blob: 923a2178708292ef1acc8638fafaa3fa19ba83a1 (
plain) (
blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
|
pub struct StartupAck {
writer: std::os::unix::io::RawFd,
}
impl StartupAck {
pub fn ack(&self) -> anyhow::Result<()> {
nix::unistd::write(self.writer, &[0])?;
nix::unistd::close(self.writer)?;
Ok(())
}
}
impl Drop for StartupAck {
fn drop(&mut self) {
// best effort close here, can't do better in a destructor
let _ = nix::unistd::close(self.writer);
}
}
pub fn daemonize() -> anyhow::Result<StartupAck> {
rbw::dirs::make_all()?;
let stdout = std::fs::OpenOptions::new()
.append(true)
.create(true)
.open(rbw::dirs::agent_stdout_file())?;
let stderr = std::fs::OpenOptions::new()
.append(true)
.create(true)
.open(rbw::dirs::agent_stderr_file())?;
let (r, w) = nix::unistd::pipe()?;
let res = daemonize::Daemonize::new()
.pid_file(rbw::dirs::pid_file())
.stdout(stdout)
.stderr(stderr)
.exit_action(move || {
// unwraps are necessary because not really a good way to handle
// errors here otherwise
let _ = nix::unistd::close(w);
let mut buf = [0; 1];
nix::unistd::read(r, &mut buf).unwrap();
nix::unistd::close(r).unwrap();
})
.start();
let _ = nix::unistd::close(r);
match res {
Ok(_) => (),
Err(e) => {
match e {
daemonize::DaemonizeError::LockPidfile(_) => {
// this means that there is already an agent running, so
// return a special exit code to allow the cli to detect
// this case and not error out
std::process::exit(23);
}
_ => panic!("failed to daemonize: {}", e),
}
}
}
Ok(StartupAck { writer: w })
}
|