summaryrefslogtreecommitdiff
path: root/vendor/github.com/sevlyar
diff options
context:
space:
mode:
authorkali kaneko (leap communications) <kali@leap.se>2021-04-14 16:54:42 +0200
committerkali kaneko (leap communications) <kali@leap.se>2021-04-14 16:54:42 +0200
commit67a0eb7111d3f89e4a0cb21e43aefe6d87d37e04 (patch)
treec9b18e0da6e06ac165a485ee957b7850adb12e86 /vendor/github.com/sevlyar
parent2e8f2a2e8e83fd89f956cdde886d5d9d808132da (diff)
[pkg] go mod vendor to build debian/ubuntu packages
Diffstat (limited to 'vendor/github.com/sevlyar')
-rw-r--r--vendor/github.com/sevlyar/go-daemon/.travis.yml15
-rw-r--r--vendor/github.com/sevlyar/go-daemon/LICENSE7
-rw-r--r--vendor/github.com/sevlyar/go-daemon/README.md63
-rw-r--r--vendor/github.com/sevlyar/go-daemon/command.go99
-rw-r--r--vendor/github.com/sevlyar/go-daemon/daemon.go44
-rw-r--r--vendor/github.com/sevlyar/go-daemon/daemon_stub.go52
-rw-r--r--vendor/github.com/sevlyar/go-daemon/daemon_unix.go260
-rw-r--r--vendor/github.com/sevlyar/go-daemon/lock_file.go109
-rw-r--r--vendor/github.com/sevlyar/go-daemon/lock_file_solaris.go40
-rw-r--r--vendor/github.com/sevlyar/go-daemon/lock_file_stub.go11
-rw-r--r--vendor/github.com/sevlyar/go-daemon/lock_file_unix.go23
-rw-r--r--vendor/github.com/sevlyar/go-daemon/os_executable.go11
-rw-r--r--vendor/github.com/sevlyar/go-daemon/os_executable_pre18.go11
-rw-r--r--vendor/github.com/sevlyar/go-daemon/signal.go59
-rw-r--r--vendor/github.com/sevlyar/go-daemon/syscall_dup.go11
-rw-r--r--vendor/github.com/sevlyar/go-daemon/syscall_dup_arm64.go11
-rw-r--r--vendor/github.com/sevlyar/go-daemon/syscall_dup_pre17.go13
17 files changed, 839 insertions, 0 deletions
diff --git a/vendor/github.com/sevlyar/go-daemon/.travis.yml b/vendor/github.com/sevlyar/go-daemon/.travis.yml
new file mode 100644
index 0000000..03d4305
--- /dev/null
+++ b/vendor/github.com/sevlyar/go-daemon/.travis.yml
@@ -0,0 +1,15 @@
+language: go
+
+go:
+ - 1.3
+ - 1.5
+ - tip
+
+before_install:
+ - go get -t -v ./...
+
+script:
+ - go test -v -coverprofile=coverage.txt -covermode=atomic
+
+after_success:
+ - bash <(curl -s https://codecov.io/bash)
diff --git a/vendor/github.com/sevlyar/go-daemon/LICENSE b/vendor/github.com/sevlyar/go-daemon/LICENSE
new file mode 100644
index 0000000..6923f2f
--- /dev/null
+++ b/vendor/github.com/sevlyar/go-daemon/LICENSE
@@ -0,0 +1,7 @@
+Copyright (C) 2013 Sergey Yarmonov
+
+Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:
+
+The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.
+
+THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
diff --git a/vendor/github.com/sevlyar/go-daemon/README.md b/vendor/github.com/sevlyar/go-daemon/README.md
new file mode 100644
index 0000000..be4824a
--- /dev/null
+++ b/vendor/github.com/sevlyar/go-daemon/README.md
@@ -0,0 +1,63 @@
+# go-daemon [![Build Status](https://travis-ci.org/sevlyar/go-daemon.svg?branch=master)](https://travis-ci.org/sevlyar/go-daemon) [![GoDoc](https://godoc.org/github.com/sevlyar/go-daemon?status.svg)](https://godoc.org/github.com/sevlyar/go-daemon)
+
+Library for writing system daemons in Go.
