2006-12-07 00:25:32 +01:00
|
|
|
/*
|
|
|
|
* Copyright (c) 1983, 1993
|
|
|
|
* The Regents of the University of California. All rights reserved.
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
|
|
* documentation and/or other materials provided with the distribution.
|
|
|
|
* 3. All advertising materials mentioning features or use of this software
|
|
|
|
* must display the following acknowledgement:
|
|
|
|
* This product includes software developed by the University of
|
|
|
|
* California, Berkeley and its contributors.
|
|
|
|
* 4. Neither the name of the University nor the names of its contributors
|
|
|
|
* may be used to endorse or promote products derived from this software
|
|
|
|
* without specific prior written permission.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
|
|
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
|
|
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
|
|
* SUCH DAMAGE.
|
2006-12-07 00:25:39 +01:00
|
|
|
*
|
2013-01-26 17:07:51 +01:00
|
|
|
* 1999-02-22 Arkadiusz Miśkiewicz <misiek@pld.ORG.PL>
|
2006-12-07 00:25:39 +01:00
|
|
|
* - added Native Language Support
|
|
|
|
* Sun Mar 21 1999 - Arnaldo Carvalho de Melo <acme@conectiva.com.br>
|
|
|
|
* - fixed strerr(errno) in gettext calls
|
2006-12-07 00:25:32 +01:00
|
|
|
*/
|
|
|
|
|
|
|
|
#include <errno.h>
|
2014-05-11 21:26:41 +02:00
|
|
|
#include <limits.h>
|
2006-12-07 00:25:32 +01:00
|
|
|
#include <unistd.h>
|
|
|
|
#include <stdlib.h>
|
2014-09-19 01:36:37 +02:00
|
|
|
#include <sys/time.h>
|
2006-12-07 00:25:32 +01:00
|
|
|
#include <stdio.h>
|
|
|
|
#include <ctype.h>
|
|
|
|
#include <string.h>
|
2006-12-07 00:25:39 +01:00
|
|
|
#include <sys/types.h>
|
|
|
|
#include <sys/socket.h>
|
2006-12-07 00:25:44 +01:00
|
|
|
#include <sys/un.h>
|
2011-01-28 14:15:20 +01:00
|
|
|
#include <arpa/inet.h>
|
|
|
|
#include <netdb.h>
|
2011-02-24 20:16:40 +01:00
|
|
|
#include <getopt.h>
|
2014-06-23 00:29:36 +02:00
|
|
|
#include <pwd.h>
|
2015-10-29 11:18:21 +01:00
|
|
|
#include <signal.h>
|
2016-02-22 17:25:21 +01:00
|
|
|
#include <sys/uio.h>
|
2011-02-24 20:16:40 +01:00
|
|
|
|
2014-06-22 23:59:57 +02:00
|
|
|
#include "all-io.h"
|
2011-02-24 20:16:40 +01:00
|
|
|
#include "c.h"
|
2012-04-04 19:56:48 +02:00
|
|
|
#include "closestream.h"
|
2006-12-07 00:25:39 +01:00
|
|
|
#include "nls.h"
|
2015-02-22 15:41:45 +01:00
|
|
|
#include "pathnames.h"
|
2011-02-24 20:16:40 +01:00
|
|
|
#include "strutils.h"
|
2014-02-21 20:25:30 +01:00
|
|
|
#include "xalloc.h"
|
2015-10-01 14:48:15 +02:00
|
|
|
#include "strv.h"
|
|
|
|
#include "list.h"
|
2006-12-07 00:25:32 +01:00
|
|
|
|
|
|
|
#define SYSLOG_NAMES
|
|
|
|
#include <syslog.h>
|
|
|
|
|
2014-04-09 12:23:30 +02:00
|
|
|
#ifdef HAVE_LIBSYSTEMD
|
2018-07-07 20:11:46 +02:00
|
|
|
# define SD_JOURNAL_SUPPRESS_LOCATION
|
logger: add --socket-errors compatibility option
Hello,
Depending viewpoint this change is either regression fix, or
re-regression in context of none-systemd init. I ack the change is sent
very late to be part of v2.26, but then again the excess noise was found
only because of -rc1 was tested in sysvinit environment. IMHO it would
contradict purpose of having rc's if faults will not lead to fixes.
I also want to point out the sysvinit scripts are broken, not the
logger(1), but getting them corrected is practically impossible.
Assuming sysvinit script are further developed by various teams and
distributions who maintain them they should use --socket-error=on in
future, and write scripts that pass without noise. Meanwhile trying to
be clever when to silence errors seems like a reasonable thing to do.
--->8----
From: Sami Kerola <kerolasa@iki.fi>
Date: Sat, 14 Feb 2015 19:05:55 +0000
Subject: [PATCH] logger: add --socket-errors compatibility option
Now when logger(1) has stopped using openlog() for Unix sockets, in
commit mentioned in reference, the lack of /dev/log detected will report
error accordingly. According to Gabriele Balducci this makes sysvinit
style boot scripts to print a lot of errors. So make the logger to
detect whether it should be in compatibility mode, and not report errors
if logging device is missing. That imitates behavior of glibc openlog().
To allow full control to users the /dev/log error messages can be forced
to on or off. The automatic error messaging is explained in manual page.
Reference: 1d57503378bdcd838365d625f6d2d0a09da9c29d
Reported-by: Gabriele Balducci <balducci@units.it>
Signed-off-by: Sami Kerola <kerolasa@iki.fi>
2015-02-15 10:50:23 +01:00
|
|
|
# include <systemd/sd-daemon.h>
|
2014-02-21 20:25:30 +01:00
|
|
|
# include <systemd/sd-journal.h>
|
|
|
|
#endif
|
|
|
|
|
2015-01-18 22:44:54 +01:00
|
|
|
#ifdef HAVE_SYS_TIMEX_H
|
|
|
|
# include <sys/timex.h>
|
|
|
|
#endif
|
|
|
|
|
2013-04-05 22:17:24 +02:00
|
|
|
enum {
|
|
|
|
TYPE_UDP = (1 << 1),
|
|
|
|
TYPE_TCP = (1 << 2),
|
|
|
|
ALL_TYPES = TYPE_UDP | TYPE_TCP
|
|
|
|
};
|
|
|
|
|
logger: add --socket-errors compatibility option
Hello,
Depending viewpoint this change is either regression fix, or
re-regression in context of none-systemd init. I ack the change is sent
very late to be part of v2.26, but then again the excess noise was found
only because of -rc1 was tested in sysvinit environment. IMHO it would
contradict purpose of having rc's if faults will not lead to fixes.
