Do not attempt to read .tmux.conf if we can't figure out a home
[tmux-openbsd.git] / server.c
blob8ac9321ee247a973a17ad3c9820e8c1eb9442716
1 /* $OpenBSD$ */
3 /*
4 * Copyright (c) 2007 Nicholas Marriott <nicm@users.sourceforge.net>
6 * Permission to use, copy, modify, and distribute this software for any
7 * purpose with or without fee is hereby granted, provided that the above
8 * copyright notice and this permission notice appear in all copies.
10 * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
11 * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
12 * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
13 * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
14 * WHATSOEVER RESULTING FROM LOSS OF MIND, USE, DATA OR PROFITS, WHETHER
15 * IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING
16 * OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
19 #include <sys/types.h>
20 #include <sys/ioctl.h>
21 #include <sys/socket.h>
22 #include <sys/stat.h>
23 #include <sys/un.h>
24 #include <sys/wait.h>
26 #include <errno.h>
27 #include <event.h>
28 #include <fcntl.h>
29 #include <paths.h>
30 #include <signal.h>
31 #include <stdio.h>
32 #include <stdlib.h>
33 #include <string.h>
34 #include <syslog.h>
35 #include <termios.h>
36 #include <time.h>
37 #include <unistd.h>
39 #include "tmux.h"
42 * Main server functions.
45 /* Client list. */
46 struct clients clients;
47 struct clients dead_clients;
49 int server_fd;
50 int server_shutdown;
51 struct event server_ev_accept;
52 struct event server_ev_second;
54 struct paste_stack global_buffers;
56 int server_create_socket(void);
57 void server_loop(void);
58 int server_should_shutdown(void);
59 void server_send_shutdown(void);
60 void server_clean_dead(void);
61 void server_accept_callback(int, short, void *);
62 void server_signal_callback(int, short, void *);
63 void server_child_signal(void);
64 void server_child_exited(pid_t, int);
65 void server_child_stopped(pid_t, int);
66 void server_second_callback(int, short, void *);
67 void server_lock_server(void);
68 void server_lock_sessions(void);
70 /* Create server socket. */
71 int
72 server_create_socket(void)
74 struct sockaddr_un sa;
75 size_t size;
76 mode_t mask;
77 int fd;
79 memset(&sa, 0, sizeof sa);
80 sa.sun_family = AF_UNIX;
81 size = strlcpy(sa.sun_path, socket_path, sizeof sa.sun_path);
82 if (size >= sizeof sa.sun_path) {
83 errno = ENAMETOOLONG;
84 fatal("socket failed");
86 unlink(sa.sun_path);
88 if ((fd = socket(AF_UNIX, SOCK_STREAM, 0)) == -1)
89 fatal("socket failed");
91 mask = umask(S_IXUSR|S_IXGRP|S_IRWXO);
92 if (bind(fd, (struct sockaddr *) &sa, SUN_LEN(&sa)) == -1)
93 fatal("bind failed");
94 umask(mask);
96 if (listen(fd, 16) == -1)
97 fatal("listen failed");
98 setblocking(fd, 0);
100 server_update_socket();
102 return (fd);
105 /* Fork new server. */
107 server_start(int lockfd, char *lockfile)
109 int pair[2];
110 struct timeval tv;
111 char *cause;
113 /* The first client is special and gets a socketpair; create it. */
114 if (socketpair(AF_UNIX, SOCK_STREAM, PF_UNSPEC, pair) != 0)
115 fatal("socketpair failed");
117 switch (fork()) {
118 case -1:
119 fatal("fork failed");
120 case 0:
121 break;
122 default:
123 close(pair[1]);
124 return (pair[0]);
126 close(pair[0]);
129 * Must daemonise before loading configuration as the PID changes so
130 * $TMUX would be wrong for sessions created in the config file.
