New upstream version 2.2
This commit is contained in:
		
							parent
							
								
									ea115afa68
								
							
						
					
					
						commit
						c845af032a
					
				
					 101 changed files with 4649 additions and 22969 deletions
				
			
		| 
						 | 
				
			
			@ -147,6 +147,7 @@ am__aclocal_m4_deps = $(top_srcdir)/m4/np_mysqlclient.m4 \
 | 
			
		|||
	$(top_srcdir)/gl/m4/stddef_h.m4 $(top_srcdir)/gl/m4/stdint.m4 \
 | 
			
		||||
	$(top_srcdir)/gl/m4/stdint_h.m4 $(top_srcdir)/gl/m4/stdio_h.m4 \
 | 
			
		||||
	$(top_srcdir)/gl/m4/stdlib_h.m4 $(top_srcdir)/gl/m4/strcase.m4 \
 | 
			
		||||
	$(top_srcdir)/gl/m4/strcasestr.m4 \
 | 
			
		||||
	$(top_srcdir)/gl/m4/strerror.m4 \
 | 
			
		||||
	$(top_srcdir)/gl/m4/string_h.m4 \
 | 
			
		||||
	$(top_srcdir)/gl/m4/strings_h.m4 \
 | 
			
		||||
| 
						 | 
				
			
			@ -1196,6 +1197,7 @@ PACKAGE_VERSION = @PACKAGE_VERSION@
 | 
			
		|||
PATH_SEPARATOR = @PATH_SEPARATOR@
 | 
			
		||||
PATH_TO_APTGET = @PATH_TO_APTGET@
 | 
			
		||||
PATH_TO_DIG = @PATH_TO_DIG@
 | 
			
		||||
PATH_TO_ENV = @PATH_TO_ENV@
 | 
			
		||||
PATH_TO_FPING = @PATH_TO_FPING@
 | 
			
		||||
PATH_TO_FPING6 = @PATH_TO_FPING6@
 | 
			
		||||
PATH_TO_LMSTAT = @PATH_TO_LMSTAT@
 | 
			
		||||
| 
						 | 
				
			
			@ -1213,6 +1215,7 @@ PATH_TO_SMBCLIENT = @PATH_TO_SMBCLIENT@
 | 
			
		|||
PATH_TO_SNMPGET = @PATH_TO_SNMPGET@
 | 
			
		||||
PATH_TO_SNMPGETNEXT = @PATH_TO_SNMPGETNEXT@
 | 
			
		||||
PATH_TO_SSH = @PATH_TO_SSH@
 | 
			
		||||
PATH_TO_SUDO = @PATH_TO_SUDO@
 | 
			
		||||
PATH_TO_SWAP = @PATH_TO_SWAP@
 | 
			
		||||
PATH_TO_SWAPINFO = @PATH_TO_SWAPINFO@
 | 
			
		||||
PATH_TO_UPTIME = @PATH_TO_UPTIME@
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -160,10 +160,10 @@ int process_arguments (int argc, char **argv) {
 | 
			
		|||
		switch(c) {
 | 
			
		||||
		case 'h':
 | 
			
		||||
			print_help();
 | 
			
		||||
			exit(STATE_OK);
 | 
			
		||||
			exit(STATE_UNKNOWN);
 | 
			
		||||
		case 'V':
 | 
			
		||||
			print_revision(progname, NP_VERSION);
 | 
			
		||||
			exit(STATE_OK);
 | 
			
		||||
			exit(STATE_UNKNOWN);
 | 
			
		||||
		case 'v':
 | 
			
		||||
			verbose++;
 | 
			
		||||
			break;
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -100,6 +100,13 @@ main (int argc, char **argv)
 | 
			
		|||
 | 
			
		||||
	result = cmd_run_array (commargv, &chld_out, &chld_err, 0);
 | 
			
		||||
 | 
			
		||||
	if (verbose) {
 | 
			
		||||
		for(i = 0; i < chld_out.lines; i++)
 | 
			
		||||
			printf("stdout: %s\n", chld_out.line[i]);
 | 
			
		||||
		for(i = 0; i < chld_err.lines; i++)
 | 
			
		||||
			printf("stderr: %s\n", chld_err.line[i]);
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if (skip_stdout == -1) /* --skip-stdout specified without argument */
 | 
			
		||||
		skip_stdout = chld_out.lines;
 | 
			
		||||
	if (skip_stderr == -1) /* --skip-stderr specified without argument */
 | 
			
		||||
| 
						 | 
				
			
			@ -209,10 +216,10 @@ process_arguments (int argc, char **argv)
 | 
			
		|||
		switch (c) {
 | 
			
		||||
		case 'V':									/* version */
 | 
			
		||||
			print_revision (progname, NP_VERSION);
 | 
			
		||||
			exit (STATE_OK);
 | 
			
		||||
			exit (STATE_UNKNOWN);
 | 
			
		||||
		case 'h':									/* help */
 | 
			
		||||
			print_help ();
 | 
			
		||||
			exit (STATE_OK);
 | 
			
		||||
			exit (STATE_UNKNOWN);
 | 
			
		||||
		case 'v':									/* help */
 | 
			
		||||
			verbose = TRUE;
 | 
			
		||||
			break;
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -200,7 +200,7 @@ int process_arguments(int argc, char **argv){
 | 
			
		|||
 | 
			
		||||
		case 'V': /* version */
 | 
			
		||||
			print_revision (progname, NP_VERSION);
 | 
			
		||||
			exit (STATE_OK);
 | 
			
		||||
			exit (STATE_UNKNOWN);
 | 
			
		||||
			break;
 | 
			
		||||
 | 
			
		||||
		case 'H': /* help */
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -368,10 +368,10 @@ process_arguments (int argc, char **argv)
 | 
			
		|||
			usage5 ();
 | 
			
		||||
		case 'h':     /* help */
 | 
			
		||||
			print_help ();
 | 
			
		||||
			exit (STATE_OK);
 | 
			
		||||
			exit (STATE_UNKNOWN);
 | 
			
		||||
		case 'V':     /* version */
 | 
			
		||||
			print_revision (progname, NP_VERSION);
 | 
			
		||||
			exit (STATE_OK);
 | 
			
		||||
			exit (STATE_UNKNOWN);
 | 
			
		||||
 | 
			
		||||
		case 'c':     /* critical range */
 | 
			
		||||
			critical_range = optarg;
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -48,7 +48,7 @@ void print_usage (void);
 | 
			
		|||
 | 
			
		||||
#define UNDEFINED 0
 | 
			
		||||
#define DEFAULT_PORT 53
 | 
			
		||||
#define DEFAULT_TRIES 3
 | 
			
		||||
#define DEFAULT_TRIES 2
 | 
			
		||||
 | 
			
		||||
char *query_address = NULL;
 | 
			
		||||
char *record_type = "A";
 | 
			
		||||
| 
						 | 
				
			
			@ -94,7 +94,7 @@ main (int argc, char **argv)
 | 
			
		|||
  timeout_interval_dig = timeout_interval / number_tries + number_tries;
 | 
			
		||||
 | 
			
		||||
  /* get the command to run */
 | 
			
		||||
  xasprintf (&command_line, "%s %s %s -p %d @%s %s %s +tries=%d +time=%d",
 | 
			
		||||
  xasprintf (&command_line, "%s %s %s -p %d @%s %s %s +retry=%d +time=%d",
 | 
			
		||||
            PATH_TO_DIG, dig_args, query_transport, server_port, dns_server, query_address, record_type, number_tries, timeout_interval_dig);
 | 
			
		||||
 | 
			
		||||
  alarm (timeout_interval);
 | 
			
		||||
| 
						 | 
				
			
			@ -125,7 +125,7 @@ main (int argc, char **argv)
 | 
			
		|||
        if (verbose)
 | 
			
		||||
          printf ("%s\n", chld_out.line[i]);
 | 
			
		||||
 | 
			
		||||
        if (strstr (chld_out.line[i], (expected_address == NULL ? query_address : expected_address)) != NULL) {
 | 
			
		||||
        if (strcasestr (chld_out.line[i], (expected_address == NULL ? query_address : expected_address)) != NULL) {
 | 
			
		||||
          msg = chld_out.line[i];
 | 
			
		||||
          result = STATE_OK;
 | 
			
		||||
 | 
			
		||||
| 
						 | 
				
			
			@ -223,10 +223,10 @@ process_arguments (int argc, char **argv)
 | 
			
		|||
    switch (c) {
 | 
			
		||||
    case 'h':                 /* help */
 | 
			
		||||
      print_help ();
 | 
			
		||||
      exit (STATE_OK);
 | 
			
		||||
      exit (STATE_UNKNOWN);
 | 
			
		||||
    case 'V':                 /* version */
 | 
			
		||||
      print_revision (progname, NP_VERSION);
 | 
			
		||||
      exit (STATE_OK);
 | 
			
		||||
      exit (STATE_UNKNOWN);
 | 
			
		||||
    case 'H':                 /* hostname */
 | 
			
		||||
      host_or_die(optarg);
 | 
			
		||||
      dns_server = optarg;
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -58,9 +58,6 @@ const char *email = "devel@monitoring-plugins.org";
 | 
			
		|||
# define ERROR -1
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
/* If nonzero, show inode information. */
 | 
			
		||||
static int inode_format = 1;
 | 
			
		||||
 | 
			
		||||
/* If nonzero, show even filesystems with zero size or
 | 
			
		||||
   uninteresting types. */
 | 
			
		||||
static int show_all_fs = 1;
 | 
			
		||||
| 
						 | 
				
			
			@ -178,7 +175,7 @@ main (int argc, char **argv)
 | 
			
		|||
  int temp_result;
 | 
			
		||||
 | 
			
		||||
  struct mount_entry *me;
 | 
			
		||||
  struct fs_usage fsp, tmpfsp;
 | 
			
		||||
  struct fs_usage fsp;
 | 
			
		||||
  struct parameter_list *temp_list, *path;
 | 
			
		||||
 | 
			
		||||
#ifdef __CYGWIN__
 | 
			
		||||
| 
						 | 
				
			
			@ -423,9 +420,7 @@ process_arguments (int argc, char **argv)
 | 
			
		|||
  int c, err;
 | 
			
		||||
  struct parameter_list *se;
 | 
			
		||||
  struct parameter_list *temp_list = NULL, *previous = NULL;
 | 
			
		||||
  struct parameter_list *temp_path_select_list = NULL;
 | 
			
		||||
  struct mount_entry *me, *temp_me;
 | 
			
		||||
  int result = OK;
 | 
			
		||||
  struct mount_entry *me;
 | 
			
		||||
  regex_t re;
 | 
			
		||||
  int cflags = REG_NOSUB | REG_EXTENDED;
 | 
			
		||||
  int default_cflags = cflags;
 | 
			
		||||
| 
						 | 
				
			
			@ -762,10 +757,10 @@ process_arguments (int argc, char **argv)
 | 
			
		|||
      break;
 | 
			
		||||
    case 'V':                 /* version */
 | 
			
		||||
      print_revision (progname, NP_VERSION);
 | 
			
		||||
      exit (STATE_OK);
 | 
			
		||||
      exit (STATE_UNKNOWN);
 | 
			
		||||
    case 'h':                 /* help */
 | 
			
		||||
      print_help ();
 | 
			
		||||
      exit (STATE_OK);
 | 
			
		||||
      exit (STATE_UNKNOWN);
 | 
			
		||||
    case '?':                 /* help */
 | 
			
		||||
      usage (_("Unknown argument"));
 | 
			
		||||
    }
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -81,7 +81,6 @@ main (int argc, char **argv)
 | 
			
		|||
  double elapsed_time;
 | 
			
		||||
  long microsec;
 | 
			
		||||
  struct timeval tv;
 | 
			
		||||
  int multi_address;
 | 
			
		||||
  int parse_address = FALSE; /* This flag scans for Address: but only after Name: */
 | 
			
		||||
  output chld_out, chld_err;
 | 
			
		||||
  size_t i;
 | 
			
		||||
| 
						 | 
				
			
			@ -127,7 +126,7 @@ main (int argc, char **argv)
 | 
			
		|||
    if (verbose)
 | 
			
		||||
      puts(chld_out.line[i]);
 | 
			
		||||
 | 
			
		||||
    if (strstr (chld_out.line[i], ".in-addr.arpa")) {
 | 
			
		||||
    if (strcasestr (chld_out.line[i], ".in-addr.arpa")) {
 | 
			
		||||
      if ((temp_buffer = strstr (chld_out.line[i], "name = ")))
 | 
			
		||||
        addresses[n_addresses++] = strdup (temp_buffer + 7);
 | 
			
		||||
      else {
 | 
			
		||||
| 
						 | 
				
			
			@ -249,11 +248,6 @@ main (int argc, char **argv)
 | 
			
		|||
  elapsed_time = (double)microsec / 1.0e6;
 | 
			
		||||
 | 
			
		||||
  if (result == STATE_OK) {
 | 
			
		||||
    if (strchr (address, ',') == NULL)
 | 
			
		||||
      multi_address = FALSE;
 | 
			
		||||
    else
 | 
			
		||||
      multi_address = TRUE;
 | 
			
		||||
 | 
			
		||||
    result = get_status(elapsed_time, time_thresholds);
 | 
			
		||||
    if (result == STATE_OK) {
 | 
			
		||||
      printf ("DNS %s: ", _("OK"));
 | 
			
		||||
| 
						 | 
				
			
			@ -395,10 +389,10 @@ process_arguments (int argc, char **argv)
 | 
			
		|||
    switch (c) {
 | 
			
		||||
    case 'h': /* help */
 | 
			
		||||
      print_help ();
 | 
			
		||||
      exit (STATE_OK);
 | 
			
		||||
      exit (STATE_UNKNOWN);
 | 
			
		||||
    case 'V': /* version */
 | 
			
		||||
      print_revision (progname, NP_VERSION);
 | 
			
		||||
      exit (STATE_OK);
 | 
			
		||||
      exit (STATE_UNKNOWN);
 | 
			
		||||
    case 'v': /* version */
 | 
			
		||||
      verbose = TRUE;
 | 
			
		||||
      break;
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -52,11 +52,11 @@ main (int argc, char **argv)
 | 
			
		|||
    usage4 (_("Could not parse arguments"));
 | 
			
		||||
  else if (strcmp (argv[1], "-V") == 0 || strcmp (argv[1], "--version") == 0) {
 | 
			
		||||
    print_revision (progname, NP_VERSION);
 | 
			
		||||
    exit (STATE_OK);
 | 
			
		||||
    exit (STATE_UNKNOWN);
 | 
			
		||||
  }
 | 
			
		||||
  else if (strcmp (argv[1], "-h") == 0 || strcmp (argv[1], "--help") == 0) {
 | 
			
		||||
    print_help ();
 | 
			
		||||
    exit (STATE_OK);
 | 
			
		||||
    exit (STATE_UNKNOWN);
 | 
			
		||||
  }
 | 
			
		||||
  else if (!is_integer (argv[1]))
 | 
			
		||||
    usage4 (_("Arguments to check_dummy must be an integer"));
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -105,7 +105,7 @@ main (int argc, char **argv)
 | 
			
		|||
    xasprintf(&option_string, "%s-I %s ", option_string, sourceif);
 | 
			
		||||
 | 
			
		||||
#ifdef PATH_TO_FPING6
 | 
			
		||||
  if (address_family == AF_INET6)
 | 
			
		||||
  if (address_family != AF_INET && is_inet6_addr(server))
 | 
			
		||||
    fping_prog = strdup(PATH_TO_FPING6);
 | 
			
		||||
  else
 | 
			
		||||
    fping_prog = strdup(PATH_TO_FPING);
 | 
			
		||||
| 
						 | 
				
			
			@ -314,10 +314,10 @@ process_arguments (int argc, char **argv)
 | 
			
		|||
      usage5 ();
 | 
			
		||||
    case 'h':                 /* help */
 | 
			
		||||
      print_help ();
 | 
			
		||||
      exit (STATE_OK);
 | 
			
		||||
      exit (STATE_UNKNOWN);
 | 
			
		||||
    case 'V':                 /* version */
 | 
			
		||||
      print_revision (progname, NP_VERSION);
 | 
			
		||||
      exit (STATE_OK);
 | 
			
		||||
      exit (STATE_UNKNOWN);
 | 
			
		||||
    case 'v':                 /* verbose mode */
 | 
			
		||||
      verbose = TRUE;
 | 
			
		||||
      break;
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -196,10 +196,10 @@ process_arguments (int argc, char **argv)
 | 
			
		|||
    switch (c) {
 | 
			
		||||
    case 'h': /* help */
 | 
			
		||||
      print_help ();
 | 
			
		||||
      exit (STATE_OK);
 | 
			
		||||
      exit (STATE_UNKNOWN);
 | 
			
		||||
    case 'V': /* version */
 | 
			
		||||
      print_revision (progname, NP_VERSION);
 | 
			
		||||
      exit (STATE_OK);
 | 
			
		||||
      exit (STATE_UNKNOWN);
 | 
			
		||||
    case 'v': /* version */
 | 
			
		||||
      verbose = TRUE;
 | 
			
		||||
      break;
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -350,10 +350,10 @@ process_arguments (int argc, char **argv)
 | 
			
		|||
			break;
 | 
			
		||||
		case 'V':									/* version */
 | 
			
		||||
			print_revision (progname, NP_VERSION);
 | 
			
		||||
			exit (STATE_OK);
 | 
			
		||||
			exit (STATE_UNKNOWN);
 | 
			
		||||
		case 'h':									/* help */
 | 
			
		||||
			print_help ();
 | 
			
		||||
			exit (STATE_OK);
 | 
			
		||||
			exit (STATE_UNKNOWN);
 | 
			
		||||
		case '?':									/* help */
 | 
			
		||||
			usage5 ();
 | 
			
		||||
		}
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -91,10 +91,12 @@ struct timeval tv_temp;
 | 
			
		|||
 | 
			
		||||
int specify_port = FALSE;
 | 
			
		||||
int server_port = HTTP_PORT;
 | 
			
		||||
int virtual_port = 0;
 | 
			
		||||
char server_port_text[6] = "";
 | 
			
		||||
char server_type[6] = "http";
 | 
			
		||||
char *server_address;
 | 
			
		||||
char *host_name;
 | 
			
		||||
int host_name_length;
 | 
			
		||||
char *server_url;
 | 
			
		||||
char *user_agent;
 | 
			
		||||
int server_url_length;
 | 
			
		||||
| 
						 | 
				
			
			@ -267,11 +269,11 @@ process_arguments (int argc, char **argv)
 | 
			
		|||
      break;
 | 
			
		||||
    case 'h': /* help */
 | 
			
		||||
      print_help ();
 | 
			
		||||
      exit (STATE_OK);
 | 
			
		||||
      exit (STATE_UNKNOWN);
 | 
			
		||||
      break;
 | 
			
		||||
    case 'V': /* version */
 | 
			
		||||
      print_revision (progname, NP_VERSION);
 | 
			
		||||
      exit (STATE_OK);
 | 
			
		||||
      exit (STATE_UNKNOWN);
 | 
			
		||||
      break;
 | 
			
		||||
    case 't': /* timeout period */
 | 
			
		||||
      if (!is_intnonneg (optarg))
 | 
			
		||||
| 
						 | 
				
			
			@ -343,9 +345,20 @@ process_arguments (int argc, char **argv)
 | 
			
		|||
         parameters, like -S and -C combinations */
 | 
			
		||||
      use_ssl = TRUE;
 | 
			
		||||
      if (c=='S' && optarg != NULL) {
 | 
			
		||||
        ssl_version = atoi(optarg);
 | 
			
		||||
        if (ssl_version < 1 || ssl_version > 3)
 | 
			
		||||
            usage4 (_("Invalid option - Valid values for SSL Version are 1 (TLSv1), 2 (SSLv2) or 3 (SSLv3)"));
 | 
			
		||||
        int got_plus = strchr(optarg, '+') != NULL;
 | 
			
		||||
 | 
			
		||||
        if (!strncmp (optarg, "1.2", 3))
 | 
			
		||||
          ssl_version = got_plus ? MP_TLSv1_2_OR_NEWER : MP_TLSv1_2;
 | 
			
		||||
        else if (!strncmp (optarg, "1.1", 3))
 | 
			
		||||
          ssl_version = got_plus ? MP_TLSv1_1_OR_NEWER : MP_TLSv1_1;
 | 
			
		||||
        else if (optarg[0] == '1')
 | 
			
		||||
          ssl_version = got_plus ? MP_TLSv1_OR_NEWER : MP_TLSv1;
 | 
			
		||||
        else if (optarg[0] == '3')
 | 
			
		||||
          ssl_version = got_plus ? MP_SSLv3_OR_NEWER : MP_SSLv3;
 | 
			
		||||
        else if (optarg[0] == '2')
 | 
			
		||||
          ssl_version = got_plus ? MP_SSLv2_OR_NEWER : MP_SSLv2;
 | 
			
		||||
        else
 | 
			
		||||
          usage4 (_("Invalid option - Valid SSL/TLS versions: 2, 3, 1, 1.1, 1.2 (with optional '+' suffix)"));
 | 
			
		||||
      }
 | 
			
		||||
      if (specify_port == FALSE)
 | 
			
		||||
        server_port = HTTPS_PORT;
 | 
			
		||||
| 
						 | 
				
			
			@ -380,11 +393,25 @@ process_arguments (int argc, char **argv)
 | 
			
		|||
    case 'H': /* Host Name (virtual host) */
 | 
			
		||||
      host_name = strdup (optarg);
 | 
			
		||||
      if (host_name[0] == '[') {
 | 
			
		||||
        if ((p = strstr (host_name, "]:")) != NULL) /* [IPv6]:port */
 | 
			
		||||
          server_port = atoi (p + 2);
 | 
			
		||||
        if ((p = strstr (host_name, "]:")) != NULL) { /* [IPv6]:port */
 | 
			
		||||
          virtual_port = atoi (p + 2);
 | 
			
		||||
          /* cut off the port */
 | 
			
		||||
	  host_name_length = strlen (host_name) - strlen (p) - 1;
 | 
			
		||||
          free (host_name);
 | 
			
		||||
          host_name = strndup (optarg, host_name_length);
 | 
			
		||||
          if (specify_port == FALSE)
 | 
			
		||||
            server_port = virtual_port;
 | 
			
		||||
	}
 | 
			
		||||
      } else if ((p = strchr (host_name, ':')) != NULL
 | 
			
		||||
                 && strchr (++p, ':') == NULL) /* IPv4:port or host:port */
 | 
			
		||||
          server_port = atoi (p);
 | 
			
		||||
                 && strchr (++p, ':') == NULL) { /* IPv4:port or host:port */
 | 
			
		||||
          virtual_port = atoi (p);
 | 
			
		||||
          /* cut off the port */
 | 
			
		||||
	  host_name_length = strlen (host_name) - strlen (p) - 1;
 | 
			
		||||
          free (host_name);
 | 
			
		||||
          host_name = strndup (optarg, host_name_length);
 | 
			
		||||
          if (specify_port == FALSE)
 | 
			
		||||
            server_port = virtual_port;
 | 
			
		||||
        }
 | 
			
		||||
      break;
 | 
			
		||||
    case 'I': /* Server IP-address */
 | 
			
		||||
      server_address = strdup (optarg);
 | 
			
		||||
| 
						 | 
				
			
			@ -539,9 +566,12 @@ process_arguments (int argc, char **argv)
 | 
			
		|||
  if (http_method == NULL)
 | 
			
		||||
    http_method = strdup ("GET");
 | 
			
		||||
 | 
			
		||||
  if (client_cert && !client_privkey) 
 | 
			
		||||
  if (client_cert && !client_privkey)
 | 
			
		||||
    usage4 (_("If you use a client certificate you must also specify a private key file"));
 | 
			
		||||
 | 
			
		||||
  if (virtual_port == 0)
 | 
			
		||||
    virtual_port = server_port;
 | 
			
		||||
 | 
			
		||||
  return TRUE;
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
| 
						 | 
				
