]> git.ipfire.org Git - thirdparty/util-linux.git/blob - misc-utils/logger.c
logger: realloc buffer when header size changed
[thirdparty/util-linux.git] / misc-utils / logger.c
1 /*
2 * Copyright (c) 1983, 1993
3 * The Regents of the University of California. All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
13 * 3. All advertising materials mentioning features or use of this software
14 * must display the following acknowledgement:
15 * This product includes software developed by the University of
16 * California, Berkeley and its contributors.
17 * 4. Neither the name of the University nor the names of its contributors
18 * may be used to endorse or promote products derived from this software
19 * without specific prior written permission.
20 *
21 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31 * SUCH DAMAGE.
32 *
33 * 1999-02-22 Arkadiusz Miƛkiewicz <misiek@pld.ORG.PL>
34 * - added Native Language Support
35 * Sun Mar 21 1999 - Arnaldo Carvalho de Melo <acme@conectiva.com.br>
36 * - fixed strerr(errno) in gettext calls
37 */
38
39 #include <errno.h>
40 #include <limits.h>
41 #include <unistd.h>
42 #include <stdlib.h>
43 #include <sys/time.h>
44 #include <stdio.h>
45 #include <ctype.h>
46 #include <string.h>
47 #include <sys/types.h>
48 #include <sys/socket.h>
49 #include <sys/un.h>
50 #include <arpa/inet.h>
51 #include <netdb.h>
52 #include <getopt.h>
53 #include <pwd.h>
54 #include <signal.h>
55 #include <sys/uio.h>
56
57 #include "all-io.h"
58 #include "c.h"
59 #include "closestream.h"
60 #include "nls.h"
61 #include "pathnames.h"
62 #include "strutils.h"
63 #include "xalloc.h"
64 #include "strv.h"
65 #include "list.h"
66 #include "pwdutils.h"
67
68 #define SYSLOG_NAMES
69 #include <syslog.h>
70
71 #ifdef HAVE_LIBSYSTEMD
72 # define SD_JOURNAL_SUPPRESS_LOCATION
73 # include <systemd/sd-daemon.h>
74 # include <systemd/sd-journal.h>
75 #endif
76
77 #ifdef HAVE_SYS_TIMEX_H
78 # include <sys/timex.h>
79 #endif
80
81 enum {
82 TYPE_UDP = (1 << 1),
83 TYPE_TCP = (1 << 2),
84 ALL_TYPES = TYPE_UDP | TYPE_TCP
85 };
86
87 enum {
88 AF_UNIX_ERRORS_OFF = 0,
89 AF_UNIX_ERRORS_ON,
90 AF_UNIX_ERRORS_AUTO
91 };
92
93 enum {
94 OPT_PRIO_PREFIX = CHAR_MAX + 1,
95 OPT_JOURNALD,
96 OPT_RFC3164,
97 OPT_RFC5424,
98 OPT_SOCKET_ERRORS,
99 OPT_MSGID,
100 OPT_NOACT,
101 OPT_ID,
102 OPT_STRUCTURED_DATA_ID,
103 OPT_STRUCTURED_DATA_PARAM,
104 OPT_OCTET_COUNT
105 };
106
107 /* rfc5424 structured data */
108 struct structured_data {
109 char *id; /* SD-ID */
110 char **params; /* array with SD-PARAMs */
111
112 struct list_head sds;
113 };
114
115 struct logger_ctl {
116 int fd;
117 int pri;
118 pid_t pid; /* zero when unwanted */
119 char *hdr; /* the syslog header (based on protocol) */
120 char const *tag;
121 char *login;
122 char *msgid;
123 char *unix_socket; /* -u <path> or default to _PATH_DEVLOG */
124 char *server;
125 char *port;
126 int socket_type;
127 size_t max_message_size;
128 struct list_head user_sds; /* user defined rfc5424 structured data */
129 struct list_head reserved_sds; /* standard rfc5424 structured data */
130
131 void (*syslogfp)(struct logger_ctl *ctl);
132
133 unsigned int
134 unix_socket_errors:1, /* whether to report or not errors */
135 noact:1, /* do not write to sockets */
136 prio_prefix:1, /* read priority from input */
137 stderr_printout:1, /* output message to stderr */
138 rfc5424_time:1, /* include time stamp */
139 rfc5424_tq:1, /* include time quality markup */
140 rfc5424_host:1, /* include hostname */
141 skip_empty_lines:1, /* do not send empty lines when processing files */
142 octet_count:1; /* use RFC6587 octet counting */
143 };
144
145 #define is_connected(_ctl) ((_ctl)->fd >= 0)
146 static void logger_reopen(struct logger_ctl *ctl);
147
148 /*
149 * For tests we want to be able to control datetime outputs
150 */
151 #ifdef TEST_LOGGER
152 static inline int logger_gettimeofday(struct timeval *tv, struct timezone *tz)
153 {
154 char *str = getenv("LOGGER_TEST_TIMEOFDAY");
155 uintmax_t sec, usec;
156
157 if (str && sscanf(str, "%ju.%ju", &sec, &usec) == 2) {
158 tv->tv_sec = sec;
159 tv->tv_usec = usec;
160 return tv->tv_sec >= 0 && tv->tv_usec >= 0 ? 0 : -EINVAL;
161 }
162
163 return gettimeofday(tv, tz);
164 }
165
166 static inline char *logger_xgethostname(void)
167 {
168 char *str = getenv("LOGGER_TEST_HOSTNAME");
169 return str ? xstrdup(str) : xgethostname();
170 }
171
172 static inline pid_t logger_getpid(void)
173 {
174 char *str = getenv("LOGGER_TEST_GETPID");
175 unsigned int pid;
176
177 if (str && sscanf(str, "%u", &pid) == 1)
178 return pid;
179 return getpid();
180 }
181
182
183 #undef HAVE_NTP_GETTIME /* force to default non-NTP */
184
185 #else /* !TEST_LOGGER */
186 # define logger_gettimeofday(x, y) gettimeofday(x, y)
187 # define logger_xgethostname xgethostname
188 # define logger_getpid getpid
189 #endif
190
191
192 static int decode(const char *name, const CODE *codetab)
193 {
194 register const CODE *c;
195
196 if (name == NULL || *name == '\0')
197 return -1;
198 if (isdigit(*name)) {
199 int num;
200 char *end = NULL;
201
202 errno = 0;
203 num = strtol(name, &end, 10);
204 if (errno || name == end || (end && *end))
205 return -1;
