]> git.ipfire.org Git - thirdparty/systemd.git/blob - src/journal-remote/journal-upload.c
Merge pull request #15482 from ssahani/dhcpv6-userclass
[thirdparty/systemd.git] / src / journal-remote / journal-upload.c
1 /* SPDX-License-Identifier: LGPL-2.1+ */
2
3 #include <curl/curl.h>
4 #include <fcntl.h>
5 #include <getopt.h>
6 #include <stdio.h>
7 #include <sys/stat.h>
8
9 #include "sd-daemon.h"
10
11 #include "alloc-util.h"
12 #include "build.h"
13 #include "conf-parser.h"
14 #include "daemon-util.h"
15 #include "def.h"
16 #include "env-file.h"
17 #include "fd-util.h"
18 #include "fileio.h"
19 #include "format-util.h"
20 #include "glob-util.h"
21 #include "journal-upload.h"
22 #include "log.h"
23 #include "main-func.h"
24 #include "mkdir.h"
25 #include "parse-util.h"
26 #include "path-util.h"
27 #include "pretty-print.h"
28 #include "process-util.h"
29 #include "rlimit-util.h"
30 #include "sigbus.h"
31 #include "signal-util.h"
32 #include "string-util.h"
33 #include "strv.h"
34 #include "tmpfile-util.h"
35 #include "util.h"
36
37 #define PRIV_KEY_FILE CERTIFICATE_ROOT "/private/journal-upload.pem"
38 #define CERT_FILE CERTIFICATE_ROOT "/certs/journal-upload.pem"
39 #define TRUST_FILE CERTIFICATE_ROOT "/ca/trusted.pem"
40 #define DEFAULT_PORT 19532
41
42 static const char* arg_url = NULL;
43 static const char *arg_key = NULL;
44 static const char *arg_cert = NULL;
45 static const char *arg_trust = NULL;
46 static const char *arg_directory = NULL;
47 static char **arg_file = NULL;
48 static const char *arg_cursor = NULL;
49 static bool arg_after_cursor = false;
50 static int arg_journal_type = 0;
51 static const char *arg_machine = NULL;
52 static bool arg_merge = false;
53 static int arg_follow = -1;
54 static const char *arg_save_state = NULL;
55
56 static void close_fd_input(Uploader *u);
57
58 #define SERVER_ANSWER_KEEP 2048
59
60 #define STATE_FILE "/var/lib/systemd/journal-upload/state"
61
62 #define easy_setopt(curl, opt, value, level, cmd) \
63 do { \
64 code = curl_easy_setopt(curl, opt, value); \
65 if (code) { \
66 log_full(level, \
67 "curl_easy_setopt " #opt " failed: %s", \
68 curl_easy_strerror(code)); \
69 cmd; \
70 } \
71 } while (0)
72
73 static size_t output_callback(char *buf,
74 size_t size,
75 size_t nmemb,
76 void *userp) {
77 Uploader *u = userp;
78
79 assert(u);
80
81 log_debug("The server answers (%zu bytes): %.*s",
82 size*nmemb, (int)(size*nmemb), buf);
83
84 if (nmemb && !u->answer) {
85 u->answer = strndup(buf, size*nmemb);
86 if (!u->answer)
87 log_warning("Failed to store server answer (%zu bytes): out of memory", size*nmemb);
88 }
89
90 return size * nmemb;
91 }
92
93 static int check_cursor_updating(Uploader *u) {
94 _cleanup_free_ char *temp_path = NULL;
95 _cleanup_fclose_ FILE *f = NULL;
96 int r;
97
98 if (!u->state_file)
99 return 0;
100
101 r = mkdir_parents(u->state_file, 0755);
102 if (r < 0)
103 return log_error_errno(r, "Cannot create parent directory of state file %s: %m",
104 u->state_file);
105
106 r = fopen_temporary(u->state_file, &f, &temp_path);
107 if (r < 0)
108 return log_error_errno(r, "Cannot save state to %s: %m",
109 u->state_file);
110 (void) unlink(temp_path);
111
112 return 0;
113 }
114
115 static int update_cursor_state(Uploader *u) {
116 _cleanup_free_ char *temp_path = NULL;
