Return to site

Launchd Editor

broken image


  1. Launchd Editor Mac
  2. Launchd Editor Software

A launchd.plist editor. Launchd is a powerful and flexible replacement for cron, but writing the plist files for it by hand can be difficult. This app makes it easier. Without crontabs, the only way that your Mac is going to run scheduled commands is under launchd. Instead of crontab entries, launchd relies on XML property lists (.plist files) which are placed in standard locations: /Library/LaunchAgents for user agents provided by the user, /Library/LaunchAgents for user agents provided by the.

  • Get the most out of Launchpad! Delete, Rearrange, Group or Ungroup any of your Launchpad Icons, or simply put them into alphabetical order!
  • Free download Launchd Editor Launchd Editor for Mac OS X. Launchd Editor - After Tiger came out I heard about this new process that replaced cron, at, watchdog, init, startup items, and a.

OS X may seem inordinately complicated, to the point where it all becomes a meaningless blur, but it really boils down to two major components: the kernel, and launchd. The kernel is the heart, vital to everything, and its failure is catastrophe. Kernel extensions (KEXTs) extend its functionality to operate hardware beyond the essential core.

The kernel cannot, though, do much else, for which it looks to launchd, the first task to run outside the kernel and always with the process ID of 1. launchd then gets everything else loaded up and running, from services which have to be started each time that OS X starts up, to those routine housekeeping functions which run in the middle of the night. If the kernel is the heart, then surely launchd is its brain.

If you want to get a quick idea of how much launchd is responsible for, you can use its control and admin tool launchctl to list all the tasks which it is currently managing, with the command
launchctl print-cache
which will generate a huge list of all sorts of things that you didn't know that your Mac was up to.

launchd is a relatively recent innovation in OS X: it was not there in the first release, not appearing until OS X 10.4 (Tiger). Designed and written by Dave Zarzycki, its beauty lies in bringing together, into a single service, all the things that several other services did. The most prominent of those is the standard Unix service for running scheduled commands, cron. Although OS X still has cron and can still run timed events with it, it does so thanks to launchd.

cron

If you wanted to back your Home folder up to a networked file server at 2300 every weeknight, for example, in traditional Unix you would write an entry in your crontab, a table which acts as the timetable for such events. The diehard Unix wizard can still do that in OS X, but Apple discourages you from doing so. At some stages during the introduction of launchd, the cron service, inevitably known as crond, became extremely unreliable, forcing users to migrate to launchd.

Chances are that nothing on your Mac now uses the old, deprecated cron system with crontabs. You can check by looking for its crontabs, located in /etc/crontab or /usr/lib/cron/tabs. Because the latter are protected (they are user-specific), the best way to check on these is with the commands
ls -la /etc/crontabs
which will almost certainly return No such file or directory
and
sudo ls -la /usr/lib/cron/tabs/username
where username is your short user name, and should return an empty folder.

Without crontabs, the only way that your Mac is going to run scheduled commands is under launchd.

launchd

Instead of crontab entries, launchd relies on XML property lists (.plist files) which are placed in standard locations:

  • ~/Library/LaunchAgents for user agents provided by the user,
  • /Library/LaunchAgents for user agents provided by the administrator,
  • /Library/LaunchDaemons for system-wide daemons provided by the administrator,
  • /System/Library/LaunchAgents for user agents provided by Apple,
  • /System/Library/LaunchDaemons for system-wide daemons provided by Apple.

It is easy to remember which is which: if they're in either of the folders in /System/Library/, they should now be part of OS X, and protected by SIP, so that you cannot tamper with them. If they're in either of the folders in /Library, then they will run for all users, and typically support apps, hardware, and other services which are accessible to all users. If they're in ~/Library/LaunchAgents they are specific to that user alone.

The differences between daemons and agents can appear subtle, but there is one which is decisive: daemons cannot display any sort of user interface, or interact directly with your login session; if the service or action needs an interface or interaction, then it should go into one of the LaunchAgents folders.