132 if (daemon(1, 0) != 0)
133 fatal("daemon failed");
135 /* event_init() was called in our parent, need to reinit. */
136 if (event_reinit(ev_base) != 0)
137 fatal("event_reinit failed");
138 clear_signals(0);
140 logfile("server");
141 log_debug("server started, pid %ld", (long) getpid());
143 ARRAY_INIT(&windows);
144 RB_INIT(&all_window_panes);
145 ARRAY_INIT(&clients);
146 ARRAY_INIT(&dead_clients);
147 RB_INIT(&sessions);
148 RB_INIT(&dead_sessions);
149 TAILQ_INIT(&session_groups);
150 ARRAY_INIT(&global_buffers);
151 mode_key_init_trees();
152 key_bindings_init();
153 utf8_build();
155 start_time = time(NULL);
156 log_debug("socket path %s", socket_path);
157 setproctitle("server (%s)", socket_path);
159 server_fd = server_create_socket();
160 server_client_create(pair[1]);
162 unlink(lockfile);
163 free(lockfile);
164 close(lockfd);
166 cfg_cmd_q = cmdq_new(NULL);
167 cfg_cmd_q->emptyfn = cfg_default_done;
168 cfg_finished = 0;
169 cfg_references = 1;
170 ARRAY_INIT(&cfg_causes);
171 cfg_client = ARRAY_FIRST(&clients);
172 if (cfg_client != NULL)
173 cfg_client->references++;
175 if (access(TMUX_CONF, R_OK) == 0) {
176 if (load_cfg(TMUX_CONF, cfg_cmd_q, &cause) == -1) {
177 xasprintf(&cause, "%s: %s", TMUX_CONF, cause);
178 ARRAY_ADD(&cfg_causes, cause);
180 } else if (errno != ENOENT) {
181 xasprintf(&cause, "%s: %s", TMUX_CONF, strerror(errno));
182 ARRAY_ADD(&cfg_causes, cause);
184 if (cfg_file != NULL) {
185 if (load_cfg(cfg_file, cfg_cmd_q, &cause) == -1) {
186 xasprintf(&cause, "%s: %s", cfg_file, cause);
187 ARRAY_ADD(&cfg_causes, cause);
190 cmdq_continue(cfg_cmd_q);
192 server_add_accept(0);
194 memset(&tv, 0, sizeof tv);
195 tv.tv_sec = 1;
196 evtimer_set(&server_ev_second, server_second_callback, NULL);
197 evtimer_add(&server_ev_second, &tv);
199 set_signals(server_signal_callback);
200 server_loop();
201 exit(0);
204 /* Main server loop. */
205 void
206 server_loop(void)
208 while (!server_should_shutdown()) {
209 event_loop(EVLOOP_ONCE);
211 server_window_loop();
212 server_client_loop();
214 key_bindings_clean();
215 server_clean_dead();
219 /* Check if the server should be shutting down (no more clients or sessions). */
221 server_should_shutdown(void)
223 u_int i;
225 if (!options_get_number(&global_options, "exit-unattached")) {
226 if (!RB_EMPTY(&sessions))
227 return (0);
229 for (i = 0; i < ARRAY_LENGTH(&clients); i++) {
230 if (ARRAY_ITEM(&clients, i) != NULL)
231 return (0);
233 return (1);
236 /* Shutdown the server by killing all clients and windows. */
237 void
238 server_send_shutdown(void)
