diff options
| author | RincewindsHat <12514511+RincewindsHat@users.noreply.github.com> | 2024-10-31 14:02:13 +0100 | 
|---|---|---|
| committer | RincewindsHat <12514511+RincewindsHat@users.noreply.github.com> | 2024-10-31 14:02:13 +0100 | 
| commit | 0be4dede6e546234684b807618d930c1aa50fe31 (patch) | |
| tree | b78129f188909795181bb8638d525fc082a493c4 /plugins | |
| parent | b6d920da5576b712fe998abc04dbf4cb23245106 (diff) | |
| download | monitoring-plugins-0be4dede6e546234684b807618d930c1aa50fe31.tar.gz | |
check_tcp: clang-format
Diffstat (limited to 'plugins')
| -rw-r--r-- | plugins/check_tcp.c | 556 | 
1 files changed, 261 insertions, 295 deletions
| diff --git a/plugins/check_tcp.c b/plugins/check_tcp.c index 01dd35eb..78dcbd43 100644 --- a/plugins/check_tcp.c +++ b/plugins/check_tcp.c | |||
| @@ -1,31 +1,31 @@ | |||
| 1 | /***************************************************************************** | 1 | /***************************************************************************** | 
| 2 | * | 2 | * | 
| 3 | * Monitoring check_tcp plugin | 3 | * Monitoring check_tcp plugin | 
| 4 | * | 4 | * | 
| 5 | * License: GPL | 5 | * License: GPL | 
| 6 | * Copyright (c) 1999-2013 Monitoring Plugins Development Team | 6 | * Copyright (c) 1999-2013 Monitoring Plugins Development Team | 
| 7 | * | 7 | * | 
| 8 | * Description: | 8 | * Description: | 
| 9 | * | 9 | * | 
| 10 | * This file contains the check_tcp plugin | 10 | * This file contains the check_tcp plugin | 
| 11 | * | 11 | * | 
| 12 | * | 12 | * | 
| 13 | * This program is free software: you can redistribute it and/or modify | 13 | * This program is free software: you can redistribute it and/or modify | 
| 14 | * it under the terms of the GNU General Public License as published by | 14 | * it under the terms of the GNU General Public License as published by | 
| 15 | * the Free Software Foundation, either version 3 of the License, or | 15 | * the Free Software Foundation, either version 3 of the License, or | 
| 16 | * (at your option) any later version. | 16 | * (at your option) any later version. | 
| 17 | * | 17 | * | 
| 18 | * This program is distributed in the hope that it will be useful, | 18 | * This program is distributed in the hope that it will be useful, | 
| 19 | * but WITHOUT ANY WARRANTY; without even the implied warranty of | 19 | * but WITHOUT ANY WARRANTY; without even the implied warranty of | 
| 20 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | 20 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | 
| 21 | * GNU General Public License for more details. | 21 | * GNU General Public License for more details. | 
| 22 | * | 22 | * | 
| 23 | * You should have received a copy of the GNU General Public License | 23 | * You should have received a copy of the GNU General Public License | 
| 24 | * along with this program. If not, see <http://www.gnu.org/licenses/>. | 24 | * along with this program. If not, see <http://www.gnu.org/licenses/>. | 
| 25 | * | 25 | * | 
| 26 | * $Id$ | 26 | * $Id$ | 
| 27 | * | 27 | * | 
| 28 | *****************************************************************************/ | 28 | *****************************************************************************/ | 
| 29 | 29 | ||
| 30 | /* progname "check_tcp" changes depending on symlink called */ | 30 | /* progname "check_tcp" changes depending on symlink called */ | 
| 31 | char *progname; | 31 | char *progname; | 
| @@ -43,17 +43,17 @@ const char *email = "devel@monitoring-plugins.org"; | |||
| 43 | #ifdef HAVE_SSL | 43 | #ifdef HAVE_SSL | 
| 44 | static bool check_cert = false; | 44 | static bool check_cert = false; | 
| 45 | static int days_till_exp_warn, days_till_exp_crit; | 45 | static int days_till_exp_warn, days_till_exp_crit; | 
| 46 | # define my_recv(buf, len) ((flags & FLAG_SSL) ? np_net_ssl_read(buf, len) : read(sd, buf, len)) | 46 | # define my_recv(buf, len) ((flags & FLAG_SSL) ? np_net_ssl_read(buf, len) : read(sd, buf, len)) | 
| 47 | # define my_send(buf, len) ((flags & FLAG_SSL) ? np_net_ssl_write(buf, len) : send(sd, buf, len, 0)) | 47 | # define my_send(buf, len) ((flags & FLAG_SSL) ? np_net_ssl_write(buf, len) : send(sd, buf, len, 0)) | 
| 48 | #else | 48 | #else | 
| 49 | # define my_recv(buf, len) read(sd, buf, len) | 49 | # define my_recv(buf, len) read(sd, buf, len) | 
| 50 | # define my_send(buf, len) send(sd, buf, len, 0) | 50 | # define my_send(buf, len) send(sd, buf, len, 0) | 
| 51 | #endif | 51 | #endif | 
| 52 | 52 | ||
| 53 | /* int my_recv(char *, size_t); */ | 53 | /* int my_recv(char *, size_t); */ | 
| 54 | static int process_arguments (int, char **); | 54 | static int process_arguments(int, char **); | 
| 55 | void print_help (void); | 55 | void print_help(void); | 
| 56 | void print_usage (void); | 56 | void print_usage(void); | 
| 57 | 57 | ||
| 58 | #define EXPECT server_expect[0] | 58 | #define EXPECT server_expect[0] | 
| 59 | static char *SERVICE = "TCP"; | 59 | static char *SERVICE = "TCP"; | 
| @@ -91,16 +91,14 @@ static char *sni = NULL; | |||
| 91 | static bool sni_specified = false; | 91 | static bool sni_specified = false; | 
| 92 | #endif | 92 | #endif | 
| 93 | 93 | ||
| 94 | #define FLAG_SSL 0x01 | 94 | #define FLAG_SSL 0x01 | 
| 95 | #define FLAG_VERBOSE 0x02 | 95 | #define FLAG_VERBOSE 0x02 | 
| 96 | #define FLAG_TIME_WARN 0x04 | 96 | #define FLAG_TIME_WARN 0x04 | 
| 97 | #define FLAG_TIME_CRIT 0x08 | 97 | #define FLAG_TIME_CRIT 0x08 | 
| 98 | #define FLAG_HIDE_OUTPUT 0x10 | 98 | #define FLAG_HIDE_OUTPUT 0x10 | 
| 99 | static size_t flags; | 99 | static size_t flags; | 
| 100 | 100 | ||
| 101 | int | 101 | int main(int argc, char **argv) { | 
| 102 | main (int argc, char **argv) | ||
| 103 | { | ||
| 104 | int result = STATE_UNKNOWN; | 102 | int result = STATE_UNKNOWN; | 
| 105 | char *status = NULL; | 103 | char *status = NULL; | 