I also want to point out the sysvinit scripts are broken, not the
logger(1), but getting them corrected is practically impossible.
Assuming sysvinit script are further developed by various teams and
distributions who maintain them they should use --socket-error=on in
future, and write scripts that pass without noise. Meanwhile trying to
be clever when to silence errors seems like a reasonable thing to do.
--->8----
From: Sami Kerola <kerolasa@iki.fi>
Date: Sat, 14 Feb 2015 19:05:55 +0000
Subject: [PATCH] logger: add --socket-errors compatibility option
Now when logger(1) has stopped using openlog() for Unix sockets, in
commit mentioned in reference, the lack of /dev/log detected will report
error accordingly. According to Gabriele Balducci this makes sysvinit
style boot scripts to print a lot of errors. So make the logger to
detect whether it should be in compatibility mode, and not report errors
if logging device is missing. That imitates behavior of glibc openlog().
To allow full control to users the /dev/log error messages can be forced
to on or off. The automatic error messaging is explained in manual page.
Reference: 1d57503378bdcd838365d625f6d2d0a09da9c29d
Reported-by: Gabriele Balducci <balducci@units.it>
Signed-off-by: Sami Kerola <kerolasa@iki.fi>
2015-02-15 10:50:23 +01:00
|
|
|
enum {
|
|
|
|
AF_UNIX_ERRORS_OFF = 0,
|
|
|
|
AF_UNIX_ERRORS_ON,
|
|
|
|
AF_UNIX_ERRORS_AUTO
|
|
|
|
};
|
|
|
|
|
2013-05-22 13:12:08 +02:00
|
|
|
enum {
|
2014-02-21 20:25:30 +01:00
|
|
|
OPT_PRIO_PREFIX = CHAR_MAX + 1,
|
2014-06-26 17:13:55 +02:00
|
|
|
OPT_JOURNALD,
|
|
|
|
OPT_RFC3164,
|
logger: add --socket-errors compatibility option
Hello,
Depending viewpoint this change is either regression fix, or
re-regression in context of none-systemd init. I ack the change is sent
very late to be part of v2.26, but then again the excess noise was found
only because of -rc1 was tested in sysvinit environment. IMHO it would
contradict purpose of having rc's if faults will not lead to fixes.
I also want to point out the sysvinit scripts are broken, not the
logger(1), but getting them corrected is practically impossible.
Assuming sysvinit script are further developed by various teams and
distributions who maintain them they should use --socket-error=on in
future, and write scripts that pass without noise. Meanwhile trying to
be clever when to silence errors seems like a reasonable thing to do.
--->8----
From: Sami Kerola <kerolasa@iki.fi>
Date: Sat, 14 Feb 2015 19:05:55 +0000
Subject: [PATCH] logger: add --socket-errors compatibility option
Now when logger(1) has stopped using openlog() for Unix sockets, in
commit mentioned in reference, the lack of /dev/log detected will report
error accordingly. According to Gabriele Balducci this makes sysvinit
style boot scripts to print a lot of errors. So make the logger to
detect whether it should be in compatibility mode, and not report errors
if logging device is missing. That imitates behavior of glibc openlog().
To allow full control to users the /dev/log error messages can be forced
to on or off. The automatic error messaging is explained in manual page.
Reference: 1d57503378bdcd838365d625f6d2d0a09da9c29d
Reported-by: Gabriele Balducci <balducci@units.it>
Signed-off-by: Sami Kerola <kerolasa@iki.fi>
2015-02-15 10:50:23 +01:00
|
|
|
OPT_RFC5424,
|
2015-02-20 20:42:34 +01:00
|
|
|
OPT_SOCKET_ERRORS,
|
2015-03-10 17:47:30 +01:00
|
|
|
OPT_MSGID,
|
2015-03-16 12:38:46 +01:00
|
|
|
OPT_NOACT,
|
2015-07-15 20:01:48 +02:00
|
|
|
OPT_ID,
|
2015-10-01 14:48:15 +02:00
|
|
|
OPT_STRUCTURED_DATA_ID,
|
|
|
|
OPT_STRUCTURED_DATA_PARAM,
|
2015-07-15 20:01:48 +02:00
|
|
|
OPT_OCTET_COUNT
|
2013-05-22 13:12:08 +02:00
|
|
|
};
|
|
|
|
|
2015-10-01 14:48:15 +02:00
|
|
|
/* rfc5424 structured data */
|
|
|
|
struct structured_data {
|
|
|
|
char *id; /* SD-ID */
|
|
|
|
char **params; /* array with SD-PARAMs */
|
|
|
|
|
|
|
|
struct list_head sds;
|
|
|
|
};
|
|
|
|
|
2014-06-26 22:48:25 +02:00
|
|
|
struct logger_ctl {
|
|
|
|
int fd;
|
|
|
|
int pri;
|
2014-08-20 12:24:40 +02:00
|
|
|
pid_t pid; /* zero when unwanted */
|
logger: refactor message generation
Previously, the message format was generated in one big step. Now
this is refactored to generate the header independently. This not
only provides a better isolation of functionality, but enables
to calculate the size of the header *before* generating the user
part of the message. That in turn is needed in order to precisely
enforce the message size limit. This is especially important while
processing files, as here parts of the message may be lost if the
receiver truncates the message. The file reader itself tries to
guard against this by reading only the permitted number of bytes,
but without knowing the header size, it would mis-guess here.
Note that when --prio-prefix is given, we still do not know exactly
the header length, because the PRI value is between 1 and 3 bytes.
Unfortunately, we do not know the actual size before reading. With
the current (simple) approach, we need to read the full line before
getting the PRI, so this is a hen-egg problem. To solve this, a
more complex reader would be required. It is questionable if this
is necessary for a tool like logger. So currently, we still have a
2-byte window of uncertainty if --prio-prefix is given.
