]> git.ipfire.org Git - thirdparty/systemd.git/blob - src/journal-remote/journal-upload.c
conf-parser: turn three bool function params into a flags fields
[thirdparty/systemd.git] / src / journal-remote / journal-upload.c
1 /***
2 This file is part of systemd.
3
4 Copyright 2014 Zbigniew Jędrzejewski-Szmek
5
6 systemd is free software; you can redistribute it and/or modify it
7 under the terms of the GNU Lesser General Public License as published by
8 the Free Software Foundation; either version 2.1 of the License, or
9 (at your option) any later version.
10
11 systemd is distributed in the hope that it will be useful, but
12 WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 Lesser General Public License for more details.
15
16 You should have received a copy of the GNU Lesser General Public License
17 along with systemd; If not, see <http://www.gnu.org/licenses/>.
18 ***/
19
20 #include <curl/curl.h>
21 #include <fcntl.h>
22 #include <getopt.h>
23 #include <stdio.h>
24 #include <sys/stat.h>
25
26 #include "sd-daemon.h"
27
28 #include "alloc-util.h"
29 #include "conf-parser.h"
30 #include "def.h"
31 #include "fd-util.h"
32 #include "fileio.h"
33 #include "format-util.h"
34 #include "glob-util.h"
35 #include "journal-upload.h"
36 #include "log.h"
37 #include "mkdir.h"
38 #include "parse-util.h"
39 #include "sigbus.h"
40 #include "signal-util.h"
41 #include "string-util.h"
42 #include "util.h"
43
44 #define PRIV_KEY_FILE CERTIFICATE_ROOT "/private/journal-upload.pem"
45 #define CERT_FILE CERTIFICATE_ROOT "/certs/journal-upload.pem"
46 #define TRUST_FILE CERTIFICATE_ROOT "/ca/trusted.pem"
47 #define DEFAULT_PORT 19532
48
49 static const char* arg_url = NULL;
50 static const char *arg_key = NULL;
51 static const char *arg_cert = NULL;
52 static const char *arg_trust = NULL;
53 static const char *arg_directory = NULL;
54 static char **arg_file = NULL;
55 static const char *arg_cursor = NULL;
56 static bool arg_after_cursor = false;
57 static int arg_journal_type = 0;
58 static const char *arg_machine = NULL;
59 static bool arg_merge = false;
60 static int arg_follow = -1;
61 static const char *arg_save_state = NULL;
62
63 static void close_fd_input(Uploader *u);
64
65 #define SERVER_ANSWER_KEEP 2048
66
67 #define STATE_FILE "/var/lib/systemd/journal-upload/state"
68
69 #define easy_setopt(curl, opt, value, level, cmd) \
70 do { \
71 code = curl_easy_setopt(curl, opt, value); \
72 if (code) { \
73 log_full(level, \
74 "curl_easy_setopt " #opt " failed: %s", \
75 curl_easy_strerror(code)); \
76 cmd; \
77 } \
78 } while (0)
79
80 static size_t output_callback(char *buf,
81 size_t size,
82 size_t nmemb,
83 void *userp) {
84 Uploader *u = userp;
85
86 assert(u);
87
88 log_debug("The server answers (%zu bytes): %.*s",
89 size*nmemb, (int)(size*nmemb), buf);
90
91 if (nmemb && !u->answer) {
92 u->answer = strndup(buf, size*nmemb);
93 if (!u->answer)
94 log_warning_errno(ENOMEM, "Failed to store server answer (%zu bytes): %m",
95 size*nmemb);
96 }
97
98 return size * nmemb;
99 }
100
101 static int check_cursor_updating(Uploader *u) {
102 _cleanup_free_ char *temp_path = NULL;
