move src/tools/daemon.rs to proxmox-rest-server workspace
Signed-off-by: Thomas Lamprecht <t.lamprecht@proxmox.com>
This commit is contained in:
parent
fd6d243843
commit
8bca935f08
@ -13,6 +13,7 @@ http = "0.2"
|
|||||||
hyper = { version = "0.14", features = [ "full" ] }
|
hyper = { version = "0.14", features = [ "full" ] }
|
||||||
lazy_static = "1.4"
|
lazy_static = "1.4"
|
||||||
libc = "0.2"
|
libc = "0.2"
|
||||||
|
log = "0.4"
|
||||||
nix = "0.19.1"
|
nix = "0.19.1"
|
||||||
serde = { version = "1.0", features = [] }
|
serde = { version = "1.0", features = [] }
|
||||||
serde_json = "1.0"
|
serde_json = "1.0"
|
||||||
|
@ -15,8 +15,9 @@ use anyhow::{bail, format_err, Error};
|
|||||||
use futures::future::{self, Either};
|
use futures::future::{self, Either};
|
||||||
|
|
||||||
use proxmox::tools::io::{ReadExt, WriteExt};
|
use proxmox::tools::io::{ReadExt, WriteExt};
|
||||||
|
use proxmox::tools::fd::Fd;
|
||||||
|
|
||||||
use crate::tools::{fd_change_cloexec, self};
|
use crate::fd_change_cloexec;
|
||||||
|
|
||||||
#[link(name = "systemd")]
|
#[link(name = "systemd")]
|
||||||
extern "C" {
|
extern "C" {
|
||||||
@ -218,7 +219,7 @@ impl Reloadable for tokio::net::TcpListener {
|
|||||||
// FIXME: We could become "independent" of the TcpListener and its reference to the file
|
// FIXME: We could become "independent" of the TcpListener and its reference to the file
|
||||||
// descriptor by `dup()`ing it (and check if the listener still exists via kcmp()?)
|
// descriptor by `dup()`ing it (and check if the listener still exists via kcmp()?)
|
||||||
fn get_store_func(&self) -> Result<BoxedStoreFunc, Error> {
|
fn get_store_func(&self) -> Result<BoxedStoreFunc, Error> {
|
||||||
let mut fd_opt = Some(tools::Fd(
|
let mut fd_opt = Some(Fd(
|
||||||
nix::fcntl::fcntl(self.as_raw_fd(), nix::fcntl::FcntlArg::F_DUPFD_CLOEXEC(0))?
|
nix::fcntl::fcntl(self.as_raw_fd(), nix::fcntl::FcntlArg::F_DUPFD_CLOEXEC(0))?
|
||||||
));
|
));
|
||||||
Ok(Box::new(move || {
|
Ok(Box::new(move || {
|
||||||
@ -273,11 +274,11 @@ where
|
|||||||
).await?;
|
).await?;
|
||||||
|
|
||||||
let server_future = create_service(listener, NotifyReady)?;
|
let server_future = create_service(listener, NotifyReady)?;
|
||||||
let shutdown_future = proxmox_rest_server::shutdown_future();
|
let shutdown_future = crate::shutdown_future();
|
||||||
|
|
||||||
let finish_future = match future::select(server_future, shutdown_future).await {
|
let finish_future = match future::select(server_future, shutdown_future).await {
|
||||||
Either::Left((_, _)) => {
|
Either::Left((_, _)) => {
|
||||||
proxmox_rest_server::request_shutdown(); // make sure we are in shutdown mode
|
crate::request_shutdown(); // make sure we are in shutdown mode
|
||||||
None
|
None
|
||||||
}
|
}
|
||||||
Either::Right((_, server_future)) => Some(server_future),
|
Either::Right((_, server_future)) => Some(server_future),
|
||||||
@ -285,7 +286,7 @@ where
|
|||||||
|
|
||||||
let mut reloader = Some(reloader);
|
let mut reloader = Some(reloader);
|
||||||
|
|
||||||
if proxmox_rest_server::is_reload_request() {
|
if crate::is_reload_request() {
|
||||||
log::info!("daemon reload...");
|
log::info!("daemon reload...");
|
||||||
if let Err(e) = systemd_notify(SystemdNotify::Reloading) {
|
if let Err(e) = systemd_notify(SystemdNotify::Reloading) {
|
||||||
log::error!("failed to notify systemd about the state change: {}", e);
|
log::error!("failed to notify systemd about the state change: {}", e);
|
||||||
@ -304,7 +305,7 @@ where
|
|||||||
}
|
}
|
||||||
|
|
||||||
// FIXME: this is a hack, replace with sd_notify_barrier when available
|
