/* Copyright (c) 2009-2015 Roger Light All rights reserved. This program and the accompanying materials are made available under the terms of the Eclipse Public License v1.0 and Eclipse Distribution License v1.0 which accompany this distribution. The Eclipse Public License is available at http://www.eclipse.org/legal/epl-v10.html and the Eclipse Distribution License is available at http://www.eclipse.org/org/documents/edl-v10.php. Contributors: Roger Light - initial implementation and documentation. */ #include "config.h" #ifndef WIN32 /* For initgroups() */ # define _BSD_SOURCE # include # include #endif #ifndef WIN32 #include #else #include #include #include #endif #ifndef WIN32 # include #endif #include #include #include #include #ifdef WITH_WRAP #include #endif #ifdef WITH_WEBSOCKETS # include #endif #include "mosquitto_broker.h" #include "memory_mosq.h" #include "util_mosq.h" struct mosquitto_db int_db; bool flag_reload = false; #ifdef WITH_PERSISTENCE bool flag_db_backup = false; #endif bool flag_tree_print = false; int run; #ifdef WITH_WRAP #include int allow_severity = LOG_INFO; int deny_severity = LOG_INFO; #endif void handle_sigint(int signal); void handle_sigusr1(int signal); void handle_sigusr2(int signal); struct mosquitto_db *mosquitto__get_db(void) { return &int_db; } /* mosquitto shouldn't run as root. * This function will attempt to change to an unprivileged user and group if * running as root. The user is given in config->user. * Returns 1 on failure (unknown user, setuid/setgid failure) * Returns 0 on success. * Note that setting config->user to "root" does not produce an error, but it * strongly discouraged. */ int drop_privileges(struct mosquitto__config *config, bool temporary) { #if !defined(__CYGWIN__) && !defined(WIN32) struct passwd *pwd; char err[256]; int rc; if(geteuid() == 0){ if(config->user && strcmp(config->user, "root")){ pwd = getpwnam(config->user); if(!pwd){ mosquitto__log_printf(NULL, MOSQ_LOG_ERR, "Error: Invalid user '%s'.", config->user); return 1; } if(initgroups(config->user, pwd->pw_gid) == -1){ strerror_r(errno, err, 256); mosquitto__log_printf(NULL, MOSQ_LOG_ERR, "Error setting groups whilst dropping privileges: %s.", err); return 1; } if(temporary){ rc = setegid(pwd->pw_gid); }else{ rc = setgid(pwd->pw_gid); } if(rc == -1){ strerror_r(errno, err, 256); mosquitto__log_printf(NULL, MOSQ_LOG_ERR, "Error setting gid whilst dropping privileges: %s.", err); return 1; } if(temporary){ rc = seteuid(pwd->pw_uid); }else{ rc = setuid(pwd->pw_uid); } if(rc == -1){ strerror_r(errno, err, 256); mosquitto__log_printf(NULL, MOSQ_LOG_ERR, "Error setting uid whilst dropping privileges: %s.", err); return 1; } } if(geteuid() == 0 || getegid() == 0){ mosquitto__log_printf(NULL, MOSQ_LOG_WARNING, "Warning: Mosquitto should not be run as root/administrator."); } } #endif return MOSQ_ERR_SUCCESS; } int restore_privileges(void) { #if !defined(__CYGWIN__) && !defined(WIN32) char err[256]; int rc; if(getuid() == 0){ rc = setegid(0); if(rc == -1){ strerror_r(errno, err, 256); mosquitto__log_printf(NULL, MOSQ_LOG_ERR, "Error setting gid whilst restoring privileges: %s.", err); return 1; } rc = seteuid(0); if(rc == -1){ strerror_r(errno, err, 256); mosquitto__log_printf(NULL, MOSQ_LOG_ERR, "Error setting uid whilst restoring privileges: %s.", err); return 1; } } #endif return MOSQ_ERR_SUCCESS; } #ifdef SIGHUP /* Signal handler for SIGHUP - flag a config reload. */ void handle_sighup(int signal) { flag_reload = true; } #endif /* Signal handler for SIGINT and SIGTERM - just stop gracefully. */ void handle_sigint(int signal) { run = 0; } /* Signal handler for SIGUSR1 - backup the db. */ void handle_sigusr1(int signal) { #ifdef WITH_PERSISTENCE flag_db_backup = true; #endif } /* Signal handler for SIGUSR2 - vacuum the db. */ void handle_sigusr2(int signal) { flag_tree_print = true; } int main(int argc, char *argv[]) { int *listensock = NULL; int