owntone-server/src/main.c

871 lines
19 KiB
C
Raw Normal View History

2003-10-13 11:03:14 -04:00
/*
* Copyright (C) 2009-2011 Julien BLACHE <jb@jblache.org>
2003-10-13 11:03:14 -04:00
*
* Pieces from mt-daapd:
2003-12-29 15:41:08 -05:00
* Copyright (C) 2003 Ron Pedde (ron@pedde.com)
2003-10-13 11:03:14 -04:00
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 2 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; if not, write to the Free Software
* Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
*/
#ifdef HAVE_CONFIG_H
2009-06-05 09:25:43 -04:00
# include <config.h>
#endif
2003-10-13 11:03:14 -04:00
#include <stdio.h>
#include <stdlib.h>
2009-06-05 09:25:43 -04:00
#include <unistd.h>
#include <string.h>
2009-06-05 09:25:43 -04:00
#include <errno.h>
#include <fcntl.h>
#include <sys/stat.h>
#include <sys/types.h>
2004-02-14 19:51:11 -05:00
#include <sys/wait.h>
2009-06-05 09:25:43 -04:00
#include <signal.h>
#include <limits.h>
#include <grp.h>
#include <stdint.h>
#if defined(__linux__)
# include <sys/signalfd.h>
#elif defined(__FreeBSD__) || defined(__FreeBSD_kernel__)
# include <sys/time.h>
# include <sys/event.h>
#endif
2009-06-05 09:25:43 -04:00
#include <pthread.h>
#include <getopt.h>
#include <event.h>
#include <libavutil/log.h>
2009-06-05 09:25:43 -04:00
#include <libavformat/avformat.h>
#include <gcrypt.h>
GCRY_THREAD_OPTION_PTHREAD_IMPL;
#include "conffile.h"
2009-06-07 12:58:02 -04:00
#include "db.h"
2009-05-08 11:46:32 -04:00
#include "logger.h"
#include "misc.h"
#include "cache.h"
2009-04-19 13:29:44 -04:00
#include "filescanner.h"
#include "httpd.h"
2010-09-18 10:29:06 -04:00
#include "mdns.h"
2010-01-15 13:39:37 -05:00
#include "remote_pairing.h"
2010-04-04 07:52:17 -04:00
#include "player.h"
#if LIBAVFORMAT_VERSION_MAJOR < 53
# include "ffmpeg_url_evbuffer.h"
#endif
2009-04-07 13:32:47 -04:00
#ifdef LASTFM
# include "lastfm.h"
#endif
#ifdef HAVE_SPOTIFY_H
# include "spotify.h"
#endif
2009-06-12 05:09:58 -04:00
#define PIDFILE STATEDIR "/run/" PACKAGE ".pid"
2009-04-07 11:37:12 -04:00
struct event_base *evbase_main;
static struct event sig_event;
static int main_exit;
static void
version(void)
{
fprintf(stdout, "Forked Media Server: Version %s\n", VERSION);
2011-07-09 06:12:15 -04:00
fprintf(stdout, "Copyright (C) 2009-2011 Julien BLACHE <jb@jblache.org>\n");
fprintf(stdout, "Based on mt-daapd, Copyright (C) 2003-2007 Ron Pedde <ron@pedde.com>\n");
fprintf(stdout, "Released under the GNU General Public License version 2 or later\n");
}
2009-04-07 11:37:12 -04:00
2009-06-05 09:25:43 -04:00
static void
usage(char *program)
{
version();
printf("\n");
printf("Usage: %s [options]\n\n", program);
2009-06-05 09:25:43 -04:00
printf("Options:\n");
printf(" -d <number> Log level (0-5)\n");
printf(" -D <dom,dom..> Log domains\n");
printf(" -c <file> Use <file> as the configfile\n");
printf(" -P <file> Write PID to specified file\n");
printf(" -f Run in foreground\n");
printf(" -b <id> ffid to be broadcast\n");
printf(" -v Display version information\n");
printf("\n\n");
printf("Available log domains:\n");
logger_domains();
printf("\n\n");
}
static int
2009-06-05 10:36:07 -04:00
daemonize(int background, char *pidfile)
{
FILE *fp;
pid_t childpid;
2009-12-31 14:12:36 -05:00
pid_t pid_ret;
2009-06-05 10:36:07 -04:00
int fd;
2009-12-31 14:12:36 -05:00
int ret;
2009-06-05 10:36:07 -04:00
char *runas;
if (background)
{
fp = fopen(pidfile, "w");
if (!fp)
{
DPRINTF(E_LOG, L_MAIN, "Error opening pidfile (%s): %s\n", pidfile, strerror(errno));
return -1;
}
fd = open("/dev/null", O_RDWR, 0);
if (fd < 0)
{
DPRINTF(E_LOG, L_MAIN, "Error opening /dev/null: %s\n", strerror(errno));
fclose(fp);
