2019-06-10 08:33:19 +00:00
|
|
|
package home
|
2019-02-04 10:54:53 +00:00
|
|
|
|
|
|
|
import (
|
2020-02-18 13:01:32 +00:00
|
|
|
"fmt"
|
2020-02-05 14:38:23 +00:00
|
|
|
"io/ioutil"
|
2019-02-04 10:54:53 +00:00
|
|
|
"os"
|
2019-02-05 11:09:05 +00:00
|
|
|
"runtime"
|
2020-02-18 13:01:32 +00:00
|
|
|
"strconv"
|
2020-02-05 14:38:23 +00:00
|
|
|
"strings"
|
2019-07-02 09:56:23 +00:00
|
|
|
"syscall"
|
2019-02-04 10:54:53 +00:00
|
|
|
|
2021-03-16 16:42:15 +00:00
|
|
|
"github.com/AdguardTeam/AdGuardHome/internal/aghos"
|
2020-10-30 10:32:02 +00:00
|
|
|
"github.com/AdguardTeam/AdGuardHome/internal/util"
|
2019-02-25 13:44:22 +00:00
|
|
|
"github.com/AdguardTeam/golibs/log"
|
2019-02-04 10:54:53 +00:00
|
|
|
"github.com/kardianos/service"
|
|
|
|
)
|
|
|
|
|
2021-02-01 11:12:57 +00:00
|
|
|
// TODO(a.garipov): Move shell templates into actual files. Either during the
|
|
|
|
// v0.106.0 cycle using packr or during the following cycle using go:embed.
|
|
|
|
|
2019-02-05 11:09:05 +00:00
|
|
|
const (
|
2019-02-05 11:21:07 +00:00
|
|
|
launchdStdoutPath = "/var/log/AdGuardHome.stdout.log"
|
|
|
|
launchdStderrPath = "/var/log/AdGuardHome.stderr.log"
|
|
|
|
serviceName = "AdGuardHome"
|
|
|
|
serviceDisplayName = "AdGuard Home service"
|
|
|
|
serviceDescription = "AdGuard Home: Network-level blocker"
|
2019-02-05 11:09:05 +00:00
|
|
|
)
|
|
|
|
|
2019-02-04 10:54:53 +00:00
|
|
|
// Represents the program that will be launched by a service or daemon
|
|
|
|
type program struct {
|
2020-09-07 09:26:40 +00:00
|
|
|
opts options
|
2019-02-04 10:54:53 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Start should quickly start the program
|
|
|
|
func (p *program) Start(s service.Service) error {
|
|
|
|
// Start should not block. Do the actual work async.
|
2020-09-07 09:26:40 +00:00
|
|
|
args := p.opts
|
|
|
|
args.runningAsService = true
|
2019-02-04 10:54:53 +00:00
|
|
|
go run(args)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Stop stops the program
|
|
|
|
func (p *program) Stop(s service.Service) error {
|
|
|
|
// Stop should not block. Return with a few seconds.
|
2020-02-13 15:42:07 +00:00
|
|
|
if Context.appSignalChannel == nil {
|
2019-07-02 09:56:23 +00:00
|
|
|
os.Exit(0)
|
|
|
|
}
|
2020-02-13 15:42:07 +00:00
|
|
|
Context.appSignalChannel <- syscall.SIGINT
|
2019-02-04 10:54:53 +00:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2021-03-12 11:32:08 +00:00
|
|
|
// svcStatus check the service's status.
|
|
|
|
//
|
|
|
|
// On OpenWrt, the service utility may not exist. We use our service script
|
|
|
|
// directly in this case.
|
|
|
|
func svcStatus(s service.Service) (status service.Status, err error) {
|
|
|
|
status, err = s.Status()
|
2020-01-16 09:44:06 +00:00
|
|
|
if err != nil && service.Platform() == "unix-systemv" {
|
2021-03-12 11:32:08 +00:00
|
|
|
var code int
|
|
|
|
code, err = runInitdCommand("status")
|
|
|
|
if err != nil || code != 0 {
|
2020-01-16 09:44:06 +00:00
|
|
|
return service.StatusStopped, nil
|
|
|
|
}
|
2021-03-12 11:32:08 +00:00
|
|
|
|
2020-01-16 09:44:06 +00:00
|
|
|
return service.StatusRunning, nil
|
|
|
|
}
|
2021-03-12 11:32:08 +00:00
|
|
|
|
2020-01-16 09:44:06 +00:00
|
|
|
return status, err
|
|
|
|
}
|
|
|
|
|
2021-03-12 11:32:08 +00:00
|
|
|
// svcAction performs the action on the service.
