irker.handle(data)
if __name__ == '__main__':
- srvhost = HOST
- srvport = PORT
debuglvl = 0
- (options, arguments) = getopt.getopt(sys.argv[1:], "d:p:V")
+ (options, arguments) = getopt.getopt(sys.argv[1:], "d:V")
for (opt, val) in options:
if opt == '-d': # Enable debug/progress messages
debuglvl = int(val)
if debuglvl > 1:
logging.basicConfig(level=logging.DEBUG)
- elif opt == '-p': # Set the listening port
- srvport = int(val)
elif opt == '-V': # Emit version and exit
sys.stdout.write("irker version %s\n" % version)
sys.exit(0)
irker = Irker(debuglevel=debuglvl)
- tcpserver = SocketServer.TCPServer((srvhost, srvport), IrkerTCPHandler)
- udpserver = SocketServer.UDPServer((srvhost, srvport), IrkerUDPHandler)
+ tcpserver = SocketServer.TCPServer((HOST, PORT), IrkerTCPHandler)
+ udpserver = SocketServer.UDPServer((HOST, PORT), IrkerUDPHandler)
threading.Thread(target=tcpserver.serve_forever).start()
threading.Thread(target=udpserver.serve_forever).start()
<cmdsynopsis>
<command>irker</command>
- <arg>-p <replaceable>number</replaceable></arg>
<arg>-d <replaceable>debuglevel</replaceable></arg>
<arg>-V</arg>
</cmdsynopsis>
<variablelist>
<varlistentry>
-<term>-p</term>
-<listitem><para>Takes a following value which sets the port on which the
-daemon will listen.</para></listitem>
-</varlistentry>
-<varlistentry>
<term>-d</term>
<listitem><para>Takes a following value, seting the debugging level from
it. This option will generally only be of interest to developers;
socket can be visible from commit-hook code but not exposed to the
outside world. Priming your firewall with blocklists of IP addresses
known to spew spam is always a good idea.</para>
+
+<para>The absence of any option to set the service port is deliberate.
+If you think you need to do that, you have a problem better solved at
+your firewall.</para>
</refsect1>
<refsect1 id='authors'><title>AUTHOR</title>