]> git.ipfire.org Git - thirdparty/systemd.git/blob - src/journal-remote/journal-upload.c
license: LGPL-2.1+ -> LGPL-2.1-or-later
[thirdparty/systemd.git] / src / journal-remote / journal-upload.c
1 /* SPDX-License-Identifier: LGPL-2.1-or-later */
2
3 #include <curl/curl.h>
4 #include <fcntl.h>
5 #include <getopt.h>
6 #include <stdio.h>
7 #include <sys/stat.h>
8
9 #include "sd-daemon.h"
10
11 #include "alloc-util.h"
12 #include "build.h"
13 #include "conf-parser.h"
14 #include "daemon-util.h"
15 #include "def.h"
16 #include "env-file.h"
17 #include "fd-util.h"
18 #include "fileio.h"
19 #include "format-util.h"
20 #include "glob-util.h"
21 #include "journal-upload.h"
22 #include "log.h"
23 #include "main-func.h"
24 #include "mkdir.h"
25 #include "parse-util.h"
26 #include "path-util.h"
27 #include "pretty-print.h"
28 #include "process-util.h"
29 #include "rlimit-util.h"
30 #include "sigbus.h"
31 #include "signal-util.h"
32 #include "string-util.h"
33 #include "strv.h"
34 #include "tmpfile-util.h"
35 #include "util.h"
36
37 #define PRIV_KEY_FILE CERTIFICATE_ROOT "/private/journal-upload.pem"
38 #define CERT_FILE CERTIFICATE_ROOT "/certs/journal-upload.pem"
39 #define TRUST_FILE CERTIFICATE_ROOT "/ca/trusted.pem"
40 #define DEFAULT_PORT 19532
41
42 static const char* arg_url = NULL;
43 static const char *arg_key = NULL;
44 static const char *arg_cert = NULL;
45 static const char *arg_trust = NULL;
46 static const char *arg_directory = NULL;
47 static char **arg_file = NULL;
48 static const char *arg_cursor = NULL;
49 static bool arg_after_cursor = false;
50 static int arg_journal_type = 0;
51 static const char *arg_machine = NULL;
52 static bool arg_merge = false;
53 static int arg_follow = -1;
54 static const char *arg_save_state = NULL;
55
56 static void close_fd_input(Uploader *u);
57
58 #define SERVER_ANSWER_KEEP 2048
59
60 #define STATE_FILE "/var/lib/systemd/journal-upload/state"
61
62 #define easy_setopt(curl, opt, value, level, cmd) \
63 do { \
64 code = curl_easy_setopt(curl, opt, value); \
65 if (code) { \
66 log_full(level, \
67 "curl_easy_setopt " #opt " failed: %s", \
68 curl_easy_strerror(code)); \
69 cmd; \
70 } \
71 } while (0)
72
73 static size_t output_callback(char *buf,
74 size_t size,
75 size_t nmemb,
76 void *userp) {
77 Uploader *u = userp;
78
79 assert(u);
80
81 log_debug("The server answers (%zu bytes): %.*s",
82 size*nmemb, (int)(size*nmemb), buf);
83
84 if (nmemb && !u->answer) {
85 u->answer = strndup(buf, size*nmemb);
86 if (!u->answer)
87 log_warning("Failed to store server answer (%zu bytes): out of memory", size*nmemb);
88 }
89
90 return size * nmemb;
91 }
92
93 static int check_cursor_updating(Uploader *u) {
94 _cleanup_free_ char *temp_path = NULL;
95 _cleanup_fclose_ FILE *f = NULL;
96 int r;
97
98 if (!u->state_file)
99 return 0;
100
101 r = mkdir_parents(u->state_file, 0755);
102 if (r < 0)
103 return log_error_errno(r, "Cannot create parent directory of state file %s: %m",
104 u->state_file);
105
106 r = fopen_temporary(u->state_file, &f, &temp_path);
107 if (r < 0)
108 return log_error_errno(r, "Cannot save state to %s: %m",
109 u->state_file);
110 (void) unlink(temp_path);
111
112 return 0;
113 }
114
115 static int update_cursor_state(Uploader *u) {
116 _cleanup_free_ char *temp_path = NULL;
