Mon, 26 May 2025 21:13:11 +0200
remove ucx utils.h includes
| 1 | 1 | /* |
| 2 | * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS HEADER. | |
| 3 | * | |
|
44
3da1f7b6847f
added some error messages
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
41
diff
changeset
|
4 | * Copyright 2013 Olaf Wintermann. All rights reserved. |
| 1 | 5 | * |
| 6 | * Redistribution and use in source and binary forms, with or without | |
| 7 | * modification, are permitted provided that the following conditions are met: | |
| 8 | * | |
| 9 | * 1. Redistributions of source code must retain the above copyright | |
| 10 | * notice, this list of conditions and the following disclaimer. | |
| 11 | * | |
| 12 | * 2. Redistributions in binary form must reproduce the above copyright | |
| 13 | * notice, this list of conditions and the following disclaimer in the | |
| 14 | * documentation and/or other materials provided with the distribution. | |
| 15 | * | |
| 16 | * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" | |
| 17 | * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | |
| 18 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | |
| 19 | * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE | |
| 20 | * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR | |
| 21 | * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF | |
| 22 | * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS | |
| 23 | * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN | |
| 24 | * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) | |
| 25 | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE | |
| 26 | * POSSIBILITY OF SUCH DAMAGE. | |
| 27 | */ | |
| 28 | ||
|
41
bb7a1f5a8b48
added Linux support
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
39
diff
changeset
|
29 | |
|
bb7a1f5a8b48
added Linux support
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
39
diff
changeset
|
30 | #ifdef __gnu_linux__ |
|
bb7a1f5a8b48
added Linux support
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
39
diff
changeset
|
31 | #define _GNU_SOURCE |
|
bb7a1f5a8b48
added Linux support
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
39
diff
changeset
|
32 | #endif |
|
bb7a1f5a8b48
added Linux support
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
39
diff
changeset
|
33 | |
| 1 | 34 | #include <stdio.h> |
| 35 | #include <stdlib.h> | |
|
9
30e51941a673
Added mod_jk dependencies
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
6
diff
changeset
|
36 | #include <dlfcn.h> |
|
47
ce9790523346
server can change uid
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
44
diff
changeset
|
37 | #include <grp.h> |
|
58
66c22e54aa90
webdav uses the vfs api
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
47
diff
changeset
|
38 | #include <sys/types.h> |
|
66c22e54aa90
webdav uses the vfs api
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
47
diff
changeset
|
39 | #include <sys/stat.h> |
| 1 | 40 | |
|
106
b122f34ddc80
added minimal ssl support
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
85
diff
changeset
|
41 | #include <openssl/bio.h> |
|
b122f34ddc80
added minimal ssl support
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
85
diff
changeset
|
42 | #include <openssl/ssl.h> |
|
b122f34ddc80
added minimal ssl support
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
85
diff
changeset
|
43 | #include <openssl/err.h> |
|
b122f34ddc80
added minimal ssl support
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
85
diff
changeset
|
44 | |
|
14
b8bf95b39952
New source folder layout
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
9
diff
changeset
|
45 | #include "../public/nsapi.h" |
|
59
ab25c0a231d0
some fixes and new public APIs
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
58
diff
changeset
|
46 | #include "../public/auth.h" |
|
14
b8bf95b39952
New source folder layout
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
9
diff
changeset
|
47 | #include "../util/systhr.h" |
|
363
7f0f5c03666a
port pblock.cpp to pblock.c
Mike Becker <universe@uap-core.de>
parents:
179
diff
changeset
|
48 | #include "../util/pblock.h" |
|
47
ce9790523346
server can change uid
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
44
diff
changeset
|
49 | #include "../util/util.h" |
| 1 | 50 | |
|
415
d938228c382e
switch from ucx 2 to 3
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
392
diff
changeset
|
51 | #include <cx/printf.h> |
|
d938228c382e
switch from ucx 2 to 3
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
392
diff
changeset
|
52 | #include <cx/compare.h> |
|
156
724e107983e9
adds unix domain socket for server control ops
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
154
diff
changeset
|
53 | |
|
154
6394ce09889a
adds set-variable saf
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
146
diff
changeset
|
54 | #include "../safs/common.h" |
|
6394ce09889a
adds set-variable saf
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
146
diff
changeset
|
55 | |
| 1 | 56 | #include "func.h" |
|
18
73aacbf6e492
Added server.conf parser
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
14
diff
changeset
|
57 | #include "config.h" |
|
19
d680536f8c2f
Added configuration manager
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
18
diff
changeset
|
58 | #include "configmanager.h" |
| 1 | 59 | #include "httplistener.h" |
| 60 | #include "webserver.h" | |
|
66
74babc0082b7
added authentication cache
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
63
diff
changeset
|
61 | #include "auth.h" |
|
158
77f4f0079428
adds reconfig and shutdown handler to srvctrl
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
156
diff
changeset
|
62 | #include "srvctrl.h" |
|
269
3dfbd0b91950
add ResourcePool initialization
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
256
diff
changeset
|
63 | #include "resourcepool.h" |
|
461
9b20b8f3582b
add ldap resource pool type implementation
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
444
diff
changeset
|
64 | #include "ldap_resource.h" |
| 1 | 65 | |
| 66 | extern struct FuncStruct webserver_funcs[]; | |
| 67 | ||
|
68
f5102a892ed4
some fixes for mod_jk
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
66
diff
changeset
|
68 | static RestartCallback *atrestart; |
| 1 | 69 | |
|
576
5c31cc844c68
add more shutdown cleanup: pwbuf, threadpool, logfiles, authdb
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
574
diff
changeset
|
70 | static char *pwbuf; |
|
5c31cc844c68
add more shutdown cleanup: pwbuf, threadpool, logfiles, authdb