|
|
|
|
//
|
|
|
|
// On OpenWrt, the service utility may not exist. We use our service script
|
|
|
|
// directly in this case.
|
|
|
|
func svcAction(s service.Service, action string) (err error) {
|
|
|
|
err = service.Control(s, action)
|
2020-01-16 09:44:06 +00:00
|
|
|
if err != nil && service.Platform() == "unix-systemv" &&
|
|
|
|
(action == "start" || action == "stop" || action == "restart") {
|
2021-03-12 11:32:08 +00:00
|
|
|
_, err = runInitdCommand(action)
|
|
|
|
|
2020-01-16 09:44:06 +00:00
|
|
|
return err
|
|
|
|
}
|
2021-03-12 11:32:08 +00:00
|
|
|
|
2020-01-16 09:44:06 +00:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2020-02-18 13:01:32 +00:00
|
|
|
// Send SIGHUP to a process with ID taken from our pid-file
|
|
|
|
// If pid-file doesn't exist, find our PID using 'ps' command
|
|
|
|
func sendSigReload() {
|
|
|
|
if runtime.GOOS == "windows" {
|
|
|
|
log.Error("Not implemented on Windows")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
pidfile := fmt.Sprintf("/var/run/%s.pid", serviceName)
|
|
|
|
data, err := ioutil.ReadFile(pidfile)
|
|
|
|
if os.IsNotExist(err) {
|
2021-03-12 11:32:08 +00:00
|
|
|
var code int
|
|
|
|
var psdata string
|
2021-03-22 13:46:36 +00:00
|
|
|
code, psdata, err = aghos.RunCommand("ps", "-C", serviceName, "-o", "pid=")
|
2020-02-18 13:01:32 +00:00
|
|
|
if err != nil || code != 0 {
|
|
|
|
log.Error("Can't find AdGuardHome process: %s code:%d", err, code)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
data = []byte(psdata)
|
|
|
|
|
|
|
|
} else if err != nil {
|
|
|
|
log.Error("Can't read PID file %s: %s", pidfile, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
parts := strings.SplitN(string(data), "\n", 2)
|
|
|
|
if len(parts) == 0 {
|
|
|
|
log.Error("Can't read PID file %s: bad value", pidfile)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2020-11-03 14:44:03 +00:00
|
|
|
pid, err := strconv.Atoi(strings.TrimSpace(parts[0]))
|
2020-02-18 13:01:32 +00:00
|
|
|
if err != nil {
|
|
|
|
log.Error("Can't read PID file %s: %s", pidfile, err)
|
|
|
|
return
|
|
|
|
}
|
2021-03-16 16:42:15 +00:00
|
|
|
err = aghos.SendProcessSignal(pid, syscall.SIGHUP)
|
2020-02-18 13:01:32 +00:00
|
|
|
if err != nil {
|
|
|
|
log.Error("Can't send signal to PID %d: %s", pid, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
log.Debug("Sent signal to PID %d", pid)
|
|
|
|
}
|
|
|
|
|
2019-02-04 10:54:53 +00:00
|
|
|
// handleServiceControlAction one of the possible control actions:
|
|
|
|
// install -- installs a service/daemon
|
|
|
|
// uninstall -- uninstalls it
|
|
|
|
// status -- prints the service status
|
|
|
|
// start -- starts the previously installed service
|
|
|
|
// stop -- stops the previously installed service
|
|
|
|
// restart - restarts the previously installed service
|
2019-02-05 11:09:05 +00:00
|
|
|
// run - this is a special command that is not supposed to be used directly
|
|
|
|
// it is specified when we register a service, and it indicates to the app
|
|
|
|
// that it is being run as a service/daemon.