206 for (c = codetab; c->c_name; c++)
207 if (num == c->c_val)
208 return num;
209 return -1;
210 }
211 for (c = codetab; c->c_name; c++)
212 if (!strcasecmp(name, c->c_name))
213 return (c->c_val);
214
215 return -1;
216 }
217
218 static int pencode(char *s)
219 {
220 int facility, level;
221 char *separator;
222
223 assert(s);
224
225 separator = strchr(s, '.');
226 if (separator) {
227 *separator = '\0';
228 facility = decode(s, facilitynames);
229 if (facility < 0)
230 errx(EXIT_FAILURE, _("unknown facility name: %s"), s);
231 s = ++separator;
232 } else
233 facility = LOG_USER;
234 level = decode(s, prioritynames);
235 if (level < 0)
236 errx(EXIT_FAILURE, _("unknown priority name: %s"), s);
237 if (facility == LOG_KERN)
238 facility = LOG_USER; /* kern is forbidden */
239 return ((level & LOG_PRIMASK) | (facility & LOG_FACMASK));
240 }
241
242 static int unix_socket(struct logger_ctl *ctl, const char *path, int *socket_type)
243 {
244 int fd = -1, i, type = -1;
245 static struct sockaddr_un s_addr; /* AF_UNIX address of local logger */
246
247 if (strlen(path) >= sizeof(s_addr.sun_path))
248 errx(EXIT_FAILURE, _("openlog %s: pathname too long"), path);
249
250 s_addr.sun_family = AF_UNIX;
251 strcpy(s_addr.sun_path, path);
252
253 for (i = 2; i; i--) {
254 int st = -1;
255
256 if (i == 2 && *socket_type & TYPE_UDP) {
257 st = SOCK_DGRAM;
258 type = TYPE_UDP;
259 }
260 if (i == 1 && *socket_type & TYPE_TCP) {
261 st = SOCK_STREAM;
262 type = TYPE_TCP;
263 }
264 if (st == -1 || (fd = socket(AF_UNIX, st, 0)) == -1)
265 continue;
266 if (connect(fd, (struct sockaddr *)&s_addr, sizeof(s_addr)) == -1) {
267 close(fd);
268 continue;
269 }
270 break;
271 }
272
273 if (i == 0) {
274 if (ctl->unix_socket_errors)
275 err(EXIT_FAILURE, _("socket %s"), path);
276
277 /* write_output() will try to reconnect */
278 return -1;
279 }
280
281 /* replace ALL_TYPES with the real TYPE_* */
282 if (type > 0 && type != *socket_type)
283 *socket_type = type;
284 return fd;
285 }
286
287 static int inet_socket(const char *servername, const char *port, int *socket_type)
288 {
289 int fd, errcode, i, type = -1;
290 struct addrinfo hints, *res;
291 const char *p = port;
292
293 for (i = 2; i; i--) {
294 memset(&hints, 0, sizeof(hints));
295 if (i == 2 && *socket_type & TYPE_UDP) {
296 hints.ai_socktype = SOCK_DGRAM;
297 type = TYPE_UDP;
298 if (port == NULL)
299 p = "syslog";
300 }
301 if (i == 1 && *socket_type & TYPE_TCP) {
302 hints.ai_socktype = SOCK_STREAM;
303 type = TYPE_TCP;
304 if (port == NULL)
305 p = "syslog-conn";
306 }
307 if (hints.ai_socktype == 0)
308 continue;
309 hints.ai_family = AF_UNSPEC;
310 errcode = getaddrinfo(servername, p, &hints, &res);
311 if (errcode != 0)
312 errx(EXIT_FAILURE, _("failed to resolve name %s port %s: %s"),
313 servername, p, gai_strerror(errcode));
314 if ((fd = socket(res->ai_family, res->ai_socktype, res->ai_protocol)) == -1) {
315 freeaddrinfo(res);
316 continue;
317 }
318 if (connect(fd, res->ai_addr, res->ai_addrlen) == -1) {
319 freeaddrinfo(res);
320 close(fd);
321 continue;
322 }
323
324 freeaddrinfo(res);
325 break;
326 }
327
328 if (i == 0)
329 errx(EXIT_FAILURE, _("failed to connect to %s port %s"), servername, p);
330
331 /* replace ALL_TYPES with the real TYPE_* */
332 if (type > 0 && type != *socket_type)
333 *socket_type = type;
334 return fd;
335 }
336
337 #ifdef HAVE_LIBSYSTEMD
338 static int journald_entry(struct logger_ctl *ctl, FILE *fp)
339 {
340 struct iovec *iovec;
341 char *buf = NULL;
342 ssize_t sz;
343 int n, lines = 0, vectors = 8, ret = 0, msgline = -1;
344 size_t dummy = 0;
345
346 iovec = xmalloc(vectors * sizeof(struct iovec));
347 while (1) {
348 buf = NULL;
349 sz = getline(&buf, &dummy, fp);
350 if (sz == -1 ||
351 (sz = rtrim_whitespace((unsigned char *) buf)) == 0) {
352 free(buf);
353 break;
354 }
355
356 if (strncmp(buf, "MESSAGE=", 8) == 0) {
357 if (msgline == -1)
358 msgline = lines; /* remember the first message */
359 else {
360 char *p = xrealloc(iovec[msgline].iov_base,
361 iovec[msgline].iov_len + sz - 8 + 2);
362
363 iovec[msgline].iov_base = p;
364 p += iovec[msgline].iov_len;
365 *p++ = '\n';
366 memcpy(p, buf + 8, sz - 8);
367 free(buf);
368
369 iovec[msgline].iov_len += sz - 8 + 1;
370 continue;
371 }
372 }
373
374 if (lines == vectors) {
375 vectors *= 2;
376 if (IOV_MAX < vectors)
377 errx(EXIT_FAILURE, _("maximum input lines (%d) exceeded"), IOV_MAX);
378 iovec = xrealloc(iovec, vectors * sizeof(struct iovec));
379 }
380 iovec[lines].iov_base = buf;
381 iovec[lines].iov_len = sz;
382 ++lines;
383 }
384
385 if (!ctl->noact)
386 ret = sd_journal_sendv(iovec, lines);
387 if (ctl->stderr_printout) {
388 for (n = 0; n < lines; n++)
389 fprintf(stderr, "%s\n", (char *) iovec[n].iov_base);
390 }
391 for (n = 0; n < lines; n++)
392 free(iovec[n].iov_base);
393 free(iovec);
394 return ret;
395 }
396 #endif
397
398 /* this creates a timestamp based on current time according to the
399 * fine rules of RFC3164, most importantly it ensures in a portable
400 * way that the month day is correctly written (with a SP instead
401 * of a leading 0). The function uses a static buffer which is
402 * overwritten on the next call (just like ctime() does).