103 _cleanup_fclose_ FILE *f = NULL;
104 int r;
105
106 if (!u->state_file)
107 return 0;
108
109 r = mkdir_parents(u->state_file, 0755);
110 if (r < 0)
111 return log_error_errno(r, "Cannot create parent directory of state file %s: %m",
112 u->state_file);
113
114 r = fopen_temporary(u->state_file, &f, &temp_path);
115 if (r < 0)
116 return log_error_errno(r, "Cannot save state to %s: %m",
117 u->state_file);
118 unlink(temp_path);
119
120 return 0;
121 }
122
123 static int update_cursor_state(Uploader *u) {
124 _cleanup_free_ char *temp_path = NULL;
125 _cleanup_fclose_ FILE *f = NULL;
126 int r;
127
128 if (!u->state_file || !u->last_cursor)
129 return 0;
130
131 r = fopen_temporary(u->state_file, &f, &temp_path);
132 if (r < 0)
133 goto fail;
134
135 fprintf(f,
136 "# This is private data. Do not parse.\n"
137 "LAST_CURSOR=%s\n",
138 u->last_cursor);
139
140 r = fflush_and_check(f);
141 if (r < 0)
142 goto fail;
143
144 if (rename(temp_path, u->state_file) < 0) {
145 r = -errno;
146 goto fail;
147 }
148
149 return 0;
150
151 fail:
152 if (temp_path)
153 (void) unlink(temp_path);
154
155 (void) unlink(u->state_file);
156
157 return log_error_errno(r, "Failed to save state %s: %m", u->state_file);
158 }
159
160 static int load_cursor_state(Uploader *u) {
161 int r;
162
163 if (!u->state_file)
164 return 0;
165
166 r = parse_env_file(u->state_file, NEWLINE,
167 "LAST_CURSOR", &u->last_cursor,
168 NULL);
169
170 if (r == -ENOENT)
171 log_debug("State file %s is not present.", u->state_file);
172 else if (r < 0)
173 return log_error_errno(r, "Failed to read state file %s: %m",
174 u->state_file);
175 else
176 log_debug("Last cursor was %s", u->last_cursor);
177
178 return 0;
179 }
180
181
182
183 int start_upload(Uploader *u,
184 size_t (*input_callback)(void *ptr,
185 size_t size,
186 size_t nmemb,
187 void *userdata),
188 void *data) {
189 CURLcode code;
190
191 assert(u);
192 assert(input_callback);
193
194 if (!u->header) {
195 struct curl_slist *h;
196
197 h = curl_slist_append(NULL, "Content-Type: application/vnd.fdo.journal");
198 if (!h)
199 return log_oom();
200
201 h = curl_slist_append(h, "Transfer-Encoding: chunked");
202 if (!h) {
203 curl_slist_free_all(h);
204 return log_oom();
205 }
206
207 h = curl_slist_append(h, "Accept: text/plain");
208 if (!h) {
209 curl_slist_free_all(h);
210 return log_oom();
211 }
212
213 u->header = h;
214 }
215
216 if (!u->easy) {
217 CURL *curl;
218
219 curl = curl_easy_init();
220 if (!curl) {
221 log_error("Call to curl_easy_init failed.");
222 return -ENOSR;
223 }
224
225 /* tell it to POST to the URL */
226 easy_setopt(curl, CURLOPT_POST, 1L,
227 LOG_ERR, return -EXFULL);
228
229 easy_setopt(curl, CURLOPT_ERRORBUFFER, u->error,
230 LOG_ERR, return -EXFULL);
231
232 /* set where to write to */
233 easy_setopt(curl, CURLOPT_WRITEFUNCTION, output_callback,
234 LOG_ERR, return -EXFULL);
235
236 easy_setopt(curl, CURLOPT_WRITEDATA, data,
237 LOG_ERR, return -EXFULL);
238
239 /* set where to read from */
240 easy_setopt(curl, CURLOPT_READFUNCTION, input_callback,
241 LOG_ERR, return -EXFULL);
242
