trinidad_init_services 1.1.3 → 1.1.4
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- data/.gitignore +5 -0
- data/Gemfile +3 -0
- data/History.txt +6 -0
- data/README.md +95 -0
- data/Rakefile +9 -58
- data/bin/trinidad_init_service +3 -4
- data/init.d/trinidad.erb +33 -12
- data/jsvc-unix-src/CHANGES.txt +62 -0
- data/jsvc-unix-src/INSTALL.txt +81 -0
- data/jsvc-unix-src/Makedefs.in +32 -0
- data/jsvc-unix-src/Makefile.in +42 -0
- data/jsvc-unix-src/configure +4417 -0
- data/jsvc-unix-src/configure.in +141 -0
- data/jsvc-unix-src/man/README +20 -0
- data/jsvc-unix-src/man/fetch.sh +36 -0
- data/jsvc-unix-src/man/jsvc.1.xml +214 -0
- data/jsvc-unix-src/native/.indent.pro +7 -0
- data/jsvc-unix-src/native/Makefile.in +46 -0
- data/jsvc-unix-src/native/arguments.c +476 -0
- data/jsvc-unix-src/native/arguments.h +94 -0
- data/jsvc-unix-src/native/debug.c +87 -0
- data/jsvc-unix-src/native/debug.h +65 -0
- data/jsvc-unix-src/native/dso-dlfcn.c +62 -0
- data/jsvc-unix-src/native/dso-dyld.c +153 -0
- data/jsvc-unix-src/native/dso.h +38 -0
- data/jsvc-unix-src/native/help.c +106 -0
- data/jsvc-unix-src/native/help.h +24 -0
- data/jsvc-unix-src/native/home.c +265 -0
- data/jsvc-unix-src/native/home.h +47 -0
- data/jsvc-unix-src/native/java.c +608 -0
- data/jsvc-unix-src/native/java.h +35 -0
- data/jsvc-unix-src/native/jsvc-unix.c +1267 -0
- data/jsvc-unix-src/native/jsvc.h +55 -0
- data/jsvc-unix-src/native/location.c +151 -0
- data/jsvc-unix-src/native/location.h +29 -0
- data/jsvc-unix-src/native/locks.c +52 -0
- data/jsvc-unix-src/native/locks.h +40 -0
- data/jsvc-unix-src/native/replace.c +121 -0
- data/jsvc-unix-src/native/replace.h +39 -0
- data/jsvc-unix-src/native/signals.c +105 -0
- data/jsvc-unix-src/native/signals.h +34 -0
- data/jsvc-unix-src/native/version.h +63 -0
- data/jsvc-unix-src/support/apfunctions.m4 +110 -0
- data/jsvc-unix-src/support/apjava.m4 +94 -0
- data/jsvc-unix-src/support/apsupport.m4 +155 -0
- data/jsvc-unix-src/support/buildconf.sh +33 -0
- data/jsvc-unix-src/support/config.guess +1371 -0
- data/jsvc-unix-src/support/config.sub +1760 -0
- data/jsvc-unix-src/support/install.sh +128 -0
- data/jsvc-unix-src/support/mkdist.sh +104 -0
- data/lib/trinidad/daemon.rb +31 -0
- data/lib/trinidad_init_services.rb +2 -30
- data/lib/trinidad_init_services/configuration.rb +91 -14
- data/lib/trinidad_init_services/version.rb +5 -0
- data/spec/spec_helper.rb +5 -6
- data/spec/trinidad_daemon_spec.rb +0 -1
- data/spec/trinidad_init_services/configuration_spec.rb +34 -1
- data/trinidad_init_services.gemspec +14 -51
- metadata +146 -87
- data/README +0 -63
- data/trinidad-libs/jsvc_linux +0 -0
@@ -0,0 +1,35 @@
|
|
1
|
+
/* Licensed to the Apache Software Foundation (ASF) under one or more
|
2
|
+
* contributor license agreements. See the NOTICE file distributed with
|
3
|
+
* this work for additional information regarding copyright ownership.
|
4
|
+
* The ASF licenses this file to You under the Apache License, Version 2.0
|
5
|
+
* (the "License"); you may not use this file except in compliance with
|
6
|
+
* the License. You may obtain a copy of the License at
|
7
|
+
*
|
8
|
+
* http://www.apache.org/licenses/LICENSE-2.0
|
9
|
+
*
|
10
|
+
* Unless required by applicable law or agreed to in writing, software
|
11
|
+
* distributed under the License is distributed on an "AS IS" BASIS,
|
12
|
+
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
13
|
+
* See the License for the specific language governing permissions and
|
14
|
+
* limitations under the License.
|
15
|
+
*/
|
16
|
+
|
17
|
+
/* @version $Id: java.h 1130635 2011-06-02 16:29:44Z mturk $ */
|
18
|
+
#ifndef __JSVC_JAVA_H__
|
19
|
+
#define __JSVC_JAVA_H__
|
20
|
+
|
21
|
+
#define LOADER "org/apache/commons/daemon/support/DaemonLoader"
|
22
|
+
|
23
|
+
char *java_library(arg_data *args, home_data *data);
|
24
|
+
bool java_init(arg_data *args, home_data *data);
|
25
|
+
bool java_destroy(void);
|
26
|
+
bool java_load(arg_data *args);
|
27
|
+
bool java_signal(void);
|
28
|
+
bool java_start(void);
|
29
|
+
bool java_stop(void);
|
30
|
+
bool java_version(void);
|
31
|
+
bool java_check(arg_data *args);
|
32
|
+
bool JVM_destroy(int exit);
|
33
|
+
|
34
|
+
#endif /* __JSVC_JAVA_H__ */
|
35
|
+
|
@@ -0,0 +1,1267 @@
|
|
1
|
+
/* Licensed to the Apache Software Foundation (ASF) under one or more
|
2
|
+
* contributor license agreements. See the NOTICE file distributed with
|
3
|
+
* this work for additional information regarding copyright ownership.
|
4
|
+
* The ASF licenses this file to You under the Apache License, Version 2.0
|
5
|
+
* (the "License"); you may not use this file except in compliance with
|
6
|
+
* the License. You may obtain a copy of the License at
|
7
|
+
*
|
8
|
+
* http://www.apache.org/licenses/LICENSE-2.0
|
9
|
+
*
|
10
|
+
* Unless required by applicable law or agreed to in writing, software
|
11
|
+
* distributed under the License is distributed on an "AS IS" BASIS,
|
12
|
+
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
13
|
+
* See the License for the specific language governing permissions and
|
14
|
+
* limitations under the License.
