2013-11-26 22:57:29 +00:00
#! /usr/bin/perl -w -I ..
#
# Test check_http by having an actual HTTP server running
#
# To create the https server certificate:
2022-10-19 15:24:24 +00:00
# ./certs/generate-certs.sh
2013-11-26 22:57:29 +00:00
use strict ;
use Test::More ;
use NPTest ;
use FindBin qw( $Bin ) ;
2023-10-18 07:29:37 +00:00
use IO::Socket::INET ;
2013-11-26 22:57:29 +00:00
2016-11-30 11:36:55 +00:00
$ ENV { 'LC_TIME' } = "C" ;
2023-02-02 09:13:25 +00:00
my $ common_tests = 71 ;
2020-12-10 20:00:09 +00:00
my $ virtual_port_tests = 8 ;
2022-10-19 15:24:24 +00:00
my $ ssl_only_tests = 12 ;
2023-10-18 07:29:37 +00:00
my $ chunked_encoding_special_tests = 1 ;
2013-11-26 22:58:53 +00:00
# Check that all dependent modules are available
2014-07-11 19:01:00 +00:00
eval "use HTTP::Daemon 6.01;" ;
plan skip_all = > 'HTTP::Daemon >= 6.01 required' if $@ ;
2013-11-26 22:58:53 +00:00
eval {
require HTTP::Status ;
require HTTP::Response ;
} ;
2020-12-10 20:00:09 +00:00
my $ plugin = 'check_http' ;
$ plugin = 'check_curl' if $ 0 =~ m/check_curl/mx ;
2013-11-26 22:58:53 +00:00
if ( $@ ) {
plan skip_all = > "Missing required module for test: $@" ;
} else {
2020-12-10 20:00:09 +00:00
if ( - x "./$plugin" ) {
2023-10-18 07:29:37 +00:00
plan tests = > $ common_tests * 2 + $ ssl_only_tests + $ virtual_port_tests + $ chunked_encoding_special_tests ;
2013-11-26 22:58:53 +00:00
} else {
2020-12-10 20:00:09 +00:00
plan skip_all = > "No $plugin compiled" ;
2013-11-26 22:58:53 +00:00
}
}
2013-11-26 22:57:29 +00:00
my $ servers = { http = > 0 } ; # HTTP::Daemon should always be available
eval { require HTTP::Daemon::SSL } ;
if ( $@ ) {
diag "Cannot load HTTP::Daemon::SSL: $@" ;
} else {
$ servers - > { https } = 0 ;
}
# set a fixed version, so the header size doesn't vary
$ HTTP:: Daemon:: VERSION = "1.00" ;
my $ port_http = 50000 + int ( rand ( 1000 ) ) ;
my $ port_https = $ port_http + 1 ;
my $ port_https_expired = $ port_http + 2 ;
2022-10-19 15:24:24 +00:00
my $ port_https_clientcert = $ port_http + 3 ;
2023-10-18 07:29:37 +00:00
my $ port_hacked_http = $ port_http + 4 ;
2013-11-26 22:57:29 +00:00
# This array keeps sockets around for implementing timeouts
my @ persist ;
# Start up all servers
my @ pids ;
2022-10-19 15:24:24 +00:00
# Fork a HTTP server
my $ pid = fork ;
defined $ pid or die "Failed to fork" ;
if ( ! $ pid ) {
undef @ pids ;
2013-11-26 22:57:29 +00:00
my $ d = HTTP::Daemon - > new (
LocalPort = > $ port_http ,
LocalAddr = > "127.0.0.1" ,
) || die ;
print "Please contact http at: <URL:" , $ d - > url , ">\n" ;
run_server ( $ d ) ;
2022-10-19 15:24:24 +00:00
die "webserver stopped" ;
2013-11-26 22:57:29 +00:00
}
2022-10-19 15:24:24 +00:00
push @ pids , $ pid ;
2023-10-18 07:29:37 +00:00
# Fork the hacked HTTP server
undef $ pid ;
$ pid = fork ;
defined $ pid or die "Failed to fork" ;
if ( ! $ pid ) {
# this is the fork
undef @ pids ;
my $ socket = new IO::Socket:: INET (
LocalHost = > '0.0.0.0' ,
LocalPort = > $ port_hacked_http ,
Proto = > 'tcp' ,
Listen = > 5 ,
Reuse = > 1
) ;
die "cannot create socket $!n" unless $ socket ;
my $ local_sock = $ socket - > sockport ( ) ;
