You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@mesos.apache.org by gr...@apache.org on 2017/07/13 00:06:51 UTC

[4/4] mesos git commit: Moved internal libprocess headers to the src directory.

Moved internal libprocess headers to the src directory.

The POSIX- and Windows-specific subprocess headers are internal
to libprocess, so move them to the src directory to make it clear
that they don't need to be installed.

Review: https://reviews.apache.org/r/60699/


Project: http://git-wip-us.apache.org/repos/asf/mesos/repo
Commit: http://git-wip-us.apache.org/repos/asf/mesos/commit/c35293ef
Tree: http://git-wip-us.apache.org/repos/asf/mesos/tree/c35293ef
Diff: http://git-wip-us.apache.org/repos/asf/mesos/diff/c35293ef

Branch: refs/heads/master
Commit: c35293ef8e70d3b98576aa180935b523003232ce
Parents: 350f72d
Author: James Peach <jp...@apache.org>
Authored: Wed Jul 12 17:01:15 2017 -0700
Committer: Greg Mann <gr...@gmail.com>
Committed: Wed Jul 12 17:01:15 2017 -0700

----------------------------------------------------------------------
 3rdparty/libprocess/Makefile.am                 |   1 +
 3rdparty/libprocess/include/Makefile.am         |   4 -
 .../include/process/posix/subprocess.hpp        | 353 -------------------
 .../include/process/windows/subprocess.hpp      | 102 ------
 3rdparty/libprocess/src/subprocess.cpp          |  12 +-
 3rdparty/libprocess/src/subprocess_posix.hpp    | 353 +++++++++++++++++++
 3rdparty/libprocess/src/subprocess_windows.hpp  | 102 ++++++
 7 files changed, 462 insertions(+), 465 deletions(-)
----------------------------------------------------------------------


http://git-wip-us.apache.org/repos/asf/mesos/blob/c35293ef/3rdparty/libprocess/Makefile.am
----------------------------------------------------------------------
diff --git a/3rdparty/libprocess/Makefile.am b/3rdparty/libprocess/Makefile.am
index c2190b4..d2b2ed2 100644
--- a/3rdparty/libprocess/Makefile.am
+++ b/3rdparty/libprocess/Makefile.am
@@ -177,6 +177,7 @@ libprocess_la_SOURCES =		\
   src/socket.cpp		\
   src/subprocess.cpp		\
   src/subprocess_posix.cpp	\
+  src/subprocess_posix.hpp	\
   src/time.cpp			\
   src/timeseries.cpp
 

http://git-wip-us.apache.org/repos/asf/mesos/blob/c35293ef/3rdparty/libprocess/include/Makefile.am
----------------------------------------------------------------------
diff --git a/3rdparty/libprocess/include/Makefile.am b/3rdparty/libprocess/include/Makefile.am
index 258e2ca..b452053 100644
--- a/3rdparty/libprocess/include/Makefile.am
+++ b/3rdparty/libprocess/include/Makefile.am
@@ -71,7 +71,3 @@ nobase_include_HEADERS =		\
   process/timeout.hpp			\
   process/timer.hpp			\
   process/timeseries.hpp
-
-noinst_HEADERS = 			\
-  process/posix/subprocess.hpp		\
-  process/windows/subprocess.hpp

