]> git.ipfire.org Git - thirdparty/systemd.git/blob - src/journal-remote/journal-upload.c
fileio: drop "newline" parameter for env file parsers
[thirdparty/systemd.git] / src / journal-remote / journal-upload.c
1 /* SPDX-License-Identifier: LGPL-2.1+ */
2
3 #include <curl/curl.h>
4 #include <fcntl.h>
5 #include <getopt.h>
6 #include <stdio.h>
7 #include <sys/stat.h>
8
9 #include "sd-daemon.h"
10
11 #include "alloc-util.h"
12 #include "conf-parser.h"
13 #include "def.h"
14 #include "fd-util.h"
15 #include "fileio.h"
16 #include "format-util.h"
17 #include "glob-util.h"
18 #include "journal-upload.h"
19 #include "log.h"
20 #include "mkdir.h"
21 #include "parse-util.h"
22 #include "process-util.h"
23 #include "rlimit-util.h"
24 #include "sigbus.h"
25 #include "signal-util.h"
26 #include "string-util.h"
27 #include "terminal-util.h"
28 #include "util.h"
29
30 #define PRIV_KEY_FILE CERTIFICATE_ROOT "/private/journal-upload.pem"
31 #define CERT_FILE CERTIFICATE_ROOT "/certs/journal-upload.pem"
32 #define TRUST_FILE CERTIFICATE_ROOT "/ca/trusted.pem"
33 #define DEFAULT_PORT 19532
34
35 static const char* arg_url = NULL;
36 static const char *arg_key = NULL;
37 static const char *arg_cert = NULL;
38 static const char *arg_trust = NULL;
39 static const char *arg_directory = NULL;
40 static char **arg_file = NULL;
41 static const char *arg_cursor = NULL;
42 static bool arg_after_cursor = false;
43 static int arg_journal_type = 0;
44 static const char *arg_machine = NULL;
45 static bool arg_merge = false;
46 static int arg_follow = -1;
47 static const char *arg_save_state = NULL;
48
49 static void close_fd_input(Uploader *u);
50
51 #define SERVER_ANSWER_KEEP 2048
52
53 #define STATE_FILE "/var/lib/systemd/journal-upload/state"
54
55 #define easy_setopt(curl, opt, value, level, cmd) \
56 do { \
57 code = curl_easy_setopt(curl, opt, value); \
58 if (code) { \
59 log_full(level, \
60 "curl_easy_setopt " #opt " failed: %s", \
61 curl_easy_strerror(code)); \
62 cmd; \
63 } \
64 } while (0)
65
66 static size_t output_callback(char *buf,
67 size_t size,
68 size_t nmemb,
69 void *userp) {
70 Uploader *u = userp;
71
72 assert(u);
73
74 log_debug("The server answers (%zu bytes): %.*s",
75 size*nmemb, (int)(size*nmemb), buf);
76
77 if (nmemb && !u->answer) {
78 u->answer = strndup(buf, size*nmemb);
79 if (!u->answer)
80 log_warning_errno(ENOMEM, "Failed to store server answer (%zu bytes): %m",
81 size*nmemb);
82 }
83
84 return size * nmemb;
85 }
86
87 static int check_cursor_updating(Uploader *u) {
88 _cleanup_free_ char *temp_path = NULL;
89 _cleanup_fclose_ FILE *f = NULL;
90 int r;
91
92 if (!u->state_file)
93 return 0;
94
95 r = mkdir_parents(u->state_file, 0755);
96 if (r < 0)
97 return log_error_errno(r, "Cannot create parent directory of state file %s: %m",
98 u->state_file);
99
100 r = fopen_temporary(u->state_file, &f, &temp_path);
101 if (r < 0)
102 return log_error_errno(r, "Cannot save state to %s: %m",
103 u->state_file);
104 unlink(temp_path);
105
106 return 0;
107 }
108
109 static int update_cursor_state(Uploader *u) {
