nghttpx: Split monolithic one process into control and worker processes
The control process handles signals, reads configuration, reads private keys, and bind port (which may be privileged one). It never drop privileges, so that it can execute new binary with the same privilege. It forks worker process. The worker process handles all incoming connections. It drops privilege.
This commit is contained in:
parent
b57b0db5bf
commit
ce1b11e3a0
|
@ -42,6 +42,14 @@ SIGUSR2
|
|||
After new process comes up, sending SIGQUIT to the original process
|
||||
to perform hot swapping.
|
||||
|
||||
.. note::
|
||||
|
||||
nghttpx consists of 2 processes: one process for processing these
|
||||
signals, and another one for processing requests. The former spawns
|
||||
the latter. The former is called master process, and the latter is
|
||||
called worker process. The above signal must be sent to the master
|
||||
process. If the worker process receives one of them, it is ignored.
|
||||
|
||||
SERVER PUSH
|
||||
-----------
|
||||
|
||||
|
|
|
@ -125,6 +125,8 @@ NGHTTPX_SRCS = \
|
|||
shrpx_memcached_connection.cc shrpx_memcached_connection.h \
|
||||
shrpx_memcached_request.h \
|
||||
shrpx_memcached_result.h \
|
||||
shrpx_worker_process.cc shrpx_worker_process.h \
|
||||
shrpx_process.h \
|
||||
buffer.h memchunk.h template.h
|
||||
|
||||
if HAVE_SPDYLAY
|
||||
|
|
903
src/shrpx.cc
903
src/shrpx.cc
File diff suppressed because it is too large
Load Diff
|
@ -327,6 +327,7 @@ struct Config {
|
|||
nghttp2_option *http2_client_option;
|
||||
const EVP_CIPHER *tls_ticket_key_cipher;
|
||||
const char *server_name;
|
||||
char **original_argv;
|
||||
char **argv;
|
||||
char *cwd;
|
||||
size_t num_worker;
|
||||
|
|
|
@ -0,0 +1,43 @@
|
|||
/*
|
||||
* nghttp2 - HTTP/2 C Library
|
||||
*
|
||||
* Copyright (c) 2015 Tatsuhiro Tsujikawa
|
||||
*
|
||||
* Permission is hereby granted, free of charge, to any person obtaining
|
||||
* a copy of this software and associated documentation files (the
|
||||
* "Software"), to deal in the Software without restriction, including
|
||||
* without limitation the rights to use, copy, modify, merge, publish,
|
||||
* distribute, sublicense, and/or sell copies of the Software, and to
|
||||
* permit persons to whom the Software is furnished to do so, subject to
|
||||
* the following conditions:
|
||||
*
|
||||
* The above copyright notice and this permission notice shall be
|
||||
* included in all copies or substantial portions of the Software.