http://git-wip-us.apache.org/repos/asf/mesos/blob/c35293ef/3rdparty/libprocess/include/process/posix/subprocess.hpp
----------------------------------------------------------------------
diff --git a/3rdparty/libprocess/include/process/posix/subprocess.hpp b/3rdparty/libprocess/include/process/posix/subprocess.hpp
deleted file mode 100644
index b478bec..0000000
--- a/3rdparty/libprocess/include/process/posix/subprocess.hpp
+++ /dev/null
@@ -1,353 +0,0 @@
-// Licensed under the Apache License, Version 2.0 (the "License");
-// you may not use this file except in compliance with the License.
-// You may obtain a copy of the License at
-//
-//     http://www.apache.org/licenses/LICENSE-2.0
-//
-// Unless required by applicable law or agreed to in writing, software
-// distributed under the License is distributed on an "AS IS" BASIS,
-// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
-// See the License for the specific language governing permissions and
-// limitations under the License
-
-#ifndef __PROCESS_POSIX_SUBPROCESS_HPP__
-#define __PROCESS_POSIX_SUBPROCESS_HPP__
-
-#ifdef __linux__
-#include <sys/prctl.h>
-#endif // __linux__
-#include <sys/types.h>
-
-#include <string>
-
-#include <glog/logging.h>
-
-#include <process/subprocess.hpp>
-
-#include <stout/check.hpp>
-#include <stout/error.hpp>
-#include <stout/foreach.hpp>
-#include <stout/hashset.hpp>
-#include <stout/nothing.hpp>
-#include <stout/lambda.hpp>
-#include <stout/none.hpp>
-#include <stout/option.hpp>
-#include <stout/os.hpp>
-#include <stout/try.hpp>
-#include <stout/unreachable.hpp>
-
-#include <stout/os/close.hpp>
-#include <stout/os/environment.hpp>
-#include <stout/os/fcntl.hpp>
-#include <stout/os/signals.hpp>
-#include <stout/os/strerror.hpp>
-
-namespace process {
-namespace internal {
-
-static void close(std::initializer_list<int_fd> fds);
-
-
-static void close(
-    const Subprocess::IO::InputFileDescriptors& stdinfds,
-    const Subprocess::IO::OutputFileDescriptors& stdoutfds,
-    const Subprocess::IO::OutputFileDescriptors& stderrfds);
-
-
-inline pid_t defaultClone(const lambda::function<int()>& func)
-{
-  pid_t pid = ::fork();
-  if (pid == -1) {
-    return -1;
-  } else if (pid == 0) {
-    // Child.
-    ::exit(func());
-    UNREACHABLE();
-  } else {
-    // Parent.
-    return pid;
-  }
-}
-
-
-// This function will invoke `os::cloexec` on all specified file
-// descriptors that are valid (i.e., not `None` and >= 0).
-inline Try<Nothing> cloexec(
-    const InputFileDescriptors& stdinfds,
-    const OutputFileDescriptors& stdoutfds,
-    const OutputFileDescriptors& stderrfds)
-{
-  hashset<int> fds = {
-    stdinfds.read,
-    stdinfds.write.getOrElse(-1),
-    stdoutfds.read.getOrElse(-1),
-    stdoutfds.write,
-    stderrfds.read.getOrElse(-1),
-    stderrfds.write
-  };
-
-  foreach (int fd, fds) {
-    if (fd >= 0) {
-      Try<Nothing> cloexec = os::cloexec(fd);
-      if (cloexec.isError()) {
-        return Error(cloexec.error());
-      }
-    }
-  }
-
-  return Nothing();
-}
-
-
-// The main entry of the child process.
-//
-// NOTE: This function has to be async signal safe.
-inline int childMain(
-    const std::string& path,
-    char** argv,
-    char** envp,
-    const InputFileDescriptors& stdinfds,
-    const OutputFileDescriptors& stdoutfds,
-    const OutputFileDescriptors& stderrfds,
-    bool blocking,
-    int pipes[2],
-    const std::vector<Subprocess::ChildHook>& child_hooks)
-{
-  // Close parent's end of the pipes.
-  if (stdinfds.write.isSome()) {
-    ::close(stdinfds.write.get());
-  }
-  if (stdoutfds.read.isSome()) {
-    ::close(stdoutfds.read.get());
-  }
-  if (stderrfds.read.isSome()) {
-    ::close(stderrfds.read.get());
-  }
-
-  // Currently we will block the child's execution of the new process
-  // until all the parent hooks (if any) have executed.
-  if (blocking) {
-    ::close(pipes[1]);
-  }
-
-  // Redirect I/O for stdin/stdout/stderr.
-  while (::dup2(stdinfds.read, STDIN_FILENO) == -1 && errno == EINTR);
-  while (::dup2(stdoutfds.write, STDOUT_FILENO) == -1 && errno == EINTR);
-  while (::dup2(stderrfds.write, STDERR_FILENO) == -1 && errno == EINTR);
-
-  // Close the copies. We need to make sure that we do not close the
-  // file descriptor assigned to stdin/stdout/stderr in case the
-  // parent has closed stdin/stdout/stderr when calling this
-  // function (in that case, a dup'ed file descriptor may have the
-  // same file descriptor number as stdin/stdout/stderr).
-  //
-  // We also need to ensure that we don't "double close" any file
-  // descriptors in the case where one of stdinfds.read,
-  // stdoutfds.write, or stdoutfds.write are equal.
-  if (stdinfds.read != STDIN_FILENO &&
-      stdinfds.read != STDOUT_FILENO &&
-      stdinfds.read != STDERR_FILENO) {
-    ::close(stdinfds.read);
-  }
-  if (stdoutfds.write != STDIN_FILENO &&
-      stdoutfds.write != STDOUT_FILENO &&
-      stdoutfds.write != STDERR_FILENO &&
-      stdoutfds.write != stdinfds.read) {
-    ::close(stdoutfds.write);
-  }
-  if (stderrfds.write != STDIN_FILENO &&
-      stderrfds.write != STDOUT_FILENO &&
-      stderrfds.write != STDERR_FILENO &&
-      stderrfds.write != stdinfds.read &&
-      stderrfds.write != stdoutfds.write) {
-    ::close(stderrfds.write);
-  }
-
-  if (blocking) {
-    // Do a blocking read on the pipe until the parent signals us to
-    // continue.
-    char dummy;
-    ssize_t length;