110 _cleanup_free_ char *temp_path = NULL;
111 _cleanup_fclose_ FILE *f = NULL;
112 int r;
113
114 if (!u->state_file || !u->last_cursor)
115 return 0;
116
117 r = fopen_temporary(u->state_file, &f, &temp_path);
118 if (r < 0)
119 goto fail;
120
121 fprintf(f,
122 "# This is private data. Do not parse.\n"
123 "LAST_CURSOR=%s\n",
124 u->last_cursor);
125
126 r = fflush_and_check(f);
127 if (r < 0)
128 goto fail;
129
130 if (rename(temp_path, u->state_file) < 0) {
131 r = -errno;
132 goto fail;
133 }
134
135 return 0;
136
137 fail:
138 if (temp_path)
139 (void) unlink(temp_path);
140
141 (void) unlink(u->state_file);
142
143 return log_error_errno(r, "Failed to save state %s: %m", u->state_file);
144 }
145
146 static int load_cursor_state(Uploader *u) {
147 int r;
148
149 if (!u->state_file)
150 return 0;
151
152 r = parse_env_file(NULL, u->state_file,
153 "LAST_CURSOR", &u->last_cursor,
154 NULL);
155
156 if (r == -ENOENT)
157 log_debug("State file %s is not present.", u->state_file);
158 else if (r < 0)
159 return log_error_errno(r, "Failed to read state file %s: %m",
160 u->state_file);
161 else
162 log_debug("Last cursor was %s", u->last_cursor);
163
164 return 0;
165 }
166
167 int start_upload(Uploader *u,
168 size_t (*input_callback)(void *ptr,
169 size_t size,
170 size_t nmemb,
171 void *userdata),
172 void *data) {
173 CURLcode code;
174
175 assert(u);
176 assert(input_callback);
177
178 if (!u->header) {
179 struct curl_slist *h;
180
181 h = curl_slist_append(NULL, "Content-Type: application/vnd.fdo.journal");
182 if (!h)
183 return log_oom();
184
185 h = curl_slist_append(h, "Transfer-Encoding: chunked");
186 if (!h) {
187 curl_slist_free_all(h);
188 return log_oom();
189 }
190
191 h = curl_slist_append(h, "Accept: text/plain");
192 if (!h) {
193 curl_slist_free_all(h);
194 return log_oom();
195 }
196
197 u->header = h;
198 }
199
200 if (!u->easy) {
201 CURL *curl;
202
203 curl = curl_easy_init();
204 if (!curl) {
205 log_error("Call to curl_easy_init failed.");
206 return -ENOSR;
207 }
208
209 /* tell it to POST to the URL */
210 easy_setopt(curl, CURLOPT_POST, 1L,
211 LOG_ERR, return -EXFULL);
212
213 easy_setopt(curl, CURLOPT_ERRORBUFFER, u->error,
214 LOG_ERR, return -EXFULL);
215
216 /* set where to write to */
217 easy_setopt(curl, CURLOPT_WRITEFUNCTION, output_callback,
218 LOG_ERR, return -EXFULL);
219
220 easy_setopt(curl, CURLOPT_WRITEDATA, data,
221 LOG_ERR, return -EXFULL);
222
223 /* set where to read from */
224 easy_setopt(curl, CURLOPT_READFUNCTION, input_callback,
225 LOG_ERR, return -EXFULL);
226
227 easy_setopt(curl, CURLOPT_READDATA, data,
228 LOG_ERR, return -EXFULL);
229
230 /* use our special own mime type and chunked transfer */
231 easy_setopt(curl, CURLOPT_HTTPHEADER, u->header,
232 LOG_ERR, return -EXFULL);
233
234 if (DEBUG_LOGGING)
235 /* enable verbose for easier tracing */
236 easy_setopt(curl, CURLOPT_VERBOSE, 1L, LOG_WARNING, );
237
238 easy_setopt(curl, CURLOPT_USERAGENT,
239 "systemd-journal-upload " PACKAGE_STRING,
240 LOG_WARNING, );
241
242 if (arg_key || startswith(u->url, "https://")) {
