New upstream version 2.2
This commit is contained in:
parent
ea115afa68
commit
c845af032a
101 changed files with 4649 additions and 22969 deletions
|
@ -147,6 +147,7 @@ am__aclocal_m4_deps = $(top_srcdir)/m4/np_mysqlclient.m4 \
|
|||
$(top_srcdir)/gl/m4/stddef_h.m4 $(top_srcdir)/gl/m4/stdint.m4 \
|
||||
$(top_srcdir)/gl/m4/stdint_h.m4 $(top_srcdir)/gl/m4/stdio_h.m4 \
|
||||
$(top_srcdir)/gl/m4/stdlib_h.m4 $(top_srcdir)/gl/m4/strcase.m4 \
|
||||
$(top_srcdir)/gl/m4/strcasestr.m4 \
|
||||
$(top_srcdir)/gl/m4/strerror.m4 \
|
||||
$(top_srcdir)/gl/m4/string_h.m4 \
|
||||
$(top_srcdir)/gl/m4/strings_h.m4 \
|
||||
|
@ -1196,6 +1197,7 @@ PACKAGE_VERSION = @PACKAGE_VERSION@
|
|||
PATH_SEPARATOR = @PATH_SEPARATOR@
|
||||
PATH_TO_APTGET = @PATH_TO_APTGET@
|
||||
PATH_TO_DIG = @PATH_TO_DIG@
|
||||
PATH_TO_ENV = @PATH_TO_ENV@
|
||||
PATH_TO_FPING = @PATH_TO_FPING@
|
||||
PATH_TO_FPING6 = @PATH_TO_FPING6@
|
||||
PATH_TO_LMSTAT = @PATH_TO_LMSTAT@
|
||||
|
@ -1213,6 +1215,7 @@ PATH_TO_SMBCLIENT = @PATH_TO_SMBCLIENT@
|
|||
PATH_TO_SNMPGET = @PATH_TO_SNMPGET@
|
||||
PATH_TO_SNMPGETNEXT = @PATH_TO_SNMPGETNEXT@
|
||||
PATH_TO_SSH = @PATH_TO_SSH@
|
||||
PATH_TO_SUDO = @PATH_TO_SUDO@
|
||||
PATH_TO_SWAP = @PATH_TO_SWAP@
|
||||
PATH_TO_SWAPINFO = @PATH_TO_SWAPINFO@
|
||||
PATH_TO_UPTIME = @PATH_TO_UPTIME@
|
||||
|
|
|
@ -160,10 +160,10 @@ int process_arguments (int argc, char **argv) {
|
|||
switch(c) {
|
||||
case 'h':
|
||||
print_help();
|
||||
exit(STATE_OK);
|
||||
exit(STATE_UNKNOWN);
|
||||
case 'V':
|
||||
print_revision(progname, NP_VERSION);
|
||||
exit(STATE_OK);
|
||||
exit(STATE_UNKNOWN);
|
||||
case 'v':
|
||||
verbose++;
|
||||
break;
|
||||
|
|
|
@ -100,6 +100,13 @@ main (int argc, char **argv)
|
|||
|
||||
result = cmd_run_array (commargv, &chld_out, &chld_err, 0);
|
||||
|
||||
if (verbose) {
|
||||
for(i = 0; i < chld_out.lines; i++)
|
||||
printf("stdout: %s\n", chld_out.line[i]);
|
||||
for(i = 0; i < chld_err.lines; i++)
|
||||
printf("stderr: %s\n", chld_err.line[i]);
|
||||
}
|
||||
|
||||
if (skip_stdout == -1) /* --skip-stdout specified without argument */
|
||||
skip_stdout = chld_out.lines;
|
||||
if (skip_stderr == -1) /* --skip-stderr specified without argument */
|
||||
|
@ -209,10 +216,10 @@ process_arguments (int argc, char **argv)
|
|||
switch (c) {
|
||||
case 'V': /* version */
|
||||
print_revision (progname, NP_VERSION);
|
||||
exit (STATE_OK);
|
||||
exit (STATE_UNKNOWN);
|
||||
case 'h': /* help */
|
||||
print_help ();
|
||||
exit (STATE_OK);
|
||||
exit (STATE_UNKNOWN);
|
||||
case 'v': /* help */
|
||||
verbose = TRUE;
|
||||
break;
|
||||
|
|
|
@ -200,7 +200,7 @@ int process_arguments(int argc, char **argv){
|
|||
|
||||
case 'V': /* version */
|
||||
print_revision (progname, NP_VERSION);
|
||||
exit (STATE_OK);
|
||||
exit (STATE_UNKNOWN);
|
||||
break;
|
||||
|
||||
case 'H': /* help */
|
||||
|
|
|
@ -368,10 +368,10 @@ process_arguments (int argc, char **argv)
|
|||
usage5 ();
|
||||
case 'h': /* help */
|
||||
print_help ();
|
||||
exit (STATE_OK);
|
||||
exit (STATE_UNKNOWN);
|
||||
case 'V': /* version */
|
||||
print_revision (progname, NP_VERSION);
|
||||
exit (STATE_OK);
|
||||
exit (STATE_UNKNOWN);
|
||||
|
||||
case 'c': /* critical range */
|
||||
critical_range = optarg;
|
||||
|
|
|
@ -48,7 +48,7 @@ void print_usage (void);
|
|||
|
||||
#define UNDEFINED 0
|
||||
#define DEFAULT_PORT 53
|
||||
#define DEFAULT_TRIES 3
|
||||
#define DEFAULT_TRIES 2
|
||||
|
||||
char *query_address = NULL;
|
||||
char *record_type = "A";
|
||||
|
@ -94,7 +94,7 @@ main (int argc, char **argv)
|
|||
timeout_interval_dig = timeout_interval / number_tries + number_tries;
|
||||
|
||||
/* get the command to run */
|
||||
xasprintf (&command_line, "%s %s %s -p %d @%s %s %s +tries=%d +time=%d",
|
||||
xasprintf (&command_line, "%s %s %s -p %d @%s %s %s +retry=%d +time=%d",
|
||||
PATH_TO_DIG, dig_args, query_transport, server_port, dns_server, query_address, record_type, number_tries, timeout_interval_dig);
|
||||
|
||||
alarm (timeout_interval);
|
||||
|
@ -125,7 +125,7 @@ main (int argc, char **argv)
|
|||
if (verbose)
|
||||
printf ("%s\n", chld_out.line[i]);
|
||||
|
||||
if (strstr (chld_out.line[i], (expected_address == NULL ? query_address : expected_address)) != NULL) {
|
||||
if (strcasestr (chld_out.line[i], (expected_address == NULL ? query_address : expected_address)) != NULL) {
|
||||
msg = chld_out.line[i];
|
||||
result = STATE_OK;
|
||||
|
||||
|
@ -223,10 +223,10 @@ process_arguments (int argc, char **argv)
|
|||
switch (c) {
|
||||
case 'h': /* help */
|
||||
print_help ();
|
||||
exit (STATE_OK);
|
||||
exit (STATE_UNKNOWN);
|
||||
case 'V': /* version */
|
||||
print_revision (progname, NP_VERSION);
|
||||
exit (STATE_OK);
|
||||
exit (STATE_UNKNOWN);
|
||||
case 'H': /* hostname */
|
||||
host_or_die(optarg);
|
||||
dns_server = optarg;
|
||||
|
|
|
@ -58,9 +58,6 @@ const char *email = "devel@monitoring-plugins.org";
|
|||
# define ERROR -1
|
||||
#endif
|
||||
|
||||
/* If nonzero, show inode information. */
|
||||
static int inode_format = 1;
|
||||
|
||||
/* If nonzero, show even filesystems with zero size or
|
||||
uninteresting types. */
|
||||
static int show_all_fs = 1;
|
||||
|
@ -178,7 +175,7 @@ main (int argc, char **argv)
|
|||
int temp_result;
|
||||
|
||||
struct mount_entry *me;
|
||||
struct fs_usage fsp, tmpfsp;
|
||||
struct fs_usage fsp;
|
||||
struct parameter_list *temp_list, *path;
|
||||
|
||||
#ifdef __CYGWIN__
|
||||
|
@ -423,9 +420,7 @@ process_arguments (int argc, char **argv)
|
|||
int c, err;
|
||||
struct parameter_list *se;
|
||||
struct parameter_list *temp_list = NULL, *previous = NULL;
|
||||
struct parameter_list *temp_path_select_list = NULL;
|
||||
struct mount_entry *me, *temp_me;
|
||||
int result = OK;
|
||||
struct mount_entry *me;
|
||||
regex_t re;
|
||||
int cflags = REG_NOSUB | REG_EXTENDED;
|
||||
int default_cflags = cflags;
|
||||
|
@ -762,10 +757,10 @@ process_arguments (int argc, char **argv)
|
|||
break;
|
||||
case 'V': /* version */
|
||||
print_revision (progname, NP_VERSION);
|
||||
exit (STATE_OK);
|
||||
exit (STATE_UNKNOWN);
|
||||
case 'h': /* help */
|
||||
print_help ();
|
||||
exit (STATE_OK);
|
||||
exit (STATE_UNKNOWN);
|
||||
case '?': /* help */
|
||||
usage (_("Unknown argument"));
|
||||
}
|
||||
|
|
|
@ -81,7 +81,6 @@ main (int argc, char **argv)
|
|||
double elapsed_time;
|
||||
long microsec;
|
||||
struct timeval tv;
|
||||
int multi_address;
|
||||
int parse_address = FALSE; /* This flag scans for Address: but only after Name: */
|
||||
output chld_out, chld_err;
|
||||
size_t i;
|
||||
|
@ -127,7 +126,7 @@ main (int argc, char **argv)
|
|||
if (verbose)
|
||||
puts(chld_out.line[i]);
|
||||
|
||||
if (strstr (chld_out.line[i], ".in-addr.arpa")) {
|
||||
if (strcasestr (chld_out.line[i], ".in-addr.arpa")) {
|
||||
if ((temp_buffer = strstr (chld_out.line[i], "name = ")))
|
||||
addresses[n_addresses++] = strdup (temp_buffer + 7);
|
||||
else {
|
||||
|
@ -249,11 +248,6 @@ main (int argc, char **argv)
|
|||
elapsed_time = (double)microsec / 1.0e6;
|
||||
|
||||
if (result == STATE_OK) {
|
||||
if (strchr (address, ',') == NULL)
|
||||
multi_address = FALSE;
|
||||
else
|
||||
multi_address = TRUE;
|
||||
|
||||
result = get_status(elapsed_time, time_thresholds);
|
||||
if (result == STATE_OK) {
|
||||
printf ("DNS %s: ", _("OK"));
|
||||
|
@ -395,10 +389,10 @@ process_arguments (int argc, char **argv)
|
|||
switch (c) {
|
||||
case 'h': /* help */
|
||||
print_help ();
|
||||
exit (STATE_OK);
|
||||
exit (STATE_UNKNOWN);
|
||||
case 'V': /* version */
|
||||
print_revision (progname, NP_VERSION);
|
||||
exit (STATE_OK);
|
||||
exit (STATE_UNKNOWN);
|
||||
case 'v': /* version */
|
||||
verbose = TRUE;
|
||||
break;
|
||||
|
|
|
@ -52,11 +52,11 @@ main (int argc, char **argv)
|
|||
usage4 (_("Could not parse arguments"));
|
||||
else if (strcmp (argv[1], "-V") == 0 || strcmp (argv[1], "--version") == 0) {
|
||||
print_revision (progname, NP_VERSION);
|
||||
exit (STATE_OK);
|
||||
exit (STATE_UNKNOWN);
|
||||
}
|
||||
else if (strcmp (argv[1], "-h") == 0 || strcmp (argv[1], "--help") == 0) {
|
||||
print_help ();
|
||||
exit (STATE_OK);
|
||||
exit (STATE_UNKNOWN);
|
||||
}
|
||||
else if (!is_integer (argv[1]))
|
||||
usage4 (_("Arguments to check_dummy must be an integer"));
|
||||
|
|
|
@ -105,7 +105,7 @@ main (int argc, char **argv)
|
|||
xasprintf(&option_string, "%s-I %s ", option_string, sourceif);
|
||||
|
||||
#ifdef PATH_TO_FPING6
|
||||
if (address_family == AF_INET6)
|
||||
if (address_family != AF_INET && is_inet6_addr(server))
|
||||
fping_prog = strdup(PATH_TO_FPING6);
|
||||
else
|
||||
fping_prog = strdup(PATH_TO_FPING);
|
||||
|
@ -314,10 +314,10 @@ process_arguments (int argc, char **argv)
|
|||
usage5 ();
|
||||
case 'h': /* help */
|
||||
print_help ();
|
||||
exit (STATE_OK);
|
||||
exit (STATE_UNKNOWN);
|
||||
case 'V': /* version */
|
||||
print_revision (progname, NP_VERSION);
|
||||
exit (STATE_OK);
|
||||
exit (STATE_UNKNOWN);
|
||||
case 'v': /* verbose mode */
|
||||
verbose = TRUE;
|
||||
break;
|
||||
|
|
|
@ -196,10 +196,10 @@ process_arguments (int argc, char **argv)
|
|||
switch (c) {
|
||||
case 'h': /* help */
|
||||
print_help ();
|
||||
exit (STATE_OK);
|
||||
exit (STATE_UNKNOWN);
|
||||
case 'V': /* version */
|
||||
print_revision (progname, NP_VERSION);
|
||||
exit (STATE_OK);
|
||||
exit (STATE_UNKNOWN);
|
||||
case 'v': /* version */
|
||||
verbose = TRUE;
|
||||
break;
|
||||
|
|
|
@ -350,10 +350,10 @@ process_arguments (int argc, char **argv)
|
|||
break;
|
||||
case 'V': /* version */
|
||||
print_revision (progname, NP_VERSION);
|
||||
exit (STATE_OK);
|
||||
exit (STATE_UNKNOWN);
|
||||
case 'h': /* help */
|
||||
print_help ();
|
||||
exit (STATE_OK);
|
||||
exit (STATE_UNKNOWN);
|
||||
case '?': /* help */
|
||||
usage5 ();
|
||||
}
|
||||
|
|
|
@ -91,10 +91,12 @@ struct timeval tv_temp;
|
|||
|
||||
int specify_port = FALSE;
|
||||
int server_port = HTTP_PORT;
|
||||
int virtual_port = 0;
|
||||
char server_port_text[6] = "";
|
||||
char server_type[6] = "http";
|
||||
char *server_address;
|
||||
char *host_name;
|
||||
int host_name_length;
|
||||
char *server_url;
|
||||
char *user_agent;
|
||||
int server_url_length;
|
||||
|
@ -267,11 +269,11 @@ process_arguments (int argc, char **argv)
|
|||
break;
|
||||
case 'h': /* help */
|
||||
print_help ();
|
||||
exit (STATE_OK);
|
||||
exit (STATE_UNKNOWN);
|
||||
break;
|
||||
case 'V': /* version */
|
||||
print_revision (progname, NP_VERSION);
|
||||
exit (STATE_OK);
|
||||
exit (STATE_UNKNOWN);
|
||||
break;
|
||||
case 't': /* timeout period */
|
||||
if (!is_intnonneg (optarg))
|
||||
|
@ -343,9 +345,20 @@ process_arguments (int argc, char **argv)
|
|||
parameters, like -S and -C combinations */
|
||||
use_ssl = TRUE;
|
||||
if (c=='S' && optarg != NULL) {
|
||||
ssl_version = atoi(optarg);
|
||||
if (ssl_version < 1 || ssl_version > 3)
|
||||
usage4 (_("Invalid option - Valid values for SSL Version are 1 (TLSv1), 2 (SSLv2) or 3 (SSLv3)"));
|
||||
int got_plus = strchr(optarg, '+') != NULL;
|
||||
|
||||
if (!strncmp (optarg, "1.2", 3))
|
||||
ssl_version = got_plus ? MP_TLSv1_2_OR_NEWER : MP_TLSv1_2;
|
||||
else if (!strncmp (optarg, "1.1", 3))
|
||||
ssl_version = got_plus ? MP_TLSv1_1_OR_NEWER : MP_TLSv1_1;
|
||||
else if (optarg[0] == '1')
|
||||
ssl_version = got_plus ? MP_TLSv1_OR_NEWER : MP_TLSv1;
|
||||
else if (optarg[0] == '3')
|
||||
ssl_version = got_plus ? MP_SSLv3_OR_NEWER : MP_SSLv3;
|
||||
else if (optarg[0] == '2')
|
||||
ssl_version = got_plus ? MP_SSLv2_OR_NEWER : MP_SSLv2;
|
||||
else
|
||||
usage4 (_("Invalid option - Valid SSL/TLS versions: 2, 3, 1, 1.1, 1.2 (with optional '+' suffix)"));
|
||||
}
|
||||
if (specify_port == FALSE)
|
||||
server_port = HTTPS_PORT;
|
||||
|
@ -380,11 +393,25 @@ process_arguments (int argc, char **argv)
|
|||
case 'H': /* Host Name (virtual host) */
|
||||
host_name = strdup (optarg);
|
||||
if (host_name[0] == '[') {
|
||||
if ((p = strstr (host_name, "]:")) != NULL) /* [IPv6]:port */
|
||||
server_port = atoi (p + 2);
|
||||
if ((p = strstr (host_name, "]:")) != NULL) { /* [IPv6]:port */
|
||||
virtual_port = atoi (p + 2);
|
||||
/* cut off the port */
|
||||
host_name_length = strlen (host_name) - strlen (p) - 1;
|
||||
free (host_name);
|
||||
host_name = strndup (optarg, host_name_length);
|
||||
if (specify_port == FALSE)
|
||||
server_port = virtual_port;
|
||||
}
|
||||
} else if ((p = strchr (host_name, ':')) != NULL
|
||||
&& strchr (++p, ':') == NULL) /* IPv4:port or host:port */
|
||||
server_port = atoi (p);
|
||||
&& strchr (++p, ':') == NULL) { /* IPv4:port or host:port */
|
||||
virtual_port = atoi (p);
|
||||
/* cut off the port */
|
||||
host_name_length = strlen (host_name) - strlen (p) - 1;
|
||||
free (host_name);
|
||||
host_name = strndup (optarg, host_name_length);
|
||||
if (specify_port == FALSE)
|
||||
server_port = virtual_port;
|
||||
}
|
||||
break;
|
||||
case 'I': /* Server IP-address */
|
||||
server_address = strdup (optarg);
|
||||
|
@ -539,9 +566,12 @@ process_arguments (int argc, char **argv)
|
|||
if (http_method == NULL)
|
||||
http_method = strdup ("GET");
|
||||
|
||||
if (client_cert && !client_privkey)
|
||||
if (client_cert && !client_privkey)
|
||||
usage4 (_("If you use a client certificate you must also specify a private key file"));
|
||||
|
||||
if (virtual_port == 0)
|
||||
virtual_port = server_port;
|
||||
|
||||
return TRUE;
|
||||
}
|
||||
|
||||
|
@ -869,53 +899,100 @@ check_http (void)
|
|||
double elapsed_time_transfer = 0.0;
|
||||
int page_len = 0;
|
||||
int result = STATE_OK;
|
||||
char *force_host_header = NULL;
|
||||
|
||||
/* try to connect to the host at the given port number */
|
||||
gettimeofday (&tv_temp, NULL);
|
||||
if (my_tcp_connect (server_address, server_port, &sd) != STATE_OK)
|
||||
die (STATE_CRITICAL, _("HTTP CRITICAL - Unable to open TCP socket\n"));
|
||||
microsec_connect = deltime (tv_temp);
|
||||
|
||||
/* if we are called with the -I option, the -j method is CONNECT and */
|
||||
/* we received -S for SSL, then we tunnel the request through a proxy*/
|
||||
/* @20100414, public[at]frank4dd.com, http://www.frank4dd.com/howto */
|
||||
|
||||
if ( server_address != NULL && strcmp(http_method, "CONNECT") == 0
|
||||
&& host_name != NULL && use_ssl == TRUE) {
|
||||
|
||||
if (verbose) printf ("Entering CONNECT tunnel mode with proxy %s:%d to dst %s:%d\n", server_address, server_port, host_name, HTTPS_PORT);
|
||||
asprintf (&buf, "%s %s:%d HTTP/1.1\r\n%s\r\n", http_method, host_name, HTTPS_PORT, user_agent);
|
||||
asprintf (&buf, "%sProxy-Connection: keep-alive\r\n", buf);
|
||||
asprintf (&buf, "%sHost: %s\r\n", buf, host_name);
|
||||
/* we finished our request, send empty line with CRLF */
|
||||
asprintf (&buf, "%s%s", buf, CRLF);
|
||||
if (verbose) printf ("%s\n", buf);
|
||||
send(sd, buf, strlen (buf), 0);
|
||||
buf[0]='\0';
|
||||
|
||||
if (verbose) printf ("Receive response from proxy\n");
|
||||
read (sd, buffer, MAX_INPUT_BUFFER-1);
|
||||
if (verbose) printf ("%s", buffer);
|
||||
/* Here we should check if we got HTTP/1.1 200 Connection established */
|
||||
}
|
||||
#ifdef HAVE_SSL
|
||||
elapsed_time_connect = (double)microsec_connect / 1.0e6;
|
||||
if (use_ssl == TRUE) {
|
||||
gettimeofday (&tv_temp, NULL);
|
||||
result = np_net_ssl_init_with_hostname_version_and_cert(sd, (use_sni ? host_name : NULL), ssl_version, client_cert, client_privkey);
|
||||
if (verbose) printf ("SSL initialized\n");
|
||||
if (result != STATE_OK)
|
||||
die (STATE_CRITICAL, NULL);
|
||||
microsec_ssl = deltime (tv_temp);
|
||||
elapsed_time_ssl = (double)microsec_ssl / 1.0e6;
|
||||
if (check_cert == TRUE) {
|
||||
result = np_net_ssl_check_cert(days_till_exp_warn, days_till_exp_crit);
|
||||
np_net_ssl_cleanup();
|
||||
if (sd) close(sd);
|
||||
np_net_ssl_cleanup();
|
||||
return result;
|
||||
}
|
||||
}
|
||||
#endif /* HAVE_SSL */
|
||||
|
||||
xasprintf (&buf, "%s %s %s\r\n%s\r\n", http_method, server_url, host_name ? "HTTP/1.1" : "HTTP/1.0", user_agent);
|
||||
if ( server_address != NULL && strcmp(http_method, "CONNECT") == 0
|
||||
&& host_name != NULL && use_ssl == TRUE)
|
||||
asprintf (&buf, "%s %s %s\r\n%s\r\n", "GET", server_url, host_name ? "HTTP/1.1" : "HTTP/1.0", user_agent);
|
||||
else
|
||||
asprintf (&buf, "%s %s %s\r\n%s\r\n", http_method, server_url, host_name ? "HTTP/1.1" : "HTTP/1.0", user_agent);
|
||||
|
||||
/* tell HTTP/1.1 servers not to keep the connection alive */
|
||||
xasprintf (&buf, "%sConnection: close\r\n", buf);
|
||||
|
||||
/* check if Host header is explicitly set in options */
|
||||
if (http_opt_headers_count) {
|
||||
for (i = 0; i < http_opt_headers_count ; i++) {
|
||||
if (strncmp(http_opt_headers[i], "Host:", 5) == 0) {
|
||||
force_host_header = http_opt_headers[i];
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
/* optionally send the host header info */
|
||||
if (host_name) {
|
||||
/*
|
||||
* Specify the port only if we're using a non-default port (see RFC 2616,
|
||||
* 14.23). Some server applications/configurations cause trouble if the
|
||||
* (default) port is explicitly specified in the "Host:" header line.