Adding and controlling agents and daemons

There are three ways that you can create and add a new agent/daemon, or modify the settings of an existing one. If you want to do this on a temporary basis, and enjoy using the command line, then the shell command launchctl provides a complete set of commands for doing that. And the best of luck to you – it is not at all easy.

In most cases, you will want any changes to persist into the future. In that case, you will need to create a new XML property list and install it into the appropriate folder, or edit an existing one. Although this is not as tough as using launchctl, you will need to be comfortable editing property lists, and study Apple's documentation for these particular files.

By far the best way of adding to or tweaking the property lists is using Peter Borg's excellent Lingon X. This comes in two different versions: that offered in the App Store has limited functionality because of the constraints placed on App Store apps. It is perfectly suitable for creating your own periodic tasks, but if you want full access to its power you will need to purchase the unlimited version of Lingon X from here.

A service which runs every day might be set up like this Adobe service. Each time that my Mac starts up, and every twenty-four hours afterwards, this will automatically run the background service named AGSService. You could configure a similar service to synchronise the contents of a working documents folder with that on a file server, for example, in the same way. Instead of using a repeat interval like this, you could set a fixed time each day, perhaps.

The launchctl/launchd system allows more advanced options too, which you can also edit easily using Lingon. Most common among these are the bottom two, which set the paths for normal and error output.

So long as you are working with a small number of daemons/agents, launchd is not that complex, and certainly not difficult to use. It can get messier when you need to know about other tasks. One example of this is when your Mac starts crashing or freezing at 0200 every morning, but the logs provide insufficient information to identify what has caused the problem – something that I have recently experienced.

Trying to use launchctl to list all tasks is futile: for a start you'd never find that needle in its haystack, and in any case if the service is only run at 0200, you won't find it there now. A better solution is to browse those property list files, either in the Finder or using Lingon, until you identify which is configured to run then. You could then disable it, and see whether that made the problem vanish too.

Further information

launchd, launchctl, cron, and crontabs are fully documented in their man files. The best overall guide to launchd is at launchd.info, which explains how to make your own property list files and much more.

If you are developing daemons to run on OS X, it is highly recommended that you design your daemons to be launchd compliant. Using launchd provides better performance and flexibility for daemons. It also improves the ability of administrators to manage the daemons running on a given system.

If you are running per-user background processes for OS X, launchd is also the preferred way to start these processes. These per-user processes are referred to as user agents. A user agent is essentially identical to a daemon, but is specific to a given logged-in user and executes only while that user is logged in.

Unless otherwise noted, for the purposes of this chapter, the terms 'daemon' and 'agent' can be used interchangeably. Thus, the term 'daemon' is used generically in this section to encompass both system-level daemons and user agents except where otherwise noted.

There are four ways to launch daemons using launchd. The preferred method is on-demand launching, but launchd can launch daemons that run continuously, and can replace inetdfor launching inetd-style daemons. In addition, launchd can start jobs at timed intervals.

Although launchd supports non-launch-on-demand daemons, this use is not recommended. The launchd daemon was designed to remove the need for dependency ordering among daemons. If you do not make your daemon be launched on demand, you will have to handle these dependencies in another way, such as by using the legacy startup item mechanism.

Launching Custom Daemons Using launchd

With the introduction of launchd in OS X v10.4, an effort was made to improve the steps needed to launch and maintain daemons. What launchd provides is a harness for launching your daemon as needed. To client programs, the port representing your daemon's service is always available and ready to handle requests. In reality, the daemon may or may not be running. When a client sends a request to the port, launchd may have to launch the daemon so that it can handle the request. Once launched, the daemon can continue running or shut itself down to free up the memory and resources it holds. If a daemon shuts itself down, launchd once again relaunches it as needed to process requests.

In addition to the launch-on-demand feature, launchd provides the following benefits to daemon developers:

  • Simplifies the process of making a daemon by handling many of the standard housekeeping chores normally associated with launching a daemon.

  • Provides system administrators with a central place to manage daemons on the system.

  • Supports inetd-style daemons.

  • Eliminates the primary reason for running daemons as root. Because launchd runs as root, it can create low-numbered TCP/IP listen sockets and hand them off to the daemon.