|
15
|
+
*/
|
16
|
+
|
17
|
+
/* @version $Id: jsvc-unix.c 1293002 2012-02-23 22:48:24Z mturk $ */
|
18
|
+
#include "jsvc.h"
|
19
|
+
|
20
|
+
#include <signal.h>
|
21
|
+
#include <unistd.h>
|
22
|
+
#include <sys/types.h>
|
23
|
+
#include <sys/stat.h>
|
24
|
+
#include <sys/wait.h>
|
25
|
+
#include <fcntl.h>
|
26
|
+
#include <stdio.h>
|
27
|
+
#include <string.h>
|
28
|
+
#include <pwd.h>
|
29
|
+
#include <grp.h>
|
30
|
+
#include <syslog.h>
|
31
|
+
#include <errno.h>
|
32
|
+
#ifdef OS_LINUX
|
33
|
+
#include <sys/prctl.h>
|
34
|
+
#include <sys/syscall.h>
|
35
|
+
#define _LINUX_FS_H
|
36
|
+
#include <linux/capability.h>
|
37
|
+
#ifdef HAVE_LIBCAP
|
38
|
+
#include <sys/capability.h>
|
39
|
+
#endif
|
40
|
+
#endif
|
41
|
+
#include <time.h>
|
42
|
+
|
43
|
+
#ifdef OS_CYGWIN
|
44
|
+
#include <sys/fcntl.h>
|
45
|
+
#define F_ULOCK 0 /* Unlock a previously locked region */
|
46
|
+
#define F_LOCK 1 /* Lock a region for exclusive use */
|
47
|
+
#endif
|
48
|
+
extern char **environ;
|
49
|
+
|
50
|
+
static mode_t envmask; /* mask to create the files */
|
51
|
+
|
52
|
+
pid_t controlled = 0; /* the child process pid */
|
53
|
+
pid_t logger_pid = 0; /* the logger process pid */
|
54
|
+
static bool stopping = false;
|
55
|
+
static bool doreload = false;
|
56
|
+
static bool doreopen = false;
|
57
|
+
static bool dosignal = false;
|
58
|
+
typedef void (*sighandler_t)(int);
|
59
|
+
static sighandler_t handler_int = NULL;
|
60
|
+
static sighandler_t handler_usr1 = NULL;
|
61
|
+
static sighandler_t handler_usr2 = NULL;
|
62
|
+
static sighandler_t handler_hup = NULL;
|
63
|
+
static sighandler_t handler_trm = NULL;
|
64
|
+
|
65
|
+
static int run_controller(arg_data *args, home_data *data, uid_t uid,
|
66
|
+
gid_t gid);
|
67
|
+
static void set_output(char *outfile, char *errfile, bool redirectstdin,
|
68
|
+
char *procname);
|
69
|
+
|
70
|
+
#ifdef OS_CYGWIN
|
71
|
+
/*
|
72
|
+
* File locking routine
|
73
|
+
*/
|
74
|
+
static int lockf(int fildes, int function, off_t size)
|
75
|
+
{
|
76
|
+
struct flock buf;
|
77
|
+
|
78
|
+
switch (function) {
|
79
|
+
case F_LOCK:
|
80
|
+
buf.l_type = F_WRLCK;
|
81
|
+
break;
|
82
|
+
case F_ULOCK:
|
83
|
+
buf.l_type = F_UNLCK;
|
84
|
+
break;
|
85
|
+
default:
|
86
|
+
return -1;
|
87
|
+
}
|
88
|
+
buf.l_whence = 0;
|
89
|
+
buf.l_start = 0;
|
90
|
+
buf.l_len = size;
|
91
|
+
|
92
|
+
return fcntl(fildes, F_SETLK, &buf);
|
93
|
+
}
|
94
|
+
|
95
|
+
#endif
|
96
|
+
|
97
|
+
static void handler(int sig)
|
98
|
+
{
|
99
|
+
switch (sig) {
|
100
|
+
case SIGTERM:
|
101
|
+
log_debug("Caught SIGTERM: Scheduling a shutdown");
|
102
|
+
if (stopping == true) {
|
103
|
+
log_error("Shutdown or reload already scheduled");
|
104
|
+
}
|
105
|
+
else {
|
106
|
+
stopping = true;
|
107
|
+
}
|
108
|
+
break;
|
109
|
+
case SIGINT:
|
110
|
+
log_debug("Caught SIGINT: Scheduling a shutdown");
|
111
|
+
if (stopping == true) {
|
112
|
+
log_error("Shutdown or reload already scheduled");
|
113
|
+
}
|
114
|
+
else {
|
115
|
+
stopping = true;
|
116
|
+
}
|
117
|
+
break;
|
118
|
+
case SIGHUP:
|
119
|
+
log_debug("Caught SIGHUP: Scheduling a reload");
|
120
|
+
if (stopping == true) {
|
121
|
+
log_error("Shutdown or reload already scheduled");
|
122
|
+
}
|
123
|
+
else {
|
124
|
+
stopping = true;
|
125
|
+
doreload = true;
|
126
|
+
}
|
127
|
+
break;
|
128
|
+
case SIGUSR1:
|
129
|
+
log_debug("Caught SIGUSR1: Reopening logs");
|
130
|
+
doreopen = true;
|
131
|
+
break;
|
132
|
+
case SIGUSR2:
|
133
|
+
log_debug("Caught SIGUSR2: Scheduling a custom signal");
|
134
|
+
dosignal = true;
|
135
|
+
break;
|
136
|
+
default:
|
137
|
+
log_debug("Caught unknown signal %d", sig);
|
138
|
+
break;
|
139
|
+
}
|
140
|
+
}
|
141
|
+
|
142
|
+
/* user and group */
|
143
|
+
static int set_user_group(const char *user, int uid, int gid)
|
144
|
+
{
|
145
|
+
if (user != NULL) {
|
146
|
+
if (setgid(gid) != 0) {
|
147
|
+
log_error("Cannot set group id for user '%s'", user);
|
148
|
+
return -1;
|
149
|
+
}
|
150
|
+
if (initgroups(user, gid) != 0) {
|
151
|
+
if (getuid() != uid) {
|
152
|
+
log_error("Cannot set supplement group list for user '%s'",
|
153
|
+
user);
|
154
|
+
return -1;
|
155
|
+
}
|
156
|
+
else
|
157
|
+
log_debug("Cannot set supplement group list for user '%s'",
|
158
|
+
user);
|
159
|
+
}
|
160
|
+
if (getuid() == uid) {
|
161
|
+
log_debug("No need to change user to '%s'!", user);
|
162
|
+
return 0;
|
163
|
+
}
|
164
|
+
if (setuid(uid) != 0) {
|
165
|
+
log_error("Cannot set user id for user '%s'", user);
|
166
|
+
return -1;
|
167
|
+
}
|
168
|
+
log_debug("user changed to '%s'", user);
|
169
|
+
}
|
170
|
+
return 0;
|
171
|
+
}
|
172
|
+
|
173
|
+
/* Set linux capability, user and group */
|
174
|
+
#ifdef OS_LINUX
|
175
|
+
/* CAPSALL is to allow to read/write at any location */
|
176
|
+
#define LEGACY_CAPSALL (1 << CAP_NET_BIND_SERVICE) + \
|
177
|
+
(1 << CAP_SETUID) + \
|
178
|
+
(1 << CAP_SETGID) + \
|
179
|
+
(1 << CAP_DAC_READ_SEARCH) + \
|
180
|
+
(1 << CAP_DAC_OVERRIDE)
|
181
|
+
|
182
|
+
#define LEGACY_CAPSMAX (1 << CAP_NET_BIND_SERVICE) + \
|
183
|
+
(1 << CAP_DAC_READ_SEARCH) + \
|
184
|
+
(1 << CAP_DAC_OVERRIDE)
|
185
|
+
|
186
|
+
/* That a more reasonable configuration */
|
187
|
+
#define LEGACY_CAPS (1 << CAP_NET_BIND_SERVICE) + \
|
188
|
+
(1 << CAP_DAC_READ_SEARCH) + \
|
189
|
+
(1 << CAP_SETUID) + \
|
190
|
+
(1 << CAP_SETGID)
|
191
|
+
|
192
|
+
/* probably the only one Java could use */
|
193
|
+
#define LEGACY_CAPSMIN (1 << CAP_NET_BIND_SERVICE) + \
|
194
|
+
(1 << CAP_DAC_READ_SEARCH)
|
195
|
+
|
196
|
+
#define LEGACY_CAP_VERSION 0x19980330
|
197
|
+
static int set_legacy_caps(int caps)
|
198
|
+
{
|
199