117 _cleanup_fclose_ FILE *f = NULL;
118 int r;
119
120 if (!u->state_file || !u->last_cursor)
121 return 0;
122
123 r = fopen_temporary(u->state_file, &f, &temp_path);
124 if (r < 0)
125 goto fail;
126
127 fprintf(f,
128 "# This is private data. Do not parse.\n"
129 "LAST_CURSOR=%s\n",
130 u->last_cursor);
131
132 r = fflush_and_check(f);
133 if (r < 0)
134 goto fail;
135
136 if (rename(temp_path, u->state_file) < 0) {
137 r = -errno;
138 goto fail;
139 }
140
141 return 0;
142
143 fail:
144 if (temp_path)
145 (void) unlink(temp_path);
146
147 (void) unlink(u->state_file);
148
149 return log_error_errno(r, "Failed to save state %s: %m", u->state_file);
150 }
151
152 static int load_cursor_state(Uploader *u) {
153 int r;
154
155 if (!u->state_file)
156 return 0;
157
158 r = parse_env_file(NULL, u->state_file, "LAST_CURSOR", &u->last_cursor);
159 if (r == -ENOENT)
160 log_debug("State file %s is not present.", u->state_file);
161 else if (r < 0)
162 return log_error_errno(r, "Failed to read state file %s: %m",
163 u->state_file);
164 else
165 log_debug("Last cursor was %s", u->last_cursor);
166
167 return 0;
168 }
169
170 int start_upload(Uploader *u,
171 size_t (*input_callback)(void *ptr,
172 size_t size,
173 size_t nmemb,
174 void *userdata),
175 void *data) {
176 CURLcode code;
177
178 assert(u);
179 assert(input_callback);
180
181 if (!u->header) {
182 struct curl_slist *h;
183
184 h = curl_slist_append(NULL, "Content-Type: application/vnd.fdo.journal");
185 if (!h)
186 return log_oom();
187
188 h = curl_slist_append(h, "Transfer-Encoding: chunked");
189 if (!h) {
190 curl_slist_free_all(h);
191 return log_oom();
192 }
193
194 h = curl_slist_append(h, "Accept: text/plain");
195 if (!h) {
196 curl_slist_free_all(h);
197 return log_oom();
198 }
199
200 u->header = h;
201 }
202
203 if (!u->easy) {
204 CURL *curl;
205
206 curl = curl_easy_init();
207 if (!curl)
208 return log_error_errno(SYNTHETIC_ERRNO(ENOSR),
209 "Call to curl_easy_init failed.");
210
211 /* tell it to POST to the URL */
212 easy_setopt(curl, CURLOPT_POST, 1L,
213 LOG_ERR, return -EXFULL);
214
215 easy_setopt(curl, CURLOPT_ERRORBUFFER, u->error,
216 LOG_ERR, return -EXFULL);
217
218 /* set where to write to */
219 easy_setopt(curl, CURLOPT_WRITEFUNCTION, output_callback,
220 LOG_ERR, return -EXFULL);
221
222 easy_setopt(curl, CURLOPT_WRITEDATA, data,
223 LOG_ERR, return -EXFULL);
224
225 /* set where to read from */
226 easy_setopt(curl, CURLOPT_READFUNCTION, input_callback,
227 LOG_ERR, return -EXFULL);
228
229 easy_setopt(curl, CURLOPT_READDATA, data,
230 LOG_ERR, return -EXFULL);
231
232 /* use our special own mime type and chunked transfer */
233 easy_setopt(curl, CURLOPT_HTTPHEADER, u->header,
234 LOG_ERR, return -EXFULL);
235
236 if (DEBUG_LOGGING)
237 /* enable verbose for easier tracing */
238 easy_setopt(curl, CURLOPT_VERBOSE, 1L, LOG_WARNING, );
239
240 easy_setopt(curl, CURLOPT_USERAGENT,
241 "systemd-journal-upload " GIT_VERSION,
242 LOG_WARNING, );
243
244 if (!streq_ptr(arg_key, "-") && (arg_key || startswith(u->url, "https://"))) {
245 easy_setopt(curl, CURLOPT_SSLKEY, arg_key ?: PRIV_KEY_FILE,
246 LOG_ERR, return -EXFULL);
247 easy_setopt(curl, CURLOPT_SSLCERT, arg_cert ?: CERT_FILE,
248 LOG_ERR, return -EXFULL);
249 }
250
251 if (STRPTR_IN_SET(arg_trust, "-", "all"))