  • Simplifies error handling and dependency management for inter-daemon communication. Because daemons launch on demand, communication requests do not fail if the daemon is not launched. They are simply delayed until the daemon can launch and process them.

The launchd Startup Process

After the system is booted and the kernel is running, launchd is run to finish the system initialization. As part of that initialization, it goes through the following steps:

  1. It loads the parameters for each launch-on-demand system-level daemon from the property list files found in /System/Library/LaunchDaemons/ and /Library/LaunchDaemons/.

  2. It registers the sockets and file descriptors requested by those daemons.

  3. It launches any daemons that requested to be running all the time.

  4. As requests for a particular service arrive, it launches the corresponding daemon and passes the request to it.

  5. When the system shuts down, it sends a SIGTERM signal to all of the daemons that it started.

The process for per-user agents is similar. When a user logs in, a per-user launchd is started. It does the following:

  1. It loads the parameters for each launch-on-demand user agent from the property list files found in /System/Library/LaunchAgents, /Library/LaunchAgents, and the user's individual Library/LaunchAgents directory.

  2. It registers the sockets and file descriptors requested by those user agents.

  3. It launches any user agents that requested to be running all the time.

  4. As requests for a particular service arrive, it launches the corresponding user agent and passes the request to it.

  5. When the user logs out, it sends a SIGTERM signal to all of the user agents that it started.

Because launchd registers the sockets and file descriptors used by all daemons before it launches any of them, daemons can be launched in any order. If a request comes in for a daemon that is not yet running, the requesting process is suspended until the target daemon finishes launching and responds.

If a daemon does not receive any requests over a specific period of time, it can choose to shut itself down and release the resources it holds. When this happens, launchd monitors the shutdown and makes a note to launch the daemon again when future requests arrive.

Important: If your daemon shuts down too quickly after being launched, launchd may think it has crashed. Daemons that continue this behavior may be suspended and not launched again when future requests arrive. To avoid this behavior, do not shut down for at least 10 seconds after launch.

Creating a launchd Property List File

To run under launchd, you must provide a configuration property list file for your daemon. This file contains information about your daemon, including the list of sockets or file descriptors it uses to process requests. Specifying this information in a property list file lets launchd register the corresponding file descriptors and launch your daemon only after a request arrives for your daemon's services. Table 5-1 lists the required and recommended keys for all daemons.

The property list file is structured the same for both daemons and agents. You indicate whether it describes a daemon or agent by the directory you place it in. Property list files describing daemons are installed in /Library/LaunchDaemons, and those describing agents are installed in /Library/LaunchAgents or in the LaunchAgents subdirectory of an individual user's Library directory. (The appropriate location for executables that you launch from your job is /usr/local/libexec.)

Table 5-1 Required and recommended property list keys

Key

Description

Label

Contains a unique string that identifies your daemon to launchd. (required)

ProgramArguments

Contains the arguments used to launch your daemon. (required)

inetdCompatibility

Indicates that your daemon requires a separate instance per incoming connection. This causes launchd to behave like inetd, passing each daemon a single socket that is already connected to the incoming client. (required if your daemon was designed to be launched by inetd; otherwise, must not be included)

KeepAlive

This key specifies whether your daemon launches on-demand or must always be running. It is recommended that you design your daemon to be launched on-demand.

Iscrapbook 7 0 1. For more information: For a complete listing of the keys, see the launchd.plist manual page.

For sample configuration property lists, look at the files in /System/Library/LaunchDaemons/. These files are used to configure many daemons that run on OS X.

Writing a 'Hello World!' launchd Job

The following simple example launches a daemon named hello, passing world as a single argument, and instructs launchd to keep the job running:

In this example, there are three keys in the top level dictionary. The first is Label, which uniquely identifies the job. when. The second is ProgramArguments which has a value of an array of strings which represent the tokenized arguments and the program to run. The third and final key is KeepAlive which indicates that this job needs to be running at all times, rather than the default launch-on-demand behavior, so launchd should always try to keep this job running.