240 struct client *c;
241 struct session *s, *next_s;
242 u_int i;
244 for (i = 0; i < ARRAY_LENGTH(&clients); i++) {
245 c = ARRAY_ITEM(&clients, i);
246 if (c != NULL) {
247 if (c->flags & (CLIENT_BAD|CLIENT_SUSPENDED))
248 server_client_lost(c);
249 else
250 server_write_client(c, MSG_SHUTDOWN, NULL, 0);
251 c->session = NULL;
255 s = RB_MIN(sessions, &sessions);
256 while (s != NULL) {
257 next_s = RB_NEXT(sessions, &sessions, s);
258 session_destroy(s);
259 s = next_s;
263 /* Free dead, unreferenced clients and sessions. */
264 void
265 server_clean_dead(void)
267 struct session *s, *next_s;
268 struct client *c;
269 u_int i;
271 s = RB_MIN(sessions, &dead_sessions);
272 while (s != NULL) {
273 next_s = RB_NEXT(sessions, &dead_sessions, s);
274 if (s->references == 0) {
275 RB_REMOVE(sessions, &dead_sessions, s);
276 free(s->name);
277 free(s);
279 s = next_s;
282 for (i = 0; i < ARRAY_LENGTH(&dead_clients); i++) {
283 c = ARRAY_ITEM(&dead_clients, i);
284 if (c == NULL || c->references != 0)
285 continue;
286 ARRAY_SET(&dead_clients, i, NULL);
287 free(c);
291 /* Update socket execute permissions based on whether sessions are attached. */
292 void
293 server_update_socket(void)
295 struct session *s;
296 static int last = -1;
297 int n, mode;
298 struct stat sb;
300 n = 0;
301 RB_FOREACH(s, sessions, &sessions) {
302 if (!(s->flags & SESSION_UNATTACHED)) {
303 n++;
304 break;
308 if (n != last) {
309 last = n;
311 if (stat(socket_path, &sb) != 0)
312 return;
313 mode = sb.st_mode;
314 if (n != 0) {
315 if (mode & S_IRUSR)
316 mode |= S_IXUSR;
317 if (mode & S_IRGRP)
318 mode |= S_IXGRP;
319 if (mode & S_IROTH)
320 mode |= S_IXOTH;
321 } else
322 mode &= ~(S_IXUSR|S_IXGRP|S_IXOTH);
323 chmod(socket_path, mode);
327 /* Callback for server socket. */
328 void
329 server_accept_callback(int fd, short events, unused void *data)
331 struct sockaddr_storage sa;
332 socklen_t slen = sizeof sa;
333 int newfd;
335 server_add_accept(0);
336 if (!(events & EV_READ))
337 return;
339 newfd = accept(fd, (struct sockaddr *) &sa, &slen);
340 if (newfd == -1) {
341 if (errno == EAGAIN || errno == EINTR || errno == ECONNABORTED)
342 return;
343 if (errno == ENFILE || errno == EMFILE) {
344 /* Delete and don't try again for 1 second. */
345 server_add_accept(1);
346 return;
348 fatal("accept failed");
350 if (server_shutdown) {
351 close(newfd);
352 return;
354 server_client_create(newfd);
358 * Add accept event. If timeout is nonzero, add as a timeout instead of a read
359 * event - used to backoff when running out of file descriptors.
