rsyslog/tests/allowed-sender-tcp-fail.sh
Rainer Gerhards f447fda845
testbench: add tests for $AllowedSender functionality
while this is deprecated, it is still used in practice. So far no
test guarded this functionality.
2019-08-16 20:45:33 +02:00

27 lines
958 B
Bash
Executable File

#!/bin/bash
# check that we are able to receive messages from allowed sender
# added 2019-08-15 by RGerhards, released under ASL 2.0
. ${srcdir:=.}/diag.sh init
export NUMMESSAGES=5 # it's just important that we get any messages at all
generate_conf
add_conf '
module(load="../plugins/imtcp/.libs/imtcp")
input(type="imtcp" port="0" listenPortFileName="'$RSYSLOG_DYNNAME'.tcpflood_port" ruleset="rs")
$AllowedSender TCP,128.66.0.0/16 # this IP range is reserved by RFC5737
template(name="outfmt" type="string" string="%msg:F,58:2%\n")
ruleset(name="rs") {
action(type="omfile" template="outfmt" file="'$RSYSLOG_DYNNAME.must-not-be-created'")
}
action(type="omfile" file="'$RSYSLOG_OUT_LOG'")
'
startup
assign_tcpflood_port $RSYSLOG_DYNNAME.tcpflood_port
tcpflood -m$NUMMESSAGES
shutdown_when_empty
wait_shutdown
content_check --regex "TCP message from disallowed sender .* discarded"
check_file_not_exists "$RSYSLOG_DYNNAME.must-not-be-created"
exit_test