243 easy_setopt(curl, CURLOPT_READDATA, data,
244 LOG_ERR, return -EXFULL);
245
246 /* use our special own mime type and chunked transfer */
247 easy_setopt(curl, CURLOPT_HTTPHEADER, u->header,
248 LOG_ERR, return -EXFULL);
249
250 if (_unlikely_(log_get_max_level() >= LOG_DEBUG))
251 /* enable verbose for easier tracing */
252 easy_setopt(curl, CURLOPT_VERBOSE, 1L, LOG_WARNING, );
253
254 easy_setopt(curl, CURLOPT_USERAGENT,
255 "systemd-journal-upload " PACKAGE_STRING,
256 LOG_WARNING, );
257
258 if (arg_key || startswith(u->url, "https://")) {
259 easy_setopt(curl, CURLOPT_SSLKEY, arg_key ?: PRIV_KEY_FILE,
260 LOG_ERR, return -EXFULL);
261 easy_setopt(curl, CURLOPT_SSLCERT, arg_cert ?: CERT_FILE,
262 LOG_ERR, return -EXFULL);
263 }
264
265 if (streq_ptr(arg_trust, "all"))
266 easy_setopt(curl, CURLOPT_SSL_VERIFYPEER, 0,
267 LOG_ERR, return -EUCLEAN);
268 else if (arg_trust || startswith(u->url, "https://"))
269 easy_setopt(curl, CURLOPT_CAINFO, arg_trust ?: TRUST_FILE,
270 LOG_ERR, return -EXFULL);
271
272 if (arg_key || arg_trust)
273 easy_setopt(curl, CURLOPT_SSLVERSION, CURL_SSLVERSION_TLSv1,
274 LOG_WARNING, );
275
276 u->easy = curl;
277 } else {
278 /* truncate the potential old error message */
279 u->error[0] = '\0';
280
281 free(u->answer);
282 u->answer = 0;
283 }
284
285 /* upload to this place */
286 code = curl_easy_setopt(u->easy, CURLOPT_URL, u->url);
287 if (code) {
288 log_error("curl_easy_setopt CURLOPT_URL failed: %s",
289 curl_easy_strerror(code));
290 return -EXFULL;
291 }
292
293 u->uploading = true;
294
295 return 0;
296 }
297
298 static size_t fd_input_callback(void *buf, size_t size, size_t nmemb, void *userp) {
299 Uploader *u = userp;
300
301 ssize_t r;
302
303 assert(u);
304 assert(nmemb <= SSIZE_MAX / size);
305
306 if (u->input < 0)
307 return 0;
308
309 r = read(u->input, buf, size * nmemb);
310 log_debug("%s: allowed %zu, read %zd", __func__, size*nmemb, r);
311
312 if (r > 0)
313 return r;
314
315 u->uploading = false;
316 if (r == 0) {
317 log_debug("Reached EOF");
318 close_fd_input(u);
319 return 0;
320 } else {
321 log_error_errno(errno, "Aborting transfer after read error on input: %m.");
322 return CURL_READFUNC_ABORT;
323 }
324 }
325
326 static void close_fd_input(Uploader *u) {
327 assert(u);
328
329 if (u->input >= 0)
330 close_nointr(u->input);
331 u->input = -1;
332 u->timeout = 0;
333 }
334
335 static int dispatch_fd_input(sd_event_source *event,
336 int fd,
337 uint32_t revents,
338 void *userp) {
339 Uploader *u = userp;
340
341 assert(u);
342 assert(fd >= 0);
343
344 if (revents & EPOLLHUP) {
345 log_debug("Received HUP");
346 close_fd_input(u);
347 return 0;
348 }
349
350 if (!(revents & EPOLLIN)) {
351 log_warning("Unexpected poll event %"PRIu32".", revents);
352 return -EINVAL;
353 }
354
355 if (u->uploading) {
356 log_warning("dispatch_fd_input called when uploading, ignoring.");
357 return 0;
358 }
359
360 return start_upload(u, fd_input_callback, u);
361 }
362
363 static int open_file_for_upload(Uploader *u, const char *filename) {
364 int fd, r = 0;
365
366 if (streq(filename, "-"))
367 fd = STDIN_FILENO;
368 else {