|
||||
*/
|
||||
if ((use_ssl == FALSE && server_port == HTTP_PORT) ||
|
||||
(use_ssl == TRUE && server_port == HTTPS_PORT))
|
||||
xasprintf (&buf, "%sHost: %s\r\n", buf, host_name);
|
||||
else
|
||||
xasprintf (&buf, "%sHost: %s:%d\r\n", buf, host_name, server_port);
|
||||
if (force_host_header) {
|
||||
xasprintf (&buf, "%s%s\r\n", buf, force_host_header);
|
||||
}
|
||||
else {
|
||||
/*
|
||||
* Specify the port only if we're using a non-default port (see RFC 2616,
|
||||
* 14.23). Some server applications/configurations cause trouble if the
|
||||
* (default) port is explicitly specified in the "Host:" header line.
|
||||
*/
|
||||
if ((use_ssl == FALSE && virtual_port == HTTP_PORT) ||
|
||||
(use_ssl == TRUE && virtual_port == HTTPS_PORT) ||
|
||||
(server_address != NULL && strcmp(http_method, "CONNECT") == 0
|
||||
&& host_name != NULL && use_ssl == TRUE))
|
||||
xasprintf (&buf, "%sHost: %s\r\n", buf, host_name);
|
||||
else
|
||||
xasprintf (&buf, "%sHost: %s:%d\r\n", buf, host_name, virtual_port);
|
||||
}
|
||||
}
|
||||
|
||||
/* optionally send any other header tag */
|
||||
if (http_opt_headers_count) {
|
||||
for (i = 0; i < http_opt_headers_count ; i++) {
|
||||
xasprintf (&buf, "%s%s\r\n", buf, http_opt_headers[i]);
|
||||
if (force_host_header != http_opt_headers[i]) {
|
||||
xasprintf (&buf, "%s%s\r\n", buf, http_opt_headers[i]);
|
||||
}
|
||||
}
|
||||
/* This cannot be free'd here because a redirection will then try to access this and segfault */
|
||||
/* Covered in a testcase in tests/check_http.t */
|
||||
|
@ -964,6 +1041,10 @@ check_http (void)
|
|||
microsec_firstbyte = deltime (tv_temp);
|
||||
elapsed_time_firstbyte = (double)microsec_firstbyte / 1.0e6;
|
||||
}
|
||||
while (pos = memchr(buffer, '\0', i)) {
|
||||
/* replace nul character with a blank */
|
||||
*pos = ' ';
|
||||
}
|
||||
buffer[i] = '\0';
|
||||
xasprintf (&full_page_new, "%s%s", full_page, buffer);
|
||||
free (full_page);
|
||||
|
@ -1005,10 +1086,10 @@ check_http (void)
|
|||
die (STATE_CRITICAL, _("HTTP CRITICAL - No data received from host\n"));
|
||||
|
||||
/* close the connection */
|
||||
if (sd) close(sd);
|
||||
#ifdef HAVE_SSL
|
||||
np_net_ssl_cleanup();
|
||||
#endif
|
||||
if (sd) close(sd);
|
||||
|
||||
/* Save check time */
|
||||
microsec = deltime (tv);
|
||||
|
@ -1363,6 +1444,9 @@ redir (char *pos, char *status_line)
|
|||
MAX_PORT, server_type, server_address, server_port, server_url,
|
||||
display_html ? "</A>" : "");
|
||||
|
||||
/* reset virtual port */
|
||||
virtual_port = server_port;
|
||||
|
||||
if (verbose)
|
||||
printf (_("Redirection to %s://%s:%d%s\n"), server_type,
|
||||
host_name ? host_name : server_address, server_port, server_url);
|
||||
|
@ -1395,32 +1479,32 @@ char *perfd_time (double elapsed_time)
|
|||
return fperfdata ("time", elapsed_time, "s",
|
||||
thlds->warning?TRUE:FALSE, thlds->warning?thlds->warning->end:0,
|
||||
thlds->critical?TRUE:FALSE, thlds->critical?thlds->critical->end:0,
|
||||
TRUE, 0, FALSE, 0);
|
||||
TRUE, 0, TRUE, socket_timeout);
|
||||
}
|
||||
|
||||
char *perfd_time_connect (double elapsed_time_connect)
|
||||
{
|
||||
return fperfdata ("time_connect", elapsed_time_connect, "s", FALSE, 0, FALSE, 0, FALSE, 0, FALSE, 0);
|
||||
return fperfdata ("time_connect", elapsed_time_connect, "s", FALSE, 0, FALSE, 0, FALSE, 0, TRUE, socket_timeout);
|
||||
}
|
||||
|
||||
char *perfd_time_ssl (double elapsed_time_ssl)
|
||||
{
|
||||
return fperfdata ("time_ssl", elapsed_time_ssl, "s", FALSE, 0, FALSE, 0, FALSE, 0, FALSE, 0);
|
||||
return fperfdata ("time_ssl", elapsed_time_ssl, "s", FALSE, 0, FALSE, 0, FALSE, 0, TRUE, socket_timeout);
|
||||
}
|
||||
|
||||
char *perfd_time_headers (double elapsed_time_headers)
|
||||
{
|
||||
return fperfdata ("time_headers", elapsed_time_headers, "s", FALSE, 0, FALSE, 0, FALSE, 0, FALSE, 0);
|
||||
return fperfdata ("time_headers", elapsed_time_headers, "s", FALSE, 0, FALSE, 0, FALSE, 0, TRUE, socket_timeout);
|
||||
}
|
||||
|
||||
char *perfd_time_firstbyte (double elapsed_time_firstbyte)
|
||||
{
|
||||
return fperfdata ("time_firstbyte", elapsed_time_firstbyte, "s", FALSE, 0, FALSE, 0, FALSE, 0, FALSE, 0);
|
||||
return fperfdata ("time_firstbyte", elapsed_time_firstbyte, "s", FALSE, 0, FALSE, 0, FALSE, 0, TRUE, socket_timeout);
|
||||
}
|
||||
|
||||
char *perfd_time_transfer (double elapsed_time_transfer)
|
||||
{
|
||||
return fperfdata ("time_transfer", elapsed_time_transfer, "s", FALSE, 0, FALSE, 0, FALSE, 0, FALSE, 0);
|
||||
return fperfdata ("time_transfer", elapsed_time_transfer, "s", FALSE, 0, FALSE, 0, FALSE, 0, TRUE, socket_timeout);
|
||||
}
|
||||
|
||||
char *perfd_size (int page_len)
|
||||
|
@ -1467,9 +1551,10 @@ print_help (void)
|
|||
printf (UT_IPv46);
|
||||
|
||||
#ifdef HAVE_SSL
|
||||
printf (" %s\n", "-S, --ssl=VERSION");
|
||||
printf (" %s\n", "-S, --ssl=VERSION[+]");
|
||||
printf (" %s\n", _("Connect via SSL. Port defaults to 443. VERSION is optional, and prevents"));
|
||||
printf (" %s\n", _("auto-negotiation (1 = TLSv1, 2 = SSLv2, 3 = SSLv3)."));
|
||||
printf (" %s\n", _("auto-negotiation (2 = SSLv2, 3 = SSLv3, 1 = TLSv1, 1.1 = TLSv1.1,"));
|
||||
printf (" %s\n", _("1.2 = TLSv1.2). With a '+' suffix, newer versions are also accepted."));
|
||||
printf (" %s\n", "--sni");
|
||||
printf (" %s\n", _("Enable SSL/TLS hostname extension support (SNI)"));
|
||||
printf (" %s\n", "-C, --certificate=INTEGER[,INTEGER]");
|
||||
|
@ -1496,7 +1581,7 @@ print_help (void)
|
|||
printf (" %s\n", _("URL to GET or POST (default: /)"));
|
||||
printf (" %s\n", "-P, --post=STRING");
|
||||
printf (" %s\n", _("URL encoded http POST data"));
|
||||
printf (" %s\n", "-j, --method=STRING (for example: HEAD, OPTIONS, TRACE, PUT, DELETE)");
|
||||
printf (" %s\n", "-j, --method=STRING (for example: HEAD, OPTIONS, TRACE, PUT, DELETE, CONNECT)");
|
||||
printf (" %s\n", _("Set HTTP method."));
|
||||
printf (" %s\n", "-N, --no-body");
|
||||
printf (" %s\n", _("Don't wait for document body: stop reading after headers."));
|
||||
|
@ -1570,7 +1655,7 @@ print_help (void)
|
|||
printf (" %s\n", _("When the certificate of 'www.verisign.com' is valid for more than 14 days,"));
|
||||
printf (" %s\n", _("a STATE_OK is returned. When the certificate is still valid, but for less than"));
|
||||
printf (" %s\n", _("14 days, a STATE_WARNING is returned. A STATE_CRITICAL will be returned when"));
|
||||
printf (" %s\n", _("the certificate is expired."));
|
||||
printf (" %s\n\n", _("the certificate is expired."));
|
||||
printf ("\n");
|
||||
printf (" %s\n\n", "CHECK CERTIFICATE: check_http -H www.verisign.com -C 30,14");
|
||||
printf (" %s\n", _("When the certificate of 'www.verisign.com' is valid for more than 30 days,"));
|
||||
|
@ -1578,6 +1663,13 @@ print_help (void)
|
|||
printf (" %s\n", _("30 days, but more than 14 days, a STATE_WARNING is returned."));
|
||||
printf (" %s\n", _("A STATE_CRITICAL will be returned when certificate expires in less than 14 days"));
|
||||
|
||||
printf (" %s\n\n", "CHECK SSL WEBSERVER CONTENT VIA PROXY USING HTTP 1.1 CONNECT: ");
|
||||
printf (" %s\n", _("check_http -I 192.168.100.35 -p 80 -u https://www.verisign.com/ -S -j CONNECT -H www.verisign.com "));
|
||||
printf (" %s\n", _("all these options are needed: -I <proxy> -p <proxy-port> -u <check-url> -S(sl) -j CONNECT -H <webserver>"));
|
||||
printf (" %s\n", _("a STATE_OK will be returned. When the server returns its content but exceeds"));
|
||||
printf (" %s\n", _("the 5-second threshold, a STATE_WARNING will be returned. When an error occurs,"));
|
||||
printf (" %s\n", _("a STATE_CRITICAL will be returned."));
|
||||
|
||||
#endif
|
||||
|
||||
printf (UT_SUPPORT);
|
||||
|
|
|
@ -166,7 +166,6 @@ enum SmartCommand
|
|||
|
||||
char *get_offline_text (int);
|
||||
int smart_read_values (int, values_t *);
|
||||
int values_not_passed (values_t *, thresholds_t *);
|
||||
int nagios (values_t *, thresholds_t *);
|
||||
void print_value (value_t *, threshold_t *);
|
||||
void print_values (values_t *, thresholds_t *);
|
||||
|
@ -234,10 +233,10 @@ main (int argc, char *argv[])
|
|||
break;
|
||||
case 'h':
|
||||
print_help ();
|
||||
return STATE_OK;
|
||||
return STATE_UNKNOWN;
|
||||
case 'V':
|
||||
print_revision (progname, NP_VERSION);
|
||||
return STATE_OK;
|
||||
return STATE_UNKNOWN;
|
||||
default:
|
||||
usage5 ();
|
||||
}
|
||||
|
@ -249,7 +248,7 @@ main (int argc, char *argv[])
|
|||
|
||||
if (!device) {
|
||||
print_help ();
|
||||
return STATE_OK;
|
||||
return STATE_UNKNOWN;
|
||||
}
|
||||
|
||||
fd = open (device, OPEN_MODE);
|
||||
|
@ -339,31 +338,6 @@ smart_read_values (int fd, values_t * values)
|
|||
|
||||
|
||||
|
||||
int
|
||||
values_not_passed (values_t * p, thresholds_t * t)
|
||||
{
|
||||
value_t * value = p->values;
|
||||
threshold_t * threshold = t->thresholds;
|
||||
int failed = 0;
|
||||
int passed = 0;
|
||||
int i;
|
||||
for (i = 0; i < NR_ATTRIBUTES; i++) {
|
||||
if (value->id && threshold->id && value->id == threshold->id) {
|
||||
if (value->value < threshold->threshold) {
|
||||
++failed;
|
||||
}
|
||||
else {
|
||||
++passed;
|
||||
}
|
||||
}
|
||||
++value;
|
||||
++threshold;
|
||||
}
|
||||
return (passed ? -failed : 2);
|
||||
}
|
||||
|
||||
|
||||
|
||||
int
|
||||
nagios (values_t * p, thresholds_t * t)
|
||||
{
|
||||
|
|
|
@ -1,29 +1,29 @@
|
|||
/*****************************************************************************
|
||||
*
|
||||
*
|
||||
* Monitoring check_ldap plugin
|
||||
*
|
||||
*
|
||||
* License: GPL
|
||||
* Copyright (c) 2000-2008 Monitoring Plugins Development Team
|
||||
*
|
||||
*
|
||||
* Description:
|
||||
*
|
||||
*
|
||||
* This file contains the check_ldap plugin
|
||||
*
|
||||
*
|
||||
*
|
||||
*
|
||||
* This program is free software: you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License as published by
|
||||
* the Free Software Foundation, either version 3 of the License, or
|
||||
* (at your option) any later version.
|
||||
*
|
||||
*
|
||||
* This program is distributed in the hope that it will be useful,
|
||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
* GNU General Public License for more details.