|
2020-09-07 09:26:40 +00:00
|
|
|
func handleServiceControlAction(opts options) {
|
|
|
|
action := opts.serviceControlAction
|
2019-02-04 10:54:53 +00:00
|
|
|
log.Printf("Service control action: %s", action)
|
|
|
|
|
2020-02-18 13:01:32 +00:00
|
|
|
if action == "reload" {
|
|
|
|
sendSigReload()
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2019-02-04 10:54:53 +00:00
|
|
|
pwd, err := os.Getwd()
|
|
|
|
if err != nil {
|
|
|
|
log.Fatal("Unable to find the path to the current directory")
|
|
|
|
}
|
2020-09-07 09:26:40 +00:00
|
|
|
runOpts := opts
|
|
|
|
runOpts.serviceControlAction = "run"
|
2019-02-04 10:54:53 +00:00
|
|
|
svcConfig := &service.Config{
|
2019-02-05 11:21:07 +00:00
|
|
|
Name: serviceName,
|
|
|
|
DisplayName: serviceDisplayName,
|
|
|
|
Description: serviceDescription,
|
2019-02-04 10:54:53 +00:00
|
|
|
WorkingDirectory: pwd,
|
2020-09-07 09:26:40 +00:00
|
|
|
Arguments: serialize(runOpts),
|
2019-02-04 10:54:53 +00:00
|
|
|
}
|
2019-02-05 11:09:05 +00:00
|
|
|
configureService(svcConfig)
|
2020-09-07 09:26:40 +00:00
|
|
|
prg := &program{runOpts}
|
2019-02-04 10:54:53 +00:00
|
|
|
s, err := service.New(prg, svcConfig)
|
|
|
|
if err != nil {
|
|
|
|
log.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if action == "status" {
|
2020-02-05 14:38:23 +00:00
|
|
|
handleServiceStatusCommand(s)
|
2019-02-05 11:09:05 +00:00
|
|
|
} else if action == "run" {
|
|
|
|
err = s.Run()
|
|
|
|
if err != nil {
|
|
|
|
log.Fatalf("Failed to run service: %s", err)
|
|
|
|
}
|
2020-02-05 14:38:23 +00:00
|
|
|
} else if action == "install" {
|
2020-09-28 07:57:56 +00:00
|
|
|
initConfigFilename(opts)
|
|
|
|
initWorkingDir(opts)
|
2020-02-05 14:38:23 +00:00
|
|
|
handleServiceInstallCommand(s)
|
|
|
|
} else if action == "uninstall" {
|
|
|
|
handleServiceUninstallCommand(s)
|
2019-02-04 10:54:53 +00:00
|
|
|
} else {
|
2020-02-05 14:38:23 +00:00
|
|
|
err = svcAction(s, action)
|
|
|
|
if err != nil {
|
|
|
|
log.Fatal(err)
|
2019-02-05 11:09:05 +00:00
|
|
|
}
|
2020-02-05 14:38:23 +00:00
|
|
|
}
|
2019-02-05 11:09:05 +00:00
|
|
|
|
2020-02-05 14:38:23 +00:00
|
|
|
log.Printf("Action %s has been done successfully on %s", action, service.ChosenSystem().String())
|
|
|
|
}
|
|
|
|
|
|
|
|
// handleServiceStatusCommand handles service "status" command
|
|
|
|
func handleServiceStatusCommand(s service.Service) {
|
|
|
|
status, errSt := svcStatus(s)
|
|
|
|
if errSt != nil {
|
|
|
|
log.Fatalf("failed to get service status: %s", errSt)
|
|
|
|
}
|
|
|
|
|
|
|
|
switch status {
|
|
|
|
case service.StatusUnknown:
|
|
|
|
log.Printf("Service status is unknown")
|
|
|
|
case service.StatusStopped:
|
|
|
|
log.Printf("Service is stopped")
|
|
|
|
case service.StatusRunning:
|
|
|
|
log.Printf("Service is running")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// handleServiceStatusCommand handles service "install" command
|
|
|
|
func handleServiceInstallCommand(s service.Service) {
|
|
|
|
err := svcAction(s, "install")
|
|
|
|
if err != nil {
|
|
|
|
log.Fatal(err)
|
|
|
|
}
|
|
|
|
|
2021-03-12 11:32:08 +00:00
|
|
|
if util.IsOpenWrt() {
|
2020-02-05 14:38:23 +00:00
|
|
|
// On OpenWrt it is important to run enable after the service installation
|
|
|
|
// Otherwise, the service won't start on the system startup
|
2021-03-12 11:32:08 +00:00
|
|
|
_, err = runInitdCommand("enable")
|
2019-02-04 10:54:53 +00:00
|
|
|
if err != nil {
|
|
|
|
log.Fatal(err)
|
|
|
|
}
|
2020-02-05 14:38:23 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Start automatically after install
|
|
|
|
err = svcAction(s, "start")
|
|
|
|
if err != nil {
|
|
|
|
log.Fatalf("Failed to start the service: %s", err)
|
|
|
|
}
|
|
|
|
log.Printf("Service has been started")
|
|
|
|
|
|
|
|
if detectFirstRun() {
|
|
|
|
log.Printf(`Almost ready!