Launchd Editor Mac

Listening on Sockets

You can also include other keys in your configuration property list file. For example, if your daemon monitors a well-known port (one of the ports listed in /etc/services), add a Sockets entry as follows:

The string for SockServiceName typically comes from the leftmost column in /etc/services. The SockType is one of dgram (UDP) or stream (TCP/IP). If you need to pass a port number that is not listed in the well-known ports list, the format is the same, except the string contains a number instead of a name. For example:

Debugging launchd Jobs

There are some options that are useful for debugging your launchd job.

The following example enables core dumps, sets standard out and error to go to a log file, and instructs launchd to temporarily increase the debug level of its logging while acting on behalf of your job (remember to adjust your syslog.conf accordingly):

Running a Job Periodically

The following example creates a job that is run every five minutes (300 seconds):

Alternately, you can specify a calendar-based interval. The following example starts the job on the 7th day of every month at 13:45 (1:45 pm). Like the Unix cron subsystem, any missing key of the StartCalendarInterval dictionary is treated as a wildcard—in this case, the month is omitted, so the job is run every month.

Monitoring a Directory

The following example starts the job whenever any of the paths being watched have changed:

Launchd Editor Software

An additional file system trigger is the notion of a queue directory. The launchd daemon starts your job whenever the given directories are non-empty, and it keeps your job running as long as those directories are not empty:

Emulating inetd

The launchd daemon emulates the older inetd-style daemon semantics if you provide the inetdCompatibility key:

Behavior for Processes Managed by launchd

Processes that are managed by launchd must follow certain requirements so that they interact properly with launchd. This includes launch daemons and launch agents.

Required Behaviors

To support launchd, you must obey the following guidelines when writing your daemon code:

  • You must provide a property list with some basic launch-on-demand criteria for your daemon. See Creating a launchd Property List File.

  • You must not daemonize your process. This includes calling the daemon function, calling fork followed by exec, or calling fork followed by exit. If you do, launchd thinks your process has died. Depending on your property list key settings, launchd will either keep trying to relaunch your process until it gives up (with a 'respawning too fast' error message) or will be unable to restart it if it really does die.

  • Daemons and agents that are installed globally must be owned by the root user. Agents installed for the current user must be owned by that user. All daemons and agents must not be group writable or world writable. (That is, they must have file mode set to 600 or 400.)

Recommended Behaviors

To support launchd, it is recommended that you obey the following guidelines when writing your daemon code:

Launchd Editor
  • Wait until your daemon is fully initialized before attempting to process requests. Your daemon should always provide a reasonable response (rather than an error) when processing requests.

  • Register the sockets and file descriptors used by your daemon in your launchd configuration property list file.

  • If your daemon advertises a socket, check in with launchd as part of your daemon initialization. For an example implementation of the check-in process, see SampleD.

  • During check-in, get the launch dictionary from launchd, extract and store its contents, and then discard the dictionary. Accessing the data structure used for the dictionary is very slow, so storing the whole dictionary locally and accessing it frequently could hurt performance.

  • Provide a handler to catch the SIGTERM signal.

In addition to the preceding list, the following is a list of things it is recommended you avoid in your code:

  • Do not set the user or group ID for your daemon. Include the UserName, UID, GroupName, or GID keys in your daemon's configuration property list instead.

  • Do not set the working directory. Include the WorkingDirectory key in your daemon's configuration property list instead.

  • Do not call chroot to change the root directory. Include the RootDirectory key in your daemon's configuration property list instead.

  • Do not call setsid to create a new session.

  • Do not close any stray file descriptors.

  • Do not change stdio to point to /dev/null. Include the StandardOutPath or StandardErrorPath keys in your daemon's configuration property list file instead.

  • Do not set up resource limits with setrusage.

  • Do not set the daemon priority with setpriority

Although many of the preceding behaviors may be standard tasks for daemons to perform, they are not recommended when running under launchd. The reason is that launchd configures the operating environment for the daemons that it manages. Changing this environment could interfere with the normal operation of your daemon.

Deciding When to Shut Down

If you do not expect your daemon to handle many requests, you might want to shut it down after a predetermined amount of idle time, rather than continue running. Although a well-written daemon does not consume any CPU resources when idle, it still consumes memory and could be paged out during periods of intense memory use.