403 */
404 static char const *rfc3164_current_time(void)
405 {
406 static char time[32];
407 struct timeval tv;
408 struct tm tm;
409 static char const * const monthnames[] = {
410 "Jan", "Feb", "Mar", "Apr", "May", "Jun", "Jul", "Aug",
411 "Sep", "Oct", "Nov", "Dec"
412 };
413
414 logger_gettimeofday(&tv, NULL);
415 localtime_r(&tv.tv_sec, &tm);
416 snprintf(time, sizeof(time),"%s %2d %2.2d:%2.2d:%2.2d",
417 monthnames[tm.tm_mon], tm.tm_mday,
418 tm.tm_hour, tm.tm_min, tm.tm_sec);
419 return time;
420 }
421
422 #define next_iovec(ary, idx) __extension__ ({ \
423 assert(ARRAY_SIZE(ary) > (size_t)idx); \
424 assert(idx >= 0); \
425 &ary[idx++]; \
426 })
427
428 #define iovec_add_string(ary, idx, str, len) \
429 do { \
430 struct iovec *v = next_iovec(ary, idx); \
431 v->iov_base = (void *) str; \
432 v->iov_len = len ? len : strlen(str); \
433 } while (0)
434
435 #define iovec_memcmp(ary, idx, str, len) \
436 memcmp((ary)[(idx) - 1].iov_base, str, len)
437
438 /* writes generated buffer to desired destination. For TCP syslog,
439 * we use RFC6587 octet-stuffing (unless octet-counting is selected).
440 * This is not great, but doing full blown RFC5425 (TLS) looks like
441 * it is too much for the logger utility. If octet-counting is
442 * selected, we use that.
443 */
444 static void write_output(struct logger_ctl *ctl, const char *const msg)
445 {
446 struct iovec iov[4];
447 int iovlen = 0;
448 char *octet = NULL;
449
450 /* initial connect failed? */
451 if (!ctl->noact && !is_connected(ctl))
452 logger_reopen(ctl);
453
454 /* 1) octen count */
455 if (ctl->octet_count) {
456 size_t len = xasprintf(&octet, "%zu ", strlen(ctl->hdr) + strlen(msg));
457 iovec_add_string(iov, iovlen, octet, len);
458 }
459
460 /* 2) header */
461 iovec_add_string(iov, iovlen, ctl->hdr, 0);
462
463 /* 3) message */
464 iovec_add_string(iov, iovlen, msg, 0);
465
466 if (!ctl->noact && is_connected(ctl)) {
467 struct msghdr message = { 0 };
468 #ifdef SCM_CREDENTIALS
469 struct cmsghdr *cmhp;
470 struct ucred *cred;
471 union {
472 struct cmsghdr cmh;
473 char control[CMSG_SPACE(sizeof(struct ucred))];
474 } cbuf;
475 #endif
476
477 /* 4) add extra \n to make sure message is terminated */
478 if ((ctl->socket_type == TYPE_TCP) && !ctl->octet_count)
479 iovec_add_string(iov, iovlen, "\n", 1);
480
481 message.msg_iov = iov;
482 message.msg_iovlen = iovlen;
483
484 #ifdef SCM_CREDENTIALS
485 /* syslog/journald may follow local socket credentials rather
486 * than in the message PID. If we use --id as root than we can
487 * force kernel to accept another valid PID than the real logger(1)
488 * PID.
489 */
490 if (ctl->pid && !ctl->server && ctl->pid != getpid()
491 && geteuid() == 0 && kill(ctl->pid, 0) == 0) {
492
493 message.msg_control = cbuf.control;
494 message.msg_controllen = CMSG_SPACE(sizeof(struct ucred));
495
496 cmhp = CMSG_FIRSTHDR(&message);
497 cmhp->cmsg_len = CMSG_LEN(sizeof(struct ucred));
498 cmhp->cmsg_level = SOL_SOCKET;
499 cmhp->cmsg_type = SCM_CREDENTIALS;
500 cred = (struct ucred *) CMSG_DATA(cmhp);
501
502 cred->pid = ctl->pid;
503 }
504 #endif
505 /* Note that logger(1) maybe executed for long time (as pipe
506 * reader) and connection endpoint (syslogd) may be restarted.
507 *
508 * The libc syslog() function reconnects on failed send().
509 * Let's do the same to be robust. [kzak -- Oct 2017]
510 *
511 * MSG_NOSIGNAL is POSIX.1-2008 compatible, but it for example
512 * not supported by apple-darwin15.6.0.
