veilid/veilid-server/src/unix.rs

124 lines
4.0 KiB
Rust
Raw Normal View History

2022-05-16 15:52:48 +00:00
use crate::server::*;
2022-01-15 23:50:56 +00:00
use crate::settings::Settings;
2022-06-28 03:46:29 +00:00
use crate::tools::*;
2022-05-16 15:52:48 +00:00
use crate::veilid_logs::*;
2022-01-15 23:50:56 +00:00
use clap::ArgMatches;
2022-06-28 03:46:29 +00:00
use futures::StreamExt;
2022-05-16 15:52:48 +00:00
use signal_hook::consts::signal::*;
use signal_hook_async_std::Signals;
2022-05-28 14:07:57 +00:00
use std::io::Read;
2022-06-10 21:07:10 +00:00
use tracing::*;
2021-11-22 16:28:30 +00:00
2022-06-10 21:07:10 +00:00
#[instrument(skip(signals))]
2022-05-16 15:52:48 +00:00
async fn handle_signals(mut signals: Signals) {
while let Some(signal) = signals.next().await {
match signal {
SIGHUP => {
// XXX: reload configuration?
}
SIGTERM | SIGINT | SIGQUIT => {
// Shutdown the system;
shutdown();
}
_ => unreachable!(),
}
}
}
2022-06-10 21:07:10 +00:00
#[instrument(err)]
2022-05-16 15:52:48 +00:00
pub fn run_daemon(settings: Settings, _matches: ArgMatches) -> Result<(), String> {
let daemon = {
let mut daemon = daemonize::Daemonize::new();
let s = settings.read();
2022-05-28 14:07:57 +00:00
if let Some(pid_file) = s.daemon.pid_file.clone() {
daemon = daemon.pid_file(pid_file.clone()); //.chown_pid_file(true);
daemon = daemon.exit_action(move || {
// wait for pid file to exist before exiting parent
let pid_path = std::path::Path::new(&pid_file);
loop {
if let Ok(mut f) = std::fs::File::open(pid_path) {
let mut s = String::new();
if f.read_to_string(&mut s).is_ok()
&& !s.is_empty()
&& s.parse::<u32>().is_ok()
{
println!("pidfile found");
break;
}
}
std::thread::sleep(std::time::Duration::from_millis(100));
}
})
2022-05-16 15:52:48 +00:00
}
if let Some(chroot) = &s.daemon.chroot {
daemon = daemon.chroot(chroot);
}
if let Some(working_directory) = &s.daemon.working_directory {
daemon = daemon.working_directory(working_directory);
}
if let Some(user) = &s.daemon.user {
daemon = daemon.user(user.as_str());
}
if let Some(group) = &s.daemon.group {
daemon = daemon.group(group.as_str());
}
let stdout_file = if let Some(stdout_file) = &s.daemon.stdout_file {
Some(
std::fs::File::create(stdout_file)
.map_err(|e| format!("Failed to create stdio file: {}", e))?,
)
} else {
None
};
if let Some(stderr_file) = &s.daemon.stderr_file {
if Some(stderr_file) == s.daemon.stdout_file.as_ref() {
// same output file for stderr and stdout
daemon = daemon.stderr(
stdout_file
.as_ref()
.unwrap()
.try_clone()
.map_err(|e| format!("Failed to clone stdout file: {}", e))?,
);
} else {
daemon = daemon.stderr(
std::fs::File::create(stderr_file)
.map_err(|e| format!("Failed to create stderr file: {}", e))?,
);
}
}
if let Some(stdout_file) = stdout_file {
daemon = daemon.stdout(stdout_file);
}
daemon
};
// Now, run the server
2022-06-28 03:46:29 +00:00
block_on(async {
2022-06-11 22:47:58 +00:00
// Init combined console/file logger
let _logs = VeilidLogs::setup(settings.clone())?;
// Daemonize
daemon
.start()
.map_err(|e| format!("Failed to daemonize: {}", e))?;
2022-05-16 15:52:48 +00:00
// Catch signals
let signals = Signals::new(&[SIGHUP, SIGTERM, SIGINT, SIGQUIT])
.map_err(|e| format!("failed to init signals: {}", e))?;
let handle = signals.handle();
2022-06-28 03:46:29 +00:00
let signals_task = spawn(handle_signals(signals));
2022-05-16 15:52:48 +00:00
2022-06-08 13:33:41 +00:00
let res = run_veilid_server(settings, ServerMode::Normal).await;
2022-05-16 15:52:48 +00:00
// Terminate the signal stream.
handle.close();
2022-06-29 14:13:49 +00:00
let _ = signals_task.await;
2022-05-16 15:52:48 +00:00
res
})
2021-11-22 16:28:30 +00:00
}