl.setIdleSleep(newBusySleep * 10);
|
|
|
|
sb.setConfig(SwitchboardConstants.CRAWLJOB_REMOTE_TRIGGERED_CRAWL_BUSYSLEEP, Long.toString(newBusySleep));
|
|
|
|
sb.setConfig("cluster.peers.ipport", checkIPPortList(post.get("cluster.peers.ipport", "")));
|
|
sb.setConfig("cluster.peers.yacydomain", checkYaCyDomainList(post.get("cluster.peers.yacydomain", "")));
|
|
|
|
// update the cluster hash set
|
|
sb.clusterhashes = sb.peers.clusterHashes(sb.getConfig("cluster.peers.yacydomain", ""));
|
|
}
|
|
}
|
|
|
|
// write answer code
|
|
prop.put("commit", commit);
|
|
|
|
// write remote crawl request settings
|
|
prop.put("crawlResponse", sb.getConfigBool("crawlResponse", false) ? "1" : "0");
|
|
long RTCbusySleep = 100;
|
|
try {
|
|
RTCbusySleep = Math.max(1, Integer.parseInt(env.getConfig(SwitchboardConstants.CRAWLJOB_REMOTE_TRIGGERED_CRAWL_BUSYSLEEP, "100")));
|
|
} catch (final NumberFormatException e) {}
|
|
final int RTCppm = (int) (60000L / RTCbusySleep);
|
|
prop.put("acceptCrawlLimit", RTCppm);
|
|
|
|
final boolean indexDistribute = sb.getConfig(SwitchboardConstants.INDEX_DIST_ALLOW, "true").equals("true");
|
|
final boolean indexReceive = sb.getConfig(SwitchboardConstants.INDEX_RECEIVE_ALLOW, "true").equals("true");
|
|
prop.put("indexDistributeChecked", (indexDistribute) ? "1" : "0");
|
|
prop.put("indexDistributeWhileCrawling.on", (sb.getConfig(SwitchboardConstants.INDEX_DIST_ALLOW_WHILE_CRAWLING, "true").equals("true")) ? "1" : "0");
|
|
prop.put("indexDistributeWhileCrawling.off", (sb.getConfig(SwitchboardConstants.INDEX_DIST_ALLOW_WHILE_CRAWLING, "true").equals("true")) ? "0" : "1");
|
|
prop.put("indexDistributeWhileIndexing.on", (sb.getConfig(SwitchboardConstants.INDEX_DIST_ALLOW_WHILE_INDEXING, "true").equals("true")) ? "1" : "0");
|
|
prop.put("indexDistributeWhileIndexing.off", (sb.getConfig(SwitchboardConstants.INDEX_DIST_ALLOW_WHILE_INDEXING, "true").equals("true")) ? "0" : "1");
|
|
prop.put("indexReceiveChecked", (indexReceive) ? "1" : "0");
|
|
prop.put("indexReceiveBlockBlacklistChecked.on", (sb.getConfig("indexReceiveBlockBlacklist", "true").equals("true")) ? "1" : "0");
|
|
prop.put("indexReceiveBlockBlacklistChecked.off", (sb.getConfig("indexReceiveBlockBlacklist", "true").equals("true")) ? "0" : "1");
|
|
prop.putHTML("peertags", serverCodings.set2string(sb.peers.mySeed().getPeerTags(), ",", false));
|
|
|
|
// set seed information directly
|
|
sb.peers.mySeed().setFlagAcceptRemoteCrawl(sb.getConfigBool("crawlResponse", false));
|
|
sb.peers.mySeed().setFlagAcceptRemoteIndex(indexReceive);
|
|
|
|
// set p2p/robinson mode flags and values
|
|
prop.put("p2p.checked", (indexDistribute || indexReceive) ? "1" : "0");
|
|
prop.put("robinson.checked", (indexDistribute || indexReceive) ? "0" : "1");
|
|
prop.putHTML("cluster.peers.ipport", sb.getConfig("cluster.peers.ipport", ""));
|
|
prop.putHTML("cluster.peers.yacydomain", sb.getConfig("cluster.peers.yacydomain", ""));
|
|
String hashes = "";
|
|
for (byte[] h:sb.clusterhashes.keySet()) hashes += ", " + new String(h);
|
|
if (hashes.length() > 2) hashes = hashes.substring(2);
|
|
prop.put("cluster.peers.yacydomain.hashes", hashes);
|
|
|
|
// set p2p mode flags
|
|
prop.put("privatepeerChecked", (sb.getConfig("cluster.mode", "").equals("privatepeer")) ? "1" : "0");
|
|
prop.put("privateclusterChecked", (sb.getConfig("cluster.mode", "").equals("privatecluster")) ? "1" : "0");
|
|
prop.put("publicclusterChecked", (sb.getConfig("cluster.mode", "").equals("publiccluster")) ? "1" : "0");
|
|
prop.put("publicpeerChecked", (sb.getConfig("cluster.mode", "").equals("publicpeer")) ? "1" : "0");
|
|
|
|
// set network configuration
|
|
prop.putHTML("network.unit.definition", sb.getConfig("network.unit.definition", ""));
|
|
prop.putHTML("network.unit.name", sb.getConfig(SwitchboardConstants.NETWORK_NAME, ""));
|
|
prop.putHTML("network.unit.description", sb.getConfig("network.unit.description", ""));
|
|
prop.putHTML("network.unit.domain", sb.getConfig("network.unit.domain", ""));
|
|
prop.putHTML("network.unit.dht", sb.getConfig("network.unit.dht", ""));
|
|
networkBootstrapLocations.remove(sb.getConfig("network.unit.definition", ""));
|
|
int c = 0;
|
|
for (final String s: networkBootstrapLocations) prop.put("networks_" + c++ + "_network", s);
|
|
prop.put("networks", c);
|
|
|
|
return prop;
|
|
}
|
|
|
|
public static String normalizedList(String input) {
|
|
input = input.replace(' ', ',');
|
|
input = input.replace(' ', ';');
|
|
input = input.replaceAll(",,", ",");
|
|
if (input.startsWith(",")) input = input.substring(1);
|
|
if (input.endsWith(",")) input = input.substring(0, input.length() - 1);
|
|
return input;
|
|
}
|
|
|
|
public static String checkYaCyDomainList(String input) {
|
|
input = normalizedList(input);
|
|
final String[] s = input.split(",");
|
|
input = "";
|
|
for (int i = 0; i < s.length; i++) {
|
|
if ((s[i].endsWith(".yacyh")) || (s[i].endsWith(".yacy")) ||
|
|
(s[i].indexOf(".yacyh=") > 0) || (s[i].indexOf(".yacy=") > 0)) input += "," + s[i];
|
|
}
|
|
if (input.length() == 0) return input;
|
|
return input.substring(1);
|
|
}
|
|
|
|
public static String checkIPPortList(String input) {
|
|
input = normalizedList(input);
|
|
final String[] s = input.split(",");
|
|
input = "";
|
|
for (int i = 0; i < s.length; i++) {
|
|
if (s[i].indexOf(':') >= 9) input += "," + s[i];
|
|
}
|
|
if (input.length() == 0) return input;
|
|
return input.substring(1);
|
|
}
|
|
}
|