			
			@ -869,53 +899,100 @@ check_http (void)
 | 
			
		|||
  double elapsed_time_transfer = 0.0;
 | 
			
		||||
  int page_len = 0;
 | 
			
		||||
  int result = STATE_OK;
 | 
			
		||||
  char *force_host_header = NULL;
 | 
			
		||||
 | 
			
		||||
  /* try to connect to the host at the given port number */
 | 
			
		||||
  gettimeofday (&tv_temp, NULL);
 | 
			
		||||
  if (my_tcp_connect (server_address, server_port, &sd) != STATE_OK)
 | 
			
		||||
    die (STATE_CRITICAL, _("HTTP CRITICAL - Unable to open TCP socket\n"));
 | 
			
		||||
  microsec_connect = deltime (tv_temp);
 | 
			
		||||
 | 
			
		||||
    /* if we are called with the -I option, the -j method is CONNECT and */
 | 
			
		||||
    /* we received -S for SSL, then we tunnel the request through a proxy*/
 | 
			
		||||
    /* @20100414, public[at]frank4dd.com, http://www.frank4dd.com/howto  */
 | 
			
		||||
 | 
			
		||||
    if ( server_address != NULL && strcmp(http_method, "CONNECT") == 0
 | 
			
		||||
      && host_name != NULL && use_ssl == TRUE) {
 | 
			
		||||
 | 
			
		||||
    if (verbose) printf ("Entering CONNECT tunnel mode with proxy %s:%d to dst %s:%d\n", server_address, server_port, host_name, HTTPS_PORT);
 | 
			
		||||
    asprintf (&buf, "%s %s:%d HTTP/1.1\r\n%s\r\n", http_method, host_name, HTTPS_PORT, user_agent);
 | 
			
		||||
    asprintf (&buf, "%sProxy-Connection: keep-alive\r\n", buf);
 | 
			
		||||
    asprintf (&buf, "%sHost: %s\r\n", buf, host_name);
 | 
			
		||||
    /* we finished our request, send empty line with CRLF */
 | 
			
		||||
    asprintf (&buf, "%s%s", buf, CRLF);
 | 
			
		||||
    if (verbose) printf ("%s\n", buf);
 | 
			
		||||
    send(sd, buf, strlen (buf), 0);
 | 
			
		||||
    buf[0]='\0';
 | 
			
		||||
 | 
			
		||||
    if (verbose) printf ("Receive response from proxy\n");
 | 
			
		||||
    read (sd, buffer, MAX_INPUT_BUFFER-1);
 | 
			
		||||
    if (verbose) printf ("%s", buffer);
 | 
			
		||||
    /* Here we should check if we got HTTP/1.1 200 Connection established */
 | 
			
		||||
  }
 | 
			
		||||
#ifdef HAVE_SSL
 | 
			
		||||
  elapsed_time_connect = (double)microsec_connect / 1.0e6;
 | 
			
		||||
  if (use_ssl == TRUE) {
 | 
			
		||||
    gettimeofday (&tv_temp, NULL);
 | 
			
		||||
    result = np_net_ssl_init_with_hostname_version_and_cert(sd, (use_sni ? host_name : NULL), ssl_version, client_cert, client_privkey);
 | 
			
		||||
    if (verbose) printf ("SSL initialized\n");
 | 
			
		||||
    if (result != STATE_OK)
 | 
			
		||||
      die (STATE_CRITICAL, NULL);
 | 
			
		||||
    microsec_ssl = deltime (tv_temp);
 | 
			
		||||
    elapsed_time_ssl = (double)microsec_ssl / 1.0e6;
 | 
			
		||||
    if (check_cert == TRUE) {
 | 
			
		||||
      result = np_net_ssl_check_cert(days_till_exp_warn, days_till_exp_crit);
 | 
			
		||||
      np_net_ssl_cleanup();
 | 
			
		||||
      if (sd) close(sd);
 | 
			
		||||
      np_net_ssl_cleanup();
 | 
			
		||||
      return result;
 | 
			
		||||
    }
 | 
			
		||||
  }
 | 
			
		||||
#endif /* HAVE_SSL */
 | 
			
		||||
 | 
			
		||||
  xasprintf (&buf, "%s %s %s\r\n%s\r\n", http_method, server_url, host_name ? "HTTP/1.1" : "HTTP/1.0", user_agent);
 | 
			
		||||
  if ( server_address != NULL && strcmp(http_method, "CONNECT") == 0
 | 
			
		||||
       && host_name != NULL && use_ssl == TRUE)
 | 
			
		||||
    asprintf (&buf, "%s %s %s\r\n%s\r\n", "GET", server_url, host_name ? "HTTP/1.1" : "HTTP/1.0", user_agent);
 | 
			
		||||
  else
 | 
			
		||||
    asprintf (&buf, "%s %s %s\r\n%s\r\n", http_method, server_url, host_name ? "HTTP/1.1" : "HTTP/1.0", user_agent);
 | 
			
		||||
 | 
			
		||||
  /* tell HTTP/1.1 servers not to keep the connection alive */
 | 
			
		||||
  xasprintf (&buf, "%sConnection: close\r\n", buf);
 | 
			
		||||
 | 
			
		||||
  /* check if Host header is explicitly set in options */
 | 
			
		||||
  if (http_opt_headers_count) {
 | 
			
		||||
    for (i = 0; i < http_opt_headers_count ; i++) {
 | 
			
		||||
      if (strncmp(http_opt_headers[i], "Host:", 5) == 0) {
 | 
			
		||||
        force_host_header = http_opt_headers[i];
 | 
			
		||||
      }
 | 
			
		||||
    }
 | 
			
		||||
  }
 | 
			
		||||
 | 
			
		||||
  /* optionally send the host header info */
 | 
			
		||||
  if (host_name) {
 | 
			
		||||
    /*
 | 
			
		||||
     * Specify the port only if we're using a non-default port (see RFC 2616,
 | 
			
		||||
     * 14.23).  Some server applications/configurations cause trouble if the
 | 
			
		||||
     * (default) port is explicitly specified in the "Host:" header line.
 | 
			
		||||
     */
 | 
			
		||||
    if ((use_ssl == FALSE && server_port == HTTP_PORT) ||
 | 
			
		||||
        (use_ssl == TRUE && server_port == HTTPS_PORT))
 | 
			
		||||
      xasprintf (&buf, "%sHost: %s\r\n", buf, host_name);
 | 
			
		||||
    else
 | 
			
		||||
      xasprintf (&buf, "%sHost: %s:%d\r\n", buf, host_name, server_port);
 | 
			
		||||
    if (force_host_header) {
 | 
			
		||||
      xasprintf (&buf, "%s%s\r\n", buf, force_host_header);
 | 
			
		||||
    }
 | 
			
		||||
    else {
 | 
			
		||||
      /*
 | 
			
		||||
       * Specify the port only if we're using a non-default port (see RFC 2616,
 | 
			
		||||
       * 14.23).  Some server applications/configurations cause trouble if the
 | 
			
		||||
       * (default) port is explicitly specified in the "Host:" header line.
 | 
			
		||||
       */
 | 
			
		||||
      if ((use_ssl == FALSE && virtual_port == HTTP_PORT) ||
 | 
			
		||||
          (use_ssl == TRUE && virtual_port == HTTPS_PORT) ||
 | 
			
		||||
          (server_address != NULL && strcmp(http_method, "CONNECT") == 0
 | 
			
		||||
         && host_name != NULL && use_ssl == TRUE))
 | 
			
		||||
        xasprintf (&buf, "%sHost: %s\r\n", buf, host_name);
 | 
			
		||||
      else
 | 
			
		||||
        xasprintf (&buf, "%sHost: %s:%d\r\n", buf, host_name, virtual_port);
 | 
			
		||||
    }
 | 
			
		||||
  }
 | 
			
		||||
 | 
			
		||||
  /* optionally send any other header tag */
 | 
			
		||||
  if (http_opt_headers_count) {
 | 
			
		||||
    for (i = 0; i < http_opt_headers_count ; i++) {
 | 
			
		||||
      xasprintf (&buf, "%s%s\r\n", buf, http_opt_headers[i]);
 | 
			
		||||
      if (force_host_header != http_opt_headers[i]) {
 | 
			
		||||
        xasprintf (&buf, "%s%s\r\n", buf, http_opt_headers[i]);
 | 
			
		||||
      }
 | 
			
		||||
    }
 | 
			
		||||
    /* This cannot be free'd here because a redirection will then try to access this and segfault */
 | 
			
		||||
    /* Covered in a testcase in tests/check_http.t */
 | 
			
		||||
| 
						 | 
				
			
			@ -964,6 +1041,10 @@ check_http (void)
 | 
			
		|||
      microsec_firstbyte = deltime (tv_temp);
 | 
			
		||||
      elapsed_time_firstbyte = (double)microsec_firstbyte / 1.0e6;
 | 
			
		||||
    }
 | 
			
		||||
    while (pos = memchr(buffer, '\0', i)) {
 | 
			
		||||
      /* replace nul character with a blank */
 | 
			
		||||
      *pos = ' ';
 | 
			
		||||
    }
 | 
			
		||||
    buffer[i] = '\0';
 | 
			
		||||
    xasprintf (&full_page_new, "%s%s", full_page, buffer);
 | 
			
		||||
    free (full_page);
 | 
			
		||||
| 
						 | 
				
			
			@ -1005,10 +1086,10 @@ check_http (void)
 | 
			
		|||
    die (STATE_CRITICAL, _("HTTP CRITICAL - No data received from host\n"));
 | 
			
		||||
 | 
			
		||||
  /* close the connection */
 | 
			
		||||
  if (sd) close(sd);
 | 
			
		||||
#ifdef HAVE_SSL
 | 
			
		||||
  np_net_ssl_cleanup();
 | 
			
		||||
#endif
 | 
			
		||||
  if (sd) close(sd);
 | 
			
		||||
 | 
			
		||||
  /* Save check time */
 | 
			
		||||
  microsec = deltime (tv);
 | 
			
		||||
| 
						 | 
				
			
			@ -1363,6 +1444,9 @@ redir (char *pos, char *status_line)
 | 
			
		|||
         MAX_PORT, server_type, server_address, server_port, server_url,
 | 
			
		||||
         display_html ? "</A>" : "");
 | 
			
		||||
 | 
			
		||||
  /* reset virtual port */
 | 
			
		||||
  virtual_port = server_port;
 | 
			
		||||
 | 
			
		||||
  if (verbose)
 | 
			
		||||
    printf (_("Redirection to %s://%s:%d%s\n"), server_type,
 | 
			
		||||
            host_name ? host_name : server_address, server_port, server_url);
 | 
			
		||||
| 
						 | 
				
			
			@ -1395,32 +1479,32 @@ char *perfd_time (double elapsed_time)
 | 
			
		|||
  return fperfdata ("time", elapsed_time, "s",
 | 
			
		||||
            thlds->warning?TRUE:FALSE, thlds->warning?thlds->warning->end:0,
 | 
			
		||||
            thlds->critical?TRUE:FALSE, thlds->critical?thlds->critical->end:0,
 | 
			
		||||
                   TRUE, 0, FALSE, 0);
 | 
			
		||||
                   TRUE, 0, TRUE, socket_timeout);
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
char *perfd_time_connect (double elapsed_time_connect)
 | 
			
		||||
{
 | 
			
		||||
  return fperfdata ("time_connect", elapsed_time_connect, "s", FALSE, 0, FALSE, 0, FALSE, 0, FALSE, 0);
 | 
			
		||||
  return fperfdata ("time_connect", elapsed_time_connect, "s", FALSE, 0, FALSE, 0, FALSE, 0, TRUE, socket_timeout);
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
char *perfd_time_ssl (double elapsed_time_ssl)
 | 
			
		||||
{
 | 
			
		||||
  return fperfdata ("time_ssl", elapsed_time_ssl, "s", FALSE, 0, FALSE, 0, FALSE, 0, FALSE, 0);
 | 
			
		||||
  return fperfdata ("time_ssl", elapsed_time_ssl, "s", FALSE, 0, FALSE, 0, FALSE, 0, TRUE, socket_timeout);
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
char *perfd_time_headers (double elapsed_time_headers)
 | 
			
		||||
{
 | 
			
		||||
  return fperfdata ("time_headers", elapsed_time_headers, "s", FALSE, 0, FALSE, 0, FALSE, 0, FALSE, 0);
 | 
			
		||||
  return fperfdata ("time_headers", elapsed_time_headers, "s", FALSE, 0, FALSE, 0, FALSE, 0, TRUE, socket_timeout);
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
char *perfd_time_firstbyte (double elapsed_time_firstbyte)
 | 
			
		||||
{
 | 
			
		||||
  return fperfdata ("time_firstbyte", elapsed_time_firstbyte, "s", FALSE, 0, FALSE, 0, FALSE, 0, FALSE, 0);
 | 
			
		||||
  return fperfdata ("time_firstbyte", elapsed_time_firstbyte, "s", FALSE, 0, FALSE, 0, FALSE, 0, TRUE, socket_timeout);
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
char *perfd_time_transfer (double elapsed_time_transfer)
 | 
			
		||||
{
 | 
			
		||||
  return fperfdata ("time_transfer", elapsed_time_transfer, "s", FALSE, 0, FALSE, 0, FALSE, 0, FALSE, 0);
 | 
			
		||||
  return fperfdata ("time_transfer", elapsed_time_transfer, "s", FALSE, 0, FALSE, 0, FALSE, 0, TRUE, socket_timeout);
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
char *perfd_size (int page_len)
 | 
			
		||||
| 
						 | 
				
			
			@ -1467,9 +1551,10 @@ print_help (void)
 | 
			
		|||
  printf (UT_IPv46);
 | 
			
		||||
 | 
			
		||||
#ifdef HAVE_SSL
 | 
			
		||||
  printf (" %s\n", "-S, --ssl=VERSION");
 | 
			
		||||
  printf (" %s\n", "-S, --ssl=VERSION[+]");
 | 
			
		||||
  printf ("    %s\n", _("Connect via SSL. Port defaults to 443. VERSION is optional, and prevents"));
 | 
			
		||||
  printf ("    %s\n", _("auto-negotiation (1 = TLSv1, 2 = SSLv2, 3 = SSLv3)."));
 | 
			
		||||
  printf ("    %s\n", _("auto-negotiation (2 = SSLv2, 3 = SSLv3, 1 = TLSv1, 1.1 = TLSv1.1,"));
 | 
			
		||||
  printf ("    %s\n", _("1.2 = TLSv1.2). With a '+' suffix, newer versions are also accepted."));
 | 
			
		||||
  printf (" %s\n", "--sni");
 | 
			
		||||
  printf ("    %s\n", _("Enable SSL/TLS hostname extension support (SNI)"));
 | 
			
		||||
  printf (" %s\n", "-C, --certificate=INTEGER[,INTEGER]");
 | 
			
		||||
| 
						 | 
				
			
			@ -1496,7 +1581,7 @@ print_help (void)
 | 
			
		|||
  printf ("    %s\n", _("URL to GET or POST (default: /)"));
 | 
			
		||||
  printf (" %s\n", "-P, --post=STRING");
 | 
			
		||||
  printf ("    %s\n", _("URL encoded http POST data"));
 | 
			
		||||
  printf (" %s\n", "-j, --method=STRING  (for example: HEAD, OPTIONS, TRACE, PUT, DELETE)");
 | 
			
		||||
  printf (" %s\n", "-j, --method=STRING  (for example: HEAD, OPTIONS, TRACE, PUT, DELETE, CONNECT)");
 | 
			
		||||
  printf ("    %s\n", _("Set HTTP method."));
 | 
			
		||||
  printf (" %s\n", "-N, --no-body");
 | 
			
		||||
  printf ("    %s\n", _("Don't wait for document body: stop reading after headers."));
 | 
			
		||||
| 
						 | 
				
			
			@ -1570,7 +1655,7 @@ print_help (void)
 | 
			
		|||
  printf (" %s\n", _("When the certificate of 'www.verisign.com' is valid for more than 14 days,"));
 | 
			
		||||
  printf (" %s\n", _("a STATE_OK is returned. When the certificate is still valid, but for less than"));
 | 
			
		||||
  printf (" %s\n", _("14 days, a STATE_WARNING is returned. A STATE_CRITICAL will be returned when"));
 | 
			
		||||
  printf (" %s\n", _("the certificate is expired."));
 | 
			
		||||
  printf (" %s\n\n", _("the certificate is expired."));
 | 
			
		||||
  printf ("\n");
 | 
			
		||||
  printf (" %s\n\n", "CHECK CERTIFICATE: check_http -H www.verisign.com -C 30,14");
 | 
			
		||||
  printf (" %s\n", _("When the certificate of 'www.verisign.com' is valid for more than 30 days,"));
 | 
			
		||||
| 
						 | 
				
			
			@ -1578,6 +1663,13 @@ print_help (void)
 | 
			
		|||
  printf (" %s\n", _("30 days, but more than 14 days, a STATE_WARNING is returned."));
 | 
			
		||||
  printf (" %s\n", _("A STATE_CRITICAL will be returned when certificate expires in less than 14 days"));
 | 
			
		||||
 | 
			
		||||
  printf (" %s\n\n", "CHECK SSL WEBSERVER CONTENT VIA PROXY USING HTTP 1.1 CONNECT: ");
 | 
			
		||||
  printf (" %s\n", _("check_http -I 192.168.100.35 -p 80 -u https://www.verisign.com/ -S -j CONNECT -H www.verisign.com "));
 | 
			
		||||
  printf (" %s\n", _("all these options are needed: -I <proxy> -p <proxy-port> -u <check-url> -S(sl) -j CONNECT -H <webserver>"));
 | 
			
		||||
  printf (" %s\n", _("a STATE_OK will be returned. When the server returns its content but exceeds"));
 | 
			
		||||
  printf (" %s\n", _("the 5-second threshold, a STATE_WARNING will be returned. When an error occurs,"));
 | 
			
		||||
  printf (" %s\n", _("a STATE_CRITICAL will be returned."));
 | 
			
		||||
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
  printf (UT_SUPPORT);
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -166,7 +166,6 @@ enum SmartCommand
 | 
			
		|||
 | 
			
		||||
char *get_offline_text (int);
 | 
			
		||||
int smart_read_values (int, values_t *);
 | 
			
		||||
int values_not_passed (values_t *, thresholds_t *);
 | 
			
		||||
int nagios (values_t *, thresholds_t *);
 | 
			
		||||
void print_value (value_t *, threshold_t *);
 | 
			
		||||
void print_values (values_t *, thresholds_t *);
 | 
			
		||||
| 
						 | 
				
			
			@ -234,10 +233,10 @@ main (int argc, char *argv[])
 | 
			
		|||
			break;
 | 
			
		||||
		case 'h':
 | 
			
		||||
			print_help ();
 | 
			
		||||
			return STATE_OK;
 | 
			
		||||
			return STATE_UNKNOWN;
 | 
			
		||||
		case 'V':
 | 
			
		||||
			print_revision (progname, NP_VERSION);
 | 
			
		||||
			return STATE_OK;
 | 
			
		||||
			return STATE_UNKNOWN;
 | 
			
		||||
		default:
 | 
			
		||||
			usage5 ();
 | 
			
		||||
		}
 | 
			
		||||
| 
						 | 
				
			
			@ -249,7 +248,7 @@ main (int argc, char *argv[])
 | 
			
		|||
 | 
			
		||||
	if (!device) {
 | 
			
		||||
		print_help ();
 | 
			
		||||
		return STATE_OK;
 | 
			
		||||
		return STATE_UNKNOWN;
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	fd = open (device, OPEN_MODE);
 | 
			
		||||
| 
						 | 
				
			
			@ -339,31 +338,6 @@ smart_read_values (int fd, values_t * values)
 | 
			
		|||
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
int
 | 
			
		||||
values_not_passed (values_t * p, thresholds_t * t) 
 | 
			
		||||
{
 | 
			
		||||
	value_t * value = p->values;
 | 
			
		||||
	threshold_t * threshold = t->thresholds;
 | 
			
		||||
	int failed = 0;
 | 
			
		||||
	int passed = 0;
 | 
			
		||||
	int i;
 | 
			
		||||
	for (i = 0; i < NR_ATTRIBUTES; i++) {
 | 
			
		||||
		if (value->id && threshold->id && value->id == threshold->id) {
 | 
			
		||||
			if (value->value < threshold->threshold) {
 | 
			
		||||
				++failed;
 | 
			
		||||
			}
 | 
			
		||||
			else {
 | 
			
		||||
				++passed;
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
		++value;
 | 
			
		||||
		++threshold;
 | 
			
		||||
	}
 | 
			
		||||
	return (passed ? -failed : 2);
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
int
 | 
			
		||||
nagios (values_t * p, thresholds_t * t) 
 | 
			
		||||
{
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -1,29 +1,29 @@
 | 
			
		|||
/*****************************************************************************
 | 
			
		||||
* 
 | 
			
		||||
*
 | 
			
		||||
* Monitoring check_ldap plugin
 | 
			
		||||
* 
 | 
			
		||||
*
 | 
			
		||||
* License: GPL
 | 
			
		||||
* Copyright (c) 2000-2008 Monitoring Plugins Development Team
 | 
			
		||||
* 
 | 
			
		||||
*
 | 
			
		||||
* Description:
 | 
			
		||||
* 
 | 
			
		||||
*
 | 
			
		||||
* This file contains the check_ldap plugin
 | 
			
		||||
* 
 | 
			
		||||
* 
 | 
			
		||||
*
 | 
			
		||||
*
 | 
			
		||||
* This program is free software: you can redistribute it and/or modify
 | 
			
		||||
* it under the terms of the GNU General Public License as published by
 | 
			
		||||
* the Free Software Foundation, either version 3 of the License, or
 | 
			
		||||
* (at your option) any later version.
 | 
			
		||||
* 
 | 
			
		||||
*
 | 
			
		||||
* This program is distributed in the hope that it will be useful,
 | 
			
		||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
 | 
			
		||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 | 
			
		||||
* GNU General Public License for more details.
 | 
			
		||||
* 
 | 
			
		||||
*
 | 
			
		||||
* You should have received a copy of the GNU General Public License
 | 
			
		||||
* along with this program.  If not, see <http://www.gnu.org/licenses/>.
 | 
			
		||||
* 
 | 
			
		||||
* 
 | 
			
		||||
*
 | 
			
		||||
*
 | 
			
		||||
*****************************************************************************/
 | 
			
		||||
 | 
			
		||||
/* progname may be check_ldaps */
 | 
			
		||||
| 
						 | 
				
			
			@ -67,7 +67,10 @@ int ld_protocol = DEFAULT_PROTOCOL;
 | 
			
		|||
#endif
 | 
			
		||||
double warn_time = UNDEFINED;
 | 
			
		||||
double crit_time = UNDEFINED;
 | 
			
		||||
thresholds *entries_thresholds = NULL;
 | 
			
		||||
struct timeval tv;
 | 
			
		||||
char* warn_entries = NULL;
 | 
			
		||||
char* crit_entries = NULL;
 | 
			
		||||
int starttls = FALSE;
 | 
			
		||||
int ssl_on_connect = FALSE;
 | 
			
		||||
int verbose = 0;
 | 
			
		||||
| 
						 | 
				
			
			@ -94,6 +97,12 @@ main (int argc, char *argv[])
 | 
			
		|||
	int tls;
 | 
			
		||||
	int version=3;
 | 
			
		||||
 | 
			
		||||
	/* for entry counting */
 | 
			
		||||
 | 
			
		||||
	LDAPMessage *next_entry;
 | 
			
		||||
	int status_entries = STATE_OK;
 | 
			
		||||
	int num_entries = 0;
 | 
			
		||||
 | 
			
		||||
	setlocale (LC_ALL, "");
 | 
			
		||||
	bindtextdomain (PACKAGE, LOCALEDIR);
 | 
			
		||||
	textdomain (PACKAGE);
 | 
			
		||||
| 
						 | 
				
			
			@ -197,12 +206,14 @@ main (int argc, char *argv[])
 | 
			
		|||
	}
 | 
			
		||||
 | 
			
		||||
	/* do a search of all objectclasses in the base dn */
 | 
			
		||||
	if (ldap_search_s (ld, ld_base, LDAP_SCOPE_BASE, ld_attr, NULL, 0, &result)
 | 
			