117 _cleanup_fclose_ FILE *f = NULL;
118 int r;
119
120 if (!u->state_file || !u->last_cursor)
121 return 0;
122
123 r = fopen_temporary(u->state_file, &f, &temp_path);
124 if (r < 0)
125 goto fail;
126
127 fprintf(f,
128 "# This is private data. Do not parse.\n"
129 "LAST_CURSOR=%s\n",
130 u->last_cursor);
131
132 r = fflush_and_check(f);
133 if (r < 0)
134 goto fail;
135
136 if (rename(temp_path, u->state_file) < 0) {
137 r = -errno;
138 goto fail;
139 }
140
141 return 0;
142
143 fail:
144 if (temp_path)
145 (void) unlink(temp_path);
146
147 (void) unlink(u->state_file);
148
149 return log_error_errno(r, "Failed to save state %s: %m", u->state_file);
150 }
151
152 static int load_cursor_state(Uploader *u) {
153 int r;
154
155 if (!u->state_file)
156 return 0;
157
158 r = parse_env_file(NULL, u->state_file, "LAST_CURSOR", &u->last_cursor);
159 if (r == -ENOENT)
160 log_debug("State file %s is not present.", u->state_file);
161 else if (r < 0)
162 return log_error_errno(r, "Failed to read state file %s: %m",
163 u->state_file);
164 else
165 log_debug("Last cursor was %s", u->last_cursor);
166
167 return 0;
168 }
169
170 int start_upload(Uploader *u,
171 size_t (*input_callback)(void *ptr,
172 size_t size,
173 size_t nmemb,
174 void *userdata),
175 void *data) {
176 CURLcode code;
177
178 assert(u);
179 assert(input_callback);
180
181 if (!u->header) {
182 struct curl_slist *h;
183
184 h = curl_slist_append(NULL, "Content-Type: application/vnd.fdo.journal");
185 if (!h)
186 return log_oom();
187
188 h = curl_slist_append(h, "Transfer-Encoding: chunked");
189 if (!h) {
190 curl_slist_free_all(h);
191 return log_oom();
192 }
193
194 h = curl_slist_append(h, "Accept: text/plain");
195 if (!h) {
196 curl_slist_free_all(h);
197 return log_oom();
198 }
199
200 u->header = h;
201 }
202
203 if (!u->easy) {
204 CURL *curl;
205
206 curl = curl_easy_init();
207 if (!curl)
208 return log_error_errno(SYNTHETIC_ERRNO(ENOSR),
209 "Call to curl_easy_init failed.");
210
211 /* tell it to POST to the URL */
212 easy_setopt(curl, CURLOPT_POST, 1L,
213 LOG_ERR, return -EXFULL);
214
215 easy_setopt(curl, CURLOPT_ERRORBUFFER, u->error,
216 LOG_ERR, return -EXFULL);
217
218 /* set where to write to */
219 easy_setopt(curl, CURLOPT_WRITEFUNCTION, output_callback,
220 LOG_ERR, return -EXFULL);
221
222 easy_setopt(curl, CURLOPT_WRITEDATA, data,
223 LOG_ERR, return -EXFULL);
224
225 /* set where to read from */
226 easy_setopt(curl, CURLOPT_READFUNCTION, input_callback,
227 LOG_ERR, return -EXFULL);
228
229 easy_setopt(curl, CURLOPT_READDATA, data,
230 LOG_ERR, return -EXFULL);
231
232 /* use our special own mime type and chunked transfer */
233 easy_setopt(curl, CURLOPT_HTTPHEADER, u->header,
234 LOG_ERR, return -EXFULL);
235
236 if (DEBUG_LOGGING)
237 /* enable verbose for easier tracing */
238 easy_setopt(curl, CURLOPT_VERBOSE, 1L, LOG_WARNING, );
239
240 easy_setopt(curl, CURLOPT_USERAGENT,
241 "systemd-journal-upload " GIT_VERSION,
242 LOG_WARNING, );
243
244 if (!streq_ptr(arg_key, "-") && (arg_key || startswith(u->url, "https://"))) {
245 easy_setopt(curl, CURLOPT_SSLKEY, arg_key ?: PRIV_KEY_FILE,
246 LOG_ERR, return -EXFULL);
247 easy_setopt(curl, CURLOPT_SSLCERT, arg_cert ?: CERT_FILE,
248 LOG_ERR, return -EXFULL);
249 }
250