return -1;
}
signal(SIGTTOU, SIG_IGN);
signal(SIGTTIN, SIG_IGN);
signal(SIGTSTP, SIG_IGN);
childpid = fork();
if (childpid > 0)
exit(EXIT_SUCCESS);
else if (childpid < 0)
{
DPRINTF(E_FATAL, L_MAIN, "Fork failed: %s\n", strerror(errno));
close(fd);
fclose(fp);
return -1;
}
2009-12-31 14:12:36 -05:00
pid_ret = setsid();
if (pid_ret == (pid_t) -1)
{
DPRINTF(E_FATAL, L_MAIN, "setsid() failed: %s\n", strerror(errno));
close(fd);
fclose(fp);
return -1;
}
2009-05-08 11:46:32 -04:00
logger_detach();
dup2(fd, STDIN_FILENO);
dup2(fd, STDOUT_FILENO);
dup2(fd, STDERR_FILENO);
if (fd > 2)
close(fd);
ret = chdir("/");
if (ret < 0)
DPRINTF(E_WARN, L_MAIN, "chdir() failed: %s\n", strerror(errno));
umask(0);
fprintf(fp, "%d\n", getpid());
fclose(fp);
DPRINTF(E_DBG, L_MAIN, "PID: %d\n", getpid());
}
if (geteuid() == (uid_t) 0)
{
runas = cfg_getstr(cfg_getsec(cfg, "general"), "uid");
ret = initgroups(runas, runas_gid);
2009-12-31 14:12:36 -05:00
if (ret != 0)
{
DPRINTF(E_FATAL, L_MAIN, "initgroups() failed: %s\n", strerror(errno));
return -1;
}
ret = setegid(runas_gid);
2009-12-31 14:12:36 -05:00
if (ret != 0)
{
DPRINTF(E_FATAL, L_MAIN, "setegid() failed: %s\n", strerror(errno));
return -1;
}
ret = seteuid(runas_uid);
2009-12-31 14:12:36 -05:00
if (ret != 0)
{
DPRINTF(E_FATAL, L_MAIN, "seteuid() failed: %s\n", strerror(errno));
return -1;
}
}
return 0;
}
static int
register_services(char *ffid, int no_rsp, int no_daap)
{
cfg_t *lib;
char *libname;
char *password;
char *txtrecord[10];
char records[9][128];
int port;
uint32_t hash;
int i;
int ret;
srand((unsigned int)time(NULL));
lib = cfg_getsec(cfg, "library");
libname = cfg_getstr(lib, "name");
hash = djb_hash(libname, strlen(libname));
for (i = 0; i < (sizeof(records) / sizeof(records[0])); i++)
{
memset(records[i], 0, 128);
txtrecord[i] = records[i];
}
txtrecord[9] = NULL;
snprintf(txtrecord[0], 128, "txtvers=1");
snprintf(txtrecord[1], 128, "Database ID=%0X", hash);
snprintf(txtrecord[2], 128, "Machine ID=%0X", hash);
snprintf(txtrecord[3], 128, "Machine Name=%s", libname);
snprintf(txtrecord[4], 128, "mtd-version=%s", VERSION);
snprintf(txtrecord[5], 128, "iTSh Version=131073"); /* iTunes 6.0.4 */
snprintf(txtrecord[6], 128, "Version=196610"); /* iTunes 6.0.4 */
password = cfg_getstr(lib, "password");
snprintf(txtrecord[7], 128, "Password=%s", (password) ? "true" : "false");
if (ffid)
snprintf(txtrecord[8], 128, "ffid=%s", ffid);
else
snprintf(txtrecord[8], 128, "ffid=%08x", rand());
DPRINTF(E_INFO, L_MAIN, "Registering rendezvous names\n");
port = cfg_getint(lib, "port");
/* Register web server service */
ret = mdns_register(libname, "_http._tcp", port, txtrecord);
if (ret < 0)
return ret;
/* Register RSP service */
if (!no_rsp)
{
ret = mdns_register(libname, "_rsp._tcp", port, txtrecord);
if (ret < 0)
return ret;
}
/* Register DAAP service */
if (!no_daap)
{
ret = mdns_register(libname, "_daap._tcp", port, txtrecord);
if (ret < 0)
return ret;
}
for (i = 0; i < (sizeof(records) / sizeof(records[0])); i++)
{
memset(records[i], 0, 128);
}
snprintf(txtrecord[0], 128, "txtvers=1");
snprintf(txtrecord[1], 128, "DbId=%016" PRIX64, libhash);
snprintf(txtrecord[2], 128, "DvTy=iTunes");
snprintf(txtrecord[3], 128, "DvSv=2306"); /* Magic number! Yay! */
snprintf(txtrecord[4], 128, "Ver=131073"); /* iTunes 6.0.4 */
snprintf(txtrecord[5], 128, "OSsi=0x1F5"); /* Magic number! Yay! */
snprintf(txtrecord[6], 128, "CtlN=%s", libname);
/* Terminator */
txtrecord[7] = NULL;
/* The group name for the touch-able service advertising is a 64bit hash
* but is different from the DbId in iTunes. For now we'll use a hash of
* the library name for both, and we'll change that if needed.