|
2019-04-17 16:57:42 +00:00
|
|
|
AdGuard Home is successfully installed and will automatically start on boot.
|
|
|
|
There are a few more things that must be configured before you can use it.
|
|
|
|
Click on the link below and follow the Installation Wizard steps to finish setup.`)
|
2021-03-15 11:19:04 +00:00
|
|
|
printHTTPAddresses(schemeHTTP)
|
2020-02-05 14:38:23 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// handleServiceStatusCommand handles service "uninstall" command
|
|
|
|
func handleServiceUninstallCommand(s service.Service) {
|
2021-03-12 11:32:08 +00:00
|
|
|
if util.IsOpenWrt() {
|
2020-02-05 14:38:23 +00:00
|
|
|
// On OpenWrt it is important to run disable command first
|
|
|
|
// as it will remove the symlink
|
|
|
|
_, err := runInitdCommand("disable")
|
|
|
|
if err != nil {
|
|
|
|
log.Fatal(err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
err := svcAction(s, "uninstall")
|
|
|
|
if err != nil {
|
|
|
|
log.Fatal(err)
|
|
|
|
}
|
2019-04-17 16:57:42 +00:00
|
|
|
|
2020-02-05 14:38:23 +00:00
|
|
|
if runtime.GOOS == "darwin" {
|
2021-03-12 11:32:08 +00:00
|
|
|
// Remove log files on cleanup and log errors.
|
|
|
|
err = os.Remove(launchdStdoutPath)
|
2020-02-05 14:38:23 +00:00
|
|
|
if err != nil && !os.IsNotExist(err) {
|
2021-03-12 11:32:08 +00:00
|
|
|
log.Printf("removing stdout file: %s", err)
|
2020-02-05 14:38:23 +00:00
|
|
|
}
|
2021-03-12 11:32:08 +00:00
|
|
|
|
2020-02-05 14:38:23 +00:00
|
|
|
err = os.Remove(launchdStderrPath)
|
|
|
|
if err != nil && !os.IsNotExist(err) {
|
2021-03-12 11:32:08 +00:00
|
|
|
log.Printf("removing stderr file: %s", err)
|
2019-02-05 11:09:05 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// configureService defines additional settings of the service
|
|
|
|
func configureService(c *service.Config) {
|
|
|
|
c.Option = service.KeyValue{}
|
|
|
|
|
|
|
|
// OS X
|
|
|
|
// Redefines the launchd config file template
|
|
|
|
// The purpose is to enable stdout/stderr redirect by default
|
|
|
|
c.Option["LaunchdConfig"] = launchdConfig
|
|
|
|
// This key is used to start the job as soon as it has been loaded. For daemons this means execution at boot time, for agents execution at login.
|
|
|
|
c.Option["RunAtLoad"] = true
|
|
|
|
|
|
|
|
// POSIX
|
|
|
|
// Redirect StdErr & StdOut to files.
|
|
|
|
c.Option["LogOutput"] = true
|
2019-10-08 09:29:11 +00:00
|
|
|
|
2020-11-06 09:15:08 +00:00
|
|
|
// Use modified service file templates.
|
2019-10-08 09:29:11 +00:00
|
|
|
c.Option["SystemdScript"] = systemdScript
|
2020-01-16 09:44:06 +00:00
|
|
|
c.Option["SysvScript"] = sysvScript
|
|
|
|
|
2020-11-06 09:15:08 +00:00
|
|
|
// On OpenWrt we're using a different type of sysvScript.
