]> git.ipfire.org Git - thirdparty/systemd.git/blob - src/journal-remote/journal-upload.c
Merge pull request #2589 from keszybz/resolve-tool-2
[thirdparty/systemd.git] / src / journal-remote / journal-upload.c
1 /***
2 This file is part of systemd.
3
4 Copyright 2014 Zbigniew Jędrzejewski-Szmek
5
6 systemd is free software; you can redistribute it and/or modify it
7 under the terms of the GNU Lesser General Public License as published by
8 the Free Software Foundation; either version 2.1 of the License, or
9 (at your option) any later version.
10
11 systemd is distributed in the hope that it will be useful, but
12 WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 Lesser General Public License for more details.
15
16 You should have received a copy of the GNU Lesser General Public License
17 along with systemd; If not, see <http://www.gnu.org/licenses/>.
18 ***/
19
20 #include <curl/curl.h>
21 #include <fcntl.h>
22 #include <getopt.h>
23 #include <stdio.h>
24 #include <sys/stat.h>
25
26 #include "sd-daemon.h"
27
28 #include "alloc-util.h"
29 #include "conf-parser.h"
30 #include "def.h"
31 #include "fd-util.h"
32 #include "fileio.h"
33 #include "formats-util.h"
34 #include "glob-util.h"
35 #include "journal-upload.h"
36 #include "log.h"
37 #include "mkdir.h"
38 #include "parse-util.h"
39 #include "sigbus.h"
40 #include "signal-util.h"
41 #include "string-util.h"
42 #include "util.h"
43
44 #define PRIV_KEY_FILE CERTIFICATE_ROOT "/private/journal-upload.pem"
45 #define CERT_FILE CERTIFICATE_ROOT "/certs/journal-upload.pem"
46 #define TRUST_FILE CERTIFICATE_ROOT "/ca/trusted.pem"
47 #define DEFAULT_PORT 19532
48
49 static const char* arg_url = NULL;
50 static const char *arg_key = NULL;
51 static const char *arg_cert = NULL;
52 static const char *arg_trust = NULL;
53 static const char *arg_directory = NULL;
54 static char **arg_file = NULL;
55 static const char *arg_cursor = NULL;
56 static bool arg_after_cursor = false;
57 static int arg_journal_type = 0;
58 static const char *arg_machine = NULL;
59 static bool arg_merge = false;
60 static int arg_follow = -1;
61 static const char *arg_save_state = NULL;
62
63 static void close_fd_input(Uploader *u);
64
65 #define SERVER_ANSWER_KEEP 2048
66
67 #define STATE_FILE "/var/lib/systemd/journal-upload/state"
68
69 #define easy_setopt(curl, opt, value, level, cmd) \
70 do { \
71 code = curl_easy_setopt(curl, opt, value); \
72 if (code) { \
73 log_full(level, \
74 "curl_easy_setopt " #opt " failed: %s", \
75 curl_easy_strerror(code)); \
76 cmd; \
77 } \
78 } while(0)
79
80 static size_t output_callback(char *buf,
81 size_t size,
82 size_t nmemb,
83 void *userp) {
84 Uploader *u = userp;
85
86 assert(u);
87
88 log_debug("The server answers (%zu bytes): %.*s",
89 size*nmemb, (int)(size*nmemb), buf);
90
91 if (nmemb && !u->answer) {
92 u->answer = strndup(buf, size*nmemb);
93 if (!u->answer)
94 log_warning_errno(ENOMEM, "Failed to store server answer (%zu bytes): %m",
95 size*nmemb);
96 }
97
98 return size * nmemb;
99 }
100
101 static int check_cursor_updating(Uploader *u) {
102 _cleanup_free_ char *temp_path = NULL;