[kzak@redhat.com: - fix compiler warnings [-Wunused-but-set-variable]]
Signed-off-by: Karel Zak <kzak@redhat.com>
2015-03-06 18:52:26 +01:00
|
|
|
char *hdr; /* the syslog header (based on protocol) */
|
2017-04-15 22:56:23 +02:00
|
|
|
char const *tag;
|
2015-03-10 17:47:30 +01:00
|
|
|
char *msgid;
|
2015-03-06 11:05:30 +01:00
|
|
|
char *unix_socket; /* -u <path> or default to _PATH_DEVLOG */
|
2014-07-26 14:10:25 +02:00
|
|
|
char *server;
|
|
|
|
char *port;
|
|
|
|
int socket_type;
|
2015-03-06 15:50:34 +01:00
|
|
|
size_t max_message_size;
|
2015-10-01 14:48:15 +02:00
|
|
|
struct list_head user_sds; /* user defined rfc5424 structured data */
|
|
|
|
struct list_head reserved_sds; /* standard rfc5424 structured data */
|
|
|
|
|
logger: refactor message generation
Previously, the message format was generated in one big step. Now
this is refactored to generate the header independently. This not
only provides a better isolation of functionality, but enables
to calculate the size of the header *before* generating the user
part of the message. That in turn is needed in order to precisely
enforce the message size limit. This is especially important while
processing files, as here parts of the message may be lost if the
receiver truncates the message. The file reader itself tries to
guard against this by reading only the permitted number of bytes,
but without knowing the header size, it would mis-guess here.
Note that when --prio-prefix is given, we still do not know exactly
the header length, because the PRI value is between 1 and 3 bytes.
Unfortunately, we do not know the actual size before reading. With
the current (simple) approach, we need to read the full line before
getting the PRI, so this is a hen-egg problem. To solve this, a
more complex reader would be required. It is questionable if this
is necessary for a tool like logger. So currently, we still have a
2-byte window of uncertainty if --prio-prefix is given.
[kzak@redhat.com: - fix compiler warnings [-Wunused-but-set-variable]]
Signed-off-by: Karel Zak <kzak@redhat.com>
2015-03-06 18:52:26 +01:00
|
|
|
void (*syslogfp)(struct logger_ctl *ctl);
|
2015-10-01 14:48:15 +02:00
|
|
|
|
2014-06-26 17:13:55 +02:00
|
|
|
unsigned int
|
logger: add --socket-errors compatibility option
Hello,
Depending viewpoint this change is either regression fix, or
re-regression in context of none-systemd init. I ack the change is sent
very late to be part of v2.26, but then again the excess noise was found
only because of -rc1 was tested in sysvinit environment. IMHO it would
contradict purpose of having rc's if faults will not lead to fixes.
I also want to point out the sysvinit scripts are broken, not the
logger(1), but getting them corrected is practically impossible.
Assuming sysvinit script are further developed by various teams and
distributions who maintain them they should use --socket-error=on in
future, and write scripts that pass without noise. Meanwhile trying to
be clever when to silence errors seems like a reasonable thing to do.
--->8----
From: Sami Kerola <kerolasa@iki.fi>
Date: Sat, 14 Feb 2015 19:05:55 +0000
Subject: [PATCH] logger: add --socket-errors compatibility option
Now when logger(1) has stopped using openlog() for Unix sockets, in
commit mentioned in reference, the lack of /dev/log detected will report
error accordingly. According to Gabriele Balducci this makes sysvinit
style boot scripts to print a lot of errors. So make the logger to
detect whether it should be in compatibility mode, and not report errors
if logging device is missing. That imitates behavior of glibc openlog().
To allow full control to users the /dev/log error messages can be forced
to on or off. The automatic error messaging is explained in manual page.
Reference: 1d57503378bdcd838365d625f6d2d0a09da9c29d
Reported-by: Gabriele Balducci <balducci@units.it>
Signed-off-by: Sami Kerola <kerolasa@iki.fi>
2015-02-15 10:50:23 +01:00
|
|
|
unix_socket_errors:1, /* whether to report or not errors */
|
2015-03-16 12:38:46 +01:00
|
|
|
noact:1, /* do not write to sockets */
|
2016-05-29 23:11:53 +02:00
|
|
|
prio_prefix:1, /* read priority from input */
|
logger: add --socket-errors compatibility option
Hello,
Depending viewpoint this change is either regression fix, or
re-regression in context of none-systemd init. I ack the change is sent
very late to be part of v2.26, but then again the excess noise was found
only because of -rc1 was tested in sysvinit environment. IMHO it would
contradict purpose of having rc's if faults will not lead to fixes.
I also want to point out the sysvinit scripts are broken, not the
logger(1), but getting them corrected is practically impossible.
Assuming sysvinit script are further developed by various teams and
distributions who maintain them they should use --socket-error=on in
future, and write scripts that pass without noise. Meanwhile trying to
be clever when to silence errors seems like a reasonable thing to do.
--->8----
From: Sami Kerola <kerolasa@iki.fi>
Date: Sat, 14 Feb 2015 19:05:55 +0000
Subject: [PATCH] logger: add --socket-errors compatibility option
Now when logger(1) has stopped using openlog() for Unix sockets, in
commit mentioned in reference, the lack of /dev/log detected will report
error accordingly. According to Gabriele Balducci this makes sysvinit
style boot scripts to print a lot of errors. So make the logger to
detect whether it should be in compatibility mode, and not report errors
if logging device is missing. That imitates behavior of glibc openlog().
To allow full control to users the /dev/log error messages can be forced
to on or off. The automatic error messaging is explained in manual page.