251 if (STRPTR_IN_SET(arg_trust, "-", "all"))
252 easy_setopt(curl, CURLOPT_SSL_VERIFYPEER, 0,
253 LOG_ERR, return -EUCLEAN);
254 else if (arg_trust || startswith(u->url, "https://"))
255 easy_setopt(curl, CURLOPT_CAINFO, arg_trust ?: TRUST_FILE,
256 LOG_ERR, return -EXFULL);
257
258 if (arg_key || arg_trust)
259 easy_setopt(curl, CURLOPT_SSLVERSION, CURL_SSLVERSION_TLSv1,
260 LOG_WARNING, );
261
262 u->easy = curl;
263 } else {
264 /* truncate the potential old error message */
265 u->error[0] = '\0';
266
267 free(u->answer);
268 u->answer = 0;
269 }
270
271 /* upload to this place */
272 code = curl_easy_setopt(u->easy, CURLOPT_URL, u->url);
273 if (code)
274 return log_error_errno(SYNTHETIC_ERRNO(EXFULL),
275 "curl_easy_setopt CURLOPT_URL failed: %s",
276 curl_easy_strerror(code));
277
278 u->uploading = true;
279
280 return 0;
281 }
282
283 static size_t fd_input_callback(void *buf, size_t size, size_t nmemb, void *userp) {
284 Uploader *u = userp;
285 ssize_t n;
286
287 assert(u);
288 assert(nmemb < SSIZE_MAX / size);
289
290 if (u->input < 0)
291 return 0;
292
293 assert(!size_multiply_overflow(size, nmemb));
294
295 n = read(u->input, buf, size * nmemb);
296 log_debug("%s: allowed %zu, read %zd", __func__, size*nmemb, n);
297 if (n > 0)
298 return n;
299
300 u->uploading = false;
301 if (n < 0) {
302 log_error_errno(errno, "Aborting transfer after read error on input: %m.");
303 return CURL_READFUNC_ABORT;
304 }
305
306 log_debug("Reached EOF");
307 close_fd_input(u);
308 return 0;
309 }
310
311 static void close_fd_input(Uploader *u) {
312 assert(u);
313
314 u->input = safe_close(u->input);
315 u->timeout = 0;
316 }
317
318 static int dispatch_fd_input(sd_event_source *event,
319 int fd,
320 uint32_t revents,
321 void *userp) {
322 Uploader *u = userp;
323
324 assert(u);
325 assert(fd >= 0);
326
327 if (revents & EPOLLHUP) {
328 log_debug("Received HUP");
329 close_fd_input(u);
330 return 0;
331 }
332
333 if (!(revents & EPOLLIN)) {
334 log_warning("Unexpected poll event %"PRIu32".", revents);
335 return -EINVAL;
336 }
337
338 if (u->uploading) {
339 log_warning("dispatch_fd_input called when uploading, ignoring.");
340 return 0;
341 }
342
343 return start_upload(u, fd_input_callback, u);
344 }
345
346 static int open_file_for_upload(Uploader *u, const char *filename) {
347 int fd, r = 0;
348
349 if (streq(filename, "-"))
350 fd = STDIN_FILENO;
351 else {
352 fd = open(filename, O_RDONLY|O_CLOEXEC|O_NOCTTY);
353 if (fd < 0)
354 return log_error_errno(errno, "Failed to open %s: %m", filename);
355 }
356
357 u->input = fd;
358
359 if (arg_follow) {
360 r = sd_event_add_io(u->events, &u->input_event,
361 fd, EPOLLIN, dispatch_fd_input, u);
362 if (r < 0) {
363 if (r != -EPERM || arg_follow > 0)
364 return log_error_errno(r, "Failed to register input event: %m");
365
366 /* Normal files should just be consumed without polling. */
367 r = start_upload(u, fd_input_callback, u);
368 }
369 }
370
371 return r;
372 }
373
374 static int dispatch_sigterm(sd_event_source *event,
375 const struct signalfd_siginfo *si,
376 void *userdata) {
377 Uploader *u = userdata;
378
379 assert(u);
380
381 log_received_signal(LOG_INFO, si);
382
383 close_fd_input(u);
384 close_journal_input(u);
385
386 sd_event_exit(u->events, 0);
387 return 0;
388 }
389