|
||||
*
|
||||
*
|
||||
* You should have received a copy of the GNU General Public License
|
||||
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||
*
|
||||
*
|
||||
*
|
||||
*
|
||||
*****************************************************************************/
|
||||
|
||||
/* progname may be check_ldaps */
|
||||
|
@ -67,7 +67,10 @@ int ld_protocol = DEFAULT_PROTOCOL;
|
|||
#endif
|
||||
double warn_time = UNDEFINED;
|
||||
double crit_time = UNDEFINED;
|
||||
thresholds *entries_thresholds = NULL;
|
||||
struct timeval tv;
|
||||
char* warn_entries = NULL;
|
||||
char* crit_entries = NULL;
|
||||
int starttls = FALSE;
|
||||
int ssl_on_connect = FALSE;
|
||||
int verbose = 0;
|
||||
|
@ -94,6 +97,12 @@ main (int argc, char *argv[])
|
|||
int tls;
|
||||
int version=3;
|
||||
|
||||
/* for entry counting */
|
||||
|
||||
LDAPMessage *next_entry;
|
||||
int status_entries = STATE_OK;
|
||||
int num_entries = 0;
|
||||
|
||||
setlocale (LC_ALL, "");
|
||||
bindtextdomain (PACKAGE, LOCALEDIR);
|
||||
textdomain (PACKAGE);
|
||||
|
@ -197,12 +206,14 @@ main (int argc, char *argv[])
|
|||
}
|
||||
|
||||
/* do a search of all objectclasses in the base dn */
|
||||
if (ldap_search_s (ld, ld_base, LDAP_SCOPE_BASE, ld_attr, NULL, 0, &result)
|
||||
if (ldap_search_s (ld, ld_base, (crit_entries!=NULL || warn_entries!=NULL) ? LDAP_SCOPE_SUBTREE : LDAP_SCOPE_BASE, ld_attr, NULL, 0, &result)
|
||||
!= LDAP_SUCCESS) {
|
||||
if (verbose)
|
||||
ldap_perror(ld, "ldap_search");
|
||||
printf (_("Could not search/find objectclasses in %s\n"), ld_base);
|
||||
return STATE_CRITICAL;
|
||||
} else if (crit_entries!=NULL || warn_entries!=NULL) {
|
||||
num_entries = ldap_count_entries(ld, result);
|
||||
}
|
||||
|
||||
/* unbind from the ldap server */
|
||||
|
@ -223,14 +234,42 @@ main (int argc, char *argv[])
|
|||
else
|
||||
status = STATE_OK;
|
||||
|
||||
if(entries_thresholds != NULL) {
|
||||
if (verbose) {
|
||||
printf ("entries found: %d\n", num_entries);
|
||||
print_thresholds("entry threasholds", entries_thresholds);
|
||||
}
|
||||
status_entries = get_status(num_entries, entries_thresholds);
|
||||
if (status_entries == STATE_CRITICAL) {
|
||||
status = STATE_CRITICAL;
|
||||
} else if (status != STATE_CRITICAL) {
|
||||
status = status_entries;
|
||||
}
|
||||
}
|
||||
|
||||
/* print out the result */
|
||||
printf (_("LDAP %s - %.3f seconds response time|%s\n"),
|
||||
state_text (status),
|
||||
elapsed_time,
|
||||
fperfdata ("time", elapsed_time, "s",
|
||||
(int)warn_time, warn_time,
|
||||
(int)crit_time, crit_time,
|
||||
TRUE, 0, FALSE, 0));
|
||||
if (crit_entries!=NULL || warn_entries!=NULL) {
|
||||
printf (_("LDAP %s - found %d entries in %.3f seconds|%s %s\n"),
|
||||
state_text (status),
|
||||
num_entries,
|
||||
elapsed_time,
|
||||
fperfdata ("time", elapsed_time, "s",
|
||||
(int)warn_time, warn_time,
|
||||
(int)crit_time, crit_time,
|
||||
TRUE, 0, FALSE, 0),
|
||||
sperfdata ("entries", (double)num_entries, "",
|
||||
warn_entries,
|
||||
crit_entries,
|
||||
TRUE, 0.0, FALSE, 0.0));
|
||||
} else {
|
||||
printf (_("LDAP %s - %.3f seconds response time|%s\n"),
|
||||
state_text (status),
|
||||
elapsed_time,
|
||||
fperfdata ("time", elapsed_time, "s",
|
||||
(int)warn_time, warn_time,
|
||||
(int)crit_time, crit_time,
|
||||
TRUE, 0, FALSE, 0));
|
||||
}
|
||||
|
||||
return status;
|
||||
}
|
||||
|
@ -263,6 +302,8 @@ process_arguments (int argc, char **argv)
|
|||
{"port", required_argument, 0, 'p'},
|
||||
{"warn", required_argument, 0, 'w'},
|
||||
{"crit", required_argument, 0, 'c'},
|
||||
{"warn-entries", required_argument, 0, 'W'},
|
||||
{"crit-entries", required_argument, 0, 'C'},
|
||||
{"verbose", no_argument, 0, 'v'},
|
||||
{0, 0, 0, 0}
|
||||
};
|
||||
|
@ -276,7 +317,7 @@ process_arguments (int argc, char **argv)
|
|||
}
|
||||
|
||||
while (1) {
|
||||
c = getopt_long (argc, argv, "hvV234TS6t:c:w:H:b:p:a:D:P:", longopts, &option);
|
||||
c = getopt_long (argc, argv, "hvV234TS6t:c:w:H:b:p:a:D:P:C:W:", longopts, &option);
|
||||
|
||||
if (c == -1 || c == EOF)
|
||||
break;
|
||||
|
@ -284,10 +325,10 @@ process_arguments (int argc, char **argv)
|
|||
switch (c) {
|
||||
case 'h': /* help */
|
||||
print_help ();
|
||||
exit (STATE_OK);
|
||||
exit (STATE_UNKNOWN);
|
||||
case 'V': /* version */
|
||||
print_revision (progname, NP_VERSION);
|
||||
exit (STATE_OK);
|
||||
exit (STATE_UNKNOWN);
|
||||
case 't': /* timeout period */
|
||||
if (!is_intnonneg (optarg))
|
||||
usage2 (_("Timeout interval must be a positive integer"), optarg);
|
||||
|
@ -318,6 +359,12 @@ process_arguments (int argc, char **argv)
|
|||
case 'c':
|
||||
crit_time = strtod (optarg, NULL);
|
||||
break;
|
||||
case 'W':
|
||||
warn_entries = optarg;
|
||||
break;
|
||||
case 'C':
|
||||
crit_entries = optarg;
|
||||
break;
|
||||
#ifdef HAVE_LDAP_SET_OPTION
|
||||
case '2':
|
||||
ld_protocol = 2;
|
||||
|
@ -381,6 +428,10 @@ validate_arguments ()
|
|||
if (ld_base==NULL)
|
||||
usage4 (_("Please specify the LDAP base\n"));
|
||||
|
||||
if (crit_entries!=NULL || warn_entries!=NULL) {
|
||||
set_thresholds(&entries_thresholds,
|
||||
warn_entries, crit_entries);
|
||||
}
|
||||
return OK;
|
||||
}
|
||||
|
||||
|
@ -430,6 +481,11 @@ print_help (void)
|
|||
|
||||
printf (UT_WARN_CRIT);
|
||||
|
||||
printf (" %s\n", "-W [--warn-entries]");
|
||||
printf (" %s\n", _("Number of found entries to result in warning status"));
|
||||
printf (" %s\n", "-C [--crit-entries]");
|
||||
printf (" %s\n", _("Number of found entries to result in critical status"));
|
||||
|
||||
printf (UT_CONN_TIMEOUT, DEFAULT_SOCKET_TIMEOUT);
|
||||
|
||||
printf (UT_VERBOSE);
|
||||
|
@ -441,6 +497,7 @@ print_help (void)
|
|||
printf (" %s\n", _("'SSL on connect' will be used no matter how the plugin was called."));
|
||||
printf (" %s\n", _("This detection is deprecated, please use 'check_ldap' with the '--starttls' or '--ssl' flags"));
|
||||
printf (" %s\n", _("to define the behaviour explicitly instead."));
|
||||
printf (" %s\n", _("The parameters --warn-entries and --crit-entries are optional."));
|
||||
|
||||
printf (UT_SUPPORT);
|
||||
}
|
||||
|
|
|
@ -160,7 +160,7 @@ main (int argc, char **argv)
|
|||
sscanf (input_buffer, "%*[^l]load averages: %lf, %lf, %lf", &la1, &la5, &la15);
|
||||
}
|
||||
else {
|
||||
printf (_("could not parse load from uptime: %s\n"), result, PATH_TO_UPTIME);
|
||||
printf (_("could not parse load from uptime %s: %s\n"), PATH_TO_UPTIME, result);
|
||||
return STATE_UNKNOWN;
|
||||
}
|
||||
|
||||
|
@ -251,10 +251,10 @@ process_arguments (int argc, char **argv)
|
|||
break;
|
||||
case 'V': /* version */
|
||||
print_revision (progname, NP_VERSION);
|
||||
exit (STATE_OK);
|
||||
exit (STATE_UNKNOWN);
|
||||
case 'h': /* help */
|
||||
print_help ();
|
||||
exit (STATE_OK);
|
||||
exit (STATE_UNKNOWN);
|
||||
case '?': /* help */
|
||||
usage5 ();
|
||||
}
|
||||
|
|
|
@ -234,10 +234,10 @@ process_arguments (int argc, char **argv)
|
|||
break;
|
||||
case 'V': /* version */
|
||||
print_revision (progname, NP_VERSION);
|
||||
exit (STATE_OK);
|
||||
exit (STATE_UNKNOWN);
|
||||
case 'h': /* help */
|
||||
print_help ();
|
||||
exit (STATE_OK);
|
||||
exit (STATE_UNKNOWN);
|
||||
case '?': /* help */
|
||||
usage5 ();
|
||||
}
|
||||
|
|
|
@ -148,37 +148,37 @@ main (int argc, char **argv)
|
|||
|
||||
/* report incoming traffic in Bytes/sec */
|
||||
if (incoming_rate < 1024) {
|
||||
strcpy (incoming_speed_rating, "B/s");
|
||||
strcpy (incoming_speed_rating, "B");
|
||||
adjusted_incoming_rate = (double) incoming_rate;
|
||||
}
|
||||
|
||||
/* report incoming traffic in KBytes/sec */
|
||||
else if (incoming_rate < (1024 * 1024)) {
|
||||
strcpy (incoming_speed_rating, "KB/s");
|
||||
strcpy (incoming_speed_rating, "KB");
|
||||
adjusted_incoming_rate = (double) (incoming_rate / 1024.0);
|
||||
}
|
||||
|
||||
/* report incoming traffic in MBytes/sec */
|
||||
else {
|
||||
strcpy (incoming_speed_rating, "MB/s");
|
||||
strcpy (incoming_speed_rating, "MB");
|
||||
adjusted_incoming_rate = (double) (incoming_rate / 1024.0 / 1024.0);
|
||||
}
|
||||
|
||||
/* report outgoing traffic in Bytes/sec */
|
||||
if (outgoing_rate < 1024) {
|
||||
strcpy (outgoing_speed_rating, "B/s");
|
||||
strcpy (outgoing_speed_rating, "B");
|
||||
adjusted_outgoing_rate = (double) outgoing_rate;
|
||||
}
|
||||
|
||||
/* report outgoing traffic in KBytes/sec */
|
||||
else if (outgoing_rate < (1024 * 1024)) {
|
||||
strcpy (outgoing_speed_rating, "KB/s");
|
||||
strcpy (outgoing_speed_rating, "KB");
|
||||
adjusted_outgoing_rate = (double) (outgoing_rate / 1024.0);
|
||||
}
|
||||
|
||||
/* report outgoing traffic in MBytes/sec */
|
||||
else {
|
||||
strcpy (outgoing_speed_rating, "MB/s");
|
||||
strcpy (outgoing_speed_rating, "MB");
|
||||
adjusted_outgoing_rate = (double) (outgoing_rate / 1024.0 / 1024.0);
|
||||
}
|
||||
|
||||
|
@ -191,7 +191,7 @@ main (int argc, char **argv)
|
|||
result = STATE_WARNING;
|
||||
}
|
||||
|
||||
xasprintf (&error_message, _("%s. In = %0.1f %s, %s. Out = %0.1f %s|%s %s\n"),
|
||||
xasprintf (&error_message, _("%s. In = %0.1f %s/s, %s. Out = %0.1f %s/s|%s %s\n"),
|
||||
(use_average == TRUE) ? _("Avg") : _("Max"), adjusted_incoming_rate,
|
||||
incoming_speed_rating, (use_average == TRUE) ? _("Avg") : _("Max"),
|
||||
adjusted_outgoing_rate, outgoing_speed_rating,
|
||||
|
@ -270,10 +270,10 @@ process_arguments (int argc, char **argv)
|
|||
break;
|
||||
case 'V': /* version */
|
||||
print_revision (progname, NP_VERSION);
|
||||
exit (STATE_OK);
|
||||
exit (STATE_UNKNOWN);
|
||||
case 'h': /* help */
|
||||
print_help ();
|
||||
exit (STATE_OK);
|
||||
exit (STATE_UNKNOWN);
|
||||
case '?': /* help */
|
||||
usage5 ();
|
||||
}
|
||||
|
|
|
@ -444,10 +444,10 @@ process_arguments (int argc, char **argv)
|
|||
break;
|
||||
case 'V': /* version */
|
||||
print_revision (progname, NP_VERSION);
|
||||
exit (STATE_OK);
|
||||
exit (STATE_UNKNOWN);
|
||||
case 'h': /* help */
|
||||
print_help ();
|
||||
exit (STATE_OK);
|
||||
exit (STATE_UNKNOWN);
|
||||
case 'v':
|
||||
verbose++;
|
||||
break;
|
||||
|
|
|
@ -250,10 +250,10 @@ process_arguments (int argc, char **argv)
|
|||
break;
|
||||
case 'V': /* version */
|
||||
print_revision (progname, NP_VERSION);
|
||||
exit (STATE_OK);
|
||||
exit (STATE_UNKNOWN);
|
||||
case 'h': /* help */
|
||||
print_help ();
|
||||
exit (STATE_OK);
|
||||
exit (STATE_UNKNOWN);
|
||||
case 'q':
|
||||
xasprintf(&sql_query, "%s", optarg);
|
||||
break;
|
||||
|
|
|
@ -235,10 +235,10 @@ process_arguments (int argc, char **argv)
|
|||
switch (c) {
|
||||
case 'h': /* help */
|
||||
print_help ();
|
||||
exit (STATE_OK);
|
||||
exit (STATE_UNKNOWN);
|
||||
case 'V': /* version */
|
||||
print_revision (progname, NP_VERSION);
|
||||
exit (STATE_OK);
|
||||
exit (STATE_UNKNOWN);
|
||||
case 'F': /* status log */
|
||||
status_log = optarg;
|
||||
break;
|
||||
|
|
|
@ -197,19 +197,40 @@ int main(int argc, char **argv){
|
|||
|
||||
case CHECK_UPTIME:
|
||||
|
||||
xasprintf(&send_buffer, "%s&3", req_password);
|
||||
fetch_data (server_address, server_port, send_buffer);
|
||||
uptime=strtoul(recv_buffer,NULL,10);
|
||||
updays = uptime / 86400;
|
||||
uphours = (uptime % 86400) / 3600;
|
||||
upminutes = ((uptime % 86400) % 3600) / 60;
|
||||
xasprintf(&output_message,_("System Uptime - %u day(s) %u hour(s) %u minute(s)|uptime=%lu"), updays, uphours, upminutes, uptime);
|
||||
if (check_critical_value==TRUE && uptime <= critical_value)
|
||||
return_code=STATE_CRITICAL;
|
||||
else if (check_warning_value==TRUE && uptime <= warning_value)
|
||||
return_code=STATE_WARNING;
|
||||
else
|
||||
return_code=STATE_OK;
|
||||
if (value_list == NULL) {
|
||||
value_list = "minutes";
|
||||
}
|
||||
if (strncmp(value_list, "seconds", strlen("seconds") + 1 ) &&
|
||||
strncmp(value_list, "minutes", strlen("minutes") + 1) &&
|
||||
strncmp(value_list, "hours", strlen("hours") + 1) &&
|
||||
strncmp(value_list, "days", strlen("days") + 1)) {
|
||||
|
||||
output_message = strdup (_("wrong -l argument"));
|
||||
} else {
|
||||
xasprintf(&send_buffer, "%s&3", req_password);
|
||||
fetch_data (server_address, server_port, send_buffer);
|
||||
uptime=strtoul(recv_buffer,NULL,10);
|
||||
updays = uptime / 86400;
|
||||
uphours = (uptime % 86400) / 3600;
|
||||
upminutes = ((uptime % 86400) % 3600) / 60;
|
||||
|
||||
if (!strncmp(value_list, "minutes", strlen("minutes")))
|
||||
uptime = uptime / 60;
|
||||
else if (!strncmp(value_list, "hours", strlen("hours")))
|
||||
uptime = uptime / 3600;
|
||||
else if (!strncmp(value_list, "days", strlen("days")))
|
||||
uptime = uptime / 86400;
|
||||
/* else uptime in seconds, nothing to do */
|
||||
|
||||
xasprintf(&output_message,_("System Uptime - %u day(s) %u hour(s) %u minute(s) |uptime=%lu"),updays, uphours, upminutes, uptime);
|
||||
|
||||
if (check_critical_value==TRUE && uptime <= critical_value)
|
||||
return_code=STATE_CRITICAL;
|
||||
else if (check_warning_value==TRUE && uptime <= warning_value)
|
||||
return_code=STATE_WARNING;
|
||||
else
|
||||
return_code=STATE_OK;
|
||||
}
|
||||
break;
|
||||
|
||||
case CHECK_USEDDISKSPACE:
|
||||
|
@ -532,10 +553,10 @@ int process_arguments(int argc, char **argv){
|
|||
usage5 ();
|
||||
case 'h': /* help */
|
||||
print_help();
|
||||
exit(STATE_OK);
|
||||
exit(STATE_UNKNOWN);
|
||||
case 'V': /* version */
|
||||
print_revision(progname, NP_VERSION);
|
||||
exit(STATE_OK);
|
||||
exit(STATE_UNKNOWN);
|
||||
case 'H': /* hostname */
|
||||
server_address = optarg;
|
||||
break;
|
||||
|
@ -713,7 +734,9 @@ void print_help(void)
|
|||
printf (" %s\n", "ie: -l 60,90,95,120,90,95");
|
||||
printf (" %s\n", "UPTIME =");
|
||||
printf (" %s\n", _("Get the uptime of the machine."));
|
||||
printf (" %s\n", _("No specific parameters. No warning or critical threshold"));
|
||||
printf (" %s\n", _("-l <unit> "));
|
||||
printf (" %s\n", _("<unit> = seconds, minutes, hours, or days. (default: minutes)"));