		||||
	if (ldap_search_s (ld, ld_base, (crit_entries!=NULL || warn_entries!=NULL) ? LDAP_SCOPE_SUBTREE : LDAP_SCOPE_BASE, ld_attr, NULL, 0, &result)
 | 
			
		||||
			!= LDAP_SUCCESS) {
 | 
			
		||||
		if (verbose)
 | 
			
		||||
			ldap_perror(ld, "ldap_search");
 | 
			
		||||
		printf (_("Could not search/find objectclasses in %s\n"), ld_base);
 | 
			
		||||
		return STATE_CRITICAL;
 | 
			
		||||
	} else if (crit_entries!=NULL || warn_entries!=NULL) {
 | 
			
		||||
		num_entries = ldap_count_entries(ld, result);
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	/* unbind from the ldap server */
 | 
			
		||||
| 
						 | 
				
			
			@ -223,14 +234,42 @@ main (int argc, char *argv[])
 | 
			
		|||
	else
 | 
			
		||||
		status = STATE_OK;
 | 
			
		||||
 | 
			
		||||
	if(entries_thresholds != NULL) {
 | 
			
		||||
		if (verbose) {
 | 
			
		||||
			printf ("entries found: %d\n", num_entries);
 | 
			
		||||
			print_thresholds("entry threasholds", entries_thresholds);
 | 
			
		||||
		}
 | 
			
		||||
		status_entries = get_status(num_entries, entries_thresholds);
 | 
			
		||||
		if (status_entries == STATE_CRITICAL) {
 | 
			
		||||
			status = STATE_CRITICAL;
 | 
			
		||||
		} else if (status != STATE_CRITICAL) {
 | 
			
		||||
			status = status_entries;
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	/* print out the result */
 | 
			
		||||
	printf (_("LDAP %s - %.3f seconds response time|%s\n"),
 | 
			
		||||
	        state_text (status),
 | 
			
		||||
	        elapsed_time,
 | 
			
		||||
	        fperfdata ("time", elapsed_time, "s",
 | 
			
		||||
	                  (int)warn_time, warn_time,
 | 
			
		||||
	                  (int)crit_time, crit_time,
 | 
			
		||||
	                  TRUE, 0, FALSE, 0));
 | 
			
		||||
	if (crit_entries!=NULL || warn_entries!=NULL) {
 | 
			
		||||
		printf (_("LDAP %s - found %d entries in %.3f seconds|%s %s\n"),
 | 
			
		||||
			state_text (status),
 | 
			
		||||
			num_entries,
 | 
			
		||||
			elapsed_time,
 | 
			
		||||
			fperfdata ("time", elapsed_time, "s",
 | 
			
		||||
				(int)warn_time, warn_time,
 | 
			
		||||
				(int)crit_time, crit_time,
 | 
			
		||||
				TRUE, 0, FALSE, 0),
 | 
			
		||||
			sperfdata ("entries", (double)num_entries, "",
 | 
			
		||||
				warn_entries,
 | 
			
		||||
				crit_entries,
 | 
			
		||||
				TRUE, 0.0, FALSE, 0.0));
 | 
			
		||||
	} else {
 | 
			
		||||
		printf (_("LDAP %s - %.3f seconds response time|%s\n"),
 | 
			
		||||
			state_text (status),
 | 
			
		||||
			elapsed_time,
 | 
			
		||||
			fperfdata ("time", elapsed_time, "s",
 | 
			
		||||
				(int)warn_time, warn_time,
 | 
			
		||||
				(int)crit_time, crit_time,
 | 
			
		||||
				TRUE, 0, FALSE, 0));
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	return status;
 | 
			
		||||
}
 | 
			
		||||
| 
						 | 
				
			
			@ -263,6 +302,8 @@ process_arguments (int argc, char **argv)
 | 
			
		|||
		{"port", required_argument, 0, 'p'},
 | 
			
		||||
		{"warn", required_argument, 0, 'w'},
 | 
			
		||||
		{"crit", required_argument, 0, 'c'},
 | 
			
		||||
		{"warn-entries", required_argument, 0, 'W'},
 | 
			
		||||
		{"crit-entries", required_argument, 0, 'C'},
 | 
			
		||||
		{"verbose", no_argument, 0, 'v'},
 | 
			
		||||
		{0, 0, 0, 0}
 | 
			
		||||
	};
 | 
			
		||||
| 
						 | 
				
			
			@ -276,7 +317,7 @@ process_arguments (int argc, char **argv)
 | 
			
		|||
	}
 | 
			
		||||
 | 
			
		||||
	while (1) {
 | 
			
		||||
		c = getopt_long (argc, argv, "hvV234TS6t:c:w:H:b:p:a:D:P:", longopts, &option);
 | 
			
		||||
		c = getopt_long (argc, argv, "hvV234TS6t:c:w:H:b:p:a:D:P:C:W:", longopts, &option);
 | 
			
		||||
 | 
			
		||||
		if (c == -1 || c == EOF)
 | 
			
		||||
			break;
 | 
			
		||||
| 
						 | 
				
			
			@ -284,10 +325,10 @@ process_arguments (int argc, char **argv)
 | 
			
		|||
		switch (c) {
 | 
			
		||||
		case 'h':									/* help */
 | 
			
		||||
			print_help ();
 | 
			
		||||
			exit (STATE_OK);
 | 
			
		||||
			exit (STATE_UNKNOWN);
 | 
			
		||||
		case 'V':									/* version */
 | 
			
		||||
			print_revision (progname, NP_VERSION);
 | 
			
		||||
			exit (STATE_OK);
 | 
			
		||||
			exit (STATE_UNKNOWN);
 | 
			
		||||
		case 't':									/* timeout period */
 | 
			
		||||
			if (!is_intnonneg (optarg))
 | 
			
		||||
				usage2 (_("Timeout interval must be a positive integer"), optarg);
 | 
			
		||||
| 
						 | 
				
			
			@ -318,6 +359,12 @@ process_arguments (int argc, char **argv)
 | 
			
		|||
		case 'c':
 | 
			
		||||
			crit_time = strtod (optarg, NULL);
 | 
			
		||||
			break;
 | 
			
		||||
		case 'W':
 | 
			
		||||
			warn_entries = optarg;
 | 
			
		||||
			break;
 | 
			
		||||
		case 'C':
 | 
			
		||||
			crit_entries = optarg;
 | 
			
		||||
			break;
 | 
			
		||||
#ifdef HAVE_LDAP_SET_OPTION
 | 
			
		||||
		case '2':
 | 
			
		||||
			ld_protocol = 2;
 | 
			
		||||
| 
						 | 
				
			
			@ -381,6 +428,10 @@ validate_arguments ()
 | 
			
		|||
	if (ld_base==NULL)
 | 
			
		||||
		usage4 (_("Please specify the LDAP base\n"));
 | 
			
		||||
 | 
			
		||||
	if (crit_entries!=NULL || warn_entries!=NULL) {
 | 
			
		||||
		set_thresholds(&entries_thresholds,
 | 
			
		||||
			warn_entries, crit_entries);
 | 
			
		||||
	}
 | 
			
		||||
	return OK;
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
| 
						 | 
				
			
			@ -430,6 +481,11 @@ print_help (void)
 | 
			
		|||
 | 
			
		||||
	printf (UT_WARN_CRIT);
 | 
			
		||||
 | 
			
		||||
  printf (" %s\n", "-W [--warn-entries]");
 | 
			
		||||
  printf ("    %s\n", _("Number of found entries to result in warning status"));
 | 
			
		||||
  printf (" %s\n", "-C [--crit-entries]");
 | 
			
		||||
  printf ("    %s\n", _("Number of found entries to result in critical status"));
 | 
			
		||||
 | 
			
		||||
	printf (UT_CONN_TIMEOUT, DEFAULT_SOCKET_TIMEOUT);
 | 
			
		||||
 | 
			
		||||
	printf (UT_VERBOSE);
 | 
			
		||||
| 
						 | 
				
			
			@ -441,6 +497,7 @@ print_help (void)
 | 
			
		|||
	printf (" %s\n", _("'SSL on connect' will be used no matter how the plugin was called."));
 | 
			
		||||
	printf (" %s\n", _("This detection is deprecated, please use 'check_ldap' with the '--starttls' or '--ssl' flags"));
 | 
			
		||||
	printf (" %s\n", _("to define the behaviour explicitly instead."));
 | 
			
		||||
	printf (" %s\n", _("The parameters --warn-entries and --crit-entries are optional."));
 | 
			
		||||
 | 
			
		||||
	printf (UT_SUPPORT);
 | 
			
		||||
}
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -160,7 +160,7 @@ main (int argc, char **argv)
 | 
			
		|||
	    sscanf (input_buffer, "%*[^l]load averages: %lf, %lf, %lf", &la1, &la5, &la15);
 | 
			
		||||
    }
 | 
			
		||||
    else {
 | 
			
		||||
		printf (_("could not parse load from uptime: %s\n"), result, PATH_TO_UPTIME);
 | 
			
		||||
		printf (_("could not parse load from uptime %s: %s\n"), PATH_TO_UPTIME, result);
 | 
			
		||||
		return STATE_UNKNOWN;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
| 
						 | 
				
			
			@ -251,10 +251,10 @@ process_arguments (int argc, char **argv)
 | 
			
		|||
			break;
 | 
			
		||||
		case 'V':									/* version */
 | 
			
		||||
			print_revision (progname, NP_VERSION);
 | 
			
		||||
			exit (STATE_OK);
 | 
			
		||||
			exit (STATE_UNKNOWN);
 | 
			
		||||
		case 'h':									/* help */
 | 
			
		||||
			print_help ();
 | 
			
		||||
			exit (STATE_OK);
 | 
			
		||||
			exit (STATE_UNKNOWN);
 | 
			
		||||
		case '?':									/* help */
 | 
			
		||||
			usage5 ();
 | 
			
		||||
		}
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -234,10 +234,10 @@ process_arguments (int argc, char **argv)
 | 
			
		|||
			break;
 | 
			
		||||
		case 'V':									/* version */
 | 
			
		||||
			print_revision (progname, NP_VERSION);
 | 
			
		||||
			exit (STATE_OK);
 | 
			
		||||
			exit (STATE_UNKNOWN);
 | 
			
		||||
		case 'h':									/* help */
 | 
			
		||||
			print_help ();
 | 
			
		||||
			exit (STATE_OK);
 | 
			
		||||
			exit (STATE_UNKNOWN);
 | 
			
		||||
		case '?':									/* help */
 | 
			
		||||
			usage5 ();
 | 
			
		||||
		}
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -148,37 +148,37 @@ main (int argc, char **argv)
 | 
			
		|||
 | 
			
		||||
	/* report incoming traffic in Bytes/sec */
 | 
			
		||||
	if (incoming_rate < 1024) {
 | 
			
		||||
		strcpy (incoming_speed_rating, "B/s");
 | 
			
		||||
		strcpy (incoming_speed_rating, "B");
 | 
			
		||||
		adjusted_incoming_rate = (double) incoming_rate;
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	/* report incoming traffic in KBytes/sec */
 | 
			
		||||
	else if (incoming_rate < (1024 * 1024)) {
 | 
			
		||||
		strcpy (incoming_speed_rating, "KB/s");
 | 
			
		||||
		strcpy (incoming_speed_rating, "KB");
 | 
			
		||||
		adjusted_incoming_rate = (double) (incoming_rate / 1024.0);
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	/* report incoming traffic in MBytes/sec */
 | 
			
		||||
	else {
 | 
			
		||||
		strcpy (incoming_speed_rating, "MB/s");
 | 
			
		||||
		strcpy (incoming_speed_rating, "MB");
 | 
			
		||||
		adjusted_incoming_rate = (double) (incoming_rate / 1024.0 / 1024.0);
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	/* report outgoing traffic in Bytes/sec */
 | 
			
		||||
	if (outgoing_rate < 1024) {
 | 
			
		||||
		strcpy (outgoing_speed_rating, "B/s");
 | 
			
		||||
		strcpy (outgoing_speed_rating, "B");
 | 
			
		||||
		adjusted_outgoing_rate = (double) outgoing_rate;
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	/* report outgoing traffic in KBytes/sec */
 | 
			
		||||
	else if (outgoing_rate < (1024 * 1024)) {
 | 
			
		||||
		strcpy (outgoing_speed_rating, "KB/s");
 | 
			
		||||
		strcpy (outgoing_speed_rating, "KB");
 | 
			
		||||
		adjusted_outgoing_rate = (double) (outgoing_rate / 1024.0);
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	/* report outgoing traffic in MBytes/sec */
 | 
			
		||||
	else {
 | 
			
		||||
		strcpy (outgoing_speed_rating, "MB/s");
 | 
			
		||||
		strcpy (outgoing_speed_rating, "MB");
 | 
			
		||||
		adjusted_outgoing_rate = (double) (outgoing_rate / 1024.0 / 1024.0);
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
| 
						 | 
				
			
			@ -191,7 +191,7 @@ main (int argc, char **argv)
 | 
			
		|||
		result = STATE_WARNING;
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	xasprintf (&error_message, _("%s. In = %0.1f %s, %s. Out = %0.1f %s|%s %s\n"),
 | 
			
		||||
	xasprintf (&error_message, _("%s. In = %0.1f %s/s, %s. Out = %0.1f %s/s|%s %s\n"),
 | 
			
		||||
	          (use_average == TRUE) ? _("Avg") : _("Max"), adjusted_incoming_rate,
 | 
			
		||||
	          incoming_speed_rating, (use_average == TRUE) ? _("Avg") : _("Max"),
 | 
			
		||||
	          adjusted_outgoing_rate, outgoing_speed_rating,
 | 
			
		||||
| 
						 | 
				
			
			@ -270,10 +270,10 @@ process_arguments (int argc, char **argv)
 | 
			
		|||
			break;
 | 
			
		||||
		case 'V':									/* version */
 | 
			
		||||
			print_revision (progname, NP_VERSION);
 | 
			
		||||
			exit (STATE_OK);
 | 
			
		||||
			exit (STATE_UNKNOWN);
 | 
			
		||||
		case 'h':									/* help */
 | 
			
		||||
			print_help ();
 | 
			
		||||
			exit (STATE_OK);
 | 
			
		||||
			exit (STATE_UNKNOWN);
 | 
			
		||||
		case '?':									/* help */
 | 
			
		||||
			usage5 ();
 | 
			
		||||
		}
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -444,10 +444,10 @@ process_arguments (int argc, char **argv)
 | 
			
		|||
			break;
 | 
			
		||||
		case 'V':									/* version */
 | 
			
		||||
			print_revision (progname, NP_VERSION);
 | 
			
		||||
			exit (STATE_OK);
 | 
			
		||||
			exit (STATE_UNKNOWN);
 | 
			
		||||
		case 'h':									/* help */
 | 
			
		||||
			print_help ();
 | 
			
		||||
			exit (STATE_OK);
 | 
			
		||||
			exit (STATE_UNKNOWN);
 | 
			
		||||
		case 'v':
 | 
			
		||||
			verbose++;
 | 
			
		||||
			break;
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -250,10 +250,10 @@ process_arguments (int argc, char **argv)
 | 
			
		|||
			break;
 | 
			
		||||
		case 'V':									/* version */
 | 
			
		||||
			print_revision (progname, NP_VERSION);
 | 
			
		||||
			exit (STATE_OK);
 | 
			
		||||
			exit (STATE_UNKNOWN);
 | 
			
		||||
		case 'h':									/* help */
 | 
			
		||||
			print_help ();
 | 
			
		||||
			exit (STATE_OK);
 | 
			
		||||
			exit (STATE_UNKNOWN);
 | 
			
		||||
		case 'q':
 | 
			
		||||
			xasprintf(&sql_query, "%s", optarg);
 | 
			
		||||
			break;
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -235,10 +235,10 @@ process_arguments (int argc, char **argv)
 | 
			
		|||
		switch (c) {
 | 
			
		||||
		case 'h':									/* help */
 | 
			
		||||
			print_help ();
 | 
			
		||||
			exit (STATE_OK);
 | 
			
		||||
			exit (STATE_UNKNOWN);
 | 
			
		||||
		case 'V':									/* version */
 | 
			
		||||
			print_revision (progname, NP_VERSION);
 | 
			
		||||
			exit (STATE_OK);
 | 
			
		||||
			exit (STATE_UNKNOWN);
 | 
			
		||||
		case 'F':									/* status log */
 | 
			
		||||
			status_log = optarg;
 | 
			
		||||
			break;
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -197,19 +197,40 @@ int main(int argc, char **argv){
 | 
			
		|||
 | 
			
		||||
	case CHECK_UPTIME:
 | 
			
		||||
 | 
			
		||||
		xasprintf(&send_buffer, "%s&3", req_password);
 | 
			
		||||
		fetch_data (server_address, server_port, send_buffer);
 | 
			
		||||
		uptime=strtoul(recv_buffer,NULL,10);
 | 
			
		||||
		updays = uptime / 86400;
 | 
			
		||||
		uphours = (uptime % 86400) / 3600;
 | 
			
		||||
		upminutes = ((uptime % 86400) % 3600) / 60;
 | 
			
		||||
		xasprintf(&output_message,_("System Uptime - %u day(s) %u hour(s) %u minute(s)|uptime=%lu"), updays, uphours, upminutes, uptime);
 | 
			
		||||
		if (check_critical_value==TRUE && uptime <= critical_value)
 | 
			
		||||
			return_code=STATE_CRITICAL;
 | 
			
		||||
		else if (check_warning_value==TRUE && uptime <= warning_value)
 | 
			
		||||
			return_code=STATE_WARNING;
 | 
			
		||||
		else
 | 
			
		||||
			return_code=STATE_OK;
 | 
			
		||||
		if (value_list == NULL) {
 | 
			
		||||
			value_list = "minutes";
 | 
			
		||||
		}
 | 
			
		||||
		if (strncmp(value_list, "seconds", strlen("seconds") + 1 ) &&
 | 
			
		||||
			strncmp(value_list, "minutes", strlen("minutes") + 1) &&
 | 
			
		||||
			strncmp(value_list, "hours", strlen("hours") + 1) &&
 | 
			
		||||
			strncmp(value_list, "days", strlen("days") + 1)) {
 | 
			
		||||
 | 
			
		||||
			output_message = strdup (_("wrong -l argument"));
 | 
			
		||||
		} else {
 | 
			
		||||
			xasprintf(&send_buffer, "%s&3", req_password);
 | 
			
		||||
			fetch_data (server_address, server_port, send_buffer);
 | 
			
		||||
			uptime=strtoul(recv_buffer,NULL,10);
 | 
			
		||||
			updays = uptime / 86400;
 | 
			
		||||
			uphours = (uptime % 86400) / 3600;
 | 
			
		||||
			upminutes = ((uptime % 86400) % 3600) / 60;
 | 
			
		||||
 | 
			
		||||
			if (!strncmp(value_list, "minutes", strlen("minutes")))
 | 
			
		||||
				uptime = uptime / 60;
 | 
			
		||||
			else if (!strncmp(value_list, "hours", strlen("hours")))
 | 
			
		||||
				uptime = uptime / 3600;
 | 
			
		||||
			else if (!strncmp(value_list, "days", strlen("days")))
 | 
			
		||||
				uptime = uptime / 86400;
 | 
			
		||||
			/* else uptime in seconds, nothing to do */
 | 
			
		||||
 | 
			
		||||
			xasprintf(&output_message,_("System Uptime - %u day(s) %u hour(s) %u minute(s) |uptime=%lu"),updays, uphours, upminutes, uptime);
 | 
			
		||||
 | 
			
		||||
			if (check_critical_value==TRUE && uptime <= critical_value)
 | 
			
		||||
				return_code=STATE_CRITICAL;
 | 
			
		||||
			else if (check_warning_value==TRUE && uptime <= warning_value)
 | 
			
		||||
				return_code=STATE_WARNING;
 | 
			
		||||
			else
 | 
			
		||||
				return_code=STATE_OK;
 | 
			
		||||
		}
 | 
			
		||||
		break;
 | 
			
		||||
 | 
			
		||||
	case CHECK_USEDDISKSPACE:
 | 
			
		||||
| 
						 | 
				
			
			@ -532,10 +553,10 @@ int process_arguments(int argc, char **argv){
 | 
			
		|||
			usage5 ();
 | 
			
		||||
			case 'h': /* help */
 | 
			
		||||
				print_help();
 | 
			
		||||
				exit(STATE_OK);
 | 
			
		||||
				exit(STATE_UNKNOWN);
 | 
			
		||||
			case 'V': /* version */
 | 
			
		||||
				print_revision(progname, NP_VERSION);
 | 
			
		||||
				exit(STATE_OK);
 | 
			
		||||
				exit(STATE_UNKNOWN);
 | 
			
		||||
			case 'H': /* hostname */
 | 
			
		||||
				server_address = optarg;
 | 
			
		||||
				break;
 | 
			
		||||
| 
						 | 
				
			
			@ -713,7 +734,9 @@ void print_help(void)
 | 
			
		|||
	printf ("  %s\n", "ie: -l 60,90,95,120,90,95");
 | 
			
		||||
	printf (" %s\n", "UPTIME =");
 | 
			
		||||
	printf ("  %s\n", _("Get the uptime of the machine."));
 | 
			
		||||
	printf ("  %s\n", _("No specific parameters. No warning or critical threshold"));
 | 
			
		||||
	printf ("  %s\n", _("-l <unit> "));
 | 
			
		||||
	printf ("  %s\n", _("<unit> = seconds, minutes, hours, or days. (default: minutes)"));
 | 
			
		||||
	printf ("  %s\n", _("Thresholds will use the unit specified above."));
 | 
			
		||||
	printf (" %s\n", "USEDDISKSPACE =");
 | 
			
		||||
	printf ("  %s\n", _("Size and percentage of disk use."));
 | 
			
		||||
	printf ("  %s\n", _("Request a -l parameter containing the drive letter only."));
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -297,7 +297,7 @@ void setup_request(ntp_message *p){
 | 
			
		|||
 * this is done by filtering servers based on stratum, dispersion, and
 | 
			
		||||
 * finally round-trip delay. */
 | 
			
		||||
int best_offset_server(const ntp_server_results *slist, int nservers){
 | 
			
		||||
	int i=0, cserver=0, best_server=-1;
 | 
			
		||||
	int cserver=0, best_server=-1;
 | 
			
		||||
 | 
			
		||||
	/* for each server */
 | 
			
		||||
	for(cserver=0; cserver<nservers; cserver++){
 | 
			
		||||
| 
						 | 
				
			
			@ -356,7 +356,7 @@ int best_offset_server(const ntp_server_results *slist, int nservers){
 | 
			
		|||
 *   we have to do it in a way that our lazy macros don't handle currently :( */
 | 
			
		||||
double offset_request(const char *host, int *status){
 | 
			
		||||
	int i=0, j=0, ga_result=0, num_hosts=0, *socklist=NULL, respnum=0;
 | 
			
		||||
	int servers_completed=0, one_written=0, one_read=0, servers_readable=0, best_index=-1;
 | 
			
		||||
	int servers_completed=0, one_read=0, servers_readable=0, best_index=-1;
 | 
			
		||||
	time_t now_time=0, start_ts=0;
 | 
			
		||||
	ntp_message *req=NULL;
 | 
			
		||||
	double avg_offset=0.;
 | 
			
		||||
| 
						 | 
				
			
			@ -421,7 +421,6 @@ double offset_request(const char *host, int *status){
 | 
			
		|||
		 * been touched in the past second or so and is still lacking
 | 
			
		||||
		 * some responses.  for each of these servers, send a new request,
 | 
			
		||||
		 * and update the "waiting" timestamp with the current time. */
 | 
			
		||||
		one_written=0;
 | 
			
		||||
		now_time=time(NULL);
 | 
			
		||||
 | 
			
		||||
		for(i=0; i<num_hosts; i++){
 | 
			
		||||
| 
						 | 
				
			
			@ -431,7 +430,6 @@ double offset_request(const char *host, int *status){
 | 
			
		|||
				setup_request(&req[i]);
 | 
			
		||||
				write(socklist[i], &req[i], sizeof(ntp_message));
 | 
			
		||||
				servers[i].waiting=now_time;
 | 
			
		||||
				one_written=1;
 | 
			
		||||
				break;
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
| 
						 | 
				