|
2021-03-12 11:32:08 +00:00
|
|
|
if util.IsOpenWrt() {
|
2020-02-05 14:38:23 +00:00
|
|
|
c.Option["SysvScript"] = openWrtScript
|
2020-11-06 09:15:08 +00:00
|
|
|
} else if runtime.GOOS == "freebsd" {
|
2020-07-02 08:41:36 +00:00
|
|
|
c.Option["SysvScript"] = freeBSDScript
|
2020-01-16 09:44:06 +00:00
|
|
|
}
|
2019-02-05 11:09:05 +00:00
|
|
|
}
|
|
|
|
|
2020-02-05 14:38:23 +00:00
|
|
|
// runInitdCommand runs init.d service command
|
|
|
|
// returns command code or error if any
|
|
|
|
func runInitdCommand(action string) (int, error) {
|
|
|
|
confPath := "/etc/init.d/" + serviceName
|
2021-03-22 13:46:36 +00:00
|
|
|
code, _, err := aghos.RunCommand("sh", "-c", confPath+" "+action)
|
2020-02-05 14:38:23 +00:00
|
|
|
return code, err
|
|
|
|
}
|
|
|
|
|
2019-02-05 11:09:05 +00:00
|
|
|
// Basically the same template as the one defined in github.com/kardianos/service
|
|
|
|
// but with two additional keys - StandardOutPath and StandardErrorPath
|
|
|
|
var launchdConfig = `<?xml version='1.0' encoding='UTF-8'?>
|
|
|
|
<!DOCTYPE plist PUBLIC "-//Apple Computer//DTD PLIST 1.0//EN"
|
|
|
|
"http://www.apple.com/DTDs/PropertyList-1.0.dtd" >
|
|
|
|
<plist version='1.0'>
|
|
|
|
<dict>
|
|
|
|
<key>Label</key><string>{{html .Name}}</string>
|
|
|
|
<key>ProgramArguments</key>
|
|
|
|
<array>
|
|
|
|
<string>{{html .Path}}</string>
|
|
|
|
{{range .Config.Arguments}}
|
|
|
|
<string>{{html .}}</string>
|
|
|
|
{{end}}
|
|
|
|
</array>
|
|
|
|
{{if .UserName}}<key>UserName</key><string>{{html .UserName}}</string>{{end}}
|
|
|
|
{{if .ChRoot}}<key>RootDirectory</key><string>{{html .ChRoot}}</string>{{end}}
|
|
|
|
{{if .WorkingDirectory}}<key>WorkingDirectory</key><string>{{html .WorkingDirectory}}</string>{{end}}
|
|
|
|
<key>SessionCreate</key><{{bool .SessionCreate}}/>
|
|
|
|
<key>KeepAlive</key><{{bool .KeepAlive}}/>
|
|
|
|
<key>RunAtLoad</key><{{bool .RunAtLoad}}/>
|
|
|
|
<key>Disabled</key><false/>
|
|
|
|
<key>StandardOutPath</key>
|
|
|
|
<string>` + launchdStdoutPath + `</string>
|
|
|
|
<key>StandardErrorPath</key>
|
|
|
|
<string>` + launchdStderrPath + `</string>
|
|
|
|
</dict>
|
|
|
|
</plist>
|
|
|
|
`
|
2019-10-08 09:29:11 +00:00
|
|
|
|
|
|
|
// Note: we should keep it in sync with the template from service_systemd_linux.go file
|
2020-01-16 09:44:06 +00:00
|
|
|
// Add "After=" setting for systemd service file, because we must be started only after network is online
|
|
|
|
// Set "RestartSec" to 10
|
2019-10-08 09:29:11 +00:00
|
|
|
const systemdScript = `[Unit]
|
|
|
|
Description={{.Description}}
|
|
|
|
ConditionFileIsExecutable={{.Path|cmdEscape}}
|
|
|
|
After=syslog.target network-online.target
|
|
