diff options
Diffstat (limited to 'src/fluent-bit/tests/runtime/in_syslog.c')
-rw-r--r-- | src/fluent-bit/tests/runtime/in_syslog.c | 1023 |
1 files changed, 1023 insertions, 0 deletions
diff --git a/src/fluent-bit/tests/runtime/in_syslog.c b/src/fluent-bit/tests/runtime/in_syslog.c new file mode 100644 index 000000000..6935c7a3b --- /dev/null +++ b/src/fluent-bit/tests/runtime/in_syslog.c @@ -0,0 +1,1023 @@ +/* -*- Mode: C; tab-width: 4; indent-tabs-mode: nil; c-basic-offset: 4 -*- */ + +/* Fluent Bit + * ========== + * Copyright (C) 2019-2022 The Fluent Bit Authors + * Copyright (C) 2015-2018 Treasure Data Inc. + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +#include <fluent-bit.h> +#include <fluent-bit/flb_compat.h> +#include <fluent-bit/flb_time.h> +#include <fluent-bit/flb_socket.h> +#include <fluent-bit/flb_parser.h> +#include <sys/types.h> +#include <sys/stat.h> +#ifdef FLB_HAVE_UNIX_SOCKET +#include <sys/socket.h> +#include <sys/un.h> +#endif +#include <fcntl.h> +#include "flb_tests_runtime.h" + +#define DPATH FLB_TESTS_DATA_PATH "/data/common" + +/* Examples from RFCs */ +#define RFC5424_EXAMPLE_1 "<34>1 2003-10-11T22:14:15.003Z mymachine.example.com su - ID47 - 'su root' failed for lonvick on /dev/pts/8\n" +#define RFC3164_EXAMPLE_1 "<34>Oct 11 22:14:15 mymachine su: 'su root' failed for lonvick on /dev/pts/8\n" + +char *RFC5424_EXPECTED_STRS_1[] = {"\"pri\":\"34\"", "\"message\":\"'su root' failed for lonvick on /dev/pts/8\"", + "\"host\":\"mymachine.example.com\"", "\"msgid\":\"ID47\"","\"time\":\"2003-10-11T22:14:15.003Z\"", + "\"ident\":\"su\"" +}; + +char *RFC5424_EXPECTED_STRS_TCP[] = {"\"pri\":\"34\"", "\"message\":\"'su root' failed for lonvick on /dev/pts/8\"", + "\"host\":\"mymachine.example.com\"", "\"msgid\":\"ID47\"","\"time\":\"2003-10-11T22:14:15.003Z\"", + "\"ident\":\"su\"", + "\"source_host\":\"tcp://" +}; + +char *RFC5424_EXPECTED_STRS_UDP[] = {"\"pri\":\"34\"", "\"message\":\"'su root' failed for lonvick on /dev/pts/8\"", + "\"host\":\"mymachine.example.com\"", "\"msgid\":\"ID47\"","\"time\":\"2003-10-11T22:14:15.003Z\"", + "\"ident\":\"su\"", + "\"source_host\":\"udp://" +}; + +char *RFC3164_EXPECTED_STRS_1[] = {"\"pri\":\"34\"", "\"message\":\"'su root' failed for lonvick on /dev/pts/8\"", + "\"host\":\"mymachine\"", "\"time\":\"Oct 11 22:14:15\"", "\"ident\":\"su\"" +}; + + +struct test_ctx { + flb_ctx_t *flb; /* Fluent Bit library context */ + int i_ffd; /* Input fd */ + int f_ffd; /* Filter fd (unused) */ + int o_ffd; /* Output fd */ +}; + + +pthread_mutex_t result_mutex = PTHREAD_MUTEX_INITIALIZER; +int num_output = 0; +static int get_output_num() +{ + int ret; + pthread_mutex_lock(&result_mutex); + ret = num_output; + pthread_mutex_unlock(&result_mutex); + + return ret; +} + +static void set_output_num(int num) +{ + pthread_mutex_lock(&result_mutex); + num_output = num; + pthread_mutex_unlock(&result_mutex); +} + +static void clear_output_num() +{ + set_output_num(0); +} + +struct str_list { + size_t size; + char **lists; +}; + +/* Callback to check expected results */ +static int cb_check_json_str_list(void *record, size_t size, void *data) +{ + char *p; + char *result; + int num = get_output_num(); + size_t i; + struct str_list *l = (struct str_list*)data; + + if (!TEST_CHECK(l != NULL)) { + flb_error("Data is NULL"); + flb_free(record); + return 0; + } + set_output_num(num+1); + + result = (char *) record; + + for (i=0; i<l->size; i++) { + p = strstr(result, l->lists[i]); + if(!TEST_CHECK(p != NULL)) { + flb_error("Expected to find: '%s' in result '%s'", + l->lists[i], result); + } + } + flb_free(record); + return 0; +} + +static struct test_ctx *test_ctx_create(struct flb_lib_out_cb *data) +{ + int i_ffd; + int o_ffd; + int ret; + struct test_ctx *ctx = NULL; + + ctx = flb_malloc(sizeof(struct test_ctx)); + if (!TEST_CHECK(ctx != NULL)) { + TEST_MSG("malloc failed"); + flb_errno(); + return NULL; + } + + /* Service config */ + ctx->flb = flb_create(); + flb_service_set(ctx->flb, + "Flush", "0.200000000", + "Grace", "1", + "Log_Level", "error", + "Parsers_File", DPATH "/parsers.conf", + NULL); + + /* Input */ + i_ffd = flb_input(ctx->flb, (char *) "syslog", NULL); + TEST_CHECK(i_ffd >= 0); + ctx->i_ffd = i_ffd; + + /* Output */ + o_ffd = flb_output(ctx->flb, (char *) "lib", (void *) data); + ctx->o_ffd = o_ffd; + ret = flb_output_set(ctx->flb, ctx->o_ffd, + "format", "json", + NULL); + TEST_CHECK(ret == 0); + + return ctx; +} + +#define PARSER_NAME_RFC5424 "syslog-rfc5424" +#define PARSER_NAME_RFC3164 "syslog-rfc3164" + +static void test_ctx_destroy(struct test_ctx *ctx) +{ + TEST_CHECK(ctx != NULL); + + sleep(1); + flb_stop(ctx->flb); + flb_destroy(ctx->flb); + flb_free(ctx); +} + +#define DEFAULT_HOST "127.0.0.1" +#define DEFAULT_PORT 5140 +static flb_sockfd_t connect_tcp(char *in_host, int in_port) +{ + int port = in_port; + char *host = in_host; + flb_sockfd_t fd; + int ret; + struct sockaddr_in addr; + + if (host == NULL) { + host = DEFAULT_HOST; + } + if (port < 0) { + port = DEFAULT_PORT; + } + + memset(&addr, 0, sizeof(addr)); + fd = socket(PF_INET, SOCK_STREAM, 0); + if (!TEST_CHECK(fd >= 0)) { + TEST_MSG("failed to socket. host=%s port=%d errno=%d", host, port, errno); + return -1; + } + + addr.sin_family = AF_INET; + addr.sin_addr.s_addr = inet_addr(host); + addr.sin_port = htons(port); + + ret = connect(fd, (const struct sockaddr *)&addr, sizeof(addr)); + if (!TEST_CHECK(ret >= 0)) { + TEST_MSG("failed to connect. host=%s port=%d errno=%d", host, port, errno); + flb_socket_close(fd); + return -1; + } + return fd; +} + +#ifdef FLB_HAVE_UNIX_SOCKET +static flb_sockfd_t connect_tcp_unix(char *path) +{ + flb_sockfd_t fd; + struct sockaddr_un sun; + int ret; + + if (!TEST_CHECK(path != NULL)) { + TEST_MSG("path is NULL"); + return -1; + } + + memset(&sun, 0, sizeof(sun)); + fd = socket(AF_LOCAL, SOCK_STREAM, 0); + if (!TEST_CHECK(fd >= 0)) { + TEST_MSG("failed to socket. path=%s errno=%d", path, errno); + return -1; + } + + sun.sun_family = AF_LOCAL; + strcpy(sun.sun_path, path); + ret = connect(fd, (const struct sockaddr *)&sun, sizeof(sun)); + if (!TEST_CHECK(ret >= 0)) { + TEST_MSG("failed to connect. path=%s errno=%d", path, errno); + flb_socket_close(fd); + return -1; + } + return fd; +} + +static flb_sockfd_t init_udp_unix(char *path, struct sockaddr_un *sun) +{ + flb_sockfd_t fd; + int ret; + + if (!TEST_CHECK(path != NULL)) { + TEST_MSG("path is NULL"); + return -1; + } + if (!TEST_CHECK(sun != NULL)) { + TEST_MSG("sun is NULL"); + return -1; + } + + memset(sun, 0, sizeof(struct sockaddr_un)); + fd = socket(AF_LOCAL, SOCK_DGRAM, 0); + if (!TEST_CHECK(fd >= 0)) { + TEST_MSG("failed to socket. path=%s errno=%d", path, errno); + return -1; + } + + sun->sun_family = AF_LOCAL; + strcpy(sun->sun_path, path); + ret = connect(fd, (const struct sockaddr *)sun, sizeof(struct sockaddr_un)); + if (!TEST_CHECK(ret >= 0)) { + TEST_MSG("failed to connect. path=%s errno=%d", path, errno); + flb_socket_close(fd); + return -1; + } + return fd; +} +#endif + +static int init_udp(char *in_host, int in_port, struct sockaddr_in *addr) +{ + int port = in_port; + char *host = in_host; + flb_sockfd_t fd; + + if (host == NULL) { + host = DEFAULT_HOST; + } + if (port < 0) { + port = DEFAULT_PORT; + } + + memset(addr, 0, sizeof(struct sockaddr_in)); + fd = socket(AF_INET, SOCK_DGRAM, 0); + if (!TEST_CHECK(fd >= 0)) { + TEST_MSG("failed to socket. host=%s port=%d errno=%d", host, port, errno); + return -1; + } + + addr->sin_family = AF_INET; + addr->sin_addr.s_addr = inet_addr(host); + addr->sin_port = htons(port); + + return fd; +} + +void flb_test_syslog_tcp() +{ + struct flb_lib_out_cb cb_data; + struct test_ctx *ctx; + flb_sockfd_t fd; + int ret; + int num; + ssize_t w_size; + + struct str_list expected = { + .size = sizeof(RFC5424_EXPECTED_STRS_1)/sizeof(char*), + .lists = &RFC5424_EXPECTED_STRS_1[0], + }; + + char *buf = RFC5424_EXAMPLE_1; + size_t size = strlen(buf); + + clear_output_num(); + + cb_data.cb = cb_check_json_str_list; + cb_data.data = &expected; + + ctx = test_ctx_create(&cb_data); + if (!TEST_CHECK(ctx != NULL)) { + TEST_MSG("test_ctx_create failed"); + exit(EXIT_FAILURE); + } + + ret = flb_input_set(ctx->flb, ctx->i_ffd, + "mode", "tcp", + "parser", PARSER_NAME_RFC5424, + NULL); + TEST_CHECK(ret == 0); + + /* Start the engine */ + ret = flb_start(ctx->flb); + TEST_CHECK(ret == 0); + + /* use default host/port */ + fd = connect_tcp(NULL, -1); + if (!TEST_CHECK(fd >= 0)) { + test_ctx_destroy(ctx); + exit(EXIT_FAILURE); + } + + w_size = send(fd, buf, size, 0); + if (!TEST_CHECK(w_size == size)) { + TEST_MSG("failed to