mirror of
http://git.haproxy.org/git/haproxy.git/
synced 2025-02-15 01:47:19 +00:00
Gcc complains because the systemd wrapper mixed code and declaration : "warning: ISO C90 forbids mixed declarations and code [-Wdeclaration-after-statement]".
215 lines
4.5 KiB
C
215 lines
4.5 KiB
C
/*
|
|
* Wrapper to make haproxy systemd-compliant.
|
|
*
|
|
* Copyright 2013 Marc-Antoine Perennou <Marc-Antoine@Perennou.com>
|
|
*
|
|
* This program is free software; you can redistribute it and/or
|
|
* modify it under the terms of the GNU General Public License
|
|
* as published by the Free Software Foundation; either version
|
|
* 2 of the License, or (at your option) any later version.
|
|
*
|
|
*/
|
|
|
|
#include <errno.h>
|
|
#include <signal.h>
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
#include <unistd.h>
|
|
#include <sys/wait.h>
|
|
|
|
#define REEXEC_FLAG "HAPROXY_SYSTEMD_REEXEC"
|
|
#define SD_DEBUG "<7>"
|
|
#define SD_NOTICE "<5>"
|
|
|
|
static volatile sig_atomic_t caught_signal;
|
|
|
|
static char *pid_file = "/run/haproxy.pid";
|
|
static int wrapper_argc;
|
|
static char **wrapper_argv;
|
|
|
|
/* returns the path to the haproxy binary into <buffer>, whose size indicated
|
|
* in <buffer_size> must be at least 1 byte long.
|
|
*/
|
|
static void locate_haproxy(char *buffer, size_t buffer_size)
|
|
{
|
|
char *end = NULL;
|
|
int len;
|
|
|
|
len = readlink("/proc/self/exe", buffer, buffer_size - 1);
|
|
if (len == -1)
|
|
goto fail;
|
|
|
|
buffer[len] = 0;
|
|
end = strrchr(buffer, '/');
|
|
if (end == NULL)
|
|
goto fail;
|
|
|
|
if (strcmp(end + strlen(end) - 16, "-systemd-wrapper") == 0) {
|
|
end[strlen(end) - 16] = '\0';
|
|
return;
|
|
}
|
|
|
|
end[1] = '\0';
|
|
strncpy(end + 1, "haproxy", buffer + buffer_size - (end + 1));
|
|
buffer[buffer_size - 1] = '\0';
|
|
return;
|
|
fail:
|
|
strncpy(buffer, "/usr/sbin/haproxy", buffer_size);
|
|
buffer[buffer_size - 1] = '\0';
|
|
return;
|
|
}
|
|
|
|
static void spawn_haproxy(char **pid_strv, int nb_pid)
|
|
{
|
|
char haproxy_bin[512];
|
|
pid_t pid;
|
|
int main_argc;
|
|
char **main_argv;
|
|
|
|
main_argc = wrapper_argc - 1;
|
|
main_argv = wrapper_argv + 1;
|
|
|
|
pid = fork();
|
|
if (!pid) {
|
|
/* 3 for "haproxy -Ds -sf" */
|
|
char **argv = calloc(4 + main_argc + nb_pid + 1, sizeof(char *));
|
|
int i;
|
|
int argno = 0;
|
|
locate_haproxy(haproxy_bin, 512);
|
|
argv[argno++] = haproxy_bin;
|
|
for (i = 0; i < main_argc; ++i)
|
|
argv[argno++] = main_argv[i];
|
|
argv[argno++] = "-Ds";
|
|
if (nb_pid > 0) {
|
|
argv[argno++] = "-sf";
|
|
for (i = 0; i < nb_pid; ++i)
|
|
argv[argno++] = pid_strv[i];
|
|
}
|
|
argv[argno] = NULL;
|
|
|
|
fprintf(stderr, SD_DEBUG "haproxy-systemd-wrapper: executing ");
|
|
