##// END OF EJS Templates
chg: forward job control signals to worker process (issue5051)...
Yuya Nishihara -
r28086:65d24ca3 default
parent child Browse files
Show More
@@ -1,340 +1,383
1 /*
1 /*
2 * A fast client for Mercurial command server
2 * A fast client for Mercurial command server
3 *
3 *
4 * Copyright (c) 2011 Yuya Nishihara <yuya@tcha.org>
4 * Copyright (c) 2011 Yuya Nishihara <yuya@tcha.org>
5 *
5 *
6 * This software may be used and distributed according to the terms of the
6 * This software may be used and distributed according to the terms of the
7 * GNU General Public License version 2 or any later version.
7 * GNU General Public License version 2 or any later version.
8 */
8 */
9
9
10 #include <assert.h>
10 #include <assert.h>
11 #include <errno.h>
11 #include <errno.h>
12 #include <fcntl.h>
12 #include <fcntl.h>
13 #include <signal.h>
13 #include <signal.h>
14 #include <stdio.h>
14 #include <stdio.h>
15 #include <stdlib.h>
15 #include <stdlib.h>
16 #include <string.h>
16 #include <string.h>
17 #include <sys/stat.h>
17 #include <sys/stat.h>
18 #include <sys/types.h>
18 #include <sys/types.h>
19 #include <sys/un.h>
19 #include <sys/un.h>
20 #include <sys/wait.h>
20 #include <sys/wait.h>
21 #include <time.h>
21 #include <time.h>
22 #include <unistd.h>
22 #include <unistd.h>
23
23
24 #include "hgclient.h"
24 #include "hgclient.h"
25 #include "util.h"
25 #include "util.h"
26
26
27 #ifndef UNIX_PATH_MAX
27 #ifndef UNIX_PATH_MAX
28 #define UNIX_PATH_MAX (sizeof(((struct sockaddr_un *)NULL)->sun_path))
28 #define UNIX_PATH_MAX (sizeof(((struct sockaddr_un *)NULL)->sun_path))
29 #endif
29 #endif
30
30
31 struct cmdserveropts {
31 struct cmdserveropts {
32 char sockname[UNIX_PATH_MAX];
32 char sockname[UNIX_PATH_MAX];
33 char lockfile[UNIX_PATH_MAX];
33 char lockfile[UNIX_PATH_MAX];
34 char pidfile[UNIX_PATH_MAX];
34 char pidfile[UNIX_PATH_MAX];
35 };
35 };
36
36
37 static void preparesockdir(const char *sockdir)
37 static void preparesockdir(const char *sockdir)
38 {
38 {
39 int r;
39 int r;
40 r = mkdir(sockdir, 0700);
40 r = mkdir(sockdir, 0700);
41 if (r < 0 && errno != EEXIST)
41 if (r < 0 && errno != EEXIST)
42 abortmsg("cannot create sockdir %s (errno = %d)",
42 abortmsg("cannot create sockdir %s (errno = %d)",
43 sockdir, errno);
43 sockdir, errno);
44
44
45 struct stat st;
45 struct stat st;
46 r = lstat(sockdir, &st);
46 r = lstat(sockdir, &st);
47 if (r < 0)
47 if (r < 0)
48 abortmsg("cannot stat %s (errno = %d)", sockdir, errno);
48 abortmsg("cannot stat %s (errno = %d)", sockdir, errno);
49 if (!S_ISDIR(st.st_mode))
49 if (!S_ISDIR(st.st_mode))
50 abortmsg("cannot create sockdir %s (file exists)", sockdir);
50 abortmsg("cannot create sockdir %s (file exists)", sockdir);
51 if (st.st_uid != geteuid() || st.st_mode & 0077)
51 if (st.st_uid != geteuid() || st.st_mode & 0077)
52 abortmsg("insecure sockdir %s", sockdir);
52 abortmsg("insecure sockdir %s", sockdir);
53 }
53 }
54
54
55 static void setcmdserveropts(struct cmdserveropts *opts)
55 static void setcmdserveropts(struct cmdserveropts *opts)
56 {
56 {
57 int r;
57 int r;
58 char sockdir[UNIX_PATH_MAX];
58 char sockdir[UNIX_PATH_MAX];
59 const char *envsockname = getenv("CHGSOCKNAME");
59 const char *envsockname = getenv("CHGSOCKNAME");
60 if (!envsockname) {
60 if (!envsockname) {
61 /* by default, put socket file in secure directory
