main-afb-daemon: manage listening interfaces
[src/app-framework-binder.git] / src / main-afb-daemon.c
1 /*
2  * Copyright (C) 2015-2019 "IoT.bzh"
3  * Author "Fulup Ar Foll"
4  * Author José Bollo <jose.bollo@iot.bzh>
5  *
6  * Licensed under the Apache License, Version 2.0 (the "License");
7  * you may not use this file except in compliance with the License.
8  * You may obtain a copy of the License at
9  *
10  *   http://www.apache.org/licenses/LICENSE-2.0
11  *
12  * Unless required by applicable law or agreed to in writing, software
13  * distributed under the License is distributed on an "AS IS" BASIS,
14  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
15  * See the License for the specific language governing permissions and
16  * limitations under the License.
17  */
18
19 #define _GNU_SOURCE
20
21 #include <stdlib.h>
22 #include <stdio.h>
23 #include <stdint.h>
24 #include <signal.h>
25 #include <string.h>
26 #include <unistd.h>
27 #include <limits.h>
28 #include <errno.h>
29 #include <fcntl.h>
30 #include <sys/stat.h>
31 #include <sys/wait.h>
32
33 #if !defined(NO_CALL_PERSONALITY)
34 #include <sys/personality.h>
35 #endif
36
37 #include <json-c/json.h>
38
39 #include <systemd/sd-daemon.h>
40
41 #include "afb-args.h"
42 #include "afb-hswitch.h"
43 #include "afb-apiset.h"
44 #include "afb-autoset.h"
45 #include "afb-api-so.h"
46 #if WITH_DBUS_TRANSPARENCY
47 #   include "afb-api-dbus.h"
48 #endif
49 #include "afb-api-ws.h"
50 #include "afb-hsrv.h"
51 #include "afb-hreq.h"
52 #include "afb-xreq.h"
53 #include "afb-session.h"
54 #include "verbose.h"
55 #include "afb-common.h"
56 #include "afb-export.h"
57 #include "afb-monitor.h"
58 #if WITH_AFB_HOOK
59 #include "afb-hook.h"
60 #include "afb-hook-flags.h"
61 #endif
62 #include "afb-debug.h"
63 #if WITH_SUPERVISION
64 #   include "afb-supervision.h"
65 #endif
66
67 #include "process-name.h"
68 #include "wrap-json.h"
69 #include "jobs.h"
70 #include "sig-monitor.h"
71 #include "watchdog.h"
72
73 #if !defined(DEFAULT_BINDER_INTERFACE)
74 #  define DEFAULT_BINDER_INTERFACE NULL
75 #endif
76
77 /*
78    if SELF_PGROUP == 0 the launched command is the group leader
79    if SELF_PGROUP != 0 afb-daemon is the group leader
80 */
81 #define SELF_PGROUP 0
82
83 struct afb_apiset *main_apiset;
84 struct json_object *main_config;
85
86 static pid_t childpid;
87
88 /**
89  * Tiny helper around putenv: add the variable name=value
90  *
91  * @param name name of the variable to set
92  * @param value value to set to the variable
93  *
94  * @return 0 in case of success or -1 in case of error (with errno set to ENOMEM)
95  */
96 static int addenv(const char *name, const char *value)
97 {
98         char *head, *middle;
99
100         head = malloc(2 + strlen(name) + strlen(value));
101         if (head == NULL) {
102                 errno = ENOMEM;
103                 return -1;
104         }
105         middle = stpcpy(head, name);
106         middle[0] = '=';
107         strcpy(&middle[1], value);
108         return putenv(head);
109 }
110
111 /**
112  * Tiny helper around addenv that export the real path
113  *
114  * @param name name of the variable to set
115  * @param path the path value to export to the variable
116  *
117  * @return 0 in case of success or -1 in case of error (with errno set to ENOMEM)
118  */
119 static int addenv_realpath(const char *name, const char *path)
120 {
121         char buffer[PATH_MAX];
122         char *p = realpath(path, buffer);
123         return p ? addenv(name, p) : -1;
124 }
125
126 /**
127  * Tiny helper around addenv that export an integer
128  *
129  * @param name name of the variable to set
130  * @param value the integer value to export
131  *
132  * @return 0 in case of success or -1 in case of error (with errno set to ENOMEM)
133  */
134 static int addenv_int(const char *name, int value)
135 {
136         char buffer[64];
137         snprintf(buffer, sizeof buffer, "%d", value);
138         return addenv(name, buffer);
139 }
140
141 /*----------------------------------------------------------
142  |   helpers for handling list of arguments
143  +--------------------------------------------------------- */
144
145 static const char *run_for_config_array_opt(const char *name,
