diff options
author | Lorenz Kästle <12514511+RincewindsHat@users.noreply.github.com> | 2025-09-08 15:57:06 +0200 |
---|---|---|
committer | Lorenz Kästle <12514511+RincewindsHat@users.noreply.github.com> | 2025-09-08 15:57:06 +0200 |
commit | 87195f5511bf18db2a64f71ea9783ebbfb33c3a5 (patch) | |
tree | 491157b89647d73ed6acb0e4e2ae7cdf7fffb01c /plugins | |
parent | 1aefb1f9df5268ccbcd3ce38f5527ebca3896db6 (diff) | |
download | monitoring-plugins-87195f5511bf18db2a64f71ea9783ebbfb33c3a5.tar.gz |
check_snmp: refactoring + fixes
This commit moves the state retention logic to check_snmp as it is only
used there and I do not want it to be used at all, so it doesn't get a
place in the lib.
Otherwise this adapts tests and fixes the rate computing in the
refactored version of check_snmp.
Also fixes some bugs detected with the tests
Diffstat (limited to 'plugins')
-rw-r--r-- | plugins/Makefile.am | 14 | ||||
-rw-r--r-- | plugins/check_snmp.c | 778 | ||||
-rw-r--r-- | plugins/check_snmp.d/check_snmp_helpers.c | 861 | ||||
-rw-r--r-- | plugins/check_snmp.d/check_snmp_helpers.h | 64 | ||||
-rw-r--r-- | plugins/check_snmp.d/config.h | 25 | ||||
-rwxr-xr-x | plugins/tests/check_snmp.t | 159 | ||||
-rw-r--r-- | plugins/tests/check_snmp_agent.pl | 78 | ||||
-rw-r--r-- | plugins/tests/test_check_snmp.c | 175 | ||||
-rwxr-xr-x | plugins/tests/test_check_snmp.t | 6 |
9 files changed, 1623 insertions, 537 deletions
diff --git a/plugins/Makefile.am b/plugins/Makefile.am index f2f1777f..deae938d 100644 --- a/plugins/Makefile.am +++ b/plugins/Makefile.am | |||
@@ -13,8 +13,14 @@ AM_CFLAGS = -DNP_VERSION='"$(NP_VERSION)"' | |||
13 | 13 | ||
14 | VPATH = $(top_srcdir) $(top_srcdir)/lib $(top_srcdir)/plugins $(top_srcdir)/plugins/t | 14 | VPATH = $(top_srcdir) $(top_srcdir)/lib $(top_srcdir)/plugins $(top_srcdir)/plugins/t |
15 | 15 | ||
16 | AM_CPPFLAGS = -I.. -I$(top_srcdir)/lib -I$(top_srcdir)/gl -I$(top_srcdir)/intl \ | 16 | AM_CPPFLAGS = -I.. \ |
17 | @LDAPINCLUDE@ @PGINCLUDE@ @SSLINCLUDE@ | 17 | -I$(top_srcdir)/lib \ |
18 | -I$(top_srcdir)/gl \ | ||
19 | -I$(top_srcdir)/intl \ | ||
20 | -DNP_STATE_DIR_PREFIX=\"$(localstatedir)\" \ | ||
21 | @LDAPINCLUDE@ \ | ||
22 | @PGINCLUDE@ \ | ||
23 | @SSLINCLUDE@ | ||
18 | 24 | ||
19 | localedir = $(datadir)/locale | 25 | localedir = $(datadir)/locale |
20 | # gettext docs say to use AM_CPPFLAGS, but per module_CPPFLAGS override this | 26 | # gettext docs say to use AM_CPPFLAGS, but per module_CPPFLAGS override this |
@@ -42,11 +48,13 @@ EXTRA_PROGRAMS = check_mysql check_radius check_pgsql check_hpjd \ | |||
42 | check_procs check_mysql_query check_apt check_dbi check_curl \ | 48 | check_procs check_mysql_query check_apt check_dbi check_curl \ |
43 | \ | 49 | \ |
44 | tests/test_check_swap \ | 50 | tests/test_check_swap \ |
51 | tests/test_check_snmp \ | ||
45 | tests/test_check_disk | 52 | tests/test_check_disk |
46 | 53 | ||
47 | SUBDIRS = picohttpparser | 54 | SUBDIRS = picohttpparser |
48 | 55 | ||
49 | np_test_scripts = tests/test_check_swap.t \ | 56 | np_test_scripts = tests/test_check_swap.t \ |
57 | tests/test_check_snmp.t \ | ||
50 | tests/test_check_disk.t | 58 | tests/test_check_disk.t |
51 | 59 | ||
52 | EXTRA_DIST = t \ | 60 | EXTRA_DIST = t \ |
@@ -178,6 +186,8 @@ endif | |||
178 | 186 | ||
179 | tests_test_check_swap_LDADD = $(BASEOBJS) $(tap_ldflags) -ltap | 187 | tests_test_check_swap_LDADD = $(BASEOBJS) $(tap_ldflags) -ltap |
180 | tests_test_check_swap_SOURCES = tests/test_check_swap.c check_swap.d/swap.c | 188 | tests_test_check_swap_SOURCES = tests/test_check_swap.c check_swap.d/swap.c |
189 | tests_test_check_snmp_LDADD = $(BASEOBJS) $(tap_ldflags) -ltap | ||
190 | tests_test_check_snmp_SOURCES = tests/test_check_snmp.c check_snmp.d/check_snmp_helpers.c | ||
181 | tests_test_check_disk_LDADD = $(BASEOBJS) $(tap_ldflags) check_disk.d/utils_disk.c -ltap | 191 | tests_test_check_disk_LDADD = $(BASEOBJS) $(tap_ldflags) check_disk.d/utils_disk.c -ltap |
182 | tests_test_check_disk_SOURCES = tests/test_check_disk.c | 192 | tests_test_check_disk_SOURCES = tests/test_check_disk.c |
183 | 193 | ||
diff --git a/plugins/check_snmp.c b/plugins/check_snmp.c index 3c054259..a5a7afe8 100644 --- a/plugins/check_snmp.c +++ b/plugins/check_snmp.c | |||
@@ -37,10 +37,8 @@ const char *email = "devel@monitoring-plugins.org"; | |||
37 | #include "./utils.h" | 37 | #include "./utils.h" |
38 | #include "../lib/states.h" | 38 | #include "../lib/states.h" |
39 | 39 | ||
40 | #include "../lib/thresholds.h" | ||
41 | #include "../lib/utils_base.h" | 40 | #include "../lib/utils_base.h" |
42 | #include "../lib/output.h" | 41 | #include "../lib/output.h" |
43 | #include "../lib/perfdata.h" | ||
44 | #include "check_snmp.d/check_snmp_helpers.h" | 42 | #include "check_snmp.d/check_snmp_helpers.h" |
45 | 43 | ||
46 | #include <bits/getopt_core.h> | 44 | #include <bits/getopt_core.h> |
@@ -49,6 +47,7 @@ const char *email = "devel@monitoring-plugins.org"; | |||
49 | #include <stdint.h> | 47 | #include <stdint.h> |
50 | 48 | ||
51 | #include "check_snmp.d/config.h" | 49 | #include "check_snmp.d/config.h" |
50 | #include <stdlib.h> | ||
52 | #include <arpa/inet.h> | 51 | #include <arpa/inet.h> |
53 | #include <net-snmp/library/parse.h> | 52 | #include <net-snmp/library/parse.h> |
54 | #include <net-snmp/net-snmp-config.h> | 53 | #include <net-snmp/net-snmp-config.h> |
@@ -63,6 +62,7 @@ const char *email = "devel@monitoring-plugins.org"; | |||
63 | #include <net-snmp/library/snmp_impl.h> | 62 | #include <net-snmp/library/snmp_impl.h> |
64 | #include <string.h> | 63 | #include <string.h> |
65 | #include "../gl/regex.h" | 64 | #include "../gl/regex.h" |
65 | #include "../gl/base64.h" | ||
66 | #include <assert.h> | 66 | #include <assert.h> |
67 | 67 | ||
68 | const char DEFAULT_COMMUNITY[] = "public"; | 68 | const char DEFAULT_COMMUNITY[] = "public"; |
@@ -86,7 +86,168 @@ static char *get_next_argument(char *str); | |||
86 | void print_usage(void); | 86 | void print_usage(void); |
87 | void print_help(void); | 87 | void print_help(void); |
88 | 88 | ||
89 | static int verbose = 0; | 89 | int verbose = 0; |
90 | |||
91 | typedef struct { | ||
92 | int errorcode; | ||
93 | char *state_string; | ||
94 | } gen_state_string_type; | ||
95 | gen_state_string_type gen_state_string(check_snmp_state_entry *entries, size_t num_of_entries) { | ||
96 | char *encoded_string = NULL; | ||
97 | gen_state_string_type result = {.errorcode = OK, .state_string = NULL}; | ||
98 | |||
99 | if (verbose > 1) { | ||
100 | printf("%s:\n", __FUNCTION__); | ||
101 | for (size_t i = 0; i < num_of_entries; i++) { | ||
102 | printf("Entry timestamp %lu: %s", entries[i].timestamp, ctime(&entries[i].timestamp)); | ||
103 | switch (entries[i].type) { | ||
104 | case ASN_GAUGE: | ||
105 | printf("Type GAUGE\n"); | ||
106 | break; | ||
107 | case ASN_TIMETICKS: | ||
108 | printf("Type TIMETICKS\n"); | ||
109 | break; | ||
110 | case ASN_COUNTER: | ||
111 | printf("Type COUNTER\n"); | ||
112 | break; | ||
113 | case ASN_UINTEGER: | ||
114 | printf("Type UINTEGER\n"); | ||
115 | break; | ||
116 | case ASN_COUNTER64: | ||
117 | printf("Type COUNTER64\n"); | ||
118 | break; | ||
119 | case ASN_FLOAT: | ||
120 | printf("Type FLOAT\n"); | ||
121 | case ASN_DOUBLE: | ||
122 | printf("Type DOUBLE\n"); | ||
123 | break; | ||
124 | case ASN_INTEGER: | ||
125 | printf("Type INTEGER\n"); | ||
126 | break; | ||
127 | } | ||
128 | |||
129 | switch (entries[i].type) { | ||
130 | case ASN_GAUGE: | ||
131 | case ASN_TIMETICKS: | ||
132 | case ASN_COUNTER: | ||
133 | case ASN_UINTEGER: | ||
134 | case ASN_COUNTER64: | ||
135 | printf("Value %llu\n", entries[i].value.uIntVal); | ||
136 | break; | ||
137 | case ASN_FLOAT: | ||
138 | case ASN_DOUBLE: | ||
139 | printf("Value %f\n", entries[i].value.doubleVal); | ||
140 | break; | ||
141 | case ASN_INTEGER: | ||
142 | printf("Value %lld\n", entries[i].value.intVal); | ||
143 | break; | ||
144 | } | ||
145 | } | ||
146 | } | ||
147 | |||
148 | idx_t encoded = base64_encode_alloc((const char *)entries, | ||
149 | (idx_t)(num_of_entries * sizeof(check_snmp_state_entry)), | ||
150 | &encoded_string); | ||
151 | |||
152 | if (encoded > 0 && encoded_string != NULL) { | ||
153 | // success | ||
154 | if (verbose > 1) { | ||
155 | printf("encoded string: %s\n", encoded_string); | ||
156 | printf("encoded string length: %lu\n", strlen(encoded_string)); | ||
157 | } | ||
158 | result.state_string = encoded_string; | ||
159 | return result; | ||
160 | } | ||
161 | result.errorcode = ERROR; | ||
162 | return result; | ||
163 | } | ||
164 | |||
165 | typedef struct { | ||
166 | int errorcode; | ||
167 | check_snmp_state_entry *state; | ||
168 | } recover_state_data_type; | ||
169 | recover_state_data_type recover_state_data(char *state_string, idx_t state_string_length) { | ||
170 | recover_state_data_type result = {.errorcode = OK, .state = NULL}; | ||
171 | |||
172 | if (verbose > 1) { | ||
173 | printf("%s:\n", __FUNCTION__); | ||
174 | printf("State string: %s\n", state_string); | ||
175 | printf("State string length: %lu\n", state_string_length); | ||
176 | } | ||
177 | |||
178 | idx_t outlen = 0; | ||
179 | bool decoded = | ||
180 | base64_decode_alloc(state_string, state_string_length, (char **)&result.state, &outlen); | ||
181 | |||
182 | if (!decoded) { | ||
183 | if (verbose) { | ||
184 | printf("Failed to decode state string\n"); | ||
185 | } | ||
186 | // failure to decode | ||
187 | result.errorcode = ERROR; | ||
188 | return result; | ||
189 | } | ||
190 | |||
191 | if (result.state == NULL) { | ||
192 | // Memory Error? | ||
193 | result.errorcode = ERROR; | ||
194 | return result; | ||
195 | } | ||
196 | |||
197 | if (verbose > 1) { | ||
198 | printf("Recovered %lu entries of size %lu\n", | ||
199 | (size_t)outlen / sizeof(check_snmp_state_entry), outlen); | ||
200 | |||
201 | for (size_t i = 0; i < (size_t)outlen / sizeof(check_snmp_state_entry); i++) { | ||
202 | printf("Entry timestamp %lu: %s", result.state[i].timestamp, | ||
203 | ctime(&result.state[i].timestamp)); | ||
204 | switch (result.state[i].type) { | ||
205 | case ASN_GAUGE: | ||
206 | printf("Type GAUGE\n"); | ||
207 | break; | ||
208 | case ASN_TIMETICKS: | ||
209 | printf("Type TIMETICKS\n"); | ||
210 | break; | ||
211 | case ASN_COUNTER: | ||
212 | printf("Type COUNTER\n"); | ||
213 | break; | ||
214 | case ASN_UINTEGER: | ||
215 | printf("Type UINTEGER\n"); | ||
216 | break; | ||
217 | case ASN_COUNTER64: | ||
218 | printf("Type COUNTER64\n"); | ||
219 | break; | ||
220 | case ASN_FLOAT: | ||
221 | printf("Type FLOAT\n"); | ||
222 | case ASN_DOUBLE: | ||
223 | printf("Type DOUBLE\n"); | ||
224 | break; | ||
225 | case ASN_INTEGER: | ||
226 | printf("Type INTEGER\n"); | ||
227 | break; | ||
228 | } | ||
229 | |||
230 | switch (result.state[i].type) { | ||
231 | case ASN_GAUGE: | ||
232 | case ASN_TIMETICKS: | ||
233 | case ASN_COUNTER: | ||
234 | case ASN_UINTEGER: | ||
235 | case ASN_COUNTER64: | ||
236 | printf("Value %llu\n", result.state[i].value.uIntVal); | ||
237 | break; | ||
238 | case ASN_FLOAT: | ||
239 | case ASN_DOUBLE: | ||
240 | printf("Value %f\n", result.state[i].value.doubleVal); | ||
241 | break; | ||
242 | case ASN_INTEGER: | ||
243 | printf("Value %lld\n", result.state[i].value.intVal); | ||
244 | break; | ||
245 | } | ||
246 | } | ||
247 | } | ||
248 | |||
249 | return result; | ||
250 | } | ||
90 | 251 | ||
91 | int main(int argc, char **argv) { | 252 | int main(int argc, char **argv) { |
92 | setlocale(LC_ALL, ""); | 253 | setlocale(LC_ALL, ""); |
@@ -97,6 +258,8 @@ int main(int argc, char **argv) { | |||
97 | 258 | ||
98 | np_init((char *)progname, argc, argv); | 259 | np_init((char *)progname, argc, argv); |
99 | 260 | ||
261 | state_key stateKey = np_enable_state(NULL, 1, progname, argc, argv); | ||
262 | |||
100 | /* Parse extra opts if any */ | 263 | /* Parse extra opts if any */ |
101 | argv = np_extra_opts(&argc, argv, progname); | 264 | argv = np_extra_opts(&argc, argv, progname); |
102 | 265 | ||
@@ -105,9 +268,6 @@ int main(int argc, char **argv) { | |||
105 | // Initialize net-snmp before touching the session we are going to use | 268 | // Initialize net-snmp before touching the session we are going to use |
106 | init_snmp("check_snmp"); | 269 | init_snmp("check_snmp"); |
107 | 270 | ||
108 | time_t current_time; | ||
109 | time(¤t_time); | ||
110 | |||
111 | process_arguments_wrapper paw_tmp = process_arguments(argc, argv); | 271 | process_arguments_wrapper paw_tmp = process_arguments(argc, argv); |
112 | if (paw_tmp.errorcode == ERROR) { | 272 | if (paw_tmp.errorcode == ERROR) { |
113 | usage4(_("Could not parse arguments")); | 273 | usage4(_("Could not parse arguments")); |
@@ -119,347 +279,103 @@ int main(int argc, char **argv) { | |||
119 | mp_set_format(config.output_format); | 279 | mp_set_format(config.output_format); |
120 | } | 280 | } |
121 | 281 | ||
122 | if (config.ignore_mib_parsing_errors) { | ||
123 | char *opt_toggle_res = snmp_mib_toggle_options("e"); | ||
124 | if (opt_toggle_res != NULL) { | ||
125 | die(STATE_UNKNOWN, "Unable to disable MIB parsing errors"); | ||
126 | } | ||
127 | } | ||
128 | |||
129 | struct snmp_pdu *pdu = NULL; | ||
130 | if (config.use_getnext) { | ||
131 | pdu = snmp_pdu_create(SNMP_MSG_GETNEXT); | ||
132 | } else { | ||
133 | pdu = snmp_pdu_create(SNMP_MSG_GET); | ||
134 | } | ||
135 | |||
136 | for (size_t i = 0; i < config.num_of_test_units; i++) { | ||
137 | assert(config.test_units[i].oid != NULL); | ||
138 | if (verbose > 0) { | ||
139 | printf("OID %zu to parse: %s\n", i, config.test_units[i].oid); | ||
140 | } | ||
141 | |||
142 | oid tmp_OID[MAX_OID_LEN]; | ||
143 | size_t tmp_OID_len = MAX_OID_LEN; | ||
144 | if (snmp_parse_oid(config.test_units[i].oid, tmp_OID, &tmp_OID_len) != NULL) { | ||
145 | // success | ||
146 | snmp_add_null_var(pdu, tmp_OID, tmp_OID_len); | ||
147 | } else { | ||
148 | // failed | ||
149 | snmp_perror("Parsing failure"); | ||
150 | die(STATE_UNKNOWN, "Failed to parse OID\n"); | ||
151 | } | ||
152 | } | ||
153 | |||
154 | /* Set signal handling and alarm */ | 282 | /* Set signal handling and alarm */ |
155 | if (signal(SIGALRM, runcmd_timeout_alarm_handler) == SIG_ERR) { | 283 | if (signal(SIGALRM, runcmd_timeout_alarm_handler) == SIG_ERR) { |
156 | usage4(_("Cannot catch SIGALRM")); | 284 | usage4(_("Cannot catch SIGALRM")); |
157 | } | 285 | } |
158 | 286 | ||
159 | const int timeout_safety_tolerance = 5; | 287 | time_t current_time; |
160 | alarm((timeout_interval * (unsigned int)config.snmp_session.retries) + | 288 | time(¤t_time); |
161 | timeout_safety_tolerance); | ||
162 | |||
163 | struct snmp_session *active_session = snmp_open(&config.snmp_session); | ||
164 | if (active_session == NULL) { | ||
165 | int pcliberr = 0; | ||
166 | int psnmperr = 0; | ||
167 | char *pperrstring = NULL; | ||
168 | snmp_error(&config.snmp_session, &pcliberr, &psnmperr, &pperrstring); | ||
169 | die(STATE_UNKNOWN, "Failed to open SNMP session: %s\n", pperrstring); | ||
170 | } | ||
171 | |||
172 | struct snmp_pdu *response = NULL; | ||
173 | int snmp_query_status = snmp_synch_response(active_session, pdu, &response); | ||
174 | |||
175 | if (!(snmp_query_status == STAT_SUCCESS && response->errstat == SNMP_ERR_NOERROR)) { | ||
176 | int pcliberr = 0; | ||
177 | int psnmperr = 0; | ||
178 | char *pperrstring = NULL; | ||
179 | snmp_error(active_session, &pcliberr, &psnmperr, &pperrstring); | ||
180 | 289 | ||
181 | if (psnmperr == SNMPERR_TIMEOUT) { | 290 | if (verbose > 2) { |
182 | // We exit with critical here for some historical reason | 291 | printf("current time: %s (timestamp: %lu)\n", ctime(¤t_time), current_time); |
183 | die(STATE_CRITICAL, "SNMP query ran into a timeout\n"); | ||
184 | } | ||
185 | die(STATE_UNKNOWN, "SNMP query failed: %s\n", pperrstring); | ||
186 | } | 292 | } |
187 | 293 | ||
188 | snmp_close(active_session); | 294 | snmp_responces response = do_snmp_query(config.snmp_params); |
189 | |||
190 | /* disable alarm again */ | ||
191 | alarm(0); | ||
192 | 295 | ||
193 | mp_check overall = mp_check_init(); | 296 | mp_check overall = mp_check_init(); |
194 | 297 | ||
195 | mp_subcheck sc_successfull_query = mp_subcheck_init(); | 298 | if (response.errorcode == OK) { |
196 | xasprintf(&sc_successfull_query.output, "SNMP query was successful"); | 299 | mp_subcheck sc_successfull_query = mp_subcheck_init(); |
197 | sc_successfull_query = mp_set_subcheck_state(sc_successfull_query, STATE_OK); | 300 | xasprintf(&sc_successfull_query.output, "SNMP query was successful"); |
198 | mp_add_subcheck_to_check(&overall, sc_successfull_query); | 301 | sc_successfull_query = mp_set_subcheck_state(sc_successfull_query, STATE_OK); |
199 | 302 | mp_add_subcheck_to_check(&overall, sc_successfull_query); | |
200 | // We got the the query results, now process them | 303 | } else { |
201 | size_t loop_index = 0; | 304 | // Error treatment here, either partial or whole |
202 | for (netsnmp_variable_list *vars = response->variables; vars; | 305 | mp_subcheck sc_failed_query = mp_subcheck_init(); |
203 | vars = vars->next_variable, loop_index++) { | 306 | xasprintf(&sc_failed_query.output, "SNMP query failed"); |
204 | mp_subcheck sc_oid_test = mp_subcheck_init(); | 307 | sc_failed_query = mp_set_subcheck_state(sc_failed_query, STATE_OK); |
308 | mp_add_subcheck_to_check(&overall, sc_failed_query); | ||
309 | mp_exit(overall); | ||
310 | } | ||
205 | 311 | ||
206 | if (verbose > 0) { | 312 | check_snmp_state_entry *prev_state = NULL; |
207 | printf("loop_index: %zu\n", loop_index); | 313 | bool have_previous_state = false; |
208 | } | ||
209 | 314 | ||
210 | if ((config.test_units[loop_index].label != NULL) && | 315 | if (config.evaluation_params.calculate_rate) { |
211 | (strcmp(config.test_units[loop_index].label, "") != 0)) { | 316 | state_data *previous_state = np_state_read(stateKey); |
212 | xasprintf(&sc_oid_test.output, "%s - ", config.test_units[loop_index].label); | 317 | if (previous_state == NULL) { |
318 | // failed to recover state | ||
319 | // or no previous state | ||
320 | have_previous_state = false; | ||
213 | } else { | 321 | } else { |
214 | sc_oid_test.output = strdup(""); | 322 | // sanity check |
215 | } | 323 | recover_state_data_type prev_state_wrapper = |