|
+
struct __user_cap_header_struct caphead;
|
200
|
+
struct __user_cap_data_struct cap;
|
201
|
+
|
202
|
+
memset(&caphead, 0, sizeof caphead);
|
203
|
+
caphead.version = LEGACY_CAP_VERSION;
|
204
|
+
caphead.pid = 0;
|
205
|
+
memset(&cap, 0, sizeof cap);
|
206
|
+
cap.effective = caps;
|
207
|
+
cap.permitted = caps;
|
208
|
+
cap.inheritable = caps;
|
209
|
+
if (syscall(__NR_capset, &caphead, &cap) < 0) {
|
210
|
+
log_error("set_caps: failed to set capabilities");
|
211
|
+
log_error("check that your kernel supports capabilities");
|
212
|
+
return -1;
|
213
|
+
}
|
214
|
+
return 0;
|
215
|
+
}
|
216
|
+
|
217
|
+
#ifdef HAVE_LIBCAP
|
218
|
+
static cap_value_t caps_std[] = {
|
219
|
+
CAP_NET_BIND_SERVICE,
|
220
|
+
CAP_SETUID,
|
221
|
+
CAP_SETGID,
|
222
|
+
CAP_DAC_READ_SEARCH
|
223
|
+
};
|
224
|
+
|
225
|
+
static cap_value_t caps_min[] = {
|
226
|
+
CAP_NET_BIND_SERVICE,
|
227
|
+
CAP_DAC_READ_SEARCH
|
228
|
+
};
|
229
|
+
|
230
|
+
#define CAPS 1
|
231
|
+
#define CAPSMIN 2
|
232
|
+
|
233
|
+
|
234
|
+
typedef int (*fd_cap_free)(void *);
|
235
|
+
typedef cap_t (*fd_cap_init)(void);
|
236
|
+
typedef int (*fd_cap_clear)(cap_t);
|
237
|
+
typedef int (*fd_cap_get_flag)(cap_t, cap_value_t, cap_flag_t, cap_flag_value_t *);
|
238
|
+
typedef int (*fd_cap_set_flag)(cap_t, cap_flag_t, int, const cap_value_t *, cap_flag_value_t);
|
239
|
+
typedef int (*fd_cap_set_proc)(cap_t);
|
240
|
+
|
241
|
+
static dso_handle hlibcap = NULL;
|
242
|
+
static fd_cap_free fp_cap_free;
|
243
|
+
static fd_cap_init fp_cap_init;
|
244
|
+
static fd_cap_clear fp_cap_clear;
|
245
|
+
static fd_cap_get_flag fp_cap_get_flag;
|
246
|
+
static fd_cap_set_flag fp_cap_set_flag;
|
247
|
+
static fd_cap_set_proc fp_cap_set_proc;
|
248
|
+
|
249
|
+
static const char *libcap_locs[] = {
|
250
|
+
"/lib/libcap.so.2",
|
251
|
+
"/lib/libcap.so.1",
|
252
|
+
"/lib/libcap.so",
|
253
|
+
"/usr/lib/libcap.so.2",
|
254
|
+
"/usr/lib/libcap.so.1",
|
255
|
+
"/usr/lib/libcap.so",
|
256
|
+
NULL
|
257
|
+
};
|
258
|
+
|
259
|
+
static int ld_libcap(void)
|
260
|
+
{
|
261
|
+
int i = 0;
|
262
|
+
dso_handle dso = NULL;
|
263
|
+
#define CAP_LDD(name) \
|
264
|
+
if ((fp_##name = dso_symbol(dso, #name)) == NULL) { \
|
265
|
+
log_error("cannot locate " #name " in libcap.so -- %s", dso_error()); \
|
266
|
+
dso_unlink(dso); \
|
267
|
+
return -1; \
|
268
|
+
} else log_debug("loaded " #name " from libcap.")
|
269
|
+
|
270
|
+
if (hlibcap != NULL)
|
271
|
+
return 0;
|
272
|
+
while (libcap_locs[i] && dso == NULL) {
|
273
|
+
if ((dso = dso_link(libcap_locs[i++])))
|
274
|
+
break;
|
275
|
+
};
|
276
|
+
if (dso == NULL) {
|
277
|
+
log_error("failed loading capabilities library -- %s.", dso_error());
|
278
|
+
return -1;
|
279
|
+
}
|
280
|
+
CAP_LDD(cap_free);
|
281
|
+
CAP_LDD(cap_init);
|
282
|
+
CAP_LDD(cap_clear);
|
283
|
+
|
284
|
+
CAP_LDD(cap_get_flag);
|
285
|
+
CAP_LDD(cap_set_flag);
|
286
|
+
CAP_LDD(cap_set_proc);
|
287
|
+
hlibcap = dso;
|
288
|
+
#undef CAP_LDD
|
289
|
+
return 0;
|
290
|
+
}
|
291
|
+
|
292
|
+
|
293
|
+
static int set_caps(int cap_type)
|
294
|
+
{
|
295
|
+
cap_t c;
|
296
|
+
int ncap;
|
297
|
+
int flag = CAP_SET;
|
298
|
+
cap_value_t *caps;
|
299
|
+
const char *type;
|
300
|
+
|
301
|
+
if (ld_libcap()) {
|
302
|
+
return set_legacy_caps(cap_type);
|
303
|
+
}
|
304
|
+
if (cap_type == CAPS) {
|
305
|
+
ncap = sizeof(caps_std)/sizeof(cap_value_t);
|
306
|
+
caps = caps_std;
|
307
|
+
type = "default";
|
308
|
+
}
|
309
|
+
else if (cap_type == CAPSMIN) {
|
310
|
+
ncap = sizeof(caps_min)/sizeof(cap_value_t);
|
311
|
+
caps = caps_min;
|
312
|
+
type = "min";
|
313
|
+
}
|
314
|
+
else {
|
315
|
+
ncap = sizeof(caps_min)/sizeof(cap_value_t);
|
316
|
+
caps = caps_min;
|
317
|
+
type = "null";
|
318
|
+
flag = CAP_CLEAR;
|
319
|
+
}
|
320
|
+
c = (*fp_cap_init)();
|
321
|
+
(*fp_cap_clear)(c);
|
322
|
+
(*fp_cap_set_flag)(c, CAP_EFFECTIVE, ncap, caps, flag);
|
323
|
+
(*fp_cap_set_flag)(c, CAP_INHERITABLE, ncap, caps, flag);
|
324
|
+
(*fp_cap_set_flag)(c, CAP_PERMITTED, ncap, caps, flag);
|
325
|
+
if ((*fp_cap_set_proc)(c) != 0) {
|
326
|
+
log_error("failed setting %s capabilities.", type);
|
327
|
+
return -1;
|
328
|
+
}
|
329
|
+
(*fp_cap_free)(c);
|
330
|
+
if (cap_type == CAPS)
|
331
|
+
log_debug("increased capability set.");
|
332
|
+
else if (cap_type == CAPSMIN)
|
333
|
+
log_debug("decreased capability set to min required.");
|
334
|
+
else
|
335
|
+
log_debug("dropped capabilities.");
|
336
|
+
return 0;
|
337
|
+
}
|
338
|
+
|
339
|
+
#else /* !HAVE_LIBCAP */
|
340
|
+
/* CAPSALL is to allow to read/write at any location */
|
341
|
+
#define CAPSALL LEGACY_CAPSALL
|
342
|
+
#define CAPSMAX LEGACY_CAPSMAX
|
343
|
+
#define CAPS LEGACY_CAPS
|
344
|
+
#define CAPSMIN LEGACY_CAPSMIN
|
345
|
+
static int set_caps(int caps)
|
346
|
+
{
|
347
|
+
return set_legacy_caps(caps);
|
348
|
+
}
|
349
|
+
#endif
|
350
|
+
|
351
|
+
static int linuxset_user_group(const char *user, int uid, int gid)
|
352
|
+
{
|
353
|
+
int caps_set = 0;
|
354
|
+
|
355
|
+
if (user == NULL)
|
356
|
+
return 0;
|
357
|
+
/* set capabilities enough for binding port 80 setuid/getuid */
|
358
|
+
if (getuid() == 0) {
|
359
|
+
if (set_caps(CAPS) != 0) {
|
360
|
+
if (getuid() != uid) {
|
361
|
+
log_error("set_caps(CAPS) failed for user '%s'", user);
|
362
|
+
return -1;
|
363
|
+
}
|
364
|
+
log_debug("set_caps(CAPS) failed for user '%s'", user);
|
365
|
+
}
|
366
|
+
/* make sure they are kept after setuid */
|
367
|
+
if (prctl(PR_SET_KEEPCAPS, 1, 0, 0, 0) < 0) {
|
368
|
+
log_error("prctl failed in for user '%s'", user);
|
369
|
+
return -1;
|
370
|
+
}
|
371
|
+
caps_set = 1;
|
372
|
+
}
|
373
|
+
|
374
|
+
