You want your program to run as a daemon.
If you are paranoid and running as root,
chroot
to a safe directory:
chroot("/var/daemon") or die "Couldn't chroot to /var/daemon: $!";
Fork once, and let the parent exit.
$pid = fork; exit if $pid; die "Couldn't fork: $!" unless defined($pid);
Dissociate from the controlling terminal that started us and stop being part of whatever process group we had been a member of.
use POSIX; POSIX::setsid() or die "Can't start a new session: $!";
Trap fatal signals, setting a flag to indicate we need to gracefully exit.
$time_to_die = 0; sub signal_handler { $time_to_die = 1; } $SIG{INT} = $SIG{TERM} = $SIG{HUP} = \&signal_handler; # trap or ignore $SIG{PIPE}
Wrap your actual server code in a loop:
until ($time_to_die) { # ... }
Before POSIX, every operating system had its own way for a process to tell the operating system "I'm going it alone, please interfere with me as little as possible." POSIX makes it much cleaner. That said, you can still take advantage of any operating system-specific calls if you want to.
The
chroot
call is one of those non-POSIX calls. It makes a process change where it thinks the directory
/
is. For instance, after
chroot
"/var/daemon"
, if the process tries to read the file
/etc/passwd
, it will read
/var/daemon/etc/passwd
. A
chroot
ed process needs copies of any files it will run made available inside its new
/
, of course. For instance, our chrooted process would need
/var/daemon/bin/csh
if it were going to glob files. For security reasons, only the superuser may
chroot
. This is done by FTP servers if you login to them anonymously. It isn't really necessary to become a daemon.
The operating system expects a child's parent to wait when the child dies. Our daemon process has no particular parent to do this, so we need to disinherit it. This we do by
fork
ing once and having our parent exit, so that the child is not associated with the process that started the parent. The child then closes all the filehandles it got from its parent (STDIN, STDERR, and STDOUT) and calls
POSIX::setsid
to ensure that it is completely dissociated from its parent's terminal.
Now we're almost ready to begin. We don't want signals like SIGINT to kill us immediately (its default behavior), so we use
%SIG
to catch them and set a flag saying it's time to exit. Then our main program simply becomes: "While we weren't killed, do something."
The signal SIGPIPE is a special case. It's easy to get (by writing to a filehandle whose other end is closed) and has unforgiving default behavior (it terminates your process). You probably want to either ignore it (
$SIG{PIPE}
=
'IGNORE'
) or define your own signal handler to deal with it appropriately.
Your system's
setsid
(2) and
chroot
(1) manpage (if you have them);
the
chroot
function in
Chapter 3
of
Programming Perl
and in
perlfunc
(1); the Unix Socket FAQ at
http://www.ibrado.com/sock-faq/
.
Unix Network Programming
Copyright © 2001 O'Reilly & Associates. All rights reserved.