/*
* Copyright © 2007 Pierre Habouzit
+ * Copyright © 2008 Florent Bruneau
*/
#include <fcntl.h>
void common_sighandler(int sig)
{
- static time_t lastintr = 0;
- time_t now = time(NULL);
-
switch (sig) {
case SIGINT:
- if (sigint) {
- if (now - lastintr >= 1)
- break;
- } else {
- lastintr = now;
- sigint = true;
- }
+ sigint = true;
return;
case SIGHUP:
return 0;
}
-int tcp_listen_nonblock(const struct sockaddr *addr, socklen_t len)
+int tcp_bind(const struct sockaddr *addr, socklen_t len)
{
int sock;
return -1;
}
- if (setnonblock(sock)) {
+ return sock;
+}
+
+int tcp_listen(const struct sockaddr *addr, socklen_t len)
+{
+ int sock = tcp_bind(addr, len);
+ if (listen(sock, 0) < 0) {
+ UNIXERR("bind");
close(sock);
return -1;
}
+ return sock;
+}
+int tcp_listen_nonblock(const struct sockaddr *addr, socklen_t len)
+{
+ int sock = tcp_bind(addr, len);
+ if (setnonblock(sock)) {
+ close(sock);
+ return -1;
+ }
if (listen(sock, 0) < 0) {
UNIXERR("bind");
close(sock);
return -1;
}
-
return sock;
}
}
}
-extern initcall_t __madinit[], __madexit[];
+int common_setup(const char* pidfilename, bool unsafe, const char* runas_user,
+ const char* runas_group, bool daemonize)
+{
+ if (pidfile_open(pidfilename) < 0) {
+ syslog(LOG_CRIT, "unable to write pidfile %s", pidfilename);
+ return EXIT_FAILURE;
+ }
+
+ if (!unsafe && drop_privileges(runas_user, runas_group) < 0) {
+ syslog(LOG_CRIT, "unable to drop privileges");
+ return EXIT_FAILURE;
+ }
+
+ if (daemonize && daemon_detach() < 0) {
+ syslog(LOG_CRIT, "unable to fork");
+ return EXIT_FAILURE;
+ }
+
+ pidfile_refresh();
+ return EXIT_SUCCESS;
+}
+
+extern initcall_t __madinit[];
+extern exitcall_t __madexit[];
static void common_shutdown(void)
{
+ syslog(LOG_INFO, "Stopping...");
pidfile_close();
for (int i = -1; __madexit[i]; i--) {