print "server waiting for client connection on port $local_sock\n" ;
run_hacked_http_server ( $ socket ) ;
die "hacked http server stopped" ;
}
push @ pids , $ pid ;
2022-10-19 15:24:24 +00:00
if ( exists $ servers - > { https } ) {
# Fork a normal HTTPS server
$ pid = fork ;
defined $ pid or die "Failed to fork" ;
if ( ! $ pid ) {
undef @ pids ;
# closing the connection after -C cert checks make the daemon exit with a sigpipe otherwise
local $ SIG { 'PIPE' } = 'IGNORE' ;
my $ d = HTTP::Daemon::SSL - > new (
LocalPort = > $ port_https ,
LocalAddr = > "127.0.0.1" ,
SSL_cert_file = > "$Bin/certs/server-cert.pem" ,
SSL_key_file = > "$Bin/certs/server-key.pem" ,
) || die ;
print "Please contact https at: <URL:" , $ d - > url , ">\n" ;
run_server ( $ d ) ;
die "webserver stopped" ;
}
push @ pids , $ pid ;
# Fork an expired cert server
$ pid = fork ;
defined $ pid or die "Failed to fork" ;
if ( ! $ pid ) {
undef @ pids ;
# closing the connection after -C cert checks make the daemon exit with a sigpipe otherwise
local $ SIG { 'PIPE' } = 'IGNORE' ;
my $ d = HTTP::Daemon::SSL - > new (
LocalPort = > $ port_https_expired ,
LocalAddr = > "127.0.0.1" ,
SSL_cert_file = > "$Bin/certs/expired-cert.pem" ,
SSL_key_file = > "$Bin/certs/expired-key.pem" ,
) || die ;
print "Please contact https expired at: <URL:" , $ d - > url , ">\n" ;
run_server ( $ d ) ;
die "webserver stopped" ;
}
push @ pids , $ pid ;
# Fork an client cert expecting server
$ pid = fork ;
defined $ pid or die "Failed to fork" ;
if ( ! $ pid ) {
undef @ pids ;
# closing the connection after -C cert checks make the daemon exit with a sigpipe otherwise
local $ SIG { 'PIPE' } = 'IGNORE' ;
my $ d = HTTP::Daemon::SSL - > new (
LocalPort = > $ port_https_clientcert ,
LocalAddr = > "127.0.0.1" ,
SSL_cert_file = > "$Bin/certs/server-cert.pem" ,
SSL_key_file = > "$Bin/certs/server-key.pem" ,
SSL_verify_mode = > IO::Socket::SSL - > SSL_VERIFY_PEER | IO::Socket::SSL - > SSL_VERIFY_FAIL_IF_NO_PEER_CERT ,
SSL_ca_file = > "$Bin/certs/clientca-cert.pem" ,
) || die ;
print "Please contact https client cert at: <URL:" , $ d - > url , ">\n" ;
run_server ( $ d ) ;
die "webserver stopped" ;
}
push @ pids , $ pid ;
}
# give our webservers some time to startup
sleep ( 3 ) ;
2013-11-26 22:57:29 +00:00
# Run the same server on http and https
sub run_server {
my $ d = shift ;
2022-10-19 15:24:24 +00:00
while ( 1 ) {
MAINLOOP: while ( my $ c = $ d - > accept ) {
while ( my $ r = $ c - > get_request ) {
if ( $ r - > method eq "GET" and $ r - > url - > path =~ m ^ /statuscode/ ( \ d + ) ^ ) {
$ c - > send_basic_header ( $ 1 ) ;
$ c - > send_crlf ;
} elsif ( $ r - > method eq "GET" and $ r - > url - > path =~ m ^ /file/ ( . * ) ^ ) {
$ c - > send_basic_header ;
$ c - > send_crlf ;
$ c - > send_file_response ( "$Bin/var/$1" ) ;
} elsif ( $ r - > method eq "GET" and $ r - > url - > path eq "/slow" ) {
$ c - > send_basic_header ;
$ c - > send_crlf ;
sleep 1 ;
$ c - > send_response ( "slow" ) ;
} elsif ( $ r - > url - > path eq "/method" ) {
if ( $ r - > method eq "DELETE" ) {
$ c - > send_error ( HTTP::Status - > RC_METHOD_NOT_ALLOWED ) ;
} elsif ( $ r - > method eq "foo" ) {
$ c - > send_error ( HTTP::Status - > RC_NOT_IMPLEMENTED ) ;