-    while ((length = ::read(pipes[0], &dummy, sizeof(dummy))) == -1 &&
-          errno == EINTR);
-
-    if (length != sizeof(dummy)) {
-      ABORT("Failed to synchronize with parent");
-    }
-
-    // Now close the pipe as we don't need it anymore.
-    ::close(pipes[0]);
-  }
-
-  // Run the child hooks.
-  foreach (const Subprocess::ChildHook& hook, child_hooks) {
-    Try<Nothing> callback = hook();
-
-    // If the callback failed, we should abort execution.
-    if (callback.isError()) {
-      ABORT("Failed to execute Subprocess::ChildHook: " + callback.error());
-    }
-  }
-
-  os::execvpe(path.c_str(), argv, envp);
-
-  ABORT("Failed to os::execvpe on path '" + path + "': " + os::strerror(errno));
-}
-
-
-inline Try<pid_t> cloneChild(
-    const std::string& path,
-    std::vector<std::string> argv,
-    const Option<std::map<std::string, std::string>>& environment,
-    const Option<lambda::function<
-        pid_t(const lambda::function<int()>&)>>& _clone,
-    const std::vector<Subprocess::ParentHook>& parent_hooks,
-    const std::vector<Subprocess::ChildHook>& child_hooks,
-    const InputFileDescriptors stdinfds,
-    const OutputFileDescriptors stdoutfds,
-    const OutputFileDescriptors stderrfds)
-{
-  // The real arguments that will be passed to 'os::execvpe'. We need
-  // to construct them here before doing the clone as it might not be
-  // async signal safe to perform the memory allocation.
-  char** _argv = new char*[argv.size() + 1];
-  for (size_t i = 0; i < argv.size(); i++) {
-    _argv[i] = (char*) argv[i].c_str();
-  }
-  _argv[argv.size()] = nullptr;
-
-  // Like above, we need to construct the environment that we'll pass
-  // to 'os::execvpe' as it might not be async-safe to perform the
-  // memory allocations.
-  char** envp = os::raw::environment();
-
-  if (environment.isSome()) {
-    // NOTE: We add 1 to the size for a `nullptr` terminator.
-    envp = new char*[environment.get().size() + 1];
-
-    size_t index = 0;
-    foreachpair (
-        const std::string& key,
-        const std::string& value, environment.get()) {
-      std::string entry = key + "=" + value;
-      envp[index] = new char[entry.size() + 1];
-      strncpy(envp[index], entry.c_str(), entry.size() + 1);
-      ++index;
-    }
-
-    envp[index] = nullptr;
-  }
-
-  // Determine the function to clone the child process. If the user
-  // does not specify the clone function, we will use the default.
-  lambda::function<pid_t(const lambda::function<int()>&)> clone =
-    (_clone.isSome() ? _clone.get() : defaultClone);
-
-  // Currently we will block the child's execution of the new process
-  // until all the `parent_hooks` (if any) have executed.
-  std::array<int, 2> pipes;
-  const bool blocking = !parent_hooks.empty();
-
-  if (blocking) {
-    // We assume this should not fail under reasonable conditions so we
-    // use CHECK.
-    Try<std::array<int, 2>> pipe = os::pipe();
-    CHECK_SOME(pipe);
-
-    pipes = pipe.get();
-  }
-
-  // Now, clone the child process.
-  pid_t pid = clone(lambda::bind(
-      &childMain,
-      path,
-      _argv,
-      envp,
-      stdinfds,
-      stdoutfds,
-      stderrfds,
-      blocking,
-      pipes.data(),
-      child_hooks));
-
-  delete[] _argv;
-
-  // Need to delete 'envp' if we had environment variables passed to
-  // us and we needed to allocate the space.
-  if (environment.isSome()) {
-    CHECK_NE(os::raw::environment(), envp);
-
-    // We ignore the last 'envp' entry since it is nullptr.
-    for (size_t index = 0; index < environment->size(); index++) {
-      delete[] envp[index];
-    }
-
-    delete[] envp;
-  }
-
-  if (pid == -1) {
-    // Save the errno as 'close' below might overwrite it.
-    ErrnoError error("Failed to clone");
-    internal::close(stdinfds, stdoutfds, stderrfds);
-
-    if (blocking) {
-      os::close(pipes[0]);
-      os::close(pipes[1]);
-    }
-
-    return error;
-  }
-
-  // Close the child-ends of the file descriptors that are created by
-  // this function.
-  internal::close({stdinfds.read, stdoutfds.write, stderrfds.write});
-
-  if (blocking) {
-    os::close(pipes[0]);
-
-    // Run the parent hooks.
-    foreach (const Subprocess::ParentHook& hook, parent_hooks) {
-      Try<Nothing> parentSetup = hook.parent_setup(pid);
-
-      // If the hook callback fails, we shouldn't proceed with the
-      // execution and hence the child process should be killed.
-      if (parentSetup.isError()) {
-        LOG(WARNING)
-          << "Failed to execute Subprocess::ParentHook in parent for child '"
-          << pid << "': " << parentSetup.error();
-
-        os::close(pipes[1]);
-
-        // Ensure the child is killed.
-        ::kill(pid, SIGKILL);
-
-        return Error(
-            "Failed to execute Subprocess::ParentHook in parent for child '" +
-            stringify(pid) + "': " + parentSetup.error());
-      }
-    }
-
-    // Now that we've executed the parent hooks, we can signal the child to
-    // continue by writing to the pipe.
-    char dummy;
-    ssize_t length;
-    while ((length = ::write(pipes[1], &dummy, sizeof(dummy))) == -1 &&
-           errno == EINTR);
-
-    os::close(pipes[1]);
-
-    if (length != sizeof(dummy)) {
-      // Ensure the child is killed.
-      ::kill(pid, SIGKILL);
-
-      return Error("Failed to synchronize child process");
-    }
-  }
-
-  return pid;
-}
-
-}  // namespace internal {
-}  // namespace process {
-
-#endif // __PROCESS_POSIX_SUBPROCESS_HPP__