| 106 | struct timeval tv; | 104 | struct timeval tv; | 
| @@ -110,19 +108,21 @@ main (int argc, char **argv) | |||
| 110 | 108 | ||
| 111 | FD_ZERO(&rfds); | 109 | FD_ZERO(&rfds); | 
| 112 | 110 | ||
| 113 | setlocale (LC_ALL, ""); | 111 | setlocale(LC_ALL, ""); | 
| 114 | bindtextdomain (PACKAGE, LOCALEDIR); | 112 | bindtextdomain(PACKAGE, LOCALEDIR); | 
| 115 | textdomain (PACKAGE); | 113 | textdomain(PACKAGE); | 
| 116 | 114 | ||
| 117 | /* determine program- and service-name quickly */ | 115 | /* determine program- and service-name quickly */ | 
| 118 | progname = strrchr(argv[0], '/'); | 116 | progname = strrchr(argv[0], '/'); | 
| 119 | if(progname != NULL) progname++; | 117 | if (progname != NULL) | 
| 120 | else progname = argv[0]; | 118 | progname++; | 
| 119 | else | ||
| 120 | progname = argv[0]; | ||
| 121 | 121 | ||
| 122 | size_t prog_name_len = strlen(progname); | 122 | size_t prog_name_len = strlen(progname); | 
| 123 | if(prog_name_len > 6 && !memcmp(progname, "check_", 6)) { | 123 | if (prog_name_len > 6 && !memcmp(progname, "check_", 6)) { | 
| 124 | SERVICE = strdup(progname + 6); | 124 | SERVICE = strdup(progname + 6); | 
| 125 | for(size_t i = 0; i < prog_name_len - 6; i++) | 125 | for (size_t i = 0; i < prog_name_len - 6; i++) | 
| 126 | SERVICE[i] = toupper(SERVICE[i]); | 126 | SERVICE[i] = toupper(SERVICE[i]); | 
| 127 | } | 127 | } | 
| 128 | 128 | ||
| @@ -133,23 +133,19 @@ main (int argc, char **argv) | |||
| 133 | /* determine defaults for this service's protocol */ | 133 | /* determine defaults for this service's protocol */ | 
| 134 | if (!strncmp(SERVICE, "UDP", 3)) { | 134 | if (!strncmp(SERVICE, "UDP", 3)) { | 
| 135 | PROTOCOL = IPPROTO_UDP; | 135 | PROTOCOL = IPPROTO_UDP; | 
| 136 | } | 136 | } else if (!strncmp(SERVICE, "FTP", 3)) { | 
| 137 | else if (!strncmp(SERVICE, "FTP", 3)) { | ||
| 138 | EXPECT = "220"; | 137 | EXPECT = "220"; | 
| 139 | QUIT = "QUIT\r\n"; | 138 | QUIT = "QUIT\r\n"; | 
| 140 | PORT = 21; | 139 | PORT = 21; | 
| 141 | } | 140 | } else if (!strncmp(SERVICE, "POP", 3) || !strncmp(SERVICE, "POP3", 4)) { | 
| 142 | else if (!strncmp(SERVICE, "POP", 3) || !strncmp(SERVICE, "POP3", 4)) { | ||
| 143 | EXPECT = "+OK"; | 141 | EXPECT = "+OK"; | 
| 144 | QUIT = "QUIT\r\n"; | 142 | QUIT = "QUIT\r\n"; | 
| 145 | PORT = 110; | 143 | PORT = 110; | 
| 146 | } | 144 | } else if (!strncmp(SERVICE, "SMTP", 4)) { | 
| 147 | else if (!strncmp(SERVICE, "SMTP", 4)) { | ||
| 148 | EXPECT = "220"; | 145 | EXPECT = "220"; | 
| 149 | QUIT = "QUIT\r\n"; | 146 | QUIT = "QUIT\r\n"; | 
| 150 | PORT = 25; | 147 | PORT = 25; | 
| 151 | } | 148 | } else if (!strncmp(SERVICE, "IMAP", 4)) { | 
| 152 | else if (!strncmp(SERVICE, "IMAP", 4)) { | ||
| 153 | EXPECT = "* OK"; | 149 | EXPECT = "* OK"; | 
| 154 | QUIT = "a1 LOGOUT\r\n"; | 150 | QUIT = "a1 LOGOUT\r\n"; | 
| 155 | PORT = 143; | 151 | PORT = 143; | 
| @@ -160,27 +156,23 @@ main (int argc, char **argv) | |||
| 160 | QUIT = "a1 LOGOUT\r\n"; | 156 | QUIT = "a1 LOGOUT\r\n"; | 
| 161 | flags |= FLAG_SSL; | 157 | flags |= FLAG_SSL; | 
| 162 | PORT = 993; | 158 | PORT = 993; | 
| 163 | } | 159 | } else if (!strncmp(SERVICE, "SPOP", 4)) { | 
| 164 | else if (!strncmp(SERVICE, "SPOP", 4)) { | ||
| 165 | EXPECT = "+OK"; | 160 | EXPECT = "+OK"; | 
| 166 | QUIT = "QUIT\r\n"; | 161 | QUIT = "QUIT\r\n"; | 
| 167 | flags |= FLAG_SSL; | 162 | flags |= FLAG_SSL; | 
| 168 | PORT = 995; | 163 | PORT = 995; | 
| 169 | } | 164 | } else if (!strncmp(SERVICE, "SSMTP", 5)) { | 
| 170 | else if (!strncmp(SERVICE, "SSMTP", 5)) { | ||
| 171 | EXPECT = "220"; | 165 | EXPECT = "220"; | 
| 172 | QUIT = "QUIT\r\n"; | 166 | QUIT = "QUIT\r\n"; | 
| 173 | flags |= FLAG_SSL; | 167 | flags |= FLAG_SSL; | 
| 174 | PORT = 465; | 168 | PORT = 465; | 
| 175 | } | 169 | } else if (!strncmp(SERVICE, "JABBER", 6)) { | 
| 176 | else if (!strncmp(SERVICE, "JABBER", 6)) { | ||
| 177 | SEND = "<stream:stream to=\'host\' xmlns=\'jabber:client\' xmlns:stream=\'http://etherx.jabber.org/streams\'>\n"; | 170 | SEND = "<stream:stream to=\'host\' xmlns=\'jabber:client\' xmlns:stream=\'http://etherx.jabber.org/streams\'>\n"; | 
| 178 | EXPECT = "<?xml version=\'1.0\'"; | 171 | EXPECT = "<?xml version=\'1.0\'"; | 
| 179 | QUIT = "</stream:stream>\n"; | 172 | QUIT = "</stream:stream>\n"; | 
| 180 | flags |= FLAG_HIDE_OUTPUT; | 173 | flags |= FLAG_HIDE_OUTPUT; | 
| 181 | PORT = 5222; | 174 | PORT = 5222; | 
| 182 | } | 175 | } else if (!strncmp(SERVICE, "NNTPS", 5)) { | 
| 183 | else if (!strncmp (SERVICE, "NNTPS", 5)) { | ||
| 184 | server_expect_count = 2; | 176 | server_expect_count = 2; | 
| 185 | server_expect[0] = "200"; | 177 | server_expect[0] = "200"; | 
| 186 | server_expect[1] = "201"; | 178 | server_expect[1] = "201"; | 
| @@ -189,23 +181,22 @@ main (int argc, char **argv) | |||
| 189 | PORT = 563; | 181 | PORT = 563; | 
| 190 | } | 182 | } | 
| 191 | #endif | 183 | #endif | 
| 192 | else if (!strncmp (SERVICE, "NNTP", 4)) { | 184 | else if (!strncmp(SERVICE, "NNTP", 4)) { | 
| 193 | server_expect_count = 2; | 185 | server_expect_count = 2; | 
| 194 | server_expect = malloc(sizeof(char *) * server_expect_count); | 186 | server_expect = malloc(sizeof(char *) * server_expect_count); | 
| 195 | server_expect[0] = strdup("200"); | 187 | server_expect[0] = strdup("200"); | 
| 196 | server_expect[1] = strdup("201"); | 188 | server_expect[1] = strdup("201"); | 
| 197 | QUIT = "QUIT\r\n"; | 189 | QUIT = "QUIT\r\n"; | 
| 198 | PORT = 119; | 190 | PORT = 119; | 
| 199 | } | 191 | } else if (!strncmp(SERVICE, "CLAMD", 5)) { | 
| 200 | else if (!strncmp(SERVICE, "CLAMD", 5)) { | ||
| 201 | SEND = "PING"; | 192 | SEND = "PING"; | 
| 202 | EXPECT = "PONG"; | 193 | EXPECT = "PONG"; | 
| 203 | QUIT = NULL; | 194 | QUIT = NULL; | 
| 204 | PORT = 3310; | 195 | PORT = 3310; | 