216 | 324 | recover_state_data(previous_state->data, (idx_t)previous_state->length); | |
217 | char oid_string[(MAX_OID_LEN * 2) + 1] = {}; | ||
218 | |||
219 | int oid_string_result = | ||
220 | snprint_objid(oid_string, (MAX_OID_LEN * 2) + 1, vars->name, vars->name_length); | ||
221 | if (oid_string_result <= 0) { | ||
222 | // TODO error here | ||
223 | } | ||
224 | |||
225 | if (verbose > 2) { | ||
226 | printf("Processing oid %s\n", oid_string); | ||
227 | } | ||
228 | 325 | ||
229 | mp_perfdata_value pd_result_val = {0}; | 326 | if (prev_state_wrapper.errorcode == OK) { |
230 | xasprintf(&sc_oid_test.output, "%sOID: %s", sc_oid_test.output, oid_string); | 327 | have_previous_state = true; |
231 | sc_oid_test = mp_set_subcheck_default_state(sc_oid_test, STATE_OK); | 328 | prev_state = prev_state_wrapper.state; |
232 | |||
233 | switch (vars->type) { | ||
234 | case ASN_OCTET_STR: { | ||
235 | if (verbose) { | ||
236 | printf("Debug: Got a string\n"); | ||
237 | } | ||
238 | |||
239 | char *tmp = (char *)vars->val.string; | ||
240 | |||
241 | if (strchr(tmp, '"') != NULL) { | ||
242 | // got double quote in the string | ||
243 | if (strchr(tmp, '\'') != NULL) { | ||
244 | // got single quote in the string too | ||
245 | // dont quote that at all to avoid even more confusion | ||
246 | xasprintf(&sc_oid_test.output, "%s - Value: %s", sc_oid_test.output, tmp); | ||
247 | } else { | ||
248 | // quote with single quotes | ||
249 | xasprintf(&sc_oid_test.output, "%s - Value: '%s'", sc_oid_test.output, tmp); | ||
250 | } | ||
251 | } else { | 329 | } else { |
252 | // quote with double quotes | 330 | have_previous_state = false; |
253 | xasprintf(&sc_oid_test.output, "%s - Value: \"%s\"", sc_oid_test.output, tmp); | 331 | prev_state = NULL; |
254 | } | ||
255 | |||
256 | if (strlen(tmp) == 0) { | ||
257 | sc_oid_test = mp_set_subcheck_state(sc_oid_test, config.nulloid_result); | ||
258 | } | 332 | } |
259 | |||
260 | // String matching test | ||
261 | if ((config.test_units[loop_index].eval_mthd.crit_string)) { | ||
262 | if (strcmp(tmp, config.string_cmp_value)) { | ||
263 | sc_oid_test = mp_set_subcheck_state( | ||
264 | sc_oid_test, (config.invert_search) ? STATE_CRITICAL : STATE_OK); | ||
265 | } else { | ||
266 | sc_oid_test = mp_set_subcheck_state( | ||
267 | sc_oid_test, (config.invert_search) ? STATE_OK : STATE_CRITICAL); | ||
268 | } | ||
269 | } else if (config.test_units[loop_index].eval_mthd.crit_regex) { | ||
270 | const size_t nmatch = config.regex_cmp_value.re_nsub + 1; | ||
271 | regmatch_t pmatch[nmatch]; | ||
272 | memset(pmatch, '\0', sizeof(regmatch_t) * nmatch); | ||
273 | |||
274 | int excode = regexec(&config.regex_cmp_value, tmp, nmatch, pmatch, 0); | ||
275 | if (excode == 0) { | ||
276 | sc_oid_test = mp_set_subcheck_state( | ||
277 | sc_oid_test, (config.invert_search) ? STATE_OK : STATE_CRITICAL); | ||
278 | } else if (excode != REG_NOMATCH) { | ||
279 | char errbuf[MAX_INPUT_BUFFER] = ""; | ||
280 | regerror(excode, &config.regex_cmp_value, errbuf, MAX_INPUT_BUFFER); | ||
281 | printf(_("Execute Error: %s\n"), errbuf); | ||
282 | exit(STATE_CRITICAL); | ||
283 | } else { // REG_NOMATCH | ||
284 | sc_oid_test = mp_set_subcheck_state( | ||
285 | sc_oid_test, config.invert_search ? STATE_CRITICAL : STATE_OK); | ||
286 | } | ||
287 | } | ||
288 | |||
289 | mp_add_subcheck_to_check(&overall, sc_oid_test); | ||
290 | } | 333 | } |
291 | continue; | 334 | } |
292 | case ASN_OPAQUE: | ||
293 | if (verbose) { | ||
294 | printf("Debug: Got OPAQUE\n"); | ||
295 | } | ||
296 | break; | ||
297 | case ASN_COUNTER64: { | ||
298 | if (verbose) { | ||
299 | printf("Debug: Got counter64\n"); | ||
300 | } | ||
301 | struct counter64 tmp = *(vars->val.counter64); | ||
302 | uint64_t counter = (tmp.high << 32) + tmp.low; | ||
303 | |||
304 | if (config.multiplier_set || config.offset_set) { | ||
305 | double processed = 0; | ||
306 | if (config.multiplier_set) { | ||
307 | processed = (double)counter * config.multiplier; | ||
308 | } | ||
309 | |||
310 | if (config.offset_set) { | ||
311 | processed += config.offset; | ||
312 | } | ||
313 | pd_result_val = mp_create_pd_value(processed); | ||
314 | } else { | ||
315 | pd_result_val = mp_create_pd_value(counter); | ||
316 | } | ||
317 | |||
318 | } break; | ||
319 | /* Numerical values */ | ||
320 | case ASN_GAUGE: // same as ASN_UNSIGNED | ||
321 | case ASN_TIMETICKS: | ||
322 | case ASN_COUNTER: | ||
323 | case ASN_UINTEGER: { | ||
324 | if (verbose) { | ||
325 | printf("Debug: Got a Integer like\n"); | ||
326 | } | ||
327 | unsigned long tmp = (unsigned long)*(vars->val.integer); | ||
328 | |||
329 | if (config.multiplier_set || config.offset_set) { | ||
330 | double processed = 0; | ||
331 | if (config.multiplier_set) { | ||
332 | processed = (double)tmp * config.multiplier; | ||
333 | } | ||
334 | 335 | ||
335 | if (config.offset_set) { | 336 | check_snmp_state_entry *new_state = NULL; |
336 | processed += config.offset; | 337 | if (config.evaluation_params.calculate_rate) { |
337 | } | 338 | new_state = calloc(config.snmp_params.num_of_test_units, sizeof(check_snmp_state_entry)); |
338 | pd_result_val = mp_create_pd_value(processed); | 339 | if (new_state == NULL) { |
339 | } else { | 340 | die(STATE_UNKNOWN, "memory allocation failed"); |
340 | pd_result_val = mp_create_pd_value(tmp); | ||
341 | } | ||
342 | break; | ||
343 | } | 341 | } |
344 | case ASN_INTEGER: { | 342 | } |
345 | if (verbose) { | ||
346 | printf("Debug: Got a Integer\n"); | ||
347 | } | ||
348 | |||
349 | long tmp = *(vars->val.integer); | ||
350 | |||
351 | if (config.multiplier_set || config.offset_set) { | ||
352 | double processed = 0; | ||
353 | if (config.multiplier_set) { | ||
354 | processed = (double)tmp * config.multiplier; | ||
355 | } | ||
356 | |||
357 | if (config.offset_set) { | ||
358 | processed += config.offset; | ||
359 | } | ||
360 | pd_result_val = mp_create_pd_value(processed); | ||
361 | } else { | ||
362 | pd_result_val = mp_create_pd_value(tmp); | ||
363 | } | ||
364 | |||
365 | } break; | ||
366 | case ASN_FLOAT: { | ||
367 | if (verbose) { | ||
368 | printf("Debug: Got a float\n"); | ||
369 | } | ||
370 | double tmp = *(vars->val.floatVal); | ||
371 | |||
372 | if (config.multiplier_set) { | ||
373 | tmp *= config.multiplier; | ||
374 | } | ||
375 | |||
376 | if (config.offset_set) { | ||
377 | tmp += config.offset; | ||
378 | } | ||
379 | 343 | ||
380 | pd_result_val = mp_create_pd_value(tmp); | 344 | // We got the the query results, now process them |
381 | break; | 345 | for (size_t loop_index = 0; loop_index < config.snmp_params.num_of_test_units; loop_index++) { |
346 | if (verbose > 0) { | ||
347 | printf("loop_index: %zu\n", loop_index); | ||
382 | } | 348 | } |
383 | case ASN_DOUBLE: { | ||
384 | if (verbose) { | ||
385 | printf("Debug: Got a double\n"); | ||
386 | } | ||
387 | double tmp = *(vars->val.doubleVal); | ||
388 | if (config.multiplier_set) { | ||
389 | tmp *= config.multiplier; | ||
390 | } | ||
391 | |||
392 | if (config.offset_set) { | ||
393 | tmp += config.offset; | ||
394 | } | ||
395 | 349 | ||
396 | pd_result_val = mp_create_pd_value(tmp); | 350 | check_snmp_state_entry previous_unit_state = {}; |
397 | break; | 351 | if (config.evaluation_params.calculate_rate && have_previous_state) { |
352 | previous_unit_state = prev_state[loop_index]; | ||
398 | } | 353 | } |
399 | case ASN_IPADDRESS: | ||
400 | if (verbose) { | ||
401 | printf("Debug: Got an IP address\n"); | ||
402 | } | ||
403 | continue; | ||
404 | default: | ||
405 | if (verbose) { | ||
406 | printf("Debug: Got a unmatched result type: %hhu\n", vars->type); | ||
407 | } | ||
408 | // TODO: Error here? | ||
409 | continue; | ||
410 | } | ||
411 | |||
412 | // some kind of numerical value | ||
413 | mp_perfdata pd_num_val = { | ||
414 | .value = pd_result_val, | ||
415 | }; | ||
416 | 354 | ||
417 | if (!config.use_perf_data_labels_from_input) { | 355 | check_snmp_evaluation single_eval = |
418 | // Use oid for perdata label | 356 | evaluate_single_unit(response.response_values[loop_index], config.evaluation_params, |
419 | pd_num_val.label = strdup(oid_string); | 357 | config.snmp_params.test_units[loop_index], current_time, |
420 | // TODO strdup error checking | 358 | previous_unit_state, have_previous_state); |
421 | } else if (config.test_units[loop_index].label != NULL && | ||
422 | strcmp(config.test_units[loop_index].label, "") != 0) { | ||
423 | pd_num_val.label = config.test_units[loop_index].label; | ||
424 | } else { | ||
425 | pd_num_val.label = config.test_units[loop_index].oid; | ||
426 | } | ||
427 | 359 | ||
428 | if (config.test_units[loop_index].unit_value != NULL && | 360 | if (config.evaluation_params.calculate_rate && |
429 | strcmp(config.test_units[loop_index].unit_value, "") != 0) { | 361 | mp_compute_subcheck_state(single_eval.sc) != STATE_UNKNOWN) { |
430 | pd_num_val.uom = config.test_units[loop_index].unit_value; | 362 | new_state[loop_index] = single_eval.state; |
431 | } | 363 | } |
432 | 364 | ||
433 | xasprintf(&sc_oid_test.output, "%s Value: %s", sc_oid_test.output, | 365 | mp_add_subcheck_to_check(&overall, single_eval.sc); |
434 | pd_value_to_string(pd_result_val)); | 366 | } |
435 | 367 | ||
436 | if (config.test_units[loop_index].unit_value != NULL && | 368 | if (config.evaluation_params.calculate_rate) { |
437 | strcmp(config.test_units[loop_index].unit_value, "") != 0) { | 369 | // store state |
438 | xasprintf(&sc_oid_test.output, "%s%s", sc_oid_test.output, | 370 | gen_state_string_type current_state_wrapper = |
439 | config.test_units[loop_index].unit_value); | 371 | gen_state_string(new_state, config.snmp_params.num_of_test_units); |
440 | } | ||
441 | 372 | ||
442 | if (config.test_units[loop_index].threshold.warning_is_set || | 373 | if (current_state_wrapper.errorcode == OK) { |
443 | config.test_units[loop_index].threshold.critical_is_set) { | 374 | np_state_write_string(stateKey, current_time, current_state_wrapper.state_string); |
444 | pd_num_val = mp_pd_set_thresholds(pd_num_val, config.test_units[loop_index].threshold); | 375 | } else { |
445 | mp_state_enum tmp_state = mp_get_pd_status(pd_num_val); | 376 | die(STATE_UNKNOWN, "failed to create state string"); |
446 | |||
447 | if (tmp_state == STATE_WARNING) { | ||
448 | sc_oid_test = mp_set_subcheck_state(sc_oid_test, STATE_WARNING); | ||
449 | xasprintf(&sc_oid_test.output, "%s - number violates warning threshold", | ||
450 | sc_oid_test.output); | ||
451 | } else if (tmp_state == STATE_CRITICAL) { | ||
452 | sc_oid_test = mp_set_subcheck_state(sc_oid_test, STATE_CRITICAL); | ||
453 | xasprintf(&sc_oid_test.output, "%s - number violates critical threshold", | ||
454 | sc_oid_test.output); | ||
455 | } | ||
456 | } | 377 | } |
457 | |||
458 | mp_add_perfdata_to_subcheck(&sc_oid_test, pd_num_val); | ||
459 | |||
460 | mp_add_subcheck_to_check(&overall, sc_oid_test); | ||
461 | } | 378 | } |
462 | |||
463 | mp_exit(overall); | 379 | mp_exit(overall); |
464 | } | 380 | } |
465 | 381 | ||
@@ -472,6 +388,8 @@ static process_arguments_wrapper process_arguments(int argc, char **argv) { | |||
472 | ignore_mib_parsing_errors_index, | 388 | ignore_mib_parsing_errors_index, |
473 | connection_prefix_index, | 389 | connection_prefix_index, |
474 | output_format_index, | 390 | output_format_index, |
391 | calculate_rate, | ||
392 | rate_multiplier | ||
475 | }; | 393 | }; |
476 | 394 | ||
477 | static struct option longopts[] = { | 395 | static struct option longopts[] = { |
@@ -510,6 +428,8 @@ static process_arguments_wrapper process_arguments(int argc, char **argv) { | |||
510 | {"ignore-mib-parsing-errors", no_argument, 0, ignore_mib_parsing_errors_index}, | 428 | {"ignore-mib-parsing-errors", no_argument, 0, ignore_mib_parsing_errors_index}, |
511 | {"connection-prefix", required_argument, 0, connection_prefix_index}, | 429 | {"connection-prefix", required_argument, 0, connection_prefix_index}, |
512 | {"output-format", required_argument, 0, output_format_index}, | 430 | {"output-format", required_argument, 0, output_format_index}, |
431 | {"rate", no_argument, 0, calculate_rate}, | ||
432 | {"rate-multiplier", required_argument, 0, rate_multiplier}, | ||
513 | {0, 0, 0, 0}}; | 433 | {0, 0, 0, 0}}; |
514 | 434 | ||
515 | if (argc < 2) { | 435 | if (argc < 2) { |
@@ -575,8 +495,8 @@ static process_arguments_wrapper process_arguments(int argc, char **argv) { | |||
575 | } | 495 | } |
576 | 496 | ||
577 | check_snmp_config config = check_snmp_config_init(); | 497 | check_snmp_config config = check_snmp_config_init(); |
578 | config.test_units = tmp; | 498 | config.snmp_params.test_units = tmp; |
579 | config.num_of_test_units = oid_counter; | 499 | config.snmp_params.num_of_test_units = oid_counter; |
580 | 500 | ||
581 | option = 0; | 501 | option = 0; |
582 | optind = 1; // Reset argument scanner | 502 | optind = 1; // Reset argument scanner |
@@ -616,11 +536,11 @@ static process_arguments_wrapper process_arguments(int argc, char **argv) { | |||
616 | 536 | ||
617 | /* Connection info */ | 537 | /* Connection info */ |
618 | case 'C': /* group or community */ | 538 | case 'C': /* group or community */ |
619 | config.snmp_session.community = (unsigned char *)optarg; | 539 | config.snmp_params.snmp_session.community = (unsigned char *)optarg; |
620 | config.snmp_session.community_len = strlen(optarg); | 540 | config.snmp_params.snmp_session.community_len = strlen(optarg); |
621 | break; | 541 | break; |
622 | case 'H': /* Host or server */ | 542 | case 'H': /* Host or server */ |
623 | config.snmp_session.peername = optarg; | 543 | config.snmp_params.snmp_session.peername = optarg; |
624 | break; | 544 | break; |
625 | case 'p': /*port number */ | 545 | case 'p': /*port number */ |
626 | // Add port to "peername" below to not rely on argument order | 546 | // Add port to "peername" below to not rely on argument order |
@@ -630,15 +550,15 @@ static process_arguments_wrapper process_arguments(int argc, char **argv) { | |||
630 | miblist = optarg; | 550 | miblist = optarg; |
631 | break; | 551 | break; |
632 | case 'n': /* use_getnext instead of get */ | 552 | case 'n': /* use_getnext instead of get */ |
633 | config.use_getnext = true; | 553 | config.snmp_params.use_getnext = true; |
634 | break; | 554 | break; |
635 | case 'P': /* SNMP protocol version */ | 555 | case 'P': /* SNMP protocol version */ |
636 | if (strcasecmp("1", optarg) == 0) { | 556 | if (strcasecmp("1", optarg) == 0) { |
637 | config.snmp_session.version = SNMP_VERSION_1; | 557 | config.snmp_params.snmp_session.version = SNMP_VERSION_1; |
638 | } else if (strcasecmp("2c", optarg) == 0) { | 558 | } else if (strcasecmp("2c", optarg) == 0) { |
639 | config.snmp_session.version = SNMP_VERSION_2c; | 559 | config.snmp_params.snmp_session.version = SNMP_VERSION_2c; |
640 | } else if (strcasecmp("3", optarg) == 0) { | 560 | } else if (strcasecmp("3", optarg) == 0) { |
641 | config.snmp_session.version = SNMP_VERSION_3; | 561 | config.snmp_params.snmp_session.version = SNMP_VERSION_3; |
642 | } else { | 562 | } else { |
643 | die(STATE_UNKNOWN, "invalid SNMP version/protocol: %s", optarg); | 563 | die(STATE_UNKNOWN, "invalid SNMP version/protocol: %s", optarg); |
644 | } | 564 | } |
@@ -646,45 +566,51 @@ static process_arguments_wrapper process_arguments(int argc, char **argv) { | |||
646 | 566 | ||
647 | break; | 567 | break; |
648 | case 'N': /* SNMPv3 context name */ | 568 | case 'N': /* SNMPv3 context name */ |
649 | config.snmp_session.contextName = optarg; | 569 | config.snmp_params.snmp_session.contextName = optarg; |
650 | config.snmp_session.contextNameLen = strlen(optarg); | 570 | config.snmp_params.snmp_session.contextNameLen = strlen(optarg); |
651 | break; | 571 | break; |
652 | case 'L': /* security level */ | 572 | case 'L': /* security level */ |
653 | if (strcasecmp("noAuthNoPriv", optarg) == 0) { | 573 | if (strcasecmp("noAuthNoPriv", optarg) == 0) { |
654 | config.snmp_session.securityLevel = SNMP_SEC_LEVEL_NOAUTH; | 574 | config.snmp_params.snmp_session.securityLevel = SNMP_SEC_LEVEL_NOAUTH; |
655 | } else if (strcasecmp("authNoPriv", optarg) == 0) { | 575 | } else if (strcasecmp("authNoPriv", optarg) == 0) { |
656 | config.snmp_session.securityLevel = SNMP_SEC_LEVEL_AUTHNOPRIV; | 576 | config.snmp_params.snmp_session.securityLevel = SNMP_SEC_LEVEL_AUTHNOPRIV; |
657 | } else if (strcasecmp("authPriv", optarg) == 0) { | 577 | } else if (strcasecmp("authPriv", optarg) == 0) { |
658 | config.snmp_session.securityLevel = SNMP_SEC_LEVEL_AUTHPRIV; | 578 | config.snmp_params.snmp_session.securityLevel = SNMP_SEC_LEVEL_AUTHPRIV; |
659 | } else { | 579 | } else { |
660 | die(STATE_UNKNOWN, "invalid security level: %s", optarg); | 580 | die(STATE_UNKNOWN, "invalid security level: %s", optarg); |
661 | } | 581 | } |
662 | break; | 582 | break; |
663 | case 'U': /* security username */ | 583 | case 'U': /* security username */ |
664 | config.snmp_session.securityName = optarg; | 584 | config.snmp_params.snmp_session.securityName = optarg; |
665 | config.snmp_session.securityNameLen = strlen(optarg); | 585 | config.snmp_params.snmp_session.securityNameLen = strlen(optarg); |
666 | break; | 586 | break; |
667 | case 'a': /* auth protocol */ | 587 | case 'a': /* auth protocol */ |
668 | // SNMPv3: SHA or MD5 | 588 | // SNMPv3: SHA or MD5 |
669 | // TODO Test for availability of individual protocols | 589 | // TODO Test for availability of individual protocols |
670 | if (strcasecmp("MD5", optarg) == 0) { | 590 | if (strcasecmp("MD5", optarg) == 0) { |
671 | config.snmp_session.securityAuthProto = usmHMACMD5AuthProtocol; | 591 | config.snmp_params.snmp_session.securityAuthProto = usmHMACMD5AuthProtocol; |
672 | config.snmp_session.securityAuthProtoLen = OID_LENGTH(usmHMACMD5AuthProtocol); | 592 | config.snmp_params.snmp_session.securityAuthProtoLen = |
593 | OID_LENGTH(usmHMACMD5AuthProtocol); | ||
673 | } else if (strcasecmp("SHA", optarg) == 0) { | 594 | } else if (strcasecmp("SHA", optarg) == 0) { |
674 | config.snmp_session.securityAuthProto = usmHMACSHA1AuthProtocol; | 595 | config.snmp_params.snmp_session.securityAuthProto = usmHMACSHA1AuthProtocol; |
675 | config.snmp_session.securityAuthProtoLen = OID_LENGTH(usmHMACSHA1AuthProtocol); | 596 | config.snmp_params.snmp_session.securityAuthProtoLen = |