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
574
diff
changeset
|
71 | |
|
129
fd324464f56f
adds support for ssl cert chain files and improves ssl error handling
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
115
diff
changeset
|
72 | int webserver_init() { |
| 1 | 73 | // init NSPR |
| 74 | systhread_init("webserver"); | |
| 28 | 75 | |
|
392
0aef555055ee
print error in case the log file config doesn't work
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
391
diff
changeset
|
76 | log_ereport(LOG_VERBOSE, "webserver_init"); |
|
0aef555055ee
print error in case the log file config doesn't work
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
391
diff
changeset
|
77 | |
|
106
b122f34ddc80
added minimal ssl support
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
85
diff
changeset
|
78 | // init ssl |
|
b122f34ddc80
added minimal ssl support
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
85
diff
changeset
|
79 | if(ws_init_ssl()) { |
|
392
0aef555055ee
print error in case the log file config doesn't work
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
391
diff
changeset
|
80 | log_ereport(LOG_FAILURE, "ssl init failed"); |
|
106
b122f34ddc80
added minimal ssl support
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
85
diff
changeset
|
81 | return -1; |
|
b122f34ddc80
added minimal ssl support
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
85
diff
changeset
|
82 | } |
|
b122f34ddc80
added minimal ssl support
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
85
diff
changeset
|
83 | |
|
438
22eca559aded
refactore http listener creation
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
435
diff
changeset
|
84 | // init listener socket map |
|
22eca559aded
refactore http listener creation
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
435
diff
changeset
|
85 | if(http_listener_global_init()) { |
|
22eca559aded
refactore http listener creation
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
435
diff
changeset
|
86 | log_ereport(LOG_FAILURE, "listener global init failed"); |
|
22eca559aded
refactore http listener creation
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
435
diff
changeset
|
87 | return -1; |
|
22eca559aded
refactore http listener creation
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
435
diff
changeset
|
88 | } |
|
22eca559aded
refactore http listener creation
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
435
diff
changeset
|
89 | |
| 1 | 90 | // init NSAPI functions |
|
363
7f0f5c03666a
port pblock.cpp to pblock.c
Mike Becker <universe@uap-core.de>
parents:
179
diff
changeset
|
91 | pblock_init_default_keys(); |
|
7f0f5c03666a
port pblock.cpp to pblock.c
Mike Becker <universe@uap-core.de>
parents:
179
diff
changeset
|
92 | atexit(pblock_free_default_keys); |
| 1 | 93 | func_init(); |
| 94 | add_functions(webserver_funcs); | |
|
38
d07810b02147
added ldap authentication
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
32
diff
changeset
|
95 | |
|
269
3dfbd0b91950
add ResourcePool initialization
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
256
diff
changeset
|
96 | // init resource pools |
|
3dfbd0b91950
add ResourcePool initialization
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
256
diff
changeset
|
97 | if(init_resource_pools()) { |
|
392
0aef555055ee
print error in case the log file config doesn't work
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
391
diff
changeset
|
98 | log_ereport(LOG_FAILURE, "resource pool init failed"); |
|
269
3dfbd0b91950
add ResourcePool initialization
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
256
diff
changeset
|
99 | return -1; |
|
3dfbd0b91950
add ResourcePool initialization
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
256
diff
changeset
|
100 | } |
|
461
9b20b8f3582b
add ldap resource pool type implementation
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
444
diff
changeset
|
101 | if(resourcepool_register_type("ldap", ldap_get_resource_type())) { |
|
9b20b8f3582b
add ldap resource pool type implementation
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
444
diff
changeset
|
102 | log_ereport(LOG_FAILURE, "webserver-init: Cannot register ldap resourcepool type"); |
|
9b20b8f3582b
add ldap resource pool type implementation
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
444
diff
changeset
|
103 | return -1; |
|
9b20b8f3582b
add ldap resource pool type implementation
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
444
diff
changeset
|
104 | } |
|
269
3dfbd0b91950
add ResourcePool initialization
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
256
diff
changeset
|
105 | |
| 1 | 106 | // load init.conf |
|
426
6a2e7a464991
run Init directives after setuid
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
415
diff
changeset
|
107 | InitConfig *init_config = load_init_conf("config/init.conf"); |
|
6a2e7a464991
run Init directives after setuid
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
415
diff
changeset
|
108 | if(!init_config) { |
|
60
feb2f1e115c6
improved logging
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
59
diff
changeset
|
109 | return -1; |
|
feb2f1e115c6
improved logging
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
59
diff
changeset
|
110 | } |
| 1 | 111 | |
| 112 | // load server.conf | |
|
388
30d29ef5b79a
change uid before most of the config is loaded
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
386
diff
changeset
|
113 | // Only the runtime infos are stored in the ServerConfiguration at |
|
30d29ef5b79a
change uid before most of the config is loaded
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
386
diff
changeset
|
114 | // this stage. The remaining configuration is loaded after the uid |
|
30d29ef5b79a
change uid before most of the config is loaded
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
386
diff
changeset
|
115 | // is changed (if needed). |
|
19
d680536f8c2f
Added configuration manager
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
18
diff
changeset
|
116 | init_configuration_manager(); |
|
388
30d29ef5b79a
change uid before most of the config is loaded
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
386
diff
changeset
|
117 | CfgManager mgr; |
|
30d29ef5b79a
change uid before most of the config is loaded
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
386
diff
changeset
|
118 | if(cfgmgr_load_config(&mgr) != 0) { |
|
443
ef3c8a0e1fee
improve daemon startup
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
440
diff
changeset
|
119 | return 1; |