61 /* by default, put socket file in secure directory
62 * (permission of socket file may be ignored on some Unices) */
62 * (permission of socket file may be ignored on some Unices) */
63 const char *tmpdir = getenv("TMPDIR");
63 const char *tmpdir = getenv("TMPDIR");
64 if (!tmpdir)
64 if (!tmpdir)
65 tmpdir = "/tmp";
65 tmpdir = "/tmp";
66 r = snprintf(sockdir, sizeof(sockdir), "%s/chg%d",
66 r = snprintf(sockdir, sizeof(sockdir), "%s/chg%d",
67 tmpdir, geteuid());
67 tmpdir, geteuid());
68 if (r < 0 || (size_t)r >= sizeof(sockdir))
68 if (r < 0 || (size_t)r >= sizeof(sockdir))
69 abortmsg("too long TMPDIR (r = %d)", r);
69 abortmsg("too long TMPDIR (r = %d)", r);
70 preparesockdir(sockdir);
70 preparesockdir(sockdir);
71 }
71 }
72
72
73 const char *basename = (envsockname) ? envsockname : sockdir;
73 const char *basename = (envsockname) ? envsockname : sockdir;
74 const char *sockfmt = (envsockname) ? "%s" : "%s/server";
74 const char *sockfmt = (envsockname) ? "%s" : "%s/server";
75 const char *lockfmt = (envsockname) ? "%s.lock" : "%s/lock";
75 const char *lockfmt = (envsockname) ? "%s.lock" : "%s/lock";
76 const char *pidfmt = (envsockname) ? "%s.pid" : "%s/pid";
76 const char *pidfmt = (envsockname) ? "%s.pid" : "%s/pid";
77 r = snprintf(opts->sockname, sizeof(opts->sockname), sockfmt, basename);
77 r = snprintf(opts->sockname, sizeof(opts->sockname), sockfmt, basename);
78 if (r < 0 || (size_t)r >= sizeof(opts->sockname))
78 if (r < 0 || (size_t)r >= sizeof(opts->sockname))
79 abortmsg("too long TMPDIR or CHGSOCKNAME (r = %d)", r);
79 abortmsg("too long TMPDIR or CHGSOCKNAME (r = %d)", r);
80 r = snprintf(opts->lockfile, sizeof(opts->lockfile), lockfmt, basename);
80 r = snprintf(opts->lockfile, sizeof(opts->lockfile), lockfmt, basename);
81 if (r < 0 || (size_t)r >= sizeof(opts->lockfile))
81 if (r < 0 || (size_t)r >= sizeof(opts->lockfile))
82 abortmsg("too long TMPDIR or CHGSOCKNAME (r = %d)", r);
82 abortmsg("too long TMPDIR or CHGSOCKNAME (r = %d)", r);
83 r = snprintf(opts->pidfile, sizeof(opts->pidfile), pidfmt, basename);
83 r = snprintf(opts->pidfile, sizeof(opts->pidfile), pidfmt, basename);
84 if (r < 0 || (size_t)r >= sizeof(opts->pidfile))
84 if (r < 0 || (size_t)r >= sizeof(opts->pidfile))
85 abortmsg("too long TMPDIR or CHGSOCKNAME (r = %d)", r);
85 abortmsg("too long TMPDIR or CHGSOCKNAME (r = %d)", r);
86 }
86 }
87
87
88 /*
88 /*
89 * Make lock file that indicates cmdserver process is about to start. Created
89 * Make lock file that indicates cmdserver process is about to start. Created
90 * lock file will be deleted by server. (0: success, -1: lock exists)
90 * lock file will be deleted by server. (0: success, -1: lock exists)
91 */
91 */
92 static int lockcmdserver(const struct cmdserveropts *opts)
92 static int lockcmdserver(const struct cmdserveropts *opts)
93 {
93 {
94 int r;
94 int r;
95 char info[32];
95 char info[32];
96 r = snprintf(info, sizeof(info), "%d", getpid());
96 r = snprintf(info, sizeof(info), "%d", getpid());
97 if (r < 0 || (size_t)r >= sizeof(info))
97 if (r < 0 || (size_t)r >= sizeof(info))
98 abortmsg("failed to format lock info");
98 abortmsg("failed to format lock info");
99 r = symlink(info, opts->lockfile);
99 r = symlink(info, opts->lockfile);
100 if (r < 0 && errno != EEXIST)
100 if (r < 0 && errno != EEXIST)
101 abortmsg("failed to make lock %s (errno = %d)",