146                                             int (*run) (void *closure, const char *value),
147                                             void *closure)
148 {
149         int i, n, rc;
150         struct json_object *array, *value;
151
152         if (json_object_object_get_ex(main_config, name, &array)) {
153                 if (!json_object_is_type(array, json_type_array))
154                         return json_object_get_string(array);
155                 n = (int)json_object_array_length(array);
156                 for (i = 0 ; i < n ; i++) {
157                         value = json_object_array_get_idx(array, i);
158                         rc = run(closure, json_object_get_string(value));
159                         if (!rc)
160                                 return json_object_get_string(value);
161                 }
162         }
163         return NULL;
164 }
165
166 static int run_start(void *closure, const char *value)
167 {
168         int (*starter) (const char *value, struct afb_apiset *declare_set, struct afb_apiset *call_set) = closure;
169         return starter(value, main_apiset, main_apiset) >= 0;
170 }
171
172 static void apiset_start_list(const char *name,
173                         int (*starter) (const char *value, struct afb_apiset *declare_set, struct afb_apiset *call_set),
174                         const char *message)
175 {
176         const char *item = run_for_config_array_opt(name, run_start, starter);
177         if (item) {
178                 ERROR("can't start %s %s", message, item);
179                 exit(1);
180         }
181 }
182
183 /*----------------------------------------------------------
184  | exit_handler
185  |   Handles on exit specific actions
186  +--------------------------------------------------------- */
187 static void exit_handler()
188 {
189         struct sigaction siga;
190
191         memset(&siga, 0, sizeof siga);
192         siga.sa_handler = SIG_IGN;
193         sigaction(SIGTERM, &siga, NULL);
194
195         if (SELF_PGROUP)
196                 killpg(0, SIGTERM);
197         else if (childpid > 0)
198                 killpg(childpid, SIGTERM);
199 }
200
201 static void on_sigterm(int signum, siginfo_t *info, void *uctx)
202 {
203         NOTICE("Received SIGTERM");
204         exit(0);
205 }
206
207 static void on_sighup(int signum, siginfo_t *info, void *uctx)
208 {
209         NOTICE("Received SIGHUP");
210         /* TODO */
211 }
212
213 static void setup_daemon()
214 {
215         struct sigaction siga;
216
217         /* install signal handlers */
218         memset(&siga, 0, sizeof siga);
219         siga.sa_flags = SA_SIGINFO;
220
221         siga.sa_sigaction = on_sigterm;
222         sigaction(SIGTERM, &siga, NULL);
223
224         siga.sa_sigaction = on_sighup;
225         sigaction(SIGHUP, &siga, NULL);
226
227         /* handle groups */
228         atexit(exit_handler);
229
230         /* ignore any SIGPIPE */
231         signal(SIGPIPE, SIG_IGN);
232 }
233
234 /*----------------------------------------------------------
235  | daemonize
236  |   set the process in background
237  +--------------------------------------------------------- */
238 static void daemonize()
239 {
240         int fd = 0, daemon, nostdin;
241         const char *output;
242         pid_t pid;
243
244         daemon = 0;
245         output = NULL;
246         wrap_json_unpack(main_config, "{s?b s?s}", "daemon", &daemon, "output", &output);
247         nostdin = 0;
248
249         if (output) {
250                 fd = open(output, O_WRONLY | O_APPEND | O_CREAT, 0640);
251                 if (fd < 0) {
252                         ERROR("Can't open output %s", output);
253                         exit(1);
254                 }
255         }
256
257         if (daemon) {
258                 INFO("entering background mode");
259
260                 pid = fork();
261                 if (pid == -1) {
262                         ERROR("Failed to fork daemon process");
263                         exit(1);
264                 }
265                 if (pid != 0)
266                         _exit(0);
267
268                 nostdin = 1;
269         }
270
271         /* closes the input */
272         if (output) {
273                 NOTICE("Redirecting output to %s", output);
