2 * citserver's main() function lives here.
4 * Copyright (c) 1987-2017 by the citadel.org team
6 * This program is open source software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License version 3.
9 * This program is distributed in the hope that it will be useful,
10 * but WITHOUT ANY WARRANTY; without even the implied warranty of
11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 * GNU General Public License for more details.
17 #include <sys/types.h>
21 #include <libcitadel.h>
23 #include "citserver.h"
24 #include "svn_revision.h"
25 #include "modules_init.h"
28 #include "serv_extensions.h"
29 #include "citadel_dirs.h"
34 const char *CitadelServiceUDS="citadel-UDS";
35 const char *CitadelServiceTCP="citadel-TCP";
39 void go_threading(void);
44 * Create or remove a lock file, so we only have one Citadel Server running at a time.
46 void ctdl_lockfile(int yo) {
47 static char lockfilename[SIZ];
52 syslog(LOG_DEBUG, "main: creating lockfile");
53 snprintf(lockfilename, sizeof lockfilename, "%s/citadel.lock", ctdl_run_dir);
54 fp = fopen(lockfilename, "w");
56 syslog(LOG_ERR, "%s: %s", lockfilename, strerror(errno));
59 if (flock(fileno(fp), (LOCK_EX|LOCK_NB)) != 0) {
60 syslog(LOG_ERR, "main: cannot lock %s , is another citserver running?", lockfilename);
66 syslog(LOG_DEBUG, "main: removing lockfile");
68 flock(fileno(fp), LOCK_UN);
78 * Here's where it all begins.
80 int main(int argc, char **argv)
84 int a; /* General-purpose variables */
85 struct passwd pw, *pwp = NULL;
87 int drop_root_perms = 1;
91 char relhome[PATH_MAX]="";
92 char ctdldir[PATH_MAX]=CTDLDIR;
93 int syslog_facility = LOG_DAEMON;
94 const char *eDebuglist[] = {NULL, NULL};
96 struct passwd *p = NULL;
98 struct stat filestats;
100 #ifdef HAVE_BACKTRACE
101 eCrashParameters params;
102 // eCrashSymbolTable symbol_table;
105 /* initialize the master context */
106 InitializeMasterCC();
107 InitializeMasterTSD();
109 /* parse command-line arguments */
110 while ((a=getopt(argc, argv, "l:dh:x:t:B:Dru:")) != EOF) switch(a) {
113 safestrncpy(facility, optarg, sizeof(facility));
114 syslog_facility = SyslogFacility(facility);
117 /* run in the background if -d was specified */
119 running_as_daemon = 1;
123 relh = optarg[0] != '/';
125 safestrncpy(ctdl_home_directory, optarg, sizeof ctdl_home_directory);
128 safestrncpy(relhome, optarg, sizeof relhome);
134 eDebuglist [0] = optarg;
137 case 't': /* deprecated */
139 case 'B': /* Basesize */
140 basesize = atoi(optarg);
147 /* -r tells the server not to drop root permissions.
148 * Don't use this unless you know what you're doing.
154 /* -u tells the server what uid to run under... */
161 p = getpwnam(optarg);
172 /* any other parameter makes it crash and burn */
173 fprintf(stderr, "citserver: usage: "
183 /* Last ditch effort to determine the user name ... if there's a user called "citadel" then use that */
185 p = getpwnam("citadel");
190 p = getpwnam("guest");
200 if ((ctdluid == 0) && (drop_root_perms == 0)) {
201 fprintf(stderr, "citserver: cannot determine user to run as; please specify -r or -u options\n");
202 exit(CTDLEXIT_UNUSER);
205 StartLibCitadel(basesize);
207 ( running_as_daemon ? (LOG_PID) : (LOG_PID | LOG_PERROR) ),
211 calc_dirs_n_files(relh, home, relhome, ctdldir, dbg);
212 /* daemonize, if we were asked to */
213 if (running_as_daemon) {
218 /* Tell 'em who's in da house */
219 syslog(LOG_NOTICE, " ");
220 syslog(LOG_NOTICE, " ");
221 syslog(LOG_NOTICE, "*** Citadel server engine ***\n");
222 syslog(LOG_NOTICE, "Version %d (build %s) ***", REV_LEVEL, svn_revision());
223 syslog(LOG_NOTICE, "Copyright (C) 1987-2017 by the Citadel development team.");
224 syslog(LOG_NOTICE, "This program is distributed under the terms of the GNU "
225 "General Public License.");
226 syslog(LOG_NOTICE, " ");
227 syslog(LOG_DEBUG, "Called as: %s", argv[0]);
228 syslog(LOG_INFO, "%s", libcitadel_version_string());
231 /* on some dists rundir gets purged on startup. so we need to recreate it. */
233 if (stat(ctdl_run_dir, &filestats)==-1){
234 #ifdef HAVE_GETPWUID_R
235 #ifdef SOLARIS_GETPWUID
236 pwp = getpwuid_r(ctdluid, &pw, pwbuf, sizeof(pwbuf));
237 #else // SOLARIS_GETPWUID
238 getpwuid_r(ctdluid, &pw, pwbuf, sizeof(pwbuf), &pwp);
239 #endif // SOLARIS_GETPWUID
240 #else // HAVE_GETPWUID_R
242 #endif // HAVE_GETPWUID_R
244 if ((mkdir(ctdl_run_dir, 0755) != 0) && (errno != EEXIST)) {
245 syslog(LOG_ERR, "main: unable to create run directory [%s]: %s", ctdl_run_dir, strerror(errno));
248 if (chown(ctdl_run_dir, ctdluid, (pwp==NULL)?-1:pw.pw_gid) != 0) {
249 syslog(LOG_ERR, "main: unable to set the access rights for [%s]: %s", ctdl_run_dir, strerror(errno));
260 * Do non system dependent startup functions.