*/
/* Use as scratch space for the hash */
snprintf(records[7], 128, "%016" PRIX64, libhash);
/* Register touch-able service, for Remote.app */
ret = mdns_register(records[7], "_touch-able._tcp", port, txtrecord);
if (ret < 0)
return ret;
return 0;
}
#if defined(__linux__)
static void
signal_signalfd_cb(int fd, short event, void *arg)
{
struct signalfd_siginfo info;
int status;
while (read(fd, &info, sizeof(struct signalfd_siginfo)) > 0)
{
switch (info.ssi_signo)
{
case SIGCHLD:
DPRINTF(E_LOG, L_MAIN, "Got SIGCHLD, reaping children\n");
while (wait3(&status, WNOHANG, NULL) > 0)
/* Nothing. */ ;
break;
case SIGINT:
case SIGTERM:
DPRINTF(E_LOG, L_MAIN, "Got SIGTERM or SIGINT\n");
main_exit = 1;
break;
case SIGHUP:
DPRINTF(E_LOG, L_MAIN, "Got SIGHUP\n");
if (!main_exit)
2009-05-08 11:46:32 -04:00
logger_reinit();
break;
}
}
if (main_exit)
event_base_loopbreak(evbase_main);
else
event_add(&sig_event, NULL);
}
#elif defined(__FreeBSD__) || defined(__FreeBSD_kernel__)
static void
signal_kqueue_cb(int fd, short event, void *arg)
{
struct timespec ts;
struct kevent ke;
int status;
ts.tv_sec = 0;
ts.tv_nsec = 0;
while (kevent(fd, NULL, 0, &ke, 1, &ts) > 0)
{
switch (ke.ident)
{
case SIGCHLD:
DPRINTF(E_LOG, L_MAIN, "Got SIGCHLD, reaping children\n");
while (wait3(&status, WNOHANG, NULL) > 0)
/* Nothing. */ ;
break;
case SIGINT:
case SIGTERM:
DPRINTF(E_LOG, L_MAIN, "Got SIGTERM or SIGINT\n");
main_exit = 1;
break;
case SIGHUP:
DPRINTF(E_LOG, L_MAIN, "Got SIGHUP\n");
if (!main_exit)
logger_reinit();
break;
}
}
if (main_exit)
event_base_loopbreak(evbase_main);
else
event_add(&sig_event, NULL);
}
#endif
2009-06-05 09:25:43 -04:00
2010-09-15 12:20:23 -04:00
static int
ffmpeg_lockmgr(void **mutex, enum AVLockOp op)
{
switch (op)
{
case AV_LOCK_CREATE:
*mutex = malloc(sizeof(pthread_mutex_t));
if (!*mutex)
return 1;
return !!pthread_mutex_init(*mutex, NULL);
case AV_LOCK_OBTAIN:
return !!pthread_mutex_lock(*mutex);
case AV_LOCK_RELEASE:
return !!pthread_mutex_unlock(*mutex);
case AV_LOCK_DESTROY:
pthread_mutex_destroy(*mutex);
free(*mutex);
return 0;
}
return 1;
}
2009-06-05 09:25:43 -04:00
int
main(int argc, char **argv)
{
int option;
2009-06-05 10:01:54 -04:00
char *configfile;
2009-06-05 09:25:43 -04:00
int background;
2009-06-05 10:01:54 -04:00
int mdns_no_rsp;
int mdns_no_daap;
int loglevel;
char *logdomains;
char *logfile;
char *ffid;
char *pidfile;
const char *gcry_version;
2009-06-05 09:25:43 -04:00
sigset_t sigs;
int sigfd;
#if defined(__FreeBSD__) || defined(__FreeBSD_kernel__)
struct kevent ke_sigs[4];
#endif
2009-06-05 09:25:43 -04:00
int ret;
2009-06-05 10:01:54 -04:00
struct option option_map[] =
{
{ "ffid", 1, NULL, 'b' },
{ "debug", 1, NULL, 'd' },
{ "logdomains", 1, NULL, 'D' },
