summaryrefslogtreecommitdiff
path: root/src/main-utils.c
blob: c6f95a11f2bef9e57cb0bd7df5cb8bcb4b08dc5d (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
// SPDX-License-Identifier: GPL-2.0+
/*
 * Copyright (C) 2004 - 2012 Red Hat, Inc.
 * Copyright (C) 2005 - 2008 Novell, Inc.
 */

#include "nm-default.h"

#include <stdio.h>
#include <fcntl.h>
#include <stdlib.h>
#include <unistd.h>
#include <sys/stat.h>
#include <locale.h>

#include <glib/gstdio.h>
#include <glib-unix.h>

#include "main-utils.h"
#include "NetworkManagerUtils.h"
#include "nm-config.h"

static gboolean
sighup_handler(gpointer user_data)
{
    nm_main_config_reload(GPOINTER_TO_INT(user_data));
    return G_SOURCE_CONTINUE;
}

static gboolean
sigint_handler(gpointer user_data)
{
    GMainLoop *main_loop = user_data;

    nm_log_info(LOGD_CORE, "caught SIGINT, shutting down normally.");
    g_main_loop_quit(main_loop);

    return G_SOURCE_REMOVE;
}

static gboolean
sigterm_handler(gpointer user_data)
{
    GMainLoop *main_loop = user_data;

    nm_log_info(LOGD_CORE, "caught SIGTERM, shutting down normally.");
    g_main_loop_quit(main_loop);

    return G_SOURCE_REMOVE;
}

/**
 * nm_main_utils_setup_signals:
 * @main_loop: the #GMainLoop to quit when SIGINT or SIGTERM is received
 *
 * Sets up signal handling for NetworkManager.
 */
void
nm_main_utils_setup_signals(GMainLoop *main_loop)
{
    g_return_if_fail(main_loop != NULL);

    signal(SIGPIPE, SIG_IGN);

    g_unix_signal_add(SIGHUP, sighup_handler, GINT_TO_POINTER(SIGHUP));
    if (nm_glib_check_version(2, 36, 0)) {
        g_unix_signal_add(SIGUSR1, sighup_handler, GINT_TO_POINTER(SIGUSR1));
        g_unix_signal_add(SIGUSR2, sighup_handler, GINT_TO_POINTER(SIGUSR2));
    } else
        nm_log_warn(LOGD_CORE,
                    "glib-version: cannot handle SIGUSR1 and SIGUSR2 signals. Consider upgrading "
                    "glib to 2.36.0 or newer");
    g_unix_signal_add(SIGINT, sigint_handler, main_loop);
    g_unix_signal_add(SIGTERM, sigterm_handler, main_loop);
}

gboolean
nm_main_utils_write_pidfile(const char *pidfile)
{
    char     pid[16];
    int      fd;
    int      errsv;
    gboolean success = FALSE;

    if ((fd = open(pidfile, O_CREAT | O_WRONLY | O_TRUNC | O_CLOEXEC, 00644)) < 0) {
        errsv = errno;
        fprintf(stderr, _("Opening %s failed: %s\n"), pidfile, nm_strerror_native(errsv));
        return FALSE;
    }

    g_snprintf(pid, sizeof(pid), "%d", getpid());
    if (write(fd, pid, strlen(pid)) < 0) {
        errsv = errno;
        fprintf(stderr, _("Writing to %s failed: %s\n"), pidfile, nm_strerror_native(errsv));
    } else
        success = TRUE;

    if (nm_close(fd)) {
        errsv = errno;
        fprintf(stderr, _("Closing %s failed: %s\n"), pidfile, nm_strerror_native(errsv));
    }

    return success;
}

void
nm_main_utils_ensure_statedir()
{
    gs_free char *parent = NULL;
    int           errsv;

    parent = g_path_get_dirname(NMSTATEDIR);

    /* Ensure parent state directories exists */
    if (parent && parent[0] == '/' && parent[1] != '\0'
        && g_mkdir_with_parents(parent, 0755) != 0) {
        errsv = errno;
        fprintf(stderr,
                "Cannot create parents for '%s': %s",
                NMSTATEDIR,
                nm_strerror_native(errsv));
        exit(1);
    }
    /* Ensure state directory exists */
    if (g_mkdir_with_parents(NMSTATEDIR, 0700) != 0) {
        errsv = errno;
        fprintf(stderr, "Cannot create '%s': %s", NMSTATEDIR, nm_strerror_native(errsv));
        exit(1);
    }
}

void
nm_main_utils_ensure_rundir()
{
    int errsv;

    /* Setup runtime directory */
    if (g_mkdir_with_parents(NMRUNDIR, 0755) != 0) {
        errsv = errno;
        fprintf(stderr, _("Cannot create '%s': %s"), NMRUNDIR, nm_strerror_native(errsv));
        exit(1);
    }

    /* NM_CONFIG_DEVICE_STATE_DIR is used to determine whether NM is restarted or not.
	 * It is important to set NMConfigCmdLineOptions.first_start before creating
	 * the directory. */
    nm_assert(g_str_has_prefix(NM_CONFIG_DEVICE_STATE_DIR, NMRUNDIR "/"));
    if (g_mkdir(NM_CONFIG_DEVICE_STATE_DIR, 0755) != 0) {
        errsv = errno;
        if (errsv != EEXIST) {
            fprintf(stderr,
                    _("Cannot create '%s': %s"),
                    NM_CONFIG_DEVICE_STATE_DIR,
                    nm_strerror_native(errsv));
            exit(1);
        }
    }
}