|
19
d680536f8c2f
Added configuration manager
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
18
diff
changeset
|
120 | } |
|
392
0aef555055ee
print error in case the log file config doesn't work
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
391
diff
changeset
|
121 | log_ereport(LOG_VERBOSE, "cfgmgr_load_config stage 1 successful"); |
|
388
30d29ef5b79a
change uid before most of the config is loaded
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
386
diff
changeset
|
122 | ServerConfiguration *cfg = mgr.cfg; |
|
47
ce9790523346
server can change uid
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
44
diff
changeset
|
123 | |
|
ce9790523346
server can change uid
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
44
diff
changeset
|
124 | // set global vars |
|
ce9790523346
server can change uid
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
44
diff
changeset
|
125 | conf_global_vars_s *vars = conf_getglobals(); |
|
ce9790523346
server can change uid
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
44
diff
changeset
|
126 | |
|
146
a9591a91c004
fixes server user init
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
133
diff
changeset
|
127 | WSBool changeuid = FALSE; |
|
73
79fa26ecd135
added file system ACLs for linux
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
68
diff
changeset
|
128 | uid_t ws_uid = geteuid(); |
|
63
66442f81f823
supports file system ACLs on Solaris
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
60
diff
changeset
|
129 | setpwent(); |
|
576
5c31cc844c68
add more shutdown cleanup: pwbuf, threadpool, logfiles, authdb
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
574
diff
changeset
|
130 | pwbuf = malloc(DEF_PWBUF); |
|
73
79fa26ecd135
added file system ACLs for linux
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
68
diff
changeset
|
131 | vars->Vuserpw = malloc(sizeof(struct passwd)); |
|
79fa26ecd135
added file system ACLs for linux
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
68
diff
changeset
|
132 | if(cfg->user.ptr) { |
|
79fa26ecd135
added file system ACLs for linux
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
68
diff
changeset
|
133 | if(!util_getpwnam(cfg->user.ptr, vars->Vuserpw, pwbuf, DEF_PWBUF)) { |
|
79fa26ecd135
added file system ACLs for linux
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
68
diff
changeset
|
134 | log_ereport( |
|
79fa26ecd135
added file system ACLs for linux
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
68
diff
changeset
|
135 | LOG_MISCONFIG, |
|
79fa26ecd135
added file system ACLs for linux
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
68
diff
changeset
|
136 | "user %s does not exist!", |
|
79fa26ecd135
added file system ACLs for linux
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
68
diff
changeset
|
137 | cfg->user.ptr); |
|
79fa26ecd135
added file system ACLs for linux
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
68
diff
changeset
|
138 | free(vars->Vuserpw); |
|
79fa26ecd135
added file system ACLs for linux
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
68
diff
changeset
|
139 | vars->Vuserpw = NULL; |
|
146
a9591a91c004
fixes server user init
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
133
diff
changeset
|
140 | } else { |
|
a9591a91c004
fixes server user init
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
133
diff
changeset
|
141 | changeuid = TRUE; |
|
73
79fa26ecd135
added file system ACLs for linux
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
68
diff
changeset
|
142 | } |
|
79fa26ecd135
added file system ACLs for linux
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
68
diff
changeset
|
143 | } else { |
|
79fa26ecd135
added file system ACLs for linux
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
68
diff
changeset
|
144 | if(!util_getpwuid(ws_uid, vars->Vuserpw, pwbuf, DEF_PWBUF)) { |
|
79fa26ecd135
added file system ACLs for linux
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
68
diff
changeset
|
145 | log_ereport(LOG_FAILURE, "webserver_init: cannot get passwd data"); |
|
79fa26ecd135
added file system ACLs for linux
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
68
diff
changeset
|
146 | free(vars->Vuserpw); |
|
79fa26ecd135
added file system ACLs for linux
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
68
diff
changeset
|
147 | vars->Vuserpw = NULL; |
|
79fa26ecd135
added file system ACLs for linux
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
68
diff
changeset
|
148 | } |
|
79fa26ecd135
added file system ACLs for linux
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
68
diff
changeset
|
149 | } |
|
79fa26ecd135
added file system ACLs for linux
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
68
diff
changeset
|
150 | if(!vars->Vuserpw) { |
|
435
713ec3da79ec
expression parser: add support for functions
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
427
diff
changeset
|
151 | log_ereport(LOG_VERBOSE, "globalvars->Vuserpw is null"); |
|
73
79fa26ecd135
added file system ACLs for linux
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
68
diff
changeset
|
152 | } |
|
576
5c31cc844c68
add more shutdown cleanup: pwbuf, threadpool, logfiles, authdb
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
574
diff
changeset
|
153 | endpwent(); |
|
443
ef3c8a0e1fee
improve daemon startup
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
440
diff
changeset
|
154 | |
|
47
ce9790523346
server can change uid
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
44
diff
changeset
|
155 | // change uid |
|
146
a9591a91c004
fixes server user init
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
133
diff
changeset
|
156 | if(changeuid && ws_uid == 0) { |
|
47
ce9790523346
server can change uid
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
44
diff
changeset
|
157 | // a webserver user is set and we are root |
|
391
80ee93a7d257
add verbose logging for setuid/setgid and abort startup if setuid fails
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
388
diff
changeset
|
158 | log_ereport(LOG_VERBOSE, "setgid(%d)", vars->Vuserpw->pw_gid); |
|
47
ce9790523346
server can change uid
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
44
diff
changeset
|
159 | if(setgid(vars->Vuserpw->pw_gid) != 0) { |
|
ce9790523346
server can change uid
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
44
diff
changeset
|
160 | log_ereport( |
|
60
feb2f1e115c6
improved logging
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
59
diff
changeset
|
161 | LOG_FAILURE, |