101 abortmsg("failed to make lock %s (errno = %d)",
102 opts->lockfile, errno);
102 opts->lockfile, errno);
103 return r;
103 return r;
104 }
104 }
105
105
106 static void execcmdserver(const struct cmdserveropts *opts)
106 static void execcmdserver(const struct cmdserveropts *opts)
107 {
107 {
108 const char *hgcmd = getenv("CHGHG");
108 const char *hgcmd = getenv("CHGHG");
109 if (!hgcmd || hgcmd[0] == '\0')
109 if (!hgcmd || hgcmd[0] == '\0')
110 hgcmd = getenv("HG");
110 hgcmd = getenv("HG");
111 if (!hgcmd || hgcmd[0] == '\0')
111 if (!hgcmd || hgcmd[0] == '\0')
112 hgcmd = "hg";
112 hgcmd = "hg";
113
113
114 const char *argv[] = {
114 const char *argv[] = {
115 hgcmd,
115 hgcmd,
116 "serve",
116 "serve",
117 "--cwd", "/",
117 "--cwd", "/",
118 "--cmdserver", "chgunix",
118 "--cmdserver", "chgunix",
119 "--address", opts->sockname,
119 "--address", opts->sockname,
120 "--daemon-pipefds", opts->lockfile,
120 "--daemon-pipefds", opts->lockfile,
121 "--pid-file", opts->pidfile,
121 "--pid-file", opts->pidfile,
122 "--config", "extensions.chgserver=",
122 "--config", "extensions.chgserver=",
123 /* wrap root ui so that it can be disabled/enabled by config */
123 /* wrap root ui so that it can be disabled/enabled by config */
124 "--config", "progress.assume-tty=1",
124 "--config", "progress.assume-tty=1",
125 NULL,
125 NULL,
126 };
126 };
127 if (execvp(hgcmd, (char **)argv) < 0)
127 if (execvp(hgcmd, (char **)argv) < 0)
128 abortmsg("failed to exec cmdserver (errno = %d)", errno);
128 abortmsg("failed to exec cmdserver (errno = %d)", errno);
129 }
129 }
130
130
131 /*
131 /*
132 * Sleep until lock file is deleted, i.e. cmdserver process starts listening.
132 * Sleep until lock file is deleted, i.e. cmdserver process starts listening.
133 * If pid is given, it also checks if the child process fails to start.
133 * If pid is given, it also checks if the child process fails to start.
134 */
134 */
135 static void waitcmdserver(const struct cmdserveropts *opts, pid_t pid)
135 static void waitcmdserver(const struct cmdserveropts *opts, pid_t pid)
136 {
136 {
137 static const struct timespec sleepreq = {0, 10 * 1000000};
137 static const struct timespec sleepreq = {0, 10 * 1000000};
138 int pst = 0;
138 int pst = 0;
139
139
140 for (unsigned int i = 0; i < 10 * 100; i++) {
140 for (unsigned int i = 0; i < 10 * 100; i++) {
141 int r;
141 int r;
142 struct stat lst;
142 struct stat lst;
143
143
144 r = lstat(opts->lockfile, &lst);
144 r = lstat(opts->lockfile, &lst);
145 if (r < 0 && errno == ENOENT)
145 if (r < 0 && errno == ENOENT)
146 return; /* lock file deleted by server */
146 return; /* lock file deleted by server */
147 if (r < 0)
147 if (r < 0)
148 goto cleanup;
148 goto cleanup;
149
149
150 if (pid > 0) {
150 if (pid > 0) {
151 /* collect zombie if child process fails to start */
151 /* collect zombie if child process fails to start */
152 r = waitpid(pid, &pst, WNOHANG);
152 r = waitpid(pid, &pst, WNOHANG);
153 if (r != 0)
153 if (r != 0)
154 goto cleanup;
154 goto cleanup;
155 }
155 }
156
156
157 nanosleep(&sleepreq, NULL);
157 nanosleep(&sleepreq, NULL);
158 }
158 }
159
159
160 abortmsg("timed out waiting for cmdserver %s", opts->lockfile);
160 abortmsg("timed out waiting for cmdserver %s", opts->lockfile);
161 return;
161 return;
162
162
163 cleanup:
163 cleanup:
164 if (pid > 0)
164 if (pid > 0)
165 /* lockfile should be made by this process */
