aboutsummaryrefslogtreecommitdiffstats
path: root/udp514-journal.c
blob: cef688ff70329c0704ade904c64571c3b82afdaa (about) (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
/*
 * (C) 2018-2019 by Christian Hesse <mail@eworm.de>
 *
 * This software may be used and distributed according to the terms
 * of the GNU General Public License, incorporated herein by reference.
 */

#include "udp514-journal.h"

int main(int argc, char **argv) {
	int s, n;
	socklen_t len;
	struct sockaddr_in cliAddr, servAddr;
	char buffer[BUFFER_SIZE];
	const int y = 1;
	unsigned int count = 0;

	/* open socket */
	if ((s = socket(AF_INET, SOCK_DGRAM, 0)) < 0) {
		perror("could not open socket");
		return EXIT_FAILURE;
	}

	/* bind local socket port */
	servAddr.sin_family = AF_INET;
	servAddr.sin_addr.s_addr = htonl(INADDR_ANY);
	servAddr.sin_port = htons(LOCAL_SERVER_PORT);
	setsockopt(s, SOL_SOCKET, SO_REUSEADDR, &y, sizeof(int));
	if (bind(s, (struct sockaddr *) &servAddr, sizeof(servAddr)) < 0) {
		perror("could not bind on port " LOCAL_SERVER_PORT_STR);
		return EXIT_FAILURE;
	}

	/* tell systemd we are ready to go... */
	sd_notify(0, "READY=1\nSTATUS=Listening for syslog input...");

	/* server loop */
	while (1) {
		memset(buffer, 0, BUFFER_SIZE);
		len = sizeof(cliAddr);
		n = recvfrom(s, buffer, BUFFER_SIZE, 0,
			(struct sockaddr *) &cliAddr, &len);
		if (n < 0) {
			perror("could not receive data");
			continue;
		}
	
		/* send to systemd-journald */
		sd_journal_send("MESSAGE=%s", buffer,
			"SYSLOG_IDENTIFIER=%s", inet_ntoa(cliAddr.sin_addr),
			NULL);

		/* count and update status */
		sd_notifyf(0, "READY=1\nSTATUS=Forwarded %d syslog messages.", ++count);
	}

	/* close socket */
	close(s);

	return EXIT_SUCCESS;
}