Warn if we try to write an inappropriate job.
[beanstalkd.git] / beanstalkd.c
bloba371809bf91fdabe0cb67d5296565d9d02819202
1 /* beanstalk - fast, general-purpose work queue */
3 /* Copyright (C) 2007 Keith Rarick and Philotic Inc.
5 * This program is free software: you can redistribute it and/or modify
6 * it under the terms of the GNU General Public License as published by
7 * the Free Software Foundation, either version 3 of the License, or
8 * (at your option) any later version.
10 * This program is distributed in the hope that it will be useful,
11 * but WITHOUT ANY WARRANTY; without even the implied warranty of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
13 * GNU General Public License for more details.
15 * You should have received a copy of the GNU General Public License
16 * along with this program. If not, see <http://www.gnu.org/licenses/>.
19 #include <signal.h>
20 #include <stdio.h>
21 #include <stdlib.h>
22 #include <errno.h>
23 #include <sys/stat.h>
24 #include <sys/resource.h>
25 #include <sys/socket.h>
26 #include <netinet/in.h>
27 #include <arpa/inet.h>
28 #include <sys/types.h>
29 #include <unistd.h>
30 #include <pwd.h>
31 #include <event.h>
33 #include "net.h"
34 #include "util.h"
35 #include "prot.h"
36 #include "version.h"
37 #include "binlog.h"
39 static char *user = NULL;
40 static int detach = 0;
41 static int port = 11300;
42 static struct in_addr host_addr = { INADDR_ANY };
44 static void
45 nullfd(int fd, int flags)
47 int r;
49 close(fd);
50 r = open("/dev/null", flags);
51 if (r != fd) twarn("open(\"/dev/null\")"), exit(1);
54 static void
55 dfork()
57 pid_t p;
59 p = fork();
60 if (p == -1) exit(1);
61 if (p) exit(0);
64 static void
65 daemonize()
67 chdir("/");
68 nullfd(0, O_RDONLY);
69 nullfd(1, O_WRONLY);
70 nullfd(2, O_WRONLY);
71 umask(0);
72 dfork();
73 setsid();
74 dfork();
77 static void
78 su(const char *user) {
79 int r;
80 struct passwd *pwent;
82 errno = 0;
83 pwent = getpwnam(user);
84 if (errno) twarn("getpwnam(\"%s\")", user), exit(32);
85 if (!pwent) twarnx("getpwnam(\"%s\"): no such user", user), exit(33);
87 r = setgid(pwent->pw_gid);
88 if (r == -1) twarn("setgid(%d \"%s\")", pwent->pw_gid, user), exit(34);
90 r = setuid(pwent->pw_uid);
91 if (r == -1) twarn("setuid(%d \"%s\")", pwent->pw_uid, user), exit(34);
94 void
95 exit_cleanly(int sig)
97 binlog_close();
98 exit(0);
102 static void
103 set_sig_handlers()
105 int r;
106 struct sigaction sa;
108 sa.sa_handler = SIG_IGN;
109 sa.sa_flags = 0;
110 r = sigemptyset(&sa.sa_mask);
111 if (r == -1) twarn("sigemptyset()"), exit(111);
113 r = sigaction(SIGPIPE, &sa, 0);
114 if (r == -1) twarn("sigaction(SIGPIPE)"), exit(111);
116 sa.sa_handler = enter_drain_mode;
117 r = sigaction(SIGUSR1, &sa, 0);
118 if (r == -1) twarn("sigaction(SIGUSR1)"), exit(111);
120 sa.sa_handler = exit_cleanly;
121 r = sigaction(SIGINT, &sa, 0);
122 if (r == -1) twarn("sigaction(SIGINT)"), exit(111);
125 /* This is a workaround for a mystifying workaround in libevent's epoll
126 * implementation. The epoll_init() function creates an epoll fd with space to
127 * handle RLIMIT_NOFILE - 1 fds, accompanied by the following puzzling comment:
128 * "Solaris is somewhat retarded - it's important to drop backwards
129 * compatibility when making changes. So, don't dare to put rl.rlim_cur here."