/* set setuid/getuid */
|
375
|
+
if (set_user_group(user, uid, gid) != 0) {
|
376
|
+
log_error("set_user_group failed for user '%s'", user);
|
377
|
+
return -1;
|
378
|
+
}
|
379
|
+
|
380
|
+
if (caps_set) {
|
381
|
+
/* set capability to binding port 80 read conf */
|
382
|
+
if (set_caps(CAPSMIN) != 0) {
|
383
|
+
if (getuid() != uid) {
|
384
|
+
log_error("set_caps(CAPSMIN) failed for user '%s'", user);
|
385
|
+
return -1;
|
386
|
+
}
|
387
|
+
log_debug("set_caps(CAPSMIN) failed for user '%s'", user);
|
388
|
+
}
|
389
|
+
}
|
390
|
+
|
391
|
+
return 0;
|
392
|
+
}
|
393
|
+
#endif
|
394
|
+
|
395
|
+
|
396
|
+
static bool checkuser(char *user, uid_t * uid, gid_t * gid)
|
397
|
+
{
|
398
|
+
struct passwd *pwds = NULL;
|
399
|
+
int status = 0;
|
400
|
+
pid_t pid = 0;
|
401
|
+
|
402
|
+
/* Do we actually _have_ to switch user? */
|
403
|
+
if (user == NULL)
|
404
|
+
return true;
|
405
|
+
|
406
|
+
pwds = getpwnam(user);
|
407
|
+
if (pwds == NULL) {
|
408
|
+
log_error("Invalid user name '%s' specified", user);
|
409
|
+
return false;
|
410
|
+
}
|
411
|
+
|
412
|
+
*uid = pwds->pw_uid;
|
413
|
+
*gid = pwds->pw_gid;
|
414
|
+
|
415
|
+
/* Validate the user name in another process */
|
416
|
+
pid = fork();
|
417
|
+
if (pid == -1) {
|
418
|
+
log_error("Cannot validate user name");
|
419
|
+
return false;
|
420
|
+
}
|
421
|
+
|
422
|
+
/* If we're in the child process, let's validate */
|
423
|
+
if (pid == 0) {
|
424
|
+
if (set_user_group(user, *uid, *gid) != 0)
|
425
|
+
exit(1);
|
426
|
+
/* If we got here we switched user/group */
|
427
|
+
exit(0);
|
428
|
+
}
|
429
|
+
|
430
|
+
while (waitpid(pid, &status, 0) != pid) {
|
431
|
+
/* Just wait */
|
432
|
+
}
|
433
|
+
|
434
|
+
/* The child must have exited cleanly */
|
435
|
+
if (WIFEXITED(status)) {
|
436
|
+
status = WEXITSTATUS(status);
|
437
|
+
|
438
|
+
/* If the child got out with 0 the user is ok */
|
439
|
+
if (status == 0) {
|
440
|
+
log_debug("User '%s' validated", user);
|
441
|
+
return true;
|
442
|
+
}
|
443
|
+
}
|
444
|
+
|
445
|
+
log_error("Error validating user '%s'", user);
|
446
|
+
return false;
|
447
|
+
}
|
448
|
+
|
449
|
+
#ifdef OS_CYGWIN
|
450
|
+
static void cygwincontroller(void)
|
451
|
+
{
|
452
|
+
raise(SIGTERM);
|
453
|
+
}
|
454
|
+
#endif
|
455
|
+
static void controller(int sig)
|
456
|
+
{
|
457
|
+
switch (sig) {
|
458
|
+
case SIGTERM:
|
459
|
+
case SIGINT:
|
460
|
+
case SIGHUP:
|
461
|
+
case SIGUSR1:
|
462
|
+
case SIGUSR2:
|
463
|
+
log_debug("Forwarding signal %d to process %d", sig, controlled);
|
464
|
+
kill(controlled, sig);
|
465
|
+
signal(sig, controller);
|
466
|
+
break;
|
467
|
+
default:
|
468
|
+
log_debug("Caught unknown signal %d", sig);
|
469
|
+
break;
|
470
|
+
}
|
471
|
+
}
|
472
|
+
|
473
|
+
/*
|
474
|
+
* Return the address of the current signal handler and set the new one.
|
475
|
+
*/
|
476
|
+
static sighandler_t signal_set(int sig, sighandler_t newHandler)
|
477
|
+
{
|
478
|
+
sighandler_t hand;
|
479
|
+
|
480
|
+
hand = signal(sig, newHandler);
|
481
|
+
#ifdef SIG_ERR
|
482
|
+
if (hand == SIG_ERR)
|
483
|
+
hand = NULL;
|
484
|
+
#endif
|
485
|
+
if (hand == handler || hand == controller)
|
486
|
+
hand = NULL;
|
487
|
+
return hand;
|
488
|
+
}
|
489
|
+
|
490
|
+
/*
|
491
|
+
* Check pid and if still running
|
492
|
+
*/
|
493
|
+
|
494
|
+
static int check_pid(arg_data *args)
|
495
|
+
{
|
496
|
+
int fd;
|
497
|
+
FILE *pidf;
|
498
|
+
char buff[80];
|
499
|
+
pid_t pidn = getpid();
|
500
|
+
int i, pid;
|
501
|
+
|
502
|
+
fd = open(args->pidf, O_RDWR | O_CREAT, S_IRUSR | S_IWUSR);
|
503
|
+
if (fd < 0) {
|
504
|
+
log_error("Cannot open PID file %s, PID is %d", args->pidf, pidn);
|
505
|
+
return -1;
|
506
|
+
}
|
507
|
+
else {
|
508
|
+
lockf(fd, F_LOCK, 0);
|
509
|
+
i = read(fd, buff, sizeof(buff));
|
510
|
+
if (i > 0) {
|
511
|
+
buff[i] = '\0';
|
512
|
+
pid = atoi(buff);
|
513
|
+
if (kill(pid, 0) == 0) {
|
514
|
+
log_error("Still running according to PID file %s, PID is %d",
|
515
|
+
args->pidf, pid);
|
516
|
+
lockf(fd, F_ULOCK, 0);
|
517
|
+
close(fd);
|
518
|
+
return 122;
|
519
|
+
}
|
520
|
+
}
|
521
|
+
|
522
|
+
/* skip writing the pid file if version or check */
|
523
|
+
if (args->vers != true && args->chck != true) {
|
524
|
+
lseek(fd, SEEK_SET, 0);
|
525
|
+
pidf = fdopen(fd, "r+");
|
526
|
+
fprintf(pidf, "%d\n", (int)getpid());
|
527
|
+
fflush(pidf);
|
528
|
+
lockf(fd, F_ULOCK, 0);
|
529
|
+
fclose(pidf);
|
530
|
+
close(fd);
|
531
|
+
}
|
532
|
+
else {
|
533
|
+
lockf(fd, F_ULOCK, 0);
|
534
|
+
close(fd);
|
535
|
+
}
|
536
|
+
}
|
537
|
+
return 0;
|
538
|
+
}
|
539
|
+
|
540
|
+
/*
|
541
|
+
* read the pid from the pidfile
|
542
|
+
*/
|
543
|
+
static int get_pidf(arg_data *args, bool quiet)
|
544
|
+
{
|
545
|
+
int fd;
|
546
|
+
int i;
|
547
|
+
char buff[80];
|
548
|
+
|
549
|
+
fd = open(args->pidf, O_RDONLY, 0);
|
550
|
+
if (!quiet)
|
551
|
+
log_debug("get_pidf: %d in %s", fd, args->pidf);
|
552
|
+
if (fd < 0) {
|
553
|
+
/* something has gone wrong the JVM has stopped */
|
554
|
+
return -1;
|
555
|
+
}
|
556
|
+
lockf(fd, F_LOCK, 0);
|
557
|
+
i = read(fd, buff, sizeof(buff));
|
558
|
+
lockf(fd, F_ULOCK, 0);
|
559
|
+
close(fd);
|
560
|
+
if (i > 0) {
|
561
|
+
buff[i] = '\0';
|
562
|
+
i = atoi(buff);
|
563
|
+
if (!quiet)
|
564
|
+
log_debug("get_pidf: pid %d", i);
|
565
|
+
if (kill(i, 0) == 0)
|
566
|
+
return i;
|
567
|
+
}
|
568
|
+
return -1;
|
569
|
+
}
|
570
|
+
|
571
|
+
/*
|
572
|
+
* Check temporatory file created by controller
|
573
|
+
* /tmp/pid.jsvc_up
|
574
|
+
* Notes:
|
575
|
+
* we fork several times
|
576
|
+
* 1 - to be a daemon before the setsid(), the child is the controler process.