Reference: 1d57503378bdcd838365d625f6d2d0a09da9c29d
Reported-by: Gabriele Balducci <balducci@units.it>
Signed-off-by: Sami Kerola <kerolasa@iki.fi>
2015-02-15 10:50:23 +01:00
|
|
|
stderr_printout:1, /* output message to stderr */
|
|
|
|
rfc5424_time:1, /* include time stamp */
|
|
|
|
rfc5424_tq:1, /* include time quality markup */
|
2015-03-07 12:14:21 +01:00
|
|
|
rfc5424_host:1, /* include hostname */
|
2015-07-15 20:01:48 +02:00
|
|
|
skip_empty_lines:1, /* do not send empty lines when processing files */
|
|
|
|
octet_count:1; /* use RFC6587 octet counting */
|
2014-06-26 22:48:25 +02:00
|
|
|
};
|
|
|
|
|
2017-10-11 12:35:24 +02:00
|
|
|
#define is_connected(_ctl) ((_ctl)->fd >= 0)
|
2017-10-10 13:56:30 +02:00
|
|
|
static void logger_reopen(struct logger_ctl *ctl);
|
|
|
|
|
2015-03-16 13:26:52 +01:00
|
|
|
/*
|
|
|
|
* For tests we want to be able to control datetime outputs
|
|
|
|
*/
|
|
|
|
#ifdef TEST_LOGGER
|
|
|
|
static inline int logger_gettimeofday(struct timeval *tv, struct timezone *tz)
|
|
|
|
{
|
|
|
|
char *str = getenv("LOGGER_TEST_TIMEOFDAY");
|
|
|
|
uintmax_t sec, usec;
|
|
|
|
|
|
|
|
if (str && sscanf(str, "%ju.%ju", &sec, &usec) == 2) {
|
|
|
|
tv->tv_sec = sec;
|
|
|
|
tv->tv_usec = usec;
|
2015-03-23 11:40:45 +01:00
|
|
|
return tv->tv_sec >= 0 && tv->tv_usec >= 0 ? 0 : -EINVAL;
|
2015-03-16 13:26:52 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
return gettimeofday(tv, tz);
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline char *logger_xgethostname(void)
|
|
|
|
{
|
|
|
|
char *str = getenv("LOGGER_TEST_HOSTNAME");
|
|
|
|
return str ? xstrdup(str) : xgethostname();
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline pid_t logger_getpid(void)
|
|
|
|
{
|
|
|
|
char *str = getenv("LOGGER_TEST_GETPID");
|
|
|
|
unsigned int pid;
|
|
|
|
|
|
|
|
if (str && sscanf(str, "%u", &pid) == 1)
|
|
|
|
return pid;
|
|
|
|
return getpid();
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
#undef HAVE_NTP_GETTIME /* force to default non-NTP */
|
|
|
|
|
|
|
|
#else /* !TEST_LOGGER */
|
|
|
|
# define logger_gettimeofday(x, y) gettimeofday(x, y)
|
|
|
|
# define logger_xgethostname xgethostname
|
|
|
|
# define logger_getpid getpid
|
|
|
|
#endif
|
|
|
|
|
|
|
|
|
2016-03-08 11:23:14 +01:00
|
|
|
static int decode(const char *name, const CODE *codetab)
|
2012-05-23 22:36:00 +02:00
|
|
|
{
|
2016-03-08 11:23:14 +01:00
|
|
|
register const CODE *c;
|
2012-05-23 22:36:00 +02:00
|
|
|
|
2014-05-11 21:26:42 +02:00
|
|
|
if (name == NULL || *name == '\0')
|
|
|
|
return -1;
|
|
|
|
if (isdigit(*name)) {
|
|
|
|
int num;
|
|
|
|
char *end = NULL;
|
|
|
|
|
2015-03-15 14:23:32 +01:00
|
|
|
errno = 0;
|
2014-05-11 21:26:42 +02:00
|
|
|
num = strtol(name, &end, 10);
|
|
|
|
if (errno || name == end || (end && *end))
|
|
|
|
return -1;
|
|
|
|
for (c = codetab; c->c_name; c++)
|
|
|
|
if (num == c->c_val)
|
|
|
|
return num;
|
|
|
|
return -1;
|
|
|
|
}
|
2012-05-23 22:36:00 +02:00
|
|
|
for (c = codetab; c->c_name; c++)
|
|
|
|
if (!strcasecmp(name, c->c_name))
|
|
|
|
return (c->c_val);
|
|
|
|
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int pencode(char *s)
|
|
|
|
{
|
2014-07-26 16:19:26 +02:00
|
|
|
int facility, level;
|
|
|
|
char *separator;
|
|
|
|
|
2019-05-23 12:14:10 +02:00
|
|
|
assert(s);
|
|
|
|
|
2014-07-26 16:19:26 +02:00
|
|
|
separator = strchr(s, '.');
|
|
|
|
if (separator) {
|
|
|
|
*separator = '\0';
|
|
|
|
facility = decode(s, facilitynames);
|
|
|
|
if (facility < 0)
|
|
|
|
errx(EXIT_FAILURE, _("unknown facility name: %s"), s);
|
|
|
|
s = ++separator;
|
|
|
|
} else
|
|
|
|
facility = LOG_USER;
|
|
|
|
level = decode(s, prioritynames);
|
|
|
|
if (level < 0)
|
|
|
|
errx(EXIT_FAILURE, _("unknown priority name: %s"), s);
|
2015-03-15 13:54:47 +01:00
|
|
|
if (facility == LOG_KERN)
|
|
|
|
facility = LOG_USER; /* kern is forbidden */
|
2014-07-26 16:19:26 +02:00
|
|
|
return ((level & LOG_PRIMASK) | (facility & LOG_FACMASK));
|
2012-05-23 22:36:00 +02:00
|
|
|
}
|
|
|
|
|
2015-10-06 09:16:33 +02:00
|
|
|
static int unix_socket(struct logger_ctl *ctl, const char *path, int *socket_type)
|
2013-04-02 21:42:57 +02:00
|
|
|
{
|
2019-02-09 10:34:52 +01:00
|
|
|
int fd = -1, i, type = -1;
|
2013-04-02 21:42:57 +02:00
|
|
|
static struct sockaddr_un s_addr; /* AF_UNIX address of local logger */
|
2006-12-07 00:25:39 +01:00
|
|
|
|
2013-04-05 22:17:24 +02:00
|
|
|
if (strlen(path) >= sizeof(s_addr.sun_path))
|
|
|
|
errx(EXIT_FAILURE, _("openlog %s: pathname too long"), path);
|
2006-12-07 00:25:39 +01:00
|
|
|
|
2013-04-02 21:42:57 +02:00
|
|
|
s_addr.sun_family = AF_UNIX;
|
2013-04-05 22:17:24 +02:00
|
|
|
strcpy(s_addr.sun_path, path);
|
|
|
|
|
|
|
|
for (i = 2; i; i--) {
|
|
|
|
int st = -1;
|
2011-02-24 20:16:41 +01:00
|
|
|
|
2015-10-06 09:16:33 +02:00
|
|
|
if (i == 2 && *socket_type & TYPE_UDP) {
|
2013-04-05 22:17:24 +02:00
|
|
|
st = SOCK_DGRAM;
|
2015-10-06 09:16:33 +02:00
|
|
|
type = TYPE_UDP;
|
|
|
|
}
|
|
|
|
if (i == 1 && *socket_type & TYPE_TCP) {
|
2013-04-05 22:17:24 +02:00
|
|
|
st = SOCK_STREAM;
|
2015-10-06 09:16:33 +02:00
|
|
|
type = TYPE_TCP;
|
|
|
|
}
|
2013-04-05 22:17:24 +02:00
|
|
|
if (st == -1 || (fd = socket(AF_UNIX, st, 0)) == -1)
|
|
|
|
continue;
|
2013-04-02 21:42:57 +02:00
|
|
|
if (connect(fd, (struct sockaddr *)&s_addr, sizeof(s_addr)) == -1) {
|
|
|
|
close(fd);
|
2013-04-05 22:17:24 +02:00
|
|
|
continue;
|
2013-04-02 21:42:57 +02:00
|
|
|
}
|
2013-04-05 22:17:24 +02:00
|
|
|
break;
|
2013-04-02 21:42:57 +02:00
|
|
|
}
|
2006-12-07 00:25:39 +01:00
|
|
|
|
logger: add --socket-errors compatibility option
Hello,
Depending viewpoint this change is either regression fix, or
re-regression in context of none-systemd init. I ack the change is sent
very late to be part of v2.26, but then again the excess noise was found
only because of -rc1 was tested in sysvinit environment. IMHO it would
contradict purpose of having rc's if faults will not lead to fixes.