252 easy_setopt(curl, CURLOPT_SSL_VERIFYPEER, 0,
253 LOG_ERR, return -EUCLEAN);
254 else if (arg_trust || startswith(u->url, "https://"))
255 easy_setopt(curl, CURLOPT_CAINFO, arg_trust ?: TRUST_FILE,
256 LOG_ERR, return -EXFULL);
257
258 if (arg_key || arg_trust)
259 easy_setopt(curl, CURLOPT_SSLVERSION, CURL_SSLVERSION_TLSv1,
260 LOG_WARNING, );
261
262 u->easy = curl;
263 } else {
264 /* truncate the potential old error message */
265 u->error[0] = '\0';
266
267 free(u->answer);
268 u->answer = 0;
269 }
270
271 /* upload to this place */
272 code = curl_easy_setopt(u->easy, CURLOPT_URL, u->url);
273 if (code)
274 return log_error_errno(SYNTHETIC_ERRNO(EXFULL),
275 "curl_easy_setopt CURLOPT_URL failed: %s",
276 curl_easy_strerror(code));
277
278 u->uploading = true;
279
280 return 0;
281 }
282
283 static size_t fd_input_callback(void *buf, size_t size, size_t nmemb, void *userp) {
284 Uploader *u = userp;
285 ssize_t n;
286
287 assert(u);
288 assert(nmemb < SSIZE_MAX / size);
289
290 if (u->input < 0)
291 return 0;
292
293 assert(!size_multiply_overflow(size, nmemb));
294
295 n = read(u->input, buf, size * nmemb);
296 log_debug("%s: allowed %zu, read %zd", __func__, size*nmemb, n);
297 if (n > 0)
298 return n;
299
300 u->uploading = false;
301 if (n < 0) {
302 log_error_errno(errno, "Aborting transfer after read error on input: %m.");
303 return CURL_READFUNC_ABORT;
304 }
305
306 log_debug("Reached EOF");
307 close_fd_input(u);
308 return 0;
309 }
310
311 static void close_fd_input(Uploader *u) {
312 assert(u);
313
314 u->input = safe_close(u->input);
315 u->timeout = 0;
316 }
317
318 static int dispatch_fd_input(sd_event_source *event,
319 int fd,
320 uint32_t revents,
321 void *userp) {
322 Uploader *u = userp;
323
324 assert(u);
325 assert(fd >= 0);
326
327 if (revents & EPOLLHUP) {
328 log_debug("Received HUP");
329 close_fd_input(u);
330 return 0;
331 }
332
333 if (!(revents & EPOLLIN)) {
334 log_warning("Unexpected poll event %"PRIu32".", revents);
335 return -EINVAL;
336 }
337
338 if (u->uploading) {
339 log_warning("dispatch_fd_input called when uploading, ignoring.");
340 return 0;
341 }
342
343 return start_upload(u, fd_input_callback, u);
344 }
345
346 static int open_file_for_upload(Uploader *u, const char *filename) {
347 int fd, r = 0;
348
349 if (streq(filename, "-"))
350 fd = STDIN_FILENO;
351 else {
352 fd = open(filename, O_RDONLY|O_CLOEXEC|O_NOCTTY);
353 if (fd < 0)
354 return log_error_errno(errno, "Failed to open %s: %m", filename);
355 }
356
357 u->input = fd;
358
359 if (arg_follow) {
360 r = sd_event_add_io(u->events, &u->input_event,
361 fd, EPOLLIN, dispatch_fd_input, u);
362 if (r < 0) {
363 if (r != -EPERM || arg_follow > 0)
364 return log_error_errno(r, "Failed to register input event: %m");
365
366 /* Normal files should just be consumed without polling. */
367 r = start_upload(u, fd_input_callback, u);
368 }
369 }
370
371 return r;
372 }
373
374 static int dispatch_sigterm(sd_event_source *event,
375 const struct signalfd_siginfo *si,
376 void *userdata) {
377 Uploader *u = userdata;
378
379 assert(u);
380
381 log_received_signal(LOG_INFO, si);
382
383 close_fd_input(u);
384 close_journal_input(u);
385
386 sd_event_exit(u->events, 0);
387 return 0;
388 }
389
390 static int setup_signals(Uploader *u) {