} else {
$ c - > send_status_line ( 200 , $ r - > method ) ;
}
} elsif ( $ r - > url - > path eq "/postdata" ) {
$ c - > send_basic_header ;
$ c - > send_crlf ;
$ c - > send_response ( $ r - > method . ":" . $ r - > content ) ;
} elsif ( $ r - > url - > path eq "/redirect" ) {
$ c - > send_redirect ( "/redirect2" ) ;
} elsif ( $ r - > url - > path eq "/redir_external" ) {
$ c - > send_redirect ( ( $ d - > isa ( 'HTTP::Daemon::SSL' ) ? "https" : "http" ) . "://169.254.169.254/redirect2" ) ;
} elsif ( $ r - > url - > path eq "/redirect2" ) {
$ c - > send_basic_header ;
$ c - > send_crlf ;
$ c - > send_response ( HTTP::Response - > new ( 200 , 'OK' , undef , 'redirected' ) ) ;
} elsif ( $ r - > url - > path eq "/redir_timeout" ) {
$ c - > send_redirect ( "/timeout" ) ;
} elsif ( $ r - > url - > path eq "/timeout" ) {
# Keep $c from being destroyed, but prevent severe leaks
unshift @ persist , $ c ;
delete ( $ persist [ 1000 ] ) ;
next MAINLOOP ;
} elsif ( $ r - > url - > path eq "/header_check" ) {
$ c - > send_basic_header ;
$ c - > send_header ( 'foo' ) ;
$ c - > send_crlf ;
} elsif ( $ r - > url - > path eq "/virtual_port" ) {
# return sent Host header
$ c - > send_basic_header ;
$ c - > send_crlf ;
$ c - > send_response ( HTTP::Response - > new ( 200 , 'OK' , undef , $ r - > header ( 'Host' ) ) ) ;
2023-02-02 09:13:25 +00:00
} elsif ( $ r - > url - > path eq "/chunked" ) {
my $ chunks = [ "chunked" , "encoding" , "test\n" ] ;
$ c - > send_response ( HTTP::Response - > new ( 200 , 'OK' , undef , sub {
my $ chunk = shift @ { $ chunks } ;
return unless $ chunk ;
sleep ( 1 ) ;
return ( $ chunk ) ;
} ) ) ;
2013-11-26 22:57:29 +00:00
} else {
2022-10-19 15:24:24 +00:00
$ c - > send_error ( HTTP::Status - > RC_FORBIDDEN ) ;
2013-11-26 22:57:29 +00:00
}
2022-10-19 15:24:24 +00:00
$ c - > close ;
2013-11-26 22:57:29 +00:00
}
}
}
}
2023-10-18 07:29:37 +00:00
sub run_hacked_http_server {
my $ socket = shift ;
# auto-flush on socket
$| = 1 ;
while ( 1 )
{
# waiting for a new client connection
my $ client_socket = $ socket - > accept ( ) ;
# get information about a newly connected client
my $ client_address = $ client_socket - > peerhost ( ) ;
my $ client_portn = $ client_socket - > peerport ( ) ;
print "connection from $client_address:$client_portn" ;
# read up to 1024 characters from the connected client
my $ data = "" ;
$ client_socket - > recv ( $ data , 1024 ) ;
print "received data: $data" ;
# write response data to the connected client
$ data = "HTTP/1.1 200 OK\r\nTransfer-Encoding: chunked\r\n\r\n0\r\n\r\n" ;
$ client_socket - > send ( $ data ) ;
# notify client that response has been sent
shutdown ( $ client_socket , 1 ) ;
}
}
2013-11-26 22:59:47 +00:00
END {
2013-11-26 22:57:29 +00:00
foreach my $ pid ( @ pids ) {
2013-11-26 22:59:47 +00:00
if ( $ pid ) { print "Killing $pid\n" ; kill "INT" , $ pid }
2013-11-26 22:57:29 +00:00
}
} ;
if ( $ ARGV [ 0 ] && $ ARGV [ 0 ] eq "-d" ) {
while ( 1 ) {
sleep 100 ;
}
}
my $ result ;
2020-12-10 20:00:09 +00:00
my $ command = "./$plugin -H 127.0.0.1" ;
2013-11-26 22:57:29 +00:00
2023-10-18 07:29:37 +00:00