165 /* lockfile should be made by this process */
166 unlink(opts->lockfile);
166 unlink(opts->lockfile);
167 if (WIFEXITED(pst)) {
167 if (WIFEXITED(pst)) {
168 abortmsg("cmdserver exited with status %d", WEXITSTATUS(pst));
168 abortmsg("cmdserver exited with status %d", WEXITSTATUS(pst));
169 } else if (WIFSIGNALED(pst)) {
169 } else if (WIFSIGNALED(pst)) {
170 abortmsg("cmdserver killed by signal %d", WTERMSIG(pst));
170 abortmsg("cmdserver killed by signal %d", WTERMSIG(pst));
171 } else {
171 } else {
172 abortmsg("error white waiting cmdserver");
172 abortmsg("error white waiting cmdserver");
173 }
173 }
174 }
174 }
175
175
176 /* Spawn new background cmdserver */
176 /* Spawn new background cmdserver */
177 static void startcmdserver(const struct cmdserveropts *opts)
177 static void startcmdserver(const struct cmdserveropts *opts)
178 {
178 {
179 debugmsg("start cmdserver at %s", opts->sockname);
179 debugmsg("start cmdserver at %s", opts->sockname);
180
180
181 if (lockcmdserver(opts) < 0) {
181 if (lockcmdserver(opts) < 0) {
182 debugmsg("lock file exists, waiting...");
182 debugmsg("lock file exists, waiting...");
183 waitcmdserver(opts, 0);
183 waitcmdserver(opts, 0);
184 return;
184 return;
185 }
185 }
186
186
187 /* remove dead cmdserver socket if any */
187 /* remove dead cmdserver socket if any */
188 unlink(opts->sockname);
188 unlink(opts->sockname);
189
189
190 pid_t pid = fork();
190 pid_t pid = fork();
191 if (pid < 0)
191 if (pid < 0)
192 abortmsg("failed to fork cmdserver process");
192 abortmsg("failed to fork cmdserver process");
193 if (pid == 0) {
193 if (pid == 0) {
194 /* bypass uisetup() of pager extension */
194 /* bypass uisetup() of pager extension */
195 int nullfd = open("/dev/null", O_WRONLY);
195 int nullfd = open("/dev/null", O_WRONLY);
196 if (nullfd >= 0) {
196 if (nullfd >= 0) {
197 dup2(nullfd, fileno(stdout));
197 dup2(nullfd, fileno(stdout));
198 close(nullfd);
198 close(nullfd);
199 }
199 }
200 execcmdserver(opts);
200 execcmdserver(opts);
201 } else {
201 } else {
202 waitcmdserver(opts, pid);
202 waitcmdserver(opts, pid);
203 }
203 }
204 }
204 }
205
205
206 static void killcmdserver(const struct cmdserveropts *opts, int sig)
206 static void killcmdserver(const struct cmdserveropts *opts, int sig)
207 {
207 {
208 FILE *fp = fopen(opts->pidfile, "r");
208 FILE *fp = fopen(opts->pidfile, "r");
209 if (!fp)
209 if (!fp)
210 abortmsg("cannot open %s (errno = %d)", opts->pidfile, errno);
210 abortmsg("cannot open %s (errno = %d)", opts->pidfile, errno);
211 int pid = 0;
211 int pid = 0;
212 int n = fscanf(fp, "%d", &pid);
212 int n = fscanf(fp, "%d", &pid);
213 fclose(fp);
213 fclose(fp);
214 if (n != 1 || pid <= 0)
214 if (n != 1 || pid <= 0)
215 abortmsg("cannot read pid from %s", opts->pidfile);
215 abortmsg("cannot read pid from %s", opts->pidfile);
216
216
217 if (kill((pid_t)pid, sig) < 0) {
217 if (kill((pid_t)pid, sig) < 0) {
218 if (errno == ESRCH)
218 if (errno == ESRCH)
219 return;
219 return;
220 abortmsg("cannot kill %d (errno = %d)", pid, errno);
220 abortmsg("cannot kill %d (errno = %d)", pid, errno);
221 }
221 }
222 }
222 }
223
223
224 static pid_t peerpid = 0;
224 static pid_t peerpid = 0;
225
225
226 static void forwardsignal(int sig)
226 static void forwardsignal(int sig)
227 {
227 {
228 assert(peerpid > 0);
228 assert(peerpid > 0);
229 if (kill(peerpid, sig) < 0)
