1 /******************************************************************************/
2 /* pfixtools: a collection of postfix related tools */
4 /* ________________________________________________________________________ */
6 /* Redistribution and use in source and binary forms, with or without */
7 /* modification, are permitted provided that the following conditions */
10 /* 1. Redistributions of source code must retain the above copyright */
11 /* notice, this list of conditions and the following disclaimer. */
12 /* 2. Redistributions in binary form must reproduce the above copyright */
13 /* notice, this list of conditions and the following disclaimer in the */
14 /* documentation and/or other materials provided with the distribution. */
15 /* 3. The names of its contributors may not be used to endorse or promote */
16 /* products derived from this software without specific prior written */
19 /* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND */
20 /* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE */
21 /* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR */
22 /* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS */
23 /* BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR */
24 /* CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF */
25 /* SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS */
26 /* INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN */
27 /* CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) */
28 /* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF */
29 /* THE POSSIBILITY OF SUCH DAMAGE. */
30 /******************************************************************************/
33 * Copyright © 2007 Pierre Habouzit
34 * Copyright © 2008 Florent Bruneau
44 bool daemon_process = true;
45 int log_level = LOG_INFO;
46 bool log_syslog = false;
48 static FILE *pidfile = NULL;
50 void common_sighandler(int sig)
54 err("Killed (got signal %d)...", sig);
59 int setnonblock(int sock)
61 int res = fcntl(sock, F_GETFL);
68 if (fcntl(sock, F_SETFL, res | O_NONBLOCK) < 0) {
76 int tcp_bind(const struct sockaddr *addr, socklen_t len)
80 switch (addr->sa_family) {
82 unlink(((struct sockaddr_un *)addr)->sun_path);
83 sock = socket(PF_UNIX, SOCK_STREAM, 0);
86 sock = socket(PF_INET, SOCK_STREAM, 0);
89 sock = socket(PF_INET6, SOCK_STREAM, 0);
101 if (addr->sa_family != AF_UNIX) {
103 if (setsockopt(sock, SOL_SOCKET, SO_REUSEADDR, &v, sizeof(v)) < 0) {
104 UNIXERR("setsockopt(SO_REUSEADDR)");
110 if (bind(sock, addr, len) < 0) {
119 int tcp_listen(const struct sockaddr *addr, socklen_t len)
121 int sock = tcp_bind(addr, len);
122 if (listen(sock, 0) < 0) {
130 int tcp_listen_nonblock(const struct sockaddr *addr, socklen_t len)
132 int sock = tcp_bind(addr, len);
133 if (setnonblock(sock)) {
137 if (listen(sock, 0) < 0) {
145 int accept_nonblock(int fd)
147 int sock = accept(fd, NULL, 0);
154 if (setnonblock(sock)) {
162 int xwrite(int fd, const char *s, size_t l)
165 int nb = write(fd, s, l);
167 if (errno == EINTR || errno == EAGAIN)
176 int daemon_detach(void)
181 close(STDOUT_FILENO);
182 close(STDERR_FILENO);
184 open("/dev/null", O_RDWR);
185 open("/dev/null", O_RDWR);
186 open("/dev/null", O_RDWR);
193 daemon_process = false;
201 int drop_privileges(const char *user, const char *group)
208 gr = getgrnam(group);
226 int pidfile_open(const char *name)
229 pidfile = fopen(name, "w");
232 fprintf(pidfile, "%d\n", getpid());
233 return fflush(pidfile);
238 int pidfile_refresh(void)
242 ftruncate(fileno(pidfile), 0);
243 fprintf(pidfile, "%d\n", getpid());
244 return fflush(pidfile);
249 static void pidfile_close(void)
252 if (daemon_process) {
254 ftruncate(fileno(pidfile), 0);
261 int common_setup(const char* pidfilename, bool unsafe, const char* runas_user,
262 const char* runas_group, bool daemonize)
264 if (pidfile_open(pidfilename) < 0) {
265 crit("unable to write pidfile %s", pidfilename);
269 if (!unsafe && drop_privileges(runas_user, runas_group) < 0) {
270 crit("unable to drop privileges");
274 if (daemonize && daemon_detach() < 0) {
275 crit("unable to fork");
283 extern initcall_t __madinit[];
284 extern exitcall_t __madexit[];
286 static void common_shutdown(void)
288 if (daemon_process && log_syslog) {
292 for (int i = -1; __madexit[i]; i--) {
297 static void __attribute__((__constructor__,__used__))
298 common_initialize(void)
300 if (atexit(common_shutdown)) {
301 fputs("Cannot hook my atexit function, quitting !\n", stderr);
305 for (int i = 0; __madinit[i]; i++) {
306 if ((*__madinit[i])()) {