http://git-wip-us.apache.org/repos/asf/mesos/blob/c35293ef/3rdparty/libprocess/include/process/windows/subprocess.hpp
----------------------------------------------------------------------
diff --git a/3rdparty/libprocess/include/process/windows/subprocess.hpp b/3rdparty/libprocess/include/process/windows/subprocess.hpp
deleted file mode 100644
index 0183bb4..0000000
--- a/3rdparty/libprocess/include/process/windows/subprocess.hpp
+++ /dev/null
@@ -1,102 +0,0 @@
-// Licensed under the Apache License, Version 2.0 (the "License");
-// you may not use this file except in compliance with the License.
-// You may obtain a copy of the License at
-//
-//     http://www.apache.org/licenses/LICENSE-2.0
-//
-// Unless required by applicable law or agreed to in writing, software
-// distributed under the License is distributed on an "AS IS" BASIS,
-// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
-// See the License for the specific language governing permissions and
-// limitations under the License
-
-#ifndef __PROCESS_WINDOWS_SUBPROCESS_HPP__
-#define __PROCESS_WINDOWS_SUBPROCESS_HPP__
-
-#include <signal.h>
-
-#include <string>
-#include <tuple>
-
-#include <glog/logging.h>
-
-#include <process/subprocess.hpp>
-
-#include <stout/error.hpp>
-#include <stout/foreach.hpp>
-#include <stout/hashset.hpp>
-#include <stout/option.hpp>
-#include <stout/os.hpp>
-#include <stout/os/shell.hpp>
-#include <stout/try.hpp>
-#include <stout/windows.hpp>
-
-#include <stout/os/close.hpp>
-#include <stout/os/environment.hpp>
-
-#include <userEnv.h>
-
-namespace process {
-namespace internal {
-
-// NOTE: We are expecting that components of `argv` that need to be quoted
-// (for example, paths with spaces in them like `C:\"Program Files"\foo.exe`)
-// to have been already quoted correctly before we generate `command`.
-// Incorrectly-quoted command arguments will probably lead the child process
-// to terminate with an error. See also NOTE on `process::subprocess`.
-inline Try<::internal::windows::ProcessData> createChildProcess(
-    const std::string& path,
-    const std::vector<std::string>& argv,
-    const Option<std::map<std::string, std::string>>& environment,
-    const std::vector<Subprocess::ParentHook>& parent_hooks,
-    const InputFileDescriptors stdinfds,
-    const OutputFileDescriptors stdoutfds,
-    const OutputFileDescriptors stderrfds)
-{
-  Try<::internal::windows::ProcessData> process_data =
-    ::internal::windows::create_process(
-        path,
-        argv,
-        environment,
-        true, // Create suspended.
-        std::make_tuple(stdinfds.read, stdoutfds.write, stderrfds.write));
-
-  if (process_data.isError()) {
-    return process_data;
-  }
-
-  // Run the parent hooks.
-  const pid_t pid = process_data.get().pid;
-  foreach (const Subprocess::ParentHook& hook, parent_hooks) {
-    Try<Nothing> parentSetup = hook.parent_setup(pid);
-
-    // If the hook callback fails, we shouldn't proceed with the
-    // execution and hence the child process should be killed.
-    if (parentSetup.isError()) {
-      // Attempt to kill the process. Since it is still in suspended state, we
-      // do not need to kill any descendents. We also can't use `os::kill_job`
-      // because this process is not in a Job Object unless one of the parent
-      // hooks added it.
-      ::TerminateProcess(process_data.get().process_handle.get_handle(), 1);
-
-      return Error(
-          "Failed to execute Parent Hook in child '" + stringify(pid) +
-          "' with command '" + stringify(argv) + "': " +
-          parentSetup.error());
-    }
-  }
-
-  // Start child process.
-  if (::ResumeThread(process_data.get().thread_handle.get_handle()) == -1) {
-    return WindowsError(
-        "Failed to resume child process with command '" +
-        stringify(argv) + "'");
-  }
-
-  return process_data;
-}
-
-}  // namespace internal {
-}  // namespace process {
-
-#endif // __PROCESS_WINDOWS_SUBPROCESS_HPP__