274                 close(2);
275                 dup(fd);
276                 close(1);
277                 dup(fd);
278                 close(fd);
279         }
280
281         if (nostdin)
282                 close(0); /* except if 'daemon', ctrl+C still works after that */
283 }
284
285 /*---------------------------------------------------------
286  | http server
287  |   Handles the HTTP server
288  +--------------------------------------------------------- */
289 static int init_alias(void *closure, const char *spec)
290 {
291         struct afb_hsrv *hsrv = closure;
292         char *path = strchr(spec, ':');
293
294         if (path == NULL) {
295                 ERROR("Missing ':' in alias %s. Alias ignored", spec);
296                 return 1;
297         }
298         *path++ = 0;
299         INFO("Alias for url=%s to path=%s", spec, path);
300         return afb_hsrv_add_alias(hsrv, spec, afb_common_rootdir_get_fd(), path,
301                                   0, 1);
302 }
303
304 static int init_http_server(struct afb_hsrv *hsrv)
305 {
306         int rc;
307         const char *rootapi, *roothttp, *rootbase;
308
309         roothttp = NULL;
310         rc = wrap_json_unpack(main_config, "{ss ss s?s}",
311                                 "rootapi", &rootapi,
312                                 "rootbase", &rootbase,
313                                 "roothttp", &roothttp);
314         if (rc < 0) {
315                 ERROR("Can't get HTTP server config");
316                 exit(1);
317         }
318
319         if (!afb_hsrv_add_handler(hsrv, rootapi,
320                         afb_hswitch_websocket_switch, main_apiset, 20))
321                 return 0;
322
323         if (!afb_hsrv_add_handler(hsrv, rootapi,
324                         afb_hswitch_apis, main_apiset, 10))
325                 return 0;
326
327         if (run_for_config_array_opt("alias", init_alias, hsrv))
328                 return 0;
329
330         if (roothttp != NULL) {
331                 if (!afb_hsrv_add_alias(hsrv, "",
332                         afb_common_rootdir_get_fd(), roothttp, -10, 1))
333                         return 0;
334         }
335
336         if (!afb_hsrv_add_handler(hsrv, rootbase,
337                         afb_hswitch_one_page_api_redirect, NULL, -20))
338                 return 0;
339
340         return 1;
341 }
342
343 static int add_interface(void *closure, const char *value)
344 {
345         struct afb_hsrv *hsrv = closure;
346         int rc;
347
348         rc = afb_hsrv_add_interface(hsrv, value);
349         return rc > 0;
350 }
351
352 static struct afb_hsrv *start_http_server()
353 {
354         int rc;
355         const char *uploaddir, *rootdir, *errs;
356         struct afb_hsrv *hsrv;
357         int cache_timeout, http_port;
358         struct json_object *junk;
359
360         http_port = -1;
361         rc = wrap_json_unpack(main_config, "{ss ss si s?i}",
362                                 "uploaddir", &uploaddir,
363                                 "rootdir", &rootdir,
364                                 "cache-eol", &cache_timeout,
365                                 "port", &http_port);
366         if (rc < 0) {
367                 ERROR("Can't get HTTP server start config");
368                 exit(1);
369         }
370
371         if (afb_hreq_init_download_path(uploaddir)) {
372                 static const char fallback_uploaddir[] = "/tmp";
373                 WARNING("unable to set the upload directory %s", uploaddir);
374                 if (afb_hreq_init_download_path(fallback_uploaddir)) {
375                         ERROR("unable to fallback to upload directory %s", fallback_uploaddir);
376                         return NULL;
377                 }
378                 uploaddir = fallback_uploaddir;
379         }
380
381         hsrv = afb_hsrv_create();
382         if (hsrv == NULL) {
383                 ERROR("memory allocation failure");
384                 return NULL;
385         }
386
387         if (!afb_hsrv_set_cache_timeout(hsrv, cache_timeout)
388             || !init_http_server(hsrv)) {
389                 ERROR("initialisation of httpd failed");
390                 afb_hsrv_put(hsrv);
391                 return NULL;
392         }
393