597 | OID_LENGTH(usmHMACSHA1AuthProtocol); | ||
676 | } else if (strcasecmp("SHA224", optarg) == 0) { | 598 | } else if (strcasecmp("SHA224", optarg) == 0) { |
677 | config.snmp_session.securityAuthProto = usmHMAC128SHA224AuthProtocol; | 599 | config.snmp_params.snmp_session.securityAuthProto = usmHMAC128SHA224AuthProtocol; |
678 | config.snmp_session.securityAuthProtoLen = OID_LENGTH(usmHMAC128SHA224AuthProtocol); | 600 | config.snmp_params.snmp_session.securityAuthProtoLen = |
601 | OID_LENGTH(usmHMAC128SHA224AuthProtocol); | ||
679 | } else if (strcasecmp("SHA256", optarg) == 0) { | 602 | } else if (strcasecmp("SHA256", optarg) == 0) { |
680 | config.snmp_session.securityAuthProto = usmHMAC192SHA256AuthProtocol; | 603 | config.snmp_params.snmp_session.securityAuthProto = usmHMAC192SHA256AuthProtocol; |
681 | config.snmp_session.securityAuthProtoLen = OID_LENGTH(usmHMAC192SHA256AuthProtocol); | 604 | config.snmp_params.snmp_session.securityAuthProtoLen = |
605 | OID_LENGTH(usmHMAC192SHA256AuthProtocol); | ||
682 | } else if (strcasecmp("SHA384", optarg) == 0) { | 606 | } else if (strcasecmp("SHA384", optarg) == 0) { |
683 | config.snmp_session.securityAuthProto = usmHMAC256SHA384AuthProtocol; | 607 | config.snmp_params.snmp_session.securityAuthProto = usmHMAC256SHA384AuthProtocol; |
684 | config.snmp_session.securityAuthProtoLen = OID_LENGTH(usmHMAC256SHA384AuthProtocol); | 608 | config.snmp_params.snmp_session.securityAuthProtoLen = |
609 | OID_LENGTH(usmHMAC256SHA384AuthProtocol); | ||
685 | } else if (strcasecmp("SHA512", optarg) == 0) { | 610 | } else if (strcasecmp("SHA512", optarg) == 0) { |
686 | config.snmp_session.securityAuthProto = usmHMAC384SHA512AuthProtocol; | 611 | config.snmp_params.snmp_session.securityAuthProto = usmHMAC384SHA512AuthProtocol; |
687 | config.snmp_session.securityAuthProtoLen = OID_LENGTH(usmHMAC384SHA512AuthProtocol); | 612 | config.snmp_params.snmp_session.securityAuthProtoLen = |
613 | OID_LENGTH(usmHMAC384SHA512AuthProtocol); | ||
688 | } else { | 614 | } else { |
689 | die(STATE_UNKNOWN, "Unknown authentication protocol"); | 615 | die(STATE_UNKNOWN, "Unknown authentication protocol"); |
690 | } | 616 | } |
@@ -692,24 +618,28 @@ static process_arguments_wrapper process_arguments(int argc, char **argv) { | |||
692 | case 'x': /* priv protocol */ | 618 | case 'x': /* priv protocol */ |
693 | if (strcasecmp("DES", optarg) == 0) { | 619 | if (strcasecmp("DES", optarg) == 0) { |
694 | #ifdef HAVE_USM_DES_PRIV_PROTOCOL | 620 | #ifdef HAVE_USM_DES_PRIV_PROTOCOL |
695 | config.snmp_session.securityAuthProto = usmDESPrivProtocol; | 621 | config.snmp_params.snmp_session.securityAuthProto = usmDESPrivProtocol; |
696 | config.snmp_session.securityAuthProtoLen = OID_LENGTH(usmDESPrivProtocol); | 622 | config.snmp_params.snmp_session.securityAuthProtoLen = |
623 | OID_LENGTH(usmDESPrivProtocol); | ||
697 | #else | 624 | #else |
698 | die(STATE_UNKNOWN, "DES Privacy Protocol not available on this platform"); | 625 | die(STATE_UNKNOWN, "DES Privacy Protocol not available on this platform"); |
699 | #endif | 626 | #endif |
700 | } else if (strcasecmp("AES", optarg) == 0) { | 627 | } else if (strcasecmp("AES", optarg) == 0) { |
701 | config.snmp_session.securityAuthProto = usmAESPrivProtocol; | 628 | config.snmp_params.snmp_session.securityAuthProto = usmAESPrivProtocol; |
702 | config.snmp_session.securityAuthProtoLen = OID_LENGTH(usmAESPrivProtocol); | 629 | config.snmp_params.snmp_session.securityAuthProtoLen = |
630 | OID_LENGTH(usmAESPrivProtocol); | ||
703 | // } else if (strcasecmp("AES128", optarg)) { | 631 | // } else if (strcasecmp("AES128", optarg)) { |
704 | // config.snmp_session.securityAuthProto = usmAES128PrivProtocol; | 632 | // config.snmp_session.securityAuthProto = usmAES128PrivProtocol; |
705 | // config.snmp_session.securityAuthProtoLen = OID_LENGTH(usmAES128PrivProtocol) | 633 | // config.snmp_session.securityAuthProtoLen = OID_LENGTH(usmAES128PrivProtocol) |
706 | // / OID_LENGTH(oid); | 634 | // / OID_LENGTH(oid); |
707 | } else if (strcasecmp("AES192", optarg) == 0) { | 635 | } else if (strcasecmp("AES192", optarg) == 0) { |
708 | config.snmp_session.securityAuthProto = usmAES192PrivProtocol; | 636 | config.snmp_params.snmp_session.securityAuthProto = usmAES192PrivProtocol; |
709 | config.snmp_session.securityAuthProtoLen = OID_LENGTH(usmAES192PrivProtocol); | 637 | config.snmp_params.snmp_session.securityAuthProtoLen = |
638 | OID_LENGTH(usmAES192PrivProtocol); | ||
710 | } else if (strcasecmp("AES256", optarg) == 0) { | 639 | } else if (strcasecmp("AES256", optarg) == 0) { |
711 | config.snmp_session.securityAuthProto = usmAES256PrivProtocol; | 640 | config.snmp_params.snmp_session.securityAuthProto = usmAES256PrivProtocol; |
712 | config.snmp_session.securityAuthProtoLen = OID_LENGTH(usmAES256PrivProtocol); | 641 | config.snmp_params.snmp_session.securityAuthProtoLen = |
642 | OID_LENGTH(usmAES256PrivProtocol); | ||
713 | // } else if (strcasecmp("AES192Cisco", optarg)) { | 643 | // } else if (strcasecmp("AES192Cisco", optarg)) { |
714 | // config.snmp_session.securityAuthProto = usmAES192CiscoPrivProtocol; | 644 | // config.snmp_session.securityAuthProto = usmAES192CiscoPrivProtocol; |
715 | // config.snmp_session.securityAuthProtoLen = | 645 | // config.snmp_session.securityAuthProtoLen = |
@@ -738,7 +668,7 @@ static process_arguments_wrapper process_arguments(int argc, char **argv) { | |||
738 | if (!is_integer(optarg)) { | 668 | if (!is_integer(optarg)) { |
739 | usage2(_("Retries interval must be a positive integer"), optarg); | 669 | usage2(_("Retries interval must be a positive integer"), optarg); |
740 | } else { | 670 | } else { |
741 | config.snmp_session.retries = atoi(optarg); | 671 | config.snmp_params.snmp_session.retries = atoi(optarg); |
742 | } | 672 | } |
743 | break; | 673 | break; |
744 | case 't': /* timeout period */ | 674 | case 't': /* timeout period */ |
@@ -751,10 +681,10 @@ static process_arguments_wrapper process_arguments(int argc, char **argv) { | |||
751 | 681 | ||
752 | /* Test parameters */ | 682 | /* Test parameters */ |
753 | case 'c': /* critical threshold */ | 683 | case 'c': /* critical threshold */ |
754 | check_snmp_set_thresholds(optarg, config.test_units, oid_counter, true); | 684 | check_snmp_set_thresholds(optarg, config.snmp_params.test_units, oid_counter, true); |
755 | break; | 685 | break; |
756 | case 'w': /* warning threshold */ | 686 | case 'w': /* warning threshold */ |
757 | check_snmp_set_thresholds(optarg, config.test_units, oid_counter, false); | 687 | check_snmp_set_thresholds(optarg, config.snmp_params.test_units, oid_counter, false); |
758 | break; | 688 | break; |
759 | case 'o': /* object identifier */ | 689 | case 'o': /* object identifier */ |
760 | if (strspn(optarg, "0123456789.,") != strlen(optarg)) { | 690 | if (strspn(optarg, "0123456789.,") != strlen(optarg)) { |
@@ -763,25 +693,27 @@ static process_arguments_wrapper process_arguments(int argc, char **argv) { | |||
763 | * so we have a mib variable, rather than just an SNMP OID, | 693 | * so we have a mib variable, rather than just an SNMP OID, |
764 | * so we have to actually read the mib files | 694 | * so we have to actually read the mib files |
765 | */ | 695 | */ |
766 | config.need_mibs = true; | 696 | config.snmp_params.need_mibs = true; |
767 | } | 697 | } |
768 | 698 | ||
769 | for (char *ptr = strtok(optarg, ", "); ptr != NULL; | 699 | for (char *ptr = strtok(optarg, ", "); ptr != NULL; |
770 | ptr = strtok(NULL, ", "), tmp_oid_counter++) { | 700 | ptr = strtok(NULL, ", "), tmp_oid_counter++) { |
771 | config.test_units[tmp_oid_counter].oid = strdup(ptr); | 701 | config.snmp_params.test_units[tmp_oid_counter].oid = strdup(ptr); |
772 | } | 702 | } |
773 | break; | 703 | break; |
774 | case 'z': /* Null OID Return Check */ | 704 | case 'z': /* Null OID Return Check */ |
775 | if (!is_integer(optarg)) { | 705 | if (!is_integer(optarg)) { |
776 | usage2(_("Exit status must be a positive integer"), optarg); | 706 | usage2(_("Exit status must be a positive integer"), optarg); |
777 | } else { | 707 | } else { |
778 | config.nulloid_result = atoi(optarg); | 708 | config.evaluation_params.nulloid_result = atoi(optarg); |
779 | } | 709 | } |
780 | break; | 710 | break; |
781 | case 's': /* string or substring */ | 711 | case 's': /* string or substring */ |
782 | strncpy(config.string_cmp_value, optarg, sizeof(config.string_cmp_value) - 1); | 712 | strncpy(config.evaluation_params.string_cmp_value, optarg, |
783 | config.string_cmp_value[sizeof(config.string_cmp_value) - 1] = 0; | 713 | sizeof(config.evaluation_params.string_cmp_value) - 1); |
784 | config.test_units[eval_counter++].eval_mthd.crit_string = true; | 714 | config.evaluation_params |
715 | .string_cmp_value[sizeof(config.evaluation_params.string_cmp_value) - 1] = 0; | ||
716 | config.snmp_params.test_units[eval_counter++].eval_mthd.crit_string = true; | ||
785 | break; | 717 | break; |
786 | case 'R': /* regex */ | 718 | case 'R': /* regex */ |
787 | cflags = REG_ICASE; | 719 | cflags = REG_ICASE; |
@@ -792,72 +724,73 @@ static process_arguments_wrapper process_arguments(int argc, char **argv) { | |||
792 | cflags |= REG_EXTENDED | REG_NOSUB | REG_NEWLINE; | 724 | cflags |= REG_EXTENDED | REG_NOSUB | REG_NEWLINE; |
793 | strncpy(regex_expect, optarg, sizeof(regex_expect) - 1); | 725 | strncpy(regex_expect, optarg, sizeof(regex_expect) - 1); |
794 | regex_expect[sizeof(regex_expect) - 1] = 0; | 726 | regex_expect[sizeof(regex_expect) - 1] = 0; |
795 | int errcode = regcomp(&config.regex_cmp_value, regex_expect, cflags); | 727 | int errcode = regcomp(&config.evaluation_params.regex_cmp_value, regex_expect, cflags); |
796 | if (errcode != 0) { | 728 | if (errcode != 0) { |
797 | char errbuf[MAX_INPUT_BUFFER] = ""; | 729 | char errbuf[MAX_INPUT_BUFFER] = ""; |
798 | regerror(errcode, &config.regex_cmp_value, errbuf, MAX_INPUT_BUFFER); | 730 | regerror(errcode, &config.evaluation_params.regex_cmp_value, errbuf, |
731 | MAX_INPUT_BUFFER); | ||
799 | printf("Could Not Compile Regular Expression: %s", errbuf); | 732 | printf("Could Not Compile Regular Expression: %s", errbuf); |
800 | process_arguments_wrapper result = { | 733 | process_arguments_wrapper result = { |
801 | .errorcode = ERROR, | 734 | .errorcode = ERROR, |
802 | }; | 735 | }; |
803 | return result; | 736 | return result; |
804 | } | 737 | } |
805 | config.test_units[eval_counter++].eval_mthd.crit_regex = true; | 738 | config.snmp_params.test_units[eval_counter++].eval_mthd.crit_regex = true; |
806 | } break; | 739 | } break; |
807 | case 'l': /* label */ | 740 | case 'l': /* label */ |
808 | { | 741 | { |
809 | if (labels_counter >= config.num_of_test_units) { | 742 | if (labels_counter >= config.snmp_params.num_of_test_units) { |
810 | break; | 743 | break; |
811 | } | 744 | } |
812 | char *ptr = trim_whitespaces_and_check_quoting(optarg); | 745 | char *ptr = trim_whitespaces_and_check_quoting(optarg); |
813 | if (ptr[0] == '\'') { | 746 | if (ptr[0] == '\'') { |
814 | config.test_units[labels_counter].label = ptr + 1; | 747 | config.snmp_params.test_units[labels_counter].label = ptr + 1; |
815 | } else { | 748 | } else { |
816 | config.test_units[labels_counter].label = ptr; | 749 | config.snmp_params.test_units[labels_counter].label = ptr; |
817 | } | 750 | } |
818 | 751 | ||
819 | while (ptr && (ptr = get_next_argument(ptr))) { | 752 | while (ptr && (ptr = get_next_argument(ptr))) { |
820 | labels_counter++; | 753 | labels_counter++; |
821 | ptr = trim_whitespaces_and_check_quoting(ptr); | 754 | ptr = trim_whitespaces_and_check_quoting(ptr); |
822 | if (ptr[0] == '\'') { | 755 | if (ptr[0] == '\'') { |
823 | config.test_units[labels_counter].label = ptr + 1; | 756 | config.snmp_params.test_units[labels_counter].label = ptr + 1; |
824 | } else { | 757 | } else { |
825 | config.test_units[labels_counter].label = ptr; | 758 | config.snmp_params.test_units[labels_counter].label = ptr; |
826 | } | 759 | } |
827 | } | 760 | } |
828 | labels_counter++; | 761 | labels_counter++; |
829 | } break; | 762 | } break; |
830 | case 'u': /* units */ | 763 | case 'u': /* units */ |
831 | { | 764 | { |
832 | if (unitv_counter >= config.num_of_test_units) { | 765 | if (unitv_counter >= config.snmp_params.num_of_test_units) { |
833 | break; | 766 | break; |
834 | } | 767 | } |
835 | char *ptr = trim_whitespaces_and_check_quoting(optarg); | 768 | char *ptr = trim_whitespaces_and_check_quoting(optarg); |
836 | if (ptr[0] == '\'') { | 769 | if (ptr[0] == '\'') { |
837 | config.test_units[unitv_counter].unit_value = ptr + 1; | 770 | config.snmp_params.test_units[unitv_counter].unit_value = ptr + 1; |
838 | } else { | 771 | } else { |
839 | config.test_units[unitv_counter].unit_value = ptr; | 772 | config.snmp_params.test_units[unitv_counter].unit_value = ptr; |
840 | } | 773 | } |
841 | while (ptr && (ptr = get_next_argument(ptr))) { | 774 | while (ptr && (ptr = get_next_argument(ptr))) { |
842 | unitv_counter++; | 775 | unitv_counter++; |
843 | ptr = trim_whitespaces_and_check_quoting(ptr); | 776 | ptr = trim_whitespaces_and_check_quoting(ptr); |
844 | if (ptr[0] == '\'') { | 777 | if (ptr[0] == '\'') { |
845 | config.test_units[unitv_counter].unit_value = ptr + 1; | 778 | config.snmp_params.test_units[unitv_counter].unit_value = ptr + 1; |
846 | } else { | 779 | } else { |
847 | config.test_units[unitv_counter].unit_value = ptr; | 780 | config.snmp_params.test_units[unitv_counter].unit_value = ptr; |
848 | } | 781 | } |
849 | } | 782 | } |
850 | unitv_counter++; | 783 | unitv_counter++; |
851 | } break; | 784 | } break; |
852 | case offset_index: | 785 | case offset_index: |
853 | config.offset = strtod(optarg, NULL); | 786 | config.evaluation_params.offset = strtod(optarg, NULL); |
854 | config.offset_set = true; | 787 | config.evaluation_params.offset_set = true; |
855 | break; | 788 | break; |
856 | case invert_search_index: | 789 | case invert_search_index: |
857 | config.invert_search = false; | 790 | config.evaluation_params.invert_search = false; |
858 | break; | 791 | break; |
859 | case 'O': | 792 | case 'O': |
860 | config.use_perf_data_labels_from_input = true; | 793 | config.evaluation_params.use_oid_as_perf_data_label = true; |
861 | break; | 794 | break; |
862 | case '4': | 795 | case '4': |
863 | // The default, do something here to be exclusive to -6 instead of doing nothing? | 796 | // The default, do something here to be exclusive to -6 instead of doing nothing? |
@@ -871,12 +804,12 @@ static process_arguments_wrapper process_arguments(int argc, char **argv) { | |||
871 | break; | 804 | break; |
872 | case 'M': | 805 | case 'M': |
873 | if (strspn(optarg, "0123456789.,") == strlen(optarg)) { | 806 | if (strspn(optarg, "0123456789.,") == strlen(optarg)) { |
874 | config.multiplier = strtod(optarg, NULL); | 807 | config.evaluation_params.multiplier = strtod(optarg, NULL); |
875 | config.multiplier_set = true; | 808 | config.evaluation_params.multiplier_set = true; |
876 | } | 809 | } |
877 | break; | 810 | break; |
878 | case ignore_mib_parsing_errors_index: | 811 | case ignore_mib_parsing_errors_index: |
879 | config.ignore_mib_parsing_errors = true; | 812 | config.snmp_params.ignore_mib_parsing_errors = true; |
880 | break; | 813 | break; |
881 | case 'f': // Deprecated format option for floating point values | 814 | case 'f': // Deprecated format option for floating point values |
882 | break; | 815 | break; |
@@ -892,13 +825,22 @@ static process_arguments_wrapper process_arguments(int argc, char **argv) { | |||
892 | config.output_format = parser.output_format; | 825 | config.output_format = parser.output_format; |
893 | break; | 826 | break; |
894 | } | 827 | } |
828 | case calculate_rate: | ||
829 | config.evaluation_params.calculate_rate = true; | ||
830 | break; | ||
831 | case rate_multiplier: | ||
832 | if (!is_integer(optarg) || | ||
833 | ((config.evaluation_params.rate_multiplier = (unsigned int)atoi(optarg)) <= 0)) { | ||
834 | usage2(_("Rate multiplier must be a positive integer"), optarg); | ||
835 | } | ||
836 | break; | ||
895 | default: | 837 | default: |
896 | die(STATE_UNKNOWN, "Unknown option"); | 838 | die(STATE_UNKNOWN, "Unknown option"); |
897 | } | 839 | } |
898 | } | 840 | } |
899 | 841 | ||
900 | if (config.snmp_session.peername == NULL) { | 842 | if (config.snmp_params.snmp_session.peername == NULL) { |
901 | config.snmp_session.peername = argv[optind]; | 843 | config.snmp_params.snmp_session.peername = argv[optind]; |
902 | } | 844 | } |
903 | 845 | ||
904 | // Build true peername here if necessary | 846 | // Build true peername here if necessary |
@@ -908,7 +850,8 @@ static process_arguments_wrapper process_arguments(int argc, char **argv) { | |||
908 | // The default, do nothing | 850 | // The default, do nothing |
909 | } else if (strcasecmp(connection_prefix, "tcp") == 0) { | 851 | } else if (strcasecmp(connection_prefix, "tcp") == 0) { |
910 | // use tcp/ipv4 | 852 | // use tcp/ipv4 |
911 | xasprintf(&config.snmp_session.peername, "tcp:%s", config.snmp_session.peername); | 853 | xasprintf(&config.snmp_params.snmp_session.peername, "tcp:%s", |
854 | config.snmp_params.snmp_session.peername); | ||
912 | } else if (strcasecmp(connection_prefix, "tcp6") == 0 || | 855 | } else if (strcasecmp(connection_prefix, "tcp6") == 0 || |
913 | strcasecmp(connection_prefix, "tcpv6") == 0 || | 856 | strcasecmp(connection_prefix, "tcpv6") == 0 || |
914 | strcasecmp(connection_prefix, "tcpipv6") == 0 || | 857 | strcasecmp(connection_prefix, "tcpipv6") == 0 || |
@@ -917,19 +860,23 @@ static process_arguments_wrapper process_arguments(int argc, char **argv) { | |||
917 | strcasecmp(connection_prefix, "udpv6") == 0) { | 860 | strcasecmp(connection_prefix, "udpv6") == 0) { |
918 | // Man page (or net-snmp) code says IPv6 addresses should be wrapped in [], but it | 861 | // Man page (or net-snmp) code says IPv6 addresses should be wrapped in [], but it |
919 | // works anyway therefore do nothing here | 862 | // works anyway therefore do nothing here |
920 | xasprintf(&config.snmp_session.peername, "%s:%s", connection_prefix, | 863 | xasprintf(&config.snmp_params.snmp_session.peername, "%s:%s", connection_prefix, |