{ "foreground", 0, NULL, 'f' },
{ "config", 1, NULL, 'c' },
{ "pidfile", 1, NULL, 'P' },
{ "version", 0, NULL, 'v' },
{ "mdns-no-rsp", 0, NULL, 512 },
{ "mdns-no-daap", 0, NULL, 513 },
{ NULL, 0, NULL, 0 }
};
configfile = CONFFILE;
pidfile = PIDFILE;
loglevel = -1;
logdomains = NULL;
logfile = NULL;
2009-06-05 09:25:43 -04:00
background = 1;
2009-06-05 10:01:54 -04:00
ffid = NULL;
mdns_no_rsp = 0;
mdns_no_daap = 0;
2009-06-05 09:25:43 -04:00
2009-06-05 10:01:54 -04:00
while ((option = getopt_long(argc, argv, "D:d:c:P:fb:v", option_map, NULL)) != -1)
2009-06-05 09:25:43 -04:00
{
switch (option)
{
2009-06-05 10:01:54 -04:00
case 512:
mdns_no_rsp = 1;
break;
case 513:
mdns_no_daap = 1;
break;
2009-06-05 09:25:43 -04:00
case 'b':
ffid = optarg;
2006-07-15 01:56:32 -04:00
break;
2006-08-24 23:37:03 -04:00
2009-06-05 09:25:43 -04:00
case 'd':
ret = safe_atoi32(optarg, &option);
2009-06-05 09:25:43 -04:00
if (ret < 0)
fprintf(stderr, "Error: loglevel must be an integer in '-d %s'\n", optarg);
else
loglevel = option;
break;
2006-08-24 23:37:03 -04:00
2009-06-05 09:25:43 -04:00
case 'D':
2009-05-08 11:46:32 -04:00
logdomains = optarg;
break;
2006-08-24 23:37:03 -04:00
2009-06-05 09:25:43 -04:00
case 'f':
background = 0;
break;
2009-06-05 09:25:43 -04:00
case 'c':
configfile = optarg;
break;
2009-06-05 09:25:43 -04:00
case 'P':
pidfile = optarg;
break;
2009-04-02 05:04:33 -04:00
2009-06-05 09:25:43 -04:00
case 'v':
version();
2009-06-05 12:07:36 -04:00
return EXIT_SUCCESS;
break;
2009-06-05 09:25:43 -04:00
default:
usage(argv[0]);
2009-06-05 12:07:36 -04:00
return EXIT_FAILURE;
break;
}
}
2009-06-05 09:25:43 -04:00
ret = logger_init(NULL, NULL, (loglevel < 0) ? E_LOG : loglevel);
if (ret != 0)
{
fprintf(stderr, "Could not initialize log facility\n");
2009-06-05 12:07:36 -04:00
return EXIT_FAILURE;
2006-02-27 17:48:42 -05:00
}
2005-03-19 23:13:34 -05:00
2009-06-05 09:25:43 -04:00
ret = conffile_load(configfile);
if (ret != 0)
{
DPRINTF(E_FATAL, L_MAIN, "Config file errors; please fix your config\n");
logger_deinit();
2009-06-05 12:07:36 -04:00
return EXIT_FAILURE;
2004-03-08 15:36:07 -05:00
}
2009-06-05 09:25:43 -04:00
logger_deinit();
2003-10-13 11:03:14 -04:00
2009-06-05 09:25:43 -04:00
/* Reinit log facility with configfile values */
if (loglevel < 0)
loglevel = cfg_getint(cfg_getsec(cfg, "general"), "loglevel");
2003-11-26 01:10:58 -05:00
2009-06-05 09:25:43 -04:00
logfile = cfg_getstr(cfg_getsec(cfg, "general"), "logfile");
2009-05-04 11:51:42 -04:00
2009-06-05 09:25:43 -04:00
ret = logger_init(logfile, logdomains, loglevel);
if (ret != 0)
{
fprintf(stderr, "Could not reinitialize log facility with config file settings\n");
2004-04-13 00:23:36 -04:00