394         rc = afb_hsrv_start(hsrv, 15);
395         if (!rc) {
396                 ERROR("starting of httpd failed");
397                 afb_hsrv_put(hsrv);
398                 return NULL;
399         }
400
401         NOTICE("Serving rootdir=%s uploaddir=%s", rootdir, uploaddir);
402
403         /* check if port is set */
404         if (http_port < 0) {
405                 /* not set, check existing interfaces */
406                 if (!json_object_object_get_ex(main_config, "interface", &junk)) {
407                         ERROR("No port and no interface ");
408                 }
409         } else {
410                 rc = afb_hsrv_add_interface_tcp(hsrv, DEFAULT_BINDER_INTERFACE, (uint16_t) http_port);
411                 if (!rc) {
412                         ERROR("setting interface failed");
413                         afb_hsrv_put(hsrv);
414                         return NULL;
415                 }
416                 NOTICE("Browser URL= http://localhost:%d", http_port);
417         }
418
419         errs = run_for_config_array_opt("interface", add_interface, hsrv);
420         if (errs) {
421                 ERROR("setting interface %s failed", errs);
422                 afb_hsrv_put(hsrv);
423                 return NULL;
424         }
425
426         return hsrv;
427 }
428
429 /*---------------------------------------------------------
430  | execute_command
431  +--------------------------------------------------------- */
432
433 static void exit_at_end()
434 {
435         exit(0);
436 }
437
438 static void wait_child(int signum, void* arg)
439 {
440         pid_t pid = (pid_t)(intptr_t)arg;
441         pid_t pidchld = childpid;
442
443         if (pidchld == pid) {
444                 childpid = 0;
445                 if (!SELF_PGROUP)
446                         killpg(pidchld, SIGKILL);
447                 waitpid(pidchld, NULL, 0);
448                 jobs_exit(exit_at_end);
449         } else {
450                 waitpid(pid, NULL, 0);
451         }
452 }
453
454 static void on_sigchld(int signum, siginfo_t *info, void *uctx)
455 {
456         if (info->si_pid == childpid) {
457                 switch (info->si_code) {
458                 case CLD_EXITED:
459                 case CLD_KILLED:
460                 case CLD_DUMPED:
461                         jobs_queue_lazy(0, 0, wait_child, (void*)(intptr_t)info->si_pid);
462                 default:
463                         break;
464                 }
465         }
466 }
467
468 /*
469 # @@ @
470 # @p port
471 # @t token
472 */
473
474 #define SUBST_CHAR  '@'
475 #define SUBST_STR   "@"
476
477 static char *instanciate_string(const char *arg, const char *port, const char *token)
478 {
479         char *resu, *it, *wr;
480         int chg, dif;
481
482         /* get the changes */
483         chg = 0;
484         dif = 0;
485         it = strchrnul(arg, SUBST_CHAR);
486         while (*it) {
487                 switch(*++it) {
488                 case 'p': chg++; dif += (int)strlen(port) - 2; break;
489                 case 't': chg++; dif += (int)strlen(token) - 2; break;
490                 case SUBST_CHAR: it++; chg++; dif--; break;
491                 default: break;
492                 }
493                 it = strchrnul(it, SUBST_CHAR);
494         }
495
496         /* return arg when no change */
497         if (!chg)
498                 return strdup(arg);
499
500         /* allocates the result */
501         resu = malloc((it - arg) + dif + 1);
502         if (!resu) {
503                 ERROR("out of memory");
504                 return NULL;
505         }
506
507         /* instanciate the arguments */
508         wr = resu;
509         for (;;) {
510                 it = strchrnul(arg, SUBST_CHAR);
511                 wr = mempcpy(wr, arg, it - arg);
512                 if (!*it)
513                         break;
514                 switch(*++it) {
515                 case 'p': wr = stpcpy(wr, port); break;
516                 case 't': wr = stpcpy(wr, token); break;
517                 default: *wr++ = SUBST_CHAR; /*@fallthrough@*/
518                 case SUBST_CHAR: *wr++ = *it;
519                 }
520                 arg = ++it;
521         }
522
523         *wr = 0;
524         return resu;
525 }
526
