[rrd-developers] [RFC] implement rrd_daemon socket activation for systemd
Tomasz Torcz
tomek at pipebreaker.pl
Mon May 21 14:22:15 CEST 2012
Hello,
I reworked the implementation based on iodine's socket activation patch.
It is much simpler - no additional files to ship, no autoconf stuff. Gathering
passed file descriptor is now unconditional and do not interfere with non-systemd
systems.
Previously sent units definition files are still fine.
Also, I forgot to mention previously that similiar mechanism is available
in Mac OS X server, if anybody want to run rrdcached on it. Someone inclined
could probably add support for launchd to my patch.
--
Tomasz Torcz ,,(...) today's high-end is tomorrow's embedded processor.''
xmpp: zdzichubg at chrome.pl -- Mitchell Blank on LKML
-------------- next part --------------
diff --git a/src/rrd_daemon.c b/src/rrd_daemon.c
index 2c81424..0610d38 100644
--- a/src/rrd_daemon.c
+++ b/src/rrd_daemon.c
@@ -2975,6 +2975,91 @@ static int open_listen_socket (const listen_socket_t *sock) /* {{{ */
return (open_listen_socket_network(sock));
} /* }}} int open_listen_socket */
+#ifndef SD_LISTEN_FDS_START
+# define SD_LISTEN_FDS_START 3
+#endif
+/*
+ * returns number of descriptors passed from systemd
+ */
+static int open_listen_sockets_systemd(void) /* {{{ */
+{
+ listen_socket_t *temp;
+ struct sockaddr_un sa;
+ socklen_t l;
+ int sd_fd;
+ const char *env;
+ unsigned long n;
+
+ /* check if it for us */
+ env = getenv("LISTEN_PID");
+ if (!env)
+ return 0;
+
+ n = strtoul(env, NULL, 10);
+ if (!n || n == ULONG_MAX || (pid_t)n != getpid())
+ return 0;
+
+ /* get the number of passed descriptors */
+ env = getenv("LISTEN_FDS");
+ if (!env)
+ return 0;
+
+ n = strtoul(env, NULL, 10);
+ if (!n || n == ULONG_MAX)
+ return 0;
+
+ temp = (listen_socket_t *) rrd_realloc (listen_fds,
+ sizeof (listen_fds[0]) * (listen_fds_num + n));
+ if (temp == NULL)
+ {
+ fprintf (stderr, "rrdcached: open_listen_socket_systemd: realloc failed.\n");
+ return 0;
+ }
+ listen_fds = temp;
+
+ for (unsigned int i = 0; i < n; i++)
+ {
+ sd_fd = SD_LISTEN_FDS_START + i;
+
+ l = sizeof(sa);
+ memset(&sa, 0, l);
+ if (getsockname(sd_fd, &sa, &l) < 0)
+ {
+ fprintf(stderr, "open_listen_sockets_systemd: problem getting fd %d: %s\n", sd_fd, rrd_strerror (errno));
+ return i;
+ }
+
+ listen_fds[listen_fds_num].fd = sd_fd;
+ listen_fds[listen_fds_num].family = sa.sun_family;
+ listen_fds_num++;
+ }
+
+ return n;
+} /* }}} open_listen_sockets_systemd */
+
+static void open_listen_sockets_traditional(void) /* {{{ */
+{
+ if (config_listen_address_list_len > 0)
+ {
+ for (size_t i = 0; i < config_listen_address_list_len; i++)
+ open_listen_socket (config_listen_address_list[i]);
+
+ rrd_free_ptrs((void ***) &config_listen_address_list,
+ &config_listen_address_list_len);
+ }
+ else
+ {
+ strncpy(default_socket.addr, RRDCACHED_DEFAULT_ADDRESS,
+ sizeof(default_socket.addr) - 1);
+ default_socket.addr[sizeof(default_socket.addr) - 1] = '\0';
+
+ if (default_socket.permissions == 0)
+ socket_permission_set_all (&default_socket);
+
+ open_listen_socket (&default_socket);
+ }
+} /* }}} open_list_sockets_traditional */
+
static int close_listen_sockets (void) /* {{{ */
{
size_t i;
@@ -3120,26 +3205,11 @@ static int daemonize (void) /* {{{ */
if (pid_fd < 0)
return pid_fd;
- /* open all the listen sockets */
- if (config_listen_address_list_len > 0)
- {
- for (size_t i = 0; i < config_listen_address_list_len; i++)
- open_listen_socket (config_listen_address_list[i]);
-
- rrd_free_ptrs((void ***) &config_listen_address_list,
- &config_listen_address_list_len);
- }
- else
- {
- strncpy(default_socket.addr, RRDCACHED_DEFAULT_ADDRESS,
- sizeof(default_socket.addr) - 1);
- default_socket.addr[sizeof(default_socket.addr) - 1] = '\0';
-
- if (default_socket.permissions == 0)
- socket_permission_set_all (&default_socket);
+ /* gather sockets passed from systemd;
+ * if none, open all the listen sockets from config or default */
- open_listen_socket (&default_socket);
- }
+ if (!(open_listen_sockets_systemd() > 0))
+ open_listen_sockets_traditional();
if (listen_fds_num < 1)
{
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 270 bytes
Desc: not available
Url : http://lists.oetiker.ch/pipermail/rrd-developers/attachments/20120521/56893453/attachment.pgp
More information about the rrd-developers
mailing list