Show More
@@ -1,332 +1,340 | |||
|
1 | 1 | /* |
|
2 | 2 | * A fast client for Mercurial command server |
|
3 | 3 | * |
|
4 | 4 | * Copyright (c) 2011 Yuya Nishihara <yuya@tcha.org> |
|
5 | 5 | * |
|
6 | 6 | * This software may be used and distributed according to the terms of the |
|
7 | 7 | * GNU General Public License version 2 or any later version. |
|
8 | 8 | */ |
|
9 | 9 | |
|
10 | 10 | #include <assert.h> |
|
11 | 11 | #include <errno.h> |
|
12 | 12 | #include <fcntl.h> |
|
13 | 13 | #include <signal.h> |
|
14 | 14 | #include <stdio.h> |
|
15 | 15 | #include <stdlib.h> |
|
16 | 16 | #include <string.h> |
|
17 | 17 | #include <sys/stat.h> |
|
18 | 18 | #include <sys/types.h> |
|
19 | 19 | #include <sys/un.h> |
|
20 | 20 | #include <sys/wait.h> |
|
21 | 21 | #include <time.h> |
|
22 | 22 | #include <unistd.h> |
|
23 | 23 | |
|
24 | 24 | #include "hgclient.h" |
|
25 | 25 | #include "util.h" |
|
26 | 26 | |
|
27 | 27 | #ifndef UNIX_PATH_MAX |
|
28 | 28 | #define UNIX_PATH_MAX (sizeof(((struct sockaddr_un *)NULL)->sun_path)) |
|
29 | 29 | #endif |
|
30 | 30 | |
|
31 | 31 | struct cmdserveropts { |
|
32 | 32 | char sockname[UNIX_PATH_MAX]; |
|
33 | 33 | char lockfile[UNIX_PATH_MAX]; |
|
34 | 34 | char pidfile[UNIX_PATH_MAX]; |
|
35 | 35 | }; |
|
36 | 36 | |
|
37 | 37 | static void preparesockdir(const char *sockdir) |
|
38 | 38 | { |
|
39 | 39 | int r; |
|
40 | 40 | r = mkdir(sockdir, 0700); |
|
41 | 41 | if (r < 0 && errno != EEXIST) |
|
42 | 42 | abortmsg("cannot create sockdir %s (errno = %d)", |
|
43 | 43 | sockdir, errno); |
|
44 | 44 | |
|
45 | 45 | struct stat st; |
|
46 | 46 | r = lstat(sockdir, &st); |
|
47 | 47 | if (r < 0) |
|
48 | 48 | abortmsg("cannot stat %s (errno = %d)", sockdir, errno); |
|
49 | 49 | if (!S_ISDIR(st.st_mode)) |
|
50 | 50 | abortmsg("cannot create sockdir %s (file exists)", sockdir); |
|
51 | 51 | if (st.st_uid != geteuid() || st.st_mode & 0077) |
|
52 | 52 | abortmsg("insecure sockdir %s", sockdir); |
|
53 | 53 | } |
|
54 | 54 | |
|
55 | 55 | static void setcmdserveropts(struct cmdserveropts *opts) |
|
56 | 56 | { |
|
57 | 57 | int r; |
|
58 | 58 | char sockdir[UNIX_PATH_MAX]; |
|
59 | 59 | const char *envsockname = getenv("CHGSOCKNAME"); |
|
60 | 60 | if (!envsockname) { |
|
61 | 61 | /* by default, put socket file in secure directory |
|
62 | 62 | * (permission of socket file may be ignored on some Unices) */ |
|
63 | 63 | const char *tmpdir = getenv("TMPDIR"); |
|
64 | 64 | if (!tmpdir) |
|
65 | 65 | tmpdir = "/tmp"; |
|
66 | 66 | r = snprintf(sockdir, sizeof(sockdir), "%s/chg%d", |
|
67 | 67 | tmpdir, geteuid()); |
|
68 | 68 | if (r < 0 || (size_t)r >= sizeof(sockdir)) |
|
69 | 69 | abortmsg("too long TMPDIR (r = %d)", r); |
|
