syslog.go 6.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265
  1. // Package syslog provides the logdriver for forwarding server logs to syslog endpoints.
  2. package syslog
  3. import (
  4. "crypto/tls"
  5. "errors"
  6. "fmt"
  7. "net"
  8. "net/url"
  9. "os"
  10. "strconv"
  11. "strings"
  12. "time"
  13. syslog "github.com/RackSec/srslog"
  14. "github.com/Sirupsen/logrus"
  15. "github.com/docker/docker/daemon/logger"
  16. "github.com/docker/docker/daemon/logger/loggerutils"
  17. "github.com/docker/docker/pkg/urlutil"
  18. "github.com/docker/go-connections/tlsconfig"
  19. )
  20. const (
  21. name = "syslog"
  22. secureProto = "tcp+tls"
  23. )
  24. var facilities = map[string]syslog.Priority{
  25. "kern": syslog.LOG_KERN,
  26. "user": syslog.LOG_USER,
  27. "mail": syslog.LOG_MAIL,
  28. "daemon": syslog.LOG_DAEMON,
  29. "auth": syslog.LOG_AUTH,
  30. "syslog": syslog.LOG_SYSLOG,
  31. "lpr": syslog.LOG_LPR,
  32. "news": syslog.LOG_NEWS,
  33. "uucp": syslog.LOG_UUCP,
  34. "cron": syslog.LOG_CRON,
  35. "authpriv": syslog.LOG_AUTHPRIV,
  36. "ftp": syslog.LOG_FTP,
  37. "local0": syslog.LOG_LOCAL0,
  38. "local1": syslog.LOG_LOCAL1,
  39. "local2": syslog.LOG_LOCAL2,
  40. "local3": syslog.LOG_LOCAL3,
  41. "local4": syslog.LOG_LOCAL4,
  42. "local5": syslog.LOG_LOCAL5,
  43. "local6": syslog.LOG_LOCAL6,
  44. "local7": syslog.LOG_LOCAL7,
  45. }
  46. type syslogger struct {
  47. writer *syslog.Writer
  48. }
  49. func init() {
  50. if err := logger.RegisterLogDriver(name, New); err != nil {
  51. logrus.Fatal(err)
  52. }
  53. if err := logger.RegisterLogOptValidator(name, ValidateLogOpt); err != nil {
  54. logrus.Fatal(err)
  55. }
  56. }
  57. // rsyslog uses appname part of syslog message to fill in an %syslogtag% template
  58. // attribute in rsyslog.conf. In order to be backward compatible to rfc3164
  59. // tag will be also used as an appname
  60. func rfc5424formatterWithAppNameAsTag(p syslog.Priority, hostname, tag, content string) string {
  61. timestamp := time.Now().Format(time.RFC3339)
  62. pid := os.Getpid()
  63. msg := fmt.Sprintf("<%d>%d %s %s %s %d %s - %s",
  64. p, 1, timestamp, hostname, tag, pid, tag, content)
  65. return msg
  66. }
  67. // The timestamp field in rfc5424 is derived from rfc3339. Whereas rfc3339 makes allowances
  68. // for multiple syntaxes, there are further restrictions in rfc5424, i.e., the maximum
  69. // resolution is limited to "TIME-SECFRAC" which is 6 (microsecond resolution)
  70. func rfc5424microformatterWithAppNameAsTag(p syslog.Priority, hostname, tag, content string) string {
  71. timestamp := time.Now().Format("2006-01-02T15:04:05.999999Z07:00")
  72. pid := os.Getpid()
  73. msg := fmt.Sprintf("<%d>%d %s %s %s %d %s - %s",
  74. p, 1, timestamp, hostname, tag, pid, tag, content)
  75. return msg
  76. }
  77. // New creates a syslog logger using the configuration passed in on
  78. // the context. Supported context configuration variables are
  79. // syslog-address, syslog-facility, syslog-format.