|
||||
*
|
||||
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
|
||||
* EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
|
||||
* MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
|
||||
* NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE
|
||||
* LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION
|
||||
* OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION
|
||||
* WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
|
||||
*/
|
||||
#ifndef SHRPX_PROCESS_H
|
||||
#define SHRPX_PROCESS_H
|
||||
|
||||
#include "shrpx.h"
|
||||
|
||||
#include <signal.h>
|
||||
|
||||
namespace shrpx {
|
||||
|
||||
constexpr uint8_t SHRPX_IPC_REOPEN_LOG = 1;
|
||||
constexpr uint8_t SHRPX_IPC_GRACEFUL_SHUTDOWN = 2;
|
||||
|
||||
constexpr int REOPEN_LOG_SIGNAL = SIGUSR1;
|
||||
constexpr int EXEC_BINARY_SIGNAL = SIGUSR2;
|
||||
constexpr int GRACEFUL_SHUTDOWN_SIGNAL = SIGQUIT;
|
||||
|
||||
} // namespace shrpx
|
||||
|
||||
#endif // SHRPX_PROCESS_H
|
|
@ -183,7 +183,8 @@ void Worker::process_events() {
|
|||
break;
|
||||
}
|
||||
case REOPEN_LOG:
|
||||
WLOG(NOTICE, this) << "Reopening log files: worker(" << this << ")";
|
||||
WLOG(NOTICE, this) << "Reopening log files: worker process (thread "
|
||||
<< this << ")";
|
||||
|
||||
reopen_log_files();
|
||||
|
||||
|
|
|
@ -0,0 +1,467 @@
|
|||
/*
|
||||
* nghttp2 - HTTP/2 C Library
|
||||
*
|
||||
* Copyright (c) 2015 Tatsuhiro Tsujikawa
|
||||
*
|
||||
* Permission is hereby granted, free of charge, to any person obtaining
|
||||
* a copy of this software and associated documentation files (the
|
||||
* "Software"), to deal in the Software without restriction, including
|
||||
* without limitation the rights to use, copy, modify, merge, publish,
|
||||
* distribute, sublicense, and/or sell copies of the Software, and to
|
||||
* permit persons to whom the Software is furnished to do so, subject to
|
||||
* the following conditions:
|
||||
*
|
||||
* The above copyright notice and this permission notice shall be
|
||||
* included in all copies or substantial portions of the Software.
|
||||
*
|
||||
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
|
||||
* EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
|
||||
* MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
|
||||
* NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE
|
||||
* LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION
|
||||
* OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION
|
||||
* WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
|
||||
*/
|
||||
#include "shrpx_worker_process.h"
|
||||
|
||||
#include <sys/types.h>
|
||||
#ifdef HAVE_UNISTD_H
|
||||
#include <unistd.h>
|
||||
#endif // HAVE_UNISTD_H
|
||||
#include <sys/resource.h>
|
||||
#include <grp.h>
|
||||
|
||||
#include <cinttypes>
|
||||
#include <cstdlib>
|
||||
|
||||
#include <openssl/rand.h>
|
||||
|
||||
#include <ev.h>
|
||||
|
||||
#include "shrpx_config.h"
|
||||
#include "shrpx_connection_handler.h"
|
||||
#include "shrpx_log_config.h"
|
||||
#include "shrpx_worker.h"
|
||||
#include "shrpx_accept_handler.h"
|
||||
#include "shrpx_http2_upstream.h"
|
||||
#include "shrpx_http2_session.h"
|
||||
#include "shrpx_memcached_dispatcher.h"
|
||||
#include "shrpx_memcached_request.h"
|
||||
#include "shrpx_process.h"
|
||||
#include "util.h"
|
||||
#include "app_helper.h"
|
||||
#include "template.h"
|
||||
|
||||
using namespace nghttp2;
|
||||
|
||||
namespace shrpx {
|
||||
|
||||
namespace {
|
||||
void drop_privileges() {
|
||||
if (getuid() == 0 && get_config()->uid != 0) {
|
||||
if (initgroups(get_config()->user.get(), get_config()->gid) != 0) {
|
||||
auto error = errno;
|
||||
LOG(FATAL) << "Could not change supplementary groups: "
|
||||
<< strerror(error);
|
||||
exit(EXIT_FAILURE);
|
||||
}
|
||||
if (setgid(get_config()->gid) != 0) {
|
||||
auto error = errno;
|
||||
LOG(FATAL) << "Could not change gid: " << strerror(error);
|
||||
exit(EXIT_FAILURE);
|
||||
}
|
||||
if (setuid(get_config()->uid) != 0) {
|
||||
auto error = errno;
|
||||
LOG(FATAL) << "Could not change uid: " << strerror(error);
|
||||
exit(EXIT_FAILURE);
|
||||
}
|
||||
if (setuid(0) != -1) {
|
||||
LOG(FATAL) << "Still have root privileges?";
|
||||
exit(EXIT_FAILURE);
|
||||
}
|
||||
}
|
||||
}
|
||||
} // namespace
|
||||
|
||||
namespace {
|
||||
void graceful_shutdown(ConnectionHandler *conn_handler) {
|
||||
if (conn_handler->get_graceful_shutdown()) {
|
||||
return;
|
||||
}
|
||||
|
||||
LOG(NOTICE) << "Graceful shutdown signal received";
|
||||
|
||||
conn_handler->set_graceful_shutdown(true);
|
||||
|
||||
conn_handler->disable_acceptor();
|
||||
|
||||
// After disabling accepting new connection, disptach incoming
|
||||
// connection in backlog.