|
577
|
+
* 2 - to start the JVM in the child process. (whose pid is stored in pidfile).
|
578
|
+
*/
|
579
|
+
static int check_tmp_file(arg_data *args)
|
580
|
+
{
|
581
|
+
int pid;
|
582
|
+
char buff[80];
|
583
|
+
int fd;
|
584
|
+
|
585
|
+
pid = get_pidf(args, false);
|
586
|
+
if (pid < 0)
|
587
|
+
return -1;
|
588
|
+
sprintf(buff, "/tmp/%d.jsvc_up", pid);
|
589
|
+
log_debug("check_tmp_file: %s", buff);
|
590
|
+
fd = open(buff, O_RDONLY);
|
591
|
+
if (fd == -1)
|
592
|
+
return -1;
|
593
|
+
close(fd);
|
594
|
+
return 0;
|
595
|
+
}
|
596
|
+
|
597
|
+
static void create_tmp_file(arg_data *args)
|
598
|
+
{
|
599
|
+
char buff[80];
|
600
|
+
int fd;
|
601
|
+
|
602
|
+
sprintf(buff, "/tmp/%d.jsvc_up", (int)getpid());
|
603
|
+
log_debug("create_tmp_file: %s", buff);
|
604
|
+
fd = open(buff, O_RDWR | O_CREAT, S_IRUSR | S_IWUSR);
|
605
|
+
if (fd != -1)
|
606
|
+
close(fd);
|
607
|
+
}
|
608
|
+
|
609
|
+
static void remove_tmp_file(arg_data *args)
|
610
|
+
{
|
611
|
+
char buff[80];
|
612
|
+
|
613
|
+
sprintf(buff, "/tmp/%d.jsvc_up", (int)getpid());
|
614
|
+
log_debug("remove_tmp_file: %s", buff);
|
615
|
+
unlink(buff);
|
616
|
+
}
|
617
|
+
|
618
|
+
/*
|
619
|
+
* wait until jsvc create the I am ready file
|
620
|
+
* pid is the controller and args->pidf the JVM itself.
|
621
|
+
*/
|
622
|
+
static int wait_child(arg_data *args, int pid)
|
623
|
+
{
|
624
|
+
int count = 10;
|
625
|
+
bool havejvm = false;
|
626
|
+
int fd;
|
627
|
+
char buff[80];
|
628
|
+
int i, status, waittime;
|
629
|
+
|
630
|
+
log_debug("wait_child %d", pid);
|
631
|
+
waittime = args->wait / 10;
|
632
|
+
if (waittime > 10) {
|
633
|
+
count = waittime;
|
634
|
+
waittime = 10;
|
635
|
+
}
|
636
|
+
while (count > 0) {
|
637
|
+
sleep(1);
|
638
|
+
/* check if the controler is still running */
|
639
|
+
if (waitpid(pid, &status, WNOHANG) == pid) {
|
640
|
+
if (WIFEXITED(status))
|
641
|
+
return (WEXITSTATUS(status));
|
642
|
+
else
|
643
|
+
return 1;
|
644
|
+
}
|
645
|
+
|
646
|
+
/* check if the pid file process exists */
|
647
|
+
fd = open(args->pidf, O_RDONLY);
|
648
|
+
if (fd < 0 && havejvm) {
|
649
|
+
/* something has gone wrong the JVM has stopped */
|
650
|
+
return 1;
|
651
|
+
}
|
652
|
+
lockf(fd, F_LOCK, 0);
|
653
|
+
i = read(fd, buff, sizeof(buff));
|
654
|
+
lockf(fd, F_ULOCK, 0);
|
655
|
+
close(fd);
|
656
|
+
if (i > 0) {
|
657
|
+
buff[i] = '\0';
|
658
|
+
i = atoi(buff);
|
659
|
+
if (kill(i, 0) == 0) {
|
660
|
+
/* the JVM process has started */
|
661
|
+
havejvm = true;
|
662
|
+
if (check_tmp_file(args) == 0) {
|
663
|
+
/* the JVM is started */
|
664
|
+
if (waitpid(pid, &status, WNOHANG) == pid) {
|
665
|
+
if (WIFEXITED(status))
|
666
|
+
return (WEXITSTATUS(status));
|
667
|
+
else
|
668
|
+
return 1;
|
669
|
+
}
|
670
|
+
return 0; /* ready JVM started */
|
671
|
+
}
|
672
|
+
}
|
673
|
+
}
|
674
|
+
sleep(waittime);
|
675
|
+
count--;
|
676
|
+
}
|
677
|
+
/* It takes more than the wait time to start,
|
678
|
+
* something must be wrong
|
679
|
+
*/
|
680
|
+
return 1;
|
681
|
+
}
|
682
|
+
|
683
|
+
/*
|
684
|
+
* stop the running jsvc
|
685
|
+
*/
|
686
|
+
static int stop_child(arg_data *args)
|
687
|
+
{
|
688
|
+
int pid = get_pidf(args, false);
|
689
|
+
int count = 60;
|
690
|
+
|
691
|
+
if (pid > 0) {
|
692
|
+
/* kill the process and wait until the pidfile has been
|
693
|
+
* removed by the controler
|
694
|
+
*/
|
695
|
+
kill(pid, SIGTERM);
|
696
|
+
while (count > 0) {
|
697
|
+
sleep(1);
|
698
|
+
pid = get_pidf(args, true);
|
699
|
+
if (pid <= 0) {
|
700
|
+
/* JVM has stopped */
|
701
|
+
return 0;
|
702
|
+
}
|
703
|
+
count--;
|
704
|
+
}
|
705
|
+
}
|
706
|
+
return -1;
|
707
|
+
}
|
708
|
+
|
709
|
+
/*
|
710
|
+
* child process logic.