2009-06-05 09:25:43 -04:00
conffile_unload();
2009-06-05 12:07:36 -04:00
return EXIT_FAILURE;
2009-06-05 09:25:43 -04:00
}
2009-05-08 11:46:32 -04:00
2009-06-05 09:25:43 -04:00
/* Set up libevent logging callback */
event_set_log_callback(logger_libevent);
2003-10-13 11:03:14 -04:00
2009-06-12 05:09:58 -04:00
DPRINTF(E_LOG, L_MAIN, "Forked Media Server Version %s taking off\n", VERSION);
2009-06-05 09:25:43 -04:00
2010-09-15 12:20:23 -04:00
ret = av_lockmgr_register(ffmpeg_lockmgr);
if (ret < 0)
{
DPRINTF(E_FATAL, L_MAIN, "Could not register ffmpeg lock manager callback\n");
ret = EXIT_FAILURE;
goto ffmpeg_init_fail;
}
2009-06-05 09:25:43 -04:00
av_register_all();
#if LIBAVFORMAT_VERSION_MAJOR >= 54 || (LIBAVFORMAT_VERSION_MAJOR == 53 && LIBAVFORMAT_VERSION_MINOR >= 13)
avformat_network_init();
#endif
av_log_set_callback(logger_ffmpeg);
#if LIBAVFORMAT_VERSION_MAJOR < 53
2010-03-07 04:50:50 -05:00
register_ffmpeg_evbuffer_url_protocol();
#endif
2009-06-05 09:25:43 -04:00
/* Initialize libgcrypt */
gcry_control(GCRYCTL_SET_THREAD_CBS, &gcry_threads_pthread);
gcry_version = gcry_check_version(GCRYPT_VERSION);
if (!gcry_version)
{
DPRINTF(E_FATAL, L_MAIN, "libgcrypt version mismatch\n");
ret = EXIT_FAILURE;
goto gcrypt_init_fail;
}
/* We aren't handling anything sensitive, so give up on secure
* memory, which is a scarce system resource.
*/
gcry_control(GCRYCTL_DISABLE_SECMEM, 0);
gcry_control(GCRYCTL_INITIALIZATION_FINISHED, 0);
DPRINTF(E_DBG, L_MAIN, "Initialized with gcrypt %s\n", gcry_version);
2009-06-05 09:25:43 -04:00
/* Block signals for all threads except the main one */
sigemptyset(&sigs);
sigaddset(&sigs, SIGINT);
sigaddset(&sigs, SIGHUP);
sigaddset(&sigs, SIGCHLD);
sigaddset(&sigs, SIGTERM);
sigaddset(&sigs, SIGPIPE);
ret = pthread_sigmask(SIG_BLOCK, &sigs, NULL);
if (ret != 0)
{
DPRINTF(E_LOG, L_MAIN, "Error setting signal set\n");
2009-06-05 12:07:36 -04:00
ret = EXIT_FAILURE;
goto signal_block_fail;
2009-06-05 09:25:43 -04:00
}
/* Daemonize and drop privileges */
2009-06-05 10:36:07 -04:00
ret = daemonize(background, pidfile);
2009-06-05 09:25:43 -04:00
if (ret < 0)
{
DPRINTF(E_LOG, L_MAIN, "Could not initialize server\n");
2009-06-05 12:07:36 -04:00
ret = EXIT_FAILURE;
goto daemon_fail;
2009-06-05 09:25:43 -04:00
}
/* Initialize libevent (after forking) */
evbase_main = event_init();
DPRINTF(E_LOG, L_MAIN, "mDNS init\n");
ret = mdns_init();
if (ret != 0)
{
DPRINTF(E_FATAL, L_MAIN, "mDNS init failed\n");
2009-06-05 12:07:36 -04:00
ret = EXIT_FAILURE;
goto mdns_fail;
2009-06-05 09:25:43 -04:00
}
2009-06-07 12:58:02 -04:00
/* Initialize the database before starting */
DPRINTF(E_INFO, L_MAIN, "Initializing database\n");
ret = db_init();
if (ret < 0)
2009-06-05 09:25:43 -04:00