// FIXME: this is a hack, replace with sd_notify_barrier when available
|
||||||
if proxmox_rest_server::is_reload_request() {
|
if crate::is_reload_request() {
|
||||||
wait_service_is_not_state(service_name, "reloading").await?;
|
wait_service_is_not_state(service_name, "reloading").await?;
|
||||||
}
|
}
|
||||||
|
|
@ -1,4 +1,10 @@
|
|||||||
use anyhow::{bail, Error};
|
use std::os::unix::io::RawFd;
|
||||||
|
|
||||||
|
use anyhow::{bail, format_err, Error};
|
||||||
|
|
||||||
|
use proxmox::tools::fd::Fd;
|
||||||
|
|
||||||
|
pub mod daemon;
|
||||||
|
|
||||||
mod state;
|
mod state;
|
||||||
pub use state::*;
|
pub use state::*;
|
||||||
@ -52,3 +58,26 @@ pub fn fail_on_shutdown() -> Result<(), Error> {
|
|||||||
Ok(())
|
Ok(())
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/// Helper to set/clear the FD_CLOEXEC flag on file descriptors
|
||||||
|
pub fn fd_change_cloexec(fd: RawFd, on: bool) -> Result<(), Error> {
|
||||||
|
use nix::fcntl::{fcntl, FdFlag, F_GETFD, F_SETFD};
|
||||||
|
let mut flags = FdFlag::from_bits(fcntl(fd, F_GETFD)?)
|
||||||
|
.ok_or_else(|| format_err!("unhandled file flags"))?; // nix crate is stupid this way...
|
||||||
|
flags.set(FdFlag::FD_CLOEXEC, on);
|
||||||
|
fcntl(fd, F_SETFD(flags))?;
|
||||||
|
Ok(())
|
||||||
|
}
|
||||||
|
|
||||||
|
/// safe wrapper for `nix::sys::socket::socketpair` defaulting to `O_CLOEXEC` and guarding the file
|
||||||
|
/// descriptors.
|
||||||
|
pub fn socketpair() -> Result<(Fd, Fd), Error> {
|
||||||
|
use nix::sys::socket;
|
||||||
|
let (pa, pb) = socket::socketpair(
|
||||||
|
socket::AddressFamily::Unix,
|
||||||
|
socket::SockType::Stream,
|
||||||
|
None,
|
||||||
|
socket::SockFlag::SOCK_CLOEXEC,
|
||||||
|
)?;
|
||||||
|
Ok((Fd(pa), Fd(pb)))
|
||||||
|
}
|
||||||
|
|
||||||
|
@ -151,7 +151,7 @@ async fn termproxy(cmd: Option<String>, rpcenv: &mut dyn RpcEnvironment) -> Resu
|
|||||||
move |worker| async move {
|
move |worker| async move {
|
||||||
// move inside the worker so that it survives and does not close the port
|
// move inside the worker so that it survives and does not close the port
|
||||||
// remove CLOEXEC from listenere so that we can reuse it in termproxy
|
// remove CLOEXEC from listenere so that we can reuse it in termproxy
|
||||||
tools::fd_change_cloexec(listener.as_raw_fd(), false)?;
|
proxmox_rest_server::fd_change_cloexec(listener.as_raw_fd(), false)?;
|
||||||
|
|
||||||
let mut arguments: Vec<&str> = Vec::new();
|
let mut arguments: Vec<&str> = Vec::new();
|
||||||
let fd_string = listener.as_raw_fd().to_string();
|
let fd_string = listener.as_raw_fd().to_string();
|
||||||
|
@ -13,7 +13,8 @@ use proxmox_backup::server::{
|
|||||||
auth::default_api_auth,
|
auth::default_api_auth,
|
||||||
rest::*,
|
rest::*,
|
||||||
};
|
};
|
||||||
use proxmox_backup::tools::daemon;
|
use proxmox_rest_server::daemon;
|
||||||
|
|
||||||
use proxmox_backup::auth_helpers::*;
|
use proxmox_backup::auth_helpers::*;
|
||||||
use proxmox_backup::config;
|
use proxmox_backup::config;
|
||||||
|
|
||||||
|
@ -39,11 +39,12 @@ use pbs_api_types::{
|
|||||||
PruneOptions,
|
PruneOptions,
|
||||||
};
|
};
|
||||||
|
|
||||||
|
use proxmox_rest_server::daemon;
|
||||||
|
|
||||||
use proxmox_backup::server;
|
use proxmox_backup::server;
|
||||||
use proxmox_backup::auth_helpers::*;
|
use proxmox_backup::auth_helpers::*;
|
||||||
use proxmox_backup::tools::{
|
use proxmox_backup::tools::{
|
||||||
PROXMOX_BACKUP_TCP_KEEPALIVE_TIME,
|
PROXMOX_BACKUP_TCP_KEEPALIVE_TIME,
|
||||||
daemon,
|
|
||||||
disks::{
|
disks::{
|
||||||
DiskManage,
|
DiskManage,
|
||||||
zfs_pool_stats,
|
zfs_pool_stats,
|
||||||
|
@ -2,13 +2,10 @@
|
|||||||
//!
