1 /*- 2 * SPDX-License-Identifier: BSD-3-Clause 3 * 4 * Copyright (c) 1983, 1993 5 * The Regents of the University of California. All rights reserved. 6 * 7 * Redistribution and use in source and binary forms, with or without 8 * modification, are permitted provided that the following conditions 9 * are met: 10 * 1. Redistributions of source code must retain the above copyright 11 * notice, this list of conditions and the following disclaimer. 12 * 2. Redistributions in binary form must reproduce the above copyright 13 * notice, this list of conditions and the following disclaimer in the 14 * documentation and/or other materials provided with the distribution. 15 * 3. Neither the name of the University nor the names of its contributors 16 * may be used to endorse or promote products derived from this software 17 * without specific prior written permission. 18 * 19 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 20 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 21 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 22 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 23 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 24 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 25 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 26 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 27 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 28 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 29 * SUCH DAMAGE. 30 */ 31 32 #ifndef lint 33 static const char copyright[] = 34 "@(#) Copyright (c) 1983, 1993\n\ 35 The Regents of the University of California. All rights reserved.\n"; 36 #endif /* not lint */ 37 38 #if 0 39 #ifndef lint 40 static char sccsid[] = "@(#)logger.c 8.1 (Berkeley) 6/6/93"; 41 #endif /* not lint */ 42 #endif 43 44 #include <sys/cdefs.h> 45 __FBSDID("$FreeBSD$"); 46 47 #include <sys/capsicum.h> 48 #include <sys/param.h> 49 #include <sys/socket.h> 50 #include <netinet/in.h> 51 52 #include <capsicum_helpers.h> 53 #include <ctype.h> 54 #include <err.h> 55 #include <netdb.h> 56 #include <stdio.h> 57 #include <stdlib.h> 58 #include <string.h> 59 #include <time.h> 60 #include <unistd.h> 61 62 #include <libcasper.h> 63 #include <casper/cap_syslog.h> 64 65 #define SYSLOG_NAMES 66 #include <syslog.h> 67 68 #define sstosa(ss) ((struct sockaddr *)(void *)ss) 69 70 struct socks { 71 int sk_sock; 72 int sk_addrlen; 73 struct sockaddr_storage sk_addr; 74 }; 75 76 static int decode(char *, const CODE *); 77 static int pencode(char *); 78 static ssize_t socksetup(const char *, const char *, const char *, 79 struct socks **); 80 static void logmessage(int, const char *, const char *, const char *, 81 struct socks *, ssize_t, const char *); 82 static void usage(void); 83 84 static cap_channel_t *capsyslog; 85 #ifdef INET6 86 static int family = PF_UNSPEC; /* protocol family (IPv4, IPv6 or both) */ 87 #else 88 static int family = PF_INET; /* protocol family (IPv4 only) */ 89 #endif 90 static int send_to_all = 0; /* send message to all IPv4/IPv6 addresses */ 91 92 /* 93 * logger -- read and log utility 94 * 95 * Reads from an input and arranges to write the result on the system 96 * log. 97 */ 98 int 99 main(int argc, char *argv[]) 100 { 101 cap_channel_t *capcas; 102 struct socks *socks; 103 ssize_t nsock; 104 time_t now; 105 int ch, logflags, pri; 106 char *tag, *host, buf[1024], *timestamp, tbuf[26], 107 *hostname, hbuf[MAXHOSTNAMELEN], *pristr; 108 const char *svcname, *src; 109 110 tag = NULL; 111 host = NULL; 112 hostname = NULL; 113 svcname = "syslog"; 114 src = NULL; 115 socks = NULL; 116 pri = LOG_USER | LOG_NOTICE; 117 pristr = NULL; 118 logflags = 0; 119 unsetenv("TZ"); 120 while ((ch = getopt(argc, argv, "46Af:H:h:iP:p:S:st:")) != -1) 121 switch((char)ch) { 122 case '4': 123 family = PF_INET; 124 break; 125 #ifdef INET6 126 case '6': 127 family = PF_INET6; 