{
2009-06-07 12:58:02 -04:00
DPRINTF(E_FATAL, L_MAIN, "Database init failed\n");
2009-06-05 09:25:43 -04:00
2009-06-05 12:07:36 -04:00
ret = EXIT_FAILURE;
goto db_fail;
2009-06-05 09:25:43 -04:00
}
/* Open a DB connection for the main thread */
ret = db_perthread_init();
if (ret < 0)
{
DPRINTF(E_FATAL, L_MAIN, "Could not perform perthread DB init for main\n");
ret = EXIT_FAILURE;
goto db_fail;
}
/* Spawn cache thread */
ret = cache_init();
2014-08-19 18:21:48 -04:00
if (ret != 0)
{
DPRINTF(E_FATAL, L_MAIN, "Cache thread failed to start\n");
2014-08-19 18:21:48 -04:00
ret = EXIT_FAILURE;
goto cache_fail;
}
2009-06-05 09:25:43 -04:00
/* Spawn file scanner thread */
ret = filescanner_init();
if (ret != 0)
{
DPRINTF(E_FATAL, L_MAIN, "File scanner thread failed to start\n");
2009-06-05 12:07:36 -04:00
ret = EXIT_FAILURE;
goto filescanner_fail;
2009-06-05 09:25:43 -04:00
}
#ifdef HAVE_SPOTIFY_H
/* Spawn Spotify thread */
ret = spotify_init();
if (ret < 0)
{
DPRINTF(E_INFO, L_MAIN, "Spotify thread not started\n");;
}
#endif
2010-04-04 07:52:17 -04:00
/* Spawn player thread */
ret = player_init();
if (ret != 0)
{
DPRINTF(E_FATAL, L_MAIN, "Player thread failed to start\n");
ret = EXIT_FAILURE;
goto player_fail;
}
2009-06-05 09:25:43 -04:00
/* Spawn HTTPd thread */
ret = httpd_init();
if (ret != 0)
{
DPRINTF(E_FATAL, L_MAIN, "HTTPd thread failed to start\n");
2009-06-05 12:07:36 -04:00
ret = EXIT_FAILURE;
goto httpd_fail;
2009-06-05 09:25:43 -04:00
}
2010-01-15 13:39:37 -05:00
/* Start Remote pairing service */
ret = remote_pairing_init();
if (ret != 0)
{
DPRINTF(E_FATAL, L_MAIN, "Remote pairing service failed to start\n");
ret = EXIT_FAILURE;
goto remote_fail;
}
2009-06-05 09:25:43 -04:00
/* Register mDNS services */
ret = register_services(ffid, mdns_no_rsp, mdns_no_daap);
if (ret < 0)
2009-06-05 09:25:43 -04:00
{
2009-06-05 12:07:36 -04:00
ret = EXIT_FAILURE;
goto mdns_reg_fail;
2009-06-05 09:25:43 -04:00
}
#if defined(__linux__)
2009-06-05 09:25:43 -04:00
/* Set up signal fd */
sigfd = signalfd(-1, &sigs, SFD_NONBLOCK | SFD_CLOEXEC);
if (sigfd < 0)
{
DPRINTF(E_FATAL, L_MAIN, "Could not setup signalfd: %s\n", strerror(errno));
2009-06-05 12:07:36 -04:00
ret = EXIT_FAILURE;
goto signalfd_fail;
2009-06-05 09:25:43 -04:00
}
event_set(&sig_event, sigfd, EV_READ, signal_signalfd_cb, NULL);
#elif defined(__FreeBSD__) || defined(__FreeBSD_kernel__)
sigfd = kqueue();
if (sigfd < 0)
{
DPRINTF(E_FATAL, L_MAIN, "Could not setup kqueue: %s\n", strerror(errno));
ret = EXIT_FAILURE;
goto signalfd_fail;
}
EV_SET(&ke_sigs[0], SIGINT, EVFILT_SIGNAL, EV_ADD, 0, 0, NULL);
EV_SET(&ke_sigs[1], SIGTERM, EVFILT_SIGNAL, EV_ADD, 0, 0, NULL);
EV_SET(&ke_sigs[2], SIGHUP, EVFILT_SIGNAL, EV_ADD, 0, 0, NULL);