+
+Now supported only UNIX-based OS (Windows is not supported). But the library was tested only on Linux
+and OSX, so that if you have an ability to test the library on other platforms, give me feedback, please (#26).
+
+*Please, feel free to send me bug reports and fixes. Many thanks to all contributors.*
+
+## Features
+
+* Goroutine-safe daemonization;
+* Out of box work with pid-files;
+* Easy handling of system signals;
+* The control of a daemon.
+
+## Installation
+
+ go get github.com/sevlyar/go-daemon
+
+You can use [gopkg.in](http://labix.org/gopkg.in):
+
+ go get gopkg.in/sevlyar/go-daemon.v0
+
+If you want to use the library in production project, please use vendoring,
+because i can not ensure backward compatibility before release v1.0.
+
+## Examples
+
+* [Simple](examples/cmd/gd-simple/)
+* [Log rotation](examples/cmd/gd-log-rotation/)
+* [Signal handling](examples/cmd/gd-signal-handling/)
+
+## Documentation
+
+[godoc.org/github.com/sevlyar/go-daemon](https://godoc.org/github.com/sevlyar/go-daemon)
+
+## How it works
+
+We can not use `fork` syscall in Golang's runtime, because child process doesn't inherit
+threads and goroutines in that case. The library uses a simple trick: it runs its own copy with
+a mark - a predefined environment variable. Availability of the variable for the process means
+an execution in the child's copy. So that if the mark is not setted - the library executes
+parent's operations and runs its own copy with mark, and if the mark is setted - the library
+executes child's operations:
+
+```go
+func main() {
+ Pre()
+
+ context := new(Context)
+ child, _ := context.Reborn()
+
+ if child != nil {
+ PostParent()
+ } else {
+ defer context.Release()
+ PostChild()
+ }
+}
+```
+
+![](img/idea.png)
diff --git a/vendor/github.com/sevlyar/go-daemon/command.go b/vendor/github.com/sevlyar/go-daemon/command.go
new file mode 100644
index 0000000..07d23c8
--- /dev/null
+++ b/vendor/github.com/sevlyar/go-daemon/command.go
@@ -0,0 +1,99 @@
+package daemon
+
+import (
+ "os"
+)
+
+// AddCommand is wrapper on AddFlag and SetSigHandler functions.
+func AddCommand(f Flag, sig os.Signal, handler SignalHandlerFunc) {
+ if f != nil {
+ AddFlag(f, sig)
+ }
+ if handler != nil {
+ SetSigHandler(handler, sig)
+ }
+}
+
+// Flag is the interface implemented by an object that has two state:
+// 'set' and 'unset'.
+type Flag interface {
+ IsSet() bool
+}
+
+// BoolFlag returns new object that implements interface Flag and
+// has state 'set' when var with the given address is true.
+func BoolFlag(f *bool) Flag {
+ return &boolFlag{f}
+}
+
+// StringFlag returns new object that implements interface Flag and
+// has state 'set' when var with the given address equals given value of v.
+func StringFlag(f *string, v string) Flag {
+ return &stringFlag{f, v}
+}
+
+type boolFlag struct {
+ b *bool
+}
+
+func (f *boolFlag) IsSet() bool {
+ if f == nil {
+ return false
+ }
+ return *f.b
+}
+
+type stringFlag struct {
+ s *string
+ v string
+}
+
+func (f *stringFlag) IsSet() bool {
+ if f == nil {
+ return false
+ }
+ return *f.s == f.v
+}
+
+var flags = make(map[Flag]os.Signal)
+
+// Flags returns flags that was added by the function AddFlag.
+func Flags() map[Flag]os.Signal {
+ return flags
+}
+
+// AddFlag adds the flag and signal to the internal map.