513 */
514 #ifndef MSG_NOSIGNAL
515 # define MSG_NOSIGNAL 0
516 #endif
517 if (sendmsg(ctl->fd, &message, MSG_NOSIGNAL) < 0) {
518 logger_reopen(ctl);
519 if (sendmsg(ctl->fd, &message, MSG_NOSIGNAL) < 0)
520 warn(_("send message failed"));
521 }
522 }
523
524 if (ctl->stderr_printout) {
525 /* make sure it's terminated for stderr */
526 if (iovec_memcmp(iov, iovlen, "\n", 1) != 0)
527 iovec_add_string(iov, iovlen, "\n", 1);
528
529 ignore_result( writev(STDERR_FILENO, iov, iovlen) );
530 }
531
532 free(octet);
533 }
534
535 #define NILVALUE "-"
536 static void syslog_rfc3164_header(struct logger_ctl *const ctl)
537 {
538 char pid[30], *hostname;
539
540 *pid = '\0';
541 if (ctl->pid)
542 snprintf(pid, sizeof(pid), "[%d]", ctl->pid);
543
544 if ((hostname = logger_xgethostname())) {
545 char *dot = strchr(hostname, '.');
546 if (dot)
547 *dot = '\0';
548 } else
549 hostname = xstrdup(NILVALUE);
550
551 if ((size_t) xasprintf(&ctl->hdr, "<%d>%.15s %s %.200s%s: ",
552 ctl->pri, rfc3164_current_time(),
553 hostname, ctl->tag, pid) > ctl->max_message_size)
554 errx(EXIT_FAILURE, _("maximal message size is smaller than message header"));
555
556
557 free(hostname);
558 }
559
560 static inline struct list_head *get_user_structured_data(struct logger_ctl *ctl)
561 {
562 return &ctl->user_sds;
563 }
564
565 static inline struct list_head *get_reserved_structured_data(struct logger_ctl *ctl)
566 {
567 return &ctl->reserved_sds;
568 }
569
570 static int has_structured_data_id(struct list_head *ls, const char *id)
571 {
572 struct list_head *p;
573
574 if (!ls || list_empty(ls))
575 return 0;
576
577 list_for_each(p, ls) {
578 struct structured_data *sd = list_entry(p, struct structured_data, sds);
579 if (sd->id && strcmp(sd->id, id) == 0)
580 return 1;
581 }
582
583 return 0;
584 }
585
586 static void add_structured_data_id(struct list_head *ls, const char *id)
587 {
588 struct structured_data *sd;
589
590 assert(id);
591
592 if (has_structured_data_id(ls, id))
593 errx(EXIT_FAILURE, _("structured data ID '%s' is not unique"), id);
594
595 sd = xcalloc(1, sizeof(*sd));
596 INIT_LIST_HEAD(&sd->sds);
597 sd->id = xstrdup(id);
598
599 list_add_tail(&sd->sds, ls);
600 }
601
602 static void add_structured_data_param(struct list_head *ls, const char *param)
603 {
604 struct structured_data *sd;
605
606 if (list_empty(ls))
607 errx(EXIT_FAILURE, _("--sd-id was not specified for --sd-param %s"), param);
608
609 assert(param);
610
611 sd = list_last_entry(ls, struct structured_data, sds);
612
613 if (strv_extend(&sd->params, param))
614 err_oom();
615 }
616
617 static void __attribute__ ((__format__ (__printf__, 2, 3)))
618 add_structured_data_paramf(struct list_head *ls, const char *fmt, ...)
619 {
620 struct structured_data *sd;
621 va_list ap;
622 int x;
623
624 assert(!list_empty(ls));
625 assert(fmt);
626
627 sd = list_last_entry(ls, struct structured_data, sds);
628 va_start(ap, fmt);
629 x = strv_extendv(&sd->params, fmt, ap);
630 va_end(ap);
631
632 if (x)
633 err_oom();
634 }
635
636 static char *strdup_structured_data(struct structured_data *sd)
637 {
638 char *res, *tmp;
639
640 if (strv_isempty(sd->params))
641 return NULL;
642
643 xasprintf(&res, "[%s %s]", sd->id,
644 (tmp = strv_join(sd->params, " ")));
645 free(tmp);
646 return res;
647 }
648
649 static char *strdup_structured_data_list(struct list_head *ls)
650 {
651 struct list_head *p;
652 char *res = NULL;
653
654 list_for_each(p, ls) {
655 struct structured_data *sd = list_entry(p, struct structured_data, sds);
656 char *one = strdup_structured_data(sd);
657 char *tmp = res;
658
659 if (!one)
660 continue;
661 res = strconcat(tmp, one);
662 free(tmp);
663 free(one);
664 }
665
666 return res;
667 }
668
669 static char *get_structured_data_string(struct logger_ctl *ctl)
670 {
671 char *sys = NULL, *usr = NULL, *res;
672
673 if (!list_empty(&ctl->reserved_sds))
674 sys = strdup_structured_data_list(&ctl->reserved_sds);
675 if (!list_empty(&ctl->user_sds))
676 usr = strdup_structured_data_list(&ctl->user_sds);
677
678 if (sys && usr) {
679 res = strconcat(sys, usr);
680 free(sys);
681 free(usr);
682 } else
683 res = sys ? sys : usr;
684
685 return res;
686 }
687
688 static int valid_structured_data_param(const char *str)
689 {
690 char *eq = strchr(str, '='),
691 *qm1 = strchr(str, '"'),
692 *qm2 = qm1 ? strchr(qm1 + 1, '"') : NULL;
693
694 if (!eq || !qm1 || !qm2) /* something is missing */
695 return 0;
696
697 /* foo="bar" */
698 return eq > str && eq < qm1 && eq + 1 == qm1 && qm1 < qm2 && *(qm2 + 1) == '\0';
699 }
700
701 /* SD-ID format:
702 * name@<private enterprise number>, e.g., "ourSDID@32473"
703 */
704 static int valid_structured_data_id(const char *str)
705 {
706 char *at = strchr(str, '@');
707 const char *p;
708
709 /* standardized IDs without @<digits> */
710 if (!at && (strcmp(str, "timeQuality") == 0 ||
711 strcmp(str, "origin") == 0 ||
712 strcmp(str, "meta") == 0))
713 return 1;
714
715 if (!at || at == str || !*(at + 1))
716 return 0;
717
718 /* <digits> or <digits>.<digits>[...] */
719 for (p = at + 1; p && *p; p++) {
720 const char *end;
721
722 if (isdigit_strend(p, &end))
723 break; /* only digits in the string */
724
725 if (end == NULL || end == p ||
726 *end != '.' || *(end + 1) == '\0')
727 return 0;
728 p = end;
729 }
730
731 /* check for forbidden chars in the <name> */
732 for (p = str; p < at; p++) {
733 if (*p == '[' || *p == '=' || *p == '"' || *p == '@')
734 return 0;
735 if (isblank((unsigned char) *p) || iscntrl((unsigned char) *p))
736 return 0;
737 }
738 return 1;
739 }
740
741
742 /* Some field mappings may be controversial, thus I give the reason
743 * why this specific mapping was used:
744 * APP-NAME <-- tag
745 * Some may argue that "logger" is a better fit, but we think
746 * this is better inline of what other implementations do. In
747 * rsyslog, for example, the TAG value is populated from APP-NAME.