run_chunked_encoding_special_test ( { command = > "$command -p $port_hacked_http" } ) ;
2013-11-26 22:57:29 +00:00
run_common_tests ( { command = > "$command -p $port_http" } ) ;
SKIP: {
skip "HTTP::Daemon::SSL not installed" , $ common_tests + $ ssl_only_tests if ! exists $ servers - > { https } ;
run_common_tests ( { command = > "$command -p $port_https" , ssl = > 1 } ) ;
2013-11-26 22:59:47 +00:00
2022-10-19 15:24:24 +00:00
my $ expiry = "Thu Nov 28 21:02:11 2030 +0000" ;
2013-11-26 22:57:29 +00:00
$ result = NPTest - > testCmd ( "$command -p $port_https -S -C 14" ) ;
is ( $ result - > return_code , 0 , "$command -p $port_https -S -C 14" ) ;
2022-10-19 15:24:24 +00:00
is ( $ result - > output , "OK - Certificate 'Monitoring Plugins' will expire on $expiry." , "output ok" ) ;
2013-11-26 22:57:29 +00:00
$ result = NPTest - > testCmd ( "$command -p $port_https -S -C 14000" ) ;
is ( $ result - > return_code , 1 , "$command -p $port_https -S -C 14000" ) ;
2022-10-19 15:24:24 +00:00
like ( $ result - > output , '/WARNING - Certificate \'Monitoring Plugins\' expires in \d+ day\(s\) \(' . quotemeta ( $ expiry ) . '\)./' , "output ok" ) ;
2013-11-26 22:57:29 +00:00
# Expired cert tests
2013-11-26 22:59:47 +00:00
$ result = NPTest - > testCmd ( "$command -p $port_https -S -C 13960,14000" ) ;
is ( $ result - > return_code , 2 , "$command -p $port_https -S -C 13960,14000" ) ;
2022-10-19 15:24:24 +00:00
like ( $ result - > output , '/CRITICAL - Certificate \'Monitoring Plugins\' expires in \d+ day\(s\) \(' . quotemeta ( $ expiry ) . '\)./' , "output ok" ) ;
2013-11-26 22:59:47 +00:00
2013-11-26 22:57:29 +00:00
$ result = NPTest - > testCmd ( "$command -p $port_https_expired -S -C 7" ) ;
is ( $ result - > return_code , 2 , "$command -p $port_https_expired -S -C 7" ) ;
2013-11-26 22:59:47 +00:00
is ( $ result - > output ,
2022-10-19 15:24:24 +00:00
'CRITICAL - Certificate \'Monitoring Plugins\' expired on Wed Jan 2 12:00:00 2008 +0000.' ,
2013-11-26 22:57:29 +00:00
"output ok" ) ;
2022-10-19 15:24:24 +00:00
# client cert tests
my $ cmd ;
$ cmd = "$command -p $port_https_clientcert"
. " -J \"$Bin/certs/client-cert.pem\""
. " -K \"$Bin/certs/client-key.pem\""
. " -u /statuscode/200" ;
$ result = NPTest - > testCmd ( $ cmd ) ;
is ( $ result - > return_code , 0 , $ cmd ) ;
like ( $ result - > output , '/^HTTP OK: HTTP/1.1 200 OK - \d+ bytes in [\d\.]+ second/' , "Output correct: " . $ result - > output ) ;
$ cmd = "$command -p $port_https_clientcert"
. " -J \"$Bin/certs/clientchain-cert.pem\""
. " -K \"$Bin/certs/clientchain-key.pem\""
. " -u /statuscode/200" ;
$ result = NPTest - > testCmd ( $ cmd ) ;
is ( $ result - > return_code , 0 , $ cmd ) ;
like ( $ result - > output , '/^HTTP OK: HTTP/1.1 200 OK - \d+ bytes in [\d\.]+ second/' , "Output correct: " . $ result - > output ) ;
2013-11-26 22:57:29 +00:00
}
2020-12-10 20:00:09 +00:00
my $ cmd ;
# check virtual port behaviour
#
# http without virtual port
$ cmd = "$command -p $port_http -u /virtual_port -r ^127.0.0.1:$port_http\$" ;
$ result = NPTest - > testCmd ( $ cmd ) ;
is ( $ result - > return_code , 0 , $ cmd ) ;
like ( $ result - > output , '/^HTTP OK: HTTP/1.1 200 OK - \d+ bytes in [\d\.]+ second/' , "Output correct: " . $ result - > output ) ;
