rsyslog/tests/dnscache-TTL-0.sh
Rainer Gerhards 37187427bf
dnscache: fix looking issue detected by Coverity Scan
This leads to a refactoring of the looking code; issue was caused
by new TTL cache expiration code which placed not semantics on the
cache. These were not properly handled under all circumstances.
2019-04-16 15:41:32 +02:00

22 lines
667 B
Bash
Executable File

#!/bin/bash
# addd 2019-04-12 by RGerhards, released under ASL 2.0
. ${srcdir:=.}/diag.sh init
export NUMMESSAGES=20 # should be sufficient to stress DNS cache
generate_conf
add_conf '
global(reverselookup.cache.ttl.default="0"
reverselookup.cache.ttl.enable="on")
module(load="../plugins/imtcp/.libs/imtcp")
input(type="imtcp" port="'$TCPFLOOD_PORT'")
template(name="outfmt" type="string" string="%msg:F,58:2%\n")
:msg, contains, "msgnum:" action(type="omfile" template="outfmt"
file="'$RSYSLOG_OUT_LOG'")
'
startup
tcpflood -m$NUMMESSAGES -c10 # run on 10 connections --> 10 dns cache calls
shutdown_when_empty
wait_shutdown
seq_check
exit_test