130 * This is presumably to work around a bug in Solaris, but it has the
131 * unfortunate side-effect of causing epoll_ctl() (and, therefore, event_add())
132 * to fail for a valid fd if we have hit the limit of open fds. That makes it
133 * hard to provide reasonable behavior in that situation. So, let's reduce the
134 * real value of RLIMIT_NOFILE by one, after epoll_init() has run. */
135 static void
136 nudge_fd_limit()
138 int r;
139 struct rlimit rl;
141 r = getrlimit(RLIMIT_NOFILE, &rl);
142 if (r != 0) twarn("getrlimit(RLIMIT_NOFILE)"), exit(2);
144 rl.rlim_cur--;
146 r = setrlimit(RLIMIT_NOFILE, &rl);
147 if (r != 0) twarn("setrlimit(RLIMIT_NOFILE)"), exit(2);
150 static void
151 usage(char *msg, char *arg)
153 if (arg) warnx("%s: %s", msg, arg);
154 fprintf(stderr, "Use: %s [OPTIONS]\n"
155 "\n"
156 "Options:\n"
157 " -d detach\n"
158 " -b DIR binlog directory\n"
159 " -l ADDR listen on address (default is 0.0.0.0)\n"
160 " -p PORT listen on port (default is 11300)\n"
161 " -u USER become user and group\n"
162 " -z SIZE set the maximum job size in bytes (default is %d)\n"
163 " -v show version information\n"
164 " -h show this help\n",
165 progname, JOB_DATA_SIZE_LIMIT_DEFAULT);
166 exit(arg ? 5 : 0);
169 static size_t
170 parse_size_t(char *str)
172 char r, x;
173 size_t size;
175 r = sscanf(str, "%zu%c", &size, &x);
176 if (1 != r) usage("invalid size", str);
177 return size;
180 static int
181 parse_port(char *portstr)
183 int port;
184 char *end;
186 errno = 0;
187 port = strtol(portstr, &end, 10);
188 if (end == portstr) usage("invalid port", portstr);
189 if (end[0] != 0) usage("invalid port", portstr);
190 if (errno) usage("invalid port", portstr);
192 return port;
195 static struct in_addr
196 parse_host(char *hoststr)
198 int r;
199 struct in_addr addr;
201 r = inet_aton(hoststr, &addr);
202 if (!r) usage("invalid address", hoststr);
204 return addr;
207 static void
208 opts(int argc, char **argv)
210 int i;
212 for (i = 1; i < argc; ++i) {
213 if (argv[i][0] != '-') usage("unknown option", argv[i]);
214 if (argv[i][1] == 0 || argv[i][2] != 0) usage("unknown option",argv[i]);
215 switch (argv[i][1]) {
216 case 'd':
217 detach = 1;
218 break;
219 case 'p':
220 port = parse_port(argv[++i]);
221 break;
222 case 'l':
223 host_addr = parse_host(argv[++i]);
224 break;
225 case 'z':
226 job_data_size_limit = parse_size_t(argv[++i]);
227 break;
228 case 'u':
229 user = argv[++i];
230 break;
231 case 'b':
232 binlog_dir = argv[++i];
233 break;
234 case 'h':
235 usage(NULL, NULL);
236 case 'v':
237 printf("beanstalkd %s\n", BEAN_VERSION);
238 exit(0);
239 default:
240 usage("unknown option", argv[i]);
246 main(int argc, char **argv)
248 int r;
250 progname = argv[0];
251 opts(argc, argv);
253 job_init();
254 prot_init();
256 r = make_server_socket(host_addr, port);
257 if (r == -1) twarnx("make_server_socket()"), exit(111);
259 if (user) su(user);
260 if (detach) daemonize();
261 event_init();
262 set_sig_handlers();
263 nudge_fd_limit();
265 unbrake((evh) h_accept);
266 prot_replay_binlog();
267 binlog_init();
269 event_dispatch();
270 binlog_close();
271 twarnx("got here for some reason");
272 return 0;