|
||||
printf (" %s\n", _("Thresholds will use the unit specified above."));
|
||||
printf (" %s\n", "USEDDISKSPACE =");
|
||||
printf (" %s\n", _("Size and percentage of disk use."));
|
||||
printf (" %s\n", _("Request a -l parameter containing the drive letter only."));
|
||||
|
|
|
@ -297,7 +297,7 @@ void setup_request(ntp_message *p){
|
|||
* this is done by filtering servers based on stratum, dispersion, and
|
||||
* finally round-trip delay. */
|
||||
int best_offset_server(const ntp_server_results *slist, int nservers){
|
||||
int i=0, cserver=0, best_server=-1;
|
||||
int cserver=0, best_server=-1;
|
||||
|
||||
/* for each server */
|
||||
for(cserver=0; cserver<nservers; cserver++){
|
||||
|
@ -356,7 +356,7 @@ int best_offset_server(const ntp_server_results *slist, int nservers){
|
|||
* we have to do it in a way that our lazy macros don't handle currently :( */
|
||||
double offset_request(const char *host, int *status){
|
||||
int i=0, j=0, ga_result=0, num_hosts=0, *socklist=NULL, respnum=0;
|
||||
int servers_completed=0, one_written=0, one_read=0, servers_readable=0, best_index=-1;
|
||||
int servers_completed=0, one_read=0, servers_readable=0, best_index=-1;
|
||||
time_t now_time=0, start_ts=0;
|
||||
ntp_message *req=NULL;
|
||||
double avg_offset=0.;
|
||||
|
@ -421,7 +421,6 @@ double offset_request(const char *host, int *status){
|
|||
* been touched in the past second or so and is still lacking
|
||||
* some responses. for each of these servers, send a new request,
|
||||
* and update the "waiting" timestamp with the current time. */
|
||||
one_written=0;
|
||||
now_time=time(NULL);
|
||||
|
||||
for(i=0; i<num_hosts; i++){
|
||||
|
@ -431,7 +430,6 @@ double offset_request(const char *host, int *status){
|
|||
setup_request(&req[i]);
|
||||
write(socklist[i], &req[i], sizeof(ntp_message));
|
||||
servers[i].waiting=now_time;
|
||||
one_written=1;
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
@ -691,11 +689,11 @@ int process_arguments(int argc, char **argv){
|
|||
switch (c) {
|
||||
case 'h':
|
||||
print_help();
|
||||
exit(STATE_OK);
|
||||
exit(STATE_UNKNOWN);
|
||||
break;
|
||||
case 'V':
|
||||
print_revision(progname, NP_VERSION);
|
||||
exit(STATE_OK);
|
||||
exit(STATE_UNKNOWN);
|
||||
break;
|
||||
case 'v':
|
||||
verbose++;
|
||||
|
|
|
@ -448,11 +448,11 @@ int process_arguments(int argc, char **argv){
|
|||
switch (c) {
|
||||
case 'h':
|
||||
print_help();
|
||||
exit(STATE_OK);
|
||||
exit(STATE_UNKNOWN);
|
||||
break;
|
||||
case 'V':
|
||||
print_revision(progname, NP_VERSION);
|
||||
exit(STATE_OK);
|
||||
exit(STATE_UNKNOWN);
|
||||
break;
|
||||
case 'v':
|
||||
verbose++;
|
||||
|
|
|
@ -244,7 +244,7 @@ void setup_request(ntp_message *p){
|
|||
* this is done by filtering servers based on stratum, dispersion, and
|
||||
* finally round-trip delay. */
|
||||
int best_offset_server(const ntp_server_results *slist, int nservers){
|
||||
int i=0, cserver=0, best_server=-1;
|
||||
int cserver=0, best_server=-1;
|
||||
|
||||
/* for each server */
|
||||
for(cserver=0; cserver<nservers; cserver++){
|
||||
|
@ -303,7 +303,7 @@ int best_offset_server(const ntp_server_results *slist, int nservers){
|
|||
* we have to do it in a way that our lazy macros don't handle currently :( */
|
||||
double offset_request(const char *host, int *status){
|
||||
int i=0, j=0, ga_result=0, num_hosts=0, *socklist=NULL, respnum=0;
|
||||
int servers_completed=0, one_written=0, one_read=0, servers_readable=0, best_index=-1;
|
||||
int servers_completed=0, one_read=0, servers_readable=0, best_index=-1;
|
||||
time_t now_time=0, start_ts=0;
|
||||
ntp_message *req=NULL;
|
||||
double avg_offset=0.;
|
||||
|
@ -368,7 +368,6 @@ double offset_request(const char *host, int *status){
|
|||
* been touched in the past second or so and is still lacking
|
||||
* some responses. For each of these servers, send a new request,
|
||||
* and update the "waiting" timestamp with the current time. */
|
||||
one_written=0;
|
||||
now_time=time(NULL);
|
||||
|
||||
for(i=0; i<num_hosts; i++){
|
||||
|
@ -378,7 +377,6 @@ double offset_request(const char *host, int *status){
|
|||
setup_request(&req[i]);
|
||||
write(socklist[i], &req[i], sizeof(ntp_message));
|
||||
servers[i].waiting=now_time;
|
||||
one_written=1;
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
@ -477,11 +475,11 @@ int process_arguments(int argc, char **argv){
|
|||
switch (c) {
|
||||
case 'h':
|
||||
print_help();
|
||||
exit(STATE_OK);
|
||||
exit(STATE_UNKNOWN);
|
||||
break;
|
||||
case 'V':
|
||||
print_revision(progname, NP_VERSION);
|
||||
exit(STATE_OK);
|
||||
exit(STATE_UNKNOWN);
|
||||
break;
|
||||
case 'v':
|
||||
verbose++;
|
||||
|
@ -635,7 +633,7 @@ void print_help(void){
|
|||
printf("%s\n", _("Notes:"));
|
||||
printf(" %s\n", _("If you'd rather want to monitor an NTP server, please use"));
|
||||
printf(" %s\n", _("check_ntp_peer."));
|
||||
printf(" %s\n", _("--time-offset is usefull for compensating for servers with known"));
|
||||
printf(" %s\n", _("--time-offset is useful for compensating for servers with known"));
|
||||
printf(" %s\n", _("and expected clock skew."));
|
||||
printf("\n");
|
||||
printf(UT_THRESHOLDS_NOTES);
|
||||
|
|
|
@ -1354,10 +1354,10 @@ int process_arguments(int argc, char **argv) {
|
|||
usage5 ();
|
||||
case 'h': /* help */
|
||||
print_help();
|
||||
exit(STATE_OK);
|
||||
exit(STATE_UNKNOWN);
|
||||
case 'V': /* version */
|
||||
print_revision(progname, NP_VERSION);
|
||||
exit(STATE_OK);
|
||||
exit(STATE_UNKNOWN);
|
||||
case 'H': /* hostname */
|
||||
server_address=optarg;
|
||||
break;
|
||||
|
|
|
@ -340,10 +340,10 @@ process_arguments (int argc, char **argv)
|
|||
usage5 ();
|
||||
case 'h': /* help */
|
||||
print_help ();
|
||||
exit (STATE_OK);
|
||||
exit (STATE_UNKNOWN);
|
||||
case 'V': /* version */
|
||||
print_revision (progname, NP_VERSION);
|
||||
exit (STATE_OK);
|
||||
exit (STATE_UNKNOWN);
|
||||
case 'H': /* hostname */
|
||||
server_address = optarg;
|
||||
break;
|
||||
|
|
|
@ -302,10 +302,10 @@ process_arguments (int argc, char **argv)
|
|||
usage5 ();
|
||||
case 'h': /* help */
|
||||
print_help ();
|
||||
exit (STATE_OK);
|
||||
exit (STATE_UNKNOWN);
|
||||
case 'V': /* version */
|
||||
print_revision (progname, NP_VERSION);
|
||||
exit (STATE_OK);
|
||||
exit (STATE_UNKNOWN);
|
||||
case 't': /* timeout period */
|
||||
if (!is_integer (optarg))
|
||||
usage2 (_("Timeout interval must be a positive integer"), optarg);
|
||||
|
|
|
@ -224,11 +224,11 @@ process_arguments (int argc, char **argv)
|
|||
usage5 ();
|
||||
case 'h': /* help */
|
||||
print_help ();
|
||||
exit (STATE_OK);
|
||||
exit (STATE_UNKNOWN);
|
||||
break;
|
||||
case 'V': /* version */
|
||||
print_revision (progname, NP_VERSION);
|
||||
exit (STATE_OK);
|
||||
exit (STATE_UNKNOWN);
|
||||
break;
|
||||
case 't': /* timeout period */
|
||||
timeout_interval = atoi (optarg);
|
||||
|
|
|
@ -428,10 +428,10 @@ process_arguments (int argc, char **argv)
|
|||
usage5 ();
|
||||
case 'h': /* help */
|
||||
print_help ();
|
||||
exit (STATE_OK);
|
||||
exit (STATE_UNKNOWN);
|
||||
case 'V': /* version */
|
||||
print_revision (progname, NP_VERSION);
|
||||
exit (STATE_OK);
|
||||
exit (STATE_UNKNOWN);
|
||||
case 't': /* timeout period */
|
||||
if (!is_integer (optarg))
|
||||
usage2 (_("Timeout interval must be a positive integer"), optarg);
|
||||
|
|
|
@ -36,7 +36,9 @@ const char *email = "devel@monitoring-plugins.org";
|
|||
#include "utils.h"
|
||||
#include "netutils.h"
|
||||
|
||||
#if defined(HAVE_LIBFREERADIUS_CLIENT)
|
||||
#if defined(HAVE_LIBRADCLI)
|
||||
#include <radcli/radcli.h>
|
||||
#elif defined(HAVE_LIBFREERADIUS_CLIENT)
|
||||
#include <freeradius-client.h>
|
||||
#elif defined(HAVE_LIBRADIUSCLIENT_NG)
|
||||
#include <radiusclient-ng.h>
|
||||
|
@ -48,22 +50,24 @@ int process_arguments (int, char **);
|
|||
void print_help (void);
|
||||
void print_usage (void);
|
||||
|
||||
#if defined(HAVE_LIBFREERADIUS_CLIENT) || defined(HAVE_LIBRADIUSCLIENT_NG)
|
||||
#if defined(HAVE_LIBFREERADIUS_CLIENT) || defined(HAVE_LIBRADIUSCLIENT_NG) || defined(HAVE_LIBRADCLI)
|
||||
#define my_rc_conf_str(a) rc_conf_str(rch,a)
|
||||
#if defined(HAVE_LIBRADCLI)
|
||||
#define my_rc_send_server(a,b) rc_send_server(rch,a,b,AUTH)
|
||||
#else
|
||||
#define my_rc_send_server(a,b) rc_send_server(rch,a,b)
|
||||
#ifdef HAVE_LIBFREERADIUS_CLIENT
|
||||
#endif
|
||||
#if defined(HAVE_LIBFREERADIUS_CLIENT) || defined(HAVE_LIBRADCLI)
|
||||
#define my_rc_buildreq(a,b,c,d,e,f) rc_buildreq(rch,a,b,c,d,(a)->secret,e,f)
|
||||
#else
|
||||
#define my_rc_buildreq(a,b,c,d,e,f) rc_buildreq(rch,a,b,c,d,e,f)
|
||||
#endif
|
||||
#define my_rc_own_ipaddress() rc_own_ipaddress(rch)
|
||||
#define my_rc_avpair_add(a,b,c,d) rc_avpair_add(rch,a,b,c,-1,d)
|
||||
#define my_rc_read_dictionary(a) rc_read_dictionary(rch, a)
|
||||
#else
|
||||
#define my_rc_conf_str(a) rc_conf_str(a)
|
||||
#define my_rc_send_server(a,b) rc_send_server(a, b)
|
||||
#define my_rc_buildreq(a,b,c,d,e,f) rc_buildreq(a,b,c,d,e,f)
|
||||
#define my_rc_own_ipaddress() rc_own_ipaddress()
|
||||
#define my_rc_avpair_add(a,b,c,d) rc_avpair_add(a, b, c, d)
|
||||
#define my_rc_read_dictionary(a) rc_read_dictionary(a)
|
||||
#endif
|
||||
|
@ -76,7 +80,7 @@ void print_usage (void);
|
|||
|
||||
int my_rc_read_config(char *);
|
||||
|
||||
#if defined(HAVE_LIBFREERADIUS_CLIENT) || defined(HAVE_LIBRADIUSCLIENT_NG)
|
||||
#if defined(HAVE_LIBFREERADIUS_CLIENT) || defined(HAVE_LIBRADIUSCLIENT_NG) || defined(HAVE_LIBRADCLI)
|
||||
rc_handle *rch = NULL;
|
||||
#endif
|
||||
|
||||
|
@ -90,7 +94,6 @@ char *config_file = NULL;
|
|||
unsigned short port = PW_AUTH_UDP_PORT;
|
||||
int retries = 1;
|
||||
int verbose = FALSE;
|
||||
ENV *env = NULL;
|
||||
|
||||
/******************************************************************************
|
||||
|
||||
|
@ -150,6 +153,8 @@ Please note that all tags must be lowercase to use the DocBook XML DTD.
|
|||
int
|
||||
main (int argc, char **argv)
|
||||
{
|
||||
struct sockaddr_storage ss;
|
||||
char name[HOST_NAME_MAX];
|
||||
char msg[BUFFER_LEN];
|
||||
SEND_DATA data;
|
||||
int result = STATE_UNKNOWN;
|
||||
|
@ -185,15 +190,14 @@ main (int argc, char **argv)
|
|||
die (STATE_UNKNOWN, _("Invalid NAS-Identifier\n"));
|
||||
}
|
||||
|
||||
if (nasipaddress != NULL) {
|
||||
if (rc_good_ipaddr (nasipaddress))
|
||||
die (STATE_UNKNOWN, _("Invalid NAS-IP-Address\n"));
|
||||
if ((client_id = rc_get_ipaddr(nasipaddress)) == 0)
|
||||
die (STATE_UNKNOWN, _("Invalid NAS-IP-Address\n"));
|
||||
} else {
|
||||
if ((client_id = my_rc_own_ipaddress ()) == 0)
|
||||
die (STATE_UNKNOWN, _("Can't find local IP for NAS-IP-Address\n"));
|
||||
if (nasipaddress == NULL) {
|
||||
if (gethostname (name, sizeof(name)) != 0)
|
||||
die (STATE_UNKNOWN, _("gethostname() failed!\n"));
|
||||
nasipaddress = name;
|
||||
}
|
||||
if (!dns_lookup (nasipaddress, &ss, AF_INET)) /* TODO: Support IPv6. */
|
||||
die (STATE_UNKNOWN, _("Invalid NAS-IP-Address\n"));
|
||||
client_id = ntohl (((struct sockaddr_in *)&ss)->sin_addr.s_addr);
|
||||
if (my_rc_avpair_add (&(data.send_pairs), PW_NAS_IP_ADDRESS, &client_id, 0) == NULL)
|
||||
die (STATE_UNKNOWN, _("Invalid NAS-IP-Address\n"));
|
||||
|
||||
|
@ -259,10 +263,10 @@ process_arguments (int argc, char **argv)
|
|||
usage5 ();
|
||||
case 'h': /* help */
|
||||
print_help ();
|
||||
exit (OK);
|
||||
exit (STATE_UNKNOWN);
|
||||
case 'V': /* version */
|
||||
print_revision (progname, NP_VERSION);
|
||||
exit (OK);
|
||||
exit (STATE_UNKNOWN);
|
||||
case 'v': /* verbose mode */
|
||||
verbose = TRUE;
|
||||
break;
|
||||
|
@ -274,7 +278,7 @@ process_arguments (int argc, char **argv)
|
|||
break;
|
||||
case 'P': /* port */
|
||||
if (is_intnonneg (optarg))
|
||||
port = atoi (optarg);
|
||||
port = (unsigned short)atoi (optarg);
|
||||
else
|
||||
usage4 (_("Port must be a positive integer"));
|
||||
break;
|
||||
|
@ -310,7 +314,7 @@ process_arguments (int argc, char **argv)
|
|||
break;
|
||||
case 't': /* timeout */
|
||||
if (is_intpos (optarg))
|
||||
timeout_interval = atoi (optarg);
|
||||
timeout_interval = (unsigned)atoi (optarg);
|
||||
else
|
||||
usage2 (_("Timeout interval must be a positive integer"), optarg);
|
||||
break;
|
||||
|
@ -399,7 +403,7 @@ print_usage (void)
|
|||
|
||||
int my_rc_read_config(char * a)
|
||||
{
|
||||
#if defined(HAVE_LIBFREERADIUS_CLIENT) || defined(HAVE_LIBRADIUSCLIENT_NG)
|
||||
#if defined(HAVE_LIBFREERADIUS_CLIENT) || defined(HAVE_LIBRADIUSCLIENT_NG) || defined(HAVE_LIBRADCLI)
|
||||
rch = rc_read_config(a);
|
||||
return (rch == NULL) ? 1 : 0;
|
||||
#else
|
||||
|
|
|
@ -163,17 +163,17 @@ main (int argc, char **argv)
|
|||
|
||||
/* Part I - Server Check */
|
||||
|
||||
/* send the OPTIONS request */
|
||||
sprintf (buffer, "DESCRIBE rtsp://%s:%d%s RTSP/1.0\n", host_name,
|
||||
/* send the DESCRIBE request */
|
||||
sprintf (buffer, "DESCRIBE rtsp://%s:%d%s RTSP/1.0\r\n", host_name,
|
||||
server_port, server_url);
|
||||
result = send (sd, buffer, strlen (buffer), 0);
|
||||
|
||||
/* send the header sync */
|
||||
sprintf (buffer, "CSeq: 2\n");
|
||||
sprintf (buffer, "CSeq: 2\r\n");
|
||||
result = send (sd, buffer, strlen (buffer), 0);
|
||||
|
||||
/* send a newline so the server knows we're done with the request */
|
||||
sprintf (buffer, "\n");
|
||||
sprintf (buffer, "\r\n");
|
||||
result = send (sd, buffer, strlen (buffer), 0);
|
||||
|
||||
/* watch for the REAL connection string */
|
||||
|
@ -359,10 +359,10 @@ process_arguments (int argc, char **argv)
|
|||
break;
|
||||
case 'V': /* version */
|
||||
print_revision (progname, NP_VERSION);
|
||||
exit (STATE_OK);
|
||||
exit (STATE_UNKNOWN);
|
||||
case 'h': /* help */
|
||||
print_help ();
|
||||
exit (STATE_OK);
|
||||
exit (STATE_UNKNOWN);
|
||||
case '?': /* usage */
|
||||
usage5 ();
|
||||
}
|
||||
|
|
|
@ -59,10 +59,6 @@ enum {
|
|||
#define SMTP_STARTTLS "STARTTLS\r\n"