EV_SET(&ke_sigs[3], SIGCHLD, EVFILT_SIGNAL, EV_ADD, 0, 0, NULL);
ret = kevent(sigfd, ke_sigs, 4, NULL, 0, NULL);
if (ret < 0)
{
DPRINTF(E_FATAL, L_MAIN, "Could not register signal events: %s\n", strerror(errno));
ret = EXIT_FAILURE;
goto signalfd_fail;
}
event_set(&sig_event, sigfd, EV_READ, signal_kqueue_cb, NULL);
#endif
2009-06-05 09:25:43 -04:00
event_base_set(evbase_main, &sig_event);
event_add(&sig_event, NULL);
/* Run the loop */
event_base_dispatch(evbase_main);
DPRINTF(E_LOG, L_MAIN, "Stopping gracefully\n");
2009-06-05 12:07:36 -04:00
ret = EXIT_SUCCESS;
2009-06-05 09:25:43 -04:00
2009-06-05 12:07:36 -04:00
/*
* On a clean shutdown, bring mDNS down first to give a chance
* to the clients to perform a clean shutdown on their end
*/
DPRINTF(E_LOG, L_MAIN, "mDNS deinit\n");
mdns_deinit();
signalfd_fail:
mdns_reg_fail:
2010-01-15 13:39:37 -05:00
DPRINTF(E_LOG, L_MAIN, "Remote pairing deinit\n");
remote_pairing_deinit();
remote_fail:
2009-06-05 09:25:43 -04:00
DPRINTF(E_LOG, L_MAIN, "HTTPd deinit\n");
httpd_deinit();
httpd_fail:
2010-04-04 07:52:17 -04:00
DPRINTF(E_LOG, L_MAIN, "Player deinit\n");
player_deinit();
player_fail:
#ifdef LASTFM
DPRINTF(E_LOG, L_MAIN, "LastFM deinit\n");
lastfm_deinit();
#endif
#ifdef HAVE_SPOTIFY_H
DPRINTF(E_LOG, L_MAIN, "Spotify deinit\n");
spotify_deinit();
#endif
2009-06-05 09:25:43 -04:00
DPRINTF(E_LOG, L_MAIN, "File scanner deinit\n");
filescanner_deinit();
2009-06-05 12:07:36 -04:00
filescanner_fail:
DPRINTF(E_LOG, L_MAIN, "Cache deinit\n");
cache_deinit();
2014-08-19 18:21:48 -04:00
cache_fail:
2010-04-26 12:24:09 -04:00
DPRINTF(E_LOG, L_MAIN, "Database deinit\n");
db_perthread_deinit();
2010-04-26 12:24:09 -04:00
db_deinit();
2014-08-19 18:21:48 -04:00
2009-06-05 12:07:36 -04:00
db_fail:
if (ret == EXIT_FAILURE)
{
DPRINTF(E_LOG, L_MAIN, "mDNS deinit\n");
mdns_deinit();
}
mdns_fail:
daemon_fail:
2009-06-05 09:25:43 -04:00
if (background)
{
ret = seteuid(0);
2009-06-05 09:25:43 -04:00
if (ret < 0)
DPRINTF(E_LOG, L_MAIN, "seteuid() failed: %s\n", strerror(errno));
else
{
ret = unlink(pidfile);
if (ret < 0)
DPRINTF(E_LOG, L_MAIN, "Could not unlink PID file %s: %s\n", pidfile, strerror(errno));
}
2009-06-05 09:25:43 -04:00
}
2009-06-05 12:07:36 -04:00
signal_block_fail:
gcrypt_init_fail:
#if LIBAVFORMAT_VERSION_MAJOR >= 54 || (LIBAVFORMAT_VERSION_MAJOR == 53 && LIBAVFORMAT_VERSION_MINOR >= 13)
avformat_network_deinit();
#endif
2010-09-15 12:20:23 -04:00
av_lockmgr_register(NULL);
ffmpeg_init_fail:
2009-06-05 09:25:43 -04:00
DPRINTF(E_LOG, L_MAIN, "Exiting.\n");
2009-06-05 12:07:36 -04:00
conffile_unload();
2009-06-05 09:25:43 -04:00
logger_deinit();
2009-06-05 12:07:36 -04:00
return ret;
2009-06-05 09:25:43 -04:00
}