This change fixes crashing error, that ought not to be simply avoided. $ echo foo | logger -n localhost Segmentation fault (core dumped) If the ctl->hdr is just checked not to be NULL syslog message will not have valid header, so generating such is not optional when reading message from stdin and writing it to remote destination. Reviewed-by: Bernhard Voelker <mail@bernhard-voelker.de> Signed-off-by: Patrick Plagwitz <patrick.plagwitz@fau.de> Signed-off-by: Sami Kerola <kerolasa@iki.fi>
934 lines
25 KiB
C
934 lines
25 KiB
C
/*
|
|
* Copyright (c) 1983, 1993
|
|
* The Regents of the University of California. All rights reserved.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions
|
|
* are met:
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
* documentation and/or other materials provided with the distribution.
|
|
* 3. All advertising materials mentioning features or use of this software
|
|
* must display the following acknowledgement:
|
|
* This product includes software developed by the University of
|
|
* California, Berkeley and its contributors.
|
|
* 4. Neither the name of the University nor the names of its contributors
|
|
* may be used to endorse or promote products derived from this software
|
|
* without specific prior written permission.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
* SUCH DAMAGE.
|
|
*
|
|
* 1999-02-22 Arkadiusz Miśkiewicz <misiek@pld.ORG.PL>
|
|
* - added Native Language Support
|
|
* Sun Mar 21 1999 - Arnaldo Carvalho de Melo <acme@conectiva.com.br>
|
|
* - fixed strerr(errno) in gettext calls
|
|
*/
|
|
|
|
#include <errno.h>
|
|
#include <limits.h>
|
|
#include <unistd.h>
|
|
#include <stdlib.h>
|
|
#include <sys/time.h>
|
|
#include <stdio.h>
|
|
#include <ctype.h>
|
|
#include <string.h>
|
|
#include <sys/types.h>
|
|
#include <sys/socket.h>
|
|
#include <sys/un.h>
|
|
#include <arpa/inet.h>
|
|
#include <netdb.h>
|
|
#include <getopt.h>
|
|
#include <pwd.h>
|
|
|
|
#include "all-io.h"
|
|
#include "c.h"
|
|
#include "closestream.h"
|
|
#include "nls.h"
|
|
#include "pathnames.h"
|
|
#include "strutils.h"
|
|
#include "xalloc.h"
|
|
|
|
#define SYSLOG_NAMES
|
|
#include <syslog.h>
|
|
|
|
#ifdef HAVE_LIBSYSTEMD
|
|
# include <systemd/sd-daemon.h>
|
|
# include <systemd/sd-journal.h>
|
|
#endif
|
|
|
|
#ifdef HAVE_SYS_TIMEX_H
|
|
# include <sys/timex.h>
|
|
#endif
|
|
|
|
enum {
|
|
TYPE_UDP = (1 << 1),
|
|
TYPE_TCP = (1 << 2),
|
|
ALL_TYPES = TYPE_UDP | TYPE_TCP
|
|
};
|
|
|
|
enum {
|
|
AF_UNIX_ERRORS_OFF = 0,
|
|
AF_UNIX_ERRORS_ON,
|
|
AF_UNIX_ERRORS_AUTO
|
|
};
|
|
|
|
enum {
|
|
OPT_PRIO_PREFIX = CHAR_MAX + 1,
|
|
OPT_JOURNALD,
|
|
OPT_RFC3164,
|
|
OPT_RFC5424,
|
|
OPT_SOCKET_ERRORS,
|
|
OPT_MSGID,
|
|
OPT_NOACT,
|
|
OPT_ID
|
|
};
|
|
|
|
struct logger_ctl {
|
|
int fd;
|
|
int pri;
|
|
pid_t pid; /* zero when unwanted */
|
|
char *hdr; /* the syslog header (based on protocol) */
|
|
char *tag;
|
|
char *msgid;
|
|
char *unix_socket; /* -u <path> or default to _PATH_DEVLOG */
|
|
char *server;
|
|
char *port;
|
|
int socket_type;
|
|
size_t max_message_size;
|
|
void (*syslogfp)(struct logger_ctl *ctl);
|
|
unsigned int
|
|
unix_socket_errors:1, /* whether to report or not errors */
|
|
noact:1, /* do not write to sockets */
|
|
prio_prefix:1, /* read priority from intput */
|
|
stderr_printout:1, /* output message to stderr */
|
|
rfc5424_time:1, /* include time stamp */
|
|
rfc5424_tq:1, /* include time quality markup */
|
|
