1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
|
/*
* (C) 2018-2025 by Christian Hesse <mail@eworm.de>
*
* This program is free software: you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation, either version 3 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program. If not, see <https://www.gnu.org/licenses/>.
*
*/
#include "udp514-journal.h"
int main(int argc, char **argv) {
int activation, sock;
unsigned int count = 0;
/* socket address for listening */
struct sockaddr_storage ss_listen = {};
struct sockaddr *addr_listen = (struct sockaddr *) &ss_listen;
struct sockaddr_in6 *addr_listen_in6 = (struct sockaddr_in6 *) &ss_listen;
activation = sd_listen_fds(0);
if (activation > 1) {
perror("too many file descriptors received");
return EXIT_FAILURE;
} else if (activation == 1) {
sock = SD_LISTEN_FDS_START + 0;
} else {
/* open socket, the usual way */
if ((sock = socket(AF_INET6, SOCK_DGRAM, 0)) < 0) {
perror("could not open socket");
return EXIT_FAILURE;
}
/* bind local socket port */
addr_listen_in6->sin6_family = AF_INET6;
addr_listen_in6->sin6_addr = in6addr_any;
addr_listen_in6->sin6_scope_id = 0;
addr_listen_in6->sin6_port = htons(LOCAL_SERVER_PORT);
if (bind(sock, addr_listen, sizeof(struct sockaddr_in6)) < 0) {
perror("could not bind on port " LOCAL_SERVER_PORT_STR);
return EXIT_FAILURE;
}
}
/* tell systemd we are ready to go... */
sd_notify(0, "READY=1\nSTATUS=Listening for syslog input...");
/* server loop */
while (1) {
char addr_buf[INET6_ADDRSTRLEN], msg_buf[BUFFER_SIZE];
const char * address;
socklen_t len;
char * match;
CODE * pri;
uint8_t priority = LOG_INFO;
/* socket address for client */
struct sockaddr_storage ss_client = {};
struct sockaddr *addr_client = (struct sockaddr *) &ss_client;
struct sockaddr_in *addr_client_in = (struct sockaddr_in *) &ss_client;
struct sockaddr_in6 *addr_client_in6 = (struct sockaddr_in6 *) &ss_client;
memset(msg_buf, 0, BUFFER_SIZE);
len = sizeof(struct sockaddr_storage);
if (recvfrom(sock, msg_buf, BUFFER_SIZE, 0, addr_client, &len) < 0) {
perror("could not receive data");
continue;
}
/* parse priority */
if ((match = strndup(msg_buf, BUFFER_SIZE)) != NULL) {
char * space = strchr(match, ' ');
if (space != NULL)
*space = 0;
for (pri = prioritynames; pri->c_name && strstr(match, pri->c_name) == NULL; pri++);
free(match);
priority = pri->c_val;
}
/* get client's ip address */
switch (addr_client->sa_family) {
case AF_INET6:
address = inet_ntop(AF_INET6, &addr_client_in6->sin6_addr,
addr_buf, INET6_ADDRSTRLEN);
break;
case AF_INET:
address = inet_ntop(AF_INET, &addr_client_in->sin_addr,
addr_buf, INET6_ADDRSTRLEN);
break;
default:
fputs("unhadled address family", stderr);
continue;
}
if (address == NULL) {
perror("could not get clients ip address");
continue;
}
/* strip prefix from mapped ipv4 addresses */
if (strncmp(address, "::ffff:", 7) == 0) {
address += 7;
}
/* send to systemd-journald */
sd_journal_send("MESSAGE=%s", msg_buf,
"SYSLOG_IDENTIFIER=%s", address,
"PRIORITY=%i", priority,
NULL);
/* count and update status */
sd_notifyf(0, "READY=1\nSTATUS=Forwarded %d syslog messages.", ++count);
}
/* close socket */
close(sock);
return EXIT_SUCCESS;
}
|