+func AddFlag(f Flag, sig os.Signal) {
+ flags[f] = sig
+}
+
+// SendCommands sends active signals to the given process.
+func SendCommands(p *os.Process) (err error) {
+ for _, sig := range signals() {
+ if err = p.Signal(sig); err != nil {
+ return
+ }
+ }
+ return
+}
+
+// ActiveFlags returns flags that has the state 'set'.
+func ActiveFlags() (ret []Flag) {
+ ret = make([]Flag, 0, 1)
+ for f := range flags {
+ if f.IsSet() {
+ ret = append(ret, f)
+ }
+ }
+ return
+}
+
+func signals() (ret []os.Signal) {
+ ret = make([]os.Signal, 0, 1)
+ for f, sig := range flags {
+ if f.IsSet() {
+ ret = append(ret, sig)
+ }
+ }
+ return
+}
diff --git a/vendor/github.com/sevlyar/go-daemon/daemon.go b/vendor/github.com/sevlyar/go-daemon/daemon.go
new file mode 100644
index 0000000..6c44aae
--- /dev/null
+++ b/vendor/github.com/sevlyar/go-daemon/daemon.go
@@ -0,0 +1,44 @@
+package daemon
+
+import (
+ "errors"
+ "os"
+)
+
+var errNotSupported = errors.New("daemon: Non-POSIX OS is not supported")
+
+// Mark of daemon process - system environment variable _GO_DAEMON=1
+const (
+ MARK_NAME = "_GO_DAEMON"
+ MARK_VALUE = "1"
+)
+
+// Default file permissions for log and pid files.
+const FILE_PERM = os.FileMode(0640)
+
+// WasReborn returns true in child process (daemon) and false in parent process.
+func WasReborn() bool {
+ return os.Getenv(MARK_NAME) == MARK_VALUE
+}
+
+// Reborn runs second copy of current process in the given context.
+// function executes separate parts of code in child process and parent process
+// and provides demonization of child process. It look similar as the
+// fork-daemonization, but goroutine-safe.
+// In success returns *os.Process in parent process and nil in child process.
+// Otherwise returns error.
+func (d *Context) Reborn() (child *os.Process, err error) {
+ return d.reborn()
+}
+
+// Search searches daemons process by given in context pid file name.
+// If success returns pointer on daemons os.Process structure,
+// else returns error. Returns nil if filename is empty.
+func (d *Context) Search() (daemon *os.Process, err error) {
+ return d.search()
+}
+
+// Release provides correct pid-file release in daemon.
+func (d *Context) Release() (err error) {
+ return d.release()
+}
diff --git a/vendor/github.com/sevlyar/go-daemon/daemon_stub.go b/vendor/github.com/sevlyar/go-daemon/daemon_stub.go
new file mode 100644
index 0000000..25f3bbb
--- /dev/null
+++ b/vendor/github.com/sevlyar/go-daemon/daemon_stub.go
@@ -0,0 +1,52 @@
+// +build !darwin,!dragonfly,!freebsd,!linux,!netbsd,!openbsd,!plan9,!solaris
+
+package daemon
+
+import (
+ "os"
+)
+
+// A Context describes daemon context.
+type Context struct {
+ // If PidFileName is non-empty, parent process will try to create and lock
+ // pid file with given name. Child process writes process id to file.
+ PidFileName string
+ // Permissions for new pid file.
+ PidFilePerm os.FileMode
+
+ // If LogFileName is non-empty, parent process will create file with given name
+ // and will link to fd 2 (stderr) for child process.
+ LogFileName string
+ // Permissions for new log file.
+ LogFilePerm os.FileMode
+
+ // If WorkDir is non-empty, the child changes into the directory before
+ // creating the process.
+ WorkDir string
+ // If Chroot is non-empty, the child changes root directory
+ Chroot string
+
+ // If Env is non-nil, it gives the environment variables for the
+ // daemon-process in the form returned by os.Environ.
+ // If it is nil, the result of os.Environ will be used.