128 break; 129 #endif 130 case 'A': 131 send_to_all++; 132 break; 133 case 'f': /* file to log */ 134 if (freopen(optarg, "r", stdin) == NULL) 135 err(1, "%s", optarg); 136 setvbuf(stdin, 0, _IONBF, 0); 137 break; 138 case 'H': /* hostname to set in message header */ 139 hostname = optarg; 140 break; 141 case 'h': /* hostname to deliver to */ 142 host = optarg; 143 break; 144 case 'i': /* log process id also */ 145 logflags |= LOG_PID; 146 break; 147 case 'P': /* service name or port number */ 148 svcname = optarg; 149 break; 150 case 'p': /* priority */ 151 pristr = optarg; 152 break; 153 case 's': /* log to standard error */ 154 logflags |= LOG_PERROR; 155 break; 156 case 'S': /* source address */ 157 src = optarg; 158 break; 159 case 't': /* tag */ 160 tag = optarg; 161 break; 162 case '?': 163 default: 164 usage(); 165 } 166 argc -= optind; 167 argv += optind; 168 169 if (host) { 170 nsock = socksetup(src, host, svcname, &socks); 171 if (nsock <= 0) 172 errx(1, "socket"); 173 } else { 174 if (src) 175 errx(1, "-h option is missing."); 176 nsock = 0; 177 } 178 179 capcas = cap_init(); 180 if (capcas == NULL) 181 err(1, "Unable to contact Casper"); 182 caph_cache_catpages(); 183 caph_cache_tzdata(); 184 if (caph_enter() < 0) 185 err(1, "Unable to enter capability mode"); 186 capsyslog = cap_service_open(capcas, "system.syslog"); 187 if (capsyslog == NULL) 188 err(1, "Unable to open system.syslog service"); 189 cap_close(capcas); 190 191 if (pristr != NULL) 192 pri = pencode(pristr); 193 if (tag == NULL) 194 tag = getlogin(); 195 /* setup for logging */ 196 if (host == NULL) 197 cap_openlog(capsyslog, tag, logflags, 0); 198 199 (void )time(&now); 200 (void )ctime_r(&now, tbuf); 201 tbuf[19] = '\0'; 202 timestamp = tbuf + 4; 203 204 if (hostname == NULL) { 205 hostname = hbuf; 206 (void )gethostname(hbuf, MAXHOSTNAMELEN); 207 *strchrnul(hostname, '.') = '\0'; 208 } 209 210 /* log input line if appropriate */ 211 if (argc > 0) { 212 char *p, *endp; 213 size_t len; 214 215 for (p = buf, endp = buf + sizeof(buf) - 2; *argv;) { 216 len = strlen(*argv); 217 if (p + len > endp && p > buf) { 218 logmessage(pri, timestamp, hostname, tag, 219 socks, nsock, buf); 220 p = buf; 221 } 222 if (len > sizeof(buf) - 1) 223 logmessage(pri, timestamp, hostname, tag, 224 socks, nsock, *argv++); 225 else { 226 if (p != buf) 227 *p++ = ' '; 228 bcopy(*argv++, p, len); 229 *(p += len) = '\0'; 230 } 231 } 232 if (p != buf) 233 logmessage(pri, timestamp, hostname, tag, socks, nsock, 234 buf); 235 } else 236 while (fgets(buf, sizeof(buf), stdin) != NULL) 237 logmessage(pri, timestamp, hostname, tag, socks, nsock, 238 buf); 239 exit(0); 240 } 241 242 static ssize_t 243 socksetup(const char *src, const char *dst, const char *svcname, 244 struct socks **socks) 245 { 246 struct addrinfo hints, *res, *res0; 247 struct sockaddr_storage *ss_src[AF_MAX]; 248 struct socks *sk; 249 ssize_t nsock = 0; 250 int error, maxs; 251 252 memset(&ss_src[0], 0, sizeof(ss_src)); 253 if (src) { 254 char *p, *p0, *hs, *hbuf, *sbuf; 255 256 hbuf = sbuf = NULL; 257 p0 = p = strdup(src); 258 if (p0 == NULL) 259 err(1, "strdup failed"); 260 hs = p0; /* point to search ":" */ 261 #ifdef INET6 262 /* -S option supports IPv6 addr in "[2001:db8::1]:service". */ 263 if (*p0 == '[') { 264 p = strchr(p0, ']'); 265 if (p == NULL) 266 errx(1, "\"]\" not found in src addr"); 267 *p = '\0'; 268 /* hs points just after ']' (':' or '\0'). */ 269 hs = p + 1; 270 /* 271 * p points just after '[' while it points hs 272 * in the case of []. 