|
47
ce9790523346
server can change uid
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
44
diff
changeset
|
162 | "setgid(%d) failed", |
|
ce9790523346
server can change uid
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
44
diff
changeset
|
163 | vars->Vuserpw->pw_gid); |
|
391
80ee93a7d257
add verbose logging for setuid/setgid and abort startup if setuid fails
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
388
diff
changeset
|
164 | return -1; |
|
47
ce9790523346
server can change uid
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
44
diff
changeset
|
165 | } else { |
|
ce9790523346
server can change uid
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
44
diff
changeset
|
166 | // setgid was successful |
|
ce9790523346
server can change uid
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
44
diff
changeset
|
167 | // we need to call initgroups to have all group permissions |
|
ce9790523346
server can change uid
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
44
diff
changeset
|
168 | if(initgroups(vars->Vuserpw->pw_name, vars->Vuserpw->pw_gid)!=0) { |
|
60
feb2f1e115c6
improved logging
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
59
diff
changeset
|
169 | log_ereport(LOG_FAILURE, "initgroups failed"); |
|
391
80ee93a7d257
add verbose logging for setuid/setgid and abort startup if setuid fails
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
388
diff
changeset
|
170 | return -1; |
|
47
ce9790523346
server can change uid
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
44
diff
changeset
|
171 | } |
|
ce9790523346
server can change uid
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
44
diff
changeset
|
172 | } |
|
ce9790523346
server can change uid
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
44
diff
changeset
|
173 | |
|
ce9790523346
server can change uid
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
44
diff
changeset
|
174 | // change the uid |
|
391
80ee93a7d257
add verbose logging for setuid/setgid and abort startup if setuid fails
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
388
diff
changeset
|
175 | log_ereport(LOG_VERBOSE, "setuid(%d)", vars->Vuserpw->pw_uid); |
|
47
ce9790523346
server can change uid
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
44
diff
changeset
|
176 | if(setuid(vars->Vuserpw->pw_uid)) { |
|
ce9790523346
server can change uid
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
44
diff
changeset
|
177 | log_ereport( |
|
60
feb2f1e115c6
improved logging
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
59
diff
changeset
|
178 | LOG_FAILURE, |
|
47
ce9790523346
server can change uid
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
44
diff
changeset
|
179 | "setuid(%d) failed", |
|
ce9790523346
server can change uid
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
44
diff
changeset
|
180 | vars->Vuserpw->pw_uid); |
|
391
80ee93a7d257
add verbose logging for setuid/setgid and abort startup if setuid fails
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
388
diff
changeset
|
181 | return -1; |
|
47
ce9790523346
server can change uid
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
44
diff
changeset
|
182 | } |
|
ce9790523346
server can change uid
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
44
diff
changeset
|
183 | } else if(vars->Vuserpw) { |
|
ce9790523346
server can change uid
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
44
diff
changeset
|
184 | log_ereport( |
|
60
feb2f1e115c6
improved logging
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
59
diff
changeset
|
185 | LOG_WARN, |
|
47
ce9790523346
server can change uid
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
44
diff
changeset
|
186 | "server must be started as root to change uid"); |
|
ce9790523346
server can change uid
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
44
diff
changeset
|
187 | } |
|
66
74babc0082b7
added authentication cache
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
63
diff
changeset
|
188 | |
|
426
6a2e7a464991
run Init directives after setuid
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
415
diff
changeset
|
189 | // run Init directives |
|
6a2e7a464991
run Init directives after setuid
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
415
diff
changeset
|
190 | // this must be done after setuid |
|
6a2e7a464991
run Init directives after setuid
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
415
diff
changeset
|
191 | int err = apply_init_conf(init_config); |
|
6a2e7a464991
run Init directives after setuid
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
415
diff
changeset
|
192 | free_init_conf(init_config); |
|
6a2e7a464991
run Init directives after setuid
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
415
diff
changeset
|
193 | if(err) { |
|
6a2e7a464991
run Init directives after setuid
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
415
diff
changeset
|
194 | log_ereport(LOG_FAILURE, "server init failed"); |
|
6a2e7a464991
run Init directives after setuid
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
415
diff
changeset
|
195 | return 1; |
|
6a2e7a464991
run Init directives after setuid
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
415
diff
changeset
|
196 | } |
|
6a2e7a464991
run Init directives after setuid
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
415
diff
changeset
|
197 | |
|
6a2e7a464991
run Init directives after setuid
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
415
diff
changeset
|
198 | // init caches |
|
6a2e7a464991
run Init directives after setuid
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
415
diff
changeset
|
199 | auth_cache_init(); |
|
6a2e7a464991
run Init directives after setuid
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
415
diff
changeset
|
200 | |
|
6a2e7a464991
run Init directives after setuid
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
415
diff
changeset
|
201 | // init SAFs |
|
6a2e7a464991
run Init directives after setuid
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
415
diff
changeset
|
202 | common_saf_init(); |
|
6a2e7a464991
run Init directives after setuid
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
415
diff
changeset
|
203 | |
|
388
30d29ef5b79a
change uid before most of the config is loaded
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
386
diff
changeset
|
204 | |
|
30d29ef5b79a
change uid before most of the config is loaded
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
386
diff
changeset
|