748 * PROCID <-- pid
749 * This is a relatively straightforward interpretation from
750 * RFC5424, sect. 6.2.6.
751 * MSGID <-- msgid (from --msgid)
752 * One may argue that the string "logger" would be better suited
753 * here so that a receiver can identify the sender process.
754 * However, this does not sound like a good match to RFC5424,
755 * sect. 6.2.7.
756 * Note that appendix A.1 of RFC5424 does not provide clear guidance
757 * of how these fields should be used. This is the case because the
758 * IETF working group couldn't arrive at a clear agreement when we
759 * specified RFC5424. The rest of the field mappings should be
760 * pretty clear from RFC5424. -- Rainer Gerhards, 2015-03-10
761 */
762 static void syslog_rfc5424_header(struct logger_ctl *const ctl)
763 {
764 char *time;
765 char *hostname;
766 char const *app_name = ctl->tag;
767 char *procid;
768 char *const msgid = xstrdup(ctl->msgid ? ctl->msgid : NILVALUE);
769 char *structured = NULL;
770 struct list_head *sd;
771
772 if (ctl->rfc5424_time) {
773 struct timeval tv;
774 struct tm tm;
775
776 logger_gettimeofday(&tv, NULL);
777 if (localtime_r(&tv.tv_sec, &tm) != NULL) {
778 char fmt[64];
779 const size_t i = strftime(fmt, sizeof(fmt),
780 "%Y-%m-%dT%H:%M:%S.%%06u%z ", &tm);
781 /* patch TZ info to comply with RFC3339 (we left SP at end) */
782 fmt[i - 1] = fmt[i - 2];
783 fmt[i - 2] = fmt[i - 3];
784 fmt[i - 3] = ':';
785 xasprintf(&time, fmt, tv.tv_usec);
786 } else
787 err(EXIT_FAILURE, _("localtime() failed"));
788 } else
789 time = xstrdup(NILVALUE);
790
791 if (ctl->rfc5424_host) {
792 if (!(hostname = logger_xgethostname()))
793 hostname = xstrdup(NILVALUE);
794 /* Arbitrary looking 'if (var < strlen()) checks originate from
795 * RFC 5424 - 6 Syslog Message Format definition. */
796 if (255 < strlen(hostname))
797 errx(EXIT_FAILURE, _("hostname '%s' is too long"),
798 hostname);
799 } else
800 hostname = xstrdup(NILVALUE);
801
802 if (48 < strlen(ctl->tag))
803 errx(EXIT_FAILURE, _("tag '%s' is too long"), ctl->tag);
804
805 if (ctl->pid)
806 xasprintf(&procid, "%d", ctl->pid);
807 else
808 procid = xstrdup(NILVALUE);
809
810 sd = get_reserved_structured_data(ctl);
811
812 /* time quality structured data (maybe overwritten by --sd-id timeQuality) */
813 if (ctl->rfc5424_tq && !has_structured_data_id(sd, "timeQuality")) {
814
815 add_structured_data_id(sd, "timeQuality");
816 add_structured_data_param(sd, "tzKnown=\"1\"");
817
818 #ifdef HAVE_NTP_GETTIME
819 struct ntptimeval ntptv;
820
821 if (ntp_gettime(&ntptv) == TIME_OK) {
822 add_structured_data_param(sd, "isSynced=\"1\"");
823 add_structured_data_paramf(sd, "syncAccuracy=\"%ld\"", ntptv.maxerror);
824 } else
825 #endif
826 add_structured_data_paramf(sd, "isSynced=\"0\"");
827 }
828
829 /* convert all structured data to string */
830 structured = get_structured_data_string(ctl);
831 if (!structured)
832 structured = xstrdup(NILVALUE);
833
834 if ((size_t) xasprintf(&ctl->hdr, "<%d>1 %s %s %s %s %s %s ",
835 ctl->pri,
836 time,
837 hostname,
838 app_name,
839 procid,
840 msgid,
841 structured) > ctl->max_message_size)
842 errx(EXIT_FAILURE, _("maximal message size is smaller than message header"));
843
844 free(time);
845 free(hostname);
846 /* app_name points to ctl->tag, do NOT free! */
847 free(procid);
848 free(msgid);
849 free(structured);
850 }
851
852 static void parse_rfc5424_flags(struct logger_ctl *ctl, char *s)
853 {
854 char *in, *tok;
855
856 in = s;
857 while ((tok = strtok(in, ","))) {
858 in = NULL;
859 if (!strcmp(tok, "notime")) {
860 ctl->rfc5424_time = 0;
861 ctl->rfc5424_tq = 0;
862 } else if (!strcmp(tok, "notq"))
863 ctl->rfc5424_tq = 0;
864 else if (!strcmp(tok, "nohost"))
865 ctl->rfc5424_host = 0;
866 else
867 warnx(_("ignoring unknown option argument: %s"), tok);
868 }
869 }
870
871 static int parse_unix_socket_errors_flags(char *s)
872 {
873 if (!strcmp(s, "off"))
874 return AF_UNIX_ERRORS_OFF;
875 if (!strcmp(s, "on"))
876 return AF_UNIX_ERRORS_ON;
877 if (!strcmp(s, "auto"))
878 return AF_UNIX_ERRORS_AUTO;
879 warnx(_("invalid argument: %s: using automatic errors"), s);
880 return AF_UNIX_ERRORS_AUTO;
881 }
882
883 static void syslog_local_header(struct logger_ctl *const ctl)
884 {
885 char pid[32];
886
887 if (ctl->pid)
888 snprintf(pid, sizeof(pid), "[%d]", ctl->pid);
889 else
890 pid[0] = '\0';