|
||||
|
||||
conn_handler->accept_pending_connection();
|
||||
|
||||
conn_handler->graceful_shutdown_worker();
|
||||
|
||||
if (get_config()->num_worker == 1 &&
|
||||
conn_handler->get_single_worker()->get_worker_stat()->num_connections >
|
||||
0) {
|
||||
return;
|
||||
}
|
||||
|
||||
// We have accepted all pending connections. Shutdown main event
|
||||
// loop.
|
||||
ev_break(conn_handler->get_loop());
|
||||
}
|
||||
} // namespace
|
||||
|
||||
namespace {
|
||||
void reopen_log(ConnectionHandler *conn_handler) {
|
||||
LOG(NOTICE) << "Reopening log files: worker process (thread main)";
|
||||
|
||||
(void)reopen_log_files();
|
||||
redirect_stderr_to_errorlog();
|
||||
|
||||
if (get_config()->num_worker > 1) {
|
||||
conn_handler->worker_reopen_log_files();
|
||||
}
|
||||
}
|
||||
} // namespace
|
||||
|
||||
namespace {
|
||||
void ipc_readcb(struct ev_loop *loop, ev_io *w, int revents) {
|
||||
auto conn_handler = static_cast<ConnectionHandler *>(w->data);
|
||||
std::array<uint8_t, 1024> buf;
|
||||
ssize_t nread;
|
||||
while ((nread = read(w->fd, buf.data(), buf.size())) == -1 && errno == EINTR)
|
||||
;
|
||||
if (nread == -1) {
|
||||
auto error = errno;
|
||||
LOG(ERROR) << "Failed to read data from ipc channel: errno=" << error;
|
||||
return;
|
||||
}
|
||||
|
||||
if (nread == 0) {
|
||||
// IPC socket closed. Perform immediate shutdown.
|
||||
LOG(FATAL) << "IPC socket is closed. Perform immediate shutdown.";
|
||||
ev_break(conn_handler->get_loop());
|
||||
return;
|
||||
}
|
||||
|
||||
for (ssize_t i = 0; i < nread; ++i) {
|
||||
switch (buf[i]) {
|
||||
case SHRPX_IPC_GRACEFUL_SHUTDOWN:
|
||||
graceful_shutdown(conn_handler);
|
||||
break;
|
||||
case SHRPX_IPC_REOPEN_LOG:
|
||||
reopen_log(conn_handler);
|
||||
break;
|
||||
}
|
||||
}
|
||||
}
|
||||
} // namespace
|
||||
|
||||
namespace {
|
||||
int generate_ticket_key(TicketKey &ticket_key) {
|
||||
ticket_key.cipher = get_config()->tls_ticket_key_cipher;
|
||||
ticket_key.hmac = EVP_sha256();
|
||||
ticket_key.hmac_keylen = EVP_MD_size(ticket_key.hmac);
|
||||
|
||||
assert(static_cast<size_t>(EVP_CIPHER_key_length(ticket_key.cipher)) <=
|
||||
ticket_key.data.enc_key.size());
|
||||
assert(ticket_key.hmac_keylen <= ticket_key.data.hmac_key.size());
|
||||
|
||||
if (LOG_ENABLED(INFO)) {
|
||||
LOG(INFO) << "enc_keylen=" << EVP_CIPHER_key_length(ticket_key.cipher)
|
||||
<< ", hmac_keylen=" << ticket_key.hmac_keylen;
|
||||
}
|
||||
|
||||
if (RAND_bytes(reinterpret_cast<unsigned char *>(&ticket_key.data),
|
||||
sizeof(ticket_key.data)) == 0) {
|
||||
return -1;
|
||||
}
|
||||
|
||||
return 0;
|
||||
}
|
||||
} // namespace
|
||||
|
||||
namespace {
|
||||
void renew_ticket_key_cb(struct ev_loop *loop, ev_timer *w, int revents) {
|
||||
auto conn_handler = static_cast<ConnectionHandler *>(w->data);
|
||||
const auto &old_ticket_keys = conn_handler->get_ticket_keys();
|
||||
|
||||
auto ticket_keys = std::make_shared<TicketKeys>();
|
||||