390 static int setup_signals(Uploader *u) {
391 int r;
392
393 assert(u);
394
395 assert_se(sigprocmask_many(SIG_SETMASK, NULL, SIGINT, SIGTERM, -1) >= 0);
396
397 r = sd_event_add_signal(u->events, &u->sigterm_event, SIGTERM, dispatch_sigterm, u);
398 if (r < 0)
399 return r;
400
401 r = sd_event_add_signal(u->events, &u->sigint_event, SIGINT, dispatch_sigterm, u);
402 if (r < 0)
403 return r;
404
405 return 0;
406 }
407
408 static int setup_uploader(Uploader *u, const char *url, const char *state_file) {
409 int r;
410 const char *host, *proto = "";
411
412 assert(u);
413 assert(url);
414
415 *u = (Uploader) {
416 .input = -1
417 };
418
419 host = STARTSWITH_SET(url, "http://", "https://");
420 if (!host) {
421 host = url;
422 proto = "https://";
423 }
424
425 if (strchr(host, ':'))
426 u->url = strjoin(proto, url, "/upload");
427 else {
428 char *t;
429 size_t x;
430
431 t = strdupa(url);
432 x = strlen(t);
433 while (x > 0 && t[x - 1] == '/')
434 t[x - 1] = '\0';
435
436 u->url = strjoin(proto, t, ":" STRINGIFY(DEFAULT_PORT), "/upload");
437 }
438 if (!u->url)
439 return log_oom();
440
441 u->state_file = state_file;
442
443 r = sd_event_default(&u->events);
444 if (r < 0)
445 return log_error_errno(r, "sd_event_default failed: %m");
446
447 r = setup_signals(u);
448 if (r < 0)
449 return log_error_errno(r, "Failed to set up signals: %m");
450
451 (void) sd_watchdog_enabled(false, &u->watchdog_usec);
452
453 return load_cursor_state(u);
454 }
455
456 static void destroy_uploader(Uploader *u) {
457 assert(u);
458
459 curl_easy_cleanup(u->easy);
460 curl_slist_free_all(u->header);
461 free(u->answer);
462
463 free(u->last_cursor);
464 free(u->current_cursor);
465
466 free(u->url);
467
468 u->input_event = sd_event_source_unref(u->input_event);
469
470 close_fd_input(u);
471 close_journal_input(u);
472
473 sd_event_source_unref(u->sigterm_event);
474 sd_event_source_unref(u->sigint_event);
475 sd_event_unref(u->events);
476 }
477
478 static int perform_upload(Uploader *u) {
479 CURLcode code;
480 long status;
481
482 assert(u);
483
484 u->watchdog_timestamp = now(CLOCK_MONOTONIC);
485 code = curl_easy_perform(u->easy);
486 if (code) {
487 if (u->error[0])
488 log_error("Upload to %s failed: %.*s",
489 u->url, (int) sizeof(u->error), u->error);
490 else
491 log_error("Upload to %s failed: %s",
492 u->url, curl_easy_strerror(code));
493 return -EIO;
494 }
495
496 code = curl_easy_getinfo(u->easy, CURLINFO_RESPONSE_CODE, &status);
497 if (code)
498 return log_error_errno(SYNTHETIC_ERRNO(EUCLEAN),
499 "Failed to retrieve response code: %s",
500 curl_easy_strerror(code));
501
502 if (status >= 300)
503 return log_error_errno(SYNTHETIC_ERRNO(EIO),
504 "Upload to %s failed with code %ld: %s",
505 u->url, status, strna(u->answer));
506 else if (status < 200)
507 return log_error_errno(SYNTHETIC_ERRNO(EIO),
508 "Upload to %s finished with unexpected code %ld: %s",
509 u->url, status, strna(u->answer));
510 else
511 log_debug("Upload finished successfully with code %ld: %s",
512 status, strna(u->answer));
513
514 free_and_replace(u->last_cursor, u->current_cursor);
515
516 return update_cursor_state(u);
517 }
518
519 static int config_parse_path_or_ignore(
520 const char *unit,
521 const char *filename,
522 unsigned line,
523 const char *section,