+ Env []string
+ // If Args is non-nil, it gives the command-line args for the
+ // daemon-process. If it is nil, the result of os.Args will be used
+ // (without program name).
+ Args []string
+
+ // If Umask is non-zero, the daemon-process call Umask() func with given value.
+ Umask int
+}
+
+func (d *Context) reborn() (child *os.Process, err error) {
+ return nil, errNotSupported
+}
+
+func (d *Context) search() (daemon *os.Process, err error) {
+ return nil, errNotSupported
+}
+
+func (d *Context) release() (err error) {
+ return errNotSupported
+}
diff --git a/vendor/github.com/sevlyar/go-daemon/daemon_unix.go b/vendor/github.com/sevlyar/go-daemon/daemon_unix.go
new file mode 100644
index 0000000..3bd7dc9
--- /dev/null
+++ b/vendor/github.com/sevlyar/go-daemon/daemon_unix.go
@@ -0,0 +1,260 @@
+// +build darwin dragonfly freebsd linux netbsd openbsd plan9 solaris
+
+package daemon
+
+import (
+ "encoding/json"
+ "fmt"
+ "os"
+ "path/filepath"
+ "syscall"
+)
+
+// A Context describes daemon context.
+type Context struct {
+ // If PidFileName is non-empty, parent process will try to create and lock
+ // pid file with given name. Child process writes process id to file.
+ PidFileName string
+ // Permissions for new pid file.
+ PidFilePerm os.FileMode
+
+ // If LogFileName is non-empty, parent process will create file with given name
+ // and will link to fd 2 (stderr) for child process.
+ LogFileName string
+ // Permissions for new log file.
+ LogFilePerm os.FileMode
+
+ // If WorkDir is non-empty, the child changes into the directory before
+ // creating the process.
+ WorkDir string
+ // If Chroot is non-empty, the child changes root directory
+ Chroot string
+
+ // If Env is non-nil, it gives the environment variables for the
+ // daemon-process in the form returned by os.Environ.
+ // If it is nil, the result of os.Environ will be used.
+ Env []string
+ // If Args is non-nil, it gives the command-line args for the
+ // daemon-process. If it is nil, the result of os.Args will be used.
+ Args []string
+
+ // Credential holds user and group identities to be assumed by a daemon-process.
+ Credential *syscall.Credential
+ // If Umask is non-zero, the daemon-process call Umask() func with given value.
+ Umask int
+
+ // Struct contains only serializable public fields (!!!)
+ abspath string
+ pidFile *LockFile
+ logFile *os.File
+ nullFile *os.File
+
+ rpipe, wpipe *os.File
+}
+
+func (d *Context) reborn() (child *os.Process, err error) {
+ if !WasReborn() {
+ child, err = d.parent()
+ } else {
+ err = d.child()
+ }
+ return
+}
+
+func (d *Context) search() (daemon *os.Process, err error) {
+ if len(d.PidFileName) > 0 {
+ var pid int
+ if pid, err = ReadPidFile(d.PidFileName); err != nil {
+ return
+ }
+ daemon, err = os.FindProcess(pid)
+ }
+ return
+}
+