891
892 if ((size_t) xasprintf(&ctl->hdr, "<%d>%s %s%s: ", ctl->pri, rfc3164_current_time(),
893 ctl->tag, pid) > ctl->max_message_size)
894 errx(EXIT_FAILURE, _("maximal message size is smaller than message header"));
895 }
896
897 static void generate_syslog_header(struct logger_ctl *const ctl)
898 {
899 free(ctl->hdr);
900 ctl->hdr = NULL;
901 ctl->syslogfp(ctl);
902 }
903
904 /* just open, nothing else */
905 static void __logger_open(struct logger_ctl *ctl)
906 {
907 if (ctl->server) {
908 ctl->fd = inet_socket(ctl->server, ctl->port, &ctl->socket_type);
909 } else {
910 if (!ctl->unix_socket)
911 ctl->unix_socket = _PATH_DEVLOG;
912
913 ctl->fd = unix_socket(ctl, ctl->unix_socket, &ctl->socket_type);
914 }
915 }
916
917 /* open and initialize relevant @ctl tuff */
918 static void logger_open(struct logger_ctl *ctl)
919 {
920 __logger_open(ctl);
921
922 if (!ctl->syslogfp)
923 ctl->syslogfp = ctl->server ? syslog_rfc5424_header :
924 syslog_local_header;
925 if (!ctl->tag)
926 ctl->tag = ctl->login = xgetlogin();
927 if (!ctl->tag)
928 ctl->tag = "<someone>";
929
930 generate_syslog_header(ctl);
931 }
932
933 /* re-open; usually after failed connection */
934 static void logger_reopen(struct logger_ctl *ctl)
935 {
936 if (ctl->fd != -1)
937 close(ctl->fd);
938 ctl->fd = -1;
939
940 __logger_open(ctl);
941 }
942
943 static void logger_command_line(struct logger_ctl *ctl, char **argv)
944 {
945 /* note: we never re-generate the syslog header here, even if we
946 * generate multiple messages. If so, we think it is the right thing
947 * to do to report them with the same timestamp, as the user actually
948 * intended to send a single message.
949 */
950 char *const buf = xmalloc(ctl->max_message_size + 1);
951 char *p = buf;
952 const char *endp = buf + ctl->max_message_size - 1;
953 size_t len;
954
955 while (*argv) {
956 len = strlen(*argv);
957 if (endp < p + len && p != buf) {
958 write_output(ctl, buf);
959 p = buf;
960 }
961 if (ctl->max_message_size < len) {
962 (*argv)[ctl->max_message_size] = '\0'; /* truncate */
963 write_output(ctl, *argv++);
964 continue;
965 }
966 if (p != buf)
967 *p++ = ' ';
968 memmove(p, *argv++, len);
969 *(p += len) = '\0';
970 }
971 if (p != buf)
972 write_output(ctl, buf);
973 free(buf);
974 }
975
976 static void logger_stdin(struct logger_ctl *ctl)
977 {
978 /* note: we re-generate the syslog header for each log message to
979 * update header timestamps and to reflect possible priority changes.
980 * The initial header is generated by logger_open().
981 */
982 int default_priority = ctl->pri;
983 int last_pri = default_priority;
984 size_t max_usrmsg_size = ctl->max_message_size - strlen(ctl->hdr);
985 size_t allocated_usrmsg_size = max_usrmsg_size;
986 char *buf = xmalloc(allocated_usrmsg_size + 2 + 2);
987 int pri;
988 int c;
989 size_t i;
990
991 c = getchar();
992 while (c != EOF) {
993 i = 0;
994 if (ctl->prio_prefix && c == '<') {
995 pri = 0;
996 buf[i++] = c;
997 while (isdigit(c = getchar()) && pri <= 191) {
998 buf[i++] = c;
999 pri = pri * 10 + c - '0';
1000 }
1001 if (c != EOF && c != '\n')
1002 buf[i++] = c;
1003 if (c == '>' && 0 <= pri && pri <= 191) {
1004 /* valid RFC PRI values */
1005 i = 0;
1006 if ((pri & LOG_FACMASK) == 0)
1007 pri |= (default_priority & LOG_FACMASK);
1008 ctl->pri = pri;
1009 } else
1010 ctl->pri = default_priority;
1011
1012 if (ctl->pri != last_pri) {
1013 generate_syslog_header(ctl);
1014 max_usrmsg_size = ctl->max_message_size - strlen(ctl->hdr);
1015
1016 if (max_usrmsg_size > allocated_usrmsg_size) {
1017 allocated_usrmsg_size = max_usrmsg_size;
1018 buf = xrealloc(buf, allocated_usrmsg_size + 2 + 2);
1019 }
1020
1021 last_pri = ctl->pri;
1022 }
1023 if (c != EOF && c != '\n')
1024 c = getchar();
1025 }
1026
1027 while (c != EOF && c != '\n' && i < max_usrmsg_size) {
1028 buf[i++] = c;
1029 c = getchar();
1030 }
1031 buf[i] = '\0';
1032
1033 if (i > 0 || !ctl->skip_empty_lines)
1034 write_output(ctl, buf);
1035
1036 if (c == '\n') /* discard line terminator */
1037 c = getchar();
1038 }
1039
1040 free(buf);
1041 }
1042
1043 static void logger_close(const struct logger_ctl *ctl)
1044 {
1045 if (ctl->fd != -1 && close(ctl->fd) != 0)
1046 err(EXIT_FAILURE, _("close failed"));
1047 free(ctl->hdr);
1048 free(ctl->login);
1049 }
1050
1051 static void __attribute__((__noreturn__)) usage(void)
