# vim: tabstop=4 shiftwidth=4 softtabstop=4 # Copyright 2014 IBM Corporation # Copyright 2015 Lenovo # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # This is the main application. # It should check for existing UDP socket to negotiate socket listen takeover # It will have three paths into it: # -Unix domain socket # -TLS socket # -WSGI # Additionally, it will be able to receive particular UDP packets to facilitate # Things like heartbeating and discovery # It also will optionally snoop SLP DA requests import atexit import confluentd.auth as auth import confluentd.config.configmanager as configmanager import confluentd.consoleserver as consoleserver import confluentd.core as confluentcore import confluentd.httpapi as httpapi import confluentd.log as log try: import confluentd.sockapi as sockapi except ImportError: #On platforms without pwd, give up on the sockapi in general and be http #only for now pass import eventlet #import eventlet.backdoor as backdoor try: import fcntl except ImportError: pass #import multiprocessing import sys import os import signal import ConfigParser def _daemonize(): if not 'fork' in os.__dict__: return thispid = os.fork() if thispid > 0: os.waitpid(thispid, 0) os._exit(0) os.setsid() thispid = os.fork() if thispid > 0: print 'confluent server starting as pid %d' % thispid os._exit(0) os.closerange(0, 2) os.umask(63) os.open(os.devnull, os.O_RDWR) os.dup2(0, 1) os.dup2(0, 2) sys.stdout = log.Logger('stdout') sys.stderr = log.Logger('stderr') def _updatepidfile(): pidfile = open('/var/run/confluent/pid', 'w+') fcntl.flock(pidfile, fcntl.LOCK_EX) pidfile.write(str(os.getpid())) fcntl.flock(pidfile, fcntl.LOCK_UN) pidfile.close() def _checkpidfile(): try: pidfile = open('/var/run/confluent/pid', 'r+') fcntl.flock(pidfile, fcntl.LOCK_EX) pid = pidfile.read() if pid != '': print ('/var/run/confluent/pid exists and indicates %s is still ' 'running' % pid) sys.exit(1) pidfile.write(str(os.getpid())) fcntl.flock(pidfile, fcntl.LOCK_UN) pidfile.close() except IOError: try: pidfile = open('/var/run/confluent/pid', 'w') except IOError as e: if e.errno != 2: raise os.makedirs('/var/run/confluent') pidfile = open('/var/run/confluent/pid', 'w') fcntl.flock(pidfile, fcntl.LOCK_EX) pidfile.write(str(os.getpid())) fcntl.flock(pidfile, fcntl.LOCK_UN) pidfile.close() pidfile = open('/var/run/confluent/pid', 'r') fcntl.flock(pidfile, fcntl.LOCK_SH) pid = pidfile.read() if pid != str(os.getpid()): print ('/var/run/confluent/pid exists and indicates %s is still ' 'running' % pid) sys.exit(1) fcntl.flock(pidfile, fcntl.LOCK_UN) pidfile.close() def terminate(signalname, frame): sys.exit(0) def doexit(): if 'fcntl' not in locals(): return pidfile = open('/var/run/confluent/pid') pid = pidfile.read() if pid == str(os.getpid()): os.remove('/var/run/confluent/pid') def _initsecurity(config): if config.has_option('security', 'externalcfgkey'): keyfile = config.get('security', 'externalcfgkey') with open(keyfile, 'r') as keyhandle: key = keyhandle.read() configmanager.init_masterkey(key) def run(): if 'fcntl' in locals(): _checkpidfile() if os.name == 'nt': configfile = os.path.join(os.getenv('SystemDrive'), '\\ProgramData', 'confluent', 'cfg', 'service.cfg') configfile = "/etc/confluent/service.cfg" config = ConfigParser.ConfigParser() config.read(configfile) try: _initsecurity(config) except: sys.stderr.write("Error unlocking credential store\n") doexit() sys.exit(1) try: confluentcore.load_plugins() except: doexit() raise _daemonize() if 'fcntl' in locals(): _updatepidfile() auth.init_auth() signal.signal(signal.SIGINT, terminate) signal.signal(signal.SIGTERM, terminate) #TODO(jbjohnso): eventlet has a bug about unix domain sockets, this code #works with bugs fixed #dbgsock = eventlet.listen("/var/run/confluent/dbg.sock", # family=socket.AF_UNIX) #eventlet.spawn_n(backdoor.backdoor_server, dbgsock) http_bind_host, http_bind_port = _get_connector_config(config, 'http') sock_bind_host, sock_bind_port = _get_connector_config(config, 'socket') consoleserver.start_console_sessions() webservice = httpapi.HttpApi(http_bind_host, http_bind_port) webservice.start() try: sockservice = sockapi.SockApi(sock_bind_host, sock_bind_port) sockservice.start() except NameError: pass atexit.register(doexit) while 1: eventlet.sleep(100) def _get_connector_config(config, session): try: host = config.get(session, 'bindhost') port = config.getint(session, 'bindport') except (ConfigParser.NoSectionError, ConfigParser.NoOptionError) as e: host = None port = None return (host, port)