361 void
362 server_add_accept(int timeout)
364 struct timeval tv = { timeout, 0 };
366 if (event_initialized(&server_ev_accept))
367 event_del(&server_ev_accept);
369 if (timeout == 0) {
370 event_set(&server_ev_accept,
371 server_fd, EV_READ, server_accept_callback, NULL);
372 event_add(&server_ev_accept, NULL);
373 } else {
374 event_set(&server_ev_accept,
375 server_fd, EV_TIMEOUT, server_accept_callback, NULL);
376 event_add(&server_ev_accept, &tv);
380 /* Signal handler. */
381 void
382 server_signal_callback(int sig, unused short events, unused void *data)
384 switch (sig) {
385 case SIGTERM:
386 server_shutdown = 1;
387 server_send_shutdown();
388 break;
389 case SIGCHLD:
390 server_child_signal();
391 break;
392 case SIGUSR1:
393 event_del(&server_ev_accept);
394 close(server_fd);
395 server_fd = server_create_socket();
396 server_add_accept(0);
397 break;
401 /* Handle SIGCHLD. */
402 void
403 server_child_signal(void)
405 int status;
406 pid_t pid;
408 for (;;) {
409 switch (pid = waitpid(WAIT_ANY, &status, WNOHANG|WUNTRACED)) {
410 case -1:
411 if (errno == ECHILD)
412 return;
413 fatal("waitpid failed");
414 case 0:
415 return;
417 if (WIFSTOPPED(status))
418 server_child_stopped(pid, status);
419 else if (WIFEXITED(status) || WIFSIGNALED(status))
420 server_child_exited(pid, status);
424 /* Handle exited children. */
425 void
426 server_child_exited(pid_t pid, int status)
428 struct window *w;
429 struct window_pane *wp;
430 struct job *job;
431 u_int i;
433 for (i = 0; i < ARRAY_LENGTH(&windows); i++) {
434 if ((w = ARRAY_ITEM(&windows, i)) == NULL)
435 continue;
436 TAILQ_FOREACH(wp, &w->panes, entry) {
437 if (wp->pid == pid) {
438 server_destroy_pane(wp);
439 break;
444 LIST_FOREACH(job, &all_jobs, lentry) {
445 if (pid == job->pid) {
446 job_died(job, status); /* might free job */
447 break;
452 /* Handle stopped children. */
453 void
454 server_child_stopped(pid_t pid, int status)
456 struct window *w;
457 struct window_pane *wp;
458 u_int i;
460 if (WSTOPSIG(status) == SIGTTIN || WSTOPSIG(status) == SIGTTOU)
461 return;
463 for (i = 0; i < ARRAY_LENGTH(&windows); i++) {
464 if ((w = ARRAY_ITEM(&windows, i)) == NULL)
465 continue;
466 TAILQ_FOREACH(wp, &w->panes, entry) {
467 if (wp->pid == pid) {
468 if (killpg(pid, SIGCONT) != 0)
469 kill(pid, SIGCONT);
475 /* Handle once-per-second timer events. */
476 void
477 server_second_callback(unused int fd, unused short events, unused void *arg)
479 struct window *w;
480 struct window_pane *wp;
481 struct timeval tv;
482 u_int i;
484 if (options_get_number(&global_s_options, "lock-server"))
485 server_lock_server();
486 else
487 server_lock_sessions();
489 for (i = 0; i < ARRAY_LENGTH(&windows); i++) {
490 w = ARRAY_ITEM(&windows, i);
491 if (w == NULL)
492 continue;
494 TAILQ_FOREACH(wp, &w->panes, entry) {
495 if (wp->mode != NULL && wp->mode->timer != NULL)
496 wp->mode->timer(wp);
500 server_client_status_timer();
502 evtimer_del(&server_ev_second);
503 memset(&tv, 0, sizeof tv);
504 tv.tv_sec = 1;
505 evtimer_add(&server_ev_second, &tv);
508 /* Lock the server if ALL sessions have hit the time limit. */
509 void
510 server_lock_server(void)
512 struct session *s;
513 int timeout;
514 time_t t;
516 t = time(NULL);
517 RB_FOREACH(s, sessions, &sessions) {
518 if (s->flags & SESSION_UNATTACHED)
519 continue;
520 timeout = options_get_number(&s->options, "lock-after-time");
521 if (timeout <= 0 || t <= s->activity_time.tv_sec + timeout)
522 return; /* not timed out */
525 server_lock();
526 recalculate_sizes();
529 /* Lock any sessions which have timed out. */
530 void
531 server_lock_sessions(void)
533 struct session *s;
534 int timeout;
535 time_t t;
537 t = time(NULL);
538 RB_FOREACH(s, sessions, &sessions) {
539 if (s->flags & SESSION_UNATTACHED)
540 continue;
541 timeout = options_get_number(&s->options, "lock-after-time");
542 if (timeout > 0 && t > s->activity_time.tv_sec + timeout) {
543 server_lock_session(s);
544 recalculate_sizes();