70 | 70 | preparesockdir(sockdir); |
|
71 | 71 | } |
|
72 | 72 | |
|
73 | 73 | const char *basename = (envsockname) ? envsockname : sockdir; |
|
74 | 74 | const char *sockfmt = (envsockname) ? "%s" : "%s/server"; |
|
75 | 75 | const char *lockfmt = (envsockname) ? "%s.lock" : "%s/lock"; |
|
76 | 76 | const char *pidfmt = (envsockname) ? "%s.pid" : "%s/pid"; |
|
77 | 77 | r = snprintf(opts->sockname, sizeof(opts->sockname), sockfmt, basename); |
|
78 | 78 | if (r < 0 || (size_t)r >= sizeof(opts->sockname)) |
|
79 | 79 | abortmsg("too long TMPDIR or CHGSOCKNAME (r = %d)", r); |
|
80 | 80 | r = snprintf(opts->lockfile, sizeof(opts->lockfile), lockfmt, basename); |
|
81 | 81 | if (r < 0 || (size_t)r >= sizeof(opts->lockfile)) |
|
82 | 82 | abortmsg("too long TMPDIR or CHGSOCKNAME (r = %d)", r); |
|
83 | 83 | r = snprintf(opts->pidfile, sizeof(opts->pidfile), pidfmt, basename); |
|
84 | 84 | if (r < 0 || (size_t)r >= sizeof(opts->pidfile)) |
|
85 | 85 | abortmsg("too long TMPDIR or CHGSOCKNAME (r = %d)", r); |
|
86 | 86 | } |
|
87 | 87 | |
|
88 | 88 | /* |
|
89 | 89 | * Make lock file that indicates cmdserver process is about to start. Created |
|
90 | 90 | * lock file will be deleted by server. (0: success, -1: lock exists) |
|
91 | 91 | */ |
|
92 | 92 | static int lockcmdserver(const struct cmdserveropts *opts) |
|
93 | 93 | { |
|
94 | 94 | int r; |
|
95 | 95 | char info[32]; |
|
96 | 96 | r = snprintf(info, sizeof(info), "%d", getpid()); |
|
97 | 97 | if (r < 0 || (size_t)r >= sizeof(info)) |
|
98 | 98 | abortmsg("failed to format lock info"); |
|
99 | 99 | r = symlink(info, opts->lockfile); |
|
100 | 100 | if (r < 0 && errno != EEXIST) |
|
101 | 101 | abortmsg("failed to make lock %s (errno = %d)", |
|
102 | 102 | opts->lockfile, errno); |
|
103 | 103 | return r; |
|
104 | 104 | } |
|
105 | 105 | |
|
106 | 106 | static void execcmdserver(const struct cmdserveropts *opts) |
|
107 | 107 | { |
|
108 | 108 | const char *hgcmd = getenv("CHGHG"); |
|
109 | 109 | if (!hgcmd || hgcmd[0] == '\0') |
|
110 | 110 | hgcmd = getenv("HG"); |
|
111 | 111 | if (!hgcmd || hgcmd[0] == '\0') |
|
112 | 112 | hgcmd = "hg"; |
|
113 | 113 | |
|
114 | 114 | const char *argv[] = { |
|
115 | 115 | hgcmd, |
|
116 | 116 | "serve", |
|
117 | 117 | "--cwd", "/", |
|
118 | 118 | "--cmdserver", "chgunix", |
|
119 | 119 | "--address", opts->sockname, |
|
120 | 120 | "--daemon-pipefds", opts->lockfile, |
|
121 | 121 | "--pid-file", opts->pidfile, |
|
122 | 122 | "--config", "extensions.chgserver=", |
|
123 | 123 | /* wrap root ui so that it can be disabled/enabled by config */ |
|
124 | 124 | "--config", "progress.assume-tty=1", |
|
125 | 125 | NULL, |
|
126 | 126 | }; |
|
127 | 127 | if (execvp(hgcmd, (char **)argv) < 0) |