| 205 | } | 196 | } | 
| 206 | /* fallthrough check, so it's supposed to use reverse matching */ | 197 | /* fallthrough check, so it's supposed to use reverse matching */ | 
| 207 | else if (strcmp (SERVICE, "TCP")) | 198 | else if (strcmp(SERVICE, "TCP")) | 
| 208 | usage (_("CRITICAL - Generic check_tcp called with unknown service\n")); | 199 | usage(_("CRITICAL - Generic check_tcp called with unknown service\n")); | 
| 209 | 200 | ||
| 210 | server_address = "127.0.0.1"; | 201 | server_address = "127.0.0.1"; | 
| 211 | server_port = PORT; | 202 | server_port = PORT; | 
| @@ -214,58 +205,60 @@ main (int argc, char **argv) | |||
| 214 | status = NULL; | 205 | status = NULL; | 
| 215 | 206 | ||
| 216 | /* Parse extra opts if any */ | 207 | /* Parse extra opts if any */ | 
| 217 | argv=np_extra_opts (&argc, argv, progname); | 208 | argv = np_extra_opts(&argc, argv, progname); | 
| 218 | 209 | ||
| 219 | if (process_arguments (argc, argv) == ERROR) | 210 | if (process_arguments(argc, argv) == ERROR) | 
| 220 | usage4 (_("Could not parse arguments")); | 211 | usage4(_("Could not parse arguments")); | 
| 221 | 212 | ||
| 222 | if(flags & FLAG_VERBOSE) { | 213 | if (flags & FLAG_VERBOSE) { | 
| 223 | printf("Using service %s\n", SERVICE); | 214 | printf("Using service %s\n", SERVICE); | 
| 224 | printf("Port: %d\n", server_port); | 215 | printf("Port: %d\n", server_port); | 
| 225 | printf("flags: 0x%x\n", (int)flags); | 216 | printf("flags: 0x%x\n", (int)flags); | 
| 226 | } | 217 | } | 
| 227 | 218 | ||
| 228 | if(EXPECT && !server_expect_count) | 219 | if (EXPECT && !server_expect_count) | 
| 229 | server_expect_count++; | 220 | server_expect_count++; | 
| 230 | 221 | ||
| 231 | if(PROTOCOL==IPPROTO_UDP && !(server_expect_count && server_send)){ | 222 | if (PROTOCOL == IPPROTO_UDP && !(server_expect_count && server_send)) { | 
| 232 | usage(_("With UDP checks, a send/expect string must be specified.")); | 223 | usage(_("With UDP checks, a send/expect string must be specified.")); | 
| 233 | } | 224 | } | 
| 234 | 225 | ||
| 235 | /* set up the timer */ | 226 | /* set up the timer */ | 
| 236 | signal (SIGALRM, socket_timeout_alarm_handler); | 227 | signal(SIGALRM, socket_timeout_alarm_handler); | 
| 237 | alarm (socket_timeout); | 228 | alarm(socket_timeout); | 
| 238 | 229 | ||
| 239 | /* try to connect to the host at the given port number */ | 230 | /* try to connect to the host at the given port number */ | 
| 240 | gettimeofday (&tv, NULL); | 231 | gettimeofday(&tv, NULL); | 
| 241 | 232 | ||
| 242 | result = np_net_connect (server_address, server_port, &sd, PROTOCOL); | 233 | result = np_net_connect(server_address, server_port, &sd, PROTOCOL); | 
| 243 | if (result == STATE_CRITICAL) return econn_refuse_state; | 234 | if (result == STATE_CRITICAL) | 
| 235 | return econn_refuse_state; | ||
| 244 | 236 | ||
| 245 | #ifdef HAVE_SSL | 237 | #ifdef HAVE_SSL | 
| 246 | if (flags & FLAG_SSL){ | 238 | if (flags & FLAG_SSL) { | 
| 247 | result = np_net_ssl_init_with_hostname(sd, (sni_specified ? sni : NULL)); | 239 | result = np_net_ssl_init_with_hostname(sd, (sni_specified ? sni : NULL)); | 
| 248 | if (result == STATE_OK && check_cert) { | 240 | if (result == STATE_OK && check_cert) { | 
| 249 | result = np_net_ssl_check_cert(days_till_exp_warn, days_till_exp_crit); | 241 | result = np_net_ssl_check_cert(days_till_exp_warn, days_till_exp_crit); | 
| 250 | } | 242 | } | 
| 251 | } | 243 | } | 
| 252 | if(result != STATE_OK){ | 244 | if (result != STATE_OK) { | 
| 253 | if(sd) close(sd); | 245 | if (sd) | 
| 246 | close(sd); | ||
| 254 | np_net_ssl_cleanup(); | 247 | np_net_ssl_cleanup(); | 
| 255 | return result; | 248 | return result; | 
| 256 | } | 249 | } | 
| 257 | #endif /* HAVE_SSL */ | 250 | #endif /* HAVE_SSL */ | 
| 258 | 251 | ||
| 259 | if (server_send != NULL) { /* Something to send? */ | 252 | if (server_send != NULL) { /* Something to send? */ | 
| 260 | my_send(server_send, strlen(server_send)); | 253 | my_send(server_send, strlen(server_send)); | 
| 261 | } | 254 | } | 
| 262 | 255 | ||
| 263 | if (delay > 0) { | 256 | if (delay > 0) { | 
| 264 | tv.tv_sec += delay; | 257 | tv.tv_sec += delay; | 
| 265 | sleep (delay); | 258 | sleep(delay); | 
| 266 | } | 259 | } | 
| 267 | 260 | ||
| 268 | if(flags & FLAG_VERBOSE) { | 261 | if (flags & FLAG_VERBOSE) { | 
| 269 | if (server_send) { | 262 | if (server_send) { | 
| 270 | printf("Send string: %s\n", server_send); | 263 | printf("Send string: %s\n", server_send); | 
| 271 | } | 264 | } | 
| @@ -273,7 +266,7 @@ main (int argc, char **argv) | |||
| 273 | printf("Quit string: %s\n", server_quit); | 266 | printf("Quit string: %s\n", server_quit); | 
| 274 | } | 267 | } | 
| 275 | printf("server_expect_count: %d\n", (int)server_expect_count); | 268 | printf("server_expect_count: %d\n", (int)server_expect_count); | 
| 276 | for(size_t i = 0; i < server_expect_count; i++) | 269 | for (size_t i = 0; i < server_expect_count; i++) | 
| 277 | printf("\t%zd: %s\n", i, server_expect[i]); | 270 | printf("\t%zd: %s\n", i, server_expect[i]); | 
| 278 | } | 271 | } | 
| 279 | 272 | ||
| @@ -294,17 +287,14 @@ main (int argc, char **argv) | |||
| 294 | if (maxbytes && len >= maxbytes) | 287 | if (maxbytes && len >= maxbytes) | 
| 295 | break; | 288 | break; | 
| 296 | 289 | ||
| 297 | if ((match = np_expect_match(status, | 290 | if ((match = np_expect_match(status, server_expect, server_expect_count, match_flags)) != NP_MATCH_RETRY) | 
| 298 | server_expect, | ||
| 299 | server_expect_count, | ||
| 300 | match_flags)) != NP_MATCH_RETRY) | ||
| 301 | break; | 291 | break; | 
| 302 | 292 | ||
| 303 | /* some protocols wait for further input, so make sure we don't wait forever */ | 293 | /* some protocols wait for further input, so make sure we don't wait forever */ | 