527 static int instanciate_environ(const char *port, const char *token)
528 {
529         extern char **environ;
530         char *repl;
531         int i;
532
533         /* instantiate the environment */
534         for (i = 0 ; environ[i] ; i++) {
535                 repl = instanciate_string(environ[i], port, token);
536                 if (!repl)
537                         return -1;
538                 environ[i] = repl;
539         }
540         return 0;
541 }
542
543 static char **instanciate_command_args(struct json_object *exec, const char *port, const char *token)
544 {
545         char **result;
546         char *repl;
547         int i, n;
548
549         /* allocates the result */
550         n = (int)json_object_array_length(exec);
551         result = malloc((n + 1) * sizeof * result);
552         if (!result) {
553                 ERROR("out of memory");
554                 return NULL;
555         }
556
557         /* instanciate the arguments */
558         for (i = 0 ; i < n ; i++) {
559                 repl = instanciate_string(json_object_get_string(json_object_array_get_idx(exec, i)), port, token);
560                 if (!repl) {
561                         while(i)
562                                 free(result[--i]);
563                         free(result);
564                         return NULL;
565                 }
566                 result[i] = repl;
567         }
568         result[i] = NULL;
569         return result;
570 }
571
572 static int execute_command()
573 {
574         struct json_object *exec, *oport, *otok;
575         struct sigaction siga;
576         char port[20];
577         const char *token;
578         char **args;
579         int rc;
580
581         /* check whether a command is to execute or not */
582         if (!json_object_object_get_ex(main_config, "exec", &exec))
583                 return 0;
584
585         if (SELF_PGROUP)
586                 setpgid(0, 0);
587
588         /* install signal handler */
589         memset(&siga, 0, sizeof siga);
590         siga.sa_sigaction = on_sigchld;
591         siga.sa_flags = SA_SIGINFO;
592         sigaction(SIGCHLD, &siga, NULL);
593
594         /* fork now */
595         childpid = fork();
596         if (childpid)
597                 return 0;
598
599         /* compute the string for port */
600         if (json_object_object_get_ex(main_config, "port", &oport))
601                 rc = snprintf(port, sizeof port, "%s", json_object_get_string(oport));
602         else
603                 rc = snprintf(port, sizeof port, "%cp", SUBST_CHAR);
604         if (rc < 0 || rc >= (int)(sizeof port)) {
605                 ERROR("port->txt failed");
606         }
607         else {
608                 /* instantiate arguments and environment */
609                 if (json_object_object_get_ex(main_config, "token", &otok))
610                         token = json_object_get_string(otok);
611                 else
612                         token = SUBST_STR"p";
613                 args = instanciate_command_args(exec, port, token);
614                 if (args && instanciate_environ(port, token) >= 0) {
615                         /* run */
616                         if (!SELF_PGROUP)
617                                 setpgid(0, 0);
618                         execv(args[0], args);
619                         ERROR("can't launch %s: %m", args[0]);
620                 }
621         }
622         exit(1);
623         return -1;
624 }
625
626 /*---------------------------------------------------------
627  | startup calls
628  +--------------------------------------------------------- */
629
630 struct startup_req
631 {
632         struct afb_xreq xreq;
633         char *api;
634         char *verb;
635         struct json_object *calls;
636         int index;
637         int count;
638         const char *callspec;
639         struct afb_session *session;
640 };
641
642 static void startup_call_reply(struct afb_xreq *xreq, struct json_object *object, const char *error, const char *info)
643 {
644         struct startup_req *sreq = CONTAINER_OF_XREQ(struct startup_req, xreq);
645
646         info = info ?: "";
647         if (!error) {
648                 NOTICE("startup call %s returned %s (%s)", sreq->callspec, json_object_get_string(object), info);