LOG(NOTICE) << "Renew new ticket keys";
|
||||
|
||||
// If old_ticket_keys is not empty, it should contain at least 2
|
||||
// keys: one for encryption, and last one for the next encryption
|
||||
// key but decryption only. The keys in between are old keys and
|
||||
// decryption only. The next key is provided to ensure to mitigate
|
||||
// possible problem when one worker encrypt new key, but one worker,
|
||||
// which did not take the that key yet, and cannot decrypt it.
|
||||
//
|
||||
// We keep keys for get_config()->tls_session_timeout seconds. The
|
||||
// default is 12 hours. Thus the maximum ticket vector size is 12.
|
||||
if (old_ticket_keys) {
|
||||
auto &old_keys = old_ticket_keys->keys;
|
||||
auto &new_keys = ticket_keys->keys;
|
||||
|
||||
assert(!old_keys.empty());
|
||||
|
||||
auto max_tickets =
|
||||
static_cast<size_t>(std::chrono::duration_cast<std::chrono::hours>(
|
||||
get_config()->tls_session_timeout).count());
|
||||
|
||||
new_keys.resize(std::min(max_tickets, old_keys.size() + 1));
|
||||
std::copy_n(std::begin(old_keys), new_keys.size() - 1,
|
||||
std::begin(new_keys) + 1);
|
||||
} else {
|
||||
ticket_keys->keys.resize(1);
|
||||
}
|
||||
|
||||
auto &new_key = ticket_keys->keys[0];
|
||||
|
||||
if (generate_ticket_key(new_key) != 0) {
|
||||
if (LOG_ENABLED(INFO)) {
|
||||
LOG(INFO) << "failed to generate ticket key";
|
||||
}
|
||||
conn_handler->set_ticket_keys(nullptr);
|
||||
conn_handler->set_ticket_keys_to_worker(nullptr);
|
||||
return;
|
||||
}
|
||||
|
||||
if (LOG_ENABLED(INFO)) {
|
||||
LOG(INFO) << "ticket keys generation done";
|
||||
assert(ticket_keys->keys.size() >= 1);
|
||||
LOG(INFO) << 0 << " enc+dec: "
|
||||
<< util::format_hex(ticket_keys->keys[0].data.name);
|
||||
for (size_t i = 1; i < ticket_keys->keys.size(); ++i) {
|
||||
auto &key = ticket_keys->keys[i];
|
||||
LOG(INFO) << i << " dec: " << util::format_hex(key.data.name);
|
||||
}
|
||||
}
|
||||
|
||||
conn_handler->set_ticket_keys(ticket_keys);
|
||||
conn_handler->set_ticket_keys_to_worker(ticket_keys);
|
||||
}
|
||||
} // namespace
|
||||
|
||||
namespace {
|
||||
void memcached_get_ticket_key_cb(struct ev_loop *loop, ev_timer *w,
|
||||
int revents) {
|
||||
auto conn_handler = static_cast<ConnectionHandler *>(w->data);
|
||||
auto dispatcher = conn_handler->get_tls_ticket_key_memcached_dispatcher();
|
||||
|
||||
auto req = make_unique<MemcachedRequest>();
|
||||
req->key = "nghttpx:tls-ticket-key";
|
||||
req->op = MEMCACHED_OP_GET;
|
||||
req->cb = [conn_handler, dispatcher, w](MemcachedRequest *req,
|
||||
MemcachedResult res) {
|
||||
switch (res.status_code) {
|
||||
case MEMCACHED_ERR_NO_ERROR:
|
||||
break;
|
||||
case MEMCACHED_ERR_EXT_NETWORK_ERROR:
|
||||
conn_handler->on_tls_ticket_key_network_error(w);
|
||||
return;
|
||||
default:
|
||||
conn_handler->on_tls_ticket_key_not_found(w);
|
||||
return;
|
||||
}
|
||||
|
||||
// |version (4bytes)|len (2bytes)|key (variable length)|...
