1# The client writes a message to Sys::Syslog native method.
2# The syslogd writes it into a file and through a pipe.
3# The syslogd passes it via TLS to localhost loghost.
4# The server receives the message on its TLS version 1.2 socket.
5# Find the message in client, file, pipe, syslogd, server log.
6# Check that server log contains ssl version 1.2.
7
8use strict;
9use warnings;
10use Socket;
11
12our %args = (
13    syslogd => {
14	loghost => '@tls://localhost:$connectport',
15	loggrep => {
16	    qr/Logging to FORWTLS \@tls:\/\/localhost:\d+/ => '>=4',
17	    get_testgrep() => 1,
18	    qr/syslogd: loghost .* connection error: connect failed:/ => 0,
19	},
20	cacrt => "ca.crt",
21    },
22    server => {
23	listen => { domain => AF_UNSPEC, proto => "tls", addr => "localhost" },
24	loggrep => {
25	    qr/listen sock: (127.0.0.1|::1) \d+/ => 1,
26	    get_testgrep() => 1,
27	    qr/ssl version: TLSv1_2$/ => 1,
28	},
29	sslversion => "TLSv1_2",
30    },
31);
32
331;
34