229 if (kill(peerpid, sig) < 0)
230 abortmsg("cannot kill %d (errno = %d)", peerpid, errno);
230 abortmsg("cannot kill %d (errno = %d)", peerpid, errno);
231 debugmsg("forward signal %d", sig);
231 debugmsg("forward signal %d", sig);
232 }
232 }
233
233
234 static void handlestopsignal(int sig)
235 {
236 sigset_t unblockset, oldset;
237 struct sigaction sa, oldsa;
238 if (sigemptyset(&unblockset) < 0)
239 goto error;
240 if (sigaddset(&unblockset, sig) < 0)
241 goto error;
242 memset(&sa, 0, sizeof(sa));
243 sa.sa_handler = SIG_DFL;
244 sa.sa_flags = SA_RESTART;
245 if (sigemptyset(&sa.sa_mask) < 0)
246 goto error;
247
248 forwardsignal(sig);
249 if (raise(sig) < 0) /* resend to self */
250 goto error;
251 if (sigaction(sig, &sa, &oldsa) < 0)
252 goto error;
253 if (sigprocmask(SIG_UNBLOCK, &unblockset, &oldset) < 0)
254 goto error;
255 /* resent signal will be handled before sigprocmask() returns */
256 if (sigprocmask(SIG_SETMASK, &oldset, NULL) < 0)
257 goto error;
258 if (sigaction(sig, &oldsa, NULL) < 0)
259 goto error;
260 return;
261
262 error:
263 abortmsg("failed to handle stop signal (errno = %d)", errno);
264 }
265
234 static void setupsignalhandler(pid_t pid)
266 static void setupsignalhandler(pid_t pid)
235 {
267 {
236 if (pid <= 0)
268 if (pid <= 0)
237 return;
269 return;
238 peerpid = pid;
270 peerpid = pid;
239
271
240 struct sigaction sa;
272 struct sigaction sa;
241 memset(&sa, 0, sizeof(sa));
273 memset(&sa, 0, sizeof(sa));
242 sa.sa_handler = forwardsignal;
274 sa.sa_handler = forwardsignal;
243 sa.sa_flags = SA_RESTART;
275 sa.sa_flags = SA_RESTART;
244 if (sigemptyset(&sa.sa_mask) < 0)
276 if (sigemptyset(&sa.sa_mask) < 0)
245 goto error;
277 goto error;
246
278
247 if (sigaction(SIGHUP, &sa, NULL) < 0)
279 if (sigaction(SIGHUP, &sa, NULL) < 0)
248 goto error;
280 goto error;
249 if (sigaction(SIGINT, &sa, NULL) < 0)
281 if (sigaction(SIGINT, &sa, NULL) < 0)
250 goto error;
282 goto error;
251
283
252 /* terminate frontend by double SIGTERM in case of server freeze */
284 /* terminate frontend by double SIGTERM in case of server freeze */
253 sa.sa_flags |= SA_RESETHAND;
285 sa.sa_flags |= SA_RESETHAND;
254 if (sigaction(SIGTERM, &sa, NULL) < 0)
286 if (sigaction(SIGTERM, &sa, NULL) < 0)
255 goto error;
287 goto error;
288
289 /* propagate job control requests to worker */
290 sa.sa_handler = forwardsignal;
291 sa.sa_flags = SA_RESTART;
292 if (sigaction(SIGCONT, &sa, NULL) < 0)
293 goto error;
294 sa.sa_handler = handlestopsignal;
295 sa.sa_flags = SA_RESTART;
296 if (sigaction(SIGTSTP, &sa, NULL) < 0)
297 goto error;
298
256 return;
299 return;
257
300
258 error:
301 error:
259 abortmsg("failed to set up signal handlers (errno = %d)", errno);
302 abortmsg("failed to set up signal handlers (errno = %d)", errno);
260 }
303 }
261
304
262 /* This implementation is based on hgext/pager.py (pre 369741ef7253) */
305 /* This implementation is based on hgext/pager.py (pre 369741ef7253) */
263 static void setuppager(hgclient_t *hgc, const char *const args[],
306 static void setuppager(hgclient_t *hgc, const char *const args[],
264 size_t argsize)
307 size_t argsize)
265 {
308 {
266 const char *pagercmd = hgc_getpager(hgc, args, argsize);
309 const char *pagercmd = hgc_getpager(hgc, args, argsize);
267 if (!pagercmd)
310 if (!pagercmd)
268 return;
311 return;
269
312
270 int pipefds[2];