|
711
|
+
*/
|
712
|
+
|
713
|
+
static int child(arg_data *args, home_data *data, uid_t uid, gid_t gid)
|
714
|
+
{
|
715
|
+
int ret = 0;
|
716
|
+
|
717
|
+
/* check the pid file */
|
718
|
+
ret = check_pid(args);
|
719
|
+
if (args->vers != true && args->chck != true) {
|
720
|
+
if (ret == 122)
|
721
|
+
return ret;
|
722
|
+
if (ret < 0)
|
723
|
+
return ret;
|
724
|
+
}
|
725
|
+
|
726
|
+
#ifdef OS_LINUX
|
727
|
+
/* setuid()/setgid() only apply the current thread so we must do it now */
|
728
|
+
if (linuxset_user_group(args->user, uid, gid) != 0)
|
729
|
+
return 4;
|
730
|
+
#endif
|
731
|
+
/* Initialize the Java VM */
|
732
|
+
if (java_init(args, data) != true) {
|
733
|
+
log_debug("java_init failed");
|
734
|
+
return 1;
|
735
|
+
}
|
736
|
+
else
|
737
|
+
log_debug("java_init done");
|
738
|
+
|
739
|
+
/* Check wether we need to dump the VM version */
|
740
|
+
if (args->vers == true) {
|
741
|
+
log_error("jsvc (Apache Commons Daemon) " JSVC_VERSION_STRING);
|
742
|
+
log_error("Copyright (c) 1999-2011 Apache Software Foundation.");
|
743
|
+
if (java_version() != true) {
|
744
|
+
return -1;
|
745
|
+
}
|
746
|
+
else
|
747
|
+
return 0;
|
748
|
+
}
|
749
|
+
/* Check wether we need to dump the VM version */
|
750
|
+
else if (args->vershow == true) {
|
751
|
+
if (java_version() != true) {
|
752
|
+
return 7;
|
753
|
+
}
|
754
|
+
}
|
755
|
+
|
756
|
+
/* Do we have to do a "check-only" initialization? */
|
757
|
+
if (args->chck == true) {
|
758
|
+
if (java_check(args) != true)
|
759
|
+
return 2;
|
760
|
+
printf("Service \"%s\" checked successfully\n", args->clas);
|
761
|
+
return 0;
|
762
|
+
}
|
763
|
+
|
764
|
+
/* Load the service */
|
765
|
+
if (java_load(args) != true) {
|
766
|
+
log_debug("java_load failed");
|
767
|
+
return 3;
|
768
|
+
}
|
769
|
+
else
|
770
|
+
log_debug("java_load done");
|
771
|
+
|
772
|
+
/* Downgrade user */
|
773
|
+
#ifdef OS_LINUX
|
774
|
+
if (args->user && set_caps(0) != 0) {
|
775
|
+
log_debug("set_caps (0) failed");
|
776
|
+
return 4;
|
777
|
+
}
|
778
|
+
#else
|
779
|
+
if (set_user_group(args->user, uid, gid) != 0)
|
780
|
+
return 4;
|
781
|
+
#endif
|
782
|
+
|
783
|
+
/* Start the service */
|
784
|
+
umask(envmask);
|
785
|
+
if (java_start() != true) {
|
786
|
+
log_debug("java_start failed");
|
787
|
+
return 5;
|
788
|
+
}
|
789
|
+
else
|
790
|
+
log_debug("java_start done");
|
791
|
+
|
792
|
+
/* Install signal handlers */
|
793
|
+
handler_hup = signal_set(SIGHUP, handler);
|
794
|
+
handler_usr1 = signal_set(SIGUSR1, handler);
|
795
|
+
handler_usr2 = signal_set(SIGUSR2, handler);
|
796
|
+
handler_trm = signal_set(SIGTERM, handler);
|
797
|
+
handler_int = signal_set(SIGINT, handler);
|
798
|
+
controlled = getpid();
|
799
|
+
|
800
|
+
log_debug("Waiting for a signal to be delivered");
|
801
|
+
create_tmp_file(args);
|
802
|
+
while (!stopping) {
|
803
|
+
#if defined(OSD_POSIX)
|
804
|
+
java_sleep(60);
|
805
|
+
/* pause(); */
|
806
|
+
#else
|
807
|
+
/* pause() is not threadsafe */
|
808
|
+
sleep(60);
|
809
|
+
#endif
|
810
|
+
if(doreopen) {
|
811
|
+
doreopen = false;
|
812
|
+
set_output(args->outfile, args->errfile, args->redirectstdin, args->procname);
|
813
|
+
}
|
814
|
+
if(dosignal) {
|
815
|
+
dosignal = false;
|
816
|
+
java_signal();
|
817
|
+
}
|
818
|
+
}
|
819
|
+
remove_tmp_file(args);
|
820
|
+
log_debug("Shutdown or reload requested: exiting");
|
821
|
+
|
822
|
+
/* Stop the service */
|
823
|
+
if (java_stop() != true)
|
824
|
+
return 6;
|
825
|
+
|
826
|
+
if (doreload == true)
|
827
|
+
ret = 123;
|
828
|
+
else
|
829
|
+
ret = 0;
|
830
|
+
|
831
|
+
/* Destroy the service */
|
832
|
+
java_destroy();
|
833
|
+
|
834
|
+
/* Destroy the Java VM */
|
835
|
+
if (JVM_destroy(ret) != true)
|
836
|
+
return 7;
|
837
|
+
|
838
|
+
return ret;
|
839
|
+
}
|
840
|
+
|
841
|
+
/*
|
842
|
+
* freopen close the file first and then open the new file
|
843
|
+
* that is not very good if we are try to trace the output
|
844
|
+
* note the code assumes that the errors are configuration errors.
|
845
|
+
*/
|
846
|
+
static FILE *loc_freopen(char *outfile, char *mode, FILE * stream)
|
847
|
+
{
|
848
|
+
FILE *ftest;
|
849
|
+
|
850
|
+
ftest = fopen(outfile, mode);
|
851
|
+
if (ftest == NULL) {
|
852
|
+
fprintf(stderr, "Unable to redirect to %s\n", outfile);
|
853
|
+
return stream;
|
854
|
+
}
|
855
|
+
fclose(ftest);
|
856
|
+
return freopen(outfile, mode, stream);
|
857
|
+
}
|
858
|
+
|
859
|
+
#define LOGBUF_SIZE 1024
|
860
|
+
|
861
|
+
/* Read from file descriptors. Log to syslog. */
|
862
|
+
static int logger_child(int out_fd, int err_fd, char *procname)
|
863
|
+
{
|
864
|
+
fd_set rfds;
|
865
|
+
struct timeval tv;
|
866
|
+
int retval, nfd = -1, rc = 0;
|
867
|
+
ssize_t n;
|
868
|
+
char buf[LOGBUF_SIZE];
|
869
|
+
|
870
|
+
if (out_fd == -1 && err_fd == -1)
|
871
|
+
return EINVAL;
|
872
|
+
if (out_fd == -1)
|
873
|
+
nfd = err_fd;
|
874
|
+
else if (err_fd == -1)
|
875
|
+
nfd = out_fd;
|
876
|
+
else
|
877
|
+
nfd = out_fd > err_fd ? out_fd : err_fd;
|
878
|
+
++nfd;
|
879
|
+
|
880
|
+
openlog(procname, LOG_PID, LOG_DAEMON);
|
881
|
+
|
882
|
+
while (out_fd != -1 || err_fd != -1) {
|
883
|
+
FD_ZERO(&rfds);
|
884
|
+
if (out_fd != -1) {
|
885
|
+
FD_SET(out_fd, &rfds);
|
886
|
+
}
|
887
|
+
if (err_fd != -1) {
|
888
|
+
FD_SET(err_fd, &rfds);
|
889
|
+
}
|
890
|
+
tv.tv_sec = 60;
|
891
|
+
tv.tv_usec = 0;
|
892
|
+
retval = select(nfd, &rfds, NULL, NULL, &tv);
|
893
|
+
if (retval == -1) {
|
894
|
+
rc = errno;
|
895
|
+
syslog(LOG_ERR, "select: %s", strerror(errno));
|
896
|
+
/* If select failed no point to continue */
|
897
|
+
break;
|
898
|
+
}
|
899
|
+
else if (retval) {
|
900
|
+
if (out_fd != -1 && FD_ISSET(out_fd, &rfds)) {
|
901
|
+
do {
|
902
|
+
n = read(out_fd, buf, LOGBUF_SIZE-1);
|
903
|
+
} while (n == -1 && errno == EINTR);
|
904
|
+
if (n == -1) {
|
905
|
+
syslog(LOG_ERR, "read: %s", strerror(errno));
|
906
|
+
close(out_fd);
|
907
|
+
if (err_fd == -1)
|
908
|
+
break;
|
909
|
+
nfd = err_fd + 1;
|
910
|
+
out_fd = -1;
|
911
|
+
}
|
912
|
+
else if (n > 0 && buf[0] != '\n') {
|
913
|
+
buf[n] = 0;
|
914
|
+
syslog(LOG_INFO, "%s", buf);
|
915
|
+
}
|
916
|
+
}
|
917
|
+
if (err_fd != -1 && FD_ISSET(err_fd, &rfds)) {
|
918
|
+
do {
|
919
|
+
n = read(err_fd, buf, LOGBUF_SIZE-1);
|
920
|
+
} while (n == -1 && errno == EINTR);
|
921
|
+
if (n == -1) {
|
922
|
+
syslog(LOG_ERR, "read: %s", strerror(errno));
|
923
|
+
close(err_fd);
|
924
|
+
if (out_fd == -1)
|
925
|
+
break;
|
926
|
+
nfd = out_fd + 1;
|
927
|
+
err_fd = -1;
|
928
|
+
}
|
929
|
+
else if (n > 0 && buf[0] != '\n') {
|
930
|
+
buf[n] = 0;
|
931
|
+
syslog(LOG_ERR, "%s", buf);
|
932
|
+
}
|
933
|
+
}
|
934
|
+
}
|
935
|
+
}
|
936
|
+
return rc;
|
937
|
+
}
|
938
|
+
|
939
|
+
/**
|
940
|
+
* Redirect stdin, stdout, stderr.