rfc5424_host:1, /* include hostname */
|
|
skip_empty_lines:1; /* do not send empty lines when processing files */
|
|
};
|
|
|
|
/*
|
|
* For tests we want to be able to control datetime outputs
|
|
*/
|
|
#ifdef TEST_LOGGER
|
|
static inline int logger_gettimeofday(struct timeval *tv, struct timezone *tz)
|
|
{
|
|
char *str = getenv("LOGGER_TEST_TIMEOFDAY");
|
|
uintmax_t sec, usec;
|
|
|
|
if (str && sscanf(str, "%ju.%ju", &sec, &usec) == 2) {
|
|
tv->tv_sec = sec;
|
|
tv->tv_usec = usec;
|
|
return tv->tv_sec >= 0 && tv->tv_usec >= 0 ? 0 : -EINVAL;
|
|
}
|
|
|
|
return gettimeofday(tv, tz);
|
|
}
|
|
|
|
static inline char *logger_xgethostname(void)
|
|
{
|
|
char *str = getenv("LOGGER_TEST_HOSTNAME");
|
|
return str ? xstrdup(str) : xgethostname();
|
|
}
|
|
|
|
static inline pid_t logger_getpid(void)
|
|
{
|
|
char *str = getenv("LOGGER_TEST_GETPID");
|
|
unsigned int pid;
|
|
|
|
if (str && sscanf(str, "%u", &pid) == 1)
|
|
return pid;
|
|
return getpid();
|
|
}
|
|
|
|
|
|
#undef HAVE_NTP_GETTIME /* force to default non-NTP */
|
|
|
|
#else /* !TEST_LOGGER */
|
|
# define logger_gettimeofday(x, y) gettimeofday(x, y)
|
|
# define logger_xgethostname xgethostname
|
|
# define logger_getpid getpid
|
|
#endif
|
|
|
|
|
|
static int decode(const char *name, CODE *codetab)
|
|
{
|
|
register CODE *c;
|
|
|
|
if (name == NULL || *name == '\0')
|
|
return -1;
|
|
if (isdigit(*name)) {
|
|
int num;
|
|
char *end = NULL;
|
|
|
|
errno = 0;
|
|
num = strtol(name, &end, 10);
|
|
if (errno || name == end || (end && *end))
|
|
return -1;
|
|
for (c = codetab; c->c_name; c++)
|
|
if (num == c->c_val)
|
|
return num;
|
|
return -1;
|
|
}
|
|
for (c = codetab; c->c_name; c++)
|
|
if (!strcasecmp(name, c->c_name))
|
|
return (c->c_val);
|
|
|
|
return -1;
|
|
}
|
|
|
|
static int pencode(char *s)
|
|
{
|
|
int facility, level;
|
|
char *separator;
|
|
|
|
separator = strchr(s, '.');
|
|
if (separator) {
|
|
*separator = '\0';
|
|
facility = decode(s, facilitynames);
|
|
if (facility < 0)
|
|
errx(EXIT_FAILURE, _("unknown facility name: %s"), s);
|
|
s = ++separator;
|
|
} else
|
|
facility = LOG_USER;
|
|
level = decode(s, prioritynames);
|
|
if (level < 0)
|
|
errx(EXIT_FAILURE, _("unknown priority name: %s"), s);
|
|
if (facility == LOG_KERN)
|
|
facility = LOG_USER; /* kern is forbidden */
|
|
return ((level & LOG_PRIMASK) | (facility & LOG_FACMASK));
|
|
}
|
|
|
|
static int unix_socket(struct logger_ctl *ctl, const char *path, const int socket_type)
|
|
{
|
|
int fd, i;
|
|
static struct sockaddr_un s_addr; /* AF_UNIX address of local logger */
|
|
|
|
if (strlen(path) >= sizeof(s_addr.sun_path))
|
|
errx(EXIT_FAILURE, _("openlog %s: pathname too long"), path);
|
|
|
|
s_addr.sun_family = AF_UNIX;
|
|
strcpy(s_addr.sun_path, path);
|
|
|
|
for (i = 2; i; i--) {
|
|
int st = -1;
|
|
|
|
if (i == 2 && socket_type & TYPE_UDP)
|
|
st = SOCK_DGRAM;
|
|
if (i == 1 && socket_type & TYPE_TCP)
|
|
st = SOCK_STREAM;
|
|
if (st == -1 || (fd = socket(AF_UNIX, st, 0)) == -1)
|
|
continue;
|
|
if (connect(fd, (struct sockaddr *)&s_addr, sizeof(s_addr)) == -1) {
|
|
close(fd);
|
|
continue;
|
|
}
|
|
break;
|
|
}
|
|
|
|
if (i == 0) {
|
|
if (ctl->unix_socket_errors)
|
|
err(EXIT_FAILURE, _("socket %s"), path);
|
|
else
|
|
/* See --socket-errors manual page entry for
|
|
* explanation of this strange exit. */
|
|
exit(EXIT_SUCCESS);
|
|
}
|
|
return fd;
|
|
}
|
|
|
|
static int inet_socket(const char *servername, const char *port,
|
|