|
||||
#define SMTP_AUTH_LOGIN "AUTH LOGIN\r\n"
|
||||
|
||||
#ifndef HOST_MAX_BYTES
|
||||
#define HOST_MAX_BYTES 255
|
||||
#endif
|
||||
|
||||
#define EHLO_SUPPORTS_STARTTLS 1
|
||||
|
||||
int process_arguments (int, char **);
|
||||
|
@ -128,6 +124,7 @@ main (int argc, char **argv)
|
|||
char *cmd_str = NULL;
|
||||
char *helocmd = NULL;
|
||||
char *error_msg = "";
|
||||
char *server_response = NULL;
|
||||
struct timeval tv;
|
||||
|
||||
/* Catch pipe errors in read/write - sometimes occurs when writing QUIT */
|
||||
|
@ -189,21 +186,9 @@ main (int argc, char **argv)
|
|||
printf (_("recv() failed\n"));
|
||||
return STATE_WARNING;
|
||||
}
|
||||
else {
|
||||
if (verbose)
|
||||
printf ("%s", buffer);
|
||||
/* strip the buffer of carriage returns */
|
||||
strip (buffer);
|
||||
/* make sure we find the response we are looking for */
|
||||
if (!strstr (buffer, server_expect)) {
|
||||
if (server_port == SMTP_PORT)
|
||||
printf (_("Invalid SMTP response received from host: %s\n"), buffer);
|
||||
else
|
||||
printf (_("Invalid SMTP response received from host on port %d: %s\n"),
|
||||
server_port, buffer);
|
||||
return STATE_WARNING;
|
||||
}
|
||||
}
|
||||
|
||||
/* save connect return (220 hostname ..) for later use */
|
||||
xasprintf(&server_response, "%s", buffer);
|
||||
|
||||
/* send the HELO/EHLO command */
|
||||
send(sd, helocmd, strlen(helocmd), 0);
|
||||
|
@ -231,7 +216,7 @@ main (int argc, char **argv)
|
|||
send(sd, SMTP_STARTTLS, strlen(SMTP_STARTTLS), 0);
|
||||
|
||||
recvlines(buffer, MAX_INPUT_BUFFER); /* wait for it */
|
||||
if (!strstr (buffer, server_expect)) {
|
||||
if (!strstr (buffer, SMTP_EXPECT)) {
|
||||
printf (_("Server does not support STARTTLS\n"));
|
||||
smtp_quit();
|
||||
return STATE_UNKNOWN;
|
||||
|
@ -239,8 +224,8 @@ main (int argc, char **argv)
|
|||
result = np_net_ssl_init(sd);
|
||||
if(result != STATE_OK) {
|
||||
printf (_("CRITICAL - Cannot create SSL context.\n"));
|
||||
np_net_ssl_cleanup();
|
||||
close(sd);
|
||||
np_net_ssl_cleanup();
|
||||
return STATE_CRITICAL;
|
||||
} else {
|
||||
ssl_established = 1;
|
||||
|
@ -276,6 +261,7 @@ main (int argc, char **argv)
|
|||
# ifdef USE_OPENSSL
|
||||
if ( check_cert ) {
|
||||
result = np_net_ssl_check_cert(days_till_exp_warn, days_till_exp_crit);
|
||||
smtp_quit();
|
||||
my_close();
|
||||
return result;
|
||||
}
|
||||
|
@ -283,6 +269,24 @@ main (int argc, char **argv)
|
|||
}
|
||||
#endif
|
||||
|
||||
if (verbose)
|
||||
printf ("%s", buffer);
|
||||
|
||||
/* save buffer for later use */
|
||||
xasprintf(&server_response, "%s%s", server_response, buffer);
|
||||
/* strip the buffer of carriage returns */
|
||||
strip (server_response);
|
||||
|
||||
/* make sure we find the droids we are looking for */
|
||||
if (!strstr (server_response, server_expect)) {
|
||||
if (server_port == SMTP_PORT)
|
||||
printf (_("Invalid SMTP response received from host: %s\n"), server_response);
|
||||
else
|
||||
printf (_("Invalid SMTP response received from host on port %d: %s\n"),
|
||||
server_port, server_response);
|
||||
return STATE_WARNING;
|
||||
}
|
||||
|
||||
if (send_mail_from) {
|
||||
my_send(cmd_str, strlen(cmd_str));
|
||||
if (recvlines(buffer, MAX_INPUT_BUFFER) >= 1 && verbose)
|
||||
|
@ -581,11 +585,6 @@ process_arguments (int argc, char **argv)
|
|||
usage4 (_("Timeout interval must be a positive integer"));
|
||||
}
|
||||
break;
|
||||
case 'S':
|
||||
/* starttls */
|
||||
use_ssl = TRUE;
|
||||
use_ehlo = TRUE;
|
||||
break;
|
||||
case 'D':
|
||||
/* Check SSL cert validity */
|
||||
#ifdef USE_OPENSSL
|
||||
|
@ -607,9 +606,14 @@ process_arguments (int argc, char **argv)
|
|||
days_till_exp_warn = atoi (optarg);
|
||||
}
|
||||
check_cert = TRUE;
|
||||
ignore_send_quit_failure = TRUE;
|
||||
#else
|
||||
usage (_("SSL support not available - install OpenSSL and recompile"));
|
||||
#endif
|
||||
case 'S':
|
||||
/* starttls */
|
||||
use_ssl = TRUE;
|
||||
use_ehlo = TRUE;
|
||||
break;
|
||||
case '4':
|
||||
address_family = AF_INET;
|
||||
|
@ -623,10 +627,10 @@ process_arguments (int argc, char **argv)
|
|||
break;
|
||||
case 'V': /* version */
|
||||
print_revision (progname, NP_VERSION);
|
||||
exit (STATE_OK);
|
||||
exit (STATE_UNKNOWN);
|
||||
case 'h': /* help */
|
||||
print_help ();
|
||||
exit (STATE_OK);
|
||||
exit (STATE_UNKNOWN);
|
||||
case '?': /* help */
|
||||
usage5 ();
|
||||
}
|
||||
|
@ -763,10 +767,12 @@ recvlines(char *buf, size_t bufsize)
|
|||
int
|
||||
my_close (void)
|
||||
{
|
||||
int result;
|
||||
result = close(sd);
|
||||
#ifdef HAVE_SSL
|
||||
np_net_ssl_cleanup();
|
||||
np_net_ssl_cleanup();
|
||||
#endif
|
||||
return close(sd);
|
||||
return result;
|
||||
}
|
||||
|
||||
|
||||
|
|
|
@ -103,6 +103,8 @@ int errcode, excode;
|
|||
|
||||
char *server_address = NULL;
|
||||
char *community = NULL;
|
||||
char **contextargs = NULL;
|
||||
char *context = NULL;
|
||||
char **authpriv = NULL;
|
||||
char *proto = NULL;
|
||||
char *seclevel = NULL;
|
||||
|
@ -127,6 +129,7 @@ size_t nunits = 0;
|
|||
size_t unitv_size = OID_COUNT_STEP;
|
||||
int numoids = 0;
|
||||
int numauthpriv = 0;
|
||||
int numcontext = 0;
|
||||
int verbose = 0;
|
||||
int usesnmpgetnext = FALSE;
|
||||
char *warning_thresholds = NULL;
|
||||
|
@ -149,7 +152,7 @@ state_data *previous_state;
|
|||
double *previous_value;
|
||||
size_t previous_size = OID_COUNT_STEP;
|
||||
int perf_labels = 1;
|
||||
|
||||
char* ip_version = "";
|
||||
|
||||
static char *fix_snmp_range(char *th)
|
||||
{
|
||||
|
@ -296,8 +299,8 @@ main (int argc, char **argv)
|
|||
snmpcmd = strdup (PATH_TO_SNMPGET);
|
||||
}
|
||||
|
||||
/* 10 arguments to pass before authpriv options + 1 for host and numoids. Add one for terminating NULL */
|
||||
command_line = calloc (10 + numauthpriv + 1 + numoids + 1, sizeof (char *));
|
||||
/* 10 arguments to pass before context and authpriv options + 1 for host and numoids. Add one for terminating NULL */
|
||||
command_line = calloc (10 + numcontext + numauthpriv + 1 + numoids + 1, sizeof (char *));
|
||||
command_line[0] = snmpcmd;
|
||||
command_line[1] = strdup ("-Le");
|
||||
command_line[2] = strdup ("-t");
|
||||
|
@ -309,23 +312,27 @@ main (int argc, char **argv)
|
|||
command_line[8] = "-v";
|
||||
command_line[9] = strdup (proto);
|
||||
|
||||
for (i = 0; i < numcontext; i++) {
|
||||
command_line[10 + i] = contextargs[i];
|
||||
}
|
||||
|
||||
for (i = 0; i < numauthpriv; i++) {
|
||||
command_line[10 + i] = authpriv[i];
|
||||
command_line[10 + numcontext + i] = authpriv[i];
|
||||
}
|
||||
|
||||
xasprintf (&command_line[10 + numauthpriv], "%s:%s", server_address, port);
|
||||
xasprintf (&command_line[10 + numcontext + numauthpriv], "%s:%s", server_address, port);
|
||||
|
||||
/* This is just for display purposes, so it can remain a string */
|
||||
xasprintf(&cl_hidden_auth, "%s -Le -t %d -r %d -m %s -v %s %s %s:%s",
|
||||
snmpcmd, timeout_interval, retries, strlen(miblist) ? miblist : "''", proto, "[authpriv]",
|
||||
xasprintf(&cl_hidden_auth, "%s -Le -t %d -r %d -m %s -v %s %s %s %s:%s",
|
||||
snmpcmd, timeout_interval, retries, strlen(miblist) ? miblist : "''", proto, "[context]", "[authpriv]",
|
||||
server_address, port);
|
||||
|
||||
for (i = 0; i < numoids; i++) {
|
||||
command_line[10 + numauthpriv + 1 + i] = oids[i];
|
||||
command_line[10 + numcontext + numauthpriv + 1 + i] = oids[i];
|
||||
xasprintf(&cl_hidden_auth, "%s %s", cl_hidden_auth, oids[i]);
|
||||
}
|
||||
|
||||
command_line[10 + numauthpriv + 1 + numoids] = NULL;
|
||||
command_line[10 + numcontext + numauthpriv + 1 + numoids] = NULL;
|
||||
|
||||
if (verbose)
|
||||
printf ("%s\n", cl_hidden_auth);
|
||||
|
@ -410,6 +417,9 @@ main (int argc, char **argv)
|
|||
else if (strstr (response, "INTEGER: ")) {
|
||||
show = strstr (response, "INTEGER: ") + 9;
|
||||
}
|
||||
else if (strstr (response, "OID: ")) {
|
||||
show = strstr (response, "OID: ") + 5;
|
||||
}
|
||||
else if (strstr (response, "STRING: ")) {
|
||||
show = strstr (response, "STRING: ") + 8;
|
||||
conv = "%.10g";
|
||||
|
@ -566,6 +576,18 @@ main (int argc, char **argv)
|
|||
len = sizeof(perfstr)-strlen(perfstr)-1;
|
||||
strncat(perfstr, show, len>ptr-show ? ptr-show : len);
|
||||
|
||||
if (warning_thresholds) {
|
||||
strncat(perfstr, ";", sizeof(perfstr)-strlen(perfstr)-1);
|
||||
strncat(perfstr, warning_thresholds, sizeof(perfstr)-strlen(perfstr)-1);
|
||||
}
|
||||
|
||||
if (critical_thresholds) {
|
||||
if (!warning_thresholds)
|
||||
strncat(perfstr, ";", sizeof(perfstr)-strlen(perfstr)-1);
|
||||
strncat(perfstr, ";", sizeof(perfstr)-strlen(perfstr)-1);
|
||||
strncat(perfstr, critical_thresholds, sizeof(perfstr)-strlen(perfstr)-1);
|
||||
}
|
||||
|
||||
if (type)
|
||||
strncat(perfstr, type, sizeof(perfstr)-strlen(perfstr)-1);
|
||||
strncat(perfstr, " ", sizeof(perfstr)-strlen(perfstr)-1);
|
||||
|
@ -645,6 +667,7 @@ process_arguments (int argc, char **argv)
|
|||
{"retries", required_argument, 0, 'e'},
|
||||
{"miblist", required_argument, 0, 'm'},
|
||||
{"protocol", required_argument, 0, 'P'},
|
||||
{"context", required_argument, 0, 'N'},
|
||||
{"seclevel", required_argument, 0, 'L'},
|
||||
{"secname", required_argument, 0, 'U'},
|
||||
{"authproto", required_argument, 0, 'a'},
|
||||
|
@ -657,6 +680,8 @@ process_arguments (int argc, char **argv)
|
|||
{"offset", required_argument, 0, L_OFFSET},
|
||||
{"invert-search", no_argument, 0, L_INVERT_SEARCH},
|
||||
{"perf-oids", no_argument, 0, 'O'},
|
||||
{"ipv4", no_argument, 0, '4'},
|
||||
{"ipv6", no_argument, 0, '6'},
|
||||
{0, 0, 0, 0}
|
||||
};
|
||||
|
||||
|
@ -674,7 +699,7 @@ process_arguments (int argc, char **argv)
|
|||
}
|
||||
|
||||
while (1) {
|
||||
c = getopt_long (argc, argv, "nhvVOt:c:w:H:C:o:e:E:d:D:s:t:R:r:l:u:p:m:P:L:U:a:x:A:X:",
|
||||
c = getopt_long (argc, argv, "nhvVO46t:c:w:H:C:o:e:E:d:D:s:t:R:r:l:u:p:m:P:N:L:U:a:x:A:X:",
|
||||
longopts, &option);
|
||||
|
||||
if (c == -1 || c == EOF)
|
||||
|
@ -685,10 +710,10 @@ process_arguments (int argc, char **argv)
|
|||
usage5 ();
|
||||
case 'h': /* help */
|
||||
print_help ();
|
||||
exit (STATE_OK);
|
||||
exit (STATE_UNKNOWN);
|
||||
case 'V': /* version */
|
||||
print_revision (progname, NP_VERSION);
|
||||
exit (STATE_OK);
|
||||
exit (STATE_UNKNOWN);
|
||||
case 'v': /* verbose */
|
||||
verbose++;
|
||||
break;
|
||||
|
@ -712,6 +737,9 @@ process_arguments (int argc, char **argv)
|
|||
case 'P': /* SNMP protocol version */
|
||||
proto = optarg;
|
||||
break;
|
||||
case 'N': /* SNMPv3 context */
|
||||
context = optarg;
|
||||
break;
|
||||
case 'L': /* security level */
|
||||
seclevel = optarg;
|
||||
break;
|
||||
|
@ -896,6 +924,13 @@ process_arguments (int argc, char **argv)
|
|||
case 'O':
|
||||
perf_labels=0;
|
||||
break;
|
||||
case '4':
|
||||
break;
|
||||
case '6':
|
||||
xasprintf(&ip_version, "udp6:");
|
||||
if(verbose>2)
|
||||
printf("IPv6 detected! Will pass \"udp6:\" to snmpget.\n");
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
||||
|
@ -959,6 +994,13 @@ validate_arguments ()
|
|||
authpriv[1] = strdup (community);
|
||||
}
|
||||
else if ( strcmp (proto, "3") == 0 ) { /* snmpv3 args */
|
||||
if (!(context == NULL)) {
|
||||
numcontext = 2;
|
||||
contextargs = calloc (numcontext, sizeof (char *));
|
||||
contextargs[0] = strdup ("-n");
|
||||
contextargs[1] = strdup (context);
|
||||
}
|
||||
|
||||
if (seclevel == NULL)
|
||||
xasprintf(&seclevel, "noAuthNoPriv");
|
||||
|
||||
|
@ -1094,6 +1136,7 @@ print_help (void)
|
|||
|
||||
printf (UT_HELP_VRSN);
|
||||
printf (UT_EXTRA_OPTS);
|
||||
printf (UT_IPv46);
|
||||
|
||||
printf (UT_HOST_PORT, 'p', DEFAULT_PORT);
|
||||
|
||||
|
@ -1102,6 +1145,8 @@ print_help (void)
|
|||
printf (" %s\n", _("Use SNMP GETNEXT instead of SNMP GET"));
|
||||
printf (" %s\n", "-P, --protocol=[1|2c|3]");
|
||||
printf (" %s\n", _("SNMP protocol version"));
|
||||
printf (" %s\n", "-N, --context=CONTEXT");
|
||||
printf (" %s\n", _("SNMPv3 context"));
|
||||
printf (" %s\n", "-L, --seclevel=[noAuthNoPriv|authNoPriv|authPriv]");
|
||||
printf (" %s\n", _("SNMPv3 securityLevel"));
|
||||
printf (" %s\n", "-a, --authproto=[MD5|SHA]");
|
||||
|
@ -1209,6 +1254,6 @@ print_usage (void)
|
|||
printf ("%s -H <ip_address> -o <OID> [-w warn_range] [-c crit_range]\n",progname);
|
||||
printf ("[-C community] [-s string] [-r regex] [-R regexi] [-t timeout] [-e retries]\n");
|
||||
printf ("[-l label] [-u units] [-p port-number] [-d delimiter] [-D output-delimiter]\n");
|
||||
printf ("[-m miblist] [-P snmp version] [-L seclevel] [-U secname] [-a authproto]\n");
|
||||
printf ("[-A authpasswd] [-x privproto] [-X privpasswd]\n");
|
||||
printf ("[-m miblist] [-P snmp version] [-N context] [-L seclevel] [-U secname]\n");
|
||||
printf ("[-a authproto] [-A authpasswd] [-x privproto] [-X privpasswd] [-4|6]\n");
|
||||
}
|
||||
|
|
|
@ -128,10 +128,10 @@ process_arguments (int argc, char **argv)
|
|||
usage5 ();
|
||||
case 'V': /* version */
|
||||
print_revision (progname, NP_VERSION);
|
||||
exit (STATE_OK);
|
||||
exit (STATE_UNKNOWN);
|
||||
case 'h': /* help */
|
||||
print_help ();
|
||||
exit (STATE_OK);
|
||||
exit (STATE_UNKNOWN);
|
||||
case 'v': /* verbose */
|
||||
verbose = TRUE;
|
||||
break;
|
||||
|
@ -253,18 +253,18 @@ ssh_connect (char *haddr, int hport, char *remote_version, char *remote_protocol
|
|||
|
||||
if (remote_version && strcmp(remote_version, ssh_server)) {
|
||||
printf
|
||||
(_("SSH WARNING - %s (protocol %s) version mismatch, expected '%s'\n"),
|
||||
(_("SSH CRITICAL - %s (protocol %s) version mismatch, expected '%s'\n"),
|
||||
ssh_server, ssh_proto, remote_version);
|
||||
close(sd);
|
||||
exit (STATE_WARNING);
|
||||
exit (STATE_CRITICAL);
|
||||
}
|
||||
|
||||
if (remote_protocol && strcmp(remote_protocol, ssh_proto)) {
|
||||
printf
|
||||
(_("SSH WARNING - %s (protocol %s) protocol version mismatch, expected '%s'\n"),
|
||||
(_("SSH CRITICAL - %s (protocol %s) protocol version mismatch, expected '%s'\n"),