|
//!
|
||||||
//! This is a collection of small and useful tools.
|
//! This is a collection of small and useful tools.
|
||||||
use std::any::Any;
|
use std::any::Any;
|
||||||
use std::os::unix::io::RawFd;
|
|
||||||
|
|
||||||
use anyhow::{bail, format_err, Error};
|
use anyhow::{bail, format_err, Error};
|
||||||
use openssl::hash::{hash, DigestBytes, MessageDigest};
|
use openssl::hash::{hash, DigestBytes, MessageDigest};
|
||||||
|
|
||||||
pub use proxmox::tools::fd::Fd;
|
|
||||||
|
|
||||||
use proxmox_http::{
|
use proxmox_http::{
|
||||||
client::SimpleHttp,
|
client::SimpleHttp,
|
||||||
client::SimpleHttpOptions,
|
client::SimpleHttpOptions,
|
||||||
@ -19,7 +16,6 @@ pub mod apt;
|
|||||||
pub mod async_io;
|
pub mod async_io;
|
||||||
pub mod compression;
|
pub mod compression;
|
||||||
pub mod config;
|
pub mod config;
|
||||||
pub mod daemon;
|
|
||||||
pub mod disks;
|
pub mod disks;
|
||||||
|
|
||||||
pub mod serde_filter;
|
pub mod serde_filter;
|
||||||
@ -111,29 +107,6 @@ pub fn normalize_uri_path(path: &str) -> Result<(String, Vec<&str>), Error> {
|
|||||||
Ok((path, components))
|
Ok((path, components))
|
||||||
}
|
}
|
||||||
|
|
||||||
pub fn fd_change_cloexec(fd: RawFd, on: bool) -> Result<(), Error> {
|
|
||||||
use nix::fcntl::{fcntl, FdFlag, F_GETFD, F_SETFD};
|
|
||||||
let mut flags = FdFlag::from_bits(fcntl(fd, F_GETFD)?)
|
|
||||||
.ok_or_else(|| format_err!("unhandled file flags"))?; // nix crate is stupid this way...
|
|
||||||
flags.set(FdFlag::FD_CLOEXEC, on);
|
|
||||||
fcntl(fd, F_SETFD(flags))?;
|
|
||||||
Ok(())
|
|
||||||
}
|
|
||||||
|
|
||||||
/// safe wrapper for `nix::sys::socket::socketpair` defaulting to `O_CLOEXEC` and guarding the file
|
|
||||||
/// descriptors.
|
|
||||||
pub fn socketpair() -> Result<(Fd, Fd), Error> {
|
|
||||||
use nix::sys::socket;
|
|
||||||
let (pa, pb) = socket::socketpair(
|
|
||||||
socket::AddressFamily::Unix,
|
|
||||||
socket::SockType::Stream,
|
|
||||||
None,
|
|
||||||
socket::SockFlag::SOCK_CLOEXEC,
|
|
||||||
)?;
|
|
||||||
Ok((Fd(pa), Fd(pb)))
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
/// An easy way to convert types to Any
|
/// An easy way to convert types to Any
|
||||||
///
|
///
|
||||||
/// Mostly useful to downcast trait objects (see RpcEnvironment).
|
/// Mostly useful to downcast trait objects (see RpcEnvironment).
|
||||||
|
Loading…
Reference in New Issue
Block a user