http://git-wip-us.apache.org/repos/asf/mesos/blob/c35293ef/3rdparty/libprocess/src/subprocess.cpp
----------------------------------------------------------------------
diff --git a/3rdparty/libprocess/src/subprocess.cpp b/3rdparty/libprocess/src/subprocess.cpp
index 8e1a944..b65484c 100644
--- a/3rdparty/libprocess/src/subprocess.cpp
+++ b/3rdparty/libprocess/src/subprocess.cpp
@@ -32,12 +32,6 @@
 #include <process/reap.hpp>
 #include <process/subprocess.hpp>
 
-#ifdef __WINDOWS__
-#include <process/windows/subprocess.hpp>
-#else
-#include <process/posix/subprocess.hpp>
-#endif // __WINDOWS__
-
 #include <stout/error.hpp>
 #include <stout/lambda.hpp>
 #include <stout/foreach.hpp>
@@ -46,6 +40,12 @@
 #include <stout/strings.hpp>
 #include <stout/try.hpp>
 
+#ifdef __WINDOWS__
+#include "subprocess_windows.hpp"
+#else
+#include "subprocess_posix.hpp"
+#endif // __WINDOWS__
+
 using std::map;
 using std::string;
 using std::vector;

http://git-wip-us.apache.org/repos/asf/mesos/blob/c35293ef/3rdparty/libprocess/src/subprocess_posix.hpp
----------------------------------------------------------------------
diff --git a/3rdparty/libprocess/src/subprocess_posix.hpp b/3rdparty/libprocess/src/subprocess_posix.hpp
new file mode 100644
index 0000000..b478bec
--- /dev/null
+++ b/3rdparty/libprocess/src/subprocess_posix.hpp
@@ -0,0 +1,353 @@
+// Licensed under the Apache License, Version 2.0 (the "License");
+// you may not use this file except in compliance with the License.
+// You may obtain a copy of the License at
+//
+//     http://www.apache.org/licenses/LICENSE-2.0
+//
+// Unless required by applicable law or agreed to in writing, software
+// distributed under the License is distributed on an "AS IS" BASIS,
+// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+// See the License for the specific language governing permissions and
+// limitations under the License
+
+#ifndef __PROCESS_POSIX_SUBPROCESS_HPP__
+#define __PROCESS_POSIX_SUBPROCESS_HPP__
+
+#ifdef __linux__
+#include <sys/prctl.h>
+#endif // __linux__
+#include <sys/types.h>
+
+#include <string>
+
+#include <glog/logging.h>
+
+#include <process/subprocess.hpp>
+
+#include <stout/check.hpp>
+#include <stout/error.hpp>
+#include <stout/foreach.hpp>
+#include <stout/hashset.hpp>
+#include <stout/nothing.hpp>
+#include <stout/lambda.hpp>
+#include <stout/none.hpp>
+#include <stout/option.hpp>
+#include <stout/os.hpp>
+#include <stout/try.hpp>
+#include <stout/unreachable.hpp>
+
+#include <stout/os/close.hpp>
+#include <stout/os/environment.hpp>
+#include <stout/os/fcntl.hpp>
+#include <stout/os/signals.hpp>
+#include <stout/os/strerror.hpp>
+
+namespace process {
+namespace internal {
+
+static void close(std::initializer_list<int_fd> fds);
+
+
+static void close(
+    const Subprocess::IO::InputFileDescriptors& stdinfds,
+    const Subprocess::IO::OutputFileDescriptors& stdoutfds,
+    const Subprocess::IO::OutputFileDescriptors& stderrfds);
+
+
+inline pid_t defaultClone(const lambda::function<int()>& func)
+{
+  pid_t pid = ::fork();
+  if (pid == -1) {
+    return -1;
+  } else if (pid == 0) {
+    // Child.
+    ::exit(func());
+    UNREACHABLE();
+  } else {
+    // Parent.
+    return pid;
+  }
+}
+
+
+// This function will invoke `os::cloexec` on all specified file
+// descriptors that are valid (i.e., not `None` and >= 0).
+inline Try<Nothing> cloexec(
+    const InputFileDescriptors& stdinfds,
+    const OutputFileDescriptors& stdoutfds,
+    const OutputFileDescriptors& stderrfds)
+{
+  hashset<int> fds = {
+    stdinfds.read,
+    stdinfds.write.getOrElse(-1),
+    stdoutfds.read.getOrElse(-1),
+    stdoutfds.write,
+    stderrfds.read.getOrElse(-1),
+    stderrfds.write
+  };
+
+  foreach (int fd, fds) {
+    if (fd >= 0) {
+      Try<Nothing> cloexec = os::cloexec(fd);
+      if (cloexec.isError()) {
+        return Error(cloexec.error());
+      }
+    }
+  }
+
+  return Nothing();
+}
+
+