send, errno=%d", errno); + flb_socket_close(fd); + test_ctx_destroy(ctx); + exit(EXIT_FAILURE); + } + + /* waiting to flush */ + flb_time_msleep(500); + + num = get_output_num(); + if (!TEST_CHECK(num > 0)) { + TEST_MSG("no outputs"); + } + + flb_socket_close(fd); + test_ctx_destroy(ctx); +} + +void flb_test_syslog_tcp_port() +{ + struct flb_lib_out_cb cb_data; + struct test_ctx *ctx; + flb_sockfd_t fd; + int ret; + int num; + ssize_t w_size; + char *port = "15140"; + + struct str_list expected = { + .size = sizeof(RFC5424_EXPECTED_STRS_1)/sizeof(char*), + .lists = &RFC5424_EXPECTED_STRS_1[0], + }; + + char *buf = RFC5424_EXAMPLE_1; + size_t size = strlen(buf); + + clear_output_num(); + + cb_data.cb = cb_check_json_str_list; + cb_data.data = &expected; + + ctx = test_ctx_create(&cb_data); + if (!TEST_CHECK(ctx != NULL)) { + TEST_MSG("test_ctx_create failed"); + exit(EXIT_FAILURE); + } + + ret = flb_input_set(ctx->flb, ctx->i_ffd, + "mode", "tcp", + "Port", port, + "parser", PARSER_NAME_RFC5424, + NULL); + TEST_CHECK(ret == 0); + + /* Start the engine */ + ret = flb_start(ctx->flb); + TEST_CHECK(ret == 0); + + /* use default host/port */ + fd = connect_tcp(NULL, atoi(port)); + if (!TEST_CHECK(fd >= 0)) { + test_ctx_destroy(ctx); + exit(EXIT_FAILURE); + } + + w_size = send(fd, buf, size, 0); + if (!TEST_CHECK(w_size == size)) { + TEST_MSG("failed to send, errno=%d", errno); + flb_socket_close(fd); + test_ctx_destroy(ctx); + exit(EXIT_FAILURE); + } + + /* waiting to flush */ + flb_time_msleep(500); + + num = get_output_num(); + if (!TEST_CHECK(num > 0)) { + TEST_MSG("no outputs"); + } + + flb_socket_close(fd); + test_ctx_destroy(ctx); +} + +void flb_test_syslog_tcp_source_address() +{ + struct flb_lib_out_cb cb_data; + struct test_ctx *ctx; + flb_sockfd_t fd; + int ret; + int num; + ssize_t w_size; + + struct str_list expected = { + .size = sizeof(RFC5424_EXPECTED_STRS_TCP)/sizeof(char*), + .lists = &RFC5424_EXPECTED_STRS_TCP[0], + }; + + char *buf = RFC5424_EXAMPLE_1; + size_t size = strlen(buf); + + clear_output_num(); + + cb_data.cb = cb_check_json_str_list; + cb_data.data = &expected; + + ctx = test_ctx_create(&cb_data); + if (!TEST_CHECK(ctx != NULL)) { + TEST_MSG("test_ctx_create failed"); + exit(EXIT_FAILURE); + } + + ret = flb_input_set(ctx->flb, ctx->i_ffd, + "mode", "tcp", + "source_address_key", "source_host", + "parser", PARSER_NAME_RFC5424, + NULL); + TEST_CHECK(ret == 0); + + /* Start the engine */ + ret = flb_start(ctx->flb); + TEST_CHECK(ret == 0); + + /* use default host/port */ + fd = connect_tcp(NULL, -1); + if (!TEST_CHECK(fd >= 0)) { + test_ctx_destroy(ctx); + exit(EXIT_FAILURE); + } + + w_size = send(fd, buf, size, 0); + if (!TEST_CHECK(w_size == size)) { + TEST_MSG("failed to send, errno=%d", errno); + flb_socket_close(fd); + test_ctx_destroy(ctx); + exit(EXIT_FAILURE); + } + + /* waiting to flush */ + flb_time_msleep(500); + + num = get_output_num(); + if (!TEST_CHECK(num > 0)) { + TEST_MSG("no outputs"); + } + + flb_socket_close(fd); + test_ctx_destroy(ctx); +} + +void flb_test_syslog_unknown_mode() +{ + struct flb_lib_out_cb cb_data; + struct test_ctx *ctx; + int ret; + + struct str_list expected = { + .size = sizeof(RFC5424_EXPECTED_STRS_1)/sizeof(char*), + .lists = &RFC5424_EXPECTED_STRS_1[0], + }; + + + clear_output_num(); + + cb_data.cb = cb_check_json_str_list; + cb_data.data = &expected; + + ctx = test_ctx_create(&cb_data); + if (!TEST_CHECK(ctx != NULL)) { + TEST_MSG("test_ctx_create failed"); + exit(EXIT_FAILURE); + } + + ret = flb_input_set(ctx->flb, ctx->i_ffd, + "mode", "UNKNOWN", + "parser", PARSER_NAME_RFC5424, + NULL); + TEST_CHECK(ret == 0); + + /* Start the engine */ + ret = flb_start(ctx->flb); + if(!TEST_CHECK(ret != 0)) { + TEST_MSG("flb_start should be failed"); + test_ctx_destroy(ctx); + exit(EXIT_FAILURE); + } + + test_ctx_destroy(ctx); +} + +void flb_test_syslog_unix_perm() +{ + struct flb_lib_out_cb cb_data; + struct test_ctx *ctx; + int ret; + char *unix_path = "in_syslog_unix"; + struct stat sb; + struct str_list expected = { + .size = sizeof(RFC5424_EXPECTED_STRS_1)/sizeof(char*), + .lists = &RFC5424_EXPECTED_STRS_1[0], + }; + + + clear_output_num(); + + cb_data.cb = cb_check_json_str_list; + cb_data.data = &expected; + + ctx = test_ctx_create(&cb_data); + if (!TEST_CHECK(ctx != NULL)) { + TEST_MSG("test_ctx_create failed"); + exit(EXIT_FAILURE); + } + + ret = flb_input_set(ctx->flb, ctx->i_ffd, + "path", unix_path, + "unix_perm", "0600", + "parser", PARSER_NAME_RFC5424, + NULL); + TEST_CHECK(ret == 0); + + /* Start the engine */ + ret = flb_start(ctx->flb); + TEST_CHECK(ret == 0); + + ret = stat(unix_path, &sb); + if (!TEST_CHECK(ret == 0)) { + TEST_MSG("stat failed. errno=%d", errno); + test_ctx_destroy(ctx); + exit(EXIT_FAILURE); + } + + if (!TEST_CHECK((sb.st_mode & S_IRWXO) == 0)) { + TEST_MSG("Permssion(others) error. val=0x%x",sb.st_mode & S_IRWXO); + } + if (!TEST_CHECK((sb.st_mode & S_IRWXG) == 0)) { + TEST_MSG("Permssion(group) error. val=0x%x",sb.st_mode & S_IRWXG); + } + if (!TEST_CHECK((sb.st_mode & S_IRWXU) == (S_IRUSR | S_IWUSR))) { + TEST_MSG("Permssion(user) error. val=0x%x",sb.st_mode & S_IRWXU); + } + + test_ctx_destroy(ctx); +} + +void flb_test_syslog_udp() +{ + struct flb_lib_out_cb cb_data; + struct test_ctx *ctx; + struct sockaddr_in addr; + flb_sockfd_t fd; + int ret; + int num; + ssize_t w_size; + + struct str_list expected = { + .size = sizeof(RFC5424_EXPECTED_STRS_1)/sizeof(char*), + .lists = &RFC5424_EXPECTED_STRS_1[0], + }; + + char *buf = RFC5424_EXAMPLE_1; + size_t size = strlen(buf); + + clear_output_num(); + + cb_data.cb = cb_check_json_str_list; + cb_data.data = &expected; + + ctx = test_ctx_create(&cb_data); + if (!TEST_CHECK(ctx != NULL)) { + TEST_MSG("test_ctx_create