const int socket_type)
|
|
{
|
|
int fd, errcode, i;
|
|
struct addrinfo hints, *res;
|
|
const char *p = port;
|
|
|
|
for (i = 2; i; i--) {
|
|
memset(&hints, 0, sizeof(hints));
|
|
if (i == 2 && socket_type & TYPE_UDP) {
|
|
hints.ai_socktype = SOCK_DGRAM;
|
|
if (port == NULL)
|
|
p = "syslog";
|
|
}
|
|
if (i == 1 && socket_type & TYPE_TCP) {
|
|
hints.ai_socktype = SOCK_STREAM;
|
|
if (port == NULL)
|
|
p = "syslog-conn";
|
|
}
|
|
if (hints.ai_socktype == 0)
|
|
continue;
|
|
hints.ai_family = AF_UNSPEC;
|
|
errcode = getaddrinfo(servername, p, &hints, &res);
|
|
if (errcode != 0)
|
|
errx(EXIT_FAILURE, _("failed to resolve name %s port %s: %s"),
|
|
servername, p, gai_strerror(errcode));
|
|
if ((fd = socket(res->ai_family, res->ai_socktype, res->ai_protocol)) == -1) {
|
|
freeaddrinfo(res);
|
|
continue;
|
|
}
|
|
if (connect(fd, res->ai_addr, res->ai_addrlen) == -1) {
|
|
freeaddrinfo(res);
|
|
close(fd);
|
|
continue;
|
|
}
|
|
|
|
freeaddrinfo(res);
|
|
break;
|
|
}
|
|
|
|
if (i == 0)
|
|
errx(EXIT_FAILURE, _("failed to connect to %s port %s"), servername, p);
|
|
|
|
return fd;
|
|
}
|
|
|
|
#ifdef HAVE_LIBSYSTEMD
|
|
static int journald_entry(struct logger_ctl *ctl, FILE *fp)
|
|
{
|
|
struct iovec *iovec;
|
|
char *buf = NULL;
|
|
ssize_t sz;
|
|
int n, lines, vectors = 8, ret = 0;
|
|
size_t dummy = 0;
|
|
|
|
iovec = xmalloc(vectors * sizeof(struct iovec));
|
|
for (lines = 0; /* nothing */ ; lines++) {
|
|
buf = NULL;
|
|
sz = getline(&buf, &dummy, fp);
|
|
if (sz == -1)
|
|
break;
|
|
if (0 < sz && buf[sz - 1] == '\n') {
|
|
sz--;
|
|
buf[sz] = '\0';
|
|
}
|
|
if (lines == vectors) {
|
|
vectors *= 2;
|
|
if (IOV_MAX < vectors)
|
|
errx(EXIT_FAILURE, _("maximum input lines (%d) exceeded"), IOV_MAX);
|
|
iovec = xrealloc(iovec, vectors * sizeof(struct iovec));
|
|
}
|
|
iovec[lines].iov_base = buf;
|
|
iovec[lines].iov_len = sz;
|
|
}
|
|
|
|
if (!ctl->noact)
|
|
ret = sd_journal_sendv(iovec, lines);
|
|
if (ctl->stderr_printout) {
|
|
for (n = 0; n < lines; n++)
|
|
fprintf(stderr, "%s\n", (char *) iovec[n].iov_base);
|
|
}
|
|
for (n = 0; n < lines; n++)
|
|
free(iovec[n].iov_base);
|
|
free(iovec);
|
|
return ret;
|
|
}
|
|
#endif
|
|
|
|
static char *xgetlogin(void)
|
|
{
|
|
char *cp;
|
|
struct passwd *pw;
|
|
|
|
if (!(cp = getlogin()) || !*cp)
|
|
cp = (pw = getpwuid(geteuid()))? pw->pw_name : "<someone>";
|
|
return cp;
|
|
}
|
|
|
|
/* this creates a timestamp based on current time according to the
|
|
* fine rules of RFC3164, most importantly it ensures in a portable
|
|
* way that the month day is correctly written (with a SP instead
|
|
* of a leading 0). The function uses a static buffer which is
|
|
* overwritten on the next call (just like ctime() does).
|
|
*/
|
|
static const char *rfc3164_current_time(void)
|
|
{
|
|
static char time[32];
|
|
struct timeval tv;
|
|
struct tm *tm;
|
|
static char *monthnames[] = {
|
|
"Jan", "Feb", "Mar", "Apr", "May", "Jun", "Jul", "Aug",
|
|
"Sep", "Oct", "Nov", "Dec"
|
|
};
|
|
|
|
logger_gettimeofday(&tv, NULL);
|
|
tm = localtime(&tv.tv_sec);
|
|
snprintf(time, sizeof(time),"%s %2d %2.2d:%2.2d:%2.2d",
|
|
monthnames[tm->tm_mon], tm->tm_mday,
|
|
tm->tm_hour, tm->tm_min, tm->tm_sec);
|
|
return time;
|
|
}
|
|
|
|
/* writes generated buffer to desired destination. For TCP syslog,
|
|
* we use RFC6587 octet-stuffing. This is not great, but doing
|
|
* full blown RFC5425 (TLS) looks like it is too much for the
|
|
* logger utility.