| 304 | FD_SET(sd, &rfds); | 294 | FD_SET(sd, &rfds); | 
| 305 | timeout.tv_sec = READ_TIMEOUT; | 295 | timeout.tv_sec = READ_TIMEOUT; | 
| 306 | timeout.tv_usec = 0; | 296 | timeout.tv_usec = 0; | 
| 307 | if(select(sd + 1, &rfds, NULL, NULL, &timeout) <= 0) | 297 | if (select(sd + 1, &rfds, NULL, NULL, &timeout) <= 0) | 
| 308 | break; | 298 | break; | 
| 309 | } | 299 | } | 
| 310 | 300 | ||
| @@ -313,26 +303,26 @@ main (int argc, char **argv) | |||
| 313 | 303 | ||
| 314 | /* no data when expected, so return critical */ | 304 | /* no data when expected, so return critical */ | 
| 315 | if (len == 0) | 305 | if (len == 0) | 
| 316 | die (STATE_CRITICAL, _("No data received from host\n")); | 306 | die(STATE_CRITICAL, _("No data received from host\n")); | 
| 317 | 307 | ||
| 318 | /* print raw output if we're debugging */ | 308 | /* print raw output if we're debugging */ | 
| 319 | if(flags & FLAG_VERBOSE) | 309 | if (flags & FLAG_VERBOSE) | 
| 320 | printf("received %d bytes from host\n#-raw-recv-------#\n%s\n#-raw-recv-------#\n", | 310 | printf("received %d bytes from host\n#-raw-recv-------#\n%s\n#-raw-recv-------#\n", (int)len + 1, status); | 
| 321 | (int)len + 1, status); | ||
| 322 | /* strip whitespace from end of output */ | 311 | /* strip whitespace from end of output */ | 
| 323 | while(--len > 0 && isspace(status[len])) | 312 | while (--len > 0 && isspace(status[len])) | 
| 324 | status[len] = '\0'; | 313 | status[len] = '\0'; | 
| 325 | } | 314 | } | 
| 326 | 315 | ||
| 327 | if (server_quit != NULL) { | 316 | if (server_quit != NULL) { | 
| 328 | my_send(server_quit, strlen(server_quit)); | 317 | my_send(server_quit, strlen(server_quit)); | 
| 329 | } | 318 | } | 
| 330 | if (sd) close (sd); | 319 | if (sd) | 
| 320 | close(sd); | ||
| 331 | #ifdef HAVE_SSL | 321 | #ifdef HAVE_SSL | 
| 332 | np_net_ssl_cleanup(); | 322 | np_net_ssl_cleanup(); | 
| 333 | #endif | 323 | #endif | 
| 334 | 324 | ||
| 335 | microsec = deltime (tv); | 325 | microsec = deltime(tv); | 
| 336 | elapsed_time = (double)microsec / 1.0e6; | 326 | elapsed_time = (double)microsec / 1.0e6; | 
| 337 | 327 | ||
| 338 | if (flags & FLAG_TIME_CRIT && elapsed_time > critical_time) | 328 | if (flags & FLAG_TIME_CRIT && elapsed_time > critical_time) | 
| @@ -341,66 +331,52 @@ main (int argc, char **argv) | |||
| 341 | result = STATE_WARNING; | 331 | result = STATE_WARNING; | 
| 342 | 332 | ||
| 343 | /* did we get the response we hoped? */ | 333 | /* did we get the response we hoped? */ | 
| 344 | if(match == NP_MATCH_FAILURE && result != STATE_CRITICAL) | 334 | if (match == NP_MATCH_FAILURE && result != STATE_CRITICAL) | 
| 345 | result = expect_mismatch_state; | 335 | result = expect_mismatch_state; | 
| 346 | 336 | ||
| 347 | /* reset the alarm */ | 337 | /* reset the alarm */ | 
| 348 | alarm (0); | 338 | alarm(0); | 
| 349 | 339 | ||
| 350 | /* this is a bit stupid, because we don't want to print the | 340 | /* this is a bit stupid, because we don't want to print the | 
| 351 | * response time (which can look ok to the user) if we didn't get | 341 | * response time (which can look ok to the user) if we didn't get | 
| 352 | * the response we were looking for. if-else */ | 342 | * the response we were looking for. if-else */ | 
| 353 | printf("%s %s - ", SERVICE, state_text(result)); | 343 | printf("%s %s - ", SERVICE, state_text(result)); | 
| 354 | 344 | ||
| 355 | if(match == NP_MATCH_FAILURE && len && !(flags & FLAG_HIDE_OUTPUT)) | 345 | if (match == NP_MATCH_FAILURE && len && !(flags & FLAG_HIDE_OUTPUT)) | 
| 356 | printf("Unexpected response from host/socket: %s", status); | 346 | printf("Unexpected response from host/socket: %s", status); | 
| 357 | else { | 347 | else { | 
| 358 | if(match == NP_MATCH_FAILURE) | 348 | if (match == NP_MATCH_FAILURE) | 
| 359 | printf("Unexpected response from host/socket on "); | 349 | printf("Unexpected response from host/socket on "); | 
| 360 | else | 350 | else | 
| 361 | printf("%.3f second response time on ", elapsed_time); | 351 | printf("%.3f second response time on ", elapsed_time); | 
| 362 | if(server_address[0] != '/') { | 352 | if (server_address[0] != '/') { | 
| 363 | if (host_specified) | 353 | if (host_specified) | 
| 364 | printf("%s port %d", | 354 | printf("%s port %d", server_address, server_port); | 
| 365 | server_address, server_port); | ||
| 366 | else | 355 | else | 
| 367 | printf("port %d", server_port); | 356 | printf("port %d", server_port); | 
| 368 | } | 357 | } else | 
| 369 | else | ||
| 370 | printf("socket %s", server_address); | 358 | printf("socket %s", server_address); | 
| 371 | } | 359 | } | 
| 372 | 360 | ||
| 373 | if (match != NP_MATCH_FAILURE && !(flags & FLAG_HIDE_OUTPUT) && len) | 361 | if (match != NP_MATCH_FAILURE && !(flags & FLAG_HIDE_OUTPUT) && len) | 
| 374 | printf (" [%s]", status); | 362 | printf(" [%s]", status); | 
| 375 | 363 | ||
| 376 | /* perf-data doesn't apply when server doesn't talk properly, | 364 | /* perf-data doesn't apply when server doesn't talk properly, | 
| 377 | * so print all zeroes on warn and crit. Use fperfdata since | 365 | * so print all zeroes on warn and crit. Use fperfdata since | 
| 378 | * localisation settings can make different outputs */ | 366 | * localisation settings can make different outputs */ | 
| 379 | if(match == NP_MATCH_FAILURE) | 367 | if (match == NP_MATCH_FAILURE) | 
| 380 | printf ("|%s", | 368 | printf("|%s", fperfdata("time", elapsed_time, "s", (flags & FLAG_TIME_WARN ? true : false), 0, | 
| 381 | fperfdata ("time", elapsed_time, "s", | 369 | (flags & FLAG_TIME_CRIT ? true : false), 0, true, 0, true, socket_timeout)); | 
| 382 | (flags & FLAG_TIME_WARN ? true : false), 0, | ||
| 383 | (flags & FLAG_TIME_CRIT ? true : false), 0, | ||
| 384 | true, 0, | ||
| 385 | true, socket_timeout) | ||