|
941
|
+
*/
|
942
|
+
static void set_output(char *outfile, char *errfile, bool redirectstdin, char *procname)
|
943
|
+
{
|
944
|
+
int out_pipe[2] = {-1, -1};
|
945
|
+
int err_pipe[2] = {-1, -1};
|
946
|
+
int fork_needed = 0;
|
947
|
+
|
948
|
+
if (redirectstdin == true) {
|
949
|
+
freopen("/dev/null", "r", stdin);
|
950
|
+
}
|
951
|
+
|
952
|
+
log_debug("redirecting stdout to %s and stderr to %s", outfile, errfile);
|
953
|
+
|
954
|
+
/* make sure the debug goes out */
|
955
|
+
if (log_debug_flag == true && strcmp(errfile, "/dev/null") == 0)
|
956
|
+
return;
|
957
|
+
if (strcmp(outfile, "&1") == 0 && strcmp(errfile, "&2") == 0)
|
958
|
+
return;
|
959
|
+
if (strcmp(outfile, "SYSLOG") == 0) {
|
960
|
+
freopen("/dev/null", "a", stdout);
|
961
|
+
/* Send stdout to syslog through a logger process */
|
962
|
+
if (pipe(out_pipe) == -1) {
|
963
|
+
log_error("cannot create stdout pipe: %s",
|
964
|
+
strerror(errno));
|
965
|
+
}
|
966
|
+
else {
|
967
|
+
fork_needed = 1;
|
968
|
+
log_stdout_syslog_flag = true;
|
969
|
+
}
|
970
|
+
}
|
971
|
+
else if (strcmp(outfile, "&2")) {
|
972
|
+
if (strcmp(outfile, "&1")) {
|
973
|
+
/* Redirect stdout to a file */
|
974
|
+
loc_freopen(outfile, "a", stdout);
|
975
|
+
}
|
976
|
+
}
|
977
|
+
|
978
|
+
if (strcmp(errfile, "SYSLOG") == 0) {
|
979
|
+
freopen("/dev/null", "a", stderr);
|
980
|
+
/* Send stderr to syslog through a logger process */
|
981
|
+
if (pipe(err_pipe) == -1) {
|
982
|
+
log_error("cannot create stderr pipe: %s",
|
983
|
+
strerror(errno));
|
984
|
+
}
|
985
|
+
else {
|
986
|
+
fork_needed = 1;
|
987
|
+
log_stderr_syslog_flag = true;
|
988
|
+
}
|
989
|
+
}
|
990
|
+
else if (strcmp(errfile, "&1")) {
|
991
|
+
if (strcmp(errfile, "&2")) {
|
992
|
+
/* Redirect stderr to a file */
|
993
|
+
loc_freopen(errfile, "a", stderr);
|
994
|
+
}
|
995
|
+
}
|
996
|
+
if (strcmp(errfile, "&1") == 0 && strcmp(outfile, "&1")) {
|
997
|
+
/*
|
998
|
+
* -errfile &1 -outfile foo
|
999
|
+
* Redirect stderr to stdout
|
1000
|
+
*/
|
1001
|
+
close(2);
|
1002
|
+
dup2(1, 2);
|
1003
|
+
}
|
1004
|
+
if (strcmp(outfile, "&2") == 0 && strcmp(errfile, "&2")) {
|
1005
|
+
/*
|
1006
|
+
* -outfile &2 -errfile foo
|
1007
|
+
* Redirect stdout to stderr
|
1008
|
+
*/
|
1009
|
+
close(1);
|
1010
|
+
dup2(2, 1);
|
1011
|
+
}
|
1012
|
+
|
1013
|
+
if (fork_needed) {
|
1014
|
+
pid_t pid = fork();
|
1015
|
+
if (pid == -1) {
|
1016
|
+
log_error("cannot create logger process: %s", strerror(errno));
|
1017
|
+
}
|
1018
|
+
else {
|
1019
|
+
if (pid != 0) {
|
1020
|
+
/* Parent process.
|
1021
|
+
* Close child pipe endpoints.
|
1022
|
+
*/
|
1023
|
+
logger_pid = pid;
|
1024
|
+
if (out_pipe[0] != -1) {
|
1025
|
+
close(out_pipe[0]);
|
1026
|
+
if (dup2(out_pipe[1], 1) == -1) {
|
1027
|
+
log_error("cannot redirect stdout to pipe for syslog: %s",
|
1028
|
+
strerror(errno));
|
1029
|
+
}
|
1030
|
+
}
|
1031
|
+
if (err_pipe[0] != -1) {
|
1032
|
+
close(err_pipe[0]);
|
1033
|
+
if (dup2(err_pipe[1], 2) == -1) {
|
1034
|
+
log_error("cannot redirect stderr to pipe for syslog: %s",
|
1035
|
+
strerror(errno));
|
1036
|
+
}
|
1037
|
+
}
|
1038
|
+
}
|
1039
|
+
else {
|
1040
|
+
exit(logger_child(out_pipe[0], err_pipe[0], procname));
|
1041
|
+
}
|
1042
|
+
}
|
1043
|
+
}
|
1044
|
+
}
|
1045
|
+
|
1046
|
+
int main(int argc, char *argv[])
|
1047
|
+
{
|
1048
|
+
arg_data *args = NULL;
|
1049
|
+
home_data *data = NULL;
|
1050
|
+
pid_t pid = 0;
|
1051
|
+
uid_t uid = 0;
|
1052
|
+
gid_t gid = 0;
|
1053
|
+
int res;
|
1054
|
+
|
1055
|
+
/* Parse command line arguments */
|
1056
|
+
args = arguments(argc, argv);
|
1057
|
+
if (args == NULL)
|
1058
|
+
return 1;
|
1059
|
+
|
1060
|
+
/* Stop running jsvc if required */
|
1061
|
+
if (args->stop == true)
|
1062
|
+
return (stop_child(args));
|
1063
|
+
|
1064
|
+
/* Let's check if we can switch user/group IDs */
|
1065
|
+
if (checkuser(args->user, &uid, &gid) == false)
|
1066
|
+
return 1;
|
1067
|
+
|
1068
|
+
/* Retrieve JAVA_HOME layout */
|
1069
|
+
data = home(args->home);
|
1070
|
+
if (data == NULL)
|
1071
|
+
return 1;
|
1072
|
+
|
1073
|
+
/* Check for help */
|
1074
|
+
if (args->help == true) {
|
1075
|
+
help(data);
|
1076
|
+
return 0;
|
1077
|
+
}
|
1078
|
+
|
1079
|
+
#ifdef OS_LINUX
|
1080
|
+
/* On some UNIX operating systems, we need to REPLACE this current
|
1081
|
+
process image with another one (thru execve) to allow the correct
|
1082
|
+
loading of VMs (notably this is for Linux). Set, replace, and go. */
|
1083
|
+
if (strcmp(argv[0], args->procname) != 0) {
|
1084
|
+
char *oldpath = getenv("LD_LIBRARY_PATH");
|
1085
|
+
char *libf = java_library(args, data);
|
1086
|
+
char *filename;
|
1087
|
+
char buf[2048];
|
1088
|
+
int ret;
|
1089
|
+
char *tmp = NULL;
|
1090
|
+
char *p1 = NULL;
|
1091
|
+
char *p2 = NULL;
|
1092
|
+
|
1093
|
+
/*
|
1094
|
+
* There is no need to change LD_LIBRARY_PATH
|
1095
|
+
* if we were not able to find a path to libjvm.so
|
1096
|
+
* (additionaly a strdup(NULL) cores dump on my machine).