# http with virtual port
$ cmd = "$command:80 -p $port_http -u /virtual_port -r ^127.0.0.1\$" ;
$ result = NPTest - > testCmd ( $ cmd ) ;
is ( $ result - > return_code , 0 , $ cmd ) ;
like ( $ result - > output , '/^HTTP OK: HTTP/1.1 200 OK - \d+ bytes in [\d\.]+ second/' , "Output correct: " . $ result - > output ) ;
SKIP: {
skip "HTTP::Daemon::SSL not installed" , 4 if ! exists $ servers - > { https } ;
# https without virtual port
$ cmd = "$command -p $port_https --ssl -u /virtual_port -r ^127.0.0.1:$port_https\$" ;
$ result = NPTest - > testCmd ( $ cmd ) ;
is ( $ result - > return_code , 0 , $ cmd ) ;
like ( $ result - > output , '/^HTTP OK: HTTP/1.1 200 OK - \d+ bytes in [\d\.]+ second/' , "Output correct: " . $ result - > output ) ;
# https with virtual port
$ cmd = "$command:443 -p $port_https --ssl -u /virtual_port -r ^127.0.0.1\$" ;
$ result = NPTest - > testCmd ( $ cmd ) ;
is ( $ result - > return_code , 0 , $ cmd ) ;
like ( $ result - > output , '/^HTTP OK: HTTP/1.1 200 OK - \d+ bytes in [\d\.]+ second/' , "Output correct: " . $ result - > output ) ;
}
2013-11-26 22:57:29 +00:00
sub run_common_tests {
my ( $ opts ) = @ _ ;
my $ command = $ opts - > { command } ;
if ( $ opts - > { ssl } ) {
$ command . = " --ssl" ;
}
$ result = NPTest - > testCmd ( "$command -u /file/root" ) ;
is ( $ result - > return_code , 0 , "/file/root" ) ;
like ( $ result - > output , '/^HTTP OK: HTTP/1.1 200 OK - 274 bytes in [\d\.]+ second/' , "Output correct" ) ;
$ result = NPTest - > testCmd ( "$command -u /file/root -s Root" ) ;
is ( $ result - > return_code , 0 , "/file/root search for string" ) ;
like ( $ result - > output , '/^HTTP OK: HTTP/1.1 200 OK - 274 bytes in [\d\.]+ second/' , "Output correct" ) ;
$ result = NPTest - > testCmd ( "$command -u /file/root -s NonRoot" ) ;
is ( $ result - > return_code , 2 , "Missing string check" ) ;
like ( $ result - > output , qr%^HTTP CRITICAL: HTTP/1\.1 200 OK - string 'NonRoot' not found on 'https?://127\.0\.0\.1:\d+/file/root'% , "Shows search string and location" ) ;
$ result = NPTest - > testCmd ( "$command -u /file/root -s NonRootWithOver30charsAndMoreFunThanAWetFish" ) ;
is ( $ result - > return_code , 2 , "Missing string check" ) ;
like ( $ result - > output , qr%HTTP CRITICAL: HTTP/1\.1 200 OK - string 'NonRootWithOver30charsAndM...' not found on 'https?://127\.0\.0\.1:\d+/file/root'% , "Shows search string and location" ) ;
2013-11-26 22:59:47 +00:00
$ result = NPTest - > testCmd ( "$command -u /header_check -d foo" ) ;
is ( $ result - > return_code , 0 , "header_check search for string" ) ;
like ( $ result - > output , '/^HTTP OK: HTTP/1.1 200 OK - 96 bytes in [\d\.]+ second/' , "Output correct" ) ;
$ result = NPTest - > testCmd ( "$command -u /header_check -d bar" ) ;
is ( $ result - > return_code , 2 , "Missing header string check" ) ;
like ( $ result - > output , qr%^HTTP CRITICAL: HTTP/1\.1 200 OK - header 'bar' not found on 'https?://127\.0\.0\.1:\d+/header_check'% , "Shows search string and location" ) ;
2013-11-26 22:57:29 +00:00
my $ cmd ;
$ cmd = "$command -u /slow" ;
$ result = NPTest - > testCmd ( $ cmd ) ;