I also want to point out the sysvinit scripts are broken, not the
logger(1), but getting them corrected is practically impossible.
Assuming sysvinit script are further developed by various teams and
distributions who maintain them they should use --socket-error=on in
future, and write scripts that pass without noise. Meanwhile trying to
be clever when to silence errors seems like a reasonable thing to do.
--->8----
From: Sami Kerola <kerolasa@iki.fi>
Date: Sat, 14 Feb 2015 19:05:55 +0000
Subject: [PATCH] logger: add --socket-errors compatibility option
Now when logger(1) has stopped using openlog() for Unix sockets, in
commit mentioned in reference, the lack of /dev/log detected will report
error accordingly. According to Gabriele Balducci this makes sysvinit
style boot scripts to print a lot of errors. So make the logger to
detect whether it should be in compatibility mode, and not report errors
if logging device is missing. That imitates behavior of glibc openlog().
To allow full control to users the /dev/log error messages can be forced
to on or off. The automatic error messaging is explained in manual page.
Reference: 1d57503378bdcd838365d625f6d2d0a09da9c29d
Reported-by: Gabriele Balducci <balducci@units.it>
Signed-off-by: Sami Kerola <kerolasa@iki.fi>
2015-02-15 10:50:23 +01:00
|
|
|
if (i == 0) {
|
|
|
|
if (ctl->unix_socket_errors)
|
|
|
|
err(EXIT_FAILURE, _("socket %s"), path);
|
2015-08-05 13:23:34 +02:00
|
|
|
|
2017-10-11 12:35:24 +02:00
|
|
|
/* write_output() will try to reconnect */
|
2015-08-05 13:23:34 +02:00
|
|
|
return -1;
|
logger: add --socket-errors compatibility option
Hello,
Depending viewpoint this change is either regression fix, or
re-regression in context of none-systemd init. I ack the change is sent
very late to be part of v2.26, but then again the excess noise was found
only because of -rc1 was tested in sysvinit environment. IMHO it would
contradict purpose of having rc's if faults will not lead to fixes.
I also want to point out the sysvinit scripts are broken, not the
logger(1), but getting them corrected is practically impossible.
Assuming sysvinit script are further developed by various teams and
distributions who maintain them they should use --socket-error=on in
future, and write scripts that pass without noise. Meanwhile trying to
be clever when to silence errors seems like a reasonable thing to do.
--->8----
From: Sami Kerola <kerolasa@iki.fi>
Date: Sat, 14 Feb 2015 19:05:55 +0000
Subject: [PATCH] logger: add --socket-errors compatibility option
Now when logger(1) has stopped using openlog() for Unix sockets, in
commit mentioned in reference, the lack of /dev/log detected will report
error accordingly. According to Gabriele Balducci this makes sysvinit
style boot scripts to print a lot of errors. So make the logger to
detect whether it should be in compatibility mode, and not report errors
if logging device is missing. That imitates behavior of glibc openlog().
To allow full control to users the /dev/log error messages can be forced
to on or off. The automatic error messaging is explained in manual page.
Reference: 1d57503378bdcd838365d625f6d2d0a09da9c29d
Reported-by: Gabriele Balducci <balducci@units.it>
Signed-off-by: Sami Kerola <kerolasa@iki.fi>
2015-02-15 10:50:23 +01:00
|
|
|
}
|
2015-10-06 09:16:33 +02:00
|
|
|
|
|
|
|
/* replace ALL_TYPES with the real TYPE_* */
|
|
|
|
if (type > 0 && type != *socket_type)
|
|
|
|
*socket_type = type;
|
2013-04-02 21:42:57 +02:00
|
|
|
return fd;
|
2006-12-07 00:25:39 +01:00
|
|
|
}
|
|
|
|
|
2015-10-06 09:16:33 +02:00
|
|
|
static int inet_socket(const char *servername, const char *port, int *socket_type)
|
2013-04-05 22:17:24 +02:00
|
|
|
{
|
2015-10-06 09:16:33 +02:00
|
|
|
int fd, errcode, i, type = -1;
|
2012-10-12 22:28:41 +02:00
|
|
|
struct addrinfo hints, *res;
|
2013-04-05 22:17:24 +02:00
|
|
|
const char *p = port;
|
|
|
|
|
|
|
|
for (i = 2; i; i--) {
|
|
|
|
memset(&hints, 0, sizeof(hints));
|
2015-10-06 09:16:33 +02:00
|
|
|
if (i == 2 && *socket_type & TYPE_UDP) {
|
2013-04-05 22:17:24 +02:00
|
|
|
hints.ai_socktype = SOCK_DGRAM;
|
2015-10-06 09:16:33 +02:00
|
|
|
type = TYPE_UDP;
|
2013-04-05 22:17:24 +02:00
|
|
|
if (port == NULL)
|
|
|
|
p = "syslog";
|
|
|
|
}
|
2015-10-06 09:16:33 +02:00
|
|
|
if (i == 1 && *socket_type & TYPE_TCP) {
|
2013-04-05 22:17:24 +02:00
|
|
|
hints.ai_socktype = SOCK_STREAM;
|
2015-10-06 09:16:33 +02:00
|
|
|
type = TYPE_TCP;
|
2013-04-05 22:17:24 +02:00
|
|
|
if (port == NULL)
|
|
|
|
p = "syslog-conn";
|
|
|
|
}
|
|
|
|
if (hints.ai_socktype == 0)
|
|
|
|
continue;
|
|
|
|
hints.ai_family = AF_UNSPEC;
|
|
|
|
errcode = getaddrinfo(servername, p, &hints, &res);
|
|
|
|
if (errcode != 0)
|
2013-05-29 21:52:56 +02:00
|
|
|
errx(EXIT_FAILURE, _("failed to resolve name %s port %s: %s"),
|
2013-04-05 22:17:24 +02:00
|
|
|
servername, p, gai_strerror(errcode));
|
|
|
|
if ((fd = socket(res->ai_family, res->ai_socktype, res->ai_protocol)) == -1) {
|
|
|
|
freeaddrinfo(res);
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
if (connect(fd, res->ai_addr, res->ai_addrlen) == -1) {
|
|
|
|
freeaddrinfo(res);
|
|
|
|
close(fd);
|
|
|
|
continue;
|
|
|
|
}
|
2012-10-12 22:28:41 +02:00
|
|
|
|
2013-04-05 22:17:24 +02:00
|
|
|
freeaddrinfo(res);
|
|
|
|
break;
|
|
|
|
}
|
2011-01-28 14:15:20 +01:00
|
|
|
|
2013-04-05 22:17:24 +02:00
|
|
|
if (i == 0)
|
2013-05-29 21:52:56 +02:00
|
|
|
errx(EXIT_FAILURE, _("failed to connect to %s port %s"), servername, p);
|
2011-02-24 20:16:41 +01:00
|
|
|
|
2015-10-06 09:16:33 +02:00
|
|
|
/* replace ALL_TYPES with the real TYPE_* */
|
|
|
|
if (type > 0 && type != *socket_type)
|
|
|
|
*socket_type = type;
|
2011-01-28 14:15:20 +01:00
|
|
|
return fd;
|
|
|
|
}
|
2013-04-05 22:17:24 +02:00
|
|
|
|
2014-04-09 12:23:30 +02:00
|
|
|
#ifdef HAVE_LIBSYSTEMD
|
2015-03-16 12:38:46 +01:00
|
|
|
static int journald_entry(struct logger_ctl *ctl, FILE *fp)
|
2014-02-21 20:25:30 +01:00
|
|
|
{
|
|
|
|
struct iovec *iovec;
|
|
|
|
char *buf = NULL;
|
|
|
|
ssize_t sz;
|
2019-01-23 11:41:43 +01:00
|
|
|
int n, lines = 0, vectors = 8, ret = 0, msgline = -1;
|
2014-02-21 20:25:30 +01:00
|
|
|
size_t dummy = 0;
|
|
|
|
|
|
|
|
iovec = xmalloc(vectors * sizeof(struct iovec));
|
2019-01-23 11:41:43 +01:00
|
|
|
while (1) {
|
2014-02-21 20:25:30 +01:00
|
|
|
buf = NULL;
|
|
|
|
sz = getline(&buf, &dummy, fp);
|
2016-07-18 22:49:27 +02:00
|
|
|
if (sz == -1 ||
|
|
|
|
(sz = rtrim_whitespace((unsigned char *) buf)) == 0) {
|
2016-03-13 11:31:40 +01:00
|
|
|
free(buf);
|
2014-02-21 20:25:30 +01:00
|
|
|
break;
|
2016-03-13 11:31:40 +01:00
|
|
|
}
|
2019-01-23 11:41:43 +01:00
|
|
|
|
|
|
|
if (strncmp(buf, "MESSAGE=", 8) == 0) {
|
|
|
|
if (msgline == -1)
|
|
|
|
msgline = lines; /* remember the first message */
|
|
|
|
else {
|
|
|
|
char *p = xrealloc(iovec[msgline].iov_base,
|
|
|
|
iovec[msgline].iov_len + sz - 8 + 2);
|
|
|
|
|
|
|
|
iovec[msgline].iov_base = p;
|
|
|
|
p += iovec[msgline].iov_len;
|
|
|
|
*p++ = '\n';
|
|
|
|
memcpy(p, buf + 8, sz - 8);
|
|
|
|
free(buf);
|
|
|
|
|
|
|
|
iovec[msgline].iov_len += sz - 8 + 1;
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-02-21 20:25:30 +01:00
|
|
|
if (lines == vectors) {
|
|
|
|
vectors *= 2;
|
2014-05-11 21:26:41 +02:00
|
|
|
if (IOV_MAX < vectors)
|
|
|
|
errx(EXIT_FAILURE, _("maximum input lines (%d) exceeded"), IOV_MAX);
|
2014-02-21 20:25:30 +01:00
|
|
|
iovec = xrealloc(iovec, vectors * sizeof(struct iovec));
|
|
|
|
}
|
|
|
|
iovec[lines].iov_base = buf;
|
|
|
|
iovec[lines].iov_len = sz;
|
2019-01-23 11:41:43 +01:00
|
|
|
++lines;
|
2014-02-21 20:25:30 +01:00
|
|
|
}
|
2015-03-16 12:38:46 +01:00
|
|
|
|
|
|
|
if (!ctl->noact)
|
|
|
|
ret = sd_journal_sendv(iovec, lines);
|
|
|
|
if (ctl->stderr_printout) {
|
|
|
|
for (n = 0; n < lines; n++)
|
|
|
|
fprintf(stderr, "%s\n", (char *) iovec[n].iov_base);
|
|
|
|
}
|
2014-02-21 20:25:30 +01:00
|
|
|
for (n = 0; n < lines; n++)
|
|
|
|
free(iovec[n].iov_base);
|
|
|
|
free(iovec);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2017-04-15 22:56:23 +02:00
|
|
|
static char const *xgetlogin(void)
|
2014-06-23 00:29:36 +02:00
|
|
|
{
|
2017-04-15 22:56:23 +02:00
|
|
|
char const *cp;
|
2014-06-23 00:29:36 +02:00
|
|
|
struct passwd *pw;
|
|
|
|
|
|
|
|
if (!(cp = getlogin()) || !*cp)
|
|
|
|
cp = (pw = getpwuid(geteuid()))? pw->pw_name : "<someone>";
|
|
|
|
return cp;
|
|
|
|
}
|
|
|
|
|
2015-03-05 15:20:50 +01:00
|
|
|
/* this creates a timestamp based on current time according to the
|
|
|
|
* fine rules of RFC3164, most importantly it ensures in a portable
|
|
|
|
* way that the month day is correctly written (with a SP instead
|
|
|
|
* of a leading 0). The function uses a static buffer which is
|
|
|
|
* overwritten on the next call (just like ctime() does).