103 _cleanup_fclose_ FILE *f = NULL;
104 int r;
105
106 if (!u->state_file)
107 return 0;
108
109 r = mkdir_parents(u->state_file, 0755);
110 if (r < 0)
111 return log_error_errno(r, "Cannot create parent directory of state file %s: %m",
112 u->state_file);
113
114 r = fopen_temporary(u->state_file, &f, &temp_path);
115 if (r < 0)
116 return log_error_errno(r, "Cannot save state to %s: %m",
117 u->state_file);
118 unlink(temp_path);
119
120 return 0;
121 }
122
123 static int update_cursor_state(Uploader *u) {
124 _cleanup_free_ char *temp_path = NULL;
125 _cleanup_fclose_ FILE *f = NULL;
126 int r;
127
128 if (!u->state_file || !u->last_cursor)
129 return 0;
130
131 r = fopen_temporary(u->state_file, &f, &temp_path);
132 if (r < 0)
133 goto fail;
134
135 fprintf(f,
136 "# This is private data. Do not parse.\n"
137 "LAST_CURSOR=%s\n",
138 u->last_cursor);
139
140 r = fflush_and_check(f);
141 if (r < 0)
142 goto fail;
143
144 if (rename(temp_path, u->state_file) < 0) {
145 r = -errno;
146 goto fail;
147 }
148
149 return 0;
150
151 fail:
152 if (temp_path)
153 (void) unlink(temp_path);
154
155 (void) unlink(u->state_file);
156
157 return log_error_errno(r, "Failed to save state %s: %m", u->state_file);
158 }
159
160 static int load_cursor_state(Uploader *u) {
161 int r;
162
163 if (!u->state_file)
164 return 0;
165
166 r = parse_env_file(u->state_file, NEWLINE,
167 "LAST_CURSOR", &u->last_cursor,
168 NULL);
169
170 if (r == -ENOENT)
171 log_debug("State file %s is not present.", u->state_file);
172 else if (r < 0)
173 return log_error_errno(r, "Failed to read state file %s: %m",
174 u->state_file);
175 else
176 log_debug("Last cursor was %s", u->last_cursor);
177
178 return 0;
179 }
180
181
182
183 int start_upload(Uploader *u,
184 size_t (*input_callback)(void *ptr,
185 size_t size,
186 size_t nmemb,
187 void *userdata),
188 void *data) {
189 CURLcode code;
190
191 assert(u);
192 assert(input_callback);
193
194 if (!u->header) {
195 struct curl_slist *h;
196
197 h = curl_slist_append(NULL, "Content-Type: application/vnd.fdo.journal");
198 if (!h)
199 return log_oom();
200
201 h = curl_slist_append(h, "Transfer-Encoding: chunked");
202 if (!h) {
203 curl_slist_free_all(h);
204 return log_oom();
205 }
206
207 h = curl_slist_append(h, "Accept: text/plain");
208 if (!h) {
209 curl_slist_free_all(h);
210 return log_oom();
211 }
212
213 u->header = h;
214 }
215
216 if (!u->easy) {
217 CURL *curl;
218
219 curl = curl_easy_init();
220 if (!curl) {
221 log_error("Call to curl_easy_init failed.");
222 return -ENOSR;
223 }
224
225 /* tell it to POST to the URL */
226 easy_setopt(curl, CURLOPT_POST, 1L,
227 LOG_ERR, return -EXFULL);
228
229 easy_setopt(curl, CURLOPT_ERRORBUFFER, u->error,
230 LOG_ERR, return -EXFULL);
231
232 /* set where to write to */
233 easy_setopt(curl, CURLOPT_WRITEFUNCTION, output_callback,
234 LOG_ERR, return -EXFULL);
235
236 easy_setopt(curl, CURLOPT_WRITEDATA, data,
237 LOG_ERR, return -EXFULL);
238
239 /* set where to read from */
240 easy_setopt(curl, CURLOPT_READFUNCTION, input_callback,
241 LOG_ERR, return -EXFULL);
242