| 386 | ); | ||
| 387 | else | 370 | else | 
| 388 | printf("|%s", | 371 | printf("|%s", fperfdata("time", elapsed_time, "s", (flags & FLAG_TIME_WARN ? true : false), warning_time, | 
| 389 | fperfdata ("time", elapsed_time, "s", | 372 | (flags & FLAG_TIME_CRIT ? true : false), critical_time, true, 0, true, socket_timeout)); | 
| 390 | (flags & FLAG_TIME_WARN ? true : false), warning_time, | ||
| 391 | (flags & FLAG_TIME_CRIT ? true : false), critical_time, | ||
| 392 | true, 0, | ||
| 393 | true, socket_timeout) | ||
| 394 | ); | ||
| 395 | 373 | ||
| 396 | putchar('\n'); | 374 | putchar('\n'); | 
| 397 | return result; | 375 | return result; | 
| 398 | } | 376 | } | 
| 399 | 377 | ||
| 400 | |||
| 401 | |||
| 402 | /* process command-line arguments */ | 378 | /* process command-line arguments */ | 
| 403 | static int process_arguments (int argc, char **argv) { | 379 | static int process_arguments(int argc, char **argv) { | 
| 404 | int c; | 380 | int c; | 
| 405 | bool escape = false; | 381 | bool escape = false; | 
| 406 | char *temp; | 382 | char *temp; | 
| @@ -410,50 +386,48 @@ static int process_arguments (int argc, char **argv) { | |||
| 410 | }; | 386 | }; | 
| 411 | 387 | ||
| 412 | int option = 0; | 388 | int option = 0; | 
| 413 | static struct option longopts[] = { | 389 | static struct option longopts[] = {{"hostname", required_argument, 0, 'H'}, | 
| 414 | {"hostname", required_argument, 0, 'H'}, | 390 | {"critical", required_argument, 0, 'c'}, | 
| 415 | {"critical", required_argument, 0, 'c'}, | 391 | {"warning", required_argument, 0, 'w'}, | 
| 416 | {"warning", required_argument, 0, 'w'}, | 392 | {"critical-codes", required_argument, 0, 'C'}, | 
| 417 | {"critical-codes", required_argument, 0, 'C'}, | 393 | {"warning-codes", required_argument, 0, 'W'}, | 
| 418 | {"warning-codes", required_argument, 0, 'W'}, | 394 | {"timeout", required_argument, 0, 't'}, | 
| 419 | {"timeout", required_argument, 0, 't'}, | 395 | {"protocol", required_argument, 0, 'P'}, /* FIXME: Unhandled */ | 
| 420 | {"protocol", required_argument, 0, 'P'}, /* FIXME: Unhandled */ | 396 | {"port", required_argument, 0, 'p'}, | 
| 421 | {"port", required_argument, 0, 'p'}, | 397 | {"escape", no_argument, 0, 'E'}, | 
| 422 | {"escape", no_argument, 0, 'E'}, | 398 | {"all", no_argument, 0, 'A'}, | 
| 423 | {"all", no_argument, 0, 'A'}, | 399 | {"send", required_argument, 0, 's'}, | 
| 424 | {"send", required_argument, 0, 's'}, | 400 | {"expect", required_argument, 0, 'e'}, | 
| 425 | {"expect", required_argument, 0, 'e'}, | 401 | {"maxbytes", required_argument, 0, 'm'}, | 
| 426 | {"maxbytes", required_argument, 0, 'm'}, | 402 | {"quit", required_argument, 0, 'q'}, | 
| 427 | {"quit", required_argument, 0, 'q'}, | 403 | {"jail", no_argument, 0, 'j'}, | 
| 428 | {"jail", no_argument, 0, 'j'}, | 404 | {"delay", required_argument, 0, 'd'}, | 
| 429 | {"delay", required_argument, 0, 'd'}, | 405 | {"refuse", required_argument, 0, 'r'}, | 
| 430 | {"refuse", required_argument, 0, 'r'}, | 406 | {"mismatch", required_argument, 0, 'M'}, | 
| 431 | {"mismatch", required_argument, 0, 'M'}, | 407 | {"use-ipv4", no_argument, 0, '4'}, | 
| 432 | {"use-ipv4", no_argument, 0, '4'}, | 408 | {"use-ipv6", no_argument, 0, '6'}, | 
| 433 | {"use-ipv6", no_argument, 0, '6'}, | 409 | {"verbose", no_argument, 0, 'v'}, | 
| 434 | {"verbose", no_argument, 0, 'v'}, | 410 | {"version", no_argument, 0, 'V'}, | 
| 435 | {"version", no_argument, 0, 'V'}, | 411 | {"help", no_argument, 0, 'h'}, | 
| 436 | {"help", no_argument, 0, 'h'}, | 412 | {"ssl", no_argument, 0, 'S'}, | 
| 437 | {"ssl", no_argument, 0, 'S'}, | 413 | {"sni", required_argument, 0, SNI_OPTION}, | 
| 438 | {"sni", required_argument, 0, SNI_OPTION}, | 414 | {"certificate", required_argument, 0, 'D'}, | 
| 439 | {"certificate", required_argument, 0, 'D'}, | 415 | {0, 0, 0, 0}}; | 
| 440 | {0, 0, 0, 0} | ||
| 441 | }; | ||
| 442 | 416 | ||
| 443 | if (argc < 2) | 417 | if (argc < 2) | 
| 444 | usage4 (_("No arguments found")); | 418 | usage4(_("No arguments found")); | 
| 445 | 419 | ||
| 446 | /* backwards compatibility */ | 420 | /* backwards compatibility */ | 
| 447 | for (c = 1; c < argc; c++) { | 421 | for (c = 1; c < argc; c++) { | 
| 448 | if (strcmp ("-to", argv[c]) == 0) | 422 | if (strcmp("-to", argv[c]) == 0) | 
| 449 | strcpy (argv[c], "-t"); | 423 | strcpy(argv[c], "-t"); | 
| 450 | else if (strcmp ("-wt", argv[c]) == 0) | 424 | else if (strcmp("-wt", argv[c]) == 0) | 
| 451 | strcpy (argv[c], "-w"); | 425 | strcpy(argv[c], "-w"); | 
| 452 | else if (strcmp ("-ct", argv[c]) == 0) | 426 | else if (strcmp("-ct", argv[c]) == 0) | 
| 453 | strcpy (argv[c], "-c"); | 427 | strcpy(argv[c], "-c"); | 
| 454 | } | 428 | } | 
| 455 | 429 | ||
| 456 | if (!is_option (argv[1])) { | 430 | if (!is_option(argv[1])) { | 
| 457 | server_address = argv[1]; | 431 | server_address = argv[1]; | 
| 458 | argv[1] = argv[0]; | 432 | argv[1] = argv[0]; | 
| 459 | argv = &argv[1]; | 433 | argv = &argv[1]; | 
| @@ -461,22 +435,21 @@ static int process_arguments (int argc, char **argv) { | |||
| 461 | } | 435 | } | 
| 462 | 436 | ||
| 463 | while (1) { | 437 | while (1) { | 
| 464 | c = getopt_long (argc, argv, "+hVv46EAH:s:e:q:m:c:w:t:p:C:W:d:Sr:jD:M:", | 438 | c = getopt_long(argc, argv, "+hVv46EAH:s:e:q:m:c:w:t:p:C:W:d:Sr:jD:M:", longopts, &option); | 
| 465 | longopts, &option); | ||
| 466 | 439 | ||
| 467 | if (c == -1 || c == EOF || c == 1) | 440 | if (c == -1 || c == EOF || c == 1) | 
| 468 | break; | 441 | break; | 
| 469 | 442 | ||
| 470 | switch (c) { | 443 | switch (c) { | 
| 471 | case '?': /* print short usage statement if args not parsable */ | 444 | case '?': /* print short usage statement if args not parsable */ | 
| 472 | usage5 (); | 445 | usage5(); | 