369 fd = open(filename, O_RDONLY|O_CLOEXEC|O_NOCTTY);
370 if (fd < 0)
371 return log_error_errno(errno, "Failed to open %s: %m", filename);
372 }
373
374 u->input = fd;
375
376 if (arg_follow) {
377 r = sd_event_add_io(u->events, &u->input_event,
378 fd, EPOLLIN, dispatch_fd_input, u);
379 if (r < 0) {
380 if (r != -EPERM || arg_follow > 0)
381 return log_error_errno(r, "Failed to register input event: %m");
382
383 /* Normal files should just be consumed without polling. */
384 r = start_upload(u, fd_input_callback, u);
385 }
386 }
387
388 return r;
389 }
390
391 static int dispatch_sigterm(sd_event_source *event,
392 const struct signalfd_siginfo *si,
393 void *userdata) {
394 Uploader *u = userdata;
395
396 assert(u);
397
398 log_received_signal(LOG_INFO, si);
399
400 close_fd_input(u);
401 close_journal_input(u);
402
403 sd_event_exit(u->events, 0);
404 return 0;
405 }
406
407 static int setup_signals(Uploader *u) {
408 int r;
409
410 assert(u);
411
412 assert_se(sigprocmask_many(SIG_SETMASK, NULL, SIGINT, SIGTERM, -1) >= 0);
413
414 r = sd_event_add_signal(u->events, &u->sigterm_event, SIGTERM, dispatch_sigterm, u);
415 if (r < 0)
416 return r;
417
418 r = sd_event_add_signal(u->events, &u->sigint_event, SIGINT, dispatch_sigterm, u);
419 if (r < 0)
420 return r;
421
422 return 0;
423 }
424
425 static int setup_uploader(Uploader *u, const char *url, const char *state_file) {
426 int r;
427 const char *host, *proto = "";
428
429 assert(u);
430 assert(url);
431
432 memzero(u, sizeof(Uploader));
433 u->input = -1;
434
435 if (!(host = startswith(url, "http://")) && !(host = startswith(url, "https://"))) {
436 host = url;
437 proto = "https://";
438 }
439
440 if (strchr(host, ':'))
441 u->url = strjoin(proto, url, "/upload");
442 else {
443 char *t;
444 size_t x;
445
446 t = strdupa(url);
447 x = strlen(t);
448 while (x > 0 && t[x - 1] == '/')
449 t[x - 1] = '\0';
450
451 u->url = strjoin(proto, t, ":" STRINGIFY(DEFAULT_PORT), "/upload");
452 }
453 if (!u->url)
454 return log_oom();
455
456 u->state_file = state_file;
457
458 r = sd_event_default(&u->events);
459 if (r < 0)
460 return log_error_errno(r, "sd_event_default failed: %m");
461
462 r = setup_signals(u);
463 if (r < 0)
464 return log_error_errno(r, "Failed to set up signals: %m");
465
466 (void) sd_watchdog_enabled(false, &u->watchdog_usec);
467
468 return load_cursor_state(u);
469 }
470
471 static void destroy_uploader(Uploader *u) {
472 assert(u);
473
474 curl_easy_cleanup(u->easy);
475 curl_slist_free_all(u->header);
476 free(u->answer);
477
478 free(u->last_cursor);
479 free(u->current_cursor);
480
481 free(u->url);
482
483 u->input_event = sd_event_source_unref(u->input_event);
484
485 close_fd_input(u);
486 close_journal_input(u);
487
488 sd_event_source_unref(u->sigterm_event);
489 sd_event_source_unref(u->sigint_event);
490 sd_event_unref(u->events);
491 }
492
493 static int perform_upload(Uploader *u) {
494 CURLcode code;
495 long status;
496
497 assert(u);
498
499 u->watchdog_timestamp = now(CLOCK_MONOTONIC);
500 code = curl_easy_perform(u->easy);
501 if (code) {
502 if (u->error[0])