|
|
|
|
*/
|
2017-04-15 22:56:23 +02:00
|
|
|
static char const *rfc3164_current_time(void)
|
2015-03-05 15:20:50 +01:00
|
|
|
{
|
|
|
|
static char time[32];
|
|
|
|
struct timeval tv;
|
2020-02-09 23:14:56 +01:00
|
|
|
struct tm tm;
|
2017-04-15 22:56:23 +02:00
|
|
|
static char const * const monthnames[] = {
|
2015-03-15 13:54:47 +01:00
|
|
|
"Jan", "Feb", "Mar", "Apr", "May", "Jun", "Jul", "Aug",
|
|
|
|
"Sep", "Oct", "Nov", "Dec"
|
|
|
|
};
|
2015-03-05 15:20:50 +01:00
|
|
|
|
2015-03-16 13:26:52 +01:00
|
|
|
logger_gettimeofday(&tv, NULL);
|
2020-02-09 23:14:56 +01:00
|
|
|
localtime_r(&tv.tv_sec, &tm);
|
2015-03-05 15:20:50 +01:00
|
|
|
snprintf(time, sizeof(time),"%s %2d %2.2d:%2.2d:%2.2d",
|
2020-02-09 23:14:56 +01:00
|
|
|
monthnames[tm.tm_mon], tm.tm_mday,
|
|
|
|
tm.tm_hour, tm.tm_min, tm.tm_sec);
|
2015-03-05 15:20:50 +01:00
|
|
|
return time;
|
|
|
|
}
|
|
|
|
|
2015-10-27 18:44:00 +01:00
|
|
|
#define next_iovec(ary, idx) __extension__ ({ \
|
2016-02-23 00:54:41 +01:00
|
|
|
assert(ARRAY_SIZE(ary) > (size_t)idx); \
|
2015-10-27 18:44:00 +01:00
|
|
|
assert(idx >= 0); \
|
|
|
|
&ary[idx++]; \
|
|
|
|
})
|
|
|
|
|
|
|
|
#define iovec_add_string(ary, idx, str, len) \
|
|
|
|
do { \
|
|
|
|
struct iovec *v = next_iovec(ary, idx); \
|
|
|
|
v->iov_base = (void *) str; \
|
|
|
|
v->iov_len = len ? len : strlen(str); \
|
|
|
|
} while (0)
|
|
|
|
|
|
|
|
#define iovec_memcmp(ary, idx, str, len) \
|
|
|
|
memcmp((ary)[(idx) - 1].iov_base, str, len)
|
|
|
|
|
2015-03-06 12:12:15 +01:00
|
|
|
/* writes generated buffer to desired destination. For TCP syslog,
|
2015-07-15 20:01:48 +02:00
|
|
|
* we use RFC6587 octet-stuffing (unless octet-counting is selected).
|
|
|
|
* This is not great, but doing full blown RFC5425 (TLS) looks like
|
|
|
|
* it is too much for the logger utility. If octet-counting is
|
|
|
|
* selected, we use that.
|
2015-03-06 12:12:15 +01:00
|
|
|
*/
|
2017-10-10 13:56:30 +02:00
|
|
|
static void write_output(struct logger_ctl *ctl, const char *const msg)
|
2015-03-06 11:51:31 +01:00
|
|
|
{
|
2015-10-27 18:44:00 +01:00
|
|
|
struct iovec iov[4];
|
|
|
|
int iovlen = 0;
|
|
|
|
char *octet = NULL;
|
|
|
|
|
2017-10-11 12:35:24 +02:00
|
|
|
/* initial connect failed? */
|
|
|
|
if (!ctl->noact && !is_connected(ctl))
|
|
|
|
logger_reopen(ctl);
|
|
|
|
|
2015-10-27 18:44:00 +01:00
|
|
|
/* 1) octen count */
|
|
|
|
if (ctl->octet_count) {
|
|
|
|
size_t len = xasprintf(&octet, "%zu ", strlen(ctl->hdr) + strlen(msg));
|
|
|
|
iovec_add_string(iov, iovlen, octet, len);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* 2) header */
|
|
|
|
iovec_add_string(iov, iovlen, ctl->hdr, 0);
|
|
|
|
|
|
|
|
/* 3) message */
|
|
|
|
iovec_add_string(iov, iovlen, msg, 0);
|
2015-03-16 12:38:46 +01:00
|
|
|
|
2017-10-11 12:35:24 +02:00
|
|
|
if (!ctl->noact && is_connected(ctl)) {
|
2015-10-31 13:27:36 +01:00
|
|
|
struct msghdr message = { 0 };
|
2016-02-19 01:44:14 +01:00
|
|
|
#ifdef SCM_CREDENTIALS
|
2015-10-29 11:18:21 +01:00
|
|
|
struct cmsghdr *cmhp;
|
|
|
|
struct ucred *cred;
|
|
|
|
union {
|
|
|
|
struct cmsghdr cmh;
|
|
|
|
char control[CMSG_SPACE(sizeof(struct ucred))];
|
|
|
|
} cbuf;
|
2016-02-19 01:44:14 +01:00
|
|
|
#endif
|
2015-10-27 18:44:00 +01:00
|
|
|
|
|
|
|
/* 4) add extra \n to make sure message is terminated */
|
|
|
|
if ((ctl->socket_type == TYPE_TCP) && !ctl->octet_count)
|
|
|
|
iovec_add_string(iov, iovlen, "\n", 1);
|
2015-10-27 13:19:16 +01:00
|
|
|
|
2015-10-31 13:27:36 +01:00
|
|
|
message.msg_iov = iov;
|
|
|
|
message.msg_iovlen = iovlen;
|
2015-10-27 13:19:16 +01:00
|
|
|
|
2016-02-19 01:44:14 +01:00
|
|
|
#ifdef SCM_CREDENTIALS
|
2015-10-29 11:18:21 +01:00
|
|
|
/* syslog/journald may follow local socket credentials rather
|
|
|
|
* than in the message PID. If we use --id as root than we can
|
|
|
|
* force kernel to accept another valid PID than the real logger(1)
|
|
|
|
* PID.
|
|
|
|
*/
|
|
|
|
if (ctl->pid && !ctl->server && ctl->pid != getpid()
|
|
|
|
&& geteuid() == 0 && kill(ctl->pid, 0) == 0) {
|
|
|
|
|
2015-10-31 13:27:36 +01:00
|
|
|
message.msg_control = cbuf.control;
|
|
|
|
message.msg_controllen = CMSG_SPACE(sizeof(struct ucred));
|
2015-10-29 11:18:21 +01:00
|
|
|
|
2015-10-31 13:27:36 +01:00
|
|
|
cmhp = CMSG_FIRSTHDR(&message);
|
2015-10-29 11:18:21 +01:00
|
|
|
cmhp->cmsg_len = CMSG_LEN(sizeof(struct ucred));
|
|
|
|
cmhp->cmsg_level = SOL_SOCKET;
|
|
|
|
cmhp->cmsg_type = SCM_CREDENTIALS;
|
|
|
|
cred = (struct ucred *) CMSG_DATA(cmhp);
|
|
|
|
|
|
|
|
cred->pid = ctl->pid;
|
|
|
|
}
|
2016-02-19 01:44:14 +01:00
|
|
|
#endif
|
2017-10-10 13:56:30 +02:00
|
|
|
/* Note that logger(1) maybe executed for long time (as pipe
|
|
|
|
* reader) and connection endpoint (syslogd) may be restarted.