649                 json_object_put(object);
650         } else {
651                 ERROR("startup call %s ERROR! %s (%s)", sreq->callspec, error, info);
652                 exit(1);
653         }
654 }
655
656 static void startup_call_current(struct startup_req *sreq);
657
658 static void startup_call_unref(struct afb_xreq *xreq)
659 {
660         struct startup_req *sreq = CONTAINER_OF_XREQ(struct startup_req, xreq);
661
662         free(sreq->api);
663         free(sreq->verb);
664         json_object_put(sreq->xreq.json);
665         if (++sreq->index < sreq->count)
666                 startup_call_current(sreq);
667         else {
668                 afb_session_close(sreq->session);
669                 afb_session_unref(sreq->session);
670                 free(sreq);
671         }
672 }
673
674 static struct afb_xreq_query_itf startup_xreq_itf =
675 {
676         .reply = startup_call_reply,
677         .unref = startup_call_unref
678 };
679
680 static void startup_call_current(struct startup_req *sreq)
681 {
682         const char *api, *verb, *json;
683         enum json_tokener_error jerr;
684
685         sreq->callspec = json_object_get_string(json_object_array_get_idx(sreq->calls, sreq->index)),
686         api = sreq->callspec;
687         verb = strchr(api, '/');
688         if (verb) {
689                 json = strchr(verb, ':');
690                 if (json) {
691                         afb_xreq_init(&sreq->xreq, &startup_xreq_itf);
692                         afb_context_init_validated(&sreq->xreq.context, sreq->session, NULL, NULL);
693                         sreq->api = strndup(api, verb - api);
694                         sreq->verb = strndup(verb + 1, json - verb - 1);
695                         sreq->xreq.request.called_api = sreq->api;
696                         sreq->xreq.request.called_verb = sreq->verb;
697                         sreq->xreq.json = json_tokener_parse_verbose(json + 1, &jerr);
698                         if (sreq->api && sreq->verb && jerr == json_tokener_success) {
699                                 afb_xreq_process(&sreq->xreq, main_apiset);
700                                 return;
701                         }
702                 }
703         }
704         ERROR("Bad call specification %s", sreq->callspec);
705         exit(1);
706 }
707
708 static void run_startup_calls()
709 {
710         struct json_object *calls;
711         struct startup_req *sreq;
712         int count;
713
714         if (json_object_object_get_ex(main_config, "call", &calls)
715          && json_object_is_type(calls, json_type_array)
716          && (count = (int)json_object_array_length(calls))) {
717                 sreq = calloc(1, sizeof *sreq);
718                 sreq->session = afb_session_create(3600);
719                 sreq->calls = calls;
720                 sreq->index = 0;
721                 sreq->count = count;
722                 startup_call_current(sreq);
723         }
724 }
725
726 /*---------------------------------------------------------
727  | job for starting the daemon
728  +--------------------------------------------------------- */
729
730 static void start(int signum, void *arg)
731 {
732 #if WITH_AFB_HOOK
733         const char *tracereq = NULL, *traceapi = NULL, *traceevt = NULL,
734 #if !defined(REMOVE_LEGACY_TRACE)
735                 *tracesvc = NULL, *traceditf = NULL,
736 #endif
737                 *traceses = NULL, *traceglob = NULL;
738 #endif
739         const char *workdir, *rootdir, *token, *rootapi;
740         struct json_object *settings;
741         struct afb_hsrv *hsrv;
742         int max_session_count, session_timeout, api_timeout;
743         int no_httpd, http_port;
744         int rc;
745
746
747         afb_debug("start-entry");
748
749         if (signum) {
750                 ERROR("start aborted: received signal %s", strsignal(signum));
751                 exit(1);
752         }
753
754         settings = NULL;
755         no_httpd = 0;
756         http_port = -1;
757         rootapi = token = NULL;
758         rc = wrap_json_unpack(main_config, "{"
759                         "ss ss s?s"
760                         "si si si"
761                         "s?b s?i s?s"
762 #if WITH_AFB_HOOK