|
||||
// (len, key) pairs are repeated as necessary.
|
||||
|
||||
auto &value = res.value;
|
||||
if (value.size() < 4) {
|
||||
LOG(WARN) << "Memcached: tls ticket key value is too small: got "
|
||||
<< value.size();
|
||||
conn_handler->on_tls_ticket_key_not_found(w);
|
||||
return;
|
||||
}
|
||||
auto p = value.data();
|
||||
auto version = util::get_uint32(p);
|
||||
// Currently supported version is 1.
|
||||
if (version != 1) {
|
||||
LOG(WARN) << "Memcached: tls ticket key version: want 1, got " << version;
|
||||
conn_handler->on_tls_ticket_key_not_found(w);
|
||||
return;
|
||||
}
|
||||
|
||||
auto end = p + value.size();
|
||||
p += 4;
|
||||
|
||||
size_t expectedlen;
|
||||
size_t enc_keylen;
|
||||
size_t hmac_keylen;
|
||||
if (get_config()->tls_ticket_key_cipher == EVP_aes_128_cbc()) {
|
||||
expectedlen = 48;
|
||||
enc_keylen = 16;
|
||||
hmac_keylen = 16;
|
||||
} else if (get_config()->tls_ticket_key_cipher == EVP_aes_256_cbc()) {
|
||||
expectedlen = 80;
|
||||
enc_keylen = 32;
|
||||
hmac_keylen = 32;
|
||||
} else {
|
||||
return;
|
||||
}
|
||||
|
||||
auto ticket_keys = std::make_shared<TicketKeys>();
|
||||
|
||||
for (; p != end;) {
|
||||
if (end - p < 2) {
|
||||
LOG(WARN) << "Memcached: tls ticket key data is too small";
|
||||
conn_handler->on_tls_ticket_key_not_found(w);
|
||||
return;
|
||||
}
|
||||
auto len = util::get_uint16(p);
|
||||
p += 2;
|
||||
if (len != expectedlen) {
|
||||
LOG(WARN) << "Memcached: wrong tls ticket key size: want "
|
||||
<< expectedlen << ", got " << len;
|
||||
conn_handler->on_tls_ticket_key_not_found(w);
|
||||
return;
|
||||
}
|
||||
if (p + len > end) {
|
||||
LOG(WARN) << "Memcached: too short tls ticket key payload: want " << len
|
||||
<< ", got " << (end - p);
|
||||
conn_handler->on_tls_ticket_key_not_found(w);
|
||||
return;
|
||||
}
|
||||
auto key = TicketKey();
|
||||
key.cipher = get_config()->tls_ticket_key_cipher;
|
||||
key.hmac = EVP_sha256();
|
||||
key.hmac_keylen = hmac_keylen;
|
||||
|
||||
std::copy_n(p, key.data.name.size(), key.data.name.data());
|
||||
p += key.data.name.size();
|
||||
|
||||
std::copy_n(p, enc_keylen, key.data.enc_key.data());
|
||||
p += enc_keylen;
|
||||
|
||||
std::copy_n(p, hmac_keylen, key.data.hmac_key.data());
|
||||
p += hmac_keylen;
|
||||
|
||||
ticket_keys->keys.push_back(std::move(key));
|
||||
}
|
||||
|
||||
conn_handler->on_tls_ticket_key_get_success(ticket_keys, w);
|
||||
};
|
||||
|
||||
if (LOG_ENABLED(INFO)) {
|
||||
LOG(INFO) << "Memcached: tls ticket key get request sent";