391 int r;
392
393 assert(u);
394
395 assert_se(sigprocmask_many(SIG_SETMASK, NULL, SIGINT, SIGTERM, -1) >= 0);
396
397 r = sd_event_add_signal(u->events, &u->sigterm_event, SIGTERM, dispatch_sigterm, u);
398 if (r < 0)
399 return r;
400
401 r = sd_event_add_signal(u->events, &u->sigint_event, SIGINT, dispatch_sigterm, u);
402 if (r < 0)
403 return r;
404
405 return 0;
406 }
407
408 static int setup_uploader(Uploader *u, const char *url, const char *state_file) {
409 int r;
410 const char *host, *proto = "";
411
412 assert(u);
413 assert(url);
414
415 *u = (Uploader) {
416 .input = -1
417 };
418
419 host = STARTSWITH_SET(url, "http://", "https://");
420 if (!host) {
421 host = url;
422 proto = "https://";
423 }
424
425 if (strchr(host, ':'))
426 u->url = strjoin(proto, url, "/upload");
427 else {
428 char *t;
429 size_t x;
430
431 t = strdupa(url);
432 x = strlen(t);
433 while (x > 0 && t[x - 1] == '/')
434 t[x - 1] = '\0';
435
436 u->url = strjoin(proto, t, ":" STRINGIFY(DEFAULT_PORT), "/upload");
437 }
438 if (!u->url)
439 return log_oom();
440
441 u->state_file = state_file;
442
443 r = sd_event_default(&u->events);
444 if (r < 0)
445 return log_error_errno(r, "sd_event_default failed: %m");
446
447 r = setup_signals(u);
448 if (r < 0)
449 return log_error_errno(r, "Failed to set up signals: %m");
450
451 (void) sd_watchdog_enabled(false, &u->watchdog_usec);
452
453 return load_cursor_state(u);
454 }
455
456 static void destroy_uploader(Uploader *u) {
457 assert(u);
458
459 curl_easy_cleanup(u->easy);
460 curl_slist_free_all(u->header);
461 free(u->answer);
462
463 free(u->last_cursor);
464 free(u->current_cursor);
465
466 free(u->url);
467
468 u->input_event = sd_event_source_unref(u->input_event);
469
470 close_fd_input(u);
471 close_journal_input(u);
472
473 sd_event_source_unref(u->sigterm_event);
474 sd_event_source_unref(u->sigint_event);
475 sd_event_unref(u->events);
476 }
477
478 static int perform_upload(Uploader *u) {
479 CURLcode code;
480 long status;
481
482 assert(u);
483
484 u->watchdog_timestamp = now(CLOCK_MONOTONIC);
485 code = curl_easy_perform(u->easy);
486 if (code) {
487 if (u->error[0])
488 log_error("Upload to %s failed: %.*s",
489 u->url, (int) sizeof(u->error), u->error);
490 else
491 log_error("Upload to %s failed: %s",
492 u->url, curl_easy_strerror(code));
493 return -EIO;
494 }
495
496 code = curl_easy_getinfo(u->easy, CURLINFO_RESPONSE_CODE, &status);
497 if (code)
498 return log_error_errno(SYNTHETIC_ERRNO(EUCLEAN),
499 "Failed to retrieve response code: %s",
500 curl_easy_strerror(code));
501
502 if (status >= 300)
503 return log_error_errno(SYNTHETIC_ERRNO(EIO),
504 "Upload to %s failed with code %ld: %s",
505 u->url, status, strna(u->answer));
506 else if (status < 200)
507 return log_error_errno(SYNTHETIC_ERRNO(EIO),
508 "Upload to %s finished with unexpected code %ld: %s",
509 u->url, status, strna(u->answer));
510 else
511 log_debug("Upload finished successfully with code %ld: %s",
512 status, strna(u->answer));
513
514 free_and_replace(u->last_cursor, u->current_cursor);
515
516 return update_cursor_state(u);
517 }
518
519 static int config_parse_path_or_ignore(
520 const char *unit,
521 const char *filename,
522 unsigned line,
523 const char *section,
524 unsigned section_line,