/**
 * nm_main_utils_ensure_not_running_pidfile:
 * @pidfile: the pid file
 *
 * Checks whether the pidfile already exists and contains PID of a running
 * process.
 *
 * Exits with code 1 if a conflicting process is running.
 */
void
nm_main_utils_ensure_not_running_pidfile(const char *pidfile)
{
    gs_free char *contents     = NULL;
    gs_free char *proc_cmdline = NULL;
    gsize         len          = 0;
    long          pid;
    const char *  process_name;
    const char *  prgname = g_get_prgname();

    g_return_if_fail(prgname);

    if (!pidfile || !*pidfile)
        return;

    if (!g_file_get_contents(pidfile, &contents, &len, NULL))
        return;
    if (len <= 0)
        return;

    errno = 0;
    pid   = strtol(contents, NULL, 10);
    if (pid <= 0 || pid > 65536 || errno)
        return;

    nm_clear_g_free(&contents);
    proc_cmdline = g_strdup_printf("/proc/%ld/cmdline", pid);
    if (!g_file_get_contents(proc_cmdline, &contents, &len, NULL))
        return;

    process_name = strrchr(contents, '/');
    if (process_name)
        process_name++;
    else
        process_name = contents;
    if (strcmp(process_name, prgname) == 0) {
        /* Check that the process exists */
        if (kill(pid, 0) == 0) {
            fprintf(stderr, _("%s is already running (pid %ld)\n"), prgname, pid);
            exit(1);
        }
    }
}

void
nm_main_utils_ensure_root()
{
    if (getuid() != 0) {
        fprintf(stderr, _("You must be root to run %s!\n"), g_get_prgname() ?: "");
        exit(1);
    }
}

gboolean
nm_main_utils_early_setup(const char *  progname,
                          int *         argc,
                          char **       argv[],
                          GOptionEntry *options,
                          void (*option_context_hook)(gpointer user_data, GOptionContext *opt_ctx),
                          gpointer    option_context_hook_data,
                          const char *summary)
{
    GOptionContext *opt_ctx = NULL;
    GError *        error   = NULL;
    gboolean        success = FALSE;
    int             i;
    const char *    opt_fmt_log_level = NULL, *opt_fmt_log_domains = NULL;
    const char **   opt_loc_log_level = NULL, **opt_loc_log_domains = NULL;

    /* Make GIO ignore the remote VFS service; otherwise it tries to use the
	 * session bus to contact the remote service, and NM shouldn't ever be
	 * talking on the session bus.  See rh #588745
	 */
    setenv("GIO_USE_VFS", "local", 1);

    /*
	 * Set the umask to 0022, which results in 0666 & ~0022 = 0644.
	 * Otherwise, if root (or an su'ing user) has a wacky umask, we could
	 * write out an unreadable resolv.conf.
	 */
    umask(022);

    /* Ensure gettext() gets the right environment (bgo #666516) */
    setlocale(LC_ALL, "");
    textdomain(GETTEXT_PACKAGE);

    for (i = 0; options[i].long_name; i++) {
        NM_PRAGMA_WARNING_DISABLE("-Wformat-nonliteral")
        if (!strcmp(options[i].long_name, "log-level")) {
            opt_fmt_log_level = options[i].description;
            opt_loc_log_level = &options[i].description;
            options[i].description =
                g_strdup_printf(options[i].description, nm_logging_all_levels_to_string());
        } else if (!strcmp(options[i].long_name, "log-domains")) {
            opt_fmt_log_domains = options[i].description;
            opt_loc_log_domains = &options[i].description;
            options[i].description =
                g_strdup_printf(options[i].description, nm_logging_all_domains_to_string());
        }
        NM_PRAGMA_WARNING_REENABLE
    }

    /* Parse options */
    opt_ctx = g_option_context_new(NULL);
    g_option_context_set_translation_domain(opt_ctx, GETTEXT_PACKAGE);
    g_option_context_set_ignore_unknown_options(opt_ctx, FALSE);
    g_option_context_set_help_enabled(opt_ctx, TRUE);
    g_option_context_add_main_entries(opt_ctx, options, NULL);
    g_option_context_set_summary(opt_ctx, summary);
    if (option_context_hook)
        option_context_hook(option_context_hook_data, opt_ctx);

    success = g_option_context_parse(opt_ctx, argc, argv, &error);
    if (!success) {
        fprintf(stderr,
                _("%s.  Please use --help to see a list of valid options.\n"),
                error->message);
        g_clear_error(&error);
    }
    g_option_context_free(opt_ctx);

    if (opt_loc_log_level) {
        g_free((char *) *opt_loc_log_level);
        *opt_loc_log_level = opt_fmt_log_level;
    }
    if (opt_loc_log_domains) {
        g_free((char *) *opt_loc_log_domains);
        *opt_loc_log_domains = opt_fmt_log_domains;
    }

    return success;
}