/* * Phusion Passenger - https://www.phusionpassenger.com/ * Copyright (c) 2010-2014 Phusion * * "Phusion Passenger" is a trademark of Hongli Lai & Ninh Bui. * * Permission is hereby granted, free of charge, to any person obtaining a copy * of this software and associated documentation files (the "Software"), to deal * in the Software without restriction, including without limitation the rights * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell * copies of the Software, and to permit persons to whom the Software is * furnished to do so, subject to the following conditions: * * The above copyright notice and this permission notice shall be included in * all copies or substantial portions of the Software. * * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN * THE SOFTWARE. */ #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include using namespace boost; using namespace oxt; using namespace Passenger; using namespace Passenger::ApplicationPool2; class RemoteController: public MessageServer::Handler { private: struct SpecificContext: public MessageServer::ClientContext { }; typedef MessageServer::CommonClientContext CommonClientContext; boost::shared_ptr requestHandler; PoolPtr pool; /********************************************* * Message handler methods *********************************************/ void processDetachProcess(CommonClientContext &commonContext, SpecificContext *specificContext, const vector &args) { TRACE_POINT(); commonContext.requireRights(Account::DETACH); if (pool->detachProcess((pid_t) atoi(args[1]))) { writeArrayMessage(commonContext.fd, "true", NULL); } else { writeArrayMessage(commonContext.fd, "false", NULL); } } void processDetachProcessByKey(CommonClientContext &commonContext, SpecificContext *specificContext, const vector &args) { TRACE_POINT(); commonContext.requireRights(Account::DETACH); // TODO: implement this writeArrayMessage(commonContext.fd, "false", NULL); } bool processInspect(CommonClientContext &commonContext, SpecificContext *specificContext, const vector &args) { TRACE_POINT(); commonContext.requireRights(Account::INSPECT_BASIC_INFO); if ((args.size() - 1) % 2 != 0) { return false; } VariantMap options = argsToOptions(args); writeScalarMessage(commonContext.fd, pool->inspect(Pool::InspectOptions(options))); return true; } void processToXml(CommonClientContext &commonContext, SpecificContext *specificContext, const vector &args) { TRACE_POINT(); commonContext.requireRights(Account::INSPECT_BASIC_INFO); bool includeSensitiveInfo = commonContext.account->hasRights(Account::INSPECT_SENSITIVE_INFO) && args[1] == "true"; writeScalarMessage(commonContext.fd, pool->toXml(includeSensitiveInfo)); } void processBacktraces(CommonClientContext &commonContext, SpecificContext *specificContext, const vector &args) { TRACE_POINT(); commonContext.requireRights(Account::INSPECT_BACKTRACES); writeScalarMessage(commonContext.fd, oxt::thread::all_backtraces()); } void processRestartAppGroup(CommonClientContext &commonContext, SpecificContext *specificContext, const vector &args) { TRACE_POINT(); commonContext.requireRights(Account::RESTART); VariantMap options = argsToOptions(args, 2); RestartMethod method = RM_DEFAULT; if (options.get("method", false) == "blocking") { method = RM_BLOCKING; } else if (options.get("method", false) == "rolling") { method = RM_ROLLING; } bool result = pool->restartGroupByName(args[1], method); writeArrayMessage(commonContext.fd, result ? "true" : "false", NULL); } void processRequests(CommonClientContext &commonContext, SpecificContext *specificContext, const vector &args) { TRACE_POINT(); stringstream stream; commonContext.requireRights(Account::INSPECT_REQUESTS); requestHandler->inspect(stream); writeScalarMessage(commonContext.fd, stream.str()); } public: RemoteController(const boost::shared_ptr &requestHandler, const PoolPtr &pool) { this->requestHandler = requestHandler; this->pool = pool; } virtual MessageServer::ClientContextPtr newClient(CommonClientContext &commonContext) { return boost::make_shared(); } virtual bool processMessage(CommonClientContext &commonContext, MessageServer::ClientContextPtr &_specificContext, const vector &args) { SpecificContext *specificContext = (SpecificContext *) _specificContext.get(); try { if (isCommand(args, "detach_process", 1)) { processDetachProcess(commonContext, specificContext, args); } else if (isCommand(args, "detach_process_by_key", 1)) { processDetachProcessByKey(commonContext, specificContext, args); } else if (args[0] == "inspect") { return processInspect(commonContext, specificContext, args); } else if (isCommand(args, "toXml", 1)) { processToXml(commonContext, specificContext, args); } else if (isCommand(args, "backtraces", 0)) { processBacktraces(commonContext, specificContext, args); } else if (isCommand(args, "restart_app_group", 1, 99)) { processRestartAppGroup(commonContext, specificContext, args); } else if (isCommand(args, "requests", 0)) { processRequests(commonContext, specificContext, args); } else { return false; } } catch (const SecurityException &) { /* Client does not have enough rights to perform a certain action. * It has already been notified of this; ignore exception and move on. */ } return true; } }; class ExitHandler: public MessageServer::Handler { private: EventFd &exitEvent; public: ExitHandler(EventFd &_exitEvent) : exitEvent(_exitEvent) { } virtual bool processMessage(MessageServer::CommonClientContext &commonContext, MessageServer::ClientContextPtr &handlerSpecificContext, const vector &args) { if (args[0] == "exit") { TRACE_POINT(); commonContext.requireRights(Account::EXIT); UPDATE_TRACE_POINT(); exitEvent.notify(); UPDATE_TRACE_POINT(); writeArrayMessage(commonContext.fd, "exit command received", NULL); return true; } else { return false; } } }; /** * A representation of the Server responsible for handling Client instances. * * @see Client */ class Server { private: static const int MESSAGE_SERVER_THREAD_STACK_SIZE = 128 * 1024; static const int EVENT_LOOP_THREAD_STACK_SIZE = 256 * 1024; FileDescriptor feedbackFd; const AgentOptions &options; BackgroundEventLoop poolLoop; BackgroundEventLoop requestLoop; FileDescriptor requestSocket; ServerInstanceDir serverInstanceDir; ServerInstanceDir::GenerationPtr generation; UnionStation::LoggerFactoryPtr loggerFactory; RandomGeneratorPtr randomGenerator; SpawnerFactoryPtr spawnerFactory; PoolPtr pool; ev::sig sigquitWatcher; AccountsDatabasePtr accountsDatabase; MessageServerPtr messageServer; ResourceLocator resourceLocator; boost::shared_ptr requestHandler; boost::shared_ptr prestarterThread; boost::shared_ptr messageServerThread; boost::shared_ptr eventLoopThread; EventFd exitEvent; /** * Starts listening for client connections on this server's request socket. * * @throws SystemException Something went wrong while trying to create and bind to the Unix socket. * @throws RuntimeException Something went wrong. */ void startListening() { this_thread::disable_syscall_interruption dsi; requestSocket = createUnixServer(getRequestSocketFilename().c_str()); int ret, e; do { ret = chmod(getRequestSocketFilename().c_str(), S_ISVTX | S_IRUSR | S_IWUSR | S_IXUSR | S_IRGRP | S_IWGRP | S_IXGRP | S_IROTH | S_IWOTH | S_IXOTH); } while (ret == -1 && errno == EINTR); setNonBlocking(requestSocket); if (!options.requestSocketLink.empty()) { struct stat buf; // If this is a symlink then we'll want to check the file the symlink // points to, so we use stat() instead of lstat(). ret = syscalls::stat(options.requestSocketLink.c_str(), &buf); if (ret == 0 || (ret == -1 && errno == ENOENT)) { if (ret == -1 || buf.st_mode & S_IFSOCK) { if (syscalls::unlink(options.requestSocketLink.c_str()) == -1) { e = errno; throw FileSystemException("Cannot delete existing socket file '" + options.requestSocketLink + "'", e, options.requestSocketLink); } } else { throw RuntimeException("File '" + options.requestSocketLink + "' already exists and is not a Unix domain socket"); } } else if (ret == -1 && errno != ENOENT) { e = errno; throw FileSystemException("Cannot stat() file '" + options.requestSocketLink + "'", e, options.requestSocketLink); } do { ret = symlink(getRequestSocketFilename().c_str(), options.requestSocketLink.c_str()); } while (ret == -1 && errno == EINTR); if (ret == -1) { e = errno; throw FileSystemException("Cannot create a symlink '" + options.requestSocketLink + "' to '" + getRequestSocketFilename() + "'", e, options.requestSocketLink); } } } /** * Lowers this process's privilege to that of username and groupname. */ void lowerPrivilege(const string &username, const string &groupname) { struct passwd *userEntry; gid_t gid; int e; userEntry = getpwnam(username.c_str()); if (userEntry == NULL) { throw NonExistentUserException(string("Unable to lower Passenger " "HelperAgent's privilege to that of user '") + username + "': user does not exist."); } gid = lookupGid(groupname); if (gid == (gid_t) -1) { throw NonExistentGroupException(string("Unable to lower Passenger " "HelperAgent's privilege to that of user '") + username + "': user does not exist."); } if (initgroups(username.c_str(), userEntry->pw_gid) != 0) { e = errno; throw SystemException(string("Unable to lower Passenger HelperAgent's " "privilege to that of user '") + username + "': cannot set supplementary groups for this user", e); } if (setgid(gid) != 0) { e = errno; throw SystemException(string("Unable to lower Passenger HelperAgent's " "privilege to that of user '") + username + "': cannot set group ID", e); } if (setuid(userEntry->pw_uid) != 0) { e = errno; throw SystemException(string("Unable to lower Passenger HelperAgent's " "privilege to that of user '") + username + "': cannot set user ID", e); } setenv("HOME", userEntry->pw_dir, 1); } void onSigquit(ev::sig &signal, int revents) { requestHandler->inspect(cerr); cerr.flush(); cerr << "\n" << pool->inspect(); cerr.flush(); cerr << "\n" << oxt::thread::all_backtraces(); cerr.flush(); } void installDiagnosticsDumper() { ::installDiagnosticsDumper(dumpDiagnosticsOnCrash, this); } void uninstallDiagnosticsDumper() { ::installDiagnosticsDumper(NULL, NULL); } static void dumpDiagnosticsOnCrash(void *userData) { Server *self = (Server *) userData; cerr << "### Request handler state\n"; self->requestHandler->inspect(cerr); cerr << "\n"; cerr.flush(); cerr << "### Pool state (simple)\n"; // Do not lock, the crash may occur within the pool. Pool::InspectOptions options; options.verbose = true; cerr << self->pool->inspect(options, false); cerr << "\n"; cerr.flush(); cerr << "### Pool state (XML)\n"; cerr << self->pool->toXml(true, false); cerr << "\n\n"; cerr.flush(); cerr << "### Backtraces\n"; cerr << oxt::thread::all_backtraces(); cerr.flush(); } public: Server(FileDescriptor feedbackFd, const AgentOptions &_options) : options(_options), requestLoop(true), serverInstanceDir(_options.serverInstanceDir, false), resourceLocator(options.passengerRoot) { TRACE_POINT(); this->feedbackFd = feedbackFd; UPDATE_TRACE_POINT(); generation = serverInstanceDir.getGeneration(options.generationNumber); startListening(); accountsDatabase = boost::make_shared(); accountsDatabase->add("_passenger-status", options.adminToolStatusPassword, false, Account::INSPECT_BASIC_INFO | Account::INSPECT_SENSITIVE_INFO | Account::INSPECT_BACKTRACES | Account::INSPECT_REQUESTS | Account::DETACH | Account::RESTART); accountsDatabase->add("_web_server", options.exitPassword, false, Account::EXIT); messageServer = boost::make_shared( parseUnixSocketAddress(options.adminSocketAddress), accountsDatabase); createFile(generation->getPath() + "/helper_agent.pid", toString(getpid()), S_IRUSR | S_IWUSR | S_IRGRP | S_IROTH); if (geteuid() == 0 && !options.userSwitching) { lowerPrivilege(options.defaultUser, options.defaultGroup); } UPDATE_TRACE_POINT(); randomGenerator = boost::make_shared(); // Check whether /dev/urandom is actually random. // https://code.google.com/p/phusion-passenger/issues/detail?id=516 if (randomGenerator->generateByteString(16) == randomGenerator->generateByteString(16)) { throw RuntimeException("Your random number device, /dev/urandom, appears to be broken. " "It doesn't seem to be returning random data. Please fix this."); } UPDATE_TRACE_POINT(); loggerFactory = boost::make_shared(options.loggingAgentAddress, "logging", options.loggingAgentPassword); spawnerFactory = boost::make_shared(poolLoop.safe, resourceLocator, generation, boost::make_shared(randomGenerator)); pool = boost::make_shared(spawnerFactory, loggerFactory, randomGenerator, &options); pool->initialize(); pool->setMax(options.maxPoolSize); pool->setMaxIdleTime(options.poolIdleTime * 1000000); requestHandler = boost::make_shared(requestLoop.safe, requestSocket, pool, options); messageServer->addHandler(boost::make_shared(requestHandler, pool)); messageServer->addHandler(ptr(new ExitHandler(exitEvent))); sigquitWatcher.set(requestLoop.loop); sigquitWatcher.set(SIGQUIT); sigquitWatcher.set(this); sigquitWatcher.start(); UPDATE_TRACE_POINT(); writeArrayMessage(feedbackFd, "initialized", getRequestSocketFilename().c_str(), messageServer->getSocketFilename().c_str(), NULL); boost::function func = boost::bind(prestartWebApps, resourceLocator, options.defaultRubyCommand, options.prestartUrls ); prestarterThread = ptr(new oxt::thread( boost::bind(runAndPrintExceptions, func, true) )); } ~Server() { TRACE_POINT(); this_thread::disable_syscall_interruption dsi; this_thread::disable_interruption di; P_DEBUG("Shutting down helper agent..."); prestarterThread->interrupt_and_join(); if (messageServerThread != NULL) { messageServerThread->interrupt_and_join(); } messageServer.reset(); P_DEBUG("Destroying application pool..."); pool->destroy(); uninstallDiagnosticsDumper(); pool.reset(); poolLoop.stop(); requestLoop.stop(); requestHandler.reset(); if (!options.requestSocketLink.empty()) { char path[PATH_MAX + 1]; ssize_t ret; bool shouldUnlink; ret = readlink(options.requestSocketLink.c_str(), path, PATH_MAX); if (ret != -1) { path[ret] = '\0'; // Only unlink if a new Flying Passenger instance hasn't overwritten the // symlink. // https://code.google.com/p/phusion-passenger/issues/detail?id=939 shouldUnlink = getRequestSocketFilename() == path; } else { shouldUnlink = true; } if (shouldUnlink) { syscalls::unlink(options.requestSocketLink.c_str()); } } P_TRACE(2, "All threads have been shut down."); } void mainLoop() { TRACE_POINT(); boost::function func; func = boost::bind(&MessageServer::mainLoop, messageServer.get()); messageServerThread = ptr(new oxt::thread( boost::bind(runAndPrintExceptions, func, true), "MessageServer thread", MESSAGE_SERVER_THREAD_STACK_SIZE )); poolLoop.start("Pool event loop", 0); requestLoop.start("Request event loop", 0); /* Wait until the watchdog closes the feedback fd (meaning it * was killed) or until we receive an exit message. */ this_thread::disable_syscall_interruption dsi; fd_set fds; int largestFd; FD_ZERO(&fds); FD_SET(feedbackFd, &fds); FD_SET(exitEvent.fd(), &fds); largestFd = (feedbackFd > exitEvent.fd()) ? (int) feedbackFd : exitEvent.fd(); UPDATE_TRACE_POINT(); installDiagnosticsDumper(); if (syscalls::select(largestFd + 1, &fds, NULL, NULL, NULL) == -1) { int e = errno; uninstallDiagnosticsDumper(); throw SystemException("select() failed", e); } if (FD_ISSET(feedbackFd, &fds)) { /* If the watchdog has been killed then we'll kill all descendant * processes and exit. There's no point in keeping this helper * server running because we can't detect when the web server exits, * and because this helper agent doesn't own the server instance * directory. As soon as passenger-status is run, the server * instance directory will be cleaned up, making this helper agent * inaccessible. */ P_DEBUG("Watchdog seems to be killed; forcing shutdown of all subprocesses"); // We send a SIGTERM first to allow processes to gracefully shut down. syscalls::killpg(getpgrp(), SIGTERM); usleep(500000); syscalls::killpg(getpgrp(), SIGKILL); _exit(2); // In case killpg() fails. } else { /* We received an exit command. We want to exit 5 seconds after * all clients have disconnected have become inactive. */ P_DEBUG("Received command to exit gracefully. " "Waiting until 5 seconds after all clients have disconnected..."); pool->prepareForShutdown(); requestHandler->resetInactivityTime(); while (requestHandler->inactivityTime() < 5000) { syscalls::usleep(250000); } P_DEBUG("It's now 5 seconds after all clients have disconnected. " "Proceeding with graceful exit."); } } string getRequestSocketFilename() const { return options.requestSocketFilename; } }; /** * Initializes and starts the helper agent that is responsible for handling communication * between Nginx and the backend Rails processes. * * @see Server * @see Client */ int main(int argc, char *argv[]) { TRACE_POINT(); AgentOptionsPtr options; try { options = boost::make_shared( initializeAgent(argc, argv, "PassengerHelperAgent")); } catch (const VariantMap::MissingKeyException &e) { fprintf(stderr, "Option required: %s\n", e.getKey().c_str()); return 1; } if (options->testBinary) { printf("PASS\n"); exit(0); } P_DEBUG("Starting PassengerHelperAgent..."); MultiLibeio::init(); try { UPDATE_TRACE_POINT(); Server server(FileDescriptor(FEEDBACK_FD), *options); P_WARN("PassengerHelperAgent online, listening at unix:" << server.getRequestSocketFilename()); UPDATE_TRACE_POINT(); server.mainLoop(); } catch (const tracable_exception &e) { P_ERROR("*** ERROR: " << e.what() << "\n" << e.backtrace()); return 1; } MultiLibeio::shutdown(); P_TRACE(2, "Helper agent exiting with code 0."); return 0; }