  80. func New(info logger.Info) (logger.Logger, error) {
  81. tag, err := loggerutils.ParseLogTag(info, loggerutils.DefaultTemplate)
  82. if err != nil {
  83. return nil, err
  84. }
  85. proto, address, err := parseAddress(info.Config["syslog-address"])
  86. if err != nil {
  87. return nil, err
  88. }
  89. facility, err := parseFacility(info.Config["syslog-facility"])
  90. if err != nil {
  91. return nil, err
  92. }
  93. syslogFormatter, syslogFramer, err := parseLogFormat(info.Config["syslog-format"], proto)
  94. if err != nil {
  95. return nil, err
  96. }
  97. var log *syslog.Writer
  98. if proto == secureProto {
  99. tlsConfig, tlsErr := parseTLSConfig(info.Config)
  100. if tlsErr != nil {
  101. return nil, tlsErr
  102. }
  103. log, err = syslog.DialWithTLSConfig(proto, address, facility, tag, tlsConfig)
  104. } else {
  105. log, err = syslog.Dial(proto, address, facility, tag)
  106. }
  107. if err != nil {
  108. return nil, err
  109. }
  110. log.SetFormatter(syslogFormatter)
  111. log.SetFramer(syslogFramer)
  112. return &syslogger{
  113. writer: log,
  114. }, nil
  115. }
  116. func (s *syslogger) Log(msg *logger.Message) error {
  117. line := string(msg.Line)
  118. logger.PutMessage(msg)
  119. if msg.Source == "stderr" {
  120. return s.writer.Err(line)
  121. }
  122. return s.writer.Info(line)
  123. }
  124. func (s *syslogger) Close() error {
  125. return s.writer.Close()
  126. }
  127. func (s *syslogger) Name() string {
  128. return name
  129. }
  130. func parseAddress(address string) (string, string, error) {
  131. if address == "" {
  132. return "", "", nil
  133. }
  134. if !urlutil.IsTransportURL(address) {
  135. return "", "", fmt.Errorf("syslog-address should be in form proto://address, got %v", address)
  136. }
  137. url, err := url.Parse(address)
  138. if err != nil {
  139. return "", "", err
  140. }
  141. // unix and unixgram socket validation
  142. if url.Scheme == "unix" || url.Scheme == "unixgram" {
  143. if _, err := os.Stat(url.Path); err != nil {
  144. return "", "", err
  145. }
  146. return url.Scheme, url.Path, nil
  147. }
  148. // here we process tcp|udp
  149. host := url.Host
  150. if _, _, err := net.SplitHostPort(host); err != nil {
  151. if !strings.Contains(err.Error(), "missing port in address") {
  152. return "", "", err
  153. }
  154. host = host + ":514"
  155. }
  156. return url.Scheme, host, nil
  157. }
  158. // ValidateLogOpt looks for syslog specific log options
  159. // syslog-address, syslog-facility.
  160. func ValidateLogOpt(cfg map[string]string) error {
  161. for key := range cfg {
  162. switch key {
  163. case "env":
  164. case "env-regex":
  165. case "labels":
  166. case "syslog-address":
  167. case "syslog-facility":
  168. case "syslog-tls-ca-cert":
  169. case "syslog-tls-cert":
  170. case "syslog-tls-key":
  171. case "syslog-tls-skip-verify":
  172. case "tag":
  173. case "syslog-format":
  174. default:
  175. return fmt.Errorf("unknown log opt '%s' for syslog log driver", key)
  176. }
  177. }
  178. if _, _, err := parseAddress(cfg["syslog-address"]); err != nil {
  179. return err
  180. }
  181. if _, err := parseFacility(cfg["syslog-facility"]); err != nil {
  182. return err
  183. }
  184. if _, _, err := parseLogFormat(cfg["syslog-format"], ""); err != nil {
  185. return err
  186. }
  187. return nil
  188. }
  189. func parseFacility(facility string) (syslog.Priority, error) {
  190. if facility == "" {
  191. return syslog.LOG_DAEMON, nil
  192. }
  193. if syslogFacility, valid := facilities[facility]; valid {
  194. return syslogFacility, nil
  195. }
  196. fInt, err := strconv.Atoi(facility)
  197. if err == nil && 0 <= fInt && fInt <= 23 {
  198. return syslog.Priority(fInt << 3), nil
  199. }
  200. return syslog.Priority(0), errors.New("invalid syslog facility")
  201. }
  202. func parseTLSConfig(cfg map[string]string) (*tls.Config, error) {
  203. _, skipVerify := cfg["syslog-tls-skip-verify"]
  204. opts := tlsconfig.Options{
  205. CAFile: cfg["syslog-tls-ca-cert"],
  206. CertFile: cfg["syslog-tls-cert"],
  207. KeyFile: cfg["syslog-tls-key"],
  208. InsecureSkipVerify: skipVerify,
  209. }
  210. return tlsconfig.Client(opts)
  211. }
  212. func parseLogFormat(logFormat, proto string) (syslog.Formatter, syslog.Framer, error) {
  213. switch logFormat {
  214. case "":
  215. return syslog.UnixFormatter, syslog.DefaultFramer, nil
  216. case "rfc3164":
  217. return syslog.RFC3164Formatter, syslog.DefaultFramer, nil
  218. case "rfc5424":
  219. if proto == secureProto {
  220. return rfc5424formatterWithAppNameAsTag, syslog.RFC5425MessageLengthFramer, nil
  221. }
  222. return rfc5424formatterWithAppNameAsTag, syslog.DefaultFramer, nil
  223. case "rfc5424micro":
  224. if proto == secureProto {
  225. return rfc5424microformatterWithAppNameAsTag, syslog.RFC5425MessageLengthFramer, nil
  226. }
  227. return rfc5424microformatterWithAppNameAsTag, syslog.DefaultFramer, nil
  228. default:
  229. return nil, nil, errors.New("Invalid syslog format")
  230. }
  231. }