503 log_error("Upload to %s failed: %.*s",
504 u->url, (int) sizeof(u->error), u->error);
505 else
506 log_error("Upload to %s failed: %s",
507 u->url, curl_easy_strerror(code));
508 return -EIO;
509 }
510
511 code = curl_easy_getinfo(u->easy, CURLINFO_RESPONSE_CODE, &status);
512 if (code) {
513 log_error("Failed to retrieve response code: %s",
514 curl_easy_strerror(code));
515 return -EUCLEAN;
516 }
517
518 if (status >= 300) {
519 log_error("Upload to %s failed with code %ld: %s",
520 u->url, status, strna(u->answer));
521 return -EIO;
522 } else if (status < 200) {
523 log_error("Upload to %s finished with unexpected code %ld: %s",
524 u->url, status, strna(u->answer));
525 return -EIO;
526 } else
527 log_debug("Upload finished successfully with code %ld: %s",
528 status, strna(u->answer));
529
530 free_and_replace(u->last_cursor, u->current_cursor);
531
532 return update_cursor_state(u);
533 }
534
535 static int parse_config(void) {
536 const ConfigTableItem items[] = {
537 { "Upload", "URL", config_parse_string, 0, &arg_url },
538 { "Upload", "ServerKeyFile", config_parse_path, 0, &arg_key },
539 { "Upload", "ServerCertificateFile", config_parse_path, 0, &arg_cert },
540 { "Upload", "TrustedCertificateFile", config_parse_path, 0, &arg_trust },
541 {}};
542
543 return config_parse_many_nulstr(PKGSYSCONFDIR "/journal-upload.conf",
544 CONF_PATHS_NULSTR("systemd/journal-upload.conf.d"),
545 "Upload\0", config_item_table_lookup, items,
546 CONFIG_PARSE_WARN, NULL);
547 }
548
549 static void help(void) {
550 printf("%s -u URL {FILE|-}...\n\n"
551 "Upload journal events to a remote server.\n\n"
552 " -h --help Show this help\n"
553 " --version Show package version\n"
554 " -u --url=URL Upload to this address (default port "
555 STRINGIFY(DEFAULT_PORT) ")\n"
556 " --key=FILENAME Specify key in PEM format (default:\n"
557 " \"" PRIV_KEY_FILE "\")\n"
558 " --cert=FILENAME Specify certificate in PEM format (default:\n"
559 " \"" CERT_FILE "\")\n"
560 " --trust=FILENAME|all Specify CA certificate or disable checking (default:\n"
561 " \"" TRUST_FILE "\")\n"
562 " --system Use the system journal\n"
563 " --user Use the user journal for the current user\n"
564 " -m --merge Use all available journals\n"
565 " -M --machine=CONTAINER Operate on local container\n"
566 " -D --directory=PATH Use journal files from directory\n"
567 " --file=PATH Use this journal file\n"
568 " --cursor=CURSOR Start at the specified cursor\n"
569 " --after-cursor=CURSOR Start after the specified cursor\n"
570 " --follow[=BOOL] Do [not] wait for input\n"
571 " --save-state[=FILE] Save uploaded cursors (default \n"
572 " " STATE_FILE ")\n"
573 " -h --help Show this help and exit\n"
574 " --version Print version string and exit\n"
575 , program_invocation_short_name);
576 }
577
578 static int parse_argv(int argc, char *argv[]) {
579 enum {
580 ARG_VERSION = 0x100,
581 ARG_KEY,
582 ARG_CERT,
583 ARG_TRUST,
584 ARG_USER,
585 ARG_SYSTEM,
586 ARG_FILE,
587 ARG_CURSOR,
588 ARG_AFTER_CURSOR,
589 ARG_FOLLOW,
590 ARG_SAVE_STATE,
591 };
592
593 static const struct option options[] = {
594 { "help", no_argument, NULL, 'h' },