313 int pipefds[2];
271 if (pipe(pipefds) < 0)
314 if (pipe(pipefds) < 0)
272 return;
315 return;
273 pid_t pid = fork();
316 pid_t pid = fork();
274 if (pid < 0)
317 if (pid < 0)
275 goto error;
318 goto error;
276 if (pid == 0) {
319 if (pid == 0) {
277 close(pipefds[0]);
320 close(pipefds[0]);
278 if (dup2(pipefds[1], fileno(stdout)) < 0)
321 if (dup2(pipefds[1], fileno(stdout)) < 0)
279 goto error;
322 goto error;
280 if (isatty(fileno(stderr))) {
323 if (isatty(fileno(stderr))) {
281 if (dup2(pipefds[1], fileno(stderr)) < 0)
324 if (dup2(pipefds[1], fileno(stderr)) < 0)
282 goto error;
325 goto error;
283 }
326 }
284 close(pipefds[1]);
327 close(pipefds[1]);
285 hgc_attachio(hgc); /* reattach to pager */
328 hgc_attachio(hgc); /* reattach to pager */
286 return;
329 return;
287 } else {
330 } else {
288 dup2(pipefds[0], fileno(stdin));
331 dup2(pipefds[0], fileno(stdin));
289 close(pipefds[0]);
332 close(pipefds[0]);
290 close(pipefds[1]);
333 close(pipefds[1]);
291
334
292 int r = execlp("/bin/sh", "/bin/sh", "-c", pagercmd, NULL);
335 int r = execlp("/bin/sh", "/bin/sh", "-c", pagercmd, NULL);
293 if (r < 0) {
336 if (r < 0) {
294 abortmsg("cannot start pager '%s' (errno = %d)",
337 abortmsg("cannot start pager '%s' (errno = %d)",
295 pagercmd, errno);
338 pagercmd, errno);
296 }
339 }
297 return;
340 return;
298 }
341 }
299
342
300 error:
343 error:
301 close(pipefds[0]);
344 close(pipefds[0]);
302 close(pipefds[1]);
345 close(pipefds[1]);
303 abortmsg("failed to prepare pager (errno = %d)", errno);
346 abortmsg("failed to prepare pager (errno = %d)", errno);
304 }
347 }
305
348
306 int main(int argc, const char *argv[], const char *envp[])
349 int main(int argc, const char *argv[], const char *envp[])
307 {
350 {
308 if (getenv("CHGDEBUG"))
351 if (getenv("CHGDEBUG"))
309 enabledebugmsg();
352 enabledebugmsg();
310
353
311 struct cmdserveropts opts;
354 struct cmdserveropts opts;
312 setcmdserveropts(&opts);
355 setcmdserveropts(&opts);
313
356
314 if (argc == 2) {
357 if (argc == 2) {
315 int sig = 0;
358 int sig = 0;
316 if (strcmp(argv[1], "--kill-chg-daemon") == 0)
359 if (strcmp(argv[1], "--kill-chg-daemon") == 0)
317 sig = SIGTERM;
360 sig = SIGTERM;
318 if (strcmp(argv[1], "--reload-chg-daemon") == 0)
361 if (strcmp(argv[1], "--reload-chg-daemon") == 0)
319 sig = SIGHUP;
362 sig = SIGHUP;
320 if (sig > 0) {
363 if (sig > 0) {
321 killcmdserver(&opts, sig);
364 killcmdserver(&opts, sig);
322 return 0;
365 return 0;
323 }
366 }
324 }
367 }
325
368
326 hgclient_t *hgc = hgc_open(opts.sockname);
369 hgclient_t *hgc = hgc_open(opts.sockname);
327 if (!hgc) {
370 if (!hgc) {
328 startcmdserver(&opts);
371 startcmdserver(&opts);
329 hgc = hgc_open(opts.sockname);
372 hgc = hgc_open(opts.sockname);
330 }
373 }
331 if (!hgc)
374 if (!hgc)
332 abortmsg("cannot open hg client");
375 abortmsg("cannot open hg client");
333
376
334 setupsignalhandler(hgc_peerpid(hgc));
377 setupsignalhandler(hgc_peerpid(hgc));
335 hgc_setenv(hgc, envp);
378 hgc_setenv(hgc, envp);
336 setuppager(hgc, argv + 1, argc - 1);
379 setuppager(hgc, argv + 1, argc - 1);
337 int exitcode = hgc_runcommand(hgc, argv + 1, argc - 1);
380 int exitcode = hgc_runcommand(hgc, argv + 1, argc - 1);
338 hgc_close(hgc);
381 hgc_close(hgc);
339 return exitcode;
382 return exitcode;
340 }
383 }
General Comments 0
You need to be logged in to leave comments. Login now