is ( $ result - > return_code , 0 , "$cmd" ) ;
like ( $ result - > output , '/^HTTP OK: HTTP/1.1 200 OK - \d+ bytes in [\d\.]+ second/' , "Output correct: " . $ result - > output ) ;
$ result - > output =~ /in ([\d\.]+) second/ ;
cmp_ok ( $ 1 , ">" , 1 , "Time is > 1 second" ) ;
$ cmd = "$command -u /statuscode/200" ;
$ result = NPTest - > testCmd ( $ cmd ) ;
is ( $ result - > return_code , 0 , $ cmd ) ;
like ( $ result - > output , '/^HTTP OK: HTTP/1.1 200 OK - \d+ bytes in [\d\.]+ second/' , "Output correct: " . $ result - > output ) ;
$ cmd = "$command -u /statuscode/200 -e 200" ;
$ result = NPTest - > testCmd ( $ cmd ) ;
is ( $ result - > return_code , 0 , $ cmd ) ;
like ( $ result - > output , '/^HTTP OK: Status line output matched "200" - \d+ bytes in [\d\.]+ second/' , "Output correct: " . $ result - > output ) ;
$ cmd = "$command -u /statuscode/201" ;
$ result = NPTest - > testCmd ( $ cmd ) ;
is ( $ result - > return_code , 0 , $ cmd ) ;
like ( $ result - > output , '/^HTTP OK: HTTP/1.1 201 Created - \d+ bytes in [\d\.]+ second /' , "Output correct: " . $ result - > output ) ;
$ cmd = "$command -u /statuscode/201 -e 201" ;
$ result = NPTest - > testCmd ( $ cmd ) ;
is ( $ result - > return_code , 0 , $ cmd ) ;
like ( $ result - > output , '/^HTTP OK: Status line output matched "201" - \d+ bytes in [\d\.]+ second /' , "Output correct: " . $ result - > output ) ;
$ cmd = "$command -u /statuscode/201 -e 200" ;
$ result = NPTest - > testCmd ( $ cmd ) ;
is ( $ result - > return_code , 2 , $ cmd ) ;
like ( $ result - > output , '/^HTTP CRITICAL - Invalid HTTP response received from host on port \d+: HTTP/1.1 201 Created/' , "Output correct: " . $ result - > output ) ;
$ cmd = "$command -u /statuscode/200 -e 200,201,202" ;
$ result = NPTest - > testCmd ( $ cmd ) ;
is ( $ result - > return_code , 0 , $ cmd ) ;
like ( $ result - > output , '/^HTTP OK: Status line output matched "200,201,202" - \d+ bytes in [\d\.]+ second/' , "Output correct: " . $ result - > output ) ;
$ cmd = "$command -u /statuscode/201 -e 200,201,202" ;
$ result = NPTest - > testCmd ( $ cmd ) ;
is ( $ result - > return_code , 0 , $ cmd ) ;
like ( $ result - > output , '/^HTTP OK: Status line output matched "200,201,202" - \d+ bytes in [\d\.]+ second/' , "Output correct: " . $ result - > output ) ;
$ cmd = "$command -u /statuscode/203 -e 200,201,202" ;
$ result = NPTest - > testCmd ( $ cmd ) ;
is ( $ result - > return_code , 2 , $ cmd ) ;
like ( $ result - > output , '/^HTTP CRITICAL - Invalid HTTP response received from host on port (\d+): HTTP/1.1 203 Non-Authoritative Information/' , "Output correct: " . $ result - > output ) ;
$ cmd = "$command -j HEAD -u /method" ;
$ result = NPTest - > testCmd ( $ cmd ) ;
is ( $ result - > return_code , 0 , $ cmd ) ;
like ( $ result - > output , '/^HTTP OK: HTTP/1.1 200 HEAD - \d+ bytes in [\d\.]+ second/' , "Output correct: " . $ result - > output ) ;
$ cmd = "$command -j POST -u /method" ;
$ result = NPTest - > testCmd ( $ cmd ) ;
is ( $ result - > return_code , 0 , $ cmd ) ;
like ( $ result - > output , '/^HTTP OK: HTTP/1.1 200 POST - \d+ bytes in [\d\.]+ second/' , "Output correct: " . $ result - > output ) ;