243 easy_setopt(curl, CURLOPT_SSLKEY, arg_key ?: PRIV_KEY_FILE,
244 LOG_ERR, return -EXFULL);
245 easy_setopt(curl, CURLOPT_SSLCERT, arg_cert ?: CERT_FILE,
246 LOG_ERR, return -EXFULL);
247 }
248
249 if (streq_ptr(arg_trust, "all"))
250 easy_setopt(curl, CURLOPT_SSL_VERIFYPEER, 0,
251 LOG_ERR, return -EUCLEAN);
252 else if (arg_trust || startswith(u->url, "https://"))
253 easy_setopt(curl, CURLOPT_CAINFO, arg_trust ?: TRUST_FILE,
254 LOG_ERR, return -EXFULL);
255
256 if (arg_key || arg_trust)
257 easy_setopt(curl, CURLOPT_SSLVERSION, CURL_SSLVERSION_TLSv1,
258 LOG_WARNING, );
259
260 u->easy = curl;
261 } else {
262 /* truncate the potential old error message */
263 u->error[0] = '\0';
264
265 free(u->answer);
266 u->answer = 0;
267 }
268
269 /* upload to this place */
270 code = curl_easy_setopt(u->easy, CURLOPT_URL, u->url);
271 if (code) {
272 log_error("curl_easy_setopt CURLOPT_URL failed: %s",
273 curl_easy_strerror(code));
274 return -EXFULL;
275 }
276
277 u->uploading = true;
278
279 return 0;
280 }
281
282 static size_t fd_input_callback(void *buf, size_t size, size_t nmemb, void *userp) {
283 Uploader *u = userp;
284 ssize_t n;
285
286 assert(u);
287 assert(nmemb < SSIZE_MAX / size);
288
289 if (u->input < 0)
290 return 0;
291
292 assert(!size_multiply_overflow(size, nmemb));
293
294 n = read(u->input, buf, size * nmemb);
295 log_debug("%s: allowed %zu, read %zd", __func__, size*nmemb, n);
296 if (n > 0)
297 return n;
298
299 u->uploading = false;
300 if (n < 0) {
301 log_error_errno(errno, "Aborting transfer after read error on input: %m.");
302 return CURL_READFUNC_ABORT;
303 }
304
305 log_debug("Reached EOF");
306 close_fd_input(u);
307 return 0;
308 }
309
310 static void close_fd_input(Uploader *u) {
311 assert(u);
312
313 u->input = safe_close(u->input);
314 u->timeout = 0;
315 }
316
317 static int dispatch_fd_input(sd_event_source *event,
318 int fd,
319 uint32_t revents,
320 void *userp) {
321 Uploader *u = userp;
322
323 assert(u);
324 assert(fd >= 0);
325
326 if (revents & EPOLLHUP) {
327 log_debug("Received HUP");
328 close_fd_input(u);
329 return 0;
330 }
331
332 if (!(revents & EPOLLIN)) {
333 log_warning("Unexpected poll event %"PRIu32".", revents);
334 return -EINVAL;
335 }
336
337 if (u->uploading) {
338 log_warning("dispatch_fd_input called when uploading, ignoring.");
339 return 0;
340 }
341
342 return start_upload(u, fd_input_callback, u);
343 }
344
345 static int open_file_for_upload(Uploader *u, const char *filename) {
346 int fd, r = 0;
347
348 if (streq(filename, "-"))
349 fd = STDIN_FILENO;
350 else {
351 fd = open(filename, O_RDONLY|O_CLOEXEC|O_NOCTTY);
352 if (fd < 0)
353 return log_error_errno(errno, "Failed to open %s: %m", filename);
354 }
355
356 u->input = fd;
357
358 if (arg_follow) {
359 r = sd_event_add_io(u->events, &u->input_event,
360 fd, EPOLLIN, dispatch_fd_input, u);
361 if (r < 0) {
362 if (r != -EPERM || arg_follow > 0)
363 return log_error_errno(r, "Failed to register input event: %m");
364
365 /* Normal files should just be consumed without polling. */
