main.c revision f53759c12ba7f3a80c9fe277bea4f781f862a3f1
/* Copyright (C) 2002 Timo Sirainen */
#include "common.h"
#include "ioloop.h"
#include "lib-signals.h"
#include "network.h"
#include "env-util.h"
#include "fd-close-on-exec.h"
#include "write-full.h"
#include "askpass.h"
#include "auth-process.h"
#include "capabilities.h"
#include "dict-process.h"
#include "login-process.h"
#include "mail-process.h"
#include "syslog-util.h"
#include "ssl-init.h"
#include "log.h"
#include <stdio.h>
#include <stdlib.h>
#include <unistd.h>
#include <fcntl.h>
#include <syslog.h>
char program_path[PATH_MAX];
char ssl_manual_key_password[100];
const char *env_tz;
#ifdef DEBUG
bool gdb;
#endif
static void listen_fds_open(bool retry);
{
int facility;
} else {
/* log to file or stderr */
}
}
static void settings_reload(void)
{
i_warning("SIGHUP received - reloading configuration");
/* restart auth and login processes */
i_warning("Invalid configuration, keeping old one");
else {
if (!IS_INETD()) {
}
}
}
{
/* warn about being killed because of some signal, except SIGINT (^C)
which is too common at least while testing :) */
}
void *context __attr_unused__)
{
}
void *context __attr_unused__)
{
}
{
const char *p;
unsigned int ips_count;
int ret;
if (*name == '\0') {
/* defaults to "*" or "[::]" */
return;
}
if (name[0] == '[') {
/* IPv6 address */
if (p == NULL) {
i_fatal("%s: Missing ']' in address %s",
}
p++;
if (*p == '\0')
p = NULL;
else if (*p != ':') {
i_fatal("%s: Invalid data after ']' in address %s",
}
} else {
if (p != NULL)
}
if (p != NULL) {
i_fatal("%s: Invalid port in address %s",
}
}
/* IPv4 any */
return;
}
/* IPv6 any */
return;
}
/* Return the first IP if there happens to be multiple. */
if (ret != 0) {
i_fatal("%s: Can't resolve address %s: %s",
}
if (ips_count < 1)
}
static void
{
}
}
}
const char *proto)
{
struct server_settings *server;
"imap", proto);
}
"pop3", proto);
}
}
}
{
const char *const *proto;
unsigned int port;
int *fd, i;
#ifdef HAVE_SSL
#else
set->ssl_listen_port = 0;
#endif
/* resolve */
if (!set->ssl_disable) {
&set->ssl_listen_port);
}
/* if ssl_listen wasn't explicitly set in the config file,
use the non-ssl IP settings for the ssl listener, too. */
/* register wanted protocols */
}
!set->ssl_disable) {
}
}
!set->ssl_disable) {
}
} else {
}
continue;
if (*fd != -1)
if (port == 0)
else {
for (i = 0; i < 10; i++) {
if (*fd != -1)
break;
if (errno == EADDRINUSE) {
/* retry */
/* SIGHUPing sometimes gets us here.
we don't want to die. */
} else {
/* error */
break;
}
if (!retry)
break;
/* wait a while and try again. we're SIGHUPing
so we most likely just closed it ourself.. */
sleep(1);
}
if (*fd == -1)
}
}
}
static void listen_fds_open(bool retry)
{
struct server_settings *server;
}
}
{
i_error("close(imap.listen_fd) failed: %m");
}
i_error("close(pop3.listen_fd) failed: %m");
}
}
}
{
return TRUE;
return TRUE;
return FALSE;
}
{
return TRUE;
return TRUE;
}
return FALSE;
}
static void open_null_fd(void)
{
if (null_fd == -1)
}
static void open_fds(void)
{
/* make sure all fds between 0..3 are used. */
while (null_fd < 4) {
if (null_fd == -1)
i_fatal("dup(null_fd) failed: %m");
}
if (!IS_INETD())
/* close stdin and stdout. */
i_fatal("dup2(0) failed: %m");
i_fatal("dup2(1) failed: %m");
}
static void create_pid_file(const char *path)
{
const char *pid;
int fd;
if (fd == -1)
}
{
/* deny file access from everyone else except owner */