763 #if !defined(REMOVE_LEGACY_TRACE)
764                         "s?s s?s"
765 #endif
766                         "s?s s?s s?s s?s s?s"
767 #endif
768                         "s?o"
769                         "}",
770
771                         "rootdir", &rootdir,
772                         "workdir", &workdir,
773                         "token", &token,
774
775                         "apitimeout", &api_timeout,
776                         "cntxtimeout", &session_timeout,
777                         "session-max", &max_session_count,
778
779                         "no-httpd", &no_httpd,
780                         "port", &http_port,
781                         "rootapi", &rootapi,
782
783 #if WITH_AFB_HOOK
784 #if !defined(REMOVE_LEGACY_TRACE)
785                         "tracesvc", &tracesvc,
786                         "traceditf", &traceditf,
787 #endif
788                         "tracereq", &tracereq,
789                         "traceapi", &traceapi,
790                         "traceevt", &traceevt,
791                         "traceses",  &traceses,
792                         "traceglob", &traceglob,
793 #endif
794                         "set", &settings
795                         );
796         if (rc < 0) {
797                 ERROR("Unable to get start config");
798                 exit(1);
799         }
800
801         /* initialize session handling */
802         if (afb_session_init(max_session_count, session_timeout)) {
803                 ERROR("initialisation of session manager failed");
804                 goto error;
805         }
806
807         /* set the directories */
808         mkdir(workdir, S_IRWXU | S_IRGRP | S_IXGRP);
809         if (chdir(workdir) < 0) {
810                 ERROR("Can't enter working dir %s", workdir);
811                 goto error;
812         }
813         if (afb_common_rootdir_set(rootdir) < 0) {
814                 ERROR("failed to set common root directory %s", rootdir);
815                 goto error;
816         }
817         if (addenv_realpath("AFB_WORKDIR", "."     /* resolved by realpath */)
818          || addenv_realpath("AFB_ROOTDIR", rootdir /* relative to current directory */)) {
819                 ERROR("can't set DIR environment");
820                 goto error;
821         }
822
823         /* setup HTTP */
824         if (!no_httpd) {
825                 if (http_port < 0) {
826                         ERROR("no port is defined");
827                         goto error;
828                 }
829                 if (http_port == 0) {
830                         ERROR("random port is not implemented");
831                         goto error;
832                 }
833                 if (addenv_int("AFB_PORT", http_port)
834                  || addenv("AFB_TOKEN", token?:"")) {
835                         ERROR("can't set HTTP environment");
836                         goto error;
837                 }
838         }
839
840         /* configure the daemon */
841         afb_export_set_config(settings);
842         main_apiset = afb_apiset_create("main", api_timeout);
843         if (!main_apiset) {
844                 ERROR("can't create main api set");
845                 goto error;
846         }
847         if (afb_monitor_init(main_apiset, main_apiset) < 0) {
848                 ERROR("failed to setup monitor");
849                 goto error;
850         }
851 #if WITH_SUPERVISION
852         if (afb_supervision_init(main_apiset, main_config) < 0) {
853                 ERROR("failed to setup supervision");
854                 goto error;
855         }
856 #endif
857
858 #if WITH_AFB_HOOK
859         /* install hooks */
860         if (tracereq)
861                 afb_hook_create_xreq(NULL, NULL, NULL, afb_hook_flags_xreq_from_text(tracereq), NULL, NULL);
862 #if !defined(REMOVE_LEGACY_TRACE)
863         if (traceapi || tracesvc || traceditf)
864                 afb_hook_create_api(NULL, afb_hook_flags_api_from_text(traceapi)
865                         | afb_hook_flags_legacy_ditf_from_text(traceditf)
866                         | afb_hook_flags_legacy_svc_from_text(tracesvc), NULL, NULL);
867 #else
868         if (traceapi)
869                 afb_hook_create_api(NULL, afb_hook_flags_api_from_text(traceapi), NULL, NULL);
870 #endif