| 473 | case 'h': /* help */ | 446 | case 'h': /* help */ | 
| 474 | print_help (); | 447 | print_help(); | 
| 475 | exit (STATE_UNKNOWN); | 448 | exit(STATE_UNKNOWN); | 
| 476 | case 'V': /* version */ | 449 | case 'V': /* version */ | 
| 477 | print_revision (progname, NP_VERSION); | 450 | print_revision(progname, NP_VERSION); | 
| 478 | exit (STATE_UNKNOWN); | 451 | exit(STATE_UNKNOWN); | 
| 479 | case 'v': /* verbose mode */ | 452 | case 'v': /* verbose mode */ | 
| 480 | flags |= FLAG_VERBOSE; | 453 | flags |= FLAG_VERBOSE; | 
| 481 | match_flags |= NP_MATCH_VERBOSE; | 454 | match_flags |= NP_MATCH_VERBOSE; | 
| 482 | break; | 455 | break; | 
| @@ -487,43 +460,43 @@ static int process_arguments (int argc, char **argv) { | |||
| 487 | #ifdef USE_IPV6 | 460 | #ifdef USE_IPV6 | 
| 488 | address_family = AF_INET6; | 461 | address_family = AF_INET6; | 
| 489 | #else | 462 | #else | 
| 490 | usage4 (_("IPv6 support not available")); | 463 | usage4(_("IPv6 support not available")); | 
| 491 | #endif | 464 | #endif | 
| 492 | break; | 465 | break; | 
| 493 | case 'H': /* hostname */ | 466 | case 'H': /* hostname */ | 
| 494 | host_specified = true; | 467 | host_specified = true; | 
| 495 | server_address = optarg; | 468 | server_address = optarg; | 
| 496 | break; | 469 | break; | 
| 497 | case 'c': /* critical */ | 470 | case 'c': /* critical */ | 
| 498 | critical_time = strtod (optarg, NULL); | 471 | critical_time = strtod(optarg, NULL); | 
| 499 | flags |= FLAG_TIME_CRIT; | 472 | flags |= FLAG_TIME_CRIT; | 
| 500 | break; | 473 | break; | 
| 501 | case 'j': /* hide output */ | 474 | case 'j': /* hide output */ | 
| 502 | flags |= FLAG_HIDE_OUTPUT; | 475 | flags |= FLAG_HIDE_OUTPUT; | 
| 503 | break; | 476 | break; | 
| 504 | case 'w': /* warning */ | 477 | case 'w': /* warning */ | 
| 505 | warning_time = strtod (optarg, NULL); | 478 | warning_time = strtod(optarg, NULL); | 
| 506 | flags |= FLAG_TIME_WARN; | 479 | flags |= FLAG_TIME_WARN; | 
| 507 | break; | 480 | break; | 
| 508 | case 'C': | 481 | case 'C': | 
| 509 | crit_codes = realloc (crit_codes, ++crit_codes_count); | 482 | crit_codes = realloc(crit_codes, ++crit_codes_count); | 
| 510 | crit_codes[crit_codes_count - 1] = optarg; | 483 | crit_codes[crit_codes_count - 1] = optarg; | 
| 511 | break; | 484 | break; | 
| 512 | case 'W': | 485 | case 'W': | 
| 513 | warn_codes = realloc (warn_codes, ++warn_codes_count); | 486 | warn_codes = realloc(warn_codes, ++warn_codes_count); | 
| 514 | warn_codes[warn_codes_count - 1] = optarg; | 487 | warn_codes[warn_codes_count - 1] = optarg; | 
| 515 | break; | 488 | break; | 
| 516 | case 't': /* timeout */ | 489 | case 't': /* timeout */ | 
| 517 | if (!is_intpos (optarg)) | 490 | if (!is_intpos(optarg)) | 
| 518 | usage4 (_("Timeout interval must be a positive integer")); | 491 | usage4(_("Timeout interval must be a positive integer")); | 
| 519 | else | 492 | else | 
| 520 | socket_timeout = atoi (optarg); | 493 | socket_timeout = atoi(optarg); | 
| 521 | break; | 494 | break; | 
| 522 | case 'p': /* port */ | 495 | case 'p': /* port */ | 
| 523 | if (!is_intpos (optarg)) | 496 | if (!is_intpos(optarg)) | 
| 524 | usage4 (_("Port must be a positive integer")); | 497 | usage4(_("Port must be a positive integer")); | 
| 525 | else | 498 | else | 
| 526 | server_port = atoi (optarg); | 499 | server_port = atoi(optarg); | 
| 527 | break; | 500 | break; | 
| 528 | case 'E': | 501 | case 'E': | 
| 529 | escape = true; | 502 | escape = true; | 
| @@ -537,16 +510,16 @@ static int process_arguments (int argc, char **argv) { | |||
| 537 | case 'e': /* expect string (may be repeated) */ | 510 | case 'e': /* expect string (may be repeated) */ | 
| 538 | match_flags &= ~NP_MATCH_EXACT; | 511 | match_flags &= ~NP_MATCH_EXACT; | 
| 539 | if (server_expect_count == 0) | 512 | if (server_expect_count == 0) | 
| 540 | server_expect = malloc (sizeof (char *) * (++server_expect_count)); | 513 | server_expect = malloc(sizeof(char *) * (++server_expect_count)); | 
| 541 | else | 514 | else | 
| 542 | server_expect = realloc (server_expect, sizeof (char *) * (++server_expect_count)); | 515 | server_expect = realloc(server_expect, sizeof(char *) * (++server_expect_count)); | 
| 543 | server_expect[server_expect_count - 1] = optarg; | 516 | server_expect[server_expect_count - 1] = optarg; | 
| 544 | break; | 517 | break; | 
| 545 | case 'm': | 518 | case 'm': | 
| 546 | if (!is_intpos (optarg)) | 519 | if (!is_intpos(optarg)) | 
| 547 | usage4 (_("Maxbytes must be a positive integer")); | 520 | usage4(_("Maxbytes must be a positive integer")); | 
| 548 | else | 521 | else | 
| 549 | maxbytes = strtol (optarg, NULL, 0); | 522 | maxbytes = strtol(optarg, NULL, 0); | 
| 550 | break; | 523 | break; | 
| 551 | case 'q': | 524 | case 'q': | 
| 552 | if (escape) | 525 | if (escape) | 
| @@ -555,62 +528,61 @@ static int process_arguments (int argc, char **argv) { | |||
| 555 | xasprintf(&server_quit, "%s\r\n", optarg); | 528 | xasprintf(&server_quit, "%s\r\n", optarg); | 
| 556 | break; | 529 | break; | 
| 557 | case 'r': | 530 | case 'r': | 
| 558 | if (!strncmp(optarg,"ok",2)) | 531 | if (!strncmp(optarg, "ok", 2)) | 
| 559 | econn_refuse_state = STATE_OK; | 532 | econn_refuse_state = STATE_OK; | 
| 560 | else if (!strncmp(optarg,"warn",4)) | 533 | else if (!strncmp(optarg, "warn", 4)) | 
| 561 | econn_refuse_state = STATE_WARNING; | 534 | econn_refuse_state = STATE_WARNING; | 
| 562 | else if (!strncmp(optarg,"crit",4)) | 535 | else if (!strncmp(optarg, "crit", 4)) | 
| 563 | econn_refuse_state = STATE_CRITICAL; | 536 | econn_refuse_state = STATE_CRITICAL; | 
| 564 | else | 537 | else | 
| 565 | usage4 (_("Refuse must be one of ok, warn, crit")); | 538 | usage4(_("Refuse must be one of ok, warn, crit")); | 
| 566 | break; | 539 | break; | 
| 567 | case 'M': | 540 | case 'M': | 