243 easy_setopt(curl, CURLOPT_READDATA, data,
244 LOG_ERR, return -EXFULL);
245
246 /* use our special own mime type and chunked transfer */
247 easy_setopt(curl, CURLOPT_HTTPHEADER, u->header,
248 LOG_ERR, return -EXFULL);
249
250 if (_unlikely_(log_get_max_level() >= LOG_DEBUG))
251 /* enable verbose for easier tracing */
252 easy_setopt(curl, CURLOPT_VERBOSE, 1L, LOG_WARNING, );
253
254 easy_setopt(curl, CURLOPT_USERAGENT,
255 "systemd-journal-upload " PACKAGE_STRING,
256 LOG_WARNING, );
257
258 if (arg_key || startswith(u->url, "https://")) {
259 easy_setopt(curl, CURLOPT_SSLKEY, arg_key ?: PRIV_KEY_FILE,
260 LOG_ERR, return -EXFULL);
261 easy_setopt(curl, CURLOPT_SSLCERT, arg_cert ?: CERT_FILE,
262 LOG_ERR, return -EXFULL);
263 }
264
265 if (streq_ptr(arg_trust, "all"))
266 easy_setopt(curl, CURLOPT_SSL_VERIFYPEER, 0,
267 LOG_ERR, return -EUCLEAN);
268 else if (arg_trust || startswith(u->url, "https://"))
269 easy_setopt(curl, CURLOPT_CAINFO, arg_trust ?: TRUST_FILE,
270 LOG_ERR, return -EXFULL);
271
272 if (arg_key || arg_trust)
273 easy_setopt(curl, CURLOPT_SSLVERSION, CURL_SSLVERSION_TLSv1,
274 LOG_WARNING, );
275
276 u->easy = curl;
277 } else {
278 /* truncate the potential old error message */
279 u->error[0] = '\0';
280
281 free(u->answer);
282 u->answer = 0;
283 }
284
285 /* upload to this place */
286 code = curl_easy_setopt(u->easy, CURLOPT_URL, u->url);
287 if (code) {
288 log_error("curl_easy_setopt CURLOPT_URL failed: %s",
289 curl_easy_strerror(code));
290 return -EXFULL;
291 }
292
293 u->uploading = true;
294
295 return 0;
296 }
297
298 static size_t fd_input_callback(void *buf, size_t size, size_t nmemb, void *userp) {
299 Uploader *u = userp;
300
301 ssize_t r;
302
303 assert(u);
304 assert(nmemb <= SSIZE_MAX / size);
305
306 if (u->input < 0)
307 return 0;
308
309 r = read(u->input, buf, size * nmemb);
310 log_debug("%s: allowed %zu, read %zd", __func__, size*nmemb, r);
311
312 if (r > 0)
313 return r;
314
315 u->uploading = false;
316 if (r == 0) {
317 log_debug("Reached EOF");
318 close_fd_input(u);
319 return 0;
320 } else {
321 log_error_errno(errno, "Aborting transfer after read error on input: %m.");
322 return CURL_READFUNC_ABORT;
323 }
324 }
325
326 static void close_fd_input(Uploader *u) {
327 assert(u);
328
329 if (u->input >= 0)
330 close_nointr(u->input);
331 u->input = -1;
332 u->timeout = 0;
333 }
334
335 static int dispatch_fd_input(sd_event_source *event,
336 int fd,
337 uint32_t revents,
338 void *userp) {
339 Uploader *u = userp;
340
341 assert(u);
342 assert(fd >= 0);
343
344 if (revents & EPOLLHUP) {
345 log_debug("Received HUP");
346 close_fd_input(u);
347 return 0;
348 }
349
350 if (!(revents & EPOLLIN)) {
351 log_warning("Unexpected poll event %"PRIu32".", revents);
352 return -EINVAL;
353 }
354
355 if (u->uploading) {
356 log_warning("dispatch_fd_input called when uploading, ignoring.");
357 return 0;
358 }
359
360 return start_upload(u, fd_input_callback, u);
361 }
362
363 static int open_file_for_upload(Uploader *u, const char *filename) {
364 int fd, r = 0;
365
366 if (streq(filename, "-"))
367 fd = STDIN_FILENO;