|
|
*/
|
|
static void write_output(const struct logger_ctl *ctl, const char *const msg)
|
|
{
|
|
char *buf;
|
|
const size_t len = xasprintf(&buf, "%s%s", ctl->hdr, msg);
|
|
|
|
if (!ctl->noact) {
|
|
if (write_all(ctl->fd, buf, len) < 0)
|
|
warn(_("write failed"));
|
|
else if (ctl->socket_type == TYPE_TCP) {
|
|
/* using an additional write seems like the best compromise:
|
|
* - writev() is not yet supported by framework
|
|
* - adding the \n to the buffer in formatters violates layers
|
|
* - adding \n after the fact requires memory copy
|
|
* - logger is not a high-performance app
|
|
*/
|
|
if (write_all(ctl->fd, "\n", 1) < 0)
|
|
warn(_("write failed"));
|
|
}
|
|
}
|
|
|
|
if (ctl->stderr_printout)
|
|
fprintf(stderr, "%s\n", buf);
|
|
}
|
|
|
|
#define NILVALUE "-"
|
|
static void syslog_rfc3164_header(struct logger_ctl *const ctl)
|
|
{
|
|
char pid[30], *hostname;
|
|
|
|
*pid = '\0';
|
|
if (ctl->fd < 0)
|
|
return;
|
|
if (ctl->pid)
|
|
snprintf(pid, sizeof(pid), "[%d]", ctl->pid);
|
|
|
|
if ((hostname = logger_xgethostname())) {
|
|
char *dot = strchr(hostname, '.');
|
|
if (dot)
|
|
*dot = '\0';
|
|
} else
|
|
hostname = xstrdup(NILVALUE);
|
|
|
|
xasprintf(&ctl->hdr, "<%d>%.15s %s %.200s%s: ",
|
|
ctl->pri, rfc3164_current_time(), hostname, ctl->tag, pid);
|
|
|
|
free(hostname);
|
|
}
|
|
|
|
/* Some field mappings may be controversal, thus I give the reason
|
|
* why this specific mapping was used:
|
|
* APP-NAME <-- tag
|
|
* Some may argue that "logger" is a better fit, but we think
|
|
* this is better inline of what other implementations do. In
|
|
* rsyslog, for example, the TAG value is populated from APP-NAME.
|
|
* PROCID <-- pid
|
|
* This is a relatively straightforward interpretation from
|
|
* RFC5424, sect. 6.2.6.
|
|
* MSGID <-- msgid (from --msgid)
|
|
* One may argue that the string "logger" would be better suited
|
|
* here so that a receiver can identify the sender process.
|
|
* However, this does not sound like a good match to RFC5424,
|
|
* sect. 6.2.7.
|
|
* Note that appendix A.1 of RFC5424 does not provide clear guidance
|
|
* of how these fields should be used. This is the case because the
|
|
* IETF working group couldn't arrive at a clear agreement when we
|
|
* specified RFC5424. The rest of the field mappings should be
|
|
* pretty clear from RFC5424. -- Rainer Gerhards, 2015-03-10
|
|
*/
|
|
static void syslog_rfc5424_header(struct logger_ctl *const ctl)
|
|
{
|
|
char *time;
|
|
char *hostname;
|
|
char *const app_name = ctl->tag;
|
|
char *procid;
|
|
char *const msgid = xstrdup(ctl->msgid ? ctl->msgid : NILVALUE);
|
|
char *structured_data;
|
|
|
|
if (ctl->fd < 0)
|
|
return;
|
|
|
|
if (ctl->rfc5424_time) {
|
|
struct timeval tv;
|
|
struct tm *tm;
|
|
|
|
logger_gettimeofday(&tv, NULL);
|
|
if ((tm = localtime(&tv.tv_sec)) != NULL) {
|
|
char fmt[64];
|
|
const size_t i = strftime(fmt, sizeof(fmt),
|
|
"%Y-%m-%dT%H:%M:%S.%%06u%z ", tm);
|
|
/* patch TZ info to comply with RFC3339 (we left SP at end) */
|
|
fmt[i - 1] = fmt[i - 2];
|
|
fmt[i - 2] = fmt[i - 3];
|
|
fmt[i - 3] = ':';
|
|
xasprintf(&time, fmt, tv.tv_usec);
|
|
} else
|
|
err(EXIT_FAILURE, _("localtime() failed"));
|
|
} else
|
|
time = xstrdup(NILVALUE);
|
|
|
|
if (ctl->rfc5424_host) {
|
|
if (!(hostname = logger_xgethostname()))
|
|
hostname = xstrdup(NILVALUE);