+func (d *Context) parent() (child *os.Process, err error) {
+ if err = d.prepareEnv(); err != nil {
+ return
+ }
+
+ defer d.closeFiles()
+ if err = d.openFiles(); err != nil {
+ return
+ }
+
+ attr := &os.ProcAttr{
+ Dir: d.WorkDir,
+ Env: d.Env,
+ Files: d.files(),
+ Sys: &syscall.SysProcAttr{
+ //Chroot: d.Chroot,
+ Credential: d.Credential,
+ Setsid: true,
+ },
+ }
+
+ if child, err = os.StartProcess(d.abspath, d.Args, attr); err != nil {
+ if d.pidFile != nil {
+ d.pidFile.Remove()
+ }
+ return
+ }
+
+ d.rpipe.Close()
+ encoder := json.NewEncoder(d.wpipe)
+ if err = encoder.Encode(d); err != nil {
+ return
+ }
+ _, err = fmt.Fprint(d.wpipe, "\n\n")
+ return
+}
+
+func (d *Context) openFiles() (err error) {
+ if d.PidFilePerm == 0 {
+ d.PidFilePerm = FILE_PERM
+ }
+ if d.LogFilePerm == 0 {
+ d.LogFilePerm = FILE_PERM
+ }
+
+ if d.nullFile, err = os.Open(os.DevNull); err != nil {
+ return
+ }
+
+ if len(d.PidFileName) > 0 {
+ if d.PidFileName, err = filepath.Abs(d.PidFileName); err != nil {
+ return err
+ }
+ if d.pidFile, err = OpenLockFile(d.PidFileName, d.PidFilePerm); err != nil {
+ return
+ }
+ if err = d.pidFile.Lock(); err != nil {
+ return
+ }
+ if len(d.Chroot) > 0 {
+ // Calculate PID-file absolute path in child's environment
+ if d.PidFileName, err = filepath.Rel(d.Chroot, d.PidFileName); err != nil {
+ return err
+ }
+ d.PidFileName = "/" + d.PidFileName
+ }
+ }
+
+ if len(d.LogFileName) > 0 {
+ if d.logFile, err = os.OpenFile(d.LogFileName,
+ os.O_WRONLY|os.O_CREATE|os.O_APPEND, d.LogFilePerm); err != nil {
+ return
+ }
+ }
+
+ d.rpipe, d.wpipe, err = os.Pipe()
+ return
+}
+
+func (d *Context) closeFiles() (err error) {
+ cl := func(file **os.File) {
+ if *file != nil {
+ (*file).Close()
+ *file = nil
+ }
+ }
+ cl(&d.rpipe)
+ cl(&d.wpipe)
+ cl(&d.logFile)
+ cl(&d.nullFile)
+ if d.pidFile != nil {
+ d.pidFile.Close()
+ d.pidFile = nil
+ }
+ return
+}
+
+func (d *Context) prepareEnv() (err error) {
+ if d.abspath, err = osExecutable(); err != nil {
+ return
+ }
+
+ if len(d.Args) == 0 {
+ d.Args = os.Args
+ }
+
+ mark := fmt.Sprintf("%s=%s", MARK_NAME, MARK_VALUE)
+ if len(d.Env) == 0 {
+ d.Env = os.Environ()
+ }
+ d.Env = append(d.Env, mark)
+
+ return
+}
+
+func (d *Context) files() (f []*os.File) {
+ log := d.nullFile
+ if d.logFile != nil {
+ log = d.logFile
+ }
+
+ f = []*os.File{
+ d.rpipe, // (0) stdin
+ log, // (1) stdout
+ log, // (2) stderr
+ d.nullFile, // (3) dup on fd 0 after initialization
+ }
+
+ if d.pidFile != nil {
+ f = append(f, d.pidFile.File) // (4) pid file
+ }
+ return
+}
+
+var initialized = false
+
+func (d *Context) child() (err error) {
+ if initialized {
+ return os.ErrInvalid
+ }
+ initialized = true
+
+ decoder := json.NewDecoder(os.Stdin)
+ if err = decoder.Decode(d); err != nil {
+ return
+ }
+
+ // create PID file after context decoding to know PID file full path.