265 * Check that the control record is correct and place sensible values if it isn't
270 * Run any upgrade entry points
272 syslog(LOG_INFO, "main: upgrading modules");
276 * Load the user for the masterCC or create them if they don't exist
278 if (CtdlGetUser(&masterCC.user, "SYS_Citadel"))
280 /* User doesn't exist. We can't use create user here as the user number needs to be 0 */
281 strcpy (masterCC.user.fullname, "SYS_Citadel") ;
282 CtdlPutUser(&masterCC.user);
283 CtdlGetUser(&masterCC.user, "SYS_Citadel"); /* Just to be safe */
287 * Bind the server to a Unix-domain socket (user client access)
289 CtdlRegisterServiceHook(0,
291 citproto_begin_session,
297 * Bind the server to a Unix-domain socket (admin client access)
299 CtdlRegisterServiceHook(0,
300 file_citadel_admin_socket,
301 citproto_begin_admin_session,
305 chmod(file_citadel_admin_socket, S_IRWXU); /* for your eyes only */
308 * Bind the server to our favorite TCP port (usually 504).
310 CtdlRegisterServiceHook(CtdlGetConfigInt("c_port_number"),
312 citproto_begin_session,
321 * Load any server-side extensions available here.
323 syslog(LOG_INFO, "main: initializing server extensions");
325 initialise_modules(0);
327 eDebuglist[1] = getenv("CITADEL_LOGDEBUG");
328 CtdlSetDebugLogFacilities(eDebuglist, 2);
331 * If we need host auth, start our chkpwd daemon.
333 if (CtdlGetConfigInt("c_auth_mode") == AUTHMODE_HOST) {
334 start_chkpwd_daemon();
339 * check, whether we're fired up another time after a crash.
340 * if, post an aide message, so the admin has a chance to react.
346 * Now that we've bound the sockets, change to the Citadel user id and its
347 * corresponding group ids
349 if (drop_root_perms) {
350 cdb_chmod_data(); /* make sure we own our data files */
352 #ifdef HAVE_GETPWUID_R
353 #ifdef SOLARIS_GETPWUID
354 pwp = getpwuid_r(ctdluid, &pw, pwbuf, sizeof(pwbuf));
355 #else // SOLARIS_GETPWUID
356 getpwuid_r(ctdluid, &pw, pwbuf, sizeof(pwbuf), &pwp);
357 #endif // SOLARIS_GETPWUID
358 #else // HAVE_GETPWUID_R
360 #endif // HAVE_GETPWUID_R
363 syslog(LOG_ERR, "main: WARNING, getpwuid(%ld): %s" "Group IDs will be incorrect.", (long)CTDLUID, strerror(errno));
365 initgroups(pw.pw_name, pw.pw_gid);
366 if (setgid(pw.pw_gid))
367 syslog(LOG_ERR, "main: setgid(%ld): %s", (long)pw.pw_gid, strerror(errno));
369 syslog(LOG_INFO, "main: changing uid to %ld", (long)CTDLUID);
370 if (setuid(CTDLUID) != 0) {
371 syslog(LOG_ERR, "main: setuid() failed: %s", strerror(errno));
373 #if defined (HAVE_SYS_PRCTL_H) && defined (PR_SET_DUMPABLE)
374 prctl(PR_SET_DUMPABLE, 1);
378 /* We want to check for idle sessions once per minute */
379 CtdlRegisterSessionHook(terminate_idle_sessions, EVT_TIMER, PRIO_CLEANUP + 1);
383 int exit_code = master_cleanup(exit_signal);