|
|
/* Arbitrary looking 'if (var < strlen()) checks originate from
|
|
* RFC 5424 - 6 Syslog Message Format definition. */
|
|
if (255 < strlen(hostname))
|
|
errx(EXIT_FAILURE, _("hostname '%s' is too long"),
|
|
hostname);
|
|
} else
|
|
hostname = xstrdup(NILVALUE);
|
|
|
|
if (48 < strlen(ctl->tag))
|
|
errx(EXIT_FAILURE, _("tag '%s' is too long"), ctl->tag);
|
|
|
|
if (ctl->pid)
|
|
xasprintf(&procid, "%d", ctl->pid);
|
|
else
|
|
procid = xstrdup(NILVALUE);
|
|
|
|
if (ctl->rfc5424_tq) {
|
|
#ifdef HAVE_NTP_GETTIME
|
|
struct ntptimeval ntptv;
|
|
|
|
if (ntp_gettime(&ntptv) == TIME_OK)
|
|
xasprintf(&structured_data,
|
|
"[timeQuality tzKnown=\"1\" isSynced=\"1\" syncAccuracy=\"%ld\"]",
|
|
ntptv.maxerror);
|
|
else
|
|
#endif
|
|
xasprintf(&structured_data,
|
|
"[timeQuality tzKnown=\"1\" isSynced=\"0\"]");
|
|
} else
|
|
structured_data = xstrdup(NILVALUE);
|
|
|
|
xasprintf(&ctl->hdr, "<%d>1 %s %s %s %s %s %s ",
|
|
ctl->pri,
|
|
time,
|
|
hostname,
|
|
app_name,
|
|
procid,
|
|
msgid,
|
|
structured_data);
|
|
|
|
free(time);
|
|
free(hostname);
|
|
/* app_name points to ctl->tag, do NOT free! */
|
|
free(procid);
|
|
free(msgid);
|
|
free(structured_data);
|
|
}
|
|
|
|
static void parse_rfc5424_flags(struct logger_ctl *ctl, char *optarg)
|
|
{
|
|
char *in, *tok;
|
|
|
|
in = optarg;
|
|
while ((tok = strtok(in, ","))) {
|
|
in = NULL;
|
|
if (!strcmp(tok, "notime")) {
|
|
ctl->rfc5424_time = 0;
|
|
ctl->rfc5424_tq = 0;
|
|
} else if (!strcmp(tok, "notq"))
|
|
ctl->rfc5424_tq = 0;
|
|
else if (!strcmp(tok, "nohost"))
|
|
ctl->rfc5424_host = 0;
|
|
else
|
|
warnx(_("ignoring unknown option argument: %s"), tok);
|
|
}
|
|
}
|
|
|
|
static int parse_unix_socket_errors_flags(char *optarg)
|
|
{
|
|
if (!strcmp(optarg, "off"))
|
|
return AF_UNIX_ERRORS_OFF;
|
|
if (!strcmp(optarg, "on"))
|
|
return AF_UNIX_ERRORS_ON;
|
|
if (!strcmp(optarg, "auto"))
|
|
return AF_UNIX_ERRORS_AUTO;
|
|
warnx(_("invalid argument: %s: using automatic errors"), optarg);
|
|
return AF_UNIX_ERRORS_AUTO;
|
|
}
|
|
|
|
static void syslog_local_header(struct logger_ctl *const ctl)
|
|
{
|
|
char pid[32];
|
|
|
|
if (ctl->pid)
|
|
snprintf(pid, sizeof(pid), "[%d]", ctl->pid);
|
|
else
|
|
pid[0] = '\0';
|
|
|
|
xasprintf(&ctl->hdr, "<%d>%s %s%s: ", ctl->pri, rfc3164_current_time(),
|
|
ctl->tag, pid);
|
|
}
|
|
|
|
static void generate_syslog_header(struct logger_ctl *const ctl)
|
|
{
|
|
free(ctl->hdr);
|
|
ctl->syslogfp(ctl);
|
|
}
|
|
|
|
static void logger_open(struct logger_ctl *ctl)
|
|
{
|
|
if (ctl->server) {
|
|
ctl->fd = inet_socket(ctl->server, ctl->port, ctl->socket_type);
|
|
if (!ctl->syslogfp)
|
|
ctl->syslogfp = syslog_rfc5424_header;
|
|
} else {
|
|
if (!ctl->unix_socket)
|
|
ctl->unix_socket = _PATH_DEVLOG;
|
|
|
|
ctl->fd = unix_socket(ctl, ctl->unix_socket, ctl->socket_type);
|
|
if (!ctl->syslogfp)
|
|
ctl->syslogfp = syslog_local_header;
|
|
}
|
|
if (!ctl->tag)
|
|
ctl->tag = xgetlogin();
|
|
generate_syslog_header(ctl);
|
|
}
|
|
|
|
static void logger_command_line(const struct logger_ctl *ctl, char **argv)
|
|
{
|
|
/* note: we never re-generate the syslog header here, even if we
|
|
* generate multiple messages. If so, we think it is the right thing
|
|
* to do to report them with the same timestamp, as the user actually
|
|
* intended to send a single message.