+ if len(d.PidFileName) > 0 {
+ d.pidFile = NewLockFile(os.NewFile(4, d.PidFileName))
+ if err = d.pidFile.WritePid(); err != nil {
+ return
+ }
+ defer func() {
+ if err != nil {
+ d.pidFile.Remove()
+ }
+ }()
+ }
+
+ if err = syscallDup(3, 0); err != nil {
+ return
+ }
+
+ if d.Umask != 0 {
+ syscall.Umask(int(d.Umask))
+ }
+ if len(d.Chroot) > 0 {
+ err = syscall.Chroot(d.Chroot)
+ if err != nil {
+ return
+ }
+ }
+
+ return
+}
+
+func (d *Context) release() (err error) {
+ if !initialized {
+ return
+ }
+ if d.pidFile != nil {
+ err = d.pidFile.Remove()
+ }
+ return
+}
diff --git a/vendor/github.com/sevlyar/go-daemon/lock_file.go b/vendor/github.com/sevlyar/go-daemon/lock_file.go
new file mode 100644
index 0000000..1ec81db
--- /dev/null
+++ b/vendor/github.com/sevlyar/go-daemon/lock_file.go
@@ -0,0 +1,109 @@
+package daemon
+
+import (
+ "errors"
+ "fmt"
+ "os"
+)
+
+var (
+ // ErrWouldBlock indicates on locking pid-file by another process.
+ ErrWouldBlock = errors.New("daemon: Resource temporarily unavailable")
+)
+
+// LockFile wraps *os.File and provide functions for locking of files.
+type LockFile struct {
+ *os.File
+}
+
+// NewLockFile returns a new LockFile with the given File.
+func NewLockFile(file *os.File) *LockFile {
+ return &LockFile{file}
+}
+
+// CreatePidFile opens the named file, applies exclusive lock and writes
+// current process id to file.
+func CreatePidFile(name string, perm os.FileMode) (lock *LockFile, err error) {
+ if lock, err = OpenLockFile(name, perm); err != nil {
+ return
+ }
+ if err = lock.Lock(); err != nil {
+ lock.Remove()
+ return
+ }
+ if err = lock.WritePid(); err != nil {
+ lock.Remove()
+ }
+ return
+}
+
+// OpenLockFile opens the named file with flags os.O_RDWR|os.O_CREATE and specified perm.
+// If successful, function returns LockFile for opened file.
+func OpenLockFile(name string, perm os.FileMode) (lock *LockFile, err error) {
+ var file *os.File
+ if file, err = os.OpenFile(name, os.O_RDWR|os.O_CREATE, perm); err == nil {
+ lock = &LockFile{file}
+ }
+ return
+}
+
+// Lock apply exclusive lock on an open file. If file already locked, returns error.
+func (file *LockFile) Lock() error {
+ return lockFile(file.Fd())
+}
+
+// Unlock remove exclusive lock on an open file.
+func (file *LockFile) Unlock() error {
+ return unlockFile(file.Fd())
+}
+
+// ReadPidFile reads process id from file with give name and returns pid.
+// If unable read from a file, returns error.
+func ReadPidFile(name string) (pid int, err error) {
+ var file *os.File
+ if file, err = os.OpenFile(name, os.O_RDONLY, 0640); err != nil {
+ return
+ }
+ defer file.Close()
+
+ lock := &LockFile{file}
+ pid, err = lock.ReadPid()
+ return
+}
+
+// WritePid writes current process id to an open file.
+func (file *LockFile) WritePid() (err error) {
+ if _, err = file.Seek(0, os.SEEK_SET); err != nil {
+ return
+ }
+ var fileLen int
+ if fileLen, err = fmt.Fprint(file, os.Getpid()); err != nil {
+ return
+ }
+ if err = file.Truncate(int64(fileLen)); err != nil {
+ return
+ }
+ err = file.Sync()
+ return
+}
+
+// ReadPid reads process id from file and returns pid.
+// If unable read from a file, returns error.
+func (file *LockFile) ReadPid() (pid int, err error) {
+ if _, err = file.Seek(0, os.SEEK_SET); err != nil {
+ return
+ }
+ _, err = fmt.Fscan(file, &pid)
+ return
+}
+
+// Remove removes lock, closes and removes an open file.