+// The main entry of the child process.
+//
+// NOTE: This function has to be async signal safe.
+inline int childMain(
+    const std::string& path,
+    char** argv,
+    char** envp,
+    const InputFileDescriptors& stdinfds,
+    const OutputFileDescriptors& stdoutfds,
+    const OutputFileDescriptors& stderrfds,
+    bool blocking,
+    int pipes[2],
+    const std::vector<Subprocess::ChildHook>& child_hooks)
+{
+  // Close parent's end of the pipes.
+  if (stdinfds.write.isSome()) {
+    ::close(stdinfds.write.get());
+  }
+  if (stdoutfds.read.isSome()) {
+    ::close(stdoutfds.read.get());
+  }
+  if (stderrfds.read.isSome()) {
+    ::close(stderrfds.read.get());
+  }
+
+  // Currently we will block the child's execution of the new process
+  // until all the parent hooks (if any) have executed.
+  if (blocking) {
+    ::close(pipes[1]);
+  }
+
+  // Redirect I/O for stdin/stdout/stderr.
+  while (::dup2(stdinfds.read, STDIN_FILENO) == -1 && errno == EINTR);
+  while (::dup2(stdoutfds.write, STDOUT_FILENO) == -1 && errno == EINTR);
+  while (::dup2(stderrfds.write, STDERR_FILENO) == -1 && errno == EINTR);
+
+  // Close the copies. We need to make sure that we do not close the
+  // file descriptor assigned to stdin/stdout/stderr in case the
+  // parent has closed stdin/stdout/stderr when calling this
+  // function (in that case, a dup'ed file descriptor may have the
+  // same file descriptor number as stdin/stdout/stderr).
+  //
+  // We also need to ensure that we don't "double close" any file
+  // descriptors in the case where one of stdinfds.read,
+  // stdoutfds.write, or stdoutfds.write are equal.
+  if (stdinfds.read != STDIN_FILENO &&
+      stdinfds.read != STDOUT_FILENO &&
+      stdinfds.read != STDERR_FILENO) {
+    ::close(stdinfds.read);
+  }
+  if (stdoutfds.write != STDIN_FILENO &&
+      stdoutfds.write != STDOUT_FILENO &&
+      stdoutfds.write != STDERR_FILENO &&
+      stdoutfds.write != stdinfds.read) {
+    ::close(stdoutfds.write);
+  }
+  if (stderrfds.write != STDIN_FILENO &&
+      stderrfds.write != STDOUT_FILENO &&
+      stderrfds.write != STDERR_FILENO &&
+      stderrfds.write != stdinfds.read &&
+      stderrfds.write != stdoutfds.write) {
+    ::close(stderrfds.write);
+  }
+
+  if (blocking) {
+    // Do a blocking read on the pipe until the parent signals us to
+    // continue.
+    char dummy;
+    ssize_t length;
+    while ((length = ::read(pipes[0], &dummy, sizeof(dummy))) == -1 &&
+          errno == EINTR);
+
+    if (length != sizeof(dummy)) {
+      ABORT("Failed to synchronize with parent");
+    }
+
+    // Now close the pipe as we don't need it anymore.
+    ::close(pipes[0]);
+  }
+
+  // Run the child hooks.
+  foreach (const Subprocess::ChildHook& hook, child_hooks) {
+    Try<Nothing> callback = hook();
+
+    // If the callback failed, we should abort execution.
+    if (callback.isError()) {
+      ABORT("Failed to execute Subprocess::ChildHook: " + callback.error());
+    }
+  }
+
+  os::execvpe(path.c_str(), argv, envp);
+
+  ABORT("Failed to os::execvpe on path '" + path + "': " + os::strerror(errno));
+}
+
+
+inline Try<pid_t> cloneChild(
+    const std::string& path,
+    std::vector<std::string> argv,
+    const Option<std::map<std::string, std::string>>& environment,
+    const Option<lambda::function<
+        pid_t(const lambda::function<int()>&)>>& _clone,
+    const std::vector<Subprocess::ParentHook>& parent_hooks,
+    const std::vector<Subprocess::ChildHook>& child_hooks,
+    const InputFileDescriptors stdinfds,
+    const OutputFileDescriptors stdoutfds,
+    const OutputFileDescriptors stderrfds)
+{
+  // The real arguments that will be passed to 'os::execvpe'. We need
+  // to construct them here before doing the clone as it might not be
+  // async signal safe to perform the memory allocation.
+  char** _argv = new char*[argv.size() + 1];
+  for (size_t i = 0; i < argv.size(); i++) {
+    _argv[i] = (char*) argv[i].c_str();