368 else {
369 fd = open(filename, O_RDONLY|O_CLOEXEC|O_NOCTTY);
370 if (fd < 0)
371 return log_error_errno(errno, "Failed to open %s: %m", filename);
372 }
373
374 u->input = fd;
375
376 if (arg_follow) {
377 r = sd_event_add_io(u->events, &u->input_event,
378 fd, EPOLLIN, dispatch_fd_input, u);
379 if (r < 0) {
380 if (r != -EPERM || arg_follow > 0)
381 return log_error_errno(r, "Failed to register input event: %m");
382
383 /* Normal files should just be consumed without polling. */
384 r = start_upload(u, fd_input_callback, u);
385 }
386 }
387
388 return r;
389 }
390
391 static int dispatch_sigterm(sd_event_source *event,
392 const struct signalfd_siginfo *si,
393 void *userdata) {
394 Uploader *u = userdata;
395
396 assert(u);
397
398 log_received_signal(LOG_INFO, si);
399
400 close_fd_input(u);
401 close_journal_input(u);
402
403 sd_event_exit(u->events, 0);
404 return 0;
405 }
406
407 static int setup_signals(Uploader *u) {
408 int r;
409
410 assert(u);
411
412 assert_se(sigprocmask_many(SIG_SETMASK, NULL, SIGINT, SIGTERM, -1) >= 0);
413
414 r = sd_event_add_signal(u->events, &u->sigterm_event, SIGTERM, dispatch_sigterm, u);
415 if (r < 0)
416 return r;
417
418 r = sd_event_add_signal(u->events, &u->sigint_event, SIGINT, dispatch_sigterm, u);
419 if (r < 0)
420 return r;
421
422 return 0;
423 }
424
425 static int setup_uploader(Uploader *u, const char *url, const char *state_file) {
426 int r;
427 const char *host, *proto = "";
428
429 assert(u);
430 assert(url);
431
432 memzero(u, sizeof(Uploader));
433 u->input = -1;
434
435 if (!(host = startswith(url, "http://")) && !(host = startswith(url, "https://"))) {
436 host = url;
437 proto = "https://";
438 }
439
440 if (strchr(host, ':'))
441 u->url = strjoin(proto, url, "/upload", NULL);
442 else {
443 char *t;
444 size_t x;
445
446 t = strdupa(url);
447 x = strlen(t);
448 while (x > 0 && t[x - 1] == '/')
449 t[x - 1] = '\0';
450
451 u->url = strjoin(proto, t, ":" STRINGIFY(DEFAULT_PORT), "/upload", NULL);
452 }
453 if (!u->url)
454 return log_oom();
455
456 u->state_file = state_file;
457
458 r = sd_event_default(&u->events);
459 if (r < 0)
460 return log_error_errno(r, "sd_event_default failed: %m");
461
462 r = setup_signals(u);
463 if (r < 0)
464 return log_error_errno(r, "Failed to set up signals: %m");
465
466 return load_cursor_state(u);
467 }
468
469 static void destroy_uploader(Uploader *u) {
470 assert(u);
471
472 curl_easy_cleanup(u->easy);
473 curl_slist_free_all(u->header);
474 free(u->answer);
475
476 free(u->last_cursor);
477 free(u->current_cursor);
478
479 free(u->url);
480
481 u->input_event = sd_event_source_unref(u->input_event);
482
483 close_fd_input(u);
484 close_journal_input(u);
485
486 sd_event_source_unref(u->sigterm_event);
487 sd_event_source_unref(u->sigint_event);
488 sd_event_unref(u->events);
489 }
490
491 static int perform_upload(Uploader *u) {
492 CURLcode code;
493 long status;
494
495 assert(u);
496
497 code = curl_easy_perform(u->easy);
498 if (code) {
499 if (u->error[0])
500 log_error("Upload to %s failed: %.*s",
501 u->url, (int) sizeof(u->error), u->error);