The timing of when to shut down is different for each daemon and depends on several factors, including:

  • The number and frequency of requests it receives

  • The time it takes to launch the daemon

  • The time it takes to shut down the daemon

  • The need to retain state information

If your daemon does not receive frequent requests and can be launched and shut down quickly, you might prefer to shut it down rather than wait for it to be paged out to disk. Paging memory to disk, and subsequently reading it back, incurs two disk operations. If you do not need the data stored in memory, your daemon can shut down and avoid the step of writing memory to disk.

Special Dependencies

While launchd takes care of dependencies between daemons, in some cases, your daemon may depend on other system functionality that cannot be addressed in this manner. This section describes many of these special cases and how to handle them.

Network Availability

If your daemon depends on the network being available, this cannot be handled with dependencies because network interfaces can come and go at any time in OS X. To solve this problem, you should use the network reachability functionality or the dynamic store functionality in the System Configuration framework. This is documented in System Configuration Programming Guidelines and System Configuration Framework Reference. For more information about network reachability, see Determining Reachability and Getting Connected in System Configuration Programming Guidelines.

Disk or Server Availability

If your daemon depends on the availability of a mounted volume (whether local or remote), you can determine the status of that volume using the Disk Arbitration framework. This is documented in Disk Arbitration Framework Reference.

Non-launchd Daemons

If your daemon has a dependency on a non-launchd daemon, you must take additional care to ensure that your daemon works correctly if that non-launchd daemon has not started when your daemon is started. The best way to do this is to include a loop at start time that checks to see if the non-launchd daemon is running, and if not, sleeps for several seconds before checking again.

Be sure to set up handlers for SIGTERM prior to this loop to ensure that you are able to properly shut down if the daemon you rely on never becomes available.

User Logins

In general, a daemon should not care whether a user is logged in, and user agents should be used to provide per-user functionality. However, in some cases, this may be useful.

To determine what user is logged in at the console, you can use the System Configuration framework, as described in Technical Q&A QA1133.

Kernel Extensions

If your daemon requires that a certain kernel extension be loaded prior to executing, you have two options: load it yourself, or wait for it to be loaded.

The daemon may manually request that an extension be loaded. To do this, run kextload with the appropriate arguments using exec or variants thereof. I/O Kit kernel extensions should not be loaded with kextload; the I/O Kit will load them automatically when they are needed.

Note: The kextload executable must be run as root in order to load extensions into the kernel. For security reasons, it is not a setuid executable. This means that your daemon must either be running as the root user or must include a helper binary that is setuid root in order to use kextload to load a kernel extension.

Alternatively, our daemon may wait for a kernel service to be available. To do this, you should first register for service change notification. This is further documented in I/O Kit Framework Reference.

After registering for these notifications, you should check to see if the service is already available. By doing this after registering for notifications, you avoid waiting forever if the service becomes available between checking for availability and registering for the notification.

Note: In order for your kernel extension to be detected in a useful way, it must publish a node in the I/O registry to advertise the availability of its service. For I/O Kit drivers, this is usually handled by the I/O Kit family.

For other kernel extensions, you must explicitly register the service by publishing a nub, which must be an instance of IOService.

For more information about I/O Kit services and matching, see IOKit Fundamentals, I/O Kit Framework Reference (user space reference), and Kernel Framework Reference (kernel space reference).

For More Information

The manual pages for launchd and launchd.plist are the two best sources for information about launchd.

In addition, you can find a source daemon accompanying the launchd source code (available from http://www.macosforge.org/). This daemon is also provided from the Mac Developer Library as the SampleD sample code project.

The Daemons and Agents technical note provides additional information about how launchd daemons and agents work under the hood.

Finally, many Apple-provided daemons support launchd. Their property list files can be found in /System/Library/LaunchDaemons. Some of these daemons are also available as open source from http://www.opensource.apple.com/ or http://www.macosforge.org/.



Copyright © 2003, 2016 Apple Inc. All Rights Reserved. Terms of Use | Privacy Policy | Updated: 2016-09-13





broken image