17 #include "web_client.h"
18 #include "plugins_d.h"
24 void sig_handler(int signo)
33 info("Signaled exit (signal %d). Errno: %d (%s)", signo, errno, strerror(errno));
34 signal(SIGCHLD, SIG_IGN);
35 signal(SIGPIPE, SIG_IGN);
36 signal(SIGTERM, SIG_IGN);
37 signal(SIGQUIT, SIG_IGN);
38 signal(SIGHUP, SIG_IGN);
39 signal(SIGINT, SIG_IGN);
40 signal(SIGCHLD, SIG_IGN);
43 //unlink("/var/run/netdata.pid");
44 info("NetData exiting. Bye bye...");
49 info("Signaled PIPE (signal %d). Errno: %d (%s)", signo, errno, strerror(errno));
50 // this is received when web clients send a reset
52 // info("Ignoring signal %d. Errno: %d (%s)", signo, errno, strerror(errno));
56 info("Signal %d received. Falling back to default action for it.", signo);
57 signal(signo, SIG_DFL);
62 char rundir[FILENAME_MAX + 1] = "/var/run/netdata";
63 char pidfile[FILENAME_MAX + 1] = "";
64 void prepare_rundir() {
66 mkdir("/run/user", 0775);
67 snprintf(rundir, FILENAME_MAX, "/run/user/%d", getuid());
69 snprintf(rundir, FILENAME_MAX, "/run/user/%d/netdata", getuid());
72 snprintf(pidfile, FILENAME_MAX, "%s/netdata.pid", rundir);
74 if(mkdir(rundir, 0775) != 0) {
75 if(errno != EEXIST) fprintf(stderr, "Cannot create directory '%s' (%s).", rundir, strerror(errno));
79 int become_user(const char *username)
81 struct passwd *pw = getpwnam(username);
83 fprintf(stderr, "User %s is not present. Error: %s\n", username, strerror(errno));
87 if(chown(rundir, pw->pw_uid, pw->pw_gid) != 0) {
88 fprintf(stderr, "Cannot chown directory '%s' to user %s. Error: %s\n", rundir, username, strerror(errno));
92 if(setgid(pw->pw_gid) != 0) {
93 fprintf(stderr, "Cannot switch to user's %s group (gid: %d). Error: %s\n", username, pw->pw_gid, strerror(errno));
96 if(setegid(pw->pw_gid) != 0) {
97 fprintf(stderr, "Cannot effectively switch to user's %s group (gid: %d). Error: %s\n", username, pw->pw_gid, strerror(errno));
100 if(setuid(pw->pw_uid) != 0) {
101 fprintf(stderr, "Cannot switch to user %s (uid: %d). Error: %s\n", username, pw->pw_uid, strerror(errno));
104 if(seteuid(pw->pw_uid) != 0) {
105 fprintf(stderr, "Cannot effectively switch to user %s (uid: %d). Error: %s\n", username, pw->pw_uid, strerror(errno));
112 int become_daemon(int dont_fork, int close_all_files, const char *input, const char *output, const char *error, const char *access, int *access_fd, FILE **access_fp)
116 // open the files before forking
117 int input_fd = -1, output_fd = -1, error_fd = -1, dev_null = -1;
119 if(input && *input) {
120 if((input_fd = open(input, O_RDONLY, 0666)) == -1) {
121 fprintf(stderr, "Cannot open input file '%s' (%s).", input, strerror(errno));
126 if(output && *output) {
127 if((output_fd = open(output, O_RDWR | O_APPEND | O_CREAT, 0666)) == -1) {
128 fprintf(stderr, "Cannot open output log file '%s' (%s).", output, strerror(errno));
129 if(input_fd != -1) close(input_fd);
134 if(error && *error) {
135 if((error_fd = open(error, O_RDWR | O_APPEND | O_CREAT, 0666)) == -1) {
136 fprintf(stderr, "Cannot open error log file '%s' (%s).", error, strerror(errno));
137 if(input_fd != -1) close(input_fd);
138 if(output_fd != -1) close(output_fd);
143 if(access && *access && access_fd) {
144 if((*access_fd = open(access, O_RDWR | O_APPEND | O_CREAT, 0666)) == -1) {
145 fprintf(stderr, "Cannot open access log file '%s' (%s).", access, strerror(errno));
146 if(input_fd != -1) close(input_fd);
147 if(output_fd != -1) close(output_fd);
148 if(error_fd != -1) close(error_fd);
153 *access_fp = fdopen(*access_fd, "w");
155 fprintf(stderr, "Cannot migrate file's '%s' fd %d (%s).\n", access, *access_fd, strerror(errno));
156 if(input_fd != -1) close(input_fd);
157 if(output_fd != -1) close(output_fd);
158 if(error_fd != -1) close(error_fd);
166 if((dev_null = open("/dev/null", O_RDWR, 0666)) == -1) {
167 perror("Cannot open /dev/null");
168 if(input_fd != -1) close(input_fd);
169 if(output_fd != -1) close(output_fd);
170 if(error_fd != -1) close(error_fd);
171 if(access && access_fd && *access_fd != -1) {
188 perror("cannot fork");
192 exit(0); // the parent
195 // become session leader
197 perror("Cannot become session leader.");
202 signal(SIGCHLD, SIG_IGN);
203 signal(SIGHUP, SIG_IGN);
204 signal(SIGWINCH, SIG_IGN);
210 perror("cannot fork");
214 exit(0); // the parent
218 // Set new file permissions
222 if(close_all_files) {
224 for(i = sysconf(_SC_OPEN_MAX); i > 0; i--)
226 ((access_fd && i != *access_fd) || !access_fd)
236 close(STDOUT_FILENO);
237 close(STDERR_FILENO);
240 // put the opened files
241 // to our standard file descriptors
243 if(input_fd != STDIN_FILENO) {
244 dup2(input_fd, STDIN_FILENO);
249 else dup2(dev_null, STDIN_FILENO);
251 if(output_fd != -1) {
252 if(output_fd != STDOUT_FILENO) {
253 dup2(output_fd, STDOUT_FILENO);
258 else dup2(dev_null, STDOUT_FILENO);
261 if(error_fd != STDERR_FILENO) {
262 dup2(error_fd, STDERR_FILENO);
267 else dup2(dev_null, STDERR_FILENO);
270 if(dev_null != STDIN_FILENO && dev_null != STDOUT_FILENO && dev_null != STDERR_FILENO)
273 // generate our pid file
276 int fd = open(pidfile, O_RDWR | O_CREAT, 0666);
279 sprintf(b, "%d\n", getpid());
280 int i = write(fd, b, strlen(b));
281 if(i <= 0) perror("Cannot write pid to file.");