366 r = start_upload(u, fd_input_callback, u);
367 }
368 }
369
370 return r;
371 }
372
373 static int dispatch_sigterm(sd_event_source *event,
374 const struct signalfd_siginfo *si,
375 void *userdata) {
376 Uploader *u = userdata;
377
378 assert(u);
379
380 log_received_signal(LOG_INFO, si);
381
382 close_fd_input(u);
383 close_journal_input(u);
384
385 sd_event_exit(u->events, 0);
386 return 0;
387 }
388
389 static int setup_signals(Uploader *u) {
390 int r;
391
392 assert(u);
393
394 assert_se(sigprocmask_many(SIG_SETMASK, NULL, SIGINT, SIGTERM, -1) >= 0);
395
396 r = sd_event_add_signal(u->events, &u->sigterm_event, SIGTERM, dispatch_sigterm, u);
397 if (r < 0)
398 return r;
399
400 r = sd_event_add_signal(u->events, &u->sigint_event, SIGINT, dispatch_sigterm, u);
401 if (r < 0)
402 return r;
403
404 return 0;
405 }
406
407 static int setup_uploader(Uploader *u, const char *url, const char *state_file) {
408 int r;
409 const char *host, *proto = "";
410
411 assert(u);
412 assert(url);
413
414 memzero(u, sizeof(Uploader));
415 u->input = -1;
416
417 if (!(host = startswith(url, "http://")) && !(host = startswith(url, "https://"))) {
418 host = url;
419 proto = "https://";
420 }
421
422 if (strchr(host, ':'))
423 u->url = strjoin(proto, url, "/upload");
424 else {
425 char *t;
426 size_t x;
427
428 t = strdupa(url);
429 x = strlen(t);
430 while (x > 0 && t[x - 1] == '/')
431 t[x - 1] = '\0';
432
433 u->url = strjoin(proto, t, ":" STRINGIFY(DEFAULT_PORT), "/upload");
434 }
435 if (!u->url)
436 return log_oom();
437
438 u->state_file = state_file;
439
440 r = sd_event_default(&u->events);
441 if (r < 0)
442 return log_error_errno(r, "sd_event_default failed: %m");
443
444 r = setup_signals(u);
445 if (r < 0)
446 return log_error_errno(r, "Failed to set up signals: %m");
447
448 (void) sd_watchdog_enabled(false, &u->watchdog_usec);
449
450 return load_cursor_state(u);
451 }
452
453 static void destroy_uploader(Uploader *u) {
454 assert(u);
455
456 curl_easy_cleanup(u->easy);
457 curl_slist_free_all(u->header);
458 free(u->answer);
459
460 free(u->last_cursor);
461 free(u->current_cursor);
462
463 free(u->url);
464
465 u->input_event = sd_event_source_unref(u->input_event);
466
467 close_fd_input(u);
468 close_journal_input(u);
469
470 sd_event_source_unref(u->sigterm_event);
471 sd_event_source_unref(u->sigint_event);
472 sd_event_unref(u->events);
473 }
474
475 static int perform_upload(Uploader *u) {
476 CURLcode code;
477 long status;
478
479 assert(u);
480
481 u->watchdog_timestamp = now(CLOCK_MONOTONIC);
482 code = curl_easy_perform(u->easy);
483 if (code) {
484 if (u->error[0])
485 log_error("Upload to %s failed: %.*s",
486 u->url, (int) sizeof(u->error), u->error);
487 else
488 log_error("Upload to %s failed: %s",
489 u->url, curl_easy_strerror(code));
490 return -EIO;
491 }
492
493 code = curl_easy_getinfo(u->easy, CURLINFO_RESPONSE_CODE, &status);
494 if (code) {
495 log_error("Failed to retrieve response code: %s",
496 curl_easy_strerror(code));
497 return -EUCLEAN;
498 }
499
500 if (status >= 300) {
