mirror of
https://github.com/rsyslog/rsyslog.git
synced 2025-12-16 11:00:41 +01:00
while this is deprecated, it is still used in practice. So far no test guarded this functionality.
27 lines
958 B
Bash
Executable File
27 lines
958 B
Bash
Executable File
#!/bin/bash
|
|
# check that we are able to receive messages from allowed sender
|
|
# added 2019-08-15 by RGerhards, released under ASL 2.0
|
|
. ${srcdir:=.}/diag.sh init
|
|
export NUMMESSAGES=5 # it's just important that we get any messages at all
|
|
generate_conf
|
|
add_conf '
|
|
module(load="../plugins/imtcp/.libs/imtcp")
|
|
input(type="imtcp" port="0" listenPortFileName="'$RSYSLOG_DYNNAME'.tcpflood_port" ruleset="rs")
|
|
|
|
$AllowedSender TCP,128.66.0.0/16 # this IP range is reserved by RFC5737
|
|
template(name="outfmt" type="string" string="%msg:F,58:2%\n")
|
|
ruleset(name="rs") {
|
|
action(type="omfile" template="outfmt" file="'$RSYSLOG_DYNNAME.must-not-be-created'")
|
|
}
|
|
|
|
action(type="omfile" file="'$RSYSLOG_OUT_LOG'")
|
|
'
|
|
startup
|
|
assign_tcpflood_port $RSYSLOG_DYNNAME.tcpflood_port
|
|
tcpflood -m$NUMMESSAGES
|
|
shutdown_when_empty
|
|
wait_shutdown
|
|
content_check --regex "TCP message from disallowed sender .* discarded"
|
|
check_file_not_exists "$RSYSLOG_DYNNAME.must-not-be-created"
|
|
exit_test
|