|
||||
ssh_server, ssh_proto, remote_protocol);
|
||||
close(sd);
|
||||
exit (STATE_WARNING);
|
||||
exit (STATE_CRITICAL);
|
||||
}
|
||||
|
||||
elapsed_time = (double)deltime(tv) / 1.0e6;
|
||||
|
@ -307,10 +307,10 @@ print_help (void)
|
|||
printf (UT_CONN_TIMEOUT, DEFAULT_SOCKET_TIMEOUT);
|
||||
|
||||
printf (" %s\n", "-r, --remote-version=STRING");
|
||||
printf (" %s\n", _("Warn if string doesn't match expected server version (ex: OpenSSH_3.9p1)"));
|
||||
printf (" %s\n", _("Alert if string doesn't match expected server version (ex: OpenSSH_3.9p1)"));
|
||||
|
||||
printf (" %s\n", "-P, --remote-protocol=STRING");
|
||||
printf (" %s\n", _("Warn if protocol doesn't match expected protocol version (ex: 2.0)"));
|
||||
printf (" %s\n", _("Alert if protocol doesn't match expected protocol version (ex: 2.0)"));
|
||||
|
||||
printf (UT_VERBOSE);
|
||||
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
/*****************************************************************************
|
||||
*
|
||||
* Monitoring check_disk plugin
|
||||
* Monitoring check_swap plugin
|
||||
*
|
||||
* License: GPL
|
||||
* Copyright (c) 2000 Karl DeBisschop (kdebisschop@users.sourceforge.net)
|
||||
|
@ -352,6 +352,7 @@ main (int argc, char **argv)
|
|||
percent_used = 100 * ((double) used_swap_mb) / ((double) total_swap_mb);
|
||||
} else {
|
||||
percent_used = 100;
|
||||
status = "- Swap is either disabled, not present, or of zero size. ";
|
||||
}
|
||||
|
||||
result = max_state (result, check_swap (percent_used, free_swap_mb));
|
||||
|
@ -469,10 +470,10 @@ process_arguments (int argc, char **argv)
|
|||
break;
|
||||
case 'V': /* version */
|
||||
print_revision (progname, NP_VERSION);
|
||||
exit (STATE_OK);
|
||||
exit (STATE_UNKNOWN);
|
||||
case 'h': /* help */
|
||||
print_help ();
|
||||
exit (STATE_OK);
|
||||
exit (STATE_UNKNOWN);
|
||||
case '?': /* error */
|
||||
usage5 ();
|
||||
}
|
||||
|
|
|
@ -237,7 +237,7 @@ main (int argc, char **argv)
|
|||
gettimeofday (&tv, NULL);
|
||||
|
||||
result = np_net_connect (server_address, server_port, &sd, PROTOCOL);
|
||||
if (result == STATE_CRITICAL) return STATE_CRITICAL;
|
||||
if (result == STATE_CRITICAL) return econn_refuse_state;
|
||||
|
||||
#ifdef HAVE_SSL
|
||||
if (flags & FLAG_SSL){
|
||||
|
@ -247,8 +247,8 @@ main (int argc, char **argv)
|
|||
}
|
||||
}
|
||||
if(result != STATE_OK){
|
||||
np_net_ssl_cleanup();
|
||||
if(sd) close(sd);
|
||||
np_net_ssl_cleanup();
|
||||
return result;
|
||||
}
|
||||
#endif /* HAVE_SSL */
|
||||
|
@ -321,10 +321,10 @@ main (int argc, char **argv)
|
|||
if (server_quit != NULL) {
|
||||
my_send(server_quit, strlen(server_quit));
|
||||
}
|
||||
if (sd) close (sd);
|
||||
#ifdef HAVE_SSL
|
||||
np_net_ssl_cleanup();
|
||||
#endif
|
||||
if (sd) close (sd);
|
||||
|
||||
microsec = deltime (tv);
|
||||
elapsed_time = (double)microsec / 1.0e6;
|
||||
|
@ -463,10 +463,10 @@ process_arguments (int argc, char **argv)
|
|||
usage5 ();
|
||||
case 'h': /* help */
|
||||
print_help ();
|
||||
exit (STATE_OK);
|
||||
exit (STATE_UNKNOWN);
|
||||
case 'V': /* version */
|
||||
print_revision (progname, NP_VERSION);
|
||||
exit (STATE_OK);
|
||||
exit (STATE_UNKNOWN);
|
||||
case 'v': /* verbose mode */
|
||||
flags |= FLAG_VERBOSE;
|
||||
match_flags |= NP_MATCH_VERBOSE;
|
||||
|
@ -577,7 +577,8 @@ process_arguments (int argc, char **argv)
|
|||
if ((temp=strchr(optarg,','))!=NULL) {
|
||||
*temp='\0';
|
||||
if (!is_intnonneg (optarg))
|
||||
usage2 (_("Invalid certificate expiration period"), optarg); days_till_exp_warn = atoi(optarg);
|
||||
usage2 (_("Invalid certificate expiration period"), optarg);
|
||||
days_till_exp_warn = atoi (optarg);
|
||||
*temp=',';
|
||||
temp++;
|
||||
if (!is_intnonneg (temp))
|
||||
|
|
|
@ -231,10 +231,10 @@ process_arguments (int argc, char **argv)
|
|||
usage5 ();
|
||||
case 'h': /* help */
|
||||
print_help ();
|
||||
exit (STATE_OK);
|
||||
exit (STATE_UNKNOWN);
|
||||
case 'V': /* version */
|
||||
print_revision (progname, NP_VERSION);
|
||||
exit (STATE_OK);
|
||||
exit (STATE_UNKNOWN);
|
||||
case 'H': /* hostname */
|
||||
if (is_host (optarg) == FALSE)
|
||||
usage2 (_("Invalid hostname/address"), optarg);
|
||||
|
|
|
@ -558,10 +558,10 @@ process_arguments (int argc, char **argv)
|
|||
break;
|
||||
case 'V': /* version */
|
||||
print_revision (progname, NP_VERSION);
|
||||
exit (STATE_OK);
|
||||
exit (STATE_UNKNOWN);
|
||||
case 'h': /* help */
|
||||
print_help ();
|
||||
exit (STATE_OK);
|
||||
exit (STATE_UNKNOWN);
|
||||
}
|
||||
}
|
||||
|
||||
|
|
|
@ -54,15 +54,15 @@ int process_arguments (int, char **);
|
|||
void print_help (void);
|
||||
void print_usage (void);
|
||||
|
||||
int wusers = -1;
|
||||
int cusers = -1;
|
||||
char *warning_range = NULL;
|
||||
char *critical_range = NULL;
|
||||
thresholds *thlds = NULL;
|
||||
|
||||
int
|
||||
main (int argc, char **argv)
|
||||
{
|
||||
int users = -1;
|
||||
int result = STATE_UNKNOWN;
|
||||
char *perf;
|
||||
#if HAVE_WTSAPI32_H
|
||||
WTS_SESSION_INFO *wtsinfo;
|
||||
DWORD wtscount;
|
||||
|
@ -77,8 +77,6 @@ main (int argc, char **argv)
|
|||
bindtextdomain (PACKAGE, LOCALEDIR);
|
||||
textdomain (PACKAGE);
|
||||
|
||||
perf = strdup ("");
|
||||
|
||||
/* Parse extra opts if any */
|
||||
argv = np_extra_opts (&argc, argv, progname);
|
||||
|
||||
|
@ -160,23 +158,15 @@ main (int argc, char **argv)
|
|||
#endif
|
||||
|
||||
/* check the user count against warning and critical thresholds */
|
||||
if (users > cusers)
|
||||
result = STATE_CRITICAL;
|
||||
else if (users > wusers)
|
||||
result = STATE_WARNING;
|
||||
else if (users >= 0)
|
||||
result = STATE_OK;
|
||||
result = get_status((double)users, thlds);
|
||||
|
||||
if (result == STATE_UNKNOWN)
|
||||
printf ("%s\n", _("Unable to read output"));
|
||||
else {
|
||||
xasprintf (&perf, "%s", perfdata ("users", users, "",
|
||||
TRUE, wusers,
|
||||
TRUE, cusers,
|
||||
TRUE, 0,
|
||||
FALSE, 0));
|
||||
printf (_("USERS %s - %d users currently logged in |%s\n"), state_text (result),
|
||||
users, perf);
|
||||
printf (_("USERS %s - %d users currently logged in |%s\n"),
|
||||
state_text(result), users,
|
||||
sperfdata_int("users", users, "", warning_range,
|
||||
critical_range, TRUE, 0, FALSE, 0));
|
||||
}
|
||||
|
||||
return result;
|
||||
|
@ -210,38 +200,32 @@ process_arguments (int argc, char **argv)
|
|||
usage5 ();
|
||||
case 'h': /* help */
|
||||
print_help ();
|
||||
exit (STATE_OK);
|
||||
exit (STATE_UNKNOWN);
|
||||
case 'V': /* version */
|
||||
print_revision (progname, NP_VERSION);
|
||||
exit (STATE_OK);
|
||||
exit (STATE_UNKNOWN);
|
||||
case 'c': /* critical */
|
||||
if (!is_intnonneg (optarg))
|
||||
usage4 (_("Critical threshold must be a positive integer"));
|
||||
else
|
||||
cusers = atoi (optarg);
|
||||
critical_range = optarg;
|
||||
break;
|
||||
case 'w': /* warning */
|
||||
if (!is_intnonneg (optarg))
|
||||
usage4 (_("Warning threshold must be a positive integer"));
|
||||
else
|
||||
wusers = atoi (optarg);
|
||||
warning_range = optarg;
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
||||
c = optind;
|
||||
if (wusers == -1 && argc > c) {
|
||||
if (is_intnonneg (argv[c]) == FALSE)
|
||||
usage4 (_("Warning threshold must be a positive integer"));
|
||||
else
|
||||
wusers = atoi (argv[c++]);
|
||||
}
|
||||
if (cusers == -1 && argc > c) {
|
||||
if (is_intnonneg (argv[c]) == FALSE)
|
||||
usage4 (_("Warning threshold must be a positive integer"));
|
||||
else
|
||||
cusers = atoi (argv[c]);
|
||||
}
|
||||
if (warning_range == NULL && argc > c)
|
||||
warning_range = argv[c++];
|
||||
if (critical_range == NULL && argc > c)
|
||||
critical_range = argv[c++];
|
||||
|
||||
/* this will abort in case of invalid ranges */
|
||||
set_thresholds (&thlds, warning_range, critical_range);
|
||||
|
||||
if (thlds->warning->end < 0)
|
||||
usage4 (_("Warning threshold must be a positive integer"));
|
||||
if (thlds->critical->end < 0)
|
||||
usage4 (_("Critical threshold must be a positive integer"));
|
||||
|
||||
return OK;
|
||||
}
|
||||
|
|
|
@ -161,6 +161,13 @@
|
|||
# endif
|
||||
#endif
|
||||
|
||||
/* openssl 1.1 does not set OPENSSL_NO_SSL2 by default but ships without ssl2 */
|
||||
#ifdef OPENSSL_VERSION_NUMBER
|
||||
# if OPENSSL_VERSION_NUMBER >= 0x10100000
|
||||
# define OPENSSL_NO_SSL2
|
||||
# endif
|
||||
#endif
|
||||
|
||||
/*
|
||||
*
|
||||
* Standard Values
|
||||
|
|
|
@ -59,8 +59,8 @@ static int state[4] = {
|
|||
int
|
||||
main (int argc, char **argv)
|
||||
{
|
||||
int found = 0, result = STATE_UNKNOWN;
|
||||
char *buf, *sub;
|
||||
int result = STATE_UNKNOWN;
|
||||
char *sub;
|
||||
char **command_line;
|
||||
output chld_out, chld_err;
|
||||
int i;
|
||||
|
|
|
@ -161,6 +161,10 @@ process_request (const char *server_address, int server_port, int proto,
|
|||
int
|
||||
np_net_connect (const char *host_name, int port, int *sd, int proto)
|
||||
{
|
||||
/* send back STATE_UNKOWN if there's an error
|
||||
send back STATE_OK if we connect
|
||||
send back STATE_CRITICAL if we can't connect.
|
||||
Let upstream figure out what to send to the user. */
|
||||
struct addrinfo hints;
|
||||
struct addrinfo *r, *res;
|
||||
struct sockaddr_un su;
|
||||
|
@ -250,16 +254,14 @@ np_net_connect (const char *host_name, int port, int *sd, int proto)
|
|||
else if (was_refused) {
|
||||
switch (econn_refuse_state) { /* a user-defined expected outcome */
|
||||
case STATE_OK:
|
||||
case STATE_WARNING: /* user wants WARN or OK on refusal */
|
||||
return econn_refuse_state;
|
||||
break;
|
||||
case STATE_CRITICAL: /* user did not set econn_refuse_state */
|
||||
case STATE_WARNING: /* user wants WARN or OK on refusal, or... */
|
||||
case STATE_CRITICAL: /* user did not set econn_refuse_state, or wanted critical */
|
||||
if (is_socket)
|
||||
printf("connect to file socket %s: %s\n", host_name, strerror(errno));
|
||||
else
|
||||
printf("connect to address %s and port %d: %s\n",
|
||||
host_name, port, strerror(errno));
|
||||
return econn_refuse_state;
|
||||
return STATE_CRITICAL;
|
||||
break;
|
||||
default: /* it's a logic error if we do not end up in STATE_(OK|WARNING|CRITICAL) */
|
||||
return STATE_UNKNOWN;
|
||||
|
@ -357,20 +359,21 @@ is_addr (const char *address)
|
|||
}
|
||||
|
||||
int
|
||||
resolve_host_or_addr (const char *address, int family)
|
||||
dns_lookup (const char *in, struct sockaddr_storage *ss, int family)
|
||||
{
|
||||
struct addrinfo hints;
|
||||
struct addrinfo *res;
|
||||
int retval;
|
||||
|
||||
memset (&hints, 0, sizeof (hints));
|
||||
memset (&hints, 0, sizeof(struct addrinfo));
|
||||
hints.ai_family = family;
|
||||
retval = getaddrinfo (address, NULL, &hints, &res);
|
||||
|
||||
retval = getaddrinfo (in, NULL, &hints, &res);
|
||||
if (retval != 0)
|
||||
return FALSE;
|
||||
else {
|
||||
freeaddrinfo (res);
|
||||
return TRUE;
|
||||
}
|
||||
|
||||
if (ss != NULL)
|
||||
memcpy (ss, res->ai_addr, res->ai_addrlen);
|
||||
freeaddrinfo (res);
|
||||
return TRUE;
|
||||
}
|
||||
|
|
|
@ -45,6 +45,10 @@
|
|||
# endif /* UNIX_PATH_MAX */
|
||||
#endif /* HAVE_SYS_UN_H */
|
||||
|
||||
#ifndef HOST_MAX_BYTES
|
||||
# define HOST_MAX_BYTES 255
|
||||
#endif
|
||||
|
||||
/* process_request and wrapper macros */
|
||||
#define process_tcp_request(addr, port, sbuf, rbuf, rsize) \
|
||||
process_request(addr, port, IPPROTO_TCP, sbuf, rbuf, rsize)
|
||||
|
@ -71,8 +75,9 @@ int send_request (int sd, int proto, const char *send_buffer, char *recv_buffer,
|
|||
/* "is_*" wrapper macros and functions */
|
||||
int is_host (const char *);
|
||||
int is_addr (const char *);
|
||||
int resolve_host_or_addr (const char *, int);
|
||||
int dns_lookup (const char *, struct sockaddr_storage *, int);
|
||||
void host_or_die(const char *str);
|
||||
#define resolve_host_or_addr(addr, family) dns_lookup(addr, NULL, family)
|
||||
#define is_inet_addr(addr) resolve_host_or_addr(addr, AF_INET)
|
||||
#ifdef USE_IPV6
|
||||
# define is_inet6_addr(addr) resolve_host_or_addr(addr, AF_INET6)
|
||||
|
@ -91,6 +96,16 @@ RETSIGTYPE socket_timeout_alarm_handler (int) __attribute__((noreturn));
|
|||
|
||||
/* SSL-Related functionality */
|
||||
#ifdef HAVE_SSL
|
||||
# define MP_SSLv2 1
|
||||
# define MP_SSLv3 2
|
||||
# define MP_TLSv1 3
|
||||
# define MP_TLSv1_1 4
|
||||
# define MP_TLSv1_2 5
|
||||
# define MP_SSLv2_OR_NEWER 6
|
||||
# define MP_SSLv3_OR_NEWER 7
|
||||
# define MP_TLSv1_OR_NEWER 8
|
||||
# define MP_TLSv1_1_OR_NEWER 9
|
||||
# define MP_TLSv1_2_OR_NEWER 10
|
||||
/* maybe this could be merged with the above np_net_connect, via some flags */
|
||||
int np_net_ssl_init(int sd);
|
||||
int np_net_ssl_init_with_hostname(int sd, char *host_name);
|
||||
|
|
|
@ -48,34 +48,79 @@ int np_net_ssl_init_with_hostname_and_version(int sd, char *host_name, int versi
|
|||
}
|
||||
|
||||
int np_net_ssl_init_with_hostname_version_and_cert(int sd, char *host_name, int version, char *cert, char *privkey) {
|
||||
SSL_METHOD *method = NULL;
|
||||
const SSL_METHOD *method = NULL;
|
||||
long options = 0;
|
||||
|
||||
switch (version) {
|
||||
case 0: /* Deafult to auto negotiation */
|
||||
method = SSLv23_client_method();
|
||||
break;
|
||||
case 1: /* TLSv1 protocol */
|
||||
method = TLSv1_client_method();
|
||||
break;
|
||||
case 2: /* SSLv2 protocol */
|
||||
case MP_SSLv2: /* SSLv2 protocol */
|
||||
#if defined(USE_GNUTLS) || defined(OPENSSL_NO_SSL2)
|
||||
printf("%s\n", _("CRITICAL - SSL protocol version 2 is not supported by your SSL library."));
|
||||
return STATE_CRITICAL;
|
||||
printf("%s\n", _("UNKNOWN - SSL protocol version 2 is not supported by your SSL library."));
|
||||
return STATE_UNKNOWN;
|
||||
#else
|
||||
method = SSLv2_client_method();
|
||||
#endif
|
||||
break;
|
||||
case 3: /* SSLv3 protocol */
|
||||
#endif
|
||||
case MP_SSLv3: /* SSLv3 protocol */
|
||||
#if defined(OPENSSL_NO_SSL3)
|
||||