501 log_error("Upload to %s failed with code %ld: %s",
502 u->url, status, strna(u->answer));
503 return -EIO;
504 } else if (status < 200) {
505 log_error("Upload to %s finished with unexpected code %ld: %s",
506 u->url, status, strna(u->answer));
507 return -EIO;
508 } else
509 log_debug("Upload finished successfully with code %ld: %s",
510 status, strna(u->answer));
511
512 free_and_replace(u->last_cursor, u->current_cursor);
513
514 return update_cursor_state(u);
515 }
516
517 static int parse_config(void) {
518 const ConfigTableItem items[] = {
519 { "Upload", "URL", config_parse_string, 0, &arg_url },
520 { "Upload", "ServerKeyFile", config_parse_path, 0, &arg_key },
521 { "Upload", "ServerCertificateFile", config_parse_path, 0, &arg_cert },
522 { "Upload", "TrustedCertificateFile", config_parse_path, 0, &arg_trust },
523 {}};
524
525 return config_parse_many_nulstr(PKGSYSCONFDIR "/journal-upload.conf",
526 CONF_PATHS_NULSTR("systemd/journal-upload.conf.d"),
527 "Upload\0", config_item_table_lookup, items,
528 CONFIG_PARSE_WARN, NULL);
529 }
530
531 static int help(void) {
532 _cleanup_free_ char *link = NULL;
533 int r;
534
535 r = terminal_urlify_man("systemd-journal-upload.service", "8", &link);
536 if (r < 0)
537 return log_oom();
538
539 printf("%s -u URL {FILE|-}...\n\n"
540 "Upload journal events to a remote server.\n\n"
541 " -h --help Show this help\n"
542 " --version Show package version\n"
543 " -u --url=URL Upload to this address (default port "
544 STRINGIFY(DEFAULT_PORT) ")\n"
545 " --key=FILENAME Specify key in PEM format (default:\n"
546 " \"" PRIV_KEY_FILE "\")\n"
547 " --cert=FILENAME Specify certificate in PEM format (default:\n"
548 " \"" CERT_FILE "\")\n"
549 " --trust=FILENAME|all Specify CA certificate or disable checking (default:\n"
550 " \"" TRUST_FILE "\")\n"
551 " --system Use the system journal\n"
552 " --user Use the user journal for the current user\n"
553 " -m --merge Use all available journals\n"
554 " -M --machine=CONTAINER Operate on local container\n"
555 " -D --directory=PATH Use journal files from directory\n"
556 " --file=PATH Use this journal file\n"
557 " --cursor=CURSOR Start at the specified cursor\n"
558 " --after-cursor=CURSOR Start after the specified cursor\n"
559 " --follow[=BOOL] Do [not] wait for input\n"
560 " --save-state[=FILE] Save uploaded cursors (default \n"
561 " " STATE_FILE ")\n"
562 "\nSee the %s for details.\n"
563 , program_invocation_short_name
564 , link
565 );
566
567 return 0;
568 }
569
570 static int parse_argv(int argc, char *argv[]) {
571 enum {
572 ARG_VERSION = 0x100,
573 ARG_KEY,
574 ARG_CERT,
575 ARG_TRUST,
576 ARG_USER,
577 ARG_SYSTEM,
578 ARG_FILE,
579 ARG_CURSOR,
580 ARG_AFTER_CURSOR,
581 ARG_FOLLOW,
582 ARG_SAVE_STATE,
583 };
584
585 static const struct option options[] = {
586 { "help", no_argument, NULL, 'h' },
587 { "version", no_argument, NULL, ARG_VERSION },
588 { "url", required_argument, NULL, 'u' },
589 { "key", required_argument, NULL, ARG_KEY },
590 { "cert", required_argument, NULL, ARG_CERT },