921 | config.snmp_session.peername); | 864 | config.snmp_params.snmp_session.peername); |
922 | } else if (strcmp(connection_prefix, "tls") == 0) { | 865 | } else if (strcmp(connection_prefix, "tls") == 0) { |
923 | // TODO: Anything else to do here? | 866 | // TODO: Anything else to do here? |
924 | xasprintf(&config.snmp_session.peername, "tls:%s", config.snmp_session.peername); | 867 | xasprintf(&config.snmp_params.snmp_session.peername, "tls:%s", |
868 | config.snmp_params.snmp_session.peername); | ||
925 | } else if (strcmp(connection_prefix, "dtls") == 0) { | 869 | } else if (strcmp(connection_prefix, "dtls") == 0) { |
926 | // TODO: Anything else to do here? | 870 | // TODO: Anything else to do here? |
927 | xasprintf(&config.snmp_session.peername, "dtls:%s", config.snmp_session.peername); | 871 | xasprintf(&config.snmp_params.snmp_session.peername, "dtls:%s", |
872 | config.snmp_params.snmp_session.peername); | ||
928 | } else if (strcmp(connection_prefix, "unix") == 0) { | 873 | } else if (strcmp(connection_prefix, "unix") == 0) { |
929 | // TODO: Check whether this is a valid path? | 874 | // TODO: Check whether this is a valid path? |
930 | xasprintf(&config.snmp_session.peername, "unix:%s", config.snmp_session.peername); | 875 | xasprintf(&config.snmp_params.snmp_session.peername, "unix:%s", |
876 | config.snmp_params.snmp_session.peername); | ||
931 | } else if (strcmp(connection_prefix, "ipx") == 0) { | 877 | } else if (strcmp(connection_prefix, "ipx") == 0) { |
932 | xasprintf(&config.snmp_session.peername, "ipx:%s", config.snmp_session.peername); | 878 | xasprintf(&config.snmp_params.snmp_session.peername, "ipx:%s", |
879 | config.snmp_params.snmp_session.peername); | ||
933 | } else { | 880 | } else { |
934 | // Don't know that prefix, die here | 881 | // Don't know that prefix, die here |
935 | die(STATE_UNKNOWN, "Unknown connection prefix"); | 882 | die(STATE_UNKNOWN, "Unknown connection prefix"); |
@@ -937,17 +884,18 @@ static process_arguments_wrapper process_arguments(int argc, char **argv) { | |||
937 | } | 884 | } |
938 | 885 | ||
939 | /* Check server_address is given */ | 886 | /* Check server_address is given */ |
940 | if (config.snmp_session.peername == NULL) { | 887 | if (config.snmp_params.snmp_session.peername == NULL) { |
941 | die(STATE_UNKNOWN, _("No host specified\n")); | 888 | die(STATE_UNKNOWN, _("No host specified\n")); |
942 | } | 889 | } |
943 | 890 | ||
944 | if (port != NULL) { | 891 | if (port != NULL) { |
945 | xasprintf(&config.snmp_session.peername, "%s:%s", config.snmp_session.peername, port); | 892 | xasprintf(&config.snmp_params.snmp_session.peername, "%s:%s", |
893 | config.snmp_params.snmp_session.peername, port); | ||
946 | } | 894 | } |
947 | 895 | ||
948 | /* check whether to load locally installed MIBS (CPU/disk intensive) */ | 896 | /* check whether to load locally installed MIBS (CPU/disk intensive) */ |
949 | if (miblist == NULL) { | 897 | if (miblist == NULL) { |
950 | if (config.need_mibs) { | 898 | if (config.snmp_params.need_mibs) { |
951 | setenv("MIBLS", DEFAULT_MIBLIST, 1); | 899 | setenv("MIBLS", DEFAULT_MIBLIST, 1); |
952 | } else { | 900 | } else { |
953 | setenv("MIBLS", "NONE", 1); | 901 | setenv("MIBLS", "NONE", 1); |
@@ -959,37 +907,37 @@ static process_arguments_wrapper process_arguments(int argc, char **argv) { | |||
959 | } | 907 | } |
960 | 908 | ||
961 | // Historical default is SNMP v2c | 909 | // Historical default is SNMP v2c |
962 | if (!snmp_version_set_explicitely && config.snmp_session.community != NULL) { | 910 | if (!snmp_version_set_explicitely && config.snmp_params.snmp_session.community != NULL) { |
963 | config.snmp_session.version = SNMP_VERSION_2c; | 911 | config.snmp_params.snmp_session.version = SNMP_VERSION_2c; |
964 | } | 912 | } |
965 | 913 | ||
966 | if ((config.snmp_session.version == SNMP_VERSION_1) || | 914 | if ((config.snmp_params.snmp_session.version == SNMP_VERSION_1) || |
967 | (config.snmp_session.version == SNMP_VERSION_2c)) { /* snmpv1 or snmpv2c */ | 915 | (config.snmp_params.snmp_session.version == SNMP_VERSION_2c)) { /* snmpv1 or snmpv2c */ |
968 | /* | 916 | /* |
969 | config.numauthpriv = 2; | 917 | config.numauthpriv = 2; |
970 | config.authpriv = calloc(config.numauthpriv, sizeof(char *)); | 918 | config.authpriv = calloc(config.numauthpriv, sizeof(char *)); |
971 | config.authpriv[0] = strdup("-c"); | 919 | config.authpriv[0] = strdup("-c"); |
972 | config.authpriv[1] = strdup(community); | 920 | config.authpriv[1] = strdup(community); |
973 | */ | 921 | */ |
974 | } else if (config.snmp_session.version == SNMP_VERSION_3) { /* snmpv3 args */ | 922 | } else if (config.snmp_params.snmp_session.version == SNMP_VERSION_3) { /* snmpv3 args */ |
975 | // generate keys for priv and auth here (if demanded) | 923 | // generate keys for priv and auth here (if demanded) |
976 | 924 | ||
977 | if (config.snmp_session.securityName == NULL) { | 925 | if (config.snmp_params.snmp_session.securityName == NULL) { |
978 | die(STATE_UNKNOWN, _("Required parameter: %s\n"), "secname"); | 926 | die(STATE_UNKNOWN, _("Required parameter: %s\n"), "secname"); |
979 | } | 927 | } |
980 | 928 | ||
981 | switch (config.snmp_session.securityLevel) { | 929 | switch (config.snmp_params.snmp_session.securityLevel) { |
982 | case SNMP_SEC_LEVEL_AUTHPRIV: { | 930 | case SNMP_SEC_LEVEL_AUTHPRIV: { |
983 | if (authpasswd == NULL) { | 931 | if (authpasswd == NULL) { |
984 | die(STATE_UNKNOWN, | 932 | die(STATE_UNKNOWN, |
985 | "No authentication passphrase was given, but authorization was requested"); | 933 | "No authentication passphrase was given, but authorization was requested"); |
986 | } | 934 | } |
987 | // auth and priv | 935 | // auth and priv |
988 | int priv_key_generated = | 936 | int priv_key_generated = generate_Ku( |
989 | generate_Ku(config.snmp_session.securityPrivProto, | 937 | config.snmp_params.snmp_session.securityPrivProto, |
990 | (unsigned int)config.snmp_session.securityPrivProtoLen, authpasswd, | 938 | (unsigned int)config.snmp_params.snmp_session.securityPrivProtoLen, authpasswd, |
991 | strlen((const char *)authpasswd), config.snmp_session.securityPrivKey, | 939 | strlen((const char *)authpasswd), config.snmp_params.snmp_session.securityPrivKey, |
992 | &config.snmp_session.securityPrivKeyLen); | 940 | &config.snmp_params.snmp_session.securityPrivKeyLen); |
993 | 941 | ||
994 | if (priv_key_generated != SNMPERR_SUCCESS) { | 942 | if (priv_key_generated != SNMPERR_SUCCESS) { |
995 | die(STATE_UNKNOWN, "Failed to generate privacy key"); | 943 | die(STATE_UNKNOWN, "Failed to generate privacy key"); |
@@ -1000,11 +948,11 @@ static process_arguments_wrapper process_arguments(int argc, char **argv) { | |||
1000 | if (privpasswd == NULL) { | 948 | if (privpasswd == NULL) { |
1001 | die(STATE_UNKNOWN, "No privacy passphrase was given, but privacy was requested"); | 949 | die(STATE_UNKNOWN, "No privacy passphrase was given, but privacy was requested"); |
1002 | } | 950 | } |
1003 | int auth_key_generated = | 951 | int auth_key_generated = generate_Ku( |
1004 | generate_Ku(config.snmp_session.securityAuthProto, | 952 | config.snmp_params.snmp_session.securityAuthProto, |
1005 | (unsigned int)config.snmp_session.securityAuthProtoLen, privpasswd, | 953 | (unsigned int)config.snmp_params.snmp_session.securityAuthProtoLen, privpasswd, |
1006 | strlen((const char *)privpasswd), config.snmp_session.securityAuthKey, | 954 | strlen((const char *)privpasswd), config.snmp_params.snmp_session.securityAuthKey, |
1007 | &config.snmp_session.securityAuthKeyLen); | 955 | &config.snmp_params.snmp_session.securityAuthKeyLen); |
1008 | 956 | ||
1009 | if (auth_key_generated != SNMPERR_SUCCESS) { | 957 | if (auth_key_generated != SNMPERR_SUCCESS) { |
1010 | die(STATE_UNKNOWN, "Failed to generate privacy key"); | 958 | die(STATE_UNKNOWN, "Failed to generate privacy key"); |
diff --git a/plugins/check_snmp.d/check_snmp_helpers.c b/plugins/check_snmp.d/check_snmp_helpers.c index 8f4bcb9c..9fa396d8 100644 --- a/plugins/check_snmp.d/check_snmp_helpers.c +++ b/plugins/check_snmp.d/check_snmp_helpers.c | |||
@@ -1,6 +1,15 @@ | |||
1 | #include "./check_snmp_helpers.h" | 1 | #include "./check_snmp_helpers.h" |
2 | #include <string.h> | 2 | #include <string.h> |
3 | #include "../../lib/utils_base.h" | 3 | #include "../../lib/utils_base.h" |
4 | #include "config.h" | ||
5 | #include <assert.h> | ||
6 | #include "../utils.h" | ||
7 | #include "output.h" | ||
8 | #include "states.h" | ||
9 | #include <sys/stat.h> | ||
10 | #include <ctype.h> | ||
11 | |||
12 | extern int verbose; | ||
4 | 13 | ||
5 | check_snmp_test_unit check_snmp_test_unit_init() { | 14 | check_snmp_test_unit check_snmp_test_unit_init() { |
6 | check_snmp_test_unit tmp = { | 15 | check_snmp_test_unit tmp = { |
@@ -78,38 +87,848 @@ int check_snmp_set_thresholds(const char *threshold_string, check_snmp_test_unit | |||
78 | const int DEFAULT_PROTOCOL = SNMP_VERSION_1; | 87 | const int DEFAULT_PROTOCOL = SNMP_VERSION_1; |
79 | const char DEFAULT_OUTPUT_DELIMITER[] = " "; | 88 | const char DEFAULT_OUTPUT_DELIMITER[] = " "; |
80 | 89 | ||
81 | const int RANDOM_STATE_DATA_LENGTH_PREDICTION = 1024; | 90 | const int RANDOM_STATE_DATA_LENGTH_PREDICTION = 8192; |
82 | 91 | ||
83 | check_snmp_config check_snmp_config_init() { | 92 | check_snmp_config check_snmp_config_init() { |
84 | check_snmp_config tmp = { | 93 | check_snmp_config tmp = { |
85 | .use_getnext = false, | 94 | .snmp_params = |
95 | { | ||
96 | .use_getnext = false, | ||
97 | |||
98 | .ignore_mib_parsing_errors = false, | ||
99 | .need_mibs = false, | ||
86 | 100 | ||
87 | .ignore_mib_parsing_errors = false, | 101 | .test_units = NULL, |
88 | .need_mibs = false, | 102 | .num_of_test_units = 0, |
103 | }, | ||
89 | 104 | ||
90 | .test_units = NULL, | 105 | .evaluation_params = |
91 | .num_of_test_units = 0, | 106 | { |
107 | .nulloid_result = STATE_UNKNOWN, // state to return if no result for query | ||
92 | 108 | ||
93 | .nulloid_result = STATE_UNKNOWN, // state to return if no result for query | 109 | .invert_search = true, |
110 | .regex_cmp_value = {}, | ||
111 | .string_cmp_value = "", | ||
94 | 112 | ||
95 | .invert_search = true, | 113 | .multiplier = 1.0, |
96 | .regex_cmp_value = {}, | 114 | .multiplier_set = false, |
97 | .string_cmp_value = "", | 115 | .offset = 0, |
116 | .offset_set = false, | ||
98 | 117 | ||
99 | .multiplier = 1.0, | 118 | .use_oid_as_perf_data_label = false, |
100 | .multiplier_set = false, | ||
101 | .offset = 0, | ||
102 | .offset_set = false, | ||
103 | 119 | ||
104 | .use_perf_data_labels_from_input = false, | 120 | .calculate_rate = false, |
121 | .rate_multiplier = 1, | ||
122 | }, | ||
105 | }; | 123 | }; |
106 | 124 | ||
107 | snmp_sess_init(&tmp.snmp_session); | 125 | snmp_sess_init(&tmp.snmp_params.snmp_session); |
108 | 126 | ||
109 | tmp.snmp_session.retries = DEFAULT_RETRIES; | 127 | tmp.snmp_params.snmp_session.retries = DEFAULT_RETRIES; |
110 | tmp.snmp_session.version = DEFAULT_SNMP_VERSION; | 128 | tmp.snmp_params.snmp_session.version = DEFAULT_SNMP_VERSION; |
111 | tmp.snmp_session.securityLevel = SNMP_SEC_LEVEL_NOAUTH; | 129 | tmp.snmp_params.snmp_session.securityLevel = SNMP_SEC_LEVEL_NOAUTH; |
112 | tmp.snmp_session.community = (unsigned char *)"public"; | 130 | tmp.snmp_params.snmp_session.community = (unsigned char *)"public"; |
113 | tmp.snmp_session.community_len = strlen("public"); | 131 | tmp.snmp_params.snmp_session.community_len = strlen("public"); |
114 | return tmp; | 132 | return tmp; |
115 | } | 133 | } |
134 | |||
135 | snmp_responces do_snmp_query(check_snmp_config_snmp_parameters parameters) { | ||
136 | if (parameters.ignore_mib_parsing_errors) { | ||
137 | char *opt_toggle_res = snmp_mib_toggle_options("e"); | ||
138 | if (opt_toggle_res != NULL) { | ||
139 | die(STATE_UNKNOWN, "Unable to disable MIB parsing errors"); | ||
140 | } | ||
141 | } | ||
142 | |||
143 | struct snmp_pdu *pdu = NULL; | ||
144 | if (parameters.use_getnext) { | ||
145 | pdu = snmp_pdu_create(SNMP_MSG_GETNEXT); | ||
146 | } else { | ||
147 | pdu = snmp_pdu_create(SNMP_MSG_GET); | ||
148 | } | ||
149 | |||
150 | for (size_t i = 0; i < parameters.num_of_test_units; i++) { | ||
151 | assert(parameters.test_units[i].oid != NULL); | ||
152 | if (verbose > 0) { | ||
153 | printf("OID %zu to parse: %s\n", i, parameters.test_units[i].oid); | ||
154 | } | ||
155 | |||
156 | oid tmp_OID[MAX_OID_LEN]; | ||
157 | size_t tmp_OID_len = MAX_OID_LEN; | ||
158 | if (snmp_parse_oid(parameters.test_units[i].oid, tmp_OID, &tmp_OID_len) != NULL) { | ||
159 | // success | ||
160 | snmp_add_null_var(pdu, tmp_OID, tmp_OID_len); | ||
161 | } else { | ||
162 | // failed | ||
163 | snmp_perror("Parsing failure"); | ||
164 | die(STATE_UNKNOWN, "Failed to parse OID\n"); | ||
165 | } | ||
166 | } | ||
167 | |||
168 | const int timeout_safety_tolerance = 5; | ||
169 | alarm((timeout_interval * (unsigned int)parameters.snmp_session.retries) + | ||
170 | timeout_safety_tolerance); | ||
171 | |||
172 | struct snmp_session *active_session = snmp_open(¶meters.snmp_session); | ||
173 | if (active_session == NULL) { | ||
174 | int pcliberr = 0; | ||
175 | int psnmperr = 0; | ||
176 | char *pperrstring = NULL; | ||
177 | snmp_error(¶meters.snmp_session, &pcliberr, &psnmperr, &pperrstring); | ||
178 | die(STATE_UNKNOWN, "Failed to open SNMP session: %s\n", pperrstring); | ||
179 | } | ||
180 | |||
181 | struct snmp_pdu *response = NULL; | ||
182 | int snmp_query_status = snmp_synch_response(active_session, pdu, &response); | ||
183 | |||
184 | if (!(snmp_query_status == STAT_SUCCESS && response->errstat == SNMP_ERR_NOERROR)) { | ||
185 | int pcliberr = 0; | ||
186 | int psnmperr = 0; | ||
187 | char *pperrstring = NULL; | ||
188 | snmp_error(active_session, &pcliberr, &psnmperr, &pperrstring); | ||
189 | |||
190 | if (psnmperr == SNMPERR_TIMEOUT) { | ||
191 | // We exit with critical here for some historical reason | ||
192 | die(STATE_CRITICAL, "SNMP query ran into a timeout\n"); | ||
193 | } | ||
194 | die(STATE_UNKNOWN, "SNMP query failed: %s\n", pperrstring); | ||
195 | } | ||
196 | |||
197 | snmp_close(active_session); | ||
198 | |||
199 | /* disable alarm again */ | ||
200 | alarm(0); | ||
201 | |||
202 | snmp_responces result = { | ||
203 | .errorcode = OK, | ||
204 | .response_values = calloc(parameters.num_of_test_units, sizeof(response_value)), | ||
205 | }; | ||
206 | |||
207 | if (result.response_values == NULL) { | ||
208 | result.errorcode = ERROR; | ||
209 | return result; | ||
210 | } | ||
211 | |||
212 | // We got the the query results, now process them | ||
213 | size_t loop_index = 0; | ||
214 | for (netsnmp_variable_list *vars = response->variables; vars; | ||
215 | vars = vars->next_variable, loop_index++) { | ||
216 | |||
217 | for (size_t jdx = 0; jdx < vars->name_length; jdx++) { | ||
218 | result.response_values[loop_index].oid[jdx] = vars->name[jdx]; | ||
219 | } | ||
220 | result.response_values[loop_index].oid_length = vars->name_length; | ||
221 | |||
222 | switch (vars->type) { | ||
223 | case ASN_OCTET_STR: { | ||
224 | result.response_values[loop_index].string_response = strdup((char *)vars->val.string); | ||
225 | result.response_values[loop_index].type = vars->type; | ||
226 | if (verbose) { | ||
227 | printf("Debug: Got a string as response: %s\n", vars->val.string); | ||
228 | } | ||
229 | } | ||
230 | continue; | ||
231 | case ASN_OPAQUE: | ||
232 | if (verbose) { | ||
233 | printf("Debug: Got OPAQUE\n"); | ||
234 | } | ||
235 | break; | ||
236 | /* Numerical values */ | ||
237 | case ASN_COUNTER64: { | ||
238 | if (verbose) { | ||
239 | printf("Debug: Got counter64\n"); | ||
240 | } | ||
241 | struct counter64 tmp = *(vars->val.counter64); | ||
242 | uint64_t counter = (tmp.high << 32) + tmp.low; | ||
243 | result.response_values[loop_index].value.uIntVal = counter; | ||
244 | result.response_values[loop_index].type = vars->type; | ||
245 | } break; | ||
246 | case ASN_GAUGE: // same as ASN_UNSIGNED | ||
247 | case ASN_TIMETICKS: | ||
248 | case ASN_COUNTER: | ||
249 | case ASN_UINTEGER: { | ||
250 | if (verbose) { | ||
251 | printf("Debug: Got a Integer like\n"); | ||
252 | } | ||
253 | result.response_values[loop_index].value.uIntVal = (unsigned long)*(vars->val.integer); | ||
254 | result.response_values[loop_index].type = vars->type; | ||
255 | } break; | ||
256 | case ASN_INTEGER: { | ||
257 | if (verbose) { | ||
258 | printf("Debug: Got a Integer\n"); | ||
259 | } | ||
260 | result.response_values[loop_index].value.intVal = *(vars->val.integer); | ||
261 | result.response_values[loop_index].type = vars->type; | ||
262 | } break; | ||
263 | case ASN_FLOAT: { | ||
264 | if (verbose) { | ||
265 | printf("Debug: Got a float\n"); | ||
266 | } | ||
267 | result.response_values[loop_index].value.doubleVal = *(vars->val.floatVal); | ||
268 | result.response_values[loop_index].type = vars->type; | ||
269 | } break; | ||
270 | case ASN_DOUBLE: { | ||
271 | if (verbose) { | ||
272 | printf("Debug: Got a double\n"); | ||
273 | } | ||
274 | result.response_values[loop_index].value.doubleVal = *(vars->val.doubleVal); | ||
275 | result.response_values[loop_index].type = vars->type; | ||
276 | break; | ||
277 | } | ||
278 | case ASN_IPADDRESS: | ||
279 | if (verbose) { | ||
280 | printf("Debug: Got an IP address\n"); | ||
281 | } | ||
282 | result.response_values[loop_index].type = vars->type; | ||
283 | |||
284 | // TODO: print address here, state always ok? or regex match? | ||
285 | continue; | ||
286 | default: | ||
287 | if (verbose) { | ||
288 | printf("Debug: Got a unmatched result type: %hhu\n", vars->type); | ||
289 | } | ||
290 | // TODO: Error here? | ||
291 | continue; | ||
292 | } | ||
293 | } | ||
294 | |||
295 | return result; | ||
296 | } | ||
297 | |||
298 | check_snmp_evaluation evaluate_single_unit(response_value response, | ||
299 | check_snmp_evaluation_parameters eval_params, | ||
300 | check_snmp_test_unit test_unit, time_t query_timestamp, | ||
301 | check_snmp_state_entry prev_state, | ||
302 | bool have_previous_state) { | ||
303 | mp_subcheck sc_oid_test = mp_subcheck_init(); | ||
304 | |||
305 | if ((test_unit.label != NULL) && (strcmp(test_unit.label, "") != 0)) { | ||
306 | xasprintf(&sc_oid_test.output, "%s - ", test_unit.label); | ||