+  }
+  _argv[argv.size()] = nullptr;
+
+  // Like above, we need to construct the environment that we'll pass
+  // to 'os::execvpe' as it might not be async-safe to perform the
+  // memory allocations.
+  char** envp = os::raw::environment();
+
+  if (environment.isSome()) {
+    // NOTE: We add 1 to the size for a `nullptr` terminator.
+    envp = new char*[environment.get().size() + 1];
+
+    size_t index = 0;
+    foreachpair (
+        const std::string& key,
+        const std::string& value, environment.get()) {
+      std::string entry = key + "=" + value;
+      envp[index] = new char[entry.size() + 1];
+      strncpy(envp[index], entry.c_str(), entry.size() + 1);
+      ++index;
+    }
+
+    envp[index] = nullptr;
+  }
+
+  // Determine the function to clone the child process. If the user
+  // does not specify the clone function, we will use the default.
+  lambda::function<pid_t(const lambda::function<int()>&)> clone =
+    (_clone.isSome() ? _clone.get() : defaultClone);
+
+  // Currently we will block the child's execution of the new process
+  // until all the `parent_hooks` (if any) have executed.
+  std::array<int, 2> pipes;
+  const bool blocking = !parent_hooks.empty();
+
+  if (blocking) {
+    // We assume this should not fail under reasonable conditions so we
+    // use CHECK.
+    Try<std::array<int, 2>> pipe = os::pipe();
+    CHECK_SOME(pipe);
+
+    pipes = pipe.get();
+  }
+
+  // Now, clone the child process.
+  pid_t pid = clone(lambda::bind(
+      &childMain,
+      path,
+      _argv,
+      envp,
+      stdinfds,
+      stdoutfds,
+      stderrfds,
+      blocking,
+      pipes.data(),
+      child_hooks));
+
+  delete[] _argv;
+
+  // Need to delete 'envp' if we had environment variables passed to
+  // us and we needed to allocate the space.
+  if (environment.isSome()) {
+    CHECK_NE(os::raw::environment(), envp);
+
+    // We ignore the last 'envp' entry since it is nullptr.
+    for (size_t index = 0; index < environment->size(); index++) {
+      delete[] envp[index];
+    }
+
+    delete[] envp;
+  }
+
+  if (pid == -1) {
+    // Save the errno as 'close' below might overwrite it.
+    ErrnoError error("Failed to clone");
+    internal::close(stdinfds, stdoutfds, stderrfds);
+
+    if (blocking) {
+      os::close(pipes[0]);
+      os::close(pipes[1]);
+    }
+
+    return error;
+  }
+
+  // Close the child-ends of the file descriptors that are created by
+  // this function.
+  internal::close({stdinfds.read, stdoutfds.write, stderrfds.write});
+
+  if (blocking) {
+    os::close(pipes[0]);
+
+    // Run the parent hooks.
+    foreach (const Subprocess::ParentHook& hook, parent_hooks) {
+      Try<Nothing> parentSetup = hook.parent_setup(pid);
+
+      // If the hook callback fails, we shouldn't proceed with the
+      // execution and hence the child process should be killed.
+      if (parentSetup.isError()) {
+        LOG(WARNING)
+          << "Failed to execute Subprocess::ParentHook in parent for child '"
+          << pid << "': " << parentSetup.error();
+
+        os::close(pipes[1]);
+
+        // Ensure the child is killed.
+        ::kill(pid, SIGKILL);
+
+        return Error(
+            "Failed to execute Subprocess::ParentHook in parent for child '" +
+            stringify(pid) + "': " + parentSetup.error());
+      }
+    }
+
+    // Now that we've executed the parent hooks, we can signal the child to
+    // continue by writing to the pipe.
+    char dummy;
+    ssize_t length;
+    while ((length = ::write(pipes[1], &dummy, sizeof(dummy))) == -1 &&
+           errno == EINTR);
+
+    os::close(pipes[1]);
+
+    if (length != sizeof(dummy)) {
+      // Ensure the child is killed.
+      ::kill(pid, SIGKILL);
+
+      return Error("Failed to synchronize child process");
+    }
+  }
+
+  return pid;
+}
+
+}  // namespace internal {
+}  // namespace process {
+
+#endif // __PROCESS_POSIX_SUBPROCESS_HPP__

