return 0;
}
-static int setup_journal(const char *directory, uid_t uid_shift, uid_t uid_range) {
+static int setup_journal(const char *root_dir, const char *persistent_path, uid_t chown_uid, uid_t chown_range) {
_cleanup_free_ char *d = NULL;
sd_id128_t this_id;
bool try;
int r;
+ assert(root_dir);
+
/* Don't link journals in ephemeral mode */
if (arg_ephemeral)
return 0;
try = arg_link_journal_try || arg_link_journal == LINK_AUTO;
+ if (!persistent_path) {
+ if (try) {
+ log_debug("No persistent path available, skipping journal linking.");
+ return 0;
+ } else
+ return log_error_errno(
+ SYNTHETIC_ERRNO(ENOENT),
+ "Journal linking requested but no persistent directory available. "
+ "Use --directory, or --link-journal=auto/try-guest/try-host for optional linking.");
+ }
+
r = sd_id128_get_machine(&this_id);
if (r < 0)
return log_error_errno(r, "Failed to retrieve machine ID: %m");
}
FOREACH_STRING(dirname, "/var", "/var/log", "/var/log/journal") {
- r = userns_mkdir(directory, dirname, 0755, 0, 0);
+ r = userns_mkdir(root_dir, dirname, 0755, 0, 0);
if (r < 0) {
bool ignore = r == -EROFS && try;
log_full_errno(ignore ? LOG_DEBUG : LOG_ERR, r,
if (!p)
return log_oom();
- _cleanup_free_ char *q = path_join(directory, p);
+ _cleanup_free_ char *q = path_join(persistent_path, p);
if (!q)
return log_oom();
+ _cleanup_free_ char *container_path = path_join(root_dir, p);
+ if (!container_path)
+ return log_oom();
+
if (path_is_mount_point(p) > 0) {
if (try)
return 0;
"%s: already a mount point, refusing to use for journal", p);
}
- if (path_is_mount_point(q) > 0) {
+ if (path_is_mount_point(container_path) > 0) {
if (try)
return 0;
- return log_error_errno(SYNTHETIC_ERRNO(EEXIST),
- "%s: already a mount point, refusing to use for journal", q);
+ return log_error_errno(
+ SYNTHETIC_ERRNO(EEXIST),
+ "%s: already a mount point, refusing to use for journal",
+ container_path);
}
r = readlink_and_make_absolute(p, &d);
if (IN_SET(arg_link_journal, LINK_GUEST, LINK_AUTO) &&
path_equal(d, q)) {
- r = userns_mkdir(directory, p, 0755, 0, 0);
+ r = userns_mkdir(root_dir, p, 0755, 0, 0);
if (r < 0)
- log_warning_errno(r, "Failed to create directory %s: %m", q);
+ log_warning_errno(r, "Failed to create directory %s: %m", container_path);
return 0;
}
return log_error_errno(errno, "Failed to symlink %s to %s: %m", q, p);
}
- r = userns_mkdir(directory, p, 0755, 0, 0);
+ r = userns_mkdir(root_dir, p, 0755, 0, 0);
if (r < 0)
- log_warning_errno(r, "Failed to create directory %s: %m", q);
+ log_warning_errno(r, "Failed to create directory %s: %m", container_path);
return 0;
}
} else if (access(p, F_OK) < 0)
return 0;
- if (dir_is_empty(q, /* ignore_hidden_or_backup= */ false) == 0)
- log_warning("%s is not empty, proceeding anyway.", q);
+ if (dir_is_empty(container_path, /* ignore_hidden_or_backup= */ false) == 0)
+ log_warning("%s is not empty, proceeding anyway.", container_path);
- r = userns_mkdir(directory, p, 0755, 0, 0);
+ r = userns_mkdir(root_dir, p, 0755, 0, 0);
if (r < 0)
- return log_error_errno(r, "Failed to create %s: %m", q);
+ return log_error_errno(r, "Failed to create %s: %m", container_path);
return mount_custom(
- directory,
+ root_dir,
&(CustomMount) {
.type = CUSTOM_MOUNT_BIND,
- .options = (char*) (uid_is_valid(uid_shift) ? "rootidmap" : NULL),
+ .options = (char*) (uid_is_valid(chown_uid) ? "rootidmap" : NULL),
.source = p,
.destination = p,
.destination_uid = UID_INVALID,
},
/* n = */ 1,
- uid_shift,
- uid_range,
+ chown_uid,
+ chown_range,
arg_selinux_apifs_context,
MOUNT_NON_ROOT_ONLY);
}
static int outer_child(
Barrier *barrier,
const char *directory,
+ const char *persistent_path,
int mount_fd,
DissectedImage *dissected_image,
int fd_outer_socket,
if (r < 0)
return r;
- r = setup_journal(directory, chown_uid, chown_range);
+ r = setup_journal(directory, persistent_path, chown_uid, chown_range);
if (r < 0)
return r;
static int run_container(
const char *directory,
+ const char *persistent_path,
int mount_fd,
DissectedImage *dissected_image,
int userns_fd,
r = outer_child(&barrier,
directory,
+ persistent_path,
mount_fd,
dissected_image,
fd_outer_socket_pair[1],
_cleanup_(dissected_image_unrefp) DissectedImage *dissected_image = NULL;
_cleanup_(sd_netlink_unrefp) sd_netlink *nfnl = NULL;
_cleanup_(pidref_done) PidRef pid = PIDREF_NULL;
+ _cleanup_free_ char *persistent_path_storage = NULL;
log_setup();
arg_architecture = dissected_image_architecture(dissected_image);
}
+ /* Journal linking creates symlinks from the host's /var/log/journal/<uuid> to a persistent directory
+ * that survives container restarts, allowing journalctl -M to read container logs. But where that
+ * persistent directory is can be quite different depending on the mode:
+ *
+ * For --directory: The directory itself is the persistent location.
+ * For --image: Use /var/lib/machines/<machine-name> if it exists as a directory.
+ *
+ * Otherwise, we skip journal linking.
+ */
+ const char *persistent_path;
+ if (arg_directory)
+ persistent_path = arg_directory;
+ else if (arg_image) {
+ persistent_path_storage = path_join("/var/lib/machines", arg_machine);
+ if (!persistent_path_storage) {
+ r = log_oom();
+ goto finish;
+ }
+
+ /* Validate that the persistent path exists and is actually a directory. We cannot create it
+ * ourselves as that would conflict with image management. */
+ struct stat st;
+ if (stat(persistent_path_storage, &st) < 0) {
+ if (errno == ENOENT)
+ log_debug("Persistent directory %s does not exist, skipping journal linking.",
+ persistent_path_storage);
+ else
+ log_warning_errno(
+ errno,
+ "Failed to access persistent directory %s, skipping journal linking: %m",
+ persistent_path_storage);
+ persistent_path = NULL;
+ } else if (!S_ISDIR(st.st_mode)) {
+ log_warning("%s exists but is not a directory, skipping journal linking.",
+ persistent_path_storage);
+ persistent_path = NULL;
+ } else
+ persistent_path = persistent_path_storage;
+ } else
+ assert_not_reached();
+
/* Create a temporary place to mount stuff. */
r = mkdtemp_malloc("/tmp/nspawn-root-XXXXXX", &rootdir);
if (r < 0) {
for (;;) {
r = run_container(
rootdir,
+ persistent_path,
mount_fd,
dissected_image,
userns_fd,