|
|
*/
|
|
char *const buf = xmalloc(ctl->max_message_size + 1);
|
|
char *p = buf;
|
|
const char *endp = buf + ctl->max_message_size - 1;
|
|
size_t len;
|
|
|
|
while (*argv) {
|
|
len = strlen(*argv);
|
|
if (endp < p + len && p != buf) {
|
|
write_output(ctl, buf);
|
|
p = buf;
|
|
}
|
|
if (ctl->max_message_size < len) {
|
|
(*argv)[ctl->max_message_size] = '\0'; /* truncate */
|
|
write_output(ctl, *argv++);
|
|
continue;
|
|
}
|
|
if (p != buf)
|
|
*p++ = ' ';
|
|
memmove(p, *argv++, len);
|
|
*(p += len) = '\0';
|
|
}
|
|
if (p != buf)
|
|
write_output(ctl, buf);
|
|
}
|
|
|
|
static void logger_stdin(struct logger_ctl *ctl)
|
|
{
|
|
int default_priority = ctl->pri;
|
|
int last_pri = default_priority;
|
|
size_t max_usrmsg_size = ctl->max_message_size - strlen(ctl->hdr);
|
|
char *const buf = xmalloc(max_usrmsg_size + 2 + 2);
|
|
int pri;
|
|
int c;
|
|
size_t i;
|
|
|
|
c = getchar();
|
|
while (c != EOF) {
|
|
i = 0;
|
|
if (ctl->prio_prefix) {
|
|
if (c == '<') {
|
|
pri = 0;
|
|
buf[i++] = c;
|
|
while (isdigit(c = getchar()) && pri <= 191) {
|
|
buf[i++] = c;
|
|
pri = pri * 10 + c - '0';
|
|
}
|
|
if (c != EOF && c != '\n')
|
|
buf[i++] = c;
|
|
if (c == '>' && 0 <= pri && pri <= 191) { /* valid RFC PRI values */
|
|
i = 0;
|
|
if (pri < 8)
|
|
pri |= 8; /* kern facility is forbidden */
|
|
ctl->pri = pri;
|
|
} else
|
|
ctl->pri = default_priority;
|
|
|
|
if (ctl->pri != last_pri) {
|
|
generate_syslog_header(ctl);
|
|
max_usrmsg_size = ctl->max_message_size - strlen(ctl->hdr);
|
|
last_pri = ctl->pri;
|
|
}
|
|
if (c != EOF && c != '\n')
|
|
c = getchar();
|
|
}
|
|
}
|
|
|
|
while (c != EOF && c != '\n' && i < max_usrmsg_size) {
|
|
buf[i++] = c;
|
|
c = getchar();
|
|
}
|
|
buf[i] = '\0';
|
|
|
|
if (i > 0 || !ctl->skip_empty_lines)
|
|
write_output(ctl, buf);
|
|
|
|
if (c == '\n') /* discard line terminator */
|
|
c = getchar();
|
|
}
|
|
}
|
|
|
|
static void logger_close(const struct logger_ctl *ctl)
|
|
{
|
|
if (close(ctl->fd) != 0)
|
|
err(EXIT_FAILURE, _("close failed"));
|
|
free(ctl->hdr);
|
|
}
|
|
|
|
static void __attribute__ ((__noreturn__)) usage(FILE *out)
|
|
{
|
|
fputs(USAGE_HEADER, out);
|
|
fprintf(out, _(" %s [options] [<message>]\n"), program_invocation_short_name);
|
|
|
|
fputs(USAGE_SEPARATOR, out);
|
|
fputs(_("Enter messages into the system log.\n"), out);
|
|
|
|
fputs(USAGE_OPTIONS, out);
|
|
fputs(_(" -i log the logger command's PID\n"), out);
|
|
fputs(_(" --id[=<id>] log the given <id>, or otherwise the PID\n"), out);
|
|
fputs(_(" -f, --file <file> log the contents of this file\n"), out);
|
|
fputs(_(" -e, --skip-empty do not log empty lines when processing files\n"), out);
|
|
fputs(_(" --no-act do everything except the write the log\n"), out);
|
|
fputs(_(" -p, --priority <prio> mark given message with this priority\n"), out);
|
|
fputs(_(" --prio-prefix look for a prefix on every line read from stdin\n"), out);
|
|
fputs(_(" -s, --stderr output message to standard error as well\n"), out);
|
|
fputs(_(" -S, --size <size> maximum size for a single message\n"), out);
|
|
fputs(_(" -t, --tag <tag> mark every line with this tag\n"), out);
