listeners_unix.go 2.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104
  1. // +build !windows,!solaris
  2. package listeners
  3. import (
  4. "crypto/tls"
  5. "fmt"
  6. "net"
  7. "os"
  8. "strconv"
  9. "github.com/Sirupsen/logrus"
  10. "github.com/coreos/go-systemd/activation"
  11. "github.com/docker/go-connections/sockets"
  12. )
  13. // Init creates new listeners for the server.
  14. // TODO: Clean up the fact that socketGroup and tlsConfig aren't always used.
  15. func Init(proto, addr, socketGroup string, tlsConfig *tls.Config) ([]net.Listener, error) {
  16. ls := []net.Listener{}
  17. switch proto {
  18. case "fd":
  19. fds, err := listenFD(addr, tlsConfig)
  20. if err != nil {
  21. return nil, err
  22. }
  23. ls = append(ls, fds...)
  24. case "tcp":
  25. l, err := sockets.NewTCPSocket(addr, tlsConfig)
  26. if err != nil {
  27. return nil, err
  28. }
  29. ls = append(ls, l)
  30. case "unix":
  31. gid, err := lookupGID(socketGroup)
  32. if err != nil {
  33. if socketGroup != "" {
  34. if socketGroup != defaultSocketGroup {
  35. return nil, err
  36. }
  37. logrus.Warnf("could not change group %s to %s: %v", addr, defaultSocketGroup, err)
  38. }
  39. gid = os.Getgid()
  40. }
  41. l, err := sockets.NewUnixSocket(addr, gid)
  42. if err != nil {
  43. return nil, fmt.Errorf("can't create unix socket %s: %v", addr, err)
  44. }
  45. ls = append(ls, l)
  46. default:
  47. return nil, fmt.Errorf("invalid protocol format: %q", proto)
  48. }
  49. return ls, nil
  50. }
  51. // listenFD returns the specified socket activated files as a slice of
  52. // net.Listeners or all of the activated files if "*" is given.
  53. func listenFD(addr string, tlsConfig *tls.Config) ([]net.Listener, error) {
  54. var (
  55. err error
  56. listeners []net.Listener
  57. )
  58. // socket activation
  59. if tlsConfig != nil {
  60. listeners, err = activation.TLSListeners(false, tlsConfig)
  61. } else {
  62. listeners, err = activation.Listeners(false)
  63. }
  64. if err != nil {
  65. return nil, err
  66. }
  67. if len(listeners) == 0 {
  68. return nil, fmt.Errorf("no sockets found via socket activation: make sure the service was started by systemd")
  69. }
  70. // default to all fds just like unix:// and tcp://
  71. if addr == "" || addr == "*" {
  72. return listeners, nil
  73. }
  74. fdNum, err := strconv.Atoi(addr)
  75. if err != nil {
  76. return nil, fmt.Errorf("failed to parse systemd fd address: should be a number: %v", addr)
  77. }
  78. fdOffset := fdNum - 3
  79. if len(listeners) < int(fdOffset)+1 {
  80. return nil, fmt.Errorf("too few socket activated files passed in by systemd")
  81. }
  82. if listeners[fdOffset] == nil {
  83. return nil, fmt.Errorf("failed to listen on systemd activated file: fd %d", fdOffset+3)
  84. }
  85. for i, ls := range listeners {
  86. if i == fdOffset || ls == nil {
  87. continue
  88. }
  89. if err := ls.Close(); err != nil {
  90. return nil, fmt.Errorf("failed to close systemd activated file: fd %d: %v", fdOffset+3, err)
  91. }
  92. }
  93. return []net.Listener{listeners[fdOffset]}, nil
  94. }