| 568 | if (!strncmp(optarg,"ok",2)) | 541 | if (!strncmp(optarg, "ok", 2)) | 
| 569 | expect_mismatch_state = STATE_OK; | 542 | expect_mismatch_state = STATE_OK; | 
| 570 | else if (!strncmp(optarg,"warn",4)) | 543 | else if (!strncmp(optarg, "warn", 4)) | 
| 571 | expect_mismatch_state = STATE_WARNING; | 544 | expect_mismatch_state = STATE_WARNING; | 
| 572 | else if (!strncmp(optarg,"crit",4)) | 545 | else if (!strncmp(optarg, "crit", 4)) | 
| 573 | expect_mismatch_state = STATE_CRITICAL; | 546 | expect_mismatch_state = STATE_CRITICAL; | 
| 574 | else | 547 | else | 
| 575 | usage4 (_("Mismatch must be one of ok, warn, crit")); | 548 | usage4(_("Mismatch must be one of ok, warn, crit")); | 
| 576 | break; | 549 | break; | 
| 577 | case 'd': | 550 | case 'd': | 
| 578 | if (is_intpos (optarg)) | 551 | if (is_intpos(optarg)) | 
| 579 | delay = atoi (optarg); | 552 | delay = atoi(optarg); | 
| 580 | else | 553 | else | 
| 581 | usage4 (_("Delay must be a positive integer")); | 554 | usage4(_("Delay must be a positive integer")); | 
| 582 | break; | 555 | break; | 
| 583 | case 'D': /* Check SSL cert validity - days 'til certificate expiration */ | 556 | case 'D': /* Check SSL cert validity - days 'til certificate expiration */ | 
| 584 | #ifdef HAVE_SSL | 557 | #ifdef HAVE_SSL | 
| 585 | # ifdef USE_OPENSSL /* XXX */ | 558 | # ifdef USE_OPENSSL /* XXX */ | 
| 586 | if ((temp=strchr(optarg,','))!=NULL) { | 559 | if ((temp = strchr(optarg, ',')) != NULL) { | 
| 587 | *temp='\0'; | 560 | *temp = '\0'; | 
| 588 | if (!is_intnonneg (optarg)) | 561 | if (!is_intnonneg(optarg)) | 
| 589 | usage2 (_("Invalid certificate expiration period"), optarg); | 562 | usage2(_("Invalid certificate expiration period"), optarg); | 
| 590 | days_till_exp_warn = atoi (optarg); | 563 | days_till_exp_warn = atoi(optarg); | 
| 591 | *temp=','; | 564 | *temp = ','; | 
| 592 | temp++; | 565 | temp++; | 
| 593 | if (!is_intnonneg (temp)) | 566 | if (!is_intnonneg(temp)) | 
| 594 | usage2 (_("Invalid certificate expiration period"), temp); | 567 | usage2(_("Invalid certificate expiration period"), temp); | 
| 595 | days_till_exp_crit = atoi (temp); | 568 | days_till_exp_crit = atoi(temp); | 
| 596 | } | 569 | } else { | 
| 597 | else { | 570 | days_till_exp_crit = 0; | 
| 598 | days_till_exp_crit=0; | 571 | if (!is_intnonneg(optarg)) | 
| 599 | if (!is_intnonneg (optarg)) | 572 | usage2(_("Invalid certificate expiration period"), optarg); | 
| 600 | usage2 (_("Invalid certificate expiration period"), optarg); | 573 | days_till_exp_warn = atoi(optarg); | 
| 601 | days_till_exp_warn = atoi (optarg); | ||
| 602 | } | 574 | } | 
| 603 | check_cert = true; | 575 | check_cert = true; | 
| 604 | flags |= FLAG_SSL; | 576 | flags |= FLAG_SSL; | 
| 605 | break; | 577 | break; | 
| 606 | # endif /* USE_OPENSSL */ | 578 | # endif /* USE_OPENSSL */ | 
| 607 | #endif | 579 | #endif | 
| 608 | /* fallthrough if we don't have ssl */ | 580 | /* fallthrough if we don't have ssl */ | 
| 609 | case 'S': | 581 | case 'S': | 
| 610 | #ifdef HAVE_SSL | 582 | #ifdef HAVE_SSL | 
| 611 | flags |= FLAG_SSL; | 583 | flags |= FLAG_SSL; | 
| 612 | #else | 584 | #else | 
| 613 | die (STATE_UNKNOWN, _("Invalid option - SSL is not available")); | 585 | die(STATE_UNKNOWN, _("Invalid option - SSL is not available")); | 
| 614 | #endif | 586 | #endif | 
| 615 | break; | 587 | break; | 
| 616 | case SNI_OPTION: | 588 | case SNI_OPTION: | 
| @@ -619,7 +591,7 @@ static int process_arguments (int argc, char **argv) { | |||
| 619 | sni_specified = true; | 591 | sni_specified = true; | 
| 620 | sni = optarg; | 592 | sni = optarg; | 
| 621 | #else | 593 | #else | 
| 622 | die (STATE_UNKNOWN, _("Invalid option - SSL is not available")); | 594 | die(STATE_UNKNOWN, _("Invalid option - SSL is not available")); | 
| 623 | #endif | 595 | #endif | 
| 624 | break; | 596 | break; | 
| 625 | case 'A': | 597 | case 'A': | 
| @@ -629,86 +601,80 @@ static int process_arguments (int argc, char **argv) { | |||
| 629 | } | 601 | } | 
| 630 | 602 | ||
| 631 | c = optind; | 603 | c = optind; | 
| 632 | if(!host_specified && c < argc) | 604 | if (!host_specified && c < argc) | 
| 633 | server_address = strdup (argv[c++]); | 605 | server_address = strdup(argv[c++]); | 
| 634 | 606 | ||
| 635 | if (server_address == NULL) | 607 | if (server_address == NULL) | 
| 636 | usage4 (_("You must provide a server address")); | 608 | usage4(_("You must provide a server address")); | 
| 637 | else if (server_address[0] != '/' && !is_host(server_address)) | 609 | else if (server_address[0] != '/' && !is_host(server_address)) | 
| 638 | die (STATE_CRITICAL, "%s %s - %s: %s\n", SERVICE, state_text(STATE_CRITICAL), _("Invalid hostname, address or socket"), server_address); | 610 | die(STATE_CRITICAL, "%s %s - %s: %s\n", SERVICE, state_text(STATE_CRITICAL), _("Invalid hostname, address or socket"), | 
| 611 | server_address); | ||
| 639 | 612 | ||
| 640 | return OK; | 613 | return OK; | 
| 641 | } | 614 | } | 
| 642 | 615 | ||
| 643 | 616 | void print_help(void) { | |
| 644 | void | 617 | print_revision(progname, NP_VERSION); | 
| 645 | print_help (void) | 618 | |
| 646 | { | 619 | printf("Copyright (c) 1999 Ethan Galstad <nagios@nagios.org>\n"); | 
| 647 | print_revision (progname, NP_VERSION); | 620 | printf(COPYRIGHT, copyright, email); | 
| 648 | 621 | ||
| 649 | printf ("Copyright (c) 1999 Ethan Galstad <nagios@nagios.org>\n"); | 622 | printf(_("This plugin tests %s connections with the specified host (or unix socket).\n\n"), SERVICE); | 
| 650 | printf (COPYRIGHT, copyright, email); | 623 | |
| 651 | 624 | print_usage(); | |
| 652 | printf (_("This plugin tests %s connections with the specified host (or unix socket).\n\n"), | 625 | |
| 653 | SERVICE); | 626 | printf(UT_HELP_VRSN); | 