273 */ 274 p = ((p0 + 1) == (hs - 1)) ? hs : p0 + 1; 275 } 276 #endif 277 if (*p != '\0') { 278 /* (p == hs) means ":514" or "[]:514". */ 279 hbuf = (p == hs && *p == ':') ? NULL : p; 280 p = strchr(hs, ':'); 281 if (p != NULL) { 282 *p = '\0'; 283 sbuf = (*(p + 1) != '\0') ? p + 1 : NULL; 284 } 285 } 286 hints = (struct addrinfo){ 287 .ai_family = family, 288 .ai_socktype = SOCK_DGRAM, 289 .ai_flags = AI_PASSIVE 290 }; 291 error = getaddrinfo(hbuf, sbuf, &hints, &res0); 292 if (error) 293 errx(1, "%s: %s", gai_strerror(error), src); 294 for (res = res0; res; res = res->ai_next) { 295 switch (res->ai_family) { 296 case AF_INET: 297 #ifdef INET6 298 case AF_INET6: 299 #endif 300 if (ss_src[res->ai_family] != NULL) 301 continue; 302 ss_src[res->ai_family] = 303 malloc(sizeof(struct sockaddr_storage)); 304 if (ss_src[res->ai_family] == NULL) 305 err(1, "malloc failed"); 306 memcpy(ss_src[res->ai_family], res->ai_addr, 307 res->ai_addrlen); 308 } 309 } 310 freeaddrinfo(res0); 311 free(p0); 312 } 313 314 /* resolve hostname */ 315 hints = (struct addrinfo){ 316 .ai_family = family, 317 .ai_socktype = SOCK_DGRAM 318 }; 319 error = getaddrinfo(dst, svcname, &hints, &res0); 320 if (error == EAI_SERVICE) { 321 warnx("%s/udp: unknown service", svcname); 322 error = getaddrinfo(dst, "514", &hints, &res0); 323 } 324 if (error) 325 errx(1, "%s: %s", gai_strerror(error), dst); 326 /* count max number of sockets we may open */ 327 maxs = 0; 328 for (res = res0; res; res = res->ai_next) 329 maxs++; 330 sk = calloc(maxs, sizeof(*sk)); 331 if (sk == NULL) 332 errx(1, "couldn't allocate memory for sockets"); 333 for (res = res0; res; res = res->ai_next) { 334 int s; 335 336 s = socket(res->ai_family, res->ai_socktype, 337 res->ai_protocol); 338 if (s < 0) 339 continue; 340 if (src && ss_src[res->ai_family] == NULL) 341 errx(1, "address family mismatch"); 342 343 if (ss_src[res->ai_family]) { 344 error = bind(s, sstosa(ss_src[res->ai_family]), 345 ss_src[res->ai_family]->ss_len); 346 if (error < 0) 347 err(1, "bind"); 348 } 349 sk[nsock] = (struct socks){ 350 .sk_addrlen = res->ai_addrlen, 351 .sk_sock = s 352 }; 353 memcpy(&sk[nsock].sk_addr, res->ai_addr, res->ai_addrlen); 354 nsock++; 355 } 356 freeaddrinfo(res0); 357 358 *socks = sk; 359 return (nsock); 360 } 361 362 /* 363 * Send the message to syslog, either on the local host, or on a remote host 364 */ 365 static void 366 logmessage(int pri, const char *timestamp, const char *hostname, 367 const char *tag, struct socks *sk, ssize_t nsock, const char *buf) 368 { 369 char *line; 370 int len, i, lsent; 371 372 if (nsock == 0) { 373 cap_syslog(capsyslog, pri, "%s", buf); 374 return; 375 } 376 if ((len = asprintf(&line, "<%d>%s %s %s: %s", pri, timestamp, 377 hostname, tag, buf)) == -1) 378 errx(1, "asprintf"); 379 380 lsent = -1; 381 for (i = 0; i < nsock; i++) { 382 lsent = sendto(sk[i].sk_sock, line, len, 0, 383 sstosa(&sk[i].sk_addr), sk[i].sk_addrlen); 384 if (lsent == len && !send_to_all) 385 break; 386 } 387 if (lsent != len) { 388 if (lsent == -1) 389 warn("sendto"); 390 else 391 warnx("sendto: short send - %d bytes", lsent); 392 } 393 394 free(line); 395 } 396 397 /* 398 * Decode a symbolic name to a numeric value 399 */ 400 static int 401 pencode(char *s) 402 { 403 char *save; 404 int fac, lev; 405 406 for (save = s; *s && *s != '.'; ++s); 407 if (*s) { 408 *s = '\0'; 409 fac = decode(save, facilitynames); 410 if (fac < 0) 411 errx(1, "unknown facility name: %s", save); 412 *s++ = '.'; 413 } 414 else { 415 fac = 0; 416 s = save; 417 } 418 lev = decode(s, prioritynames); 419 if (lev < 0) 420 errx(1, "unknown priority name: %s", save); 421 return ((lev & LOG_PRIMASK) | (fac & LOG_FACMASK)); 422 } 423 424 static int 425 decode(char *name, const CODE *codetab) 426 { 427 const CODE *c; 428 429 if (isdigit(*name)) 430 return (atoi(name)); 431 432 for (c = codetab; c->c_name; c++) 433 if (!strcasecmp(name, c->c_name)) 434 return (c->c_val); 435 436 return (-1); 437 } 438 439 static void 440 usage(void) 441 { 442 (void)fprintf(stderr, "usage: %s\n", 443 "logger [-46Ais] [-f file] [-h host] [-P port] [-p pri] [-t tag]\n" 444 " [-S addr:port] [message ...]" 445 ); 446 exit(1); 447 } 448