591 { "trust", required_argument, NULL, ARG_TRUST },
592 { "system", no_argument, NULL, ARG_SYSTEM },
593 { "user", no_argument, NULL, ARG_USER },
594 { "merge", no_argument, NULL, 'm' },
595 { "machine", required_argument, NULL, 'M' },
596 { "directory", required_argument, NULL, 'D' },
597 { "file", required_argument, NULL, ARG_FILE },
598 { "cursor", required_argument, NULL, ARG_CURSOR },
599 { "after-cursor", required_argument, NULL, ARG_AFTER_CURSOR },
600 { "follow", optional_argument, NULL, ARG_FOLLOW },
601 { "save-state", optional_argument, NULL, ARG_SAVE_STATE },
602 {}
603 };
604
605 int c, r;
606
607 assert(argc >= 0);
608 assert(argv);
609
610 opterr = 0;
611
612 while ((c = getopt_long(argc, argv, "hu:mM:D:", options, NULL)) >= 0)
613 switch(c) {
614 case 'h':
615 return help();
616
617 case ARG_VERSION:
618 return version();
619
620 case 'u':
621 if (arg_url) {
622 log_error("cannot use more than one --url");
623 return -EINVAL;
624 }
625
626 arg_url = optarg;
627 break;
628
629 case ARG_KEY:
630 if (arg_key) {
631 log_error("cannot use more than one --key");
632 return -EINVAL;
633 }
634
635 arg_key = optarg;
636 break;
637
638 case ARG_CERT:
639 if (arg_cert) {
640 log_error("cannot use more than one --cert");
641 return -EINVAL;
642 }
643
644 arg_cert = optarg;
645 break;
646
647 case ARG_TRUST:
648 if (arg_trust) {
649 log_error("cannot use more than one --trust");
650 return -EINVAL;
651 }
652
653 arg_trust = optarg;
654 break;
655
656 case ARG_SYSTEM:
657 arg_journal_type |= SD_JOURNAL_SYSTEM;
658 break;
659
660 case ARG_USER:
661 arg_journal_type |= SD_JOURNAL_CURRENT_USER;
662 break;
663
664 case 'm':
665 arg_merge = true;
666 break;
667
668 case 'M':
669 if (arg_machine) {
670 log_error("cannot use more than one --machine/-M");
671 return -EINVAL;
672 }
673
674 arg_machine = optarg;
675 break;
676
677 case 'D':
678 if (arg_directory) {
679 log_error("cannot use more than one --directory/-D");
680 return -EINVAL;
681 }
682
683 arg_directory = optarg;
684 break;
685
686 case ARG_FILE:
687 r = glob_extend(&arg_file, optarg);
688 if (r < 0)
689 return log_error_errno(r, "Failed to add paths: %m");
690 break;
691
692 case ARG_CURSOR:
693 if (arg_cursor) {
694 log_error("cannot use more than one --cursor/--after-cursor");
695 return -EINVAL;
696 }
697
698 arg_cursor = optarg;
699 break;
700
701 case ARG_AFTER_CURSOR:
702 if (arg_cursor) {
703 log_error("cannot use more than one --cursor/--after-cursor");
704 return -EINVAL;
705 }
706
707 arg_cursor = optarg;
708 arg_after_cursor = true;
709 break;
710
711 case ARG_FOLLOW:
712 if (optarg) {
713 r = parse_boolean(optarg);
714 if (r < 0) {
715 log_error("Failed to parse --follow= parameter.");
716 return -EINVAL;
717 }
718
719 arg_follow = !!r;
720 } else
721 arg_follow = true;
722
723 break;
724
725 case ARG_SAVE_STATE:
726 arg_save_state = optarg ?: STATE_FILE;
727 break;
728
729 case '?':
730 log_error("Unknown option %s.", argv[optind-1]);
731 return -EINVAL;
732
733 case ':':
734 log_error("Missing argument to %s.", argv[optind-1]);
735 return -EINVAL;
736