1052 {
1053 FILE *out = stdout;
1054 fputs(USAGE_HEADER, out);
1055 fprintf(out, _(" %s [options] [<message>]\n"), program_invocation_short_name);
1056
1057 fputs(USAGE_SEPARATOR, out);
1058 fputs(_("Enter messages into the system log.\n"), out);
1059
1060 fputs(USAGE_OPTIONS, out);
1061 fputs(_(" -i log the logger command's PID\n"), out);
1062 fputs(_(" --id[=<id>] log the given <id>, or otherwise the PID\n"), out);
1063 fputs(_(" -f, --file <file> log the contents of this file\n"), out);
1064 fputs(_(" -e, --skip-empty do not log empty lines when processing files\n"), out);
1065 fputs(_(" --no-act do everything except the write the log\n"), out);
1066 fputs(_(" -p, --priority <prio> mark given message with this priority\n"), out);
1067 fputs(_(" --octet-count use rfc6587 octet counting\n"), out);
1068 fputs(_(" --prio-prefix look for a prefix on every line read from stdin\n"), out);
1069 fputs(_(" -s, --stderr output message to standard error as well\n"), out);
1070 fputs(_(" -S, --size <size> maximum size for a single message\n"), out);
1071 fputs(_(" -t, --tag <tag> mark every line with this tag\n"), out);
1072 fputs(_(" -n, --server <name> write to this remote syslog server\n"), out);
1073 fputs(_(" -P, --port <port> use this port for UDP or TCP connection\n"), out);
1074 fputs(_(" -T, --tcp use TCP only\n"), out);
1075 fputs(_(" -d, --udp use UDP only\n"), out);
1076 fputs(_(" --rfc3164 use the obsolete BSD syslog protocol\n"), out);
1077 fputs(_(" --rfc5424[=<snip>] use the syslog protocol (the default for remote);\n"
1078 " <snip> can be notime, or notq, and/or nohost\n"), out);
1079 fputs(_(" --sd-id <id> rfc5424 structured data ID\n"), out);
1080 fputs(_(" --sd-param <data> rfc5424 structured data name=value\n"), out);
1081 fputs(_(" --msgid <msgid> set rfc5424 message id field\n"), out);
1082 fputs(_(" -u, --socket <socket> write to this Unix socket\n"), out);
1083 fputs(_(" --socket-errors[=<on|off|auto>]\n"
1084 " print connection errors when using Unix sockets\n"), out);
1085 #ifdef HAVE_LIBSYSTEMD
1086 fputs(_(" --journald[=<file>] write journald entry\n"), out);
1087 #endif
1088
1089 fputs(USAGE_SEPARATOR, out);
1090 printf(USAGE_HELP_OPTIONS(26));
1091 printf(USAGE_MAN_TAIL("logger(1)"));
1092
1093 exit(EXIT_SUCCESS);
1094 }
1095
1096 /*
1097 * logger -- read and log utility
1098 *
1099 * Reads from an input and arranges to write the result on the system
1100 * log.
1101 */
1102 int main(int argc, char **argv)
1103 {
1104 struct logger_ctl ctl = {
1105 .fd = -1,
1106 .pid = 0,
1107 .pri = LOG_USER | LOG_NOTICE,
1108 .prio_prefix = 0,
1109 .tag = NULL,
1110 .unix_socket = NULL,
1111 .unix_socket_errors = 0,
1112 .server = NULL,
1113 .port = NULL,
1114 .hdr = NULL,
1115 .msgid = NULL,
1116 .socket_type = ALL_TYPES,
1117 .max_message_size = 1024,
1118 .rfc5424_time = 1,
1119 .rfc5424_tq = 1,
1120 .rfc5424_host = 1,
1121 .skip_empty_lines = 0
1122 };
1123 int ch;
1124 int stdout_reopened = 0;
1125 int unix_socket_errors_mode = AF_UNIX_ERRORS_AUTO;
1126 #ifdef HAVE_LIBSYSTEMD
1127 FILE *jfd = NULL;
1128 #endif
1129 static const struct option longopts[] = {
1130 { "id", optional_argument, 0, OPT_ID },
1131 { "stderr", no_argument, 0, 's' },
1132 { "file", required_argument, 0, 'f' },
1133 { "no-act", no_argument, 0, OPT_NOACT, },
1134 { "priority", required_argument, 0, 'p' },
1135 { "tag", required_argument, 0, 't' },
1136 { "socket", required_argument, 0, 'u' },
1137 { "socket-errors", required_argument, 0, OPT_SOCKET_ERRORS },
1138 { "udp", no_argument, 0, 'd' },
1139 { "tcp", no_argument, 0, 'T' },
1140 { "server", required_argument, 0, 'n' },
1141 { "port", required_argument, 0, 'P' },
1142 { "version", no_argument, 0, 'V' },
1143 { "help", no_argument, 0, 'h' },
1144 { "octet-count", no_argument, 0, OPT_OCTET_COUNT },
1145 { "prio-prefix", no_argument, 0, OPT_PRIO_PREFIX },
1146 { "rfc3164", no_argument, 0, OPT_RFC3164 },
1147 { "rfc5424", optional_argument, 0, OPT_RFC5424 },
1148 { "size", required_argument, 0, 'S' },
1149 { "msgid", required_argument, 0, OPT_MSGID },
1150 { "skip-empty", no_argument, 0, 'e' },
1151 { "sd-id", required_argument, 0, OPT_STRUCTURED_DATA_ID },
1152 { "sd-param", required_argument, 0, OPT_STRUCTURED_DATA_PARAM },
1153 #ifdef HAVE_LIBSYSTEMD
1154 { "journald", optional_argument, 0, OPT_JOURNALD },