failed"); + exit(EXIT_FAILURE); + } + + ret = flb_input_set(ctx->flb, ctx->i_ffd, + "mode", "udp", + "parser", PARSER_NAME_RFC5424, + NULL); + TEST_CHECK(ret == 0); + + /* Start the engine */ + ret = flb_start(ctx->flb); + TEST_CHECK(ret == 0); + + /* use default host/port */ + fd = init_udp(NULL, -1, &addr); + if (!TEST_CHECK(fd >= 0)) { + test_ctx_destroy(ctx); + exit(EXIT_FAILURE); + } + + w_size = sendto(fd, buf, size, 0, (const struct sockaddr *)&addr, sizeof(addr)); + if (!TEST_CHECK(w_size == size)) { + TEST_MSG("failed to send, errno=%d", errno); + flb_socket_close(fd); + test_ctx_destroy(ctx); + exit(EXIT_FAILURE); + } + + /* waiting to flush */ + flb_time_msleep(500); + + num = get_output_num(); + if (!TEST_CHECK(num > 0)) { + TEST_MSG("no outputs"); + } + + flb_socket_close(fd); + test_ctx_destroy(ctx); +} + +void flb_test_syslog_udp_port() +{ + struct flb_lib_out_cb cb_data; + struct test_ctx *ctx; + struct sockaddr_in addr; + flb_sockfd_t fd; + int ret; + int num; + ssize_t w_size; + char *port = "15140"; + + struct str_list expected = { + .size = sizeof(RFC5424_EXPECTED_STRS_1)/sizeof(char*), + .lists = &RFC5424_EXPECTED_STRS_1[0], + }; + + char *buf = RFC5424_EXAMPLE_1; + size_t size = strlen(buf); + + clear_output_num(); + + cb_data.cb = cb_check_json_str_list; + cb_data.data = &expected; + + ctx = test_ctx_create(&cb_data); + if (!TEST_CHECK(ctx != NULL)) { + TEST_MSG("test_ctx_create failed"); + exit(EXIT_FAILURE); + } + + ret = flb_input_set(ctx->flb, ctx->i_ffd, + "mode", "udp", + "Port", port, + "parser", PARSER_NAME_RFC5424, + NULL); + TEST_CHECK(ret == 0); + + /* Start the engine */ + ret = flb_start(ctx->flb); + TEST_CHECK(ret == 0); + + /* use default host/port */ + fd = init_udp(NULL, atoi(port), &addr); + if (!TEST_CHECK(fd >= 0)) { + test_ctx_destroy(ctx); + exit(EXIT_FAILURE); + } + + w_size = sendto(fd, buf, size, 0, (const struct sockaddr *)&addr, sizeof(addr)); + if (!TEST_CHECK(w_size == size)) { + TEST_MSG("failed to send, errno=%d", errno); + flb_socket_close(fd); + test_ctx_destroy(ctx); + exit(EXIT_FAILURE); + } + + /* waiting to flush */ + flb_time_msleep(500); + + num = get_output_num(); + if (!TEST_CHECK(num > 0)) { + TEST_MSG("no outputs"); + } + + flb_socket_close(fd); + test_ctx_destroy(ctx); +} + +void flb_test_syslog_udp_source_address() +{ + struct flb_lib_out_cb cb_data; + struct test_ctx *ctx; + struct sockaddr_in addr; + flb_sockfd_t fd; + int ret; + int num; + ssize_t w_size; + + struct str_list expected = { + .size = sizeof(RFC5424_EXPECTED_STRS_UDP)/sizeof(char*), + .lists = &RFC5424_EXPECTED_STRS_UDP[0], + }; + + char *buf = RFC5424_EXAMPLE_1; + size_t size = strlen(buf); + + clear_output_num(); + + cb_data.cb = cb_check_json_str_list; + cb_data.data = &expected; + + ctx = test_ctx_create(&cb_data); + if (!TEST_CHECK(ctx != NULL)) { + TEST_MSG("test_ctx_create