502 else
503 log_error("Upload to %s failed: %s",
504 u->url, curl_easy_strerror(code));
505 return -EIO;
506 }
507
508 code = curl_easy_getinfo(u->easy, CURLINFO_RESPONSE_CODE, &status);
509 if (code) {
510 log_error("Failed to retrieve response code: %s",
511 curl_easy_strerror(code));
512 return -EUCLEAN;
513 }
514
515 if (status >= 300) {
516 log_error("Upload to %s failed with code %ld: %s",
517 u->url, status, strna(u->answer));
518 return -EIO;
519 } else if (status < 200) {
520 log_error("Upload to %s finished with unexpected code %ld: %s",
521 u->url, status, strna(u->answer));
522 return -EIO;
523 } else
524 log_debug("Upload finished successfully with code %ld: %s",
525 status, strna(u->answer));
526
527 free(u->last_cursor);
528 u->last_cursor = u->current_cursor;
529 u->current_cursor = NULL;
530
531 return update_cursor_state(u);
532 }
533
534 static int parse_config(void) {
535 const ConfigTableItem items[] = {
536 { "Upload", "URL", config_parse_string, 0, &arg_url },
537 { "Upload", "ServerKeyFile", config_parse_path, 0, &arg_key },
538 { "Upload", "ServerCertificateFile", config_parse_path, 0, &arg_cert },
539 { "Upload", "TrustedCertificateFile", config_parse_path, 0, &arg_trust },
540 {}};
541
542 return config_parse_many(PKGSYSCONFDIR "/journal-upload.conf",
543 CONF_PATHS_NULSTR("systemd/journal-upload.conf.d"),
544 "Upload\0", config_item_table_lookup, items,
545 false, NULL);
546 }
547
548 static void help(void) {
549 printf("%s -u URL {FILE|-}...\n\n"
550 "Upload journal events to a remote server.\n\n"
551 " -h --help Show this help\n"
552 " --version Show package version\n"
553 " -u --url=URL Upload to this address (default port "
554 STRINGIFY(DEFAULT_PORT) ")\n"
555 " --key=FILENAME Specify key in PEM format (default:\n"
556 " \"" PRIV_KEY_FILE "\")\n"
557 " --cert=FILENAME Specify certificate in PEM format (default:\n"
558 " \"" CERT_FILE "\")\n"
559 " --trust=FILENAME|all Specify CA certificate or disable checking (default:\n"
560 " \"" TRUST_FILE "\")\n"
561 " --system Use the system journal\n"
562 " --user Use the user journal for the current user\n"
563 " -m --merge Use all available journals\n"
564 " -M --machine=CONTAINER Operate on local container\n"
565 " -D --directory=PATH Use journal files from directory\n"
566 " --file=PATH Use this journal file\n"
567 " --cursor=CURSOR Start at the specified cursor\n"
568 " --after-cursor=CURSOR Start after the specified cursor\n"
569 " --follow[=BOOL] Do [not] wait for input\n"
570 " --save-state[=FILE] Save uploaded cursors (default \n"
571 " " STATE_FILE ")\n"
572 " -h --help Show this help and exit\n"
573 " --version Print version string and exit\n"
574 , program_invocation_short_name);
575 }
576
577 static int parse_argv(int argc, char *argv[]) {
578 enum {
579 ARG_VERSION = 0x100,
580 ARG_KEY,
581 ARG_CERT,
582 ARG_TRUST,
583 ARG_USER,
584 ARG_SYSTEM,
585 ARG_FILE,
586 ARG_CURSOR,
587 ARG_AFTER_CURSOR,
588 ARG_FOLLOW,
589 ARG_SAVE_STATE,
590 };
591
592 static const struct option options[] = {
593 { "help", no_argument, NULL, 'h' },