524 unsigned section_line,
525 const char *lvalue,
526 int ltype,
527 const char *rvalue,
528 void *data,
529 void *userdata) {
530
531 _cleanup_free_ char *n = NULL;
532 bool fatal = ltype;
533 char **s = data;
534 int r;
535
536 assert(filename);
537 assert(lvalue);
538 assert(rvalue);
539 assert(data);
540
541 if (isempty(rvalue))
542 goto finalize;
543
544 n = strdup(rvalue);
545 if (!n)
546 return log_oom();
547
548 if (streq(n, "-"))
549 goto finalize;
550
551 r = path_simplify_and_warn(n, PATH_CHECK_ABSOLUTE | (fatal ? PATH_CHECK_FATAL : 0), unit, filename, line, lvalue);
552 if (r < 0)
553 return fatal ? -ENOEXEC : 0;
554
555 finalize:
556 return free_and_replace(*s, n);
557 }
558
559 static int parse_config(void) {
560 const ConfigTableItem items[] = {
561 { "Upload", "URL", config_parse_string, 0, &arg_url },
562 { "Upload", "ServerKeyFile", config_parse_path_or_ignore, 0, &arg_key },
563 { "Upload", "ServerCertificateFile", config_parse_path_or_ignore, 0, &arg_cert },
564 { "Upload", "TrustedCertificateFile", config_parse_path_or_ignore, 0, &arg_trust },
565 {}};
566
567 return config_parse_many_nulstr(PKGSYSCONFDIR "/journal-upload.conf",
568 CONF_PATHS_NULSTR("systemd/journal-upload.conf.d"),
569 "Upload\0", config_item_table_lookup, items,
570 CONFIG_PARSE_WARN, NULL);
571 }
572
573 static int help(void) {
574 _cleanup_free_ char *link = NULL;
575 int r;
576
577 r = terminal_urlify_man("systemd-journal-upload.service", "8", &link);
578 if (r < 0)
579 return log_oom();
580
581 printf("%s -u URL {FILE|-}...\n\n"
582 "Upload journal events to a remote server.\n\n"
583 " -h --help Show this help\n"
584 " --version Show package version\n"
585 " -u --url=URL Upload to this address (default port "
586 STRINGIFY(DEFAULT_PORT) ")\n"
587 " --key=FILENAME Specify key in PEM format (default:\n"
588 " \"" PRIV_KEY_FILE "\")\n"
589 " --cert=FILENAME Specify certificate in PEM format (default:\n"
590 " \"" CERT_FILE "\")\n"
591 " --trust=FILENAME|all Specify CA certificate or disable checking (default:\n"
592 " \"" TRUST_FILE "\")\n"
593 " --system Use the system journal\n"
594 " --user Use the user journal for the current user\n"
595 " -m --merge Use all available journals\n"
596 " -M --machine=CONTAINER Operate on local container\n"
597 " -D --directory=PATH Use journal files from directory\n"
598 " --file=PATH Use this journal file\n"
599 " --cursor=CURSOR Start at the specified cursor\n"
600 " --after-cursor=CURSOR Start after the specified cursor\n"
601 " --follow[=BOOL] Do [not] wait for input\n"
602 " --save-state[=FILE] Save uploaded cursors (default \n"
603 " " STATE_FILE ")\n"
604 "\nSee the %s for details.\n"
605 , program_invocation_short_name
606 , link
607 );
608
609 return 0;
610 }
611
612 static int parse_argv(int argc, char *argv[]) {
613 enum {
614 ARG_VERSION = 0x100,
615 ARG_KEY,
616 ARG_CERT,
617 ARG_TRUST,
618 ARG_USER,
619 ARG_SYSTEM,
620 ARG_FILE,
621 ARG_CURSOR,
622 ARG_AFTER_CURSOR,
623 ARG_FOLLOW,
624 ARG_SAVE_STATE,
625 };
626
627 static const struct option options[] = {
628 { "help", no_argument, NULL, 'h' },
629 { "version", no_argument, NULL, ARG_VERSION },
630 { "url", required_argument, NULL, 'u' },
631 { "key", required_argument, NULL, ARG_KEY },
632 { "cert", required_argument, NULL, ARG_CERT },