|
128 | 128 | abortmsg("failed to exec cmdserver (errno = %d)", errno); |
|
129 | 129 | } |
|
130 | 130 | |
|
131 | 131 | /* |
|
132 | 132 | * Sleep until lock file is deleted, i.e. cmdserver process starts listening. |
|
133 | 133 | * If pid is given, it also checks if the child process fails to start. |
|
134 | 134 | */ |
|
135 | 135 | static void waitcmdserver(const struct cmdserveropts *opts, pid_t pid) |
|
136 | 136 | { |
|
137 | 137 | static const struct timespec sleepreq = {0, 10 * 1000000}; |
|
138 | 138 | int pst = 0; |
|
139 | 139 | |
|
140 | 140 | for (unsigned int i = 0; i < 10 * 100; i++) { |
|
141 | 141 | int r; |
|
142 | 142 | struct stat lst; |
|
143 | 143 | |
|
144 | 144 | r = lstat(opts->lockfile, &lst); |
|
145 | 145 | if (r < 0 && errno == ENOENT) |
|
146 | 146 | return; /* lock file deleted by server */ |
|
147 | 147 | if (r < 0) |
|
148 | 148 | goto cleanup; |
|
149 | 149 | |
|
150 | 150 | if (pid > 0) { |
|
151 | 151 | /* collect zombie if child process fails to start */ |
|
152 | 152 | r = waitpid(pid, &pst, WNOHANG); |
|
153 | 153 | if (r != 0) |
|
154 | 154 | goto cleanup; |
|
155 | 155 | } |
|
156 | 156 | |
|
157 | 157 | nanosleep(&sleepreq, NULL); |
|
158 | 158 | } |
|
159 | 159 | |
|
160 | 160 | abortmsg("timed out waiting for cmdserver %s", opts->lockfile); |
|
161 | 161 | return; |
|
162 | 162 | |
|
163 | 163 | cleanup: |
|
164 | 164 | if (pid > 0) |
|
165 | 165 | /* lockfile should be made by this process */ |
|
166 | 166 | unlink(opts->lockfile); |
|
167 | 167 | if (WIFEXITED(pst)) { |
|
168 | 168 | abortmsg("cmdserver exited with status %d", WEXITSTATUS(pst)); |
|
169 | 169 | } else if (WIFSIGNALED(pst)) { |
|
170 | 170 | abortmsg("cmdserver killed by signal %d", WTERMSIG(pst)); |
|
171 | 171 | } else { |
|
172 | 172 | abortmsg("error white waiting cmdserver"); |
|
173 | 173 | } |
|
174 | 174 | } |
|
175 | 175 | |
|
176 | 176 | /* Spawn new background cmdserver */ |
|
177 | 177 | static void startcmdserver(const struct cmdserveropts *opts) |
|
178 | 178 | { |
|
179 | 179 | debugmsg("start cmdserver at %s", opts->sockname); |
|
180 | 180 | |
|
181 | 181 | if (lockcmdserver(opts) < 0) { |
|
182 | 182 | debugmsg("lock file exists, waiting..."); |
|
183 | 183 | waitcmdserver(opts, 0); |
|
184 | 184 | return; |
|
185 | 185 | } |
|
186 | 186 | |
|
187 | 187 | /* remove dead cmdserver socket if any */ |
|
188 | 188 | unlink(opts->sockname); |
|
189 | 189 | |
|
190 | 190 | pid_t pid = fork(); |
|
191 | 191 | if (pid < 0) |
|
192 | 192 | abortmsg("failed to fork cmdserver process"); |
|
193 | 193 | if (pid == 0) { |
|
194 | 194 | /* bypass uisetup() of pager extension */ |
|
195 | 195 | int nullfd = open("/dev/null", O_WRONLY); |
|