307 | } else { | ||
308 | sc_oid_test.output = strdup(""); | ||
309 | } | ||
310 | |||
311 | char oid_string[(MAX_OID_LEN * 2) + 1] = {}; | ||
312 | |||
313 | int oid_string_result = | ||
314 | snprint_objid(oid_string, (MAX_OID_LEN * 2) + 1, response.oid, response.oid_length); | ||
315 | if (oid_string_result <= 0) { | ||
316 | // TODO error here | ||
317 | die(STATE_UNKNOWN, "snprint_objid failed\n"); | ||
318 | } | ||
319 | |||
320 | xasprintf(&sc_oid_test.output, "%sOID: %s", sc_oid_test.output, oid_string); | ||
321 | sc_oid_test = mp_set_subcheck_default_state(sc_oid_test, STATE_OK); | ||
322 | |||
323 | if (verbose > 2) { | ||
324 | printf("Processing oid %s\n", oid_string); | ||
325 | } | ||
326 | |||
327 | bool got_a_numerical_value = false; | ||
328 | mp_perfdata_value pd_result_val = {0}; | ||
329 | |||
330 | check_snmp_state_entry result_state = { | ||
331 | .timestamp = query_timestamp, | ||
332 | .oid_length = response.oid_length, | ||
333 | .type = response.type, | ||
334 | }; | ||
335 | |||
336 | for (size_t i = 0; i < response.oid_length; i++) { | ||
337 | result_state.oid[i] = response.oid[i]; | ||
338 | } | ||
339 | |||
340 | if (have_previous_state) { | ||
341 | if (query_timestamp == prev_state.timestamp) { | ||
342 | // somehow we have the same timestamp again, that can't be good | ||
343 | sc_oid_test = mp_set_subcheck_state(sc_oid_test, STATE_UNKNOWN); | ||
344 | xasprintf(&sc_oid_test.output, "Time duration between plugin calls is invalid"); | ||
345 | |||
346 | check_snmp_evaluation result = { | ||
347 | .sc = sc_oid_test, | ||
348 | .state = result_state, | ||
349 | }; | ||
350 | |||
351 | return result; | ||
352 | } | ||
353 | } | ||
354 | // compute rate time difference | ||
355 | double timeDiff = 0; | ||
356 | if (have_previous_state) { | ||
357 | if (verbose) { | ||
358 | printf("Previous timestamp: %s", ctime(&prev_state.timestamp)); | ||
359 | printf("Current timestamp: %s", ctime(&query_timestamp)); | ||
360 | } | ||
361 | timeDiff = difftime(query_timestamp, prev_state.timestamp) / eval_params.rate_multiplier; | ||
362 | } | ||
363 | |||
364 | mp_perfdata pd_num_val = {}; | ||
365 | |||
366 | switch (response.type) { | ||
367 | case ASN_OCTET_STR: { | ||
368 | char *tmp = response.string_response; | ||
369 | if (strchr(tmp, '"') != NULL) { | ||
370 | // got double quote in the string | ||
371 | if (strchr(tmp, '\'') != NULL) { | ||
372 | // got single quote in the string too | ||
373 | // dont quote that at all to avoid even more confusion | ||
374 | xasprintf(&sc_oid_test.output, "%s - Value: %s", sc_oid_test.output, tmp); | ||
375 | } else { | ||
376 | // quote with single quotes | ||
377 | xasprintf(&sc_oid_test.output, "%s - Value: '%s'", sc_oid_test.output, tmp); | ||
378 | } | ||
379 | } else { | ||
380 | // quote with double quotes | ||
381 | xasprintf(&sc_oid_test.output, "%s - Value: \"%s\"", sc_oid_test.output, tmp); | ||
382 | } | ||
383 | |||
384 | if (strlen(tmp) == 0) { | ||
385 | sc_oid_test = mp_set_subcheck_state(sc_oid_test, eval_params.nulloid_result); | ||
386 | } | ||
387 | |||
388 | // String matching test | ||
389 | if ((test_unit.eval_mthd.crit_string)) { | ||
390 | if (strcmp(tmp, eval_params.string_cmp_value)) { | ||
391 | sc_oid_test = mp_set_subcheck_state( | ||
392 | sc_oid_test, (eval_params.invert_search) ? STATE_CRITICAL : STATE_OK); | ||
393 | } else { | ||
394 | sc_oid_test = mp_set_subcheck_state( | ||
395 | sc_oid_test, (eval_params.invert_search) ? STATE_OK : STATE_CRITICAL); | ||
396 | } | ||
397 | } else if (test_unit.eval_mthd.crit_regex) { | ||
398 | const size_t nmatch = eval_params.regex_cmp_value.re_nsub + 1; | ||
399 | regmatch_t pmatch[nmatch]; | ||
400 | memset(pmatch, '\0', sizeof(regmatch_t) * nmatch); | ||
401 | |||
402 | int excode = regexec(&eval_params.regex_cmp_value, tmp, nmatch, pmatch, 0); | ||
403 | if (excode == 0) { | ||
404 | sc_oid_test = mp_set_subcheck_state( | ||
405 | sc_oid_test, (eval_params.invert_search) ? STATE_OK : STATE_CRITICAL); | ||
406 | } else if (excode != REG_NOMATCH) { | ||
407 | char errbuf[MAX_INPUT_BUFFER] = ""; | ||
408 | regerror(excode, &eval_params.regex_cmp_value, errbuf, MAX_INPUT_BUFFER); | ||
409 | printf(_("Execute Error: %s\n"), errbuf); | ||
410 | exit(STATE_CRITICAL); | ||
411 | } else { // REG_NOMATCH | ||
412 | sc_oid_test = mp_set_subcheck_state( | ||
413 | sc_oid_test, eval_params.invert_search ? STATE_CRITICAL : STATE_OK); | ||
414 | } | ||
415 | } | ||
416 | } break; | ||
417 | case ASN_COUNTER64: | ||
418 | got_a_numerical_value = true; | ||
419 | |||
420 | result_state.value.uIntVal = response.value.uIntVal; | ||
421 | result_state.type = response.type; | ||
422 | |||
423 | // TODO: perfdata unit counter | ||
424 | if (eval_params.calculate_rate && have_previous_state) { | ||
425 | if (prev_state.value.uIntVal > response.value.uIntVal) { | ||
426 | // overflow | ||
427 | unsigned long long tmp = | ||
428 | (UINT64_MAX - prev_state.value.uIntVal) + response.value.uIntVal; | ||
429 | |||
430 | tmp /= timeDiff; | ||
431 | pd_result_val = mp_create_pd_value(tmp); | ||
432 | } else { | ||
433 | pd_result_val = mp_create_pd_value( | ||
434 | (response.value.uIntVal - prev_state.value.uIntVal) / timeDiff); | ||
435 | } | ||
436 | } else { | ||
437 | // It's only a counter if we cont compute rate | ||
438 | pd_num_val.uom = "c"; | ||
439 | pd_result_val = mp_create_pd_value(response.value.uIntVal); | ||
440 | } | ||
441 | break; | ||
442 | case ASN_GAUGE: // same as ASN_UNSIGNED | ||
443 | case ASN_TIMETICKS: | ||
444 | case ASN_COUNTER: | ||
445 | case ASN_UINTEGER: { | ||
446 | got_a_numerical_value = true; | ||
447 | long long treated_value = (long long)response.value.uIntVal; | ||
448 | |||
449 | if (eval_params.multiplier_set || eval_params.offset_set) { | ||
450 | double processed = 0; | ||
451 | if (eval_params.offset_set) { | ||
452 | processed += eval_params.offset; | ||
453 | } | ||
454 | |||
455 | if (eval_params.multiplier_set) { | ||
456 | processed = processed * eval_params.multiplier; | ||
457 | } | ||
458 | |||
459 | treated_value = lround(processed); | ||
460 | } | ||
461 | |||
462 | result_state.value.intVal = treated_value; | ||
463 | |||
464 | if (eval_params.calculate_rate && have_previous_state) { | ||
465 | if (verbose > 2) { | ||
466 | printf("%s: Rate calculation (int/counter/gauge): prev: %lli\n", __FUNCTION__, | ||
467 | prev_state.value.intVal); | ||
468 | printf("%s: Rate calculation (int/counter/gauge): current: %lli\n", __FUNCTION__, | ||
469 | treated_value); | ||
470 | } | ||
471 | double rate = (treated_value - prev_state.value.intVal) / timeDiff; | ||
472 | pd_result_val = mp_create_pd_value(rate); | ||
473 | } else { | ||
474 | pd_result_val = mp_create_pd_value(treated_value); | ||
475 | |||
476 | if (response.type == ASN_COUNTER) { | ||
477 | pd_num_val.uom = "c"; | ||
478 | } | ||
479 | } | ||
480 | |||
481 | } break; | ||
482 | case ASN_INTEGER: { | ||
483 | if (eval_params.multiplier_set || eval_params.offset_set) { | ||
484 | double processed = 0; | ||
485 | if (eval_params.multiplier_set) { | ||
486 | processed = (double)response.value.intVal * eval_params.multiplier; | ||
487 | } | ||
488 | |||
489 | if (eval_params.offset_set) { | ||
490 | processed += eval_params.offset; | ||
491 | } | ||
492 | |||
493 | result_state.value.doubleVal = processed; | ||
494 | |||
495 | if (eval_params.calculate_rate && have_previous_state) { | ||
496 | pd_result_val = | ||
497 | mp_create_pd_value((processed - prev_state.value.doubleVal) / timeDiff); | ||
498 | } else { | ||
499 | pd_result_val = mp_create_pd_value(processed); | ||
500 | } | ||
501 | } else { | ||
502 | result_state.value.intVal = response.value.intVal; | ||
503 | |||
504 | if (eval_params.calculate_rate && have_previous_state) { | ||
505 | pd_result_val = mp_create_pd_value( | ||
506 | (response.value.intVal - prev_state.value.intVal) / timeDiff); | ||
507 | } else { | ||
508 | pd_result_val = mp_create_pd_value(response.value.intVal); | ||
509 | } | ||
510 | } | ||
511 | |||
512 | got_a_numerical_value = true; | ||
513 | } break; | ||
514 | case ASN_FLOAT: // fallthrough | ||
515 | case ASN_DOUBLE: { | ||
516 | got_a_numerical_value = true; | ||
517 | double tmp = response.value.doubleVal; | ||
518 | if (eval_params.offset_set) { | ||
519 | tmp += eval_params.offset; | ||
520 | } | ||
521 | |||
522 | if (eval_params.multiplier_set) { | ||
523 | tmp *= eval_params.multiplier; | ||
524 | } | ||
525 | |||
526 | if (eval_params.calculate_rate && have_previous_state) { | ||
527 | pd_result_val = mp_create_pd_value((tmp - prev_state.value.doubleVal) / timeDiff); | ||
528 | } else { | ||
529 | pd_result_val = mp_create_pd_value(tmp); | ||
530 | } | ||
531 | got_a_numerical_value = true; | ||
532 | |||
533 | result_state.value.doubleVal = tmp; | ||
534 | } break; | ||
535 | case ASN_IPADDRESS: | ||
536 | // TODO | ||
537 | } | ||
538 | |||
539 | if (got_a_numerical_value) { | ||
540 | if (eval_params.use_oid_as_perf_data_label) { | ||
541 | // Use oid for perdata label | ||
542 | pd_num_val.label = strdup(oid_string); | ||
543 | // TODO strdup error checking | ||
544 | } else if (test_unit.label != NULL && strcmp(test_unit.label, "") != 0) { | ||
545 | pd_num_val.label = strdup(test_unit.label); | ||
546 | } else { | ||
547 | pd_num_val.label = strdup(test_unit.oid); | ||
548 | } | ||
549 | |||
550 | if (!(eval_params.calculate_rate && !have_previous_state)) { | ||
551 | // some kind of numerical value | ||
552 | if (test_unit.unit_value != NULL && strcmp(test_unit.unit_value, "") != 0) { | ||
553 | pd_num_val.uom = test_unit.unit_value; | ||
554 | } | ||
555 | |||
556 | pd_num_val.value = pd_result_val; | ||
557 | |||
558 | xasprintf(&sc_oid_test.output, "%s Value: %s", sc_oid_test.output, | ||
559 | pd_value_to_string(pd_result_val)); | ||
560 | |||
561 | if (test_unit.unit_value != NULL && strcmp(test_unit.unit_value, "") != 0) { | ||
562 | xasprintf(&sc_oid_test.output, "%s%s", sc_oid_test.output, test_unit.unit_value); | ||
563 | } | ||
564 | |||
565 | if (test_unit.threshold.warning_is_set || test_unit.threshold.critical_is_set) { | ||
566 | pd_num_val = mp_pd_set_thresholds(pd_num_val, test_unit.threshold); | ||
567 | mp_state_enum tmp_state = mp_get_pd_status(pd_num_val); | ||
568 | |||
569 | if (tmp_state == STATE_WARNING) { | ||
570 | sc_oid_test = mp_set_subcheck_state(sc_oid_test, STATE_WARNING); | ||
571 | xasprintf(&sc_oid_test.output, "%s - number violates warning threshold", | ||
572 | sc_oid_test.output); | ||
573 | } else if (tmp_state == STATE_CRITICAL) { | ||
574 | sc_oid_test = mp_set_subcheck_state(sc_oid_test, STATE_CRITICAL); | ||
575 | xasprintf(&sc_oid_test.output, "%s - number violates critical threshold", | ||
576 | sc_oid_test.output); | ||
577 | } | ||
578 | } | ||
579 | |||
580 | mp_add_perfdata_to_subcheck(&sc_oid_test, pd_num_val); | ||
581 | } else { | ||
582 | // should calculate rate, but there is no previous state, so first run | ||
583 | // exit with ok now | ||
584 | sc_oid_test = mp_set_subcheck_state(sc_oid_test, STATE_OK); | ||
585 | xasprintf(&sc_oid_test.output, "%s - No previous data to calculate rate - assume okay", | ||
586 | sc_oid_test.output); | ||
587 | } | ||
588 | } | ||
589 | |||
590 | check_snmp_evaluation result = { | ||
591 | .sc = sc_oid_test, | ||
592 | .state = result_state, | ||
593 | }; | ||
594 | |||
595 | return result; | ||
596 | } | ||
597 | |||
598 | char *_np_state_generate_key(int argc, char **argv); | ||
599 | |||
600 | /* | ||
601 | * If time=NULL, use current time. Create state file, with state format | ||
602 | * version, default text. Writes version, time, and data. Avoid locking | ||
603 | * problems - use mv to write and then swap. Possible loss of state data if | ||
604 | * two things writing to same key at same time. | ||
605 | * Will die with UNKNOWN if errors | ||
606 | */ | ||
607 | void np_state_write_string(state_key stateKey, time_t timestamp, char *stringToStore) { | ||
608 | time_t current_time; | ||
609 | if (timestamp == 0) { | ||
610 | time(¤t_time); | ||
611 | } else { | ||
612 | current_time = timestamp; | ||
613 | } | ||
614 | |||
615 | int result = 0; | ||
616 | |||
617 | /* If file doesn't currently exist, create directories */ | ||
618 | if (access(stateKey._filename, F_OK) != 0) { | ||
619 | char *directories = NULL; | ||
620 | result = asprintf(&directories, "%s", stateKey._filename); | ||
621 | if (result < 0) { | ||
622 | die(STATE_UNKNOWN, _("Cannot allocate memory: %s"), strerror(errno)); | ||
623 | } | ||
624 | |||
625 | for (char *p = directories + 1; *p; p++) { | ||
626 | if (*p == '/') { | ||
627 | *p = '\0'; | ||
628 | if ((access(directories, F_OK) != 0) && (mkdir(directories, S_IRWXU) != 0)) { | ||
629 | /* Can't free this! Otherwise error message is wrong! */ | ||
630 | /* np_free(directories); */ | ||
631 | die(STATE_UNKNOWN, _("Cannot create directory: %s"), directories); | ||
632 | } | ||
633 | *p = '/'; | ||
634 | } | ||
635 | } | ||
636 | |||
637 | if (directories) { | ||
638 | free(directories); | ||
639 | } | ||
640 | } | ||
641 | |||
642 | char *temp_file = NULL; | ||
643 | result = asprintf(&temp_file, "%s.XXXXXX", stateKey._filename); | ||
644 | if (result < 0) { | ||
645 | die(STATE_UNKNOWN, _("Cannot allocate memory: %s"), strerror(errno)); | ||
646 | } | ||
647 | |||
648 | int temp_file_desc = 0; | ||
649 | if ((temp_file_desc = mkstemp(temp_file)) == -1) { | ||
650 | if (temp_file) { | ||
651 | free(temp_file); | ||
652 | } | ||
653 | die(STATE_UNKNOWN, _("Cannot create temporary filename")); | ||
654 | } | ||
655 | |||
656 | FILE *temp_file_pointer = fdopen(temp_file_desc, "w"); | ||
657 | if (temp_file_pointer == NULL) { | ||
658 | close(temp_file_desc); | ||
659 | unlink(temp_file); | ||
660 | if (temp_file) { | ||
661 | free(temp_file); | ||
662 | } | ||
663 | die(STATE_UNKNOWN, _("Unable to open temporary state file")); | ||
664 | } | ||
665 | |||
666 | fprintf(temp_file_pointer, "# NP State file\n"); | ||
667 | fprintf(temp_file_pointer, "%d\n", NP_STATE_FORMAT_VERSION); | ||
668 | fprintf(temp_file_pointer, "%d\n", stateKey.data_version); | ||
669 | fprintf(temp_file_pointer, "%lu\n", current_time); | ||
670 | fprintf(temp_file_pointer, "%s\n", stringToStore); | ||
671 | |||
672 | fchmod(temp_file_desc, S_IRUSR | S_IWUSR | S_IRGRP); | ||
673 | |||
674 | fflush(temp_file_pointer); | ||
675 | |||
676 | result = fclose(temp_file_pointer); | ||
677 | |||
678 | fsync(temp_file_desc); | ||
679 | |||
680 | if (result != 0) { | ||
681 | unlink(temp_file); | ||
682 | if (temp_file) { | ||
683 | free(temp_file); | ||
684 | } | ||
685 | die(STATE_UNKNOWN, _("Error writing temp file")); | ||
686 | } | ||
687 | |||
688 | if (rename(temp_file, stateKey._filename) != 0) { | ||
689 | unlink(temp_file); | ||
690 | if (temp_file) { | ||
691 | free(temp_file); | ||
692 | } | ||
693 | die(STATE_UNKNOWN, _("Cannot rename state temp file")); | ||
694 | } | ||
695 | |||
696 | if (temp_file) { | ||
697 | free(temp_file); | ||
698 | } | ||
699 | } | ||
700 | |||
701 | /* | ||
702 | * Read the state file | ||
703 | */ | ||
704 | bool _np_state_read_file(FILE *state_file, state_key stateKey) { | ||
705 | time_t current_time; | ||
706 | time(¤t_time); | ||
707 | |||
708 | /* Note: This introduces a limit of 8192 bytes in the string data */ | ||
709 | char *line = (char *)calloc(1, 8192); | ||
710 | if (line == NULL) { | ||
711 | die(STATE_UNKNOWN, _("Cannot allocate memory: %s"), strerror(errno)); | ||
712 | } | ||
713 | |||
714 | bool status = false; | ||
715 | enum { | ||
716 | STATE_FILE_VERSION, | ||
717 | STATE_DATA_VERSION, | ||
718 | STATE_DATA_TIME, | ||
719 | STATE_DATA_TEXT, | ||
720 | STATE_DATA_END | ||
721 | } expected = STATE_FILE_VERSION; | ||
722 | |||
723 | int failure = 0; | ||
724 | while (!failure && (fgets(line, 8192, state_file)) != NULL) { | ||
725 | size_t pos = strlen(line); | ||
726 | if (line[pos - 1] == '\n') { | ||
727 | line[pos - 1] = '\0'; | ||
728 | } | ||
729 | |||
730 | if (line[0] == '#') { | ||
731 | continue; | ||
732 | } | ||
733 | |||
734 | switch (expected) { | ||
735 | case STATE_FILE_VERSION: { | ||
736 | int i = atoi(line); | ||
737 | if (i != NP_STATE_FORMAT_VERSION) { | ||
738 | failure++; | ||
739 | } else { | ||
740 | expected = STATE_DATA_VERSION; | ||
741 | } | ||
742 | } break; | ||
743 | case STATE_DATA_VERSION: { | ||
744 | int i = atoi(line); | ||
745 | if (i != stateKey.data_version) { | ||
746 | failure++; | ||
747 | } else { | ||
748 | expected = STATE_DATA_TIME; | ||
749 | } | ||
750 | } break; | ||
751 | case STATE_DATA_TIME: { | ||
752 | /* If time > now, error */ | ||
753 | time_t data_time = strtoul(line, NULL, 10); | ||
754 | if (data_time > current_time) { | ||
755 | failure++; | ||
756 | } else { | ||
757 | stateKey.state_data->time = data_time; | ||
758 | expected = STATE_DATA_TEXT; | ||
759 | } | ||
760 | } break; | ||
761 | case STATE_DATA_TEXT: | ||
762 | stateKey.state_data->data = strdup(line); | ||
763 | if (stateKey.state_data->data == NULL) { | ||
764 | die(STATE_UNKNOWN, _("Cannot execute strdup: %s"), strerror(errno)); | ||
765 | } | ||
766 | stateKey.state_data->length = strlen(line); | ||
767 | expected = STATE_DATA_END; | ||
768 | status = true; | ||
769 | break; | ||
770 | case STATE_DATA_END:; | ||
771 | } | ||
772 | } | ||
773 | |||
774 | if (line) { | ||
775 | free(line); | ||
776 | } | ||
777 | return status; | ||
778 | } | ||
779 | /* | ||
780 | * Will return NULL if no data is available (first run). If key currently | ||
781 | * exists, read data. If state file format version is not expected, return | ||
782 | * as if no data. Get state data version number and compares to expected. | ||
783 | * If numerically lower, then return as no previous state. die with UNKNOWN | ||
784 | * if exceptional error. | ||
785 | */ | ||
786 | state_data *np_state_read(state_key stateKey) { | ||
787 | /* Open file. If this fails, no previous state found */ | ||
788 | FILE *statefile = fopen(stateKey._filename, "r"); | ||
789 | state_data *this_state_data = (state_data *)calloc(1, sizeof(state_data)); | ||
790 | if (statefile != NULL) { | ||
791 | |||
792 | if (this_state_data == NULL) { | ||
793 | die(STATE_UNKNOWN, _("Cannot allocate memory: %s"), strerror(errno)); | ||