|
||||
}
|
||||
|
||||
dispatcher->add_request(std::move(req));
|
||||
}
|
||||
|
||||
} // namespace
|
||||
|
||||
int worker_process_event_loop(WorkerProcessConfig *wpconf) {
|
||||
if (reopen_log_files() != 0) {
|
||||
LOG(FATAL) << "Failed to open log file";
|
||||
return -1;
|
||||
}
|
||||
|
||||
auto loop = EV_DEFAULT;
|
||||
|
||||
ConnectionHandler conn_handler(loop);
|
||||
|
||||
if (wpconf->server_fd6 != -1) {
|
||||
conn_handler.set_acceptor6(
|
||||
make_unique<AcceptHandler>(wpconf->server_fd6, &conn_handler));
|
||||
}
|
||||
if (wpconf->server_fd != 1) {
|
||||
conn_handler.set_acceptor(
|
||||
make_unique<AcceptHandler>(wpconf->server_fd, &conn_handler));
|
||||
}
|
||||
|
||||
ev_timer renew_ticket_key_timer;
|
||||
if (!get_config()->upstream_no_tls) {
|
||||
if (get_config()->tls_ticket_key_memcached_host) {
|
||||
conn_handler.set_tls_ticket_key_memcached_dispatcher(
|
||||
make_unique<MemcachedDispatcher>(
|
||||
&get_config()->tls_ticket_key_memcached_addr, loop));
|
||||
|
||||
ev_timer_init(&renew_ticket_key_timer, memcached_get_ticket_key_cb, 0.,
|
||||
0.);
|
||||
renew_ticket_key_timer.data = &conn_handler;
|
||||
// Get first ticket keys.
|
||||
memcached_get_ticket_key_cb(loop, &renew_ticket_key_timer, 0);
|
||||
} else {
|
||||
bool auto_tls_ticket_key = true;
|
||||
if (!get_config()->tls_ticket_key_files.empty()) {
|
||||
if (!get_config()->tls_ticket_key_cipher_given) {
|
||||
LOG(WARN)
|
||||
<< "It is strongly recommended to specify "
|
||||
"--tls-ticket-key-cipher=aes-128-cbc (or "
|
||||
"tls-ticket-key-cipher=aes-128-cbc in configuration file) "
|
||||
"when --tls-ticket-key-file is used for the smooth "
|
||||
"transition when the default value of --tls-ticket-key-cipher "
|
||||
"becomes aes-256-cbc";
|
||||
}
|
||||
auto ticket_keys = read_tls_ticket_key_file(
|
||||
get_config()->tls_ticket_key_files,
|
||||
get_config()->tls_ticket_key_cipher, EVP_sha256());
|
||||
if (!ticket_keys) {
|
||||
LOG(WARN) << "Use internal session ticket key generator";
|
||||
} else {
|
||||
conn_handler.set_ticket_keys(std::move(ticket_keys));
|
||||
auto_tls_ticket_key = false;
|
||||
}
|
||||
}
|
||||
if (auto_tls_ticket_key) {
|
||||
// Generate new ticket key every 1hr.
|
||||
ev_timer_init(&renew_ticket_key_timer, renew_ticket_key_cb, 0., 1_h);
|
||||
renew_ticket_key_timer.data = &conn_handler;
|
||||
ev_timer_again(loop, &renew_ticket_key_timer);
|
||||
|
||||
// Generate first session ticket key before running workers.