|
|
|
|
|
|
[Service]
|
|
|
|
StartLimitInterval=5
|
|
|
|
StartLimitBurst=10
|
|
|
|
ExecStart={{.Path|cmdEscape}}{{range .Arguments}} {{.|cmd}}{{end}}
|
|
|
|
{{if .ChRoot}}RootDirectory={{.ChRoot|cmd}}{{end}}
|
|
|
|
{{if .WorkingDirectory}}WorkingDirectory={{.WorkingDirectory|cmdEscape}}{{end}}
|
|
|
|
{{if .UserName}}User={{.UserName}}{{end}}
|
|
|
|
{{if .ReloadSignal}}ExecReload=/bin/kill -{{.ReloadSignal}} "$MAINPID"{{end}}
|
|
|
|
{{if .PIDFile}}PIDFile={{.PIDFile|cmd}}{{end}}
|
|
|
|
{{if and .LogOutput .HasOutputFileSupport -}}
|
|
|
|
StandardOutput=file:/var/log/{{.Name}}.out
|
|
|
|
StandardError=file:/var/log/{{.Name}}.err
|
|
|
|
{{- end}}
|
|
|
|
Restart=always
|
|
|
|
RestartSec=10
|
|
|
|
EnvironmentFile=-/etc/sysconfig/{{.Name}}
|
|
|
|
|
|
|
|
[Install]
|
|
|
|
WantedBy=multi-user.target
|
|
|
|
`
|
2020-01-16 09:44:06 +00:00
|
|
|
|
|
|
|
// Note: we should keep it in sync with the template from service_sysv_linux.go file
|
|
|
|
// Use "ps | grep -v grep | grep $(get_pid)" because "ps PID" may not work on OpenWrt
|
|
|
|
const sysvScript = `#!/bin/sh
|
|
|
|
# For RedHat and cousins:
|
|
|
|
# chkconfig: - 99 01
|
|
|
|
# description: {{.Description}}
|
|
|
|
# processname: {{.Path}}
|
|
|
|
|
|
|
|
### BEGIN INIT INFO
|
|
|
|
# Provides: {{.Path}}
|
|
|
|
# Required-Start:
|
|
|
|
# Required-Stop:
|
|
|
|
# Default-Start: 2 3 4 5
|
|
|
|
# Default-Stop: 0 1 6
|
|
|
|
# Short-Description: {{.DisplayName}}
|
|
|
|
# Description: {{.Description}}
|
|
|
|
### END INIT INFO
|
|
|
|
|
|
|
|
cmd="{{.Path}}{{range .Arguments}} {{.|cmd}}{{end}}"
|
|
|
|
|
|
|
|
name=$(basename $(readlink -f $0))
|
|
|
|
pid_file="/var/run/$name.pid"
|
|
|
|
stdout_log="/var/log/$name.log"
|
|
|
|
stderr_log="/var/log/$name.err"
|
|
|
|
|
|
|
|
[ -e /etc/sysconfig/$name ] && . /etc/sysconfig/$name
|
|
|
|
|
|
|
|
get_pid() {
|
|
|
|
cat "$pid_file"
|
|
|
|
}
|
|
|
|
|
|
|
|
is_running() {
|
|
|
|
[ -f "$pid_file" ] && ps | grep -v grep | grep $(get_pid) > /dev/null 2>&1
|
|
|
|
}
|
|
|
|
|
|
|
|
case "$1" in
|
|
|
|
start)
|
|
|
|
if is_running; then
|
|
|
|
echo "Already started"
|
|
|
|
else
|
|
|
|
echo "Starting $name"
|
|
|
|
{{if .WorkingDirectory}}cd '{{.WorkingDirectory}}'{{end}}
|
|
|
|
$cmd >> "$stdout_log" 2>> "$stderr_log" &
|
|
|
|
echo $! > "$pid_file"
|
|
|
|
if ! is_running; then
|
|
|
|
echo "Unable to start, see $stdout_log and $stderr_log"
|
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
;;
|
|
|
|
stop)
|
|
|
|
if is_running; then
|
|
|
|
echo -n "Stopping $name.."
|
|
|
|
kill $(get_pid)
|
|
|
|
for i in $(seq 1 10)
|
|
|
|
do
|
|
|
|
if ! is_running; then
|
|
|
|
break
|
|
|
|
fi
|
|
|
|
echo -n "."