794 | } | ||
795 | |||
796 | this_state_data->data = NULL; | ||
797 | stateKey.state_data = this_state_data; | ||
798 | |||
799 | if (_np_state_read_file(statefile, stateKey)) { | ||
800 | this_state_data->errorcode = OK; | ||
801 | } else { | ||
802 | this_state_data->errorcode = ERROR; | ||
803 | } | ||
804 | |||
805 | fclose(statefile); | ||
806 | } else { | ||
807 | // Failed to open state file | ||
808 | this_state_data->errorcode = ERROR; | ||
809 | } | ||
810 | |||
811 | return stateKey.state_data; | ||
812 | } | ||
813 | |||
814 | /* | ||
815 | * Internal function. Returns either: | ||
816 | * envvar NAGIOS_PLUGIN_STATE_DIRECTORY | ||
817 | * statically compiled shared state directory | ||
818 | */ | ||
819 | char *_np_state_calculate_location_prefix(void) { | ||
820 | char *env_dir; | ||
821 | |||
822 | /* Do not allow passing MP_STATE_PATH in setuid plugins | ||
823 | * for security reasons */ | ||
824 | if (!mp_suid()) { | ||
825 | env_dir = getenv("MP_STATE_PATH"); | ||
826 | if (env_dir && env_dir[0] != '\0') { | ||
827 | return env_dir; | ||
828 | } | ||
829 | /* This is the former ENV, for backward-compatibility */ | ||
830 | env_dir = getenv("NAGIOS_PLUGIN_STATE_DIRECTORY"); | ||
831 | if (env_dir && env_dir[0] != '\0') { | ||
832 | return env_dir; | ||
833 | } | ||
834 | } | ||
835 | |||
836 | return NP_STATE_DIR_PREFIX; | ||
837 | } | ||
838 | |||
839 | /* | ||
840 | * Initiatializer for state routines. | ||
841 | * Sets variables. Generates filename. Returns np_state_key. die with | ||
842 | * UNKNOWN if exception | ||
843 | */ | ||
844 | state_key np_enable_state(char *keyname, int expected_data_version, char *plugin_name, int argc, | ||
845 | char **argv) { | ||
846 | state_key *this_state = (state_key *)calloc(1, sizeof(state_key)); | ||
847 | if (this_state == NULL) { | ||
848 | die(STATE_UNKNOWN, _("Cannot allocate memory: %s"), strerror(errno)); | ||
849 | } | ||
850 | |||
851 | char *temp_keyname = NULL; | ||
852 | if (keyname == NULL) { | ||
853 | temp_keyname = _np_state_generate_key(argc, argv); | ||
854 | } else { | ||
855 | temp_keyname = strdup(keyname); | ||
856 | if (temp_keyname == NULL) { | ||
857 | die(STATE_UNKNOWN, _("Cannot execute strdup: %s"), strerror(errno)); | ||
858 | } | ||
859 | } | ||
860 | |||
861 | /* Die if invalid characters used for keyname */ | ||
862 | char *tmp_char = temp_keyname; | ||
863 | while (*tmp_char != '\0') { | ||
864 | if (!(isalnum(*tmp_char) || *tmp_char == '_')) { | ||
865 | die(STATE_UNKNOWN, _("Invalid character for keyname - only alphanumerics or '_'")); | ||
866 | } | ||
867 | tmp_char++; | ||
868 | } | ||
869 | this_state->name = temp_keyname; | ||
870 | this_state->plugin_name = plugin_name; | ||
871 | this_state->data_version = expected_data_version; | ||
872 | this_state->state_data = NULL; | ||
873 | |||
874 | /* Calculate filename */ | ||
875 | char *temp_filename = NULL; | ||
876 | int error = asprintf(&temp_filename, "%s/%lu/%s/%s", _np_state_calculate_location_prefix(), | ||
877 | (unsigned long)geteuid(), plugin_name, this_state->name); | ||
878 | if (error < 0) { | ||
879 | die(STATE_UNKNOWN, _("Cannot allocate memory: %s"), strerror(errno)); | ||
880 | } | ||
881 | |||
882 | this_state->_filename = temp_filename; | ||
883 | |||
884 | return *this_state; | ||
885 | } | ||
886 | |||
887 | /* | ||
888 | * Returns a string to use as a keyname, based on an md5 hash of argv, thus | ||
889 | * hopefully a unique key per service/plugin invocation. Use the extra-opts | ||
890 | * parse of argv, so that uniqueness in parameters are reflected there. | ||
891 | */ | ||
892 | char *_np_state_generate_key(int argc, char **argv) { | ||
893 | unsigned char result[256]; | ||
894 | |||
895 | #ifdef USE_OPENSSL | ||
896 | /* | ||
897 | * This code path is chosen if openssl is available (which should be the most common | ||
898 | * scenario). Alternatively, the gnulib implementation/ | ||
899 | * | ||
900 | */ | ||
901 | EVP_MD_CTX *ctx = EVP_MD_CTX_new(); | ||
902 | |||
903 | EVP_DigestInit(ctx, EVP_sha256()); | ||
904 | |||
905 | for (int i = 0; i < argc; i++) { | ||
906 | EVP_DigestUpdate(ctx, argv[i], strlen(argv[i])); | ||
907 | } | ||
908 | |||
909 | EVP_DigestFinal(ctx, result, NULL); | ||
910 | #else | ||
911 | |||
912 | struct sha256_ctx ctx; | ||
913 | |||
914 | for (int i = 0; i < this_monitoring_plugin->argc; i++) { | ||
915 | sha256_process_bytes(argv[i], strlen(argv[i]), &ctx); | ||
916 | } | ||
917 | |||
918 | sha256_finish_ctx(&ctx, result); | ||
919 | #endif // FOUNDOPENSSL | ||
920 | |||
921 | char keyname[41]; | ||
922 | for (int i = 0; i < 20; ++i) { | ||
923 | sprintf(&keyname[2 * i], "%02x", result[i]); | ||
924 | } | ||
925 | |||
926 | keyname[40] = '\0'; | ||
927 | |||
928 | char *keyname_copy = strdup(keyname); | ||
929 | if (keyname_copy == NULL) { | ||
930 | die(STATE_UNKNOWN, _("Cannot execute strdup: %s"), strerror(errno)); | ||
931 | } | ||
932 | |||
933 | return keyname_copy; | ||
934 | } | ||
diff --git a/plugins/check_snmp.d/check_snmp_helpers.h b/plugins/check_snmp.d/check_snmp_helpers.h index 28e3c4e3..0f7780b1 100644 --- a/plugins/check_snmp.d/check_snmp_helpers.h +++ b/plugins/check_snmp.d/check_snmp_helpers.h | |||
@@ -1,7 +1,71 @@ | |||
1 | #pragma once | 1 | #pragma once |
2 | 2 | ||
3 | #include "./config.h" | 3 | #include "./config.h" |
4 | #include <net-snmp/library/asn1.h> | ||
4 | 5 | ||
5 | check_snmp_test_unit check_snmp_test_unit_init(); | 6 | check_snmp_test_unit check_snmp_test_unit_init(); |
6 | int check_snmp_set_thresholds(const char *, check_snmp_test_unit[], size_t, bool); | 7 | int check_snmp_set_thresholds(const char *, check_snmp_test_unit[], size_t, bool); |
7 | check_snmp_config check_snmp_config_init(); | 8 | check_snmp_config check_snmp_config_init(); |
9 | |||
10 | typedef struct { | ||
11 | oid oid[MAX_OID_LEN]; | ||
12 | size_t oid_length; | ||
13 | unsigned char type; | ||
14 | union { | ||
15 | uint64_t uIntVal; | ||
16 | int64_t intVal; | ||
17 | double doubleVal; | ||
18 | } value; | ||
19 | char *string_response; | ||
20 | } response_value; | ||
21 | |||
22 | typedef struct { | ||
23 | int errorcode; | ||
24 | response_value *response_values; | ||
25 | } snmp_responces; | ||
26 | snmp_responces do_snmp_query(check_snmp_config_snmp_parameters parameters); | ||
27 | |||
28 | // state is similar to response, but only numerics and a timestamp | ||
29 | typedef struct { | ||
30 | time_t timestamp; | ||
31 | oid oid[MAX_OID_LEN]; | ||
32 | size_t oid_length; | ||
33 | unsigned char type; | ||
34 | union { | ||
35 | unsigned long long uIntVal; | ||
36 | long long intVal; | ||
37 | double doubleVal; | ||
38 | } value; | ||
39 | } check_snmp_state_entry; | ||
40 | |||
41 | typedef struct { | ||
42 | check_snmp_state_entry state; | ||
43 | mp_subcheck sc; | ||
44 | } check_snmp_evaluation; | ||
45 | check_snmp_evaluation evaluate_single_unit(response_value response, | ||
46 | check_snmp_evaluation_parameters eval_params, | ||
47 | check_snmp_test_unit test_unit, time_t query_timestamp, | ||
48 | check_snmp_state_entry prev_state, | ||
49 | bool have_previous_state); | ||
50 | |||
51 | #define NP_STATE_FORMAT_VERSION 1 | ||
52 | |||
53 | typedef struct state_data_struct { | ||
54 | time_t time; | ||
55 | void *data; | ||
56 | size_t length; /* Of binary data */ | ||
57 | int errorcode; | ||
58 | } state_data; | ||
59 | |||
60 | typedef struct state_key_struct { | ||
61 | char *name; | ||
62 | char *plugin_name; | ||
63 | int data_version; | ||
64 | char *_filename; | ||
65 | state_data *state_data; | ||
66 | } state_key; | ||
67 | |||
68 | state_data *np_state_read(state_key stateKey); | ||
69 | state_key np_enable_state(char *keyname, int expected_data_version, char *plugin_name, int argc, | ||
70 | char **argv); | ||
71 | void np_state_write_string(state_key stateKey, time_t timestamp, char *stringToStore); | ||
diff --git a/plugins/check_snmp.d/config.h b/plugins/check_snmp.d/config.h index e68986e2..a5d5aa52 100644 --- a/plugins/check_snmp.d/config.h +++ b/plugins/check_snmp.d/config.h | |||
@@ -1,7 +1,7 @@ | |||
1 | #pragma once | 1 | #pragma once |
2 | 2 | ||
3 | #include "thresholds.h" | 3 | #include "../../lib/thresholds.h" |
4 | #include "states.h" | 4 | #include "../../lib/states.h" |
5 | #include <stdlib.h> | 5 | #include <stdlib.h> |
6 | #include <stdbool.h> | 6 | #include <stdbool.h> |
7 | #include <regex.h> | 7 | #include <regex.h> |
@@ -18,7 +18,7 @@ | |||
18 | #include <net-snmp/library/snmp.h> | 18 | #include <net-snmp/library/snmp.h> |
19 | #include <net-snmp/session_api.h> | 19 | #include <net-snmp/session_api.h> |
20 | 20 | ||
21 | #define DEFAULT_PORT "161" | 21 | #define DEFAULT_PORT "161" |
22 | #define DEFAULT_RETRIES 5 | 22 | #define DEFAULT_RETRIES 5 |
23 | 23 | ||
24 | typedef struct eval_method { | 24 | typedef struct eval_method { |
@@ -34,10 +34,8 @@ typedef struct check_snmp_test_unit { | |||
34 | mp_thresholds threshold; | 34 | mp_thresholds threshold; |
35 | } check_snmp_test_unit; | 35 | } check_snmp_test_unit; |
36 | 36 | ||
37 | typedef struct check_snmp_config { | 37 | typedef struct { |
38 | // SNMP session to use | ||
39 | struct snmp_session snmp_session; | 38 | struct snmp_session snmp_session; |
40 | |||
41 | // use getnet instead of get | 39 | // use getnet instead of get |
42 | bool use_getnext; | 40 | bool use_getnext; |
43 | 41 | ||
@@ -47,7 +45,9 @@ typedef struct check_snmp_config { | |||
47 | 45 | ||
48 | check_snmp_test_unit *test_units; | 46 | check_snmp_test_unit *test_units; |
49 | size_t num_of_test_units; | 47 | size_t num_of_test_units; |
48 | } check_snmp_config_snmp_parameters; | ||
50 | 49 | ||
50 | typedef struct { | ||
51 | // State if an empty value is encountered | 51 | // State if an empty value is encountered |
52 | mp_state_enum nulloid_result; | 52 | mp_state_enum nulloid_result; |
53 | 53 | ||
@@ -63,7 +63,18 @@ typedef struct check_snmp_config { | |||
63 | bool offset_set; | 63 | bool offset_set; |
64 | 64 | ||
65 | // Modify output | 65 | // Modify output |
66 | bool use_perf_data_labels_from_input; | 66 | bool use_oid_as_perf_data_label; |
67 | |||
68 | // activate rate calucation | ||
69 | bool calculate_rate; | ||
70 | unsigned int rate_multiplier; | ||
71 | } check_snmp_evaluation_parameters; | ||
72 | |||
73 | typedef struct check_snmp_config { | ||
74 | // SNMP session to use | ||
75 | check_snmp_config_snmp_parameters snmp_params; | ||
76 | |||
77 | check_snmp_evaluation_parameters evaluation_params; | ||
67 | 78 | ||
68 | mp_output_format output_format; | 79 | mp_output_format output_format; |
69 | bool output_format_is_set; | 80 | bool output_format_is_set; |
diff --git a/plugins/tests/check_snmp.t b/plugins/tests/check_snmp.t index bfe42e16..26d67898 100755 --- a/plugins/tests/check_snmp.t +++ b/plugins/tests/check_snmp.t | |||
@@ -4,12 +4,13 @@ | |||
4 | # | 4 | # |
5 | 5 | ||
6 | use strict; | 6 | use strict; |
7 | use warnings; | ||
7 | use Test::More; | 8 | use Test::More; |
8 | use NPTest; | 9 | use NPTest; |
9 | use FindBin qw($Bin); | 10 | use FindBin qw($Bin); |
10 | use POSIX qw/strftime/; | 11 | use POSIX qw/strftime/; |
11 | 12 | ||
12 | my $tests = 81; | 13 | my $tests = 75; |
13 | # Check that all dependent modules are available | 14 | # Check that all dependent modules are available |
14 | eval { | 15 | eval { |
15 | require NetSNMP::OID; | 16 | require NetSNMP::OID; |
@@ -76,49 +77,36 @@ my $res; | |||
76 | 77 | ||
77 | $res = NPTest->testCmd( "./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.0"); | 78 | $res = NPTest->testCmd( "./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.0"); |
78 | cmp_ok( $res->return_code, '==', 0, "Exit OK when querying a multi-line string" ); | 79 | cmp_ok( $res->return_code, '==', 0, "Exit OK when querying a multi-line string" ); |
79 | like($res->output, '/^SNMP OK - /', "String contains SNMP OK"); | 80 | like($res->output, '/.*Cisco Internetwork Operating System Software.*/m', "String contains all lines"); |
80 | like($res->output, '/'.quotemeta('SNMP OK - Cisco Internetwork Operating System Software | | ||
81 | .1.3.6.1.4.1.8072.3.2.67.0: | ||
82 | "Cisco Internetwork Operating System Software | ||
83 | IOS (tm) Catalyst 4000 \"L3\" Switch Software (cat4000-I9K91S-M), Version | ||
84 | 12.2(20)EWA, RELEASE SOFTWARE (fc1) | ||
85 | Technical Support: http://www.cisco.com/techsupport | ||
86 | Copyright (c) 1986-2004 by cisco Systems, Inc. | ||
87 | "').'/m', "String contains all lines"); | ||
88 | 81 | ||
89 | # sysContact.0 is "Alice" (from our snmpd.conf) | 82 | # sysContact.0 is "Alice" (from our snmpd.conf) |
90 | $res = NPTest->testCmd( "./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.0 -o sysContact.0 -o .1.3.6.1.4.1.8072.3.2.67.1"); | 83 | $res = NPTest->testCmd( "./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.0 -o sysContact.0 -o .1.3.6.1.4.1.8072.3.2.67.1"); |
91 | cmp_ok( $res->return_code, '==', 0, "Exit OK when querying multi-line OIDs" ); | 84 | cmp_ok( $res->return_code, '==', 0, "Exit OK when querying multi-line OIDs" ); |
92 | like($res->output, '/^SNMP OK - /', "String contains SNMP OK"); | 85 | # like($res->output, '/^SNMP OK - /', "String contains SNMP OK"); |
93 | like($res->output, '/'.quotemeta('SNMP OK - Cisco Internetwork Operating System Software ').'"?Alice"?'.quotemeta(' Kisco Outernetwork Oserating Gystem Totware | | 86 | like($res->output, '/.*Cisco Internetwork Operating System Software.*/m', "String contains all lines with multiple OIDs"); |
94 | .1.3.6.1.4.1.8072.3.2.67.0: | 87 | like($res->output, '/.*Alice.*/m', "String contains all lines with multiple OIDs"); |
95 | "Cisco Internetwork Operating System Software | 88 | like($res->output, '/.*Kisco Outernetwork Oserating Gystem Totware.*/m', "String contains all lines with multiple OIDs"); |
96 | IOS (tm) Catalyst 4000 \"L3\" Switch Software (cat4000-I9K91S-M), Version | ||
97 | 12.2(20)EWA, RELEASE SOFTWARE (fc1) | ||
98 | Technical Support: http://www.cisco.com/techsupport | ||
99 | Copyright (c) 1986-2004 by cisco Systems, Inc. | ||
100 | " | ||
101 | .1.3.6.1.4.1.8072.3.2.67.1: | ||
102 | "Kisco Outernetwork Oserating Gystem Totware | ||
103 | Copyleft (c) 2400-2689 by kisco Systrems, Inc."').'/m', "String contains all lines with multiple OIDs"); | ||
104 | 89 | ||
105 | $res = NPTest->testCmd( "./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.2"); | 90 | $res = NPTest->testCmd( "./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.2"); |
106 | like($res->output, '/'.quotemeta('SNMP OK - This should not confuse check_snmp \"parser\" | | 91 | cmp_ok( $res->return_code, '==', 0, "Exit OK when querying multi-line OIDs" ); |
107 | .1.3.6.1.4.1.8072.3.2.67.2: | 92 | # like($res->output, '/'.quotemeta('This should not confuse check_snmp \"parser\" | |
108 | "This should not confuse check_snmp \"parser\" | 93 | # .1.3.6.1.4.1.8072.3.2.67.2: |
109 | into thinking there is no 2nd line"').'/m', "Attempt to confuse parser No.1"); | 94 | # "This should not confuse check_snmp \"parser\" |
95 | # into thinking there is no 2nd line"').'/m', "Attempt to confuse parser No.1"); | ||
110 | 96 | ||
111 | $res = NPTest->testCmd( "./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.3"); | 97 | $res = NPTest->testCmd( "./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.3"); |
112 | like($res->output, '/'.quotemeta('SNMP OK - It\'s getting even harder if the line | | 98 | cmp_ok( $res->return_code, '==', 0, "Exit OK when querying multi-line OIDs" ); |
113 | .1.3.6.1.4.1.8072.3.2.67.3: | 99 | # like($res->output, '/'.quotemeta('It\'s getting even harder if the line | |
114 | "It\'s getting even harder if the line | 100 | # .1.3.6.1.4.1.8072.3.2.67.3: |
115 | ends with with this: C:\\\\"').'/m', "Attempt to confuse parser No.2"); | 101 | # "It\'s getting even harder if the line |
102 | # ends with with this: C:\\\\"').'/m', "Attempt to confuse parser No.2"); | ||
116 | 103 | ||
117 | $res = NPTest->testCmd( "./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.4"); | 104 | $res = NPTest->testCmd( "./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.4"); |
118 | like($res->output, '/'.quotemeta('SNMP OK - And now have fun with with this: \"C:\\\\\" | | 105 | cmp_ok( $res->return_code, '==', 0, "Exit OK when querying multi-line OIDs" ); |
119 | .1.3.6.1.4.1.8072.3.2.67.4: | 106 | # like($res->output, '/'.quotemeta('And now have fun with with this: \"C:\\\\\" | |
120 | "And now have fun with with this: \"C:\\\\\" | 107 | # .1.3.6.1.4.1.8072.3.2.67.4: |
121 | because we\'re not done yet!"').'/m', "Attempt to confuse parser No.3"); | 108 | # "And now have fun with with this: \"C:\\\\\" |
109 | # because we\'re not done yet!"').'/m', "Attempt to confuse parser No.3"); | ||
122 | 110 | ||
123 | system("rm -f ".$ENV{'MP_STATE_PATH'}."/*/check_snmp/*"); | 111 | system("rm -f ".$ENV{'MP_STATE_PATH'}."/*/check_snmp/*"); |
124 | 112 | ||
@@ -131,156 +119,159 @@ SKIP: { | |||
131 | my $ts = time(); | 119 | my $ts = time(); |
132 | $res = NPTest->testCmd("LC_TIME=C TZ=UTC faketime -f '".strftime("%Y-%m-%d %H:%M:%S", localtime($ts))."' ./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.10 --rate -w 600" ); | 120 | $res = NPTest->testCmd("LC_TIME=C TZ=UTC faketime -f '".strftime("%Y-%m-%d %H:%M:%S", localtime($ts))."' ./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.10 --rate -w 600" ); |
133 | is($res->return_code, 0, "Returns OK"); | 121 | is($res->return_code, 0, "Returns OK"); |
134 | is($res->output, "No previous data to calculate rate - assume okay"); | 122 | like($res->output, "/.*No previous data to calculate rate - assume okay.*/"); |
135 | 123 | ||
136 | # test rate 1 second later | 124 | # test rate 1 second later |
137 | $res = NPTest->testCmd("LC_TIME=C TZ=UTC faketime -f '".strftime("%Y-%m-%d %H:%M:%S", localtime($ts+1))."' ./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.10 --rate -w 600" ); | 125 | $res = NPTest->testCmd("LC_TIME=C TZ=UTC faketime -f '".strftime("%Y-%m-%d %H:%M:%S", localtime($ts+1))."' ./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.10 --rate -w 600" ); |
138 | is($res->return_code, 1, "WARNING - due to going above rate calculation" ); | 126 | is($res->return_code, 1, "WARNING - due to going above rate calculation" ); |