737 default:
738 assert_not_reached("Unhandled option code.");
739 }
740
741 if (!arg_url) {
742 log_error("Required --url/-u option missing.");
743 return -EINVAL;
744 }
745
746 if (!!arg_key != !!arg_cert) {
747 log_error("Options --key and --cert must be used together.");
748 return -EINVAL;
749 }
750
751 if (optind < argc && (arg_directory || arg_file || arg_machine || arg_journal_type)) {
752 log_error("Input arguments make no sense with journal input.");
753 return -EINVAL;
754 }
755
756 return 1;
757 }
758
759 static int open_journal(sd_journal **j) {
760 int r;
761
762 if (arg_directory)
763 r = sd_journal_open_directory(j, arg_directory, arg_journal_type);
764 else if (arg_file)
765 r = sd_journal_open_files(j, (const char**) arg_file, 0);
766 else if (arg_machine)
767 r = sd_journal_open_container(j, arg_machine, 0);
768 else
769 r = sd_journal_open(j, !arg_merge*SD_JOURNAL_LOCAL_ONLY + arg_journal_type);
770 if (r < 0)
771 log_error_errno(r, "Failed to open %s: %m",
772 arg_directory ? arg_directory : arg_file ? "files" : "journal");
773 return r;
774 }
775
776 int main(int argc, char **argv) {
777 Uploader u;
778 int r;
779 bool use_journal;
780
781 log_show_color(true);
782 log_parse_environment();
783
784 /* The journal merging logic potentially needs a lot of fds. */
785 (void) rlimit_nofile_bump(HIGH_RLIMIT_NOFILE);
786
787 r = parse_config();
788 if (r < 0)
789 goto finish;
790
791 r = parse_argv(argc, argv);
792 if (r <= 0)
793 goto finish;
794
795 sigbus_install();
796
797 r = setup_uploader(&u, arg_url, arg_save_state);
798 if (r < 0)
799 goto cleanup;
800
801 sd_event_set_watchdog(u.events, true);
802
803 r = check_cursor_updating(&u);
804 if (r < 0)
805 goto cleanup;
806
807 log_debug("%s running as pid "PID_FMT,
808 program_invocation_short_name, getpid_cached());
809
810 use_journal = optind >= argc;
811 if (use_journal) {
812 sd_journal *j;
813 r = open_journal(&j);
814 if (r < 0)
815 goto finish;
816 r = open_journal_for_upload(&u, j,
817 arg_cursor ?: u.last_cursor,
818 arg_cursor ? arg_after_cursor : true,
819 !!arg_follow);
820 if (r < 0)
821 goto finish;
822 }
823
824 sd_notify(false,
825 "READY=1\n"
826 "STATUS=Processing input...");
827
828 for (;;) {
829 r = sd_event_get_state(u.events);
830 if (r < 0)
831 break;
832 if (r == SD_EVENT_FINISHED)
833 break;
834
835 if (use_journal) {
836 if (!u.journal)
837 break;
838
839 r = check_journal_input(&u);
840 } else if (u.input < 0 && !use_journal) {
841 if (optind >= argc)
842 break;
843
844 log_debug("Using %s as input.", argv[optind]);
845 r = open_file_for_upload(&u, argv[optind++]);
846 }
847 if (r < 0)
848 goto cleanup;
849
850 if (u.uploading) {
851 r = perform_upload(&u);
852 if (r < 0)
853 break;
854 }
855
856 r = sd_event_run(u.events, u.timeout);
857 if (r < 0) {
858 log_error_errno(r, "Failed to run event loop: %m");
859 break;
860 }
861 }
862
863 cleanup:
864 sd_notify(false,
865 "STOPPING=1\n"
866 "STATUS=Shutting down...");
867
868 destroy_uploader(&u);
869
870 finish:
871 return r >= 0 ? EXIT_SUCCESS : EXIT_FAILURE;
872 }