failed"); + exit(EXIT_FAILURE); + } + + ret = flb_input_set(ctx->flb, ctx->i_ffd, + "mode", "udp", + "source_address_key", "source_host", + "parser", PARSER_NAME_RFC5424, + NULL); + TEST_CHECK(ret == 0); + + /* Start the engine */ + ret = flb_start(ctx->flb); + TEST_CHECK(ret == 0); + + /* use default host/port */ + fd = init_udp(NULL, -1, &addr); + if (!TEST_CHECK(fd >= 0)) { + test_ctx_destroy(ctx); + exit(EXIT_FAILURE); + } + + w_size = sendto(fd, buf, size, 0, (const struct sockaddr *)&addr, sizeof(addr)); + if (!TEST_CHECK(w_size == size)) { + TEST_MSG("failed to send, errno=%d", errno); + flb_socket_close(fd); + test_ctx_destroy(ctx); + exit(EXIT_FAILURE); + } + + /* waiting to flush */ + flb_time_msleep(500); + + num = get_output_num(); + if (!TEST_CHECK(num > 0)) { + TEST_MSG("no outputs"); + } + + flb_socket_close(fd); + test_ctx_destroy(ctx); +} + +#ifdef FLB_HAVE_UNIX_SOCKET +void flb_test_syslog_tcp_unix() +{ + struct flb_lib_out_cb cb_data; + struct test_ctx *ctx; + flb_sockfd_t fd; + int ret; + int num; + ssize_t w_size; + char *unix_path = "in_syslog_unix"; + + struct str_list expected = { + .size = sizeof(RFC5424_EXPECTED_STRS_1)/sizeof(char*), + .lists = &RFC5424_EXPECTED_STRS_1[0], + }; + + char *buf = RFC5424_EXAMPLE_1; + size_t size = strlen(buf); + + clear_output_num(); + + cb_data.cb = cb_check_json_str_list; + cb_data.data = &expected; + + ctx = test_ctx_create(&cb_data); + if (!TEST_CHECK(ctx != NULL)) { + TEST_MSG("test_ctx_create failed"); + exit(EXIT_FAILURE); + } + + ret = flb_input_set(ctx->flb, ctx->i_ffd, + "mode", "unix_tcp", + "path", unix_path, + "parser", PARSER_NAME_RFC5424, + NULL); + TEST_CHECK(ret == 0); + + /* Start the engine */ + ret = flb_start(ctx->flb); + TEST_CHECK(ret == 0); + + /* use default host/port */ + fd = connect_tcp_unix(unix_path); + if (!TEST_CHECK(fd >= 0)) { + test_ctx_destroy(ctx); + exit(EXIT_FAILURE); + } + + w_size = send(fd, buf, size, 0); + if (!TEST_CHECK(w_size == size)) { + TEST_MSG("failed to send, errno=%d", errno); + flb_socket_close(fd); + test_ctx_destroy(ctx); + exit(EXIT_FAILURE); + } + + /* waiting to flush */ + flb_time_msleep(500); + + num = get_output_num(); + if (!TEST_CHECK(num > 0)) { + TEST_MSG("no outputs"); + } + + flb_socket_close(fd); + test_ctx_destroy(ctx); +} + +void flb_test_syslog_udp_unix() +{ + struct flb_lib_out_cb cb_data; + struct test_ctx *ctx; + struct sockaddr_un sun; + flb_sockfd_t fd; + int ret; + int num; + ssize_t w_size; + char *unix_path = "in_syslog_unix"; + + struct str_list expected = { + .size = sizeof(RFC5424_EXPECTED_STRS_1)/sizeof(char*), + .lists = &RFC5424_EXPECTED_STRS_1[0], + }; + + char *buf = RFC5424_EXAMPLE_1; + size_t size = strlen(buf); + + clear_output_num(); + + cb_data.cb = cb_check_json_str_list; + cb_data.data = &expected; + + ctx = test_ctx_create(&cb_data); + if (!TEST_CHECK(ctx != NULL)) { + TEST_MSG("test_ctx_create