594 { "version", no_argument, NULL, ARG_VERSION },
595 { "url", required_argument, NULL, 'u' },
596 { "key", required_argument, NULL, ARG_KEY },
597 { "cert", required_argument, NULL, ARG_CERT },
598 { "trust", required_argument, NULL, ARG_TRUST },
599 { "system", no_argument, NULL, ARG_SYSTEM },
600 { "user", no_argument, NULL, ARG_USER },
601 { "merge", no_argument, NULL, 'm' },
602 { "machine", required_argument, NULL, 'M' },
603 { "directory", required_argument, NULL, 'D' },
604 { "file", required_argument, NULL, ARG_FILE },
605 { "cursor", required_argument, NULL, ARG_CURSOR },
606 { "after-cursor", required_argument, NULL, ARG_AFTER_CURSOR },
607 { "follow", optional_argument, NULL, ARG_FOLLOW },
608 { "save-state", optional_argument, NULL, ARG_SAVE_STATE },
609 {}
610 };
611
612 int c, r;
613
614 assert(argc >= 0);
615 assert(argv);
616
617 opterr = 0;
618
619 while ((c = getopt_long(argc, argv, "hu:mM:D:", options, NULL)) >= 0)
620 switch(c) {
621 case 'h':
622 help();
623 return 0 /* done */;
624
625 case ARG_VERSION:
626 return version();
627
628 case 'u':
629 if (arg_url) {
630 log_error("cannot use more than one --url");
631 return -EINVAL;
632 }
633
634 arg_url = optarg;
635 break;
636
637 case ARG_KEY:
638 if (arg_key) {
639 log_error("cannot use more than one --key");
640 return -EINVAL;
641 }
642
643 arg_key = optarg;
644 break;
645
646 case ARG_CERT:
647 if (arg_cert) {
648 log_error("cannot use more than one --cert");
649 return -EINVAL;
650 }
651
652 arg_cert = optarg;
653 break;
654
655 case ARG_TRUST:
656 if (arg_trust) {
657 log_error("cannot use more than one --trust");
658 return -EINVAL;
659 }
660
661 arg_trust = optarg;
662 break;
663
664 case ARG_SYSTEM:
665 arg_journal_type |= SD_JOURNAL_SYSTEM;
666 break;
667
668 case ARG_USER:
669 arg_journal_type |= SD_JOURNAL_CURRENT_USER;
670 break;
671
672 case 'm':
673 arg_merge = true;
674 break;
675
676 case 'M':
677 if (arg_machine) {
678 log_error("cannot use more than one --machine/-M");
679 return -EINVAL;
680 }
681
682 arg_machine = optarg;
683 break;
684
685 case 'D':
686 if (arg_directory) {
687 log_error("cannot use more than one --directory/-D");
688 return -EINVAL;
689 }
690
691 arg_directory = optarg;
692 break;
693
694 case ARG_FILE:
695 r = glob_extend(&arg_file, optarg);
696 if (r < 0)
697 return log_error_errno(r, "Failed to add paths: %m");
698 break;
699
700 case ARG_CURSOR:
701 if (arg_cursor) {
702 log_error("cannot use more than one --cursor/--after-cursor");
703 return -EINVAL;
704 }
705
706 arg_cursor = optarg;
707 break;
708
709 case ARG_AFTER_CURSOR:
710 if (arg_cursor) {
711 log_error("cannot use more than one --cursor/--after-cursor");
712 return -EINVAL;
713 }
714
715 arg_cursor = optarg;
716 arg_after_cursor = true;
717 break;
718
719 case ARG_FOLLOW:
720 if (optarg) {
721 r = parse_boolean(optarg);
722 if (r < 0) {
723 log_error("Failed to parse --follow= parameter.");
724 return -EINVAL;
725 }
726
727 arg_follow = !!r;
728 } else
729 arg_follow = true;
730
731 break;
732
733 case ARG_SAVE_STATE:
734 arg_save_state = optarg ?: STATE_FILE;
735 break;
736
737 case '?':