1155 #endif
1156 { NULL, 0, 0, 0 }
1157 };
1158
1159 setlocale(LC_ALL, "");
1160 bindtextdomain(PACKAGE, LOCALEDIR);
1161 textdomain(PACKAGE);
1162 close_stdout_atexit();
1163
1164 INIT_LIST_HEAD(&ctl.user_sds);
1165 INIT_LIST_HEAD(&ctl.reserved_sds);
1166
1167 while ((ch = getopt_long(argc, argv, "ef:ip:S:st:u:dTn:P:Vh",
1168 longopts, NULL)) != -1) {
1169 switch (ch) {
1170 case 'f': /* file to log */
1171 if (freopen(optarg, "r", stdin) == NULL)
1172 err(EXIT_FAILURE, _("file %s"), optarg);
1173 stdout_reopened = 1;
1174 break;
1175 case 'e':
1176 ctl.skip_empty_lines = 1;
1177 break;
1178 case 'i': /* log process id also */
1179 ctl.pid = logger_getpid();
1180 break;
1181 case OPT_ID:
1182 if (optarg) {
1183 const char *p = optarg;
1184
1185 if (*p == '=')
1186 p++;
1187 ctl.pid = strtoul_or_err(optarg, _("failed to parse id"));
1188 } else
1189 ctl.pid = logger_getpid();
1190 break;
1191 case 'p': /* priority */
1192 ctl.pri = pencode(optarg);
1193 break;
1194 case 's': /* log to standard error */
1195 ctl.stderr_printout = 1;
1196 break;
1197 case 't': /* tag */
1198 ctl.tag = optarg;
1199 break;
1200 case 'u': /* unix socket */
1201 ctl.unix_socket = optarg;
1202 break;
1203 case 'S': /* max message size */
1204 ctl.max_message_size = strtosize_or_err(optarg,
1205 _("failed to parse message size"));
1206 break;
1207 case 'd':
1208 ctl.socket_type = TYPE_UDP;
1209 break;
1210 case 'T':
1211 ctl.socket_type = TYPE_TCP;
1212 break;
1213 case 'n':
1214 ctl.server = optarg;
1215 break;
1216 case 'P':
1217 ctl.port = optarg;
1218 break;
1219 case OPT_OCTET_COUNT:
1220 ctl.octet_count = 1;
1221 break;
1222 case OPT_PRIO_PREFIX:
1223 ctl.prio_prefix = 1;
1224 break;
1225 case OPT_RFC3164:
1226 ctl.syslogfp = syslog_rfc3164_header;
1227 break;
1228 case OPT_RFC5424:
1229 ctl.syslogfp = syslog_rfc5424_header;
1230 if (optarg)
1231 parse_rfc5424_flags(&ctl, optarg);
1232 break;
1233 case OPT_MSGID:
1234 if (strchr(optarg, ' '))
1235 errx(EXIT_FAILURE, _("--msgid cannot contain space"));
1236 ctl.msgid = optarg;
1237 break;
1238 #ifdef HAVE_LIBSYSTEMD
1239 case OPT_JOURNALD:
1240 if (optarg) {
1241 jfd = fopen(optarg, "r");
1242 if (!jfd)
1243 err(EXIT_FAILURE, _("cannot open %s"),
1244 optarg);
1245 } else
1246 jfd = stdin;
1247 break;
1248 #endif
1249 case OPT_SOCKET_ERRORS:
1250 unix_socket_errors_mode = parse_unix_socket_errors_flags(optarg);
1251 break;
1252 case OPT_NOACT:
1253 ctl.noact = 1;
1254 break;
1255 case OPT_STRUCTURED_DATA_ID:
1256 if (!valid_structured_data_id(optarg))
1257 errx(EXIT_FAILURE, _("invalid structured data ID: '%s'"), optarg);
1258 add_structured_data_id(get_user_structured_data(&ctl), optarg);
1259 break;
1260 case OPT_STRUCTURED_DATA_PARAM:
1261 if (!valid_structured_data_param(optarg))
1262 errx(EXIT_FAILURE, _("invalid structured data parameter: '%s'"), optarg);
1263 add_structured_data_param(get_user_structured_data(&ctl), optarg);
1264 break;
1265
1266 case 'V':
1267 print_version(EXIT_SUCCESS);
1268 case 'h':
1269 usage();
1270 default:
1271 errtryhelp(EXIT_FAILURE);
1272 }
1273 }
1274 argc -= optind;
1275 argv += optind;
1276 if (stdout_reopened && argc)
1277 warnx(_("--file <file> and <message> are mutually exclusive, message is ignored"));
1278 #ifdef HAVE_LIBSYSTEMD
1279 if (jfd) {
1280 int ret = journald_entry(&ctl, jfd);
1281 if (stdin != jfd)
1282 fclose(jfd);
1283 if (ret)
1284 errx(EXIT_FAILURE, _("journald entry could not be written"));
1285 return EXIT_SUCCESS;
1286 }
1287 #endif
1288
1289 /* user overwrites built-in SD-ELEMENT */
1290 if (has_structured_data_id(get_user_structured_data(&ctl), "timeQuality"))
1291 ctl.rfc5424_tq = 0;
1292
1293 switch (unix_socket_errors_mode) {
1294 case AF_UNIX_ERRORS_OFF:
1295 ctl.unix_socket_errors = 0;
1296 break;
1297 case AF_UNIX_ERRORS_ON:
1298 ctl.unix_socket_errors = 1;
1299 break;
1300 case AF_UNIX_ERRORS_AUTO:
1301 ctl.unix_socket_errors = ctl.noact || ctl.stderr_printout;
1302 #ifdef HAVE_LIBSYSTEMD
1303 ctl.unix_socket_errors |= !!sd_booted();
1304 #endif
1305 break;
1306 default:
1307 abort();
1308 }
1309 logger_open(&ctl);
1310 if (0 < argc)
1311 logger_command_line(&ctl, argv);
1312 else
1313 /* Note. --file <arg> reopens stdin making the below
1314 * function to be used for file inputs. */
1315 logger_stdin(&ctl);
1316 logger_close(&ctl);
1317 return EXIT_SUCCESS;
1318 }