+func (file *LockFile) Remove() error {
+ defer file.Close()
+
+ if err := file.Unlock(); err != nil {
+ return err
+ }
+
+ return os.Remove(file.Name())
+}
diff --git a/vendor/github.com/sevlyar/go-daemon/lock_file_solaris.go b/vendor/github.com/sevlyar/go-daemon/lock_file_solaris.go
new file mode 100644
index 0000000..313dca0
--- /dev/null
+++ b/vendor/github.com/sevlyar/go-daemon/lock_file_solaris.go
@@ -0,0 +1,40 @@
+// +build solaris
+
+package daemon
+
+import (
+ "io"
+ "syscall"
+)
+
+func lockFile(fd uintptr) error {
+ lockInfo := syscall.Flock_t{
+ Type: syscall.F_WRLCK,
+ Whence: io.SeekStart,
+ Start: 0,
+ Len: 0,
+ }
+ if err := syscall.FcntlFlock(fd, syscall.F_SETLK, &lockInfo); err != nil {
+ if err == syscall.EAGAIN {
+ err = ErrWouldBlock
+ }
+ return err
+ }
+ return nil
+}
+
+func unlockFile(fd uintptr) error {
+ lockInfo := syscall.Flock_t{
+ Type: syscall.F_UNLCK,
+ Whence: io.SeekStart,
+ Start: 0,
+ Len: 0,
+ }
+ if err := syscall.FcntlFlock(fd, syscall.F_GETLK, &lockInfo); err != nil {
+ if err == syscall.EAGAIN {
+ err = ErrWouldBlock
+ }
+ return err
+ }
+ return nil
+}
diff --git a/vendor/github.com/sevlyar/go-daemon/lock_file_stub.go b/vendor/github.com/sevlyar/go-daemon/lock_file_stub.go
new file mode 100644
index 0000000..3be0c01
--- /dev/null
+++ b/vendor/github.com/sevlyar/go-daemon/lock_file_stub.go
@@ -0,0 +1,11 @@
+// +build !darwin,!dragonfly,!freebsd,!linux,!netbsd,!openbsd,!plan9,!solaris
+
+package daemon
+
+func lockFile(fd uintptr) error {
+ return errNotSupported
+}
+
+func unlockFile(fd uintptr) error {
+ return errNotSupported
+}
diff --git a/vendor/github.com/sevlyar/go-daemon/lock_file_unix.go b/vendor/github.com/sevlyar/go-daemon/lock_file_unix.go
new file mode 100644
index 0000000..4215a8c
--- /dev/null
+++ b/vendor/github.com/sevlyar/go-daemon/lock_file_unix.go
@@ -0,0 +1,23 @@
+// +build darwin dragonfly freebsd linux netbsd openbsd plan9
+
+package daemon
+
+import (
+ "syscall"
+)
+
+func lockFile(fd uintptr) error {
+ err := syscall.Flock(int(fd), syscall.LOCK_EX|syscall.LOCK_NB)
+ if err == syscall.EWOULDBLOCK {
+ err = ErrWouldBlock
+ }
+ return err
+}
+
+func unlockFile(fd uintptr) error {
+ err := syscall.Flock(int(fd), syscall.LOCK_UN)
+ if err == syscall.EWOULDBLOCK {
+ err = ErrWouldBlock
+ }
+ return err
+}
diff --git a/vendor/github.com/sevlyar/go-daemon/os_executable.go b/vendor/github.com/sevlyar/go-daemon/os_executable.go
new file mode 100644
index 0000000..ae38074
--- /dev/null
+++ b/vendor/github.com/sevlyar/go-daemon/os_executable.go
@@ -0,0 +1,11 @@
+// +build go1.8
+
+package daemon
+
+import (
+ "os"
+)
+
+func osExecutable() (string, error) {
+ return os.Executable()
+}
diff --git a/vendor/github.com/sevlyar/go-daemon/os_executable_pre18.go b/vendor/github.com/sevlyar/go-daemon/os_executable_pre18.go
new file mode 100644
index 0000000..d1a705c
--- /dev/null
+++ b/vendor/github.com/sevlyar/go-daemon/os_executable_pre18.go
@@ -0,0 +1,11 @@
+// +build !go1.8
+
+package daemon
+
+import (
+ "github.com/kardianos/osext"
+)
+
+func osExecutable() (string, error) {
+ return osext.Executable()
+}
diff --git a/vendor/github.com/sevlyar/go-daemon/signal.go b/vendor/github.com/sevlyar/go-daemon/signal.go
new file mode 100644
index 0000000..fe512da
--- /dev/null
+++ b/vendor/github.com/sevlyar/go-daemon/signal.go
@@ -0,0 +1,59 @@
+package daemon
+
+import (
+ "errors"
+ "os"
+ "os/signal"
+ "syscall"
+)
+
+// ErrStop should be returned signal handler function
+// for termination of handling signals.