$ cmd = "$command -j GET -u /method" ;
$ result = NPTest - > testCmd ( $ cmd ) ;
is ( $ result - > return_code , 0 , $ cmd ) ;
like ( $ result - > output , '/^HTTP OK: HTTP/1.1 200 GET - \d+ bytes in [\d\.]+ second/' , "Output correct: " . $ result - > output ) ;
$ cmd = "$command -u /method" ;
$ result = NPTest - > testCmd ( $ cmd ) ;
is ( $ result - > return_code , 0 , $ cmd ) ;
like ( $ result - > output , '/^HTTP OK: HTTP/1.1 200 GET - \d+ bytes in [\d\.]+ second/' , "Output correct: " . $ result - > output ) ;
$ cmd = "$command -P foo -u /method" ;
$ result = NPTest - > testCmd ( $ cmd ) ;
is ( $ result - > return_code , 0 , $ cmd ) ;
like ( $ result - > output , '/^HTTP OK: HTTP/1.1 200 POST - \d+ bytes in [\d\.]+ second/' , "Output correct: " . $ result - > output ) ;
$ cmd = "$command -j DELETE -u /method" ;
$ result = NPTest - > testCmd ( $ cmd ) ;
is ( $ result - > return_code , 1 , $ cmd ) ;
like ( $ result - > output , '/^HTTP WARNING: HTTP/1.1 405 Method Not Allowed/' , "Output correct: " . $ result - > output ) ;
$ cmd = "$command -j foo -u /method" ;
$ result = NPTest - > testCmd ( $ cmd ) ;
is ( $ result - > return_code , 2 , $ cmd ) ;
like ( $ result - > output , '/^HTTP CRITICAL: HTTP/1.1 501 Not Implemented/' , "Output correct: " . $ result - > output ) ;
$ cmd = "$command -P stufftoinclude -u /postdata -s POST:stufftoinclude" ;
$ result = NPTest - > testCmd ( $ cmd ) ;
is ( $ result - > return_code , 0 , $ cmd ) ;
like ( $ result - > output , '/^HTTP OK: HTTP/1.1 200 OK - \d+ bytes in [\d\.]+ second/' , "Output correct: " . $ result - > output ) ;
$ cmd = "$command -j PUT -P stufftoinclude -u /postdata -s PUT:stufftoinclude" ;
$ result = NPTest - > testCmd ( $ cmd ) ;
is ( $ result - > return_code , 0 , $ cmd ) ;
like ( $ result - > output , '/^HTTP OK: HTTP/1.1 200 OK - \d+ bytes in [\d\.]+ second/' , "Output correct: " . $ result - > output ) ;
# To confirm that the free doesn't segfault
$ cmd = "$command -P stufftoinclude -j PUT -u /postdata -s PUT:stufftoinclude" ;
$ result = NPTest - > testCmd ( $ cmd ) ;
is ( $ result - > return_code , 0 , $ cmd ) ;
like ( $ result - > output , '/^HTTP OK: HTTP/1.1 200 OK - \d+ bytes in [\d\.]+ second/' , "Output correct: " . $ result - > output ) ;
$ cmd = "$command -u /redirect" ;
$ result = NPTest - > testCmd ( $ cmd ) ;
is ( $ result - > return_code , 0 , $ cmd ) ;
like ( $ result - > output , '/^HTTP OK: HTTP/1.1 301 Moved Permanently - \d+ bytes in [\d\.]+ second/' , "Output correct: " . $ result - > output ) ;
$ cmd = "$command -f follow -u /redirect" ;
$ result = NPTest - > testCmd ( $ cmd ) ;
is ( $ result - > return_code , 0 , $ cmd ) ;
like ( $ result - > output , '/^HTTP OK: HTTP/1.1 200 OK - \d+ bytes in [\d\.]+ second/' , "Output correct: " . $ result - > output ) ;
$ cmd = "$command -u /redirect -k 'follow: me'" ;
$ result = NPTest - > testCmd ( $ cmd ) ;
is ( $ result - > return_code , 0 , $ cmd ) ;
like ( $ result - > output , '/^HTTP OK: HTTP/1.1 301 Moved Permanently - \d+ bytes in [\d\.]+ second/' , "Output correct: " . $ result - > output ) ;
$ cmd = "$command -f follow -u /redirect -k 'follow: me'" ;