871         if (traceevt)
872                 afb_hook_create_evt(NULL, afb_hook_flags_evt_from_text(traceevt), NULL, NULL);
873         if (traceses)
874                 afb_hook_create_session(NULL, afb_hook_flags_session_from_text(traceses), NULL, NULL);
875         if (traceglob)
876                 afb_hook_create_global(afb_hook_flags_global_from_text(traceglob), NULL, NULL);
877 #endif
878
879         /* load bindings and apis */
880         afb_debug("start-load");
881 #if WITH_DYNAMIC_BINDING
882         apiset_start_list("binding", afb_api_so_add_binding, "the binding");
883         apiset_start_list("ldpaths", afb_api_so_add_pathset_fails, "the binding path set");
884         apiset_start_list("weak-ldpaths", afb_api_so_add_pathset_nofails, "the weak binding path set");
885 #endif
886         apiset_start_list("auto-api", afb_autoset_add_any, "the automatic api path set");
887 #if WITH_DBUS_TRANSPARENCY
888         apiset_start_list("dbus-client", afb_api_dbus_add_client, "the afb-dbus client");
889 #endif
890         apiset_start_list("ws-client", afb_api_ws_add_client_weak, "the afb-websocket client");
891
892         DEBUG("Init config done");
893
894         /* start the services */
895         afb_debug("start-start");
896 #if !defined(NO_CALL_PERSONALITY)
897         personality((unsigned long)-1L);
898 #endif
899         if (afb_apiset_start_all_services(main_apiset) < 0)
900                 goto error;
901
902         /* export started apis */
903         apiset_start_list("ws-server", afb_api_ws_add_server, "the afb-websocket service");
904 #if WITH_DBUS_TRANSPARENCY
905         apiset_start_list("dbus-server", afb_api_dbus_add_server, "the afb-dbus service");
906 #endif
907
908         /* start the HTTP server */
909         afb_debug("start-http");
910         if (!no_httpd) {
911                 if (!afb_hreq_init_cookie(http_port, rootapi, session_timeout)) {
912                         ERROR("initialisation of HTTP cookies failed");
913                         goto error;
914                 }
915
916                 hsrv = start_http_server();
917                 if (hsrv == NULL)
918                         goto error;
919         }
920
921         /* run the startup calls */
922         afb_debug("start-call");
923         run_startup_calls();
924
925         /* run the command */
926         afb_debug("start-exec");
927         if (execute_command(http_port, token) < 0)
928                 goto error;
929
930         /* ready */
931         sd_notify(1, "READY=1");
932
933         /* activate the watchdog */
934 #if HAS_WATCHDOG
935         if (watchdog_activate() < 0)
936                 ERROR("can't start the watchdog");
937 #endif
938
939         return;
940 error:
941         exit(1);
942 }
943
944 /*---------------------------------------------------------
945  | main
946  |   Parse option and launch action
947  +--------------------------------------------------------- */
948
949 int main(int argc, char *argv[])
950 {
951         struct json_object *obj;
952         afb_debug("main-entry");
953
954         // ------------- Build session handler & init config -------
955         main_config = afb_args_parse(argc, argv);
956         if (sig_monitor_init(
957                 !json_object_object_get_ex(main_config, "trap-faults", &obj)
958                         || json_object_get_boolean(obj)) < 0) {
959                 ERROR("failed to initialise signal handlers");
960                 return 1;
961         }
962
963
964         if (json_object_object_get_ex(main_config, "name", &obj)) {
965                 verbose_set_name(json_object_get_string(obj), 0);
966                 process_name_set_name(json_object_get_string(obj));
967                 process_name_replace_cmdline(argv, json_object_get_string(obj));
968         }
969         afb_debug("main-args");
970
971         // --------- run -----------
972         daemonize();
973         INFO("running with pid %d", getpid());
974
975         /* set the daemon environment */
976         setup_daemon();
977
978         afb_debug("main-start");
979
980         /* enter job processing */
981         jobs_start(3, 0, 100, start, NULL);
982         WARNING("hoops returned from jobs_enter! [report bug]");
983         return 1;
984 }
985