196 | 196 | if (nullfd >= 0) { |
|
197 | 197 | dup2(nullfd, fileno(stdout)); |
|
198 | 198 | close(nullfd); |
|
199 | 199 | } |
|
200 | 200 | execcmdserver(opts); |
|
201 | 201 | } else { |
|
202 | 202 | waitcmdserver(opts, pid); |
|
203 | 203 | } |
|
204 | 204 | } |
|
205 | 205 | |
|
206 | 206 | static void killcmdserver(const struct cmdserveropts *opts, int sig) |
|
207 | 207 | { |
|
208 | 208 | FILE *fp = fopen(opts->pidfile, "r"); |
|
209 | 209 | if (!fp) |
|
210 | 210 | abortmsg("cannot open %s (errno = %d)", opts->pidfile, errno); |
|
211 | 211 | int pid = 0; |
|
212 | 212 | int n = fscanf(fp, "%d", &pid); |
|
213 | 213 | fclose(fp); |
|
214 | 214 | if (n != 1 || pid <= 0) |
|
215 | 215 | abortmsg("cannot read pid from %s", opts->pidfile); |
|
216 | 216 | |
|
217 | 217 | if (kill((pid_t)pid, sig) < 0) { |
|
218 | 218 | if (errno == ESRCH) |
|
219 | 219 | return; |
|
220 | 220 | abortmsg("cannot kill %d (errno = %d)", pid, errno); |
|
221 | 221 | } |
|
222 | 222 | } |
|
223 | 223 | |
|
224 | 224 | static pid_t peerpid = 0; |
|
225 | 225 | |
|
226 | 226 | static void forwardsignal(int sig) |
|
227 | 227 | { |
|
228 | 228 | assert(peerpid > 0); |
|
229 | 229 | if (kill(peerpid, sig) < 0) |
|
230 | 230 | abortmsg("cannot kill %d (errno = %d)", peerpid, errno); |
|
231 | 231 | debugmsg("forward signal %d", sig); |
|
232 | 232 | } |
|
233 | 233 | |
|
234 | 234 | static void setupsignalhandler(pid_t pid) |
|
235 | 235 | { |
|
236 | 236 | if (pid <= 0) |
|
237 | 237 | return; |
|
238 | 238 | peerpid = pid; |
|
239 | 239 | |
|
240 | 240 | struct sigaction sa; |
|
241 | 241 | memset(&sa, 0, sizeof(sa)); |
|
242 | 242 | sa.sa_handler = forwardsignal; |
|
243 | 243 | sa.sa_flags = SA_RESTART; |
|
244 |
sigemptyset(&sa.sa_mask) |
|
|
244 | if (sigemptyset(&sa.sa_mask) < 0) | |
|
245 | goto error; | |
|
245 | 246 | |
|
246 |
sigaction(SIGHUP, &sa, NULL) |
|
|
247 | sigaction(SIGINT, &sa, NULL); | |
|
247 | if (sigaction(SIGHUP, &sa, NULL) < 0) | |
|
248 | goto error; | |
|
249 | if (sigaction(SIGINT, &sa, NULL) < 0) | |
|
250 | goto error; | |
|
248 | 251 | |
|
249 | 252 | /* terminate frontend by double SIGTERM in case of server freeze */ |
|
250 | 253 | sa.sa_flags |= SA_RESETHAND; |
|
251 |
sigaction(SIGTERM, &sa, NULL) |
|
|
254 | if (sigaction(SIGTERM, &sa, NULL) < 0) | |
|
255 | goto error; | |
|
256 | return; | |
|
257 | ||
|
258 | error: | |
|
259 | abortmsg("failed to set up signal handlers (errno = %d)", errno); | |
|
252 | 260 | } |
|
253 | 261 | |
|
254 | 262 | /* This implementation is based on hgext/pager.py (pre 369741ef7253) */ |
|
255 | 263 | static void setuppager(hgclient_t *hgc, const char *const args[], |
|
256 | 264 | size_t argsize) |
|
257 | 265 | { |
|