listensock_count = 0; int listensock_index = 0; struct mosquitto__config config; #ifdef WITH_SYS_TREE char buf[1024]; #endif int i, j; FILE *pid; int listener_max; int rc; #ifdef WIN32 SYSTEMTIME st; #else char err[256]; struct timeval tv; #endif struct mosquitto *ctxt, *ctxt_tmp; #if defined(WIN32) || defined(__CYGWIN__) if(argc == 2){ if(!strcmp(argv[1], "run")){ service_run(); return 0; }else if(!strcmp(argv[1], "install")){ service_install(); return 0; }else if(!strcmp(argv[1], "uninstall")){ service_uninstall(); return 0; } } #endif #ifdef WIN32 GetSystemTime(&st); srand(st.wSecond + st.wMilliseconds); #else gettimeofday(&tv, NULL); srand(tv.tv_sec + tv.tv_usec); #endif memset(&int_db, 0, sizeof(struct mosquitto_db)); mosquitto__net_init(); config__init(&config); rc = config__parse_args(&config, argc, argv); if(rc != MOSQ_ERR_SUCCESS) return rc; int_db.config = &config; if(config.daemon){ #ifndef WIN32 switch(fork()){ case 0: break; case -1: strerror_r(errno, err, 256); mosquitto__log_printf(NULL, MOSQ_LOG_ERR, "Error in fork: %s", err); return 1; default: return MOSQ_ERR_SUCCESS; } #else mosquitto__log_printf(NULL, MOSQ_LOG_WARNING, "Warning: Can't start in daemon mode in Windows."); #endif } if(config.daemon && config.pid_file){ pid = mosquitto__fopen(config.pid_file, "wt"); if(pid){ fprintf(pid, "%d", getpid()); fclose(pid); }else{ mosquitto__log_printf(NULL, MOSQ_LOG_ERR, "Error: Unable to write pid file."); return 1; } } rc = db__open(&config, &int_db); if(rc != MOSQ_ERR_SUCCESS){ mosquitto__log_printf(NULL, MOSQ_LOG_ERR, "Error: Couldn't open database."); return rc; } /* Initialise logging only after initialising the database in case we're * logging to topics */ log__init(&config); mosquitto__log_printf(NULL, MOSQ_LOG_INFO, "mosquitto version %s (build date %s) starting", VERSION, TIMESTAMP); if(config.config_file){ mosquitto__log_printf(NULL, MOSQ_LOG_INFO, "Config loaded from %s.", config.config_file); }else{ mosquitto__log_printf(NULL, MOSQ_LOG_INFO, "Using default config."); } rc = mosquitto_security_module_init(&int_db); if(rc) return rc; rc = mosquitto_security_init(&int_db, false); if(rc) return rc; #ifdef WITH_SYS_TREE if(config.sys_interval > 0){ /* Set static $SYS messages */ snprintf(buf, 1024, "mosquitto version %s", VERSION); db__messages_easy_queue(&int_db, NULL, "$SYS/broker/version", 2, strlen(buf), buf, 1); snprintf(buf, 1024, "%s", TIMESTAMP); db__messages_easy_queue(&int_db, NULL, "$SYS/broker/timestamp", 2, strlen(buf), buf, 1); } #endif listener_max = -1; listensock_index = 0; for(i=0; i listener_max){ listener_max = listensock[listensock_index]; } listensock_index++; } }else if(config.listeners[i].protocol == mp_websockets){ #ifdef WITH_WEBSOCKETS config.listeners[i].ws_context = mosq_websockets_init(&config.listeners[i], config.websockets_log_level); if(!config.listeners[i].ws_context){ mosquitto__log_printf(NULL, MOSQ_LOG_ERR, "Error: Unable to create websockets listener on port %d.", config.listeners[i].port); return 1; } #endif } } rc = drop_privileges(&config, false); if(rc != MOSQ_ERR_SUCCESS) return rc; signal(SIGINT, handle_sigint); signal(SIGTERM, handle_sigint); #ifdef SIGHUP signal(SIGHUP, handle_sighup); #endif #ifndef WIN32 signal(SIGUSR1, handle_sigusr1); signal(SIGUSR2, handle_sigusr2); signal(SIGPIPE, SIG_IGN); #endif #ifdef WITH_BRIDGE for(i=0; ilistener_count; i++){ if(int_db.config->listeners[i].ws_context){ libwebsocket_context_destroy(int_db.config->listeners[i].ws_context); } if(int_db.config->listeners[i].ws_protocol){ mosquitto__free(int_db.config->listeners[i].ws_protocol); } } #endif HASH_ITER(hh_id, int_db.contexts_by_id, ctxt, ctxt_tmp){ #ifdef WITH_WEBSOCKETS if(!ctxt->wsi){ context__cleanup(&int_db, ctxt, true); } #else context__cleanup(&int_db, ctxt, true); #endif } HASH_ITER(hh_sock, int_db.contexts_by_sock, ctxt, ctxt_tmp){ context__cleanup(&int_db, ctxt, true); } #ifdef WITH_BRIDGE for(i=0; i