595 { "version", no_argument, NULL, ARG_VERSION },
596 { "url", required_argument, NULL, 'u' },
597 { "key", required_argument, NULL, ARG_KEY },
598 { "cert", required_argument, NULL, ARG_CERT },
599 { "trust", required_argument, NULL, ARG_TRUST },
600 { "system", no_argument, NULL, ARG_SYSTEM },
601 { "user", no_argument, NULL, ARG_USER },
602 { "merge", no_argument, NULL, 'm' },
603 { "machine", required_argument, NULL, 'M' },
604 { "directory", required_argument, NULL, 'D' },
605 { "file", required_argument, NULL, ARG_FILE },
606 { "cursor", required_argument, NULL, ARG_CURSOR },
607 { "after-cursor", required_argument, NULL, ARG_AFTER_CURSOR },
608 { "follow", optional_argument, NULL, ARG_FOLLOW },
609 { "save-state", optional_argument, NULL, ARG_SAVE_STATE },
610 {}
611 };
612
613 int c, r;
614
615 assert(argc >= 0);
616 assert(argv);
617
618 opterr = 0;
619
620 while ((c = getopt_long(argc, argv, "hu:mM:D:", options, NULL)) >= 0)
621 switch(c) {
622 case 'h':
623 help();
624 return 0 /* done */;
625
626 case ARG_VERSION:
627 return version();
628
629 case 'u':
630 if (arg_url) {
631 log_error("cannot use more than one --url");
632 return -EINVAL;
633 }
634
635 arg_url = optarg;
636 break;
637
638 case ARG_KEY:
639 if (arg_key) {
640 log_error("cannot use more than one --key");
641 return -EINVAL;
642 }
643
644 arg_key = optarg;
645 break;
646
647 case ARG_CERT:
648 if (arg_cert) {
649 log_error("cannot use more than one --cert");
650 return -EINVAL;
651 }
652
653 arg_cert = optarg;
654 break;
655
656 case ARG_TRUST:
657 if (arg_trust) {
658 log_error("cannot use more than one --trust");
659 return -EINVAL;
660 }
661
662 arg_trust = optarg;
663 break;
664
665 case ARG_SYSTEM:
666 arg_journal_type |= SD_JOURNAL_SYSTEM;
667 break;
668
669 case ARG_USER:
670 arg_journal_type |= SD_JOURNAL_CURRENT_USER;
671 break;
672
673 case 'm':
674 arg_merge = true;
675 break;
676
677 case 'M':
678 if (arg_machine) {
679 log_error("cannot use more than one --machine/-M");
680 return -EINVAL;
681 }
682
683 arg_machine = optarg;
684 break;
685
686 case 'D':
687 if (arg_directory) {
688 log_error("cannot use more than one --directory/-D");
689 return -EINVAL;
690 }
691
692 arg_directory = optarg;
693 break;
694
695 case ARG_FILE:
696 r = glob_extend(&arg_file, optarg);
697 if (r < 0)
698 return log_error_errno(r, "Failed to add paths: %m");
699 break;
700
701 case ARG_CURSOR:
702 if (arg_cursor) {
703 log_error("cannot use more than one --cursor/--after-cursor");
704 return -EINVAL;
705 }
706
707 arg_cursor = optarg;
708 break;
709
710 case ARG_AFTER_CURSOR:
711 if (arg_cursor) {
712 log_error("cannot use more than one --cursor/--after-cursor");
713 return -EINVAL;
714 }
715
716 arg_cursor = optarg;
717 arg_after_cursor = true;
718 break;
719
720 case ARG_FOLLOW:
721 if (optarg) {
722 r = parse_boolean(optarg);
723 if (r < 0) {
724 log_error("Failed to parse --follow= parameter.");
725 return -EINVAL;
726 }
727
728 arg_follow = !!r;
729 } else
730 arg_follow = true;
731
732 break;
733
734 case ARG_SAVE_STATE:
735 arg_save_state = optarg ?: STATE_FILE;
736 break;
737
738 case '?':