|
|
|
|
sleep 1
|
|
|
|
done
|
|
|
|
echo
|
|
|
|
if is_running; then
|
|
|
|
echo "Not stopped; may still be shutting down or shutdown may have failed"
|
|
|
|
exit 1
|
|
|
|
else
|
|
|
|
echo "Stopped"
|
|
|
|
if [ -f "$pid_file" ]; then
|
|
|
|
rm "$pid_file"
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
else
|
|
|
|
echo "Not running"
|
|
|
|
fi
|
|
|
|
;;
|
|
|
|
restart)
|
|
|
|
$0 stop
|
|
|
|
if is_running; then
|
|
|
|
echo "Unable to stop, will not attempt to start"
|
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
$0 start
|
|
|
|
;;
|
|
|
|
status)
|
|
|
|
if is_running; then
|
|
|
|
echo "Running"
|
|
|
|
else
|
|
|
|
echo "Stopped"
|
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
;;
|
|
|
|
*)
|
|
|
|
echo "Usage: $0 {start|stop|restart|status}"
|
|
|
|
exit 1
|
|
|
|
;;
|
|
|
|
esac
|
|
|
|
exit 0
|
|
|
|
`
|
2020-02-05 14:38:23 +00:00
|
|
|
|
|
|
|
// OpenWrt procd init script
|
2020-10-30 10:32:02 +00:00
|
|
|
// https://github.com/AdguardTeam/AdGuardHome/internal/issues/1386
|
2020-02-05 14:38:23 +00:00
|
|
|
const openWrtScript = `#!/bin/sh /etc/rc.common
|
|
|
|
|
|
|
|
USE_PROCD=1
|
|
|
|
|
|
|
|
START=95
|
|
|
|
STOP=01
|
|
|
|
|
|
|
|
cmd="{{.Path}}{{range .Arguments}} {{.|cmd}}{{end}}"
|
|
|
|
name="{{.Name}}"
|
|
|
|
pid_file="/var/run/${name}.pid"
|
|
|
|
|
|
|
|
start_service() {
|
|
|
|
echo "Starting ${name}"
|
|
|
|
|
|
|
|
procd_open_instance
|
|
|
|
procd_set_param command ${cmd}
|
|
|
|
procd_set_param respawn # respawn automatically if something died
|
|
|
|
procd_set_param stdout 1 # forward stdout of the command to logd
|
|
|
|
procd_set_param stderr 1 # same for stderr
|
|
|
|
procd_set_param pidfile ${pid_file} # write a pid file on instance start and remove it on stop
|
|
|
|
|
|
|
|
procd_close_instance
|
|
|
|
echo "${name} has been started"
|
|
|
|
}
|
|
|
|
|
|
|
|
stop_service() {
|
|
|
|
echo "Stopping ${name}"
|
|
|
|
}
|
|
|
|
|
|
|
|
EXTRA_COMMANDS="status"
|
|
|
|
EXTRA_HELP=" status Print the service status"
|
|
|
|
|
|
|
|
get_pid() {
|
|
|
|
cat "${pid_file}"
|
|
|
|
}
|
|
|
|
|
|
|
|
is_running() {
|
|
|
|
[ -f "${pid_file}" ] && ps | grep -v grep | grep $(get_pid) >/dev/null 2>&1
|
|
|
|
}
|
|
|
|
|
|
|
|
status() {
|
|
|
|
if is_running; then
|
|
|
|
echo "Running"
|
|
|
|
else
|
|
|
|
echo "Stopped"
|
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
`
|
2020-11-06 09:15:08 +00:00
|
|
|
|
2021-02-01 11:12:57 +00:00
|
|
|
// TODO(a.garipov): Don't use .WorkingDirectory here. There are currently no
|
|
|
|
// guarantees that it will actually be the required directory.
|
|
|
|
//
|
|
|
|
// See https://github.com/AdguardTeam/AdGuardHome/issues/2614.
|
2020-07-02 08:41:36 +00:00
|
|
|
const freeBSDScript = `#!/bin/sh
|
|
|
|
# PROVIDE: {{.Name}}
|
|
|
|
# REQUIRE: networking
|
|
|
|
# KEYWORD: shutdown
|
|
|
|
. /etc/rc.subr
|
|
|
|
name="{{.Name}}"
|
|
|
|
{{.Name}}_env="IS_DAEMON=1"
|
|
|
|
{{.Name}}_user="root"
|
|
|
|
pidfile="/var/run/${name}.pid"
|
|
|
|
command="/usr/sbin/daemon"
|
2021-02-01 11:12:57 +00:00
|
|
|
command_args="-P ${pidfile} -f -r {{.WorkingDirectory}}/{{.Name}}"
|
2020-07-02 08:41:36 +00:00
|
|
|
run_rc_command "$1"
|
|
|
|
`
|