139 | is($res->output, "SNMP RATE WARNING - *666* | iso.3.6.1.4.1.8072.3.2.67.10=666;600 "); | 127 | like($res->output, "/.*=666.*/"); |
140 | 128 | ||
141 | # test rate with same time | 129 | # test rate with same time |
142 | $res = NPTest->testCmd("LC_TIME=C TZ=UTC faketime -f '".strftime("%Y-%m-%d %H:%M:%S", localtime($ts+1))."' ./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.10 --rate -w 600" ); | 130 | $res = NPTest->testCmd("LC_TIME=C TZ=UTC faketime -f '".strftime("%Y-%m-%d %H:%M:%S", localtime($ts+1))."' ./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.10 --rate -w 600" ); |
143 | is($res->return_code, 3, "UNKNOWN - basically the divide by zero error" ); | 131 | is($res->return_code, 3, "UNKNOWN - basically the divide by zero error" ); |
144 | is($res->output, "Time duration between plugin calls is invalid"); | 132 | like($res->output, "/.*Time duration between plugin calls is invalid.*/"); |
145 | 133 | ||
146 | 134 | ||
147 | $res = NPTest->testCmd("LC_TIME=C TZ=UTC faketime -f '".strftime("%Y-%m-%d %H:%M:%S", localtime($ts))."' ./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.10 --rate -l inoctets" ); | 135 | $res = NPTest->testCmd("LC_TIME=C TZ=UTC faketime -f '".strftime("%Y-%m-%d %H:%M:%S", localtime($ts))."' ./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.10 --rate -l inoctets" ); |
148 | is($res->return_code, 0, "OK for first call" ); | 136 | is($res->return_code, 0, "OK for first call" ); |
149 | is($res->output, "No previous data to calculate rate - assume okay" ); | 137 | like($res->output, "/.*No previous data to calculate rate - assume okay.*/" ); |
150 | 138 | ||
151 | # test rate 1 second later | 139 | # test rate 1 second later |
152 | $res = NPTest->testCmd("LC_TIME=C TZ=UTC faketime -f '".strftime("%Y-%m-%d %H:%M:%S", localtime($ts+1))."' ./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.10 --rate -l inoctets" ); | 140 | $res = NPTest->testCmd("LC_TIME=C TZ=UTC faketime -f '".strftime("%Y-%m-%d %H:%M:%S", localtime($ts+1))."' ./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.10 --rate -l inoctets" ); |
153 | is($res->return_code, 0, "OK as no thresholds" ); | 141 | is($res->return_code, 0, "OK as no thresholds" ); |
154 | is($res->output, "SNMP RATE OK - inoctets 666 | inoctets=666 ", "Check label"); | 142 | like($res->output, "/.*inoctets.*=666.*/m", "Check label"); |
155 | 143 | ||
156 | # test rate 3 seconds later | 144 | # test rate 3 seconds later |
157 | $res = NPTest->testCmd("LC_TIME=C TZ=UTC faketime -f '".strftime("%Y-%m-%d %H:%M:%S", localtime($ts+3))."' ./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.10 --rate -l inoctets" ); | 145 | $res = NPTest->testCmd("LC_TIME=C TZ=UTC faketime -f '".strftime("%Y-%m-%d %H:%M:%S", localtime($ts+3))."' ./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.10 --rate -l inoctets" ); |
158 | is($res->return_code, 0, "OK as no thresholds" ); | 146 | is($res->return_code, 0, "OK as no thresholds" ); |
159 | is($res->output, "SNMP RATE OK - inoctets 333 | inoctets=333 ", "Check rate decreases due to longer interval"); | 147 | like($res->output, "/.*inoctets.*333.*/", "Check rate decreases due to longer interval"); |
160 | 148 | ||
161 | 149 | ||
162 | # label performance data check | 150 | # label performance data check |
163 | $res = NPTest->testCmd( "./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.10 -l test" ); | 151 | $res = NPTest->testCmd( "./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.10 -l test" ); |
164 | is($res->return_code, 0, "OK as no thresholds" ); | 152 | is($res->return_code, 0, "OK as no thresholds" ); |
165 | is($res->output, "SNMP OK - test 67996 | test=67996c ", "Check label"); | 153 | like($res->output, "/.*test.?=67996c/", "Check label"); |
166 | 154 | ||
167 | $res = NPTest->testCmd( "./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.10 -l \"test'test\"" ); | 155 | # following test is deactivated since it was not valid due to the guidelines (no single quote in label allowed) |
168 | is($res->return_code, 0, "OK as no thresholds" ); | 156 | # $res = NPTest->testCmd( "./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.10 -l \"test'test\"" ); |
169 | is($res->output, "SNMP OK - test'test 68662 | \"test'test\"=68662c ", "Check label"); | 157 | # is($res->return_code, 0, "OK as no thresholds" ); |
158 | # is($res->output, "test'test 68662 | \"test'test\"=68662c ", "Check label"); | ||
170 | 159 | ||
171 | $res = NPTest->testCmd( "./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.10 -l 'test\"test'" ); | 160 | $res = NPTest->testCmd( "./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.10 -l 'test\"test'" ); |
172 | is($res->return_code, 0, "OK as no thresholds" ); | 161 | is($res->return_code, 0, "OK as no thresholds" ); |
173 | is($res->output, "SNMP OK - test\"test 69328 | 'test\"test'=69328c ", "Check label"); | 162 | like($res->output, "/.*'test\"test'=68662c.*/", "Check label"); |
174 | 163 | ||
175 | $res = NPTest->testCmd( "./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.10 -l test -O" ); | 164 | $res = NPTest->testCmd( "./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.10 -l test -O" ); |
176 | is($res->return_code, 0, "OK as no thresholds" ); | 165 | is($res->return_code, 0, "OK as no thresholds" ); |
177 | is($res->output, "SNMP OK - test 69994 | iso.3.6.1.4.1.8072.3.2.67.10=69994c ", "Check label"); | 166 | like($res->output, "/.*.67.10.?=69328c.*/", "Check label"); |
178 | 167 | ||
179 | $res = NPTest->testCmd( "./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.10" ); | 168 | $res = NPTest->testCmd( "./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.10" ); |
180 | is($res->return_code, 0, "OK as no thresholds" ); | 169 | is($res->return_code, 0, "OK as no thresholds" ); |
181 | is($res->output, "SNMP OK - 70660 | iso.3.6.1.4.1.8072.3.2.67.10=70660c ", "Check label"); | 170 | like($res->output, "/.*8072.3.2.67.10.?=69994c.*/", "Check label"); |
182 | 171 | ||
183 | $res = NPTest->testCmd( "./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.10 -l 'test test'" ); | 172 | $res = NPTest->testCmd( "./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.10 -l 'test test'" ); |
184 | is($res->return_code, 0, "OK as no thresholds" ); | 173 | is($res->return_code, 0, "OK as no thresholds" ); |
185 | is($res->output, "SNMP OK - test test 71326 | 'test test'=71326c ", "Check label"); | 174 | like($res->output, "/.*'test test'=70660c/", "Check label"); |
186 | 175 | ||
187 | 176 | ||
188 | $res = NPTest->testCmd("LC_TIME=C TZ=UTC faketime -f '".strftime("%Y-%m-%d %H:%M:%S", localtime($ts))."' ./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.10 --rate -l inoctets_per_minute --rate-multiplier=60" ); | 177 | $res = NPTest->testCmd("LC_TIME=C TZ=UTC faketime -f '".strftime("%Y-%m-%d %H:%M:%S", localtime($ts))."' ./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.10 --rate -l inoctets_per_minute --rate-multiplier=60" ); |
189 | is($res->return_code, 0, "OK for first call" ); | 178 | is($res->return_code, 0, "OK for first call" ); |
190 | is($res->output, "No previous data to calculate rate - assume okay" ); | 179 | like($res->output, "/.*No previous data to calculate rate - assume okay.*/" ); |
191 | 180 | ||
192 | # test 1 second later | 181 | # test 1 second later |
193 | $res = NPTest->testCmd("LC_TIME=C TZ=UTC faketime -f '".strftime("%Y-%m-%d %H:%M:%S", localtime($ts+1))."' ./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.10 --rate -l inoctets_per_minute --rate-multiplier=60" ); | 182 | $res = NPTest->testCmd("LC_TIME=C TZ=UTC faketime -f '".strftime("%Y-%m-%d %H:%M:%S", localtime($ts+1))."' ./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.10 --rate -l inoctets_per_minute --rate-multiplier=60" ); |
194 | is($res->return_code, 0, "OK as no thresholds" ); | 183 | is($res->return_code, 0, "OK as no thresholds" ); |
195 | is($res->output, "SNMP RATE OK - inoctets_per_minute 39960 | inoctets_per_minute=39960 ", "Checking multiplier"); | 184 | like($res->output, "/.*inoctets_per_minute.*=39960/", "Checking multiplier"); |
196 | }; | 185 | }; |
197 | 186 | ||
198 | 187 | ||
199 | 188 | ||
200 | $res = NPTest->testCmd( "./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.11 -s '\"stringtests\"'" ); | 189 | $res = NPTest->testCmd( "./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.11 -s 'stringtests'" ); |
201 | is($res->return_code, 0, "OK as string matches" ); | 190 | is($res->return_code, 0, "OK as string matches" ); |
202 | is($res->output, 'SNMP OK - "stringtests" | ', "Good string match" ); | 191 | like($res->output, '/.*stringtests.*/', "Good string match" ); |
203 | 192 | ||
204 | $res = NPTest->testCmd( "./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.11 -s ring" ); | 193 | $res = NPTest->testCmd( "./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.11 -s ring" ); |
205 | is($res->return_code, 2, "CRITICAL as string doesn't match (though is a substring)" ); | 194 | is($res->return_code, 2, "CRITICAL as string doesn't match (though is a substring)" ); |
206 | is($res->output, 'SNMP CRITICAL - *"stringtests"* | ', "Failed string match" ); | 195 | like($res->output, '/.*stringtests.*/', "Failed string match" ); |
207 | 196 | ||
208 | $res = NPTest->testCmd( "./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.11 --invert-search -s '\"stringtests\"'" ); | 197 | $res = NPTest->testCmd( "./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.11 --invert-search -s 'stringtests'" ); |
209 | is($res->return_code, 2, "CRITICAL as string matches but inverted" ); | 198 | is($res->return_code, 2, "CRITICAL as string matches but inverted" ); |
210 | is($res->output, 'SNMP CRITICAL - *"stringtests"* | ', "Inverted string match" ); | 199 | like($res->output, '/.*"stringtests".*/', "Inverted string match" ); |
211 | 200 | ||
212 | $res = NPTest->testCmd( "./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.11 --invert-search -s ring" ); | 201 | $res = NPTest->testCmd( "./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.11 --invert-search -s ring" ); |
213 | is($res->return_code, 0, "OK as string doesn't match but inverted" ); | 202 | is($res->return_code, 0, "OK as string doesn't match but inverted" ); |
214 | is($res->output, 'SNMP OK - "stringtests" | ', "OK as inverted string no match" ); | 203 | like($res->output, '/.*"stringtests".*/', "OK as inverted string no match" ); |
215 | 204 | ||
216 | $res = NPTest->testCmd( "./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.12 -w 4:5" ); | 205 | $res = NPTest->testCmd( "./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.12 -w 4:5" ); |
217 | is($res->return_code, 1, "Numeric in string test" ); | 206 | # a string is a string and not a number |
218 | is($res->output, 'SNMP WARNING - *3.5* | iso.3.6.1.4.1.8072.3.2.67.12=3.5;4:5 ', "WARNING threshold checks for string masquerading as number" ); | 207 | is($res->return_code, 0, "Numeric in string test" ); |
208 | like($res->output, '/.*3.5.*| iso.3.6.1.4.1.8072.3.2.67.12=3.5;4:5/', "WARNING threshold checks for string masquerading as number" ); | ||
219 | 209 | ||
220 | $res = NPTest->testCmd( "./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.13" ); | 210 | $res = NPTest->testCmd( "./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.13" ); |
221 | is($res->return_code, 0, "Not really numeric test" ); | 211 | is($res->return_code, 0, "Not really numeric test" ); |
222 | is($res->output, 'SNMP OK - "87.4startswithnumberbutshouldbestring" | ', "Check string with numeric start is still string" ); | 212 | like($res->output, '/.*"87.4startswithnumberbutshouldbestring".*/', "Check string with numeric start is still string" ); |
223 | 213 | ||
224 | $res = NPTest->testCmd( "./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.14" ); | 214 | $res = NPTest->testCmd( "./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.14" ); |
225 | is($res->return_code, 0, "Not really numeric test (trying best to fool it)" ); | 215 | is($res->return_code, 0, "Not really numeric test (trying best to fool it)" ); |
226 | is($res->output, 'SNMP OK - "555\"I said\"" | ', "Check string with a double quote following is still a string (looks like the perl routine will always escape though)" ); | 216 | like($res->output, '/.*\'555"I said"\'.*/', "Check string with a double quote following is still a string (looks like the perl routine will always escape though)" ); |
227 | 217 | ||
228 | $res = NPTest->testCmd( "./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.15 -r 'CUSTOM CHECK OK'" ); | 218 | $res = NPTest->testCmd( "./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.15 -r 'CUSTOM CHECK OK'" ); |
229 | is($res->return_code, 0, "String check should check whole string, not a parsed number" ); | 219 | is($res->return_code, 0, "String check should check whole string, not a parsed number" ); |
230 | is($res->output, 'SNMP OK - "CUSTOM CHECK OK: foo is 12345" | ', "String check with numbers returns whole string"); | 220 | like($res->output, '/.*CUSTOM CHECK OK: foo is 12345.*/', "String check with numbers returns whole string"); |
231 | 221 | ||
232 | $res = NPTest->testCmd( "./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.16 -w -2: -c -3:" ); | 222 | $res = NPTest->testCmd( "./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.16 -w -2: -c -3:" ); |
233 | is($res->return_code, 0, "Negative integer check OK" ); | 223 | is($res->return_code, 0, "Negative integer check OK" ); |
234 | is($res->output, 'SNMP OK - -2 | iso.3.6.1.4.1.8072.3.2.67.16=-2;-2:;-3: ', "Negative integer check OK output" ); | 224 | like($res->output, '/.*-2.*| iso.3.6.1.4.1.8072.3.2.67.16=-2;-2:;-3:/', "Negative integer check OK output" ); |
235 | 225 | ||
236 | $res = NPTest->testCmd( "./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.16 -w -2: -c -3:" ); | 226 | $res = NPTest->testCmd( "./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.16 -w -2: -c -3:" ); |
237 | is($res->return_code, 1, "Negative integer check WARNING" ); | 227 | is($res->return_code, 1, "Negative integer check WARNING" ); |
238 | is($res->output, 'SNMP WARNING - *-3* | iso.3.6.1.4.1.8072.3.2.67.16=-3;-2:;-3: ', "Negative integer check WARNING output" ); | 228 | like($res->output, '/.*-3.*| iso.3.6.1.4.1.8072.3.2.67.16=-3;-2:;-3:/', "Negative integer check WARNING output" ); |
239 | 229 | ||
240 | $res = NPTest->testCmd( "./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.16 -w -2: -c -3:" ); | 230 | $res = NPTest->testCmd( "./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.16 -w -2: -c -3:" ); |
241 | is($res->return_code, 2, "Negative integer check CRITICAL" ); | 231 | is($res->return_code, 2, "Negative integer check CRITICAL" ); |
242 | is($res->output, 'SNMP CRITICAL - *-4* | iso.3.6.1.4.1.8072.3.2.67.16=-4;-2:;-3: ', "Negative integer check CRITICAL output" ); | 232 | like($res->output, '/.*-4.*| iso.3.6.1.4.1.8072.3.2.67.16=-4;-2:;-3:/', "Negative integer check CRITICAL output" ); |
243 | 233 | ||
244 | $res = NPTest->testCmd( "./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.17 -w -3: -c -6:" ); | 234 | $res = NPTest->testCmd( "./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.17 -w -3: -c -6:" ); |
245 | is($res->return_code, 1, "Negative integer as string, WARNING" ); | 235 | is($res->return_code, 1, "Negative integer as string, WARNING" ); |
246 | is($res->output, 'SNMP WARNING - *-4* | iso.3.6.1.4.1.8072.3.2.67.17=-4;-3:;-6: ', "Negative integer as string, WARNING output" ); | 236 | like($res->output, '/.*-4.*| iso.3.6.1.4.1.8072.3.2.67.17=-4;-3:;-6:/', "Negative integer as string, WARNING output" ); |
247 | 237 | ||
248 | $res = NPTest->testCmd( "./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.17 -w -2: -c -3:" ); | 238 | $res = NPTest->testCmd( "./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.17 -w -2: -c -3:" ); |
249 | is($res->return_code, 2, "Negative integer as string, CRITICAL" ); | 239 | is($res->return_code, 2, "Negative integer as string, CRITICAL" ); |
250 | is($res->output, 'SNMP CRITICAL - *-4* | iso.3.6.1.4.1.8072.3.2.67.17=-4;-2:;-3: ', "Negative integer as string, CRITICAL output" ); | 240 | like($res->output, '/.*-4.*| iso.3.6.1.4.1.8072.3.2.67.17=-4;-2:;-3:/', "Negative integer as string, CRITICAL output" ); |
251 | 241 | ||
252 | $res = NPTest->testCmd( "./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.18 -c '~:-6.5'" ); | 242 | # deactivated since the perl agent api of snmpd really does not allow floats |
253 | is($res->return_code, 0, "Negative float OK" ); | 243 | # $res = NPTest->testCmd( "./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.18 -c '~:-6.5'" ); |
254 | is($res->output, 'SNMP OK - -6.6 | iso.3.6.1.4.1.8072.3.2.67.18=-6.6;;@-6.5:~ ', "Negative float OK output" ); | 244 | # is($res->return_code, 0, "Negative float OK" ); |
245 | # is($res->output, '-6.6 | iso.3.6.1.4.1.8072.3.2.67.18=-6.6;;@-6.5:~ ', "Negative float OK output" ); | ||
255 | 246 | ||
256 | $res = NPTest->testCmd( "./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.18 -w '~:-6.65' -c '~:-6.55'" ); | 247 | # $res = NPTest->testCmd( "./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.18 -w '~:-6.65' -c '~:-6.55'" ); |
257 | is($res->return_code, 1, "Negative float WARNING" ); | 248 | # is($res->return_code, 1, "Negative float WARNING" ); |
258 | is($res->output, 'SNMP WARNING - *-6.6* | iso.3.6.1.4.1.8072.3.2.67.18=-6.6;@-6.65:~;@-6.55:~ ', "Negative float WARNING output" ); | 249 | # like($res->output, '/-6.6.*| .*67.18=-6.6;@-6.65:~;@-6.55:~/', "Negative float WARNING output" ); |
259 | 250 | ||
260 | $res = NPTest->testCmd( "./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.10,.1.3.6.1.4.1.8072.3.2.67.17 -w '1:100000,-10:20' -c '2:200000,-20:30'" ); | 251 | $res = NPTest->testCmd( "./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.10,.1.3.6.1.4.1.8072.3.2.67.17 -w '1:100000,-10:20' -c '2:200000,-20:30'" ); |
261 | is($res->return_code, 0, "Multiple OIDs with thresholds" ); | 252 | is($res->return_code, 0, "Multiple OIDs with thresholds" ); |
262 | like($res->output, '/SNMP OK - \d+ -4 | iso.3.6.1.4.1.8072.3.2.67.10=\d+c;1:100000;2:200000 iso.3.6.1.4.1.8072.3.2.67.17=-4;-10:20;-20:30/', "Multiple OIDs with thresholds output" ); | 253 | like($res->output, '/-4.*| .*67.10=\d+c;1:100000;2:200000 .*67.17=-4;-10:20;-20:30/', "Multiple OIDs with thresholds output" ); |