$ result = NPTest - > testCmd ( $ cmd ) ;
is ( $ result - > return_code , 0 , $ cmd ) ;
like ( $ result - > output , '/^HTTP OK: HTTP/1.1 200 OK - \d+ bytes in [\d\.]+ second/' , "Output correct: " . $ result - > output ) ;
$ cmd = "$command -f sticky -u /redirect -k 'follow: me'" ;
$ result = NPTest - > testCmd ( $ cmd ) ;
is ( $ result - > return_code , 0 , $ cmd ) ;
like ( $ result - > output , '/^HTTP OK: HTTP/1.1 200 OK - \d+ bytes in [\d\.]+ second/' , "Output correct: " . $ result - > output ) ;
$ cmd = "$command -f stickyport -u /redirect -k 'follow: me'" ;
$ result = NPTest - > testCmd ( $ cmd ) ;
is ( $ result - > return_code , 0 , $ cmd ) ;
like ( $ result - > output , '/^HTTP OK: HTTP/1.1 200 OK - \d+ bytes in [\d\.]+ second/' , "Output correct: " . $ result - > output ) ;
# These tests may block
print "ALRM\n" ;
# stickyport - on full urlS port is set back to 80 otherwise
$ cmd = "$command -f stickyport -u /redir_external -t 5 -s redirected" ;
2022-10-19 15:24:24 +00:00
alarm ( 2 ) ;
2013-11-26 22:57:29 +00:00
eval {
local $ SIG { ALRM } = sub { die "alarm\n" } ;
$ result = NPTest - > testCmd ( $ cmd ) ;
2022-10-19 15:24:24 +00:00
} ;
2013-11-26 22:57:29 +00:00
isnt ( $@ , "alarm\n" , $ cmd ) ;
2022-10-19 15:24:24 +00:00
alarm ( 0 ) ;
2013-11-26 22:57:29 +00:00
is ( $ result - > return_code , 0 , $ cmd ) ;
# Let's hope there won't be any web server on :80 returning "redirected"!
$ cmd = "$command -f sticky -u /redir_external -t 5 -s redirected" ;
2022-10-19 15:24:24 +00:00
alarm ( 2 ) ;
2013-11-26 22:57:29 +00:00
eval {
local $ SIG { ALRM } = sub { die "alarm\n" } ;
$ result = NPTest - > testCmd ( $ cmd ) ;
2022-10-19 15:24:24 +00:00
} ;
2013-11-26 22:57:29 +00:00
isnt ( $@ , "alarm\n" , $ cmd ) ;
2022-10-19 15:24:24 +00:00
alarm ( 0 ) ;
2013-11-26 22:57:29 +00:00
isnt ( $ result - > return_code , 0 , $ cmd ) ;
# Test an external address - timeout
SKIP: {
2020-12-10 20:00:09 +00:00
skip "This doesn't seem to work all the time" , 1 unless ( $ ENV { HTTP_EXTERNAL } ) ;
2013-11-26 22:57:29 +00:00
$ cmd = "$command -f follow -u /redir_external -t 5" ;
eval {
2014-07-11 19:01:00 +00:00
$ result = NPTest - > testCmd ( $ cmd , 2 ) ;
} ;
like ( $@ , "/timeout in command: $cmd/" , $ cmd ) ;
2013-11-26 22:57:29 +00:00
}
$ cmd = "$command -u /timeout -t 5" ;
eval {
2014-07-11 19:01:00 +00:00
$ result = NPTest - > testCmd ( $ cmd , 2 ) ;
} ;
like ( $@ , "/timeout in command: $cmd/" , $ cmd ) ;
2013-11-26 22:57:29 +00:00
$ cmd = "$command -f follow -u /redir_timeout -t 2" ;
eval {
2014-07-11 19:01:00 +00:00
$ result = NPTest - > testCmd ( $ cmd , 5 ) ;
} ;
is ( $@ , "" , $ cmd ) ;
2013-11-26 22:57:29 +00:00
2023-02-02 09:13:25 +00:00
$ cmd = "$command -u /chunked -s 'chunkedencodingtest' -d 'Transfer-Encoding: chunked'" ;
eval {
$ result = NPTest - > testCmd ( $ cmd , 5 ) ;
} ;
is ( $@ , "" , $ cmd ) ;
2013-11-26 22:57:29 +00:00
}
2023-10-18 07:29:37 +00:00
sub run_chunked_encoding_special_test {
my ( $ opts ) = @ _ ;
my $ command = $ opts - > { command } ;
$ cmd = "$command -u / -s 'ChunkedEncodingSpecialTest'" ;
eval {
$ result = NPTest - > testCmd ( $ cmd , 5 ) ;
} ;
is ( $@ , "" , $ cmd ) ;
}