1# The client writes a message to Sys::Syslog native method. 2# The syslogd writes it into a file and through a pipe. 3# The syslogd passes it via TLS to localhost loghost. 4# The server receives the message on its TLS version 1.2 socket. 5# Find the message in client, file, pipe, syslogd, server log. 6# Check that server log contains ssl version 1.2. 7 8use strict; 9use warnings; 10use Socket; 11 12our %args = ( 13 syslogd => { 14 loghost => '@tls://localhost:$connectport', 15 loggrep => { 16 qr/Logging to FORWTLS \@tls:\/\/localhost:\d+/ => '>=4', 17 get_testgrep() => 1, 18 qr/syslogd: loghost .* connection error: connect failed:/ => 0, 19 }, 20 cacrt => "ca.crt", 21 }, 22 server => { 23 listen => { domain => AF_UNSPEC, proto => "tls", addr => "localhost" }, 24 loggrep => { 25 qr/listen sock: (127.0.0.1|::1) \d+/ => 1, 26 get_testgrep() => 1, 27 qr/ssl version: TLSv1_2$/ => 1, 28 }, 29 sslversion => "TLSv1_2", 30 }, 31); 32 331; 34