205 | // now that the process is running as the correct user, we can load |
|
30d29ef5b79a
change uid before most of the config is loaded
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
386
diff
changeset
|
206 | // the remaining config |
|
30d29ef5b79a
change uid before most of the config is loaded
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
386
diff
changeset
|
207 | if(cfgmgr_apply_config(&mgr)) { |
|
392
0aef555055ee
print error in case the log file config doesn't work
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
391
diff
changeset
|
208 | log_ereport(LOG_FAILURE, "load config stage 2 failed"); |
|
388
30d29ef5b79a
change uid before most of the config is loaded
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
386
diff
changeset
|
209 | return -1; |
|
30d29ef5b79a
change uid before most of the config is loaded
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
386
diff
changeset
|
210 | } |
|
30d29ef5b79a
change uid before most of the config is loaded
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
386
diff
changeset
|
211 | |
|
30d29ef5b79a
change uid before most of the config is loaded
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
386
diff
changeset
|
212 | |
|
156
724e107983e9
adds unix domain socket for server control ops
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
154
diff
changeset
|
213 | // create tmp dir and pid file |
|
724e107983e9
adds unix domain socket for server control ops
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
154
diff
changeset
|
214 | char *mkdir_cmd = NULL; |
|
724e107983e9
adds unix domain socket for server control ops
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
154
diff
changeset
|
215 | asprintf(&mkdir_cmd, "mkdir -p %s", cfg->tmp.ptr); |
|
724e107983e9
adds unix domain socket for server control ops
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
154
diff
changeset
|
216 | system(mkdir_cmd); |
|
724e107983e9
adds unix domain socket for server control ops
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
154
diff
changeset
|
217 | free(mkdir_cmd); |
|
724e107983e9
adds unix domain socket for server control ops
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
154
diff
changeset
|
218 | |
|
724e107983e9
adds unix domain socket for server control ops
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
154
diff
changeset
|
219 | char *pid_file_path = NULL; |
|
724e107983e9
adds unix domain socket for server control ops
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
154
diff
changeset
|
220 | asprintf(&pid_file_path, "%s/pid", cfg->tmp.ptr); |
|
427
a327cb6cc868
add check if pidfile can be opened
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
426
diff
changeset
|
221 | FILE *pidfile = fopen(pid_file_path, "w"); |
|
a327cb6cc868
add check if pidfile can be opened
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
426
diff
changeset
|
222 | if(!pidfile) { |
|
a327cb6cc868
add check if pidfile can be opened
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
426
diff
changeset
|
223 | log_ereport(LOG_FAILURE, "cannot open pid file %s: %s", pid_file_path, strerror(errno)); |
|
a327cb6cc868
add check if pidfile can be opened
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
426
diff
changeset
|
224 | return -1; |
|
a327cb6cc868
add check if pidfile can be opened
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
426
diff
changeset
|
225 | } |
|
156
724e107983e9
adds unix domain socket for server control ops
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
154
diff
changeset
|
226 | pid_t pid = getpid(); |
|
724e107983e9
adds unix domain socket for server control ops
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
154
diff
changeset
|
227 | fprintf(pidfile, "%d", pid); |
|
724e107983e9
adds unix domain socket for server control ops
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
154
diff
changeset
|
228 | fclose(pidfile); |
|
724e107983e9
adds unix domain socket for server control ops
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
154
diff
changeset
|
229 | free(pid_file_path); |
|
724e107983e9
adds unix domain socket for server control ops
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
154
diff
changeset
|
230 | |
|
724e107983e9
adds unix domain socket for server control ops
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
154
diff
changeset
|
231 | // create unix domain socket for server control |
|
415
d938228c382e
switch from ucx 2 to 3
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
392
diff
changeset
|
232 | cxmutstr tmp_priv = cx_asprintf("%s/private", cfg->tmp.ptr); |
|
156
724e107983e9
adds unix domain socket for server control ops
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
154
diff
changeset
|
233 | // TODO: remove existing private dir |
|
724e107983e9
adds unix domain socket for server control ops
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
154
diff
changeset
|
234 | if(mkdir(tmp_priv.ptr, S_IRWXU)) { |
|
724e107983e9
adds unix domain socket for server control ops
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
154
diff
changeset
|
235 | if(errno == EEXIST) { |
|
724e107983e9
adds unix domain socket for server control ops
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
154
diff
changeset
|
236 | if(chmod(tmp_priv.ptr, S_IRWXU)) { |
|
724e107983e9
adds unix domain socket for server control ops
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
154
diff
changeset
|
237 | log_ereport( |
|
724e107983e9
adds unix domain socket for server control ops
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
154
diff
changeset
|
238 | LOG_CATASTROPHE, |
|
724e107983e9
adds unix domain socket for server control ops
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
154
diff
changeset
|
239 | "cannot change permissions of tmp dir %s:", |
|
724e107983e9
adds unix domain socket for server control ops
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
154
diff
changeset
|
240 | tmp_priv.ptr, |
|
724e107983e9
adds unix domain socket for server control ops
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
154
diff
changeset
|
241 | strerror(errno)); |
|
392
0aef555055ee
print error in case the log file config doesn't work
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
391
diff
changeset
|
242 | return -1; |
|
156
724e107983e9
adds unix domain socket for server control ops
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
154
diff
changeset
|
243 | } |
|
724e107983e9
adds unix domain socket for server control ops