738 log_error("Unknown option %s.", argv[optind-1]);
739 return -EINVAL;
740
741 case ':':
742 log_error("Missing argument to %s.", argv[optind-1]);
743 return -EINVAL;
744
745 default:
746 assert_not_reached("Unhandled option code.");
747 }
748
749 if (!arg_url) {
750 log_error("Required --url/-u option missing.");
751 return -EINVAL;
752 }
753
754 if (!!arg_key != !!arg_cert) {
755 log_error("Options --key and --cert must be used together.");
756 return -EINVAL;
757 }
758
759 if (optind < argc && (arg_directory || arg_file || arg_machine || arg_journal_type)) {
760 log_error("Input arguments make no sense with journal input.");
761 return -EINVAL;
762 }
763
764 return 1;
765 }
766
767 static int open_journal(sd_journal **j) {
768 int r;
769
770 if (arg_directory)
771 r = sd_journal_open_directory(j, arg_directory, arg_journal_type);
772 else if (arg_file)
773 r = sd_journal_open_files(j, (const char**) arg_file, 0);
774 else if (arg_machine)
775 r = sd_journal_open_container(j, arg_machine, 0);
776 else
777 r = sd_journal_open(j, !arg_merge*SD_JOURNAL_LOCAL_ONLY + arg_journal_type);
778 if (r < 0)
779 log_error_errno(r, "Failed to open %s: %m",
780 arg_directory ? arg_directory : arg_file ? "files" : "journal");
781 return r;
782 }
783
784 int main(int argc, char **argv) {
785 Uploader u;
786 int r;
787 bool use_journal;
788
789 log_show_color(true);
790 log_parse_environment();
791
792 r = parse_config();
793 if (r < 0)
794 goto finish;
795
796 r = parse_argv(argc, argv);
797 if (r <= 0)
798 goto finish;
799
800 sigbus_install();
801
802 r = setup_uploader(&u, arg_url, arg_save_state);
803 if (r < 0)
804 goto cleanup;
805
806 sd_event_set_watchdog(u.events, true);
807
808 r = check_cursor_updating(&u);
809 if (r < 0)
810 goto cleanup;
811
812 log_debug("%s running as pid "PID_FMT,
813 program_invocation_short_name, getpid());
814
815 use_journal = optind >= argc;
816 if (use_journal) {
817 sd_journal *j;
818 r = open_journal(&j);
819 if (r < 0)
820 goto finish;
821 r = open_journal_for_upload(&u, j,
822 arg_cursor ?: u.last_cursor,
823 arg_cursor ? arg_after_cursor : true,
824 !!arg_follow);
825 if (r < 0)
826 goto finish;
827 }
828
829 sd_notify(false,
830 "READY=1\n"
831 "STATUS=Processing input...");
832
833 for (;;) {
834 r = sd_event_get_state(u.events);
835 if (r < 0)
836 break;
837 if (r == SD_EVENT_FINISHED)
838 break;
839
840 if (use_journal) {
841 if (!u.journal)
842 break;
843
844 r = check_journal_input(&u);
845 } else if (u.input < 0 && !use_journal) {
846 if (optind >= argc)
847 break;
848
849 log_debug("Using %s as input.", argv[optind]);
850 r = open_file_for_upload(&u, argv[optind++]);
851 }
852 if (r < 0)
853 goto cleanup;
854
855 if (u.uploading) {
856 r = perform_upload(&u);
857 if (r < 0)
858 break;
859 }
860
861 r = sd_event_run(u.events, u.timeout);
862 if (r < 0) {
863 log_error_errno(r, "Failed to run event loop: %m");
864 break;
865 }
866 }
867
868 cleanup:
869 sd_notify(false,
870 "STOPPING=1\n"
871 "STATUS=Shutting down...");
872
873 destroy_uploader(&u);
874
875 finish:
876 return r >= 0 ? EXIT_SUCCESS : EXIT_FAILURE;
877 }