failed"); + exit(EXIT_FAILURE); + } + + ret = flb_input_set(ctx->flb, ctx->i_ffd, + "mode", "unix_udp", + "path", unix_path, + "parser", PARSER_NAME_RFC5424, + NULL); + TEST_CHECK(ret == 0); + + /* Start the engine */ + ret = flb_start(ctx->flb); + TEST_CHECK(ret == 0); + + fd = init_udp_unix(unix_path, &sun); + if (!TEST_CHECK(fd >= 0)) { + test_ctx_destroy(ctx); + exit(EXIT_FAILURE); + } + + w_size = sendto(fd, buf, size, 0, (const struct sockaddr *)&sun, sizeof(sun)); + if (!TEST_CHECK(w_size == size)) { + TEST_MSG("failed to send, errno=%d", errno); + flb_socket_close(fd); + test_ctx_destroy(ctx); + exit(EXIT_FAILURE); + } + + /* waiting to flush */ + flb_time_msleep(500); + + num = get_output_num(); + if (!TEST_CHECK(num > 0)) { + TEST_MSG("no outputs"); + } + + flb_socket_close(fd); + test_ctx_destroy(ctx); +} +#endif + +void flb_test_syslog_rfc3164() +{ + struct flb_lib_out_cb cb_data; + struct test_ctx *ctx; + flb_sockfd_t fd; + int ret; + int num; + ssize_t w_size; + + struct str_list expected = { + .size = sizeof(RFC3164_EXPECTED_STRS_1)/sizeof(char*), + .lists = &RFC3164_EXPECTED_STRS_1[0], + }; + + char *buf = RFC3164_EXAMPLE_1; + size_t size = strlen(buf); + + clear_output_num(); + + cb_data.cb = cb_check_json_str_list; + cb_data.data = &expected; + + ctx = test_ctx_create(&cb_data); + if (!TEST_CHECK(ctx != NULL)) { + TEST_MSG("test_ctx_create failed"); + exit(EXIT_FAILURE); + } + + ret = flb_input_set(ctx->flb, ctx->i_ffd, + "mode", "tcp", + "parser", PARSER_NAME_RFC3164, + NULL); + TEST_CHECK(ret == 0); + + /* Start the engine */ + ret = flb_start(ctx->flb); + TEST_CHECK(ret == 0); + + /* use default host/port */ + fd = connect_tcp(NULL, -1); + if (!TEST_CHECK(fd >= 0)) { + test_ctx_destroy(ctx); + exit(EXIT_FAILURE); + } + + w_size = send(fd, buf, size, 0); + if (!TEST_CHECK(w_size == size)) { + TEST_MSG("failed to send, errno=%d", errno); + flb_socket_close(fd); + test_ctx_destroy(ctx); + exit(EXIT_FAILURE); + } + + /* waiting to flush */ + flb_time_msleep(500); + + num = get_output_num(); + if (!TEST_CHECK(num > 0)) { + TEST_MSG("no outputs"); + } + + flb_socket_close(fd); + test_ctx_destroy(ctx); +} + +TEST_LIST = { + {"syslog_tcp", flb_test_syslog_tcp}, + {"syslog_udp", flb_test_syslog_udp}, + {"syslog_tcp_port", flb_test_syslog_tcp_port}, + {"syslog_tcp_source_address", flb_test_syslog_tcp_source_address}, + {"syslog_udp_port", flb_test_syslog_udp_port}, + {"syslog_udp_source_address", flb_test_syslog_udp_source_address}, + {"syslog_unknown_mode", flb_test_syslog_unknown_mode}, +#ifdef FLB_HAVE_UNIX_SOCKET + {"syslog_unix_perm", flb_test_syslog_unix_perm}, +#endif + {"syslog_rfc3164", flb_test_syslog_rfc3164}, +#ifdef FLB_HAVE_UNIX_SOCKET + {"syslog_tcp_unix", flb_test_syslog_tcp_unix}, +#ifndef FLB_SYSTEM_MACOS + {"syslog_udp_unix", flb_test_syslog_udp_unix}, +#endif +#endif + {NULL, NULL} +}; + |