			
			@ -691,11 +689,11 @@ int process_arguments(int argc, char **argv){
 | 
			
		|||
		switch (c) {
 | 
			
		||||
		case 'h':
 | 
			
		||||
			print_help();
 | 
			
		||||
			exit(STATE_OK);
 | 
			
		||||
			exit(STATE_UNKNOWN);
 | 
			
		||||
			break;
 | 
			
		||||
		case 'V':
 | 
			
		||||
			print_revision(progname, NP_VERSION);
 | 
			
		||||
			exit(STATE_OK);
 | 
			
		||||
			exit(STATE_UNKNOWN);
 | 
			
		||||
			break;
 | 
			
		||||
		case 'v':
 | 
			
		||||
			verbose++;
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -448,11 +448,11 @@ int process_arguments(int argc, char **argv){
 | 
			
		|||
		switch (c) {
 | 
			
		||||
		case 'h':
 | 
			
		||||
			print_help();
 | 
			
		||||
			exit(STATE_OK);
 | 
			
		||||
			exit(STATE_UNKNOWN);
 | 
			
		||||
			break;
 | 
			
		||||
		case 'V':
 | 
			
		||||
			print_revision(progname, NP_VERSION);
 | 
			
		||||
			exit(STATE_OK);
 | 
			
		||||
			exit(STATE_UNKNOWN);
 | 
			
		||||
			break;
 | 
			
		||||
		case 'v':
 | 
			
		||||
			verbose++;
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -244,7 +244,7 @@ void setup_request(ntp_message *p){
 | 
			
		|||
 * this is done by filtering servers based on stratum, dispersion, and
 | 
			
		||||
 * finally round-trip delay. */
 | 
			
		||||
int best_offset_server(const ntp_server_results *slist, int nservers){
 | 
			
		||||
	int i=0, cserver=0, best_server=-1;
 | 
			
		||||
	int cserver=0, best_server=-1;
 | 
			
		||||
 | 
			
		||||
	/* for each server */
 | 
			
		||||
	for(cserver=0; cserver<nservers; cserver++){
 | 
			
		||||
| 
						 | 
				
			
			@ -303,7 +303,7 @@ int best_offset_server(const ntp_server_results *slist, int nservers){
 | 
			
		|||
 *   we have to do it in a way that our lazy macros don't handle currently :( */
 | 
			
		||||
double offset_request(const char *host, int *status){
 | 
			
		||||
	int i=0, j=0, ga_result=0, num_hosts=0, *socklist=NULL, respnum=0;
 | 
			
		||||
	int servers_completed=0, one_written=0, one_read=0, servers_readable=0, best_index=-1;
 | 
			
		||||
	int servers_completed=0, one_read=0, servers_readable=0, best_index=-1;
 | 
			
		||||
	time_t now_time=0, start_ts=0;
 | 
			
		||||
	ntp_message *req=NULL;
 | 
			
		||||
	double avg_offset=0.;
 | 
			
		||||
| 
						 | 
				
			
			@ -368,7 +368,6 @@ double offset_request(const char *host, int *status){
 | 
			
		|||
		 * been touched in the past second or so and is still lacking
 | 
			
		||||
		 * some responses. For each of these servers, send a new request,
 | 
			
		||||
		 * and update the "waiting" timestamp with the current time. */
 | 
			
		||||
		one_written=0;
 | 
			
		||||
		now_time=time(NULL);
 | 
			
		||||
 | 
			
		||||
		for(i=0; i<num_hosts; i++){
 | 
			
		||||
| 
						 | 
				
			
			@ -378,7 +377,6 @@ double offset_request(const char *host, int *status){
 | 
			
		|||
				setup_request(&req[i]);
 | 
			
		||||
				write(socklist[i], &req[i], sizeof(ntp_message));
 | 
			
		||||
				servers[i].waiting=now_time;
 | 
			
		||||
				one_written=1;
 | 
			
		||||
				break;
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
| 
						 | 
				
			
			@ -477,11 +475,11 @@ int process_arguments(int argc, char **argv){
 | 
			
		|||
		switch (c) {
 | 
			
		||||
		case 'h':
 | 
			
		||||
			print_help();
 | 
			
		||||
			exit(STATE_OK);
 | 
			
		||||
			exit(STATE_UNKNOWN);
 | 
			
		||||
			break;
 | 
			
		||||
		case 'V':
 | 
			
		||||
			print_revision(progname, NP_VERSION);
 | 
			
		||||
			exit(STATE_OK);
 | 
			
		||||
			exit(STATE_UNKNOWN);
 | 
			
		||||
			break;
 | 
			
		||||
		case 'v':
 | 
			
		||||
			verbose++;
 | 
			
		||||
| 
						 | 
				
			
			@ -635,7 +633,7 @@ void print_help(void){
 | 
			
		|||
	printf("%s\n", _("Notes:"));
 | 
			
		||||
	printf(" %s\n", _("If you'd rather want to monitor an NTP server, please use"));
 | 
			
		||||
	printf(" %s\n", _("check_ntp_peer."));
 | 
			
		||||
	printf(" %s\n", _("--time-offset is usefull for compensating for servers with known"));
 | 
			
		||||
	printf(" %s\n", _("--time-offset is useful for compensating for servers with known"));
 | 
			
		||||
	printf(" %s\n", _("and expected clock skew."));
 | 
			
		||||
	printf("\n");
 | 
			
		||||
	printf(UT_THRESHOLDS_NOTES);
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -1354,10 +1354,10 @@ int process_arguments(int argc, char **argv) {
 | 
			
		|||
			usage5 ();
 | 
			
		||||
			case 'h': /* help */
 | 
			
		||||
				print_help();
 | 
			
		||||
				exit(STATE_OK);
 | 
			
		||||
				exit(STATE_UNKNOWN);
 | 
			
		||||
			case 'V': /* version */
 | 
			
		||||
				print_revision(progname, NP_VERSION);
 | 
			
		||||
				exit(STATE_OK);
 | 
			
		||||
				exit(STATE_UNKNOWN);
 | 
			
		||||
			case 'H': /* hostname */
 | 
			
		||||
				server_address=optarg;
 | 
			
		||||
				break;
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -340,10 +340,10 @@ process_arguments (int argc, char **argv)
 | 
			
		|||
			usage5 ();
 | 
			
		||||
		case 'h':									/* help */
 | 
			
		||||
			print_help ();
 | 
			
		||||
			exit (STATE_OK);
 | 
			
		||||
			exit (STATE_UNKNOWN);
 | 
			
		||||
		case 'V':									/* version */
 | 
			
		||||
			print_revision (progname, NP_VERSION);
 | 
			
		||||
			exit (STATE_OK);
 | 
			
		||||
			exit (STATE_UNKNOWN);
 | 
			
		||||
		case 'H':									/* hostname */
 | 
			
		||||
			server_address = optarg;
 | 
			
		||||
			break;
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -302,10 +302,10 @@ process_arguments (int argc, char **argv)
 | 
			
		|||
			usage5 ();
 | 
			
		||||
		case 'h':     /* help */
 | 
			
		||||
			print_help ();
 | 
			
		||||
			exit (STATE_OK);
 | 
			
		||||
			exit (STATE_UNKNOWN);
 | 
			
		||||
		case 'V':     /* version */
 | 
			
		||||
			print_revision (progname, NP_VERSION);
 | 
			
		||||
			exit (STATE_OK);
 | 
			
		||||
			exit (STATE_UNKNOWN);
 | 
			
		||||
		case 't':     /* timeout period */
 | 
			
		||||
			if (!is_integer (optarg))
 | 
			
		||||
				usage2 (_("Timeout interval must be a positive integer"), optarg);
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -224,11 +224,11 @@ process_arguments (int argc, char **argv)
 | 
			
		|||
			usage5 ();
 | 
			
		||||
		case 'h':	/* help */
 | 
			
		||||
			print_help ();
 | 
			
		||||
			exit (STATE_OK);
 | 
			
		||||
			exit (STATE_UNKNOWN);
 | 
			
		||||
			break;
 | 
			
		||||
		case 'V':	/* version */
 | 
			
		||||
			print_revision (progname, NP_VERSION);
 | 
			
		||||
			exit (STATE_OK);
 | 
			
		||||
			exit (STATE_UNKNOWN);
 | 
			
		||||
			break;
 | 
			
		||||
		case 't':	/* timeout period */
 | 
			
		||||
			timeout_interval = atoi (optarg);
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -428,10 +428,10 @@ process_arguments (int argc, char **argv)
 | 
			
		|||
			usage5 ();
 | 
			
		||||
		case 'h':									/* help */
 | 
			
		||||
			print_help ();
 | 
			
		||||
			exit (STATE_OK);
 | 
			
		||||
			exit (STATE_UNKNOWN);
 | 
			
		||||
		case 'V':									/* version */
 | 
			
		||||
			print_revision (progname, NP_VERSION);
 | 
			
		||||
			exit (STATE_OK);
 | 
			
		||||
			exit (STATE_UNKNOWN);
 | 
			
		||||
		case 't':									/* timeout period */
 | 
			
		||||
			if (!is_integer (optarg))
 | 
			
		||||
				usage2 (_("Timeout interval must be a positive integer"), optarg);
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -36,7 +36,9 @@ const char *email = "devel@monitoring-plugins.org";
 | 
			
		|||
#include "utils.h"
 | 
			
		||||
#include "netutils.h"
 | 
			
		||||
 | 
			
		||||
#if defined(HAVE_LIBFREERADIUS_CLIENT)
 | 
			
		||||
#if defined(HAVE_LIBRADCLI)
 | 
			
		||||
#include <radcli/radcli.h>
 | 
			
		||||
#elif defined(HAVE_LIBFREERADIUS_CLIENT)
 | 
			
		||||
#include <freeradius-client.h>
 | 
			
		||||
#elif defined(HAVE_LIBRADIUSCLIENT_NG)
 | 
			
		||||
#include <radiusclient-ng.h>
 | 
			
		||||
| 
						 | 
				
			
			@ -48,22 +50,24 @@ int process_arguments (int, char **);
 | 
			
		|||
void print_help (void);
 | 
			
		||||
void print_usage (void);
 | 
			
		||||
 | 
			
		||||
#if defined(HAVE_LIBFREERADIUS_CLIENT) || defined(HAVE_LIBRADIUSCLIENT_NG)
 | 
			
		||||
#if defined(HAVE_LIBFREERADIUS_CLIENT) || defined(HAVE_LIBRADIUSCLIENT_NG) || defined(HAVE_LIBRADCLI)
 | 
			
		||||
#define my_rc_conf_str(a) rc_conf_str(rch,a)
 | 
			
		||||
#if defined(HAVE_LIBRADCLI)
 | 
			
		||||
#define my_rc_send_server(a,b) rc_send_server(rch,a,b,AUTH)
 | 
			
		||||
#else
 | 
			
		||||
#define my_rc_send_server(a,b) rc_send_server(rch,a,b)
 | 
			
		||||
#ifdef HAVE_LIBFREERADIUS_CLIENT
 | 
			
		||||
#endif
 | 
			
		||||
#if defined(HAVE_LIBFREERADIUS_CLIENT) || defined(HAVE_LIBRADCLI)
 | 
			
		||||
#define my_rc_buildreq(a,b,c,d,e,f) rc_buildreq(rch,a,b,c,d,(a)->secret,e,f)
 | 
			
		||||
#else
 | 
			
		||||
#define my_rc_buildreq(a,b,c,d,e,f) rc_buildreq(rch,a,b,c,d,e,f)
 | 
			
		||||
#endif
 | 
			
		||||
#define my_rc_own_ipaddress() rc_own_ipaddress(rch)
 | 
			
		||||
#define my_rc_avpair_add(a,b,c,d) rc_avpair_add(rch,a,b,c,-1,d)
 | 
			
		||||
#define my_rc_read_dictionary(a) rc_read_dictionary(rch, a)
 | 
			
		||||
#else
 | 
			
		||||
#define my_rc_conf_str(a) rc_conf_str(a)
 | 
			
		||||
#define my_rc_send_server(a,b) rc_send_server(a, b)
 | 
			
		||||
#define my_rc_buildreq(a,b,c,d,e,f) rc_buildreq(a,b,c,d,e,f)
 | 
			
		||||
#define my_rc_own_ipaddress() rc_own_ipaddress()
 | 
			
		||||
#define my_rc_avpair_add(a,b,c,d) rc_avpair_add(a, b, c, d)
 | 
			
		||||
#define my_rc_read_dictionary(a) rc_read_dictionary(a)
 | 
			
		||||
#endif
 | 
			
		||||
| 
						 | 
				
			
			@ -76,7 +80,7 @@ void print_usage (void);
 | 
			
		|||
 | 
			
		||||
int my_rc_read_config(char *);
 | 
			
		||||
 | 
			
		||||
#if defined(HAVE_LIBFREERADIUS_CLIENT) || defined(HAVE_LIBRADIUSCLIENT_NG)
 | 
			
		||||
#if defined(HAVE_LIBFREERADIUS_CLIENT) || defined(HAVE_LIBRADIUSCLIENT_NG) || defined(HAVE_LIBRADCLI)
 | 
			
		||||
rc_handle *rch = NULL;
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
| 
						 | 
				
			
			@ -90,7 +94,6 @@ char *config_file = NULL;
 | 
			
		|||
unsigned short port = PW_AUTH_UDP_PORT;
 | 
			
		||||
int retries = 1;
 | 
			
		||||
int verbose = FALSE;
 | 
			
		||||
ENV *env = NULL;
 | 
			
		||||
 | 
			
		||||
/******************************************************************************
 | 
			
		||||
 | 
			
		||||
| 
						 | 
				
			
			@ -150,6 +153,8 @@ Please note that all tags must be lowercase to use the DocBook XML DTD.
 | 
			
		|||
int
 | 
			
		||||
main (int argc, char **argv)
 | 
			
		||||
{
 | 
			
		||||
	struct sockaddr_storage ss;
 | 
			
		||||
	char name[HOST_NAME_MAX];
 | 
			
		||||
	char msg[BUFFER_LEN];
 | 
			
		||||
	SEND_DATA data;
 | 
			
		||||
	int result = STATE_UNKNOWN;
 | 
			
		||||
| 
						 | 
				
			
			@ -185,15 +190,14 @@ main (int argc, char **argv)
 | 
			
		|||
			die (STATE_UNKNOWN, _("Invalid NAS-Identifier\n"));
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if (nasipaddress != NULL) {
 | 
			
		||||
		if (rc_good_ipaddr (nasipaddress))
 | 
			
		||||
			die (STATE_UNKNOWN, _("Invalid NAS-IP-Address\n"));
 | 
			
		||||
		if ((client_id = rc_get_ipaddr(nasipaddress)) == 0)
 | 
			
		||||
			die (STATE_UNKNOWN, _("Invalid NAS-IP-Address\n"));
 | 
			
		||||
	} else {
 | 
			
		||||
		if ((client_id = my_rc_own_ipaddress ()) == 0)
 | 
			
		||||
			die (STATE_UNKNOWN, _("Can't find local IP for NAS-IP-Address\n"));
 | 
			
		||||
	if (nasipaddress == NULL) {
 | 
			
		||||
		if (gethostname (name, sizeof(name)) != 0)
 | 
			
		||||
			die (STATE_UNKNOWN, _("gethostname() failed!\n"));
 | 
			
		||||
		nasipaddress = name;
 | 
			
		||||
	}
 | 
			
		||||
	if (!dns_lookup (nasipaddress, &ss, AF_INET)) /* TODO: Support IPv6. */
 | 
			
		||||
		die (STATE_UNKNOWN, _("Invalid NAS-IP-Address\n"));
 | 
			
		||||
	client_id = ntohl (((struct sockaddr_in *)&ss)->sin_addr.s_addr);
 | 
			
		||||
	if (my_rc_avpair_add (&(data.send_pairs), PW_NAS_IP_ADDRESS, &client_id, 0) == NULL)
 | 
			
		||||
		die (STATE_UNKNOWN, _("Invalid NAS-IP-Address\n"));
 | 
			
		||||
 | 
			
		||||
| 
						 | 
				
			
			@ -259,10 +263,10 @@ process_arguments (int argc, char **argv)
 | 
			
		|||
			usage5 ();
 | 
			
		||||
		case 'h':									/* help */
 | 
			
		||||
			print_help ();
 | 
			
		||||
			exit (OK);
 | 
			
		||||
			exit (STATE_UNKNOWN);
 | 
			
		||||
		case 'V':									/* version */
 | 
			
		||||
			print_revision (progname, NP_VERSION);
 | 
			
		||||
			exit (OK);
 | 
			
		||||
			exit (STATE_UNKNOWN);
 | 
			
		||||
		case 'v':									/* verbose mode */
 | 
			
		||||
			verbose = TRUE;
 | 
			
		||||
			break;
 | 
			
		||||
| 
						 | 
				
			
			@ -274,7 +278,7 @@ process_arguments (int argc, char **argv)
 | 
			
		|||
			break;
 | 
			
		||||
		case 'P':									/* port */
 | 
			
		||||
			if (is_intnonneg (optarg))
 | 
			
		||||
				port = atoi (optarg);
 | 
			
		||||
				port = (unsigned short)atoi (optarg);
 | 
			
		||||
			else
 | 
			
		||||
				usage4 (_("Port must be a positive integer"));
 | 
			
		||||
			break;
 | 
			
		||||
| 
						 | 
				
			
			@ -310,7 +314,7 @@ process_arguments (int argc, char **argv)
 | 
			
		|||
			break;
 | 
			
		||||
		case 't':									/* timeout */
 | 
			
		||||
			if (is_intpos (optarg))
 | 
			
		||||
				timeout_interval = atoi (optarg);
 | 
			
		||||
				timeout_interval = (unsigned)atoi (optarg);
 | 
			
		||||
			else
 | 
			
		||||
				usage2 (_("Timeout interval must be a positive integer"), optarg);
 | 
			
		||||
			break;
 | 
			
		||||
| 
						 | 
				
			
			@ -399,7 +403,7 @@ print_usage (void)
 | 
			
		|||
 | 
			
		||||
int my_rc_read_config(char * a)
 | 
			
		||||
{
 | 
			
		||||
#if defined(HAVE_LIBFREERADIUS_CLIENT) || defined(HAVE_LIBRADIUSCLIENT_NG)
 | 
			
		||||
#if defined(HAVE_LIBFREERADIUS_CLIENT) || defined(HAVE_LIBRADIUSCLIENT_NG) || defined(HAVE_LIBRADCLI)
 | 
			
		||||
	rch = rc_read_config(a);
 | 
			
		||||
	return (rch == NULL) ? 1 : 0;
 | 
			
		||||
#else
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -163,17 +163,17 @@ main (int argc, char **argv)
 | 
			
		|||
 | 
			
		||||
		/* Part I - Server Check */
 | 
			
		||||
 | 
			
		||||
		/* send the OPTIONS request */
 | 
			
		||||
		sprintf (buffer, "DESCRIBE rtsp://%s:%d%s RTSP/1.0\n", host_name,
 | 
			
		||||
		/* send the DESCRIBE request */
 | 
			
		||||
		sprintf (buffer, "DESCRIBE rtsp://%s:%d%s RTSP/1.0\r\n", host_name,
 | 
			
		||||
						 server_port, server_url);
 | 
			
		||||
		result = send (sd, buffer, strlen (buffer), 0);
 | 
			
		||||
 | 
			
		||||
		/* send the header sync */
 | 
			
		||||
		sprintf (buffer, "CSeq: 2\n");
 | 
			
		||||
		sprintf (buffer, "CSeq: 2\r\n");
 | 
			
		||||
		result = send (sd, buffer, strlen (buffer), 0);
 | 
			
		||||
 | 
			
		||||
		/* send a newline so the server knows we're done with the request */
 | 
			
		||||
		sprintf (buffer, "\n");
 | 
			
		||||
		sprintf (buffer, "\r\n");
 | 
			
		||||
		result = send (sd, buffer, strlen (buffer), 0);
 | 
			
		||||
 | 
			
		||||
		/* watch for the REAL connection string */
 | 
			
		||||
| 
						 | 
				
			
			@ -359,10 +359,10 @@ process_arguments (int argc, char **argv)
 | 
			
		|||
			break;
 | 
			
		||||
		case 'V':									/* version */
 | 
			
		||||
			print_revision (progname, NP_VERSION);
 | 
			
		||||
			exit (STATE_OK);
 | 
			
		||||
			exit (STATE_UNKNOWN);
 | 
			
		||||
		case 'h':									/* help */
 | 
			
		||||
			print_help ();
 | 
			
		||||
			exit (STATE_OK);
 | 
			
		||||
			exit (STATE_UNKNOWN);
 | 
			
		||||
		case '?':									/* usage */
 | 
			
		||||
			usage5 ();
 | 
			
		||||
		}
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -59,10 +59,6 @@ enum {
 | 
			
		|||
#define SMTP_STARTTLS "STARTTLS\r\n"
 | 
			
		||||
#define SMTP_AUTH_LOGIN "AUTH LOGIN\r\n"
 | 
			
		||||
 | 
			
		||||
#ifndef HOST_MAX_BYTES
 | 
			
		||||
#define HOST_MAX_BYTES 255
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
#define EHLO_SUPPORTS_STARTTLS 1
 | 
			
		||||
 | 
			
		||||
int process_arguments (int, char **);
 | 
			
		||||
| 
						 | 
				
			
			@ -128,6 +124,7 @@ main (int argc, char **argv)
 | 
			
		|||
	char *cmd_str = NULL;
 | 
			
		||||
	char *helocmd = NULL;
 | 
			
		||||
	char *error_msg = "";
 | 
			
		||||
	char *server_response = NULL;
 | 
			
		||||
	struct timeval tv;
 | 
			
		||||
 | 
			
		||||
	/* Catch pipe errors in read/write - sometimes occurs when writing QUIT */
 | 
			
		||||
| 
						 | 
				
			
			@ -189,21 +186,9 @@ main (int argc, char **argv)
 | 
			
		|||
			printf (_("recv() failed\n"));
 | 
			
		||||
			return STATE_WARNING;
 | 
			
		||||
		}
 | 
			
		||||
		else {
 | 
			
		||||
			if (verbose)
 | 
			
		||||
				printf ("%s", buffer);
 | 
			
		||||
			/* strip the buffer of carriage returns */
 | 
			
		||||
			strip (buffer);
 | 
			
		||||
			/* make sure we find the response we are looking for */
 | 
			
		||||
			if (!strstr (buffer, server_expect)) {
 | 
			
		||||
				if (server_port == SMTP_PORT)
 | 
			
		||||
					printf (_("Invalid SMTP response received from host: %s\n"), buffer);
 | 
			
		||||
				else
 | 
			
		||||
					printf (_("Invalid SMTP response received from host on port %d: %s\n"),
 | 
			
		||||
									server_port, buffer);
 | 
			
		||||
				return STATE_WARNING;
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		/* save connect return (220 hostname ..) for later use */
 | 
			
		||||
		xasprintf(&server_response, "%s", buffer);
 | 
			
		||||
 | 
			
		||||
		/* send the HELO/EHLO command */
 | 
			
		||||
		send(sd, helocmd, strlen(helocmd), 0);
 | 
			
		||||
| 
						 | 
				
			
			@ -231,7 +216,7 @@ main (int argc, char **argv)
 | 
			
		|||
		  send(sd, SMTP_STARTTLS, strlen(SMTP_STARTTLS), 0);
 | 
			
		||||
 | 
			
		||||
		  recvlines(buffer, MAX_INPUT_BUFFER); /* wait for it */
 | 
			
		||||
		  if (!strstr (buffer, server_expect)) {
 | 
			
		||||
		  if (!strstr (buffer, SMTP_EXPECT)) {
 | 
			
		||||
		    printf (_("Server does not support STARTTLS\n"));
 | 
			
		||||
		    smtp_quit();
 | 
			
		||||
		    return STATE_UNKNOWN;
 | 
			
		||||
| 
						 | 
				
			
			@ -239,8 +224,8 @@ main (int argc, char **argv)
 | 
			
		|||
		  result = np_net_ssl_init(sd);
 | 
			
		||||
		  if(result != STATE_OK) {
 | 
			
		||||
		    printf (_("CRITICAL - Cannot create SSL context.\n"));
 | 
			
		||||
		    np_net_ssl_cleanup();
 | 
			
		||||
		    close(sd);
 | 
			
		||||
		    np_net_ssl_cleanup();
 | 
			
		||||
		    return STATE_CRITICAL;
 | 
			
		||||
		  } else {
 | 
			
		||||
			ssl_established = 1;
 | 
			
		||||
| 
						 | 
				
			
			@ -276,6 +261,7 @@ main (int argc, char **argv)
 | 
			
		|||
#  ifdef USE_OPENSSL
 | 
			
		||||
		  if ( check_cert ) {
 | 
			
		||||
                    result = np_net_ssl_check_cert(days_till_exp_warn, days_till_exp_crit);
 | 
			
		||||
		    smtp_quit();
 | 
			
		||||
		    my_close();
 | 
			
		||||
		    return result;
 | 
			
		||||
		  }
 | 
			
		||||
| 
						 | 
				
			
			@ -283,6 +269,24 @@ main (int argc, char **argv)
 | 
			
		|||
		}
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
		if (verbose)
 | 
			
		||||
			printf ("%s", buffer);
 | 
			
		||||
 | 
			
		||||
		/* save buffer for later use */
 | 
			
		||||
		xasprintf(&server_response, "%s%s", server_response, buffer);
 | 
			
		||||
		/* strip the buffer of carriage returns */
 | 
			
		||||
		strip (server_response);
 | 
			
		||||
 | 
			
		||||
		/* make sure we find the droids we are looking for */
 | 
			
		||||
		if (!strstr (server_response, server_expect)) {
 | 
			
		||||
			if (server_port == SMTP_PORT)
 | 
			
		||||
				printf (_("Invalid SMTP response received from host: %s\n"), server_response);
 | 
			
		||||
			else
 | 
			
		||||
				printf (_("Invalid SMTP response received from host on port %d: %s\n"),
 | 
			
		||||
										server_port, server_response);
 | 
			
		||||
			return STATE_WARNING;
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		if (send_mail_from) {
 | 
			
		||||
		  my_send(cmd_str, strlen(cmd_str));
 | 
			
		||||
		  if (recvlines(buffer, MAX_INPUT_BUFFER) >= 1 && verbose)
 | 
			
		||||
| 
						 | 
				
			
			@ -581,11 +585,6 @@ process_arguments (int argc, char **argv)
 | 
			
		|||
				usage4 (_("Timeout interval must be a positive integer"));
 | 
			
		||||
			}
 | 
			
		||||
			break;
 | 
			
		||||
		case 'S':
 | 
			
		||||
		/* starttls */
 | 
			
		||||
			use_ssl = TRUE;
 | 
			
		||||
			use_ehlo = TRUE;
 | 
			
		||||
			break;
 | 
			
		||||
		case 'D':
 | 
			
		||||
		/* Check SSL cert validity */
 | 
			
		||||
#ifdef USE_OPENSSL
 | 
			
		||||
| 
						 | 
				
			
			@ -607,9 +606,14 @@ process_arguments (int argc, char **argv)
 | 
			
		|||
                            days_till_exp_warn = atoi (optarg);
 | 
			
		||||
                        }
 | 
			
		||||
			check_cert = TRUE;
 | 
			
		||||
			ignore_send_quit_failure = TRUE;
 | 
			
		||||
#else
 | 
			
		||||
			usage (_("SSL support not available - install OpenSSL and recompile"));
 | 
			
		||||
#endif
 | 
			
		||||
		case 'S':
 | 
			
		||||
		/* starttls */
 | 
			
		||||
			use_ssl = TRUE;
 | 
			
		||||
			use_ehlo = TRUE;
 | 
			
		||||
			break;
 | 
			
		||||
		case '4':
 | 
			
		||||
			address_family = AF_INET;
 | 
			
		||||
| 
						 | 
				
			
			@ -623,10 +627,10 @@ process_arguments (int argc, char **argv)
 | 
			
		|||
			break;
 | 
			
		||||
		case 'V':									/* version */
 | 
			
		||||
			print_revision (progname, NP_VERSION);
 | 
			
		||||
			exit (STATE_OK);
 | 
			
		||||
			exit (STATE_UNKNOWN);
 | 
			
		||||
		case 'h':									/* help */
 | 
			
		||||
			print_help ();
 | 
			
		||||
			exit (STATE_OK);
 | 
			
		||||
			exit (STATE_UNKNOWN);
 | 
			
		||||
		case '?':									/* help */
 | 
			
		||||
			usage5 ();
 | 
			
		||||
		}
 | 
			
		||||
| 
						 | 
				
			
			@ -763,10 +767,12 @@ recvlines(char *buf, size_t bufsize)
 | 
			
		|||
int
 | 
			
		||||
my_close (void)
 | 
			
		||||
{
 | 
			
		||||
	int result;
 | 
			
		||||
	result = close(sd);
 | 
			
		||||
#ifdef HAVE_SSL
 | 
			
		||||
  np_net_ssl_cleanup();
 | 
			
		||||
	np_net_ssl_cleanup();
 | 
			
		||||
#endif
 | 
			
		||||
  return close(sd);
 | 
			
		||||
	return result;
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -103,6 +103,8 @@ int errcode, excode;
 | 
			
		|||
 | 
			
		||||
char *server_address = NULL;
 | 
			
		||||
char *community = NULL;
 | 
			
		||||
char **contextargs = NULL;
 | 
			
		||||
char *context = NULL;
 | 
			
		||||
char **authpriv = NULL;
 | 
			
		||||
char *proto = NULL;
 | 
			
		||||
char *seclevel = NULL;
 | 
			
		||||
| 
						 | 
				
			
			@ -127,6 +129,7 @@ size_t nunits = 0;
 | 
			
		|||
size_t unitv_size = OID_COUNT_STEP;
 | 
			
		||||
int numoids = 0;
 | 
			
		||||
int numauthpriv = 0;
 | 
			
		||||
int numcontext = 0;
 | 
			
		||||
int verbose = 0;
 | 
			
		||||
int usesnmpgetnext = FALSE;
 | 
			
		||||
char *warning_thresholds = NULL;
 | 
			
		||||
| 
						 | 
				
			
			@ -149,7 +152,7 @@ state_data *previous_state;
 | 
			
		|||
double *previous_value;
 | 
			
		||||
size_t previous_size = OID_COUNT_STEP;
 | 
			
		||||
int perf_labels = 1;
 | 
			
		||||
 | 
			
		||||
char* ip_version = "";
 | 
			
		||||
 | 
			
		||||
static char *fix_snmp_range(char *th)
 | 
			
		||||
{
 | 
			
		||||
| 
						 | 
				
			
			@ -296,8 +299,8 @@ main (int argc, char **argv)
 | 
			
		|||
		snmpcmd = strdup (PATH_TO_SNMPGET);
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	/* 10 arguments to pass before authpriv options + 1 for host and numoids. Add one for terminating NULL */
 | 
			
		||||
	command_line = calloc (10 + numauthpriv + 1 + numoids + 1, sizeof (char *));
 | 
			
		||||
	/* 10 arguments to pass before context and authpriv options + 1 for host and numoids. Add one for terminating NULL */
 | 
			
		||||
	command_line = calloc (10 + numcontext + numauthpriv + 1 + numoids + 1, sizeof (char *));
 | 
			
		||||
	command_line[0] = snmpcmd;
 | 
			
		||||
	command_line[1] = strdup ("-Le");
 | 
			
		||||
	command_line[2] = strdup ("-t");
 | 
			
		||||
| 
						 | 
				
			
			@ -309,23 +312,27 @@ main (int argc, char **argv)
 | 
			
		|||
	command_line[8] = "-v";
 | 
			
		||||
	command_line[9] = strdup (proto);
 | 
			
		||||
 | 
			
		||||
	for (i = 0; i < numcontext; i++) {
 | 
			
		||||
		command_line[10 + i] = contextargs[i];
 | 
			
		||||
	}
 | 
			
		||||
	
 | 
			
		||||
	for (i = 0; i < numauthpriv; i++) {
 | 
			
		||||
		command_line[10 + i] = authpriv[i];
 | 
			
		||||
		command_line[10 + numcontext + i] = authpriv[i];
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	xasprintf (&command_line[10 + numauthpriv], "%s:%s", server_address, port);
 | 
			
		||||
	xasprintf (&command_line[10 + numcontext + numauthpriv], "%s:%s", server_address, port);
 | 
			
		||||
 | 
			
		||||
	/* This is just for display purposes, so it can remain a string */
 | 
			
		||||
	xasprintf(&cl_hidden_auth, "%s -Le -t %d -r %d -m %s -v %s %s %s:%s",
 | 
			
		||||
		snmpcmd, timeout_interval, retries, strlen(miblist) ? miblist : "''", proto, "[authpriv]",
 | 
			
		||||
	xasprintf(&cl_hidden_auth, "%s -Le -t %d -r %d -m %s -v %s %s %s %s:%s",
 | 
			
		||||
		snmpcmd, timeout_interval, retries, strlen(miblist) ? miblist : "''", proto, "[context]", "[authpriv]",
 | 
			
		||||
		server_address, port);
 | 
			
		||||
 | 
			
		||||
	for (i = 0; i < numoids; i++) {
 | 
			
		||||
		command_line[10 + numauthpriv + 1 + i] = oids[i];
 | 
			
		||||
		command_line[10 + numcontext + numauthpriv + 1 + i] = oids[i];
 | 
			
		||||
		xasprintf(&cl_hidden_auth, "%s %s", cl_hidden_auth, oids[i]);	
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	command_line[10 + numauthpriv + 1 + numoids] = NULL;
 | 
			
		||||
	command_line[10 + numcontext + numauthpriv + 1 + numoids] = NULL;
 | 
			
		||||
 | 
			
		||||
	if (verbose)
 | 
			
		||||
		printf ("%s\n", cl_hidden_auth);
 | 
			
		||||
| 
						 | 
				
			
			@ -410,6 +417,9 @@ main (int argc, char **argv)
 | 
			
		|||
		else if (strstr (response, "INTEGER: ")) {
 | 
			
		||||
			show = strstr (response, "INTEGER: ") + 9;
 | 
			
		||||
		}
 | 
			
		||||
		else if (strstr (response, "OID: ")) {
 | 
			
		||||
			show = strstr (response, "OID: ") + 5;
 | 
			
		||||
		}
 | 
			
		||||
		else if (strstr (response, "STRING: ")) {
 | 
			
		||||
			show = strstr (response, "STRING: ") + 8;
 | 
			
		||||
			conv = "%.10g";
 | 
			
		||||
| 
						 | 
				
			
			@ -566,6 +576,18 @@ main (int argc, char **argv)
 | 
			
		|||
			len = sizeof(perfstr)-strlen(perfstr)-1;
 | 
			
		||||
			strncat(perfstr, show, len>ptr-show ? ptr-show : len);
 | 
			
		||||
 | 
			
		||||
			if (warning_thresholds) {
 | 
			
		||||
				strncat(perfstr, ";", sizeof(perfstr)-strlen(perfstr)-1);
 | 
			
		||||
				strncat(perfstr, warning_thresholds, sizeof(perfstr)-strlen(perfstr)-1);
 | 
			
		||||
			}
 | 
			
		||||
 | 
			
		||||
			if (critical_thresholds) {
 | 
			
		||||
				if (!warning_thresholds)
 | 
			
		||||
					strncat(perfstr, ";", sizeof(perfstr)-strlen(perfstr)-1);
 | 
			
		||||
				strncat(perfstr, ";", sizeof(perfstr)-strlen(perfstr)-1);
 | 
			
		||||
				strncat(perfstr, critical_thresholds, sizeof(perfstr)-strlen(perfstr)-1);
 | 
			
		||||
			}
 | 
			
		||||
 | 
			
		||||
			if (type)
 | 
			
		||||
				strncat(perfstr, type, sizeof(perfstr)-strlen(perfstr)-1);
 | 
			
		||||
			strncat(perfstr, " ", sizeof(perfstr)-strlen(perfstr)-1);
 | 
			
		||||
| 
						 | 
				
			
			@ -645,6 +667,7 @@ process_arguments (int argc, char **argv)
 | 
			
		|||
		{"retries", required_argument, 0, 'e'},
 | 
			
		||||
		{"miblist", required_argument, 0, 'm'},
 | 
			
		||||
		{"protocol", required_argument, 0, 'P'},
 | 
			
		||||
		{"context", required_argument, 0, 'N'},
 | 
			
		||||
		{"seclevel", required_argument, 0, 'L'},
 | 
			
		||||
		{"secname", required_argument, 0, 'U'},
 | 
			
		||||
		{"authproto", required_argument, 0, 'a'},
 | 
			
		||||
| 
						 | 
				
			
			@ -657,6 +680,8 @@ process_arguments (int argc, char **argv)
 | 
			
		|||
		{"offset", required_argument, 0, L_OFFSET},
 | 
			
		||||
		{"invert-search", no_argument, 0, L_INVERT_SEARCH},
 | 
			
		||||
		{"perf-oids", no_argument, 0, 'O'},
 | 
			
		||||
		{"ipv4", no_argument, 0, '4'},
 | 
			
		||||
		{"ipv6", no_argument, 0, '6'},
 | 
			
		||||
		{0, 0, 0, 0}
 | 
			
		||||
	};
 | 
			
		||||
 | 
			
		||||
| 
						 | 
				
			
			@ -674,7 +699,7 @@ process_arguments (int argc, char **argv)
 | 
			
		|||
	}
 | 
			
		||||
 | 
			
		||||
	while (1) {
 | 
			
		||||
		c = getopt_long (argc, argv, "nhvVOt:c:w:H:C:o:e:E:d:D:s:t:R:r:l:u:p:m:P:L:U:a:x:A:X:",
 | 
			
		||||
		c = getopt_long (argc, argv, "nhvVO46t:c:w:H:C:o:e:E:d:D:s:t:R:r:l:u:p:m:P:N:L:U:a:x:A:X:",
 | 
			
		||||
									 longopts, &option);
 | 
			
		||||
 | 
			
		||||
		if (c == -1 || c == EOF)
 | 
			
		||||
| 
						 | 
				
			
			@ -685,10 +710,10 @@ process_arguments (int argc, char **argv)
 | 
			
		|||
			usage5 ();
 | 
			
		||||
		case 'h':	/* help */
 | 
			
		||||
			print_help ();
 | 
			
		||||
			exit (STATE_OK);
 | 
			
		||||
			exit (STATE_UNKNOWN);
 | 
			
		||||
		case 'V':	/* version */
 | 
			
		||||
			print_revision (progname, NP_VERSION);
 | 
			
		||||
			exit (STATE_OK);
 | 
			
		||||
			exit (STATE_UNKNOWN);
 | 
			
		||||
		case 'v': /* verbose */
 | 
			
		||||
			verbose++;
 | 
			
		||||
			break;
 | 
			
		||||
| 
						 | 
				
			
			@ -712,6 +737,9 @@ process_arguments (int argc, char **argv)
 | 
			
		|||
		case 'P':	/* SNMP protocol version */
 | 
			
		||||
			proto = optarg;
 | 
			
		||||
			break;
 | 
			
		||||
		case 'N':	/* SNMPv3 context */
 | 
			
		||||
			context = optarg;
 | 
			
		||||
			break;
 | 
			
		||||
		case 'L':	/* security level */
 | 
			
		||||
			seclevel = optarg;
 | 
			
		||||
			break;
 | 
			
		||||
| 
						 | 
				
			
			@ -896,6 +924,13 @@ process_arguments (int argc, char **argv)
 | 
			
		|||
		case 'O':
 | 
			
		||||
			perf_labels=0;
 | 
			
		||||
			break;
 | 
			
		||||
		case '4':
 | 
			
		||||
			break;
 | 
			
		||||
		case '6':
 | 
			
		||||
			xasprintf(&ip_version, "udp6:");
 | 
			
		||||
			if(verbose>2)
 | 
			
		||||
				printf("IPv6 detected! Will pass \"udp6:\" to snmpget.\n");
 | 
			
		||||
			break;
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
| 
						 | 
				
			
			@ -959,6 +994,13 @@ validate_arguments ()
 | 
			
		|||
		authpriv[1] = strdup (community);
 | 
			
		||||
	}
 | 
			
		||||
	else if ( strcmp (proto, "3") == 0 ) {		/* snmpv3 args */
 | 
			
		||||
		if (!(context == NULL)) {
 | 
			
		||||
			numcontext = 2;
 | 
			
		||||
			contextargs = calloc (numcontext, sizeof (char *));
 | 
			
		||||
			contextargs[0] = strdup ("-n");
 | 
			
		||||
			contextargs[1] = strdup (context);
 | 
			
		||||
		}
 | 
			
		||||
		
 | 
			
		||||
		if (seclevel == NULL)
 | 
			
		||||
			xasprintf(&seclevel, "noAuthNoPriv");
 | 
			
		||||
 | 
			
		||||
| 
						 | 
				
			
			@ -1094,6 +1136,7 @@ print_help (void)
 | 
			
		|||
 | 
			
		||||
	printf (UT_HELP_VRSN);
 | 
			
		||||
	printf (UT_EXTRA_OPTS);
 | 
			
		||||
	printf (UT_IPv46);
 | 
			
		||||
 | 
			
		||||
	printf (UT_HOST_PORT, 'p', DEFAULT_PORT);
 | 
			
		||||
 | 
			
		||||
| 
						 | 
				
			
			@ -1102,6 +1145,8 @@ print_help (void)
 | 
			
		|||
	printf ("    %s\n", _("Use SNMP GETNEXT instead of SNMP GET"));
 | 
			
		||||
	printf (" %s\n", "-P, --protocol=[1|2c|3]");
 | 
			
		||||
	printf ("    %s\n", _("SNMP protocol version"));
 | 
			
		||||
	printf (" %s\n", "-N, --context=CONTEXT");
 | 
			
		||||
	printf ("    %s\n", _("SNMPv3 context"));
 | 
			
		||||
	printf (" %s\n", "-L, --seclevel=[noAuthNoPriv|authNoPriv|authPriv]");
 | 
			
		||||
	printf ("    %s\n", _("SNMPv3 securityLevel"));
 | 
			
		||||
	printf (" %s\n", "-a, --authproto=[MD5|SHA]");
 | 
			
		||||
| 
						 | 
				
			
			@ -1209,6 +1254,6 @@ print_usage (void)
 | 
			
		|||
	printf ("%s -H <ip_address> -o <OID> [-w warn_range] [-c crit_range]\n",progname);
 | 
			
		||||
	printf ("[-C community] [-s string] [-r regex] [-R regexi] [-t timeout] [-e retries]\n");
 | 
			
		||||
	printf ("[-l label] [-u units] [-p port-number] [-d delimiter] [-D output-delimiter]\n");
 | 
			
		||||
	printf ("[-m miblist] [-P snmp version] [-L seclevel] [-U secname] [-a authproto]\n");
 | 
			
		||||
	printf ("[-A authpasswd] [-x privproto] [-X privpasswd]\n");
 | 
			
		||||
	printf ("[-m miblist] [-P snmp version] [-N context] [-L seclevel] [-U secname]\n");
 | 
			
		||||
	printf ("[-a authproto] [-A authpasswd] [-x privproto] [-X privpasswd] [-4|6]\n");
 | 
			
		||||
}
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -128,10 +128,10 @@ process_arguments (int argc, char **argv)
 | 
			
		|||
			usage5 ();
 | 
			
		||||
		case 'V':									/* version */
 | 
			
		||||
			print_revision (progname, NP_VERSION);
 | 
			
		||||
			exit (STATE_OK);
 | 
			
		||||
			exit (STATE_UNKNOWN);
 | 
			
		||||
		case 'h':									/* help */
 | 
			
		||||
			print_help ();
 | 
			
		||||
			exit (STATE_OK);
 | 
			
		||||
			exit (STATE_UNKNOWN);
 | 
			
		||||
		case 'v':									/* verbose */
 | 
			
		||||
			verbose = TRUE;
 | 
			
		||||
			break;
 | 
			
		||||
| 
						 | 
				
			
			@ -253,18 +253,18 @@ ssh_connect (char *haddr, int hport, char *remote_version, char *remote_protocol
 | 
			
		|||
 | 
			
		||||
		if (remote_version && strcmp(remote_version, ssh_server)) {
 | 
			
		||||
			printf
 | 
			
		||||
				(_("SSH WARNING - %s (protocol %s) version mismatch, expected '%s'\n"),
 | 
			
		||||
				(_("SSH CRITICAL - %s (protocol %s) version mismatch, expected '%s'\n"),
 | 
			
		||||
				 ssh_server, ssh_proto, remote_version);
 | 
			
		||||
			close(sd);
 | 
			
		||||
			exit (STATE_WARNING);
 | 
			
		||||
			exit (STATE_CRITICAL);
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		if (remote_protocol && strcmp(remote_protocol, ssh_proto)) {
 | 
			
		||||
			printf
 | 
			
		||||
				(_("SSH WARNING - %s (protocol %s) protocol version mismatch, expected '%s'\n"),
 | 
			
		||||
				(_("SSH CRITICAL - %s (protocol %s) protocol version mismatch, expected '%s'\n"),
 | 
			
		||||
				 ssh_server, ssh_proto, remote_protocol);
 | 
			
		||||
			close(sd);
 | 
			
		||||
			exit (STATE_WARNING);
 | 
			
		||||
			exit (STATE_CRITICAL);
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		elapsed_time = (double)deltime(tv) / 1.0e6;
 | 
			
		||||
| 
						 | 
				
			
			@ -307,10 +307,10 @@ print_help (void)
 | 
			
		|||
	printf (UT_CONN_TIMEOUT, DEFAULT_SOCKET_TIMEOUT);
 | 
			
		||||
 | 
			
		||||
	printf (" %s\n", "-r, --remote-version=STRING");
 | 
			
		||||
  printf ("    %s\n", _("Warn if string doesn't match expected server version (ex: OpenSSH_3.9p1)"));
 | 
			
		||||
  printf ("    %s\n", _("Alert if string doesn't match expected server version (ex: OpenSSH_3.9p1)"));
 | 
			
		||||
 | 
			
		||||
	printf (" %s\n", "-P, --remote-protocol=STRING");
 | 
			
		||||
  printf ("    %s\n", _("Warn if protocol doesn't match expected protocol version (ex: 2.0)"));
 | 
			
		||||
  printf ("    %s\n", _("Alert if protocol doesn't match expected protocol version (ex: 2.0)"));
 | 
			
		||||
 | 
			
		||||
	printf (UT_VERBOSE);
 | 
			
		||||
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -1,6 +1,6 @@
 | 
			
		|||
/*****************************************************************************
 | 
			
		||||
* 
 | 
			
		||||
* Monitoring check_disk plugin
 | 
			
		||||
* Monitoring check_swap plugin
 | 
			
		||||
* 
 | 
			
		||||
* License: GPL
 | 
			
		||||
* Copyright (c) 2000 Karl DeBisschop (kdebisschop@users.sourceforge.net)
 | 
			
		||||
| 
						 | 
				
			
			@ -352,6 +352,7 @@ main (int argc, char **argv)
 | 
			
		|||
		percent_used = 100 * ((double) used_swap_mb) / ((double) total_swap_mb);
 | 
			
		||||
	} else {
 | 
			
		||||
		percent_used = 100;
 | 
			
		||||
		status = "- Swap is either disabled, not present, or of zero size. ";
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	result = max_state (result, check_swap (percent_used, free_swap_mb));
 | 
			
		||||
| 
						 | 
				
			
			@ -469,10 +470,10 @@ process_arguments (int argc, char **argv)
 | 
			
		|||
			break;
 | 
			
		||||
		case 'V':									/* version */
 | 
			
		||||
			print_revision (progname, NP_VERSION);
 | 
			
		||||
			exit (STATE_OK);
 | 
			
		||||
			exit (STATE_UNKNOWN);
 | 
			
		||||
		case 'h':									/* help */
 | 
			
		||||
			print_help ();
 | 
			
		||||
			exit (STATE_OK);
 | 
			
		||||
			exit (STATE_UNKNOWN);
 | 
			
		||||
		case '?':									/* error */
 | 
			
		||||
			usage5 ();
 | 
			
		||||
		}
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -237,7 +237,7 @@ main (int argc, char **argv)
 | 
			
		|||
	gettimeofday (&tv, NULL);
 | 
			
		||||
 | 
			
		||||
	result = np_net_connect (server_address, server_port, &sd, PROTOCOL);
 | 
			
		||||
	if (result == STATE_CRITICAL) return STATE_CRITICAL;
 | 
			
		||||
	if (result == STATE_CRITICAL) return econn_refuse_state;
 | 
			
		||||
 | 
			
		||||
#ifdef HAVE_SSL
 | 
			
		||||
	if (flags & FLAG_SSL){
 | 
			
		||||
| 
						 | 
				
			
			@ -247,8 +247,8 @@ main (int argc, char **argv)
 | 
			
		|||
		}
 | 
			
		||||
	}
 | 
			
		||||
	if(result != STATE_OK){
 | 
			
		||||
		np_net_ssl_cleanup();
 | 
			
		||||
		if(sd) close(sd);
 | 
			
		||||
		np_net_ssl_cleanup();
 | 
			
		||||
		return result;
 | 
			
		||||
	}
 | 
			
		||||
#endif /* HAVE_SSL */
 | 
			
		||||
| 
						 | 
				
			
			@ -321,10 +321,10 @@ main (int argc, char **argv)
 | 
			
		|||
	if (server_quit != NULL) {
 | 
			
		||||
		my_send(server_quit, strlen(server_quit));
 | 
			
		||||
	}
 | 
			
		||||
	if (sd) close (sd);
 | 
			
		||||
#ifdef HAVE_SSL
 | 
			
		||||
	np_net_ssl_cleanup();
 | 
			
		||||
#endif
 | 
			
		||||
	if (sd) close (sd);
 | 
			
		||||
 | 
			
		||||
	microsec = deltime (tv);
 | 
			
		||||
	elapsed_time = (double)microsec / 1.0e6;
 | 
			
		||||
| 
						 | 
				
			
			@ -463,10 +463,10 @@ process_arguments (int argc, char **argv)
 | 
			
		|||
			usage5 ();
 | 
			
		||||
		case 'h':                 /* help */
 | 
			
		||||
			print_help ();
 | 
			
		||||
			exit (STATE_OK);
 | 
			
		||||
			exit (STATE_UNKNOWN);
 | 
			
		||||
		case 'V':                 /* version */
 | 
			
		||||
			print_revision (progname, NP_VERSION);
 | 
			
		||||
			exit (STATE_OK);
 | 
			
		||||
			exit (STATE_UNKNOWN);
 | 
			
		||||
		case 'v':                 /* verbose mode */
 | 
			
		||||
			flags |= FLAG_VERBOSE;
 | 
			
		||||
			match_flags |= NP_MATCH_VERBOSE;
 | 
			
		||||
| 
						 | 
				
			
			@ -577,7 +577,8 @@ process_arguments (int argc, char **argv)
 | 
			
		|||
			if ((temp=strchr(optarg,','))!=NULL) {
 | 
			
		||||
			    *temp='\0';
 | 
			
		||||
			    if (!is_intnonneg (optarg))
 | 
			
		||||
                               usage2 (_("Invalid certificate expiration period"), optarg);				 days_till_exp_warn = atoi(optarg);
 | 
			
		||||
                               usage2 (_("Invalid certificate expiration period"), optarg);
 | 
			
		||||
			    days_till_exp_warn = atoi (optarg);
 | 
			
		||||
			    *temp=',';
 | 
			
		||||
			    temp++;
 | 
			
		||||
			    if (!is_intnonneg (temp))
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -231,10 +231,10 @@ process_arguments (int argc, char **argv)
 | 
			
		|||
			usage5 ();
 | 
			
		||||
		case 'h':									/* help */
 | 
			
		||||
			print_help ();
 | 
			
		||||
			exit (STATE_OK);
 | 
			
		||||
			exit (STATE_UNKNOWN);
 | 
			
		||||
		case 'V':									/* version */
 | 
			
		||||
			print_revision (progname, NP_VERSION);
 | 
			
		||||
			exit (STATE_OK);
 | 
			
		||||
			exit (STATE_UNKNOWN);
 | 
			
		||||
		case 'H':									/* hostname */
 | 
			
		||||
			if (is_host (optarg) == FALSE)
 | 
			
		||||
				usage2 (_("Invalid hostname/address"), optarg);
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -558,10 +558,10 @@ process_arguments (int argc, char **argv)
 | 
			
		|||
			break;
 | 
			
		||||
		case 'V':									/* version */
 | 
			
		||||
			print_revision (progname, NP_VERSION);
 | 
			
		||||
			exit (STATE_OK);
 | 
			
		||||
			exit (STATE_UNKNOWN);
 | 
			
		||||
		case 'h':									/* help */
 | 
			
		||||
			print_help ();
 | 
			
		||||
			exit (STATE_OK);
 | 
			
		||||
			exit (STATE_UNKNOWN);
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -54,15 +54,15 @@ int process_arguments (int, char **);
 | 
			
		|||
void print_help (void);
 | 
			
		||||
void print_usage (void);
 | 
			
		||||
 | 
			
		||||
int wusers = -1;
 | 
			
		||||
int cusers = -1;
 | 
			
		||||
char *warning_range = NULL;
 | 
			
		||||
char *critical_range = NULL;
 | 
			
		||||
thresholds *thlds = NULL;
 | 
			
		||||
 | 
			
		||||
int
 | 
			
		||||
main (int argc, char **argv)
 | 
			
		||||
{
 | 
			
		||||
	int users = -1;
 | 
			
		||||
	int result = STATE_UNKNOWN;
 | 
			
		||||
	char *perf;
 | 
			
		||||
#if HAVE_WTSAPI32_H
 | 
			
		||||
	WTS_SESSION_INFO *wtsinfo;
 | 
			
		||||
	DWORD wtscount;
 | 
			
		||||
| 
						 | 
				
			
			@ -77,8 +77,6 @@ main (int argc, char **argv)
 | 
			
		|||
	bindtextdomain (PACKAGE, LOCALEDIR);
 | 
			
		||||
	textdomain (PACKAGE);
 | 
			
		||||
 | 
			
		||||
	perf = strdup ("");
 | 
			
		||||
 | 
			
		||||
	/* Parse extra opts if any */
 | 
			
		||||
	argv = np_extra_opts (&argc, argv, progname);
 | 
			
		||||
 | 
			
		||||
| 
						 | 
				
			
			@ -160,23 +158,15 @@ main (int argc, char **argv)
 | 
			
		|||
#endif
 | 
			
		||||
 | 
			
		||||
	/* check the user count against warning and critical thresholds */
 | 
			
		||||
	if (users > cusers)
 | 
			
		||||
		result = STATE_CRITICAL;
 | 
			
		||||
	else if (users > wusers)
 | 
			
		||||
		result = STATE_WARNING;
 | 
			
		||||
	else if (users >= 0)
 | 
			
		||||
		result = STATE_OK;
 | 
			
		||||
	result = get_status((double)users, thlds);
 | 
			
		||||
 | 
			
		||||
	if (result == STATE_UNKNOWN)
 | 
			
		||||
		printf ("%s\n", _("Unable to read output"));
 | 
			
		||||
	else {
 | 
			
		||||
		xasprintf (&perf, "%s", perfdata ("users", users, "",
 | 
			
		||||
		  TRUE, wusers,
 | 
			
		||||
		  TRUE, cusers,
 | 
			
		||||
		  TRUE, 0,
 | 
			
		||||
		  FALSE, 0));
 | 
			
		||||
		printf (_("USERS %s - %d users currently logged in |%s\n"), state_text (result),
 | 
			
		||||
		  users, perf);
 | 
			
		||||
		printf (_("USERS %s - %d users currently logged in |%s\n"), 
 | 
			
		||||
				state_text(result), users,
 | 
			
		||||
				sperfdata_int("users", users, "", warning_range,
 | 
			
		||||
							critical_range, TRUE, 0, FALSE, 0));
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	return result;
 | 
			
		||||
| 
						 | 
				
			
			@ -210,38 +200,32 @@ process_arguments (int argc, char **argv)
 | 
			
		|||
			usage5 ();
 | 
			
		||||
		case 'h':									/* help */
 | 
			
		||||
			print_help ();
 | 
			
		||||
			exit (STATE_OK);
 | 
			
		||||
			exit (STATE_UNKNOWN);
 | 
			
		||||
		case 'V':									/* version */
 | 
			
		||||
			print_revision (progname, NP_VERSION);
 | 
			
		||||
			exit (STATE_OK);
 | 
			
		||||
			exit (STATE_UNKNOWN);
 | 
			
		||||
		case 'c':									/* critical */
 | 
			
		||||
			if (!is_intnonneg (optarg))
 | 
			
		||||
				usage4 (_("Critical threshold must be a positive integer"));
 | 
			
		||||
			else
 | 
			
		||||
				cusers = atoi (optarg);
 | 
			
		||||
			critical_range = optarg;
 | 
			
		||||
			break;
 | 
			
		||||
		case 'w':									/* warning */
 | 
			
		||||
			if (!is_intnonneg (optarg))
 | 
			
		||||
				usage4 (_("Warning threshold must be a positive integer"));
 | 
			
		||||
			else
 | 
			
		||||
				wusers = atoi (optarg);
 | 
			
		||||
			warning_range = optarg;
 | 
			
		||||
			break;
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	c = optind;
 | 
			
		||||
	if (wusers == -1 && argc > c) {
 | 
			
		||||
		if (is_intnonneg (argv[c]) == FALSE)
 | 
			
		||||
			usage4 (_("Warning threshold must be a positive integer"));
 | 
			
		||||
		else
 | 
			
		||||
			wusers = atoi (argv[c++]);
 | 
			
		||||
	}
 | 
			
		||||
	if (cusers == -1 && argc > c) {
 | 
			
		||||
		if (is_intnonneg (argv[c]) == FALSE)
 | 
			
		||||
			usage4 (_("Warning threshold must be a positive integer"));
 | 
			
		||||
		else
 | 
			
		||||
			cusers = atoi (argv[c]);
 | 
			
		||||
	}
 | 
			
		||||
	if (warning_range == NULL && argc > c)
 | 
			
		||||
		warning_range = argv[c++];
 | 
			
		||||
	if (critical_range == NULL && argc > c)
 | 
			
		||||
		critical_range = argv[c++];
 | 
			
		||||
 | 
			
		||||
	/* this will abort in case of invalid ranges */
 | 
			
		||||
	set_thresholds (&thlds, warning_range, critical_range);
 | 
			
		||||
 | 
			
		||||
	if (thlds->warning->end < 0)
 | 
			
		||||
		usage4 (_("Warning threshold must be a positive integer"));
 | 
			
		||||
	if (thlds->critical->end < 0)
 | 
			
		||||
		usage4 (_("Critical threshold must be a positive integer"));
 | 
			
		||||
 | 
			
		||||
	return OK;
 | 
			
		||||
}
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -161,6 +161,13 @@
 | 
			
		|||
#  endif
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
/* openssl 1.1 does not set OPENSSL_NO_SSL2 by default but ships without ssl2 */
 | 
			
		||||
#ifdef OPENSSL_VERSION_NUMBER
 | 
			
		||||
#  if OPENSSL_VERSION_NUMBER >= 0x10100000
 | 
			
		||||
#   define OPENSSL_NO_SSL2
 | 
			
		||||
#  endif
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
/*
 | 
			
		||||
 *
 | 
			
		||||
 * Standard Values
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -59,8 +59,8 @@ static int state[4] = {
 | 
			
		|||
int
 | 
			
		||||
main (int argc, char **argv)
 | 
			
		||||
{
 | 
			
		||||
	int found = 0, result = STATE_UNKNOWN;
 | 
			
		||||
	char *buf, *sub;
 | 
			
		||||
	int result = STATE_UNKNOWN;
 | 
			
		||||
	char *sub;
 | 
			
		||||
	char **command_line;
 | 
			
		||||
	output chld_out, chld_err;
 | 
			
		||||
	int i;
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -161,6 +161,10 @@ process_request (const char *server_address, int server_port, int proto,
 | 
			
		|||
int
 | 
			
		||||
np_net_connect (const char *host_name, int port, int *sd, int proto)
 | 
			
		||||
{
 | 
			
		||||
        /* send back STATE_UNKOWN if there's an error
 | 
			
		||||
           send back STATE_OK if we connect
 | 
			
		||||
           send back STATE_CRITICAL if we can't connect.
 | 
			
		||||
           Let upstream figure out what to send to the user. */
 | 
			
		||||
	struct addrinfo hints;
 | 
			
		||||
	struct addrinfo *r, *res;
 | 
			
		||||
	struct sockaddr_un su;
 | 
			
		||||
| 
						 | 
				
			
			@ -250,16 +254,14 @@ np_net_connect (const char *host_name, int port, int *sd, int proto)
 | 
			
		|||
	else if (was_refused) {
 | 
			
		||||
		switch (econn_refuse_state) { /* a user-defined expected outcome */
 | 
			
		||||
		case STATE_OK:
 | 
			
		||||
		case STATE_WARNING:  /* user wants WARN or OK on refusal */
 | 
			
		||||
			return econn_refuse_state;
 | 
			
		||||
			break;
 | 
			
		||||
		case STATE_CRITICAL: /* user did not set econn_refuse_state */
 | 
			
		||||
		case STATE_WARNING:  /* user wants WARN or OK on refusal, or... */
 | 
			
		||||
		case STATE_CRITICAL: /* user did not set econn_refuse_state, or wanted critical */
 | 
			
		||||
			if (is_socket)
 | 
			
		||||
				printf("connect to file socket %s: %s\n", host_name, strerror(errno));
 | 
			
		||||
			else
 | 
			
		||||
				printf("connect to address %s and port %d: %s\n",
 | 
			
		||||
				       host_name, port, strerror(errno));
 | 
			
		||||
			return econn_refuse_state;
 | 
			
		||||
			return STATE_CRITICAL;
 | 
			
		||||
			break;
 | 
			
		||||
		default: /* it's a logic error if we do not end up in STATE_(OK|WARNING|CRITICAL) */
 | 
			
		||||
			return STATE_UNKNOWN;
 | 
			
		||||
| 
						 | 
				
			
			@ -357,20 +359,21 @@ is_addr (const char *address)
 | 
			
		|||
}
 | 
			
		||||
 | 
			
		||||
int
 | 
			
		||||
resolve_host_or_addr (const char *address, int family)
 | 
			
		||||
dns_lookup (const char *in, struct sockaddr_storage *ss, int family)
 | 
			
		||||
{
 | 
			
		||||
	struct addrinfo hints;
 | 
			
		||||
	struct addrinfo *res;
 | 
			
		||||
	int retval;
 | 
			
		||||
 | 
			
		||||
	memset (&hints, 0, sizeof (hints));
 | 
			
		||||
	memset (&hints, 0, sizeof(struct addrinfo));
 | 
			
		||||
	hints.ai_family = family;
 | 
			
		||||
	retval = getaddrinfo (address, NULL, &hints, &res);
 | 
			
		||||
 | 
			
		||||
	retval = getaddrinfo (in, NULL, &hints, &res);
 | 
			
		||||
	if (retval != 0)
 | 
			
		||||
		return FALSE;
 | 
			
		||||
	else {
 | 
			
		||||
		freeaddrinfo (res);
 | 
			
		||||
		return TRUE;
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if (ss != NULL)
 | 
			
		||||
		memcpy (ss, res->ai_addr, res->ai_addrlen);
 | 
			
		||||
	freeaddrinfo (res);
 | 
			
		||||
	return TRUE;
 | 
			
		||||
}
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -45,6 +45,10 @@
 | 
			
		|||
# endif /* UNIX_PATH_MAX */
 | 
			
		||||
#endif /* HAVE_SYS_UN_H */
 | 
			
		||||
 | 
			
		||||
#ifndef HOST_MAX_BYTES
 | 
			
		||||
# define HOST_MAX_BYTES 255
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
/* process_request and wrapper macros */
 | 
			
		||||
#define process_tcp_request(addr, port, sbuf, rbuf, rsize) \
 | 
			
		||||
	process_request(addr, port, IPPROTO_TCP, sbuf, rbuf, rsize)
 | 
			
		||||
| 
						 | 
				
			
			@ -71,8 +75,9 @@ int send_request (int sd, int proto, const char *send_buffer, char *recv_buffer,
 | 
			
		|||
/* "is_*" wrapper macros and functions */
 | 
			
		||||
int is_host (const char *);
 | 
			
		||||
int is_addr (const char *);
 | 
			
		||||
int resolve_host_or_addr (const char *, int);
 | 
			
		||||
int dns_lookup (const char *, struct sockaddr_storage *, int);
 | 
			
		||||
void host_or_die(const char *str);
 | 
			
		||||
#define resolve_host_or_addr(addr, family) dns_lookup(addr, NULL, family)
 | 
			
		||||
#define is_inet_addr(addr) resolve_host_or_addr(addr, AF_INET)
 | 
			
		||||
#ifdef USE_IPV6
 | 
			
		||||
#  define is_inet6_addr(addr) resolve_host_or_addr(addr, AF_INET6)
 | 
			
		||||
| 
						 | 
				
			
			@ -91,6 +96,16 @@ RETSIGTYPE socket_timeout_alarm_handler (int) __attribute__((noreturn));
 | 
			
		|||
 | 
			
		||||
/* SSL-Related functionality */
 | 
			
		||||
#ifdef HAVE_SSL
 | 
			
		||||
#  define MP_SSLv2 1
 | 
			
		||||
#  define MP_SSLv3 2
 | 
			
		||||
#  define MP_TLSv1 3
 | 
			
		||||
#  define MP_TLSv1_1 4
 | 
			
		||||
#  define MP_TLSv1_2 5
 | 
			
		||||
#  define MP_SSLv2_OR_NEWER 6
 | 
			
		||||
#  define MP_SSLv3_OR_NEWER 7
 | 
			
		||||
#  define MP_TLSv1_OR_NEWER 8
 | 
			
		||||
#  define MP_TLSv1_1_OR_NEWER 9
 | 
			
		||||
#  define MP_TLSv1_2_OR_NEWER 10
 | 
			
		||||
/* maybe this could be merged with the above np_net_connect, via some flags */
 | 
			
		||||
int np_net_ssl_init(int sd);
 | 
			
		||||
int np_net_ssl_init_with_hostname(int sd, char *host_name);
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -48,34 +48,79 @@ int np_net_ssl_init_with_hostname_and_version(int sd, char *host_name, int versi
 | 
			
		|||
}
 | 
			
		||||
 | 
			
		||||
int np_net_ssl_init_with_hostname_version_and_cert(int sd, char *host_name, int version, char *cert, char *privkey) {
 | 
			
		||||
	SSL_METHOD *method = NULL;
 | 
			
		||||
	const SSL_METHOD *method = NULL;
 | 
			
		||||
	long options = 0;
 | 
			
		||||
 | 
			
		||||
	switch (version) {
 | 
			
		||||
	case 0: /* Deafult to auto negotiation */
 | 
			
		||||
		method = SSLv23_client_method();
 | 
			
		||||
		break;
 | 
			
		||||
	case 1: /* TLSv1 protocol */
 | 
			
		||||
		method = TLSv1_client_method();
 | 
			
		||||
		break;
 | 
			
		||||
	case 2: /* SSLv2 protocol */
 | 
			
		||||
	case MP_SSLv2: /* SSLv2 protocol */
 | 
			
		||||
#if defined(USE_GNUTLS) || defined(OPENSSL_NO_SSL2)
 | 
			
		||||
		printf("%s\n", _("CRITICAL - SSL protocol version 2 is not supported by your SSL library."));
 | 
			
		||||
		return STATE_CRITICAL;
 | 
			
		||||
		printf("%s\n", _("UNKNOWN - SSL protocol version 2 is not supported by your SSL library."));
 | 
			
		||||
		return STATE_UNKNOWN;
 | 
			
		||||
#else
 | 
			
		||||
		method = SSLv2_client_method();
 | 
			
		||||
#endif
 | 
			
		||||
		break;
 | 
			
		||||
	case 3: /* SSLv3 protocol */
 | 
			
		||||
#endif
 | 
			
		||||
	case MP_SSLv3: /* SSLv3 protocol */
 | 
			
		||||
#if defined(OPENSSL_NO_SSL3)
 | 
			
		||||
		printf("%s\n", _("CRITICAL - SSL protocol version 3 is not supported by your SSL library."));
 | 
			
		||||
		return STATE_CRITICAL;
 | 
			
		||||
		printf("%s\n", _("UNKNOWN - SSL protocol version 3 is not supported by your SSL library."));
 | 
			
		||||
		return STATE_UNKNOWN;
 | 
			
		||||
#else
 | 
			
		||||
		method = SSLv3_client_method();
 | 
			
		||||
#endif
 | 
			
		||||
		break;
 | 
			
		||||
	default: /* Unsupported */
 | 
			
		||||
		printf("%s\n", _("CRITICAL - Unsupported SSL protocol version."));
 | 
			
		||||
		return STATE_CRITICAL;
 | 
			
		||||
#endif
 | 
			
		||||
	case MP_TLSv1: /* TLSv1 protocol */
 | 
			
		||||
#if defined(OPENSSL_NO_TLS1)
 | 
			
		||||
		printf("%s\n", _("UNKNOWN - TLS protocol version 1 is not supported by your SSL library."));
 | 
			
		||||
		return STATE_UNKNOWN;
 | 
			
		||||
#else
 | 
			
		||||
		method = TLSv1_client_method();
 | 
			
		||||
		break;
 | 
			
		||||
#endif
 | 
			
		||||
	case MP_TLSv1_1: /* TLSv1.1 protocol */
 | 
			
		||||
#if !defined(SSL_OP_NO_TLSv1_1)
 | 
			
		||||
		printf("%s\n", _("UNKNOWN - TLS protocol version 1.1 is not supported by your SSL library."));
 | 
			
		||||
		return STATE_UNKNOWN;
 | 
			
		||||
#else
 | 
			
		||||
		method = TLSv1_1_client_method();
 | 
			
		||||
		break;
 | 
			
		||||
#endif
 | 
			
		||||
	case MP_TLSv1_2: /* TLSv1.2 protocol */
 | 
			
		||||
#if !defined(SSL_OP_NO_TLSv1_2)
 | 
			
		||||
		printf("%s\n", _("UNKNOWN - TLS protocol version 1.2 is not supported by your SSL library."));
 | 
			
		||||
		return STATE_UNKNOWN;
 | 
			
		||||
#else
 | 
			
		||||
		method = TLSv1_2_client_method();
 | 
			
		||||
		break;
 | 
			
		||||
#endif
 | 
			
		||||
	case MP_TLSv1_2_OR_NEWER:
 | 
			
		||||
#if !defined(SSL_OP_NO_TLSv1_1)
 | 
			
		||||
		printf("%s\n", _("UNKNOWN - Disabling TLSv1.1 is not supported by your SSL library."));
 | 
			
		||||
		return STATE_UNKNOWN;
 | 
			
		||||
#else
 | 
			
		||||
		options |= SSL_OP_NO_TLSv1_1;
 | 
			
		||||
#endif
 | 
			
		||||
		/* FALLTHROUGH */
 | 
			
		||||
	case MP_TLSv1_1_OR_NEWER:
 | 
			
		||||
#if !defined(SSL_OP_NO_TLSv1)
 | 
			
		||||
		printf("%s\n", _("UNKNOWN - Disabling TLSv1 is not supported by your SSL library."));
 | 
			
		||||
		return STATE_UNKNOWN;
 | 
			
		||||
#else
 | 
			
		||||
		options |= SSL_OP_NO_TLSv1;
 | 
			
		||||
#endif
 | 
			
		||||
		/* FALLTHROUGH */
 | 
			
		||||
	case MP_TLSv1_OR_NEWER:
 | 
			
		||||
#if defined(SSL_OP_NO_SSLv3)
 | 
			
		||||
		options |= SSL_OP_NO_SSLv3;
 | 
			
		||||
#endif
 | 
			
		||||
		/* FALLTHROUGH */
 | 
			
		||||
	case MP_SSLv3_OR_NEWER:
 | 
			
		||||
#if defined(SSL_OP_NO_SSLv2)
 | 
			
		||||
		options |= SSL_OP_NO_SSLv2;
 | 
			
		||||
#endif
 | 
			
		||||
	case MP_SSLv2_OR_NEWER:
 | 
			
		||||
		/* FALLTHROUGH */
 | 
			
		||||
	default: /* Default to auto negotiation */
 | 
			
		||||
		method = SSLv23_client_method();
 | 
			
		||||
	}
 | 
			
		||||
	if (!initialized) {
 | 
			
		||||
		/* Initialize SSL context */
 | 
			
		||||
| 
						 | 
				
			
			@ -99,8 +144,9 @@ int np_net_ssl_init_with_hostname_version_and_cert(int sd, char *host_name, int
 | 
			
		|||
#endif
 | 
			
		||||
	}
 | 
			
		||||
#ifdef SSL_OP_NO_TICKET
 | 
			
		||||
	SSL_CTX_set_options(c, SSL_OP_NO_TICKET);
 | 
			
		||||
	options |= SSL_OP_NO_TICKET;
 | 
			
		||||
#endif
 | 
			
		||||
	SSL_CTX_set_options(c, options);
 | 
			
		||||
	SSL_CTX_set_mode(c, SSL_MODE_AUTO_RETRY);
 | 
			
		||||
	if ((s = SSL_new(c)) != NULL) {
 | 
			
		||||
#ifdef SSL_set_tlsext_host_name
 | 
			
		||||
| 
						 | 
				
			
			@ -149,7 +195,10 @@ int np_net_ssl_check_cert(int days_till_exp_warn, int days_till_exp_crit){
 | 
			
		|||
#  ifdef USE_OPENSSL
 | 
			
		||||
	X509 *certificate=NULL;
 | 
			
		||||
	X509_NAME *subj=NULL;
 | 
			
		||||
	char timestamp[50] = "";
 | 
			
		||||
	char cn[MAX_CN_LENGTH]= "";
 | 
			
		||||
	char *tz;
 | 
			
		||||
	
 | 
			
		||||
	int cnlen =-1;
 | 
			
		||||
	int status=STATE_UNKNOWN;
 | 
			
		||||
 | 
			
		||||
| 
						 | 
				
			
			@ -158,7 +207,7 @@ int np_net_ssl_check_cert(int days_till_exp_warn, int days_till_exp_crit){
 | 
			
		|||
	struct tm stamp;
 | 
			
		||||
	float time_left;
 | 
			
		||||
	int days_left;
 | 
			
		||||
	char timestamp[50] = "";
 | 
			
		||||
	int time_remaining;
 | 
			
		||||
	time_t tm_t;
 | 
			
		||||
 | 
			
		||||
	certificate=SSL_get_peer_certificate(s);
 | 
			
		||||
| 
						 | 
				
			
			@ -212,32 +261,55 @@ int np_net_ssl_check_cert(int days_till_exp_warn, int days_till_exp_crit){
 | 
			
		|||
		(tm->data[6 + offset] - '0') * 10 + (tm->data[7 + offset] - '0');
 | 
			
		||||
	stamp.tm_min =
 | 
			
		||||
		(tm->data[8 + offset] - '0') * 10 + (tm->data[9 + offset] - '0');
 | 
			
		||||
	stamp.tm_sec = 0;
 | 
			
		||||
	stamp.tm_sec =
 | 
			
		||||
		(tm->data[10 + offset] - '0') * 10 + (tm->data[11 + offset] - '0');
 | 
			
		||||
	stamp.tm_isdst = -1;
 | 
			
		||||
 | 
			
		||||
	time_left = difftime(timegm(&stamp), time(NULL));
 | 
			
		||||
	tm_t = timegm(&stamp);
 | 
			
		||||
	time_left = difftime(tm_t, time(NULL));
 | 
			
		||||
	days_left = time_left / 86400;
 | 
			
		||||
	tm_t = mktime (&stamp);
 | 
			
		||||
	strftime(timestamp, 50, "%c", localtime(&tm_t));
 | 
			
		||||
	tz = getenv("TZ");
 | 
			
		||||
	setenv("TZ", "GMT", 1);
 | 
			
		||||
	tzset();
 | 
			
		||||
	strftime(timestamp, 50, "%c %z", localtime(&tm_t));
 | 
			
		||||
	if (tz)
 | 
			
		||||
		setenv("TZ", tz, 1);
 | 
			
		||||
	else
 | 
			
		||||
		unsetenv("TZ");
 | 
			
		||||
	tzset();
 | 
			
		||||
 | 
			
		||||
	if (days_left > 0 && days_left <= days_till_exp_warn) {
 | 
			
		||||
		printf (_("%s - Certificate '%s' expires in %d day(s) (%s).\n"), (days_left>days_till_exp_crit)?"WARNING":"CRITICAL", cn, days_left, timestamp);
 | 
			
		||||
		if (days_left > days_till_exp_crit)
 | 
			
		||||
			return STATE_WARNING;
 | 
			
		||||
			status = STATE_WARNING;
 | 
			
		||||
		else
 | 
			
		||||
			return STATE_CRITICAL;
 | 
			
		||||
			status = STATE_CRITICAL;
 | 
			
		||||
	} else if (days_left == 0 && time_left > 0) {
 | 
			
		||||
		if (time_left >= 3600)
 | 
			
		||||
			time_remaining = (int) time_left / 3600;
 | 
			
		||||
		else
 | 
			
		||||
			time_remaining = (int) time_left / 60;
 | 
			
		||||
 | 
			
		||||
		printf (_("%s - Certificate '%s' expires in %u %s (%s)\n"),
 | 
			
		||||
			(days_left>days_till_exp_crit) ? "WARNING" : "CRITICAL", cn, time_remaining,
 | 
			
		||||
			time_left >= 3600 ? "hours" : "minutes", timestamp);
 | 
			
		||||
 | 
			
		||||
		if ( days_left > days_till_exp_crit)
 | 
			
		||||
			status = STATE_WARNING;
 | 
			
		||||
		else
 | 
			
		||||
			status = STATE_CRITICAL;
 | 
			
		||||
	} else if (time_left < 0) {
 | 
			
		||||
		printf(_("CRITICAL - Certificate '%s' expired on %s.\n"), cn, timestamp);
 | 
			
		||||
		status=STATE_CRITICAL;
 | 
			
		||||
	} else if (days_left == 0) {
 | 
			
		||||
		printf (_("%s - Certificate '%s' expires today (%s).\n"), (days_left>days_till_exp_crit)?"WARNING":"CRITICAL", cn, timestamp);
 | 
			
		||||
		printf (_("%s - Certificate '%s' just expired (%s).\n"), (days_left>days_till_exp_crit)?"WARNING":"CRITICAL", cn, timestamp);
 | 
			
		||||
		if (days_left > days_till_exp_crit)
 | 
			
		||||
			return STATE_WARNING;
 | 
			
		||||
			status = STATE_WARNING;
 | 
			
		||||
		else
 | 
			
		||||
			return STATE_CRITICAL;
 | 
			
		||||
			status = STATE_CRITICAL;
 | 
			
		||||
	} else {
 | 
			
		||||
		printf(_("OK - Certificate '%s' will expire on %s.\n"), cn, timestamp);
 | 
			
		||||
		status=STATE_OK;
 | 
			
		||||
		status = STATE_OK;
 | 
			
		||||
	}
 | 
			
		||||
	X509_free(certificate);
 | 
			
		||||
	return status;
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -11,7 +11,7 @@
 | 
			
		|||
  'NP_HOST_NONRESPONSIVE' => '10.0.0.1',
 | 
			
		||||
  'NP_HOST_RESPONSIVE' => 'localhost',
 | 
			
		||||
  'NP_HOST_SMB' => '',
 | 
			
		||||
  'NP_HOST_SNMP' => '',
 | 
			
		||||
  'NP_HOST_SNMP' => 'localhost',
 | 
			
		||||
  'NP_HOST_TCP_FTP' => '',
 | 
			
		||||
  'NP_HOST_TCP_HPJD' => '',
 | 
			
		||||
  'NP_HOST_HPJD_PORT_INVALID' => '161',
 | 
			
		||||
| 
						 | 
				
			
			@ -19,12 +19,14 @@
 | 
			
		|||
  'NP_HOST_TCP_HTTP' => 'localhost',
 | 
			
		||||
  'NP_HOST_TCP_HTTP2' => 'test.monitoring-plugins.org',
 | 
			
		||||
  'NP_HOST_TCP_IMAP' => 'imap.web.de',
 | 
			
		||||
  'NP_HOST_TCP_LDAP' => 'localhost',
 | 
			
		||||
  'NP_HOST_TCP_POP' => 'pop.web.de',
 | 
			
		||||
  'NP_HOST_TCP_SMTP' => 'localhost',
 | 
			
		||||
  'NP_HOST_TCP_SMTP_NOTLS' => '',
 | 
			
		||||
  'NP_HOST_TCP_SMTP_TLS' => '',
 | 
			
		||||
  'NP_INTERNET_ACCESS' => 'yes',
 | 
			
		||||
  'NP_MOUNTPOINT2_VALID' => '',
 | 
			
		||||
  'NP_LDAP_BASE_DN' => 'cn=admin,dc=nodomain',
 | 
			
		||||
  'NP_MOUNTPOINT2_VALID' => '/media/ramdisk',
 | 
			
		||||
  'NP_MOUNTPOINT_VALID' => '/',
 | 
			
		||||
  'NP_MYSQL_SERVER' => 'localhost',
 | 
			
		||||
  'NP_HOST_UDP_TIME' => 'localhost',
 | 
			
		||||
| 
						 | 
				
			
			@ -37,7 +39,7 @@
 | 
			
		|||
  'NP_SMB_SHARE_SPC' => '',
 | 
			
		||||
  'NP_SMB_VALID_USER' => '',
 | 
			
		||||
  'NP_SMB_VALID_USER_PASS' => '',
 | 
			
		||||
  'NP_SNMP_COMMUNITY' => '',
 | 
			
		||||
  'NP_SNMP_COMMUNITY' => 'public',
 | 
			
		||||
  'NP_SSH_CONFIGFILE' => '~/.ssh/config',
 | 
			
		||||
  'NP_SSH_HOST' => 'localhost',
 | 
			
		||||
  'NP_SSH_IDENTITY' => '~/.ssh/id_dsa',
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -6,9 +6,10 @@
 | 
			
		|||
 | 
			
		||||
use strict;
 | 
			
		||||
use Test::More;
 | 
			
		||||
use POSIX qw/mktime strftime/;
 | 
			
		||||
use NPTest;
 | 
			
		||||
 | 
			
		||||
plan tests => 30;
 | 
			
		||||
plan tests => 49;
 | 
			
		||||
 | 
			
		||||
my $successOutput = '/OK.*HTTP.*second/';
 | 
			
		||||
 | 
			
		||||
| 
						 | 
				
			
			@ -34,6 +35,8 @@ my $host_tcp_http2  = getTestParameter( "NP_HOST_TCP_HTTP2",
 | 
			
		|||
            "A host providing an index page containing the string 'monitoring'",
 | 
			
		||||
            "test.monitoring-plugins.org" );
 | 
			
		||||
 | 
			
		||||
my $faketime = -x '/usr/bin/faketime' ? 1 : 0;
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
$res = NPTest->testCmd(
 | 
			
		||||
	"./check_http $host_tcp_http -wt 300 -ct 600"
 | 
			
		||||
| 
						 | 
				
			
			@ -47,10 +50,10 @@ $res = NPTest->testCmd(
 | 
			
		|||
like( $res->output, '/bob:there\r\ncarl:frown\r\n/', "Got headers with multiple -k options" );
 | 
			
		||||
 | 
			
		||||
$res = NPTest->testCmd(
 | 
			
		||||
	"./check_http $host_nonresponsive -wt 1 -ct 2"
 | 
			
		||||
	"./check_http $host_nonresponsive -wt 1 -ct 2 -t 3"
 | 
			
		||||
	);
 | 
			
		||||
cmp_ok( $res->return_code, '==', 2, "Webserver $host_nonresponsive not responding" );
 | 
			
		||||
cmp_ok( $res->output, 'eq', "CRITICAL - Socket timeout after 10 seconds", "Output OK");
 | 
			
		||||
cmp_ok( $res->output, 'eq', "CRITICAL - Socket timeout after 3 seconds", "Output OK");
 | 
			
		||||
 | 
			
		||||
$res = NPTest->testCmd(
 | 
			
		||||
	"./check_http $hostname_invalid -wt 1 -ct 2"
 | 
			
		||||
| 
						 | 
				
			
			@ -61,6 +64,32 @@ cmp_ok( $res->return_code, '==', 2, "Webserver $hostname_invalid not valid" );
 | 
			
		|||
# Is also possible to get a socket timeout if DNS is not responding fast enough
 | 
			
		||||
like( $res->output, "/Unable to open TCP socket|Socket timeout after/", "Output OK");
 | 
			
		||||
 | 
			
		||||
# host header checks
 | 
			
		||||
$res = NPTest->testCmd("./check_http -v -H $host_tcp_http");
 | 
			
		||||
like( $res->output, '/^Host: '.$host_tcp_http.'\s*$/ms', "Host Header OK" );
 | 
			
		||||
 | 
			
		||||
$res = NPTest->testCmd("./check_http -v -H $host_tcp_http -p 80");
 | 
			
		||||
like( $res->output, '/^Host: '.$host_tcp_http.'\s*$/ms', "Host Header OK" );
 | 
			
		||||
 | 
			
		||||
$res = NPTest->testCmd("./check_http -v -H $host_tcp_http:8080 -p 80");
 | 
			
		||||
like( $res->output, '/^Host: '.$host_tcp_http.':8080\s*$/ms', "Host Header OK" );
 | 
			
		||||
 | 
			
		||||
$res = NPTest->testCmd("./check_http -v -H $host_tcp_http:8080 -p 80");
 | 
			
		||||
like( $res->output, '/^Host: '.$host_tcp_http.':8080\s*$/ms', "Host Header OK" );
 | 
			
		||||
 | 
			
		||||
SKIP: {
 | 
			
		||||
        skip "No internet access", 3 if $internet_access eq "no";
 | 
			
		||||
 | 
			
		||||
        $res = NPTest->testCmd("./check_http -v -H www.verisign.com -S");
 | 
			
		||||
        like( $res->output, '/^Host: www.verisign.com\s*$/ms', "Host Header OK" );
 | 
			
		||||
 | 
			
		||||
        $res = NPTest->testCmd("./check_http -v -H www.verisign.com:8080 -S -p 443");
 | 
			
		||||
        like( $res->output, '/^Host: www.verisign.com:8080\s*$/ms', "Host Header OK" );
 | 
			
		||||
 | 
			
		||||
        $res = NPTest->testCmd("./check_http -v -H www.verisign.com:443 -S -p 443");
 | 
			
		||||
        like( $res->output, '/^Host: www.verisign.com\s*$/ms', "Host Header OK" );
 | 
			
		||||
};
 | 
			
		||||
 | 
			
		||||
SKIP: {
 | 
			
		||||
        skip "No host serving monitoring in index file", 7 unless $host_tcp_http2;
 | 
			
		||||
 | 
			
		||||
| 
						 | 
				
			
			@ -112,12 +141,46 @@ SKIP: {
 | 
			
		|||
        $res = NPTest->testCmd( "./check_http www.verisign.com -C 1" );
 | 
			
		||||
        cmp_ok( $res->output, 'eq', $saved_cert_output, "Old syntax for cert checking still works");
 | 
			
		||||
 | 
			
		||||
        # run some certificate checks with faketime
 | 
			
		||||
        SKIP: {
 | 
			
		||||
                skip "No faketime binary found", 12 if !$faketime;
 | 
			
		||||
                $res = NPTest->testCmd("LC_TIME=C TZ=UTC ./check_http -C 1 www.verisign.com");
 | 
			
		||||
                like($res->output, qr/OK - Certificate 'www.verisign.com' will expire on/, "Catch cert output");
 | 
			
		||||
                is( $res->return_code, 0, "Catch cert output exit code" );
 | 
			
		||||
                my($mon,$day,$hour,$min,$sec,$year) = ($res->output =~ /(\w+)\s+(\d+)\s+(\d+):(\d+):(\d+)\s+(\d+)/);
 | 
			
		||||
                if(!defined $year) {
 | 
			
		||||
                    die("parsing date failed from: ".$res->output);
 | 
			
		||||
                }
 | 
			
		||||
                my $months = {'Jan' => 0, 'Feb' => 1, 'Mar' => 2, 'Apr' => 3, 'May' => 4, 'Jun' => 5, 'Jul' => 6, 'Aug' => 7, 'Sep' => 8, 'Oct' => 9, 'Nov' => 10, 'Dec' => 11};
 | 
			
		||||
                my $ts   = mktime($sec, $min, $hour, $day, $months->{$mon}, $year-1900);
 | 
			
		||||
                my $time = strftime("%Y-%m-%d %H:%M:%S", localtime($ts));
 | 
			
		||||
                $res = NPTest->testCmd("LC_TIME=C TZ=UTC faketime -f '".strftime("%Y-%m-%d %H:%M:%S", localtime($ts))."' ./check_http -C 1 www.verisign.com");
 | 
			
		||||
                like($res->output, qr/CRITICAL - Certificate 'www.verisign.com' just expired/, "Output on expire date");
 | 
			
		||||
                is( $res->return_code, 2, "Output on expire date" );
 | 
			
		||||
 | 
			
		||||
                $res = NPTest->testCmd("LC_TIME=C TZ=UTC faketime -f '".strftime("%Y-%m-%d %H:%M:%S", localtime($ts-1))."' ./check_http -C 1 www.verisign.com");
 | 
			
		||||
                like($res->output, qr/CRITICAL - Certificate 'www.verisign.com' expires in 0 minutes/, "cert expires in 1 second output");
 | 
			
		||||
                is( $res->return_code, 2, "cert expires in 1 second exit code" );
 | 
			
		||||
 | 
			
		||||
                $res = NPTest->testCmd("LC_TIME=C TZ=UTC faketime -f '".strftime("%Y-%m-%d %H:%M:%S", localtime($ts-120))."' ./check_http -C 1 www.verisign.com");
 | 
			
		||||
                like($res->output, qr/CRITICAL - Certificate 'www.verisign.com' expires in 2 minutes/, "cert expires in 2 minutes output");
 | 
			
		||||
                is( $res->return_code, 2, "cert expires in 2 minutes exit code" );
 | 
			
		||||
 | 
			
		||||
                $res = NPTest->testCmd("LC_TIME=C TZ=UTC faketime -f '".strftime("%Y-%m-%d %H:%M:%S", localtime($ts-7200))."' ./check_http -C 1 www.verisign.com");
 | 
			
		||||
                like($res->output, qr/CRITICAL - Certificate 'www.verisign.com' expires in 2 hours/, "cert expires in 2 hours output");
 | 
			
		||||
                is( $res->return_code, 2, "cert expires in 2 hours exit code" );
 | 
			
		||||
 | 
			
		||||
                $res = NPTest->testCmd("LC_TIME=C TZ=UTC faketime -f '".strftime("%Y-%m-%d %H:%M:%S", localtime($ts+1))."' ./check_http -C 1 www.verisign.com");
 | 
			
		||||
                like($res->output, qr/CRITICAL - Certificate 'www.verisign.com' expired on/, "Certificate expired output");
 | 
			
		||||
                is( $res->return_code, 2, "Certificate expired exit code" );
 | 
			
		||||
        };
 | 
			
		||||
 | 
			
		||||
        $res = NPTest->testCmd( "./check_http --ssl www.verisign.com -E" );
 | 
			
		||||
        like  ( $res->output, '/time_connect=[\d\.]+/', 'Extended Performance Data Output OK' );
 | 
			
		||||
        like  ( $res->output, '/time_ssl=[\d\.]+/', 'Extended Performance Data SSL Output OK' );
 | 
			
		||||
 | 
			
		||||
        $res = NPTest->testCmd(
 | 
			
		||||
                "./check_http --ssl www.e-paycobalt.com"
 | 
			
		||||
                "./check_http --ssl -H www.e-paycobalt.com"
 | 
			
		||||
                );
 | 
			
		||||
        cmp_ok( $res->return_code, "==", 0, "Can read https for www.e-paycobalt.com (uses AES certificate)" );
 | 
			
		||||
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
							
								
								
									
										80
									
								
								plugins/t/check_ldap.t
									
										
									
									
									
										Normal file
									
								
							
							
						
						
									
										80
									
								
								plugins/t/check_ldap.t
									
										
									
									
									