for (i = 0; argv[i]; ++i)
|
|
fprintf(stderr, "%s ", argv[i]);
|
|
fprintf(stderr, "\n");
|
|
|
|
execv(argv[0], argv);
|
|
exit(0);
|
|
}
|
|
}
|
|
|
|
static int read_pids(char ***pid_strv)
|
|
{
|
|
FILE *f = fopen(pid_file, "r");
|
|
int read = 0, allocated = 8;
|
|
char pid_str[10];
|
|
|
|
if (!f)
|
|
return 0;
|
|
|
|
*pid_strv = malloc(allocated * sizeof(char *));
|
|
while (1 == fscanf(f, "%s\n", pid_str)) {
|
|
if (read == allocated) {
|
|
allocated *= 2;
|
|
*pid_strv = realloc(*pid_strv, allocated * sizeof(char *));
|
|
}
|
|
(*pid_strv)[read++] = strdup(pid_str);
|
|
}
|
|
|
|
fclose(f);
|
|
|
|
return read;
|
|
}
|
|
|
|
static void signal_handler(int signum)
|
|
{
|
|
caught_signal = signum;
|
|
}
|
|
|
|
static void do_restart(void)
|
|
{
|
|
setenv(REEXEC_FLAG, "1", 1);
|
|
fprintf(stderr, SD_NOTICE "haproxy-systemd-wrapper: re-executing\n");
|
|
|
|
execv(wrapper_argv[0], wrapper_argv);
|
|
}
|
|
|
|
static void do_shutdown(void)
|
|
{
|
|
int i, pid;
|
|
char **pid_strv = NULL;
|
|
int nb_pid = read_pids(&pid_strv);
|
|
for (i = 0; i < nb_pid; ++i) {
|
|
pid = atoi(pid_strv[i]);
|
|
if (pid > 0) {
|
|
fprintf(stderr, SD_DEBUG "haproxy-systemd-wrapper: SIGINT -> %d\n", pid);
|
|
kill(pid, SIGINT);
|
|
free(pid_strv[i]);
|
|
}
|
|
}
|
|
free(pid_strv);
|
|
}
|
|
|
|
static void init(int argc, char **argv)
|
|
{
|
|
while (argc > 1) {
|
|
if ((*argv)[0] == '-' && (*argv)[1] == 'p') {
|
|
pid_file = *(argv + 1);
|
|
}
|
|
--argc; ++argv;
|
|
}
|
|
}
|
|
|
|
int main(int argc, char **argv)
|
|
{
|
|
int status;
|
|
struct sigaction sa;
|
|
|
|
wrapper_argc = argc;
|
|
wrapper_argv = argv;
|
|
|
|
--argc; ++argv;
|
|
init(argc, argv);
|
|
|
|
memset(&sa, 0, sizeof(struct sigaction));
|
|
sa.sa_handler = &signal_handler;
|
|
sigaction(SIGUSR2, &sa, NULL);
|
|
sigaction(SIGHUP, &sa, NULL);
|
|
sigaction(SIGINT, &sa, NULL);
|
|
sigaction(SIGTERM, &sa, NULL);
|
|
|
|
if (getenv(REEXEC_FLAG) != NULL) {
|
|
/* We are being re-executed: restart HAProxy gracefully */
|
|
int i;
|
|
char **pid_strv = NULL;
|
|
int nb_pid = read_pids(&pid_strv);
|
|
|
|
unsetenv(REEXEC_FLAG);
|
|
spawn_haproxy(pid_strv, nb_pid);
|
|
|
|
for (i = 0; i < nb_pid; ++i)
|
|
free(pid_strv[i]);
|
|
free(pid_strv);
|
|
}
|
|
else {
|
|
/* Start a fresh copy of HAProxy */
|
|
spawn_haproxy(NULL, 0);
|
|
}
|
|
|
|
status = -1;
|
|
while (-1 != wait(&status) || errno == EINTR) {
|
|
if (caught_signal == SIGUSR2 || caught_signal == SIGHUP) {
|
|
caught_signal = 0;
|
|
do_restart();
|
|
}
|
|
else if (caught_signal == SIGINT || caught_signal == SIGTERM) {
|
|
caught_signal = 0;
|
|
do_shutdown();
|
|
}
|
|
}
|
|
|
|
fprintf(stderr, SD_NOTICE "haproxy-systemd-wrapper: exit, haproxy RC=%d\n",
|
|
status);
|
|
return status;
|
|
}
|