633 { "trust", required_argument, NULL, ARG_TRUST },
634 { "system", no_argument, NULL, ARG_SYSTEM },
635 { "user", no_argument, NULL, ARG_USER },
636 { "merge", no_argument, NULL, 'm' },
637 { "machine", required_argument, NULL, 'M' },
638 { "directory", required_argument, NULL, 'D' },
639 { "file", required_argument, NULL, ARG_FILE },
640 { "cursor", required_argument, NULL, ARG_CURSOR },
641 { "after-cursor", required_argument, NULL, ARG_AFTER_CURSOR },
642 { "follow", optional_argument, NULL, ARG_FOLLOW },
643 { "save-state", optional_argument, NULL, ARG_SAVE_STATE },
644 {}
645 };
646
647 int c, r;
648
649 assert(argc >= 0);
650 assert(argv);
651
652 opterr = 0;
653
654 while ((c = getopt_long(argc, argv, "hu:mM:D:", options, NULL)) >= 0)
655 switch(c) {
656 case 'h':
657 return help();
658
659 case ARG_VERSION:
660 return version();
661
662 case 'u':
663 if (arg_url)
664 return log_error_errno(SYNTHETIC_ERRNO(EINVAL),
665 "cannot use more than one --url");
666
667 arg_url = optarg;
668 break;
669
670 case ARG_KEY:
671 if (arg_key)
672 return log_error_errno(SYNTHETIC_ERRNO(EINVAL),
673 "cannot use more than one --key");
674
675 arg_key = optarg;
676 break;
677
678 case ARG_CERT:
679 if (arg_cert)
680 return log_error_errno(SYNTHETIC_ERRNO(EINVAL),
681 "cannot use more than one --cert");
682
683 arg_cert = optarg;
684 break;
685
686 case ARG_TRUST:
687 if (arg_trust)
688 return log_error_errno(SYNTHETIC_ERRNO(EINVAL),
689 "cannot use more than one --trust");
690
691 arg_trust = optarg;
692 break;
693
694 case ARG_SYSTEM:
695 arg_journal_type |= SD_JOURNAL_SYSTEM;
696 break;
697
698 case ARG_USER:
699 arg_journal_type |= SD_JOURNAL_CURRENT_USER;
700 break;
701
702 case 'm':
703 arg_merge = true;
704 break;
705
706 case 'M':
707 if (arg_machine)
708 return log_error_errno(SYNTHETIC_ERRNO(EINVAL),
709 "cannot use more than one --machine/-M");
710
711 arg_machine = optarg;
712 break;
713
714 case 'D':
715 if (arg_directory)
716 return log_error_errno(SYNTHETIC_ERRNO(EINVAL),
717 "cannot use more than one --directory/-D");
718
719 arg_directory = optarg;
720 break;
721
722 case ARG_FILE:
723 r = glob_extend(&arg_file, optarg, GLOB_NOCHECK);
724 if (r < 0)
725 return log_error_errno(r, "Failed to add paths: %m");
726 break;
727
728 case ARG_CURSOR:
729 if (arg_cursor)
730 return log_error_errno(SYNTHETIC_ERRNO(EINVAL),
731 "cannot use more than one --cursor/--after-cursor");
732
733 arg_cursor = optarg;
734 break;
735
736 case ARG_AFTER_CURSOR:
737 if (arg_cursor)
738 return log_error_errno(SYNTHETIC_ERRNO(EINVAL),
739 "cannot use more than one --cursor/--after-cursor");
740
741 arg_cursor = optarg;
742 arg_after_cursor = true;
743 break;
744
745 case ARG_FOLLOW:
746 if (optarg) {
747 r = parse_boolean(optarg);
748 if (r < 0)
749 return log_error_errno(SYNTHETIC_ERRNO(EINVAL),
750 "Failed to parse --follow= parameter.");
751
752 arg_follow = !!r;
753 } else
754 arg_follow = true;
755
756 break;
757
758 case ARG_SAVE_STATE:
759 arg_save_state = optarg ?: STATE_FILE;
760 break;
761
762 case '?':
763 return log_error_errno(SYNTHETIC_ERRNO(EINVAL),
764 "Unknown option %s.",
765 argv[optind - 1]);
766
767 case ':':
768 return log_error_errno(SYNTHETIC_ERRNO(EINVAL),
769 "Missing argument to %s.",
770 argv[optind - 1]);
771
772 default:
773 assert_not_reached("Unhandled option code.");
774 }
775
776 if (!arg_url)
777 return log_error_errno(SYNTHETIC_ERRNO(EINVAL),
778 "Required --url/-u option missing.");
779
780 if (!!arg_key != !!arg_cert)
781 return log_error_errno(SYNTHETIC_ERRNO(EINVAL),
782 "Options --key and --cert must be used together.");
783
784 if (optind < argc && (arg_directory || arg_file || arg_machine || arg_journal_type))
785 return log_error_errno(SYNTHETIC_ERRNO(EINVAL),
786 "Input arguments make no sense with journal input.");
787
788 return 1;
789 }
790
791 static int open_journal(sd_journal **j) {
792 int r;
793
794 if (arg_directory)
795 r = sd_journal_open_directory(j, arg_directory, arg_journal_type);
796 else if (arg_file)
797 r = sd_journal_open_files(j, (const char**) arg_file, 0);
798 else if (arg_machine) {
799 #pragma GCC diagnostic push
800 #pragma GCC diagnostic ignored "-Wdeprecated-declarations"
801 /* FIXME: replace with D-Bus call OpenMachineRootDirectory() so that things also work with raw disk images */
802 r = sd_journal_open_container(j, arg_machine, 0);
803 #pragma GCC diagnostic pop
804 } else
805 r = sd_journal_open(j, !arg_merge*SD_JOURNAL_LOCAL_ONLY + arg_journal_type);
806 if (r < 0)
807 log_error_errno(r, "Failed to open %s: %m",
808 arg_directory ? arg_directory : arg_file ? "files" : "journal");
809 return r;
810 }
811
812 static int run(int argc, char **argv) {
813 _cleanup_(notify_on_cleanup) const char *notify_message = NULL;
814 _cleanup_(destroy_uploader) Uploader u = {};
815 bool use_journal;
816 int r;
817
818 log_show_color(true);
819 log_parse_environment();
820
821 /* The journal merging logic potentially needs a lot of fds. */
822 (void) rlimit_nofile_bump(HIGH_RLIMIT_NOFILE);
823
824 r = parse_config();
825 if (r < 0)
826 return r;
827
828 r = parse_argv(argc, argv);
829 if (r <= 0)
830 return r;
831
832 sigbus_install();
833
834 r = setup_uploader(&u, arg_url, arg_save_state);
835 if (r < 0)
836 return r;
837
838 sd_event_set_watchdog(u.events, true);
839
840 r = check_cursor_updating(&u);
841 if (r < 0)
842 return r;
843
844 log_debug("%s running as pid "PID_FMT,
845 program_invocation_short_name, getpid_cached());
846
847 use_journal = optind >= argc;
848 if (use_journal) {
849 sd_journal *j;
850 r = open_journal(&j);
851 if (r < 0)
852 return r;
853 r = open_journal_for_upload(&u, j,
854 arg_cursor ?: u.last_cursor,
855 arg_cursor ? arg_after_cursor : true,
856 !!arg_follow);
857 if (r < 0)
858 return r;
859 }
860
861 notify_message = notify_start("READY=1\n"
862 "STATUS=Processing input...",
863 NOTIFY_STOPPING);
864
865 for (;;) {
866 r = sd_event_get_state(u.events);
867 if (r < 0)
868 return r;
869 if (r == SD_EVENT_FINISHED)
870 return 0;
871
872 if (use_journal) {
873 if (!u.journal)
874 return 0;
875
876 r = check_journal_input(&u);
877 } else if (u.input < 0 && !use_journal) {
878 if (optind >= argc)
879 return 0;
880
881 log_debug("Using %s as input.", argv[optind]);
882 r = open_file_for_upload(&u, argv[optind++]);
883 }
884 if (r < 0)
885 return r;
886
887 if (u.uploading) {
888 r = perform_upload(&u);
889 if (r < 0)
890 return r;
891 }
892
893 r = sd_event_run(u.events, u.timeout);
894 if (r < 0)
895 return log_error_errno(r, "Failed to run event loop: %m");
896 }
897 }
898
899 DEFINE_MAIN_FUNCTION(run);