(void)umask(0077);
if (!have_stderr(settings_root)) {
i_fatal("dup2(2) failed: %m");
}
if (log_error) {
i_warning("This is Dovecot's warning log");
i_error("This is Dovecot's error log");
i_fatal("This is Dovecot's fatal log");
}
log_init();
ssl_init();
"/master.pid", NULL));
}
static void main_deinit(void)
{
"/master.pid", NULL));
/* call process destroy handlers first */
ssl_deinit();
i_error("close(null_fd) failed: %m");
log_deinit();
closelog();
}
{
if (pid < 0)
i_fatal("fork() failed: %m");
if (pid != 0)
_exit(0);
if (setsid() < 0)
i_fatal("setsid() failed: %m");
}
static void print_help(void)
{
"Usage: dovecot [-F] [-c <config file>] [-p] [-n] [-a]\n"
" [--exec-mail <protocol>] [--version] [--build-options]\n");
}
static void print_build_options(void)
{
printf("Build options:"
#ifdef IOLOOP_EPOLL
" ioloop=epoll"
#endif
#ifdef IOLOOP_KQUEUE
" ioloop=kqueue"
#endif
#ifdef IOLOOP_POLL
" ioloop=poll"
#endif
#ifdef IOLOOP_SELECT
" ioloop=select"
#endif
#ifdef IOLOOP_NOTIFY_DNOTIFY
" notify=dnotify"
#endif
#ifdef IOLOOP_NOTIFY_INOTIFY
" notify=inotify"
#endif
#ifdef IOLOOP_NOTIFY_KQUEUE
" notify=kqueue"
#endif
#ifdef HAVE_IPV6
" ipv6"
#endif
#ifdef HAVE_GNUTLS
" gnutls"
#endif
#ifdef HAVE_OPENSSL
" openssl"
#endif
"\nSQL drivers:"
#ifdef BUILD_MYSQL
" mysql"
#endif
#ifdef BUILD_PGSQL
" postgresql"
#endif
#ifdef BUILD_SQLITE
" sqlite"
#endif
"\nPassdb:"
#ifdef PASSDB_BSDAUTH
" bsdauth"
#endif
#ifdef PASSDB_CHECKPASSWORD
" checkpassword"
#endif
#ifdef PASSDB_LDAP
" ldap"
#endif
#ifdef PASSDB_PAM
" pam"
#endif
#ifdef PASSDB_PASSWD
" passwd"
#endif
#ifdef PASSDB_PASSWD_FILE
" passwd-file"
#endif
#ifdef PASSDB_SHADOW
" shadow"
#endif
#ifdef PASSDB_SQL
" sql"
#endif
#ifdef PASSDB_VPOPMAIL
" vpopmail"
#endif
"\nUserdb:"
#ifdef USERDB_CHECKPASSWORD
" checkpassword"
#endif
#ifdef USERDB_LDAP
" ldap"
#endif
#ifdef USERDB_PASSWD
" passwd"
#endif
#ifdef USERDB_PREFETCH
" prefetch"
#endif
#ifdef USERDB_PASSWD_FILE
" passwd-file"
#endif
#ifdef USERDB_SQL
" sql"
#endif
#ifdef USERDB_STATIC
" static"
#endif
#ifdef USERDB_VPOPMAIL
" vpopmail"
#endif
"\n");
}
{
/* parse arguments */
int i;
#ifdef DEBUG
#endif
lib_init();
master_uid = geteuid();
inetd_login_fd = -1;
for (i = 1; i < argc; i++) {
/* foreground */
foreground = TRUE;
dump_config = TRUE;
/* config file */
i++;
configfile = argv[i];
/* Ask SSL private key password */
ask_key_pass = TRUE;
/* <protocol> [<server section>]
read configuration and execute mail process */
i++;
exec_protocol = argv[i];
if (i+1 != argc)
exec_section = argv[++i];
return 0;
return 0;
foreground = TRUE;
} else {
print_help();
}
}
/* need to have this open before reading settings */
open_null_fd();
/* starting through inetd. */
inetd_login_fd = dup(0);
if (inetd_login_fd == -1)
i_fatal("dup(0) failed: %m");
foreground = TRUE;
}
if (dump_config) {
/* print the config file path before parsing it, so in case
of errors it's still shown */
}
/* read and verify settings before forking */
t_push();
t_pop();
if (dump_config) {
return 0;
}
if (ask_key_pass) {
const char *prompt;
t_push();
"%s: ",
sizeof(ssl_manual_key_password));
t_pop();
}
/* save TZ environment. AIX depends on it to get the timezone
correctly. */
/* clean up the environment of everything */
env_clean();
/* put back the TZ */
if (exec_protocol != NULL) {
/* Put back user and home */
}
open_fds();
if (!foreground)
ioloop = io_loop_create();
main_deinit();
lib_deinit();
return 0;
}