|
|
fputs(_(" -n, --server <name> write to this remote syslog server\n"), out);
|
|
fputs(_(" -P, --port <number> use this UDP port\n"), out);
|
|
fputs(_(" -T, --tcp use TCP only\n"), out);
|
|
fputs(_(" -d, --udp use UDP only\n"), out);
|
|
fputs(_(" --rfc3164 use the obsolete BSD syslog protocol\n"), out);
|
|
fputs(_(" --rfc5424[=<snip>] use the syslog protocol (the default for remote);\n"
|
|
" <snip> can be notime, or notq, and/or nohost\n"), out);
|
|
fputs(_(" --msgid <msgid> set rfc5424 message id field\n"), out);
|
|
fputs(_(" -u, --socket <socket> write to this Unix socket\n"), out);
|
|
fputs(_(" --socket-errors[=<on|off|auto>]\n"
|
|
" print connection errors when using Unix sockets\n"), out);
|
|
#ifdef HAVE_LIBSYSTEMD
|
|
fputs(_(" --journald[=<file>] write journald entry\n"), out);
|
|
#endif
|
|
|
|
fputs(USAGE_SEPARATOR, out);
|
|
fputs(USAGE_HELP, out);
|
|
fputs(USAGE_VERSION, out);
|
|
fprintf(out, USAGE_MAN_TAIL("logger(1)"));
|
|
|
|
exit(out == stderr ? EXIT_FAILURE : EXIT_SUCCESS);
|
|
}
|
|
|
|
/*
|
|
* logger -- read and log utility
|
|
*
|
|
* Reads from an input and arranges to write the result on the system
|
|
* log.
|
|
*/
|
|
int main(int argc, char **argv)
|
|
{
|
|
struct logger_ctl ctl = {
|
|
.fd = -1,
|
|
.pid = 0,
|
|
.pri = LOG_USER | LOG_NOTICE,
|
|
.prio_prefix = 0,
|
|
.tag = NULL,
|
|
.unix_socket = NULL,
|
|
.unix_socket_errors = 0,
|
|
.server = NULL,
|
|
.port = NULL,
|
|
.hdr = NULL,
|
|
.msgid = NULL,
|
|
.socket_type = ALL_TYPES,
|
|
.max_message_size = 1024,
|
|
.rfc5424_time = 1,
|
|
.rfc5424_tq = 1,
|
|
.rfc5424_host = 1,
|
|
.skip_empty_lines = 0
|
|
};
|
|
int ch;
|
|
int stdout_reopened = 0;
|
|
int unix_socket_errors_mode = AF_UNIX_ERRORS_AUTO;
|
|
#ifdef HAVE_LIBSYSTEMD
|
|
FILE *jfd = NULL;
|
|
#endif
|
|
static const struct option longopts[] = {
|
|
{ "id", optional_argument, 0, OPT_ID },
|
|
{ "stderr", no_argument, 0, 's' },
|
|
{ "file", required_argument, 0, 'f' },
|
|
{ "no-act", no_argument, 0, OPT_NOACT, },
|
|
{ "priority", required_argument, 0, 'p' },
|
|
{ "tag", required_argument, 0, 't' },
|
|
{ "socket", required_argument, 0, 'u' },
|
|
{ "socket-errors", required_argument, 0, OPT_SOCKET_ERRORS },
|
|
{ "udp", no_argument, 0, 'd' },
|
|
{ "tcp", no_argument, 0, 'T' },
|
|
{ "server", required_argument, 0, 'n' },
|
|
{ "port", required_argument, 0, 'P' },
|
|
{ "version", no_argument, 0, 'V' },
|
|
{ "help", no_argument, 0, 'h' },
|
|
{ "prio-prefix", no_argument, 0, OPT_PRIO_PREFIX },
|
|
{ "rfc3164", no_argument, 0, OPT_RFC3164 },
|
|
{ "rfc5424", optional_argument, 0, OPT_RFC5424 },
|
|
{ "size", required_argument, 0, 'S' },
|
|
{ "msgid", required_argument, 0, OPT_MSGID },
|
|
{ "skip-empty", no_argument, 0, 'e' },
|
|
#ifdef HAVE_LIBSYSTEMD
|
|
{ "journald", optional_argument, 0, OPT_JOURNALD },
|
|
#endif
|
|
{ NULL, 0, 0, 0 }
|
|
};
|
|
|
|
setlocale(LC_ALL, "");
|
|
bindtextdomain(PACKAGE, LOCALEDIR);
|
|
textdomain(PACKAGE);
|
|
atexit(close_stdout);
|
|
|
|
while ((ch = getopt_long(argc, argv, "ef:ip:S:st:u:dTn:P:Vh",
|
|
longopts, NULL)) != -1) {
|
|
switch (ch) {
|
|