http://git-wip-us.apache.org/repos/asf/mesos/blob/c35293ef/3rdparty/libprocess/src/subprocess_windows.hpp
----------------------------------------------------------------------
diff --git a/3rdparty/libprocess/src/subprocess_windows.hpp b/3rdparty/libprocess/src/subprocess_windows.hpp
new file mode 100644
index 0000000..0183bb4
--- /dev/null
+++ b/3rdparty/libprocess/src/subprocess_windows.hpp
@@ -0,0 +1,102 @@
+// Licensed under the Apache License, Version 2.0 (the "License");
+// you may not use this file except in compliance with the License.
+// You may obtain a copy of the License at
+//
+//     http://www.apache.org/licenses/LICENSE-2.0
+//
+// Unless required by applicable law or agreed to in writing, software
+// distributed under the License is distributed on an "AS IS" BASIS,
+// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+// See the License for the specific language governing permissions and
+// limitations under the License
+
+#ifndef __PROCESS_WINDOWS_SUBPROCESS_HPP__
+#define __PROCESS_WINDOWS_SUBPROCESS_HPP__
+
+#include <signal.h>
+
+#include <string>
+#include <tuple>
+
+#include <glog/logging.h>
+
+#include <process/subprocess.hpp>
+
+#include <stout/error.hpp>
+#include <stout/foreach.hpp>
+#include <stout/hashset.hpp>
+#include <stout/option.hpp>
+#include <stout/os.hpp>
+#include <stout/os/shell.hpp>
+#include <stout/try.hpp>
+#include <stout/windows.hpp>
+
+#include <stout/os/close.hpp>
+#include <stout/os/environment.hpp>
+
+#include <userEnv.h>
+
+namespace process {
+namespace internal {
+
+// NOTE: We are expecting that components of `argv` that need to be quoted
+// (for example, paths with spaces in them like `C:\"Program Files"\foo.exe`)
+// to have been already quoted correctly before we generate `command`.
+// Incorrectly-quoted command arguments will probably lead the child process
+// to terminate with an error. See also NOTE on `process::subprocess`.
+inline Try<::internal::windows::ProcessData> createChildProcess(
+    const std::string& path,
+    const std::vector<std::string>& argv,
+    const Option<std::map<std::string, std::string>>& environment,
+    const std::vector<Subprocess::ParentHook>& parent_hooks,
+    const InputFileDescriptors stdinfds,
+    const OutputFileDescriptors stdoutfds,
+    const OutputFileDescriptors stderrfds)
+{
+  Try<::internal::windows::ProcessData> process_data =
+    ::internal::windows::create_process(
+        path,
+        argv,
+        environment,
+        true, // Create suspended.
+        std::make_tuple(stdinfds.read, stdoutfds.write, stderrfds.write));
+
+  if (process_data.isError()) {
+    return process_data;
+  }
+
+  // Run the parent hooks.
+  const pid_t pid = process_data.get().pid;
+  foreach (const Subprocess::ParentHook& hook, parent_hooks) {
+    Try<Nothing> parentSetup = hook.parent_setup(pid);
+
+    // If the hook callback fails, we shouldn't proceed with the
+    // execution and hence the child process should be killed.
+    if (parentSetup.isError()) {
+      // Attempt to kill the process. Since it is still in suspended state, we
+      // do not need to kill any descendents. We also can't use `os::kill_job`
+      // because this process is not in a Job Object unless one of the parent
+      // hooks added it.
+      ::TerminateProcess(process_data.get().process_handle.get_handle(), 1);
+
+      return Error(
+          "Failed to execute Parent Hook in child '" + stringify(pid) +
+          "' with command '" + stringify(argv) + "': " +
+          parentSetup.error());
+    }
+  }
+
+  // Start child process.
+  if (::ResumeThread(process_data.get().thread_handle.get_handle()) == -1) {
+    return WindowsError(
+        "Failed to resume child process with command '" +
+        stringify(argv) + "'");
+  }
+
+  return process_data;
+}
+
+}  // namespace internal {
+}  // namespace process {
+
+#endif // __PROCESS_WINDOWS_SUBPROCESS_HPP__