739 log_error("Unknown option %s.", argv[optind-1]);
740 return -EINVAL;
741
742 case ':':
743 log_error("Missing argument to %s.", argv[optind-1]);
744 return -EINVAL;
745
746 default:
747 assert_not_reached("Unhandled option code.");
748 }
749
750 if (!arg_url) {
751 log_error("Required --url/-u option missing.");
752 return -EINVAL;
753 }
754
755 if (!!arg_key != !!arg_cert) {
756 log_error("Options --key and --cert must be used together.");
757 return -EINVAL;
758 }
759
760 if (optind < argc && (arg_directory || arg_file || arg_machine || arg_journal_type)) {
761 log_error("Input arguments make no sense with journal input.");
762 return -EINVAL;
763 }
764
765 return 1;
766 }
767
768 static int open_journal(sd_journal **j) {
769 int r;
770
771 if (arg_directory)
772 r = sd_journal_open_directory(j, arg_directory, arg_journal_type);
773 else if (arg_file)
774 r = sd_journal_open_files(j, (const char**) arg_file, 0);
775 else if (arg_machine)
776 r = sd_journal_open_container(j, arg_machine, 0);
777 else
778 r = sd_journal_open(j, !arg_merge*SD_JOURNAL_LOCAL_ONLY + arg_journal_type);
779 if (r < 0)
780 log_error_errno(r, "Failed to open %s: %m",
781 arg_directory ? arg_directory : arg_file ? "files" : "journal");
782 return r;
783 }
784
785 int main(int argc, char **argv) {
786 Uploader u;
787 int r;
788 bool use_journal;
789
790 log_show_color(true);
791 log_parse_environment();
792
793 r = parse_config();
794 if (r < 0)
795 goto finish;
796
797 r = parse_argv(argc, argv);
798 if (r <= 0)
799 goto finish;
800
801 sigbus_install();
802
803 r = setup_uploader(&u, arg_url, arg_save_state);
804 if (r < 0)
805 goto cleanup;
806
807 sd_event_set_watchdog(u.events, true);
808
809 r = check_cursor_updating(&u);
810 if (r < 0)
811 goto cleanup;
812
813 log_debug("%s running as pid "PID_FMT,
814 program_invocation_short_name, getpid_cached());
815
816 use_journal = optind >= argc;
817 if (use_journal) {
818 sd_journal *j;
819 r = open_journal(&j);
820 if (r < 0)
821 goto finish;
822 r = open_journal_for_upload(&u, j,
823 arg_cursor ?: u.last_cursor,
824 arg_cursor ? arg_after_cursor : true,
825 !!arg_follow);
826 if (r < 0)
827 goto finish;
828 }
829
830 sd_notify(false,
831 "READY=1\n"
832 "STATUS=Processing input...");
833
834 for (;;) {
835 r = sd_event_get_state(u.events);
836 if (r < 0)
837 break;
838 if (r == SD_EVENT_FINISHED)
839 break;
840
841 if (use_journal) {
842 if (!u.journal)
843 break;
844
845 r = check_journal_input(&u);
846 } else if (u.input < 0 && !use_journal) {
847 if (optind >= argc)
848 break;
849
850 log_debug("Using %s as input.", argv[optind]);
851 r = open_file_for_upload(&u, argv[optind++]);
852 }
853 if (r < 0)
854 goto cleanup;
855
856 if (u.uploading) {
857 r = perform_upload(&u);
858 if (r < 0)
859 break;
860 }
861
862 r = sd_event_run(u.events, u.timeout);
863 if (r < 0) {
864 log_error_errno(r, "Failed to run event loop: %m");
865 break;
866 }
867 }
868
869 cleanup:
870 sd_notify(false,
871 "STOPPING=1\n"
872 "STATUS=Shutting down...");
873
874 destroy_uploader(&u);
875
876 finish:
877 return r >= 0 ? EXIT_SUCCESS : EXIT_FAILURE;
878 }