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
154
diff
changeset
|
244 | } else { |
|
724e107983e9
adds unix domain socket for server control ops
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
154
diff
changeset
|
245 | log_ereport( |
|
724e107983e9
adds unix domain socket for server control ops
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
154
diff
changeset
|
246 | LOG_CATASTROPHE, |
|
724e107983e9
adds unix domain socket for server control ops
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
154
diff
changeset
|
247 | "cannot create tmp dir %s:", |
|
724e107983e9
adds unix domain socket for server control ops
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
154
diff
changeset
|
248 | tmp_priv.ptr, |
|
724e107983e9
adds unix domain socket for server control ops
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
154
diff
changeset
|
249 | strerror(errno)); |
|
724e107983e9
adds unix domain socket for server control ops
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
154
diff
changeset
|
250 | return -1; |
|
724e107983e9
adds unix domain socket for server control ops
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
154
diff
changeset
|
251 | } |
|
724e107983e9
adds unix domain socket for server control ops
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
154
diff
changeset
|
252 | } |
|
556
b036ccad4b49
improve webserver shutdown and free some stuff to make the valgrind output cleaner
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
461
diff
changeset
|
253 | free(tmp_priv.ptr); |
|
156
724e107983e9
adds unix domain socket for server control ops
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
154
diff
changeset
|
254 | |
|
724e107983e9
adds unix domain socket for server control ops
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
154
diff
changeset
|
255 | |
|
724e107983e9
adds unix domain socket for server control ops
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
154
diff
changeset
|
256 | // create srvctrl unix domain socket |
|
724e107983e9
adds unix domain socket for server control ops
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
154
diff
changeset
|
257 | // this socket is used for stop, reconfigure and other operations |
|
158
77f4f0079428
adds reconfig and shutdown handler to srvctrl
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
156
diff
changeset
|
258 | if(srvctrl_init(cfg)) { |
|
156
724e107983e9
adds unix domain socket for server control ops
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
154
diff
changeset
|
259 | return -1; |
|
158
77f4f0079428
adds reconfig and shutdown handler to srvctrl
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
156
diff
changeset
|
260 | } |
|
156
724e107983e9
adds unix domain socket for server control ops
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
154
diff
changeset
|
261 | |
|
146
a9591a91c004
fixes server user init
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
133
diff
changeset
|
262 | //endpwent(); // TODO: close or not? |
|
a9591a91c004
fixes server user init
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
133
diff
changeset
|
263 | //free(pwbuf); // TODO: ? |
|
a9591a91c004
fixes server user init
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
133
diff
changeset
|
264 | |
| 1 | 265 | return 0; |
| 266 | } | |
| 267 | ||
| 268 | int webserver_run() { | |
|
115
51d9a15eac98
improves logging
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
106
diff
changeset
|
269 | log_ereport(LOG_VERBOSE, "webserver_run"); |
| 1 | 270 | |
| 271 | // start all http listener | |
| 272 | if(start_all_listener() != 0) { | |
| 273 | fprintf(stderr, "Error: Cannot start http listener\n"); | |
| 274 | } | |
|
115
51d9a15eac98
improves logging
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
106
diff
changeset
|
275 | |
|
51d9a15eac98
improves logging
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
106
diff
changeset
|
276 | log_ereport(LOG_INFORM, "webserver started"); |
| 1 | 277 | |
| 278 | return 0; | |
| 279 | } | |
|
9
30e51941a673
Added mod_jk dependencies
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
6
diff
changeset
|
280 | |
|
68
f5102a892ed4
some fixes for mod_jk
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
66
diff
changeset
|
281 | void webserver_shutdown() { |
|
115
51d9a15eac98
improves logging
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
106
diff
changeset
|
282 | log_ereport(LOG_INFORM, "webserver shutdown"); |
|
68
f5102a892ed4
some fixes for mod_jk
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
66
diff
changeset
|
283 | |
|
158
77f4f0079428
adds reconfig and shutdown handler to srvctrl
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
156
diff
changeset
|
284 | srvctrl_shutdown(); |
|
556
b036ccad4b49
improve webserver shutdown and free some stuff to make the valgrind output cleaner
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
461
diff
changeset
|
285 | } |
|
b036ccad4b49
improve webserver shutdown and free some stuff to make the valgrind output cleaner
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
461
diff
changeset
|
286 | |
|
b036ccad4b49
improve webserver shutdown and free some stuff to make the valgrind output cleaner
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
461
diff
changeset
|
287 | void webserver_end() { |
|
572
e70418bb14b1
add cleanup for webdav module
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
571
diff
changeset
|
288 | cfgmgr_shutdown(); |
|
e70418bb14b1
add cleanup for webdav module
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
571
diff
changeset
|
289 | shutdown_threadpools(60); |
|
e70418bb14b1
add cleanup for webdav module
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
571
diff
changeset
|
290 | |
|
e70418bb14b1
add cleanup for webdav module
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
571
diff
changeset
|
291 | shutdown_eventhandlers_wait(); // TODO: timeout |
|
e70418bb14b1
add cleanup for webdav module
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
571
diff
changeset
|
292 | |
|
577
4f5ccaea4a92
add shutdown cleanup (listener, log, threadpool)
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
576
diff
changeset
|
293 | shutdown_logging(); |
|
4f5ccaea4a92
add shutdown cleanup (listener, log, threadpool)
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
576
diff
changeset
|
294 | |
|
68
f5102a892ed4
some fixes for mod_jk
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
66
diff
changeset
|
295 | // execute restart callbacks |
|