|
|
|
|
*
|
|
|
|
* The libc syslog() function reconnects on failed send().
|
|
|
|
* Let's do the same to be robust. [kzak -- Oct 2017]
|
2017-10-10 14:45:55 +02:00
|
|
|
*
|
|
|
|
* MSG_NOSIGNAL is POSIX.1-2008 compatible, but it for example
|
2018-02-15 22:02:18 +01:00
|
|
|
* not supported by apple-darwin15.6.0.
|
2017-10-10 13:56:30 +02:00
|
|
|
*/
|
2017-10-10 14:45:55 +02:00
|
|
|
#ifndef MSG_NOSIGNAL
|
|
|
|
# define MSG_NOSIGNAL 0
|
|
|
|
#endif
|
2017-10-10 13:56:30 +02:00
|
|
|
if (sendmsg(ctl->fd, &message, MSG_NOSIGNAL) < 0) {
|
|
|
|
logger_reopen(ctl);
|
|
|
|
if (sendmsg(ctl->fd, &message, MSG_NOSIGNAL) < 0)
|
|
|
|
warn(_("send message failed"));
|
|
|
|
}
|
2015-03-16 12:38:46 +01:00
|
|
|
}
|
2015-10-27 18:44:00 +01:00
|
|
|
|
|
|
|
if (ctl->stderr_printout) {
|
|
|
|
/* make sure it's terminated for stderr */
|
|
|
|
if (iovec_memcmp(iov, iovlen, "\n", 1) != 0)
|
|
|
|
iovec_add_string(iov, iovlen, "\n", 1);
|
|
|
|
|
|
|
|
ignore_result( writev(STDERR_FILENO, iov, iovlen) );
|
|
|
|
}
|
|
|
|
|
|
|
|
free(octet);
|
2015-03-06 11:51:31 +01:00
|
|
|
}
|
|
|
|
|
2015-03-15 13:54:48 +01:00
|
|
|
#define NILVALUE "-"
|
logger: refactor message generation
Previously, the message format was generated in one big step. Now
this is refactored to generate the header independently. This not
only provides a better isolation of functionality, but enables
to calculate the size of the header *before* generating the user
part of the message. That in turn is needed in order to precisely
enforce the message size limit. This is especially important while
processing files, as here parts of the message may be lost if the
receiver truncates the message. The file reader itself tries to
guard against this by reading only the permitted number of bytes,
but without knowing the header size, it would mis-guess here.
Note that when --prio-prefix is given, we still do not know exactly
the header length, because the PRI value is between 1 and 3 bytes.
Unfortunately, we do not know the actual size before reading. With
the current (simple) approach, we need to read the full line before
getting the PRI, so this is a hen-egg problem. To solve this, a
more complex reader would be required. It is questionable if this
is necessary for a tool like logger. So currently, we still have a
2-byte window of uncertainty if --prio-prefix is given.
[kzak@redhat.com: - fix compiler warnings [-Wunused-but-set-variable]]
Signed-off-by: Karel Zak <kzak@redhat.com>
2015-03-06 18:52:26 +01:00
|
|
|
static void syslog_rfc3164_header(struct logger_ctl *const ctl)
|
2013-05-29 10:56:05 +02:00
|
|
|
{
|
2015-03-15 13:54:48 +01:00
|
|
|
char pid[30], *hostname;
|
2014-06-23 00:02:43 +02:00
|
|
|
|
2014-08-09 09:38:58 +02:00
|
|
|
*pid = '\0';
|
2014-08-20 12:24:40 +02:00
|
|
|
if (ctl->pid)
|
|
|
|
snprintf(pid, sizeof(pid), "[%d]", ctl->pid);
|
2014-07-29 11:43:01 +02:00
|
|
|
|
2015-03-16 13:26:52 +01:00
|
|
|
if ((hostname = logger_xgethostname())) {
|
2015-03-15 13:54:48 +01:00
|
|
|
char *dot = strchr(hostname, '.');
|
|
|
|
if (dot)
|
|
|
|
*dot = '\0';
|
|
|
|
} else
|
|
|
|
hostname = xstrdup(NILVALUE);
|
2014-07-29 11:43:01 +02:00
|
|
|
|
logger: refactor message generation
Previously, the message format was generated in one big step. Now
this is refactored to generate the header independently. This not
only provides a better isolation of functionality, but enables
to calculate the size of the header *before* generating the user
part of the message. That in turn is needed in order to precisely
enforce the message size limit. This is especially important while
processing files, as here parts of the message may be lost if the
receiver truncates the message. The file reader itself tries to
guard against this by reading only the permitted number of bytes,
but without knowing the header size, it would mis-guess here.
Note that when --prio-prefix is given, we still do not know exactly
the header length, because the PRI value is between 1 and 3 bytes.
Unfortunately, we do not know the actual size before reading. With
the current (simple) approach, we need to read the full line before
getting the PRI, so this is a hen-egg problem. To solve this, a
more complex reader would be required. It is questionable if this
is necessary for a tool like logger. So currently, we still have a
2-byte window of uncertainty if --prio-prefix is given.
[kzak@redhat.com: - fix compiler warnings [-Wunused-but-set-variable]]
Signed-off-by: Karel Zak <kzak@redhat.com>
2015-03-06 18:52:26 +01:00
|
|
|
xasprintf(&ctl->hdr, "<%d>%.15s %s %.200s%s: ",
|
|
|
|
ctl->pri, rfc3164_current_time(), hostname, ctl->tag, pid);
|
2014-07-29 11:43:01 +02:00
|
|
|
|
|
|
|
free(hostname);
|
2006-12-07 00:25:39 +01:00
|
|
|
}
|
|
|
|
|
2015-10-01 14:48:15 +02:00
|
|
|
static inline struct list_head *get_user_structured_data(struct logger_ctl *ctl)
|
|
|
|
{
|
|
|
|
return &ctl->user_sds;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline struct list_head *get_reserved_structured_data(struct logger_ctl *ctl)
|
|
|
|
{
|
|
|
|
return &ctl->reserved_sds;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int has_structured_data_id(struct list_head *ls, const char *id)
|
|
|
|
{
|
|
|
|
struct list_head *p;
|
|
|
|
|
|
|
|
if (!ls || list_empty(ls))
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
list_for_each(p, ls) {
|
|
|
|
struct structured_data *sd = list_entry(p, struct structured_data, sds);
|
|
|
|
if (sd-& |