+var ErrStop = errors.New("stop serve signals")
+
+// SignalHandlerFunc is the interface for signal handler functions.
+type SignalHandlerFunc func(sig os.Signal) (err error)
+
+// SetSigHandler sets handler for the given signals.
+// SIGTERM has the default handler, he returns ErrStop.
+func SetSigHandler(handler SignalHandlerFunc, signals ...os.Signal) {
+ for _, sig := range signals {
+ handlers[sig] = handler
+ }
+}
+
+// ServeSignals calls handlers for system signals.
+func ServeSignals() (err error) {
+ signals := make([]os.Signal, 0, len(handlers))
+ for sig := range handlers {
+ signals = append(signals, sig)
+ }
+
+ ch := make(chan os.Signal, 8)
+ signal.Notify(ch, signals...)
+
+ for sig := range ch {
+ err = handlers[sig](sig)
+ if err != nil {
+ break
+ }
+ }
+
+ signal.Stop(ch)
+
+ if err == ErrStop {
+ err = nil
+ }
+
+ return
+}
+
+var handlers = make(map[os.Signal]SignalHandlerFunc)
+
+func init() {
+ handlers[syscall.SIGTERM] = sigtermDefaultHandler
+}
+
+func sigtermDefaultHandler(sig os.Signal) error {
+ return ErrStop
+}
diff --git a/vendor/github.com/sevlyar/go-daemon/syscall_dup.go b/vendor/github.com/sevlyar/go-daemon/syscall_dup.go
new file mode 100644
index 0000000..fbf1b4f
--- /dev/null
+++ b/vendor/github.com/sevlyar/go-daemon/syscall_dup.go
@@ -0,0 +1,11 @@
+// +build !linux !arm64
+// +build !windows
+// +build go1.7
+
+package daemon
+
+import "golang.org/x/sys/unix"
+
+func syscallDup(oldfd int, newfd int) (err error) {
+ return unix.Dup2(oldfd, newfd)
+}
diff --git a/vendor/github.com/sevlyar/go-daemon/syscall_dup_arm64.go b/vendor/github.com/sevlyar/go-daemon/syscall_dup_arm64.go
new file mode 100644
index 0000000..af00cd2
--- /dev/null
+++ b/vendor/github.com/sevlyar/go-daemon/syscall_dup_arm64.go
@@ -0,0 +1,11 @@
+// +build linux,arm64
+
+package daemon
+
+import "syscall"
+
+func syscallDup(oldfd int, newfd int) (err error) {
+ // linux_arm64 platform doesn't have syscall.Dup2
+ // so use the nearly identical syscall.Dup3 instead.
+ return syscall.Dup3(oldfd, newfd, 0)
+}
diff --git a/vendor/github.com/sevlyar/go-daemon/syscall_dup_pre17.go b/vendor/github.com/sevlyar/go-daemon/syscall_dup_pre17.go
new file mode 100644
index 0000000..b95621b
--- /dev/null
+++ b/vendor/github.com/sevlyar/go-daemon/syscall_dup_pre17.go
@@ -0,0 +1,13 @@
+// +build !linux !arm64
+// +build !windows
+// +build !go1.7
+
+package daemon
+
+import (
+ "syscall"
+)
+
+func syscallDup(oldfd int, newfd int) (err error) {
+ return syscall.Dup2(oldfd, newfd)
+}