525 const char *lvalue,
526 int ltype,
527 const char *rvalue,
528 void *data,
529 void *userdata) {
530
531 _cleanup_free_ char *n = NULL;
532 bool fatal = ltype;
533 char **s = data;
534 int r;
535
536 assert(filename);
537 assert(lvalue);
538 assert(rvalue);
539 assert(data);
540
541 if (isempty(rvalue))
542 goto finalize;
543
544 n = strdup(rvalue);
545 if (!n)
546 return log_oom();
547
548 if (streq(n, "-"))
549 goto finalize;
550
551 r = path_simplify_and_warn(n, PATH_CHECK_ABSOLUTE | (fatal ? PATH_CHECK_FATAL : 0), unit, filename, line, lvalue);
552 if (r < 0)
553 return fatal ? -ENOEXEC : 0;
554
555 finalize:
556 return free_and_replace(*s, n);
557 }
558
559 static int parse_config(void) {
560 const ConfigTableItem items[] = {
561 { "Upload", "URL", config_parse_string, 0, &arg_url },
562 { "Upload", "ServerKeyFile", config_parse_path_or_ignore, 0, &arg_key },
563 { "Upload", "ServerCertificateFile", config_parse_path_or_ignore, 0, &arg_cert },
564 { "Upload", "TrustedCertificateFile", config_parse_path_or_ignore, 0, &arg_trust },
565 {}
566 };
567
568 return config_parse_many_nulstr(
569 PKGSYSCONFDIR "/journal-upload.conf",
570 CONF_PATHS_NULSTR("systemd/journal-upload.conf.d"),
571 "Upload\0",
572 config_item_table_lookup, items,
573 CONFIG_PARSE_WARN,
574 NULL,
575 NULL);
576 }
577
578 static int help(void) {
579 _cleanup_free_ char *link = NULL;
580 int r;
581
582 r = terminal_urlify_man("systemd-journal-upload.service", "8", &link);
583 if (r < 0)
584 return log_oom();
585
586 printf("%s -u URL {FILE|-}...\n\n"
587 "Upload journal events to a remote server.\n\n"
588 " -h --help Show this help\n"
589 " --version Show package version\n"
590 " -u --url=URL Upload to this address (default port "
591 STRINGIFY(DEFAULT_PORT) ")\n"
592 " --key=FILENAME Specify key in PEM format (default:\n"
593 " \"" PRIV_KEY_FILE "\")\n"
594 " --cert=FILENAME Specify certificate in PEM format (default:\n"
595 " \"" CERT_FILE "\")\n"
596 " --trust=FILENAME|all Specify CA certificate or disable checking (default:\n"
597 " \"" TRUST_FILE "\")\n"
598 " --system Use the system journal\n"
599 " --user Use the user journal for the current user\n"
600 " -m --merge Use all available journals\n"
601 " -M --machine=CONTAINER Operate on local container\n"
602 " -D --directory=PATH Use journal files from directory\n"
603 " --file=PATH Use this journal file\n"
604 " --cursor=CURSOR Start at the specified cursor\n"
605 " --after-cursor=CURSOR Start after the specified cursor\n"
606 " --follow[=BOOL] Do [not] wait for input\n"
607 " --save-state[=FILE] Save uploaded cursors (default \n"
608 " " STATE_FILE ")\n"
609 "\nSee the %s for details.\n"
610 , program_invocation_short_name
611 , link
612 );
613
614 return 0;
615 }
616
617 static int parse_argv(int argc, char *argv[]) {
618 enum {
619 ARG_VERSION = 0x100,
620 ARG_KEY,
621 ARG_CERT,
622 ARG_TRUST,
623 ARG_USER,
624 ARG_SYSTEM,
625 ARG_FILE,
626 ARG_CURSOR,
627 ARG_AFTER_CURSOR,
628 ARG_FOLLOW,
629 ARG_SAVE_STATE,
630 };
631
632 static const struct option options[] = {
633 { "help", no_argument, NULL, 'h' },
634 { "version", no_argument, NULL, ARG_VERSION },
635 { "url", required_argument, NULL, 'u' },
636 { "key", required_argument, NULL, ARG_KEY },
637 { "cert", required_argument, NULL, ARG_CERT },