f5102a892ed4
some fixes for mod_jk
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
66
diff
changeset
|
296 | RestartCallback *re = atrestart; |
|
573
76ccfc2a932f
add resourcepools/common saf shutdown cleanup code
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
572
diff
changeset
|
297 | RestartCallback *re_next; |
|
68
f5102a892ed4
some fixes for mod_jk
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
66
diff
changeset
|
298 | while(re) { |
|
f5102a892ed4
some fixes for mod_jk
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
66
diff
changeset
|
299 | re->func(re->data); |
|
573
76ccfc2a932f
add resourcepools/common saf shutdown cleanup code
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
572
diff
changeset
|
300 | re_next = re->next; |
|
76ccfc2a932f
add resourcepools/common saf shutdown cleanup code
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
572
diff
changeset
|
301 | free(re); |
|
76ccfc2a932f
add resourcepools/common saf shutdown cleanup code
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
572
diff
changeset
|
302 | re = re_next; |
|
68
f5102a892ed4
some fixes for mod_jk
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
66
diff
changeset
|
303 | } |
|
574
76450adae540
add saf function map cleanup
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
573
diff
changeset
|
304 | |
|
556
b036ccad4b49
improve webserver shutdown and free some stuff to make the valgrind output cleaner
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
461
diff
changeset
|
305 | webserver_destroy(); |
|
68
f5102a892ed4
some fixes for mod_jk
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
66
diff
changeset
|
306 | } |
|
9
30e51941a673
Added mod_jk dependencies
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
6
diff
changeset
|
307 | |
|
158
77f4f0079428
adds reconfig and shutdown handler to srvctrl
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
156
diff
changeset
|
308 | int webserver_reconfig() { |
|
440
d77b8f3e14e2
implement successor listener, fix webserver_reconfig
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
438
diff
changeset
|
309 | CfgManager mgr; |
|
d77b8f3e14e2
implement successor listener, fix webserver_reconfig
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
438
diff
changeset
|
310 | if(cfgmgr_load_config(&mgr) != 0) { |
|
d77b8f3e14e2
implement successor listener, fix webserver_reconfig
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
438
diff
changeset
|
311 | log_ereport(LOG_FAILURE, "cannot reload server.conf"); |
|
d77b8f3e14e2
implement successor listener, fix webserver_reconfig
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
438
diff
changeset
|
312 | return 1; |
|
d77b8f3e14e2
implement successor listener, fix webserver_reconfig
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
438
diff
changeset
|
313 | } else { |
|
d77b8f3e14e2
implement successor listener, fix webserver_reconfig
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
438
diff
changeset
|
314 | if(cfgmgr_apply_config(&mgr)) { |
|
d77b8f3e14e2
implement successor listener, fix webserver_reconfig
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
438
diff
changeset
|
315 | log_ereport(LOG_FAILURE, "cannot reload config"); |
|
d77b8f3e14e2
implement successor listener, fix webserver_reconfig
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
438
diff
changeset
|
316 | return 1; |
|
d77b8f3e14e2
implement successor listener, fix webserver_reconfig
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
438
diff
changeset
|
317 | } |
|
158
77f4f0079428
adds reconfig and shutdown handler to srvctrl
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
156
diff
changeset
|
318 | } |
|
440
d77b8f3e14e2
implement successor listener, fix webserver_reconfig
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
438
diff
changeset
|
319 | |
|
158
77f4f0079428
adds reconfig and shutdown handler to srvctrl
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
156
diff
changeset
|
320 | // start newly created listeners |
|
77f4f0079428
adds reconfig and shutdown handler to srvctrl
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
156
diff
changeset
|
321 | start_all_listener(); |
|
77f4f0079428
adds reconfig and shutdown handler to srvctrl
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
156
diff
changeset
|
322 | |
|
77f4f0079428
adds reconfig and shutdown handler to srvctrl
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
156
diff
changeset
|
323 | return 0; |
|
156
724e107983e9
adds unix domain socket for server control ops
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
154
diff
changeset
|
324 | } |
|
724e107983e9
adds unix domain socket for server control ops
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
154
diff
changeset
|
325 | |
|
9
30e51941a673
Added mod_jk dependencies
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
6
diff
changeset
|
326 | void webserver_atrestart(void (*fn)(void *), void *data) { |
|
68
f5102a892ed4
some fixes for mod_jk
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
66
diff
changeset
|
327 | RestartCallback *cb = malloc(sizeof(RestartCallback)); |
|
f5102a892ed4
some fixes for mod_jk
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
66
diff
changeset
|
328 | cb->func = fn; |
|
f5102a892ed4
some fixes for mod_jk
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
66
diff
changeset
|
329 | cb->data = data; |
|
f5102a892ed4
some fixes for mod_jk
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
66
diff
changeset
|
330 | cb->next = NULL; |
|
f5102a892ed4
some fixes for mod_jk
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
66
diff
changeset
|
331 | |
|
f5102a892ed4
some fixes for mod_jk
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
66
diff
changeset
|
332 | if(atrestart) { |
|
f5102a892ed4
some fixes for mod_jk
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
66
diff
changeset
|
333 | RestartCallback *elm = atrestart; |
|
f5102a892ed4
some fixes for mod_jk
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
66
diff
changeset
|
334 | while(elm) { |
|
f5102a892ed4
some fixes for mod_jk
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
66
diff
changeset
|
335 | if(!elm->next) { |
|
f5102a892ed4
some fixes for mod_jk
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
66
diff
changeset
|
336 | elm->next = cb; |
|
f5102a892ed4
some fixes for mod_jk
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
66
diff
changeset
|
337 | break; |
|
f5102a892ed4
some fixes for mod_jk