|
1097
|
+
*/
|
1098
|
+
if (libf != NULL) {
|
1099
|
+
p1 = strdup(libf);
|
1100
|
+
tmp = strrchr(p1, '/');
|
1101
|
+
if (tmp != NULL)
|
1102
|
+
tmp[0] = '\0';
|
1103
|
+
|
1104
|
+
p2 = strdup(p1);
|
1105
|
+
tmp = strrchr(p2, '/');
|
1106
|
+
if (tmp != NULL)
|
1107
|
+
tmp[0] = '\0';
|
1108
|
+
|
1109
|
+
if (oldpath == NULL)
|
1110
|
+
snprintf(buf, 2048, "%s:%s", p1, p2);
|
1111
|
+
else
|
1112
|
+
snprintf(buf, 2048, "%s:%s:%s", oldpath, p1, p2);
|
1113
|
+
|
1114
|
+
tmp = strdup(buf);
|
1115
|
+
setenv("LD_LIBRARY_PATH", tmp, 1);
|
1116
|
+
|
1117
|
+
log_debug("Invoking w/ LD_LIBRARY_PATH=%s",
|
1118
|
+
getenv("LD_LIBRARY_PATH"));
|
1119
|
+
}
|
1120
|
+
|
1121
|
+
/* execve needs a full path */
|
1122
|
+
ret = readlink("/proc/self/exe", buf, sizeof(buf) - 1);
|
1123
|
+
if (ret <= 0)
|
1124
|
+
strcpy(buf, argv[0]);
|
1125
|
+
else
|
1126
|
+
buf[ret] = '\0';
|
1127
|
+
|
1128
|
+
filename = buf;
|
1129
|
+
|
1130
|
+
argv[0] = args->procname;
|
1131
|
+
execve(filename, argv, environ);
|
1132
|
+
log_error("Cannot execute JSVC executor process (%s)", filename);
|
1133
|
+
return 1;
|
1134
|
+
}
|
1135
|
+
log_debug("Running w/ LD_LIBRARY_PATH=%s", getenv("LD_LIBRARY_PATH"));
|
1136
|
+
#endif /* ifdef OS_LINUX */
|
1137
|
+
|
1138
|
+
/* If we have to detach, let's do it now */
|
1139
|
+
if (args->dtch == true) {
|
1140
|
+
pid = fork();
|
1141
|
+
if (pid == -1) {
|
1142
|
+
log_error("Cannot detach from parent process");
|
1143
|
+
return 1;
|
1144
|
+
}
|
1145
|
+
/* If we're in the parent process */
|
1146
|
+
if (pid != 0) {
|
1147
|
+
if (args->wait >= 10)
|
1148
|
+
return wait_child(args, pid);
|
1149
|
+
else
|
1150
|
+
return 0;
|
1151
|
+
}
|
1152
|
+
#ifndef NO_SETSID
|
1153
|
+
setsid();
|
1154
|
+
#endif
|
1155
|
+
}
|
1156
|
+
|
1157
|
+
/*
|
1158
|
+
* umask() uses inverse logic; bits are CLEAR for allowed access.
|
1159
|
+
*/
|
1160
|
+
if (~args->umask & 0022) {
|
1161
|
+
log_error("NOTICE: jsvc umask of %03o allows "
|
1162
|
+
"write permission to group and/or other", args->umask);
|
1163
|
+
}
|
1164
|
+
envmask = umask(args->umask);
|
1165
|
+
set_output(args->outfile, args->errfile, args->redirectstdin, args->procname);
|
1166
|
+
log_debug("Switching umask back to %03o from %03o", envmask, args->umask);
|
1167
|
+
res = run_controller(args, data, uid, gid);
|
1168
|
+
if (logger_pid != 0) {
|
1169
|
+
kill(logger_pid, SIGTERM);
|
1170
|
+
}
|
1171
|
+
|
1172
|
+
return res;
|
1173
|
+
}
|
1174
|
+
|
1175
|
+
static int run_controller(arg_data *args, home_data *data, uid_t uid,
|
1176
|
+
gid_t gid)
|
1177
|
+
{
|
1178
|
+
pid_t pid = 0;
|
1179
|
+
|
1180
|
+
|
1181
|
+
/* We have to fork: this process will become the controller and the other
|
1182
|
+
will be the child */
|
1183
|
+
while ((pid = fork()) != -1) {
|
1184
|
+
time_t laststart;
|
1185
|
+
int status = 0;
|
1186
|
+
/* We forked (again), if this is the child, we go on normally */
|
1187
|
+
if (pid == 0)
|
1188
|
+
exit(child(args, data, uid, gid));
|
1189
|
+
laststart = time(NULL);
|
1190
|
+
|
1191
|
+
/* We are in the controller, we have to forward all interesting signals
|
1192
|
+
to the child, and wait for it to die */
|
1193
|
+
controlled = pid;
|
1194
|
+
#ifdef OS_CYGWIN
|
1195
|
+
SetTerm(cygwincontroller);
|
1196
|
+
#endif
|
1197
|
+
signal(SIGHUP, controller);
|
1198
|
+
signal(SIGUSR1, controller);
|
1199
|
+
signal(SIGUSR2, controller);
|
1200
|
+
signal(SIGTERM, controller);
|
1201
|
+
signal(SIGINT, controller);
|
1202
|
+
|
1203
|
+
while (waitpid(pid, &status, 0) != pid) {
|
1204
|
+
/* Waith for process */
|
1205
|
+
}
|
1206
|
+
|
1207
|
+
/* The child must have exited cleanly */
|
1208
|
+
if (WIFEXITED(status)) {
|
1209
|
+
status = WEXITSTATUS(status);
|
1210
|
+
|
1211
|
+
/* Delete the pid file */
|
1212
|
+
if (args->vers != true && args->chck != true && status != 122)
|
1213
|
+
unlink(args->pidf);
|
1214
|
+
|
1215
|
+
/* If the child got out with 123 he wants to be restarted */
|
1216
|
+
/* See java_abort123 (we use this return code to restart when the JVM aborts) */
|
1217
|
+
if (status == 123) {
|
1218
|
+
log_debug("Reloading service");
|
1219
|
+
/* prevent looping */
|
1220
|
+
if (laststart + 60 > time(NULL)) {
|
1221
|
+
log_debug("Waiting 60 s to prevent looping");
|
1222
|
+
sleep(60);
|
1223
|
+
}
|
1224
|
+
continue;
|
1225
|
+
}
|
1226
|
+
/* If the child got out with 0 he is shutting down */
|
1227
|
+
if (status == 0) {
|
1228
|
+
log_debug("Service shut down");
|
1229
|
+
return 0;
|
1230
|
+
}
|
1231
|
+
/* Otherwise we don't rerun it */
|
1232
|
+
log_error("Service exit with a return value of %d", status);
|
1233
|
+
return 1;
|
1234
|
+
|
1235
|
+
}
|
1236
|
+
else {
|
1237
|
+
if (WIFSIGNALED(status)) {
|
1238
|
+
log_error("Service killed by signal %d", WTERMSIG(status));
|
1239
|
+
/* prevent looping */
|
1240
|
+
if (laststart + 60 > time(NULL)) {
|
1241
|
+
log_debug("Waiting 60 s to prevent looping");
|
1242
|
+
sleep(60);
|
1243
|
+
}
|
1244
|
+
continue;
|
1245
|
+
}
|
1246
|
+
log_error("Service did not exit cleanly", status);
|
1247
|
+
return 1;
|
1248
|
+
}
|
1249
|
+
}
|
1250
|
+
|
1251
|
+
/* Got out of the loop? A fork() failed then. */
|
1252
|
+
log_error("Cannot decouple controller/child processes");
|
1253
|
+
return 1;
|
1254
|
+
|
1255
|
+
}
|
1256
|
+
|
1257
|
+
void main_reload(void)
|
1258
|
+
{
|
1259
|
+
log_debug("Killing self with HUP signal");
|
1260
|
+
kill(controlled, SIGHUP);
|
1261
|
+
}
|
1262
|
+
|
1263
|
+
void main_shutdown(void)
|
1264
|
+
{
|
1265
|
+
log_debug("Killing self with TERM signal");
|
1266
|
+
kill(controlled, SIGTERM);
|
1267
|
+
}
|