blob: 5b16b6c3d975ac45ecc4d3fe900690c51c087092 [file] [log] [blame] [raw]
/*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
/***
This file is part of systemd.
Copyright 2014 Zbigniew Jędrzejewski-Szmek
systemd is free software; you can redistribute it and/or modify it
under the terms of the GNU Lesser General Public License as published by
the Free Software Foundation; either version 2.1 of the License, or
(at your option) any later version.
systemd is distributed in the hope that it will be useful, but
WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
Lesser General Public License for more details.
You should have received a copy of the GNU Lesser General Public License
along with systemd; If not, see <http://www.gnu.org/licenses/>.
***/
#include <stdlib.h>
#include <getopt.h>
#include "manager.h"
#include "bus-util.h"
#include "log.h"
#include "strv.h"
#include "build.h"
#include "pager.h"
#include "analyze-verify.h"
static int generate_path(char **var, char **filenames) {
char **filename;
_cleanup_strv_free_ char **ans = NULL;
int r;
STRV_FOREACH(filename, filenames) {
char *t;
t = dirname_malloc(*filename);
if (!t)
return -ENOMEM;
r = strv_consume(&ans, t);
if (r < 0)
return r;
}
assert_se(strv_uniq(ans));
r = strv_extend(&ans, "");
if (r < 0)
return r;
*var = strv_join(ans, ":");
if (!*var)
return -ENOMEM;
return 0;
}
static int verify_socket(Unit *u) {
int r;
assert(u);
if (u->type != UNIT_SOCKET)
return 0;
/* Cannot run this without the service being around */
/* This makes sure instance is created if necessary. */
r = socket_instantiate_service(SOCKET(u));
if (r < 0) {
log_error_unit(u->id, "Socket %s cannot be started, failed to create instance.",
u->id);
return r;
}
/* This checks both type of sockets */
if (UNIT_ISSET(SOCKET(u)->service)) {
Service *service;
service = SERVICE(UNIT_DEREF(SOCKET(u)->service));
log_debug_unit(u->id, "%s uses %s", u->id, UNIT(service)->id);
if (UNIT(service)->load_state != UNIT_LOADED) {
log_error_unit(u->id, "Service %s not loaded, %s cannot be started.",
UNIT(service)->id, u->id);
return -ENOENT;
}
}
return 0;
}
static int verify_executable(Unit *u, ExecCommand *exec) {
if (exec == NULL)
return 0;
if (access(exec->path, X_OK) < 0) {
log_error_unit(u->id, "%s: command %s is not executable: %m",
u->id, exec->path);
return -errno;
}
return 0;
}
static int verify_executables(Unit *u) {
ExecCommand *exec;
int r = 0, k;
unsigned i;
assert(u);
exec = u->type == UNIT_SOCKET ? SOCKET(u)->control_command :
u->type == UNIT_MOUNT ? MOUNT(u)->control_command :
u->type == UNIT_SWAP ? SWAP(u)->control_command : NULL;
k = verify_executable(u, exec);
if (k < 0 && r == 0)
r = k;
if (u->type == UNIT_SERVICE)
for (i = 0; i < ELEMENTSOF(SERVICE(u)->exec_command); i++) {
k = verify_executable(u, SERVICE(u)->exec_command[i]);
if (k < 0 && r == 0)
r = k;
}
if (u->type == UNIT_SOCKET)
for (i = 0; i < ELEMENTSOF(SOCKET(u)->exec_command); i++) {
k = verify_executable(u, SOCKET(u)->exec_command[i]);
if (k < 0 && r == 0)
r = k;
}
return r;
}
static int verify_documentation(Unit *u, bool check_man) {
char **p;
int r = 0, k;
STRV_FOREACH(p, u->documentation) {
log_debug_unit(u->id, "%s: found documentation item %s.", u->id, *p);
if (check_man && startswith(*p, "man:")) {
k = show_man_page(*p + 4, true);
if (k != 0) {
if (k < 0)
log_error_unit(u->id, "%s: can't show %s: %s",
u->id, *p, strerror(-r));
else {
log_error_unit(u->id, "%s: man %s command failed with code %d",
u->id, *p + 4, k);
k = -ENOEXEC;
}
if (r == 0)
r = k;
}
}
}
/* Check remote URLs? */
return r;
}
static int verify_unit(Unit *u, bool check_man) {
_cleanup_bus_error_free_ sd_bus_error err = SD_BUS_ERROR_NULL;
Job *j;
int r, k;
assert(u);
if (log_get_max_level() >= LOG_DEBUG)
unit_dump(u, stdout, "\t");
log_debug_unit(u->id, "Creating %s/start job", u->id);
r = manager_add_job(u->manager, JOB_START, u, JOB_REPLACE, false, &err, &j);
if (sd_bus_error_is_set(&err))
log_error_unit(u->id, "Error: %s: %s",
err.name, err.message);
if (r < 0)
log_error_unit(u->id, "Failed to create %s/start: %s",
u->id, strerror(-r));
k = verify_socket(u);
if (k < 0 && r == 0)
r = k;
k = verify_executables(u);
if (k < 0 && r == 0)
r = k;
k = verify_documentation(u, check_man);
if (k < 0 && r == 0)
r = k;
return r;
}
int verify_units(char **filenames, SystemdRunningAs running_as, bool check_man) {
_cleanup_bus_error_free_ sd_bus_error err = SD_BUS_ERROR_NULL;
Manager *m = NULL;
FILE *serial = NULL;
FDSet *fdset = NULL;
_cleanup_free_ char *var = NULL;
char **filename;
int r = 0, k;
Unit *units[strv_length(filenames)];
int i, count = 0;
if (strv_isempty(filenames))
return 0;
/* set the path */
r = generate_path(&var, filenames);
if (r < 0) {
log_error("Failed to generate unit load path: %s", strerror(-r));
return r;
}
assert_se(set_unit_path(var) >= 0);
r = manager_new(running_as, true, &m);
if (r < 0) {
log_error("Failed to initalize manager: %s", strerror(-r));
return r;
}
log_debug("Starting manager...");
r = manager_startup(m, serial, fdset);
if (r < 0) {
log_error("Failed to start manager: %s", strerror(-r));
goto finish;
}
manager_clear_jobs(m);
log_debug("Loading remaining units from the command line...");
STRV_FOREACH(filename, filenames) {
char fname[UNIT_NAME_MAX + 2 + 1] = "./";
log_debug("Handling %s...", *filename);
/* manager_load_unit does not like pure basenames, so prepend
* the local directory, but only for valid names. manager_load_unit
* will print the error for other ones. */
if (!strchr(*filename, '/') && strlen(*filename) <= UNIT_NAME_MAX) {
strncat(fname + 2, *filename, UNIT_NAME_MAX);
k = manager_load_unit(m, NULL, fname, &err, &units[count]);
} else
k = manager_load_unit(m, NULL, *filename, &err, &units[count]);
if (k < 0) {
log_error("Failed to load %s: %s", *filename, strerror(-k));
if (r == 0)
r = k;
} else
count ++;
}
for (i = 0; i < count; i++) {
k = verify_unit(units[i], check_man);
if (k < 0 && r == 0)
r = k;
}
finish:
manager_free(m);
return r;
}