1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
|
# The syslogd listens on 127.0.0.1 TCP socket.
# The client writes non transparent framing message that is too long.
# The syslogd writes it into a file and through a pipe.
# The syslogd passes it via UDP to the loghost.
# The server receives the message on its UDP socket.
# Find the message in client, file, syslogd, server log.
# Check that the file log contains the truncated message.
use strict;
use warnings;
use Socket;
use constant MAXLINE => 8192;
use constant MAX_UDPMSG => 1180;
our %args = (
client => {
connect => { domain => AF_INET, proto => "tcp", addr => "127.0.0.1",
port => 514 },
func => sub {
my $self = shift;
local $| = 1;
my $msg = generate_chars(MAXLINE+1);
print "$msg\n";
print STDERR "<<< $msg\n";
${$self->{syslogd}}->loggrep(qr/tcp logger .* use \d+ bytes/, 5)
or die ref($self), " syslogd did not use bytes";
$msg = generate_chars(MAXLINE);
print $msg;
print STDERR "<<< $msg\n";
${$self->{syslogd}}->loggrep("tcp logger .* incomplete", 5, 2)
or die ref($self), " syslogd did not receive 2 incomplete";
print "\n";
print STDERR "<<< \n";
write_shutdown($self);
},
loggrep => {
qr/<<< 0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ/ => 2,
},
},
syslogd => {
options => ["-T", "127.0.0.1:514"],
loggrep => {
qr/non transparent framing, incomplete frame, /.
qr/buffer \d+ bytes/ => 2,
qr/non transparent framing, use /.(MAXLINE+2).qr/ bytes/ => 1,
qr/non transparent framing, use /.(MAXLINE+1).qr/ bytes/ => 1,
},
},
server => {
# >>> <13>Jul 6 22:33:32 0123456789ABC...fgh
loggrep => {
qr/>>> .{19} /.generate_chars(MAX_UDPMSG-20).qr/$/ => 2,
},
},
file => {
loggrep => {
generate_chars(MAXLINE).qr/$/ => 2,
},
},
pipe => { nocheck => 1 }, # XXX syslogd ignore short writes to pipe
tty => { nocheck => 1 },
);
1;
|