1 /******************************************************************************/
2 /* pfixtools: a collection of postfix related tools */
4 /* ________________________________________________________________________ */
6 /* Redistribution and use in source and binary forms, with or without */
7 /* modification, are permitted provided that the following conditions */
10 /* 1. Redistributions of source code must retain the above copyright */
11 /* notice, this list of conditions and the following disclaimer. */
12 /* 2. Redistributions in binary form must reproduce the above copyright */
13 /* notice, this list of conditions and the following disclaimer in the */
14 /* documentation and/or other materials provided with the distribution. */
15 /* 3. The names of its contributors may not be used to endorse or promote */
16 /* products derived from this software without specific prior written */
19 /* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND */
20 /* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE */
21 /* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR */
22 /* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS */
23 /* BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR */
24 /* CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF */
25 /* SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS */
26 /* INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN */
27 /* CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) */
28 /* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF */
29 /* THE POSSIBILITY OF SUCH DAMAGE. */
30 /******************************************************************************/
33 * Copyright © 2007 Pierre Habouzit
34 * Copyright © 2008 Florent Bruneau
44 bool daemon_process = true;
45 int log_level = LOG_INFO;
46 bool log_syslog = false;
47 const char *log_state = "";
49 static FILE *pidfile = NULL;
51 void common_sighandler(int sig)
55 err("Killed (got signal %d)...", sig);
60 int setnonblock(int sock)
62 int res = fcntl(sock, F_GETFL);
69 if (fcntl(sock, F_SETFL, res | O_NONBLOCK) < 0) {
77 int tcp_bind(const struct sockaddr *addr, socklen_t len)
81 switch (addr->sa_family) {
83 unlink(((struct sockaddr_un *)addr)->sun_path);
84 sock = socket(PF_UNIX, SOCK_STREAM, 0);
87 sock = socket(PF_INET, SOCK_STREAM, 0);
90 sock = socket(PF_INET6, SOCK_STREAM, 0);
102 if (addr->sa_family != AF_UNIX) {
104 if (setsockopt(sock, SOL_SOCKET, SO_REUSEADDR, &v, sizeof(v)) < 0) {
105 UNIXERR("setsockopt(SO_REUSEADDR)");
111 if (bind(sock, addr, len) < 0) {
120 int tcp_listen(const struct sockaddr *addr, socklen_t len)
122 int sock = tcp_bind(addr, len);
123 if (listen(sock, 0) < 0) {
131 int tcp_listen_nonblock(const struct sockaddr *addr, socklen_t len)
133 int sock = tcp_bind(addr, len);
134 if (setnonblock(sock)) {
138 if (listen(sock, 0) < 0) {
146 int accept_nonblock(int fd)
148 int sock = accept(fd, NULL, 0);
155 if (setnonblock(sock)) {
163 int xwrite(int fd, const char *s, size_t l)
166 int nb = write(fd, s, l);
168 if (errno == EINTR || errno == EAGAIN)
177 int daemon_detach(void)
182 close(STDOUT_FILENO);
183 close(STDERR_FILENO);
185 open("/dev/null", O_RDWR);
186 open("/dev/null", O_RDWR);
187 open("/dev/null", O_RDWR);
194 daemon_process = false;
202 int drop_privileges(const char *user, const char *group)
209 gr = getgrnam(group);
227 int pidfile_open(const char *name)
230 pidfile = fopen(name, "w");
233 fprintf(pidfile, "%d\n", getpid());
234 return fflush(pidfile);
239 int pidfile_refresh(void)
243 ftruncate(fileno(pidfile), 0);
244 fprintf(pidfile, "%d\n", getpid());
245 return fflush(pidfile);
250 static void pidfile_close(void)
253 if (daemon_process) {
255 ftruncate(fileno(pidfile), 0);
262 int common_setup(const char* pidfilename, bool unsafe, const char* runas_user,
263 const char* runas_group, bool daemonize)
265 if (pidfile_open(pidfilename) < 0) {
266 crit("unable to write pidfile %s", pidfilename);
270 if (!unsafe && drop_privileges(runas_user, runas_group) < 0) {
271 crit("unable to drop privileges");
275 if (daemonize && daemon_detach() < 0) {
276 crit("unable to fork");
288 static A(exitcall_t) __exit = ARRAY_INIT;
290 void common_register_exit(exitcall_t exitcall)
292 array_add(__exit, exitcall);
295 static void common_shutdown(void)
297 log_state = "stopping ";
298 if (daemon_process && log_syslog) {
302 for (int i = array_len(__exit) - 1 ; i >= 0 ; --i) {
303 array_elt(__exit, i)();
308 void common_init(void)
310 static bool __ran = false;
314 log_state = "starting ";
315 if (atexit(common_shutdown)) {
316 fputs("Cannot hook my atexit function, quitting !\n", stderr);