|
||||
renew_ticket_key_cb(loop, &renew_ticket_key_timer, 0);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
int rv;
|
||||
|
||||
// It is good to ignore these control signals since user may use
|
||||
// "killall .. nghttpx". We don't want catch this signal in worker
|
||||
// process.
|
||||
struct sigaction act {};
|
||||
act.sa_handler = SIG_IGN;
|
||||
sigaction(REOPEN_LOG_SIGNAL, &act, nullptr);
|
||||
sigaction(EXEC_BINARY_SIGNAL, &act, nullptr);
|
||||
sigaction(GRACEFUL_SHUTDOWN_SIGNAL, &act, nullptr);
|
||||
|
||||
if (get_config()->num_worker == 1) {
|
||||
rv = conn_handler.create_single_worker();
|
||||
} else {
|
||||
rv = conn_handler.create_worker_thread(get_config()->num_worker);
|
||||
}
|
||||
|
||||
if (rv != 0) {
|
||||
return -1;
|
||||
}
|
||||
|
||||
drop_privileges();
|
||||
|
||||
ev_io ipcev;
|
||||
ev_io_init(&ipcev, ipc_readcb, wpconf->ipc_fd, EV_READ);
|
||||
ipcev.data = &conn_handler;
|
||||
ev_io_start(loop, &ipcev);
|
||||
|
||||
if (!get_config()->upstream_no_tls && !get_config()->no_ocsp) {
|
||||
conn_handler.proceed_next_cert_ocsp();
|
||||
}
|
||||
|
||||
if (LOG_ENABLED(INFO)) {
|
||||
LOG(INFO) << "Entering event loop";
|
||||
}
|
||||
|
||||
ev_run(loop, 0);
|
||||
|
||||
conn_handler.join_worker();
|
||||
conn_handler.cancel_ocsp_update();
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
} // namespace shrpx
|
|
@ -0,0 +1,49 @@
|
|||
/*
|
||||
* nghttp2 - HTTP/2 C Library
|
||||
*
|
||||
* Copyright (c) 2015 Tatsuhiro Tsujikawa
|
||||
*
|
||||
* Permission is hereby granted, free of charge, to any person obtaining
|
||||
* a copy of this software and associated documentation files (the
|
||||
* "Software"), to deal in the Software without restriction, including
|
||||
* without limitation the rights to use, copy, modify, merge, publish,
|
||||
* distribute, sublicense, and/or sell copies of the Software, and to
|
||||
* permit persons to whom the Software is furnished to do so, subject to
|
||||
* the following conditions:
|
||||
*
|
||||
* The above copyright notice and this permission notice shall be
|
||||
* included in all copies or substantial portions of the Software.
|
||||
*
|
||||
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
|
||||
* EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
|
||||
* MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
|
||||
* NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE
|
||||
* LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION
|
||||
* OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION
|
||||
* WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
|
||||
*/
|
||||
#ifndef SHRPX_WORKER_PROCESS_H
|
||||
#define SHRPX_WORKER_PROCESS_H
|
||||
|
||||
#include "shrpx.h"
|
||||
|
||||
using namespace nghttp2;
|
||||
|
||||
namespace shrpx {
|
||||
|
||||
class ConnectionHandler;
|
||||
|
||||
struct WorkerProcessConfig {
|
||||
// IPC socket to read event from master process
|
||||
int ipc_fd;
|
||||
// IPv4 or UNIX domain socket, or -1 if not used
|
||||
int server_fd;
|
||||
// IPv6 socket, or -1 if not used
|
||||
int server_fd6;
|
||||
};
|
||||
|
||||
int worker_process_event_loop(WorkerProcessConfig *wpconf);
|
||||
|
||||
} // namespace shrpx
|
||||
|
||||
#endif // SHRPX_WORKER_PROCESS_H
|
Loading…
Reference in New Issue