263 | 254 | ||
264 | $res = NPTest->testCmd( "./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.10,.1.3.6.1.4.1.8072.3.2.67.17 -w '1:100000,-1:2' -c '2:200000,-20:30'" ); | 255 | $res = NPTest->testCmd( "./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.10,.1.3.6.1.4.1.8072.3.2.67.17 -w '1:100000,-1:2' -c '2:200000,-20:30'" ); |
265 | is($res->return_code, 1, "Multiple OIDs with thresholds" ); | 256 | is($res->return_code, 1, "Multiple OIDs with thresholds" ); |
266 | like($res->output, '/SNMP WARNING - \d+ \*-4\* | iso.3.6.1.4.1.8072.3.2.67.10=\d+c;1:100000;2:200000 iso.3.6.1.4.1.8072.3.2.67.17=-4;-10:20;-20:30/', "Multiple OIDs with thresholds output" ); | 257 | like($res->output, '/-4.*| iso.3.6.1.4.1.8072.3.2.67.10=\d+c;1:100000;2:200000 iso.3.6.1.4.1.8072.3.2.67.17=-4;-10:20;-20:30/', "Multiple OIDs with thresholds output" ); |
267 | 258 | ||
268 | $res = NPTest->testCmd( "./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.10,.1.3.6.1.4.1.8072.3.2.67.17 -w 1,2 -c 1" ); | 259 | $res = NPTest->testCmd( "./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.10,.1.3.6.1.4.1.8072.3.2.67.17 -w 1,2 -c 1 -O" ); |
269 | is($res->return_code, 2, "Multiple OIDs with some thresholds" ); | 260 | is($res->return_code, 2, "Multiple OIDs with some thresholds" ); |
270 | like($res->output, '/SNMP CRITICAL - \*\d+\* \*-4\* | iso.3.6.1.4.1.8072.3.2.67.10=\d+c;1;2 iso.3.6.1.4.1.8072.3.2.67.17=-4;;/', "Multiple OIDs with thresholds output" ); | 261 | like($res->output, '/.*-4.*| iso.3.6.1.4.1.8072.3.2.67.10=\d+c;1;2 iso.3.6.1.4.1.8072.3.2.67.17=-4;;/', "Multiple OIDs with thresholds output" ); |
271 | 262 | ||
272 | $res = NPTest->testCmd( "./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.19"); | 263 | $res = NPTest->testCmd( "./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.19"); |
273 | is($res->return_code, 0, "Test plain .1.3.6.1.4.1.8072.3.2.67.6 RC" ); | 264 | is($res->return_code, 0, "Test plain .1.3.6.1.4.1.8072.3.2.67.6 RC" ); |
274 | is($res->output,'SNMP OK - 42 | iso.3.6.1.4.1.8072.3.2.67.19=42 ', "Test plain value of .1.3.6.1.4.1.8072.3.2.67.1" ); | 265 | like($res->output,'/.*42.*| iso.3.6.1.4.1.8072.3.2.67.19=42/', "Test plain value of .1.3.6.1.4.1.8072.3.2.67.1" ); |
275 | 266 | ||
276 | $res = NPTest->testCmd( "./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.19 -M .1"); | 267 | $res = NPTest->testCmd( "./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.19 -M .1"); |
277 | is($res->return_code, 0, "Test multiply RC" ); | 268 | is($res->return_code, 0, "Test multiply RC" ); |
278 | is($res->output,'SNMP OK - 4.200000 | iso.3.6.1.4.1.8072.3.2.67.19=4.200000 ' , "Test multiply .1 output" ); | 269 | like($res->output,'/.*4.200000.*| iso.3.6.1.4.1.8072.3.2.67.19=4.200000/' , "Test multiply .1 output" ); |
279 | 270 | ||
280 | $res = NPTest->testCmd( "./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.19 --multiplier=.1 -f '%.2f' "); | 271 | $res = NPTest->testCmd( "./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.19 --multiplier=.1"); |
281 | is($res->return_code, 0, "Test multiply RC + format" ); | 272 | is($res->return_code, 0, "Test multiply RC" ); |
282 | is($res->output, 'SNMP OK - 4.20 | iso.3.6.1.4.1.8072.3.2.67.19=4.20 ', "Test multiply .1 output + format" ); | 273 | like($res->output, '/.*4.20.*| iso.3.6.1.4.1.8072.3.2.67.19=4.20/', "Test multiply .1 output" ); |
283 | 274 | ||
284 | $res = NPTest->testCmd( "./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.19 --multiplier=.1 -f '%.2f' -w 1"); | 275 | $res = NPTest->testCmd( "./check_snmp -H 127.0.0.1 -C public -p $port_snmp -o .1.3.6.1.4.1.8072.3.2.67.19 --multiplier=.1 -w 1"); |
285 | is($res->return_code, 1, "Test multiply RC + format + thresholds" ); | 276 | is($res->return_code, 1, "Test multiply RC + thresholds" ); |
286 | is($res->output, 'SNMP WARNING - *4.20* | iso.3.6.1.4.1.8072.3.2.67.19=4.20;1 ', "Test multiply .1 output + format + thresholds" ); | 277 | like($res->output, '/.*4.20.* | iso.3.6.1.4.1.8072.3.2.67.19=4.20+;1/', "Test multiply .1 output + thresholds" ); |
diff --git a/plugins/tests/check_snmp_agent.pl b/plugins/tests/check_snmp_agent.pl index 38912e98..608b6f92 100644 --- a/plugins/tests/check_snmp_agent.pl +++ b/plugins/tests/check_snmp_agent.pl | |||
@@ -4,9 +4,10 @@ | |||
4 | # | 4 | # |
5 | 5 | ||
6 | #use strict; # Doesn't work | 6 | #use strict; # Doesn't work |
7 | use warnings; | ||
7 | use NetSNMP::OID qw(:all); | 8 | use NetSNMP::OID qw(:all); |
8 | use NetSNMP::agent; | 9 | use NetSNMP::agent; |
9 | use NetSNMP::ASN qw(ASN_OCTET_STR ASN_COUNTER ASN_COUNTER64 ASN_INTEGER ASN_INTEGER64 ASN_UNSIGNED ASN_UNSIGNED64); | 10 | use NetSNMP::ASN qw(ASN_OCTET_STR ASN_COUNTER ASN_COUNTER64 ASN_INTEGER ASN_INTEGER64 ASN_UNSIGNED ASN_UNSIGNED64 ASN_FLOAT); |
10 | #use Math::Int64 qw(uint64); # Skip that module while we don't need it | 11 | #use Math::Int64 qw(uint64); # Skip that module while we don't need it |
11 | sub uint64 { return $_ } | 12 | sub uint64 { return $_ } |
12 | 13 | ||
@@ -22,21 +23,82 @@ IOS (tm) Catalyst 4000 "L3" Switch Software (cat4000-I9K91S-M), Version | |||
22 | Technical Support: http://www.cisco.com/techsupport | 23 | Technical Support: http://www.cisco.com/techsupport |
23 | Copyright (c) 1986-2004 by cisco Systems, Inc. | 24 | Copyright (c) 1986-2004 by cisco Systems, Inc. |
24 | '; | 25 | '; |
25 | my $multilin2 = "Kisco Outernetwork Oserating Gystem Totware | 26 | my $multiline2 = "Kisco Outernetwork Oserating Gystem Totware |
26 | Copyleft (c) 2400-2689 by kisco Systrems, Inc."; | 27 | Copyleft (c) 2400-2689 by kisco Systrems, Inc."; |
27 | my $multilin3 = 'This should not confuse check_snmp "parser" | 28 | my $multiline3 = 'This should not confuse check_snmp "parser" |
28 | into thinking there is no 2nd line'; | 29 | into thinking there is no 2nd line'; |
29 | my $multilin4 = 'It\'s getting even harder if the line | 30 | my $multiline4 = 'It\'s getting even harder if the line |
30 | ends with with this: C:\\'; | 31 | ends with with this: C:\\'; |
31 | my $multilin5 = 'And now have fun with with this: "C:\\" | 32 | my $multiline5 = 'And now have fun with with this: "C:\\" |
32 | because we\'re not done yet!'; | 33 | because we\'re not done yet!'; |
33 | 34 | ||
34 | # Next are arrays of indexes (Type, initial value and increments) | 35 | # Next are arrays of indexes (Type, initial value and increments) |
35 | # 0..19 <---- please update comment when adding/removing fields | 36 | # 0..19 <---- please update comment when adding/removing fields |
36 | my @fields = (ASN_OCTET_STR, ASN_OCTET_STR, ASN_OCTET_STR, ASN_OCTET_STR, ASN_OCTET_STR, ASN_UNSIGNED, ASN_UNSIGNED, ASN_COUNTER, ASN_COUNTER64, ASN_UNSIGNED, ASN_COUNTER, ASN_OCTET_STR, ASN_OCTET_STR, ASN_OCTET_STR, ASN_OCTET_STR, ASN_OCTET_STR, ASN_INTEGER, ASN_OCTET_STR, ASN_OCTET_STR, ASN_INTEGER ); | 37 | my @fields = (ASN_OCTET_STR, # 0 |
37 | my @values = ($multiline, $multilin2, $multilin3, $multilin4, $multilin5, 4294965296, 1000, 4294965296, uint64("18446744073709351616"), int(rand(2**32)), 64000, "stringtests", "3.5", "87.4startswithnumberbutshouldbestring", '555"I said"', 'CUSTOM CHECK OK: foo is 12345', -2, '-4', '-6.6', 42 ); | 38 | ASN_OCTET_STR, # 1 |
39 | ASN_OCTET_STR, # 2 | ||
40 | ASN_OCTET_STR, # 3 | ||
41 | ASN_OCTET_STR, # 4 | ||
42 | ASN_UNSIGNED, # 5 | ||
43 | ASN_UNSIGNED, # 6 | ||
44 | ASN_COUNTER, # 7 | ||
45 | ASN_COUNTER64, # 8 | ||
46 | ASN_UNSIGNED, # 9 | ||
47 | ASN_COUNTER, # 10 | ||
48 | ASN_OCTET_STR, # 11 | ||
49 | ASN_OCTET_STR, # 12 | ||
50 | ASN_OCTET_STR, # 13 | ||
51 | ASN_OCTET_STR, # 14 | ||
52 | ASN_OCTET_STR, # 15 | ||
53 | ASN_INTEGER, # 16 | ||
54 | ASN_INTEGER, # 17 | ||
55 | ASN_FLOAT, # 18 | ||
56 | ASN_INTEGER # 19 | ||
57 | ); | ||
58 | my @values = ($multiline, # 0 | ||
59 | $multiline2, # 1 | ||
60 | $multiline3, # 2 | ||
61 | $multiline4, # 3 | ||
62 | $multiline5, # 4 | ||
63 | 4294965296, # 5 | ||
64 | 1000, # 6 | ||
65 | 4294965296, # 7 | ||
66 | uint64("18446744073709351616"), # 8 | ||
67 | int(rand(2**32)), # 9 | ||
68 | 64000, # 10 | ||
69 | "stringtests", # 11 | ||
70 | "3.5", # 12 | ||
71 | "87.4startswithnumberbutshouldbestring", # 13 | ||
72 | '555"I said"', # 14 | ||
73 | 'CUSTOM CHECK OK: foo is 12345', # 15 | ||
74 | '-2', # 16 | ||
75 | '-4', # 17 | ||
76 | '-6.6', # 18 | ||
77 | 42 # 19 | ||
78 | ); | ||
38 | # undef increments are randomized | 79 | # undef increments are randomized |
39 | my @incrts = (undef, undef, undef, undef, undef, 1000, -500, 1000, 100000, undef, 666, undef, undef, undef, undef, undef, -1, undef, undef, 0 ); | 80 | my @incrts = ( |
81 | undef, # 0 | ||
82 | undef, # 1 | ||
83 | undef, # 2 | ||
84 | undef, # 3 | ||
85 | undef, # 4 | ||
86 | 1000, # 5 | ||
87 | -500, # 6 | ||
88 | 1000, # 7 | ||
89 | 100000, # 8 | ||
90 | undef, # 9 | ||
91 | 666, # 10 | ||
92 | undef, # 11 | ||
93 | undef, # 12 | ||
94 | undef, # 13 | ||
95 | undef, # 14 | ||
96 | undef, # 15 | ||
97 | -1, # 16 | ||
98 | 0, # 17 | ||
99 | undef, # 18 | ||
100 | 0 # 19 | ||
101 | ); | ||
40 | 102 | ||
41 | # Number of elements in our OID | 103 | # Number of elements in our OID |
42 | my $oidelts; | 104 | my $oidelts; |
diff --git a/plugins/tests/test_check_snmp.c b/plugins/tests/test_check_snmp.c new file mode 100644 index 00000000..d71706d0 --- /dev/null +++ b/plugins/tests/test_check_snmp.c | |||
@@ -0,0 +1,175 @@ | |||
1 | /***************************************************************************** | ||
2 | * | ||
3 | * This program is free software: you can redistribute it and/or modify | ||
4 | * it under the terms of the GNU General Public License as published by | ||
5 | * the Free Software Foundation, either version 3 of the License, or | ||
6 | * (at your option) any later version. | ||
7 | * | ||
8 | * This program is distributed in the hope that it will be useful, | ||
9 | * but WITHOUT ANY WARRANTY; without even the implied warranty of | ||
10 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | ||
11 | * GNU General Public License for more details. | ||
12 | * | ||
13 | * You should have received a copy of the GNU General Public License | ||
14 | * along with this program. If not, see <http://www.gnu.org/licenses/>. | ||
15 | * | ||
16 | * | ||
17 | *****************************************************************************/ | ||
18 | |||
19 | #include "tap.h" | ||
20 | #include "../../config.h" | ||
21 | |||
22 | #include <unistd.h> | ||
23 | #include <sys/types.h> | ||
24 | #include <sys/stat.h> | ||
25 | |||
26 | #include "utils_base.c" | ||
27 | #include "../check_snmp.d/check_snmp_helpers.h" | ||
28 | |||
29 | char *_np_state_generate_key(int argc, char **argv); | ||
30 | char *_np_state_calculate_location_prefix(void); | ||
31 | |||
32 | int main(int argc, char **argv) { | ||
33 | char *temp_string = (char *)_np_state_generate_key(argc, argv); | ||
34 | ok(!strcmp(temp_string, "e2d17f995fd4c020411b85e3e3d0ff7306d4147e"), | ||
35 | "Got hash with exe and no parameters") || | ||
36 | diag("You are probably running in wrong directory. Must run as ./test_utils"); | ||
37 | |||
38 | int fake_argc = 4; | ||
39 | char *fake_argv[] = { | ||
40 | "./test_utils", | ||
41 | "here", | ||
42 | "--and", | ||
43 | "now", | ||
44 | }; | ||
45 | temp_string = (char *)_np_state_generate_key(fake_argc, fake_argv); | ||
46 | ok(!strcmp(temp_string, "bd72da9f78ff1419fad921ea5e43ce56508aef6c"), | ||
47 | "Got based on expected argv"); | ||
48 | |||
49 | unsetenv("MP_STATE_PATH"); | ||
50 | temp_string = (char *)_np_state_calculate_location_prefix(); | ||
51 | ok(!strcmp(temp_string, NP_STATE_DIR_PREFIX), "Got default directory"); | ||
52 | |||
53 | setenv("MP_STATE_PATH", "", 1); | ||
54 | temp_string = (char *)_np_state_calculate_location_prefix(); | ||
55 | ok(!strcmp(temp_string, NP_STATE_DIR_PREFIX), "Got default directory even with empty string"); | ||
56 | |||
57 | setenv("MP_STATE_PATH", "/usr/local/nagios/var", 1); | ||
58 | temp_string = (char *)_np_state_calculate_location_prefix(); | ||
59 | ok(!strcmp(temp_string, "/usr/local/nagios/var"), "Got default directory"); | ||
60 | |||
61 | fake_argc = 1; | ||
62 | fake_argv[0] = "./test_utils"; | ||
63 | state_key temp_state_key1 = np_enable_state(NULL, 51, "check_test", fake_argc, fake_argv); | ||
64 | ok(!strcmp(temp_state_key1.plugin_name, "check_test"), "Got plugin name"); | ||
65 | ok(!strcmp(temp_state_key1.name, "e2d17f995fd4c020411b85e3e3d0ff7306d4147e"), | ||
66 | "Got generated filename"); | ||
67 | |||
68 | state_key temp_state_key2 = | ||
69 | np_enable_state("allowedchars_in_keyname", 77, "check_snmp", fake_argc, fake_argv); | ||
70 | |||
71 | char state_path[1024]; | ||
72 | sprintf(state_path, "/usr/local/nagios/var/%lu/check_test/allowedchars_in_keyname", | ||
73 | (unsigned long)geteuid()); | ||
74 | ok(!strcmp(temp_state_key2.plugin_name, "check_test"), "Got plugin name"); | ||
75 | ok(!strcmp(temp_state_key2.name, "allowedchars_in_keyname"), "Got key name with valid chars"); | ||
76 | ok(!strcmp(temp_state_key2._filename, state_path), "Got internal filename"); | ||
77 | |||
78 | /* Don't do this test just yet. Will die */ | ||
79 | /* | ||
80 | np_enable_state("bad^chars$in@here", 77); | ||
81 | temp_state_key = this_monitoring_plugin->state; | ||
82 | ok( !strcmp(temp_state_key->name, "bad_chars_in_here"), "Got key name with bad chars replaced" | ||
83 | ); | ||
84 | */ | ||
85 | |||
86 | state_key temp_state_key3 = | ||
87 | np_enable_state("funnykeyname", 54, "check_snmp", fake_argc, fake_argv); | ||
88 | sprintf(state_path, "/usr/local/nagios/var/%lu/check_test/funnykeyname", | ||
89 | (unsigned long)geteuid()); | ||
90 | ok(!strcmp(temp_state_key3.plugin_name, "check_test"), "Got plugin name"); | ||
91 | ok(!strcmp(temp_state_key3.name, "funnykeyname"), "Got key name"); | ||
92 | |||
93 | ok(!strcmp(temp_state_key3._filename, state_path), "Got internal filename"); | ||
94 | ok(temp_state_key3.data_version == 54, "Version set"); | ||
95 | |||
96 | state_data *temp_state_data = np_state_read(temp_state_key3); | ||
97 | ok(temp_state_data == NULL, "Got no state data as file does not exist"); | ||
98 | |||
99 | /* | ||
100 | temp_fp = fopen("var/statefile", "r"); | ||
101 | if (temp_fp==NULL) | ||
102 | printf("Error opening. errno=%d\n", errno); | ||
103 | printf("temp_fp=%s\n", temp_fp); | ||
104 | ok( _np_state_read_file(temp_fp) == true, "Can read state file" ); | ||
105 | fclose(temp_fp); | ||
106 | */ | ||
107 | |||
108 | temp_state_key3._filename = "var/statefile"; | ||
109 | temp_state_data = np_state_read(temp_state_key3); | ||
110 | ok(temp_state_data != NULL, "Got state data now") || | ||
111 | diag("Are you running in right directory? Will get coredump next if not"); | ||
112 | ok(temp_state_data->time == 1234567890, "Got time"); | ||
113 | ok(!strcmp((char *)temp_state_data->data, "String to read"), "Data as expected"); | ||
114 | |||
115 | temp_state_key3.data_version = 53; | ||
116 | temp_state_data = np_state_read(temp_state_key3); | ||
117 | ok(temp_state_data == NULL, "Older data version gives NULL"); | ||
118 | temp_state_key3.data_version = 54; | ||
119 | |||
120 | temp_state_key3._filename = "var/nonexistent"; | ||
121 | temp_state_data = np_state_read(temp_state_key3); | ||
122 | ok(temp_state_data == NULL, "Missing file gives NULL"); | ||
123 | |||
124 | temp_state_key3._filename = "var/oldformat"; | ||
125 | temp_state_data = np_state_read(temp_state_key3); | ||
126 | ok(temp_state_data == NULL, "Old file format gives NULL"); | ||
127 | |||
128 | temp_state_key3._filename = "var/baddate"; | ||
129 | temp_state_data = np_state_read(temp_state_key3); | ||
130 | ok(temp_state_data == NULL, "Bad date gives NULL"); | ||
131 | |||
132 | temp_state_key3._filename = "var/missingdataline"; | ||
133 | temp_state_data = np_state_read(temp_state_key3); | ||
134 | ok(temp_state_data == NULL, "Missing data line gives NULL"); | ||
135 | |||
136 | unlink("var/generated"); | ||
137 | temp_state_key3._filename = "var/generated"; | ||
138 | |||
139 | time_t current_time = 1234567890; | ||
140 | np_state_write_string(temp_state_key3, current_time, "String to read"); | ||
141 | ok(system("cmp var/generated var/statefile") == 0, "Generated file same as expected"); | ||
142 | |||
143 | unlink("var/generated_directory/statefile"); | ||
144 | unlink("var/generated_directory"); | ||
145 | temp_state_key3._filename = "var/generated_directory/statefile"; | ||
146 | current_time = 1234567890; | ||
147 | np_state_write_string(temp_state_key3, current_time, "String to read"); | ||
148 | ok(system("cmp var/generated_directory/statefile var/statefile") == 0, | ||
149 | "Have created directory"); | ||
150 | |||
151 | /* This test to check cannot write to dir - can't automate yet */ | ||
152 | /* | ||
153 | unlink("var/generated_bad_dir"); | ||
154 | mkdir("var/generated_bad_dir", S_IRUSR); | ||
155 | np_state_write_string(current_time, "String to read"); | ||
156 | */ | ||
157 | |||
158 | temp_state_key3._filename = "var/generated"; | ||
159 | time(¤t_time); | ||
160 | np_state_write_string(temp_state_key3, 0, "String to read"); | ||
161 | temp_state_data = np_state_read(temp_state_key3); | ||
162 | /* Check time is set to current_time */ | ||
163 | ok(system("cmp var/generated var/statefile > /dev/null") != 0, | ||
164 | "Generated file should be different this time"); | ||
165 | ok(temp_state_data->time - current_time <= 1, "Has time generated from current time"); | ||
166 | |||
167 | /* Don't know how to automatically test this. Need to be able to redefine die and catch the | ||
168 | * error */ | ||
169 | /* | ||
170 | temp_state_key->_filename="/dev/do/not/expect/to/be/able/to/write"; | ||
171 | np_state_write_string(0, "Bad file"); | ||
172 | */ | ||
173 | |||
174 | np_cleanup(); | ||
175 | } | ||
diff --git a/plugins/tests/test_check_snmp.t b/plugins/tests/test_check_snmp.t new file mode 100755 index 00000000..967633e9 --- /dev/null +++ b/plugins/tests/test_check_snmp.t | |||
@@ -0,0 +1,6 @@ | |||
1 | #!/usr/bin/perl | ||
2 | use Test::More; | ||
3 | if (! -e "./test_check_snmp") { | ||
4 | plan skip_all => "./test_check_snmp not compiled - please enable libtap library to test"; | ||
5 | } | ||
6 | exec "./test_check_snmp"; | ||