case 'f': /* file to log */
|
|
if (freopen(optarg, "r", stdin) == NULL)
|
|
err(EXIT_FAILURE, _("file %s"), optarg);
|
|
stdout_reopened = 1;
|
|
break;
|
|
case 'e':
|
|
ctl.skip_empty_lines = 1;
|
|
break;
|
|
case 'i': /* log process id also */
|
|
ctl.pid = logger_getpid();
|
|
break;
|
|
case OPT_ID:
|
|
if (optarg) {
|
|
const char *p = optarg;
|
|
|
|
if (*p == '=')
|
|
p++;
|
|
ctl.pid = strtoul_or_err(optarg, _("failed to parse id"));
|
|
} else
|
|
ctl.pid = logger_getpid();
|
|
break;
|
|
case 'p': /* priority */
|
|
ctl.pri = pencode(optarg);
|
|
break;
|
|
case 's': /* log to standard error */
|
|
ctl.stderr_printout = 1;
|
|
break;
|
|
case 't': /* tag */
|
|
ctl.tag = optarg;
|
|
break;
|
|
case 'u': /* unix socket */
|
|
ctl.unix_socket = optarg;
|
|
break;
|
|
case 'S': /* max message size */
|
|
ctl.max_message_size = strtosize_or_err(optarg,
|
|
_("failed to parse message size"));
|
|
break;
|
|
case 'd':
|
|
ctl.socket_type = TYPE_UDP;
|
|
break;
|
|
case 'T':
|
|
ctl.socket_type = TYPE_TCP;
|
|
break;
|
|
case 'n':
|
|
ctl.server = optarg;
|
|
break;
|
|
case 'P':
|
|
ctl.port = optarg;
|
|
break;
|
|
case 'V':
|
|
printf(UTIL_LINUX_VERSION);
|
|
exit(EXIT_SUCCESS);
|
|
case 'h':
|
|
usage(stdout);
|
|
case OPT_PRIO_PREFIX:
|
|
ctl.prio_prefix = 1;
|
|
break;
|
|
case OPT_RFC3164:
|
|
ctl.syslogfp = syslog_rfc3164_header;
|
|
break;
|
|
case OPT_RFC5424:
|
|
ctl.syslogfp = syslog_rfc5424_header;
|
|
if (optarg)
|
|
parse_rfc5424_flags(&ctl, optarg);
|
|
break;
|
|
case OPT_MSGID:
|
|
if (strchr(optarg, ' '))
|
|
errx(EXIT_FAILURE, _("--msgid cannot contain space"));
|
|
ctl.msgid = optarg;
|
|
break;
|
|
#ifdef HAVE_LIBSYSTEMD
|
|
case OPT_JOURNALD:
|
|
if (optarg) {
|
|
jfd = fopen(optarg, "r");
|
|
if (!jfd)
|
|
err(EXIT_FAILURE, _("cannot open %s"),
|
|
optarg);
|
|
} else
|
|
jfd = stdin;
|
|
break;
|
|
#endif
|
|
case OPT_SOCKET_ERRORS:
|
|
unix_socket_errors_mode = parse_unix_socket_errors_flags(optarg);
|
|
break;
|
|
case OPT_NOACT:
|
|
ctl.noact = 1;
|
|
break;
|
|
case '?':
|
|
default:
|
|
usage(stderr);
|
|
}
|
|
}
|
|
argc -= optind;
|
|
argv += optind;
|
|
if (stdout_reopened && argc)
|
|
warnx(_("--file <file> and <message> are mutually exclusive, message is ignored"));
|
|
#ifdef HAVE_LIBSYSTEMD
|
|
if (jfd) {
|
|
int ret = journald_entry(&ctl, jfd);
|
|
if (stdin != jfd)
|
|
fclose(jfd);
|
|
if (ret)
|
|
errx(EXIT_FAILURE, _("journald entry could not be written"));
|
|
return EXIT_SUCCESS;
|
|
}
|
|
#endif
|
|
switch (unix_socket_errors_mode) {
|
|
case AF_UNIX_ERRORS_OFF:
|
|
ctl.unix_socket_errors = 0;
|
|
break;
|
|
case AF_UNIX_ERRORS_ON:
|
|
ctl.unix_socket_errors = 1;
|
|
break;
|
|
case AF_UNIX_ERRORS_AUTO:
|
|
#ifdef HAVE_LIBSYSTEMD
|
|
ctl.unix_socket_errors = sd_booted();
|
|
#else
|
|
ctl.unix_socket_errors = 0;
|
|
#endif
|
|
break;
|
|
default:
|
|
abort();
|
|
}
|
|
logger_open(&ctl);
|
|
if (0 < argc)
|
|
logger_command_line(&ctl, argv);
|
|
else
|
|
/* Note. --file <arg> reopens stdin making the below
|
|
* function to be used for file inputs. */
|
|
logger_stdin(&ctl);
|
|
logger_close(&ctl);
|
|
return EXIT_SUCCESS;
|
|
}
|