258 | 266 | const char *pagercmd = hgc_getpager(hgc, args, argsize); |
|
259 | 267 | if (!pagercmd) |
|
260 | 268 | return; |
|
261 | 269 | |
|
262 | 270 | int pipefds[2]; |
|
263 | 271 | if (pipe(pipefds) < 0) |
|
264 | 272 | return; |
|
265 | 273 | pid_t pid = fork(); |
|
266 | 274 | if (pid < 0) |
|
267 | 275 | goto error; |
|
268 | 276 | if (pid == 0) { |
|
269 | 277 | close(pipefds[0]); |
|
270 | 278 | if (dup2(pipefds[1], fileno(stdout)) < 0) |
|
271 | 279 | goto error; |
|
272 | 280 | if (isatty(fileno(stderr))) { |
|
273 | 281 | if (dup2(pipefds[1], fileno(stderr)) < 0) |
|
274 | 282 | goto error; |
|
275 | 283 | } |
|
276 | 284 | close(pipefds[1]); |
|
277 | 285 | hgc_attachio(hgc); /* reattach to pager */ |
|
278 | 286 | return; |
|
279 | 287 | } else { |
|
280 | 288 | dup2(pipefds[0], fileno(stdin)); |
|
281 | 289 | close(pipefds[0]); |
|
282 | 290 | close(pipefds[1]); |
|
283 | 291 | |
|
284 | 292 | int r = execlp("/bin/sh", "/bin/sh", "-c", pagercmd, NULL); |
|
285 | 293 | if (r < 0) { |
|
286 | 294 | abortmsg("cannot start pager '%s' (errno = %d)", |
|
287 | 295 | pagercmd, errno); |
|
288 | 296 | } |
|
289 | 297 | return; |
|
290 | 298 | } |
|
291 | 299 | |
|
292 | 300 | error: |
|
293 | 301 | close(pipefds[0]); |
|
294 | 302 | close(pipefds[1]); |
|
295 | 303 | abortmsg("failed to prepare pager (errno = %d)", errno); |
|
296 | 304 | } |
|
297 | 305 | |
|
298 | 306 | int main(int argc, const char *argv[], const char *envp[]) |
|
299 | 307 | { |
|
300 | 308 | if (getenv("CHGDEBUG")) |
|
301 | 309 | enabledebugmsg(); |
|
302 | 310 | |
|
303 | 311 | struct cmdserveropts opts; |
|
304 | 312 | setcmdserveropts(&opts); |
|
305 | 313 | |
|
306 | 314 | if (argc == 2) { |
|
307 | 315 | int sig = 0; |
|
308 | 316 | if (strcmp(argv[1], "--kill-chg-daemon") == 0) |
|
309 | 317 | sig = SIGTERM; |
|
310 | 318 | if (strcmp(argv[1], "--reload-chg-daemon") == 0) |
|
311 | 319 | sig = SIGHUP; |
|
312 | 320 | if (sig > 0) { |
|
313 | 321 | killcmdserver(&opts, sig); |
|
314 | 322 | return 0; |
|
315 | 323 | } |
|
316 | 324 | } |
|
317 | 325 | |
|
318 | 326 | hgclient_t *hgc = hgc_open(opts.sockname); |
|
319 | 327 | if (!hgc) { |
|
320 | 328 | startcmdserver(&opts); |
|
321 | 329 | hgc = hgc_open(opts.sockname); |
|
322 | 330 | } |
|
323 | 331 | if (!hgc) |
|
324 | 332 | abortmsg("cannot open hg client"); |
|
325 | 333 | |
|
326 | 334 | setupsignalhandler(hgc_peerpid(hgc)); |
|
327 | 335 | hgc_setenv(hgc, envp); |
|
328 | 336 | setuppager(hgc, argv + 1, argc - 1); |
|
329 | 337 | int exitcode = hgc_runcommand(hgc, argv + 1, argc - 1); |
|
330 | 338 | hgc_close(hgc); |
|
331 | 339 | return exitcode; |
|
332 | 340 | } |
General Comments 0
You need to be logged in to leave comments.
Login now