										Normal file
									
								
							| 
						 | 
				
			
			@ -0,0 +1,80 @@
 | 
			
		|||
#!/usr/bin/env perl -I ..
 | 
			
		||||
#
 | 
			
		||||
# Lightweight Directory Access Protocol (LDAP) Test via check_ldap
 | 
			
		||||
#
 | 
			
		||||
#
 | 
			
		||||
 | 
			
		||||
use strict;
 | 
			
		||||
use warnings;
 | 
			
		||||
use Test::More;
 | 
			
		||||
use NPTest;
 | 
			
		||||
 | 
			
		||||
my $host_tcp_ldap      = getTestParameter("NP_HOST_TCP_LDAP",
 | 
			
		||||
                                          "A host providing the LDAP Service",
 | 
			
		||||
                                          "localhost" );
 | 
			
		||||
 | 
			
		||||
my $ldap_base_dn       = getTestParameter("NP_LDAP_BASE_DN",
 | 
			
		||||
                                          "A base dn for the LDAP Service",
 | 
			
		||||
                                          "cn=admin" );
 | 
			
		||||
 | 
			
		||||
my $host_nonresponsive = getTestParameter("host_nonresponsive", "NP_HOST_NONRESPONSIVE", "10.0.0.1",
 | 
			
		||||
                                          "The hostname of system not responsive to network requests" );
 | 
			
		||||
 | 
			
		||||
my $hostname_invalid   = getTestParameter("hostname_invalid",   "NP_HOSTNAME_INVALID",   "nosuchhost",
 | 
			
		||||
                                          "An invalid (not known to DNS) hostname" );
 | 
			
		||||
 | 
			
		||||
my($result, $cmd);
 | 
			
		||||
my $command = './check_ldap';
 | 
			
		||||
 | 
			
		||||
plan tests => 16;
 | 
			
		||||
 | 
			
		||||
SKIP: {
 | 
			
		||||
    skip "NP_HOST_NONRESPONSIVE not set", 2 if ! $host_nonresponsive;
 | 
			
		||||
 | 
			
		||||
    $result = NPTest->testCmd("$command -H $host_nonresponsive -b ou=blah -t 2 -w 1 -c 1");
 | 
			
		||||
    is( $result->return_code, 2, "$command -H $host_nonresponsive -b ou=blah -t 5 -w 2 -c 3" );
 | 
			
		||||
    is( $result->output, 'CRITICAL - Socket timeout after 2 seconds', "output ok" );
 | 
			
		||||
};
 | 
			
		||||
 | 
			
		||||
SKIP: {
 | 
			
		||||
    skip "NP_HOSTNAME_INVALID not set", 2 if ! $hostname_invalid;
 | 
			
		||||
 | 
			
		||||
    $result = NPTest->testCmd("$command -H $hostname_invalid -b ou=blah -t 5");
 | 
			
		||||
    is( $result->return_code, 2, "$command -H $hostname_invalid -b ou=blah -t 5" );
 | 
			
		||||
    is( $result->output, 'Could not bind to the LDAP server', "output ok" );
 | 
			
		||||
};
 | 
			
		||||
 | 
			
		||||
SKIP: {
 | 
			
		||||
    skip "NP_HOST_TCP_LDAP not set", 12 if ! $host_tcp_ldap;
 | 
			
		||||
    skip "NP_LDAP_BASE_DN not set",  12 if ! $ldap_base_dn;
 | 
			
		||||
 | 
			
		||||
    $cmd = "$command -H $host_tcp_ldap -b $ldap_base_dn -t 5 -w 2 -c 3 -3";
 | 
			
		||||
    $result = NPTest->testCmd($cmd);
 | 
			
		||||
    is( $result->return_code, 0, $cmd );
 | 
			
		||||
    like( $result->output, '/^LDAP OK - \d+.\d+ seconds response time\|time=\d+\.\d+s;2\.0+;3\.0+;0\.0+$/', "output ok" );
 | 
			
		||||
 | 
			
		||||
    $cmd = "$command -H $host_tcp_ldap -b $ldap_base_dn -t 5 -w 2 -c 3 -3 -W 10000000 -C 10000001";
 | 
			
		||||
    $result = NPTest->testCmd($cmd);
 | 
			
		||||
    is( $result->return_code, 0, $cmd );
 | 
			
		||||
    like( $result->output, '/^LDAP OK - found \d+ entries in \d+\.\d+ seconds\|time=\d\.\d+s;2\.0+;3\.0+;0\.0+ entries=\d+\.0+;10000000;10000001;0\.0+$/', "output ok" );
 | 
			
		||||
 | 
			
		||||
    $cmd = "$command -H $host_tcp_ldap -b $ldap_base_dn -t 5 -w 2 -c 3 -3 -W 10000000: -C 10000001:";
 | 
			
		||||
    $result = NPTest->testCmd($cmd);
 | 
			
		||||
    is( $result->return_code, 2, $cmd );
 | 
			
		||||
    like( $result->output, '/^LDAP CRITICAL - found \d+ entries in \d+\.\d+ seconds\|time=\d\.\d+s;2\.0+;3\.0+;0\.0+ entries=\d+\.0+;10000000:;10000001:;0\.0+$/', "output ok" );
 | 
			
		||||
 | 
			
		||||
    $cmd = "$command -H $host_tcp_ldap -b $ldap_base_dn -t 5 -w 2 -c 3 -3 -W 0 -C 0";
 | 
			
		||||
    $result = NPTest->testCmd($cmd);
 | 
			
		||||
    is( $result->return_code, 2, $cmd );
 | 
			
		||||
    like( $result->output, '/^LDAP CRITICAL - found \d+ entries in \d+\.\d+ seconds\|time=\d\.\d+s;2\.0+;3\.0+;0\.0+ entries=\d+\.0+;0;0;0\.0+$/', "output ok" );
 | 
			
		||||
 | 
			
		||||
    $cmd = "$command -H $host_tcp_ldap -b $ldap_base_dn -t 5 -w 2 -c 3 -3 -W 10000000: -C 10000001";
 | 
			
		||||
    $result = NPTest->testCmd($cmd);
 | 
			
		||||
    is( $result->return_code, 1, $cmd );
 | 
			
		||||
    like( $result->output, '/^LDAP WARNING - found \d+ entries in \d+\.\d+ seconds\|time=\d\.\d+s;2\.0+;3\.0+;0\.0+ entries=\d+\.0+;10000000:;10000001;0\.0+$/', "output ok" );
 | 
			
		||||
 | 
			
		||||
    $cmd = "$command -H $host_tcp_ldap -b $ldap_base_dn -t 5 -w 2 -c 3 -3 -C 10000001";
 | 
			
		||||
    $result = NPTest->testCmd($cmd);
 | 
			
		||||
    is( $result->return_code, 0, $cmd );
 | 
			
		||||
    like( $result->output, '/^LDAP OK - found \d+ entries in \d+\.\d+ seconds\|time=\d\.\d+s;2\.0+;3\.0+;0\.0+ entries=\d+\.0+;;10000001;0\.0+$/', "output ok" );
 | 
			
		||||
};
 | 
			
		||||
| 
						 | 
				
			
			@ -10,7 +10,7 @@ use NPTest;
 | 
			
		|||
 | 
			
		||||
BEGIN {
 | 
			
		||||
    plan skip_all => 'check_snmp is not compiled' unless -x "./check_snmp";
 | 
			
		||||
    plan tests => 61;
 | 
			
		||||
    plan tests => 63;
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
my $res;
 | 
			
		||||
| 
						 | 
				
			
			@ -45,7 +45,7 @@ is( $res->return_code, 3, "Invalid protocol" );
 | 
			
		|||
like( $res->output, "/check_snmp: Invalid SNMP version - 3c/" );
 | 
			
		||||
 | 
			
		||||
SKIP: {
 | 
			
		||||
    skip "no snmp host defined", 48 if ( ! $host_snmp );
 | 
			
		||||
    skip "no snmp host defined", 50 if ( ! $host_snmp );
 | 
			
		||||
 | 
			
		||||
    $res = NPTest->testCmd( "./check_snmp -H $host_snmp -C $snmp_community -o system.sysUpTime.0 -w 1: -c 1:");
 | 
			
		||||
    cmp_ok( $res->return_code, '==', 0, "Exit OK when querying uptime" );
 | 
			
		||||
| 
						 | 
				
			
			@ -153,6 +153,10 @@ SKIP: {
 | 
			
		|||
    $res = NPTest->testCmd( "./check_snmp -H $host_snmp -C $snmp_community -o system.sysUpTime.0");
 | 
			
		||||
    cmp_ok( $res->return_code, '==', 0, "Timetick used as a string");
 | 
			
		||||
    like($res->output, '/^SNMP OK - Timeticks:\s\(\d+\)\s+(?:\d+ days?,\s+)?\d+:\d+:\d+\.\d+\s.*$/', "Timetick used as a string, result printed rather than parsed");
 | 
			
		||||
 | 
			
		||||
    $res = NPTest->testCmd( "./check_snmp -H $host_snmp -C $snmp_community -o HOST-RESOURCES-MIB::hrSWRunParameters.1");
 | 
			
		||||
    cmp_ok( $res->return_code, '==', 0, "Timetick used as a string");
 | 
			
		||||
    is( $res->output, 'SNMP OK - "" | ', "snmp response without datatype" );
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
SKIP: {
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -13,7 +13,7 @@ use Test;
 | 
			
		|||
use NPTest;
 | 
			
		||||
 | 
			
		||||
use vars qw($tests);
 | 
			
		||||
BEGIN {$tests = 4; plan tests => $tests}
 | 
			
		||||
BEGIN {$tests = 8; plan tests => $tests}
 | 
			
		||||
 | 
			
		||||
my $successOutput = '/^USERS OK - [0-9]+ users currently logged in/';
 | 
			
		||||
my $failureOutput = '/^USERS CRITICAL - [0-9]+ users currently logged in/';
 | 
			
		||||
| 
						 | 
				
			
			@ -22,6 +22,8 @@ my $t;
 | 
			
		|||
 | 
			
		||||
$t += checkCmd( "./check_users 1000 1000", 0, $successOutput );
 | 
			
		||||
$t += checkCmd( "./check_users    0    0", 2, $failureOutput );
 | 
			
		||||
$t += checkCmd( "./check_users -w 0:1000 -c 0:1000", 0, $successOutput );
 | 
			
		||||
$t += checkCmd( "./check_users -w 0:0 -c 0:0", 2, $failureOutput );
 | 
			
		||||
 | 
			
		||||
exit(0) if defined($Test::Harness::VERSION);
 | 
			
		||||
exit($tests - $t);
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -17,6 +17,8 @@ use Test::More;
 | 
			
		|||
use NPTest;
 | 
			
		||||
use FindBin qw($Bin);
 | 
			
		||||
 | 
			
		||||
$ENV{'LC_TIME'} = "C";
 | 
			
		||||
 | 
			
		||||
my $common_tests = 70;
 | 
			
		||||
my $ssl_only_tests = 8;
 | 
			
		||||
# Check that all dependent modules are available
 | 
			
		||||
| 
						 | 
				
			
			@ -186,21 +188,21 @@ SKIP: {
 | 
			
		|||
 | 
			
		||||
	$result = NPTest->testCmd( "$command -p $port_https -S -C 14" );
 | 
			
		||||
	is( $result->return_code, 0, "$command -p $port_https -S -C 14" );
 | 
			
		||||
	is( $result->output, 'OK - Certificate \'Ton Voon\' will expire on Sun Mar  3 21:41:00 2019.', "output ok" );
 | 
			
		||||
	is( $result->output, 'OK - Certificate \'Ton Voon\' will expire on Sun Mar  3 21:41:28 2019 +0000.', "output ok" );
 | 
			
		||||
 | 
			
		||||
	$result = NPTest->testCmd( "$command -p $port_https -S -C 14000" );
 | 
			
		||||
	is( $result->return_code, 1, "$command -p $port_https -S -C 14000" );
 | 
			
		||||
	like( $result->output, '/WARNING - Certificate \'Ton Voon\' expires in \d+ day\(s\) \(Sun Mar  3 21:41:00 2019\)./', "output ok" );
 | 
			
		||||
	like( $result->output, '/WARNING - Certificate \'Ton Voon\' expires in \d+ day\(s\) \(Sun Mar  3 21:41:28 2019 \+0000\)./', "output ok" );
 | 
			
		||||
 | 
			
		||||
	# Expired cert tests
 | 
			
		||||
	$result = NPTest->testCmd( "$command -p $port_https -S -C 13960,14000" );
 | 
			
		||||
	is( $result->return_code, 2, "$command -p $port_https -S -C 13960,14000" );
 | 
			
		||||
	like( $result->output, '/CRITICAL - Certificate \'Ton Voon\' expires in \d+ day\(s\) \(Sun Mar  3 21:41:00 2019\)./', "output ok" );
 | 
			
		||||
	like( $result->output, '/CRITICAL - Certificate \'Ton Voon\' expires in \d+ day\(s\) \(Sun Mar  3 21:41:28 2019 \+0000\)./', "output ok" );
 | 
			
		||||
 | 
			
		||||
	$result = NPTest->testCmd( "$command -p $port_https_expired -S -C 7" );
 | 
			
		||||
	is( $result->return_code, 2, "$command -p $port_https_expired -S -C 7" );
 | 
			
		||||
	is( $result->output,
 | 
			
		||||
		'CRITICAL - Certificate \'Ton Voon\' expired on Thu Mar  5 00:13:00 2009.',
 | 
			
		||||
		'CRITICAL - Certificate \'Ton Voon\' expired on Thu Mar  5 00:13:16 2009 +0000.',
 | 
			
		||||
		"output ok" );
 | 
			
		||||
 | 
			
		||||
}
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -128,7 +128,7 @@ sleep 1;
 | 
			
		|||
 | 
			
		||||
$res = NPTest->testCmd( "./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.10 --rate -w 600" );
 | 
			
		||||
is($res->return_code, 1, "WARNING - due to going above rate calculation" );
 | 
			
		||||
is($res->output, "SNMP RATE WARNING - *666* | iso.3.6.1.4.1.8072.3.2.67.10=666 ");
 | 
			
		||||
is($res->output, "SNMP RATE WARNING - *666* | iso.3.6.1.4.1.8072.3.2.67.10=666;600 ");
 | 
			
		||||
 | 
			
		||||
$res = NPTest->testCmd( "./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.10 --rate -w 600" );
 | 
			
		||||
is($res->return_code, 3, "UNKNOWN - basically the divide by zero error" );
 | 
			
		||||
| 
						 | 
				
			
			@ -209,7 +209,7 @@ is($res->output, 'SNMP OK - "stringtests" | ', "OK as inverted string no match"
 | 
			
		|||
 | 
			
		||||
$res = NPTest->testCmd( "./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.12 -w 4:5" );
 | 
			
		||||
is($res->return_code, 1, "Numeric in string test" );
 | 
			
		||||
is($res->output, 'SNMP WARNING - *3.5* | iso.3.6.1.4.1.8072.3.2.67.12=3.5 ', "WARNING threshold checks for string masquerading as number" );
 | 
			
		||||
is($res->output, 'SNMP WARNING - *3.5* | iso.3.6.1.4.1.8072.3.2.67.12=3.5;4:5 ', "WARNING threshold checks for string masquerading as number" );
 | 
			
		||||
 | 
			
		||||
$res = NPTest->testCmd( "./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.13" );
 | 
			
		||||
is($res->return_code, 0, "Not really numeric test" );
 | 
			
		||||
| 
						 | 
				
			
			@ -225,29 +225,29 @@ is($res->output, 'SNMP OK - "CUSTOM CHECK OK: foo is 12345" | ', "String check w
 | 
			
		|||
 | 
			
		||||
$res = NPTest->testCmd( "./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.16 -w -2: -c -3:" );
 | 
			
		||||
is($res->return_code, 0, "Negative integer check OK" );
 | 
			
		||||
is($res->output, 'SNMP OK - -2 | iso.3.6.1.4.1.8072.3.2.67.16=-2 ', "Negative integer check OK output" );
 | 
			
		||||
is($res->output, 'SNMP OK - -2 | iso.3.6.1.4.1.8072.3.2.67.16=-2;-2:;-3: ', "Negative integer check OK output" );
 | 
			
		||||
 | 
			
		||||
$res = NPTest->testCmd( "./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.16 -w -2: -c -3:" );
 | 
			
		||||
is($res->return_code, 1, "Negative integer check WARNING" );
 | 
			
		||||
is($res->output, 'SNMP WARNING - *-3* | iso.3.6.1.4.1.8072.3.2.67.16=-3 ', "Negative integer check WARNING output" );
 | 
			
		||||
is($res->output, 'SNMP WARNING - *-3* | iso.3.6.1.4.1.8072.3.2.67.16=-3;-2:;-3: ', "Negative integer check WARNING output" );
 | 
			
		||||
 | 
			
		||||
$res = NPTest->testCmd( "./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.16 -w -2: -c -3:" );
 | 
			
		||||
is($res->return_code, 2, "Negative integer check CRITICAL" );
 | 
			
		||||
is($res->output, 'SNMP CRITICAL - *-4* | iso.3.6.1.4.1.8072.3.2.67.16=-4 ', "Negative integer check CRITICAL output" );
 | 
			
		||||
is($res->output, 'SNMP CRITICAL - *-4* | iso.3.6.1.4.1.8072.3.2.67.16=-4;-2:;-3: ', "Negative integer check CRITICAL output" );
 | 
			
		||||
 | 
			
		||||
$res = NPTest->testCmd( "./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.17 -w -3: -c -6:" );
 | 
			
		||||
is($res->return_code, 1, "Negative integer as string, WARNING" );
 | 
			
		||||
is($res->output, 'SNMP WARNING - *-4* | iso.3.6.1.4.1.8072.3.2.67.17=-4 ', "Negative integer as string, WARNING output" );
 | 
			
		||||
is($res->output, 'SNMP WARNING - *-4* | iso.3.6.1.4.1.8072.3.2.67.17=-4;-3:;-6: ', "Negative integer as string, WARNING output" );
 | 
			
		||||
 | 
			
		||||
$res = NPTest->testCmd( "./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.17 -w -2: -c -3:" );
 | 
			
		||||
is($res->return_code, 2, "Negative integer as string, CRITICAL" );
 | 
			
		||||
is($res->output, 'SNMP CRITICAL - *-4* | iso.3.6.1.4.1.8072.3.2.67.17=-4 ', "Negative integer as string, CRITICAL output" );
 | 
			
		||||
is($res->output, 'SNMP CRITICAL - *-4* | iso.3.6.1.4.1.8072.3.2.67.17=-4;-2:;-3: ', "Negative integer as string, CRITICAL output" );
 | 
			
		||||
 | 
			
		||||
$res = NPTest->testCmd( "./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.18 -c ~:-6.5" );
 | 
			
		||||
$res = NPTest->testCmd( "./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.18 -c '~:-6.5'" );
 | 
			
		||||
is($res->return_code, 0, "Negative float OK" );
 | 
			
		||||
is($res->output, 'SNMP OK - -6.6 | iso.3.6.1.4.1.8072.3.2.67.18=-6.6 ', "Negative float OK output" );
 | 
			
		||||
is($res->output, 'SNMP OK - -6.6 | iso.3.6.1.4.1.8072.3.2.67.18=-6.6;;~:-6.5 ', "Negative float OK output" );
 | 
			
		||||
 | 
			
		||||
$res = NPTest->testCmd( "./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.18 -w ~:-6.65 -c ~:-6.55" );
 | 
			
		||||
$res = NPTest->testCmd( "./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.18 -w '~:-6.65' -c '~:-6.55'" );
 | 
			
		||||
is($res->return_code, 1, "Negative float WARNING" );
 | 
			
		||||
is($res->output, 'SNMP WARNING - *-6.6* | iso.3.6.1.4.1.8072.3.2.67.18=-6.6 ', "Negative float WARNING output" );
 | 
			
		||||
is($res->output, 'SNMP WARNING - *-6.6* | iso.3.6.1.4.1.8072.3.2.67.18=-6.6;~:-6.65;~:-6.55 ', "Negative float WARNING output" );
 | 
			
		||||
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -144,8 +144,6 @@ usage5 (void)
 | 
			
		|||
void
 | 
			
		||||
print_revision (const char *command_name, const char *revision)
 | 
			
		||||
{
 | 
			
		||||
	char plugin_revision[STRLEN];
 | 
			
		||||
 | 
			
		||||
	printf ("%s v%s (%s %s)\n",
 | 
			
		||||
	         command_name, revision, PACKAGE, VERSION);
 | 
			
		||||
}
 | 
			
		||||
| 
						 | 
				
			
			@ -630,3 +628,84 @@ char *fperfdata (const char *label,
 | 
			
		|||
 | 
			
		||||
	return data;
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
char *sperfdata (const char *label,
 | 
			
		||||
 double val,
 | 
			
		||||
 const char *uom,
 | 
			
		||||
 char *warn,
 | 
			
		||||
 char *crit,
 | 
			
		||||
 int minp,
 | 
			
		||||
 double minv,
 | 
			
		||||
 int maxp,
 | 
			
		||||
 double maxv)
 | 
			
		||||
{
 | 
			
		||||
	char *data = NULL;
 | 
			
		||||
	if (strpbrk (label, "'= "))
 | 
			
		||||
		xasprintf (&data, "'%s'=", label);
 | 
			
		||||
	else
 | 
			
		||||
		xasprintf (&data, "%s=", label);
 | 
			
		||||
 | 
			
		||||
	xasprintf (&data, "%s%f", data, val);
 | 
			
		||||
	xasprintf (&data, "%s%s;", data, uom);
 | 
			
		||||
 | 
			
		||||
	if (warn!=NULL)
 | 
			
		||||
		xasprintf (&data, "%s%s", data, warn);
 | 
			
		||||
 | 
			
		||||
	xasprintf (&data, "%s;", data);
 | 
			
		||||
 | 
			
		||||
	if (crit!=NULL)
 | 
			
		||||
		xasprintf (&data, "%s%s", data, crit);
 | 
			
		||||
 | 
			
		||||
	xasprintf (&data, "%s;", data);
 | 
			
		||||
 | 
			
		||||
	if (minp)
 | 
			
		||||
		xasprintf (&data, "%s%f", data, minv);
 | 
			
		||||
 | 
			
		||||
	if (maxp) {
 | 
			
		||||
		xasprintf (&data, "%s;", data);
 | 
			
		||||
		xasprintf (&data, "%s%f", data, maxv);
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	return data;
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
char *sperfdata_int (const char *label,
 | 
			
		||||
 int val,
 | 
			
		||||
 const char *uom,
 | 
			
		||||
 char *warn,
 | 
			
		||||
 char *crit,
 | 
			
		||||
 int minp,
 | 
			
		||||
 int minv,
 | 
			
		||||
 int maxp,
 | 
			
		||||
 int maxv)
 | 
			
		||||
{
 | 
			
		||||
	char *data = NULL;
 | 
			
		||||
	if (strpbrk (label, "'= "))
 | 
			
		||||
		xasprintf (&data, "'%s'=", label);
 | 
			
		||||
	else
 | 
			
		||||
		xasprintf (&data, "%s=", label);
 | 
			
		||||
 | 
			
		||||
	xasprintf (&data, "%s%d", data, val);
 | 
			
		||||
	xasprintf (&data, "%s%s;", data, uom);
 | 
			
		||||
 | 
			
		||||
	if (warn!=NULL)
 | 
			
		||||
		xasprintf (&data, "%s%s", data, warn);
 | 
			
		||||
 | 
			
		||||
	xasprintf (&data, "%s;", data);
 | 
			
		||||
 | 
			
		||||
	if (crit!=NULL)
 | 
			
		||||
		xasprintf (&data, "%s%s", data, crit);
 | 
			
		||||
 | 
			
		||||
	xasprintf (&data, "%s;", data);
 | 
			
		||||
 | 
			
		||||
	if (minp)
 | 
			
		||||
		xasprintf (&data, "%s%d", data, minv);
 | 
			
		||||
 | 
			
		||||
	if (maxp) {
 | 
			
		||||
		xasprintf (&data, "%s;", data);
 | 
			
		||||
		xasprintf (&data, "%s%d", data, maxv);
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	return data;
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -94,29 +94,17 @@ const char *state_text (int);
 | 
			
		|||
#define max(a,b) (((a)>(b))?(a):(b))
 | 
			
		||||
#define min(a,b) (((a)<(b))?(a):(b))
 | 
			
		||||
 | 
			
		||||
char *perfdata (const char *,
 | 
			
		||||
 long int,
 | 
			
		||||
 const char *,
 | 
			
		||||
 int,
 | 
			
		||||
 long int,
 | 
			
		||||
 int,
 | 
			
		||||
 long int,
 | 
			
		||||
 int,
 | 
			
		||||
 long int,
 | 
			
		||||
 int,
 | 
			
		||||
 long int);
 | 
			
		||||
char *perfdata (const char *, long int, const char *, int, long int,
 | 
			
		||||
                int, long int, int, long int, int, long int);
 | 
			
		||||
 | 
			
		||||
char *fperfdata (const char *,
 | 
			
		||||
 double,
 | 
			
		||||
 const char *,
 | 
			
		||||
 int,
 | 
			
		||||
 double,
 | 
			
		||||
 int,
 | 
			
		||||
 double,
 | 
			
		||||
 int,
 | 
			
		||||
 double,
 | 
			
		||||
 int,
 | 
			
		||||
 double);
 | 
			
		||||
char *fperfdata (const char *, double, const char *, int, double,
 | 
			
		||||
                 int, double, int, double, int, double);
 | 
			
		||||
 | 
			
		||||
char *sperfdata (const char *, double, const char *, char *, char *,
 | 
			
		||||
                 int, double, int, double);
 | 
			
		||||
 | 
			
		||||
char *sperfdata_int (const char *, int, const char *, char *, char *,
 | 
			
		||||
                     int, int, int, int);
 | 
			
		||||
 | 
			
		||||
/* The idea here is that, although not every plugin will use all of these, 
 | 
			
		||||
   most will or should.  Therefore, for consistency, these very common 
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
		Loading…
	
	Add table
		Add a link
		
	
		Reference in a new issue