diff options
author | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-15 16:28:20 +0000 |
---|---|---|
committer | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-15 16:28:20 +0000 |
commit | dcc721a95bef6f0d8e6d8775b8efe33e5aecd562 (patch) | |
tree | 66a2774cd0ee294d019efd71d2544c70f42b2842 /tests/sndrcv_tls_ossl_anon_ipv4.sh | |
parent | Initial commit. (diff) | |
download | rsyslog-dcc721a95bef6f0d8e6d8775b8efe33e5aecd562.tar.xz rsyslog-dcc721a95bef6f0d8e6d8775b8efe33e5aecd562.zip |
Adding upstream version 8.2402.0.upstream/8.2402.0
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'tests/sndrcv_tls_ossl_anon_ipv4.sh')
-rwxr-xr-x | tests/sndrcv_tls_ossl_anon_ipv4.sh | 66 |
1 files changed, 66 insertions, 0 deletions
diff --git a/tests/sndrcv_tls_ossl_anon_ipv4.sh b/tests/sndrcv_tls_ossl_anon_ipv4.sh new file mode 100755 index 0000000..8bb4836 --- /dev/null +++ b/tests/sndrcv_tls_ossl_anon_ipv4.sh @@ -0,0 +1,66 @@ +#!/bin/bash +# testing sending and receiving via TLS with anon auth using bare ipv4, no SNI +# rgerhards, 2011-04-04 +# This file is part of the rsyslog project, released under ASL 2.0 +. ${srcdir:=.}/diag.sh init +if [ "${TARGET:=127.0.0.1}" == "[::1]" ]; then +. $srcdir/diag.sh check-ipv6-available +fi +export NUMMESSAGES=10000 +export QUEUE_EMPTY_CHECK_FUNC=wait_file_lines + +# uncomment for debugging support: +#export RSYSLOG_DEBUG="debug nostdout noprintmutexaction" +export RSYSLOG_DEBUGLOG="log" +generate_conf +add_conf ' +global( + defaultNetstreamDriverCAFile="'$srcdir/testsuites/x.509/ca.pem'" + defaultNetstreamDriverCertFile="'$srcdir/testsuites/x.509/client-cert.pem'" + defaultNetstreamDriverKeyFile="'$srcdir/testsuites/x.509/client-key.pem'" + defaultNetstreamDriver="ossl" +# debug.whitelist="on" +# debug.files=["nsd_ossl.c", "tcpsrv.c", "nsdsel_ossl.c", "nsdpoll_ptcp.c", "dnscache.c"] +) + +module( load="../plugins/imtcp/.libs/imtcp" + StreamDriver.Name="ossl" + StreamDriver.Mode="1" + StreamDriver.AuthMode="anon" ) +input(type="imtcp" port="0" listenPortFileName="'$RSYSLOG_DYNNAME'.tcpflood_port") + +template(name="outfmt" type="string" string="%msg:F,58:2%\n") +:msg, contains, "msgnum:" action(type="omfile" template="outfmt" file="'$RSYSLOG_OUT_LOG'") +' +startup +export PORT_RCVR=$TCPFLOOD_PORT +export RSYSLOG_DEBUGLOG="log2" +#valgrind="valgrind" +generate_conf 2 +add_conf ' +global( + defaultNetstreamDriverCAFile="'$srcdir/tls-certs/ca.pem'" + defaultNetstreamDriverCertFile="'$srcdir/tls-certs/cert.pem'" + defaultNetstreamDriverKeyFile="'$srcdir/tls-certs/key.pem'" + defaultNetstreamDriver="ossl" +) + +# set up the action +$ActionSendStreamDriverMode 1 # require TLS for the connection +$ActionSendStreamDriverAuthMode anon +*.* @@'${TARGET}':'$PORT_RCVR' +' 2 +startup 2 + +# now inject the messages into instance 2. It will connect to instance 1, +# and that instance will record the data. +injectmsg2 +# shut down sender when everything is sent, receiver continues to run concurrently +shutdown_when_empty 2 +wait_shutdown 2 +# now it is time to stop the receiver as well +shutdown_when_empty +wait_shutdown + +seq_check +exit_test |