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
66
diff
changeset
|
338 | } |
|
f5102a892ed4
some fixes for mod_jk
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
66
diff
changeset
|
339 | elm = elm->next; |
|
f5102a892ed4
some fixes for mod_jk
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
66
diff
changeset
|
340 | } |
|
f5102a892ed4
some fixes for mod_jk
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
66
diff
changeset
|
341 | } else { |
|
f5102a892ed4
some fixes for mod_jk
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
66
diff
changeset
|
342 | atrestart = cb; |
|
f5102a892ed4
some fixes for mod_jk
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
66
diff
changeset
|
343 | } |
|
9
30e51941a673
Added mod_jk dependencies
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
6
diff
changeset
|
344 | } |
|
30e51941a673
Added mod_jk dependencies
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
6
diff
changeset
|
345 | |
|
556
b036ccad4b49
improve webserver shutdown and free some stuff to make the valgrind output cleaner
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
461
diff
changeset
|
346 | void webserver_destroy() { |
|
b036ccad4b49
improve webserver shutdown and free some stuff to make the valgrind output cleaner
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
461
diff
changeset
|
347 | // free some stuff |
|
b036ccad4b49
improve webserver shutdown and free some stuff to make the valgrind output cleaner
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
461
diff
changeset
|
348 | // this is not necessary, because the whole process will exit |
|
b036ccad4b49
improve webserver shutdown and free some stuff to make the valgrind output cleaner
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
461
diff
changeset
|
349 | // however it will result in a nicer valgrind output with less |
|
b036ccad4b49
improve webserver shutdown and free some stuff to make the valgrind output cleaner
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
461
diff
changeset
|
350 | // memory leaks |
|
b036ccad4b49
improve webserver shutdown and free some stuff to make the valgrind output cleaner
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
461
diff
changeset
|
351 | pool_destroy(cfg_get_init_pool()); |
|
574
76450adae540
add saf function map cleanup
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
573
diff
changeset
|
352 | |
|
76450adae540
add saf function map cleanup
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
573
diff
changeset
|
353 | resource_pool_cleanup(); |
|
76450adae540
add saf function map cleanup
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
573
diff
changeset
|
354 | func_cleanup(); |
|
76450adae540
add saf function map cleanup
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
573
diff
changeset
|
355 | |
|
76450adae540
add saf function map cleanup
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
573
diff
changeset
|
356 | ServerConfiguration *scfg = cfgmgr_get_server_config(); |
|
577
4f5ccaea4a92
add shutdown cleanup (listener, log, threadpool)
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
576
diff
changeset
|
357 | CxIterator i = cxListIterator(scfg->listeners); |
|
4f5ccaea4a92
add shutdown cleanup (listener, log, threadpool)
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
576
diff
changeset
|
358 | cx_foreach(HttpListener *, ls, i) { |
|
4f5ccaea4a92
add shutdown cleanup (listener, log, threadpool)
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
576
diff
changeset
|
359 | http_listener_destroy(ls); |
|
576
5c31cc844c68
add more shutdown cleanup: pwbuf, threadpool, logfiles, authdb
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
574
diff
changeset
|
360 | } |
|
574
76450adae540
add saf function map cleanup
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
573
diff
changeset
|
361 | pool_destroy(scfg->pool); |
|
576
5c31cc844c68
add more shutdown cleanup: pwbuf, threadpool, logfiles, authdb
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
574
diff
changeset
|
362 | |
|
577
4f5ccaea4a92
add shutdown cleanup (listener, log, threadpool)
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
576
diff
changeset
|
363 | http_listener_global_shutdown(); |
|
4f5ccaea4a92
add shutdown cleanup (listener, log, threadpool)
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
576
diff
changeset
|
364 | |
|
576
5c31cc844c68
add more shutdown cleanup: pwbuf, threadpool, logfiles, authdb
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
574
diff
changeset
|
365 | free(pwbuf); |
|
556
b036ccad4b49
improve webserver shutdown and free some stuff to make the valgrind output cleaner
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
461
diff
changeset
|
366 | } |
|
b036ccad4b49
improve webserver shutdown and free some stuff to make the valgrind output cleaner
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
461
diff
changeset
|
367 | |
|
68
f5102a892ed4
some fixes for mod_jk
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
66
diff
changeset
|
368 | int nsapi_runtime_version() { |
|
f5102a892ed4
some fixes for mod_jk
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
66
diff
changeset
|
369 | return 303; |
|
f5102a892ed4
some fixes for mod_jk
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
66
diff
changeset
|
370 | } |
|
106
b122f34ddc80
added minimal ssl support
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
85
diff
changeset
|
371 | |
|
b122f34ddc80
added minimal ssl support
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
85
diff
changeset
|
372 | |
|
b122f34ddc80
added minimal ssl support
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
85
diff
changeset
|
373 | int ws_init_ssl() { |
|
b122f34ddc80
added minimal ssl support
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
85
diff
changeset
|
374 | // TODO: handle errors |
|
b122f34ddc80
added minimal ssl support
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
85
diff
changeset
|
375 | SSL_load_error_strings(); |
|
b122f34ddc80
added minimal ssl support
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
85
diff
changeset
|
376 | SSL_library_init(); |
|
b122f34ddc80
added minimal ssl support
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
85
diff
changeset
|
377 | OpenSSL_add_all_algorithms(); |
|
b122f34ddc80
added minimal ssl support
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
85
diff
changeset
|
378 | return 0; |
|
b122f34ddc80
added minimal ssl support
Olaf Wintermann <olaf.wintermann@gmail.com>
parents:
85
diff
changeset
|
379 | } |