| 654 | 627 | printf(UT_EXTRA_OPTS); | |
| 655 | print_usage (); | 628 | |
| 656 | 629 | printf(UT_HOST_PORT, 'p', "none"); | |
| 657 | printf (UT_HELP_VRSN); | 630 | |
| 658 | printf (UT_EXTRA_OPTS); | 631 | printf(UT_IPv46); | 
| 659 | 632 | ||
| 660 | printf (UT_HOST_PORT, 'p', "none"); | 633 | printf(" %s\n", "-E, --escape"); | 
| 661 | 634 | printf(" %s\n", _("Can use \\n, \\r, \\t or \\\\ in send or quit string. Must come before send or quit option")); | |
| 662 | printf (UT_IPv46); | 635 | printf(" %s\n", _("Default: nothing added to send, \\r\\n added to end of quit")); | 
| 663 | 636 | printf(" %s\n", "-s, --send=STRING"); | |
| 664 | printf (" %s\n", "-E, --escape"); | 637 | printf(" %s\n", _("String to send to the server")); | 
| 665 | printf (" %s\n", _("Can use \\n, \\r, \\t or \\\\ in send or quit string. Must come before send or quit option")); | 638 | printf(" %s\n", "-e, --expect=STRING"); | 
| 666 | printf (" %s\n", _("Default: nothing added to send, \\r\\n added to end of quit")); | 639 | printf(" %s %s\n", _("String to expect in server response"), _("(may be repeated)")); | 
| 667 | printf (" %s\n", "-s, --send=STRING"); | 640 | printf(" %s\n", "-A, --all"); | 
| 668 | printf (" %s\n", _("String to send to the server")); | 641 | printf(" %s\n", _("All expect strings need to occur in server response. Default is any")); | 
| 669 | printf (" %s\n", "-e, --expect=STRING"); | 642 | printf(" %s\n", "-q, --quit=STRING"); | 
| 670 | printf (" %s %s\n", _("String to expect in server response"), _("(may be repeated)")); | 643 | printf(" %s\n", _("String to send server to initiate a clean close of the connection")); | 
| 671 | printf (" %s\n", "-A, --all"); | 644 | printf(" %s\n", "-r, --refuse=ok|warn|crit"); | 
| 672 | printf (" %s\n", _("All expect strings need to occur in server response. Default is any")); | 645 | printf(" %s\n", _("Accept TCP refusals with states ok, warn, crit (default: crit)")); | 
| 673 | printf (" %s\n", "-q, --quit=STRING"); | 646 | printf(" %s\n", "-M, --mismatch=ok|warn|crit"); | 
| 674 | printf (" %s\n", _("String to send server to initiate a clean close of the connection")); | 647 | printf(" %s\n", _("Accept expected string mismatches with states ok, warn, crit (default: warn)")); | 
| 675 | printf (" %s\n", "-r, --refuse=ok|warn|crit"); | 648 | printf(" %s\n", "-j, --jail"); | 
| 676 | printf (" %s\n", _("Accept TCP refusals with states ok, warn, crit (default: crit)")); | 649 | printf(" %s\n", _("Hide output from TCP socket")); | 
| 677 | printf (" %s\n", "-M, --mismatch=ok|warn|crit"); | 650 | printf(" %s\n", "-m, --maxbytes=INTEGER"); | 
| 678 | printf (" %s\n", _("Accept expected string mismatches with states ok, warn, crit (default: warn)")); | 651 | printf(" %s\n", _("Close connection once more than this number of bytes are received")); | 
| 679 | printf (" %s\n", "-j, --jail"); | 652 | printf(" %s\n", "-d, --delay=INTEGER"); | 
| 680 | printf (" %s\n", _("Hide output from TCP socket")); | 653 | printf(" %s\n", _("Seconds to wait between sending string and polling for response")); | 
| 681 | printf (" %s\n", "-m, --maxbytes=INTEGER"); | ||
| 682 | printf (" %s\n", _("Close connection once more than this number of bytes are received")); | ||
| 683 | printf (" %s\n", "-d, --delay=INTEGER"); | ||
| 684 | printf (" %s\n", _("Seconds to wait between sending string and polling for response")); | ||
| 685 | 654 | ||
| 686 | #ifdef HAVE_SSL | 655 | #ifdef HAVE_SSL | 
| 687 | printf (" %s\n", "-D, --certificate=INTEGER[,INTEGER]"); | 656 | printf(" %s\n", "-D, --certificate=INTEGER[,INTEGER]"); | 
| 688 | printf (" %s\n", _("Minimum number of days a certificate has to be valid.")); | 657 | printf(" %s\n", _("Minimum number of days a certificate has to be valid.")); | 
| 689 | printf (" %s\n", _("1st is #days for warning, 2nd is critical (if not specified - 0).")); | 658 | printf(" %s\n", _("1st is #days for warning, 2nd is critical (if not specified - 0).")); | 
| 690 | printf (" %s\n", "-S, --ssl"); | 659 | printf(" %s\n", "-S, --ssl"); | 
| 691 | printf (" %s\n", _("Use SSL for the connection.")); | 660 | printf(" %s\n", _("Use SSL for the connection.")); | 
| 692 | printf (" %s\n", "--sni=STRING"); | 661 | printf(" %s\n", "--sni=STRING"); | 
| 693 | printf (" %s\n", _("SSL server_name")); | 662 | printf(" %s\n", _("SSL server_name")); | 
| 694 | #endif | 663 | #endif | 
| 695 | 664 | ||
| 696 | printf (UT_WARN_CRIT); | 665 | printf(UT_WARN_CRIT); | 
| 697 | 666 | ||
| 698 | printf (UT_CONN_TIMEOUT, DEFAULT_SOCKET_TIMEOUT); | 667 | printf(UT_CONN_TIMEOUT, DEFAULT_SOCKET_TIMEOUT); | 
| 699 | 668 | ||
| 700 | printf (UT_VERBOSE); | 669 | printf(UT_VERBOSE); | 
| 701 | 670 | ||
| 702 | printf (UT_SUPPORT); | 671 | printf(UT_SUPPORT); | 
| 703 | } | 672 | } | 
| 704 | 673 | ||
| 705 | 674 | void print_usage(void) { | |
| 706 | void | 675 | printf("%s\n", _("Usage:")); | 
| 707 | print_usage (void) | 676 | printf("%s -H host -p port [-w <warning time>] [-c <critical time>] [-s <send string>]\n", progname); | 
| 708 | { | 677 | printf("[-e <expect string>] [-q <quit string>][-m <maximum bytes>] [-d <delay>]\n"); | 
| 709 | printf ("%s\n", _("Usage:")); | 678 | printf("[-t <timeout seconds>] [-r <refuse state>] [-M <mismatch state>] [-v] [-4|-6] [-j]\n"); | 
| 710 | printf ("%s -H host -p port [-w <warning time>] [-c <critical time>] [-s <send string>]\n",progname); | 679 | printf("[-D <warn days cert expire>[,<crit days cert expire>]] [-S <use SSL>] [-E]\n"); | 
| 711 | printf ("[-e <expect string>] [-q <quit string>][-m <maximum bytes>] [-d <delay>]\n"); | ||
| 712 | printf ("[-t <timeout seconds>] [-r <refuse state>] [-M <mismatch state>] [-v] [-4|-6] [-j]\n"); | ||
| 713 | printf ("[-D <warn days cert expire>[,<crit days cert expire>]] [-S <use SSL>] [-E]\n"); | ||
| 714 | } | 680 | } | 