printf("%s\n", _("CRITICAL - SSL protocol version 3 is not supported by your SSL library."));
|
||||
return STATE_CRITICAL;
|
||||
printf("%s\n", _("UNKNOWN - SSL protocol version 3 is not supported by your SSL library."));
|
||||
return STATE_UNKNOWN;
|
||||
#else
|
||||
method = SSLv3_client_method();
|
||||
#endif
|
||||
break;
|
||||
default: /* Unsupported */
|
||||
printf("%s\n", _("CRITICAL - Unsupported SSL protocol version."));
|
||||
return STATE_CRITICAL;
|
||||
#endif
|
||||
case MP_TLSv1: /* TLSv1 protocol */
|
||||
#if defined(OPENSSL_NO_TLS1)
|
||||
printf("%s\n", _("UNKNOWN - TLS protocol version 1 is not supported by your SSL library."));
|
||||
return STATE_UNKNOWN;
|
||||
#else
|
||||
method = TLSv1_client_method();
|
||||
break;
|
||||
#endif
|
||||
case MP_TLSv1_1: /* TLSv1.1 protocol */
|
||||
#if !defined(SSL_OP_NO_TLSv1_1)
|
||||
printf("%s\n", _("UNKNOWN - TLS protocol version 1.1 is not supported by your SSL library."));
|
||||
return STATE_UNKNOWN;
|
||||
#else
|
||||
method = TLSv1_1_client_method();
|
||||
break;
|
||||
#endif
|
||||
case MP_TLSv1_2: /* TLSv1.2 protocol */
|
||||
#if !defined(SSL_OP_NO_TLSv1_2)
|
||||
printf("%s\n", _("UNKNOWN - TLS protocol version 1.2 is not supported by your SSL library."));
|
||||
return STATE_UNKNOWN;
|
||||
#else
|
||||
method = TLSv1_2_client_method();
|
||||
break;
|
||||
#endif
|
||||
case MP_TLSv1_2_OR_NEWER:
|
||||
#if !defined(SSL_OP_NO_TLSv1_1)
|
||||
printf("%s\n", _("UNKNOWN - Disabling TLSv1.1 is not supported by your SSL library."));
|
||||
return STATE_UNKNOWN;
|
||||
#else
|
||||
options |= SSL_OP_NO_TLSv1_1;
|
||||
#endif
|
||||
/* FALLTHROUGH */
|
||||
case MP_TLSv1_1_OR_NEWER:
|
||||
#if !defined(SSL_OP_NO_TLSv1)
|
||||
printf("%s\n", _("UNKNOWN - Disabling TLSv1 is not supported by your SSL library."));
|
||||
return STATE_UNKNOWN;
|
||||
#else
|
||||
options |= SSL_OP_NO_TLSv1;
|
||||
#endif
|
||||
/* FALLTHROUGH */
|
||||
case MP_TLSv1_OR_NEWER:
|
||||
#if defined(SSL_OP_NO_SSLv3)
|
||||
options |= SSL_OP_NO_SSLv3;
|
||||
#endif
|
||||
/* FALLTHROUGH */
|
||||
case MP_SSLv3_OR_NEWER:
|
||||
#if defined(SSL_OP_NO_SSLv2)
|
||||
options |= SSL_OP_NO_SSLv2;
|
||||
#endif
|
||||
case MP_SSLv2_OR_NEWER:
|
||||
/* FALLTHROUGH */
|
||||
default: /* Default to auto negotiation */
|
||||
method = SSLv23_client_method();
|
||||
}
|
||||
if (!initialized) {
|
||||
/* Initialize SSL context */
|
||||
|
@ -99,8 +144,9 @@ int np_net_ssl_init_with_hostname_version_and_cert(int sd, char *host_name, int
|
|||
#endif
|
||||
}
|
||||
#ifdef SSL_OP_NO_TICKET
|
||||
SSL_CTX_set_options(c, SSL_OP_NO_TICKET);
|
||||
options |= SSL_OP_NO_TICKET;
|
||||
#endif
|
||||
SSL_CTX_set_options(c, options);
|
||||
SSL_CTX_set_mode(c, SSL_MODE_AUTO_RETRY);
|
||||
if ((s = SSL_new(c)) != NULL) {
|
||||
#ifdef SSL_set_tlsext_host_name
|
||||
|
@ -149,7 +195,10 @@ int np_net_ssl_check_cert(int days_till_exp_warn, int days_till_exp_crit){
|
|||
# ifdef USE_OPENSSL
|
||||
X509 *certificate=NULL;
|
||||
X509_NAME *subj=NULL;
|
||||
char timestamp[50] = "";
|
||||
char cn[MAX_CN_LENGTH]= "";
|
||||
char *tz;
|
||||
|
||||
int cnlen =-1;
|
||||
int status=STATE_UNKNOWN;
|
||||
|
||||
|
@ -158,7 +207,7 @@ int np_net_ssl_check_cert(int days_till_exp_warn, int days_till_exp_crit){
|
|||
struct tm stamp;
|
||||
float time_left;
|
||||
int days_left;
|
||||
char timestamp[50] = "";
|
||||
int time_remaining;
|
||||
time_t tm_t;
|
||||
|
||||
certificate=SSL_get_peer_certificate(s);
|
||||
|
@ -212,32 +261,55 @@ int np_net_ssl_check_cert(int days_till_exp_warn, int days_till_exp_crit){
|
|||
(tm->data[6 + offset] - '0') * 10 + (tm->data[7 + offset] - '0');
|
||||
stamp.tm_min =
|
||||
(tm->data[8 + offset] - '0') * 10 + (tm->data[9 + offset] - '0');
|
||||
stamp.tm_sec = 0;
|
||||
stamp.tm_sec =
|
||||
(tm->data[10 + offset] - '0') * 10 + (tm->data[11 + offset] - '0');
|
||||
stamp.tm_isdst = -1;
|
||||
|
||||
time_left = difftime(timegm(&stamp), time(NULL));
|
||||
tm_t = timegm(&stamp);
|
||||
time_left = difftime(tm_t, time(NULL));
|
||||
days_left = time_left / 86400;
|
||||
tm_t = mktime (&stamp);
|
||||
strftime(timestamp, 50, "%c", localtime(&tm_t));
|
||||
tz = getenv("TZ");
|
||||
setenv("TZ", "GMT", 1);
|
||||
tzset();
|
||||
strftime(timestamp, 50, "%c %z", localtime(&tm_t));
|
||||
if (tz)
|
||||
setenv("TZ", tz, 1);
|
||||
else
|
||||
unsetenv("TZ");
|
||||
tzset();
|
||||
|
||||
if (days_left > 0 && days_left <= days_till_exp_warn) {
|
||||
printf (_("%s - Certificate '%s' expires in %d day(s) (%s).\n"), (days_left>days_till_exp_crit)?"WARNING":"CRITICAL", cn, days_left, timestamp);
|
||||
if (days_left > days_till_exp_crit)
|
||||
return STATE_WARNING;
|
||||
status = STATE_WARNING;
|
||||
else
|
||||
return STATE_CRITICAL;
|
||||
status = STATE_CRITICAL;
|
||||
} else if (days_left == 0 && time_left > 0) {
|
||||
if (time_left >= 3600)
|
||||
time_remaining = (int) time_left / 3600;
|
||||
else
|
||||
time_remaining = (int) time_left / 60;
|
||||
|
||||
printf (_("%s - Certificate '%s' expires in %u %s (%s)\n"),
|
||||
(days_left>days_till_exp_crit) ? "WARNING" : "CRITICAL", cn, time_remaining,
|
||||
time_left >= 3600 ? "hours" : "minutes", timestamp);
|
||||
|
||||
if ( days_left > days_till_exp_crit)
|
||||
status = STATE_WARNING;
|
||||
else
|
||||
status = STATE_CRITICAL;
|
||||
} else if (time_left < 0) {
|
||||
printf(_("CRITICAL - Certificate '%s' expired on %s.\n"), cn, timestamp);
|
||||
status=STATE_CRITICAL;
|
||||
} else if (days_left == 0) {
|
||||
printf (_("%s - Certificate '%s' expires today (%s).\n"), (days_left>days_till_exp_crit)?"WARNING":"CRITICAL", cn, timestamp);
|
||||
printf (_("%s - Certificate '%s' just expired (%s).\n"), (days_left>days_till_exp_crit)?"WARNING":"CRITICAL", cn, timestamp);
|
||||
if (days_left > days_till_exp_crit)
|
||||
return STATE_WARNING;
|
||||
status = STATE_WARNING;
|
||||
else
|
||||
return STATE_CRITICAL;
|
||||
status = STATE_CRITICAL;
|
||||
} else {
|
||||
printf(_("OK - Certificate '%s' will expire on %s.\n"), cn, timestamp);
|
||||
status=STATE_OK;
|
||||
status = STATE_OK;
|
||||
}
|
||||
X509_free(certificate);
|
||||
return status;
|
||||
|
|
|
@ -11,7 +11,7 @@
|
|||
'NP_HOST_NONRESPONSIVE' => '10.0.0.1',
|
||||
'NP_HOST_RESPONSIVE' => 'localhost',
|
||||
'NP_HOST_SMB' => '',
|
||||
'NP_HOST_SNMP' => '',
|
||||
'NP_HOST_SNMP' => 'localhost',
|
||||
'NP_HOST_TCP_FTP' => '',
|
||||
'NP_HOST_TCP_HPJD' => '',
|
||||
'NP_HOST_HPJD_PORT_INVALID' => '161',
|
||||
|
@ -19,12 +19,14 @@
|
|||
'NP_HOST_TCP_HTTP' => 'localhost',
|
||||
'NP_HOST_TCP_HTTP2' => 'test.monitoring-plugins.org',
|
||||
'NP_HOST_TCP_IMAP' => 'imap.web.de',
|
||||
'NP_HOST_TCP_LDAP' => 'localhost',
|
||||
'NP_HOST_TCP_POP' => 'pop.web.de',
|
||||
'NP_HOST_TCP_SMTP' => 'localhost',
|
||||
'NP_HOST_TCP_SMTP_NOTLS' => '',
|
||||
'NP_HOST_TCP_SMTP_TLS' => '',
|
||||
'NP_INTERNET_ACCESS' => 'yes',
|
||||
'NP_MOUNTPOINT2_VALID' => '',
|
||||
'NP_LDAP_BASE_DN' => 'cn=admin,dc=nodomain',
|
||||
'NP_MOUNTPOINT2_VALID' => '/media/ramdisk',
|
||||
'NP_MOUNTPOINT_VALID' => '/',
|
||||
'NP_MYSQL_SERVER' => 'localhost',
|
||||
'NP_HOST_UDP_TIME' => 'localhost',
|
||||
|
@ -37,7 +39,7 @@
|
|||
'NP_SMB_SHARE_SPC' => '',
|
||||
'NP_SMB_VALID_USER' => '',
|
||||
'NP_SMB_VALID_USER_PASS' => '',
|
||||
'NP_SNMP_COMMUNITY' => '',
|
||||
'NP_SNMP_COMMUNITY' => 'public',
|
||||
'NP_SSH_CONFIGFILE' => '~/.ssh/config',
|
||||
'NP_SSH_HOST' => 'localhost',
|
||||
'NP_SSH_IDENTITY' => '~/.ssh/id_dsa',
|
||||
|
|
|
@ -6,9 +6,10 @@
|
|||
|
||||
use strict;
|
||||
use Test::More;
|
||||
use POSIX qw/mktime strftime/;
|
||||
use NPTest;
|
||||
|
||||
plan tests => 30;
|
||||
plan tests => 49;
|
||||
|
||||
my $successOutput = '/OK.*HTTP.*second/';
|
||||
|
||||
|
@ -34,6 +35,8 @@ my $host_tcp_http2 = getTestParameter( "NP_HOST_TCP_HTTP2",
|
|||
"A host providing an index page containing the string 'monitoring'",
|
||||
"test.monitoring-plugins.org" );
|
||||
|
||||
my $faketime = -x '/usr/bin/faketime' ? 1 : 0;
|
||||
|
||||
|
||||
$res = NPTest->testCmd(
|
||||
"./check_http $host_tcp_http -wt 300 -ct 600"
|
||||
|
@ -47,10 +50,10 @@ $res = NPTest->testCmd(
|
|||
like( $res->output, '/bob:there\r\ncarl:frown\r\n/', "Got headers with multiple -k options" );
|
||||
|
||||
$res = NPTest->testCmd(
|
||||
"./check_http $host_nonresponsive -wt 1 -ct 2"
|
||||
"./check_http $host_nonresponsive -wt 1 -ct 2 -t 3"
|
||||
);
|
||||
cmp_ok( $res->return_code, '==', 2, "Webserver $host_nonresponsive not responding" );
|
||||
cmp_ok( $res->output, 'eq', "CRITICAL - Socket timeout after 10 seconds", "Output OK");
|
||||
cmp_ok( $res->output, 'eq', "CRITICAL - Socket timeout after 3 seconds", "Output OK");
|
||||
|
||||
$res = NPTest->testCmd(
|
||||
"./check_http $hostname_invalid -wt 1 -ct 2"
|
||||
|
@ -61,6 +64,32 @@ cmp_ok( $res->return_code, '==', 2, "Webserver $hostname_invalid not valid" );
|
|||
# Is also possible to get a socket timeout if DNS is not responding fast enough
|
||||
like( $res->output, "/Unable to open TCP socket|Socket timeout after/", "Output OK");
|
||||
|
||||
# host header checks
|
||||
$res = NPTest->testCmd("./check_http -v -H $host_tcp_http");
|
||||
like( $res->output, '/^Host: '.$host_tcp_http.'\s*$/ms', "Host Header OK" );
|
||||
|
||||
$res = NPTest->testCmd("./check_http -v -H $host_tcp_http -p 80");
|
||||
like( $res->output, '/^Host: '.$host_tcp_http.'\s*$/ms', "Host Header OK" );
|
||||
|
||||
$res = NPTest->testCmd("./check_http -v -H $host_tcp_http:8080 -p 80");
|
||||
like( $res->output, '/^Host: '.$host_tcp_http.':8080\s*$/ms', "Host Header OK" );
|
||||
|
||||
$res = NPTest->testCmd("./check_http -v -H $host_tcp_http:8080 -p 80");
|
||||
like( $res->output, '/^Host: '.$host_tcp_http.':8080\s*$/ms', "Host Header OK" );
|
||||
|
||||
SKIP: {
|
||||
skip "No internet access", 3 if $internet_access eq "no";
|
||||
|
||||
$res = NPTest->testCmd("./check_http -v -H www.verisign.com -S");
|
||||
like( $res->output, '/^Host: www.verisign.com\s*$/ms', "Host Header OK" );
|
||||
|
||||
$res = NPTest->testCmd("./check_http -v -H www.verisign.com:8080 -S -p 443");
|
||||
like( $res->output, '/^Host: www.verisign.com:8080\s*$/ms', "Host Header OK" );
|
||||
|
||||
$res = NPTest->testCmd("./check_http -v -H www.verisign.com:443 -S -p 443");
|
||||
like( $res->output, '/^Host: www.verisign.com\s*$/ms', "Host Header OK" );
|
||||
};
|
||||
|
||||
SKIP: {
|
||||
skip "No host serving monitoring in index file", 7 unless $host_tcp_http2;
|
||||
|
||||
|
@ -112,12 +141,46 @@ SKIP: {
|
|||
$res = NPTest->testCmd( "./check_http www.verisign.com -C 1" );
|
||||
cmp_ok( $res->output, 'eq', $saved_cert_output, "Old syntax for cert checking still works");
|
||||
|
||||
# run some certificate checks with faketime
|
||||
SKIP: {
|
||||
skip "No faketime binary found", 12 if !$faketime;
|
||||
$res = NPTest->testCmd("LC_TIME=C TZ=UTC ./check_http -C 1 www.verisign.com");
|
||||
like($res->output, qr/OK - Certificate 'www.verisign.com' will expire on/, "Catch cert output");
|
||||
is( $res->return_code, 0, "Catch cert output exit code" );
|
||||
my($mon,$day,$hour,$min,$sec,$year) = ($res->output =~ /(\w+)\s+(\d+)\s+(\d+):(\d+):(\d+)\s+(\d+)/);
|
||||
if(!defined $year) {
|
||||
die("parsing date failed from: ".$res->output);
|
||||
}
|
||||
my $months = {'Jan' => 0, 'Feb' => 1, 'Mar' => 2, 'Apr' => 3, 'May' => 4, 'Jun' => 5, 'Jul' => 6, 'Aug' => 7, 'Sep' => 8, 'Oct' => 9, 'Nov' => 10, 'Dec' => 11};
|
||||
my $ts = mktime($sec, $min, $hour, $day, $months->{$mon}, $year-1900);
|
||||
my $time = strftime("%Y-%m-%d %H:%M:%S", localtime($ts));
|
||||
$res = NPTest->testCmd("LC_TIME=C TZ=UTC faketime -f '".strftime("%Y-%m-%d %H:%M:%S", localtime($ts))."' ./check_http -C 1 www.verisign.com");
|
||||
like($res->output, qr/CRITICAL - Certificate 'www.verisign.com' just expired/, "Output on expire date");
|
||||
is( $res->return_code, 2, "Output on expire date" );
|
||||
|
||||
$res = NPTest->testCmd("LC_TIME=C TZ=UTC faketime -f '".strftime("%Y-%m-%d %H:%M:%S", localtime($ts-1))."' ./check_http -C 1 www.verisign.com");
|
||||
like($res->output, qr/CRITICAL - Certificate 'www.verisign.com' expires in 0 minutes/, "cert expires in 1 second output");
|
||||
is( $res->return_code, 2, "cert expires in 1 second exit code" );
|
||||
|
||||
$res = NPTest->testCmd("LC_TIME=C TZ=UTC faketime -f '".strftime("%Y-%m-%d %H:%M:%S", localtime($ts-120))."' ./check_http -C 1 www.verisign.com");
|
||||
like($res->output, qr/CRITICAL - Certificate 'www.verisign.com' expires in 2 minutes/, "cert expires in 2 minutes output");
|
||||
is( $res->return_code, 2, "cert expires in 2 minutes exit code" );
|
||||
|
||||
$res = NPTest->testCmd("LC_TIME=C TZ=UTC faketime -f '".strftime("%Y-%m-%d %H:%M:%S", localtime($ts-7200))."' ./check_http -C 1 www.verisign.com");
|
||||
like($res->output, qr/CRITICAL - Certificate 'www.verisign.com' expires in 2 hours/, "cert expires in 2 hours output");
|
||||
is( $res->return_code, 2, "cert expires in 2 hours exit code" );
|
||||
|
||||
$res = NPTest->testCmd("LC_TIME=C TZ=UTC faketime -f '".strftime("%Y-%m-%d %H:%M:%S", localtime($ts+1))."' ./check_http -C 1 www.verisign.com");
|
||||
like($res->output, qr/CRITICAL - Certificate 'www.verisign.com' expired on/, "Certificate expired output");
|
||||
is( $res->return_code, 2, "Certificate expired exit code" );
|
||||
};
|
||||
|
||||
$res = NPTest->testCmd( "./check_http --ssl www.verisign.com -E" );
|
||||
like ( $res->output, '/time_connect=[\d\.]+/', 'Extended Performance Data Output OK' );
|
||||
like ( $res->output, '/time_ssl=[\d\.]+/', 'Extended Performance Data SSL Output OK' );
|
||||
|
||||
$res = NPTest->testCmd(
|
||||
"./check_http --ssl www.e-paycobalt.com"
|
||||
"./check_http --ssl -H www.e-paycobalt.com"
|
||||
);
|
||||
cmp_ok( $res->return_code, "==", 0, "Can read https for www.e-paycobalt.com (uses AES certificate)" );
|
||||
|
||||
|
|
80
plugins/t/check_ldap.t
Normal file
80
plugins/t/check_ldap.t
Normal file
|
@ -0,0 +1,80 @@
|
|||
#!/usr/bin/env perl -I ..
