|
|
984f77 |
From f41927c026d65e9005c0ba418c6bfff511055bd2 Mon Sep 17 00:00:00 2001
|
|
|
984f77 |
From: Yu Watanabe <watanabe.yu+github@gmail.com>
|
|
|
984f77 |
Date: Tue, 11 Sep 2018 14:05:08 +0900
|
|
|
984f77 |
Subject: [PATCH] core: add new environment variable $RUNTIME_DIRECTORY= or
|
|
|
984f77 |
friends
|
|
|
984f77 |
|
|
|
984f77 |
The variable is generated from RuntimeDirectory= or friends.
|
|
|
984f77 |
If multiple directories are set, then they are concatenated with
|
|
|
984f77 |
the separator ':'.
|
|
|
984f77 |
|
|
|
984f77 |
(cherry picked from commit fb2042dd55de5019f55931b4f20a44700ec1222b)
|
|
|
984f77 |
|
|
|
984f77 |
Resolves: #2049788
|
|
|
984f77 |
---
|
|
|
984f77 |
TODO | 9 ---------
|
|
|
984f77 |
src/core/execute.c | 46 ++++++++++++++++++++++++++++++++++++++++++++--
|
|
|
984f77 |
2 files changed, 44 insertions(+), 11 deletions(-)
|
|
|
984f77 |
|
|
|
984f77 |
diff --git a/TODO b/TODO
|
|
|
984f77 |
index 0705b6b08e..c52f9b25f3 100644
|
|
|
984f77 |
--- a/TODO
|
|
|
984f77 |
+++ b/TODO
|
|
|
984f77 |
@@ -214,15 +214,6 @@ Features:
|
|
|
984f77 |
for all units. It should be both a way to pin units into memory as well as a
|
|
|
984f77 |
wait to retrieve their exit data.
|
|
|
984f77 |
|
|
|
984f77 |
-* maybe set a new set of env vars for services, based on RuntimeDirectory=,
|
|
|
984f77 |
- StateDirectory=, LogsDirectory=, CacheDirectory= and ConfigurationDirectory=
|
|
|
984f77 |
- automatically. For example, there could be $RUNTIME_DIRECTORY,
|
|
|
984f77 |
- $STATE_DIRECTORY, $LOGS_DIRECTORY=, $CACHE_DIRECTORY and
|
|
|
984f77 |
- $CONFIGURATION_DIRECTORY or so. This could be useful to write services that
|
|
|
984f77 |
- can adapt to varying directories for these purposes. Special care has to be
|
|
|
984f77 |
- taken if multiple dirs are configured. Maybe avoid setting the env vars in
|
|
|
984f77 |
- that case?
|
|
|
984f77 |
-
|
|
|
984f77 |
* expose IO accounting data on the bus, show it in systemd-run --wait and log
|
|
|
984f77 |
about it in the resource log message
|
|
|
984f77 |
|
|
|
984f77 |
diff --git a/src/core/execute.c b/src/core/execute.c
|
|
|
984f77 |
index 3ff1a51aa1..9cbb678ac4 100644
|
|
|
984f77 |
--- a/src/core/execute.c
|
|
|
984f77 |
+++ b/src/core/execute.c
|
|
|
984f77 |
@@ -1606,6 +1606,8 @@ static void do_idle_pipe_dance(int idle_pipe[4]) {
|
|
|
984f77 |
idle_pipe[3] = safe_close(idle_pipe[3]);
|
|
|
984f77 |
}
|
|
|
984f77 |
|
|
|
984f77 |
+static const char *exec_directory_env_name_to_string(ExecDirectoryType t);
|
|
|
984f77 |
+
|
|
|
984f77 |
static int build_environment(
|
|
|
984f77 |
const Unit *u,
|
|
|
984f77 |
const ExecContext *c,
|
|
|
984f77 |
@@ -1619,6 +1621,7 @@ static int build_environment(
|
|
|
984f77 |
char ***ret) {
|
|
|
984f77 |
|
|
|
984f77 |
_cleanup_strv_free_ char **our_env = NULL;
|
|
|
984f77 |
+ ExecDirectoryType t;
|
|
|
984f77 |
size_t n_env = 0;
|
|
|
984f77 |
char *x;
|
|
|
984f77 |
|
|
|
984f77 |
@@ -1627,7 +1630,7 @@ static int build_environment(
|
|
|
984f77 |
assert(p);
|
|
|
984f77 |
assert(ret);
|
|
|
984f77 |
|
|
|
984f77 |
- our_env = new0(char*, 14);
|
|
|
984f77 |
+ our_env = new0(char*, 14 + _EXEC_DIRECTORY_TYPE_MAX);
|
|
|
984f77 |
if (!our_env)
|
|
|
984f77 |
return -ENOMEM;
|
|
|
984f77 |
|
|
|
984f77 |
@@ -1733,8 +1736,37 @@ static int build_environment(
|
|
|
984f77 |
our_env[n_env++] = x;
|
|
|
984f77 |
}
|
|
|
984f77 |
|
|
|
984f77 |
+ for (t = 0; t < _EXEC_DIRECTORY_TYPE_MAX; t++) {
|
|
|
984f77 |
+ _cleanup_free_ char *pre = NULL, *joined = NULL;
|
|
|
984f77 |
+ const char *n;
|
|
|
984f77 |
+
|
|
|
984f77 |
+ if (!p->prefix[t])
|
|
|
984f77 |
+ continue;
|
|
|
984f77 |
+
|
|
|
984f77 |
+ if (strv_isempty(c->directories[t].paths))
|
|
|
984f77 |
+ continue;
|
|
|
984f77 |
+
|
|
|
984f77 |
+ n = exec_directory_env_name_to_string(t);
|
|
|
984f77 |
+ if (!n)
|
|
|
984f77 |
+ continue;
|
|
|
984f77 |
+
|
|
|
984f77 |
+ pre = strjoin(p->prefix[t], "/");
|
|
|
984f77 |
+ if (!pre)
|
|
|
984f77 |
+ return -ENOMEM;
|
|
|
984f77 |
+
|
|
|
984f77 |
+ joined = strv_join_prefix(c->directories[t].paths, ":", pre);
|
|
|
984f77 |
+ if (!joined)
|
|
|
984f77 |
+ return -ENOMEM;
|
|
|
984f77 |
+
|
|
|
984f77 |
+ x = strjoin(n, "=", joined);
|
|
|
984f77 |
+ if (!x)
|
|
|
984f77 |
+ return -ENOMEM;
|
|
|
984f77 |
+
|
|
|
984f77 |
+ our_env[n_env++] = x;
|
|
|
984f77 |
+ }
|
|
|
984f77 |
+
|
|
|
984f77 |
our_env[n_env++] = NULL;
|
|
|
984f77 |
- assert(n_env <= 14);
|
|
|
984f77 |
+ assert(n_env <= 14 + _EXEC_DIRECTORY_TYPE_MAX);
|
|
|
984f77 |
|
|
|
984f77 |
*ret = TAKE_PTR(our_env);
|
|
|
984f77 |
|
|
|
984f77 |
@@ -5197,6 +5229,16 @@ static const char* const exec_directory_type_table[_EXEC_DIRECTORY_TYPE_MAX] = {
|
|
|
984f77 |
|
|
|
984f77 |
DEFINE_STRING_TABLE_LOOKUP(exec_directory_type, ExecDirectoryType);
|
|
|
984f77 |
|
|
|
984f77 |
+static const char* const exec_directory_env_name_table[_EXEC_DIRECTORY_TYPE_MAX] = {
|
|
|
984f77 |
+ [EXEC_DIRECTORY_RUNTIME] = "RUNTIME_DIRECTORY",
|
|
|
984f77 |
+ [EXEC_DIRECTORY_STATE] = "STATE_DIRECTORY",
|
|
|
984f77 |
+ [EXEC_DIRECTORY_CACHE] = "CACHE_DIRECTORY",
|
|
|
984f77 |
+ [EXEC_DIRECTORY_LOGS] = "LOGS_DIRECTORY",
|
|
|
984f77 |
+ [EXEC_DIRECTORY_CONFIGURATION] = "CONFIGURATION_DIRECTORY",
|
|
|
984f77 |
+};
|
|
|
984f77 |
+
|
|
|
984f77 |
+DEFINE_PRIVATE_STRING_TABLE_LOOKUP_TO_STRING(exec_directory_env_name, ExecDirectoryType);
|
|
|
984f77 |
+
|
|
|
984f77 |
static const char* const exec_keyring_mode_table[_EXEC_KEYRING_MODE_MAX] = {
|
|
|
984f77 |
[EXEC_KEYRING_INHERIT] = "inherit",
|
|
|
984f77 |
[EXEC_KEYRING_PRIVATE] = "private",
|