638 { "trust", required_argument, NULL, ARG_TRUST },
639 { "system", no_argument, NULL, ARG_SYSTEM },
640 { "user", no_argument, NULL, ARG_USER },
641 { "merge", no_argument, NULL, 'm' },
642 { "machine", required_argument, NULL, 'M' },
643 { "directory", required_argument, NULL, 'D' },
644 { "file", required_argument, NULL, ARG_FILE },
645 { "cursor", required_argument, NULL, ARG_CURSOR },
646 { "after-cursor", required_argument, NULL, ARG_AFTER_CURSOR },
647 { "follow", optional_argument, NULL, ARG_FOLLOW },
648 { "save-state", optional_argument, NULL, ARG_SAVE_STATE },
649 {}
650 };
651
652 int c, r;
653
654 assert(argc >= 0);
655 assert(argv);
656
657 opterr = 0;
658
659 while ((c = getopt_long(argc, argv, "hu:mM:D:", options, NULL)) >= 0)
660 switch(c) {
661 case 'h':
662 return help();
663
664 case ARG_VERSION:
665 return version();
666
667 case 'u':
668 if (arg_url)
669 return log_error_errno(SYNTHETIC_ERRNO(EINVAL),
670 "cannot use more than one --url");
671
672 arg_url = optarg;
673 break;
674
675 case ARG_KEY:
676 if (arg_key)
677 return log_error_errno(SYNTHETIC_ERRNO(EINVAL),
678 "cannot use more than one --key");
679
680 arg_key = optarg;
681 break;
682
683 case ARG_CERT:
684 if (arg_cert)
685 return log_error_errno(SYNTHETIC_ERRNO(EINVAL),
686 "cannot use more than one --cert");
687
688 arg_cert = optarg;
689 break;
690
691 case ARG_TRUST:
692 if (arg_trust)
693 return log_error_errno(SYNTHETIC_ERRNO(EINVAL),
694 "cannot use more than one --trust");
695
696 arg_trust = optarg;
697 break;
698
699 case ARG_SYSTEM:
700 arg_journal_type |= SD_JOURNAL_SYSTEM;
701 break;
702
703 case ARG_USER:
704 arg_journal_type |= SD_JOURNAL_CURRENT_USER;
705 break;
706
707 case 'm':
708 arg_merge = true;
709 break;
710
711 case 'M':
712 if (arg_machine)
713 return log_error_errno(SYNTHETIC_ERRNO(EINVAL),
714 "cannot use more than one --machine/-M");
715
716 arg_machine = optarg;
717 break;
718
719 case 'D':
720 if (arg_directory)
721 return log_error_errno(SYNTHETIC_ERRNO(EINVAL),
722 "cannot use more than one --directory/-D");
723
724 arg_directory = optarg;
725 break;
726
727 case ARG_FILE:
728 r = glob_extend(&arg_file, optarg, GLOB_NOCHECK);
729 if (r < 0)
730 return log_error_errno(r, "Failed to add paths: %m");
731 break;
732
733 case ARG_CURSOR:
734 if (arg_cursor)
735 return log_error_errno(SYNTHETIC_ERRNO(EINVAL),
736 "cannot use more than one --cursor/--after-cursor");
737
738 arg_cursor = optarg;
739 break;
740
741 case ARG_AFTER_CURSOR:
742 if (arg_cursor)
743 return log_error_errno(SYNTHETIC_ERRNO(EINVAL),
744 "cannot use more than one --cursor/--after-cursor");
745
746 arg_cursor = optarg;
747 arg_after_cursor = true;
748 break;
749
750 case ARG_FOLLOW:
751 if (optarg) {
752 r = parse_boolean(optarg);
753 if (r < 0)
754 return log_error_errno(SYNTHETIC_ERRNO(EINVAL),
755 "Failed to parse --follow= parameter.");
756
757 arg_follow = !!r;
758 } else
759 arg_follow = true;
760
761 break;
762
763 case ARG_SAVE_STATE:
764 arg_save_state = optarg ?: STATE_FILE;
765 break;
766
767 case '?':
768 return log_error_errno(SYNTHETIC_ERRNO(EINVAL),
769 "Unknown option %s.",
770 argv[optind - 1]);
771
772 case ':':
773 return log_error_errno(SYNTHETIC_ERRNO(EINVAL),
774 "Missing argument to %s.",
775 argv[optind - 1]);
776
777 default:
778 assert_not_reached("Unhandled option code.");
779 }
780
781 if (!arg_url)
782 return log_error_errno(SYNTHETIC_ERRNO(EINVAL),
783 "Required --url/-u option missing.");
784
785 if (!!arg_key != !!arg_cert)
786 return log_error_errno(SYNTHETIC_ERRNO(EINVAL),
787 "Options --key and --cert must be used together.");
788
789 if (optind < argc && (arg_directory || arg_file || arg_machine || arg_journal_type))
790 return log_error_errno(SYNTHETIC_ERRNO(EINVAL),
791 "Input arguments make no sense with journal input.");
792
793 return 1;
794 }
795
796 static int open_journal(sd_journal **j) {
797 int r;
798
799 if (arg_directory)
800 r = sd_journal_open_directory(j, arg_directory, arg_journal_type);
801 else if (arg_file)
802 r = sd_journal_open_files(j, (const char**) arg_file, 0);
803 else if (arg_machine) {
804 #pragma GCC diagnostic push
805 #pragma GCC diagnostic ignored "-Wdeprecated-declarations"
806 /* FIXME: replace with D-Bus call OpenMachineRootDirectory() so that things also work with raw disk images */
807 r = sd_journal_open_container(j, arg_machine, 0);
808 #pragma GCC diagnostic pop
809 } else
810 r = sd_journal_open(j, !arg_merge*SD_JOURNAL_LOCAL_ONLY + arg_journal_type);
811 if (r < 0)
812 log_error_errno(r, "Failed to open %s: %m",
813 arg_directory ? arg_directory : arg_file ? "files" : "journal");
814 return r;
815 }
816
817 static int run(int argc, char **argv) {
818 _cleanup_(destroy_uploader) Uploader u = {};
819 _cleanup_(notify_on_cleanup) const char *notify_message = NULL;
820 bool use_journal;
821 int r;
822
823 log_show_color(true);
824 log_parse_environment_cli();
825
826 /* The journal merging logic potentially needs a lot of fds. */
827 (void) rlimit_nofile_bump(HIGH_RLIMIT_NOFILE);
828
829 r = parse_config();
830 if (r < 0)
831 return r;
832
833 r = parse_argv(argc, argv);
834 if (r <= 0)
835 return r;
836
837 sigbus_install();
838
839 r = setup_uploader(&u, arg_url, arg_save_state);
840 if (r < 0)
841 return r;
842
843 sd_event_set_watchdog(u.events, true);
844
845 r = check_cursor_updating(&u);
846 if (r < 0)
847 return r;
848
849 log_debug("%s running as pid "PID_FMT,
850 program_invocation_short_name, getpid_cached());
851
852 use_journal = optind >= argc;
853 if (use_journal) {
854 sd_journal *j;
855 r = open_journal(&j);
856 if (r < 0)
857 return r;
858 r = open_journal_for_upload(&u, j,
859 arg_cursor ?: u.last_cursor,
860 arg_cursor ? arg_after_cursor : true,
861 !!arg_follow);
862 if (r < 0)
863 return r;
864 }
865
866 notify_message = notify_start("READY=1\n"
867 "STATUS=Processing input...",
868 NOTIFY_STOPPING);
869
870 for (;;) {
871 r = sd_event_get_state(u.events);
872 if (r < 0)
873 return r;
874 if (r == SD_EVENT_FINISHED)
875 return 0;
876
877 if (use_journal) {
878 if (!u.journal)
879 return 0;
880
881 r = check_journal_input(&u);
882 } else if (u.input < 0 && !use_journal) {
883 if (optind >= argc)
884 return 0;
885
886 log_debug("Using %s as input.", argv[optind]);
887 r = open_file_for_upload(&u, argv[optind++]);
888 }
889 if (r < 0)
890 return r;
891
892 if (u.uploading) {
893 r = perform_upload(&u);
894 if (r < 0)
895 return r;
896 }
897
898 r = sd_event_run(u.events, u.timeout);
899 if (r < 0)
900 return log_error_errno(r, "Failed to run event loop: %m");
901 }
902 }
903
904 DEFINE_MAIN_FUNCTION(run);