|
||||
#
|
||||
# Lightweight Directory Access Protocol (LDAP) Test via check_ldap
|
||||
#
|
||||
#
|
||||
|
||||
use strict;
|
||||
use warnings;
|
||||
use Test::More;
|
||||
use NPTest;
|
||||
|
||||
my $host_tcp_ldap = getTestParameter("NP_HOST_TCP_LDAP",
|
||||
"A host providing the LDAP Service",
|
||||
"localhost" );
|
||||
|
||||
my $ldap_base_dn = getTestParameter("NP_LDAP_BASE_DN",
|
||||
"A base dn for the LDAP Service",
|
||||
"cn=admin" );
|
||||
|
||||
my $host_nonresponsive = getTestParameter("host_nonresponsive", "NP_HOST_NONRESPONSIVE", "10.0.0.1",
|
||||
"The hostname of system not responsive to network requests" );
|
||||
|
||||
my $hostname_invalid = getTestParameter("hostname_invalid", "NP_HOSTNAME_INVALID", "nosuchhost",
|
||||
"An invalid (not known to DNS) hostname" );
|
||||
|
||||
my($result, $cmd);
|
||||
my $command = './check_ldap';
|
||||
|
||||
plan tests => 16;
|
||||
|
||||
SKIP: {
|
||||
skip "NP_HOST_NONRESPONSIVE not set", 2 if ! $host_nonresponsive;
|
||||
|
||||
$result = NPTest->testCmd("$command -H $host_nonresponsive -b ou=blah -t 2 -w 1 -c 1");
|
||||
is( $result->return_code, 2, "$command -H $host_nonresponsive -b ou=blah -t 5 -w 2 -c 3" );
|
||||
is( $result->output, 'CRITICAL - Socket timeout after 2 seconds', "output ok" );
|
||||
};
|
||||
|
||||
SKIP: {
|
||||
skip "NP_HOSTNAME_INVALID not set", 2 if ! $hostname_invalid;
|
||||
|
||||
$result = NPTest->testCmd("$command -H $hostname_invalid -b ou=blah -t 5");
|
||||
is( $result->return_code, 2, "$command -H $hostname_invalid -b ou=blah -t 5" );
|
||||
is( $result->output, 'Could not bind to the LDAP server', "output ok" );
|
||||
};
|
||||
|
||||
SKIP: {
|
||||
skip "NP_HOST_TCP_LDAP not set", 12 if ! $host_tcp_ldap;
|
||||
skip "NP_LDAP_BASE_DN not set", 12 if ! $ldap_base_dn;
|
||||
|
||||
$cmd = "$command -H $host_tcp_ldap -b $ldap_base_dn -t 5 -w 2 -c 3 -3";
|
||||
$result = NPTest->testCmd($cmd);
|
||||
is( $result->return_code, 0, $cmd );
|
||||
like( $result->output, '/^LDAP OK - \d+.\d+ seconds response time\|time=\d+\.\d+s;2\.0+;3\.0+;0\.0+$/', "output ok" );
|
||||
|
||||
$cmd = "$command -H $host_tcp_ldap -b $ldap_base_dn -t 5 -w 2 -c 3 -3 -W 10000000 -C 10000001";
|
||||
$result = NPTest->testCmd($cmd);
|
||||
is( $result->return_code, 0, $cmd );
|
||||
like( $result->output, '/^LDAP OK - found \d+ entries in \d+\.\d+ seconds\|time=\d\.\d+s;2\.0+;3\.0+;0\.0+ entries=\d+\.0+;10000000;10000001;0\.0+$/', "output ok" );
|
||||
|
||||
$cmd = "$command -H $host_tcp_ldap -b $ldap_base_dn -t 5 -w 2 -c 3 -3 -W 10000000: -C 10000001:";
|
||||
$result = NPTest->testCmd($cmd);
|
||||
is( $result->return_code, 2, $cmd );
|
||||
like( $result->output, '/^LDAP CRITICAL - found \d+ entries in \d+\.\d+ seconds\|time=\d\.\d+s;2\.0+;3\.0+;0\.0+ entries=\d+\.0+;10000000:;10000001:;0\.0+$/', "output ok" );
|
||||
|
||||
$cmd = "$command -H $host_tcp_ldap -b $ldap_base_dn -t 5 -w 2 -c 3 -3 -W 0 -C 0";
|
||||
$result = NPTest->testCmd($cmd);
|
||||
is( $result->return_code, 2, $cmd );
|
||||
like( $result->output, '/^LDAP CRITICAL - found \d+ entries in \d+\.\d+ seconds\|time=\d\.\d+s;2\.0+;3\.0+;0\.0+ entries=\d+\.0+;0;0;0\.0+$/', "output ok" );
|
||||
|
||||
$cmd = "$command -H $host_tcp_ldap -b $ldap_base_dn -t 5 -w 2 -c 3 -3 -W 10000000: -C 10000001";
|
||||
$result = NPTest->testCmd($cmd);
|
||||
is( $result->return_code, 1, $cmd );
|
||||
like( $result->output, '/^LDAP WARNING - found \d+ entries in \d+\.\d+ seconds\|time=\d\.\d+s;2\.0+;3\.0+;0\.0+ entries=\d+\.0+;10000000:;10000001;0\.0+$/', "output ok" );
|
||||
|
||||
$cmd = "$command -H $host_tcp_ldap -b $ldap_base_dn -t 5 -w 2 -c 3 -3 -C 10000001";
|
||||
$result = NPTest->testCmd($cmd);
|
||||
is( $result->return_code, 0, $cmd );
|
||||
like( $result->output, '/^LDAP OK - found \d+ entries in \d+\.\d+ seconds\|time=\d\.\d+s;2\.0+;3\.0+;0\.0+ entries=\d+\.0+;;10000001;0\.0+$/', "output ok" );
|
||||
};
|
|
@ -10,7 +10,7 @@ use NPTest;
|
|||
|
||||
BEGIN {
|
||||
plan skip_all => 'check_snmp is not compiled' unless -x "./check_snmp";
|
||||
plan tests => 61;
|
||||
plan tests => 63;
|
||||
}
|
||||
|
||||
my $res;
|
||||
|
@ -45,7 +45,7 @@ is( $res->return_code, 3, "Invalid protocol" );
|
|||
like( $res->output, "/check_snmp: Invalid SNMP version - 3c/" );
|
||||
|
||||
SKIP: {
|
||||
skip "no snmp host defined", 48 if ( ! $host_snmp );
|
||||
skip "no snmp host defined", 50 if ( ! $host_snmp );
|
||||
|
||||
$res = NPTest->testCmd( "./check_snmp -H $host_snmp -C $snmp_community -o system.sysUpTime.0 -w 1: -c 1:");
|
||||
cmp_ok( $res->return_code, '==', 0, "Exit OK when querying uptime" );
|
||||
|
@ -153,6 +153,10 @@ SKIP: {
|
|||
$res = NPTest->testCmd( "./check_snmp -H $host_snmp -C $snmp_community -o system.sysUpTime.0");
|
||||
cmp_ok( $res->return_code, '==', 0, "Timetick used as a string");
|
||||
like($res->output, '/^SNMP OK - Timeticks:\s\(\d+\)\s+(?:\d+ days?,\s+)?\d+:\d+:\d+\.\d+\s.*$/', "Timetick used as a string, result printed rather than parsed");
|
||||
|
||||
$res = NPTest->testCmd( "./check_snmp -H $host_snmp -C $snmp_community -o HOST-RESOURCES-MIB::hrSWRunParameters.1");
|
||||
cmp_ok( $res->return_code, '==', 0, "Timetick used as a string");
|
||||
is( $res->output, 'SNMP OK - "" | ', "snmp response without datatype" );
|
||||
}
|
||||
|
||||
SKIP: {
|
||||
|
|
|
@ -13,7 +13,7 @@ use Test;
|
|||
use NPTest;
|
||||
|
||||
use vars qw($tests);
|
||||
BEGIN {$tests = 4; plan tests => $tests}
|
||||
BEGIN {$tests = 8; plan tests => $tests}
|
||||
|
||||
my $successOutput = '/^USERS OK - [0-9]+ users currently logged in/';
|
||||
my $failureOutput = '/^USERS CRITICAL - [0-9]+ users currently logged in/';
|
||||
|
@ -22,6 +22,8 @@ my $t;
|
|||
|
||||
$t += checkCmd( "./check_users 1000 1000", 0, $successOutput );
|
||||
$t += checkCmd( "./check_users 0 0", 2, $failureOutput );
|
||||
$t += checkCmd( "./check_users -w 0:1000 -c 0:1000", 0, $successOutput );
|
||||
$t += checkCmd( "./check_users -w 0:0 -c 0:0", 2, $failureOutput );
|
||||
|
||||
exit(0) if defined($Test::Harness::VERSION);
|
||||
exit($tests - $t);
|
||||
|
|
|
@ -17,6 +17,8 @@ use Test::More;
|
|||
use NPTest;
|
||||
use FindBin qw($Bin);
|
||||
|
||||
$ENV{'LC_TIME'} = "C";
|
||||
|
||||
my $common_tests = 70;
|
||||
my $ssl_only_tests = 8;
|
||||
# Check that all dependent modules are available
|
||||
|
@ -186,21 +188,21 @@ SKIP: {
|
|||
|
||||
$result = NPTest->testCmd( "$command -p $port_https -S -C 14" );
|
||||
is( $result->return_code, 0, "$command -p $port_https -S -C 14" );
|
||||
is( $result->output, 'OK - Certificate \'Ton Voon\' will expire on Sun Mar 3 21:41:00 2019.', "output ok" );
|
||||
is( $result->output, 'OK - Certificate \'Ton Voon\' will expire on Sun Mar 3 21:41:28 2019 +0000.', "output ok" );
|
||||
|
||||
$result = NPTest->testCmd( "$command -p $port_https -S -C 14000" );
|
||||
is( $result->return_code, 1, "$command -p $port_https -S -C 14000" );
|
||||
like( $result->output, '/WARNING - Certificate \'Ton Voon\' expires in \d+ day\(s\) \(Sun Mar 3 21:41:00 2019\)./', "output ok" );
|
||||
like( $result->output, '/WARNING - Certificate \'Ton Voon\' expires in \d+ day\(s\) \(Sun Mar 3 21:41:28 2019 \+0000\)./', "output ok" );
|
||||
|
||||
# Expired cert tests
|
||||
$result = NPTest->testCmd( "$command -p $port_https -S -C 13960,14000" );
|
||||
is( $result->return_code, 2, "$command -p $port_https -S -C 13960,14000" );
|
||||
like( $result->output, '/CRITICAL - Certificate \'Ton Voon\' expires in \d+ day\(s\) \(Sun Mar 3 21:41:00 2019\)./', "output ok" );
|
||||
like( $result->output, '/CRITICAL - Certificate \'Ton Voon\' expires in \d+ day\(s\) \(Sun Mar 3 21:41:28 2019 \+0000\)./', "output ok" );
|
||||
|
||||
$result = NPTest->testCmd( "$command -p $port_https_expired -S -C 7" );
|
||||
is( $result->return_code, 2, "$command -p $port_https_expired -S -C 7" );
|
||||
is( $result->output,
|
||||
'CRITICAL - Certificate \'Ton Voon\' expired on Thu Mar 5 00:13:00 2009.',
|
||||
'CRITICAL - Certificate \'Ton Voon\' expired on Thu Mar 5 00:13:16 2009 +0000.',
|
||||
"output ok" );
|
||||
|
||||
}
|
||||
|
|
|
@ -128,7 +128,7 @@ sleep 1;
|
|||
|
||||
$res = NPTest->testCmd( "./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.10 --rate -w 600" );
|
||||
is($res->return_code, 1, "WARNING - due to going above rate calculation" );
|
||||
is($res->output, "SNMP RATE WARNING - *666* | iso.3.6.1.4.1.8072.3.2.67.10=666 ");
|
||||
is($res->output, "SNMP RATE WARNING - *666* | iso.3.6.1.4.1.8072.3.2.67.10=666;600 ");
|
||||
|
||||
$res = NPTest->testCmd( "./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.10 --rate -w 600" );
|
||||
is($res->return_code, 3, "UNKNOWN - basically the divide by zero error" );
|
||||
|
@ -209,7 +209,7 @@ is($res->output, 'SNMP OK - "stringtests" | ', "OK as inverted string no match"
|
|||
|
||||
$res = NPTest->testCmd( "./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.12 -w 4:5" );
|
||||
is($res->return_code, 1, "Numeric in string test" );
|
||||
is($res->output, 'SNMP WARNING - *3.5* | iso.3.6.1.4.1.8072.3.2.67.12=3.5 ', "WARNING threshold checks for string masquerading as number" );
|
||||
is($res->output, 'SNMP WARNING - *3.5* | iso.3.6.1.4.1.8072.3.2.67.12=3.5;4:5 ', "WARNING threshold checks for string masquerading as number" );
|
||||
|
||||
$res = NPTest->testCmd( "./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.13" );
|
||||
is($res->return_code, 0, "Not really numeric test" );
|
||||
|
@ -225,29 +225,29 @@ is($res->output, 'SNMP OK - "CUSTOM CHECK OK: foo is 12345" | ', "String check w
|
|||
|
||||
$res = NPTest->testCmd( "./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.16 -w -2: -c -3:" );
|
||||
is($res->return_code, 0, "Negative integer check OK" );
|
||||
is($res->output, 'SNMP OK - -2 | iso.3.6.1.4.1.8072.3.2.67.16=-2 ', "Negative integer check OK output" );
|
||||
is($res->output, 'SNMP OK - -2 | iso.3.6.1.4.1.8072.3.2.67.16=-2;-2:;-3: ', "Negative integer check OK output" );
|
||||
|
||||
$res = NPTest->testCmd( "./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.16 -w -2: -c -3:" );
|
||||
is($res->return_code, 1, "Negative integer check WARNING" );
|
||||
is($res->output, 'SNMP WARNING - *-3* | iso.3.6.1.4.1.8072.3.2.67.16=-3 ', "Negative integer check WARNING output" );
|
||||
is($res->output, 'SNMP WARNING - *-3* | iso.3.6.1.4.1.8072.3.2.67.16=-3;-2:;-3: ', "Negative integer check WARNING output" );
|
||||
|
||||
$res = NPTest->testCmd( "./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.16 -w -2: -c -3:" );
|
||||
is($res->return_code, 2, "Negative integer check CRITICAL" );
|
||||
is($res->output, 'SNMP CRITICAL - *-4* | iso.3.6.1.4.1.8072.3.2.67.16=-4 ', "Negative integer check CRITICAL output" );
|
||||
is($res->output, 'SNMP CRITICAL - *-4* | iso.3.6.1.4.1.8072.3.2.67.16=-4;-2:;-3: ', "Negative integer check CRITICAL output" );
|
||||
|
||||
$res = NPTest->testCmd( "./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.17 -w -3: -c -6:" );
|
||||
is($res->return_code, 1, "Negative integer as string, WARNING" );
|
||||
is($res->output, 'SNMP WARNING - *-4* | iso.3.6.1.4.1.8072.3.2.67.17=-4 ', "Negative integer as string, WARNING output" );
|
||||
is($res->output, 'SNMP WARNING - *-4* | iso.3.6.1.4.1.8072.3.2.67.17=-4;-3:;-6: ', "Negative integer as string, WARNING output" );
|
||||
|
||||
$res = NPTest->testCmd( "./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.17 -w -2: -c -3:" );
|
||||
is($res->return_code, 2, "Negative integer as string, CRITICAL" );
|
||||
is($res->output, 'SNMP CRITICAL - *-4* | iso.3.6.1.4.1.8072.3.2.67.17=-4 ', "Negative integer as string, CRITICAL output" );
|
||||
is($res->output, 'SNMP CRITICAL - *-4* | iso.3.6.1.4.1.8072.3.2.67.17=-4;-2:;-3: ', "Negative integer as string, CRITICAL output" );
|
||||
|
||||
$res = NPTest->testCmd( "./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.18 -c ~:-6.5" );
|
||||
$res = NPTest->testCmd( "./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.18 -c '~:-6.5'" );
|
||||
is($res->return_code, 0, "Negative float OK" );
|
||||
is($res->output, 'SNMP OK - -6.6 | iso.3.6.1.4.1.8072.3.2.67.18=-6.6 ', "Negative float OK output" );
|
||||
is($res->output, 'SNMP OK - -6.6 | iso.3.6.1.4.1.8072.3.2.67.18=-6.6;;~:-6.5 ', "Negative float OK output" );
|
||||
|
||||
$res = NPTest->testCmd( "./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.18 -w ~:-6.65 -c ~:-6.55" );
|
||||
$res = NPTest->testCmd( "./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.18 -w '~:-6.65' -c '~:-6.55'" );
|
||||
is($res->return_code, 1, "Negative float WARNING" );
|
||||
is($res->output, 'SNMP WARNING - *-6.6* | iso.3.6.1.4.1.8072.3.2.67.18=-6.6 ', "Negative float WARNING output" );
|
||||
is($res->output, 'SNMP WARNING - *-6.6* | iso.3.6.1.4.1.8072.3.2.67.18=-6.6;~:-6.65;~:-6.55 ', "Negative float WARNING output" );
|
||||
|
||||
|
|
|
@ -144,8 +144,6 @@ usage5 (void)
|
|||
void
|
||||
print_revision (const char *command_name, const char *revision)
|
||||
{
|
||||
char plugin_revision[STRLEN];
|
||||
|
||||
printf ("%s v%s (%s %s)\n",
|
||||
command_name, revision, PACKAGE, VERSION);
|
||||
}
|
||||
|
@ -630,3 +628,84 @@ char *fperfdata (const char *label,
|
|||
|
||||
return data;
|
||||
}
|
||||
|
||||
char *sperfdata (const char *label,
|
||||
double val,
|
||||
const char *uom,
|
||||
char *warn,
|
||||
char *crit,
|
||||
int minp,
|
||||
double minv,
|
||||
int maxp,
|
||||
double maxv)
|
||||
{
|
||||
char *data = NULL;
|
||||
if (strpbrk (label, "'= "))
|
||||
xasprintf (&data, "'%s'=", label);
|
||||
else
|
||||
xasprintf (&data, "%s=", label);
|
||||
|
||||
xasprintf (&data, "%s%f", data, val);
|
||||
xasprintf (&data, "%s%s;", data, uom);
|
||||
|
||||
if (warn!=NULL)
|
||||
xasprintf (&data, "%s%s", data, warn);
|
||||
|
||||
xasprintf (&data, "%s;", data);
|
||||
|
||||
if (crit!=NULL)
|
||||
xasprintf (&data, "%s%s", data, crit);
|
||||
|
||||
xasprintf (&data, "%s;", data);
|
||||
|
||||
if (minp)
|
||||
xasprintf (&data, "%s%f", data, minv);
|
||||
|
||||
if (maxp) {
|
||||
xasprintf (&data, "%s;", data);
|
||||
xasprintf (&data, "%s%f", data, maxv);
|
||||
}
|
||||
|
||||
return data;
|
||||
}
|
||||
|
||||
char *sperfdata_int (const char *label,
|
||||
int val,
|
||||
const char *uom,
|
||||
char *warn,
|
||||
char *crit,
|
||||
int minp,
|
||||
int minv,
|
||||
int maxp,
|
||||
int maxv)
|
||||
{
|
||||
char *data = NULL;
|
||||
if (strpbrk (label, "'= "))
|
||||
xasprintf (&data, "'%s'=", label);
|
||||
else
|
||||
xasprintf (&data, "%s=", label);
|
||||
|
||||
xasprintf (&data, "%s%d", data, val);
|
||||
xasprintf (&data, "%s%s;", data, uom);
|
||||
|
||||
if (warn!=NULL)
|
||||
xasprintf (&data, "%s%s", data, warn);
|
||||
|
||||
xasprintf (&data, "%s;", data);
|
||||
|
||||
if (crit!=NULL)
|
||||
xasprintf (&data, "%s%s", data, crit);
|
||||
|
||||
xasprintf (&data, "%s;", data);
|
||||
|
||||
if (minp)
|
||||
xasprintf (&data, "%s%d", data, minv);
|
||||
|
||||
if (maxp) {
|
||||
xasprintf (&data, "%s;", data);
|
||||
xasprintf (&data, "%s%d", data, maxv);
|
||||
}
|
||||
|
||||
return data;
|
||||
}
|
||||
|
||||
|
|
|
@ -94,29 +94,17 @@ const char *state_text (int);
|
|||
#define max(a,b) (((a)>(b))?(a):(b))
|
||||
#define min(a,b) (((a)<(b))?(a):(b))
|
||||
|
||||
char *perfdata (const char *,
|
||||
long int,
|
||||
const char *,
|
||||
int,
|
||||
long int,
|
||||
int,
|
||||
long int,
|
||||
int,
|
||||
long int,
|
||||
int,
|
||||
long int);
|
||||
char *perfdata (const char *, long int, const char *, int, long int,
|
||||
int, long int, int, long int, int, long int);
|
||||
|
||||
char *fperfdata (const char *,
|
||||
double,
|
||||
const char *,
|
||||
int,
|
||||
double,
|
||||
int,
|
||||
double,
|
||||
int,
|
||||
double,
|
||||
int,
|
||||
double);
|
||||
char *fperfdata (const char *, double, const char *, int, double,
|
||||
int, double, int, double, int, double);
|
||||
|
||||
char *sperfdata (const char *, double, const char *, char *, char *,
|
||||
int, double, int, double);
|
||||
|
||||
char *sperfdata_int (const char *, int, const char *, char *, char *,
|
||||
int, int, int, int);
|
||||
|
||||
/* The idea here is that, although not every plugin will use all of these,
|
||||
most will or should. Therefore, for consistency, these very common
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue